- 31
- 78 778
b100dy_c0d3r
Приєднався 4 лип 2021
With a strong foundation in IT infrastructures, networking, web servers, Oracle and MySQL databases, huge Linux installations, virtualization environments, storage area networking, and embedded devices, I am an ethical hacker with extensive technical knowledge and expertise.
Since I was young, I have been passionate about electronics and technology, so I took online classes on my own.
I began my career as a freelance ethical hacker, but my long-term objective is to join a prestigious government agency or corporation.
I first developed an interest in Linux when I put it on my other devices as well as my Ultimate Gaming PC, which had 16 GB of RAM.
I have always messed around with different gadgets since I am curious about how they operate.
Since I was young, I have been passionate about electronics and technology, so I took online classes on my own.
I began my career as a freelance ethical hacker, but my long-term objective is to join a prestigious government agency or corporation.
I first developed an interest in Linux when I put it on my other devices as well as my Ultimate Gaming PC, which had 16 GB of RAM.
I have always messed around with different gadgets since I am curious about how they operate.
How to Link Kali Linux with Metasploitable 2 in VirtualBox
Hey there! In this video, we're diving into how to connect Kali Linux with Metasploitable 2 using VirtualBox. It's the perfect setup for anyone wanting to practice penetration testing in a secure environment.
Here's What I'll Cover
Network Configuration:
1. Setting up network adapters.
2. Making sure both VMs can communicate on the same network.
Connecting the VMs:
1. Checking network connectivity.
2. Configure NAT Network to ensure everything's linked correctly.
Handy Links:
Download VirtualBox: www.virtualbox.org/wiki/Downloads
Download Kali Linux: www.kali.org/
Download Metasploitable 2: sourceforge.net/projects/metasploitable/files/Metasploitable2/
Chapter:
0:00 Intro
0:20 Setup Metasploitable 2
0:35 Check IP Address
0:49 Configure the Network
2:00 Final Check
2:13 Ready to Rock!
Follow Me:
X: x.com/b100dy_c0d3r/
Instagram: b100dy_c0d3r
Don't Miss Out!
Like, comment, and hit that subscriber button for more tutorials on cybersecurity and ethical hacking!
Happy Hacking! 😺💻🔍
Here's What I'll Cover
Network Configuration:
1. Setting up network adapters.
2. Making sure both VMs can communicate on the same network.
Connecting the VMs:
1. Checking network connectivity.
2. Configure NAT Network to ensure everything's linked correctly.
Handy Links:
Download VirtualBox: www.virtualbox.org/wiki/Downloads
Download Kali Linux: www.kali.org/
Download Metasploitable 2: sourceforge.net/projects/metasploitable/files/Metasploitable2/
Chapter:
0:00 Intro
0:20 Setup Metasploitable 2
0:35 Check IP Address
0:49 Configure the Network
2:00 Final Check
2:13 Ready to Rock!
Follow Me:
X: x.com/b100dy_c0d3r/
Instagram: b100dy_c0d3r
Don't Miss Out!
Like, comment, and hit that subscriber button for more tutorials on cybersecurity and ethical hacking!
Happy Hacking! 😺💻🔍
Переглядів: 460
Відео
5 Ways To Secure Your Network
Переглядів 137Рік тому
Knowing how to secure home Wi-Fi networks is critical to protecting your devices from hackers and cybercriminals. If someone gains access to your local network, they can easily access your personal data by "listening" to your internet traffic. Once this occurs, the cybercriminal can launch various attacks against your Wi-Fi security, including "man in the middle" attacks, ransomware, or outrigh...
A Guide to Steganography
Переглядів 219Рік тому
From invisible ink to highly complex algorithms, steganography is all around us. Steganography is a fascinating and often misunderstood technique of concealing information, and it has experienced a revival in the digital world. This video discusses everything you need to know about steganography.
Discovering SQL injections in GET - 05 SQL Injection Documentary
Переглядів 692Рік тому
I'm back!!! Actually, this video was created more than 2 months ago, I was skeptical about uploading this when I found my channel received strikes for some reason. But anyways, enjoy! #Hack #Hacker #Hacking
Discovering SQL injections In POST - 03 SQL Injection Documentary
Переглядів 8982 роки тому
The login structure we will use in our examples is straightforward. It contains two input fields (username and password), which are both vulnerable. The back-end content creates a query to approve the username and secret key given by the client. To sidestep login and access restricted areas, the attacker needs to build an SQL section that will change the “WHERE” clause and make it true. For ins...
Dangers of SQL Injection - 02 SQL Injection Documentary
Переглядів 7022 роки тому
SQL injection vulnerability is the most dangerous one as it compromises data integrity and authenticity and this has been listed among the top 10 in the OWASP list with exploits being updated regularly. SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of a...
What is SQL? - 01 SQL Injection Documentary
Переглядів 7742 роки тому
Episode 1: Structured Query Language - or SQL, is a language that communicates with databases. Learn what SQL is, and why it is an important language to learn in the era of big data.
How Hackers Embed Trojans in Microsoft Documents
Переглядів 15 тис.2 роки тому
One of the most effective methods of compromising computer security, especially as part of a targeted attack, involves emailing the victim a malicious Microsoft Office document. Even though the notion of a document originally involved non-executable data, hackers found ways to cause Microsoft Office to execute code embedded within the document. Hiding malicious code within a macro is a malware ...
How To Detect Virus Manually
Переглядів 7442 роки тому
Thank you for watching my video! Drop a like and a sub to the channel if you haven't already! ⚠️ Disclaimer: ⚠️ This Video is for informational and educational purposes only. I believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. I believe that it is impossible to defend yourself from hackers without...
How To Set Payload In Metasploit
Переглядів 15 тис.2 роки тому
A payload in Metasploit refers to an exploit module. There are three different types of payload modules in the Metasploit Framework: Singles, Stagers, and Stages. These different types allow for a great deal of versatility and can be useful across numerous types of scenarios. Whether or not a payload is staged, is represented by ‘/’ in the payload name.
Crunch: Wordlist Generator
Переглядів 4,5 тис.3 роки тому
Crunch is a wordlist generator where you can specify a standard character set or any set of characters to be used in generating the wordlists. The wordlists are created through the combination and permutation of a set of characters. You can determine the number of characters and list size. This tool supports numbers and symbols, upper and lower case characters separately, and Unicode.
Inject Your Data Into Any Websites
Переглядів 1,3 тис.3 роки тому
In this video, I will show you how easy to inject data into any websites you want to inject. Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers. #Hack #Hacker #Hacking
How to Crack ZIP File Password Using John the Ripper
Переглядів 13 тис.3 роки тому
How to Crack ZIP File Password Using John the Ripper
MAC Address Explain | How To Change It | Fix It Reverting To The Original
Переглядів 2,9 тис.3 роки тому
MAC Address Explain | How To Change It | Fix It Reverting To The Original
Episode 3 | Update and Upgrade | Ethical Hacking Series
Переглядів 5123 роки тому
Episode 3 | Update and Upgrade | Ethical Hacking Series
Episode 2 | The Terminal - Basic Commands | Ethical Hacking Series
Переглядів 6943 роки тому
Episode 2 | The Terminal - Basic Commands | Ethical Hacking Series
Episode 1 | Cyber-Attack Chain | Ethical Hacking Series
Переглядів 7563 роки тому
Episode 1 | Cyber-Attack Chain | Ethical Hacking Series
How to Upgrade to Windows 11 on Unsupported Hardware (100% working!)
Переглядів 7673 роки тому
How to Upgrade to Windows 11 on Unsupported Hardware (100% working!)
Check If Your Accounts Have Already Been Hacked
Переглядів 6923 роки тому
Check If Your Accounts Have Already Been Hacked
How A Hacker Break Into Any Windows Computer
Переглядів 1 тис.3 роки тому
How A Hacker Break Into Any Windows Computer
How To Install RouterSploit In Kali Linux
Переглядів 5 тис.3 роки тому
How To Install RouterSploit In Kali Linux
Its still don't connect... I don't get any ipv4 in metasploitable2
Bro make video on how to access devices connected to same public wifi
Bro make video on how to access devices connected to same public wifi
Thank you very much for your suggestion, my friend. I will plan for that as soon as possible.
This is the best video I've seen on setting up network adapters in VirtualBox so they can talk to each other.
You're amazing with words! You explained it so clearly. Thanks a lot!
Finding your video was like striking gold after digging through a mountain of rocks. I sifted through six other videos that led nowhere, but yours was the treasure I was searching for. Thanks a million!
This underrated channels is always what makes the most gifted people! Keep up the good work
Thank you for the kind message, my friend. I am returning once again.
Sir can you hack Facebook password
I have a technique that I use to retrieve passwords. However, hacking is wrong, and I am not a bad person. I am an advocate for the oppressed.
I want siber attac haking
Take your time, do your thin, and then you can start movin' forward. Trust me, it'll pay off in the long run.
does it work?
Oh, it's working. As long as all the inputs you provided are correct, it is guaranteed to function.
It can't bypass AVs
I know this 'cause a bunch of folks already uploaded that thing to Virus Total, and now all the antivirus services got it in their database.
@b100dy_c0d3r 1 year back I didn't knew about other techniques now I know so don't care
@@RaGhav363 can u share any other techniques ?
@@zifols9551 yeah using a crypter
is it not detected by AV ? as per now?
After creating the payload, what do you do???
You can send it to your target, it can be sent in any way. That's where your social engineering comes in.
Bruh why your face is so white? Do you use make-up Bruh?
Can you please do a video about secure online banking?
Would it be clever to change the SSID to a default name of another manufacturer to mislead anyone trying to sniff?
I hope this solves my problem, thanks for your knowledge! I will let you know.
Hi just saw your video, but I have a quick question. If my home Wi_-Fi is off how come I can still be on my tablet watching you. Thanks for sharing. 👍😏
Awesome ideas, bro... Thanks for this vid! Question: I live in a house with multiple tenants. The woman upstairs has given me (and the other tenant, I presume) the passcode to the network. Should we have the same passcode? Would the woman upstairs have access to my devices since she was the one who gave out the passcode? Would the other tenant (who, I presume has the exact same passcode... In fact I know he does?) Stange happpenings across all my devices. Btw, she has control of the router. Tnx, in advance; I get mixed info on this matter.
Thank you bro, I do have a question though is there a way to detect if someone is using your Wi-Fi? If so is there a way to prevent it?
It would be cool if you can set up guest accounts that automatically time out after a few days. Burner accounts for your Wi-Fi network.
Thank you for helpful info. Now I need to get started putting these safeguards in place. 👍
I am looking to hide my SSID and of course with this, my WPS is disabled. I have read that this is usually better but wanted to ask your take on it. Would it be considered better practice to hide my SSID and disable my WPS with it?
Great stuff, mate. Keep diggin'
Can you please do a video about printer security? I've heard that a Wi-Fi printer can be hacked? Also an explanation about how faxing is safer, and how to make our at home printers safe as well! Thanks
I'm glad I found this channel. Thanks for your great content! My concern is that my ISP provides a router from a certain overseas manufacturer whose government is not known for respecting privacy. I did all of the standard recommendations but I am concerned that the router may have a backdoor that a malicious actor can use. Am I being overly paranoid?
Thank you, fast, simple and easy.
Great tips, I especially liked the WPA Enterprise. Thank you!
Hello, thank you for sharing those tips. I was wondering is there a way to make my network more secure if I'm using a shared Wi-Fi with an Wi-Fi extender? Thank you so much in advance. Best wishes!
This guy deserves way more subscribers.
Very insightful and informative, thanks a lot!
bro u have telegram or whatsaap
what is this os
kali
Hi, how did you make such a voice?
I'm glad I found you, bro.
Bro be making videos under the ocean, appreciate his efforts.
DUDE holy crap thank you so much. Had an assignment to learn this and this is the only vid i understood from. Ur a life saver
I'm immensely grateful for this sly form of data concealment tutorial. I appreciate you.
Thanks a lot ❤ very easy to understand and very helpful 😊
Wow. This is so well explained and easy to follow. Best video I've found.
This was a cool tutorial! Thank you! I'm doing a virtual scavenger hunt and this will be super handy!
This is one of the most simple yet useful content on the platform! Keep it up!
This video is very simple, easy to understand, and goes straight to the point. Thank you for this tutorial.
This channel made me able to solve various challenges. Thank you so much.
Awesome! Tactics and tools alone are helpful, but understanding what you're looking for really makes for valuable content. Keep up the great work!
I'm a full-stack programmer and love reverse engineering and cracking stuff, security, and playing around. Keep up the good work !
Thanks for the indormation Please upload cryptography and hashing videos
Hello. Firstly, I want to appreciate the effort you made in this video, it's worth it. Please, I wish to plead with you to make the video transcript and also I wish to plead with you for the code.
Technically awesome. ❤ The way you explained is great.