ofc a lot has changed in 5 years, but this video is still highly discoverable and helpful with nmap 7.94 worth mentioning, nmap users now must include "vulscan/vulscan.nse" and/or "nmap-vulners/vulners.nse" after the --script. not just "vulscan" anymore, or youll get an error for empty directory
Man Kody scares the shit outta me!! lol I mean like i wouldn't wanna piss him off! But they do produce some pretty amazing content! I'm training to become a PenTester now and between this channel and Cybrary I'll be penetrating people's networks in no time!
Give this guy a like, he is taking the time to share the knowledge to even the beginners and he has great tips! One of my favorites.. Thank you 🙏, you are appreciated!
Null Byte No Thank YOU! Your taking the time to do what many hackers/pentesters etc and pass on your skill.. Most of the people have the attitude of I”learned it myself, and so should you” But some people need a push.. And u are that push for me, you made me go buy a raspberry and WiFi adapters, first time I clips influenced me like this so keep doing what ur doing..Do you provide any online courses that i can take and pay for like live sessions, that would be so dope.. You are appreciated 🙏 .
Your content is just amazing. By far one of the best security channels I have ever seen. Love the cat images in the background ;) perfect reference to deep learning if you ask me.
If we take all the content on this channel and compare it to other content out there we gonna find that this content here is not available out there, thats why this channel worth more than 1m$, Oops I said that last time, by updating my packages, its worth now 1. 000000*10 b$
(4:17) Like the vulscan and the nmap-vulners script. Thank you for sharing. One thing I am not clear about, it looks like you would have to pull the script down from Github and this is not out of the box script from Nmap?
U can work round that with -Pn or use -D and for decoy to spoof an IP you type in. So they don't really know its you if you don't want them to know that you scanned them.
Pls how to interact with router by using python i want to write a code that do similar to reaver it send wps pin and receive output to see if the pin was correct . What module i have to use i heard of piramiko and scapy and heard that i have to logine to router by ssh but we need hostname to do that . Pls if you can do a video about it or tell me where i can find a answer . Thank you
Thanks Kody, excellent as always. Would be great to get an overview of how you got into hacking/InfoSec, experience and how you recommend getting into the industry.
@Null Byte i have to find a Linux Kernel vulnerability on a machine however when i run the code i am unable to find the correct one, they are listed there but not the kernel one, any chance you can help
Quick question about cracking wifi hashes : can an attacker be thinking that it got the right password if the target clients use wrong password when the handshake was captured? An attacker launches deauth attack and listens for handshakes and in the time the attacker listens someone tries to connect to target wifi using wrong password then the attacker gets the handshake and tries to decrypt it and will the final password be the correct one or the invalid used by the someone who tried to connect while an attacker was listening? Im sorry for my english
Yes after deauth is finished there is a possibility that someone is typing password right at that time and that u will catch wrong password he typed instead of other devices automaticly connecting back, tho the chances for that are almost close to 0
Hey bro, how are you doing? I’m having some trouble with assignment. I was wondering if you could reach out and we could get in contact and you could help me please
Hi, i hope anyone can help me with this. when i execute "nmap --script vulscan,nmap-vulners -sV " everything was clean and i remember that the server was installed some apache 2.2 , so do i have to connect in the same network or i can do a vulscan on the public IP?
@@vamsikrishna9737 yeah i have permission as i would like to use nmap vulscan to check for the vulnerability. but it doesnt show at all. appreciate any help?
@@garytan3531 if the commands you run are executing without any errors then I think the vunlerablity is patched or they are updated so you are not getting anything other way is to try Nessus or openvas
@@vamsikrishna9737 I used trial version nessus on the internal network and scan with bunch of vulnerabilities but when I use another computer not within the network to nmap vulscan no vulnerability.
Hi. I need help. Whenever I am trying to do a Vulnerabilities scan or Service scan. I am receiving following error AllProbes::compileFallbacks: Unknown fallback specified in Probe DNSVersionBindReqTCP: 'DNSVersionBindReq' . Could you please help out solving this error or anyone can give any clue for the same?
NSE: failed to initialize the script engine: /usr/bin/../share/nmap/nse_main.lua:821: directory '/usr/bin/../share/nmap/scripts/vulscan' found, but will not match without '/' stack traceback: [C]: in function 'error' /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts' /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk [C]: in ? QUITTING!
ofc a lot has changed in 5 years, but this video is still highly discoverable and helpful with nmap 7.94
worth mentioning, nmap users now must include "vulscan/vulscan.nse" and/or "nmap-vulners/vulners.nse" after the --script. not just "vulscan" anymore, or youll get an error for empty directory
I love this channel so much. I learned a lot of things, especially writing your own script. That was amazing.
I'm glad it's helpful! Thanks for watching
Kody, you and your team need a tv program. I Love what you do and I’m sure I ain’t the only one.
Man Kody scares the shit outta me!! lol I mean like i wouldn't wanna piss him off! But they do produce some pretty amazing content! I'm training to become a PenTester now and between this channel and Cybrary I'll be penetrating people's networks in no time!
@@roberthorn6707 Hahaha thank you
@@roberthorn6707 lols right! I don't think anyone wants to land on his blacklist. That has to be a pretty scary spot to be in.
@@NullByteWHT Kody, If you ever do a meet & greet somewhere let me know I'm very interested, sounds like a lot of fun.
Jean Suriel what is tv program
Give this guy a like, he is taking the time to share the knowledge to even the beginners and he has great tips! One of my favorites.. Thank you 🙏, you are appreciated!
Thank you!
Null Byte No Thank YOU! Your taking the time to do what many hackers/pentesters etc and pass on your skill.. Most of the people have the attitude of I”learned it myself, and so should you” But some people need a push.. And u are that push for me, you made me go buy a raspberry and WiFi adapters, first time I clips influenced me like this so keep doing what ur doing..Do you provide any online courses that i can take and pay for like live sessions, that would be so dope.. You are appreciated 🙏 .
Top man just love your tutorials - thank you very much for all the effort you put in to publishing these.
Thank you for watching
Your content is just amazing. By far one of the best security channels I have ever seen. Love the cat images in the background ;) perfect reference to deep learning if you ask me.
Stumbled upon this site and love the content it helped me tremendously.
Glad it's helpful to you!
Very useful, Kody and Tokyoneon number one!
congratulations 500k dude hope keep going
Thanks
So good as usual. Thanks Kody. Been learning so much from you.
If we take all the content on this channel and compare it to other content out there we gonna find that this content here is not available out there, thats why this channel worth more than 1m$,
Oops I said that last time, by updating my packages, its worth now 1. 000000*10 b$
I really enjoy making these for all of you, I'm glad you think so highly of them!
How can I create phishing page
Please guide me
Steps to do this needed
@@NullByteWHT NSE: failed to initialize the script engine:
/usr/local/bin/../share/nmap/nse_main.lua:264: vulscan:7: unexpected symbol near '
I'd love to scan my whole network at once for vulnerabilities since I have so many things connected here... But how would I do that instead?
Look into deploying Tenable Nessus Home. It's an excellent vulnerability scanner that is free for home use.
Just run the same scan but do the whole range of IPS in the network. Thats how u scan your whole network.
No dislikes damn! Btw keep up these tutorials they are awesome!
i watch all your videos really helpful 💖🔥 #nullbyte fan
Que buenos videos! que buena terminación! seguí así maestro! gracias por enseñarnos!!!!!!!!
Thank you bro this video helps me so much.....
Great tutorial man...
Thanks Sarika Payili! We really do put in a lot of hard work.
Exactly what directory would you clone the git repository?
(4:17) Like the vulscan and the nmap-vulners script. Thank you for sharing. One thing I am not clear about, it looks like you would have to pull the script down from Github and this is not out of the box script from Nmap?
Ignore - I went to your site and got my answer; a great write up by the way.
Is Nmap a noisy tool to use? From what I’ve heard, it’s easy to detect with a firewall or an IDS on the network.
U can work round that with -Pn or use -D and for decoy to spoof an IP you type in. So they don't really know its you if you don't want them to know that you scanned them.
make a vid on pupy and how to bind the payload. thx again!
Always the best content... Great work mate !
Did you lightly paint your laptop? How did you get the tint over your stickers, I like it.
thanks sir,,,, i'm from indonesia very like your channel
awesome content man!!
I always like the video before hitting play. Never regret it.
mocheford agreed. If you take the time to make a comprehensive video and make it available for free, it deserves likes.
Thank both of you, we don't make much from this so it's the community I do it for.
@@NullByteWHT What else do you guys do? How can people support you? Do you teach?
@@mr_mr wht doesn't want a patreon, so we're looking for other ways
Pls how to interact with router by using python i want to write a code that do similar to reaver it send wps pin and receive output to see if the pin was correct . What module i have to use i heard of piramiko and scapy and heard that i have to logine to router by ssh but we need hostname to do that . Pls if you can do a video about it or tell me where i can find a answer . Thank you
Do you have much experience in the pentesting field?
@NullByte
Great content, and i'm lovin' extra energy in recent videos.
But could you please blink, at least once
You can have more energy or more blinking but not both
@@NullByteWHT I rlly don't know which comment is better XD
Thanks Kody, excellent as always. Would be great to get an overview of how you got into hacking/InfoSec, experience and how you recommend getting into the industry.
Good idea BamBam, I've added it to the list of video ideas.
How do u come up with this it’s amazing
Amazing videos make me to try my kali linux machin and dig more things you make what i need to teach like this
@Null Byte i have to find a Linux Kernel vulnerability on a machine however when i run the code i am unable to find the correct one, they are listed there but not the kernel one, any chance you can help
How can u get a laptop, I need to start learning programming 🥺
Thanks Kody, your videos are very helpful as always ! Absolutely no regrets for subscribing at all. ;D
Hey man! Could you do a video on metasploit? I’m a beginner and would like to learn from you, since you are so clear. Thx!
Yes, we can do that
Null Byte omfg thanks dude!!!
Can you use nmap to perform authenticated scans?
Amazing content bro...
Great video bro thank you
If you get a error:
Try to list the scripts like this_ sudo nmap --script nmap-vulners/,vulns/ -sV [host]
hope it helped
love you man :)))
Which version of Kali do you use?
Can we use that mnap script for bug bounty?
His eyes never blinking
Love you.... Thank you... Respect you...
Thank you!
Hello, I get this following error:
failed to initialize the script engine
'vulscan' did not match a category, filename or directory stack traceback.
Quick question about cracking wifi hashes : can an attacker be thinking that it got the right password if the target clients use wrong password when the handshake was captured?
An attacker launches deauth attack and listens for handshakes and in the time the attacker listens someone tries to connect to target wifi using wrong password then the attacker gets the handshake and tries to decrypt it and will the final password be the correct one or the invalid used by the someone who tried to connect while an attacker was listening?
Im sorry for my english
Yes after deauth is finished there is a possibility that someone is typing password right at that time and that u will catch wrong password he typed instead of other devices automaticly connecting back, tho the chances for that are almost close to 0
NullByte another diferents vulscan ? please tell me
keep up the good work
Very intresting video, im quite late. But doesn't this leave alot of footprints?
i can use this to found host to create vpn connection? with for example: http injector?
We appreciate it bro please keep helping us tnx
can you do a video on bettercap 2 ??
Yeah that would be amazing. Thanks
can we do this for websites as well?
Is there any way to discover available linux kernel network vulnerabilities ?
Which company do you work for?
My friends and I produce videos independently, right now we manage Null Byte's channel
Actually I want to ask one question that will this scan create a log file on target
@Null byte plzzz reply
Hi, do you use Kali inside VM on your computer?
Check this for more details
awesome video, Keep it up :)
This channel is fucking fantastic I love you
Will you do a review on the ALFA AC1900 adapter doing a wpa2 pw crack on kali linux, You're the best
i got one what a terrible setup hey haha
Can you proove you are human your eyes are not blinking
Thank You Kody Real 👽
Please friend can u help .i install kali linux in my laptot and whene i want to back to windows 7 i cant .there is any solution god bless u
Is it possible to use these scripts on a android device using the turmux app?
Yes
Hello, how can i get firewall name and version, tried wawoof, but its giving a wrong name. any other way?
When I execute git clone getting an error : bash: git: command not found... Failed to search for file: cannot update read-only report. Please help
Kody my boy much love big fan.luv ur vids
How come I can run this command on my IP and get results, but I do not get any results with another computer on my network?
Thanks for the info!
Hey bro, how are you doing? I’m having some trouble with assignment. I was wondering if you could reach out and we could get in contact and you could help me please
At the point you run the script with nmap, should you also include techniques to hide from IDSs? Like decoys, bits and zombies to name a few
Kody how i use 2 wifi adapters in bridge mode to use in a evil twin / honeypot without virtual machine?
Grat videos thanks ... Try to blink more !
Hi, i hope anyone can help me with this. when i execute "nmap --script vulscan,nmap-vulners -sV " everything was clean and i remember that the server was installed some apache 2.2 , so do i have to connect in the same network or i can do a vulscan on the public IP?
Be in the same network and don't perform on public ip's until you have permission to do so
@@vamsikrishna9737 yeah i have permission as i would like to use nmap vulscan to check for the vulnerability. but it doesnt show at all. appreciate any help?
@@garytan3531 if the commands you run are executing without any errors then I think the vunlerablity is patched or they are updated so you are not getting anything other way is to try Nessus or openvas
@@vamsikrishna9737 I used trial version nessus on the internal network and scan with bunch of vulnerabilities but when I use another computer not within the network to nmap vulscan no vulnerability.
Hola cuando lo ejecuto el reporte sale diferente ... no sale la puntuación ni la url del cve
alguien que me pueda orientar por favor
PLEASE MAKE A VIDEO ON SQL INJECTION ATTACK
please make a video about click jacking
Pretty awesome ! 👍
how to avoid arp detection of wireshark pls reply
Hi. I need help. Whenever I am trying to do a Vulnerabilities scan or Service scan. I am receiving following error
AllProbes::compileFallbacks: Unknown fallback specified in Probe DNSVersionBindReqTCP: 'DNSVersionBindReq' .
Could you please help out solving this error or anyone can give any clue for the same?
Sorry I have no experience with that you should contact the devs.
Does anyone know the intro music?
u are best hacker ... bro u must be OSCP ?
Thnks ❤ work
I will test it today
how do i fix ‘all 1000 ports scanned are filtered’ ?
Which books you guys refer.
Can you please tell us
Bro my nmap is giving error..
So how to solve that error?
Can you help me??
NSE: failed to initialize the script engine:
/usr/bin/../share/nmap/nse_main.lua:821: directory '/usr/bin/../share/nmap/scripts/vulscan' found, but will not match without '/'
stack traceback:
[C]: in function 'error'
/usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
/usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
[C]: in ?
QUITTING!
I got the same error
Make a video with this theme please buddy
looking at your videos impressions you lately get a lot of attention. Make sure you secure your videos to reupload to vimeo or something.
LBRY is good too, its like UA-cam, but decentralized, so complete content freedom.
nice video bro
Thank you so much!
Why is hour blurred?
To protect our aircraft
How to make a CVE ?
I need Ur help bro !!! Can u guide me plzz ... I want to contact u personally !!!
Lol, why would he do that? I'm sure every single one of us would like to be taught by him personally, but that's just not how the world works...
Check this ua-cam.com/video/1XAssdnTQSo/v-deo.html
Thus script doesn't work anymore
After the python and kali updates
Why do they recommend kali linux always, can't i do such stuff on ubuntu?
It already has a lot of required tools and drivers preinstalled.
Null Byte so that means that other versions of linux all can do the job but you have to install lots of tools first.
Thannks :)
Does not work anymore
why doesnt he blink 😨
You didn't said where to exactly cope that script
good job