Really cool video but definitely not for complete beginners, they wouldnt know about CIDR notation when searching for computers on the network or even what is ssh
Great video. In general your videos are really informative and interesting to watch. Professional examples directly to the point. Thank you. Keep up. We can’t wait
Please don’t scan any public network without the authorization, you become liable the moment you do that, practice in lab and your own network at home or homelab. I repeat don’t try to even scan network that aren’t yours it’s a good way to end up in front of a judge
Hello Mr. Loi Liang, given your expertise in cybersecurity and penetration testing, I find myself in a challenging situation. Recently, burglars broke into my house, taking my laptop, smart TV, and cell phones. I'm wondering if there are any ethical ways or security measures you could recommend to help trace and secure these devices. Your guidance in this matter would be invaluable. Thank you.
Heyyy Can u please make video on being completely anonymous on internet? not only telling how to use tor but, how to use local storage password managers (eg. keepass) (also if possible to save specific website's data in tor) Open source adblockers which doesn't sends any data to any server and more open source extensions/addons for tor.. permanent mac address spoofing, etc. Also any solution for websites with complicated captchas (eg. Outlook's captcha which is so damn slow and sometimes just stucks on captcha loop) which takes times on tor due to slow speed? Because Many youtubers just say use tor with VPNs and they just say use any VPN, but VPN also collects logs
Hey, can you make totorial how to input file(not folder) from my computer (windows) to the virtual machine (linux), i tried 😢 to find out how to do this 😔😔
Hi Mr. Loi, for education purposes. Sorry to ask this dumb question but I am really a beginner when it comes to cyber security and pentesting tools. If I want to learn these tools and want to practice for hands on, where can we or how? Because you mentioned there are IDS which can detect us.
I have a question I’m very new to this I did a scan and was messing with different ips in my network if I happened to click one that was a neighbors without knowing and I pinged it or ran other nmap scans would i be found and arrested? Correct me if I’m wrong but when you do a scan it only scans what is connected on your own network that you are connected to so you shouldn’t have this problem right?
I am new to Pentesting my when I use nmap and to see for ip to scan from host os i see that there is a ip of my host os and ip for my vmware when i scan the host os ip nmap says no host up but when i scan my vmware ip it scans what should I do to scan the host IP
Hello, I really want to learn hacking, but I don't know what to start with, I already have Kali Linux installed and everything and I did some tests with nmap and... but I want to advance, what I have to learn
Whenever I do an NMAP scan I get limited "hosts up" as well as whenever I try to scan a certain IP address im not given any openSSH areas im only given TCP, is this an error on my part or what should I do?
This is the way, teachers should actually teach. You explained it so clearly. Thank you 😊😊
Hey I am Hacoder32. I learned lot of things from you. I am 16 years old student and Sri Lankan. Thank you teachers from all that
Good 👍,, but I need a team ....
i guess we can be a team the 3 of us
Let’s make it 4 👍🏾
Me too
@@Alo-l4u2z yeah
Hello, i love the way you explain everything, i am still learning but i am doing fine with your lessons
Thanks
Really great content, I am glad that I spent my 30 mins of watching it twice. Thank you!
Best Chanel of youtube Every thing we learn here is best Ethical hacking
Not new to Nmap but I love me a hacker Loi refresher class.
Your channel is the best channel for hacking series
Thank you thank you thank you!!!
As others have said, excellent teacher!
You have been a great teacher. With you, I have acquired many skills. Thank you hacker loi
Really cool video but definitely not for complete beginners, they wouldnt know about CIDR notation when searching for computers on the network or even what is ssh
Great video. In general your videos are really informative and interesting to watch. Professional examples directly to the point. Thank you. Keep up. We can’t wait
Amazing tutorial mate. As i type now... i have my Kali linux, a target machine, and browser with nmap man page up... thats my morning :D
Per usual, Loi Liang Yang delivers
Most definitely not beginner friendly. Very informative though and greatly appreciate the content 👍
do you know where I can get more beginner friendly information for nmap?
I was waiting for this tutorial
Please don’t scan any public network without the authorization, you become liable the moment you do that, practice in lab and your own network at home or homelab. I repeat don’t try to even scan network that aren’t yours it’s a good way to end up in front of a judge
Thank you for taking the time to share your knowledge, Loi. I personally appreciate your videos.
Can we run two operating systems (Microsoft /kaali) in one laptop
yes, with VM/Dual Boot/Live Boot
List problem :
3:27 'ip' is not recognized as an internal or external command,operable program or batch file
Wouldn’t you wanna use proxy chains configuration along with nmap?
Yes if your actually doing this illegally you would want to run the command with proxy chains.
you don't have to if it's strictly legal..
@@John-Sv how?
Gosh I would love to have you as my neighbor!! Or not….😅 well done again and thanks for sharing the love! Cheers from The Swiss Alps brother!
Can i do this default wifi on laptop or do i network adapter to this?
thanks you for this video mr loi liang yang. i have one question how can i scan a routeur with nmap
better do an arp-scan for routers
thank you broh i will do it @@JhonDrock
Good teaching 💙
very useful information thank you master
Hello Mr. Loi Liang, given your expertise in cybersecurity and penetration testing, I find myself in a challenging situation. Recently, burglars broke into my house, taking my laptop, smart TV, and cell phones. I'm wondering if there are any ethical ways or security measures you could recommend to help trace and secure these devices. Your guidance in this matter would be invaluable. Thank you.
Change your passord on every services you have logged in and used on these machines at least..
Mr loi lang in windows running through wal its not working please make solution video
Heyyy Can u please make video on being completely anonymous on internet?
not only telling how to use tor but, how to use local storage password managers (eg. keepass) (also if possible to save specific website's data in tor)
Open source adblockers which doesn't sends any data to any server and more open source extensions/addons for tor..
permanent mac address spoofing, etc.
Also any solution for websites with complicated captchas (eg. Outlook's captcha which is so damn slow and sometimes just stucks on captcha loop) which takes times on tor due to slow speed?
Because Many youtubers just say use tor with VPNs and they just say use any VPN, but VPN also collects logs
bro wants to hack the government
use tails bro
If neighbour forgets his password he doesnt click on forget password option he asks loi liang for it.
Thanks Mr. Hacker Loi.
make please how to bypass windows login without usb and bios settings, just normal user
How do you cover tracks when entering into such network??
Great content man. But i need something to decipher your mouse-writing😂
Sir...Pls make a video,how to use nmap as a vulnerability assessment tool
Wonder what you can do with a flipperzero? Great videos by the way
do u have one ??
Hey, can you make totorial how to input file(not folder) from my computer (windows) to the virtual machine (linux), i tried 😢 to find out how to do this 😔😔
When I scan my network with map -sn, I have 0 hosts up whereas I have many computers run on my network…what does that mean please?
if you're running kali in virtual box then u need to put network adapter in bridge mode
Please explain in details...
Where do yo do this all kinds of activities
use your imagination
FBI came
Please tell how to contact with you sir
Hi Mr. Loi, for education purposes. Sorry to ask this dumb question but I am really a beginner when it comes to cyber security and pentesting tools. If I want to learn these tools and want to practice for hands on, where can we or how? Because you mentioned there are IDS which can detect us.
teacher please make a tutorial how to open handshake cap file into txt file... thank you very much
I have a question I’m very new to this I did a scan and was messing with different ips in my network if I happened to click one that was a neighbors without knowing and I pinged it or ran other nmap scans would i be found and arrested? Correct me if I’m wrong but when you do a scan it only scans what is connected on your own network that you are connected to so you shouldn’t have this problem right?
How can we watch members only video.. How to be a member
I am new to Pentesting my when I use nmap and to see for ip to scan from host os i see that there is a ip of my host os and ip for my vmware when i scan the host os ip nmap says no host up but when i scan my vmware ip it scans what should I do to scan the host IP
Hello, I really want to learn hacking, but I don't know what to start with, I already have Kali Linux installed and everything and I did some tests with nmap and... but I want to advance, what I have to learn
more plase 🥺❤️
Can you make a video on proxychains or subnetting please
Sir miss you, ❤️
It been a long moment
you are amazing sir❤
Hey im having some trouble, when i do ip a command my ip address starts with a 10 and when i try those commands it says connect refused
change the virtualbox network option to bridge
Amazing 😮😮
Is there a way I can practice this without getting in trouble?
yes
yes, using vulnerable test machines like metasploitable
Whenever I do an NMAP scan I get limited "hosts up" as well as whenever I try to scan a certain IP address im not given any openSSH areas im only given TCP, is this an error on my part or what should I do?
Awesome 🤩👍
You help a lot, hanks.
Soo fast bat fan🎉
i put ip addr and my device is saying it does not recongised
Nice explained, tnx
Very nice. Thanks.
Please tell me what if all 1000 port is closed what can I do
How to edit that password and username script so that I can add my own passwords or username?
you can create your own dictionaries and place the path where they are saved
Unknown timing mode????
Please Please someone answer my question why when i used Hydra in Gmail account it give me wrong password?
What if these services are not open??
there is a firewall
@@JhonDrock I know that but what to do for this??
Is awesom video cheers aigain
go ahead and hit 'enther'
😂😂
Don’t DONT DONT make fun of my guy loi or any person
Still looking for it on my keyboard. 😢
@@yasersamara9060 else?
@@C_Sparky bro wtf😭
i need a help
I have tried this but when ever i put in nmap it does not work
How Can you type I cant
ultimate free course ?
I love it
Why are your NMAP scans so fast?
nice tutorial, Loi.... LOL
Thank you Hacker Loi for your previous Windows login exploit that was able to allow me to access a microsoft account I was locked out of!!!
Who else always understood “AirPod” instead of “Airport” ?
I ❤ it
the good news that my pc and router is uncrackable, if anyone ask y, it's cause i tried to crack my self, good for me , bad for hackers 😅
i love you loi
Clark Margaret Lopez James Perez Elizabeth
Hit enter on that😂
i scan for my teacher laptop and i found aerver web apache opened and i exploit it llllol
You explained metasploit and nmap however this is not nmap this is a course to become an ethical hacker I would give it 10/10 if there was also empire
Kendall Row
This is a try to play with comment section :]
"Airpods wifi" lol.....
❤
Tutorial for ip tracking sir❤
Perez Steven Jones Brenda Hall Susan
🤫😶🌫️
WoWo
First :)
Thanks for explaining, but don't bother writing on the screen. It's pointless
Do you have a social media we could chat on I would like to pay you to help me I don’t need training but I need help
👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍👍
Remember Guys,
{Cracking*(⚫️hat)hacker)(criminal-hacking=cr-acking)}is illegal guys ☺️😌,
•hacking is alright,(⚪️hat)hacker.
Please Please someone answer my question why when i used Hydra in Gmail account it give me wrong password?
This is a try to play with comment section :]
🥹🫰🏿
Please Please someone answer my question why when i used Hydra in Gmail account it give me wrong password?
Please how can I contact with you
Give me your telegram brother
This is a try to play with comment section :]