Metasploit Tutorial for Beginners

Поділитися
Вставка
  • Опубліковано 10 лют 2025
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/...
    Full Web Ethical Hacking Course: www.udemy.com/...
    Full Mobile Hacking Course: www.udemy.com/...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangya...
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

КОМЕНТАРІ • 233

  • @LoiLiangYang
    @LoiLiangYang  3 роки тому +40

    Come join hundreds of students to learn ethical hacking and penetration testing now! www.udemy.com/course/full-ethical-hacking-course/

    • @danielv3228
      @danielv3228 3 роки тому

      Is this course new or just a few updated videos? It lists last updated as 3/21.

    • @navi3046
      @navi3046 3 роки тому +2

      Which payload nd how can we know dt which payload should we use lyk u use cmd/unix/interact

    • @rahulgaikwad9860
      @rahulgaikwad9860 3 роки тому

      @@navi3046 same here

    • @Tarun_Kotagiri
      @Tarun_Kotagiri 3 роки тому

      @@navi3046 he already said.. it has only one payload that can be used there.. and he used tab to autoload the payload.. so that's that!

    • @Everythinghere-k1o
      @Everythinghere-k1o 3 роки тому

      @@Tarun_Kotagiri I need a good haker plz help me a scam website tok my money

  • @hrushikeshdinkar9994
    @hrushikeshdinkar9994 3 роки тому +73

    Just like always a valuable beginner friendly content for all CS students.

    • @SuperNecroticOH
      @SuperNecroticOH 2 роки тому

      Funny thing, I know all my CS till college and I haven't even started to take lessons

    • @quantumblurrr
      @quantumblurrr 9 місяців тому

      @@SuperNecroticOH That's the way to do it

    • @omaryousifkamal4290
      @omaryousifkamal4290 9 місяців тому +1

      @@SuperNecroticOH I doubt that, u just scratched the serfes

  • @shintojoe7907
    @shintojoe7907 2 роки тому +7

    Thank you so much! Been diving more into pen testing and hard to find straight forward, clear understanding on how to use the tools. Love the quick break down with the tools in Kali. Will be watching more from you!

  • @root3434
    @root3434 3 роки тому +11

    Right up there with The Cyber Mentor, Zaid, and David Bombal. Great teaching style! Keep the content coming.

    • @51swarajrohad87
      @51swarajrohad87 Рік тому

      Hey got any advice for me learning from yt and various online sources.

    • @JamboRickstar-te8mx
      @JamboRickstar-te8mx 7 місяців тому

      ​@@51swarajrohad87 Well I would recommend you getting books or reading e books because that's what helped me. Coding in different languages is too helpful. Hacking the art of exploitation is my first and probably my favourite

  • @josekiki1587
    @josekiki1587 3 роки тому +9

    Thank you for making me understand what I did not understand well e.g set RHOSTS and set payload that part if you don't know anything on Metasploit its really hard to understand it when you want to use the different attack on the machine but your teaching makes one understand conveniently well, thank you and keep it up, Mr. Loi Liang Yang. I also shared your channel with other communities hopes soon you will have one million subs. Cheers..!

  • @nothing5600
    @nothing5600 3 роки тому +12

    Your a legend dud I've been watching your videos for a long time. You've really dedicated on helping others as well .. your the best great spirit :) you taught me a lot also I learned many things by looking up and tinkering around my house :D

  • @frooogle99
    @frooogle99 Рік тому +3

    I have been learning ethical hacking and penetration testing for about a year now, this was the easiest method I have ever come across. Thank you! IMMEDIATELY SUBSCRIBING for even more content. Thank you!

    • @Mware-th2md
      @Mware-th2md Рік тому

      Hey @frooogle99 I may can use your help hit me up thanks

  • @jadenshay7953
    @jadenshay7953 Рік тому +4

    Great video, but where did the cmd/unix/interact come from , only asking because the box I'm attempting is proftpd so I'm alittle lost at that part

  • @navi3046
    @navi3046 3 роки тому +7

    Waiting for part 2...continue the series of ethical hacking❤️

  • @quicksolution5881
    @quicksolution5881 Рік тому +3

    Video starts at 6:30 Youre welcome

  • @kermitdaphrogge525
    @kermitdaphrogge525 3 роки тому +6

    You just gained 15 more subscribers from my side.

    • @Everythinghere-k1o
      @Everythinghere-k1o 3 роки тому

      Hi do you know someone how has Hackers
      Because a scam website get my money
      I need help

    • @haShira_222
      @haShira_222 3 роки тому

      @@Everythinghere-k1o website name plz i will check

  • @itskarthikr15
    @itskarthikr15 3 роки тому +2

    sir i am always watching your channel and i want to became like you all are useful helping video

  • @rashad35
    @rashad35 Рік тому +1

    @9:12 You can do a 'double tap'... I mean, WTH is a double tap. I'm new and learning. Thanks!

  • @subhankarchakraborty3931
    @subhankarchakraborty3931 3 роки тому +2

    Thank you sir for giving us such a valuable description of Kali Linux system 👍👍😊😊😊

  • @DCYPT
    @DCYPT 2 місяці тому

    Thank you very much for this perfectly explained tutorial!

  • @jordanjohnson8150
    @jordanjohnson8150 3 роки тому +1

    I just discovered your channel a few days ago and I can't stop watching. Great content!

  • @babashehumodu1463
    @babashehumodu1463 2 роки тому

    Oh a very simple and easy way, I have understood a lots of points am so grateful 🙏

  • @ΣτεφανοςΚαζακκος
    @ΣτεφανοςΚαζακκος 5 місяців тому

    Bro I love your content I try to understand what is the metasploit and how to use exploit but only you explain too good

  • @diptangsugupta908
    @diptangsugupta908 Рік тому +1

    Hey how did you get the target ip address for the nmap?

  • @PeIeus
    @PeIeus 9 місяців тому

    Genius, love your work. Gonna use your materiel more. Thank you.

  • @its_code
    @its_code 3 роки тому +2

    Very helpful for me.
    See you 🤗 soon

  • @Vijay-vi5cr
    @Vijay-vi5cr 3 роки тому +4

    Thank you for the tutorial 👍🏼

  • @propolipropoli
    @propolipropoli Рік тому

    Great tutorial , hope will be more on metasploit

  • @LemonadetvYT
    @LemonadetvYT 2 роки тому +1

    Does it work the same if I target windows devices?

  • @honorvirtue2904
    @honorvirtue2904 3 роки тому +4

    Simply excellent thank you 😊

  • @gurejalectures
    @gurejalectures 3 роки тому +1

    Sir make a course only for advance level. Real advance level

    • @LoiLiangYang
      @LoiLiangYang  3 роки тому +2

      You sure can read my mind. Yes, I am in the midst of building a full advanced level ethical hacking course. Stay tuned!

  • @CtecgCtecg-jv8if
    @CtecgCtecg-jv8if Рік тому

    you are a great teacher bro
    can you make a lot of videos please

  • @GoktugErol-o9c
    @GoktugErol-o9c 9 місяців тому

    Awesome quick tutorial obviously in real world we should scan and find the IP's and it's not that straightforward, but it would be useful to tell what the target should do to avoid this unauthorized access... Is this enough for pen testing where clients give us as a task or should we go further and implement malwares and other scripts once we're in to prove how awful their security measures are?

  • @abuajmalmajidponnethabu2858
    @abuajmalmajidponnethabu2858 3 роки тому +1

    sir which courses are u done for your current job?

  • @benteta
    @benteta 3 роки тому +4

    Hey Loi, your videos are really nice but I am having trouble getting into ethical hacking. Most things that you show require the user of the windows machine to be stupid i.e. weak passwords, no firewall, no AV, no setup of windows policies/settings etc. How likely is it to get access to a Windows 10 machine that is up-to-date and is using a proper firewall?

    • @Lord_Aquasis
      @Lord_Aquasis Рік тому

      then u need to bulid your own tools exploit and scripts

    • @topias1447
      @topias1447 Рік тому

      this question screams the ”un” in front of ethical hacking lol.

  • @invisibleman6104
    @invisibleman6104 3 роки тому +2

    Amazing sir I like it ☺️

  • @mr.sameers.tathare8468
    @mr.sameers.tathare8468 Рік тому

    Very nice content.. Thank you so much..I like the way you explain in simple way.

  • @StirsMYCookiez
    @StirsMYCookiez 3 роки тому +2

    Can we use the domain name (if they have one ), instead of the IP address in all cases you list the IP addresses of the target user or does it have to be IP

  • @AIVisionaryLab
    @AIVisionaryLab 3 роки тому

    Huge FAN of yours 🙏

  • @idontwantausername7398
    @idontwantausername7398 3 роки тому +1

    Good video thank you very much a lot of hacking tutorials don’t teach you how to actually exploit open ports

    • @saryakhrs265
      @saryakhrs265 3 роки тому +1

      you need to find a vulnerabilities on the port you can't exploit it without a vulnerabilities

  • @Waheed102
    @Waheed102 Рік тому

    Good and simple Explain👍

  • @SebastienMukombe
    @SebastienMukombe Рік тому

    I love you so much you are the best teacher

  • @felosio
    @felosio 3 роки тому

    what website to learn or certificate to get first as a beginner to do pentesting or ethical hacker.

  • @devanshkanda9618
    @devanshkanda9618 3 роки тому +3

    Very informative video sir 🙏❤️

  • @MrFacproductions
    @MrFacproductions Рік тому

    Could we use the vuln scan within msf or nmap to find what uts currently vulnerability to and theb manual select thr expoloit in msf?
    Sorry if this might seem a noobe question

  • @ahmedsalah2173
    @ahmedsalah2173 3 роки тому

    عاش يا كبير🤩😍😘

  • @vinothn4228
    @vinothn4228 3 роки тому +8

    Pls don't discontinued this, pls..... Because we. Need to stuff in this 💥

  • @ashrafulislam7065
    @ashrafulislam7065 Рік тому

    valuable beginner friendly content, no doubt. But does anyone else feel weird about him not facing the camera?

  • @defyteryt2452
    @defyteryt2452 3 роки тому +3

    Im so excited to those vedios keep it up

    • @bidhumitra15
      @bidhumitra15 3 роки тому

      Oo pubg lover pehele spelling sudhar le apni video ko vedio likh raha hai 😆

  • @themullet136
    @themullet136 3 роки тому +2

    Is there a way to find out how the exploit for vsftpd was implemented? I'm curious about what happens being the scenes in metasploit. I'm assuming there is a released article about this exploit in question that explains it?

  • @sirgesound
    @sirgesound Рік тому

    Couldn't find video where you asked WHO'S our favorite hacker, so......
    1) Hacker Loi
    2) Kody Kinsey
    3) HackerSploit
    4) Katie Paxton-Fear
    5) Network Chuck

  • @thetruth3372
    @thetruth3372 3 роки тому

    at 9:12 you said double click, what does it mean , is it the double click of shift ,tab or what

  • @CybSecBuddy
    @CybSecBuddy 3 роки тому +1

    Sir i want to view your deleted youtube video that you have uploaded 1.5 month ago on topic of removing lockscreen password of android by changing some data in locksettings.db file.
    And sorry for my English if there any Mistake 😁

  • @tamerajames5590
    @tamerajames5590 2 роки тому +1

    What can I read or watch that tells me the vulnerabilities pertaining to services & versions so I can understand metasploit better. Please answer as I have an exam coming up!

    • @bix2001
      @bix2001 3 місяці тому

      Search target

  • @rahulgaikwad9860
    @rahulgaikwad9860 3 роки тому

    Sir i want to ask you one question i that question is how to create payload? And how to send that payload to victims machine?
    Can you tell me???

  • @juneilquilana5159
    @juneilquilana5159 3 роки тому +2

    Nice tutorial ♥️👍

  • @pjtrusci
    @pjtrusci 3 роки тому +2

    Thank you my friend

  • @fwiii1831
    @fwiii1831 3 роки тому

    Can you tell me how to do it with my own payload, I don’t want to have remote access just my exe to pass the Anti virus Softwares. (For ethical hacking only) We are tasked by our it school course in the realm of a project.
    It doesn’t matter which exploit we use, the payload must do its job on target machine.

  • @rouen768
    @rouen768 3 роки тому +4

    nice video always Metasploit :)

  • @osenisegun5938
    @osenisegun5938 2 роки тому

    Wow, you're a genius!

  • @daudkhanafridi3232
    @daudkhanafridi3232 3 роки тому

    Outstanding Sir.
    Well, I am beginner how to learn complete course.

  • @jackcsprat
    @jackcsprat 8 місяців тому

    I understood where you were going up until you input: "set payload cmd/unix/interact". Is this a command you will always enter or if not, can you explain please ?

  • @vikramkumavate5947
    @vikramkumavate5947 3 роки тому +1

    Thanks sir help full video

  • @Tufar123
    @Tufar123 3 роки тому

    Wow thats pretty nice thanks for your tutorial. But i have a question. When i run msf console with proxychains throught tor and have exploit with lhost parameter so how can I setup exploit throught tor?

  • @gowrishankar7011
    @gowrishankar7011 3 роки тому

    First of all very good content.... And I have question.
    Can i exploit my laptop using this... If that laptop not connected to my router .. But I know it IP address

  • @Avleen-lz7dt
    @Avleen-lz7dt 3 роки тому

    love 💕 form india sir 🤩

  • @zionstemple
    @zionstemple 3 роки тому +1

    Enjoy your content.

  • @AbdulBasitKamil
    @AbdulBasitKamil Рік тому

    I have read books and practicing it. This video has simplify what i was searching for. I DID THE COMMAND ON NMAP BUT MINE DID NOT SHOW THE VERSION, I COULDN'T PROCCEED.....?

  • @gurejalectures
    @gurejalectures 3 роки тому +1

    Sir i buy your course and i also join your channel. Can you please teach us how to make our own hacking tools instead to script kiddies ....

    • @LoiLiangYang
      @LoiLiangYang  3 роки тому +1

      Absolutely! Love your enthusiasm for learning!

    • @macbook6507
      @macbook6507 3 роки тому

      @@LoiLiangYang Greetings teacher Loi liang kindly include PayPal on the payment method because i want to Join

  • @Nunesi
    @Nunesi 3 роки тому

    Hello Loi Liang Yang ! I did blocked my window 10 by mistake that means I’m not able to login into and not able to put my password because it say “wrong password “ so what to do to get access again???? ( it doesn’t has reset password option)...😢😢😢

  • @InfiniteloopGaming-ilg
    @InfiniteloopGaming-ilg 3 роки тому +1

    now what ? i mean what's the next step after getting root access ? love ur vids btw keep going 🔥🔥

  • @SilentSolution
    @SilentSolution 3 роки тому

    Thanks for your video sir

  • @studentoflife3140
    @studentoflife3140 2 роки тому

    How do I find the correct ip address for metasploitable? When I run "ip address" it gives me the same ip address as my kali machine

  • @djawedbenslimane536
    @djawedbenslimane536 3 роки тому

    Please do a tutorial about CCTV cameras

  • @nwosukingsley8498
    @nwosukingsley8498 Рік тому

    Thank you very much for this tutorial.
    But I still don't get how the payload command came about. Any help?

  • @andersnilsen5447
    @andersnilsen5447 3 роки тому

    What about AV Evasion and how to defend?

  • @amirmohammadghasemiankarya9647
    @amirmohammadghasemiankarya9647 3 роки тому +2

    wow this is amazing

  • @radiantomen5753
    @radiantomen5753 3 роки тому

    If you port scan a public ip would it work aswell?

  • @tjinspace7001
    @tjinspace7001 3 роки тому +1

    Metasploit and Millworm havn't had current exploits in years.. Never had sandbox escapes... Real pros can use IDA or Ghydra and find exploitable bugs

  • @JoeSmith-zu6lb
    @JoeSmith-zu6lb 3 роки тому

    Do you offer courses on Metasploit?

  • @uliloves4929
    @uliloves4929 Рік тому

    Was struggling to exploit an smtp server until I learned about metasploit.. now I’m in the bathroom while I let it enumerate for me lmao

  • @durgaprasad-co7yx
    @durgaprasad-co7yx 3 роки тому

    Valuable session...

  • @umarmuzammil7332
    @umarmuzammil7332 3 роки тому +7

    Sir put a content on sms spoofing also....

  • @robcab3725
    @robcab3725 4 місяці тому

    video starts at 6:31

  • @gamingfreak5964
    @gamingfreak5964 3 роки тому

    how do u know which payloads you can use

  • @Kerry-w2m
    @Kerry-w2m 6 місяців тому

    so all my ports are close on my pc. ran this scirpt just like you did, but it says Exploit completed, but no session was created. would this of worked if i had one open port ????

  • @mansoorkochy
    @mansoorkochy Рік тому

    Hi Loi, how stay anonymous when using metasploite reverse TCP, I know ngrok but it is not anonymous enough?

  • @ENGCS_SaiShreenidhiSatish
    @ENGCS_SaiShreenidhiSatish Рік тому

    sir the ip address is not opening in the other vm can u tell me what might be the issue? is it related to network settings in the vm ? if so how i change it so that it can show that login website

  • @darshank3238
    @darshank3238 Рік тому

    Sir I followed all your instructions at last it is showing that exploit failed[unreachable] and connection timed out meanwhile it is showing down that exploit completed, but no sessions was created

  • @ajoyjohn6903
    @ajoyjohn6903 3 роки тому

    Sir make a video about routersploit

  • @Anurag_Hansda
    @Anurag_Hansda 11 місяців тому

    Wonderful, I try to export in Tesla. But in payload I got stuck, it says" value specified for payload is not valid". If anyone could help it will be helpful.
    9:11 "tap double tap." I didn't get this point . where show I double tap??

    • @legendz8531
      @legendz8531 9 місяців тому +1

      literally press the "Tab" button twice

  • @OOL12.a
    @OOL12.a 11 днів тому

    how did you find the payload?

  • @facttrendz1314
    @facttrendz1314 3 роки тому +1

    sir QnA live stream on youtube. please

  • @shabadooshabadoo4918
    @shabadooshabadoo4918 Рік тому

    What is the significance of using a vm versus just using your own system?

    • @vajaykumar5672
      @vajaykumar5672 Рік тому

      Security purpose

    • @wkeezz
      @wkeezz 8 місяців тому

      VM are made with scripts. If you screwed up, if you changed something you weren’t suppose to, you can delete it and create a new one since it is only made up of scripts.

  • @s.gopikrishna
    @s.gopikrishna Рік тому

    i got error that connection is refused can i know why and how to solve that
    i gave my windows ip

  • @asthakhare9161
    @asthakhare9161 3 роки тому +1

    Nice video

  • @san_rawat
    @san_rawat 3 роки тому

    Please make tutorials for mobile exploits.. for us

  • @tutorialmike1232
    @tutorialmike1232 3 роки тому

    how do you list all the ports?????🤔

  • @echoframechannel
    @echoframechannel 11 місяців тому

    Can you teach me how login in global server?

  • @pitercompany7344
    @pitercompany7344 3 роки тому

    someone needs help here !!
    when i click exploit it says :-
    exploit completed but no session was created .

  • @Krishna-bo1el
    @Krishna-bo1el 3 роки тому

    Please make video on how to convert Android payload to pdf or img.

  • @AceEdits3
    @AceEdits3 11 місяців тому

    when i make the app in linux, and test it on another machine it doesnt send me the info only on my local machine how do i make it over WAN i tried port forwarding idk how it works can someone send me a detailed explanation

  • @joel-uj6ge
    @joel-uj6ge 3 роки тому +1

    Its the we are now IN for me lol

  • @umarmuzammil7332
    @umarmuzammil7332 3 роки тому +2

    Sir put a content on making our own JavaScript to get location,camera ,mic of the victim🥺😘😘

  • @philipudo1872
    @philipudo1872 8 місяців тому

    The Commands are not showing well even when you make the screen landscape