Metasploit Tutorial for Beginners
Вставка
- Опубліковано 10 лют 2025
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/...
Full Web Ethical Hacking Course: www.udemy.com/...
Full Mobile Hacking Course: www.udemy.com/...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangya...
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Come join hundreds of students to learn ethical hacking and penetration testing now! www.udemy.com/course/full-ethical-hacking-course/
Is this course new or just a few updated videos? It lists last updated as 3/21.
Which payload nd how can we know dt which payload should we use lyk u use cmd/unix/interact
@@navi3046 same here
@@navi3046 he already said.. it has only one payload that can be used there.. and he used tab to autoload the payload.. so that's that!
@@Tarun_Kotagiri I need a good haker plz help me a scam website tok my money
Just like always a valuable beginner friendly content for all CS students.
Funny thing, I know all my CS till college and I haven't even started to take lessons
@@SuperNecroticOH That's the way to do it
@@SuperNecroticOH I doubt that, u just scratched the serfes
Thank you so much! Been diving more into pen testing and hard to find straight forward, clear understanding on how to use the tools. Love the quick break down with the tools in Kali. Will be watching more from you!
Right up there with The Cyber Mentor, Zaid, and David Bombal. Great teaching style! Keep the content coming.
Hey got any advice for me learning from yt and various online sources.
@@51swarajrohad87 Well I would recommend you getting books or reading e books because that's what helped me. Coding in different languages is too helpful. Hacking the art of exploitation is my first and probably my favourite
Thank you for making me understand what I did not understand well e.g set RHOSTS and set payload that part if you don't know anything on Metasploit its really hard to understand it when you want to use the different attack on the machine but your teaching makes one understand conveniently well, thank you and keep it up, Mr. Loi Liang Yang. I also shared your channel with other communities hopes soon you will have one million subs. Cheers..!
Your a legend dud I've been watching your videos for a long time. You've really dedicated on helping others as well .. your the best great spirit :) you taught me a lot also I learned many things by looking up and tinkering around my house :D
I have been learning ethical hacking and penetration testing for about a year now, this was the easiest method I have ever come across. Thank you! IMMEDIATELY SUBSCRIBING for even more content. Thank you!
Hey @frooogle99 I may can use your help hit me up thanks
Great video, but where did the cmd/unix/interact come from , only asking because the box I'm attempting is proftpd so I'm alittle lost at that part
Waiting for part 2...continue the series of ethical hacking❤️
Video starts at 6:30 Youre welcome
You just gained 15 more subscribers from my side.
Hi do you know someone how has Hackers
Because a scam website get my money
I need help
@@Everythinghere-k1o website name plz i will check
sir i am always watching your channel and i want to became like you all are useful helping video
@9:12 You can do a 'double tap'... I mean, WTH is a double tap. I'm new and learning. Thanks!
Thank you sir for giving us such a valuable description of Kali Linux system 👍👍😊😊😊
Thank you very much for this perfectly explained tutorial!
I just discovered your channel a few days ago and I can't stop watching. Great content!
Oh a very simple and easy way, I have understood a lots of points am so grateful 🙏
Bro I love your content I try to understand what is the metasploit and how to use exploit but only you explain too good
Hey how did you get the target ip address for the nmap?
Genius, love your work. Gonna use your materiel more. Thank you.
Very helpful for me.
See you 🤗 soon
Thank you for the tutorial 👍🏼
Great tutorial , hope will be more on metasploit
Does it work the same if I target windows devices?
Simply excellent thank you 😊
Sir make a course only for advance level. Real advance level
You sure can read my mind. Yes, I am in the midst of building a full advanced level ethical hacking course. Stay tuned!
you are a great teacher bro
can you make a lot of videos please
Awesome quick tutorial obviously in real world we should scan and find the IP's and it's not that straightforward, but it would be useful to tell what the target should do to avoid this unauthorized access... Is this enough for pen testing where clients give us as a task or should we go further and implement malwares and other scripts once we're in to prove how awful their security measures are?
sir which courses are u done for your current job?
Hey Loi, your videos are really nice but I am having trouble getting into ethical hacking. Most things that you show require the user of the windows machine to be stupid i.e. weak passwords, no firewall, no AV, no setup of windows policies/settings etc. How likely is it to get access to a Windows 10 machine that is up-to-date and is using a proper firewall?
then u need to bulid your own tools exploit and scripts
this question screams the ”un” in front of ethical hacking lol.
Amazing sir I like it ☺️
Very nice content.. Thank you so much..I like the way you explain in simple way.
Can we use the domain name (if they have one ), instead of the IP address in all cases you list the IP addresses of the target user or does it have to be IP
Huge FAN of yours 🙏
Good video thank you very much a lot of hacking tutorials don’t teach you how to actually exploit open ports
you need to find a vulnerabilities on the port you can't exploit it without a vulnerabilities
Good and simple Explain👍
I love you so much you are the best teacher
what website to learn or certificate to get first as a beginner to do pentesting or ethical hacker.
Very informative video sir 🙏❤️
Could we use the vuln scan within msf or nmap to find what uts currently vulnerability to and theb manual select thr expoloit in msf?
Sorry if this might seem a noobe question
عاش يا كبير🤩😍😘
Pls don't discontinued this, pls..... Because we. Need to stuff in this 💥
valuable beginner friendly content, no doubt. But does anyone else feel weird about him not facing the camera?
Im so excited to those vedios keep it up
Oo pubg lover pehele spelling sudhar le apni video ko vedio likh raha hai 😆
Is there a way to find out how the exploit for vsftpd was implemented? I'm curious about what happens being the scenes in metasploit. I'm assuming there is a released article about this exploit in question that explains it?
Couldn't find video where you asked WHO'S our favorite hacker, so......
1) Hacker Loi
2) Kody Kinsey
3) HackerSploit
4) Katie Paxton-Fear
5) Network Chuck
at 9:12 you said double click, what does it mean , is it the double click of shift ,tab or what
Sir i want to view your deleted youtube video that you have uploaded 1.5 month ago on topic of removing lockscreen password of android by changing some data in locksettings.db file.
And sorry for my English if there any Mistake 😁
What can I read or watch that tells me the vulnerabilities pertaining to services & versions so I can understand metasploit better. Please answer as I have an exam coming up!
Search target
Sir i want to ask you one question i that question is how to create payload? And how to send that payload to victims machine?
Can you tell me???
Nice tutorial ♥️👍
Thank you my friend
Can you tell me how to do it with my own payload, I don’t want to have remote access just my exe to pass the Anti virus Softwares. (For ethical hacking only) We are tasked by our it school course in the realm of a project.
It doesn’t matter which exploit we use, the payload must do its job on target machine.
nice video always Metasploit :)
Wow, you're a genius!
Outstanding Sir.
Well, I am beginner how to learn complete course.
I understood where you were going up until you input: "set payload cmd/unix/interact". Is this a command you will always enter or if not, can you explain please ?
Thanks sir help full video
Wow thats pretty nice thanks for your tutorial. But i have a question. When i run msf console with proxychains throught tor and have exploit with lhost parameter so how can I setup exploit throught tor?
First of all very good content.... And I have question.
Can i exploit my laptop using this... If that laptop not connected to my router .. But I know it IP address
love 💕 form india sir 🤩
Enjoy your content.
I have read books and practicing it. This video has simplify what i was searching for. I DID THE COMMAND ON NMAP BUT MINE DID NOT SHOW THE VERSION, I COULDN'T PROCCEED.....?
Sir i buy your course and i also join your channel. Can you please teach us how to make our own hacking tools instead to script kiddies ....
Absolutely! Love your enthusiasm for learning!
@@LoiLiangYang Greetings teacher Loi liang kindly include PayPal on the payment method because i want to Join
Hello Loi Liang Yang ! I did blocked my window 10 by mistake that means I’m not able to login into and not able to put my password because it say “wrong password “ so what to do to get access again???? ( it doesn’t has reset password option)...😢😢😢
now what ? i mean what's the next step after getting root access ? love ur vids btw keep going 🔥🔥
Thanks for your video sir
How do I find the correct ip address for metasploitable? When I run "ip address" it gives me the same ip address as my kali machine
Please do a tutorial about CCTV cameras
Thank you very much for this tutorial.
But I still don't get how the payload command came about. Any help?
What about AV Evasion and how to defend?
wow this is amazing
If you port scan a public ip would it work aswell?
Metasploit and Millworm havn't had current exploits in years.. Never had sandbox escapes... Real pros can use IDA or Ghydra and find exploitable bugs
Do you offer courses on Metasploit?
Was struggling to exploit an smtp server until I learned about metasploit.. now I’m in the bathroom while I let it enumerate for me lmao
Valuable session...
Sir put a content on sms spoofing also....
video starts at 6:31
how do u know which payloads you can use
so all my ports are close on my pc. ran this scirpt just like you did, but it says Exploit completed, but no session was created. would this of worked if i had one open port ????
Hi Loi, how stay anonymous when using metasploite reverse TCP, I know ngrok but it is not anonymous enough?
sir the ip address is not opening in the other vm can u tell me what might be the issue? is it related to network settings in the vm ? if so how i change it so that it can show that login website
Sir I followed all your instructions at last it is showing that exploit failed[unreachable] and connection timed out meanwhile it is showing down that exploit completed, but no sessions was created
Sir make a video about routersploit
Wonderful, I try to export in Tesla. But in payload I got stuck, it says" value specified for payload is not valid". If anyone could help it will be helpful.
9:11 "tap double tap." I didn't get this point . where show I double tap??
literally press the "Tab" button twice
how did you find the payload?
sir QnA live stream on youtube. please
What is the significance of using a vm versus just using your own system?
Security purpose
VM are made with scripts. If you screwed up, if you changed something you weren’t suppose to, you can delete it and create a new one since it is only made up of scripts.
i got error that connection is refused can i know why and how to solve that
i gave my windows ip
Nice video
Please make tutorials for mobile exploits.. for us
how do you list all the ports?????🤔
Can you teach me how login in global server?
someone needs help here !!
when i click exploit it says :-
exploit completed but no session was created .
Please make video on how to convert Android payload to pdf or img.
convert ?
convertttttt ?
go watch a video
when i make the app in linux, and test it on another machine it doesnt send me the info only on my local machine how do i make it over WAN i tried port forwarding idk how it works can someone send me a detailed explanation
Its the we are now IN for me lol
Sir put a content on making our own JavaScript to get location,camera ,mic of the victim🥺😘😘
The Commands are not showing well even when you make the screen landscape