@@personallothus473 Anyone who gives advice, on any subject that could be considered illegitimate, should be considered fed. For example, if you read a guide on how to stay anonymous on the dark web, you should consider that the author may be a fed, and that the guide could have been written to mislead you into compromising your identity. Thus people joke about content creators who deal with "similar" topics being feds. And for anyone unaware, feds, glowies or alphabet boys are any person/group of people working on behalf of a government organisation (think CIA, FBI)
a tip, the home key will return to the beginning of the line and the end key will go back to the end also sometimes the up and down arrows will do the same
I am strictly a local application hacker, so I only ever need to bypass local process security measures. Network hacking seems like the total opposite of application hacking. What the best part about network hacking?
I'm learning how to use nmap, I have a PC which I use as a small server to run scans. I thought of doing a scan on my university's server, now I'm blacklisted by the firewall, I'm a fucking genius :)
Back when I was in a university back in the late 90s, I was not doing nmap, but using the univeristy's Sun SPARC UNIX servers running at 'nice 20' (so super low priority) on one of the distributed computing applications, I think it was for RC4 cracking, and up comes the talkd service from the admin messaging me. Pretty much said "cut it out". He wasn't too upset at me because I was running it at lowest priority with the 'nice' command, so not too bad. Now 26 years later, I myself have been working at a community college for 24+ years in the role of the system/network admin and infosec guy.
Sorry if you mentioned this in the Video as I am not allow to get much of any sleep where I live due to a Syndicate of Children plotting against me I may have forgot but what distro of Linux are you using?
Hey: 👋 One of your videos just got disappeared - I don't remember the name but i wanted to watch it so i downloaded it on UA-cam app but now it disappeared - can you provide a link
When you work entirely in CLI and doing everything remote, no room for GUI, and especially if you don't want to bloat your system with an X-server to connect to. ;-) UIs are nice, but always learn the base level things. When things break, it helps in understanding how to troubleshoot and fix the problem.
I noticed you pronounce "sudo" the same way I do. Are you from New Hampshire? Well, you don't have to answer that, but that's where I am from. It seems like every other hacking video I watch, the content creator pronounces it like "dew" instead of "doe."
It would be nice if there was a program where you only had to enter the target IP and then the program automatically hacks into the computer. Hacking for the lazy, so to speak. 😅
I commend you for attempting to teach others. However, you have a long way to go before teaching. This is not Nmap basics. The basics would be understanding how this tool works. You explaining these commands are on the surface level of someone who doesn’t understand what’s going on, but knows a general idea. I’d advise people to watch people that actually know their stuff, like Ippsec.
my favorite PsyOP Fed Agent channel for sure
I like the no-music, no-bs, no cuts vibe.
Great stuff, "Ctrl + a" to jump to the beginning of the line 🙂
@@luqmaanmarthinus6820 tyyy!! I forgot about that shortcut
IIRC you can do `sudo !!` to redo the previous command with sudo when you forgot it again
@@Cyb3rMaddy "Ctrl + E" jumps to the end of the line. 😁
@@mbielchris lifesaver
@@Cyb3rMaddy Are you a fed honey potter or something?
My most used tools when I'm hacking is my sun glasses and my otaku suit.
you probably don't actually hack anything.
@@ShaunPrince How could u say that? I'm a hackerman, I do a lot of hacker stuffs... pff
Yeah ... Ive seen hackers in Russia they most commonly use cocaine
Wow you know so much cant imagine how good your skill will be 10 years from now
she is so paranoid.. i love it!
fed of the year fr
Maddy you can press down arrow or side arrow when a scan takes long to show how much time is left in your scan.
She looks like a Fed, but She makes nice content
I`m not american so I don`t get why there's a Fed narrative.
Why is that?
What's the issue?
@@personallothus473 they can't believe a woman can get into cybersecurity
He's mad he doesn't have a gf 😁@personallothus473
@@personallothus473 it's a joke...
@@personallothus473 Anyone who gives advice, on any subject that could be considered illegitimate, should be considered fed.
For example, if you read a guide on how to stay anonymous on the dark web, you should consider that the author may be a fed, and that the guide could have been written to mislead you into compromising your identity.
Thus people joke about content creators who deal with "similar" topics being feds.
And for anyone unaware, feds, glowies or alphabet boys are any person/group of people working on behalf of a government organisation (think CIA, FBI)
due to UDP being connectionless (no handshake) the scan takes ages.
real shit
I thought it was to check out things, not that reveal vulnerabilties, great info maddie!
I don’t care who they send, I’m not paying my taxes
no taxes, no ability to vote and no access to any social service. No access to public infrastructure. Makes sense, you're smart.
sure lil bro
Whatever makes you feel better lil bro 🫂
nice reference lmao
a tip, the home key will return to the beginning of the line and the end key will go back to the end also sometimes the up and down arrows will do the same
Girl it's fun listening to you I enjoy it.
There is something with you voice 😊girl... can't watch without rewinding. So soft,gorgeous, man its killing...❤
nmap is one of the neatest tools I've seen since the for loop in the Bash shell
Great beginner level tutorial, thanks!
you give me hope. thank you.
AI getting crazy good
HELP THATS WHAT I THOUGHT but she actually was on DefCon
@@ram-gc7gl I wasn't at DefCon that was my AI
Keep it up maddy ❤🙌
yes now i can hack into the mainframes like in the movies
hack the planet
i love your work keep it up 👍
Glowie
everyone forgets sudo. thats why we bang bang
Nice filter, fed.
has she done transitioning. no clue. no idea. she could be a spy. a pride-theme spy.
This is such an awesome topic aaand, is that a hint of nystagmus I see?
I am strictly a local application hacker, so I only ever need to bypass local process security measures.
Network hacking seems like the total opposite of application hacking.
What the best part about network hacking?
the network
Dope vid, would luv to watch a vid on airodump :p
My most used tool is actually Neofetch
I use arch btw
@@HermesSilva-xt6dt I use Qubes btw
I've been learning nmap and metapsloit
❤❤
I’ve been in tech for 100 years but only really started using nmap in the last couple years. I dunno how I survived without it all that time.
I'm learning how to use nmap, I have a PC which I use as a small server to run scans. I thought of doing a scan on my university's server, now I'm blacklisted by the firewall, I'm a fucking genius :)
Back when I was in a university back in the late 90s, I was not doing nmap, but using the univeristy's Sun SPARC UNIX servers running at 'nice 20' (so super low priority) on one of the distributed computing applications, I think it was for RC4 cracking, and up comes the talkd service from the admin messaging me. Pretty much said "cut it out". He wasn't too upset at me because I was running it at lowest priority with the 'nice' command, so not too bad. Now 26 years later, I myself have been working at a community college for 24+ years in the role of the system/network admin and infosec guy.
Sorry if you mentioned this in the Video as I am not allow to get much of any sleep where I live due to a Syndicate of Children plotting against me I may have forgot but what distro of Linux are you using?
Hai cyber ..dia do not us😮❤
Hey: 👋
One of your videos just got disappeared - I don't remember the name but i wanted to watch it so i downloaded it on UA-cam app but now it disappeared - can you provide a link
cool
ASMR video 👍
NOICE
omg is that Beadie Russell
Don't scan tho. They'll know you'r doing something nasty. Nice Mr. Frendel plush
Nice glo light in the corner
How did i automatically see you on twitter insta and youtube within a short time frame?
thank you.
The last time i saw u you were doing leet code and ur eyes was fine what did happen
carefull what you do because some isp's look at what youre sending out on your ports :(
The target is Metasploitable2, sooooo
why is her eyes moving like that??
I personally love Zenmap cause I just prefer a GUI. But nmap is essential to the beginning of any CTF challenge.
When you work entirely in CLI and doing everything remote, no room for GUI, and especially if you don't want to bloat your system with an X-server to connect to. ;-) UIs are nice, but always learn the base level things. When things break, it helps in understanding how to troubleshoot and fix the problem.
tfw no mary jane hacker gf
do what my bf did and get ur gf into cybersec
how do u find an IP like does anybody know the FBI IP so i can try this stuff on their internet? ty.
I noticed you pronounce "sudo" the same way I do. Are you from New Hampshire? Well, you don't have to answer that, but that's where I am from. It seems like every other hacking video I watch, the content creator pronounces it like "dew" instead of "doe."
It’s short for super user do, so they are pronouncing the second half like the word ‘do’
"Ethical hacker" 😉
😑😑😑😑 everyone has a gun but the police save you from thefts that's the difference between criminals and ethical hackers.
why is hacker always "hacker"? just curious
6:21 You have a nice tremolo in your voice.
wait they have a GUI version??
yes
You are so sweet, when you have to grin and almost giggle about what you say once you heard yourself saying it! 😄🥰
simp
@@maxfrischdev Simpin on UA-cam now are we?
you look soo comfy in that hoodie loooool
"sure, ethical" lol
I recon burp suite is more used than NMAP
You look like an AI!
Alba Spurs
It would be nice if there was a program where you only had to enter the target IP and then the program automatically hacks into the computer. Hacking for the lazy, so to speak. 😅
Basics of how to walk. For Olympic runners.
@@teksimian what could have made this tutorial more beginner friendly? For my future reference for videos
Jones Jennifer Gonzalez Maria Garcia Edward
I know that's the actual name, and you are correct, but it feels so weird to actually call it, "Network Mapper".
Hum... looks like a fed talking about things they dont actually know.
@@Thurgenev Oh wow, this is a first. I don't think I've ever been called a Fed before. 🤣
@@dj_chateau No, not u, her...
@@Thurgenev Awww... 😭 well now I feel left out.
ur pretty
Nice try fedboy!
When is your OnlyFeds leak?
don't use nmap anymore, use rustscan instead to go faster😂
tbh rustscan is faster but trips up more automated responses from firewalls or Ips, nmap is much safer
@@S4dakoTv I mean for CTF and challenge, it's ideal
Legend say "i can hack nasa using html". (Okay its not funny)
N in nmap for NSA connected to the CIA they are coming for me. UA-cam full of vulns
I commend you for attempting to teach others. However, you have a long way to go before teaching. This is not Nmap basics. The basics would be understanding how this tool works. You explaining these commands are on the surface level of someone who doesn’t understand what’s going on, but knows a general idea. I’d advise people to watch people that actually know their stuff, like Ippsec.
hackers probably dont look like u lol
Y’all joke just sexist, if it was done by a Man U wouldn’t say it
do asmr
Why is everything " basics for hackers"? if you are a hacker you probably don't NEED the basics.
you can map my network any time
weirdo
Something is off about your camera or face lol
blablabla Nothing new here...