@@personallothus473 Anyone who gives advice, on any subject that could be considered illegitimate, should be considered fed. For example, if you read a guide on how to stay anonymous on the dark web, you should consider that the author may be a fed, and that the guide could have been written to mislead you into compromising your identity. Thus people joke about content creators who deal with "similar" topics being feds. And for anyone unaware, feds, glowies or alphabet boys are any person/group of people working on behalf of a government organisation (think CIA, FBI)
a tip, the home key will return to the beginning of the line and the end key will go back to the end also sometimes the up and down arrows will do the same
I am strictly a local application hacker, so I only ever need to bypass local process security measures. Network hacking seems like the total opposite of application hacking. What the best part about network hacking?
Sorry if you mentioned this in the Video as I am not allow to get much of any sleep where I live due to a Syndicate of Children plotting against me I may have forgot but what distro of Linux are you using?
Hey: 👋 One of your videos just got disappeared - I don't remember the name but i wanted to watch it so i downloaded it on UA-cam app but now it disappeared - can you provide a link
I'm learning how to use nmap, I have a PC which I use as a small server to run scans. I thought of doing a scan on my university's server, now I'm blacklisted by the firewall, I'm a fucking genius :)
Back when I was in a university back in the late 90s, I was not doing nmap, but using the univeristy's Sun SPARC UNIX servers running at 'nice 20' (so super low priority) on one of the distributed computing applications, I think it was for RC4 cracking, and up comes the talkd service from the admin messaging me. Pretty much said "cut it out". He wasn't too upset at me because I was running it at lowest priority with the 'nice' command, so not too bad. Now 26 years later, I myself have been working at a community college for 24+ years in the role of the system/network admin and infosec guy.
I noticed you pronounce "sudo" the same way I do. Are you from New Hampshire? Well, you don't have to answer that, but that's where I am from. It seems like every other hacking video I watch, the content creator pronounces it like "dew" instead of "doe."
When you work entirely in CLI and doing everything remote, no room for GUI, and especially if you don't want to bloat your system with an X-server to connect to. ;-) UIs are nice, but always learn the base level things. When things break, it helps in understanding how to troubleshoot and fix the problem.
It would be nice if there was a program where you only had to enter the target IP and then the program automatically hacks into the computer. Hacking for the lazy, so to speak. 😅
I commend you for attempting to teach others. However, you have a long way to go before teaching. This is not Nmap basics. The basics would be understanding how this tool works. You explaining these commands are on the surface level of someone who doesn’t understand what’s going on, but knows a general idea. I’d advise people to watch people that actually know their stuff, like Ippsec.
my favorite PsyOP Fed Agent channel for sure
I like the no-music, no-bs, no cuts vibe.
Great stuff, "Ctrl + a" to jump to the beginning of the line 🙂
@@luqmaanmarthinus6820 tyyy!! I forgot about that shortcut
IIRC you can do `sudo !!` to redo the previous command with sudo when you forgot it again
@@Cyb3rMaddy "Ctrl + E" jumps to the end of the line. 😁
@@mbielchris lifesaver
@@Cyb3rMaddy Are you a fed honey potter or something?
My most used tools when I'm hacking is my sun glasses and my otaku suit.
you probably don't actually hack anything.
@@ShaunPrince How could u say that? I'm a hackerman, I do a lot of hacker stuffs... pff
Yeah ... Ive seen hackers in Russia they most commonly use cocaine
fed of the year fr
There is something with you voice 😊girl... can't watch without rewinding. So soft,gorgeous, man its killing...❤
She looks like a Fed, but She makes nice content
I`m not american so I don`t get why there's a Fed narrative.
Why is that?
What's the issue?
@@personallothus473 they can't believe a woman can get into cybersecurity
He's mad he doesn't have a gf 😁@personallothus473
@@personallothus473 it's a joke...
@@personallothus473 Anyone who gives advice, on any subject that could be considered illegitimate, should be considered fed.
For example, if you read a guide on how to stay anonymous on the dark web, you should consider that the author may be a fed, and that the guide could have been written to mislead you into compromising your identity.
Thus people joke about content creators who deal with "similar" topics being feds.
And for anyone unaware, feds, glowies or alphabet boys are any person/group of people working on behalf of a government organisation (think CIA, FBI)
I don’t care who they send, I’m not paying my taxes
no taxes, no ability to vote and no access to any social service. No access to public infrastructure. Makes sense, you're smart.
sure lil bro
Whatever makes you feel better lil bro 🫂
nice reference lmao
Wow you know so much cant imagine how good your skill will be 10 years from now
Maddy you can press down arrow or side arrow when a scan takes long to show how much time is left in your scan.
Girl it's fun listening to you I enjoy it.
due to UDP being connectionless (no handshake) the scan takes ages.
real shit
nmap is one of the neatest tools I've seen since the for loop in the Bash shell
I thought it was to check out things, not that reveal vulnerabilties, great info maddie!
a tip, the home key will return to the beginning of the line and the end key will go back to the end also sometimes the up and down arrows will do the same
she is so paranoid.. i love it!
Great beginner level tutorial, thanks!
you give me hope. thank you.
Keep it up maddy ❤🙌
AI getting crazy good
HELP THATS WHAT I THOUGHT but she actually was on DefCon
@@ram-gc7gl I wasn't at DefCon that was my AI
This is such an awesome topic aaand, is that a hint of nystagmus I see?
i love your work keep it up 👍
Glowie
yes now i can hack into the mainframes like in the movies
hack the planet
Nice filter, fed.
has she done transitioning. no clue. no idea. she could be a spy. a pride-theme spy.
I am strictly a local application hacker, so I only ever need to bypass local process security measures.
Network hacking seems like the total opposite of application hacking.
What the best part about network hacking?
the network
everyone forgets sudo. thats why we bang bang
Dope vid, would luv to watch a vid on airodump :p
My most used tool is actually Neofetch
I use arch btw
@@HermesSilva-xt6dt I use Qubes btw
❤❤
I’ve been in tech for 100 years but only really started using nmap in the last couple years. I dunno how I survived without it all that time.
Sorry if you mentioned this in the Video as I am not allow to get much of any sleep where I live due to a Syndicate of Children plotting against me I may have forgot but what distro of Linux are you using?
Hey: 👋
One of your videos just got disappeared - I don't remember the name but i wanted to watch it so i downloaded it on UA-cam app but now it disappeared - can you provide a link
NOICE
I'm learning how to use nmap, I have a PC which I use as a small server to run scans. I thought of doing a scan on my university's server, now I'm blacklisted by the firewall, I'm a fucking genius :)
Back when I was in a university back in the late 90s, I was not doing nmap, but using the univeristy's Sun SPARC UNIX servers running at 'nice 20' (so super low priority) on one of the distributed computing applications, I think it was for RC4 cracking, and up comes the talkd service from the admin messaging me. Pretty much said "cut it out". He wasn't too upset at me because I was running it at lowest priority with the 'nice' command, so not too bad. Now 26 years later, I myself have been working at a community college for 24+ years in the role of the system/network admin and infosec guy.
Don't scan tho. They'll know you'r doing something nasty. Nice Mr. Frendel plush
thank you.
cool
How did i automatically see you on twitter insta and youtube within a short time frame?
omg is that Beadie Russell
ASMR video 👍
I noticed you pronounce "sudo" the same way I do. Are you from New Hampshire? Well, you don't have to answer that, but that's where I am from. It seems like every other hacking video I watch, the content creator pronounces it like "dew" instead of "doe."
It’s short for super user do, so they are pronouncing the second half like the word ‘do’
I personally love Zenmap cause I just prefer a GUI. But nmap is essential to the beginning of any CTF challenge.
When you work entirely in CLI and doing everything remote, no room for GUI, and especially if you don't want to bloat your system with an X-server to connect to. ;-) UIs are nice, but always learn the base level things. When things break, it helps in understanding how to troubleshoot and fix the problem.
tfw no mary jane hacker gf
do what my bf did and get ur gf into cybersec
carefull what you do because some isp's look at what youre sending out on your ports :(
The target is Metasploitable2, sooooo
Nice glo light in the corner
Jones Jennifer Gonzalez Maria Garcia Edward
how do u find an IP like does anybody know the FBI IP so i can try this stuff on their internet? ty.
The last time i saw u you were doing leet code and ur eyes was fine what did happen
Alba Spurs
why is her eyes moving like that??
I recon burp suite is more used than NMAP
"Ethical hacker" 😉
😑😑😑😑 everyone has a gun but the police save you from thefts that's the difference between criminals and ethical hackers.
"sure, ethical" lol
wait they have a GUI version??
yes
why is hacker always "hacker"? just curious
You look like an AI!
ur pretty
6:21 You have a nice tremolo in your voice.
Nice try fedboy!
When is your OnlyFeds leak?
you look soo comfy in that hoodie loooool
It would be nice if there was a program where you only had to enter the target IP and then the program automatically hacks into the computer. Hacking for the lazy, so to speak. 😅
I know that's the actual name, and you are correct, but it feels so weird to actually call it, "Network Mapper".
Hum... looks like a fed talking about things they dont actually know.
@@Thurgenev Oh wow, this is a first. I don't think I've ever been called a Fed before. 🤣
@@dj_chateau No, not u, her...
@@Thurgenev Awww... 😭 well now I feel left out.
You are so sweet, when you have to grin and almost giggle about what you say once you heard yourself saying it! 😄🥰
simp
@@maxfrischdev Simpin on UA-cam now are we?
N in nmap for NSA connected to the CIA they are coming for me. UA-cam full of vulns
Basics of how to walk. For Olympic runners.
@@teksimian what could have made this tutorial more beginner friendly? For my future reference for videos
don't use nmap anymore, use rustscan instead to go faster😂
tbh rustscan is faster but trips up more automated responses from firewalls or Ips, nmap is much safer
@@S4dakoTv I mean for CTF and challenge, it's ideal
Legend say "i can hack nasa using html". (Okay its not funny)
hackers probably dont look like u lol
I commend you for attempting to teach others. However, you have a long way to go before teaching. This is not Nmap basics. The basics would be understanding how this tool works. You explaining these commands are on the surface level of someone who doesn’t understand what’s going on, but knows a general idea. I’d advise people to watch people that actually know their stuff, like Ippsec.
Y’all joke just sexist, if it was done by a Man U wouldn’t say it
do asmr
you can map my network any time
weirdo
Something is off about your camera or face lol
blablabla Nothing new here...