Introduction To Pentesting - Enumeration

Поділитися
Вставка
  • Опубліковано 16 лип 2020
  • In this video, I demonstrate how to perform service enumeration with Nmap scripts. The target box that is used in this video is Metasploitable2. Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques.
    Metasploitable2: sourceforge.net/projects/meta...
    📈 SUPPORT US:
    Patreon: / hackersploit
    Merchandise: teespring.com/en-GB/stores/ha...
    SOCIAL NETWORKS:
    Twitter: / hackersploit
    Instagram: / hackersploit
    LinkedIn: / 18713892
    WHERE YOU CAN FIND US ONLINE:
    HackerSploit - Open Source Cybersecurity Training: hackersploit.org/
    HackerSploit Academy: www.hackersploit.academy
    HackerSploit Forum: forum.hackersploit.org
    LISTEN TO THE CYBERTALK PODCAST:
    Spotify: open.spotify.com/show/6j0RhRi...
    We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social networks.
    Thanks for watching!
    Благодарю за просмотр!
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Obrigado por assistir
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    #Pentesting#Infosec
  • Наука та технологія

КОМЕНТАРІ • 143

  • @TheLazyJAK
    @TheLazyJAK 3 роки тому +27

    I haven't watched your channel in a year or two, but you're distinctly more professional and concise than I remember. Great job growing the channel and your content creation skills.

  • @ritikranjan7192
    @ritikranjan7192 3 роки тому +24

    Hey! Now I start loving your voice

  • @emeraldscripter
    @emeraldscripter 3 роки тому +3

    Thanks for this!
    Your tutorials means a lot to me,
    especially that you're continuing
    these kind of series.

  • @vajahat07
    @vajahat07 3 роки тому

    Your first video made me subscribe to your channel, and this second one made me click on the bell for all your uploads. Awesome stuff!

  • @geek101grew8
    @geek101grew8 3 роки тому

    You are just amazing teacher whenever i found!

  • @souravkumar7283
    @souravkumar7283 3 роки тому +3

    Channel of accurate tutorial
    Student from India

  • @nonoperation2356
    @nonoperation2356 3 роки тому +3

    Great intro and look into your enumeration process. I would love to see a series on rooting machines without Metasploit. There are some HTB series online and walkthroughs that detail this but would love to see some exploits done without MSF.

  • @JustinSahba
    @JustinSahba Рік тому +1

    Very informative content. Thank you for sharing it with everyone.

  • @thumbaroundreversefingerme4786
    @thumbaroundreversefingerme4786 3 роки тому +2

    Hey, this is the first video of yours that I watched, nice content! I will start following you more in the future, here is my sub!

  • @HowToCyber
    @HowToCyber 3 роки тому

    Thank you so much for this! Very beginner friendly

  • @pharrellarts3315
    @pharrellarts3315 2 роки тому

    I have learnt so much i just one video. Thanks alot

  • @alexd531
    @alexd531 6 місяців тому

    Been listening to this while working to try absorbing some knowledge to help me learn how to do this kind of thing, and i apretiate the way you explain everything well enough that i dont have to see what your doing to understand what is happening. (Will be rewatching on lunch to see it though.

  • @pranavtejsingh3839
    @pranavtejsingh3839 3 роки тому +3

    Love this channel!

  • @ragesann
    @ragesann 3 роки тому +2

    watch your information gathering playlist ,once i am done watching that one i will get back to this one
    nice content btw

  • @alexxxk
    @alexxxk 3 роки тому

    THE BEST YT IVE EVER SAW ..... MEN YOURE THE BEST !

  • @TheBananaChan
    @TheBananaChan 3 роки тому

    Learned a lot of things, thank you !

  • @Redivive
    @Redivive 3 роки тому +4

    Много знаний и информации.Спасибо.

  • @TheChinobi23
    @TheChinobi23 Рік тому

    Amazing video, immediately subscribed

  • @artphile8873
    @artphile8873 3 роки тому +1

    I'm a big fan hackersploit

  • @muhammedshafeeque483
    @muhammedshafeeque483 Рік тому

    my leader..all the best ..keep going on.... @rahul ji #bharatjodoyatra

  • @kr4k3nn
    @kr4k3nn 3 роки тому

    Thank you very much sir...Really appreciate it

  • @adegbolaige5057
    @adegbolaige5057 3 роки тому

    great job explaining

  • @tyrewald9083
    @tyrewald9083 3 роки тому

    Saved my weekend!

  • @therealsuryansh
    @therealsuryansh 3 роки тому

    I liked this video a lot. Sir! Keep making more and more videos :)

  • @issahmidan5821
    @issahmidan5821 3 роки тому

    Really good job man

  • @kongpanha1816
    @kongpanha1816 3 роки тому

    Good explain and best voice

  • @bbcs6392
    @bbcs6392 3 місяці тому

    Great learning ❤🎉

  • @Liryn
    @Liryn 3 роки тому

    Alexis you are the best.

  • @ritikyadav4153
    @ritikyadav4153 3 роки тому

    Love youer hacking skills

  • @localhost4356
    @localhost4356 2 роки тому

    Nice, I love this...😍😍

  • @lupibeats
    @lupibeats 3 роки тому

    John is a good guy.

  • @anupambhatta922
    @anupambhatta922 3 роки тому

    Love ur video sir..

  • @ronin0x_
    @ronin0x_ 3 роки тому +1

    Hello Hackersploit. Hope you are doing well. Quick question. What laptop and PC are you using? Linux seems to be running smoothly on yours while mine it lags badly

  • @guyinaduke7466
    @guyinaduke7466 3 роки тому

    Inspiration😍😍😍😍

  • @billyhgunn
    @billyhgunn 3 роки тому

    Sweet More to Learn

  • @8080VB
    @8080VB 2 роки тому

    Thankyou ⚡💫

  • @muntasirsakib483
    @muntasirsakib483 3 роки тому

    Love you bro 💓
    বাংলাদেশিদের পক্ষ থেকে ভালোবাসা💓💓💓🏵

  • @underscore5307
    @underscore5307 3 роки тому

    16 dislikes... Why would anyone want to dislike one of your videos is beyond me.

  • @etruba8462
    @etruba8462 3 роки тому

    Thanks

  • @jordanhess2061
    @jordanhess2061 3 роки тому

    What is needed before you begin to learn pentesting stuff, like start from scratch ?

  • @percyblakeney3743
    @percyblakeney3743 3 роки тому

    Hello there. I need help and hopin' you may be able to assist. Is it bad practice to buy a domain (super, super cheap one) then pay for web hosting for testing purposes or would it be more ideal to go the whole No-Ip/Apache (runnin' Linux) route? I've been going back and forth for DAYS and haven't come to a conclusion. Any help from you will be much appreciated. Thank you.

  • @vegoz99
    @vegoz99 9 місяців тому

    Do you have a guide for setting up the lab Environments?

  • @aasdguuu4916
    @aasdguuu4916 3 роки тому +1

    Please make a playlist for this vid

  • @sundializer5248
    @sundializer5248 3 роки тому +21

    Please make some course/tutorial about binary exploitation, i would love that!

    • @alabamalockpicking
      @alabamalockpicking 3 роки тому +5

      Finally a comment that I have been waiting for 😄

    • @nikhilt3755
      @nikhilt3755 3 роки тому +1

      this guy became shit , posting again and again
      later he posts
      basic linux commands full tutorial
      hacking enivonment setup
      pentesting bootcamp
      networking bootcamp lmao
      blah blah blah
      shitsploit

    • @steez4778
      @steez4778 3 роки тому +2

      @@nikhilt3755 Live overflow man

    • @nikhilt3755
      @nikhilt3755 3 роки тому +1

      ​@@steez4778 i know liveoverflow
      but this hackersploit in infosec for 4+ years still making basic videos ,

    • @steez4778
      @steez4778 3 роки тому +2

      @@nikhilt3755 You really don't need to know binary exploitation to be in info sec tho, although it is a good idea to get out of his comfort zone and try something new.

  • @usama_websec
    @usama_websec 3 роки тому

    Is it Kali with KDE or XCFE desktop environment?

  • @SH1xmmY
    @SH1xmmY 3 роки тому

    Hello can you also talk a little about securing or detecting a website from enumeration from tools sliek nmap and burpsuite next time pls

  • @deewanshvodehra2894
    @deewanshvodehra2894 3 роки тому +2

    🔥🔥🔥

  • @DerrickWashington
    @DerrickWashington 9 місяців тому

    What theme are you using for kali

  • @usrbinsudorm5716
    @usrbinsudorm5716 3 роки тому

    38:55; i know its easier said than done but, grep? for help thinking outside the box

  • @lordayush2680
    @lordayush2680 3 роки тому

    This is what I want

  • @TheAyamsabung
    @TheAyamsabung 3 роки тому +1

    This channel is great!! Can you post something about enumerating web apps that are hosted in a docker container. I'm interested in securing docker deployments

    • @HackerSploit
      @HackerSploit  3 роки тому +4

      That is a great suggestion, I will work on that.

    • @TheAyamsabung
      @TheAyamsabung 3 роки тому

      Thx!!!

    • @jdotmdotm
      @jdotmdotm 2 роки тому

      Alh4zrad or Alh4zred something like that has a youtube channel that does a hackthebox machine walkthrough for pivoting out of a docker container. If you go through his recent videos in the past few months you will see it. good luck.

  • @sintayehuimeru7966
    @sintayehuimeru7966 3 роки тому

    My hero 😍😍😘

  • @rayane2290
    @rayane2290 Рік тому

    Pentest via nmap detection then on ftp, telnet, and ssh. Initially you still have to access on the LAN so outpass router/firewall...

  • @Black-yt7pu
    @Black-yt7pu 3 роки тому +5

    Broo I installed Kali net Hunter and I opened Wireshark but there no wlano. (I installed Kali nethunter in Android through vnc) please help me 😪 no one replying IAM your subscriber since 2019 please

    • @sunhaa3645
      @sunhaa3645 3 роки тому

      askubuntu.com/questions/459132/wifi-connectivity-eth0-and-wlan0-interface Would this thread help you in the right direction?

    • @samuelagbo6541
      @samuelagbo6541 3 роки тому

      My account was verified with fastlinkhack on IG. His the best heacker I have ever seen

    • @cybertache
      @cybertache 3 роки тому +2

      if you have kali in VM then you have to connect VM with your wifiadapter and do bridge connection.

    • @518trey1
      @518trey1 2 роки тому +1

      You need an compatible wIFi adapter and driver or you can use a bridge connection.

  • @OVVAISNAB
    @OVVAISNAB 3 роки тому

    Thanks you man, can u tell me what is the difference between enumeration and exploitation?

    • @OVVAISNAB
      @OVVAISNAB Рік тому

      @Chuck Comm that was 2 years ago, and i know the difference now, but thats a good point too

  • @alph4byt3
    @alph4byt3 3 роки тому +2

    3:52AM, so it's not only me whose sleeping schedule went the opposite way these few months

    • @zekesalazar7643
      @zekesalazar7643 3 роки тому

      Not at all. I was already semi-nocturnal but this pandamic has shifted me fully lol.

    • @ArufisuIsRuru
      @ArufisuIsRuru 3 роки тому

      Its 3:42 am here, guess i am too also almost nailed it

  • @aroundtheworldwithfootball4460
    @aroundtheworldwithfootball4460 3 роки тому +1

    i tried to hack windows xp (i use windows xp as vulnerable machine)
    i power off the firewall and some ports were open
    i launch hail mary attack on armitage
    but it shows me
    exploit completed but no session was created

  • @faust9091
    @faust9091 3 роки тому

    Why are you running widows as host?

  • @adamjosef1250
    @adamjosef1250 3 роки тому

    I hope you add join option in ur channel and give us a from beginner to advanced courses and thnx in advance

  • @delusional5159
    @delusional5159 3 роки тому

    what version of kali is this?

  • @aroundtheworldwithfootball4460
    @aroundtheworldwithfootball4460 3 роки тому +2

    When is port 80 open on a machine ?
    - when i run an apache server
    - when i use my browser

  • @tanhayel5596
    @tanhayel5596 2 роки тому

    Guys how do we set up metasploitable2 on my vm ? i need help

  • @diegodejesus9668
    @diegodejesus9668 3 роки тому

    What type of firewall can I use to prevent an attack with nmap?

    • @SnapcrackerzTeam
      @SnapcrackerzTeam 3 роки тому

      change your mac address change your dns to cloud flare server and run an open vpn client that supports p2p

  • @narayanupadhyaynarayanupad6458
    @narayanupadhyaynarayanupad6458 3 роки тому

    Hi hacker sploit

  • @enos5192
    @enos5192 3 роки тому

    Alexis , At last Got what I wanted....

  • @ganeshsawant3949
    @ganeshsawant3949 3 роки тому

    Hello, let me know how to embaded APK to jpg

  • @mokshkasliwal1158
    @mokshkasliwal1158 3 роки тому

    I'm beginner in ethical hacking, where to start with your playlists????Which topic should i watch first??

    • @HackerSploit
      @HackerSploit  3 роки тому +1

      You should start with our Bootcamp playlist.

    • @mokshkasliwal1158
      @mokshkasliwal1158 3 роки тому

      @@HackerSploit i cannot find bootcamp playlist can u give me link?

    • @sunhaa3645
      @sunhaa3645 3 роки тому +1

      @@mokshkasliwal1158 ua-cam.com/video/qJ9ZmkMvkcA/v-deo.html

  • @richpoorworstbest4812
    @richpoorworstbest4812 10 місяців тому

    is this the same course as the 25 hours course paid for?

  • @aroundtheworldwithfootball4460
    @aroundtheworldwithfootball4460 3 роки тому +2

    what is the most important port that must be opened to hack a machine?
    80, 445, any ?

    • @sunhaa3645
      @sunhaa3645 3 роки тому

      From what I understand, people can leave ports open. If you wanted to use those ports to your advantage then maybe something with exploits or 0days, but the latter bit is what I think. Port 80 is HTTP, this is not well protected.
      I suggest looking at this: en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
      Or, looking into CCNA might aid you in this.
      Good luck!

  • @BloodmansCrypt
    @BloodmansCrypt 3 роки тому

    Hey hackersploit

  • @soumyadeepdutta8158
    @soumyadeepdutta8158 3 роки тому

    With smtp-user-enum after finding out the smtp users, what is the next step?? Is there anything to gain access in??

    • @8080VB
      @8080VB 2 роки тому

      No it enumerates usernames only .

    • @8080VB
      @8080VB 2 роки тому

      Next step ??! You can find the file your looking for ~ in an instance

  • @pengmatinez
    @pengmatinez 3 роки тому

    👍👍👍

  • @shahzan525
    @shahzan525 3 роки тому

    I am beginners , where to start from your channel

  • @imranthoufeeque165
    @imranthoufeeque165 3 роки тому

    We hope you are safe too bro...

  • @AGRuwan
    @AGRuwan 3 роки тому

    Please do bug bounties on hackerone or other site......

  • @darshanakhare6676
    @darshanakhare6676 3 роки тому

    In cyber talk episodes explain Twitter bitcoin hack and all that stuff

  • @shaniyabisburg1844
    @shaniyabisburg1844 3 роки тому +2

    Any advice on buying a laptop strictly for Linux? Spec-wise

    • @faust9091
      @faust9091 3 роки тому

      If you want a "free" as in respects your freedom go pureism or system76(They at least try to remoce the Intel managment engine and amd's version of it)
      EDIT: And don't run systemd, artix linux a fork of Arch has good alternatives if you are a Arch fan. If not go Gentoo or its forks.

    • @shaniyabisburg1844
      @shaniyabisburg1844 3 роки тому

      @@faust9091 I seen that laptop, its a little pricey tho. Would you recommend installing it on a raspberry pi?...cause I might go that route, I'm just such a noob that i don't know if theirs any drawbacks to doing that.

    • @faust9091
      @faust9091 3 роки тому

      @@shaniyabisburg1844 I'm no pro myself. Any pc can run linux normaly. I recommended them for privacy, but in general I would recommend installing Arch first on a machine you own. Then go for its forks or go on Gentoo if you feel like you got the hang of it (Or just hate systemd). All in all when you see that you can customizs everything down to the kernel you will never whant to go back.

  • @recon0x7f16
    @recon0x7f16 Рік тому

    i cant install the vm

  • @eyeinthesky1050
    @eyeinthesky1050 3 роки тому

    do you know anything about this new Pegasus program that take control of your mobilephone? Russian hackers made it...

    • @karpejev
      @karpejev 3 роки тому

      Are you sure it`s new? Wiki says it was discovered in 2016

  • @Sc00by383
    @Sc00by383 3 роки тому

    Web application testing and hacking

  • @motivationluxury7986
    @motivationluxury7986 3 роки тому +1

    Sir How much time it took you to become Hacker?

    • @AtulKumar-qz7dl
      @AtulKumar-qz7dl 3 роки тому

      When He was trying...he didn't pay attention how much time did he invest ...now he doesn't remember 😭😭

    • @sunhaa3645
      @sunhaa3645 3 роки тому

      For most people it will take 4 years or so?

  • @tejasjhamnani7724
    @tejasjhamnani7724 3 роки тому +2

    Sir my dad's email account was hacked earlier so if it gets hacked again will I be able to hack it again and get the account back after watching your course ??

    • @xinovaz2727
      @xinovaz2727 3 роки тому

      hahaha thats not how hacking works. if its a gmail account you can contact google customer support to get it back. even if it isnt, just try calling customer support of whatever service you used. hacking is very complex and if you dont understand what it really is first you shouldnt try to learn it yet.

  • @player4unmasked640
    @player4unmasked640 3 роки тому

    bro can u please teach how to do untraceable internet call for free

  • @vishalkhetavat9556
    @vishalkhetavat9556 3 роки тому

    I want you to make series of how to hack windows 1p

  • @aliemhadhy550
    @aliemhadhy550 3 роки тому

    Channel ok

  • @adamjosef1250
    @adamjosef1250 3 роки тому

    How can we know that we are not dealing with a honeypot

  • @mrtrezo3297
    @mrtrezo3297 3 роки тому

    Player android bisa apa 😣

  • @anuradhalakruwan1918
    @anuradhalakruwan1918 3 роки тому +1

    Basic ethical hac*ing cours.... Please. 🌹🌹🌹🌹🌹🌹🌹

  • @djebbaranon5892
    @djebbaranon5892 3 роки тому

    Bro do something you are restarting the videos move to something new like vunlhub binary exploitation ...

  • @katherynparker4914
    @katherynparker4914 3 роки тому

    # Parker_hacker1* es el mejor hacker que conozco en instagram

  • @m.alaiady3627
    @m.alaiady3627 3 роки тому

    Please Next Video
    How to scan & exploit the COVID-19

  • @hackplusplus117
    @hackplusplus117 3 роки тому

    stop doing easy and has been tuts please !

  • @Black-yt7pu
    @Black-yt7pu 3 роки тому +2

    Broo I installed Kali net Hunter and I opened Wireshark but there no wlano. (I installed Kali nethunter in Android through vnc) please help me 😪 no one replying IAM your subscriber since 2019 please

  • @archlinux8390
    @archlinux8390 3 роки тому +1

    Broo I installed Kali net Hunter and I opened Wireshark but there no wlano. (I installed Kali nethunter in Android through vnc) please help me 😪 no one replying IAM your subscriber since 2019 please