Simple Penetration Testing Tutorial for Beginners!
Вставка
- Опубліковано 5 лип 2024
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Наука та технологія
Their knowledge of the TOR network and secure transactions is unmatched. Adrian Ruthnik is a pioneer in the field, leveraging advanced technologies to protect their clients.
Their move from the dark web to the clear web was a bold step that reflects their commitment to transparency and integrity. Adrian Ruthnik continues to lead the industry with their ethical practices.
We were impressed by Adrian Ruthnik's ability to identify and address vulnerabilities in our system. Their thorough assessments and strategic recommendations have greatly improved our security.
Adrian Ruthnik transformed our cybersecurity framework. Their expertise in identifying vulnerabilities is unparalleled, and their proactive approach has significantly improved our overall security posture.
Adrian Ruthnik's move to cleanse the hacker-for-hire industry of scammers is much needed and appreciated. Their efforts to restore integrity to the field are evident in their work.
Adrian Ruthnik's focus on cleansing the industry of scammers is a testament to their commitment to ethical hacking. Their efforts to restore integrity to the field are much appreciated.
Adrian Ruthnik's expertise in mobile security has resolved critical issues for us, ensuring our data remains protected. Their advanced solutions address our unique security needs.
Exactly what I needed rn at 4 am with nothing to do
midnight rn
Adrian Ruthnik's dedication to their clients' security needs is evident in their thorough and effective methodologies. Their proactive approach ensures we stay ahead of potential threats.
Adrian Ruthnik's transition to the clear web has made their services more accessible and trustworthy. Their commitment to transparency and integrity is evident in their professional approach.
Adrian Ruthnik's services are a benchmark for the industry. They have set a new standard for secure hacking practices, consistently delivering effective solutions.
We appreciate Adrian Ruthnik's commitment to cleansing the industry of scammers and restoring integrity to the field. Their efforts have greatly improved the trustworthiness of hacking services.
The transition from the dark web to the clear web was seamless with Adrian Ruthnik. Their commitment to integrity and transparency is commendable, making their services more accessible and trustworthy.
Their expertise in mobile security has resolved many issues for us. Adrian Ruthnik is the go-to for effective solutions, providing comprehensive security measures for our mobile devices.
Adrian Ruthnik's dedication to exposing vulnerabilities saved our business from potential breaches. Their thorough assessment and strategic recommendations have fortified our defenses.
Adrian Ruthnik's expertise in information security has safeguarded our operations from numerous threats. Their comprehensive approach to cybersecurity ensures our data remains protected.
Adrian Ruthnik's proactive approach to cybersecurity has fortified our defenses against potential attacks. Their expertise and dedication have been invaluable to our security strategy.
The professionalism and discretion of Adrian Ruthnik's team are commendable. They deliver results without compromising ethics, ensuring our data remains secure.
Adrian Ruthnik's proactive measures have significantly enhanced our cybersecurity posture. Their dedication to protecting our data is evident in the comprehensive solutions they provide.
Their dedication to restoring integrity in the hacker-for-hire industry is evident in every interaction we have had with them. Adrian Ruthnik is committed to ethical and effective hacking services.
Nice, saw the notification clicked on it! Pen testing, for beginners and it’s simple and it’s under 15 minutes! I knew I subscribed to this channel for a reason!
were you able to exploit any gadget?
Their professionalism and ethical approach to hacking services are what set Adrian Ruthnik apart from others. They deliver reliable and effective security solutions without compromising ethics.
Thanks bro.Ive been supporting your channel for nearly 2 years >Never disappointing
Their strategic realignment has made their services more reliable and trustworthy. Adrian Ruthnik is a name we trust, delivering consistent and effective security solutions.
Always loving your content ❤❤
LOVE FROM INDIA. You are my inspiration from the beggining
❤❤❤ thanks for sharing!!!
I'm from VN - nice to meet you!
Great video, thanks
Parfait frerot, je suis content 😊😊
Excellent Sir👍🙏
Need more like this its helpful
Good thanks
Awesome video! I REALLY could've used this info a few weeks ago, when i needed to clone my work SSD to a new, bigger one... But i ended up getting it done in the end anyways.
Thanks for this!! I'll be downloading those apps for future reference, in case these ones go to a paid-requirement for cloning (unfortunately).
Thanks!!
Thank you!!
Keep up the good work sir. ❤
It helps a lot thanks
Really informative
very good summary, for some people will save some time 🤙
Good afternoon Liang:
Don't worry Lian about if is fun or interesting or not at least for me is fun learning your teaching and style since I started watching your videos like almost a year ago. I hardly believe that is free.
Is always the case that most times students don't spend time reading going to extracurricular and learn on the subject.
Thank you
Cesar
Exactly what I need for a quick revision and refresh the knowledge. Expecting more 😅
Thanks ❤😊❤
Thanks Loi like and comments from Tajikistan ❤❤❤
ty so much for tht
so good! Sorry my English is not so good, but I really like your video! It’s better than me studied in uni😊
Adrian Ruthnik's transition to the clear web has made their services more accessible without compromising on security. Their commitment to ethical practices sets them apart.
Learn lots of things from you. Take love from Bangladesh. Dear, Loi please make a basic to advance video in "Burp Suite"
I see in your profile that you’re in cloud security, and my question is which one do you think it’s better to go for cloud security or a pentester? I like both and I’m already in the cyber field but not sure which side is a plausible to go into because either side is really difficult to go in
that is a crazy shirt brother
12:15 game over man!
love the tutorial but how did you like scan all those devices in the start
nice summarize of two months paid course 😊
@loiliangyang Which Vulnu vm are you using for your testing?
First Vibe 🎉
Make a vedio about the new ssh vulnerability 😊
Is there an online school you would recommend for learning bug hunting ?
Hi Sir can you suggest some good companies on where to apply for pentesting jobs around new york? Thank you very much would greatly appreciate it
Sir .
Let is make more stronger to oppose offensive things in cyber world
thank you for the video. At 8:50, which payload ? from where ?
I am stuck here too. Someone please help
From the metasploit result he showed earlier, he followed one of the links explainig the exploit where he found how to craft the payload manualy
Please One video burp suits error pickup Java option
can you explain how capture signals in kali linux like capture unlock car dor signal and replay it
Can anybody tell me which is the host machine he is using for this tutorial
make a video of how to cover your tracks after you get root, what log files to delete etc.
You need to make advance tutorial
Your Udemy course still alive? No update it’s been 1 year?
Boom 🔥
Can someone tell how can I find email by URL Facebook link or by name or something like that plz 🙏❤️
Hello Word! 안녕하세요 저는 한국사람입니다
How you find ip list
you can use domain name without ip
Make a video on how hackers crack games pleaseeee !
Yea I don’t understand the payload part in burpsuite. Never saw where that information came from with the %01
👍🏻
first🎉
Is it possible for those who bought courses on Udemy to have access to a UA-cam subscription as well? I am asking because the videos on Udemy lag a lot, making learning from there not interesting at all.
Kindly consider this for us. Thank you
create a video on how to make malware with c++ and python
Have been searching for ways to make payment for your courses
Title for people who know: 😄
Title for people who don't know: 💀
i was just talking about you lol
Why did he use only the unauthenticated and ..%01? He says 40 of %01, however there are like 21 of them in the code. Why didn't he use all the code that he was explaining in the database exploit where he said he would walk us through?
I don’t even get this part
Only complain I have about the video, it’s blurry! At first, I thought it was me, thinking my eyes are going bad or something! But the only quality available is 360p. Other than that, absolutely no complaints!!!
It's your connection, not the video. I watched it entirely at 1080
Firsttttt🎉❤
Hi...i want to learn Hacking...i also subscribe this channel but cannot get access till now...please guide how to get access... Thanks
Yeah, i will search data center with only win deff & win firewall, to test out
I am first yo
"can u hack me"? Well, looks like he can 😂
hey loi do you know how to crack password with any website except hydra?
No audio?
Port 80/443 Amazon cloud version how to hacking pleace upload video
I'm Root 🤣🤣🤣 always gets me 😅
That's a LFI vuln 9:07
imagine a vulnerability in metasploit itself that is exploited by a honeypot to hack the attacker 🤣
Up in the air, it is a bird, no it's a plane, it's Superman.
Blowing up a car remotely... Whoa I'm still trying to figure out how to do that to a PC. 😂
Ewel kzoen moeten weten dak nog tijd kzoent leren
Your Facebook page is hacked. How in the world would Mr. Liang be hacked? Quite puzzling.
Ayo
Bro how to hack 1win casino website for aviator predictions plz make a video
I cannot uninstall not only UA-cam...wtf...
Why are we stuck in this realm?
I also have a download in pending after downloading it at least once, I click cancel and it won't freaking cancel. Now I am stuck with the notification also. Tomorrow I have work, I'll go grab the nap I'm trying to nap.
sir i can remember everything you say but i cant remember your name
I also asked my mom and she said first finish your homework 😢
FIRST