Hi, thanks so much for the video. I have a question though, since hydra as shown in your previous video is used for brute force attack, why didn't we get to use it against this ssh_login. I tried it on my own but it didn't work (hydra -L Users.txt -P Passwords.txt 10.0.200.5 ssh_login). Can you please tell me the right command to use and other steps to follow. Thanks
1.Open a terminal and locate the file 2.type 'pwd' and copy the path 3.Now set the path for user_file like this /home/kali/user.txt 4.Same for the password file too There you go!!!! 😉
I will definitely put that on my list to do. But I want to finish everything that I’ve been working on first and I can definitely take your recommendation.
the teacher gave a red hat linux machine and we need to exploit it. only ports 22, 111, 3306 and 32768 are open they didnt give username or password im so confused pls someone help 😭
@@InfoSecPat i guess so i saw the project sheet it just says we need to *find vulnerabilities, exploit all what we find, and then write a pen test report* ports 80 and 443 are out of scope. i ran nessus scan and got 31 vulnerabilities, but most of them are SSL so port 80 or 443? the rest are mostly SSH but im stuck on *what exaxtly to exploit*
hey and thanks for the video I have a question ;what is the difference between auxiliary/scanner/ssh/ssh_login and auxiliary/scanner/ssh/ssh_login _pubkey ? and when to use each one of them ? what to do if I have already the username (cve-2018-15473) but the ssh service does not support the password authentication, knowing that I got the pubkey of the target by runnig nmap scan ?
This is only a fraction of what the best hackers can do. Or rearely...
Is there any other way to exploit ssh port 22 in Metasploit without bruteforcing?
Hey, may i know are those each payload should be update or ?
Hi, thanks so much for the video. I have a question though, since hydra as shown in your previous video is used for brute force attack, why didn't we get to use it against this ssh_login. I tried it on my own but it didn't work (hydra -L Users.txt -P Passwords.txt 10.0.200.5 ssh_login). Can you please tell me the right command to use and other steps to follow. Thanks
Hi Mr, I get this error [-]Msf:: OptionvalidateError The following options failed to validate: user_file, pass_file. Please help me to solve this
1.Open a terminal and locate the file
2.type 'pwd' and copy the path
3.Now set the path for user_file like this /home/kali/user.txt
4.Same for the password file too
There you go!!!!
😉
can you pls teach ddos after this im really interested
I will definitely put that on my list to do. But I want to finish everything that I’ve been working on first and I can definitely take your recommendation.
can you please tell me what are these attacks are for?
This video is on exploding the service SSH port 21
As long the wordlist have time enough to againts the server timeout setup …
the teacher gave a red hat linux machine and we need to exploit it. only ports 22, 111, 3306 and 32768 are open they didnt give username or password
im so confused pls someone help 😭
You have to find the username and password. That’s the point of the exercise.
@@InfoSecPat i guess so
i saw the project sheet it just says we need to *find vulnerabilities, exploit all what we find, and then write a pen test report*
ports 80 and 443 are out of scope.
i ran nessus scan and got 31 vulnerabilities, but most of them are SSL so port 80 or 443?
the rest are mostly SSH but im stuck on *what exaxtly to exploit*
I expected to see Trinity's (from Matrix 2 movie) method! 😔👩🏻💻🔌⛔💡
Pat, please take the above as a… proposal, for an upcoming video! 😅🎬
👍
Thank you 🙏
hey and thanks for the video
I have a question ;what is the difference between auxiliary/scanner/ssh/ssh_login and auxiliary/scanner/ssh/ssh_login _pubkey ? and when to use each one of them ?
what to do if I have already the username (cve-2018-15473) but the ssh service does not support the password authentication, knowing that I got the pubkey of the target by runnig nmap scan ?
first view first view 👍
Super thank you 🙏