How To Hack and Exploit Port 22 SSH Metasploitable 2 - Home Hacking Lab Video 6

Поділитися
Вставка
  • Опубліковано 23 лис 2024

КОМЕНТАРІ • 23

  • @timecop1983Two
    @timecop1983Two 11 місяців тому +4

    This is only a fraction of what the best hackers can do. Or rearely...

  • @_arsalan
    @_arsalan Рік тому +2

    Is there any other way to exploit ssh port 22 in Metasploit without bruteforcing?

  • @ChapalPuteh_
    @ChapalPuteh_ Рік тому

    Hey, may i know are those each payload should be update or ?

  • @topetony1431
    @topetony1431 10 місяців тому +1

    Hi, thanks so much for the video. I have a question though, since hydra as shown in your previous video is used for brute force attack, why didn't we get to use it against this ssh_login. I tried it on my own but it didn't work (hydra -L Users.txt -P Passwords.txt 10.0.200.5 ssh_login). Can you please tell me the right command to use and other steps to follow. Thanks

  • @IramanMachage-zf5yg
    @IramanMachage-zf5yg 11 місяців тому +2

    Hi Mr, I get this error [-]Msf:: OptionvalidateError The following options failed to validate: user_file, pass_file. Please help me to solve this

    • @wiz9203
      @wiz9203 11 місяців тому +3

      1.Open a terminal and locate the file
      2.type 'pwd' and copy the path
      3.Now set the path for user_file like this /home/kali/user.txt
      4.Same for the password file too
      There you go!!!!
      😉

  • @aryanverma4232
    @aryanverma4232 Рік тому +2

    can you pls teach ddos after this im really interested

    • @InfoSecPat
      @InfoSecPat  Рік тому +2

      I will definitely put that on my list to do. But I want to finish everything that I’ve been working on first and I can definitely take your recommendation.

  • @aryanverma4232
    @aryanverma4232 Рік тому +1

    can you please tell me what are these attacks are for?

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      This video is on exploding the service SSH port 21

  • @ChapalPuteh_
    @ChapalPuteh_ Рік тому

    As long the wordlist have time enough to againts the server timeout setup …

  • @PCs454
    @PCs454 Рік тому +1

    the teacher gave a red hat linux machine and we need to exploit it. only ports 22, 111, 3306 and 32768 are open they didnt give username or password
    im so confused pls someone help 😭

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      You have to find the username and password. That’s the point of the exercise.

    • @PCs454
      @PCs454 Рік тому

      @@InfoSecPat i guess so
      i saw the project sheet it just says we need to *find vulnerabilities, exploit all what we find, and then write a pen test report*
      ports 80 and 443 are out of scope.
      i ran nessus scan and got 31 vulnerabilities, but most of them are SSL so port 80 or 443?
      the rest are mostly SSH but im stuck on *what exaxtly to exploit*

  • @Chris-Weaver
    @Chris-Weaver 7 місяців тому

    I expected to see Trinity's (from Matrix 2 movie) method! 😔👩🏻‍💻🔌⛔💡
    Pat, please take the above as a… proposal, for an upcoming video! 😅🎬

  • @sannidhyatyagi7806
    @sannidhyatyagi7806 Рік тому +3

    👍

  • @ghassenbarkache1676
    @ghassenbarkache1676 Рік тому +1

    hey and thanks for the video
    I have a question ;what is the difference between auxiliary/scanner/ssh/ssh_login and auxiliary/scanner/ssh/ssh_login _pubkey ? and when to use each one of them ?
    what to do if I have already the username (cve-2018-15473) but the ssh service does not support the password authentication, knowing that I got the pubkey of the target by runnig nmap scan ?

  • @Baba_Mohammed
    @Baba_Mohammed Рік тому +2

    first view first view 👍