How A Server Can Easily Be Hacked (Metasploit)

Поділитися
Вставка
  • Опубліковано 24 гру 2024

КОМЕНТАРІ • 95

  • @JAUS-hq3ti
    @JAUS-hq3ti 8 місяців тому +4

    i have watched all tutorial but this is out standing man well done

  • @g-man21
    @g-man21 11 місяців тому +8

    Awesome video. Really well explained. 😁

    • @infosecmastery
      @infosecmastery  11 місяців тому +1

      thank you very much I appreciate the support.

  • @CyberFlow10
    @CyberFlow10 Місяць тому

    Amazing video man! Keep it up.

  • @franckoops
    @franckoops 2 дні тому

    This video is great, I'll keep following your content!

  • @dhevasrishan3967
    @dhevasrishan3967 7 днів тому

    Okay, after multiple video now only i understand the power of Metasploit..Thank you!

  • @PROALPHA18
    @PROALPHA18 10 місяців тому +2

    bro your content grabs all the attention! Amazing

  • @TrendingShorts0009
    @TrendingShorts0009 11 місяців тому +20

    But my exploit getting failed sir

    • @infosecmastery
      @infosecmastery  11 місяців тому +5

      Hey, thanks for the comment, send me a message on discord and I'll try to help you out, here is my discord usename ilyes#0053

    • @TrendingShorts0009
      @TrendingShorts0009 11 місяців тому

      @@infosecmastery sir is ilyes0035_35299 your user name
      And error is Exploit failed:EOFError

    • @infosecmastery
      @infosecmastery  11 місяців тому +2

      here is my username i just updated it : ilyes_infosecmastery.
      you can send me screenshots and explain in detail

    • @verolyn8459
      @verolyn8459 10 місяців тому +1

      Choose another target. Or try look deeper.

    • @LocalAuthorityy
      @LocalAuthorityy 10 місяців тому

      @@infosecmasteryI added you @sultan. I have some questions on metasploit to ask

  • @gviswanath500
    @gviswanath500 10 днів тому

    Hi sir ,ur video is good .After metasploit / run command , showing error : timedout error or remote host closed.Is it comes like that sir or is any issue

  • @moorurr
    @moorurr 10 місяців тому +9

    I stumbled upon your channel recently, I'm into cybersecurity for about a week now, and no channel had explanations as good as yours does, sometimes I don't understand things for the first time, but if I rewatch it a couple times, I understand everything so well. Please, continue with your tutorials, they are amazing, and I would love to learn more from you. Only complaint I have is that you don't have more tutorials yet, but I get that it takes time, good luck in life!

  • @rackoccasiondiscount2233
    @rackoccasiondiscount2233 8 місяців тому

    i encountered this error message after i run the exploit command "exploit completed but no session was created", can you help me m thanks

  • @TwitchClipzx
    @TwitchClipzx 10 місяців тому +1

    I have a problem. So if the victim is using windows and i know the ip of that windows machine I can peform scans + exploit vulnerabilities right? but most of the exploits that i use dont end up creating a meterpreter session. Why is this ? Lets say there is an RCP vulnerability on the windows machine most of the exploits for RCP dont create a session

    • @infosecmastery
      @infosecmastery  10 місяців тому +1

      It can be anything from connectivity issues with the machine, firewall blocking you, windows defender reacting, or even that the vulnerability is patched. I can't tell you exactly what it is because i don't know your exact situation, but I would start from there if I were you.

  • @DroneDistrict
    @DroneDistrict 8 місяців тому

    So will this work when I use a ip I got when I did nmap (website) and the ip comes up?

  • @kutlusirin5856
    @kutlusirin5856 10 місяців тому

    Hey this video is very good . However ı have a question which program you use . ı couldnt understand

  • @lcd__brave5129
    @lcd__brave5129 7 місяців тому

    Hi so I can’t find port 21 since I’m trying to exploit my brothers pc I can only find port 80 and 135 how can I get through with this please

  • @HakeemWilleman
    @HakeemWilleman 10 місяців тому +1

    You explained very nice🎉

  • @abgh8da173
    @abgh8da173 4 місяці тому

    i have a problem here help please Exploit completed, but no session was created.

    • @infosecmastery
      @infosecmastery  2 місяці тому

      It can be a variety of reasons : target is not vulnerable, wrong configurations (lhost lport), firewall blocking your traffic, meterpreter session crashes...

  • @johnjoe-u2e
    @johnjoe-u2e 10 місяців тому

    sir please help me when i bind payload with original apk it's came error said unable to rebuild apk with apktool i also installed new version of apktool but still happening with me please help

    • @infosecmastery
      @infosecmastery  10 місяців тому

      you can show me the issue on discord

  • @HakeemWilleman
    @HakeemWilleman 10 місяців тому +1

    Can you do more real life examples?

  • @DevNsahu-w7y
    @DevNsahu-w7y 8 місяців тому

    It's necessary to use vpn while bug hunting ?

  • @CYBER3233
    @CYBER3233 9 місяців тому

    Infosec Mastery - Ethical Hacking for Beginers
    can you tell me how to enter the metasploitable quickly

  • @rap1z
    @rap1z 10 місяців тому +2

    Amazing video quality + 10/10 explaining, i love it when things are explained in a way thats easy to get, i was very afraid of learning msf for so long before this lol

    • @infosecmastery
      @infosecmastery  10 місяців тому +1

      GOATed comment haha, glad I helped you out

  • @Pyraminxed
    @Pyraminxed 10 місяців тому

    i have a question for you. if its so simple doing this, why don't hackers actually take down websites like youtube, instagram, facebook, etc? now if the problem is being caught doing it, why not use stuff like TOR or proxychains?

    • @infosecmastery
      @infosecmastery  10 місяців тому +6

      Great question. And I have many answers.
      Malicious hackers actively try to hack Facebook/Google/UA-cam every minute, but those companies have a cybersecurity budget that surpasses some countries GDPs, so trying to find vulnerabilities of those websites, is almost impossible. In fact, it's so hard that they have bug bounty programs (as in : if you can find anything on our application, we'll pay you thousands of dollars). So it's not really a question of privacy, but it's that those companies are too good when it comes to securing themselves.
      Side note: That's actually my job in real life, I am a pentester, my clients pay me to find vulnerabilities in their applications, so they can patch them, so bad hackers don't take down the apps.

    • @Pyraminxed
      @Pyraminxed 10 місяців тому

      @@infosecmastery oohh. thanks for the info :))
      edit: one more question tho. is it possible to ddos them?

    • @toji_fushiguro08
      @toji_fushiguro08 10 місяців тому

      ddos is not possible on bigger websites cause there firewall will just block u because to many request at a time @@Pyraminxed

    • @infosecmastery
      @infosecmastery  10 місяців тому

      @@Pyraminxed technically it's possible, but extremely hard since, again, they have best servers that can handle any amount of load, so if by trying to ddos, we are trying to overload the server, the server is surely able to handle it. There are some ddos attacks that happened in the past ( Using DNS was the most powerful attack), but nothing too frightening happened since.

    • @Pyraminxed
      @Pyraminxed 10 місяців тому

      @@infosecmastery alsooooo, is having kali linux as your os illegal or somethin? will it cause problems?

  • @தமிழன்டா-ப3ங
    @தமிழன்டா-ப3ங 10 місяців тому

    I face error when i try to update My metasploit framework
    Os - parrot

  • @warmachine3197
    @warmachine3197 7 місяців тому

    Can I use domain instead of ip ?

    • @ppgdude
      @ppgdude 5 місяців тому

      Yeah

  • @TekcrisOTV
    @TekcrisOTV 9 місяців тому

    This video made me awsoeme sauce
    Really well explained and simple

  • @AnonymousAndroid-2000
    @AnonymousAndroid-2000 10 місяців тому +1

    Hi Mr. Hacker can you tell me how you make this website and how you upload it 😮😅

    • @infosecmastery
      @infosecmastery  10 місяців тому

      It's vulnerable machine called "metasploitable 2", you can easily run it on any machine using docker. I will make a tutorial on how to create a hacking environment soon

  • @isaacsong-so5um
    @isaacsong-so5um 10 місяців тому +1

    you are so underrated awesome video :)

  • @Bubbasaure92
    @Bubbasaure92 5 місяців тому

    I really love your videos everything you did got me really engaged thank you!

  • @andresavila7858
    @andresavila7858 10 місяців тому

    amazing video!! good work and great material

  • @echoframechannel
    @echoframechannel 10 місяців тому

    Can you teach me how login to global server ?

    • @infosecmastery
      @infosecmastery  10 місяців тому

      please clarify to me what is a global server

  • @CallMeSir06
    @CallMeSir06 10 місяців тому

    Woah great and easy explanation
    New sub 🙃

  • @mandin3141
    @mandin3141 23 дні тому

    if i wouldve had something like this when starting cybersec... damn it wouldve been so much easier

  • @thansyprimezax
    @thansyprimezax 10 місяців тому

    keep going brother🥰

  • @rahulnandy3277
    @rahulnandy3277 8 місяців тому

    Wonderful video sir. Thank you so much

  • @NASIROVZR
    @NASIROVZR 10 місяців тому

    Do you have courses? 😅

    • @infosecmastery
      @infosecmastery  10 місяців тому

      Not yet, but I will surely make a few in the near future.

  • @Jay-ke4us
    @Jay-ke4us 10 місяців тому

    Good stuff 👍 keep uploading like this videos

  • @slashingbison2503
    @slashingbison2503 10 місяців тому

    great video , really helped!

  • @TheRealAnthony_real
    @TheRealAnthony_real 5 місяців тому

    I used to do this back in 2000 and I thought i was chilidish and never though that metasploit it will ever be a thing 😂

    • @infosecmastery
      @infosecmastery  3 місяці тому +1

      believe it or not, actual pentesters/auditors use it xD

  • @simeon871
    @simeon871 7 місяців тому

    nice work dude

  • @zenkycs735
    @zenkycs735 8 місяців тому

    Bro you said it’s easy but it’s not I’m new in this stuff what I can is make a undetectable reverse shell not more but I learn more to obfuscate payloads and stuff like that for me it’s so hard to make stuff undetectable I’m struggling so hard but I don’t give up every day I try to learn new stuff….. can you make a good video where you explain what are the fundamentals to make a payload fud that’s would be nice because I want to learn Cyber Security real to get a job in the future but with a detected Payload I can do nothing and demonstrate how real hackers hack system and comprise systems or networks ✌🏼

    • @zenkycs735
      @zenkycs735 8 місяців тому

      Also I learn c++ and python

  • @sujaymerawade1725
    @sujaymerawade1725 10 місяців тому

    amazing learnt so much

  • @tokakegd1198
    @tokakegd1198 Місяць тому

    step 5 : CHOAS

  • @janekmachnicki2593
    @janekmachnicki2593 10 місяців тому

    Great tutorial thanks

  • @hassan25308
    @hassan25308 Місяць тому

    I WILL DESTORY MY OFFICE SERVERS

  • @LocalAuthorityy
    @LocalAuthorityy 10 місяців тому

    Nice tutorial

    • @infosecmastery
      @infosecmastery  10 місяців тому +1

      Thank you very much I appreciate the support ♥

  • @AimaanKhan-tj3uu
    @AimaanKhan-tj3uu 6 місяців тому

    *W H O O P S*

  • @Andrzejkl94
    @Andrzejkl94 10 місяців тому

    IS that AI Voice?
    sounds really good

    • @infosecmastery
      @infosecmastery  10 місяців тому +1

      Yep, worth the 22$/month on eleven labs lol

    • @Jafrisahab101
      @Jafrisahab101 10 місяців тому

      Sounds great 😂

  • @leonmarienga3293
    @leonmarienga3293 2 місяці тому

    Thank you