Linux serverNETWORK ADMINISTRATIONSsmtp server liux

How Hackers Access Windows through Samba Exploit. Disable Samba Now! Cybersecurity Tutorial

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

source

by Loi Liang Yang

linux smtp client

13 thoughts on “How Hackers Access Windows through Samba Exploit. Disable Samba Now! Cybersecurity Tutorial

  • Hi. I From You Windows 10 and windows 11 to Computer via 445 port. How do I know with which exploit on Kali linux?. Could you please help me with this. Is there a tutorial video or any exploit you recommend?

  • Is there a way to hide (package) the "exploit" run before payload from virus scanners?

  • hi- i keep getting "connection reset by peer" for all the SMB exploits
    heres what i got for this example, any ideas?

    [*] 192.168.0.157:445 – Connecting to the server…
    [-] 192.168.0.157:445 – Auxiliary failed: Rex::Proto::SMB::Exceptions::LoginError Login Failed: Connection reset by peer

  • Let me ask a question. I've ran into machines that are very secured and can’t find a way in. Do you then write a report saying what is not open and how good the server is secured? Or is it some type of tips I can use to beat the box up to get in?
    This question is only for 1 server not looking to pivot from other workstations. The task is just to pop this one server. they are testing local server build on domain in PCI network. Are people writing exploits for those NetBIOS or SMB shares as the computer communicates to others? But they doing good job with HIPS/firewall so the server has rules for only who is to communicate with it.

  • Sir can i ask you? What you use for dual windows and kali linux ?
    i use vmware station for dual Win and Kali it's very slow
    Thank's sir for the video 🙂

  • Sir Your videos are excellent.Can you make big videos with in-depth explanation.

Comments are closed.