Simple Penetration Metasploitable 2 (Cybersecurity)
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join
// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/
// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD
// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
by Loi Liang Yang
linux ftp command
Remember to subscribe to the channel so that you can be kept abreast of the latest cybersecurity tutorials.
short video and to the point really appreciated
My shit Spanish neighborhood can't fuck Spanish women with African women. That's why bothering Asian women for a African shit security asshole fucker. White security go after white women
Why do i have the same inet address for both metasploit and kali linux? Help
i have problem when i use metasploit in mysql_login after set rhosts
OGIN FAILED: root: (Unable to Connect: invalid packet: scramble_length(0) != length of scramble(21))
can you help me sir ????
good job
Thank you. Very helpful
Hii Can you tell which virtual machine did you use?
for the kali and metasploitable virtual machine what connection type do they have to be so they can ping to eachother
Can you show more Local and remote exploit using metasploit2?
Hi my name is Robert kunga, iam from Kenya . I do like to hack ethically with my laptop and phone 😁. So I wanted to have more experiences in ethical hacking. But the things that are holding me back, is that I don't have the kind of hardware tool that I see you use to hack other gadgets. So I was asking if you could help me with an ALPHA WiFi adapter. To make me learn more and to get me exposed to the wireless industry
THANK YOU!!! Very much!!!! My friend!
Im only starting with pen testing so sorry in advance for my dumb question xD. Why do I need Metasploitable in a VM when I can start the tool in Kali Linux?
[20] Sebuah senyawa non volatil Z, digunakan untuk membuat dua larutan yang
berbeda. Larutan A mengandung 5 g senyawa Z yang dilarutkan dalam 100 g air.
Sedangkan larutan B mengandung 2,31 g senyawa Z yang dilarutkan dalam 100 g
benzen. Larutan A mempunyai tekanan uap 754,5 mmHg pada titik didih air normal
dan larutan B mempunyai tekanan uap yang sama pada titik didih normal benzen.
Hitunglah massa molar dari senyawa Z pada larutan A dan B!
WoW….its been nearly 6 years and still the best video on metasploitable!!!
Thankyou!
How can i member ?
hello tcp/514 service:- shell? this port service and version is unrecognized despite returning data. is there any way to get the information
thanks for upload
cool
I realy like your youtube chanel and I'm interested of your explenetion keep going mr.loi all the best and god bless you
Si penetracion si -_-
How do I crack that password list in the end ? The tutorial feels incomplete without that step
Thanks sir for making this video.
Thank u soo much it can very helpfull for me
from Pakistan
why is your Kali Linux so fast ?
It's better to use metasploitable2 for learning as a beginner
Sir everytime I face host seems down problem😥😥please help me out
I can't see what's written in terminals.
I can't see what's written in terminals.
excellent presentation – informative
Thank you
Hai postato questo video che non si capisce niente di niente. Quindi sei un principiante
my metasploitable ip is 10.0.2.15 and every port is closed. All of them. Please help
When i run NMAP it just says all ports are closed?….
thx it's useful
Have any way to get victim's public ip to private ip???Or How we get victim's private ip?
Thank you Mr Loi for your tutorial on Metasploitable 2. I find it helpful, good work.
How are you setting up your Nessus Scan?
Nice video!