Metasploit Tutorial for Beginners

preview_player
Показать описание
// Membership //

// Courses //

// Books //

// Social Links //

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Рекомендации по теме
Комментарии
Автор

Just like always a valuable beginner friendly content for all CS students.

hrushikeshdinkar
Автор

Thank you so much! Been diving more into pen testing and hard to find straight forward, clear understanding on how to use the tools. Love the quick break down with the tools in Kali. Will be watching more from you!

shintojoe
Автор

Right up there with The Cyber Mentor, Zaid, and David Bombal. Great teaching style! Keep the content coming.

root
Автор

Thank you for making me understand what I did not understand well e.g set RHOSTS and set payload that part if you don't know anything on Metasploit its really hard to understand it when you want to use the different attack on the machine but your teaching makes one understand conveniently well, thank you and keep it up, Mr. Loi Liang Yang. I also shared your channel with other communities hopes soon you will have one million subs. Cheers..!

josekiki
Автор

Your a legend dud I've been watching your videos for a long time. You've really dedicated on helping others as well .. your the best great spirit :) you taught me a lot also I learned many things by looking up and tinkering around my house :D

nothing
Автор

I have been learning ethical hacking and penetration testing for about a year now, this was the easiest method I have ever come across. Thank you! IMMEDIATELY SUBSCRIBING for even more content. Thank you!

frooogle
Автор

Waiting for part 2...continue the series of ethical hacking❤️

navi
Автор

sir i am always watching your channel and i want to became like you all are useful helping video

BOXOFFUN-K
Автор

Great video, but where did the cmd/unix/interact come from, only asking because the box I'm attempting is proftpd so I'm alittle lost at that part

jadenshay
Автор

You just gained 15 more subscribers from my side.

kermitdaphrogge
Автор

Bro I love your content I try to understand what is the metasploit and how to use exploit but only you explain too good

ΣτεφανοςΚαζακκος
Автор

I just discovered your channel a few days ago and I can't stop watching. Great content!

jordanjohnson
Автор

Thank you sir for giving us such a valuable description of Kali Linux system 👍👍😊😊😊

subhankarchakraborty
Автор

Genius, love your work. Gonna use your materiel more. Thank you.

PeIeus
Автор

Video starts at 6:30 Youre welcome <3

quicksolution
Автор

Awesome quick tutorial obviously in real world we should scan and find the IP's and it's not that straightforward, but it would be useful to tell what the target should do to avoid this unauthorized access... Is this enough for pen testing where clients give us as a task or should we go further and implement malwares and other scripts once we're in to prove how awful their security measures are?

GoktugErol-oc
Автор

Oh a very simple and easy way, I have understood a lots of points am so grateful 🙏

babashehumodu
Автор

Couldn't find video where you asked WHO'S our favorite hacker,

1) Hacker Loi
2) Kody Kinsey
3) HackerSploit
4) Katie Paxton-Fear
5) Network Chuck

sirgesound
Автор

Hey Loi, your videos are really nice but I am having trouble getting into ethical hacking. Most things that you show require the user of the windows machine to be stupid i.e. weak passwords, no firewall, no AV, no setup of windows policies/settings etc. How likely is it to get access to a Windows 10 machine that is up-to-date and is using a proper firewall?

benteta
Автор

Very nice content.. Thank you so much..I like the way you explain in simple way.

mr.sameers.tathare