jckss121 asked:

This is a tutorial on how to use nmap, nessus, and metasploit to launch and attack on a vulnerable system. For questions or more info goto www.crazysmarts.com and ask.

Advertisement
Tagged with →  
Share →

25 Responses to Hacking using nmap nessus and metasploit (part 2 of 2)

  1. silverthunderable says:

    @hakttowr may be there are no vulnerabilities in that port

  2. WonderNoobie says:

    i dont get it did you just hack some random guy
    this looked like chinese to me

  3. dgltema says:

    how would i copy a file or a folder when im already in the remote host , into my machine? can smbd show me the commands? thnx…

  4. Moy2005 says:

    THIS VIDEO KICKED ASS! THANK YOU SO MUCH MAN!

  5. GARiMPAS says:

    you’re a genious! =) very good

  6. lolapimm says:

    NICE!!! Subscribed!

  7. hakttowr says:

    this is my first victim ^_^ what i can do i have probelm
    msf exploit(ms08_067_netapi) > set rhost 109.82.167.221
    rhost => 109.82.167.221
    msf exploit(ms08_067_netapi) > exploit
    [*] Started bind handler
    [*] Automatically detecting the target…
    [*] Fingerprint: Windows XP Service Pack 2+ – lang:English
    [-] Could not determine the exact service pack
    [*] Auto-targeting failed, use ‘show targets’ to manually select one
    [*] Exploit completed, but no session was created.

  8. hakttowr says:

    all thing be good with me but i have problem when i type set rhost and the ip
    after i press enter all thing be good but i see that
    “Exploit completed, but no session was created”
    what is probelm in that?

  9. hakttowr says:

    coool that is good tutorial

  10. ptantiku says:

    good job.

  11. jckss121 says:

    @KevinBurnsDj Thank you very much. I’m trying to find more time to built my own website again with a forum / blog, and post more youtube videos. I have lots of things I would like to share, just not enough time to post them all 😛

  12. KevinBurnsDj says:

    beautiful.. we need more content on youtube like yours

  13. jckss121 says:

    @Sc0ttTay The computer needs to be on and connected to the internet, the user does not need to be logged in, but I sure hope you have a password to logon…

  14. Sc0ttTay says:

    @jckss121 ok thanks. does their machine need to be running to do this? like does somebody need to be using the machine?

  15. jckss121 says:

    @Sc0ttTay yes it can be done for sure. I personally would look into metasploit and the VNCinject payload. I do caution you though because you are more likely to be noticed when their mouse starts moving vs running commands in the background.

  16. Sc0ttTay says:

    Great vid! got a question though:
    ok so im new to metaspliot and such but I have heard there is a way to actually pull the remote host’s screen up on your machine and use it as if you were at that machine. Is this possible or are people just bullshitting me?

  17. jeroeniskoning says:

    Ty for sharing

  18. playfsx says:

    nice and simple , make more !! 🙂

  19. SidandCoke says:

    thanks again

  20. r4tdance says:

    Fail. i’m on OpenBSD w/ BlackBox, using BASH(Bourne Again Shell).

  21. xXclaymatorXx says:

    >implying you can do any better
    enjoy your cmd

  22. jckss121 says:

    I agree with you r4tdance. Anyone can become a script kiddie, but you have gotta dig into some code and CLI to take it to the next level.

  23. r4tdance says:

    Skiddies Dream. Go get a clue, skidiots, stop hiding your precious cluebie GUI’s and playing with code you have zero idea about. You FAIL by default.

  24. HolyJ187 says:

    @Hax0rPr0n

    His comment was not an example oxymoron at all. An oxymoron is “is a figure of speech that combines normally contradictory terms”, for example “Cold Fire” or “Microsoft Works”. It is however sligtly hypocritical and possibly an example of juxtaposition. Using big words doesn’t make you look smart unless you use them correctly.

  25. casilammer says:

    jckss121 si la pc remota usa firewall es posible explotar igual el exploit?

Leave a Reply

Your email address will not be published. Required fields are marked *

* Copy This Password *

* Type Or Paste Password Here *

Looking for something?

Use the form below to search the site:


Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.