top of page

Disclaimer

The below videos are for educational purposes only. Hacking devices / networks without the consent of their owners is illegal and can land you in serious trouble. I will not be responsible for any mishap.

What is Ethical Hacking | Installation of Kali Linux and Metasploitable

This video is the first in a series of videos on Ethical Hacking. In this we go over the installation of Kali Linux and Metasploitable as virtual machines using the Oracle VM Virtualbox.

Linux basics | Basic commands

This video is second in the series of hacking videos. In this video we look at some of the basic linux commands and get familiar with the command line.

Looking for open ports using self-made python script and Nmap

In this video we discuss about ip addresses, sockets, how we can build a python script to look for open ports, and learning to use the Nmap tool to scan for open ports and outdated services.

Hacking metasploitable using publicly available exploits

In this video we hack the metasploitable machine using publicly available exploits from the web and obtain root user on the target system.

Commands to improve the reverse terminal :

1) Use pty , example for python -

python -c 'import pty;pty.spawn("/bin/bash")'

2) After that :- CTRL + Z to background the shell, then the following commands -

stty raw -echo; fg; reset; export TERM=xterm

Basics of Networking and Wireshark tutorial

In this video we learn how we can capture data on the network (including credentials from protocols such as telnet, http, ftp, etc.) through the tool Wireshark, and I also (try) to explain basic networking theory.

bottom of page