@an0n_ali

📌 A QUICK NOTE:

This video is meant to explain the core concepts of system hacking—not demonstrate real-world attacks. For example, in passive attacks, hackers may not even use Metasploit and instead rely on custom exploits from sources like ExploitDB or GitHub, delivering them through different techniques and tools.

So while obfuscation and exploitation methods evolve over time, the core hacking concepts remain the same—whether hackers use Metasploit, Cobalt Strike, or other frameworks. Hope this helps! 

🚀 RELATED VIDEOS:

🔗 Introduction to Network Protocols: https://youtu.be/lV99N9fyjAk?si=-FPK-1ipZSmxZaKA

🔗 Introduction to Digital Forensics: https://youtu.be/GBgqvZ4LCcA?si=LhrigELwhbps_VcW

@lulztroll4081

People don't understand how hard it is to find videos like these, everything makes sense to me now! The examples with Nmap and Shodan were gold, thank you so much 😊🎉

@SamXploit

when it comes to learning hacking stuffs it's only you whom I trust.

@seeyan9944

I always learn new things from you every video! 👍

I saw someone else asked you a question and so I thought I could do the same as well. So because Shodan can be found publicly, doesn't Shodan makes it a OSINT tool as well, because you can find people IP adress and all that?

@roadtosuccess8119

It would be better, if u upload video regularly ❤

@rex2.041

Great video! but you mentioned encrypting the payload evades antivirus detection.. wouldn’t the antivirus still detect it after it’s decrypted and executed?

@Kwstas2336

Please dont forget to make the video sbout how to use metasploit to access sustems and maybe a dedicated opsec video... Amazing quality video thank you so much for entertaining us

@DarkHell-7

I just started but i face alot lf issue like my copy paste is not working i try everything it was just starting and i feel demotivating💔

@CrusadeVoyager

Good Start, waiting for more content and hack networks ;)

@WcWZzQM

What’s the difference between black hat hackers and white hat hackers ? Their morals ? Or also their tools ?

@DispJ

underrated channel

@bnk28zfp

Love you channel!!! Please create more, going to study metexploit on my own!!

@cryptx0nic

back with another banger 🔥

@alsadekalkhayer7007

Thank you 👍

@KaliLinux-iy8ib

I have a question. I have heard of the field of reverse engineering of programs and discovering vulnerabilities in the program and hacking the device or server on which the program is installed. I solve challenges on sites that offer challenges. What do you mean? I like hacking servers and devices and exploiting web vulnerabilities. What do you think of the field of reverse engineering of programs and discovering vulnerabilities in the program and hacking the device?

@Chess-kt5kq

I learnt basic MITM from null byte and realised I need hardware :( currently I am 17 and have to first make out of the college and then might start with this

@xbeast7585

Great Video

@Mogiwara213

Hope u do more Vids

@billa3223

Yo dude I am beginner currently learing from ceh any tips?
and is there any better course in budget

@vcujss68ddd

Please can you tell me the secondary voice which saying DISCLAIMER