How to Attack Open Ports for SSH, Telnet, HTTPs – Practical Pentesting
In this video, Alexis @HackerSploit and I share thoughts on how to attack common ports like 22, 23, 80, 8080 for penetration testing.
Full video:
Cybertalk Podcast (Spotify):
Cybertalk Podcast (Apple):
Alexis (HackerSploit) channel:
10 Points for PentesterLab PRO:
Ask your questions:
Python Basics course (coupon applied):
Join my SQUAD for free (for more discounts):
Learn hands-on pentesting (free trial):
Hacker Wearables:
Join me and other cyber-geeks in our Discord community (free):
My laptop for pentesting video:
Hire me as a penetration tester:
101 Pentesting Training:
101 Cybersecurity Consulting:
Paperspace credit:
DigitalOcean credit:
Connect with me:
Help me continue creating videos:
Linkedin:
Twitter:
Facebook page:
Facebook group:
Hackthebox:
Tryhackme:
Peerlyst:
Discord:
Books I recommend for Penetration Testing and Ethical Hacking:
1. TJ O’Connor – Violent Python:
2. Dafydd Stuttard – Web App Hacker’ s Handbook (2nd Ed):
3. Peter Yaworski – Web Hacking 101:
4. Jon Erickson – Hacking: The Art of Exploitation (2nd Ed):
5. Peter Kim – The Hacker Playbook 3 (2018):
My free Developing Ethical Hacking Tools with Python course on Cybrary:
It helps me tremendously if you support these educational videos:
If you’re a Youtuber, how can you survive without TubeBuddy?:
__________
Whatever type of tests you’re doing, only perform them in safe and legal environments and with the appropriate permissions.
Recon in Cybersecurity course: https://bit.ly/cybersecrecon
Python for Pentesters course: http://bit.ly/2I0sRkm
Python Basics course: http://bit.ly/37cmhlx
Hands-On Training with PentesterLab PRO: http://bit.ly/awesomepentester
For coaching in pentesting and bug bounty: https://dgtsec.com/cybersec-pentesting-training/
damn hackersploit is handsome
i there, how to know from which port we got attacked or virus?? For example we have one pc and we got virus on it, how we can to know from which port exactly virus came or attacked. Thnx
This is the first time I saw the face of HackerSploit.
port 1688? KMS hosts
Can you make some hack the box tutorials
So this is what HackerSploit looks like.
Shodan host will tell you the weaknesses too.
Brute Force will take forever and your grand kids will be old by the time they crack it.
Ftp you stick that into a browser and can see all their files. Some are password protected. But some are very very revealing. If you want vnc then use shodan and have port:5901 authentication disabled and most will not even have passwords or are behind fire walls. You can literally get into scada systems, ahells, windows desktops and Linux desk tops. It's amazing 2020 and people still don't protect vnc with a fire wall at minimum. Most will even with authent disabled if you have firewall you won't even need any passwords cos you can block all untrusted ips and no one will get in.
Nmap -sS -T4 -v (target) is a good detailed aggressive scan
I’m following u for a while you both you’re amazing 😉
Please please please, make something on shodan
Thanks @cristi
Thanks @HackerSploit
Yes please make a video going into detail about Shodan!
Amazing video, please do a video about shodan in bugbounties
shodan is a very useful resource specially if you combine it with your own scripts and put some filters on it. You make your work more efficient
i am waiting for this video thanks Cristi Vlad and HackerSploit
Thank u so much Cristi.. Looking up for more content like this
hello cristi please can you help me with a problem that exceeds me for 5 days ??
👍🔥