Hak5 — Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
Join Rob @mubix Fuller on this ethical hacking educational series for pentesters and aspiring cyber security professionals.
Metasploit Minute – the break down on breaking in. Join Mubix (aka Rob Fuller) every Monday here on Hak5. Thank you for supporting this ad free programming. Sponsored by Hak5 and the HakShop – http://hakshop.com :: Subscribe and learn more at http://metasploitminute.com :: Follow Rob Fuller at http://room362.com and http://twitter.com/mubix
-~-~~-~~~-~~-~-
Please watch: “Bash Bunny Primer – Hak5 2225”
-~-~~-~~~-~~-~-
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community โ where all hackers belong.
source
I was getting quite good with kali linux but i messed up and it some how started attacking people at random.
how about foxing your errors and show how you did that. that would show more about your skill level
How did you use Doublepulsar with sucess?? Until then I'm ever having problems with it. Can you help me?
that was fun!
The error messages state that the threat was blocked from spawning. You have concurrency set to high for that box because for some reason it was not allowing it to create that many threads.
The developer can change the software to use nonblocking sockets so that threads aren't needed for the blocking connect() call. Then its just a matter of issuing as many nonblocking connect() calls as possible than then testing every socket with select() in batches to see if the ack was returned.
Awesome to see you work through the issues! Very valuable to see.
Thanks
Great video Mubix – thanks!
thanks a lot mubix, your videos are very very helpful!
Thanks for the vids !
messing up doesn't make you look dumb, seeing how quickly and efficiently you go to fix any mistakes says more about your level of intelligence/command of the subject matter than the original process itself.
Great videos. Love seeing others struggle with exploits lol makes me feel better ๐
what language is he using?
more like the msf fuckt up the demo but ย good episode none the less. keep'em comingย
Great series. Keep up the good work! Always learning something new.
Great video, thank you. But have you figured out the issue with postgresql?ย
Darkrising, do you work for NBC? Why don't you stand in front of a camera and see how you do it? Mubik, thank you for sharing your knowledge and taking the time to make this series.
You guys could cut and paste a bit more to make Mubix look infallible. But I like that instead you show everything that goes on in an honest way! ๐ย
Did you eventually discover what was the issue with the udp_probe?ย
You're a cool guy and all but you don't seem very confident when doing this show, its quite off putting to be honest, other than that thanks for sharing your knowledge ๐
Finaly a new episode ๐ thank you for more learing stuff ๐