i got hacked and my acounts number and trusted device is change how can i change the number sim of my account even not log in so i can use my number to reset my password
I need some help understand something. I have a cheap yard phone... I use this phone separate from my work phone to keep from losing or destroying it.. Work phone is iOS yard phone is a cheap android. I noticed my calls were being forwarded so I bought a new cheap phone to replace it. I have never text or called or emailed any info from one phone to the other but Now this new phone is being forwarded. The only thing I can think of that could make this happen is the nearby share feature that is automatically turned on when you power the phone on.?? Anyone know about this? Or where I can get more info?
I have a question thats a little off topic, but I have a Samsung phone and I got an email from a hacker but I stupidly clicked on the suspicious pdf and screenshot. But I searched high and low in my files and it appears that I didn't download it, and It's not saved anywhere. I've heard of this thing called the sandbox where I can view potentially harmful files without it harming my device and I had that enabled. Does this mean I'm ok? Just making sure cuz I am not an expert with this kind of stuff and I'll definitely refrain from even opening on any suspicious emails from now on.
I'm sticking with you Loi You are FIERCE . MUCH LOVE . I can only Dream of being on your level . If I hit the Lottery I would pay you for private lessons 👍 But for now I watch all your videos and I'm learning how to code with python . My Love and passion for skateboarding was taken away all those years of blood sweat and tears gone . I'm determined to be a top notch Ethical Hacker .🎉❤
So wait hang on, you just said to the audience the metasploit method is noisy, then you suggested evil-winrm method but you assumed the attackers have the credentials from the first method and that the target runs the executable... this cant work in 99% scenarios when it's a specific target.
Sir can u teach how to hack internet in smartphone? Our state always ban internet in crisis, we can call but can't use internet. Plz help. Now I'm using hatunnel app but slow speed.
yes like you will give your target a malicious file in an unknown IP and he will download it and allow himself to get hacked and thats how we will gain access lmao
nice tutorial bro, but only 20% of people use passwords like 12345678 or password and etc. how can i generate password with user name or user phone number, i mean most people use password like john3200 like this
I needed a high level of trust and I also need to be on the same page when it comes to values and getting back my account. Clancyhacks is hard working, organized and committed to his work. CLANCYHACKS is someone who cares deeply about a lost account and w
what about this message We Cannot Review the Decision to Disable Your Account Your Facebook account was permanently disabled because it did not follow our Community Standards. We cant review this decision. since i reported multiple times and to multip
I'm able to undertand everything but i can't undertand how to get the hash code please if anyone know show me i need that for real or if you know anyone that can help me even with a video
thanks for this if you don't mind i have file of winrar it's lock i need to know the passwords please am mining engineer student i need the app which is inside this file
true story my steam account get hacked before 2-3 days , im glad steam support give my account back + i have no idea how that coward know my account name + password , bec on steam ur nickname not ur steam account name
hello loi, i have a particular problem with my online works. i found out that my phone is hacked and there is an online tracking app attached to every work i do online. this have retarded most of my works. because they use theses apps to manipulate what i do. my online courses,webiners, businesses and others. i thereby installed some anti hacking apps on my phone, it identify some unknown malicious apps like the 'dark'. my questions or request from you is that how much probability can these people be tracked?
Liang, I want you to show me how to code a pen drive to copy passwords from browsers when inserted. And the same pendrive should be able to copy the Windows passwords or remove the Windows password. Am Paulsavz from Ghana
Sorry wtf you can just pate the hash instead of the password itself? That sounds like an incredibly stupid thing to be able to do. Seriously why use Ophcrack and rainbow tables to crack a password when all you need do is input the hash instead?
Now I understand the reason why people keep recommending Clancyhacks because hes a good man and legit when it comes to retrieved of account. His attention to detail and drive to produce top-quality results has proven extremely valuable to in the process
Guys I'm paying a 1,000usdt to help me recover my password, I have a password and the username but I forgot my secret code of another page inside of the site
What to do when every device has been hacked for 3 years and the sh't is old. These people took enough including my sanity temporarily- I've given up fighting, even in courts- just wondering... I see you & what you do- but them- what makes a person so obsessed with another's life they're 24/7 committed? Let em watch me live my life 🙋🏼♀️
another incredible video Loi. an entire computer course in a nutshell......
For all who can acces deepweb/darkweb, can you find information about police tool planted inside ear?? (Sory for bad english)
Bro said
'Kids don't hack'
And proceeds to say
'Hackers don't get hacked'
If you talking about video games, those aren't hacks. Just an website installed cheats or mods.
For all who can acces deepweb/darkweb, can you find information about police tool planted inside ear?? (Sory for bad english)
Thanks man your videos are always easy to understand 😊
For all who can acces deepweb/darkweb, can you find information about police tool planted inside ear?? (Sory for bad english)
Shut up bot@@uploadaja.
Sir make one playlist on termux....
Bro your marketing is unmatched truly great
How to enter in to cyber security field which one i first learn any suggestions??
"The best hackers don't get caught"
~Loi
For all who can acces deepweb/darkweb, can you find information about police tool planted inside ear?? (Sory for bad english)
@@uploadaja. ok (sorry for bad english)
i got hacked and my acounts number and trusted device is change how can i change the number sim of my account even not log in so i can use my number to reset my password
I need some help understand something. I have a cheap yard phone... I use this phone separate from my work phone to keep from losing or destroying it.. Work phone is iOS yard phone is a cheap android. I noticed my calls were being forwarded so I bought a new cheap phone to replace it. I have never text or called or emailed any info from one phone to the other but Now this new phone is being forwarded. The only thing I can think of that could make this happen is the nearby share feature that is automatically turned on when you power the phone on.??
Anyone know about this? Or where I can get more info?
Thank you for the good explanation, it was very easy to understand the concept, showing firstly the metasploit tool and then the windows attack!
I have a question thats a little off topic, but I have a Samsung phone and I got an email from a hacker but I stupidly clicked on the suspicious pdf and screenshot. But I searched high and low in my files and it appears that I didn't download it, and It's not saved anywhere. I've heard of this thing called the sandbox where I can view potentially harmful files without it harming my device and I had that enabled. Does this mean I'm ok? Just making sure cuz I am not an expert with this kind of stuff and I'll definitely refrain from even opening on any suspicious emails from now on.
I'm sticking with you Loi
You are FIERCE .
MUCH LOVE .
I can only Dream of being on your level .
If I hit the Lottery I would pay you for private lessons 👍
But for now I watch all your videos and I'm learning how to code with python .
My Love and passion for skateboarding was taken away all those years of blood sweat and tears gone .
I'm determined to be a top notch Ethical Hacker .🎉❤
EC COUNCIL start with pen test, then take the CEH then the CEH master
Can I decrypt a RAR zip with just the hash? I'm not at all knowledgeable on this area. I just want to do it because someone said I can't
Clancyhacks never sleeps on opportunities to show how experienced he is at these sort of cases, that I can vouch for cause hes great at it.
Loi, fantastic tutorial as always!
okay, if i only have the victim hash password and no other software was installed on the victim side, can i still gain access in this same way?
Thanks Loi. I have always wondered how that was done.
How to check if our phone has been hacked? How to erase or delete? Can it be deleted or restore if we did factory reset?
Could you tell me please?
Can you please help me to get my Google account back I tried everything but nothing works
Test me up-☝️-for help_
Sir, how to fix this error in Kali Linux " no such file or directory "
* When I am trying to inter any file it's showing me this error . Please help
mr loi why when i switched from the nat mode the the bridget mode the connection is failed in my kali ????
Lol 😂
Wtf you are actife in youtube since 17 years 😮😮😮@@eval_is_evil
Would you make the link for the ONE CLICK RUNNING overheating of CPU and track the phone number where is from? THANKS!
Please someone teach me how to grab IP address without grabify or without the target needed to go on a ip login page
make a phishing link
@@МатејаТрнинић how to?
U on discord?
Sir could I pay you for a service? Hacking a phone?
Very interesting How do i learn all this and practically do it on my own.
Test me up-☝️-for help_
ics degree, it degree, it/hd experience (multiple years of study otherwise your success will be based on luck)
@@eval_is_evil dont need a degree lmao thats a waste of years
So wait hang on, you just said to the audience the metasploit method is noisy, then you suggested evil-winrm method but you assumed the attackers have the credentials from the first method and that the target runs the executable... this cant work in 99% scenarios when it's a specific target.
What if you don't have the hash value and have an IP only?
Bro.why can't i do hacking following yours rules in termux tutorial.please let me know if you spare time.
I do not have a background in cybersecurity. What skills do I need to acquire in order to be able to study a master's degree in cybersecurity?
Hey Loi, can you make video about bluetooth device hacking.
Instead of Kali Linux, can we use windows , which application or software will be helpful?
Are your videos up to date in your hacking courses because it says it was made years ago ??
It is still accurate. MS has developed some AI detection systems for PtH, but this can still work. This was made 1 year ago.
You get over high level knowledge in technology. I appreciate your support. TANK YOU.
Hello am UG can you help me with DTB universal unscramble channels firmware thanks
Sir please can you make a tutorial on how to modify or inject a web application database on real world
Sir can u teach how to hack internet in smartphone? Our state always ban internet in crisis, we can call but can't use internet. Plz help. Now I'm using hatunnel app but slow speed.
yes like you will give your target a malicious file in an unknown IP and he will download it and allow himself to get hacked
and thats how we will gain access lmao
Yeah I dont buy it.
what is his service where his programming
This exploit is patched, right? Your windows10 system must me outdated in order to exploit that.
Test me up-☝️-for help_?.
web vulnerablity tool Loi please...
this channel has probably helped me /w ethical hacking more then a paid course i did on cyber security
nice tutorial bro, but only 20% of people use passwords like 12345678 or password and etc.
how can i generate password with user name or user phone number, i mean most people use password like john3200 like this
Bro please can you please help me reset my account I forgot my password please 😢
Test me up-☝️-for help_?
i can't open port 5985, can you help me?
THIS IS LITERALLY INSANE >>> I really love such content >>> good one loi
How do you find the hash?
First to comment
Is like have been waiting for you😁
Guys like CLANCYHACKS shouldnt be slept on; that guy is a tech genius and legend on top of his game.
sqlmap WAF bypass, make that video
U cant bypass with a tutorial 😂
I needed a high level of trust and I also need to be on the same page when it comes to values and getting back my account. Clancyhacks is hard working, organized and committed to his work. CLANCYHACKS is someone who cares deeply about a lost account and w
You can explain his gap ss7 ?
where did you get that 5985 ip
Can you wipe google entire data on planet...
This video is unavailable... Why.???
what about this message We Cannot Review the Decision to Disable Your Account Your Facebook account was permanently disabled because it did not follow our Community Standards. We cant review this decision. since i reported multiple times and to multip
Is it possible to do it over the internet. Like miles away and the user download the files and execute them without him knowing?
Did microsoft patch those pass the hash vulnerabilities?
They can't just let us keep passing hashes around
I'm able to undertand everything but i can't undertand how to get the hash code please if anyone know show me i need that for real or if you know anyone that can help me even with a video
What app did he use?
How do you find the hash from an encrypted USB? Thanks!
thanks for this if you don't mind i have file of winrar it's lock i need to know the passwords please am mining engineer student i need the app which is inside this file
good video best hacker i ever seen on RUclips for sure. anyone know a website with free ip address to exploit?
Bro i need you help
Test me up-☝️-for help_?
true story my steam account get hacked before 2-3 days , im glad steam support give my account back + i have no idea how that coward know my account name + password , bec on steam ur nickname not ur steam account name
Liang please I downloaded termux on my new phone but it is not able to install please can you help me
Test me up-☝️-for help_?
Well, this method wouldn't work on websites unless they are written poorly. Still, you are making great content.
Test me up-☝️-for help_?
hello loi, i have a particular problem with my online works. i found out that my phone is hacked and there is an online tracking app attached to every work i do online. this have retarded most of my works. because they use theses apps to manipulate what i do. my online courses,webiners, businesses and others.
i thereby installed some anti hacking apps on my phone, it identify some unknown malicious apps like the 'dark'.
my questions or request from you is that how much probability can these people be tracked?
Liang, I want you to show me how to code a pen drive to copy passwords from browsers when inserted.
And the same pendrive should be able to copy the Windows passwords or remove the Windows password.
Am Paulsavz from Ghana
Sorry wtf you can just pate the hash instead of the password itself? That sounds like an incredibly stupid thing to be able to do. Seriously why use Ophcrack and rainbow tables to crack a password when all you need do is input the hash instead?
1st view ❤❤
I am the first to watch this video isn't it interesting 🤔
Who to access in shadow web
U use dictionary password anyway ... i do not understand the point
your hacking is real
Firsttt 😂❤️
Nothing is safe anymore
please show to to bypass android lockscreen
Man this guy looks like johnwick
Video about server
Now I understand the reason why people keep recommending Clancyhacks because hes a good man and legit when it comes to retrieved of account. His attention to detail and drive to produce top-quality results has proven extremely valuable to in the process
Fantastic - thanks
Fire video bro thanks a lot!
Can someone ethical Plz help me recover my old gmail account.
how do we protect against this then?
Hello
Ur great iam in India iam ur fan
Guys I'm paying a 1,000usdt to help me recover my password, I have a password and the username but I forgot my secret code of another page inside of the site
Test me up-☝️-for help_?
firewall block this type file
Please make a video on how to hack any wifi without hash file
The only option you have for that is phishing and social engineering
Send exploit show thanks.
Мужик я тебя люблю ❤😂
I would also like to know on how to stop these attacks
Loi will hack us if we dont subscribe 😰
Pass the hash!
Hey sir
Sorry but loiliangyang is not a common username 😂
What to do when every device has been hacked for 3 years and the sh't is old. These people took enough including my sanity temporarily- I've given up fighting, even in courts- just wondering... I see you & what you do- but them- what makes a person so obsessed with another's life they're 24/7 committed? Let em watch me live my life 🙋🏼♀️
Can you please create a video on how to create a Linode account, Mr. Hacker Loi?
thanks mentor.
I like you ❤🎉❤