Your videos are like magic…. I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video. The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane
You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.
what would be the tell tale sign that your PC has been infected because you don't realised that you accidently click an email that look so legitimate? will resetting my PC to factory setting will clean my PC from this infection?
I can imagine young inexperienced teenager pirating "pre-installed" games in zip. Extracting it from context menu to "here" can do its job if our little pirate then opens the "jpg". Even worse it can be packed to self-extracting rar and this "jpg" can be set to start after extraction.
@@goruluk88 stop all proccess and close out of everything, look in task manager and find anything that does not look like it shoudl be there and trace it back to file location and delete :) also look in the win startup dir
I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff
Awesome work, Dale valsko ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!
You can use an RLO character. So first it will be saved as "picturegnp.exe" then you out an right to left override to make it pictureexe.png or change it to an rcs file so it is a little less obvious so "picturercs.png"
I don't know about this since the victim is actively listening on port 4444 to receive connections, so how can firewall block the connection from the port when the client is actively listening on the port?
Metaspyclub is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work !!
There is no doubt that you will rise fast at the apex of your career Perry Moskva . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.
an easy was is to use RAT (remote access tool).although UltraVNC can be used for this there are some better RATs which are hacker base and can perform better like njRAT,DarkComet.
Wow excellent explanation.... Thank you Sir for bringing so much effort and time to make people like us safe and we can feel comfort and breeze when surfing as it is or was supposed to be... And at the same time understand and comply with the issues that are out there so we have the possibility to actually do something with it and be a part of the solution.. Excelllent.. Thank you Sir again, for your hard time and efforts to making us SECURE and Safe....!!! People like him are so important theese days... Its just amasing....You got yourself a Subber indeed....!
Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.
I personally like to see the extensions on the file names, Likely. This wouldn't catch me off guard unless I was flipping through my images. I bet there are better ways of doing this That are coming to light and we need to protect ourselves. I personally do not like Leaving my internet connected. I also do not store important important information like taxes on an online computer. I think there might be a rule that can be made in order to prevent this from ever happening. I'm not sure how you are remotely connecting, but most of my remote services are restricted or off. I'm not sure if there is actually radio frequency on my motherboard, but it is another setting that you have to disable regardless of your motherboard, not having Bluetooth and Wi-Fi. I'm finding it very difficult to find motherboards that are safe from the outside world, especially with the advancements. In hacking. We need to be proactive in scooping up resources and tools that we can use And the future should things go wrong, Like all of the corporations putting computers on record, Taking away all the AI tools after they got what they wanted, And destroying every operating system and old hardware that could be used.
3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?
Good video and interesting subject. Would you be able to tell us how to check for this possible attack aka ‘photo installed’ and how to remove it from your pc or Mac? Thank you,
Short answer is yes - Long answer is that you should also look out for other file extensions that can have executeable programm code, since exe is not the only one
Please can we get a video tutorial on how to remotely control an apple ios iphone, either a RAT or through a terminal, or if you can get us the Pegasus spyware
Wow, this is dangerous stuff you got me scared to even go on my laptop. How? How do I how do I stop somebody from doing that to me? I just don’t click on any pictures.??
trying to do the thing but : getting error like :: 'x64' is not recognized as an internal or external command, operable program or batch file. same for x86.
how can you hide ".exe" of this file when attach to email or send file via Instant message? Does google drive scan this file and found som "like virus posoning code" and alarm?
@@tm02019 encoded and zip is to protect the extension of the exe file that you convert to jpg file. its really make your trojan file as jpg file, but when victim open the file, they fuccked up
It even showed flights and me at airport 8 miles away while I'm home....bizarre. I caught several people who had access (recorded ) parked next to me while using my account n gsa app live communicate with drop box show name of the person in my map later to have the names removed....
My friend got a virus on his pc and I cant go to his house to fix it , and he is not that smart to understand what im telling him, thanks for this tutorial😂❤
Couldn't you take this a step further by adding in the ps script that is executed to also automatically hide file extension and hidden files in the event that the users does have extensions showing? Might throw some red flags if done that way maybe.
Would love to have a ducky payload for this. To be able to plug my rubber ducky into one pc, then have it do all of this, then be able to simply access it through my pc.
so basically, you need to already have access to the target machine to open the ports and point to the hacker machine? so... when does the actual hacking start?
Hi Mr. Yang, I'm have a long time searching a tutorial with the same idea, but focus on android devices infringement remotely, using a infected photo with a payload, and them sending it vía WhatsApp for example, can you make this?
It is a form of hacking… just like putting down a usb for a curious person to pick up and succumb to the curiosity of what’s on the USB…. the point of it is to get access
Its a type of malware delivery, hacker can send you a picture or pdf or a word file or anything by using email as an example pretend to be someone you know may b your company boss by spoofing their original email, once you open that file malware will automatically execute on your pc but you will see the original pdf or pic file. This is a well known technic used by hackers. They can use cross platform malware delivery technique.
You also have to find someone dumb enough to open the attachment. Beyond never opening any attachments that I have not verified by voice with the sender (only someone I have met IRL). Otherwise, if I had to open an attachment I didn't trust I guess I would do it in a virtual machine. I would download and scan it first rather than launch or run it from the browser.
Does this not require a port forward at the target? most people are behind a router. or it dont matter as it's "calling" the attacker, where naturally port 4444 needs to be forwarded?
Good day sir. I need your help with something. How can someone hack a laptop using Kali linux Without coming in contact with the laptop you want to hack? What if you are connected to the same WiFi network?
How come ever remote-control video we have to use the Tarkets machine to download something or run some code is there any way possible to just hack into it?
Your videos are like magic….
I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video.
The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane
sounds like a skid
@@LZnaxyl bruh what? You smell like a skid.
What video broe, share a link am interested
I need the the codes for this
Am I tripping. I thought this was a NetworkChuck video minus the coffee breaks
Network chuck's got a different haircut.
You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.
what would be the tell tale sign that your PC has been infected because you don't realised that you accidently click an email that look so legitimate? will resetting my PC to factory setting will clean my PC from this infection?
I can imagine young inexperienced teenager pirating "pre-installed" games in zip. Extracting it from context menu to "here" can do its job if our little pirate then opens the "jpg".
Even worse it can be packed to self-extracting rar and this "jpg" can be set to start after extraction.
@@goruluk88 stop all proccess and close out of everything, look in task manager and find anything that does not look like it shoudl be there and trace it back to file location and delete :) also look in the win startup dir
zip file and RLO characters to make it end with jpg or png, problem solved
It could be sent as a zip file.
I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff
Awesome work, Dale valsko ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!
Sends a pic to someone ,
They : why this pic is .exe???
only if they know the difference between exe and jpg :D
"It's EXtremely Entertaining"
Change the first binary/hexagonal designation
You can use an RLO character. So first it will be saved as "picturegnp.exe" then you out an right to left override to make it pictureexe.png or change it to an rcs file so it is a little less obvious so "picturercs.png"
That file could be named " annual companyindexe.pdf".its called extension spoof..this is a well known technic,so don't laugh with ur little knowledge.
man, that only works on the local network and certainly the firewall will block or notify the exposing ports
Is that true?
@@nirvaangoel8172 yes
I don't know about this since the victim is actively listening on port 4444 to receive connections, so how can firewall block the connection from the port when the client is actively listening on the port?
Please can you do a course on Linux and windows from the terminal
Metaspyclub is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work !!
There is no doubt that you will rise fast at the apex of your career Perry Moskva . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.
Any video you recommend?
Any vídeos on that?
Bro please any video or way you can explain this more
How can anyone learn when you’re teaching so quick without thorough instructions for people to pick up on?
an easy was is to use RAT (remote access tool).although
UltraVNC can be used for this there are some better RATs which are hacker base and can perform better like njRAT,DarkComet.
Your videos are much better than it was a few year ago where you wouldn't look at the camera , well done for the constant improvement
😅.really u r very smart n intelligence 😅 bcz im following u already 3.5 years done 😅😊
20 years ago I used 007 spyware for fun it's idea was very similar to create a image and deploy
Hey ❤
Could you make a video for beginners where and how to start computer science, programming and other things
so you start the video by threatening me huh?🤣🤣🤣🤣
I literally watch his videos just for the intro😂
Yes
@@LoiLiangYangExactly now do it
@@usr808yeah me too 😂
@@LoiLiangYang The always ask your mother before hacking and the laugh got me
Wow excellent explanation.... Thank you Sir for bringing so much effort and time to make people like us safe and we can feel comfort and breeze when surfing as it is or was supposed to be... And at the same time understand and comply with the issues that are out there so we have the possibility to actually do something with it and be a part of the solution.. Excelllent.. Thank you Sir again, for your hard time and efforts to making us SECURE and Safe....!!!
People like him are so important theese days... Its just amasing....You got yourself a Subber indeed....!
I'm gonna try this on my boss. Thanks Loi😊
the thing is, mail services show extensions by default.
Your video is like a mini-masterclass. So valuable!
if you know tech enough, you know this is for kids only, lol.
Can you make a video of remotely controlling another PC while staying hidden from the task manager?
Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.
I personally like to see the extensions on the file names, Likely. This wouldn't catch me off guard unless I was flipping through my images. I bet there are better ways of doing this That are coming to light and we need to protect ourselves. I personally do not like Leaving my internet connected. I also do not store important important information like taxes on an online computer. I think there might be a rule that can be made in order to prevent this from ever happening. I'm not sure how you are remotely connecting, but most of my remote services are restricted or off. I'm not sure if there is actually radio frequency on my motherboard, but it is another setting that you have to disable regardless of your motherboard, not having Bluetooth and Wi-Fi. I'm finding it very difficult to find motherboards that are safe from the outside world, especially with the advancements. In hacking. We need to be proactive in scooping up resources and tools that we can use And the future should things go wrong, Like all of the corporations putting computers on record, Taking away all the AI tools after they got what they wanted, And destroying every operating system and old hardware that could be used.
3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?
At 25sec... I see my software is already on your PC... Advanced BAT to EXE Converter. Already done :)
I see it at 1m25s
You are the REAL hacker! 😂😂
I love your intro attitude ❤😊
Before you click onto something you downloaded from the internet check what it is! It will help in most cases.
Viewer Think: Exploit Code inside an Image
Reality: Powershell download an Image
Amazing and simple explanation, hope this content increases awareness ❤
I have been following for a while now and i can testify it is awesome
when you entering commands, kindly keep your prompt in the middle of the screen, bcz normally your all commands go behind the subtitles.
0:25 my lawyer will remember that
note : physical hacking included
Congrats on 1 mil!
that face from 12:24 till 12:27 was priceless 🤣🤣
I have the Google subscriber data as the matrix. Google was hacked...or server 1426 62nd. Thanks ...ur the ethical expert
When the vortex is met with no dependencies only then can it intersect itself.
Good video and interesting subject. Would you be able to tell us how to check for this possible attack aka ‘photo installed’ and how to remove it from your pc or Mac?
Thank you,
Great Explanation Man !
wait when did he turn into thenetworkchuck?
most educational video I've seen in a while!
So the photo will always be a .exe at the end and that is how we are gonna know it is a vnc file or what ever remote?
Short answer is yes - Long answer is that you should also look out for other file extensions that can have executeable programm code, since exe is not the only one
You could use Advanced BAT to EXE Converter to make it look less suspicous
😂😂😂 I will help you find your password free of charge 😂😂
😂😂😂😂
😂😂😂😂😂😂
Loi looks nice today!!
Please can we get a video tutorial on how to remotely control an apple ios iphone, either a RAT or through a terminal, or if you can get us the Pegasus spyware
Please can you teach the best app for phishing and how to use it
That's some passive aggressive threats 😅😅😅
I follow ur every video some time due to busy life I did not remember it
such nice content to entertain youtube kids )
Loi Liang Yang - can you do this for Android as well? an not only for PC!
Big fan sir ❤
You are genius loi 😊
Wow, this is dangerous stuff you got me scared to even go on my laptop. How? How do I how do I stop somebody from doing that to me? I just don’t click on any pictures.??
Lol, just enable visible file extensions. You'll see what's an image and whats an executable.
Where did the powershell script, the one we need to polish come from?
nice room light bro
trying to do the thing but : getting error like :: 'x64' is not recognized as an internal or external command,
operable program or batch file. same for x86.
Love this guy
Thanks so much, your great sir
can you teach us how to do to with a machine in another network and not LAN?
just be careful not hacking yourself by downloading those such things :)
how can you hide ".exe" of this file when attach to email or send file via Instant message? Does google drive scan this file and found som "like virus posoning code" and alarm?
decode and zip it
@@LoneDarkWarrior013 I don't think AV engines of cloud services can not scan compressed files.
@@tm02019 encoded and zip is to protect the extension of the exe file that you convert to jpg file. its really make your trojan file as jpg file, but when victim open the file, they fuccked up
It even showed flights and me at airport 8 miles away while I'm home....bizarre. I caught several people who had access (recorded ) parked next to me while using my account n gsa app live communicate with drop box show name of the person in my map later to have the names removed....
My friend got a virus on his pc and I cant go to his house to fix it , and he is not that smart to understand what im telling him, thanks for this tutorial😂❤
congratulations 🎊 🎊
Metasploit veil and pdf or png yep this is known.. , and can do persistence...
Good content keep it up 💪🎉
Hi...boss you're best RUclips’s ❤
Love your videos ❤
that handwriting looks like minecraft enchanting table words
Thanks my mentor 1:14
Couldn't you take this a step further by adding in the ps script that is executed to also automatically hide file extension and hidden files in the event that the users does have extensions showing? Might throw some red flags if done that way maybe.
U are just so amazing...! 🤧 🤧
Why are you threatening me 😅😅
Would love to have a ducky payload for this. To be able to plug my rubber ducky into one pc, then have it do all of this, then be able to simply access it through my pc.
bruh Ive just watched the first minutes of this video and I gotta say im subscribing now coz dude lol it was funny asf
the vnc can connect over the WAN without know the target machine WAN ip or port forwarding at target machine router ??
That intro was 🔥 😂😂
you the main man! greate
what about if your target uses a firewall like tiny wall which blocks every connection unless its whitelisted by the user
Thats why we reverse shell so call from the victims computer to us to bypass firewalls
Ncat
do the two computers need to be connected on the internet???
so basically, you need to already have access to the target machine to open the ports and point to the hacker machine? so... when does the actual hacking start?
@loi would you do the same but with port forwarding
Please can you teach us how we can make an autorun usb that i can run attack if we plugin it ❤
This guy is rlly helpful but he scares me with these threats 😭😭😭😭
Hi Mr. Yang, I'm have a long time searching a tutorial with the same idea, but focus on android devices infringement remotely, using a infected photo with a payload, and them sending it vía WhatsApp for example, can you make this?
this isn't hacking at all , im sorry but if it does require me to install something on my victims pc whats the point ?
It is a form of hacking… just like putting down a usb for a curious person to pick up and succumb to the curiosity of what’s on the USB…. the point of it is to get access
Its a type of malware delivery, hacker can send you a picture or pdf or a word file or anything by using email as an example pretend to be someone you know may b your company boss by spoofing their original email, once you open that file malware will automatically execute on your pc but you will see the original pdf or pic file. This is a well known technic used by hackers. They can use cross platform malware delivery technique.
😂 how many times has a person you know done something illogical. Humans are dumb
Noob
Merge it with a Pic and then send it to the and use the RLO character to make it look like a jpg and once they open it boom
Favorite browser Internet Explorer 😂
Is that what kyc is for?
You also have to find someone dumb enough to open the attachment. Beyond never opening any attachments that I have not verified by voice with the sender (only someone I have met IRL). Otherwise, if I had to open an attachment I didn't trust I guess I would do it in a virtual machine. I would download and scan it first rather than launch or run it from the browser.
Does this not require a port forward at the target? most people are behind a router. or it dont matter as it's "calling" the attacker, where naturally port 4444 needs to be forwarded?
Do both computers have to have it installed??
sir make ur video in more detail to understand
Im literally such a fan of you but how can you hack someone without discord or a link because im asking myself for so long or just by ip
Good day sir.
I need your help with something.
How can someone hack a laptop using Kali linux Without coming in contact with the laptop you want to hack?
What if you are connected to the same WiFi network?
I am confused The application ultravnc should installed in hackers pc or the people who we are hacking bro im totally confused🤨
in the victims pc
but is it require to download vnc in the victims device
yup..lol so that's not hacking at all
not necessarily, when hacking a computer the first step is to obtain a remote shell and then you can install a program to have remote desktop acess
How come ever remote-control video we have to use the Tarkets machine to download something or run some code is there any way possible to just hack into it?
Could you teach me
Yes but how we can check if someone have even access to the network?
Need for outside the network