Remotely Control Any PC with an image?!

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии •

  • @Eazy_Bruh
    @Eazy_Bruh 5 месяцев назад +41

    Your videos are like magic….
    I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video.
    The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane

    • @LZnaxyl
      @LZnaxyl 5 месяцев назад +5

      sounds like a skid

    • @Eazy_Bruh
      @Eazy_Bruh 5 месяцев назад +1

      @@LZnaxyl bruh what? You smell like a skid.

    • @ropenphilanigqwaru7560
      @ropenphilanigqwaru7560 5 месяцев назад +2

      What video broe, share a link am interested

    • @dineshjiyoutube
      @dineshjiyoutube 5 месяцев назад +1

      I need the the codes for this

  • @shmmh
    @shmmh 5 месяцев назад +58

    Am I tripping. I thought this was a NetworkChuck video minus the coffee breaks

  • @jesperjensen293
    @jesperjensen293 5 месяцев назад +22

    You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.

    • @goruluk88
      @goruluk88 5 месяцев назад +1

      what would be the tell tale sign that your PC has been infected because you don't realised that you accidently click an email that look so legitimate? will resetting my PC to factory setting will clean my PC from this infection?

    • @kundasemkundatam7461
      @kundasemkundatam7461 5 месяцев назад +4

      I can imagine young inexperienced teenager pirating "pre-installed" games in zip. Extracting it from context menu to "here" can do its job if our little pirate then opens the "jpg".
      Even worse it can be packed to self-extracting rar and this "jpg" can be set to start after extraction.

    • @mjmares
      @mjmares 5 месяцев назад

      @@goruluk88 stop all proccess and close out of everything, look in task manager and find anything that does not look like it shoudl be there and trace it back to file location and delete :) also look in the win startup dir

    • @zer0k4ge
      @zer0k4ge 5 месяцев назад +4

      zip file and RLO characters to make it end with jpg or png, problem solved

    • @saikatbiswas573
      @saikatbiswas573 5 месяцев назад +1

      It could be sent as a zip file.

  • @lammabing6401
    @lammabing6401 5 месяцев назад +2

    I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff

  • @dipakmalode8237
    @dipakmalode8237 Месяц назад

    Awesome work, Dale valsko ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!

  • @Alex_prave
    @Alex_prave 5 месяцев назад +94

    Sends a pic to someone ,
    They : why this pic is .exe???

    • @rajesh_shrestha
      @rajesh_shrestha 5 месяцев назад +6

      only if they know the difference between exe and jpg :D

    • @winsucker7755
      @winsucker7755 5 месяцев назад +11

      "It's EXtremely Entertaining"

    • @user-zt3hq3pi5l
      @user-zt3hq3pi5l 5 месяцев назад

      Change the first binary/hexagonal designation

    • @zer0k4ge
      @zer0k4ge 5 месяцев назад +4

      You can use an RLO character. So first it will be saved as "picturegnp.exe" then you out an right to left override to make it pictureexe.png or change it to an rcs file so it is a little less obvious so "picturercs.png"

    • @saikatbiswas573
      @saikatbiswas573 5 месяцев назад

      That file could be named " annual companyindexe.pdf".its called extension spoof..this is a well known technic,so don't laugh with ur little knowledge.

  • @djleodecond
    @djleodecond 5 месяцев назад +34

    man, that only works on the local network and certainly the firewall will block or notify the exposing ports

    • @nirvaangoel8172
      @nirvaangoel8172 Месяц назад

      Is that true?

    • @djleodecond
      @djleodecond Месяц назад

      @@nirvaangoel8172 yes

    • @Styrofoamiskindabad
      @Styrofoamiskindabad 16 дней назад

      I don't know about this since the victim is actively listening on port 4444 to receive connections, so how can firewall block the connection from the port when the client is actively listening on the port?

  • @solexisdelexis4616
    @solexisdelexis4616 5 месяцев назад +4

    Please can you do a course on Linux and windows from the terminal

  • @mmkgamingchannel9918
    @mmkgamingchannel9918 Месяц назад

    Metaspyclub is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work !!

  • @RinkuRinku-pb1qp
    @RinkuRinku-pb1qp Месяц назад

    There is no doubt that you will rise fast at the apex of your career Perry Moskva . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!

  • @2kambas557
    @2kambas557 5 месяцев назад +9

    For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.

  • @cantbeserious9802
    @cantbeserious9802 2 месяца назад

    How can anyone learn when you’re teaching so quick without thorough instructions for people to pick up on?

  • @MarkGakobo
    @MarkGakobo Месяц назад

    an easy was is to use RAT (remote access tool).although
    UltraVNC can be used for this there are some better RATs which are hacker base and can perform better like njRAT,DarkComet.

  • @OoxGuru
    @OoxGuru 5 месяцев назад +1

    Your videos are much better than it was a few year ago where you wouldn't look at the camera , well done for the constant improvement

  • @AutomotiveWorld-k2q
    @AutomotiveWorld-k2q 2 месяца назад

    😅.really u r very smart n intelligence 😅 bcz im following u already 3.5 years done 😅😊

  • @satalaj
    @satalaj 5 месяцев назад +4

    20 years ago I used 007 spyware for fun it's idea was very similar to create a image and deploy

  • @wasimafzali6651
    @wasimafzali6651 5 месяцев назад +2

    Hey ❤
    Could you make a video for beginners where and how to start computer science, programming and other things

  • @wahomemutahi1008
    @wahomemutahi1008 5 месяцев назад +122

    so you start the video by threatening me huh?🤣🤣🤣🤣

    • @usr808
      @usr808 5 месяцев назад +15

      I literally watch his videos just for the intro😂

    • @LoiLiangYang
      @LoiLiangYang  5 месяцев назад +38

      Yes

    • @GamerBePlayin
      @GamerBePlayin 5 месяцев назад

      ​@@LoiLiangYangExactly now do it

    • @Blossom_Iwunna
      @Blossom_Iwunna 5 месяцев назад +2

      ​@@usr808yeah me too 😂

    • @Es7z-x7r
      @Es7z-x7r 5 месяцев назад

      @@LoiLiangYang The always ask your mother before hacking and the laugh got me

  • @uglefisken
    @uglefisken Месяц назад

    Wow excellent explanation.... Thank you Sir for bringing so much effort and time to make people like us safe and we can feel comfort and breeze when surfing as it is or was supposed to be... And at the same time understand and comply with the issues that are out there so we have the possibility to actually do something with it and be a part of the solution.. Excelllent.. Thank you Sir again, for your hard time and efforts to making us SECURE and Safe....!!!
    People like him are so important theese days... Its just amasing....You got yourself a Subber indeed....!

  • @usr808
    @usr808 5 месяцев назад +10

    I'm gonna try this on my boss. Thanks Loi😊

  • @nettlex
    @nettlex 5 месяцев назад +2

    the thing is, mail services show extensions by default.

  • @Neekamhakane
    @Neekamhakane 5 месяцев назад +1

    Your video is like a mini-masterclass. So valuable!

    • @PhamHuy-j4e
      @PhamHuy-j4e 5 месяцев назад

      if you know tech enough, you know this is for kids only, lol.

  • @mrlilstrom
    @mrlilstrom 5 месяцев назад

    Can you make a video of remotely controlling another PC while staying hidden from the task manager?

  • @yeshua_n13-8aij8
    @yeshua_n13-8aij8 5 месяцев назад

    Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.

  • @johnmyers3233
    @johnmyers3233 5 месяцев назад

    I personally like to see the extensions on the file names, Likely. This wouldn't catch me off guard unless I was flipping through my images. I bet there are better ways of doing this That are coming to light and we need to protect ourselves. I personally do not like Leaving my internet connected. I also do not store important important information like taxes on an online computer. I think there might be a rule that can be made in order to prevent this from ever happening. I'm not sure how you are remotely connecting, but most of my remote services are restricted or off. I'm not sure if there is actually radio frequency on my motherboard, but it is another setting that you have to disable regardless of your motherboard, not having Bluetooth and Wi-Fi. I'm finding it very difficult to find motherboards that are safe from the outside world, especially with the advancements. In hacking. We need to be proactive in scooping up resources and tools that we can use And the future should things go wrong, Like all of the corporations putting computers on record, Taking away all the AI tools after they got what they wanted, And destroying every operating system and old hardware that could be used.

  • @Krullfath
    @Krullfath 5 месяцев назад +6

    3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?

  • @brandondargo9875
    @brandondargo9875 5 месяцев назад +7

    At 25sec... I see my software is already on your PC... Advanced BAT to EXE Converter. Already done :)

    • @inadad8878
      @inadad8878 5 месяцев назад

      I see it at 1m25s

    • @davidsilvera7436
      @davidsilvera7436 5 месяцев назад +3

      You are the REAL hacker! 😂😂

  • @ANONYMOUS-PK313
    @ANONYMOUS-PK313 5 месяцев назад

    I love your intro attitude ❤😊

  • @muesique
    @muesique 5 месяцев назад

    Before you click onto something you downloaded from the internet check what it is! It will help in most cases.

  • @bot3d
    @bot3d 5 месяцев назад +3

    Viewer Think: Exploit Code inside an Image
    Reality: Powershell download an Image

  • @archygonzalez3086
    @archygonzalez3086 5 месяцев назад

    Amazing and simple explanation, hope this content increases awareness ❤

  • @CEFASOCACEDEMY-mz6zk
    @CEFASOCACEDEMY-mz6zk 5 месяцев назад

    I have been following for a while now and i can testify it is awesome

  • @microcyberwindows
    @microcyberwindows 5 месяцев назад

    when you entering commands, kindly keep your prompt in the middle of the screen, bcz normally your all commands go behind the subtitles.

  • @randomClips64
    @randomClips64 5 месяцев назад

    0:25 my lawyer will remember that
    note : physical hacking included

  • @computersandkeyboards
    @computersandkeyboards 5 месяцев назад +1

    Congrats on 1 mil!

  • @user-ev2ct8ug1m
    @user-ev2ct8ug1m 5 месяцев назад +3

    that face from 12:24 till 12:27 was priceless 🤣🤣

  • @orionnxaviergonzalez4279
    @orionnxaviergonzalez4279 5 месяцев назад

    I have the Google subscriber data as the matrix. Google was hacked...or server 1426 62nd. Thanks ...ur the ethical expert

    • @-someone-.
      @-someone-. 5 месяцев назад +1

      When the vortex is met with no dependencies only then can it intersect itself.

  • @Dongdang-fc2mb
    @Dongdang-fc2mb 5 месяцев назад

    Good video and interesting subject. Would you be able to tell us how to check for this possible attack aka ‘photo installed’ and how to remove it from your pc or Mac?
    Thank you,

  • @paritoshbhatt
    @paritoshbhatt 5 месяцев назад

    Great Explanation Man !

  • @joelarchary7122
    @joelarchary7122 5 месяцев назад +3

    wait when did he turn into thenetworkchuck?

  • @enlargedtext
    @enlargedtext 5 месяцев назад +1

    most educational video I've seen in a while!

  • @s7xyi
    @s7xyi 5 месяцев назад +6

    So the photo will always be a .exe at the end and that is how we are gonna know it is a vnc file or what ever remote?

    • @marvinundo7020
      @marvinundo7020 5 месяцев назад +3

      Short answer is yes - Long answer is that you should also look out for other file extensions that can have executeable programm code, since exe is not the only one

    • @St8t1c
      @St8t1c 5 месяцев назад

      You could use Advanced BAT to EXE Converter to make it look less suspicous

  • @jermainreed9653
    @jermainreed9653 5 месяцев назад +42

    😂😂😂 I will help you find your password free of charge 😂😂

  • @Finbar_Monroe
    @Finbar_Monroe 5 месяцев назад

    Loi looks nice today!!

  • @lil_rill
    @lil_rill 24 дня назад

    Please can we get a video tutorial on how to remotely control an apple ios iphone, either a RAT or through a terminal, or if you can get us the Pegasus spyware

  • @gamer2.493
    @gamer2.493 4 месяца назад

    Please can you teach the best app for phishing and how to use it

  • @tellisecfive9410
    @tellisecfive9410 5 месяцев назад

    That's some passive aggressive threats 😅😅😅

  • @mohammadashraf7496
    @mohammadashraf7496 5 месяцев назад

    I follow ur every video some time due to busy life I did not remember it

  • @ReyDev74
    @ReyDev74 5 месяцев назад +3

    such nice content to entertain youtube kids )

  • @II-er7gj
    @II-er7gj 5 месяцев назад

    Loi Liang Yang - can you do this for Android as well? an not only for PC!

  • @gaurav_0717
    @gaurav_0717 5 месяцев назад

    Big fan sir ❤

  • @suhaibnadir
    @suhaibnadir 5 месяцев назад

    You are genius loi 😊

  • @massterrbarber
    @massterrbarber 5 месяцев назад

    Wow, this is dangerous stuff you got me scared to even go on my laptop. How? How do I how do I stop somebody from doing that to me? I just don’t click on any pictures.??

    • @xenicmark
      @xenicmark 5 дней назад

      Lol, just enable visible file extensions. You'll see what's an image and whats an executable.

  • @benjaminamofa5043
    @benjaminamofa5043 5 месяцев назад

    Where did the powershell script, the one we need to polish come from?

  • @krypton_1101
    @krypton_1101 5 месяцев назад

    nice room light bro

  • @__shivansh__nigam7755
    @__shivansh__nigam7755 4 месяца назад +1

    trying to do the thing but : getting error like :: 'x64' is not recognized as an internal or external command,
    operable program or batch file. same for x86.

  • @crashtheimf
    @crashtheimf 4 месяца назад

    Love this guy

  • @MojtabaSultani
    @MojtabaSultani 5 месяцев назад

    Thanks so much, your great sir

  • @mr.haristotle
    @mr.haristotle 5 месяцев назад

    can you teach us how to do to with a machine in another network and not LAN?

  • @dog-sitive
    @dog-sitive 5 месяцев назад +1

    just be careful not hacking yourself by downloading those such things :)

  • @tm02019
    @tm02019 5 месяцев назад +4

    how can you hide ".exe" of this file when attach to email or send file via Instant message? Does google drive scan this file and found som "like virus posoning code" and alarm?

    • @LoneDarkWarrior013
      @LoneDarkWarrior013 4 месяца назад

      decode and zip it

    • @tm02019
      @tm02019 4 месяца назад

      @@LoneDarkWarrior013 I don't think AV engines of cloud services can not scan compressed files.

    • @LoneDarkWarrior013
      @LoneDarkWarrior013 4 месяца назад

      @@tm02019 encoded and zip is to protect the extension of the exe file that you convert to jpg file. its really make your trojan file as jpg file, but when victim open the file, they fuccked up

  • @orionnxaviergonzalez4279
    @orionnxaviergonzalez4279 5 месяцев назад

    It even showed flights and me at airport 8 miles away while I'm home....bizarre. I caught several people who had access (recorded ) parked next to me while using my account n gsa app live communicate with drop box show name of the person in my map later to have the names removed....

  • @XXXX-zf8fl
    @XXXX-zf8fl 3 дня назад

    My friend got a virus on his pc and I cant go to his house to fix it , and he is not that smart to understand what im telling him, thanks for this tutorial😂❤

  • @369era33
    @369era33 4 месяца назад

    congratulations 🎊 🎊

  • @MichaelRobertLawrenceITsec
    @MichaelRobertLawrenceITsec 5 месяцев назад +1

    Metasploit veil and pdf or png yep this is known.. , and can do persistence...

  • @RyanGForcE-xo9zx
    @RyanGForcE-xo9zx 5 месяцев назад

    Good content keep it up 💪🎉

  • @KhZakir-br3pc
    @KhZakir-br3pc 5 месяцев назад

    Hi...boss you're best RUclips’s ❤

  • @lettuceprayamen
    @lettuceprayamen 5 месяцев назад

    Love your videos ❤

  • @ZaiTheDragon
    @ZaiTheDragon Месяц назад

    that handwriting looks like minecraft enchanting table words

  • @ahmedsaidu2400
    @ahmedsaidu2400 5 месяцев назад

    Thanks my mentor 1:14

  • @Mason201410
    @Mason201410 5 месяцев назад

    Couldn't you take this a step further by adding in the ps script that is executed to also automatically hide file extension and hidden files in the event that the users does have extensions showing? Might throw some red flags if done that way maybe.

  • @JordanMengo
    @JordanMengo 5 месяцев назад

    U are just so amazing...! 🤧 🤧

  • @harrymakongwa1147
    @harrymakongwa1147 5 месяцев назад +2

    Why are you threatening me 😅😅

  • @exciteproductions4two0
    @exciteproductions4two0 5 месяцев назад

    Would love to have a ducky payload for this. To be able to plug my rubber ducky into one pc, then have it do all of this, then be able to simply access it through my pc.

  • @alifebz5312
    @alifebz5312 4 месяца назад

    bruh Ive just watched the first minutes of this video and I gotta say im subscribing now coz dude lol it was funny asf

  • @everfreeeeee
    @everfreeeeee 5 месяцев назад

    the vnc can connect over the WAN without know the target machine WAN ip or port forwarding at target machine router ??

  • @sultanthe2nd
    @sultanthe2nd 5 месяцев назад

    That intro was 🔥 😂😂

  • @1wilfried
    @1wilfried 5 месяцев назад

    you the main man! greate

  • @sniperfoxxy
    @sniperfoxxy 5 месяцев назад

    what about if your target uses a firewall like tiny wall which blocks every connection unless its whitelisted by the user

    • @St8t1c
      @St8t1c 5 месяцев назад

      Thats why we reverse shell so call from the victims computer to us to bypass firewalls

    • @paddymcgrath605
      @paddymcgrath605 4 месяца назад

      Ncat

  • @DaComputerSage
    @DaComputerSage 5 месяцев назад +1

    do the two computers need to be connected on the internet???

  • @DrJay_PhD
    @DrJay_PhD 4 месяца назад

    so basically, you need to already have access to the target machine to open the ports and point to the hacker machine? so... when does the actual hacking start?

  • @mussaabdi
    @mussaabdi 5 месяцев назад

    @loi would you do the same but with port forwarding

  • @ApdalhamedGaffar
    @ApdalhamedGaffar 5 месяцев назад

    Please can you teach us how we can make an autorun usb that i can run attack if we plugin it ❤

  • @CrimsonDescentOfficial
    @CrimsonDescentOfficial Месяц назад

    This guy is rlly helpful but he scares me with these threats 😭😭😭😭

  • @ElTinTin90
    @ElTinTin90 5 месяцев назад

    Hi Mr. Yang, I'm have a long time searching a tutorial with the same idea, but focus on android devices infringement remotely, using a infected photo with a payload, and them sending it vía WhatsApp for example, can you make this?

  • @idkandidclmfao8242
    @idkandidclmfao8242 5 месяцев назад +71

    this isn't hacking at all , im sorry but if it does require me to install something on my victims pc whats the point ?

    • @jaycee6438
      @jaycee6438 5 месяцев назад +23

      It is a form of hacking… just like putting down a usb for a curious person to pick up and succumb to the curiosity of what’s on the USB…. the point of it is to get access

    • @saikatbiswas573
      @saikatbiswas573 5 месяцев назад +6

      Its a type of malware delivery, hacker can send you a picture or pdf or a word file or anything by using email as an example pretend to be someone you know may b your company boss by spoofing their original email, once you open that file malware will automatically execute on your pc but you will see the original pdf or pic file. This is a well known technic used by hackers. They can use cross platform malware delivery technique.

    • @local-admin
      @local-admin 5 месяцев назад

      😂 how many times has a person you know done something illogical. Humans are dumb

    • @AmitKumar-gi5wc
      @AmitKumar-gi5wc 5 месяцев назад +5

      Noob

    • @21Powers824
      @21Powers824 5 месяцев назад +3

      Merge it with a Pic and then send it to the and use the RLO character to make it look like a jpg and once they open it boom

  • @lettuceprayamen
    @lettuceprayamen 5 месяцев назад

    Favorite browser Internet Explorer 😂

  • @Dwlukinbill
    @Dwlukinbill 5 месяцев назад

    Is that what kyc is for?

  • @NITE_PINE
    @NITE_PINE 5 месяцев назад +1

    You also have to find someone dumb enough to open the attachment. Beyond never opening any attachments that I have not verified by voice with the sender (only someone I have met IRL). Otherwise, if I had to open an attachment I didn't trust I guess I would do it in a virtual machine. I would download and scan it first rather than launch or run it from the browser.

  • @jesperjensen293
    @jesperjensen293 4 месяца назад

    Does this not require a port forward at the target? most people are behind a router. or it dont matter as it's "calling" the attacker, where naturally port 4444 needs to be forwarded?

  • @space_penguin3593
    @space_penguin3593 4 месяца назад

    Do both computers have to have it installed??

  • @kiralegion1914
    @kiralegion1914 5 месяцев назад

    sir make ur video in more detail to understand

  • @Boolanyt
    @Boolanyt 5 месяцев назад +1

    Im literally such a fan of you but how can you hack someone without discord or a link because im asking myself for so long or just by ip

  • @mubarakkhalid7099
    @mubarakkhalid7099 Месяц назад

    Good day sir.
    I need your help with something.
    How can someone hack a laptop using Kali linux Without coming in contact with the laptop you want to hack?
    What if you are connected to the same WiFi network?

  • @mzgaming2222
    @mzgaming2222 5 месяцев назад +2

    I am confused The application ultravnc should installed in hackers pc or the people who we are hacking bro im totally confused🤨

  • @ayuubmohan9951
    @ayuubmohan9951 5 месяцев назад +6

    but is it require to download vnc in the victims device

    • @thionne
      @thionne 5 месяцев назад +1

      yup..lol so that's not hacking at all

    • @2kambas557
      @2kambas557 5 месяцев назад +1

      not necessarily, when hacking a computer the first step is to obtain a remote shell and then you can install a program to have remote desktop acess

  • @kerryfreudenthaler2986
    @kerryfreudenthaler2986 4 месяца назад

    How come ever remote-control video we have to use the Tarkets machine to download something or run some code is there any way possible to just hack into it?

  • @harshyadav40
    @harshyadav40 5 месяцев назад +1

    Could you teach me

  • @ConstantineProg
    @ConstantineProg 5 месяцев назад

    Yes but how we can check if someone have even access to the network?

  • @MazinMazin-ef5mu
    @MazinMazin-ef5mu 5 месяцев назад

    Need for outside the network