Windows Fake Logon Screen!

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/...
    Full Web Ethical Hacking Course: www.udemy.com/...
    Full Mobile Hacking Course: www.udemy.com/...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangya...
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Комментарии • 98

  • @mosomiliardaru
    @mosomiliardaru Год назад +37

    this guy using notepad to edit the bat file is legendary

  • @in_the_pines
    @in_the_pines Год назад +34

    Can you actually show a legit exploit that would work in a real world scenario? bc everything you show is either no longer relevant or only works if all of these variables are some how magically aligned at once which would be at most 1-2% of the time if that.

    • @fastcode8664
      @fastcode8664 Год назад +2

      You're right, but what's no working about this? I feel it's efficient besides the fact that Metasploit is not persistent and requires the victim to open payload applications oftenly.

    • @fastcode8664
      @fastcode8664 Год назад

      Maybe checkout redline stealer and raffel rat. I think these are efficient rats to try.

    • @zinoDave
      @zinoDave Год назад +1

      youtube would block it

    • @goded.exp.1137
      @goded.exp.1137 Год назад +3

      @@fastcode8664 a way around that would be to setup a netcat listener on any port then have the target computer connect to your machine and download the malware in a folder on the targets machine then head to startup and create a batch script file that will locate the malware and execute it every time the computer starts up and for the finale piece create another batch script file to restart the computer every 10 mins so it can auto execute the malware on startup.

    • @fastcode8664
      @fastcode8664 Год назад

      @@goded.exp.1137 I like that, it's my way of working "Automation with bash scripts", you can perform obfuscation to make the exe payload undetectable by windows defender, then upload the exe payload to a file hosting site like mediafire. Then create a vbs script with an attracting icon. This vbs script once clicked opens chrome and heads to the download link of your payload and downloads it then locates it and executes it.

  • @HarryLopez82
    @HarryLopez82 Год назад +6

    Windows firewall needs to be turned off to execute that payload

  • @akhilsengar3069
    @akhilsengar3069 Год назад +1

    That laughing was personal 😂

  • @alimustafa2682
    @alimustafa2682 Год назад +29

    You executed a malware on his computer , why won’t you retreive the password from SAM files directly ?

    • @UndercoverDog
      @UndercoverDog Год назад +15

      Because he is acting like a scriptkiddie in his videos lol

    • @Ryan-xq3kl
      @Ryan-xq3kl Год назад +6

      you mean to tell me that windows is not using the discrete log problem as a basis for user security!? color me shocked

    • @amongusboi2032
      @amongusboi2032 Год назад +3

      ​@Ryan I am shocked you didn't know

    • @amirmostafavi3427
      @amirmostafavi3427 Год назад +6

      Because if he get SAM file he should crack it and it takes a long time . But with social engineering he can get password easily ;)

    • @amirmostafavi3427
      @amirmostafavi3427 Год назад +2

      Because if he get SAM file he should crack it and it takes a long time . But with social engineering he can get password easily ;)

  • @rootshell101
    @rootshell101 Год назад +6

    The executable gets flagged and removed by Windows Security app just seconds after downloading it 👍

  • @juliusrowe9374
    @juliusrowe9374 Год назад +4

    Awesome tutorial Loi!

    • @ricseeds4835
      @ricseeds4835 Год назад

      Awesome tutorial? What command did he run to get the list of running processes? Why 6044? Was that running already? The man glossed over so many things and don't tell me he covered this in other videos so I should go watch them

  • @billiraydray
    @billiraydray Год назад +14

    Sending love from Sierra Leone. Thank you Mr Loi

    • @Leo-x7t9o
      @Leo-x7t9o Год назад +1

      My dream is one day I will visit Sierra Leone 🥰. Because they also speak 🗣️ in my mother tongue Bangla. Many many Love Sierra Leone 💝 from Bangladesh.

    • @u-buntu7257
      @u-buntu7257 Год назад

      Yo hit me up
      I’m from Sierra Leone

  • @heltorberg4747
    @heltorberg4747 Год назад +1

    Apparently a friend of NetworkChuck, the presentation of content and the tone of speech are very similar🙂

  • @pioneerarist2544
    @pioneerarist2544 8 месяцев назад

    Dude, when you exploited the target, just create a local account and assign to the Administrator local group. :D

  • @olivesouch6423
    @olivesouch6423 Год назад

    0:02 Heckerman

  • @vikasrathi8256
    @vikasrathi8256 Год назад +8

    Sir i like your content , I don't skip any video... Thanks❤ for giving us that educational content😊

  • @stewiegriffin6503
    @stewiegriffin6503 Год назад +1

    windows defender will never allow this

  • @JoeTheTechTitan
    @JoeTheTechTitan Год назад +3

    Keep the good work !!

  • @user-sj9jq6nc1k
    @user-sj9jq6nc1k Год назад

    It's great to see what and how this kind of security vulnerability! To understand hackers, better protect privacy and security. Only I admire honest Hacker's. The type that does not take advantage of people's Vulnerabilities

  • @lurka1337
    @lurka1337 Год назад +1

    so how do we know that these files you are telling us to install aren't just ways for you to hack us?

  • @nole5398
    @nole5398 Год назад +1

    instructions unclear i am in federal jail now

  • @Trionine
    @Trionine Год назад

    talking style is like NetworkChuck

  • @mr.simpleeditor7157
    @mr.simpleeditor7157 Год назад +1

    Hey @hackerloi why don't you create a new series of pentesting ? Intermediate hacking series with topics that comes under CEH.?

  • @boxepic
    @boxepic Год назад

    now im on the fbi watchlist. Nice video though!

  • @thebeez18
    @thebeez18 10 месяцев назад

    YOU ARE JUMPING ON NO. 2 WITHOUT SHOWING THE COMMAND HOW TO GO IN THAT SCREEN

  • @thuc6305
    @thuc6305 Год назад

    WOW Loiling Yang is hacker using Windows 10

  • @wonderfullstar5135
    @wonderfullstar5135 Год назад

    Need help Bos. Can you make a tutorial on how to load multiple commands in bettercap by only loading one script.

  • @100kmonko
    @100kmonko Год назад

    Old ahh windows

  • @user-hd9lm3wl3t
    @user-hd9lm3wl3t 8 месяцев назад

    I like the way he teaches but he should take his time with the way he speaks

  • @Al-Musalmiin
    @Al-Musalmiin Год назад

    hey man my windows taskbar keeps flickering when im viewing the desktop, after clicking icons on the taskbar, ive checked windows registry, ive ran sfc scan, ive reinstalled all display drivers, i have all the latest drivers, ive even run a windows defender offline scan, and it still flickers when i click icons on the taskbar, its just the taskbar that flickers, nothing else, ive checked my network connections and theres nothing that shouldnt be there, it appears other users who use windows 11 have the same issue i have, and i still have not found a fix, any help you can give would be appreciated. thank you.

  • @StċrYTimes
    @StċrYTimes Год назад

    Please make a video on how to configure a wifi network adapter like (ac600 free driver) not alpha network adapter pls

  • @kntwing23
    @kntwing23 Год назад

    what happens if the person use apple or sam sung laptops or other laptops?
    is it the same thing?

  • @mormsovann
    @mormsovann Год назад +1

    sir can you make a tutorial about how to create tool for H@ck or do something else?

  • @slowedlines7914
    @slowedlines7914 Год назад

    coonnection reset by peer any suggestion ????
    plz

  • @SolitaryElite
    @SolitaryElite Год назад

    why not just make one yourself? bearly need to even code to do that

  • @cyberelitenetwork5458
    @cyberelitenetwork5458 Год назад

    please i have an issue it showed me connection refused when i set the RHOST and the ip address

  • @co-york8680
    @co-york8680 Год назад +1

    xddd back in time i put my phone above my desk and recorded it and when my father come to unlock i get the pass ehhe

  • @insanegamerz2006
    @insanegamerz2006 Год назад

    your a insane guy i wana trying to met you onec in my life

  • @hackingit
    @hackingit Год назад

    How to use it outside the network?

  • @amrfarouk-8286
    @amrfarouk-8286 Год назад

    What about Macs Loiii?

  • @shrippie-4214
    @shrippie-4214 3 месяца назад

    Think this just happened to me
    lol
    although it didn't login and I just reset my PC

  • @SeaMusicVEVO
    @SeaMusicVEVO Год назад

    Nice 👍 Dude .

  • @programersandco
    @programersandco Год назад

    My antivirus blocks the download page bruh...btw nice video

  • @praveen.kkumar
    @praveen.kkumar Год назад

    What is the best software for coding bro

  • @user-xv7di2ew6q
    @user-xv7di2ew6q Год назад

    I would a tutorial about mobile Android hacking remotely

  • @Kalilinux-em8uq
    @Kalilinux-em8uq Год назад

    Loi My channel just got hacked.

  • @IsaacNewton80735
    @IsaacNewton80735 Год назад

    Lol jajajaja great technique

  • @toyolrock
    @toyolrock Год назад

    How to monitor setelite on pc

  • @comrade791
    @comrade791 Год назад

    Can someone please help me in finding Intro & background Music

  • @C0FF1N-404
    @C0FF1N-404 Год назад

    nice information

  • @Tayariclashki
    @Tayariclashki Год назад

    I created payload but no single session is create there what should I do???

    • @STCatchMeTRACjRo
      @STCatchMeTRACjRo Год назад

      does the target computer have smb 1 turned on, missing path fix MS17-010, firewall allows smb connection and allows anonymous IPC$ and NamedPipe.
      Windows 10 by default does not have smb 1 turned on, its there for backward compatibility. Additionally, since the discovery of the exploits a patch was released that fixed the exploit.

    • @Tayariclashki
      @Tayariclashki Год назад

      @@STCatchMeTRACjRo I try on Android. Android meterpreter reverse tcp payload

  • @MrBluesky-js9fz
    @MrBluesky-js9fz Год назад

    How can we attack from a windows instead of kali Linux?

    • @in_the_pines
      @in_the_pines Год назад

      He did that bc if he was actually using windows it would automatically flag & quarantine the .exe when extracted (unless all of firewall and virus scan settings is manually disabled). In other words, this wont work 95% of the time unless they already are knowingly downloading pirated/malicious software that might accidentally get flagged and forget to turn them back on afterwards.

    • @MrBluesky-js9fz
      @MrBluesky-js9fz Год назад

      @@in_the_pines I feel scammed

  • @la_sn3ak3r19
    @la_sn3ak3r19 Год назад

    Already did it

  • @rizfpathan81
    @rizfpathan81 Год назад

    Sir please one video on how to create an undetectable payload,,, logic ... Lots of love 💕 from India...

    • @in_the_pines
      @in_the_pines Год назад

      pretty much everything he posts would not work in a real world scenario. Might also be against youtubes guidelines

  • @NotZhino
    @NotZhino Год назад

    login*

  • @MADSANYT
    @MADSANYT Год назад

    Nice

  • @amirnazari7928
    @amirnazari7928 Год назад

    best

  • @Enolaeno111
    @Enolaeno111 Год назад

    all i say love u

  • @Tmr_buira
    @Tmr_buira Год назад

    7th view bruh🤗❤️😍

  • @Mr.HameedAbdul
    @Mr.HameedAbdul Год назад

    Hi

  • @sharewebonic9878
    @sharewebonic9878 Год назад

    please help

  • @ReligionAndMaterialismDebunked

    :3

  • @Tech_Brains_
    @Tech_Brains_ Год назад

    First View we're in for it
    👍

  • @aminsec
    @aminsec Год назад

    damnnn

  • @andreyshishkin4958
    @andreyshishkin4958 Год назад

    Antivirus will be block this activity baddy..

  • @roycerodrigues
    @roycerodrigues Год назад

    1st view

  • @s.s.sgamer4899
    @s.s.sgamer4899 Год назад

    Sir, you can came in bangladesh

  • @akashsharma4829
    @akashsharma4829 Год назад

    first comment

  • @xelerated
    @xelerated Год назад

    Ffs! Hacking is not illegal! Doctoring is not illegal, being a CRIMINAL is what is illegal.

  • @rootcode
    @rootcode Год назад

    First comment @loiyangyang sir