yes, your phone is already hacked
HTML-код
- Опубликовано: 26 апр 2021
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. Наука
loi is by far one of the best free hacking resources you're going to find. Love the content bro!
No no this is not.....
@@SK-me9by Then when why don't you list them and be helpful instead of talking BS about this guy!
@@patdevine3151 I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
Insta I'd- amoldhaygude
@@patdevine3151 how to use john the ripper. i have termux
@@patdevine3151 S K is right, although this guy sometimes show some useful stuff, his best content is just for members. he only shows how to pawn android phones with a payload that no one will probably install on their device even if you were a social engineering expert. not hating on the guy but their are better free resources out there that I will be glad to point you to. resources that actually explain what are you doing and the bare metal stuff.
Like, share and subscribe :)
Hi Loi, I'm a big fan of your work, I just want to ask : do you need root permissions in order to execute the reverse shell?
Thanks in advance
Soy de Perú, entendí todo el video pero sugiero subtítulos en español, gracias por compartir, lo pondré a prueba
How to sent victim this app ???? :(
If I want to learn how can I do
@@krishnasingh-sm5ij yes
You know it gets more scary every day as hackers are always one step ahead.
especially with zero-day exploit
@@mewzi exacly .non reported exploit
Also the good ones are getting 1 step ahead
@@pickeljuice4479 correct
@@amoltofi1 yeah but did you know the good ones are 1 step ahead
Here's the really scary part... Your manufacturer can easily integrate malware into any device that you have purchased from them. Worse yet an OTA update could be distributed at anytime to bug it. This means manufacturers and carriers alike can modify your phone at a lower level than installed apps and have access to a lot more than a reverse shell through app could provide.
Its just the tip of the iceberg. There's way scarier stuffs out there.
Exactly..
I also love when you say "it's game over" lol love it. thanks again for what you do
best notification ever
This needs more like lmfao
@@kong6581 yeh 😊
@@kong6581 I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
Insta I'd- amoldhaygude
You see right when you turn your phone on you just see "yes your phone is already hacked"
69
hats of to meterpreter for creating all those great libraries and making everything seem so easy and fun
I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
Insta I'd- amoldhaygude
Zero-click is one of the popular android attacks.
It will be awesome if you explain all the stuff you are doing in details but thank you awesome video 😌
Thank you very much for sharing, With you we learn a lot to be careful on my devices, I really like your videos.
Me: spoofing gps position
Hacker: I found someone who can travel faster than light
1) modern android versions wont let you install malicious apps
2) not always all permissions are already granted automatically, usually the app will ask
3) this wont work on Ios
4) this wont work outside your own network unless you have port forwarding
5) even if you give manual permission to install meterpreter payload after some time android will terminate it
🙂
It's a click bait video.
it already comes with every android phone inside no need to send to anyone you just need to be in the same wifi / wlan / internet / network
This should be the first video they make you watch at the store after giving you a new smart phone.
Lol...yes MAKE you watch...strapped to a chair ...head held in frontal position with eye lids held open so you can’t even blink
how to gain anxiety in 0.1 seconds
Bro you are good at explaining and teaching us, we love you and respect you keep up doing what you do
Lol, why do I feel like you would be called in a Hacking/tech Avengers style show
That's why after installing i disallowed permission of every app😂
Yea. This does make sense. I saw half of it.. and i knew what you are talking about.
What you did will only work if:
1) The MainActivity front-end app for meterpreter somehow gets onto the phone (it cannot magically appear on the phone on it's own). Some possible ways of this happening include installing an unknown app outside of Google Play Store, installing an app from Google Play Store that is really a Trojan that has managed to escape Google's detection (yes this is a real issue), or Hacker has had physical access to the phone to install the meterpreter app on the phone, or maybe ISP or rogue cell provider pushed the malicious app to the phone through Sim Tool Kit or other methods.
2) ADB debugging must be enabled to allow the phone to communicate to the shell server. This requires enabling developer mode on the phone & specifically allowing the server to connect to the phone. Again, can't magically happen without user intervention unless there is some 0-day put there that is being actively exploited to do this without any user interaction.
All in all, if you are very careful on what you install on your phone, the likelihood of this scenario happening is very rare.
Also, stuff like meterpreter and "(insert your verb here)Sploit" are just script engines that runs script-based exploits that are based off of databases contributed by the hacking community in general and do not require special skills to use. Since they use scripts, they are also therefore limited in the way that script usage is limited, such as validity of the script (has the target computer been patched for that CVE) etc etc.
How about teaching us some real hacker skills.
Im curious to know.Can ISPs gain acces to their consumers pc via some methods .As they have a certain degree of control over the configuration
no one on youtube teaches real stuff
I love these videos, not only that we get to learn to hack but we also learn how easy it is to get hacked.
Yes. When Calculator asks you for permission to make calls and messages.
Great content thanks for sharing. It's great to bring awareness to this. Coming from a slight cyber security background I understand the importance of security. Hence why I never give permissions to majority of my apps LOOOL which gives me problems at times haha. Love this.
Great hands-on content.
I'm a rusty IT guy who has been hyper-conscious about this stuff since before HTC Desire.
Your videos are a gold-mine. Thank you.
I am Egyptian and I learn everything from you. I was tempted to download explanations and have it translated into Arabic
And thank
same here brother .. Salam alikom from Iraq-baghdad
@@1ali1996 مرحب بيك يا حبي وتحيه كبيرة لاهل العراق الشقيقه
@@Mohamed-wm4oz I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
Insta I'd- amoldhaygude
the fact that your content works only on your device is funny as hell
Not using this guide, but ive hacked my samsung device, although with some issues, i was able to gain full access
@@BloodyLiFe255 mate look i probably know every single command line in linux and every script so we are not talking about basic knowledge but i literally couldnt gain any sort of access using these kind of free guides mate there's some tricks related to the victim's device which need some advanced level of ethical hacking i tried everything on my deviceand my brothers devices and i couldnt reach anything at the moment so like idk what the actual fuck is happening but yea i just mentioned my experience my guy
@@lolyou5645 I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
Insta I'd- amoldhaygude
@@lolyou5645 you sound like someone who knows zero
@@lolyou5645 if you knew every single line in command line and every script, you would not watch this tutorials, you could create your own malware
Ur the best one in the category of ethical hacking vids!! But i dont understand what happens to the phone of the respective ip address once we use the 'exploit' command:( It would be great if u could clarify my doubt. And also keep doing whatever u are doing my man;)
Your so amazing idol! Thank you always for your tips👍
Thanks for Information 🙂☺️
Hmmm, funny how i refreshed RUclips and its the second recommended. Hmmmmmmmmmm
Every first 10 seconds of every video, Loi seems to be some kind of antivirus salesman.
Later on in the video you realize this is the kind of guy antivirus companies learn from.
I like to discuss with technical discussion with you, if you also like please connect me FB account - amoltofi
Insta I'd- amoldhaygude
He:- Ur phone is fully hacked…😈
Me on Ipad:- R u sure about that?😂😂😂
I love your side view camera. Good to know so lamens like me can try to increase security to avoid the evil version of you haha. Much love thanks for what you do.
Would love to see your assessment of the BlackBerry android phones
Thank you for the great video.
Best content/educational creator
Hackers only have to get it right once, consumers and cyber security specialists have to get it right every time
Payloads dont work on high security androids above 11 version
And IOS??
but why
@@rakeshdudy3638 because new androids have security patches that don't let these payloads pass through them
What if phone doesn't have internet plans..?? 😁😆
Great man 😊😊😊 ur god !! Thanks for updating us with all the information 👍
I'm a medical student bt my passion is always about tech & this trick of permission i know. & now sir you're conforming my belief that i can also be the hacker....✌⭐
Awesome video!
Do you think you could do this for iOS?
Please make a video on the services whose permissions and which permissions can be allowed so that everything else can be disabled
Im using a black berry classic :)
Yes, I knew my phone is already hacked, but this time is not the time I would respond
One question please, is your Ethical Hacking course explain all this in detail?
Love 😍 your videos
How you made that app?? Show complete procedure if you want to teach completely. Thanks
it's already available in his channel. i did once seeing him
2:02 into the video and so far all this js about is on apps permissions which is no shocker.
you can disable sensors.
Exactly what I want thanks sir
So, if I go through all of the apps and set them to 'only while using the app' is that better? or unless they are all set to off privacy doesn't exist? but I guess some of the apps will not function without storage access etc..? is there anything you suggest to secure the phone...... can we see a log of any data downloaded by apps?
Oh ya, before I forget.. use the messaging app “signal” instead of SMS or WhatsApp or anything else to ensure end to end encryption and privacy.
The title gives me a panic attack.
Which virtual mobile machine you are using? Whether it is Gene motion?
This is classic attack, this was the first things I learnt. Love are making everyone aware ❤️
@Jens Meier for this attack to work on videos he is the owner of the app and bypassed all security warning while installing. Problem with these types of attack are that the code is known by smartphone as virus already so you have to make it undetecteble
@Jens Meier Naa, in a nutshell he is making a apk using metasploit(hacking software) which can be injected to other apk to look legit but for this demo he just installed it alone and perform the attack. So he is actually hacking but his own device
Can you please explain through burpsuite in windows
it's a technique that probably won't work in a real case scenario as it is so hard to ulter a target to download and install the payload, even hard on a social engineering expert. plus these kinds of tutorials aren't good for new learners, it makes them script kiddies. so please if you are reading this and you are a beginner go learn how these things work on a low level, like ADB and listening servers and Android development also networking and then come back and learn these automated things when you actually know the basics and fundamentals that these techniques rely on. good luck and keep learning 👍
Yes, I know that already
informative
I click deny deny deny to everything. including having a phone. 🤣
jokes on you i dont have phone
Smart
4:48 well i guess you can say its usefull if you got your phone stolen
your content is best it really help me much.
cc said it was "Food Control" A "Full Control"
Ahh it's really scary !
Thank U so much Sir for an awesome video !!
Hi, defense methods for these hackers would be great
@You thought it was a joke? lol kind of true
Thank You
Love u bro . Keep us updated like it
Lol he showed voms virtual space😂
It doesn't connect to the phone actually. From Kali the TCP reverse is started, but any app I click on the smartphone doesn't do nothing, even thoose that have geoloc permissions.
So do you need to be in close proximity of the phone or do you only need the number or in address to do this?
The best part is that android itself handling by google and we do not knw what permissions and code we are having inside the firmware 🥶 we are being hacked since we started using electronic gadgets 😎
Intel processors are backdoored aswell
Can you unlock a Google Pixel 3a with GrapheneOS installed on it ? I m thinking that a setup like this is pretty much unbreakable because the USB won t work while its locked and the time limit won t allow you to brute force it.
Luckily, i dont have smartphone lol xD
Tnx for another amazing video 😁😀
-Yes, your phone is already hacked
-FUcK OfF, IM Not UsING AnDRoiD
Hey Liang, I saw termux on your phone. Can you make a video of the app? Is it a mobile version of Linux?
You are just great!
I'm new to this. So can you send a payload without the owner clicking or download anything? Or do they have to do something? Thanks. From the UK. ❤️
Hello love the show watching from Kenya. If I may ask, what is the best solution to avoid this problem.
the hacker needs to install an app in your phone. but Google will warn you with a dialog box saying that the app asks for too many sensitive permissions. but you can still install the app and give all the permissions.
In layman's terms uninstall an app right away if it asks for too many unnecessary permissions
@@priyangshuhazowary it already comes with every android phone inside no need to send to anyone you just need to be in the same wifi / wlan / internet / network
@@prohax3475 can you name it? Huh?
might be easy to run that little exploit but if the mobile user does not have your hacked app installed on their device there is nothing you can do to their phone and the only way to get your hacked app on any device is to either install it yourself by having access to their device or by manipulating someone or as we hackers call it social engineering to get them to install the app and that's not an easy task so I don't think someone has to be scared of this. lol
The old benchmark trick showed In mr robot S2 E8 can be done practically please tell
thx, now i am more paranoid then before
i rlly have crisis abt that shit lol
Please..Can you tell me what tool you are using?
Very scary but helpful video. Thanks for sharing the information.
🙏 Jai Jagannath 🙏
Sir..very informative..but how search main activity in all anroid and iPhone??
Thanks a lot
Thank you for Your Educational Video content and i can relate to some of the video content and my phone has been hacked for few years now and i'm a randomly picked target smear campaign individual for few years now
teacher I have a question about the application on the mobile, how to get it there to put it in connection with the listening IP?.
Please make a twitter account if you don't have it already and have an email so people can contact you in formal way.
Your *Android* phone, that is.
Hey, i really want to get into hacking but i don"t know how to start... What do i have to learn first ?
What Laptop/PC do you use ?, that's Literally Amazing cause you Dont Have any kind of Lag and stuff
No it's not.
I have several questions haha one being don't you need a malicious apk and 2 is Lhost your ip or the device ip
Good video 🤝
Hi bro, any advice for someone like me who's a programmer and wants to get started on ethical hacking?
not now with google protection.
You're already past the hard part, getting the application on the target phone and running it on the target phone. Social engineering is half the work of hacking someone.
Exactly, how do you even get the app on device. I don't install any app outside of play store and even from play store I only use limited sets of trusted apps which are widely used from big devs. The chances of me gettings a malware on my phone are pretty pretty low.
@@WigglyWings it already comes with every android phone inside no need to send to anyone you just need to be in the same wifi / wlan / internet / network