how hackers recover any deleted files?!?!

Поделиться
HTML-код
  • Опубликовано: 27 дек 2024

Комментарии • 417

  • @LoiLiangYang
    @LoiLiangYang  2 года назад +121

    who is your favorite hacker?

    • @justinpriyoo8708
      @justinpriyoo8708 2 года назад +26

      David bombal lol

    • @HarvestHaven09
      @HarvestHaven09 2 года назад +2

      Godzilla

    • @codedpirater
      @codedpirater 2 года назад +7

      Loi u can't ignore that it's u !

    • @cwk4088
      @cwk4088 2 года назад +2

      Chloe O'Brien (from 24 - series)

    • @rudranaik2431
      @rudranaik2431 2 года назад +2

      do you know about china data leak or make a video about it?

  • @radscientist
    @radscientist 2 года назад +37

    Hacking is NOT illegal... Unless you don't own the network or have permission to hack it. Permission is the difference between ethical and unethical.

  • @Clinx999
    @Clinx999 2 года назад +11

    You talk about hacking so chill that made everyone believe it’s so easy. Love ur vids

  • @KnellAnwyll
    @KnellAnwyll 2 года назад +3

    Bro, im doing CyberSecurity and the fact that this type of information is free, drives me crazy.

  • @notdacringe
    @notdacringe 2 года назад +23

    The teacher that teached Mr Robot how to hack, love your vids

  • @j.amethyst5685
    @j.amethyst5685 2 года назад +3

    I’m assuming you would have to install Linux on targets computer,
    Because with the Private IP, you still be able to get into it without braking into there fire wall. Can you explain?

  • @hashcat253
    @hashcat253 2 года назад +6

    If deleted stuff can be recovered that means that even if your sussy browser is deleted an expert can recover it 😳

    • @adept-of-all
      @adept-of-all 2 года назад +2

      Completely Anonymous is not possible but you can use vpn or secure browsers like tor browsers...
      Which makes difficult to detect

    • @hashcat253
      @hashcat253 2 года назад

      @@adept-of-all thanks for the advice

    • @5wholepizzas284
      @5wholepizzas284 2 года назад +1

      FUCK I GOT TO RUN

    • @hashcat253
      @hashcat253 2 года назад

      @@5wholepizzas284 your best pick is to isolate yourself on an island to avoid fbi and cia government agencies...
      how we gonna do that?

    • @majaba6825
      @majaba6825 2 года назад

      Whatever you delete it will be stored somewhere on the memory, so it can be recoverable. You can destroy disc but even that maybe can be recovered. :)

  • @OnUSB
    @OnUSB 2 года назад +2

    After watching the video , I switched back to 0:01 to see the facial expressions that you gave🔥. You gotta be an actor😂 Amazing ♥️

  • @CPP_malloc
    @CPP_malloc 2 года назад +1

    Man, I appreciate your videos... they are so good
    but no need to suffer from cramps in the whole videos! you make!!

  • @infi2723
    @infi2723 2 года назад +1

    i did this in my class a few months ago. was cool to know that can be done.

  • @syedbarkath6960
    @syedbarkath6960 2 года назад

    How the Target is Connected to You ? By In the Same Network ?

  • @atikattar1104
    @atikattar1104 2 года назад +2

    Is It Possible To Recover Data Which Is Deleted Using Data Shredding Algorithms? If Yes, Then How?

  • @juliusrowe9374
    @juliusrowe9374 2 года назад +1

    Awesome tutorial Loi! Pleas keep them coming!

  • @ConstantineProg
    @ConstantineProg 2 года назад +1

    What is the best software to control the network?

  • @MKisor-ds5db
    @MKisor-ds5db 2 года назад

    route, and connect it to my computer system, will it be as simple as creating one track and play a composition through it, recording it, then

  • @teddyinterprise9081
    @teddyinterprise9081 2 года назад

    Best entrepreneur i have ever seen plus hacker. can you teach more about hacking out of youtube like your website!!! please

  • @phrah1978
    @phrah1978 2 года назад

    Hello Mr. hacker Loi, I want to ask you where to start for build a base knowledge..if you have some books to suggest or a program language to start with..this channel is amazing and i did subscribe..TNX

  • @joemaster61
    @joemaster61 2 года назад

    Important info! But then how can we really delete files?

  • @dragonsage6909
    @dragonsage6909 2 года назад +1

    Great episode, but you go so fast.. I'll have to rewatch ..slowly.. thank you HLoi

  • @X-secular
    @X-secular 2 года назад +1

    Love from India 🇮🇳🇮🇳

  • @lady15n
    @lady15n Год назад +1

    HOW OLD FILES CAN BE RECOVER ??? PLEASE ANSWER

  • @marjmarj6407
    @marjmarj6407 2 года назад

    Hi! A while ago, I tried applying for a job, and then this lady sent a link, saying it’s software that will be used in applying. So, I downloaded it to my PC and extracted it from the download folder. After installing it, a message popped up saying that my files were gone and I needed to pay to get them back. They are also threatening to sell it on DarkWeb. Is there any way to get my files back without paying? I can’t pay because I don’t have money and there’s no assurance that they will give back my files.

  • @Burlingfamilyfoodtravelchannel
    @Burlingfamilyfoodtravelchannel 2 года назад

    very useful lesson.thank you Loi

  • @hasashi_Aayu
    @hasashi_Aayu Год назад +1

    i don't know why but whenever i try to exploit it shows exploit completed but no session was created, help please

  • @Kaum_Terpelajar
    @Kaum_Terpelajar 2 года назад

    what APP are you using?

  • @suryaroja03
    @suryaroja03 2 года назад

    Loi super vid...bit slow would be great .for us...

  • @natureislove786
    @natureislove786 2 года назад +1

    I don’t believe in data recovery but I think I should do now

  • @Post_Oak_
    @Post_Oak_ 8 месяцев назад

    How do you do this for all iPhone photos on a wiped iPhone?

  • @ronancathor5388
    @ronancathor5388 2 года назад

    Hi, for deleted files on my own drives I just use recuva. But can you also recover files, if I deleted the volume on a SSD?

    • @Graupunkt
      @Graupunkt 2 года назад +1

      Sure, if you delete stuff everything is just marked. It will than get overwritten at some point in the future.
      A known recovery tool is Testdisk. You can restore partitions with that. If that is broken worse, we still have photorec which looks for the signature of files and restore it.
      Even if you write everything with zeroes (long format), companies might be able to recover data from these drives. They could replace the drives head with a more sensitive one and get some data off it. But you need a special room for this and the right hardware. Each technology is different, this was for old hdds.
      If you wanna be sure, destroy it!

  • @nathantampon112
    @nathantampon112 2 года назад

    USESPY, your content is so high quality. The field of cyber security is so saturated with grifters. But it seems like your very rarely miss. Your channel was an excellent find.

  • @shivambaghel4465
    @shivambaghel4465 Год назад +1

    This exploit is not working if port 446 is close on target System

  • @MrChester114
    @MrChester114 2 года назад

    Does it apply to SSD drives?

  • @alixee922
    @alixee922 2 года назад

    Brother Google AdSense method available?????

  • @Iampopg
    @Iampopg Год назад

    Do I need to have a malware like a backdoor on the target device to got the reverse tcp connection? Cuz I’ve tried it on my own personal system and is not working sir

  • @stefansweb
    @stefansweb 2 года назад

    Do Mr. Hacker Loi use Kali Linux as daily runtime driver?

  • @cirklare
    @cirklare 2 года назад +1

    I knew this module before I watched this

  • @ViolentbyDesign
    @ViolentbyDesign 2 года назад

    Nice little refresher. Thank you hackkaaaa loiiiii

  • @peterbertalan1684
    @peterbertalan1684 2 года назад

    Can you show a method to obfuscate the payload?

  • @ghostgil7006
    @ghostgil7006 2 года назад

    Sir how could i upload a hacking demo without getting strike?

  • @johncoleman6701
    @johncoleman6701 2 года назад

    How do I get around this

  • @siddhesh95
    @siddhesh95 2 года назад

    Make a course on cloud... Plz

  • @mo3tezyt205
    @mo3tezyt205 2 года назад

    thnx for this vd and can you show us how to hack emails plz plz plz

  • @davidardo4466
    @davidardo4466 2 года назад +1

    How i contact you?

  • @itistime1719
    @itistime1719 2 года назад

    Where do you go then to the deleted files brother

  • @dorothymentzer8001
    @dorothymentzer8001 2 года назад

    Help… I want to ask how to I stop an mdm and a stalking ware I’m just starting school and watching all these RUclips videos but how do I gather the right info

  • @venaculaporter9825
    @venaculaporter9825 2 года назад

    Can you please do a updated video on how to download kali linux on windows 🙏🙏

  • @jesled5312
    @jesled5312 2 года назад

    Do you contract for ethical hacking

    • @jesled5312
      @jesled5312 2 года назад

      Or can you provide referrals

  • @pratikdevale2517
    @pratikdevale2517 2 года назад

    Sir make video on how to install window 11 or 10 in android basic smartphone or tablets please

  • @scott32714keiser
    @scott32714keiser 2 года назад

    Its crazy it's so easy I got to add that to my computer kit and the secure delete tool to

  • @TheAKAnonymous
    @TheAKAnonymous 2 года назад

    Sir, Please Please make a video on how to install Whole Metasploit just in Windows 10 like kali Linux

  • @jesled5312
    @jesled5312 2 года назад

    Or do you have referrals for my case? All my search engines block access to any help or direct me to illegimate sources. Please help. Much appreciated

  • @shibuadak7419
    @shibuadak7419 2 года назад

    dear ,
    sir please tell me how to create fud payload to bypass all antivirus in 2022. And execute it in a mp3 or mp4 or text or pdf file .

  • @spite_beeekilled3643
    @spite_beeekilled3643 Год назад

    If you do a factory reset and it permanently deletes all your files your telling me that you can look in your system and find the files that were deleted and migrate back in your computer?

    • @黃德森-b7r
      @黃德森-b7r Год назад

      I will never regrets meeting farish_hacker indeed his a good man

  • @AloneTech9871
    @AloneTech9871 Год назад

    Is necessary that smb is running on that host

  • @Sakib458
    @Sakib458 2 года назад

    hey Loi i have this big problem on metasploit it keeps saying Exploit completed, but no session was created.What do i do.

  • @ravindran9065
    @ravindran9065 2 года назад +1

    I think FTK manager is more easy than this.

  • @tyrestorepk6296
    @tyrestorepk6296 2 года назад

    thank you so much , it worked 🙂

  • @Berbatov204
    @Berbatov204 2 года назад

    can these files be recovered after Bleachbit ?

  • @madankhatri2080
    @madankhatri2080 2 года назад

    Hackerloi please make video on complete autopsy tool in kali linux!!

  • @richievellalar3214
    @richievellalar3214 2 года назад

    Sir how I do recover folder or files in c drive ?

  • @ANKITKumar-ow6nm
    @ANKITKumar-ow6nm 2 года назад

    Hey bro is that possible to recover users home directory if it is deleted

  • @24x7melody7
    @24x7melody7 2 года назад

    Can u bring a tutorial for instal Linux the old trick not working please

  • @lefterispanos9543
    @lefterispanos9543 Год назад

    Use the shred command and you'll be ok.

  • @adarshkhanna7587
    @adarshkhanna7587 2 года назад

    Can you do a video on how to download all the files on the hard drive remotely

    • @p3rpl3x.nano68
      @p3rpl3x.nano68 2 года назад +1

      u can use a get command "get (filename)" that sometimes works

  • @Nausikhiya95
    @Nausikhiya95 2 года назад

    HI LOI CAN YOU MAKE VIDEO ON SEOX LANGUAGE

  • @jesled5312
    @jesled5312 2 года назад

    I am being targeted and have through 80+, 10 laptops, 5 printers
    Its outrageous!

    • @jesled5312
      @jesled5312 2 года назад

      80+ cell phones- different carriers with false personal info to see if that helped.
      I love your channel and learning alot, however can't freely try on my device. I need an expert
      Sincerely Jess

  • @itachi7976
    @itachi7976 2 года назад

    Bro can u pls make a video how can I recover my files from LLOO malware pls anyone

  • @tariqnoori9343
    @tariqnoori9343 Год назад

    How we can do on phone please

  • @gauravverma9505
    @gauravverma9505 2 года назад

    @loi sir how can recover other system password.

  • @madankhatri2080
    @madankhatri2080 2 года назад +1

    @whoisbinit is the best hacker from Nepal
    Rest in Peace Binit bro!!

  • @SiddharthSingh-gg7sb
    @SiddharthSingh-gg7sb 2 года назад

    When you are the first one and don’t know what to type

  • @dhavalsuthar1
    @dhavalsuthar1 2 года назад +1

    1st view , 1st like and 1st comment 🥰😍
    You are great sir I ever seen..✨❣️

  • @annabuono671
    @annabuono671 Год назад

    With a well up to date machine this can not be achieved !!!

  • @ProfessionalBrokeMemer
    @ProfessionalBrokeMemer 2 года назад +1

    how do recover deleted youtube video?

  • @mohibmirza7758
    @mohibmirza7758 2 года назад +1

    Hi dear..
    When I run the exploit command I receive the following error message.
    Rex::Proto::SMB::Exceptions::LoginError: Login Failed: Connection reset by peer
    [*] Exploit completed, but no session was created.
    Please guide what could be the possible reason and solution for this error.

    • @mohibmirza7758
      @mohibmirza7758 2 года назад

      @@Meganano sorry I didn't get you exactly.. I am using metasploit on Kali VM and trying same attack on Windows machine. Moreover, I had also tried another machine within same network. In both cases I am getting the same issue.

    • @rehmankhan6081
      @rehmankhan6081 2 года назад

      Bro. See this is possible with metasploit only if target is vulnerable to Eternalblue MS17-01. Also port 445 need be open. If neither is true, go for wondershare software to recover deleted files.. 👍

  • @KOMALPANWAR-cu2ou
    @KOMALPANWAR-cu2ou 8 месяцев назад

    can you please tell how to get deleted photos of android through email address

  • @waterandafter
    @waterandafter 2 года назад

    So? Is Hacker Loi helping Congress recover the Secret Service deleted Jan 6 texts?
    Good timing on this video.

  • @gaaajagg
    @gaaajagg 2 года назад +1

    I don't understand any thing for this Tutorial

  • @josephchuks7626
    @josephchuks7626 2 года назад

    Hacker Loi ! Can you please slow down a bit some of us are learning and are struggling to keep up, I normally have to exit after 2 minutes.

    • @yanechiko552
      @yanechiko552 2 года назад

      Just slow down to 0.75x speed lol. I like the way he speak. It's simple, quick and straight to the point.

  • @farisda3268
    @farisda3268 2 года назад +1

    Why don't you teach us how to hack and never get caught through our ip

    • @mohibmirza7758
      @mohibmirza7758 2 года назад

      use proxychains in TOR (The Onion Router) in Kali
      Use Tails Linux (Linux on USB drive)

    • @iqlessmemes4115
      @iqlessmemes4115 2 года назад

      Because it is illegal, and Hacker Loi is an ethical hacker.

  • @codali740
    @codali740 2 года назад

    The hospitality of USESPY is admirable. That's why you need to use their services on our own.

  • @hdcomputerkeith
    @hdcomputerkeith 2 года назад

    thanks for being awesome sir

  • @johncoleman6701
    @johncoleman6701 2 года назад

    It says host refused connection any tips

    • @tunei6987
      @tunei6987 2 года назад

      Yes because not every computer is vulnerable to eternal blue. Hacking is not that easy

  • @LithikaDamnodofficial
    @LithikaDamnodofficial 2 года назад

    thank you very much..

  • @moinazizi815
    @moinazizi815 2 года назад

    Gary McKinnon and Kavin

  • @himalwooli2682
    @himalwooli2682 2 года назад

    Please make a video how to find mobile phone with imei number

  • @goodtranscendence9587
    @goodtranscendence9587 7 месяцев назад

    Need help retrieving data from stolen phone

  • @rajanrawal6396
    @rajanrawal6396 2 года назад

    pls, could anyone help me to get his ethical hacking deleted videos..

  • @adnaan_al3pha
    @adnaan_al3pha 2 года назад

    If you are one question why you can't take Oscp because of you are master metasploit and master more tool 😉 if you oscp it is for you and for your resume and you learn new things

  • @ANONYMOUS-fi3dx
    @ANONYMOUS-fi3dx 2 года назад

    WAIT A MIN so u just used the target's ip and U GOT INTO THEIR PC ?

    • @rise5544
      @rise5544 2 года назад

      yeah but only if the target machine is vulnerable to the selected exploit

  • @팩트체킹모기
    @팩트체킹모기 2 года назад

    I don't even come here to learn about security. I come here to listen to his voice and I'm a heterosexual man.

  • @hashcat253
    @hashcat253 2 года назад +1

    The difference between a hacker and a script kiddie is a hat 🧢

  • @alirandhawa1578
    @alirandhawa1578 2 года назад

    Who enabled the 2x speed parameter on my laptop for this video?😐

  • @jesled5312
    @jesled5312 2 года назад

    80+ cell phones- different carriers with false personal info to see if that helped.
    I love your channel and learning alot, however can't freely try on my device. I need an expert
    Sincerely Jess

  • @flowerflower5344
    @flowerflower5344 2 года назад

    I want to be a female hacker but I don't konw where I should start and when things get harder I awlays end up giving up...I'm also a slow learner...

    • @d3cryptor745
      @d3cryptor745 2 года назад

      Great Things Take Time Dear, Patience is the primary key for becoming the master in Ethical Hacking.

    • @user-oc1qw6uf3m
      @user-oc1qw6uf3m 2 года назад

      You should start learning a programming language first like python, etc

    • @user-oc1qw6uf3m
      @user-oc1qw6uf3m 2 года назад

      ps: Giving up isn't a good solution, even if you learn slowly, it's better than giving up, it's not a race

  • @krishnashiva3866
    @krishnashiva3866 2 года назад

    Is it possible to recover deleted WhatsApp chats?i mean clear chats pls reply

    • @krishnashiva3866
      @krishnashiva3866 2 года назад

      Everyone says they will help.but truth is nobody can't recover it alredy experienced it.only thing they ask for tool fee after getting money they disappear.can anybody says is it possible or not

  • @jissjose1382
    @jissjose1382 2 года назад

    New knowledge using msf

  • @gamingonfire9859
    @gamingonfire9859 2 года назад

    Where is recovery

  • @noorallahhakimi462
    @noorallahhakimi462 2 года назад

    Can you mack about cryptotab browser hacking.
    Pleace 🙏🏻🙏🏻

  • @kamalsharma3085
    @kamalsharma3085 Год назад

    How to recover deleted files of android phone??