I’m assuming you would have to install Linux on targets computer, Because with the Private IP, you still be able to get into it without braking into there fire wall. Can you explain?
Hello Mr. hacker Loi, I want to ask you where to start for build a base knowledge..if you have some books to suggest or a program language to start with..this channel is amazing and i did subscribe..TNX
Hi! A while ago, I tried applying for a job, and then this lady sent a link, saying it’s software that will be used in applying. So, I downloaded it to my PC and extracted it from the download folder. After installing it, a message popped up saying that my files were gone and I needed to pay to get them back. They are also threatening to sell it on DarkWeb. Is there any way to get my files back without paying? I can’t pay because I don’t have money and there’s no assurance that they will give back my files.
Sure, if you delete stuff everything is just marked. It will than get overwritten at some point in the future. A known recovery tool is Testdisk. You can restore partitions with that. If that is broken worse, we still have photorec which looks for the signature of files and restore it. Even if you write everything with zeroes (long format), companies might be able to recover data from these drives. They could replace the drives head with a more sensitive one and get some data off it. But you need a special room for this and the right hardware. Each technology is different, this was for old hdds. If you wanna be sure, destroy it!
USESPY, your content is so high quality. The field of cyber security is so saturated with grifters. But it seems like your very rarely miss. Your channel was an excellent find.
Do I need to have a malware like a backdoor on the target device to got the reverse tcp connection? Cuz I’ve tried it on my own personal system and is not working sir
Help… I want to ask how to I stop an mdm and a stalking ware I’m just starting school and watching all these RUclips videos but how do I gather the right info
If you do a factory reset and it permanently deletes all your files your telling me that you can look in your system and find the files that were deleted and migrate back in your computer?
80+ cell phones- different carriers with false personal info to see if that helped. I love your channel and learning alot, however can't freely try on my device. I need an expert Sincerely Jess
Hi dear.. When I run the exploit command I receive the following error message. Rex::Proto::SMB::Exceptions::LoginError: Login Failed: Connection reset by peer [*] Exploit completed, but no session was created. Please guide what could be the possible reason and solution for this error.
@@Meganano sorry I didn't get you exactly.. I am using metasploit on Kali VM and trying same attack on Windows machine. Moreover, I had also tried another machine within same network. In both cases I am getting the same issue.
Bro. See this is possible with metasploit only if target is vulnerable to Eternalblue MS17-01. Also port 445 need be open. If neither is true, go for wondershare software to recover deleted files.. 👍
If you are one question why you can't take Oscp because of you are master metasploit and master more tool 😉 if you oscp it is for you and for your resume and you learn new things
80+ cell phones- different carriers with false personal info to see if that helped. I love your channel and learning alot, however can't freely try on my device. I need an expert Sincerely Jess
Everyone says they will help.but truth is nobody can't recover it alredy experienced it.only thing they ask for tool fee after getting money they disappear.can anybody says is it possible or not
who is your favorite hacker?
David bombal lol
Godzilla
Loi u can't ignore that it's u !
Chloe O'Brien (from 24 - series)
do you know about china data leak or make a video about it?
Hacking is NOT illegal... Unless you don't own the network or have permission to hack it. Permission is the difference between ethical and unethical.
Then
So technically, ethical hackers are under supervision of law.
You talk about hacking so chill that made everyone believe it’s so easy. Love ur vids
Bro, im doing CyberSecurity and the fact that this type of information is free, drives me crazy.
😂😂😂👍
The teacher that teached Mr Robot how to hack, love your vids
Taught*
teached
@Tan Xiu Haw must I fighter you no it's fought
I’m assuming you would have to install Linux on targets computer,
Because with the Private IP, you still be able to get into it without braking into there fire wall. Can you explain?
If deleted stuff can be recovered that means that even if your sussy browser is deleted an expert can recover it 😳
Completely Anonymous is not possible but you can use vpn or secure browsers like tor browsers...
Which makes difficult to detect
@@adept-of-all thanks for the advice
FUCK I GOT TO RUN
@@5wholepizzas284 your best pick is to isolate yourself on an island to avoid fbi and cia government agencies...
how we gonna do that?
Whatever you delete it will be stored somewhere on the memory, so it can be recoverable. You can destroy disc but even that maybe can be recovered. :)
After watching the video , I switched back to 0:01 to see the facial expressions that you gave🔥. You gotta be an actor😂 Amazing ♥️
Man, I appreciate your videos... they are so good
but no need to suffer from cramps in the whole videos! you make!!
i did this in my class a few months ago. was cool to know that can be done.
How the Target is Connected to You ? By In the Same Network ?
Is It Possible To Recover Data Which Is Deleted Using Data Shredding Algorithms? If Yes, Then How?
Awesome tutorial Loi! Pleas keep them coming!
What is the best software to control the network?
route, and connect it to my computer system, will it be as simple as creating one track and play a composition through it, recording it, then
Best entrepreneur i have ever seen plus hacker. can you teach more about hacking out of youtube like your website!!! please
Hello Mr. hacker Loi, I want to ask you where to start for build a base knowledge..if you have some books to suggest or a program language to start with..this channel is amazing and i did subscribe..TNX
Important info! But then how can we really delete files?
Great episode, but you go so fast.. I'll have to rewatch ..slowly.. thank you HLoi
Me too I have to rewatch
Love from India 🇮🇳🇮🇳
HOW OLD FILES CAN BE RECOVER ??? PLEASE ANSWER
Hi! A while ago, I tried applying for a job, and then this lady sent a link, saying it’s software that will be used in applying. So, I downloaded it to my PC and extracted it from the download folder. After installing it, a message popped up saying that my files were gone and I needed to pay to get them back. They are also threatening to sell it on DarkWeb. Is there any way to get my files back without paying? I can’t pay because I don’t have money and there’s no assurance that they will give back my files.
very useful lesson.thank you Loi
i don't know why but whenever i try to exploit it shows exploit completed but no session was created, help please
what APP are you using?
Loi super vid...bit slow would be great .for us...
I don’t believe in data recovery but I think I should do now
How do you do this for all iPhone photos on a wiped iPhone?
Hi, for deleted files on my own drives I just use recuva. But can you also recover files, if I deleted the volume on a SSD?
Sure, if you delete stuff everything is just marked. It will than get overwritten at some point in the future.
A known recovery tool is Testdisk. You can restore partitions with that. If that is broken worse, we still have photorec which looks for the signature of files and restore it.
Even if you write everything with zeroes (long format), companies might be able to recover data from these drives. They could replace the drives head with a more sensitive one and get some data off it. But you need a special room for this and the right hardware. Each technology is different, this was for old hdds.
If you wanna be sure, destroy it!
USESPY, your content is so high quality. The field of cyber security is so saturated with grifters. But it seems like your very rarely miss. Your channel was an excellent find.
This exploit is not working if port 446 is close on target System
Does it apply to SSD drives?
Brother Google AdSense method available?????
Do I need to have a malware like a backdoor on the target device to got the reverse tcp connection? Cuz I’ve tried it on my own personal system and is not working sir
Do Mr. Hacker Loi use Kali Linux as daily runtime driver?
I knew this module before I watched this
Nice little refresher. Thank you hackkaaaa loiiiii
Can you show a method to obfuscate the payload?
Sir how could i upload a hacking demo without getting strike?
How do I get around this
Make a course on cloud... Plz
thnx for this vd and can you show us how to hack emails plz plz plz
How i contact you?
Where do you go then to the deleted files brother
Help… I want to ask how to I stop an mdm and a stalking ware I’m just starting school and watching all these RUclips videos but how do I gather the right info
Can you please do a updated video on how to download kali linux on windows 🙏🙏
Do you contract for ethical hacking
Or can you provide referrals
Sir make video on how to install window 11 or 10 in android basic smartphone or tablets please
Its crazy it's so easy I got to add that to my computer kit and the secure delete tool to
Sir, Please Please make a video on how to install Whole Metasploit just in Windows 10 like kali Linux
You can't
Or do you have referrals for my case? All my search engines block access to any help or direct me to illegimate sources. Please help. Much appreciated
dear ,
sir please tell me how to create fud payload to bypass all antivirus in 2022. And execute it in a mp3 or mp4 or text or pdf file .
If you do a factory reset and it permanently deletes all your files your telling me that you can look in your system and find the files that were deleted and migrate back in your computer?
I will never regrets meeting farish_hacker indeed his a good man
Is necessary that smb is running on that host
hey Loi i have this big problem on metasploit it keeps saying Exploit completed, but no session was created.What do i do.
I think FTK manager is more easy than this.
thank you so much , it worked 🙂
can these files be recovered after Bleachbit ?
Hackerloi please make video on complete autopsy tool in kali linux!!
Sir how I do recover folder or files in c drive ?
Hey bro is that possible to recover users home directory if it is deleted
Can u bring a tutorial for instal Linux the old trick not working please
Use the shred command and you'll be ok.
Can you do a video on how to download all the files on the hard drive remotely
u can use a get command "get (filename)" that sometimes works
HI LOI CAN YOU MAKE VIDEO ON SEOX LANGUAGE
I am being targeted and have through 80+, 10 laptops, 5 printers
Its outrageous!
80+ cell phones- different carriers with false personal info to see if that helped.
I love your channel and learning alot, however can't freely try on my device. I need an expert
Sincerely Jess
Bro can u pls make a video how can I recover my files from LLOO malware pls anyone
How we can do on phone please
@loi sir how can recover other system password.
@whoisbinit is the best hacker from Nepal
Rest in Peace Binit bro!!
When you are the first one and don’t know what to type
1st view , 1st like and 1st comment 🥰😍
You are great sir I ever seen..✨❣️
With a well up to date machine this can not be achieved !!!
how do recover deleted youtube video?
You can't
Hi dear..
When I run the exploit command I receive the following error message.
Rex::Proto::SMB::Exceptions::LoginError: Login Failed: Connection reset by peer
[*] Exploit completed, but no session was created.
Please guide what could be the possible reason and solution for this error.
@@Meganano sorry I didn't get you exactly.. I am using metasploit on Kali VM and trying same attack on Windows machine. Moreover, I had also tried another machine within same network. In both cases I am getting the same issue.
Bro. See this is possible with metasploit only if target is vulnerable to Eternalblue MS17-01. Also port 445 need be open. If neither is true, go for wondershare software to recover deleted files.. 👍
can you please tell how to get deleted photos of android through email address
So? Is Hacker Loi helping Congress recover the Secret Service deleted Jan 6 texts?
Good timing on this video.
I don't understand any thing for this Tutorial
Hacker Loi ! Can you please slow down a bit some of us are learning and are struggling to keep up, I normally have to exit after 2 minutes.
Just slow down to 0.75x speed lol. I like the way he speak. It's simple, quick and straight to the point.
Why don't you teach us how to hack and never get caught through our ip
use proxychains in TOR (The Onion Router) in Kali
Use Tails Linux (Linux on USB drive)
Because it is illegal, and Hacker Loi is an ethical hacker.
The hospitality of USESPY is admirable. That's why you need to use their services on our own.
thanks for being awesome sir
It says host refused connection any tips
Yes because not every computer is vulnerable to eternal blue. Hacking is not that easy
thank you very much..
Gary McKinnon and Kavin
Please make a video how to find mobile phone with imei number
Need help retrieving data from stolen phone
pls, could anyone help me to get his ethical hacking deleted videos..
If you are one question why you can't take Oscp because of you are master metasploit and master more tool 😉 if you oscp it is for you and for your resume and you learn new things
WAIT A MIN so u just used the target's ip and U GOT INTO THEIR PC ?
yeah but only if the target machine is vulnerable to the selected exploit
I don't even come here to learn about security. I come here to listen to his voice and I'm a heterosexual man.
The difference between a hacker and a script kiddie is a hat 🧢
Who enabled the 2x speed parameter on my laptop for this video?😐
80+ cell phones- different carriers with false personal info to see if that helped.
I love your channel and learning alot, however can't freely try on my device. I need an expert
Sincerely Jess
I want to be a female hacker but I don't konw where I should start and when things get harder I awlays end up giving up...I'm also a slow learner...
Great Things Take Time Dear, Patience is the primary key for becoming the master in Ethical Hacking.
You should start learning a programming language first like python, etc
ps: Giving up isn't a good solution, even if you learn slowly, it's better than giving up, it's not a race
Is it possible to recover deleted WhatsApp chats?i mean clear chats pls reply
Everyone says they will help.but truth is nobody can't recover it alredy experienced it.only thing they ask for tool fee after getting money they disappear.can anybody says is it possible or not
New knowledge using msf
Where is recovery
Can you mack about cryptotab browser hacking.
Pleace 🙏🏻🙏🏻
How to recover deleted files of android phone??