do not open this file!
HTML-код
- Опубликовано: 9 апр 2021
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. Наука
Like, share and subscribe!
Make video using persistance with meterpreter payload
But how to hack without sending any links?
What about anti virus detection of those payloads?
Also please make video on persistent usung this payload
@@abhinavgamercr1419 it was windows 10 pro.
Hi! How Can I watch your Member Only Videos? Please Tell Me. Thanks
Thank you Loi for easy and simple tuts :)
I have to sleep to go to work, but i cant stop watching his content
same here
Same here lot of knowledge
It's 4am lol but idc i watch
Exactly me too I have studying tomorrow 😪
Same xd
Loi could you please tell what were you using for the url the client or the host inet?
I'm currently doing a cybersec course and also an eh and just starting, thankss a lot for your help
Awesome! Looking forward for the Os X version
Your intro soundtrack is always the coolest.
I'm definitely joining.. As soon as I get paid... Needed you when I was like 20 years old.. Just gotta put on CC u speak so fast.. Lol.. But I love your work.. Thank you
You can literally see every single transaction with the Meterpreter command. Excellent video, Mr. Yang!
From which comand
@@HaiderAli-mp1qq Merter pr ter
I feel like this is the first video where I actually understand what is happening and how to follow along
_As long as you keep it by hacking your self lol_
@@heesel4089 of course!
Man u are amazing I have learnt a lot from you and I got no words to express my thankfulness
@@Kev.Innovation learned and learnt can be used interchangeably. You should have researched that before commenting XD
@@Kev.Innovation explain where's the joke.
@@Kev.Innovation yeaaa it's a joke, wow !
Thanks we need a completed course with more series
so , thank you for this part
my question is after getting any file how can analyse and clean file from any damage and uses very carefully ???
I read the metasploit thing as I love clam lol then noticed it was I love shells
You'd have to do some seriously good social engineering to get someone to both click on an unknown link, download a file and then run that file! This is hacking from the 1990's
And that is good, for a hackers perspective maybe not. But it's great that most av's gets better and better. But you can get kids to download anything easily without any effort in social engineering
@@CaptainSlaymore Exactly, social engineering in a hackers best tool. Because computers aren't supposed to have emotions, sympathy or anything like that. They are coded to be computers that read 0 and 1.
People on the other hand have all kind of emotions, greedynes, sympathy and so on. That means if u trick a human into letting you use your exploit on them. U have mastered the manipulation scheme on a whole new level where nothing can stop u as long as you put effort into manipulating humans.
@@ductabeats284 People will always be the weakest link in any security. I tend to look more towards server-side attacks than client-side these days. In our company, we send phishing emails to all employees every 3 months or so and if they fall for it, it takes them to the training portal where they have to sit through training and a test on social engineering! :)
@@MrRobot222 Wow thats actually really smart! Also it's great to hear they dont get punished for falling in the trap, I'm glad to hear they learn how to protects themselves against these type of attacks. :)
@@ductabeats284 Thanks, wasn't my idea though. But it's working as every time, there are fewer and fewer people clicking through.
Thanks for the lesson.
Lio sir I am big fan of you I naver miss your videos thank you to give more information thank you so much
I have a question I am on parrot os and to just give my system a check I used lynis audit system to see vulnerability and it gave a lot of warnings and it said somethings to fix the warnings but I didn't get them even a bit so can you please like tell me or show me how to like totally make my os secure??
The technique's good..but mostly nowadays hackers are more into using their own custom scripts rather than using metasploit, and plus, unm the tutorial is using private ip classes that means both pc's are in the same network(virtual machine & linux), if someone would need to do it in real internet..they may have to Port forward it & there's antivirus too nowadays So..its a bit more tricky than that...Good Video Though & Good explaination :)
do you know how to do it across networks? if so.. how! (or where is a good book/course/tutorial etc)
@@sefiyt12 yeah Port Forwarding is Easy, you can check out "Ngrok", if you wanna do that
@@divakarbisht7951 Hi, would you be my sensei please
@@redabelkacem6437 i can be your sensie
@@bestinbabu4244 yes please do you have discord ?
Thank you Teacher Loi Liang Yang.
Very nice videos! Keep it coming
What build of Windows 10 was the victim machine ?
Nice video bro 👍👍
This won't work in newer version of windows, defender is more than necessary to stop these kind of attacks.
Great video. Does this crafted link work out the hackers' network?
Does the ordinary user is able to launch it ? What about UAC ?
Can you do a video on the actions we can do plss?
I watched the video too
And wasnt cleared enough
But Alex is really good with tech stuff
So I hired him to help me on that
you make me laugh, when you said (GAME OVER) hahahhaa
I love your content, I have started in this beautiful world of content on RUclips, I am new to this and here we go with issues of cybersecurity and ethical hacking
i feel proud when my computer denied this attack 🤣🤣🤣😁,i feel little bit safe😂
Lol
,🤣🤣🤣🤣
Nice, what happened when you tried to run the attack? Windows defender popped up?
Isn't the file detected by the antivirus on the attacked device?
yes the file was but u need to off real time protection it is only way u can download payload it work
thank you so much, sir for easy and simple tuts
Can you bring a playlist to pentest, cyber security or ethical hacking
Very helpful for me.
I like and share this video.
And I already subscribe your channel.
Love 💕 from Pakistan.
Does it in 1 second less. Such a boss!
Nice video bro.....
Bro how to edit android payload according to the permission of binding app.....please make a video on that
does it only work in the same network or it works long distance too? for example if you are in New York and i am in Miami.
I have done similar things like this I would like to know how to gain access without needing them to run the file.
@da lo I have only tried this on hosts created by me
@@darklord2105 nice , im tryna find a group to hack with..help
Let's make things clear.
It's not about clicking a link. You can click any link you want. The next steps are the problem. Will a user install an unknown file? The majority of systems will tell the user they are doing something silly. So, while this can work, is becoming less probable with time. When the target is a company employee even harder as they don't have admin rights, so even if they go the next steps they can't install anything.
Yes. Best not to click the link but if you do, no problem, what you do next is the problem.
eh you need to know beef
@Marcus Kwon well yea ur friends are not going to call the cops bc u hacked them
This is supposed to be a basic introduction for teenagers. He gives flashy clickbait titles to attract viewers, however his methods are old and already patched on most systems post 2010. It would be highly illegal for him to show modern hacking methods on youtube.
@@demetter7936 true I guess he really can't thanks for sharing
Good mic and good teaching
i'm french, you are best, Merci tu es meilleur
Do part 2, on what you can do after your successfully penetrate the system
you don't really need metasploit though.
and without remote code exploit it is kinda eh as a lot of user won't just run a random executable.
What happened to the good old days of port scanning and fingerprinting and looking for exploitable services
Before even attempting this social engineering type of stuff.
Sending files and links isn't hacking lol
@@unicornmilk8116 yeah it's called spying someone system by installing the executable file
@@sathishsmady6051 that's called social engineering and is usually apart of every special engineering kit.
This isn't hacking.
@@unicornmilk8116 well said
These videos are clickbait to attract edgy teenagers who wanna hack their friends. His "hacking" methods are old and outdated since most OS's will catch the exploit and it won't work on systems outside your network without portforwarding anyway. No modern methods of hacking will be shown on youtube, since its illegal.
man ur explanation is fast and ez tysm
Man you are one of the most awesome hacker on youtube ! keep it up !
3:01 not exactly accurate is it? You need to download and install the program first?
Yeah, like opening a .exe
@da lo Sorry yeah, I tried to say "open the file" not install, mistyped. Not too far from installing though.
Where is defender? Did you disable it? It is detecting anything with msf.
Defender will 100 persent detect snd delwte this
He just assumed it gone and the victim being cheerful welcoming.... welcome hack my pc would ya... Lol
@@qantum251 what are the chances that's gonna be the case irl
@@r.i.j.brighton716 if you're a little kid and they want hacks for free on a game like gta or something they will download anything if they follow the video on how to do it they could get you to turn the windows defender and windows tamper protection off and the hackers can easily get access
@@steezykane4738 only if it's a "little kid" but kids are quite smart these days tho , I don't think they will turn off windows defender cuz some random mate online told them too
Awesome video! Is there a similar way for Android devices or iPhones?
Very interesting video.
That link can work only on a LAN network ????
On Can work on WAN network ?
waww thats cool, but what about if someone have a very strong fireWall and protection ;)
I make an analysis for vulnerabilities and if you are not patched nothing recently I would in..
It’s reverse tcp so firewall isn’t really a thing
Mostly the offers which say that spotify for free or Netflix for free they firstly say to turn off the firewall or any defending application then only it starts downloading the file
This may be done by some sense of social engineering
Reverse tcp
If we click those malicious links or file it's shows warning message...is there any better way to ignore those warnings at victim side. ??? :)
That's a great question.
This is the part where your social engineering skills pays off.
@@bestprogramming9842 Or good encryption software that can make the payload hide from most AV's.
Not really. HTAs are a known attack vector. Most browsers have protections and AV knows about them too. You can obfuscate the payload, but delivering via HTA will always prompt users with a warning
It's the coolest ethical hacking channel on youtube! Thanks a lot
Hey Prof Loi , You see guy like me a beginner, from where I should start?
What language you do recommend that helps in hacking ?
Thank you for sharing us these information ❤️
Even if I open it Kaspersky will take care of it.
U don't even need Kasper key or any paid av , windows defender is smart enough to identify these signatures
@@r.i.j.brighton716 windows av is garbage compared to Kaspersky.
@@Interestingworld4567 I'm not comparing both , what I ment was this stock payload can even be detected by windows defender
I am using backdoors when accessing offline servers.
How do you use and make back doors
@@mayhem1994 leave one port with admin priviledges open with pass only you know
That easy aye hm ima go run some tests now
can u plz tell me the network setting for kali linux?
I do not understand completely, but i have taken the first step. 👍
1-->how to download files from The victim computer
2-->how can i control user interface
Also my problem
Need help
Using social engineering
He skipped a huge step and that's the social engineering step to get the target to download the malicious link.
But this is not an ideal situation as most of the time that file will be flagged by the windows antivirus and will try to delete the file from the system.
Also this is pretty simple to track back to, so if anyone seriously used it the police would investigate you immediately
Very true
wuaoo excelente, nice too meet you!!
Cool, indeed!
One thing tho.. Can you make the link look like a website, just to be having its dns and not just numbers?
This payload won't work guys, windows defender won't even let it install it will delete it automatically
exactly, it aint that easy as knowing an ip and running meta
Try it on Kali for practice
Also try disable Windows defender
Lol script kiddies.
You dont need meta and yes it is as easy as knowing someone IP.
Then lookup/whois.
Portscan
Fingerprint
Use that info to find any known exploits on the running services/daemon.
Compile exploit with a few tweaks or run exploit and backdoor and clean.
No exploits, then you are into looking at trusted networks (exploit them to gain access to your target machine)
Social engineering (which is this kinda meta stuff of sending files and links to create a reverse TCP connection blah blah blah)
God damn it kids go read a book and learn.
@@kwamenkrumah2224 disabling services? Lol n00b
Fud the payload, or write your own and defender/anti vir won't have a signature of your payload.
@@unicornmilk8116 ofcoure I'm noob☺
I thought metasploit is the safe program, I saw on telegram people posting.
My pc recently got hacked.... I install a new windows.. Even tho I didn't install any malicious app after the new window installation... I still feel like something is wrong with my pc....How can I completely remove his access from my pc...Does deleting malicious files will help me recover my pc? Can anyone please help me 😭😭🙏🙏🙏... And sorry for my broken English
only think that could help is a hard reset of your disk, so remove your hdd/ssd from your pc and connect it via USB (look in Amazon for ssd/hdd adapter) to another PC and then deinstall with a software everything. You have to take a software that format with binär, it will replace all 1 in to 0, that's the safest method to delete something
If you reinstalled windows you did format your hard drive, which means everything's now okay. If you have more than one HDDs though, you need to format all of them. Actually, you need to format just the one that opened the virus.
@@asdfq90 thank you
@S3RITY B3KR The hacker took full control over the pc and deleted all my files and other application... Eventually my bank account and other important credentials is still safe
can someone hack our computer, just by knowing our ip address?
I don't understand hacking and coding 😂 but love to watch 😂
Great Video. But what about MACOS exploits.
Mr. Robot in nutshell
I need a gmail account hacker plz help me
What is the software you use? Kalitix?
It's stuff like this why I use a virtual machine to avoid this issue. But I'm wondering if that would still unsafe as well. I know that once hackers check my system specs and see that it's virtual box they're probably going to want to dig deeper into my hardware. I've been using Parrot linux in virtual box with tor browser when I browse websites i'm not as comfortable in.
Welcome into the dark Side of the Internet.
Where you for me are a Wizard ,who brings the light into the dark.
So I want to thank them for this video and hope that they will brighten into darkside with many more videos.
Basic antivirus: I'm about to end this whole mans career
do it for WAN
i need explaination with a connection diagram that how client listens on port.. server connects and how they communicate.
because when working over WAN many get issues for lhost and rhost. i hope u understand what i am trying to say. lets hope u make a video on this
good tuto ,interesting !please how can'i send this URL to the users?
That's awesome 😍
*tells people to download malicious program*
"Now we have full access in 4 minutes 44 seconds"
Literally every anti virus: "Im gonna stop you right there, a .html file without any html code? KINDA SUS"
Sir Loi, how about the "MITM" technique. Stay strong sir.
loi luang yang@ I’m a newly subscriber and I realize your on using Linux for your hack is there a specific reason for that?
hahahahhahahahah
I love you script kiddie Videos!)))
Next videos is "How to exploit SMB ver 1" :))))))
Metasploit eternal blue duh
Thank God someone else laughed lol
Nah bro next we will be teaching how to fud sub7 to install a trojan. Sorry I mean badass l337 backd004
This is just clickbait. The victim has to disable his antivirus and download and execute a file. That’s not hacking! You can also say, I can delete all your data from remote, just type format c: !
Bro is so good at hacking that he isn't scared to show his IP address lol
your certified from where? have you done any paid course?
Your the greatest youtuber to exist im never gonna stop watching
Edit: imma go hack myself real quick tho
Les goooooo
but can you modify files or do other stuff from here?
How can I join membership
*I never knew there was a pro and good hearted people like Q22CRACKS^
Nice video
Is it possible to trace back the hacker in this method.
How to protect from these type of links if you click what to do to remove these
Thank you boss
nice sir i video full watch to very amazing 🤗
what software do you use please
Thanks for the video, god bless
Which software u are using
thanks for you explication you are the best
Sir what kali linux version your using??
Hello, I am new here. I wonder how can I access the course you said? Because the link you provide in the description is RUclips and I don’t know after I pay I will get the video or other things or not to learn from the course. If @Loi Liang Yang know or anyone please respond back. Thank you!
Hey , i have a question, this computer was on the same network so you cant get access of any computer as you claims!
As any computer will be on another network so it needs router that accept port forward ? Right ?
Can I get session of android using these idea ?
is the server we made a clean for win 10 and totalscan ??
What commands do I type to start controling the pc I mean which command to log into his pc
And as is so often the case the weak link turns out to be Layer 8…
Is it with most of the hackers that they find it difficult to be a developer when you think so 😂