How Hackers Remotely Control Any PC?!
HTML-код
- Опубликовано: 3 сен 2022
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Наука
Helped me control the government mainframe to pay my grandma's medical bills! Thank you so much Loi!
Omg, you explained it very simply! It's really easy to understand. Thank you so much! I've always wanted to learn these.
Love the content you have helped me loads with php and just showed me some really cool stuff! 👍
Well i have been watching these tuts for like an hour straight and its just so interesting
Hi, I came from Brazil and this is perfect, I'm using after very easy, thanks!
Very good video🏆🏆🏆. Thank you sir for so much information 🙏. You are just like a mentor to us
So insightful, many thanks!
Loi, awesome content and tutorial sir! Thanks for sharing. Every time you post a new vlog I learn something pretty cool and new!
empire is a nice c2c tool ... used in a bunch of network exploiting labs some time ago ... easy to use and effective
You are the best Loi! ~ Thank you
As always great content!!
Yes sir it was a value able lesson
Very helpful brother thanks
Thanks you so much hacker loi
I really learn a lots from you always
is it possible to hide the .bat file with any kali linux tool? maybe as an image or pdf doc? thanx boss, absolutely amazing everything u teach us
Prolly
make a shortcut to it and then you can edit the icon
Yes you must be on the same network. However when I tried this microsoft defender stopped me. I'm sure there is a workaround?
great work awsome you teach very well master :D
Hello you seem very experienced with this and was wondering if you can please help me out with a hacker on my pc
Most antivirus detect this kind of exploits even windows warns about executing bat files... but this tool is cool...
basically the most common attack vector nowaday is physing. no matter how you protect your credential, sosial hacking always the top threat.
amazing stuff. Thank you
Besides generating suspicious promps, Windows Defender and Security will flag that bat file as suspicious.
Thank you loi for your good tutorial ur the best
Very innovative video, just makes me want to some back-end languages!
Wow very impressive Mr. Loi Liang Yang
Hello dear community. Im having a presentation soon and I picked this video because he explains the topic in such a way that literally anybody can understand it (just not me) I want to explain it right so my question is if I have to be in the same network as my target and if so how do I achieve this?
Greetings from west sweden 😊
use virtual machine
Waw my bro your computer science is about Love ❤️
I watch his videos only for him to say "It is literally game over right now !!!".
This is perfect, now my brother will have no choice but to give me that money via online banking. Thanks man!
No one cares bout you and ur mfker brother
As we are seeing more hackers, is there a way to reverse the hack seeing that they have a port into your computer/phone? If yes, would you make a video.
Can you tell us which software you use for hacking? It will work on windows? Or i need to download ubuntu or linux for this? Will this command will work with windows cmd
Hello Mr Loi... How can we detect and safeguard against such attacks ?
Hi bro I'm subscribed can you show in detail which app and which code u use 😀
Now the powershell empire when running the command "sudo powershell-empire server" it says that:
-"No such file or directory: 'dotnet'
-"Plugin failed to run: csharpserver"
Can you do another video with the same concept but with a different way from powershell empire ?
Few tutorials on host header attacks pls
Good game you are amazing professor 🤝🎯
Great tutorial👍👍👍👍👍👍👍👍👏👏👏👏👏👏
completely love the video
i have a question : what happens when the victim switch off the computer will you be able to access it while is off or on again
Difficult in this case but not possible if the main power is off.
@@Mohitkumar-ug8jq thank you looking forward for more videos
TNice tutorials was easy to follow.
even i dont understand a single thing , but man , I want to be like you !
I have 8 backdoors on my old pc and hackers literally beef each other on my pc its literally so funny
Great explanation
Sir, can you make a video for network breaching in your next video?
What are modules you would use for android?
Sir I thank u for teaching because by learning ethical hacking, I can help the victims by getting scammed by scammer
Please make vd how to create payload bypass av and advanced techniques tools for red team
Appreciate your help
Big fan sir
And also
Taken course from udemy
Hi bro, I am your avid viewer and really adore your content! Only here a strange phenomenon calls to me, when I set up the server, the line of port remains empty and without a defined port and then in fact it is not possible to continue. It happens every time and no matter how much I tried to update the system or the network settings. Can you help me please? Thank you very much!
Your videos are just of great content to learning thank you
Hello Loi I have e question ?
Do you have a courses for hacking?
Good vid, informative to those people who don't want to be hacked and what signs they need to look out for, also i could see this being quite useful in many situations
what app did he use to draw on screen during video?! pls someone hlp...
hacker loi is like that one cool friends dad who tells you some secrets but tells you not to tell anyone
You know he's ur real dad 😂
Ok you showed how the remote access process is done. The question is about the security you have not shown. If someone falls into your trap and run the launcher then how can he get rid of you?
Hope you'll answer😊
By deleting the launcher.bat
@@user-mh1tj1no9bjett diff
can you move there mouse around that would be pretty cool to do
Hii sir how you know about these all tricks, le me know sir plz🙏
@Loi, how do you create your hacking labs.
Very good contents! More More More.........
Which ipaddress and port number you used to open a file and then downloaded it, error in opening it, please assist
😃wow great video 🤘🤘🤘
what ip does the target machine have to enter in the url? the server ip? and how to you find that info out?
hi i am big fan of you from india I have help from you that is pleace make video on how to install kali linux old version and slove the problem to install some packages like vile plesase 🙏🙏🙏🙏🙏🙏
he seems to make his videos alot like network shuck with all the drawing and stuff
can you show us how hackers control light or cameras or the traffic lights
Final Spiderman dialogue 🤣🤣🔥
Which coding app you are using
sweet man, i like your episodes
Ohh do I came accrosssss some kind of hacking method lol.... This is awesome let's try some more
Thats amazing❤ 5:31
But surely even a n00b wouldn't right click, save as a random file, especially a .bat which won't even have an executable icon, and then think 'oh best go to my DLs to run that batch file'. I can see you're super talented but it seems like a lot of work casting your bait with very little chance for success. Is there a way to do this without the end user having to physically DL and run a file? Appreciate the content dude
No
@@hxd9321 lmfao
hard no
learn wireshark guys
Hello!
I have a problem: what do I search on the web for my file to appear?
Do you use that kali linux computer in vbox?
how do u know what type of laptop or computer even desktop the person have?
Nice. But the likehood of a successful execution is, obviously, quite slim.
Mr Loi but if windows defender is up to date the payload generated by powershell empire does not pass then how to bypass this?
Now tNice tutorials was truly an aweso video. I love your thorough style
I plan on becoming a white hat hacker when I grow up but I dont know where to start I only fo minor computer repairs
long time no see brother make video on Android malware making
Brother.
Can you please tell me how hackers see hacked phone screen by vnc..
Please answer🙏
Wait, so if we were to send this to a user, wouldn't they get suspicious why a simple fila needs so many permission?
yes
That was awesome what kind of stuff should a new student to cyber security do to learn stuff like that?
How much would you charge to teach willing students all you the knowledge and adaptable tactics that you have
whats the name of the software you use
Thank you Lori imma send the link
Fam Kindly Post a video on zsh Permission denied fix
Nice vedio please Mr loi another tutorial for hacking mobile
how to get the website?
Where do you learned this crazy stuff
Hi bro windows supported rat program explained plz
which applicaion?website are you using for coding in the vid??
Thats kali linux
my apache2 server works just fine on the kali machine but when im switching to windows i cant come on the site
its nice to learn hacking, aswell as writing arabic at the same time!
other so called network pro channels should learn from this channel how make an actual learning and awareness content.
IT dept remote into user computer to install Anydesk, but it prompts admin right which requires to key in admin/password.
But IT cannot let the user know the admin password, how can we bypass it to install Anydesk for the user?
Or any way we can remote to the user's computer (which has admin right), to troubleshoot on software issue?
As the admin right will keep prompt for the admin password whenever we troubleshoot.
So what if after starting apache and everything im getting a web error that says cant reach the page, did i mess up a step or am i a script kiddy?
the question is can we connect agian when the target off his laptop ?!
Thanks bro it works perfectly 😂😂
AFTER DOING YOUR COURSES WILL YOU GIVE US A CERTIFICATE OR ANY OTHER DEGREE THAT YOU ARE ELIGIBLE FOR TAKING JOB IN ANY COMPANY OR WORKING AS A ETHICAL HACKER
Doing a good job is not always about impressive innovation. Sometimes it is only about doing something with plain dedication. Well done *Johnsonspy* . This message is to recognize your contribution related to hacking. Your commitment has been exemplary and your hard work is an inspiration to everyone around you.
Thanks *johnsonspy* for the remote access into target's complete phone activities
scam