Not easily but there are ways. By stealing the victims cookies for any site, you can steal their session and import them into your own page which negates password and 2FA.
4:26 can someone explain me that whats the domain ip how to make it or enter it?? please someone tell me what ip we are gonna give to a user to crack and remote his pc?
When I run the launcher.bat file nothing happens, anyone know whats going on? A cmd pops up and goes away but in the empire terminal nothing connects. Plz help :/
Now the powershell empire when running the command "sudo powershell-empire server" it says that: -"No such file or directory: 'dotnet' -"Plugin failed to run: csharpserver" Can you do another video with the same concept but with a different way from powershell empire ?
you always crack me up when you show these kids how easy it is to access/take over a remote system. your tutorials are beautiful and spot on. as a followup to actions like this, how about a caveat of showing from the winders side, how to detect such breaches to the local security? just a quick idea suggestion, but 1 that I think, kinda, brings the idea full circle...... as always, looking forward to your next internet training adventure........
Is it possible to write a php or javascript code in such a way that as the visitor visit our website then our payload automatically install and execute at the same time? Is it possible?
No to execute code you would need to exploit a bug in the internet browser. And then that user needs to be using that browser and a version of it that’s exploitable
Ok you showed how the remote access process is done. The question is about the security you have not shown. If someone falls into your trap and run the launcher then how can he get rid of you? Hope you'll answer😊
Hello dear community. Im having a presentation soon and I picked this video because he explains the topic in such a way that literally anybody can understand it (just not me) I want to explain it right so my question is if I have to be in the same network as my target and if so how do I achieve this? Greetings from west sweden 😊
completely love the video i have a question : what happens when the victim switch off the computer will you be able to access it while is off or on again
A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *brian hacks online* . Every time you do a good job, you polish yourself one more time. Shine on mate, well done. Team Alex
AFTER DOING YOUR COURSES WILL YOU GIVE US A CERTIFICATE OR ANY OTHER DEGREE THAT YOU ARE ELIGIBLE FOR TAKING JOB IN ANY COMPANY OR WORKING AS A ETHICAL HACKER
@@cirklare I know that's why I thought this would be the topic of this video. Using Nrok is also an issue because they'll know your public IP-address and then you're not anonymous anymore. Are you familiar with Whonix? I wonder if we can combine Whonix with Nrok to hack over the internet anonymously
Bro He disabled the Windows defender, real time protection and also using Internet explorer (out-dated) .. Any one have Answers How to make undetactable backdoor?
Can you tell us which software you use for hacking? It will work on windows? Or i need to download ubuntu or linux for this? Will this command will work with windows cmd
Good vid, informative to those people who don't want to be hacked and what signs they need to look out for, also i could see this being quite useful in many situations
Thanks!
hey bot
Helped me control the government mainframe to pay my grandma's medical bills! Thank you so much Loi!
Bro
@@memebomberLMAOCan Anyone Let Me Know The Software Name Which He Use To Type Command In It?
@@shariqxcheats kali Linux
An operating system
..?!
Everyone that is watching this video to protect their pc from hackers :)
I have 8 backdoors on my old pc and hackers literally beef each other on my pc its literally so funny
Omg, you explained it very simply! It's really easy to understand. Thank you so much! I've always wanted to learn these.
hacker loi is like that one cool friends dad who tells you some secrets but tells you not to tell anyone
You know he's ur real dad 😂
Well i have been watching these tuts for like an hour straight and its just so interesting
Hii Bro how are hacker's easily buy passing the 2nd step verification?
Usually by ss7 vulnerability
And hackrf1
Edit: This is for sms verification
Not easily but there are ways. By stealing the victims cookies for any site, you can steal their session and import them into your own page which negates password and 2FA.
Easy
@@jacoblessard8213 correct., or ss7 or sim jack
@@jacoblessard8213 I can see which devices are logged in? EZ
Wait, so if we were to send this to a user, wouldn't they get suspicious why a simple fila needs so many permission?
yes
is it possible to hide the .bat file with any kali linux tool? maybe as an image or pdf doc? thanx boss, absolutely amazing everything u teach us
Prolly
make a shortcut to it and then you can edit the icon
Make a shortcut that looks like chrome and wait
4:26 can someone explain me that whats the domain ip how to make it or enter it?? please someone tell me what ip we are gonna give to a user to crack and remote his pc?
i’m also trying to find out lol
@@jshy5423 i find out
when you do that process you will get a ip use that
@@insanthat what process?
the guy [0:02] is remotely controlling someone's pc with a youtube video, huh
When I run the launcher.bat file nothing happens, anyone know whats going on? A cmd pops up and goes away but in the empire terminal nothing connects. Plz help :/
try all underscores
Add time out 200-500 secs at the start and the end of the script
Or maybe it’s just cuz ur opening it on the same pc
Hi, I came from Brazil and this is perfect, I'm using after very easy, thanks!
Now the powershell empire when running the command "sudo powershell-empire server" it says that:
-"No such file or directory: 'dotnet'
-"Plugin failed to run: csharpserver"
Can you do another video with the same concept but with a different way from powershell empire ?
Love the content you have helped me loads with php and just showed me some really cool stuff! 👍
Hello Mr Loi... How can we detect and safeguard against such attacks ?
Very good video🏆🏆🏆. Thank you sir for so much information 🙏. You are just like a mentor to us
Where do I get the malicious file to send??
What application are you using?kali linux?
Yes the operating system he is using is Kali Linux
you always crack me up when you show these kids how easy it is to access/take over a remote system. your tutorials are beautiful and spot on. as a followup to actions like this, how about a caveat of showing from the winders side, how to detect such breaches to the local security? just a quick idea suggestion, but 1 that I think, kinda, brings the idea full circle...... as always, looking forward to your next internet training adventure........
Is this really your account sir?
even i dont understand a single thing , but man , I want to be like you !
Fr😂
So insightful, many thanks!
I watch his videos only for him to say "It is literally game over right now !!!".
4:25 i didnt understood that they are entering the ip so how can i know that the ip with port number please help
same question, did you figure it out?
@Loi, how do you create your hacking labs.
Yes you must be on the same network. However when I tried this microsoft defender stopped me. I'm sure there is a workaround?
Did you find a workaround?
Wow very impressive Mr. Loi Liang Yang
Mr Loi but if windows defender is up to date the payload generated by powershell empire does not pass then how to bypass this?
This is perfect, now my brother will have no choice but to give me that money via online banking. Thanks man!
No one cares bout you and ur mfker brother
What is the name of the hacking operating system used
kali linux
As always great content!!
what app did he use to draw on screen during video?! pls someone hlp...
Hello!
I have a problem: what do I search on the web for my file to appear?
Loi, awesome content and tutorial sir! Thanks for sharing. Every time you post a new vlog I learn something pretty cool and new!
Is it possible to write a php or javascript code in such a way that as the visitor visit our website then our payload automatically install and execute at the same time? Is it possible?
No to execute code you would need to exploit a bug in the internet browser. And then that user needs to be using that browser and a version of it that’s exploitable
@@coopermarino2355 we can run shell commands using javascript in browser to execute our payload i think. What do you say?
@@coopermarino2355 shell_exec() or exec() or system() like this code
@@gurejalectures that runs serverside. Shell exec. Will execute on the server, as php is a server interperated language.
@@gurejalectures oh wait JavaScript not php. I’m not 100% sure but you shouldn’t be able to run she’ll commands with it
Very innovative video, just makes me want to some back-end languages!
Good game you are amazing professor 🤝🎯
Waw my bro your computer science is about Love ❤️
When I downloaded the launcher.bat file and fired it up on windows I do not see the agent in my terminal....
Has anyone had a similar problem ?
Hello i have the same problem do you solve it ?
Do you use virtual box ir vm
@@DenisDennison-r9y how would I download this?
empire is a nice c2c tool ... used in a bunch of network exploiting labs some time ago ... easy to use and effective
Most antivirus detect this kind of exploits even windows warns about executing bat files... but this tool is cool...
Yes but my friends expect I put a .bat file that disables your explorer.exe task
Is it compulsory to do in kali linux
What kali linux should i download, there is a lot...
Im confused with this part of the video 4:21, can you help me out?
Final Spiderman dialogue 🤣🤣🔥
Can you still trace or have signs of the hacking showing up on the target computer after you are done?
which applicaion?website are you using for coding in the vid??
Thats kali linux
Where can we get the programme pls list it
I don't get the part where you go to the browser
How did you get there
You are the best Loi! ~ Thank you
i dont get the part u type in browser and then download what is that
my windows pc is asking me to update to windows 11 it even shows blue screen notification , do i update or not , idk if it's legit from windows
Excuse , is there a reason I don't have Pack on my soft soft?
What is the name of the software?
Bro which software tools are you using for this but you have not telling
How do you get the credentials?
0:19 no I’m actually here to get rid of a menace to society
Ok you showed how the remote access process is done. The question is about the security you have not shown. If someone falls into your trap and run the launcher then how can he get rid of you?
Hope you'll answer😊
By deleting the launcher.bat
@@DenisDennison-r9yjett diff
@@DenisDennison-r9yhow to find launcher.bat in windows...
How do i know what link I have to enter?
done
Great tutorial👍👍👍👍👍👍👍👍👏👏👏👏👏👏
Do you use that kali linux computer in vbox?
Hello dear community. Im having a presentation soon and I picked this video because he explains the topic in such a way that literally anybody can understand it (just not me) I want to explain it right so my question is if I have to be in the same network as my target and if so how do I achieve this?
Greetings from west sweden 😊
use virtual machine
no windows firewall when you execute the file in the victim ? rss no anti-virus ? no pop-up message ?? :(
Do you have to have Kali to rdp win10?
completely love the video
i have a question : what happens when the victim switch off the computer will you be able to access it while is off or on again
Difficult in this case but not possible if the main power is off.
@@Mohitkumar-ug8jq thank you looking forward for more videos
How to fix error failed to run plugins csharpserver in powershell-empire server
A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *brian hacks online* . Every time you do a good job, you polish yourself one more time. Shine on mate, well done. Team Alex
scam
4:23 I don’t understand what i have to put in the search bar please someone help!!
loi i have a problem when the victim(my 2nd pc) clicks and download's and opens the launcher.bat my server is not detecting it What Do I Do
hello loi, what software did you use for the script in this video?
Kali linux
Brother.
Can you please tell me how hackers see hacked phone screen by vnc..
Please answer🙏
what ip does the target machine have to enter in the url? the server ip? and how to you find that info out?
the question is can we connect agian when the target off his laptop ?!
how to get the website?
I didn't get the web part, can somebody please explain ?
did you get it?
Hii sir how you know about these all tricks, le me know sir plz🙏
Sir I thank u for teaching because by learning ethical hacking, I can help the victims by getting scammed by scammer
AFTER DOING YOUR COURSES WILL YOU GIVE US A CERTIFICATE OR ANY OTHER DEGREE THAT YOU ARE ELIGIBLE FOR TAKING JOB IN ANY COMPANY OR WORKING AS A ETHICAL HACKER
what was that column linux thing?
I thought this video would be about gaining reverse shell from a system that is not in the same networking
You can do this by using ngrok
And hosting the file to public server
Like mega or mediafire
@@cirklare I know that's why I thought this would be the topic of this video. Using Nrok is also an issue because they'll know your public IP-address and then you're not anonymous anymore. Are you familiar with Whonix? I wonder if we can combine Whonix with Nrok to hack over the internet anonymously
Bro He disabled the Windows defender, real time protection and also using Internet explorer (out-dated) .. Any one have Answers How to make undetactable backdoor?
@@rodrigo1300 I know whonix
But I think you can use proxy chain
Or vpn with ngrok
You will have to obfuscate the payload, meaning you will have to make it so unique possible so that anti viruses don't recognize it.
So even if you quickly change your password from your phone they can still access everything? Because my pc got hacked
is it possible to send the malware without a link or email, I mean just by public IP ? maybe using nmap, sql ?
No
@@nocturne2172 so only by email, usb etc...?
Can we do it from a virtual machine?
Which ipaddress and port number you used to open a file and then downloaded it, error in opening it, please assist
I canot accsess the webpage it says its timed out
same here. I put the host address x.x.x.x/launcher.bat in the target url and I get Hmm.. can't reach this page. Please help
Same as me it’s showing on webpage not found URL on this server
I have the same problem. Have you guys figured it out?
basically the most common attack vector nowaday is physing. no matter how you protect your credential, sosial hacking always the top threat.
Can you tell us which software you use for hacking? It will work on windows? Or i need to download ubuntu or linux for this? Will this command will work with windows cmd
why can't i save the ip/launcher.bat it took too much time to reponse
So what if after starting apache and everything im getting a web error that says cant reach the page, did i mess up a step or am i a script kiddy?
If you restart the PC will the hacker lose the control of the PC? What is the best way to kick out the hacker if you have this problem?
Sir , I tried to follow through the procedure but i am unable to start the Apache servers
Can you please help?
Thats amazing❤ 5:31
What are modules you would use for android?
its not working for me on vm ware kali lunix does i have to boot kali lunix in my pc ???
sir i am getting as
agents 0
and
listeners 0
what should i do
😃wow great video 🤘🤘🤘
The website didn't work for me it could not connect to it
Good vid, informative to those people who don't want to be hacked and what signs they need to look out for, also i could see this being quite useful in many situations
can you show us how hackers control light or cameras or the traffic lights
Can we look at the screen while listening to things happening around?