How Hackers Remotely Control Any PC?!

Поделиться
HTML-код
  • Опубликовано: 25 дек 2024

Комментарии • 764

  • @ManuelAltamirano-h9c
    @ManuelAltamirano-h9c 3 месяца назад +24

    Thanks!

  • @jcowill
    @jcowill 11 месяцев назад +83

    Helped me control the government mainframe to pay my grandma's medical bills! Thank you so much Loi!

  • @daanvk3264
    @daanvk3264 5 месяцев назад +31

    Everyone that is watching this video to protect their pc from hackers :)

  • @kevinhofmann1545
    @kevinhofmann1545 Год назад +15

    I have 8 backdoors on my old pc and hackers literally beef each other on my pc its literally so funny

  • @veniciogomes2428
    @veniciogomes2428 2 года назад +21

    Omg, you explained it very simply! It's really easy to understand. Thank you so much! I've always wanted to learn these.

  • @infalogger9697
    @infalogger9697 10 месяцев назад +10

    hacker loi is like that one cool friends dad who tells you some secrets but tells you not to tell anyone

    • @a24s44
      @a24s44 10 месяцев назад +2

      You know he's ur real dad 😂

  • @sviatoslavkovzik4336
    @sviatoslavkovzik4336 2 года назад +9

    Well i have been watching these tuts for like an hour straight and its just so interesting

  • @venkatesh.k7784
    @venkatesh.k7784 2 года назад +71

    Hii Bro how are hacker's easily buy passing the 2nd step verification?

    • @cirklare
      @cirklare 2 года назад +6

      Usually by ss7 vulnerability
      And hackrf1
      Edit: This is for sms verification

    • @jacoblessard8213
      @jacoblessard8213 2 года назад +16

      Not easily but there are ways. By stealing the victims cookies for any site, you can steal their session and import them into your own page which negates password and 2FA.

    • @UNcommonSenseAUS
      @UNcommonSenseAUS 2 года назад +1

      Easy

    • @UNcommonSenseAUS
      @UNcommonSenseAUS 2 года назад +4

      @@jacoblessard8213 correct., or ss7 or sim jack

    • @rednexie
      @rednexie 2 года назад +1

      @@jacoblessard8213 I can see which devices are logged in? EZ

  • @Certified_Bruh_Initiator
    @Certified_Bruh_Initiator Год назад +8

    Wait, so if we were to send this to a user, wouldn't they get suspicious why a simple fila needs so many permission?

  • @franciscoroca9444
    @franciscoroca9444 2 года назад +8

    is it possible to hide the .bat file with any kali linux tool? maybe as an image or pdf doc? thanx boss, absolutely amazing everything u teach us

  • @insanthat
    @insanthat Год назад +2

    4:26 can someone explain me that whats the domain ip how to make it or enter it?? please someone tell me what ip we are gonna give to a user to crack and remote his pc?

    • @jshy5423
      @jshy5423 Год назад

      i’m also trying to find out lol

    • @insanthat
      @insanthat Год назад

      @@jshy5423 i find out
      when you do that process you will get a ip use that

    • @ysl.niku777
      @ysl.niku777 Год назад

      @@insanthat what process?

  • @gerum_berhanu
    @gerum_berhanu 5 месяцев назад +7

    the guy [0:02] is remotely controlling someone's pc with a youtube video, huh

  • @ironpanv2124
    @ironpanv2124 Год назад +6

    When I run the launcher.bat file nothing happens, anyone know whats going on? A cmd pops up and goes away but in the empire terminal nothing connects. Plz help :/

  • @dwamenaemmanuel9694
    @dwamenaemmanuel9694 2 года назад +1

    Hi, I came from Brazil and this is perfect, I'm using after very easy, thanks!

  • @_error4O4_
    @_error4O4_ 2 года назад +3

    Now the powershell empire when running the command "sudo powershell-empire server" it says that:
    -"No such file or directory: 'dotnet'
    -"Plugin failed to run: csharpserver"
    Can you do another video with the same concept but with a different way from powershell empire ?

  • @niandrones1056
    @niandrones1056 2 года назад +7

    Love the content you have helped me loads with php and just showed me some really cool stuff! 👍

  • @Abhigady
    @Abhigady Год назад +2

    Hello Mr Loi... How can we detect and safeguard against such attacks ?

  • @vinayakgautam1058
    @vinayakgautam1058 2 года назад +3

    Very good video🏆🏆🏆. Thank you sir for so much information 🙏. You are just like a mentor to us

  • @fu2201
    @fu2201 Год назад +3

    Where do I get the malicious file to send??

  • @aryannialcala8977
    @aryannialcala8977 11 месяцев назад +1

    What application are you using?kali linux?

    • @juanchavez2122
      @juanchavez2122 11 месяцев назад

      Yes the operating system he is using is Kali Linux

  • @longlost8424
    @longlost8424 2 года назад +21

    you always crack me up when you show these kids how easy it is to access/take over a remote system. your tutorials are beautiful and spot on. as a followup to actions like this, how about a caveat of showing from the winders side, how to detect such breaches to the local security? just a quick idea suggestion, but 1 that I think, kinda, brings the idea full circle...... as always, looking forward to your next internet training adventure........

  • @tobao6455
    @tobao6455 Год назад +2

    even i dont understand a single thing , but man , I want to be like you !

  • @brian.-_393i3.-_
    @brian.-_393i3.-_ 2 года назад +1

    So insightful, many thanks!

  • @samin6797
    @samin6797 2 года назад +2

    I watch his videos only for him to say "It is literally game over right now !!!".

  • @Bitwise-Brain
    @Bitwise-Brain Год назад +1

    4:25 i didnt understood that they are entering the ip so how can i know that the ip with port number please help

    • @ysl.niku777
      @ysl.niku777 Год назад

      same question, did you figure it out?

  • @taiquangong9912
    @taiquangong9912 Год назад +1

    @Loi, how do you create your hacking labs.

  • @marks5850
    @marks5850 Год назад +2

    Yes you must be on the same network. However when I tried this microsoft defender stopped me. I'm sure there is a workaround?

    • @rens0315
      @rens0315 6 месяцев назад

      Did you find a workaround?

  • @anony_mars
    @anony_mars Год назад

    Wow very impressive Mr. Loi Liang Yang

  • @simonngoy4803
    @simonngoy4803 2 года назад +1

    Mr Loi but if windows defender is up to date the payload generated by powershell empire does not pass then how to bypass this?

  • @samsepiol3268
    @samsepiol3268 2 года назад

    This is perfect, now my brother will have no choice but to give me that money via online banking. Thanks man!

  • @Blossom-p7z
    @Blossom-p7z Год назад +1

    What is the name of the hacking operating system used

  • @charles5077
    @charles5077 2 года назад +5

    As always great content!!

  • @zolambunga5582
    @zolambunga5582 Год назад +2

    what app did he use to draw on screen during video?! pls someone hlp...

  • @The.M.0.7.1.1.8
    @The.M.0.7.1.1.8 11 месяцев назад +2

    Hello!
    I have a problem: what do I search on the web for my file to appear?

  • @juliusrowe9374
    @juliusrowe9374 2 года назад +5

    Loi, awesome content and tutorial sir! Thanks for sharing. Every time you post a new vlog I learn something pretty cool and new!

  • @gurejalectures
    @gurejalectures 2 года назад

    Is it possible to write a php or javascript code in such a way that as the visitor visit our website then our payload automatically install and execute at the same time? Is it possible?

    • @coopermarino2355
      @coopermarino2355 2 года назад +1

      No to execute code you would need to exploit a bug in the internet browser. And then that user needs to be using that browser and a version of it that’s exploitable

    • @gurejalectures
      @gurejalectures 2 года назад

      @@coopermarino2355 we can run shell commands using javascript in browser to execute our payload i think. What do you say?

    • @gurejalectures
      @gurejalectures 2 года назад

      @@coopermarino2355 shell_exec() or exec() or system() like this code

    • @coopermarino2355
      @coopermarino2355 2 года назад

      @@gurejalectures that runs serverside. Shell exec. Will execute on the server, as php is a server interperated language.

    • @coopermarino2355
      @coopermarino2355 2 года назад

      @@gurejalectures oh wait JavaScript not php. I’m not 100% sure but you shouldn’t be able to run she’ll commands with it

  • @rafeeqweideman3821
    @rafeeqweideman3821 2 года назад

    Very innovative video, just makes me want to some back-end languages!

  • @cyber_space09
    @cyber_space09 10 месяцев назад

    Good game you are amazing professor 🤝🎯

  • @raduab3409
    @raduab3409 2 года назад

    Waw my bro your computer science is about Love ❤️

  • @platiniumcbd4942
    @platiniumcbd4942 2 года назад +1

    When I downloaded the launcher.bat file and fired it up on windows I do not see the agent in my terminal....
    Has anyone had a similar problem ?

    • @okamiky401
      @okamiky401 Год назад

      Hello i have the same problem do you solve it ?

    • @DenisDennison-r9y
      @DenisDennison-r9y Год назад

      Do you use virtual box ir vm

    • @itsspiralll1265
      @itsspiralll1265 5 месяцев назад

      @@DenisDennison-r9y how would I download this?

  • @soresrekt7138
    @soresrekt7138 Год назад +1

    empire is a nice c2c tool ... used in a bunch of network exploiting labs some time ago ... easy to use and effective

  • @marcelloqueiroz7793
    @marcelloqueiroz7793 Год назад +1

    Most antivirus detect this kind of exploits even windows warns about executing bat files... but this tool is cool...

    • @daanvk3264
      @daanvk3264 5 месяцев назад

      Yes but my friends expect I put a .bat file that disables your explorer.exe task

  • @vikaspalcm-0045
    @vikaspalcm-0045 28 дней назад +1

    Is it compulsory to do in kali linux

    • @namishgaming9996
      @namishgaming9996 9 дней назад

      What kali linux should i download, there is a lot...

  • @shortfilms7636
    @shortfilms7636 2 года назад

    Im confused with this part of the video 4:21, can you help me out?

  • @learnlinuxwithmellwm
    @learnlinuxwithmellwm Год назад

    Final Spiderman dialogue 🤣🤣🔥

  • @_TheCraftylittleWitch
    @_TheCraftylittleWitch 4 месяца назад

    Can you still trace or have signs of the hacking showing up on the target computer after you are done?

  • @afiazaffarjarral
    @afiazaffarjarral 7 месяцев назад

    which applicaion?website are you using for coding in the vid??

    • @clyfar69
      @clyfar69 7 месяцев назад +1

      Thats kali linux

  • @staceyarsiotis2709
    @staceyarsiotis2709 6 месяцев назад

    Where can we get the programme pls list it

  • @JedidiahChukwunweike
    @JedidiahChukwunweike Год назад

    I don't get the part where you go to the browser
    How did you get there

  • @Musician_Robert
    @Musician_Robert 2 года назад

    You are the best Loi! ~ Thank you

  • @Prospex1
    @Prospex1 Год назад

    i dont get the part u type in browser and then download what is that

  • @Shadow_dtp
    @Shadow_dtp 26 дней назад

    my windows pc is asking me to update to windows 11 it even shows blue screen notification , do i update or not , idk if it's legit from windows

  • @zencibalina2926
    @zencibalina2926 2 года назад

    Excuse , is there a reason I don't have Pack on my soft soft?

  • @forceless9994
    @forceless9994 8 месяцев назад +1

    What is the name of the software?

  • @SureshDas-h5v
    @SureshDas-h5v 2 месяца назад

    Bro which software tools are you using for this but you have not telling

  • @endoplasmatischesretikulum4999
    @endoplasmatischesretikulum4999 4 месяца назад

    How do you get the credentials?

  • @dom_dude64_gaming
    @dom_dude64_gaming Год назад +1

    0:19 no I’m actually here to get rid of a menace to society

  • @firecrown710
    @firecrown710 Год назад +1

    Ok you showed how the remote access process is done. The question is about the security you have not shown. If someone falls into your trap and run the launcher then how can he get rid of you?
    Hope you'll answer😊

    • @DenisDennison-r9y
      @DenisDennison-r9y Год назад +2

      By deleting the launcher.bat

    • @GabeByrne-y2i
      @GabeByrne-y2i Год назад

      @@DenisDennison-r9yjett diff

    • @CecedanRara
      @CecedanRara 4 месяца назад

      ​@@DenisDennison-r9yhow to find launcher.bat in windows...

  • @SellGames
    @SellGames 2 года назад +1

    How do i know what link I have to enter?

  • @морс-ф3д
    @морс-ф3д 2 года назад

    Great tutorial👍👍👍👍👍👍👍👍👏👏👏👏👏👏

  • @fizzwaregaming8966
    @fizzwaregaming8966 Год назад

    Do you use that kali linux computer in vbox?

  • @zetce1
    @zetce1 Год назад +1

    Hello dear community. Im having a presentation soon and I picked this video because he explains the topic in such a way that literally anybody can understand it (just not me) I want to explain it right so my question is if I have to be in the same network as my target and if so how do I achieve this?
    Greetings from west sweden 😊

    • @OKBYE0
      @OKBYE0 Год назад +1

      use virtual machine

  • @rodrigogomessantos-suprema4609
    @rodrigogomessantos-suprema4609 2 года назад

    no windows firewall when you execute the file in the victim ? rss no anti-virus ? no pop-up message ?? :(

  • @AtrixRBX
    @AtrixRBX Год назад

    Do you have to have Kali to rdp win10?

  • @computer1steam317
    @computer1steam317 2 года назад +1

    completely love the video
    i have a question : what happens when the victim switch off the computer will you be able to access it while is off or on again

    • @Mohitkumar-ug8jq
      @Mohitkumar-ug8jq 2 года назад +2

      Difficult in this case but not possible if the main power is off.

    • @computer1steam317
      @computer1steam317 2 года назад

      @@Mohitkumar-ug8jq thank you looking forward for more videos

  • @faathirjsa6179
    @faathirjsa6179 2 года назад

    How to fix error failed to run plugins csharpserver in powershell-empire server

  • @Darknesss275
    @Darknesss275 Год назад +43

    A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *brian hacks online* . Every time you do a good job, you polish yourself one more time. Shine on mate, well done. Team Alex

  • @xxxxmateooo
    @xxxxmateooo 2 года назад

    4:23 I don’t understand what i have to put in the search bar please someone help!!

  • @MrCitizensArrest
    @MrCitizensArrest Год назад

    loi i have a problem when the victim(my 2nd pc) clicks and download's and opens the launcher.bat my server is not detecting it What Do I Do

  • @zakyy2k
    @zakyy2k 3 месяца назад

    hello loi, what software did you use for the script in this video?

  • @iknowimawesome1697
    @iknowimawesome1697 2 года назад +1

    Brother.
    Can you please tell me how hackers see hacked phone screen by vnc..
    Please answer🙏

  • @kidthesciencesid5955
    @kidthesciencesid5955 Год назад

    what ip does the target machine have to enter in the url? the server ip? and how to you find that info out?

  • @cinema4all645
    @cinema4all645 2 года назад +1

    the question is can we connect agian when the target off his laptop ?!

  • @juiceWRLDdid99
    @juiceWRLDdid99 2 года назад +1

    how to get the website?

  • @danielresitca4863
    @danielresitca4863 2 года назад +2

    I didn't get the web part, can somebody please explain ?

  • @dp7546
    @dp7546 2 года назад +2

    Hii sir how you know about these all tricks, le me know sir plz🙏

  • @AdityaRamesh-2006
    @AdityaRamesh-2006 9 месяцев назад

    Sir I thank u for teaching because by learning ethical hacking, I can help the victims by getting scammed by scammer

  • @Nausikhiya95
    @Nausikhiya95 2 года назад +1

    AFTER DOING YOUR COURSES WILL YOU GIVE US A CERTIFICATE OR ANY OTHER DEGREE THAT YOU ARE ELIGIBLE FOR TAKING JOB IN ANY COMPANY OR WORKING AS A ETHICAL HACKER

  • @anakui4550
    @anakui4550 Год назад

    what was that column linux thing?

  • @rodrigo1300
    @rodrigo1300 2 года назад +2

    I thought this video would be about gaining reverse shell from a system that is not in the same networking

    • @cirklare
      @cirklare 2 года назад

      You can do this by using ngrok
      And hosting the file to public server
      Like mega or mediafire

    • @rodrigo1300
      @rodrigo1300 2 года назад

      @@cirklare I know that's why I thought this would be the topic of this video. Using Nrok is also an issue because they'll know your public IP-address and then you're not anonymous anymore. Are you familiar with Whonix? I wonder if we can combine Whonix with Nrok to hack over the internet anonymously

    • @sahilshah9678
      @sahilshah9678 2 года назад +3

      Bro He disabled the Windows defender, real time protection and also using Internet explorer (out-dated) .. Any one have Answers How to make undetactable backdoor?

    • @cirklare
      @cirklare 2 года назад

      @@rodrigo1300 I know whonix
      But I think you can use proxy chain
      Or vpn with ngrok

    • @rodrigo1300
      @rodrigo1300 2 года назад

      You will have to obfuscate the payload, meaning you will have to make it so unique possible so that anti viruses don't recognize it.

  • @samurai_JD55
    @samurai_JD55 Год назад

    So even if you quickly change your password from your phone they can still access everything? Because my pc got hacked

  • @MedicalStudentChannel
    @MedicalStudentChannel Год назад +1

    is it possible to send the malware without a link or email, I mean just by public IP ? maybe using nmap, sql ?

  • @aktalla789
    @aktalla789 23 дня назад

    Can we do it from a virtual machine?

  • @sardarmuhammadzeeshankhan7814
    @sardarmuhammadzeeshankhan7814 2 года назад

    Which ipaddress and port number you used to open a file and then downloaded it, error in opening it, please assist

  • @jongustaitis9772
    @jongustaitis9772 Год назад +1

    I canot accsess the webpage it says its timed out

    • @marks5850
      @marks5850 Год назад

      same here. I put the host address x.x.x.x/launcher.bat in the target url and I get Hmm.. can't reach this page. Please help

    • @Jayeshuu-iv8xh
      @Jayeshuu-iv8xh Год назад

      Same as me it’s showing on webpage not found URL on this server

    • @jannamarie7458
      @jannamarie7458 8 месяцев назад

      I have the same problem. Have you guys figured it out?

  • @wellyalb
    @wellyalb 2 года назад

    basically the most common attack vector nowaday is physing. no matter how you protect your credential, sosial hacking always the top threat.

  • @DhruvClaire
    @DhruvClaire 2 года назад

    Can you tell us which software you use for hacking? It will work on windows? Or i need to download ubuntu or linux for this? Will this command will work with windows cmd

  • @hungong4568
    @hungong4568 2 года назад

    why can't i save the ip/launcher.bat it took too much time to reponse

  • @InternalWar1337
    @InternalWar1337 2 года назад

    So what if after starting apache and everything im getting a web error that says cant reach the page, did i mess up a step or am i a script kiddy?

  • @HeatCraftITA
    @HeatCraftITA Год назад +4

    If you restart the PC will the hacker lose the control of the PC? What is the best way to kick out the hacker if you have this problem?

  • @namankhetwal9940
    @namankhetwal9940 2 года назад

    Sir , I tried to follow through the procedure but i am unable to start the Apache servers

  • @GameSlayer80
    @GameSlayer80 Год назад

    Thats amazing❤ 5:31

  • @CoolPage994
    @CoolPage994 2 года назад

    What are modules you would use for android?

  • @AyushSingh-io5zl
    @AyushSingh-io5zl 2 года назад

    its not working for me on vm ware kali lunix does i have to boot kali lunix in my pc ???

  • @darkshow8512
    @darkshow8512 2 года назад

    sir i am getting as
    agents 0
    and
    listeners 0
    what should i do

  • @zer0six472
    @zer0six472 2 года назад

    😃wow great video 🤘🤘🤘

  • @Hoomeri
    @Hoomeri Год назад +1

    The website didn't work for me it could not connect to it

  • @EthanMckinnell
    @EthanMckinnell Год назад +1

    Good vid, informative to those people who don't want to be hacked and what signs they need to look out for, also i could see this being quite useful in many situations

  • @Nick-Brejcha
    @Nick-Brejcha 2 года назад +1

    can you show us how hackers control light or cameras or the traffic lights

  • @claudy777
    @claudy777 2 месяца назад

    Can we look at the screen while listening to things happening around?