virus.pdf
HTML-код
- Опубликовано: 30 июн 2023
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Наука
Now I can send homework to my teacher!!!
😂 you are funny!
@@g.s.6255 The next day.......
teacher:hmm You got an A+...Excelent
you: phew
literally educational 😂
😂
Windows defender will pick it up immediately idk why he never mentions shit about defender picking up those easily detected shit
I adore how easily you explain stuff, I am SW engineer for 10 years but new to cybersecurity world and the best thing is that it's not boring for me witch explaining how TCP works. Great work dude!
What I don't like is that, there is a considerable difference between how we actually get hacked in real life, and how these demonstrations work. When a already downloaded PDF is trying to save another PDF and windows is clearly showing a very necessary warning, it is not how it is done. I am sure there are methods to evade these, but most ethical hackers will say "You are wrong, a lot a people actually fall for this". When someone gets hacked in real life it is a completely different story, especially if they are getting personally targeted. Show how to protect from those, instead of showing what Microsoft has already done something for.
Yeees, *uhm* save the others thats what i want to learn *uhm*
Yes, of course no one would show how they actually do it. Its an amazing skill and people wouldn't share it for free. The best way to learn is an internship or 1st hand with an ethical hacker.
@@ehack2 Udemy is a good place to learn
Hey Loi, are the courses in Udemy and YT membership different? And are they up to date?
The reason I'm asking this is that most of the Ethical Hacking or Penetration Testing courses on Udemy or other platforms are either outdated or purely theoretical.
try hack the box, it's hands on learning.
Dear viewers, no it's never as easy as this video is, those payloads are easily detected by nearly any AV cause of how frequently they're used so their signature is in every AV solution database sorry to bust the skids bubble 😂
If you cant bypass simple AV with all the stuff available you are less than a skid 😂😂😂
The Real problem, who show us you dont know the downside of this exploit, is the targeted OS/adobe version...
@@trustedsecurity6039 that too idk what has this channel has turned into he's the only one who got me interested in metasploit
@@trustedsecurity6039 I would love to know what "available stuff" cuz that doesn't make to much sense.
Its sad but this is the truth😂😂😂😂😂
Yes pdf exploit are all outdated ans detected by most of the avs.
There are private that work better but they are very expensive and hard to find. However excel exploits are a good alternative
great content it is always good to realize even pdf can include malicious code. the only thing i will say about it, you make it look like it is so simple but av and defender will detect that type of attack instantly. we will appreciate you mentioned that in the video and if you can also put the best way to avoid being detected so we can learn more. the video is awesome and your explanation too. thanks
You can solve by encrypt it against AV
@@JOKER-wz1nh how ?
@@CD-ir1mtby encrypting it
@@thomasspeer1388 Which program ?
@@JOKER-wz1nh no it doesn't work
It will only work in case the target uses adobe reader application for viewing pdf instead of web browser , thats how the vulnerability works :)
Take it to the next level dude . We deserve more than...Thanks
Yep
you should make 5 or 6 video series teaching on stuff like this so you don't have to explain sudo every time. I would also appreciate the series more because I'm looking for more advanced explanations rather than the light brushes on topics with the full explanation of stuff I already know
Would it be possible to go into the technical details of the vulnerability used?
The raw attack as shown in video has very slim chances to go, but combining this attack with other vulnerability could be very effective, it is up to your hacking mentality to figure out how could you make use of such attack
There is no way it could bypass windows defender
Why does it ask you to save and open if it is already saved and opened? That will make users leave the file alone.
You are my teacher sir, thanks a lot
All PDF files have a backdoor, even if the hacker or user did not add it in. No one knows who is hacking though. But I know the government uses it in their files to find out who is stealing their data. My friend found that out by downloading files from them.
I guess I need to send my pdf materials tomorrow before the meeting.
this is so far the best one you create !! i like it !! thx !!
Sir, Loi Lang Yang. You are Aaaammmmmmmaaaaaaazzzzzziiiiiiinnnnngggggg. Hats off to you
Nice video, keep up the good work
I have small question. What is shown above do i need network card with monitor mod enable? I meant i wwanna start kalilinux but i dont have enought resources now. So is networkcard with monitor mod enabled is necessary for hacking??
Is it possible to monitor and decrypt the network traffic of the machine and see the data that's being sent and received over the network?
not working ...
Does this naturally have persistence or if the user restarts the computer and doesnt open the file again will you lose access?
Thank you for making videos on cyber security for us
Mr. Hacker Loi is NOT a bad looking guy. But I got a nice laugh out of "Mr Hacker Loi is very handsome" 😂🤣😂🤣😂
Thanks Loi! I appreciate ya, man!
You forgot to tell us that good hackers never get caught, but if you do don't tell them you know Mr. Hacker Loi! 😁
Another good tuts. Sir can you make a tutorial on merging of payloads with files. Like pdf,doc and stuffs like that except APK cuz we know Metasploit already has the -x option to input the payload into an apk
watching this from jail
@hischiribunghiplesnitrungh4422 in a sense its true and in another sense its hillarious
@hischiribunghiplesnitrungh4422 im lovked out
@hischiribunghiplesnitrungh4422 are you communicating with other people in this comment section?
@hischiribunghiplesnitrungh4422 its satire... because if they let someone know inside they might get out.
Only Problem is the windows defender which blocks the file, means you have to somehow disable the target anti virus with a hotplug attack but for that you need to be at this pc or convince him idk
i "like" this video according to the website...
i also really enjoyes the video, and learned a lot.
who knew you can control a system with these techniques.
the internet is becoming such a complex place.
but it was php... and ive been on that website before.
Loi, awesome tutorial sir!
For anyone that didn't work. your device must be very vulnerable (no antivirus firewall , window defender ...) in order to work
What if the user didnt click save after double clicking?
Loi when you open a terminal it is opened on its separated plane icon and name But when I open a terminal it is drop downed how I can fix or customize it pleas make a video or replay to me
You missed one thing, this exploit only works with Adobe pdf reader
finally you are the one who told the truth
ya fr
Thank for the information.
First🥇
You should also teach how to avoid these types of scam
It would be far far better if you teach it at the end of the video
How can I hire you, to look at my PC and see if there is Virus, Keylogger, Open Port or Malware on it? How much do you charge per hour?
First viewer. Yayyy
How about disconnected to internet if the user turn off the wifi and open the files, the virus.pdf still work?
Both the hacker and Target system on same network???
that's good for understanding the concept but everybody knows that the the archive gets detected by the win10 firewall
One qestion this pdf file is only installed if victim put the url in the browser like you did or i can send them from email from whatsapp??
If the user closes adobe, does it close the conntection?
How can I fix my computer if I ever get under this attack.
Can you possibly do a video on images injected with viruses
i think it would be an interesting topic
Please make a dedicated course for Ethical hackers
Yo Loi wassup, thanks for creating such amazing content for free
hello sir, here i have some question,i confused how to use and which one terminal to use at window 11
Hey bro system can easily identify that pdf as a virus
Kepp gion brother from region kurdistan❤
Sir can you plz make a video for maintaining a metasploit session for ever.
please can u tell me the program name what u use to write on the screen like a board
what you dont explain is how am I supposed to take that file and send it in a email or social media message.
does windows defender or another antivirus can't detect this malware? how can we know that a pdf has an virus in it?
I’m pretty sure it doesn’t bypass windows defender
In my metasploit it says started reverse tcp handler on my IP, and that’s all, I can’t find where to go to the file
if the victim opens in mobile phone, does it work?. or is just work on the computer?
so how can you hide that warning that appears when the user opens the pdf file
Hey Loi I was wondering can we use the same payload on an android because i don't see any option right there for the reverse tcp for android in msf framework
true
Bro just truned off run time 😂😂😂
i thought it's gonna be another hacking tutorial, it turns out to be horror movie for straight 10:19 minutes
After opening the pdf file ..the interpreter is not showing in console
is windows defender turn off because this is easy or you are using magic msf. please teach me
Is it possible to send it as an attachment over email instead of hosting is on the web
what happen when someone closed the pdf ? is meterpreter session will be ended or not ?
So how did you get such an old version of Adobe Reader?
Ms. loi can you give me the drive ISO Kali Linux link? The problem is that I downloaded it on the web for a very long time. Thank you very much
Really good
Thank you ..❤..شرح مميز و راءع
Good luck
First
How can you access the Victim outside the network?
Why when I open the file in the windows machine it doesn't create the session?
Will be nice if you talk about defense against this type of attack
@linkedin3612would it execute the payload if the pdf opened on browser?
No it is a very old attack. Your system antivirus will trigger, your firewall would probably avoid the connection…
excellent tutorial. how could a user scan his pc to check for infections like these?
its outdated and the defense system will identify that this file is malicious
Most backdoors payloads and viruses can be detected unless modify it or else it will be deleted
Hi Loi! Is it possible to do this with my own custom crafted exe
great content
Where can i find the sudo msfconsole?
Can msfconsole work on android or i use msfvenom?
yo can you show us how to bypass the pop up when you want an app to run as admin
How do you show the options in this part: 7:26 ?
Love your video
can you make a video on how to disable the security opposing the installation of the malacious software cause windows securith immediately identifies it
Can you please tell us how to not be detected by windows real time protection ??
Well, It works good locally, but How it works externally over the internet without public IP?? And the mos important question is How we can handle It, how to find If we have been hacked by this payloads
can u make an episode showing using social engineering to send the file
was the defender turned on ?
@loilianyang
I am not sure whether you will reply to this message or not but
When I try to send the pdf the Gmail detects the virus and its also unable to download it from the receiver side
Thank you
nice camera bro
+respect
Hey Loi, could you please help a brother out?
So I used Kali linux several years ago and sort of remember this option that by pressing some keyboard shortcut enabled full screen terminal like interface.
It wasn't black like terminal, more grayish with white text I think.
That was my absolute favourite thing to use but so much happened that I had to focus on other things in life and now can't remember even the name of this function let alone the keyboard shortcut.
If you recognize what I'm talking about please let me know :)
I have already tried googling it, searching it on other engines. No trace what so ever.
Some kind soul mentioned it in a tutorial video and he also mentioned that this function was very oldschool.
Anyways, Thank you if you read all of this I really hope I'll find out how to do that again! :)
press F11
How to view these said suspicious pdf safely on linux?(if say i downloaded it from the internet)
How do i know if someone got a "open door" to my computer and how do i close that door? I received am empty PDF tonight(from a possible free lance client that reached me out in workana), and the person who send me asked to use foxit specifically, so when i tried foxit it asked to run cmd. I instant declined the permission and closed the pdf. But i guess my pc could be compromised already, how do i close that door and keep things safe from here?
Run Wireshark and see if any outbound connections are being made that are not from legitimate processes
it doesn't work in windows 11 why can you electrets it . I I appreciate that
People found out that apache isn't good to use.
All 4's for legal help. LOL!
Hello, can you make a tutorial on finding and exploiting CVEs?
When I got to open the webside it says "Site Can't be reached'. I aslo tried on other browsers,it also did not work. Can somenone help?
Can Malwarebytes detect if there is exe or what ever attached to pdf?
Thanks for sharing!
how can we stop that?
I mean.
what if that happened to me for example
what can I do?
and how can I stop it?
and actually, how can I know if that's happening?
What should I do if i want to share pdf to an android phone
mine is not connecting to the target computer
thank you
how you were able to run the file without FW block you? i used your steps and get blocked everytime.. i use VMWARE win11