Remotely Control Any PC in 4 mins 59 seconds

แชร์
ฝัง
  • เผยแพร่เมื่อ 16 พ.ย. 2024

ความคิดเห็น • 331

  • @vivekpandey95
    @vivekpandey95 ปีที่แล้ว +763

    Yeah I would totally use this for "educational" purposes and with "good intent" and "permission"

    • @MohammedHK876
      @MohammedHK876 ปีที่แล้ว +46

      *FBI wants to know your location*

    • @vivekpandey95
      @vivekpandey95 ปีที่แล้ว +17

      @@MohammedHK876 I am not Kevin Mitnick, please spare me

    • @xz7665
      @xz7665 ปีที่แล้ว +8

      @@MohammedHK876 it's in your sister house

    • @MohammedHK876
      @MohammedHK876 ปีที่แล้ว +1

      @@xz7665 *Arrest my Sister*

    • @TheMessanger
      @TheMessanger ปีที่แล้ว +1

      @@MohammedHK876 Yeah they said that now days all you need is teamvier or opps can mention the other one is too powerful no need to use all those command social engineering hacking is the new way.

  • @mattyharkin5787
    @mattyharkin5787 ปีที่แล้ว +243

    Such a nice idea if you already had control of the target machine. I expect more Loi

    • @astro3
      @astro3 ปีที่แล้ว

      ​@Baylen Levine Shorts how? it's your fault for clicking on the video even if you already had remote control access stupid

    • @astro3
      @astro3 ปีที่แล้ว

      how? it's your fault for clicking on the video even if you already had remote control access stupid

    • @kythrathesuntamer9715
      @kythrathesuntamer9715 ปีที่แล้ว +6

      still useful if you end up somewhere where you have access to other internet connected pcs. like a college library.

    • @pkal8251
      @pkal8251 ปีที่แล้ว +8

      Couldn't you setup everything on the hackers computer, then obfuscate a .bat file into a photo, or pdf, send it to the victim, and when they run it, successfully execute all commands?

    • @random-user-s
      @random-user-s ปีที่แล้ว +1

      third rule: Have fun in cyberspace and meat space.

  • @player-oe1sk
    @player-oe1sk ปีที่แล้ว +46

    "that's the password I use for all of my accounts" 😂😂

  • @koggism
    @koggism ปีที่แล้ว +55

    You need access to the windows machine - which sort of says if you do then you can install any remote software you please anyway - if you have admin. Not to mention getting through the firewall by opening a port on 1234. But yeaj certutil could be usfull

    • @jayy2k5
      @jayy2k5 ปีที่แล้ว +5

      Yeah I too agree with you amigo, also NC will be captured by windows defender...

    • @marcopierini2748
      @marcopierini2748 ปีที่แล้ว

      you can use a rubber ducky

    • @deadsouI
      @deadsouI ปีที่แล้ว +3

      No you don't he is showing an example you can just code anything and ship it with this software, and then run the command on execution and the end user will never know, as with any remote software like you say the user will always notice, and I don't think you understood it at all, the port is opened on the attackers side. The victim is a client does not need any ports opened.

  • @iainmaois595
    @iainmaois595 ปีที่แล้ว +154

    But you would still need access from the target machine for you to be able to execute command.

    • @georgejohny4800
      @georgejohny4800 ปีที่แล้ว +21

      well, He is actually showing ways to get a NC connection. One could write all of these commands in a notepad and run it as a batch file program on the target computer. I don't know that writing all the windows command line code in a batch file would cause it to be flagged by an antivirus program.

    • @freaktheman
      @freaktheman ปีที่แล้ว +7

      Sure, but there are a lot of means of doing so. As a batch file or even social engineering. The purpose of the video is showing some possibilities only

    • @TequilaDave
      @TequilaDave ปีที่แล้ว +2

      BadUSB is also an option

    • @skyejacobson7743
      @skyejacobson7743 ปีที่แล้ว +1

      There are plenty of ways to remote access via sending files over network. The truth is there is no way to gain access to someone's machine without them downloading or you interacting with their PC.

    • @tonyvelasquez6776
      @tonyvelasquez6776 ปีที่แล้ว

      @@skyejacobson7743 That's 10000% false. There are a million and one ways you can gain a foothold via a service exploit, say a vulnerable version of samba/SMB or a webserver RCE exploit, pop a shell, and then pivot throughout the network. It just depends what your goal is. I will take a service exploit over a social engineering attack any day of the week. There's zero need for another person to execute or download anything if you've found a way to upload a PHP backdoor or find a way straight into the system through a system service that's running.

  • @mrinfinity3964
    @mrinfinity3964 ปีที่แล้ว +31

    Its like telling me to place a tracker on a wallet so i can rob it later

    • @itsfalconx1674
      @itsfalconx1674 11 หลายเดือนก่อน +1

      Bro he told us the basic concept like you download malicious software with Name for eg image.png but it is actually merged with a bat file with the help of winrar and when you open that image it executes the commands on the victim's pc and gives access to hacker

  • @rebjorn79
    @rebjorn79 ปีที่แล้ว +7

    2:57 I knew it. Personally I prefer 'Administrator', it makes me feel powerful!

    • @AdamArtzi
      @AdamArtzi ปีที่แล้ว +4

      "I prefer Administrator". The most unlinuxy thing a person could say. Everyone knows "Super User" rules.

    • @Lofote
      @Lofote ปีที่แล้ว

      @@AdamArtzi Note that they are not similar ;)...

  • @mukuldubey651
    @mukuldubey651 ปีที่แล้ว +20

    You're doing all after disabling window defender but nice 👍

  • @exclusivelygameplayonly3590
    @exclusivelygameplayonly3590 ปีที่แล้ว +15

    Yeah but it's more likely playing both the sides of the chess 😅

  • @sussypusssy
    @sussypusssy ปีที่แล้ว +3

    Oh yeah I have to mention that the first 14 seconds is a crucial step in controlling any PC out of this video of 4 mins 59 seconds

  • @matze86hh
    @matze86hh ปีที่แล้ว +4

    The ringlight reflexion 🤣🤣

    • @Onel1ttlek1lla
      @Onel1ttlek1lla ปีที่แล้ว +1

      LMAO hes staring into my soul 😱

    • @matze86hh
      @matze86hh ปีที่แล้ว +1

      @@Onel1ttlek1lla 🤣

  • @d3cryptor745
    @d3cryptor745 ปีที่แล้ว +9

    This needs the physical access to the target machine first 😝

    • @silme9417
      @silme9417 ปีที่แล้ว +4

      not really you can do a script that execute these commands and send it to the target machine

    • @d3cryptor745
      @d3cryptor745 ปีที่แล้ว

      @@silme9417 that is interesting but usually such attacks are not successful

    • @malikcorozo1156
      @malikcorozo1156 ปีที่แล้ว +1

      yep, i doesnt work, for default the mayority of AV block nc connections, i tried, in maaaaanyyy pc's configs

    • @tennesseetuned
      @tennesseetuned ปีที่แล้ว

      If you are on the same LAN and you get on a box using a something like Eblue and are a low level user you can use certutil on 12-19 Server.

    • @Alpha.01285
      @Alpha.01285 6 หลายเดือนก่อน

      Patched by windows finding the entire thing so it doesnt work anymore

  • @OluwatobaAjanakuSbm
    @OluwatobaAjanakuSbm ปีที่แล้ว +6

    With this technique, can you see all the email details on the victim's computer, and maybe delete and make other command, remotely without any access to the victim's computer?

    • @amongusboi2032
      @amongusboi2032 ปีที่แล้ว

      He is but from his own computer 🖥

    • @tennesseetuned
      @tennesseetuned ปีที่แล้ว

      I mean its going to depend on what you upload to the box.

  • @MrPlayboy-d2o
    @MrPlayboy-d2o 10 หลายเดือนก่อน

    To put NetCat on the system you can type the following command in the meterpreter session: upload "nc.exe path within kali" open the shell and open the tunnel with nc

    • @TRAPxFRANK
      @TRAPxFRANK 2 หลายเดือนก่อน

      how
      im stuck where it shows not path for locate nc exe

  • @noahgottesla3439
    @noahgottesla3439 ปีที่แล้ว +17

    This is insane. Using basic tools to do the scariest

  • @neowees
    @neowees ปีที่แล้ว +1

    I don't want to be disrespectful, but the title of this video should be "Remote Control Any PC that you already have access to!"

  • @anveshpandey2917
    @anveshpandey2917 ปีที่แล้ว +18

    haha, nice way to fascinate people, but it's just simple reverse shell execution 🤣🤣

    • @astro3
      @astro3 ปีที่แล้ว

      well no shit bro

    • @blackenedistheend
      @blackenedistheend ปีที่แล้ว +2

      Yeah but a 'simple' reverse shell execution is pretty advanced for a beginner like me.

    • @amxaas4450
      @amxaas4450 ปีที่แล้ว

      Bas9cally this fascinates the script-kiddiess

  • @ajp2279
    @ajp2279 ปีที่แล้ว +3

    how would you even get into the windows computer in the first place??

  • @random-user-s
    @random-user-s ปีที่แล้ว +3

    Can i ask you the iso file of the kali linux machine you have, i cant find it anywhere. thank you

  • @tejahanu
    @tejahanu ปีที่แล้ว +4

    I am big fan of u from India

  • @amrhegazy7221
    @amrhegazy7221 ปีที่แล้ว +5

    Certutil gave me access denied

  • @MAG320
    @MAG320 ปีที่แล้ว +2

    3:45 I got a Access is denied error. It got blocked by Windows Defender.
    Context: I'm using W2022 Server, Built-in Defender. Should it be turned off or should I add an exception?

    • @arslan9212
      @arslan9212 7 หลายเดือนก่อน

      getting same error. how to fix this?

  • @guizzycraft6073
    @guizzycraft6073 ปีที่แล้ว +1

    THO this video good for pranking friends pc when you head to their house or something

  • @evil_beast_z
    @evil_beast_z ปีที่แล้ว +1

    Sir..
    I watches most of ur video...
    Can u adjust your lighting?..
    So that ur video will be more better

  • @InitiatorG
    @InitiatorG ปีที่แล้ว

    Follower from Nepal, Great learning

  • @nandorbacso4625
    @nandorbacso4625 ปีที่แล้ว +1

    So how would I do it on a machine with an external IP address (outside of my LAN)

    • @peterdesmond6730
      @peterdesmond6730 4 หลายเดือนก่อน

      Hey can you clone a phone

  • @cameronrich2536
    @cameronrich2536 ปีที่แล้ว

    Forgot to like last vid and he wiped all my accounts. Do it guys. Seriously this a burner

  • @Octopixel40
    @Octopixel40 ปีที่แล้ว

    i'm pretty sure that curl is pre-installed on newer windows versions

  • @dclxviclan
    @dclxviclan ปีที่แล้ว

    Hi, Loi, you record very cool tutorial, and all work, but when all start work, i off my windows antivirus and this is bad practice i think, technologies not stop, you have most powerfull and not see for antivirus instrument?

  • @jdmayfield88
    @jdmayfield88 ปีที่แล้ว +2

    Even better, you can also remotely control any computer sitting in front of it using mouse, keyboard, and monitor, while logged in as Administrator.

  • @guizzycraft6073
    @guizzycraft6073 ปีที่แล้ว +1

    All Yt of hacker content should make content on how to make a link with a virus to access the discord persons screen and info like IP address their name and general stuff like that

  • @AGASTRONICS
    @AGASTRONICS ปีที่แล้ว +3

    I don't use tools 🔧
    I script my tools...
    If Good purpose can't earn me, then illegal will 👹👹👹☠️

  • @johnboth3093
    @johnboth3093 ปีที่แล้ว +1

    3:00
    Now i can access your facebook tiktok youtube google account using that password🤣

  • @paint2382
    @paint2382 7 หลายเดือนก่อน

    POV: you send a comment on his video saying " Um Actually ☝🤓" Then the next day you wonder why your WiFi went offline.

  • @hongkonghacker
    @hongkonghacker ปีที่แล้ว +1

    it won't work until you turn off Windows Defender(Anti-virus)

    • @Alpha.01285
      @Alpha.01285 6 หลายเดือนก่อน

      And thats when somone else has acess to ur computer u dont know

  • @corjapin
    @corjapin ปีที่แล้ว

    no fysical acces to a computer means you can`t do it. also, overr the internet is way more difficult than within your own local network

  • @googledork
    @googledork ปีที่แล้ว +3

    Bro. Making video about cracking

  • @mixmasterkelvinatorngwenya864
    @mixmasterkelvinatorngwenya864 วันที่ผ่านมา

    how to create that nc.exe or its available on github , and what's inside it that allows remote control

  • @Derek-yz8bk
    @Derek-yz8bk ปีที่แล้ว +2

    I have so many ways to get into a computer its crazy only issue is i have no clue what to do after and resource’s are so limited lol 😂, could you make a video of how to increase my permissions or gain full control

    • @amongusboi2032
      @amongusboi2032 ปีที่แล้ว +1

      For good intends or? 🤨

    • @Derek-yz8bk
      @Derek-yz8bk ปีที่แล้ว

      @@amongusboi2032 yes lol my poor vm

    • @AdamArtzi
      @AdamArtzi ปีที่แล้ว +4

      Well, there are exploits which gains access to SU or Admin depends on your machine. But it won't work if the system is updated or has AV. You can find exploits by your self, but it is a lot of work and you need a lot of knowledge. People who find those exploits are really brilliant folks. But even without Admin you can do a lot.

    • @Derek-yz8bk
      @Derek-yz8bk ปีที่แล้ว

      @@AdamArtzi O yeah there are an insane amount

    • @amongusboi2032
      @amongusboi2032 ปีที่แล้ว

      @Adam Artzi even though I agree still I think admin does alot

  • @rbcrax4311
    @rbcrax4311 ปีที่แล้ว +1

    First step: get full RDP hahahahah nice one Loi expected more more

  • @idan678
    @idan678 ปีที่แล้ว +1

    I usually use msfvenom and meterpreter

  • @OluwatobaAjanakuSbm
    @OluwatobaAjanakuSbm ปีที่แล้ว

    Thank you,
    I have a few questions, please.
    How do you prevent an attacker from gaining access to an email server.
    And how do they practically do that ?
    What do they need to have access to an email server, ?
    Another question is how do I protect against an attacker intercepting emails in transit, between the sender and receiver,
    How does the technique called man-in-the-middle attack work ? . In this type of attack, I know the attacker inserts himself into the communication between the sender and receiver, and can then read or modify the messages being exchanged.
    But how exactly does that practically happens and how do I prevent it ?

    • @rickroll9978
      @rickroll9978 ปีที่แล้ว

      To prevent an attacker from gaining access to an email server, you should implement strong authentication methods such as multi-factor authentication and strong passwords. Additionally, you should regularly apply security patches and updates to the server, and use a firewall or intrusion detection system to monitor and detect any suspicious activity.«
      To protect against man-in-the-middle attacks, you should use encrypted communication protocols such as SSL/TLS or IPSec to encrypt the communication between the sender and receiver. Additionally, you should use digital certificates to authenticate both the sender and receiver and to ensure that the messages are sent securely. You should also use a secure email gateway to inspect and filter incoming emails for malicious content.

    • @OluwatobaAjanakuSbm
      @OluwatobaAjanakuSbm ปีที่แล้ว

      @@rickroll9978
      Thank you so very much,
      I am eternally grateful,
      I'll be glad if I can use your help,
      Any little guidance in this area would mean a lot,
      How can I contact you please ?
      I have WhatsApp

  • @kernelcortex
    @kernelcortex ปีที่แล้ว +1

    Forget black hat hacker. Meet black glasses hacker.

    • @maserekaraymondmuyira4034
      @maserekaraymondmuyira4034 ปีที่แล้ว

      get serious... ☹function donteverdothatagain(){ if(you){char crackyou = "yourface.oneclick" ;}return your(intestines);getyou🤓🧐

  • @cheesymemes-xc5ov
    @cheesymemes-xc5ov 4 หลายเดือนก่อน

    so do i instantly get control or do they have to open something?

  • @dishankchauhan8153
    @dishankchauhan8153 ปีที่แล้ว

    Please please please answer the doubt.
    Someone did the same with me. I downloaded a cracked software and since then I'm getting some creepy requests (as pop ups) to for a remote desktop connection. And point is it's not actually a request, it's simply a notification that someone has connected, now you can decide whether you want him to remain connected or not. And if I click NO, it says, the remote user has "declined" your "request" to disconnect. I mean what the hell is that! Why should I be the one requesting and who is he to decline it!
    To resolve this I simply reset my PC, with all the files removed and installed a fresh Windows. BUT I DOUBT THAT WILL SOLVE THE PROBLEM. Coz as far as I could understand the cracked software's job was to just extract the sensitivity information like IP address etc of my device, now once done that, even if I reinstall the windows, but the IP address will remain the same correct?
    It's been 10 mins I reinstalled and haven't got any just creepy remote connection notifications. But my doubt is, whether the problem is really solved? Or not? Please please please answer.

  • @الوقايةخيرمنالعلاج-ظ1ق
    @الوقايةخيرمنالعلاج-ظ1ق ปีที่แล้ว +2

    Please 🙏 a tutorial about hacking mobile Android

  • @ManjeelSharma-ef3wc
    @ManjeelSharma-ef3wc หลายเดือนก่อน

    So ncat also provides the same acces and its short process. Is not it

  • @erase_r1239
    @erase_r1239 ปีที่แล้ว

    are this both machine target and kali linux are in same network? i think it easier if they in same network, but what if otherwise? how do we do this in different network between hacker and target?

    • @mixmasterkelvinatorngwenya864
      @mixmasterkelvinatorngwenya864 วันที่ผ่านมา

      its still works because you alread installed the file , so same network or not still works

  • @kingmam
    @kingmam ปีที่แล้ว

    I got access denied on cmd when i enter the certil -urlcache... command

  • @ngonimaphosa2176
    @ngonimaphosa2176 ปีที่แล้ว +1

    for this to work the firewall on my other pc has to be off right?

  • @joefawcett2191
    @joefawcett2191 ปีที่แล้ว

    Gain control of a pc you already have control of, nice one

  • @stunnabiggie3297
    @stunnabiggie3297 ปีที่แล้ว

    as soon as i entered the command the windows defender caught it and said "Access denied" ...so thats not really controlling ANY pc in minutes...

  • @doddaajith9010
    @doddaajith9010 ปีที่แล้ว +4

    locate nc.exe
    No such file or directory
    What to do ?

  • @chip2881
    @chip2881 7 หลายเดือนก่อน

    Does the target Device have to be turned on and unlocked to gain control? and would the user see the code being inputted on their screen?

    • @chip2881
      @chip2881 7 หลายเดือนก่อน

      Also if its disconnected from network does this stop any foothold?

  • @knut3357
    @knut3357 ปีที่แล้ว

    hey , there's a flaw , a critical flaw , the video is of 4 min 58 sec not 59

  • @elder2623
    @elder2623 ปีที่แล้ว

    Cool method. I would add to this how you can get nt authority/system. That is complete control.

  • @kerhabplays
    @kerhabplays ปีที่แล้ว +1

    4:58*

  • @elitsistem3040
    @elitsistem3040 ปีที่แล้ว

    It's quite clever to gain access to the system by logging into the victim's system, disabling the firewall, and then running the application. Most likely, the owner of the machine did not notice you.🤣🤣

  • @metalhead-2612
    @metalhead-2612 ปีที่แล้ว

    is this works only if i in local network ?

  • @arzelch
    @arzelch ปีที่แล้ว

    Can you also talk on videos which show initial compromise of systems

  • @dardycinq
    @dardycinq ปีที่แล้ว

    Jokes on you, I don’t have a computer

  • @pentester-ethicalhacker
    @pentester-ethicalhacker ปีที่แล้ว

    Really, certutil and nc?

  • @Horizontff
    @Horizontff ปีที่แล้ว

    1-Como puedo quitar virus que tiene persistencia en mi pc ?
    2-como un hacker en un videojuego puede hacer que la víctima esté jugando online en el mismo equipo con el siempre y que la víctima no se de cuenta ? Como se puede solucionar ?

  • @sequencecheats
    @sequencecheats ปีที่แล้ว

    what can you do after

  • @Ballbaggins
    @Ballbaggins ปีที่แล้ว +4

    But for this to work you needed access to the target machine or am I missing something 🤔

    • @rottenfist220
      @rottenfist220 ปีที่แล้ว +2

      Yep, you have to somehow type all that long command line from win machine and pray hacker will hack you :))

    • @soumyajitkar122
      @soumyajitkar122 ปีที่แล้ว

      @@rottenfist220 no you can write it in notepad and save as a batch file

  • @liorkilunov3813
    @liorkilunov3813 10 หลายเดือนก่อน +1

    Какой пользователь будеть вбивать или скачивать таким оброзом файлы кого так можно взломать ?

  • @yurissolutions1725
    @yurissolutions1725 3 หลายเดือนก่อน

    You already had control of the Windows machine. And this only works on LAN.

  • @solomonghale98
    @solomonghale98 5 หลายเดือนก่อน

    as alwalys this only works on the local computers connected to the same network

  • @TrickyMicky123456
    @TrickyMicky123456 ปีที่แล้ว

    Does it work once the hacker/target ip changes?

  • @MrPlayboy-d2o
    @MrPlayboy-d2o 10 หลายเดือนก่อน

    Is there an exploit post that puts netcat on the system?

  • @Savaistheone
    @Savaistheone ปีที่แล้ว

    Please can someone help me bc i got hacked and controlled by and i turned off my pc and the next day it said reboot and select proper boot device or insert boot media is selected boot device and press a key _

  • @AnverPulse
    @AnverPulse 10 หลายเดือนก่อน

    is it kali linux?

  • @instantkevlar4763
    @instantkevlar4763 ปีที่แล้ว

    The title of the video should have been "Remotely Connect Any of YOUR PCs in 4 mins 59 seconds". Why not just download netcat executable using a web browser? Certutil seems unnecessary.

  • @xg_nepali8942
    @xg_nepali8942 ปีที่แล้ว

    Sir, how to make ngrok server please can you make a video of it.
    Thank you 🌻

  • @vmtex
    @vmtex 8 หลายเดือนก่อน

    can i convert the code in the victim's computer that we write in cmd to a file that I can make in notepad?

  • @mr.infamous4389
    @mr.infamous4389 ปีที่แล้ว

    He keeps bringing up column Linux how do i get there?

  • @mikaelson4738
    @mikaelson4738 ปีที่แล้ว

    Wow
    nice
    but i feel you're moving too fast😅😅

  • @JohnnyRich-h1d
    @JohnnyRich-h1d หลายเดือนก่อน

    This makes no sense, you have to be on the same network to make any of this work. The target machine can't be i.e. your neighbors pc (in my situation my neighbor is hacking into all of my PC and router technology and causing havac on my daily life and I want to get them back) can't do it using this method.

  • @ronthecinephile
    @ronthecinephile 9 หลายเดือนก่อน

    but how can I download files or images from CMD to my kali

  • @fattyz1
    @fattyz1 3 หลายเดือนก่อน

    Will it let me use my windows network?

  • @shibbyshaggy
    @shibbyshaggy ปีที่แล้ว

    reverse shell is not hacking. do all that with AV on and don't enter any commands on Windows system. then u have a hack

  • @imursoul6032
    @imursoul6032 ปีที่แล้ว +4

    Nice keep going 😍 sir love from India 🇮🇳❤️✨

    • @williamsmiler184
      @williamsmiler184 ปีที่แล้ว

      And what will you use this for in India?

    • @random99989
      @random99989 ปีที่แล้ว

      @@williamsmiler184 Racist question and old people, what a combination!

  • @seriffiplayz
    @seriffiplayz ปีที่แล้ว

    Is kali linux only linux?

  • @kwametimothy1246
    @kwametimothy1246 3 หลายเดือนก่อน

    but on the normal day, why would anyone on a windows computer run all these codes before i can get access to their computer

    • @dantecastelancarpinteyro
      @dantecastelancarpinteyro หลายเดือนก่อน

      maybe your friend needs an USB and you include an autorun.inf file?

  • @davideseracchioli2174
    @davideseracchioli2174 ปีที่แล้ว

    When i type "locate nc.exe" it says me that no such file or directory was found, help???

  • @Mezzosd
    @Mezzosd ปีที่แล้ว +1

    how did he create the nc.exe file?

  • @Maneyaku
    @Maneyaku 5 หลายเดือนก่อน

    nice...hope i can install genshin impact into everyones pc

    • @ByteBurst57
      @ByteBurst57 3 หลายเดือนก่อน

      Ew🤢

  • @jonasaguilar8103
    @jonasaguilar8103 2 หลายเดือนก่อน

    That's easy how about you try it without touching the target computer

  • @lukebyrne1623
    @lukebyrne1623 ปีที่แล้ว

    Would work well using beef exploitation framework👌👌

  • @tanvirmahamudshariful7041
    @tanvirmahamudshariful7041 ปีที่แล้ว

    nlvp: forward host lookup failed: Unknown host

  • @Angi_tmi
    @Angi_tmi ปีที่แล้ว

    Glasses's too chill ⚡

  • @bluetypie4269
    @bluetypie4269 ปีที่แล้ว +1

    the guys who think they are real hackers, try to crack Mr. Loi's Linux password :)))

  • @series-star6466
    @series-star6466 ปีที่แล้ว

    How to perform breach attack

  • @SDgames681
    @SDgames681 10 หลายเดือนก่อน

    How did he get to that screen after command prompt

  • @swethasree99
    @swethasree99 ปีที่แล้ว +1

    loved it.. In terms of computer, mobile, and internet security, restrictions are the best. It is the most practical way to prevent our personal identification and networks be harmed by viruses and malware. So we have to stay secure with the updated version of antivirus software online from renowned brands like K7 antivirus software.

  • @daohackgame101
    @daohackgame101 ปีที่แล้ว

    Remotely but bro did it on local network 💀

  • @LAJC1
    @LAJC1 ปีที่แล้ว

    what is culinux

  • @DIGINENGLISH
    @DIGINENGLISH ปีที่แล้ว

    script kiddie if i wrote it right IS HERE ... i cant make it the good way i found issues >> i like your confidence loi

  • @xXixaMXx
    @xXixaMXx ปีที่แล้ว

    Wow so advanced and usefull. This is NSA State level shit here

    • @rgxronnie6751
      @rgxronnie6751 ปีที่แล้ว

      noway you are being for real

  • @LazyBearTO
    @LazyBearTO ปีที่แล้ว +2

    certuitl is enabled in PS by default but not in CMD in Win11

    • @ThatGamerJimmy-if1rs
      @ThatGamerJimmy-if1rs ปีที่แล้ว

      It is enabled in CMD in windows 11, or I installed sum but I can't remember installing sum to help that