Check out the DeFNCE app right here: DeFNCE App on Google Play Store: play.google.com/store/apps/details?id=com.cyfirma.defnce DeFNCE App: www.cyfirma.com/defnce/
Very nice video. But why would someone allow Camera permission for a youtube video, that pretty suspicious. As this attack cannot bypass android permission management system, its safe for a satisfactorily intelligent person. Also the applications that require camera has their own native android app(I don't think anyone use those from their browser especially from smartphone).
But if you allow access for creator capture, most don’t think about it after the fact… The permission stays open… But, at the same time, as you clearly stated… *_It is safe for any, decently, intelligent person _* , that would have the sense of mind to grant permission, capture, upload, (or critique if multiple takes are required), then turn permissions back off… Just my two little pennies of input… _. ._ \’ ~ ‘/
Trust me...some people do...if u use that as a mass attack u will certainly get results..also, especially young and old people dont really know or will ever get to the privacy and security menu..i.d say 60% of android users wont ever go that far to check their accounts ever..sounds stupid but remember till this day, that african king is still receiving checks from people so he can give away his inherited fortune...dont think most people wont click allow just becausr theyd think if they dont they wont see the video...
@@purosmeemesdejupitercarnal8036 Yes thats what I meant. If user click on that then the Intent will fire and if zoom app is installed then possibly user will choose that. So, its easy to say but not that simple IRL. 😂
The efficiency of this *MysteryPlanetorg* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Mike !!
Wow this is amazing man, i tried it out and fiddled with it on both my old Iphone and Android. Unfortunately when targeting an Apple the images become blank even when allowing camera usage. I don't know if this has to do with the code not targeting the camera properly but alas, on Android it works like a charm. P.S. Remember everyone be safe and watch what you click, especially what you allow!
3:50 why would someone give access or allow to camera, i mean today's unhacker (normal ppl without knowledge of hacking) even can't give access. Like why would someone wanna be hack by itself. I wonder "^^
One question When I put the final numbers of the link and press enter, a message appears asking me what is my ngrok authtoken what am I supposed to do here?????
This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute you. *MysteryPlanetorg* . The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Alex & looking forward to seeing what you do next!
For anyone that wants to start a job in the field of cybersecurity and ethical pentesting don't do this, if you want to be a successful hacker learn to program and learn a bit of assembly language as well, this imo is a waste of time since you're using a tool made by another person Just a heads up for any beginners
Hi, I am also someone who wants to start a job in the field of cybersecurity however, I believe that you are wrong. I actually have an internship at a firm in my home country that has a cybersecurity sector (keep in mind this is no fortune 500 company) but you need to understand for the most part you are going to be using every tool you can to your advantage, so to say this is a complete waste of time I believe is wrong. you need to familiarize yourself with many different programs that bad actors will use against you, the firm or its consumers. feel free to respond if you disagree this is just what i think. I ofcourse still agree that you need to prioritize learning coding languages over using other people's tools!
@@Chris-wq3rw Well yes I do believe that using tools made by other people to some extent can be beneficial the problem is that most people don't look at what's happening under the hood and understand what's actually and if you don't do that I believe that it's kind of just learning the tool and not how the tool functions and it can lead to a skill drop when it comes to professional Pentesting, I mean using recon tools in the field when you need to do something quick is fine just wouldn't recommend beginners to learn tools 👍
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me *MysteryPlanetorg*
If i 'm right,I think there is a big flaw in this procedure !!which is when target clicks on the link it clearly asks for permission for use of camera!so the target would easily suspect and would never click to access!
Of course you need other vulnerabilities/problems. I remember in older android versions apps could ask admin privileges as popup without repetition/time limit and so people even if they rejected the first time, then they accepted
Why would someone click on that strange link, that gets redirected to youtube, and then after that, click on ALLOW ? If someone does that, it deserves to get hacked
hi sir. If we click allow one time accidentaly then they always can access our phone cam? even we do not go browser and same site? 2nd question- 7:04 minute "do not allow camera or ask camera permisson? which one we should select? in my android 6 I selected "not allowed" but "ask for camera" option was reccommend.
Thank you. One of my passwords (weak one) was leaked/hacked/breached onto the dark web. Fixed what websites I could, where I could remember having the password and other sites, some of which don't exist or work no more.
This message is to recognize your contribution to the team’s tracking and spying success. Your commitment had been exemplary and your hard working is an inspiration to everyone around you. You’re a professional *MysteryPlanetorg*
im trying to open the link on my iphone, but the photos i receive are blank and are also locked and says im not the owner of these photos. but i can see photos from the android phone. why is that?
Hi sir, nice video but how can we see live recording of the cam and also how can we retrive the session later once we disconnected the service and what to connect back to same device.
This is great. But be able to perform this attack, you still need to trick the user to believe the site you are visiting is indeed a trusted site. Kinda like phishing. Hence, it's important to always check the browser popup and the domain you are visiting.
Dude its just a matter of timing..send it to enough people and by default a certain percentage will allow just because it gave the impression if they dont they dont see content..
Does this hack give a few snap shots only while you're actually visiting the hacked site? Or can it continue to get camera access once you close the browser on your phone?
If someone has a pattern of continually "misunderstanding" you, there's a good chance you're getting manipulated. You could end up talking yourself in circles which will be draining, harm your mental health, and make you too emotional so that you can't think clearly. Many people like this are no different at their core than people who are OPENLY verbally and physically abusive, they're just more sneaky about it, and there's a good chance that the physical and/or verbal (aka overt) abuse is on its way. Covert abuse is very hard to spot but to get enough proof and clear the doubt you might be undergoing simply *MSG BRAVE NOTCH*
This seems like a great tool to catch desperate online predators on chatting websites ethicality of course. Even though there are some flaws in this software. Not everyone is smart enough like us security and I.T guys. What a great video I always love watching these types of videos keep up the great work.
I know a similar way to hack into the camera of any phone all you have to do is call someone on face time XD C'mon the way shown in the video is basic ask someone if they will let you use the camera on their phone, if they do, fine, you "hacked" their phone, but if they say no, you screwed up its just like calling someone on face time XD btw who on earth would click on a link that looks like this and allow the site to use his camera, microphone etc.
Please allow me to express my gratitude for the extra time and effort you put into helping me recover my account *MysteryPlanetorg* I recognized all your hard work, and I say a massive thank you. I think I have never seen such a reliable and trustworthy individual like you for a long time. Excellent work!
Check out the DeFNCE app right here: DeFNCE App on Google Play Store: play.google.com/store/apps/details?id=com.cyfirma.defnce
DeFNCE App: www.cyfirma.com/defnce/
How to cantact you sir
Hey loi make a video on shark phishing tool u'll love it i'm dm sure ... github Bhaviktutorials shark
plz help me
@@Rockstar-3307 wa happen ?
How to flash loan attack Sir
Friendly reminder : always disallow to camera and mic permission for unknown / suspicious websites ...
👆I only have the opportunity to get access into my partner's cell phone with his help and I really appreciate him so much. 💯
YUP. Screw those js "hacks"
@I only recommend Audenspark he’s the best Ok sure but can he do the truffle shuffle?
Very nice video. But why would someone allow Camera permission for a youtube video, that pretty suspicious. As this attack cannot bypass android permission management system, its safe for a satisfactorily intelligent person. Also the applications that require camera has their own native android app(I don't think anyone use those from their browser especially from smartphone).
But if you allow access for creator capture, most don’t think about it after the fact… The permission stays open… But, at the same time, as you clearly stated… *_It is safe for any, decently, intelligent person _* , that would have the sense of mind to grant permission, capture, upload, (or critique if multiple takes are required), then turn permissions back off… Just my two little pennies of input…
_. ._
\’ ~ ‘/
@@h.r.60 i will assume u are using termux then turn mobile hotspot on and run it again
Trust me...some people do...if u use that as a mass attack u will certainly get results..also, especially young and old people dont really know or will ever get to the privacy and security menu..i.d say 60% of android users wont ever go that far to check their accounts ever..sounds stupid but remember till this day, that african king is still receiving checks from people so he can give away his inherited fortune...dont think most people wont click allow just becausr theyd think if they dont they wont see the video...
you can make a false zoom page so that it falls more f
@@purosmeemesdejupitercarnal8036 Yes thats what I meant. If user click on that then the Intent will fire and if zoom app is installed then possibly user will choose that. So, its easy to say but not that simple IRL. 😂
This technique wanted to learn all peoples to avoid clicking suspicious url and clicking allow to access camera . Thanks for advising us.
The efficiency of this *MysteryPlanetorg* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Mike !!
Always love the humor in your videos, especially intros
👆I only have the opportunity to get access into my partner's cell phone with his help and I really appreciate him so much. 💯
Wow this is amazing man, i tried it out and fiddled with it on both my old Iphone and Android. Unfortunately when targeting an Apple the images become blank even when allowing camera usage. I don't know if this has to do with the code not targeting the camera properly but alas, on Android it works like a charm.
P.S. Remember everyone be safe and watch what you click, especially what you allow!
Hii sir how are you?.... Everything i learned about hacking is from you. You are my mentor and thanks for the video..... 😀❤️
❤️
❤️
❤
❤️
xîe xîe means thank u 😸
But arigato lagi best 👍🏻👍🏻
3:50 why would someone give access or allow to camera, i mean today's unhacker (normal ppl without knowledge of hacking) even can't give access. Like why would someone wanna be hack by itself. I wonder "^^
👆I only have the opportunity to get access into my partner's cell phone with his help and I really appreciate him so much. 💯
yeah
I was wondering what terminal you are using
So it's about camera, not the location.
whydo someone give access to camera..pleaser tell how to hide that popup permission.
& it's only work for same network 🛜 area
Hey brother... Can i talk about how to install terminal on pc ? Please...
What the video
*ON TELEGRAM*
@@Hackermylee link
@@gaming2024-bbracing*IRORUNHACKS*
One question
When I put the final numbers of the link and press enter, a message appears asking me what is my ngrok authtoken what am I supposed to do here?????
This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute you. *MysteryPlanetorg* . The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Alex & looking forward to seeing what you do next!
For anyone that wants to start a job in the field of cybersecurity and ethical pentesting don't do this, if you want to be a successful hacker learn to program and learn a bit of assembly language as well, this imo is a waste of time since you're using a tool made by another person Just a heads up for any beginners
👆I only have the opportunity to get access into my partner's cell phone with his help and I really appreciate him so much. 💯
Hi, I am also someone who wants to start a job in the field of cybersecurity however, I believe that you are wrong.
I actually have an internship at a firm in my home country that has a cybersecurity sector (keep in mind this is no fortune 500 company) but you need to understand for the most part you are going to be using every tool you can to your advantage, so to say this is a complete waste of time I believe is wrong. you need to familiarize yourself with many different programs that bad actors will use against you, the firm or its consumers. feel free to respond if you disagree this is just what i think. I ofcourse still agree that you need to prioritize learning coding languages over using other people's tools!
@@Chris-wq3rw Well yes I do believe that using tools made by other people to some extent can be beneficial the problem is that most people don't look at what's happening under the hood and understand what's actually and if you don't do that I believe that it's kind of just learning the tool and not how the tool functions and it can lead to a skill drop when it comes to professional Pentesting, I mean using recon tools in the field when you need to do something quick is fine just wouldn't recommend beginners to learn tools 👍
Well everybody starts as a script kiddie, after that they will eventually have a deeper look into it.
@@ratherstayhidden3064 sorry but programming is a tool within its self just gives you more flexibility.
Wow! Setup, exploit and provide a defender a defence. All in under 7 minutes!!!
Hacker Loi, You Legend!!
Loi Liang Yang ,there is some hacker in games online for mobile phones??thanks
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me *MysteryPlanetorg*
I bought your course in Udemy, because you deserve it.
Would you please give more details about this course. I would like to check it out.
@@crazymonkey9500 it's in his TH-cam channel description
@@justinwinarto Thank you
If i 'm right,I think there is a big flaw in this procedure !!which is when target clicks on the link it clearly asks for permission for use of camera!so the target would easily suspect and would never click to access!
trust me, there are many people accepting everything without even think about what they just accepted :D
It’s used for phishing. Not spearphishing.
Of course you need other vulnerabilities/problems.
I remember in older android versions apps could ask admin privileges as popup without repetition/time limit and so people even if they rejected the first time, then they accepted
@@pascalphilipp1910 thats not called hacking tho
@@anand.suralkar ? When did I say it's hacking?
Why would someone click on that strange link, that gets redirected to youtube, and then after that, click on ALLOW ? If someone does that, it deserves to get hacked
I do not understand what if I want to share a youtube link with my friend? what should I do? normal youtube video has option share url
I think you should do a video to let others check if they already being hacked
hi sir. If we click allow one time accidentaly then they always can access our phone cam? even we do not go browser and same site?
2nd question- 7:04 minute "do not allow camera or ask camera permisson? which one we should select? in my android 6 I selected "not allowed" but "ask for camera" option was reccommend.
What is the emulated device program name and how we can do it.
Seems silly to just allow anything through a site though. Anyone with a little bit of knowledge would know better. Still a great video though.
Thank you. One of my passwords (weak one) was leaked/hacked/breached onto the dark web. Fixed what websites I could, where I could remember having the password and other sites, some of which don't exist or work no more.
What terminal are you using, also i gave you a sub
I have a question, when they open the link and it say allow or don’t allow camera, and they click don’t allow would you still see there camera?
Wich microphone wireless brand that u use in the videos??
That make sense and easy to do it. I have one question here how to take picture when phone is locked or the user is using other apps?
What terminal are you using?
Thank you alot leo!🤗🤗🤗
This message is to recognize your contribution to the team’s tracking and spying success. Your commitment had been exemplary and your hard working is an inspiration to everyone around you. You’re a professional *MysteryPlanetorg*
Techchipnet is an Indian TH-camr. Feeling proud 😊
@@h.r.60 please send me the screenshot
@@h.r.60 same here :( , it works when I open it on my pc but when I try it on my phone it says the same
thank you for showing people how to protect themselves. its very nice
Hello all your videos are basic plz give some Advance topic and thanks
im trying to open the link on my iphone, but the photos i receive are blank and are also locked and says im not the owner of these photos. but i can see photos from the android phone. why is that?
This tool was made by Techchip Channel from india ♥️🤗
FINALLY SOMEONE NOTICED LOL
@@orbitalweapon7538 Because we are indian 💪✌
@@xxehackerno one care
your videos are the best ethical hecking videos
I see you re-invented the Blue steel expression
Awesome tutorial Loi! Your content is amazing! I learn so much from your content!
👆I only have the opportunity to get access into my partner's cell phone with his help and I really appreciate him so much. 💯
Can you do this on Mac laptop?
Can this ngrok url be shortened using bitly, and still will it work?
2:37 bro is that we can't use (bash camphish) ????
That no hack, they gave you permission and the website with that permission sent you webcam photos, that is social engineering
Is any possibility to get last location of switch off Nokia phone by ethical hacking
Termux does this job very well.nice work bro
Big fan from Bangladesh 💔🥀
Hi sir, nice video but how can we see live recording of the cam and also how can we retrive the session later once we disconnected the service and what to connect back to same device.
Thank you for this very useful video!
Can we use terminal through VM ware in windows for this purpose
This Campish Script Owner is Techchip Sir..... Real Name is Anil Parashar.... 🔥👍
Is it possible to skip the qoustion if camera is allowed or not for using?
Can you create short link out of your link? Would this work on iPhone too?
Hi, Loi. Why the direct link always enter the ngrok website first? Not enter TH-cam video directly?
You are my favourite youtuber ❤️
I tried this. But the cam file is not getting recieved. Only ip i got. I allowed the camera acess too.
How to join this channel? I want to access the premium video, why on my yt there is no join button?
So what is the site you use and plese a vedio to take a full control of phone by hacking
How to change to back camera?
Amazing tools!, Just modify the html and makesure target allowed camera
Simple , Clear and easy to understand
I Subscribe.
I also love the way he explains everything ❤
This is great. But be able to perform this attack, you still need to trick the user to believe the site you are visiting is indeed a trusted site. Kinda like phishing. Hence, it's important to always check the browser popup and the domain you are visiting.
Dude its just a matter of timing..send it to enough people and by default a certain percentage will allow just because it gave the impression if they dont they dont see content..
Social Engineering
Hello sir can you help me to start up my ngrok. so what should i do i'm getting eror.
After paste vdo watch id ,its asking for enter your valid ngrok authtoken? What token need to enter?
Your biggest fan brother
Love your videos
Thanks for sharing Your Great Video Content and my phone is hacked so is every thing else on it
@Loi how to get exact location of an ip address
I have a question. If I close the Site will it still be able to make photos or does it stop there?
where can i find the terminal to paste the code ? i have windows you said is the first step go to terminal where is ? in the windows
it worked once now i am trying again same steps not working ! what can cause this issue ?
and you are legend
Does this hack give a few snap shots only while you're actually visiting the hacked site? Or can it continue to get camera access once you close the browser on your phone?
What is the name of screen mirroring you use it? Anyone tell me pls🥺
maybe don't click allow?
it can be accident. randomly we can click. But in that situation it means they always access our cam?
Are you helping ugraine?
They need people like you.
So if they click on your connection and agree to turn on the camera, you can see them
So do u need to send the person a ulr and they have to click on it for this to work?
If someone has a pattern of continually "misunderstanding" you, there's a good chance you're getting manipulated. You could end up talking yourself in circles which will be draining, harm your mental health, and make you too emotional so that you can't think clearly. Many people like this are no different at their core than people who are OPENLY verbally and physically abusive, they're just more sneaky about it, and there's a good chance that the physical and/or verbal (aka overt) abuse is on its way. Covert abuse is very hard to spot but to get enough proof and clear the doubt you might be undergoing simply *MSG BRAVE NOTCH*
Big Thanks Loi, best mentor ever!
Sir can you explain me we are able to open this link in another network
This seems like a great tool to catch desperate online predators on chatting websites ethicality of course. Even though there are some flaws in this software. Not everyone is smart enough like us security and I.T guys.
What a great video I always love watching these types of videos keep up the great work.
Dude that’s a great idea actually. Catching Pedos with this would be my personal career choice lmaoo
@@thahrimdon lol I mean shit use the video chat module and it looks real clean and real
is it possible to see the deleted list of calls from someone else's cell phone and deleted messages in messenger ... please help
Hi there ..I need to find a location of a phone using a mobile phone number how can I do this?
I know a similar way to hack into the camera of any phone
all you have to do is call someone on face time XD
C'mon the way shown in the video is basic ask someone if they will let you use the camera on their phone, if they do, fine, you "hacked" their phone, but if they say no, you screwed up
its just like calling someone on face time XD
btw who on earth would click on a link that looks like this and allow the site to use his camera, microphone etc.
Once my phone is hacked is it works now? Even when I do factory reset, its a custom ROM. So I should just melt all my devices?
I need help when I open my terminal it appears: @kali
and the terminal name was shell no1 how do I switch to kali@kali?
I received many cam file
But it is not showing in cam file folder pls help
Please allow me to express my gratitude for the extra time and effort you put into helping me recover my account *MysteryPlanetorg* I recognized all your hard work, and I say a massive thank you. I think I have never seen such a reliable and trustworthy individual like you for a long time. Excellent work!
Is that ur phones ip?? or is it a vpn or a dummy ip at 5:53
Allow to use camera ...... or Block it .....
1:22 and 1:27 when you forget what the best part of all is.
hi sir which hacking app are you using?
CAN I ask "sir" what the app or thing that your typing the commands in ?
TQ Loi .but how to bypass warning alert .
Assembly language is important for cyber security? If yes kindly tell me how much?
Hey can you explain more about how to restore Any email pass...
Thank you 🌸💕🔥
2:40 says zsh:permisssion denied even on root
Does the same for me
@@justuslake5070 me too
IT WORKS I TRIED IT ON PHONE
Where to find the image captured in Android mobile
I can't find it
OMG thankyou so much Lio Liang Yang
I come from INDONESIA🇮🇩🇮🇩