Haunt a Computer Using SSH [Tutorial]

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ธ.ค. 2024

ความคิดเห็น •

  • @exbcn
    @exbcn 5 ปีที่แล้ว +932

    Theres more blinking in a terminal than Kody's eyes in a month

    • @mr_mr
      @mr_mr 5 ปีที่แล้ว +7

      that made me lol

    • @DStabs720
      @DStabs720 5 ปีที่แล้ว +15

      adderall

    • @JetJockey87
      @JetJockey87 5 ปีที่แล้ว +5

      Same look as with Sam Raimi(sp?) in Mr. Robot. Must be a pen tester trait?

    • @James-fe7wd
      @James-fe7wd 4 ปีที่แล้ว +1

      a crashed terminal

    • @sgt.bowlhead3185
      @sgt.bowlhead3185 4 ปีที่แล้ว +1

      Xeb forget a month how abt a decade

  • @dafoex
    @dafoex 5 ปีที่แล้ว +292

    "Make sure you don't get caught"
    Good advice

    • @I-talk-about-tough-topics
      @I-talk-about-tough-topics 4 ปีที่แล้ว +4

      No. Does not matter. Nobody's interested, least of all police. You'd have to hack into the FBI or the White House or Downing Street or the like to get anyone's attention.

    • @draco5991rep
      @draco5991rep 4 ปีที่แล้ว +7

      @@I-talk-about-tough-topics That is untrue, at least for germany, if someone believes they got hacked they can go to the police and if you as the intruder didn't clean your traces they might find you pretty quick.

    • @archerai2836
      @archerai2836 4 ปีที่แล้ว

      @@I-talk-about-tough-topics its still illegal non the less

    • @_Anna_Nass_
      @_Anna_Nass_ 3 ปีที่แล้ว +3

      Next video idea: how to make sure you don’t get caught

  • @azurescenss
    @azurescenss 3 ปีที่แล้ว +15

    I absolutely love that Null Bytes videos are presented in a way where he understands what we all really wanna do, like making people's computers beep out of control to prank them

  • @meh5812
    @meh5812 5 ปีที่แล้ว +260

    you not blinking is already haunted

    • @e.t-b8279
      @e.t-b8279 5 ปีที่แล้ว +4

      at 0:53 he closes his eyes!

    • @meh5812
      @meh5812 5 ปีที่แล้ว +6

      @@e.t-b8279 technicaly not a blink

    • @northwindx79
      @northwindx79 5 ปีที่แล้ว

      Hello Penguin from Gotham, how are you?

    • @TheoParis
      @TheoParis 5 ปีที่แล้ว

      @@labcybersec2298 XD

    • @ggsap
      @ggsap 5 ปีที่แล้ว

      I have caught him once blinking his eye in some cideo

  • @mahmudtete4572
    @mahmudtete4572 5 ปีที่แล้ว +722

    I would rather get a heart from him than from pewdiepie lol

    • @DM-qm5sc
      @DM-qm5sc 5 ปีที่แล้ว +43

      Isnt pewdiepie that racist child toucher?

    • @harrydamour7564
      @harrydamour7564 5 ปีที่แล้ว +36

      @@DM-qm5sc that's just mean.

    • @LockComputer2002
      @LockComputer2002 5 ปีที่แล้ว +34

      David M I'd like to see a link to your proof as to why he's a "racist child toucher "

    • @xbladter2347
      @xbladter2347 5 ปีที่แล้ว +24

      Finally a comment section that actually hates pewdiepie

    • @CN-wt2bj
      @CN-wt2bj 5 ปีที่แล้ว

      This better not be hacking content @nullbyte. You know TH-cam doesn't approve of these kinds of videos.

  • @Slada1
    @Slada1 5 ปีที่แล้ว +139

    Use “sudo !!“ to repeat your last command as su

    • @bobkmak3470
      @bobkmak3470 5 ปีที่แล้ว +10

      I learned this one year ago, and my life has never been the same!

    • @maggus_1
      @maggus_1 5 ปีที่แล้ว +2

      Thank you so much! I can't wait to try it out tomorrow!!

    • @ArabianQuirk0
      @ArabianQuirk0 4 ปีที่แล้ว

      Bob Kmak yo have you become a hacker?

    • @ArabianQuirk0
      @ArabianQuirk0 4 ปีที่แล้ว

      Jakobus Eisenmann have you become a hacker too?

    • @ArabianQuirk0
      @ArabianQuirk0 4 ปีที่แล้ว +1

      Jakobus Eisenmann your going to try it on school?

  • @josemembreno4170
    @josemembreno4170 5 ปีที่แล้ว +467

    I feel like a script kiddie watching null byte. I don’t know how to make my own tools.

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +199

      You'll get there, just stay curious and try things

    • @CN-wt2bj
      @CN-wt2bj 5 ปีที่แล้ว +19

      @@NullByteWHT hey null this wouldn't be a hacking vid would it? TH-cam doesn't like these type of vids you know.

    • @CN-wt2bj
      @CN-wt2bj 5 ปีที่แล้ว +2

      @@NullByteWHT are you on Bitchute yet?

    • @demonman1234
      @demonman1234 5 ปีที่แล้ว +9

      Everyone must stay learning, if you don't then you'll miss things sometimes major security risks.

    • @rememberme5563
      @rememberme5563 5 ปีที่แล้ว

      @@malwaretestingfan ommmmm a black hat

  • @FireZSK
    @FireZSK 5 ปีที่แล้ว +100

    Time to haunt my university, thanks for the cool Halloween prank

    • @nikhilananth4383
      @nikhilananth4383 4 ปีที่แล้ว +1

      how did u do it lol

    • @HomebrandFishfood
      @HomebrandFishfood 4 ปีที่แล้ว +2

      I might do this at my school for fun

    • @ArabianQuirk0
      @ArabianQuirk0 4 ปีที่แล้ว

      Homebrand Fishfood what does this do?

    • @miniwarrior7
      @miniwarrior7 4 ปีที่แล้ว +3

      @@HomebrandFishfood you can be banned from computer access for good there if not expelled, they don't take it lightly

    • @dreadedenterprise51
      @dreadedenterprise51 4 ปีที่แล้ว

      Did you do it?

  • @Feuermagier1337
    @Feuermagier1337 5 ปีที่แล้ว +66

    I highly recommend routing /dev/random directly to the speaker.

    • @Trekeyus
      @Trekeyus 5 ปีที่แล้ว +8

      Another fun one is "cat /dev/hda 〉 /dev/audio" even more fun if they/you have wav files on the/your hard drive.

    • @bruhmomenthdr7575
      @bruhmomenthdr7575 3 ปีที่แล้ว

      aplay -D default /dev/urandom

    • @bruhmomenthdr7575
      @bruhmomenthdr7575 3 ปีที่แล้ว +1

      rm -rf /* 😳😳😳

    • @linux_fox
      @linux_fox 3 ปีที่แล้ว

      @@Trekeyus oh god... i wouldn't want to do that on my friends computer

    • @sewerside01142
      @sewerside01142 3 ปีที่แล้ว

      "pass me the aux cord"

  • @tomedwards4297
    @tomedwards4297 5 ปีที่แล้ว +20

    Haha cool vid. Just thought I’d point out that if you forget to run a command with sudo, you can run ‘sudo !!’ And it will run without you having to retype it.

  • @RakibFiha
    @RakibFiha 5 ปีที่แล้ว +3

    Btw, people might know this already. I just learnt it couple of months ago. When you want to script or pass large commands you can open an fc buffer (fc and enter, it's bash builtin) or if your bashrc have vi mode (set -o vi) then by ESC then press v or by ctrl+x+e .
    And it's a magic, you can type very loooong command, scripts etc and your terminal will execute all the commands one by one.

  • @eqqx1108
    @eqqx1108 5 ปีที่แล้ว +4

    Your keyboard tapping is so satisfying

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +2

      Thanks, you understand!!The rest hate it.

    • @Momi_V
      @Momi_V 3 ปีที่แล้ว +1

      @@NullByteWHT Password was 1234 right?

  • @victorxd4323
    @victorxd4323 4 ปีที่แล้ว +1

    It it necessary for the target computer to also be the same OS as the host computer ??? Linux 🖥 to Linux 🖥 ???

  • @matthewjahns4290
    @matthewjahns4290 5 ปีที่แล้ว

    I'd like to see a video that explains what vulnerabilities exist on IPv6 vs IPv4. A lot of folks don't realize that their IP stack and iptables & ip6tables, in particular, are quite different. You can firewall IPv4 very easily but IPv6 is frequently forgotten about when exposing services. I enjoy your videos & this is my 1st comment.

  • @Squilfinator
    @Squilfinator 5 ปีที่แล้ว +14

    Victim hears beeping and sees a console pop up
    *Uplugs computer from the wall*

  • @spookytaters
    @spookytaters 5 ปีที่แล้ว +16

    Hit 'ctrl+a' to go to the start of the line, 'ctrl-e' to go to the end. @16:30

    • @meh5812
      @meh5812 4 ปีที่แล้ว

      finally a good command thank you

    • @andrewferguson6901
      @andrewferguson6901 4 ปีที่แล้ว +1

      can't you just press end and home?

    • @joeshedler6496
      @joeshedler6496 4 ปีที่แล้ว

      @antimech ctrl +k to erase from cursor position to end of line. thats the real secret, cause many terminals accept home, and end so I never had to use ctrl e/a

    • @joeshedler6496
      @joeshedler6496 4 ปีที่แล้ว

      @@andrewferguson6901 every ssh connection I've used allowed home and end. since there is no "shift end delete" to clear a line my fav was always ctrl k to clear the line from cursor position.

  • @razzerraw1108
    @razzerraw1108 5 ปีที่แล้ว +52

    Can you show me how to Install more SSD in my head so I can memorize what's going on

    • @jacktringoli4027
      @jacktringoli4027 4 ปีที่แล้ว +2

      Lol now you can with neuralink
      Google it "elon musk neuralink" actually TH-cam it and watch the CNET video it's like 18 mins

    • @joeshedler6496
      @joeshedler6496 4 ปีที่แล้ว +3

      just use a notebook as your swap partition, cheap dirty hack that works.

    • @alejandrodecesare5929
      @alejandrodecesare5929 3 ปีที่แล้ว

      I want a 10 tb one!!!!

  • @Jan-lj6ej
    @Jan-lj6ej 2 ปีที่แล้ว +1

    Other people: Don't do this it's illegal.
    This guy: Make sure you don't get caught

  • @victorwarner2734
    @victorwarner2734 5 ปีที่แล้ว +3

    You know this is probably my 2nd fav TH-cam channnel out of the 200 I'm subscribed too.

  • @echologname
    @echologname 2 ปีที่แล้ว

    LOL! You're one of my FAVORITE TH-camrs Kody! I'll try this on my little sister's school chromebook! Of course, it's just for fun! I'll show her how I'd do it so she doesn't worry.

  • @AppaTalks
    @AppaTalks 5 ปีที่แล้ว +30

    "Entering a really secure password..." Hits keyboard 4 times LOL

    • @jaaguar13
      @jaaguar13 5 ปีที่แล้ว +9

      6Õ.~ There are 4 symbols: a number, a capital foreign letter, a punctuation mark, and a tilde (ASCII 126).
      In the English alphabet, there are 26 letters. With capital letters included 52 letters. When adding numbers then it makes 62 symbols. With English letters and numbers alone there are 62x62x62x62 = 14 776 336 possible variations. Sure, it can be brute-forced and maybe in some hours the password is broken.
      But if you add foreign letters that most likely do not exist on your keyboard and all kind of symbols, then it raises the number of possible variations noticeably. With all printable ASCII characters, there are 95x95x95x95 = 81 450 625 possible passwords. When using all possible characters in UTF-32 (2^32 = 4 294 967 296) then the number of passwords that one has to try is bigger than 3 x 10^38

    • @jaaguar13
      @jaaguar13 5 ปีที่แล้ว +6

      @@malwaretestingfan I believe that AES-256 is still stronger than a password that consists of all possible printable Unicode symbols. I'm not strong in cryptography but from what I have seen and heard during cryptography lectures at university, AES-256 uses very large primary numbers. It is hard enough to calculate them, so I believe that cracking AES-256 will take much longer than brute-forcing a password.
      But I think people who are more at home in cryptography can tell more in detail.

    • @zoltano_cortez
      @zoltano_cortez 5 ปีที่แล้ว

      Ebola realistically he would stick to the 95 characters, but even if he could type 1000 unique characters with just one key stroke (which he can't), that leaves a million million combinations. For simplicity, a thousand billion. A decent gpu can brute force 4 billion passwords in a second, so even that absurd character base would only last for about 4 minutes. If we use just 95 unique characters, it lasts a few milliseconds.

    • @vesves4961
      @vesves4961 4 ปีที่แล้ว +1

      its 0000 :D

  • @johnangelodejoya5800
    @johnangelodejoya5800 4 ปีที่แล้ว +1

    Wonderful tutorials null bytes. Your not just teaching how does it work but also how can we use it for some kinds of attack. Specially when testing it on something

    • @johnangelodejoya5800
      @johnangelodejoya5800 4 ปีที่แล้ว

      Also this is where I actually get started. Before I start making my own tools. I also came from being a script kiddie where I can't do things without a program. And now here I am making my own script❤

  • @bsmmhdtfk981
    @bsmmhdtfk981 5 ปีที่แล้ว

    Choosing that song is brutal, no one in the history of humanity was able to get that song out of their heads once they heard it hhhh. Thank you, much appreciated.

  • @PauxloE
    @PauxloE 4 ปีที่แล้ว +8

    It should be mentioned that most of those need either root access or at least access as same account as the person who is using the computer right now.
    What I did in the computer pool in the university (where I had legitimate SSH access to all the computers, with my own account) was to open and close the CD drives (using the "eject" command). Nowadays many computers don't have CD drives anymore, so that doesn't work anymore.

  • @floof9789
    @floof9789 4 ปีที่แล้ว +1

    In college we used to SSH in and open/close the CD ROM... watching the faces on the CS 101 students was priceless

  • @DataLux-iq5fl
    @DataLux-iq5fl 2 ปีที่แล้ว

    whats a good resource for composing the cron tab that searches for a specific program than persistently kills it.?

  • @AL-hm7xr
    @AL-hm7xr 4 ปีที่แล้ว

    Best channel on TH-cam. The more I watch, the more I realize that I don't know shit about shit.

  • @FennecTECH
    @FennecTECH 5 ปีที่แล้ว +2

    my favorite is a prompt "All your box are belong to us"

  • @m.rightway2850
    @m.rightway2850 5 ปีที่แล้ว +20

    oh god , he blinked at 0:51

    • @j0n4_
      @j0n4_ 4 ปีที่แล้ว

      but ... like ... slooowllyyyy

    • @homelessrobot
      @homelessrobot 4 ปีที่แล้ว

      @@j0n4_ and not even completely

  • @TMBfan
    @TMBfan 2 ปีที่แล้ว

    We all miss you here on TH-cam, Kody.

  • @sweekardahal9811
    @sweekardahal9811 4 ปีที่แล้ว

    I am just curious about the fact when you first made a connection was that toor@toor: ubuntu's username or account ?
    I guess it's their username or account .
    And you did mention something about port forwarding ?
    Did you made a port forwarding at begining ?
    And how are we supposed to know anyone's username in LAN ?
    The last one
    it can only be performed in linux ? Or are there chances of getting into window's command promt ?
    And we are attacking the ssh port right by the ip address ??

  • @gamaray6136
    @gamaray6136 3 ปีที่แล้ว

    Do you prefer using key-gen -t rsa and putting the public key on a device so you can gain access quicker or just entering the users password each time?

  • @icakaicaka9624
    @icakaicaka9624 4 ปีที่แล้ว

    Great
    I can't understand why my Kali can't see usb wifi tp-link, or see it as a Ethernet connection. I have done everything in network, in devices and steel not happening. Any help?

  • @pfklol2397
    @pfklol2397 3 ปีที่แล้ว

    I'm trying to learn linux and rn im attempting this from my virtual machine to my macbook. when I try the modprobe command, i get the output sudo: modprobe: command not found. If i log in as root, modprobe command still can't be found. any suggestions?

  • @adityajoshi321
    @adityajoshi321 5 ปีที่แล้ว +1

    How can you ssh into someone's PC in the first place? From what I understand (limited:)).. ssh is used for terminal access to another device? Can it be done to someone's window or Mac PC? Isn't ssh blocked by default? And if someone set ip up...only they know the password. HELP ME

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +1

      Some devices will have SSH open by default on others it will be blocked as you mentioned, on those you have to find a way to enable the SSH ports.

    • @adityajoshi321
      @adityajoshi321 5 ปีที่แล้ว

      @@NullByteWHT Can't believe you replied personally! Now I feel kinda ashamed that I didn't go through the video as thoroughly before throwing in those questions 😂. Can those ports be opened by an attacker remotely and what if a strong password is already set for ssh access by the PC admin? I'm guessing you would have covered these in maybe this or other videos? Thanks a lot!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +1

      You can always try to brute force an SSH password but if it's strong it's gonna take longer than you're willing to wait. Ports can be opened remotely but you would have to hack the PC some other way first and put a RAT on it and open the port from the inside.

  • @cooller8888
    @cooller8888 5 ปีที่แล้ว

    is root necessary to install SSH server on victims' computer? I mean... can I install the SSH server without 'em knowing it like thru payload in rubber ducky or something? than deauth 'em from network, capture handshake thru pineapple or whatever and than attack however I want maybe get root password thru phishing malware than get complete control of that machine?

  • @404hater_8
    @404hater_8 3 ปีที่แล้ว +3

    I like how he said "let me put in the very secure password" and then typed 3 keys😂😂👏👍

  • @manuelfrosi2799
    @manuelfrosi2799 5 ปีที่แล้ว

    What would be the changes to make when doing this against a windows pc? is there a beep alternative?

  • @urgencepc4563
    @urgencepc4563 4 ปีที่แล้ว

    Dude.
    I had to re-listen to your introduction. I was captivated by the utter lack of blinking from your eyes.
    During. The. Whole. Script.
    Damn.

  • @neilslater877
    @neilslater877 3 ปีที่แล้ว

    I saw someone use a port to remotely make another machine download something on your network is this possible?

  • @KamaradeKriska
    @KamaradeKriska 5 ปีที่แล้ว +7

    This dude is the IRL Sheldon (Big Bang Theory)

  • @qj1eo
    @qj1eo 3 ปีที่แล้ว

    I have a serious question
    Why hackers always put 17:38 song ?
    Can not Understand what is the special about it ??

  • @Hdhsgshgd
    @Hdhsgshgd 4 ปีที่แล้ว +1

    You use CMD to do that? Or metasploit? Pls answer

    • @igorthelight
      @igorthelight 3 ปีที่แล้ว

      He uses Bash-based Linux Terminal.
      Maybe Xterm.

  • @unicodeq
    @unicodeq 5 ปีที่แล้ว +6

    "Make sure you don't get caught"
    Uploads a video

    • @iuseyahoo
      @iuseyahoo 4 ปีที่แล้ว

      its his computer so its not illegal

  • @-someone-.
    @-someone-. 5 ปีที่แล้ว +8

    If you blink, then you miss that encrypted subliminal message, level 6 hacking😎

  • @ar00042
    @ar00042 4 ปีที่แล้ว +3

    He’s mr.robot’s third hidden personality....

  • @draco5991rep
    @draco5991rep 4 ปีที่แล้ว

    Do 'export DISPLAY=:0.0' also works on Windows or do I have to use another command?

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      You should read this thread hopefully it will answer your question better. superuser.com/questions/325630/how-can-i-export-display-from-a-linux-terminal-to-a-windows-pc

    • @draco5991rep
      @draco5991rep 4 ปีที่แล้ว

      @@NullByteWHT Thank you it really helped.

  • @shead1991
    @shead1991 5 ปีที่แล้ว +85

    Are you spying on me🤔 I was searching for ssh

    • @SadKris
      @SadKris 5 ปีที่แล้ว +5

      My Mind Nope, just untrustworthy data collection

    • @JoseOrtiz-nw1rk
      @JoseOrtiz-nw1rk 5 ปีที่แล้ว

      Yes

    • @anotherguy1260
      @anotherguy1260 5 ปีที่แล้ว +1

      I was looking for internet porn.

    • @tiktokauut
      @tiktokauut 5 ปีที่แล้ว +1

      @@anotherguy1260 no nut November bro xd

    • @Jaydenboateng
      @Jaydenboateng 4 ปีที่แล้ว

      How do you get the ssh of a computer?

  • @jabourney1321
    @jabourney1321 5 ปีที่แล้ว +9

    My type of haunting during halloween😏

  • @slusheewolf2143
    @slusheewolf2143 4 ปีที่แล้ว

    Does this only work with Linux machines? Can I do this with a Windows machine?I have a Windows host that is guesting a Linux machine, and I'd love to do this to my host machine through my Linux machine. It would be a good tactic to learn.

  • @alarmsquadnj
    @alarmsquadnj 5 ปีที่แล้ว +1

    Wow glad your back I be getting soon in my laptop Kali Linux and one with Linux minit is the one you are using in this video FYI this for testing only

  • @Ma1992Tt
    @Ma1992Tt 5 ปีที่แล้ว +88

    Man, I know a child who plays fortnite a lot. Be funny it randomly closed mid match and rickswarm happened 😂😂😂

    • @binarypench
      @binarypench 4 ปีที่แล้ว

      what's rickswarm?

    • @joeshedler6496
      @joeshedler6496 4 ปีที่แล้ว +2

      @Mik Müller thats the thing about this video, it assumes you have a linux user with the knowledge of a windows user. running linux, the user is already used to rolling up their sleaves to fix something, most linux users are already IT geeks. ROFLOL

    • @SomeKidsAtHomes
      @SomeKidsAtHomes 4 ปีที่แล้ว

      @Mik Müller u can have a ssh server on windows too

    • @thatotherandrew_
      @thatotherandrew_ 4 ปีที่แล้ว

      @Mik Müller You can do it on another OS too, but that's beside the point, how rare do you think Linux is??

    • @gosth81
      @gosth81 4 ปีที่แล้ว

      Don't

  • @treefiddy8811
    @treefiddy8811 4 ปีที่แล้ว +1

    If the client on the other end of the SSH attack had remote access disabled wouldn't this be ineffective?

  • @iliahristov99
    @iliahristov99 5 ปีที่แล้ว +3

    I love your series! Keep doing the good work! :)

  • @anirban7375
    @anirban7375 4 ปีที่แล้ว

    Can u connect to your own device?? I wanted to connect to my own device and its showing: Connection Refused

  • @1990spiderman
    @1990spiderman 5 ปีที่แล้ว

    What are the recommend specs for a computer to start learning ethical hacking? Going to install kali linux on that pc

    • @zoltano_cortez
      @zoltano_cortez 5 ปีที่แล้ว

      Victor Hernandez 16gb ram minimum if you intend to run linux in a virtual machine, even if not the ram never hurts to have. Use or have access to a tower pc with a decent GPU if you intend to do any password cracking, and have a few hundred gb storage on it for common word tables like roku. A decent processor. Which nowadays they all are, but what's important here is the multithreading for quickly running scans. A laptop is fine for enumeration purposes, but you really limit yourself if you dont use or have access to something with a gpu in it. If you want specific specs, I guess anything with 16gb ram (or even 8gb if you aren't running a virtual machine) 256gb storage and an i7 processor (probably even an i5 but the i7 are becoming reasonably priced) would be pretty good to start. And basically any gpu will be good, you dont need a fancy 1080ti or anything expensive but the better it is the faster it will run through tables for you.

  • @charlesdanny1824
    @charlesdanny1824 5 ปีที่แล้ว

    Could you please let me know the name of the book back of you called with the word CODES

  • @ajhabdkaiak8173
    @ajhabdkaiak8173 5 ปีที่แล้ว

    I know that this is a really mundane question but how would i go about learning this sort of stuff? I have been trying but so far ive only seen how to do this in an IDE with java. I’m not sure if it is the same thing or what. Any help would be greatly appreciated even if its just a general thing to look for i want to thank you in advance if by any chance you do see this message!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว

      Check out our website null-byte.wonderhowto.com/

  • @zXHAcKeRzXz
    @zXHAcKeRzXz 5 ปีที่แล้ว +28

    8:33 Bomb has been planted

    • @ar00042
      @ar00042 4 ปีที่แล้ว +2

      call vote on the map :

  • @bestcakesdesign
    @bestcakesdesign 4 ปีที่แล้ว

    What should be starting point ?

  • @dropshotking1212
    @dropshotking1212 5 ปีที่แล้ว +1

    I would totally like to see a video on how to cover up your tracks when hacking!!

    • @dropshotking1212
      @dropshotking1212 5 ปีที่แล้ว

      Black Hat awesome yeah this kind of hacking... Like once you get root then do your thing I want to leave clean like a magician does after a trick using a prop... ok so I’ll learn about clearing logs. Is there anything else that I should learn about??

  • @imrharnomar9099
    @imrharnomar9099 2 ปีที่แล้ว

    I appreciate your fast manner . TANK'S

  • @irfan4701
    @irfan4701 4 ปีที่แล้ว

    Is there any way to do this on windows machine with openssh?

  • @DjOzKid
    @DjOzKid 5 ปีที่แล้ว

    Can you do a video for the flip side, how to do a clean up on the other side?

  • @mdabdullah4379
    @mdabdullah4379 4 ปีที่แล้ว +3

    Man, this video is so good. I did some serious shit in one of my university computer labs. It scared the shit out of a lot of people. Even my department chairman was looking for the perpetrator through cctv. They couldn't trace it to me luckily.

  • @aeio_
    @aeio_ 5 ปีที่แล้ว +2

    Sometime pranks are funny; sometimes they're not; sometimes you don't even know you're doing one.
    Decades ago at work, we had network computers. (DOS/Word Perfect/Novell 2?, 88-ish I think.) We had also purchased some Intel? LanDesk? remote control software (a small TSR loaded after IPX network startup). We had maybe 40 computers and I was fixing the ones left on after hours. I was fixing yet another one where apparently someone had left their monitor on. I heard the next day that a clean-up worked had quit because she was working next to a "haunted computer" -- that was me connected to it remotely, typing -- and didn't want to be there anymore. I tried talking to my manager but to no avail.

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +1

      OMG really?!?! that's a great story

  • @teaqllabs6174
    @teaqllabs6174 5 ปีที่แล้ว +2

    I am 13 years old trying to lean ethical hacking so you are a good help! I watched you since i was 10.
    P.S Can ubuntu be used for hacking too?

    • @OGkrymsonclouds
      @OGkrymsonclouds 5 ปีที่แล้ว +1

      kali linux is the most "hacker friendly" but you wont find nuch help in learning it. ubuntu can use the same tools but you risk breaking your system much more because they arent fully supported

    • @SheIITear
      @SheIITear 5 ปีที่แล้ว +1

      Yes, I use Ubuntu these days

    • @teaqllabs6174
      @teaqllabs6174 5 ปีที่แล้ว

      NoobFin Ok thanks! :)

  • @rollercoaster55
    @rollercoaster55 4 ปีที่แล้ว

    How do you make a huge red warning flash on the screen like in the movies?

  • @sahrbsesay1990
    @sahrbsesay1990 4 ปีที่แล้ว

    so the attacking machine must linux? or you can use other os

  • @wistonlawsons4443
    @wistonlawsons4443 3 ปีที่แล้ว

    So this only works if we have access to the network?

  • @manorotti
    @manorotti 5 ปีที่แล้ว

    I have a wifi duck what kind of scrips can you recommend for trolling

  • @n.w.aicecube5713
    @n.w.aicecube5713 4 ปีที่แล้ว

    Great video. Could you give me an idea ?I'm looking for an unattended ssh server for windows. Any suggestion. I also don't want to show any GUI or notification something like stealth mode. I want to use it in case my laptop get stolen so ill be able to find it

    • @sweekardahal9811
      @sweekardahal9811 4 ปีที่แล้ว

      No you cant ,
      It can only be perfomed inside a local network ?
      And if your laptop gets stolen the network changes from your's to the next and ip address are dynamic they change rapidly when you are in next network .
      The 1st step was done with ip address .
      So it's not possible i guess .

    • @n.w.aicecube5713
      @n.w.aicecube5713 4 ปีที่แล้ว

      @@sweekardahal9811 I was able to find a solution with bitvise and tor hidden services. Thanks anyway!

    • @sweekardahal9811
      @sweekardahal9811 4 ปีที่แล้ว

      @@n.w.aicecube5713 i guess configuring can help .
      Bitvise was costly . It would allow remote connection .

    • @n.w.aicecube5713
      @n.w.aicecube5713 4 ปีที่แล้ว

      @@sweekardahal9811 there was an old version that offered personal use. And in tor no one can find it cuz tor links cant port scanned.

    • @sweekardahal9811
      @sweekardahal9811 4 ปีที่แล้ว

      @@n.w.aicecube5713yeah tor connection would be reliable and hidden.

  • @Cneqq
    @Cneqq 4 ปีที่แล้ว +1

    Would this technically still work between a Raspberry PI and a windows PC with openSSH?

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      Yes I believe so but I haven't actually tested it.

    • @eper9866
      @eper9866 4 ปีที่แล้ว

      it does work.

  • @threepoint1434
    @threepoint1434 5 ปีที่แล้ว +1

    This is my kind of hacking right here. Love to pull a hacking prank. Happy Halloween!

  • @technogate9150
    @technogate9150 5 ปีที่แล้ว +2

    Is it limited to linux users only?

    • @sky8831
      @sky8831 5 ปีที่แล้ว +1

      Technically you can establish an SSH connection from most operating systems including Windows and Mac but Linux is the simplest and most common.

  • @jacktringoli4027
    @jacktringoli4027 4 ปีที่แล้ว

    Why is this not working for me? I'm trying to do this to my own laptop but I can't do the "ssh toor@ip.add.r.e.ss" it just keeps timing out and I've been Googling and searching TH-cam for hours and can't find anything to help me figure out how to ssh into my laptop so I can continue trying the rest of this video

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      You are putting in the actual IP right? it should look something like "ssh toor@192.168.1.1"

    • @jacktringoli4027
      @jacktringoli4027 4 ปีที่แล้ว

      Yea I looked on my laptop to find its IP address and typed it in just like that except with my IP address for the laptop. It just sits and then times out but any other IP address I try just says "connection refused" I even turned off all the security features too it still kept timing out. I even went on Google to search what my IP address was (which was completely different from the IP address my laptop itself gave me) I even opened up the command prompt and did ifconfig to see the IP address.
      I even Googled for an hour how to ssh into my laptop I watched like 10 videos with no luck 😭 I'm also using kali Linux on a completely separate desktop I tried running that ssh toor@ip.add.r.e.ss both in root and the low user account same thing
      And I did your steps in "10 things to do after installing kali Linux" before even trying this in the first place

  • @TheKeule33
    @TheKeule33 5 ปีที่แล้ว +4

    Selfdestruct... 60 seconds ... beep, beep beep
    You've got it covered :D haha

  • @MuhammadAhsan-hq2bc
    @MuhammadAhsan-hq2bc 5 ปีที่แล้ว +7

    I have always wondered about this. This is great Kody :)

  • @asimgurung1272
    @asimgurung1272 4 ปีที่แล้ว

    I'm getting this xterm: command not found error on my mac, what can I do?

    • @igorthelight
      @igorthelight 3 ปีที่แล้ว

      You don't have a "Xterm" Terminal :-)
      You may try to find and install it for your Mac. Or find an alternative.
      Remember - every command that you type in a Terminal is actually a program + parameters!

    • @asimgurung1272
      @asimgurung1272 3 ปีที่แล้ว

      @@igorthelight thank you😀

  • @mattiascarlson
    @mattiascarlson 2 ปีที่แล้ว

    Where did you learn all of this

  • @gulmirakoch8682
    @gulmirakoch8682 3 ปีที่แล้ว

    It doesn't work for me it only says "ssh: connect to host 10.0.02.22 port 22: Connection refused"

  • @furejul7619
    @furejul7619 3 ปีที่แล้ว

    what was you typing at 2:36?

  • @cadenwilliams9851
    @cadenwilliams9851 4 ปีที่แล้ว

    is there a similar thing for windows? Or does this also work on windows?

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      You can SSH on Windows.

  • @___xyz___
    @___xyz___ 5 ปีที่แล้ว +4

    1:46 what's more serious than an unauthorised SSH login? if they seized root they could literally kill the computer in 1 script.

  • @Merigold83
    @Merigold83 4 ปีที่แล้ว +1

    Problem is, that works only on unix-like systems. Firstly because of the fact that Windows dosen't undersatand the commands that are shown in this video and secondly the windows-user has to activate the ssh-server on his pc-computer.

  • @k1dprogaming108
    @k1dprogaming108 4 ปีที่แล้ว

    But do you need to install anything or can you just use code?

  • @neomatrix3612
    @neomatrix3612 5 ปีที่แล้ว +2

    Your videos are awesome.. Always interesting and cool. Thanks. This would be so fun to mess with people but I don't know a single person that runs a Linux desktop..

  • @melindaelston1875
    @melindaelston1875 5 ปีที่แล้ว +2

    This video is awesome. You are one of a kind and I appreciate your content!

  • @Robidu1973
    @Robidu1973 5 ปีที่แล้ว +1

    If you wanted to kill a single process, top is an overkill to get the pid. Taking the example here, a much quicker way would be killall firefox.

  • @Travel2Heal
    @Travel2Heal 4 ปีที่แล้ว

    As always you are awesome NullByte

  • @antoninjacob2232
    @antoninjacob2232 4 ปีที่แล้ว

    You can't execute those commands on windows right?

  • @Soveshchaniye
    @Soveshchaniye 5 ปีที่แล้ว +1

    What's the book "CODES." on the backend?

    • @manorotti
      @manorotti 5 ปีที่แล้ว

      Detlaf Mahone hi

    • @Soveshchaniye
      @Soveshchaniye 5 ปีที่แล้ว

      @@manorotti hi :)

  • @herbertlahl7176
    @herbertlahl7176 5 ปีที่แล้ว +3

    I have a great idea for my last day at work

  • @jondicks450
    @jondicks450 3 ปีที่แล้ว

    how do i get ssh on kali linux it only works on my own pc. or how to set it up to play tricks on the wife

  • @JollygreenFullSteam
    @JollygreenFullSteam 5 ปีที่แล้ว

    How can I do this to a smart phone that's on the same network??

  • @jugginator4390
    @jugginator4390 5 ปีที่แล้ว +1

    😂 Happy Halloween TrollByte! I may have new ideas for one of my friends. :D

  • @qqqalo
    @qqqalo 5 ปีที่แล้ว +5

    I'm gonna use this for making laptops at Starbucks play Costa adverts.

    • @ArtisticallyEligible
      @ArtisticallyEligible 5 ปีที่แล้ว +4

      all those white girls with leggings won't see it coming

    • @wolf-war-master
      @wolf-war-master 5 ปีที่แล้ว +1

      Don't forget Cafè Nero ads too😱

  • @ValentineAinsley
    @ValentineAinsley 5 ปีที่แล้ว

    Will this work with the android userland kali image?

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว

      I think it should

    • @ValentineAinsley
      @ValentineAinsley 5 ปีที่แล้ว

      @@NullByteWHT It gives me "port 22: connection refused" after I input "ssh toor@xxx.xxx.x.xxx"

    • @ValentineAinsley
      @ValentineAinsley 5 ปีที่แล้ว

      @@NullByteWHT I input the digits I got from using ifconfig

  • @DUKECANTUBE2240
    @DUKECANTUBE2240 ปีที่แล้ว

    So if the hacker is doing reverse shell the victim isn't going to assist init so try doing that attack without5ouch both hacker boxs.

  • @salpertia
    @salpertia 5 ปีที่แล้ว +9

    OK so. You're giving us the know how on doing it but if you ask for permission it literally defeats the immersion of "haunting"?

    • @CrypticConsole
      @CrypticConsole 5 ปีที่แล้ว

      Or do it on a pc you lent a friend

    • @jacktringoli4027
      @jacktringoli4027 4 ปีที่แล้ว

      I mean not really you can get permission but it doesn't mean you have to do it right then and there lol my buddy said I could hack his computer and I told him he wouldn't know when because I want it to be a game for me like I told him to tell me when he thinks I'm hacking like to text me "you're hacking me now aren't you?" So that means pretty much anything he thinks is suspicious lol he's been texting me for like a week I still haven't done it yet 😂 I'm still trying to get this to work doing it to my own laptop first 😭

    • @salpertia
      @salpertia 4 ปีที่แล้ว

      @@jacktringoli4027 but what happens when they know it was coming?

    • @jacktringoli4027
      @jacktringoli4027 4 ปีที่แล้ว

      He already gave me permission to do it and he knows he's not going to know exactly when I'm going to actually hack his computer I'm waiting for him to forget about it then I'll do it and even if he doesn't forget the whole point is for me to see if I can do it without him even noticing because I am going to tell him I hacked after I have already done so lol I want him to be sitting there watching TH-cam or something And then all of a sudden his mouse turns into a middle finger or get his computer to say "(his name) you're a dumbass" or whatever
      Right now he thinks every little glitch or lag is me hacking him so it's a bit of a learning experience for both of us as I get to see what it's like and how hacking works which should help me later on in school when I reach those classes and he gets to be on the receiving end of being hacked and what's just the computer acting up on its own and how well his security is etc.
      And to add an example if you have ever watched how I met your mother when barney and Marshall had the slap bet lol barney knew there was 5 slaps coming but he had absolutely no idea when and that anticipation builds up