Is Linux Really Unhackable???

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ก.ค. 2024
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 56

  • @LoiLiangYang
    @LoiLiangYang  3 ปีที่แล้ว +10

    The video I was referring to, 5 Signs Your Computer Has Been Hacked: th-cam.com/video/RRbkvseO-4k/w-d-xo.html

    • @sherazkhan6293
      @sherazkhan6293 3 ปีที่แล้ว

      Sir how to reboot usb on PC to use Kali Linux can. You make video

    • @s.aravindh6227
      @s.aravindh6227 3 ปีที่แล้ว

      Kali Linux os

    • @ben10mama
      @ben10mama 2 ปีที่แล้ว

      I'm just curious, does Linux still give any better security than windows? Like besides the probability, but in terms of actual physical structure of the two operating systems, did Linux give any advantage?

  • @AriannaEuryaleMusic
    @AriannaEuryaleMusic 3 ปีที่แล้ว +8

    Everything, Every system, Every Computer, Every Human is Hackable

  • @abdullahal-shimri3091
    @abdullahal-shimri3091 3 ปีที่แล้ว +5

    Linux is very difficult to hack. If there is one hacker writing malware for Linux there are 10 programmers working to counter that - that’s the advantage of open source. Also, for malware to make changes to your box it needs sudo access.

    • @xeridea
      @xeridea 3 ปีที่แล้ว

      The security model is definitely better, but not guaranteed. Also, being open source has drawback of it being easier to find vulnerabilities, since you have source code, and don't need to rely on disassembly, or leaked code. No system is perfect. Also, sudo access can be granted if an exploit is found.... that's pretty much how malware spreads. You need admin access on Windows to do a lot on Windows, or Mac... but that doesn't mean it isn't possible. There have been exploits found that existed for years, or decades before being found. As was mentioned in video, if Linux had 80%+ marketshare, there would be a lot more viruses.
      Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel - went unpatched for 10 years.

  • @ahmadkhaled7497
    @ahmadkhaled7497 3 ปีที่แล้ว +3

    Hacking is no longer relying on which operating system is safer. Because all the methods are concerning the internet which is the common thing among all the operating systems including mobiles as well. So it's really down to the user and his understanding of what is he clicking on and what apps he's downloading. And those like me have very tiny knowledge about it should advice our friends and families to help them do their stuff without any concerns.

  • @Seasonednuts-iv5gd
    @Seasonednuts-iv5gd 3 ปีที่แล้ว +4

    what about if we encrypt the harddisk like there is an option in pop os which encrypts hard drive is that gonna work

    • @xeridea
      @xeridea 3 ปีที่แล้ว +1

      Encrypting disk will likely significantly slow down the hacker, so long as password is sufficiently strong. If you were a really high profile target, and they REALLY wanted in, with sufficient resources, and time, they may still get in. Also, if computer is on, there are ways of pulling out the RAM, and retrieving the information (it isn't cleared immediately, and can be slowed by cooling it), so it is possible to get decryption key.

  • @darkpheonix69008
    @darkpheonix69008 3 ปีที่แล้ว +1

    I got confused by the hardware part, anyone tech savvy (anyone who uses linux) nowadays would run some kind of full disk encryption and while bitlocker has some attacks anything like veracrypt/truecrypt would stop any reading of the files without any performance penalty with all the AES instructions.
    Now there are many other ways to breach into the system with side channel attacks, evil maid, reading from memory if the system is running which would have been a better fit for the "access to hardware" context imo

    • @dingokidneys
      @dingokidneys 3 ปีที่แล้ว

      His point was that there is (almost) always a way to get to the data.
      Most people aren't going to be protecting against someone reading encryption keys from memory by dropping the whole system into liquid nitrogen. :)
      He's essentially pointing out that you can't sit back and say to yourself "I'm impervious because I'm running (Ubuntu/Fedora/Solus/etc) Linux."
      People who look for a panacea look in vain.

  • @scott32714keiser
    @scott32714keiser 3 ปีที่แล้ว

    Live os with bluetooth internet with one time pad encryption and max users set to the amount of devices you got connected

  • @manmaththigale1770
    @manmaththigale1770 3 ปีที่แล้ว +2

    Love from India

  • @Sebastianek666999
    @Sebastianek666999 2 ปีที่แล้ว

    What if someone is using encrypted VM version of Linux?

  • @tonyfernandes216
    @tonyfernandes216 3 ปีที่แล้ว +1

    what are the benefits of using a Linux webserver over windows? thanks

    • @dingokidneys
      @dingokidneys 3 ปีที่แล้ว +1

      Performance? Cheaper to host on a cloud service?

  • @xx_blank_xx671
    @xx_blank_xx671 3 ปีที่แล้ว +2

    Yeah it's just that everything in the wild targets windows

  • @rodricbr
    @rodricbr 3 ปีที่แล้ว +2

    everything is hackable, no system is perfect, there's always a flaw on it

  • @saidTY
    @saidTY 3 ปีที่แล้ว

    thank you

  • @johnroyce8650
    @johnroyce8650 2 ปีที่แล้ว

    1:10 Use FULL DISK ENCRYPTION

  • @redapple6392
    @redapple6392 3 ปีที่แล้ว

    can you make a video on bluesnirfing and bluejacking

    • @dingokidneys
      @dingokidneys 3 ปีที่แล้ว

      Not really a bit deal to go by the articles on Wikipedia. Anything Bluetooth is limited to a physical distance of only a few tens of metres.

  • @marioadelin2687
    @marioadelin2687 3 ปีที่แล้ว +1

    Subtitles?

  • @EdwardSnowden125
    @EdwardSnowden125 3 ปีที่แล้ว

    I don't understand why PPL think linux is unhackable like all servers run linux or almost all and servers do get hacked!

  • @pietjan2650
    @pietjan2650 ปีที่แล้ว

    There are 200 million engineers from china and india looking through the open source code of linux they will find every vulnerabilty

  • @corel965
    @corel965 3 ปีที่แล้ว

    Short answer is no.

  • @Windows-sq3vb
    @Windows-sq3vb 3 ปีที่แล้ว

    Linux cant hack but finded key attack network protocol and using reverse engineering attacks well done hacktable linux pc.

  • @themtg5151
    @themtg5151 3 ปีที่แล้ว

    If my harddrive is encrypted, whis a password that will take 2 billion years to bruthforce. Can you get acces when? Ez.

    • @xeridea
      @xeridea 3 ปีที่แล้ว

      There are ways to extract the key from RAM if system is on when they gain access.

  • @svenvangestel7572
    @svenvangestel7572 4 หลายเดือนก่อน

    Bad movie now I don't know that it is hackable or nor

  • @scott32714keiser
    @scott32714keiser 2 ปีที่แล้ว

    Well I don't think Linux is unhackable. I think most people use windows than Linux so coders make code on the computer they have and use so basically most viruses are made for windows. But Linux does have a few things it can do like with systemback you can install 1 app on a Linux os and backup to iso and burn to dvd and with toram Linux can run from ram and once booted you can unplug the boot drive. And with a SD card you can set it to read only. And with toram your drive speed only effects boot times because it's not running from the drive it's running from ram. So if your offline at boot and you unplug your drive after boot before you go online. you can still get a virus but it's contained in one os not all of them so any virus will only run when I want to run the app so I just consider it a add because once I'm done using the app it came with and use another app the virus is gone and won't come back until I use the os again and any viruses that come with other means would be gone after a reboot so basically all virus can be basically harmless and only temporary only when accessing that thing that caused the virus so I don't even worry about it if I got a virus I can't tell and I know for sure all viruses will be gone after a reboot I only thing i haven't figured out yet is the until management engine and the other names for other devices I'm thinking make a app that can access the internet over monitor mode and have like a raspberry pi to access the internet

    • @timothygraziano5727
      @timothygraziano5727 8 หลายเดือนก่อน

      one point of contention: overwriting a virus by using a read-only assumes it isn't a rootkit that can write itself into the firmware of the storage device, no?

    • @scott32714keiser
      @scott32714keiser 8 หลายเดือนก่อน

      @@timothygraziano5727 well theres the cmos chip sucks not removable anymore you used the be able to unplug it after boot in old computes but now you need to solder a button to it to kill the power to it but other than that not if you make a bootable iso and boot from dvd not hard drive theres no memory in my computer other than ram sure i can get a virus easy i dont use antivirus but i just reboot and im good to go. im so virus proof ill go to the same website and get a virus multiple times just because i dont care its only a few temporary popups most of the time. the fun ones are the ones that lock your files say they want money i just go lol and reboot

  • @System64MC
    @System64MC 3 ปีที่แล้ว +1

    Joke's on you, I use Fuchsia
    (I don't actually use Fuchsia ): )

    • @dingokidneys
      @dingokidneys 3 ปีที่แล้ว

      Ha ha!! Nobody can!

    • @System64MC
      @System64MC 3 ปีที่แล้ว

      @@dingokidneys Pretty sure you can actually use Fuchsia, as Google provides the OS's download links.

    • @dingokidneys
      @dingokidneys 3 ปีที่แล้ว

      @@System64MC True, but it is practically unusable.

  • @gamedose
    @gamedose 3 ปีที่แล้ว

    Hi

  • @BuckFitches
    @BuckFitches 3 ปีที่แล้ว

    Spoileralert
    Yes, you can!

  • @ClashWithHuzefa
    @ClashWithHuzefa 3 ปีที่แล้ว

    Linux is hackable, if a ssh or ftp service is open…Bruteforce or anyonther vulnerability can gain access for a hacker…!! so yeah, Linux is also hackable, Everything is hackable !

    • @dingokidneys
      @dingokidneys 3 ปีที่แล้ว +2

      You can secure your SSH or SFTP service if you really want to. I've been running an SSH service exposed to the internet for about eight years now without anyone cracking into it. You have to be knowledgeable and vigilant.
      Even now I have nation state level actors banging on that door and I manage to keep them at bay by secure configuration and regular updating of critical software.

    • @ClashWithHuzefa
      @ClashWithHuzefa 3 ปีที่แล้ว

      That is amazing…Keep it up bro

  • @umairminhas6918
    @umairminhas6918 3 ปีที่แล้ว +4

    Yes Linux Is Hackable!

    • @blackjackdealer204
      @blackjackdealer204 3 ปีที่แล้ว +2

      For sure hackable.. systemd.. browsers and webrtc are the death of you.. perhaps less secure than windows in this specific instance

  • @whoami2876
    @whoami2876 3 ปีที่แล้ว

    How to hack wifi password in kali linux ?

    • @joeyhensley9199
      @joeyhensley9199 3 ปีที่แล้ว +1

      Is aircrack still in use?

    • @MuhammadLab
      @MuhammadLab 3 ปีที่แล้ว

      Airmo ng

    • @whoami2876
      @whoami2876 3 ปีที่แล้ว +1

      @@MuhammadLab my kali virtual box not working airmon-ng and airodump

    • @MuhammadLab
      @MuhammadLab 3 ปีที่แล้ว +2

      @@whoami2876 it must work
      Btw u must have Adapter
      The best adapter is
      Alfa adapter
      Kali Linux can detect that adapter automatically

    • @whoami2876
      @whoami2876 3 ปีที่แล้ว +1

      @@MuhammadLab ok thanks you

  • @sherazkhan6293
    @sherazkhan6293 3 ปีที่แล้ว +1

    First view

  • @nallananbana.d.s4511
    @nallananbana.d.s4511 3 ปีที่แล้ว

    sir Upload hacking videos about free fire game diamond hacking please