How Hackers Remotely Control Any PC?!
ฝัง
- เผยแพร่เมื่อ 3 ก.ย. 2022
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - วิทยาศาสตร์และเทคโนโลยี
Helped me control the government mainframe to pay my grandma's medical bills! Thank you so much Loi!
Omg, you explained it very simply! It's really easy to understand. Thank you so much! I've always wanted to learn these.
So insightful, many thanks!
Well i have been watching these tuts for like an hour straight and its just so interesting
Hi, I came from Brazil and this is perfect, I'm using after very easy, thanks!
Very good video🏆🏆🏆. Thank you sir for so much information 🙏. You are just like a mentor to us
Love the content you have helped me loads with php and just showed me some really cool stuff! 👍
As always great content!!
You are the best Loi! ~ Thank you
Very helpful brother thanks
Yes sir it was a value able lesson
Wow very impressive Mr. Loi Liang Yang
amazing stuff. Thank you
Loi, awesome content and tutorial sir! Thanks for sharing. Every time you post a new vlog I learn something pretty cool and new!
empire is a nice c2c tool ... used in a bunch of network exploiting labs some time ago ... easy to use and effective
Thanks you so much hacker loi
I really learn a lots from you always
is it possible to hide the .bat file with any kali linux tool? maybe as an image or pdf doc? thanx boss, absolutely amazing everything u teach us
Prolly
make a shortcut to it and then you can edit the icon
Appreciate your help
great work awsome you teach very well master :D
Thank you loi for your good tutorial ur the best
Very innovative video, just makes me want to some back-end languages!
Waw my bro your computer science is about Love ❤️
Hello you seem very experienced with this and was wondering if you can please help me out with a hacker on my pc
Hello dear community. Im having a presentation soon and I picked this video because he explains the topic in such a way that literally anybody can understand it (just not me) I want to explain it right so my question is if I have to be in the same network as my target and if so how do I achieve this?
Greetings from west sweden 😊
use virtual machine
Great explanation
Besides generating suspicious promps, Windows Defender and Security will flag that bat file as suspicious.
Good game you are amazing professor 🤝🎯
I watch his videos only for him to say "It is literally game over right now !!!".
TNice tutorials was easy to follow.
Hello Mr Loi... How can we detect and safeguard against such attacks ?
This is perfect, now my brother will have no choice but to give me that money via online banking. Thanks man!
No one cares bout you and ur mfker brother
Great tutorial👍👍👍👍👍👍👍👍👏👏👏👏👏👏
Very good contents! More More More.........
even i dont understand a single thing , but man , I want to be like you !
Now the powershell empire when running the command "sudo powershell-empire server" it says that:
-"No such file or directory: 'dotnet'
-"Plugin failed to run: csharpserver"
Can you do another video with the same concept but with a different way from powershell empire ?
Big fan sir
And also
Taken course from udemy
Most antivirus detect this kind of exploits even windows warns about executing bat files... but this tool is cool...
What are modules you would use for android?
Few tutorials on host header attacks pls
Can you tell us which software you use for hacking? It will work on windows? Or i need to download ubuntu or linux for this? Will this command will work with windows cmd
sweet man, i like your episodes
basically the most common attack vector nowaday is physing. no matter how you protect your credential, sosial hacking always the top threat.
😃wow great video 🤘🤘🤘
Wait, so if we were to send this to a user, wouldn't they get suspicious why a simple fila needs so many permission?
yes
can you move there mouse around that would be pretty cool to do
I have 8 backdoors on my old pc and hackers literally beef each other on my pc its literally so funny
Final Spiderman dialogue 🤣🤣🔥
Sir, can you make a video for network breaching in your next video?
completely love the video
i have a question : what happens when the victim switch off the computer will you be able to access it while is off or on again
Difficult in this case but not possible if the main power is off.
@@Mohitkumar-ug8jq thank you looking forward for more videos
As we are seeing more hackers, is there a way to reverse the hack seeing that they have a port into your computer/phone? If yes, would you make a video.
Hi bro I'm subscribed can you show in detail which app and which code u use 😀
Thank you Lori imma send the link
Please make vd how to create payload bypass av and advanced techniques tools for red team
Hello!
I have a problem: what do I search on the web for my file to appear?
Ok you showed how the remote access process is done. The question is about the security you have not shown. If someone falls into your trap and run the launcher then how can he get rid of you?
Hope you'll answer😊
By deleting the launcher.bat
@@user-mh1tj1no9bjett diff
he seems to make his videos alot like network shuck with all the drawing and stuff
can you show us how hackers control light or cameras or the traffic lights
how do u know what type of laptop or computer even desktop the person have?
how to get the website?
hacker loi is like that one cool friends dad who tells you some secrets but tells you not to tell anyone
You know he's ur real dad 😂
Now tNice tutorials was truly an aweso video. I love your thorough style
Hello Loi I have e question ?
Do you have a courses for hacking?
@Loi, how do you create your hacking labs.
Sir I thank u for teaching because by learning ethical hacking, I can help the victims by getting scammed by scammer
Ohh do I came accrosssss some kind of hacking method lol.... This is awesome let's try some more
Yes you must be on the same network. However when I tried this microsoft defender stopped me. I'm sure there is a workaround?
Did you find a workaround?
Thats amazing❤ 5:31
Your videos are just of great content to learning thank you
Which ipaddress and port number you used to open a file and then downloaded it, error in opening it, please assist
Which coding app you are using
Thanks bro it works perfectly 😂😂
the question is can we connect agian when the target off his laptop ?!
my apache2 server works just fine on the kali machine but when im switching to windows i cant come on the site
what ip does the target machine have to enter in the url? the server ip? and how to you find that info out?
Good vid, informative to those people who don't want to be hacked and what signs they need to look out for, also i could see this being quite useful in many situations
So even if you quickly change your password from your phone they can still access everything? Because my pc got hacked
hi i am big fan of you from india I have help from you that is pleace make video on how to install kali linux old version and slove the problem to install some packages like vile plesase 🙏🙏🙏🙏🙏🙏
what app did he use to draw on screen during video?! pls someone hlp...
Hii sir how you know about these all tricks, le me know sir plz🙏
So much things I have to learn dang
how do u pick your target?
did they need to be connected to the same network ???
Where can we get the programme pls list it
Do you use that kali linux computer in vbox?
Will be following
its nice to learn hacking, aswell as writing arabic at the same time!
What application are you using?kali linux?
Yes the operating system he is using is Kali Linux
how can we delete such file in case I have been hacked? and how can we prevent us from being hacked?
I don't get the part where you go to the browser
How did you get there
Mr Loi but if windows defender is up to date the payload generated by powershell empire does not pass then how to bypass this?
So what if after starting apache and everything im getting a web error that says cant reach the page, did i mess up a step or am i a script kiddy?
But surely even a n00b wouldn't right click, save as a random file, especially a .bat which won't even have an executable icon, and then think 'oh best go to my DLs to run that batch file'. I can see you're super talented but it seems like a lot of work casting your bait with very little chance for success. Is there a way to do this without the end user having to physically DL and run a file? Appreciate the content dude
No
@@hxd9321 lmfao
hard no
learn wireshark guys
whats the name of the software you use
i dont get the part u type in browser and then download what is that
IT dept remote into user computer to install Anydesk, but it prompts admin right which requires to key in admin/password.
But IT cannot let the user know the admin password, how can we bypass it to install Anydesk for the user?
Or any way we can remote to the user's computer (which has admin right), to troubleshoot on software issue?
As the admin right will keep prompt for the admin password whenever we troubleshoot.
Hi bro, I am your avid viewer and really adore your content! Only here a strange phenomenon calls to me, when I set up the server, the line of port remains empty and without a defined port and then in fact it is not possible to continue. It happens every time and no matter how much I tried to update the system or the network settings. Can you help me please? Thank you very much!
Nice. But the likehood of a successful execution is, obviously, quite slim.
does it work if the other computer is turned off? and does the user see me controlling their computer?
what was that column linux thing?
Nice vedio please Mr loi another tutorial for hacking mobile