Not easily but there are ways. By stealing the victims cookies for any site, you can steal their session and import them into your own page which negates password and 2FA.
When I run the launcher.bat file nothing happens, anyone know whats going on? A cmd pops up and goes away but in the empire terminal nothing connects. Plz help :/
Now the powershell empire when running the command "sudo powershell-empire server" it says that: -"No such file or directory: 'dotnet' -"Plugin failed to run: csharpserver" Can you do another video with the same concept but with a different way from powershell empire ?
4:26 can someone explain me that whats the domain ip how to make it or enter it?? please someone tell me what ip we are gonna give to a user to crack and remote his pc?
Ok you showed how the remote access process is done. The question is about the security you have not shown. If someone falls into your trap and run the launcher then how can he get rid of you? Hope you'll answer😊
Can you tell us which software you use for hacking? It will work on windows? Or i need to download ubuntu or linux for this? Will this command will work with windows cmd
completely love the video i have a question : what happens when the victim switch off the computer will you be able to access it while is off or on again
Hello dear community. Im having a presentation soon and I picked this video because he explains the topic in such a way that literally anybody can understand it (just not me) I want to explain it right so my question is if I have to be in the same network as my target and if so how do I achieve this? Greetings from west sweden 😊
AFTER DOING YOUR COURSES WILL YOU GIVE US A CERTIFICATE OR ANY OTHER DEGREE THAT YOU ARE ELIGIBLE FOR TAKING JOB IN ANY COMPANY OR WORKING AS A ETHICAL HACKER
Hey Loi, i'm having some trouble with the port. I'll get to the "set port" stage/part and the port in Empire with have no number or anything. I'm no sure how to fix this, can't really find anything about the problem. Thanks for the amazing video, it's quite educational and easy to follow. 2:50
But surely even a n00b wouldn't right click, save as a random file, especially a .bat which won't even have an executable icon, and then think 'oh best go to my DLs to run that batch file'. I can see you're super talented but it seems like a lot of work casting your bait with very little chance for success. Is there a way to do this without the end user having to physically DL and run a file? Appreciate the content dude
IT dept remote into user computer to install Anydesk, but it prompts admin right which requires to key in admin/password. But IT cannot let the user know the admin password, how can we bypass it to install Anydesk for the user? Or any way we can remote to the user's computer (which has admin right), to troubleshoot on software issue? As the admin right will keep prompt for the admin password whenever we troubleshoot.
As we are seeing more hackers, is there a way to reverse the hack seeing that they have a port into your computer/phone? If yes, would you make a video.
Is it possible to write a php or javascript code in such a way that as the visitor visit our website then our payload automatically install and execute at the same time? Is it possible?
No to execute code you would need to exploit a bug in the internet browser. And then that user needs to be using that browser and a version of it that’s exploitable
Hi bro, I am your avid viewer and really adore your content! Only here a strange phenomenon calls to me, when I set up the server, the line of port remains empty and without a defined port and then in fact it is not possible to continue. It happens every time and no matter how much I tried to update the system or the network settings. Can you help me please? Thank you very much!
I don't understand where did you get the Ip address from. Im testing this and im trying to control my friend's computer (Friendly). That means I should put HIS Ip address there. But how do i get his Ip address?
hi i am big fan of you from india I have help from you that is pleace make video on how to install kali linux old version and slove the problem to install some packages like vile plesase 🙏🙏🙏🙏🙏🙏
hello loi, i have a particular problem with my online works. i found out that my phone is hacked and there is an online tracking app attached to every work i do online. this have retarded most of my works. because they use theses apps to manipulate what i do. my online courses,webiners, businesses and others. i thereby installed some anti hacking apps on my phone, it identify some unknown malicious apps like the 'dark'. my questions or request from you is that how much probability can these people be tracked?
Very nice vidéo I have a question ? You can create a file that imitate the wifii access on your computer To tell you you for exampe ! You need to acess your wifii network again Even if you have automacically connected since the beginning ??
Can anyone tell me what the best way to get a target host for testing? Just a VM would do right? And also what would make the user select that file and how would it just pop up?
I copied your steps Hacker Loi and I tried to open up the downloaded bat file , even after turning off real time virus and threat protection, unfortunately Windows 11 wouldn't let me open the bat file. i will turn off all Firewalls and try again. I am looking foward to seeing how you hide a bat file in a Domain Name and will that work? Will Windows 11 let me open up a file that contains a well hidden bat file ? Time will tell. I really want to overcome this hurdle and become a Hacker that can defeat Windows Firewalls.
A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *brian hacks online* . Every time you do a good job, you polish yourself one more time. Shine on mate, well done. Team Alex
Don't download stuff you aren't sure of, don't enter your credentials to websites that seem off. You have to be a tad bit paranoid to be extremely safe these days but i think if someone really wants to hack and has the dedication to do it there's nothing you can do
i'm having a bit of trouble on the part where you enter your port number in a windows computer i don't know what my port number is and i tried to google it and i did what it said i went to cmd and did this command netstat -a and got my port number and googled my port number/launcher.bat but i can't do anything like nothing downloads are you able to help with this?
system has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down. it gave me this when i typed sudo pwershell-empire server, how do i fix this?
Hey guys, Im watching this video and Ive gotten to the part where I must open the launcher.bat file. Only issue im having is that when I open it, I dont see the same things he does when opening his kali linux. Is there any fix to this issue, Ive seen multiple other people with this issue and they havent gotten answers so I just want to see if anyone has found a fix yet.
this thing is When in term of final complete control; it give error that the Driectory is Self made and can't access the remote connection. PLEASE HELP
hi basically im new to this field 😅 i was learning i got struck in port 4321 setup in my machine under port no number are there how should i setup the port😮 can anyone help me please thank you
What is a government computer's BIOS password were published on the website. How much damage could a person do remotely with a BIOS password and the known location of the computer?
Doesnt make sense to me... its all gonna fall apart at the first command "sudo apt install"... theres gonna be a challenge to the filesystem privelidge required... and then hes using sudo apt, to install onto a windows computer?
Im trying to use my mac and i have this error ..Trackback Most recent call,last): file "./empire",line 5, in from flask import flask, request, jsonify,makeresponce, abort,url_for Importerror no module flask "HELP"
Hello Guys!! May i know in real-time scenario how hackers send this malicious file to the victims machine , even if they send it successfully what if victim cannot open or run or even do not notice that particular malicious file??
you always crack me up when you show these kids how easy it is to access/take over a remote system. your tutorials are beautiful and spot on. as a followup to actions like this, how about a caveat of showing from the winders side, how to detect such breaches to the local security? just a quick idea suggestion, but 1 that I think, kinda, brings the idea full circle...... as always, looking forward to your next internet training adventure........
Thanks!
hey bot
Helped me control the government mainframe to pay my grandma's medical bills! Thank you so much Loi!
Bro
@@memebomberLMAOCan Anyone Let Me Know The Software Name Which He Use To Type Command In It?
@@shariqxcheats kali Linux
An operating system
..?!
Everyone that is watching this video to protect their pc from hackers :)
I have 8 backdoors on my old pc and hackers literally beef each other on my pc its literally so funny
hacker loi is like that one cool friends dad who tells you some secrets but tells you not to tell anyone
You know he's ur real dad 😂
is it possible to hide the .bat file with any kali linux tool? maybe as an image or pdf doc? thanx boss, absolutely amazing everything u teach us
Prolly
make a shortcut to it and then you can edit the icon
Make a shortcut that looks like chrome and wait
Well i have been watching these tuts for like an hour straight and its just so interesting
Hii Bro how are hacker's easily buy passing the 2nd step verification?
Usually by ss7 vulnerability
And hackrf1
Edit: This is for sms verification
Not easily but there are ways. By stealing the victims cookies for any site, you can steal their session and import them into your own page which negates password and 2FA.
Easy
@@jacoblessard8213 correct., or ss7 or sim jack
@@jacoblessard8213 I can see which devices are logged in? EZ
Omg, you explained it very simply! It's really easy to understand. Thank you so much! I've always wanted to learn these.
Wait, so if we were to send this to a user, wouldn't they get suspicious why a simple fila needs so many permission?
yes
When I run the launcher.bat file nothing happens, anyone know whats going on? A cmd pops up and goes away but in the empire terminal nothing connects. Plz help :/
try all underscores
Add time out 200-500 secs at the start and the end of the script
Or maybe it’s just cuz ur opening it on the same pc
Now the powershell empire when running the command "sudo powershell-empire server" it says that:
-"No such file or directory: 'dotnet'
-"Plugin failed to run: csharpserver"
Can you do another video with the same concept but with a different way from powershell empire ?
4:26 can someone explain me that whats the domain ip how to make it or enter it?? please someone tell me what ip we are gonna give to a user to crack and remote his pc?
i’m also trying to find out lol
@@jshy5423 i find out
when you do that process you will get a ip use that
@@insanthat what process?
what app did he use to draw on screen during video?! pls someone hlp...
Yes you must be on the same network. However when I tried this microsoft defender stopped me. I'm sure there is a workaround?
Did you find a workaround?
Hello Mr Loi... How can we detect and safeguard against such attacks ?
Hello!
I have a problem: what do I search on the web for my file to appear?
4:25 i didnt understood that they are entering the ip so how can i know that the ip with port number please help
same question, did you figure it out?
Mr Loi but if windows defender is up to date the payload generated by powershell empire does not pass then how to bypass this?
Hi, I came from Brazil and this is perfect, I'm using after very easy, thanks!
Ok you showed how the remote access process is done. The question is about the security you have not shown. If someone falls into your trap and run the launcher then how can he get rid of you?
Hope you'll answer😊
By deleting the launcher.bat
@@DenisDennison-r9yjett diff
@@DenisDennison-r9yhow to find launcher.bat in windows...
the guy [0:02] is remotely controlling someone's pc with a youtube video, huh
Can you tell us which software you use for hacking? It will work on windows? Or i need to download ubuntu or linux for this? Will this command will work with windows cmd
is it possible to send the malware without a link or email, I mean just by public IP ? maybe using nmap, sql ?
No
@@nocturne2172 so only by email, usb etc...?
completely love the video
i have a question : what happens when the victim switch off the computer will you be able to access it while is off or on again
Difficult in this case but not possible if the main power is off.
@@Mohitkumar-ug8jq thank you looking forward for more videos
@Loi, how do you create your hacking labs.
Hello dear community. Im having a presentation soon and I picked this video because he explains the topic in such a way that literally anybody can understand it (just not me) I want to explain it right so my question is if I have to be in the same network as my target and if so how do I achieve this?
Greetings from west sweden 😊
use virtual machine
Can you still trace or have signs of the hacking showing up on the target computer after you are done?
AFTER DOING YOUR COURSES WILL YOU GIVE US A CERTIFICATE OR ANY OTHER DEGREE THAT YOU ARE ELIGIBLE FOR TAKING JOB IN ANY COMPANY OR WORKING AS A ETHICAL HACKER
Hey Loi, i'm having some trouble with the port. I'll get to the "set port" stage/part and the port in Empire with have no number or anything. I'm no sure how to fix this, can't really find anything about the problem. Thanks for the amazing video, it's quite educational and easy to follow. 2:50
When I downloaded the launcher.bat file and fired it up on windows I do not see the agent in my terminal....
Has anyone had a similar problem ?
Hello i have the same problem do you solve it ?
Do you use virtual box ir vm
@@DenisDennison-r9y how would I download this?
But surely even a n00b wouldn't right click, save as a random file, especially a .bat which won't even have an executable icon, and then think 'oh best go to my DLs to run that batch file'. I can see you're super talented but it seems like a lot of work casting your bait with very little chance for success. Is there a way to do this without the end user having to physically DL and run a file? Appreciate the content dude
No
@@hxd9321 lmfao
hard no
learn wireshark guys
Where do I get the malicious file to send??
IT dept remote into user computer to install Anydesk, but it prompts admin right which requires to key in admin/password.
But IT cannot let the user know the admin password, how can we bypass it to install Anydesk for the user?
Or any way we can remote to the user's computer (which has admin right), to troubleshoot on software issue?
As the admin right will keep prompt for the admin password whenever we troubleshoot.
Very good video🏆🏆🏆. Thank you sir for so much information 🙏. You are just like a mentor to us
Which ipaddress and port number you used to open a file and then downloaded it, error in opening it, please assist
So even if you quickly change your password from your phone they can still access everything? Because my pc got hacked
So what if after starting apache and everything im getting a web error that says cant reach the page, did i mess up a step or am i a script kiddy?
loi i have a problem when the victim(my 2nd pc) clicks and download's and opens the launcher.bat my server is not detecting it What Do I Do
Love the content you have helped me loads with php and just showed me some really cool stuff! 👍
As we are seeing more hackers, is there a way to reverse the hack seeing that they have a port into your computer/phone? If yes, would you make a video.
my windows pc is asking me to update to windows 11 it even shows blue screen notification , do i update or not , idk if it's legit from windows
empire is a nice c2c tool ... used in a bunch of network exploiting labs some time ago ... easy to use and effective
Is it possible to write a php or javascript code in such a way that as the visitor visit our website then our payload automatically install and execute at the same time? Is it possible?
No to execute code you would need to exploit a bug in the internet browser. And then that user needs to be using that browser and a version of it that’s exploitable
@@coopermarino2355 we can run shell commands using javascript in browser to execute our payload i think. What do you say?
@@coopermarino2355 shell_exec() or exec() or system() like this code
@@gurejalectures that runs serverside. Shell exec. Will execute on the server, as php is a server interperated language.
@@gurejalectures oh wait JavaScript not php. I’m not 100% sure but you shouldn’t be able to run she’ll commands with it
Brother.
Can you please tell me how hackers see hacked phone screen by vnc..
Please answer🙏
what ip does the target machine have to enter in the url? the server ip? and how to you find that info out?
Hii sir how you know about these all tricks, le me know sir plz🙏
Hi bro, I am your avid viewer and really adore your content! Only here a strange phenomenon calls to me, when I set up the server, the line of port remains empty and without a defined port and then in fact it is not possible to continue. It happens every time and no matter how much I tried to update the system or the network settings. Can you help me please? Thank you very much!
I don't understand where did you get the Ip address from. Im testing this and im trying to control my friend's computer (Friendly). That means I should put HIS Ip address there. But how do i get his Ip address?
The Ip address was at 4:31 i think
4:23 I don’t understand what i have to put in the search bar please someone help!!
my apache2 server works just fine on the kali machine but when im switching to windows i cant come on the site
hi i am big fan of you from india I have help from you that is pleace make video on how to install kali linux old version and slove the problem to install some packages like vile plesase 🙏🙏🙏🙏🙏🙏
hello loi, i have a particular problem with my online works. i found out that my phone is hacked and there is an online tracking app attached to every work i do online. this have retarded most of my works. because they use theses apps to manipulate what i do. my online courses,webiners, businesses and others.
i thereby installed some anti hacking apps on my phone, it identify some unknown malicious apps like the 'dark'.
my questions or request from you is that how much probability can these people be tracked?
Im confused with this part of the video 4:21, can you help me out?
Very nice vidéo
I have a question ?
You can create a file that imitate the wifii access on your computer
To tell you you for exampe !
You need to acess your wifii network again
Even if you have automacically connected since the beginning ??
Thats amazing❤ 5:31
0:19 no I’m actually here to get rid of a menace to society
hello loi, what software did you use for the script in this video?
Kali linux
Can anyone tell me what the best way to get a target host for testing? Just a VM would do right?
And also what would make the user select that file and how would it just pop up?
VMware would work fine for testing and to get them to click the link, you'd have to do some social engineering.
@OSArmor Exactly to run this you have to stop the defender manually otherwise it will block the file before execution.
I copied your steps Hacker Loi and I tried to open up the downloaded bat file , even after turning off real time virus and threat protection, unfortunately Windows 11 wouldn't let me open the bat file. i will turn off all Firewalls and try again. I am looking foward to seeing how you hide a bat file in a Domain Name and will that work? Will Windows 11 let me open up a file that contains a well hidden bat file ? Time will tell. I really want to overcome this hurdle and become a Hacker that can defeat Windows Firewalls.
A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *brian hacks online* . Every time you do a good job, you polish yourself one more time. Shine on mate, well done. Team Alex
scam
That's so mean. 😢
I'm really suspiciousthat my working PChave been hacked. Is it possible even with Nordic?
Very innovative video, just makes me want to some back-end languages!
What application are you using?kali linux?
Yes the operating system he is using is Kali Linux
Any advice to the hacked that want our computers back in our control without having to reformat our computer?
Don't download stuff you aren't sure of, don't enter your credentials to websites that seem off. You have to be a tad bit paranoid to be extremely safe these days but i think if someone really wants to hack and has the dedication to do it there's nothing you can do
i'm having a bit of trouble on the part where you enter your port number in a windows computer i don't know what my port number is and i tried to google it and i did what it said i went to cmd and did this command netstat -a and got my port number and googled my port number/launcher.bat but i can't do anything like nothing downloads are you able to help with this?
system has not been booted with systemd as init system (PID 1). Can't operate.
Failed to connect to bus: Host is down. it gave me this when i typed sudo pwershell-empire server, how do i fix this?
Hey guys, Im watching this video and Ive gotten to the part where I must open the launcher.bat file. Only issue im having is that when I open it, I dont see the same things he does when opening his kali linux. Is there any fix to this issue, Ive seen multiple other people with this issue and they havent gotten answers so I just want to see if anyone has found a fix yet.
this thing is When in term of final complete control; it give error that the Driectory is Self made and can't access the remote connection. PLEASE HELP
This is perfect, now my brother will have no choice but to give me that money via online banking. Thanks man!
No one cares bout you and ur mfker brother
which applicaion?website are you using for coding in the vid??
Thats kali linux
Sir, which software is used by you for this video. (I mean for hacking)
The operating system is kali linux then do all the commands in the kali linux terminal
Wow very impressive Mr. Loi Liang Yang
I watch his videos only for him to say "It is literally game over right now !!!".
even i dont understand a single thing , but man , I want to be like you !
Fr😂
no windows firewall when you execute the file in the victim ? rss no anti-virus ? no pop-up message ?? :(
Loi, awesome content and tutorial sir! Thanks for sharing. Every time you post a new vlog I learn something pretty cool and new!
If you restart the PC will the hacker lose the control of the PC? What is the best way to kick out the hacker if you have this problem?
So insightful, many thanks!
hi basically im new to this field 😅 i was learning i got struck in port 4321 setup in my machine under port no number are there how should i setup the port😮 can anyone help me please thank you
Hello Sir, I am a new learner in this technology. What kind of Linux should I use to run. Kali Linux, Ubuntu Linux, etc..,
Plz recommend me , sir.
Kali Always❤️
@@sahilshah9678 qubes
its showing "e: unable to locate package powershell-empier" so what should i do now
how do u know what type of laptop or computer even desktop the person have?
Bro which software tools are you using for this but you have not telling
What is a government computer's BIOS password were published on the website. How much damage could a person do remotely with a BIOS password and the known location of the computer?
Hi bro I'm subscribed can you show in detail which app and which code u use 😀
Doesnt make sense to me... its all gonna fall apart at the first command "sudo apt install"... theres gonna be a challenge to the filesystem privelidge required... and then hes using sudo apt, to install onto a windows computer?
its not working for me on vm ware kali lunix does i have to boot kali lunix in my pc ???
Even after turning off every Firewall Windows 11 destroyed bat file. impossible to open.
Im trying to use my mac and i have this error ..Trackback Most recent call,last): file "./empire",line 5, in from flask import flask, request, jsonify,makeresponce, abort,url_for
Importerror no module flask "HELP"
Most antivirus detect this kind of exploits even windows warns about executing bat files... but this tool is cool...
Yes but my friends expect I put a .bat file that disables your explorer.exe task
I didn't get the web part, can somebody please explain ?
did you get it?
can you show us how hackers control light or cameras or the traffic lights
both the GMS and softEX setup is very different from the one ur using.. why is it so.? GMS doesn't even soft like a app one... and the
Hello Guys!!
May i know in real-time scenario how hackers send this malicious file to the victims machine , even if they send it successfully what if victim cannot open or run or even do not notice that particular malicious file??
does it work if the other computer is turned off? and does the user see me controlling their computer?
you always crack me up when you show these kids how easy it is to access/take over a remote system. your tutorials are beautiful and spot on. as a followup to actions like this, how about a caveat of showing from the winders side, how to detect such breaches to the local security? just a quick idea suggestion, but 1 that I think, kinda, brings the idea full circle...... as always, looking forward to your next internet training adventure........
Is this really your account sir?
As always great content!!
the question is can we connect agian when the target off his laptop ?!
Do you use that kali linux computer in vbox?