Remote Command Execution Explained and Demonstrated!

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 มิ.ย. 2022
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 98

  • @cirklare
    @cirklare 2 ปีที่แล้ว +12

    Thank you mr.loi your tutorials are very good and your udemy course is perfect
    I started making ethical hacking tutorials

  • @rtwh5240
    @rtwh5240 2 ปีที่แล้ว

    Good to see your still here making content :)

  • @asdqgwavscv8071
    @asdqgwavscv8071 ปีที่แล้ว

    as a newbie that was easy to understand. thank you!

  • @jadebrandhorst693
    @jadebrandhorst693 2 ปีที่แล้ว

    Another awesome vid. Thanks for taking the time to make them for us.

  • @hackthebox112
    @hackthebox112 2 ปีที่แล้ว +4

    I really like you so much because in my country here in Ghana,There's no such much Tutorials in Ethecal hacking.But i begin to learn something from you as a beginner.I was having no idea of Hacking or whatever,but you really inspire me much.I wish you could be my mentor in Ethical Hacking.Thank you.❤

    • @quahmehomepage9750
      @quahmehomepage9750 3 หลายเดือนก่อน

      Bro true oooooo
      I don't know even if there's a school that teaches ethical hacking in Ghana here😂

  • @Italya3343
    @Italya3343 2 ปีที่แล้ว +1

    Many thanks for sharing your amazing video!!!
    Could you plz continue with similar videos? Thanks in advance

  • @farooq5176
    @farooq5176 2 ปีที่แล้ว +5

    i didn't understand anything, but i felt good after watching...

    • @amongusboi2032
      @amongusboi2032 9 หลายเดือนก่อน

      LOL, ngl same over here 😅

    • @farooq5176
      @farooq5176 9 หลายเดือนก่อน

      @@amongusboi2032 keep progressing 😎🤏

  • @techgsmte5518
    @techgsmte5518 2 ปีที่แล้ว

    Thank you again again brother for your great job!

  • @Free.Education786
    @Free.Education786 ปีที่แล้ว +2

    Please, if possible, cover these advanced topics like How to bypass Drupal CMS or other secured CMS? How to bypass HARD WAF protection that stops HTML, SQL, and XSS injection payloads? Payload single-double-triple encoding using Cyber-Chef? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc.,? How to bypass Hard WAF using SQLMAP or Burpsuite? How to find hidden vulnerable parameters and endpoints inside the .js and .jason files? How to find hidden admin pages, cPanel pages, and WHM pages ? Please cover these important topics. Thanks

  • @aansh
    @aansh 2 ปีที่แล้ว +2

    Hello sir love you i am very existed to the videos

  • @caglayanaslan4537
    @caglayanaslan4537 2 ปีที่แล้ว +1

    Advanced IDOR and Business Logic Vulnerability Video would be nice.

  • @kerhabplays
    @kerhabplays 2 ปีที่แล้ว +1

    Hey Loi! please do a tutorial more on websites

  • @GU716
    @GU716 ปีที่แล้ว +1

    You have just earned a sub from me. Great video on this vulnerability.

    • @TKO67
      @TKO67 ปีที่แล้ว

      subframe ????/😝\

  • @AnthonyMcqueen1987
    @AnthonyMcqueen1987 ปีที่แล้ว

    The holy grail of all vulnerabilities and the one of found and proven pays MASSIVE.

  • @atharvayelve2804
    @atharvayelve2804 2 ปีที่แล้ว +4

    love you bro nice video

  • @EliHank
    @EliHank 4 หลายเดือนก่อน +13

    Apex Legends sent me here

    • @aliendude99
      @aliendude99 4 หลายเดือนก่อน

      Same, not bothering to open the game.

    • @cyberdevil657
      @cyberdevil657 3 หลายเดือนก่อน

      lol

    • @cyberdevil657
      @cyberdevil657 3 หลายเดือนก่อน

      I heard of the apex problem.
      Just know that good hackers like Loi & me are the ones who will try to prevent disasters like this.
      Much love

    • @aliendude99
      @aliendude99 3 หลายเดือนก่อน

      @@cyberdevil657 could you go more into detail of what you mean by that or what you're doing?

    • @cyberdevil657
      @cyberdevil657 3 หลายเดือนก่อน

      @@aliendude99 We are just the good guys.
      I'm speaking in general terms.
      White hats are the modern heroes of the world.
      and Apex is in need of a pen tester to fix a huge RCE exploit

  • @hamidbigga5379
    @hamidbigga5379 2 ปีที่แล้ว +5

    I love ur video i hv improved my programming and hacking skills

    • @davidstephen7070
      @davidstephen7070 2 ปีที่แล้ว

      what are u improve, most of his videos is old technique. even in this video. he try to attack joomla that release before 2011. we are in 2022 not in 2011 anymore. even in his videos when use exploit. it doesn;t explain anything. how the exploit works. he only use common word. reverse shell access. thats it.

    • @hamidbigga5379
      @hamidbigga5379 2 ปีที่แล้ว

      @@davidstephen7070 bro relax, that's my review of what i have learn't

    • @cirklare
      @cirklare 2 ปีที่แล้ว

      @@davidstephen7070 he didn't make a video about follina
      I will make it

    • @codewithraiju1424
      @codewithraiju1424 2 ปีที่แล้ว

      @@davidstephen7070 lol.. You are harsh but right.. Actually I don't think these publically available tools work anymore.. So its better to write our own scripts.. Fot example msfvenom, the exe gets detected by all antiviruses. So I wrote own script that generate exe and gives reverse shell, and guess what, most antiviruses could not detect it.. Only 5 out of 68 could

  • @mr-sol7605
    @mr-sol7605 2 ปีที่แล้ว +2

    Love u bro big fan

  • @blackthovenproductions4561
    @blackthovenproductions4561 ปีที่แล้ว

    I saw one of your video about using nmap but you didn’t mention something important = footprints… when sniffing

  • @monKeman495
    @monKeman495 2 ปีที่แล้ว +1

    when did you came back from australia?

  • @basilbrian
    @basilbrian 2 ปีที่แล้ว +1

    Cool video

  • @arayeong6711
    @arayeong6711 2 ปีที่แล้ว

    Bro can also tell about how to learn penetration testing

  • @TKO67
    @TKO67 ปีที่แล้ว

    so this can be done even if the network is behind a firewall ?

  • @aadiexplains6234
    @aadiexplains6234 ปีที่แล้ว

    Thanks

  • @sotecluxan4221
    @sotecluxan4221 2 ปีที่แล้ว

    Nice!

  • @Shibshankar_Roy
    @Shibshankar_Roy 2 ปีที่แล้ว +1

    Legend is back

    • @bhavanr.b.n7391
      @bhavanr.b.n7391 2 ปีที่แล้ว

      Dont beilve him he tell only lies you get a money from you

  • @abidakunsamuel601
    @abidakunsamuel601 2 ปีที่แล้ว +2

    I saw this video first 🥰

  • @Actechnologys
    @Actechnologys 2 ปีที่แล้ว

    hi sir. make a pratical video on ss7 attack of any socailmedias

  • @theepharmacy7424
    @theepharmacy7424 2 ปีที่แล้ว +1

    Loi 😢 where have you been bro been waiting 💯❤️

  • @squadboy7806
    @squadboy7806 2 ปีที่แล้ว

    Mr how to be one your channel member please tell me some videos required it

  • @user-no5hx7ps5i
    @user-no5hx7ps5i 2 ปีที่แล้ว

    Hey man u did great job 😀 but robot voice lool please don't apply voice filter

  • @bhuvansharma3090
    @bhuvansharma3090 2 ปีที่แล้ว

    can you make a video on how to set up android emulators in kali with SDK TOOL PACKAGE

  • @missnbcrafts
    @missnbcrafts 2 ปีที่แล้ว

    Got a syringe sms on my phone saying someone tried to open my Amazon account. I don't even have an account on amazon. I clicked the link but nothing opened.

  • @hashcat253
    @hashcat253 ปีที่แล้ว +2

    Ok so basically if you're an ethical hacker and you learn scripting in programming language then that gives more knowledge and hacking tactics if you like in easier said

  • @clashroyal2680
    @clashroyal2680 2 ปีที่แล้ว

    Can you make a tutorial how to bypass captive portal wifi

  • @tshoganetsomugungu4545
    @tshoganetsomugungu4545 2 ปีที่แล้ว

    How do I join the membership the link isn't working on my device please help

    • @aliguseynov9964
      @aliguseynov9964 2 ปีที่แล้ว

      idk bro tryna figure that out ((( if u did already please reach me out .....

  • @goded.exp.1137
    @goded.exp.1137 2 ปีที่แล้ว +1

    Wassup master

  • @blackhathacking9103
    @blackhathacking9103 2 ปีที่แล้ว +1

    How to i joine you 👌👌

  • @ahmeddubox
    @ahmeddubox 2 ปีที่แล้ว

    My brother, it is possible for a way to merge networks into one network for the speed of the internet. I am connected to 3 networks, but each unit is alone. I want to combine them into one connection. Is it possible, please?

    • @rationalism_communism
      @rationalism_communism 2 ปีที่แล้ว +1

      its actually possible load balancing combines internet connections at once.

  • @deepzd6839
    @deepzd6839 8 หลายเดือนก่อน

    How to open PDF???

  • @user-dl3hu4zn5q
    @user-dl3hu4zn5q 5 หลายเดือนก่อน

    Analisi delle qualità e dei difetti di Apple nell'ambito dell'Intelligenza Artificiale (IA)
    Qualità
    Potenziale nell'IA "on device":
    Apple potrebbe sfruttare il vantaggio di offrire IA "on device" per garantire maggiore velocità, personalizzazione e sicurezza agli utenti.
    Integrazione verticale:
    L'abilità di Apple nell'integrare hardware, software, silicio e servizi potrebbe favorire l'adozione e ottimizzazione dell'IA sui propri dispositivi.
    Controllo del silicio:
    Il design in-house dei chip da parte di Apple potrebbe posizionarla come leader nell'adozione dell'IA "on device", offrendo chip più efficienti e potenti.
    Potenziale di monetizzazione:
    L'implementazione dell'IA potrebbe stimolare le vendite di iPhone e computer, dando un nuovo impulso al ciclo di sostituzione degli iPhone.
    Privacy e sicurezza:
    L'approccio cauto di Apple nell'utilizzo dei dati degli utenti potrebbe essere un vantaggio per i consumatori che attribuiscono grande importanza alla privacy.
    Difetti
    Ritardo nella narrazione dell'IA:
    Apple non ha comunicato chiaramente la propria strategia di IA, creando incertezza tra investitori e osservatori del settore, in contrasto con aziende come Microsoft e Google.
    Mancanza di investimenti e iniziative pubbliche:
    Apple non ha annunciato iniziative significative nell'IA come altri giganti tecnologici, creando l'impressione di essere in ritardo rispetto ai concorrenti.
    Potenziale compromesso tra privacy e qualità dell'IA:
    La cautela di Apple nell'utilizzo dei dati degli utenti potrebbe limitare lo sviluppo del proprio modello di IA rispetto ai concorrenti.
    Articolo: Analisi delle qualità e dei difetti di Apple nell'ambito dell'Intelligenza Artificiale (IA)
    Apple's Position in AI: Quality and Shortcomings
    Nel 2024, Apple si trova sotto i riflettori per il suo inizio difficile, soprattutto in relazione all'Intelligenza Artificiale (IA). Mentre le azioni subiscono un calo e la mancanza di una strategia chiara nell'IA viene evidenziata, c'è un certo grado di ottimismo per il futuro di Apple in questo settore. Analizziamo le qualità e i difetti di Apple nel contesto dell'IA.
    Qualità
    Potenziale nell'IA "on device"
    Apple è in una posizione privilegiata per capitalizzare sull'IA "on device", offrendo maggiore velocità, personalizzazione e sicurezza per gli utenti. Questo potrebbe essere un vantaggio competitivo significativo, considerando l'importanza crescente di IA performante su dispositivi mobili.
    Integrazione verticale
    Il successo di Apple nell'integrare hardware, software, silicio e servizi potrebbe favorire l'adozione e l'ottimizzazione dell'IA sui propri dispositivi. Questa sinergia potrebbe consentire a Apple di offrire esperienze utente uniche e altamente performanti, differenziandosi dai concorrenti.
    Controllo del silicio
    Il design in-house dei chip da parte di Apple potrebbe posizionarla come leader nell'adozione dell'IA "on device". La capacità di progettare e ottimizzare il silicio per l'IA potrebbe consentire a Apple di offrire dispositivi più efficienti e potenti, soddisfacendo le esigenze di calcolo sempre più complesse dell'IA.
    Potenziale di monetizzazione
    L'implementazione dell'IA potrebbe stimolare le vendite di iPhone e computer, fornendo un nuovo impulso al ciclo di sostituzione degli iPhone. Questo potrebbe essere cruciale per mantenere la posizione di Apple come uno dei principali attori nel settore dei dispositivi mobili e dei computer.
    Privacy e sicurezza
    Il focus di Apple sulla privacy e la sicurezza potrebbe essere un punto di forza nell'ambito dell'IA. Mantenendo un approccio cauto nell'utilizzo dei dati degli utenti, Apple potrebbe riuscire a differenziare i suoi servizi e prodotti come soluzioni più affidabili e rispettose della privacy.
    Difetti
    Ritardo nella narrazione dell'IA
    Apple non ha comunicato chiaramente la propria strategia di IA, creando incertezza tra investitori e osservatori del settore. Questo ritardo potrebbe danneggiare la percezione di Apple come leader innovativo nell'ambito dell'IA, soprattutto considerando le chiare strategie comunicate da altri giganti tecnologici.
    Mancanza di investimenti e iniziative pubbliche
    La mancanza di annunci di iniziative significative nell'IA potrebbe far sembrare che Apple sia in ritardo rispetto ai concorrenti. Questo potrebbe compromettere la percezione di Apple come un attore chiave nell'innovazione dell'IA e potrebbe influenzare la fiducia degli investitori e degli utenti.
    Potenziale compromesso tra privacy e qualità dell'IA
    La cautela di Apple nell'utilizzo dei dati degli utenti potrebbe limitare lo sviluppo del proprio modello di IA rispetto ai concorrenti. Questo potrebbe mettere Apple in una posizione di svantaggio nell'offrire soluzioni di IA altamente performanti e personalizzate, compromettendo la sua competitività nel lungo termine.
    In conclusione, Apple si trova ad un bivio critico nell'adozione dell'IA. La sua posizione unica, l'attenzione alla privacy e il potenziale nell'IA "on device" potrebbero essere vantaggi competitivi significativi. Tuttavia, il ritardo nella narrazione e negli investimenti potrebbe metterla in difficoltà rispetto ai concorrenti più rapidi. Il 2024 potrebbe essere un anno cruciale per Apple nel dimostrare la sua capacità di capitalizzare sull'IA e superare le sfide attuali.

  • @oseghalepeter3048
    @oseghalepeter3048 2 ปีที่แล้ว

    Please sir can you teach keylogger

  • @RB_intactbreacher
    @RB_intactbreacher 2 ปีที่แล้ว

    Again..i wanna say that app by androrat or metasploit can't be run in android version 11....so...plz give a information or suggestions for the upgraded version....this is present...past has been gone.....

  • @ftechnologies1
    @ftechnologies1 2 ปีที่แล้ว +2

    Wow

  • @georgelee2884
    @georgelee2884 2 ปีที่แล้ว

    Hey brrr each time I try to watch some of your videos, it keep showing errors and I guess TH-cam probably blocked them, so you’ve your own personal website where you upload your video toturials?

  • @vivekparmar7965
    @vivekparmar7965 2 ปีที่แล้ว

    How do we known website is built on cms - joomla ?

  • @ArSiddharth
    @ArSiddharth 2 ปีที่แล้ว +2

    Nice video

  • @HarvestHaven09
    @HarvestHaven09 2 ปีที่แล้ว +2

    Ultimate 🥏

  • @colin-8101
    @colin-8101 2 ปีที่แล้ว +1

    Hi

  • @demon1058
    @demon1058 2 ปีที่แล้ว +2

    I want to be an ethical Hacker like you

    • @jimf1007
      @jimf1007 2 ปีที่แล้ว +1

      First u must be bad man hacker.

    • @demon1058
      @demon1058 2 ปีที่แล้ว

      @@jimf1007 but from where can i learn it?

    • @jimf1007
      @jimf1007 2 ปีที่แล้ว

      @@demon1058 no clue... I dont even own a computer lol

    • @demon1058
      @demon1058 2 ปีที่แล้ว

      @@jimf1007 oh

  • @islamaurfirqawareyt4710
    @islamaurfirqawareyt4710 2 ปีที่แล้ว

    hi hacker loi make a vedio on best rat android hacking

  • @scorch7399
    @scorch7399 2 ปีที่แล้ว +3

    Can you make a tutorial on a DDOS attack

    • @polymaster709
      @polymaster709 2 ปีที่แล้ว

      ddos is illegal

    • @scorch7399
      @scorch7399 2 ปีที่แล้ว

      @@polymaster709 idc someone disrespected my mom

    • @polymaster709
      @polymaster709 2 ปีที่แล้ว

      @@scorch7399 lol, you need at least 10 botnets (infected computers) to ddos ,and C2 server .A skid like you probably cant be able to do that

    • @16saalkanigga
      @16saalkanigga 2 ปีที่แล้ว

      @@scorch7399 BTW ddos is kinda a kiddie thing to do
      Trying to get a remote code execution then do whatever you want
      *FOR EDUCATIONAL PURPOSE ONLY*

    • @cirklare
      @cirklare 2 ปีที่แล้ว

      @@polymaster709 try ddos on local host website
      I'm making ethical hacking tutorials please check them out

  • @thedudewhoasked9342
    @thedudewhoasked9342 2 ปีที่แล้ว

    Can you help me login in my email a hacker logged into my gmail acc😭

  • @gillorien
    @gillorien 8 หลายเดือนก่อน

    Not trygn to criticise but sound on this video is far too bassey - i catn listen to it though headphones it is just booming!!

  • @gaaajagg
    @gaaajagg 2 ปีที่แล้ว

    please hacking android phone tutorial

  • @irfankpm9643
    @irfankpm9643 2 ปีที่แล้ว +1

    ✨️✨️✨️

  • @gaaajagg
    @gaaajagg 2 ปีที่แล้ว

    hi Mr hackerloi can you make another tutorials in Udemy

  • @cyber-dioxide
    @cyber-dioxide 2 ปีที่แล้ว

    Audio quality is really poor

  • @RB_intactbreacher
    @RB_intactbreacher 2 ปีที่แล้ว +1

    I like to watch this video but...i cannot understand what you are doing 😁.. may be i m basic level learner

    • @hackthebox112
      @hackthebox112 2 ปีที่แล้ว

      yes learn from scratch you will get thete.

  • @user-no5hx7ps5i
    @user-no5hx7ps5i 2 ปีที่แล้ว

    Robot voice 😂😂😂😂😂

  • @indika810
    @indika810 2 ปีที่แล้ว +1

    🌚🌚

  • @kaddasakhi5152
    @kaddasakhi5152 2 ปีที่แล้ว

    Thanks loi but i liké tutoriel for increase views youtube .

  • @bhavanr.b.n7391
    @bhavanr.b.n7391 2 ปีที่แล้ว

    Sry Sir what I did

  • @bjp9718
    @bjp9718 2 ปีที่แล้ว

    Lol llllllllllllllllllllllllllllllllllllllll

  • @renznews7445
    @renznews7445 ปีที่แล้ว

    CAUTION DONT PLAY GTA ONLINE ON PC, cheaters in gta online now can do this to your account, not only your account but also can damage your pc itself. More information of this in youtube just search "gta 5 online remote command execution "

  • @bjp9718
    @bjp9718 2 ปีที่แล้ว

    Lol llllllllllllllllllllllllllllllllllllllll