But you can do that when you have lan access means some public setup their public side of network as a only wan so when new devices join they can only access the internet not the lan(they separate out each to their own vlan) in that case you can't discover anything therefore no hack
This is a great foundational introduction to wi-fi security and the flaws therein, but the attacks do not account for client isolation. most modern, open wifi networks enable client isolation to prevent devices seeing and communicating with each other. Not to say there are not potentially ways around that, but this is far less likely to be successful than say a MITM attack using a rouge access point.
Nice video and probably useful too. Would be more useful If the pop-up message would show the login details and the IP-address the login-attempt came from.
Most guest WiFi networks now do it right and have each host independent on their own network, those who run a guest on a full class C or better are just asking for trouble. Thanks to the cloud based vendors that have that option built in.
So why exactly is it so dangerous to have public folder share on when connecting to a public wifi? In what way can someone enter me if they dont even have any of my info.
The king of brute forcing returns. Come on dude these are like decade old attacks at this point. How long is someone going to drink coffee for while you try and bruteforce them?
Wow Mr Pro hacker Loi I really appreciate your service just continue with your great work I have started gaining more ethical hacking knowledge from you I even don't know how to appreciate you
This is not real. Doesn't seems to be real. I'm sorry for my noob explanation, i admit that i'm noob. I was afraid of this, so i tried to protect myself. I'm not expert. When i look at network, it's empty. So no one is connected, we have single network, and three computers in our family. So. it just doesn't really work what he is trying to do. All computers are hidden, masked. And i see that he is using smb. If user doesn't have smb enabled, how hacker will hack it? Reminds me of some ''hacking'' videos about remote connection. But if connection is not setup, no one can get through. Something doesn't fit lol For example even if i have password "password", then no one can hack it (only possible through windows vulnerability). They can do it only if i will enable remote connection, smb. Am i right or not?
I've worked in cyber for 3 years. Never knew about the session manager. I guess I am usually doing EDR or SIEMs, but my home network has literally constantly been pwnd by asshole colleagues. I'm completely blue, barely know any red team, but I guess my native Windows defenses are absolute shit. I just switched to using hardened Linux distros but even then IDK wtf I'm doing. Seems nearly impossible to keep people out of my systems.
Bruhh Mr. Loi deleted my comment I was asking him if he could make video on how to remotely control any pc or mobile because the previous ones aren't working why mr. loi? why?
Well if it wasn't deleted it should be because it's a ridiculous question. Mobile. What mobile? iOS or android? Which version? Which vendor? Which pc? Control how? via backdoor or ssh? Your question wasn't answered because it's a waste of time.
Metasploit is a framework based on cve's, it's won't give you access unless it's vulnerable, there is no such a thing Like a command will give u access directly, most cases need other ways to gain access, metasploit doesn't have exploits for all cves so u have to look at it manually
@@الوقايةخيرمنالعلاج-ظ1ق there is so many possible ways ( keep in mind that results might not be expected) 1- recon: scanning your target with network mapping tools such as nmap, u see what ports are open , version running services in the targe, this will help you to identify if the target vulnerable to any cves. Also u need to search for target's operation system u might find any vulnerabilities 2- social engineering: simply u convince your target to install a malicious software U can use also MITM attacks sometimes it's useful
I've enabled the logins but I never got the understanding of how to fucking differentiate malicious logins from literally just my logins, because there's like 12 different types of logins and some are automated and recurrent so filtering is annoying as shit. I guess it's interactive remote you want to find, but I've also seen compromised systems that didn't have any apparent remote logins. This has always been a serious pain point for me, if anyone has any tips, I'd be much obliged.
Hi Sir I'm Ankur studying BCA Cloud And Security, I'm a self learner and I want to be a cyber security professional.. I have few doubts but there's none I can ask it to of you please reply me out would me nice🙏🏻
@@zielony1212hacking evolves bro like the hack that works today won’t work tomorrow, why do you think phones update or computers release patches it evolves meaning you will have to find a new way to exploit , google and Apple are paying heavy to anyone who can hack and exploit into their syestem i think google is paying 2 million
4:17 this snippet will be so great for my job. When we lose an IP of an industrial controller we are pretty much screwed and have to work with Serial Would u know how could this snippet be translated to Windows CMD commands, please?
chatgpt will probably know, I did it with other types of command conversions. something along the lines of "convert the following command to work on windows cmd: "
arp -a in cmd prompt on windows will do a similar aspect. Though I'm not sure how you would lose a controller IP. Something like that should always be on a static IP.
Mr Loi, thanks for the contents. I have a question 🤔 The power shell scripts that alerts you that there's or was an attack. Did you write it yourself or is it built into Windows?!
@@realcoolguy123 Hey Bud, yes i figured it out in the end that it was a powershell scripting. I followed pretty much what he had typed on the screen until the last 'OK' at the end which kept giving me an error message. Not sure what i did wrong! Also, i was unable to save my written power shell scripting because it kept coming up with an error message file not found!
I learn more in 10mins than any other teacher ever taught me
Lol welcome to Windows 95 and Intro to Cable Modem hacking 😂
You forgot the part where you're supposed to print "Help! I'm stuck in the printer!"
Note: the target should have SMB port open to get connection from SMBClient request
Yh it's actually open more often than not, especially with people that are not savvy in this kind of stuff
@@blackcircuit77 Yeah, but I still find some vulnerable computers in my college often and they run windows 7
In metasploit there is a module for smb bruteforce attack
@@superhacker1569 Obviously there will be a module for smb brute forcing and no, port 445 is not always open
@@darknode4791lol negative nancy here
you use windowstyle -hidden in the scheduled task it should only show the pop up warning and not the powershell window too
But you can do that when you have lan access means some public setup their public side of network as a only wan so when new devices join they can only access the internet not the lan(they separate out each to their own vlan) in that case you can't discover anything therefore no hack
how can you say ?
@@ONEGOALONEJOURNEY you just run a simple nmap scan
This is a great foundational introduction to wi-fi security and the flaws therein, but the attacks do not account for client isolation. most modern, open wifi networks enable client isolation to prevent devices seeing and communicating with each other. Not to say there are not potentially ways around that, but this is far less likely to be successful than say a MITM attack using a rouge access point.
This was amazing and the steps were well described. Thank you thank you!!
Nice video and probably useful too. Would be more useful If the pop-up message would show the login details and the IP-address the login-attempt came from.
we don't even need powershell
Just vbs will do the popup
x=msgbox("title",7,"message")
Nice my Singaporean brother. Keep it up
Most guest WiFi networks now do it right and have each host independent on their own network, those who run a guest on a full class C or better are just asking for trouble. Thanks to the cloud based vendors that have that option built in.
This was one of the coolest video of yours "Handsome Hacker Loi"!
What a cool man, Mr. Loi.
I hate that the defensive way looks more complicated than the hacking way 😂
the last code was not fully shown kinda left me hanging
Great video, I really appreciate the effort that went into making it. Keep up the great work.
Would u want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @issamelhassnaoui221
Easy....simple..and brilliant ❤❤❤❤❤
So why exactly is it so dangerous to have public folder share on when connecting to a public wifi? In what way can someone enter me if they dont even have any of my info.
Does this work on networks we've visited or all networks yet?
how to access MOBILE DEVICES connected to same network
learn more in 10 mins, sir can create video about AD pentest?
I am using a virtual machine and using netdiscover command,
i'm not able to find any connected devices. What should I do?
First you should put your vm in "nat mode", because by default is isolated
@@darioabbece3948 it is already in NAT mode still not working
thank you so much, im currently learing and your videos help alot
Would u want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @gustavganz2646
Cool. I'm gonna also create windows pop-up brute-force attack.
Thank you!
So you can’t do anything if they use a security key to sign in.
Does android have a way to check the session times like displayed in this video? :)
Hi whr can i get full course
Can I use this to find all hidden Facebook accounts of devices connected to my home network or what would I use to do that
good videos, but try enlarging your text-erea for us to read when you type
Bro, my victim's lap haven't any password, SO what should I need to enter when the password is required to enter when needed?
The king of brute forcing returns. Come on dude these are like decade old attacks at this point. How long is someone going to drink coffee for while you try and bruteforce them?
I've seen people sit the whole day
Grate video sir. can i use the same method on a phone insted of computer
Wow Mr Pro hacker Loi I really appreciate your service just continue with your great work I have started gaining more ethical hacking knowledge from you I even don't know how to appreciate you
I don’t understand what did you do in the password part? You entered a password
How do you know your phone or your device is hack
This is not real. Doesn't seems to be real. I'm sorry for my noob explanation, i admit that i'm noob. I was afraid of this, so i tried to protect myself. I'm not expert. When i look at network, it's empty. So no one is connected, we have single network, and three computers in our family. So. it just doesn't really work what he is trying to do. All computers are hidden, masked. And i see that he is using smb. If user doesn't have smb enabled, how hacker will hack it? Reminds me of some ''hacking'' videos about remote connection. But if connection is not setup, no one can get through. Something doesn't fit lol
For example even if i have password "password", then no one can hack it (only possible through windows vulnerability). They can do it only if i will enable remote connection, smb. Am i right or not?
So how do you perité y yourself from this?
I've worked in cyber for 3 years. Never knew about the session manager. I guess I am usually doing EDR or SIEMs, but my home network has literally constantly been pwnd by asshole colleagues. I'm completely blue, barely know any red team, but I guess my native Windows defenses are absolute shit. I just switched to using hardened Linux distros but even then IDK wtf I'm doing. Seems nearly impossible to keep people out of my systems.
The legend is back.
Thank you mr. Hacker loi. i learned a lot
What is your microphone name?
how do i do that with Mac OS ?
Bruhh Mr. Loi deleted my comment I was asking him if he could make video on how to remotely control any pc or mobile because the previous ones aren't working why mr. loi? why?
Well if it wasn't deleted it should be because it's a ridiculous question. Mobile. What mobile? iOS or android? Which version? Which vendor? Which pc? Control how? via backdoor or ssh? Your question wasn't answered because it's a waste of time.
@@camelotenglishtuition6394 no no if u have seen his previous video you would have understand me but u didn't so I don't hv anything to say sry
@SuccessfullAspects I wouldn't bother with his videos. If you really want to learn how to hack just sign up for hack the box and learn :) good luck
it was probably autodeleted
@@ftincel finally someone who thinks positive thanks
This man, you're a gr8 teacher
Would you want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @iyke4djakes
Would be nice to prevent brute force attack before it happens. Once they're in could be too late.
have a strong password that is highly unlikely to be brute forced
I never connected to free, unsecured wifi even before I studied/practiced cybersecurity lol it always sketched me out.
Why don't use metasploit to gain access into the system connected with wireless I need a tutorial please
Metasploit is a framework based on cve's, it's won't give you access unless it's vulnerable, there is no such a thing Like a command will give u access directly, most cases need other ways to gain access, metasploit doesn't have exploits for all cves so u have to look at it manually
But how gain access into any device connected with my network???
@@الوقايةخيرمنالعلاج-ظ1ق there is so many possible ways ( keep in mind that results might not be expected)
1- recon: scanning your target with network mapping tools such as nmap, u see what ports are open , version running services in the targe, this will help you to identify if the target vulnerable to any cves. Also u need to search for target's operation system u might find any vulnerabilities
2- social engineering: simply u convince your target to install a malicious software
U can use also MITM attacks sometimes it's useful
I've enabled the logins but I never got the understanding of how to fucking differentiate malicious logins from literally just my logins, because there's like 12 different types of logins and some are automated and recurrent so filtering is annoying as shit. I guess it's interactive remote you want to find, but I've also seen compromised systems that didn't have any apparent remote logins. This has always been a serious pain point for me, if anyone has any tips, I'd be much obliged.
Is there any way I can see my google account password? I am logged in but I don't remember the password! Any help please how to?? 🙏🙏🙏🙏
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
wow... I am big fan of yours... super cool you are
How to do this on rooter android termux?
Hi Sir I'm Ankur studying BCA Cloud And Security, I'm a self learner and I want to be a cyber security professional.. I have few doubts but there's none I can ask it to of you please reply me out would me nice🙏🏻
What's your doubt?
You'll never get a response for this TH-camr. You'll have to figure it out on your own.
Nice one Loi
Thanks Mr Loi
thank you for tech information
this is why we use vpn, in case cool video 😊
Yeah, he's making videos for the people stuck in 2010 lol.
Do u recommend any forums/channels for noob to begin with
What do you mean?
@@zielony1212hacking evolves bro like the hack that works today won’t work tomorrow, why do you think phones update or computers release patches it evolves meaning you will have to find a new way to exploit , google and Apple are paying heavy to anyone who can hack and exploit into their syestem i think google is paying 2 million
@@zielony1212 this is outdated stuff
Can't we start hacking on windows
I wonder how many sysadmins in my country know about this(windows doesn't have logon logging by default) 😅
brother plx bring sigma hacker course and make us sigma hacker and handsome like you Plx . 🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺
Mr loi with another weapon
not working on phone only pc to pc
Informative ❤
yo hacker loi;; could you show us some tutorials on abusing AD features XD
4:17 this snippet will be so great for my job. When we lose an IP of an industrial controller we are pretty much screwed and have to work with Serial
Would u know how could this snippet be translated to Windows CMD commands, please?
chatgpt will probably know, I did it with other types of command conversions.
something along the lines of "convert the following command to work on windows cmd: "
arp -a in cmd prompt on windows will do a similar aspect. Though I'm not sure how you would lose a controller IP. Something like that should always be on a static IP.
@@summoner2100 Its not so useful, you need to be in the same range and subnet
@@summoner2100 And how to not lose it, now that you need to say to our customers that provides them theyre spare ones lol
Am ditching everyone, so I'll never again have a need for one cell phone 📱 phoneless
.
amazing i liked it
can we set to 100 times of wrong password input then send alert? since alert in one time is very annoying
I need your halp
Mr Loi, thanks for the contents.
I have a question 🤔
The power shell scripts that alerts you that there's or was an attack. Did you write it yourself or is it built into Windows?!
He shows you at the end of the video. you have to write it yourself and then attach it to the task
@@realcoolguy123 Hey was it Python he used to write it ?
@@ao4514 No. It is a powershell script. So it is written in the powershell scripting language.
@@realcoolguy123 Hey Bud, yes i figured it out in the end that it was a powershell scripting.
I followed pretty much what he had typed on the screen until the last 'OK' at the end which kept giving me an error message.
Not sure what i did wrong!
Also, i was unable to save my written power shell scripting because it kept coming up with an error message file not found!
Firsr one here mr loi😻
No I was
I want to watch your members only vedio please
I just want to say that I was first. Have a nice day
Thanks you my master
Your thumbnail remind me of 😮
awsome!!!!
I like Hacker Loi! :)
@Loi Liang Yang: Why are you moving away from hacking? :(
he is not. youtube is just a terrible service. and he cannot teach the super cool stuff. he tried many times but youtube punished him
Mr hacker loi Nice job
I 'll let them ...know who's MR hacker loi 😂😂😂😂😂😂
I want a help from you about recover Facebook page . Can you help sir?
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
@@EmmaJack-y6g useless
awesome
Awessssssome Loi
nice
You think this is easy?
most wifi in my area are ap isolated so i cant see them
VPN can bypass certain restrictions imposed by AP Isolation.
What!!😳
17 secs ago pretty good vid
Now I know Mr Hacker Loi's password
❤
👌
P E R F E C T !
Do a video on crypto wallet hack
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
nine times out of ten it wasnt him
❤❤
Admininstrator user is disabled by default
Anyone who
Learn hacking
i am hacking tell me bro pleam my dream big hacker ok please tell me
Hey can you reset my Gmail for me please ... ???
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
Help me sir. Please
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me