How Hackers Remotely Control Any PC?!
Ғылым және технология
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Пікірлер: 709
Helped me control the government mainframe to pay my grandma's medical bills! Thank you so much Loi!
@memebomberLMAO
18 күн бұрын
Bro
@Twinsfoodexplore001
17 күн бұрын
@@memebomberLMAOCan Anyone Let Me Know The Software Name Which He Use To Type Command In It?
Omg, you explained it very simply! It's really easy to understand. Thank you so much! I've always wanted to learn these.
Love the content you have helped me loads with php and just showed me some really cool stuff! 👍
Everyone that is watching this video to protect their pc from hackers :)
Mr Loi but if windows defender is up to date the payload generated by powershell empire does not pass then how to bypass this?
Well i have been watching these tuts for like an hour straight and its just so interesting
So what if after starting apache and everything im getting a web error that says cant reach the page, did i mess up a step or am i a script kiddy?
@Loi, how do you create your hacking labs.
what ip does the target machine have to enter in the url? the server ip? and how to you find that info out?
what app did he use to draw on screen during video?! pls someone hlp...
Wait, so if we were to send this to a user, wouldn't they get suspicious why a simple fila needs so many permission?
@simply-coded
7 ай бұрын
yes
Yes you must be on the same network. However when I tried this microsoft defender stopped me. I'm sure there is a workaround?
@rens0315
Ай бұрын
Did you find a workaround?
Yes sir it was a value able lesson
Very helpful brother thanks
loi i have a problem when the victim(my 2nd pc) clicks and download's and opens the launcher.bat my server is not detecting it What Do I Do
As always great content!!
Thanks you so much hacker loi I really learn a lots from you always
You are the best Loi! ~ Thank you
Very good video🏆🏆🏆. Thank you sir for so much information 🙏. You are just like a mentor to us
I have 8 backdoors on my old pc and hackers literally beef each other on my pc its literally so funny
Very innovative video, just makes me want to some back-end languages!
Do you use that kali linux computer in vbox?
Hello Loi I have e question ? Do you have a courses for hacking?
hello loi, i have a particular problem with my online works. i found out that my phone is hacked and there is an online tracking app attached to every work i do online. this have retarded most of my works. because they use theses apps to manipulate what i do. my online courses,webiners, businesses and others. i thereby installed some anti hacking apps on my phone, it identify some unknown malicious apps like the 'dark'. my questions or request from you is that how much probability can these people be tracked?
basically the most common attack vector nowaday is physing. no matter how you protect your credential, sosial hacking always the top threat.
how do u know what type of laptop or computer even desktop the person have?
great work awsome you teach very well master :D
Hello dear community. Im having a presentation soon and I picked this video because he explains the topic in such a way that literally anybody can understand it (just not me) I want to explain it right so my question is if I have to be in the same network as my target and if so how do I achieve this? Greetings from west sweden 😊
@OKBYE0
11 ай бұрын
use virtual machine
"hit enter on that and that's it done we'll set up the pørn number and" 🤣
my apache2 server works just fine on the kali machine but when im switching to windows i cant come on the site
When I run the launcher.bat file nothing happens, anyone know whats going on? A cmd pops up and goes away but in the empire terminal nothing connects. Plz help :/
@kaichaffin4507
5 ай бұрын
try all underscores
@HACKSONLY34
4 ай бұрын
Add time out 200-500 secs at the start and the end of the script
@HACKSONLY34
4 ай бұрын
Or maybe it’s just cuz ur opening it on the same pc
I watch his videos only for him to say "It is literally game over right now !!!".
Hello you seem very experienced with this and was wondering if you can please help me out with a hacker on my pc
Hey guys, Im watching this video and Ive gotten to the part where I must open the launcher.bat file. Only issue im having is that when I open it, I dont see the same things he does when opening his kali linux. Is there any fix to this issue, Ive seen multiple other people with this issue and they havent gotten answers so I just want to see if anyone has found a fix yet.
Thank you loi for your good tutorial ur the best
no windows firewall when you execute the file in the victim ? rss no anti-virus ? no pop-up message ?? :(
its showing "e: unable to locate package powershell-empier" so what should i do now
I put the phished credentials into the terminal but it says "zsh: bus error". What do i do?
i'm having a bit of trouble on the part where you enter your port number in a windows computer i don't know what my port number is and i tried to google it and i did what it said i went to cmd and did this command netstat -a and got my port number and googled my port number/launcher.bat but i can't do anything like nothing downloads are you able to help with this?
Final Spiderman dialogue 🤣🤣🔥
Loi, awesome content and tutorial sir! Thanks for sharing. Every time you post a new vlog I learn something pretty cool and new!
its not working for me on vm ware kali lunix does i have to boot kali lunix in my pc ???
Waw my bro your computer science is about Love ❤️
this thing is When in term of final complete control; it give error that the Driectory is Self made and can't access the remote connection. PLEASE HELP
Good vid, informative to those people who don't want to be hacked and what signs they need to look out for, also i could see this being quite useful in many situations
is it possible to hide the .bat file with any kali linux tool? maybe as an image or pdf doc? thanx boss, absolutely amazing everything u teach us
@Cognitoman
3 ай бұрын
Prolly
@ñəméĮéšš
3 ай бұрын
make a shortcut to it and then you can edit the icon
does it work if the other computer is turned off? and does the user see me controlling their computer?
amazing stuff. Thank you
So insightful, many thanks!
Brother. Can you please tell me how hackers see hacked phone screen by vnc.. Please answer🙏
hacker loi is like that one cool friends dad who tells you some secrets but tells you not to tell anyone
@a24s44
5 ай бұрын
You know he's ur real dad 😂
system has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down. it gave me this when i typed sudo pwershell-empire server, how do i fix this?
This is perfect, now my brother will have no choice but to give me that money via online banking. Thanks man!
@japanesebeluga3596
Жыл бұрын
No one cares bout you and ur mfker brother
4:26 can someone explain me that whats the domain ip how to make it or enter it?? please someone tell me what ip we are gonna give to a user to crack and remote his pc?
@jshy5423
Жыл бұрын
i’m also trying to find out lol
@insanthat
Жыл бұрын
@@jshy5423 i find out when you do that process you will get a ip use that
@ysl.niku777
Жыл бұрын
@@insanthat what process?
Where can I find the IP address and port to use to get the launcher.bat URL?
Where can we get the programme pls list it
Is it possible to write a php or javascript code in such a way that as the visitor visit our website then our payload automatically install and execute at the same time? Is it possible?
@coopermarino2355
Жыл бұрын
No to execute code you would need to exploit a bug in the internet browser. And then that user needs to be using that browser and a version of it that’s exploitable
@gurejalectures
Жыл бұрын
@@coopermarino2355 we can run shell commands using javascript in browser to execute our payload i think. What do you say?
@gurejalectures
Жыл бұрын
@@coopermarino2355 shell_exec() or exec() or system() like this code
@coopermarino2355
Жыл бұрын
@@gurejalectures that runs serverside. Shell exec. Will execute on the server, as php is a server interperated language.
@coopermarino2355
Жыл бұрын
@@gurejalectures oh wait JavaScript not php. I’m not 100% sure but you shouldn’t be able to run she’ll commands with it
As we are seeing more hackers, is there a way to reverse the hack seeing that they have a port into your computer/phone? If yes, would you make a video.
is it possible to send the malware without a link or email, I mean just by public IP ? maybe using nmap, sql ?
@nocturne2172
Жыл бұрын
No
@MedicalStudentChannel
Жыл бұрын
@@nocturne2172 so only by email, usb etc...?
What are modules you would use for android?
Wow very impressive Mr. Loi Liang Yang
Is it possible to use pdf method with embedded bat file here?
completely love the video i have a question : what happens when the victim switch off the computer will you be able to access it while is off or on again
@Mohitkumar-ug8jq
Жыл бұрын
Difficult in this case but not possible if the main power is off.
@computer1steam317
Жыл бұрын
@@Mohitkumar-ug8jq thank you looking forward for more videos
Hii sir how you know about these all tricks, le me know sir plz🙏
Hello Guys!! May i know in real-time scenario how hackers send this malicious file to the victims machine , even if they send it successfully what if victim cannot open or run or even do not notice that particular malicious file??
Good game you are amazing professor 🤝🎯
Please make vd how to create payload bypass av and advanced techniques tools for red team
Sir, which software is used by you for this video. (I mean for hacking)
@sunnyblue3105
4 ай бұрын
The operating system is kali linux then do all the commands in the kali linux terminal
i dont get the part u type in browser and then download what is that
which applicaion?website are you using for coding in the vid??
@clyfar69
2 ай бұрын
Thats kali linux
Few tutorials on host header attacks pls
even i dont understand a single thing , but man , I want to be like you !
he seems to make his videos alot like network shuck with all the drawing and stuff
there is no port number in the table after i write the code how can i get the port number can you tell me.
Sir, can you make a video for network breaching in your next video?
4:25 i didnt understood that they are entering the ip so how can i know that the ip with port number please help
@ysl.niku777
Жыл бұрын
same question, did you figure it out?
Hi, I came from Brazil and this is perfect, I'm using after very easy, thanks!
Do you have to have Kali to rdp win10?
Doing a good job is not always about impressive innovation. Sometimes it is only about doing something with plain dedication. Well done *Johnsonspy* . This message is to recognize your contribution related to hacking. Your commitment has been exemplary and your hard work is an inspiration to everyone around you.
@lejuhnd3027
Жыл бұрын
scam
I copied your steps Hacker Loi and I tried to open up the downloaded bat file , even after turning off real time virus and threat protection, unfortunately Windows 11 wouldn't let me open the bat file. i will turn off all Firewalls and try again. I am looking foward to seeing how you hide a bat file in a Domain Name and will that work? Will Windows 11 let me open up a file that contains a well hidden bat file ? Time will tell. I really want to overcome this hurdle and become a Hacker that can defeat Windows Firewalls.
did they need to be connected to the same network ???
what was that column linux thing?
TNice tutorials was easy to follow.
Weird question but would you have to portforward port 4321 in your router to your attacker device/server?
hi i am big fan of you from india I have help from you that is pleace make video on how to install kali linux old version and slove the problem to install some packages like vile plesase 🙏🙏🙏🙏🙏🙏
Most antivirus detect this kind of exploits even windows warns about executing bat files... but this tool is cool...
@daanvk3264
15 күн бұрын
Yes but my friends expect I put a .bat file that disables your explorer.exe task
can you move there mouse around that would be pretty cool to do
I don't get the part where you go to the browser How did you get there
both the GMS and softEX setup is very different from the one ur using.. why is it so.? GMS doesn't even soft like a app one... and the
Sir I thank u for teaching because by learning ethical hacking, I can help the victims by getting scammed by scammer
Hi bro I'm subscribed can you show in detail which app and which code u use 😀
Hi, just wondering can hackers slip in a virus when windows is updating? Also, can man in the middle corrupt defender files so it do not detect viruses? Thanks.
Appreciate your help
Instructions uncleared; computer opened RickRoll video
hmm what kind of application do use for the hack
Can anyone tell me what the best way to get a target host for testing? Just a VM would do right? And also what would make the user select that file and how would it just pop up?
@pettusmediaproductionsllc7364
Жыл бұрын
VMware would work fine for testing and to get them to click the link, you'd have to do some social engineering.
@Mohitkumar-ug8jq
Жыл бұрын
@OSArmor Exactly to run this you have to stop the defender manually otherwise it will block the file before execution.
What is the program called that you're using because it doesn't look like the command propmt
@nocturne2172
Жыл бұрын
its kali linux shell...
hi basically im new to this field 😅 i was learning i got struck in port 4321 setup in my machine under port no number are there how should i setup the port😮 can anyone help me please thank you
Excuse , is there a reason I don't have Pack on my soft soft?
It's showing cannot reach the page., how to overcome this problem , while entering the command in search bar as launcher. Bat