how to HACK a password // Windows Edition

Ғылым және технология

Create passwords I can’t hack with Dashlane (unlike Michael): dashlane.com/networkchuck50 (50% off) with code NETWORKCHUCK50
It is surprisingly easy to hack a password on Windows. In this video, NetworkChuck will demonstrate how you can grab a password hash from a Windows computer and reveal the passwords with a tool called impacket secrets dump. Once we have the hash, we can use a password cracking tool called Hashcat (a popular tool in Kali Linux), to crack the password.
VIDEO HELP
---------------------------------------------------
Mitigation Techniques: attack.mitre.org/techniques/T...
SECURITY MEASURES YOU NEED TO DISABLE TO USE ALL FEATURES IN THIS VIDEO
-Disable “DisableRestrictedAdmin” (this allows winrm and rdp access with a hash): reg add HKLM\System\CurrentControlSet\Control\Lsa /t REG_DWORD /v DisableRestrictedAdmin /d 0x0 /f
-Turn off Windows Firewall
-Enable RDP and add user to RDP users group
🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
**Sponsored by Dashlane
SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️NetworkChuck membership: ntck.co/Premium
☕☕ COFFEE and MERCH: ntck.co/coffee
Check out my new channel: ntck.co/ncclips
🆘🆘NEED HELP?? Join the Discord Server: / discord
STUDY WITH ME on Twitch: bit.ly/nc_twitch
READY TO LEARN??
---------------------------------------------------
-Learn Python: bit.ly/3rzZjzz
-Get your CCNA: bit.ly/nc-ccna
FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: / networkchuck
Twitter: / networkchuck
Facebook: / networkchuck
Join the Discord server: bit.ly/nc-discord
AFFILIATES & REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)
My network gear: geni.us/L6wyIUj
Amazon Affiliate Store: www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: hostifi.com/?via=chuck
- Password cracking techniques
- How to hack a password on Windows
- Cybersecurity vulnerabilities
- Cyberattacks and network security
- Kali Linux for password hacking
- Hashcat and CUPP for password cracking
- Pass the Hash attack
- NTLM and RDP security
- WinRM for remote access
- Ethical hacking for information security
- IT security and password protection
- NetworkChuck's password cracking tutorial
- Learn password cracking on NetworkChuck
- Understanding cybersecurity and password hacking
- Protecting against password hacking
- Information security and password protection
- IT security best practices for passwords
#passwordhacking #passwordcracking #windows

Пікірлер: 1 500

  • @NetworkChuck
    @NetworkChuck10 ай бұрын

    Create passwords I can’t hack with Dashlane: dashlane.com/networkchuck50 (50% off) with code NETWORKCHUCK50 VIDEO HELP --------------------------------------------------- Mitigation Techniques: attack.mitre.org/techniques/T1003/002/ SECURITY MEASURES YOU NEED TO DISABLE TO USE ALL FEATURES IN THIS VIDEO -Disable “DisableRestrictedAdmin” (this allows winrm and rdp access with a hash): reg add HKLM\System\CurrentControlSet\Control\Lsa /t REG_DWORD /v DisableRestrictedAdmin /d 0x0 /f -Turn off Windows Firewall -Enable RDP and add user to RDP users group 🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy **Sponsored by Dashlane

  • @Obama_

    @Obama_

    10 ай бұрын

    :)

  • @loadrocks1235

    @loadrocks1235

    10 ай бұрын

    My parents won’t let me and I got hacked plz help me ):

  • @JeffJeycyn

    @JeffJeycyn

    10 ай бұрын

    Hy I'm just a kid interested in coding and I kinda need your help

  • @shootproof7080

    @shootproof7080

    10 ай бұрын

    How not to hack a password. CLS

  • @elvendragonhammer5433

    @elvendragonhammer5433

    10 ай бұрын

    You forgot to close the CMD/Powershell window on his PC so unless he's not used to your antics yet he knows something is up lol

  • @jakesteel3641
    @jakesteel364110 ай бұрын

    Next time be sure to close the cmd window with your commands and delete the files you saved. Many hackers caught by not covering their tracks. Watch the clip you forgot this.

  • @ShinyTechThings

    @ShinyTechThings

    10 ай бұрын

    Yup, he did 🤔

  • @Shimi1990

    @Shimi1990

    10 ай бұрын

    LOL saw that too😂

  • @Destuctor28

    @Destuctor28

    10 ай бұрын

    Hahaha hilarious to see that we all noticed it 😂

  • @yaboiJCMdagoat

    @yaboiJCMdagoat

    10 ай бұрын

    I’m pretty sure if he was doing it for real he would do all of that

  • @noviccen388

    @noviccen388

    10 ай бұрын

    relax and chill bro, it's staged. he knows whats he is doing

  • @Angadss101
    @Angadss10110 ай бұрын

    “He doesn’t even know” Also CMD open: 😂

  • @TheCrazycrab2
    @TheCrazycrab25 ай бұрын

    What blows me away is someone created hash cat, someone created CUPP, there are truly some brilliant minds out there that are on a level which is almost incomprehensible

  • @destroychihuahua
    @destroychihuahua9 ай бұрын

    I just found your channel two hours ago and you’ve already answered dozens of my questions across 3 videos. You’ve got my attention 😂

  • @havaduman2689
    @havaduman268910 ай бұрын

    I've had the feeling BTC would be going to 3k as well. Clearing out all my Alts going into BTC and MA230FH only, maybe a little BNB.

  • @user-jl5cx8yb7i

    @user-jl5cx8yb7i

    8 ай бұрын

    ALLHACKZEB help you aloot ❤❤❤

  • @rajaramanv
    @rajaramanv10 ай бұрын

    I quite enjoyed the suspense, drama and all the fun you had. You are definitely not a boring computer nerd !

  • @jeffburkholder2148
    @jeffburkholder21488 ай бұрын

    very cool. Have watched a few of your videos. Question: what software are you using to write/draw on screen when doing the videos?

  • @yusufmusaoz
    @yusufmusaoz10 ай бұрын

    Thank you for the update MA230FH is done right, and waiting is part of the process,

  • @imgunnaduwit
    @imgunnaduwit10 ай бұрын

    youre vids are very well made and make learning white hats stuff very interesting, I'm a beginer and the more I watch your stuff the more it makes me want to learn keep up the good work

  • @dreadesina5216
    @dreadesina52167 ай бұрын

    I know this is for educational purposes but most system now add salt to the password before it's hashed and also re hash it many times which mean the complexity is way too high to crack via brute forcing or rainbow table. I'm a developer and this is how we store password in the DB with some good library and I'm perplexed that window use MD4 while SHA256 is the most secure Hash function. Anyway good stuff like always haven't been on here in a minute your charismatic is what I came out here for and hoping I can grow my patches beard to your level 😀

  • @Harrun
    @Harrun10 ай бұрын

    Hey Chuck! Love your videos, they are super entertaining

  • @seanfager8063
    @seanfager806310 ай бұрын

    Nice. I had to break into a Windows system, once upon a time, when our vendor lost their password list for our site. Used the ol' "crash it over and over until it lets you boot into cmd/"DOS", replace the accessibility tools with a copy if cmd.exe, and manually modify the registry via the command prompt Windows launches instead of text-to-speech type stuff after a reboot" method. Works, but is a replacement for existing passwords rather than a data pull, so it's super obvious after the fact.

  • @narayan..7518
    @narayan..751810 ай бұрын

    I love this "educational" content. You're the best

  • @user-xj1hl9qk6p
    @user-xj1hl9qk6p9 ай бұрын

    Love your videos!!! Quick side note/observation/comment and a pretty much rhetorical question, its not so much of a "hack" when having to disable firewall, add user and possibly enable RDP and disable restricted admin, is it?? I dont know you may have addressed that at the start of the video, your pretty thorough so i would assume that you mentioned that, which makes me ponder the fact that i am writing this right now, past the point of return!!!! Thanks for the hours of entertainment AND KNOWLEDGE (more importantly) you have provided!!

  • @unknown-userGohst
    @unknown-userGohst10 ай бұрын

    One of your top coolest videos Chuck! I learned a lot :)

  • @Shubham-Mishra
    @Shubham-Mishra10 ай бұрын

    Hey man, please post videos frequently, We miss you ❤

  • @Jessterr2
    @Jessterr27 ай бұрын

    I'm in a software engineering school right now. I think you just helped me affirm my major choice. Thanks lmao

  • @jackjaguarygo

    @jackjaguarygo

    3 ай бұрын

    Would that be Cyber Security? I'm curious what type of degree or work this can translate to. It peaked my interest and I'd like to do something career-wise that involves this! Just want to make sure I recognize the proper track and stay on it! :)

  • @charalampost769
    @charalampost76910 ай бұрын

    Great video Chuck, but is this for local or microsoft account? or both?

  • @somarm6929
    @somarm692910 ай бұрын

    Great stuff as usual, I love your videos Chuck you are a great cybersecurity teacher and specialist. I enjoy your videos a lot and learn a lot from you. You are the best

  • @somarm6929

    @somarm6929

    10 ай бұрын

    @elenaalice4391 Thank you for the tip I'll definitely check them out

  • @DeNikow
    @DeNikow10 ай бұрын

    FYI, for domain users it's not the SAM hive but rather the SECURITY registry hive. The mistake that is often made is allowing end users to be local administrators on their endpoints within a domain. If an unknowingly system administrator then logs on to the PC with a domain administrator account or an account with local administrator on a domain member server, you're basically screwed if the endpoint is hacked. Even if the end user is not local admin, it's still really bad practice as there are other ways to elevate privileges depending on software used, Windows up-to-dateness etc.

  • @anaprivrat6050
    @anaprivrat60509 ай бұрын

    The way you approached my request in getting back my account added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Web back doors* is crucial. I really appreciate the constructive feedback you give to me regularly. Thank you for taking the time to work with me on this. It helped me get so much and also got my account back.

  • @JensSkov
    @JensSkov8 ай бұрын

    Love that T-shirt! I missed the affiliate link for that one :)

  • @notleonid
    @notleonid10 ай бұрын

    " He doesn't even know... What a sucker 😈" *left with the command prompt open with all the command history*

  • @justice32legends
    @justice32legends10 ай бұрын

    Oh no don't! Don't give me hope...

  • @zehra.5479
    @zehra.547910 ай бұрын

    Your work speaks volumes of the kind of man you are - efficient, organized and result-oriented. Well done MetaspyClub Best Social Media Expertise Within you is the absolute power to rise above any situation or struggle, and transform it into the strongest and the most beautiful version of you ever.

  • @lebothegizebo
    @lebothegizebo9 ай бұрын

    You can actually do this without being logged in. If you exploit CMD to be open on the login screen, it still works if you replace something like accessibility with CMD with a windows repair drive or if you do it by holding shift plus restart and going into cmd

  • @Mr.Programs1256
    @Mr.Programs125610 ай бұрын

    Thats incredible i love all your video ! Keep doing good content like this !🙂

  • @DmitriyK007
    @DmitriyK00710 ай бұрын

    Awesome video! Few questions. I hope Micheal staged this pass, and it is different from his common password(lol). 2, typically, on Windows, when you rdp, it kicks the logged-in user from the machine. Is Xrdp different?

  • @nayanchoudhary4353

    @nayanchoudhary4353

    10 ай бұрын

    It should not be different experience. The person on the PC is locked out.

  • @PotatoNachoIT
    @PotatoNachoIT8 ай бұрын

    who in the world would leave their computer ON without security where there is someone like chuck

  • @funkyjunky3224
    @funkyjunky322410 ай бұрын

    This is amazing and I’m going to do something similar but use a rubber ducky and such. How would this would across different networks. Thinks a home firewall will stop you from connecting to a friends computer?

  • @priyojitdeb1891
    @priyojitdeb189110 ай бұрын

    03:58 you left the CMD window open for Michael to see

  • @zyphon7
    @zyphon710 ай бұрын

    Frankly I’m just concerned with what Michael is doing in the bathroom. That’s a long break 😂

  • @wonkavision4k758
    @wonkavision4k7587 ай бұрын

    great video! so what about the wifi password . is that password you found just for windows?

  • @danbromberg
    @danbromberg8 ай бұрын

    Is there a 100% Windows version (i.e., non-Linux) to do this? Love your energy!

  • @sonniiiiii
    @sonniiiiii10 ай бұрын

    Awesome! Love your content. ❤

  • @kristenarias2022
    @kristenarias20229 ай бұрын

    Fewer problems, more solutions - keep working like this and nothing will be able to stop you from reaching the top. Good job *Web back doors* , Even the smallest of jobs well done will take you one step closer to the success you have always dreamed about. Keep it up Mate

  • @faltadeinformacao5373
    @faltadeinformacao537310 ай бұрын

    great video just a small detail was missing during the explanation of the attack windows must have remote desktop and that it is activated for it to make the connection just a question is this a local attack?

  • @youssefshares
    @youssefshares10 ай бұрын

    You are such an inspiration to me ❤

  • @gerowen
    @gerowen10 ай бұрын

    Years ago I used a Linux package called "chntpw" to forcibly reset the local Admin password on Windows machines. It's available in basically all Linux distributions and you just have to be able to mount the drive in question.

  • @camelotenglishtuition6394

    @camelotenglishtuition6394

    10 ай бұрын

    Right.. or just boot from a nix distro and copy the windows files ..

  • @leewright6982
    @leewright698210 ай бұрын

    Very impressive video again Chuck, is there anything like this for Apple os?

  • @kapzvara5732
    @kapzvara57328 ай бұрын

    Great video thanks for this really interesting video on hashs

  • @chuckfinley4869
    @chuckfinley486910 ай бұрын

    leet mode is for leet text. Leet or 1337 is a way of writing used on the internet, in which the usual letters that are used to spell a word are replaced by numbers or special characters

  • @kreesky
    @kreesky9 ай бұрын

    Any advice would be appreciated, I did all the steps in your video but hash-cat keeps saying EXHAUSTED. I even changed my password to something super simple and even WROTE it on the .txt, still says exhausted. Please help?

  • @petershepherd447
    @petershepherd4477 ай бұрын

    Anyone notice how Chuck left open the command prompt window with the commands in it on his employees computer? xD

  • @Kenny_the_WBSK
    @Kenny_the_WBSK10 ай бұрын

    "He doesnt even know" *leaves cmd on* XD all jokes aside this is good information and I will try it out on my system as well for fun. Thanks chuck :)

  • @MasteringAnySkillAndKnowledge
    @MasteringAnySkillAndKnowledge6 ай бұрын

    Chuck, you showed great composure, impressive experiencea! Awesome...

  • @Seanleeeeeeee-fk9xl
    @Seanleeeeeeee-fk9xl7 ай бұрын

    Is it a good idea to use Kali Linux as my overall OS on my PC, or should I continue using VirtualBox?

  • @wizix9877
    @wizix987710 ай бұрын

    next episode, Micheal suing NetworkChuck for emotional damage.

  • @user-su5lw4tm5z
    @user-su5lw4tm5z10 ай бұрын

    Love you MR.chuck thanks for your content ❤❤❤

  • @Matrixred11
    @Matrixred113 ай бұрын

    in one day i think i whatched all ur videos, good videos.

  • @ogeretla9332
    @ogeretla93328 ай бұрын

    could you get the files from outside the OS, for example a linux bootable drive, mounting the disk with the windows partition and grabbing the file. This is possible right?

  • @SisandaSibiya-ur1cy
    @SisandaSibiya-ur1cy10 ай бұрын

    Bro was fighting for his life in that toilet😂😭

  • @Obama_
    @Obama_10 ай бұрын

    Great video as always

  • @celinediarra4906
    @celinediarra490610 ай бұрын

    Thank you very much Chuk for such a great content.

  • @AnthonyMarkSimon8863
    @AnthonyMarkSimon88639 ай бұрын

    May i ask which software ur using? I wanted to practice it but i couldn't find the software ur using

  • @sanjuk3
    @sanjuk310 ай бұрын

    Noticed he left the terminal open and michael doesnt notices it? LOL:))

  • @maltebjorklund4354
    @maltebjorklund43545 ай бұрын

    really good explaining! You just got a like!!

  • @chloetzpiano6548
    @chloetzpiano654810 ай бұрын

    Just recently got hired as junior network engineer after passing ccna. My journey is still long ahead but networkchuck gave me this career interest path few years ago. Thank you chuck. Ok now to panic and keep studying.Bye

  • @An.Individual
    @An.Individual10 ай бұрын

    3:58 Chuck leaves the command prompt open so the guy will know what has happened. Rooky mistake.

  • @RentedLipz
    @RentedLipz7 ай бұрын

    are you doing this on the local machine or on a domain. I am assuming it is the local SAM of the desktop

  • @lgndw
    @lgndw9 ай бұрын

    The way I used to do it was my own way I had loads of netbooks from ebay that had xp and vista on them so I fired up kali linux live installed chntpw looked in system 32 files for configuration folder then looked for SAM files put in a few commands and I got full access to the hdd.

  • @Felos_Felopoulos
    @Felos_Felopoulos10 ай бұрын

    nice video as always!!

  • @tylerloomis3160
    @tylerloomis31609 ай бұрын

    FYI, leet is short for leetspeak, where you substitute numbers for letters (leet=1337) It was popular last century in IRC chat.

  • @Antonio-vf2xj
    @Antonio-vf2xj8 ай бұрын

    After some time, I managed to actually make an USB that when you put on a pc and run a file, gravs those saves files from reigstry, also does other stuff like get the user name, ect, (to get something to make the passwords list later), it's pretty insane how actually it's so easy, but also hard, to hack people And before you say, yes, I tested it but I'm not using it to hack anyone else without him knowing. Anyway, I love this video, and this channel!

  • @shyguy6185
    @shyguy618510 ай бұрын

    Chuck: "He doesn't even know" Also Chuck: Leaves CMD window WITH COMANDS USED open and Saved files in folder.

  • @DerekNhyira

    @DerekNhyira

    10 ай бұрын

    Yea, noticed it.

  • @JackInSuit
    @JackInSuit10 ай бұрын

    Hey @NetworkChuck you should consider creating a tutorial on how to make a pssword manager on a usb stik that encrypts your passwords. So like when you put in a password there is a rule that states A = 123 for example. I keep trying to do this but I am confused lol

  • @Cyhawkx

    @Cyhawkx

    10 ай бұрын

    Dude just use a normal password manager like keepassxc or 1password

  • @zeenxdownz

    @zeenxdownz

    10 ай бұрын

    @@Cyhawkx thats not the usual way that (i) or possibly (other programmers) do it. it's pretty fun to do, imagine making your own little lab with your own password manager. it's not for storing passwords, its for fun :D wish you luck.

  • @Seraph924
    @Seraph92410 ай бұрын

    @NetworkChuck Might be a stupid question, but how do you copy/paste or transfer files onto kali linux, i can't for the life of me figure that out, it doesnt detect a USB or when I copy/paste from windows to kali. I'm running kali with TigerVNC on windows 11.

  • @tharakakarunarathne5346
    @tharakakarunarathne534610 ай бұрын

    I did kind of a same thing 15 years back using telnet. My gaming friends were freaked out. Back then I only knwe to clise their running programs and shutdown the windows with a message. But that was enough. :D

  • @SamOfTheSmokies76
    @SamOfTheSmokies7610 ай бұрын

    Thanks for the vid man :D

  • @halitakat5540
    @halitakat554010 ай бұрын

    Great video! I have a question, I have two fraud inquiries on my reports that I would like to get removed. I've seen your video regarding this, but Im still a bit confused. So I know my first step would be making a call with the credit bureau (Experian) but should I also make call what time? And would I be never stop sending a good compny *VRI TOKEN* to my friends and people I know regarding any credit situations

  • @microsoftsarker
    @microsoftsarker5 ай бұрын

    Thanks man!! It was helpful 😃Thanks a lot

  • @toumpanis
    @toumpanis10 ай бұрын

    But you left the cmd open on the way out with all the commands you've used... how he doesn't know as you said?

  • @DadVlogsContentWarning
    @DadVlogsContentWarning10 ай бұрын

    Great Video!

  • @noviccen388
    @noviccen3885 ай бұрын

    10:03 does that work only for the same network segment? or it can be inter-network connected?

  • @user-wi2hl6ce5j
    @user-wi2hl6ce5j10 ай бұрын

    Hey dude Nice video! BTW don't forget to exit the command line window at 3:59

  • @SeRoShadow
    @SeRoShadow10 ай бұрын

    Here is an easier way to OVERRIDE the password on any Windows OS. Run cmd then type : net user %username% * Input the new password to whatever you wish ( even blank ) and thats it. PS: as in video, you need access to an user account with admin priviledge.

  • @hacktheworld2976
    @hacktheworld297610 ай бұрын

    Hi! I like your videos networkchuck and i dont miss any of them. Can you make a video about how track location with phone number.

  • @test-rj2vl
    @test-rj2vl10 ай бұрын

    I remember there was a live CD that could boot window computer and then use dictionary on those hashes. So you could basically make usb drive, take it to school computer class during the break when teacher was not there and get admin password to install some games.

  • @xrellikgr
    @xrellikgr10 ай бұрын

    Big shoot out to network Chuck for teaching me how to be an unethical hacker 😈

  • @8080VB
    @8080VB10 ай бұрын

    Wow Secretdump is like the windows version of unshadow . Very cool !

  • @goc19777
    @goc1977710 ай бұрын

    If it's Windows 10, you can do this MUCH more easily with a cmd trick lol 😂

  • @aninsecurecarrot

    @aninsecurecarrot

    10 ай бұрын

    What trick is that? Just curious

  • @dany2685
    @dany268510 ай бұрын

    Normally system folders should have administrator protection and it is not that easy to copy those files but this is a good beginner example of how to crack windows passwords

  • @dennisaleander5175

    @dennisaleander5175

    10 ай бұрын

    Linux does that but it forces the user to input the account password every time which is not convenient.

  • @uknowme4398
    @uknowme43987 ай бұрын

    00:00 Hacking Michael's Windows password using hash cracking 01:27 Obtaining system registry hash via command line 02:58 Secure your passwords with Dashlane 04:49 Extracted NTLM hashes can be cracked using password guessing tools 06:18 Hackers use dictionary attacks to crack passwords in data breaches. 07:57 Successfully hacked into a Windows machine using a dictionary attack 09:30 Pass the hash attack allows access to Windows computer without password. 11:01 Disabling security features was necessary to detect registry keys and execute commands remotely. Crafted by Merlin AI.

  • @Evil_Spotify

    @Evil_Spotify

    2 ай бұрын

    Underrated comment

  • @xxstepsxx4227
    @xxstepsxx422710 ай бұрын

    He barely touched that coffee mug, call ambulance! Chuck is sick! 😂

  • @ShinigamiAnger
    @ShinigamiAnger10 ай бұрын

    There are also some cheap pendrives that do all the work for you, you just plug it in for a short period of time and they do all the work. That’s why you want to use a different account as the administrator AND an hardware key (yubikey like)

  • @RazoBeckett.
    @RazoBeckett.10 ай бұрын

    Quick and sweet

  • @mysteriousgamer
    @mysteriousgamer10 ай бұрын

    Another mitigation would be to not use your administrator account by default. By using a general user account, Chuck would not have been able to create the hash file via CMD.

  • @TopMusicsEnglish
    @TopMusicsEnglish10 ай бұрын

    Hey i have a question why dont we jus get the hash and convert to password using a converter online insted od coding it is it possible?

  • @sonniiiiii
    @sonniiiiii10 ай бұрын

    You left the cmd on. What if he saw it?

  • @dominicy4868

    @dominicy4868

    10 ай бұрын

    Cmd window with all the commands used... they'd definitely notice. He also forgot to delete the files he saved 😅 most "hackers" get caught because they forget to cover their tracks

  • @ritsux4204
    @ritsux420410 ай бұрын

    Hey Chuck can you tell us how to install PHP in kali linux in your next video? btw I'm a huge fan of your videos and love your content.

  • @somnullty
    @somnullty4 ай бұрын

    chuck: leaves terminal opened chuck: he doesnt even know

  • @bendixdavid3593
    @bendixdavid35939 ай бұрын

    Can I crack the Hash also on windows or do i have to use the Linux command prompt to do that?

  • @Calvinthewestie
    @Calvinthewestie10 ай бұрын

    this didint work

  • @IDs4ios

    @IDs4ios

    29 күн бұрын

    It won’t work with the iPhone comma or mobile comma just google the altoro mutual comma and copy and paste

  • @lokeshsharma7703
    @lokeshsharma77034 ай бұрын

    This so helped me a lot in my hacking journey Thank you so much 🙂🙂🙂🙂

  • @user-ql3ix6sg3h
    @user-ql3ix6sg3h8 ай бұрын

    Good one bro!! How were you able to connect to your server computer graphically(GUI)??? I use openssh which isn't gui. You or anyone else please

  • @user-xh9ob1is1q

    @user-xh9ob1is1q

    8 ай бұрын

    *Thank god for life ALLHACKZEB helps aloot* ❤❤❤

  • @delofon

    @delofon

    8 ай бұрын

    You're talking about a Linux (or BSD too iirc) server right? If yes, OpenSSH supports X11 forwarding. This means you can install an X server on your SSH client PC (be it X Org or Xephyr for Linux or Xming or etc. for Windows). Then, by appending -Y parameter (read ssh manpage to better know what it does) to your ssh client (like `ssh -Y user@host`). This way you'll be able to open windows on your client PC as if they were opened on the server. This essentially will create a new desktop on your PC that thinks and acts like it's on the server. If not or you want to stream your server's existing desktop to your client, use either VNC or RDP.

  • @user-ql3ix6sg3h

    @user-ql3ix6sg3h

    7 ай бұрын

    @@delofon Thank you bro, I will go about that. Appreciated.

  • @user-ql3ix6sg3h

    @user-ql3ix6sg3h

    7 ай бұрын

    ​@@delofon How about similar thing but vice versa? like it should allow one to display graphical windows applications on one's linux desktop? just as it does on linux server to window client, but window server to linux client this time. So i want to independently control my windows apps or screen on another pc(linux) and then also use my windows apps independently. RDP like anydesk and teamviewer don't usually provide that. they just allow you to share the whole screen and whatever you do, it reflects live and directly on the remote pc. (windows is my intended remote in this case).

  • @The.King.12
    @The.King.1210 ай бұрын

    What if there is no password?

  • @user-sr5pj2ee5e

    @user-sr5pj2ee5e

    19 күн бұрын

    You'll know it by analyzing the hash

  • @jackspartan4221
    @jackspartan422110 ай бұрын

    Thank you for continuously making more videos!!

  • @DG-ks5wn
    @DG-ks5wn4 ай бұрын

    I have a question regarding to that dictionary thing. Will it also distinguish between keys and numbers? For example when i have something like "H3ll0" as a password...Does the dictionary Check "hello" or also numbers? So if it doesnt check numbers the password is something like safe? Sorry for the dumb question but it was a really interesting video.

  • @umutcan5111
    @umutcan511110 ай бұрын

    Myself during this Bear Market only trying to focus on BTC, *VRI TOKEN* , ETH, SOL, MATIC. not losing sight of BNB and GALA. 🇨🇦

Келесі