how to check for hackers attacking your computer?!

  Рет қаралды 97,077

Loi Liang Yang

Loi Liang Yang

2 жыл бұрын

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Пікірлер: 174
@razorwire111
@razorwire111 2 жыл бұрын
Please continue to add “how this attack can be discovered in logs” section for blue teamers! Thank you.
@iDesignTuts
@iDesignTuts 6 ай бұрын
I'm only here because the title was how to check for hackers, not how to hack into... :') There's never anything for blue team on youtube
@L1ghtOn3
@L1ghtOn3 2 жыл бұрын
Those books in the background are? I recognise one of them, the AWS security, most of those security training books are compTIA A+ etc or ISC2 CCSP study guides, it just books take sooooo long to read and always fall asleep, would be great to see a series on compTIA security book s or AWS security books done in a video would go down like a treat! Great vision as always my friend, I'm sick of my mobile getting hacked every since I started using bitcoin my phone is doing all sorts of weird crap and bugs, would really like a full secure your mobile which is a Linux kernel(I think?) and get some good security skills to keep my bitcoin safe as well as ledger and trezor hardware wallets. Anyway nice vid.
@rab621
@rab621 2 жыл бұрын
Love the video that was very helpful cheers 4 that bro
@paullee107
@paullee107 2 жыл бұрын
Thanks… I use Linux only, and would generally like more videos covering Linux as opposed to windows. I’m sure more ppl use windows; thanks a ton.
@etanonymous3061
@etanonymous3061 2 жыл бұрын
ya man and i am kali user and i want to hack window by ip
@kazisamir123
@kazisamir123 2 жыл бұрын
Best tutorial👍
@hollywoodtoyboy943
@hollywoodtoyboy943 Жыл бұрын
USESPY, your content is so high quality. The field of cyber security is so saturated with grifters. But it seems like your very rarely miss. Your channel was an excellent find.
@cryptombt5880
@cryptombt5880 2 жыл бұрын
Hi Loi, can I ask what the books are in the background. I recognise a couple. If you can make a list that would be amazing thank you so much. FYI you're videos are incredibly brilliant. My best channel here.
@fabicreativemoviemaker3327
@fabicreativemoviemaker3327 2 жыл бұрын
Very interesting Video !
@TLOH7
@TLOH7 2 жыл бұрын
The best way to learn hacking is when you're teached to protect yourself... I wish videos were more like this than: "How to hack a phone...but please don't do it".
@cobraviky2799
@cobraviky2799 2 жыл бұрын
Thank you sir for this creat video
@drblck4377
@drblck4377 2 жыл бұрын
Man you are amazing, How do you know all this stuff
@MRSMITHENTOP
@MRSMITHENTOP 10 ай бұрын
You are dope love you subscribed
@jannahia1
@jannahia1 2 жыл бұрын
Hi, It's a good explanation, but it's taken a long time, it's not possible you break or get in any pc with Rockyou, must build custom passwords break attack list. Some time scanning takes a long time not just a few clicks😊😊😊
@backinyourcommentsectionag3191
@backinyourcommentsectionag3191 2 жыл бұрын
Hello, This is actually not quite true, rockyou password list is a custom list. While building a list based on the target is generally more effective, do not underestimate that list! It can get into a pc very fast with a couple of decent GPUs to check hashes quickly!
@jannahia1
@jannahia1 2 жыл бұрын
Rockyou it's good for simple passwords, but in these days mostly it's hard to, if you capture the hashes, there's plenty ways break in apart from Rockyou. Security and privacy is important factor in this time.
@backinyourcommentsectionag3191
@backinyourcommentsectionag3191 2 жыл бұрын
@@jannahia1 Certainly. I was simply saying the old ways can be overlooked from time to time with some significant consequences. But yes, security and privacy is exceptionally important these days. In the mean time, keep the opsec tight ;)
@virenjoshi
@virenjoshi 2 жыл бұрын
thank you so much 🥺😭🤗❤️
@scottwilliams7395
@scottwilliams7395 2 жыл бұрын
This would assume that you are currently not using the PC because RDP will notify you if someone else is trying to log into the PC. Is there a way to send pop up alerts on certain event logs? How would you monitor the event logs without manually refreshing them? Cool video!
@bassmaiasa1312
@bassmaiasa1312 Жыл бұрын
"RDP will notify you if someone else is trying to log into the PC" Famous last words.
@vishwajeetsinhrathod1280
@vishwajeetsinhrathod1280 2 жыл бұрын
but it only works on PRO version of windows not for HOME edition
@safetime100
@safetime100 2 жыл бұрын
Very nice thanks, keep going please
@landero2213
@landero2213 2 жыл бұрын
How this dude running a whole operating system with just 2 gb
@sz3066
@sz3066 2 жыл бұрын
is it safe if enabled the audit log all the time ?
@somusoni7192
@somusoni7192 2 жыл бұрын
Intresting.
@clashwithmalayali9036
@clashwithmalayali9036 2 жыл бұрын
Thanks loi
@NEO_Trojanmuldrop4
@NEO_Trojanmuldrop4 2 ай бұрын
What happens when they removed their entrance manually on events / security ?
@ccook4960
@ccook4960 2 жыл бұрын
Damn your the man for someone like me who this has happened to. Thank you for the help to keep my n everyone elses computer safer.
@CyberSecForce
@CyberSecForce 2 жыл бұрын
Super 👌
@kabandajamir9844
@kabandajamir9844 2 жыл бұрын
Thanks our world's best teacher may God reward you
@tensnooze4757
@tensnooze4757 2 жыл бұрын
Nice 👍
@CXRTEDITSDEV
@CXRTEDITSDEV 2 жыл бұрын
What do you use for this stuff? Like what application?
@johnvardy9559
@johnvardy9559 5 ай бұрын
you are amzing
@WillSanchez1129
@WillSanchez1129 Жыл бұрын
Me Loi. I have a question. Can I follow your exact process without interfering with your system? By using the exact same IP
@yjhoneban2671
@yjhoneban2671 2 жыл бұрын
plese what name book on table...?
@therandomguy1681
@therandomguy1681 2 жыл бұрын
but what if im o windows 10 single home edition? no local policy editor
@ra_ref
@ra_ref 2 жыл бұрын
please can to tell next how to access to a website throw open ftp port or about open ssh port
@LYoung-op5ub
@LYoung-op5ub 2 жыл бұрын
Please do a video for computer challenged people
@dh-th2xr
@dh-th2xr 2 жыл бұрын
Just unplug the LAN cable, simple
@691337420
@691337420 9 ай бұрын
Hello Loi Liang Yang, I believe my KZbin is being hacked and my Playlists are being listed as "Updated today" or "Updated # days ago" without me being logged in or adding/removing/modifying these playlists. Is there any way to purge a session token on KZbin and force all actors to log out of the account?
@howtodefeatgangstalking
@howtodefeatgangstalking Жыл бұрын
How do you enumerate the user name in order to initiate the brute force attack?
@johnhammer3434
@johnhammer3434 2 жыл бұрын
Thanks dear, I like your videos and i also hacked my friends pc ... after see your Videos ... :)
@saadhamid5609
@saadhamid5609 2 жыл бұрын
Hi do you have online courses 2021?
@haike8780
@haike8780 2 жыл бұрын
Your forgot to talk about Syslog and IP SLA
@user-yf2cg3ew8f
@user-yf2cg3ew8f Жыл бұрын
I always wondered how can i see who is hacking me repeatedly thanks
@quack1119
@quack1119 2 жыл бұрын
Ok
@agadaFrancisLouis
@agadaFrancisLouis 2 жыл бұрын
I am your biggest fan❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤
@josephhh1745
@josephhh1745 2 жыл бұрын
Lol te robaron el acceso remoto buen vídeo master
@anormalguy2529
@anormalguy2529 2 жыл бұрын
Please make a video on kon boot pls
@ijustsneezed6484
@ijustsneezed6484 2 жыл бұрын
Cant find local security policy anywhere using windows 10 home
@ahmedshaikh3438
@ahmedshaikh3438 8 ай бұрын
Can you do this for Macbook Pro?
@manicsurfing
@manicsurfing 2 жыл бұрын
nice
@Daniel-so8ek
@Daniel-so8ek 2 жыл бұрын
This is not a real situation. RDP in LAN is easy, by default RDP is disable and the active user are logoff when you connect via RDP to the victim.
@phantomboy09
@phantomboy09 2 жыл бұрын
HELP what does it mean when it has almost the same name but with a $ at the end also it says a diferente id number
@johnSmith-bt1np
@johnSmith-bt1np Жыл бұрын
👌
@SweetInfusionByAysha
@SweetInfusionByAysha 2 жыл бұрын
which username we have to use ??? is the kalis or windows
@Jack-xx7yo
@Jack-xx7yo 2 жыл бұрын
So this only works if you’re on the same network as he user being hacked ?
@maiamaya6083
@maiamaya6083 2 жыл бұрын
I'm wondering the same
@HunchoDoughty
@HunchoDoughty 7 ай бұрын
🔥🔥
@iamneditor
@iamneditor 2 жыл бұрын
Loi using Ryzen 9 with 2gb of ram 😂
@beingunknown9538
@beingunknown9538 2 жыл бұрын
VM bro
@abdulrehman.yameen5736
@abdulrehman.yameen5736 2 жыл бұрын
😂
@SnipSnip477
@SnipSnip477 2 жыл бұрын
I just noticed that 🤣
@rAjAbhinand98
@rAjAbhinand98 2 жыл бұрын
That is his virtual machine not his real pc
@iamneditor
@iamneditor 2 жыл бұрын
@@rAjAbhinand98 Go and watch the 0.56
@DjNemes1s
@DjNemes1s 2 жыл бұрын
How did you get the username?
@billschrimpf6814
@billschrimpf6814 2 жыл бұрын
How do you enumerate the users on the machine?
@scottporter4524
@scottporter4524 2 жыл бұрын
If you just hacked into the computer within 1-2 minutes, it's literally pointless to go and read a log file every time you want to know if someone had a failed login attempt.
@arayeong6711
@arayeong6711 2 жыл бұрын
Pls tell that how to study pen test+
@erictellocosta4655
@erictellocosta4655 5 ай бұрын
How can i prevent them from doing this on an IP and way to protect myself?
@vladrazvan92able
@vladrazvan92able Жыл бұрын
Hi Liang i got some problem with some kids hwo atacks me with ddos how can i find them i mean to find their ip and necessary evidence to send the police after them?
@Paul-ki3lq
@Paul-ki3lq 2 жыл бұрын
Is there any easy codes to call to delete paired devices from Aandroid phones that i can run daily
@lux-music6321
@lux-music6321 2 жыл бұрын
Whats crowbar tho? Do I need to install it seperatly. Cuz it doesn't work on my kali machiene?
@muhammadfarrasmaruf9470
@muhammadfarrasmaruf9470 2 жыл бұрын
yes, its not built in
@luicotton5165
@luicotton5165 Жыл бұрын
Do i need linux or can I do it from CMD?
@hasagimasagi8365
@hasagimasagi8365 Жыл бұрын
Efficiency is whole personality, and nobody else could've played it better than USESPY.
@user-kk8xu2lo9f
@user-kk8xu2lo9f Жыл бұрын
Hello is there a way to hire someone my phone is being heavly hack and control
@UNITYMusics
@UNITYMusics 2 жыл бұрын
Nice ram
@motivation_hubPJ
@motivation_hubPJ 2 жыл бұрын
with newer windows 10 version by default remote deskotp service is disabled
@motivation_hubPJ
@motivation_hubPJ 2 жыл бұрын
Also whatever attacks uses password dictionary don't fell off with them because its very difficult to guess passwords of people even with various tools like hashcat. Though these videos can be taken as a good motivation for learning but they won't help you much . The real hacking stuff goes on when you can inject undetected payloads in pdf and video files which are not discovered as vulnerabilities till now. which is probably not a kids job to do even if you covered all the available Udemy courses.
@erictellocosta4655
@erictellocosta4655 5 ай бұрын
How do you check the IP address i have someone using my wifi to access my laptops and phones
@yhungseazer2914
@yhungseazer2914 2 жыл бұрын
How to get d username of the system???
@muhammadfarrasmaruf9470
@muhammadfarrasmaruf9470 2 жыл бұрын
Just like the passwords, you have to guess it. But, some people name their pc like their username. You can get the pc name using nmap
@pinayexotica8610
@pinayexotica8610 2 жыл бұрын
Is it applicable for android devices?
@anikid9609
@anikid9609 Жыл бұрын
🌱
@natebitch1407
@natebitch1407 2 жыл бұрын
Didn’t have much luck trying this on my own pc. I didn’t everything correctly but ended up getting a “no results found” it didn’t even try and of the passwords
@user-qr8ty6ul9i
@user-qr8ty6ul9i 11 ай бұрын
Can we scan public ip using nmap to hack any device??? please answer...!
@nicolae7186
@nicolae7186 2 жыл бұрын
I opened my laptop and my wallpaper was changed somehow,i don t know what is it because none of my family members use my laptop.What should I do?
@ogcreator1
@ogcreator1 2 жыл бұрын
I tried this on my computer, the second I did it, my computer shut down ! i think Microsoft did it to protect users.
@chedca
@chedca 2 жыл бұрын
i would hate to play counter strike against him
@luicotton5165
@luicotton5165 Жыл бұрын
What if I can't find local security policy
@ralphandre4438
@ralphandre4438 2 жыл бұрын
🤝
@Herobrinepvper
@Herobrinepvper Жыл бұрын
Why the hack stop
@rachelcleroux9102
@rachelcleroux9102 4 ай бұрын
can you teach me
@l3vi4theng.g88
@l3vi4theng.g88 2 жыл бұрын
Hey loi can you make a discord server so we can contact ye for help and education?
@SomeGuyWho759
@SomeGuyWho759 Жыл бұрын
Funny how if I enable ssl and install all certificates it still won't connect to the internet
@sewminachatusha3853
@sewminachatusha3853 2 жыл бұрын
Aila
@williamm200
@williamm200 2 жыл бұрын
Where do you get the word list 🤔 👀 😏
@FarhanTopG
@FarhanTopG 2 жыл бұрын
Please teach how to reconnect to the hacked device again in metasploit
@therealbaklolno.1512
@therealbaklolno.1512 2 жыл бұрын
Run command again bro 😀
@FarhanTopG
@FarhanTopG 2 жыл бұрын
@@therealbaklolno.1512 didn't get it
@therealbaklolno.1512
@therealbaklolno.1512 2 жыл бұрын
Bhai Jaan aap kaha se ho
@FarhanTopG
@FarhanTopG 2 жыл бұрын
@@therealbaklolno.1512 i dont know hindi
@therealbaklolno.1512
@therealbaklolno.1512 2 жыл бұрын
@@FarhanTopG where are you from
@ifthikhanmohamed1681
@ifthikhanmohamed1681 2 жыл бұрын
Zero click attack
@rockyjohnson1238
@rockyjohnson1238 2 жыл бұрын
No my windows 11 doesn't support remote desktop
@jdjdjdjsjsjdjdidjehwjw8301
@jdjdjdjsjsjdjdidjehwjw8301 2 жыл бұрын
Necesito que me ayudes estoy siendo atacado por un hacker
@emilym.harmon2627
@emilym.harmon2627 Жыл бұрын
How to track your iPhone hackers
@user-ke7zj2pu1z
@user-ke7zj2pu1z 5 ай бұрын
Hi, they keep hacking me, even though I bought a new phone, how can I have evidence that I have been hacked, the police won’t take them without evidence, they have been hacking me for 2 years!!! I’m asking about iPhone
@notta3d259
@notta3d259 2 жыл бұрын
Everyone is putting these screen cards on their videos anymore that's blocking the content. Creators need to wait until the very very end or make them smaller or something. Great video otherwise.
@mr_aha4713
@mr_aha4713 Жыл бұрын
no know knows what he's talking about but himself
@N75Gamer
@N75Gamer Жыл бұрын
bro someone see my docmentes and upload it in discord he hucked my.files from discord
@N75Gamer
@N75Gamer Жыл бұрын
wat can i make
@abunashersarker1403
@abunashersarker1403 2 жыл бұрын
Please send Total command as a *.txt file
@abunashersarker1403
@abunashersarker1403 2 жыл бұрын
Please continue *.txt file
@Hadidiz
@Hadidiz 2 жыл бұрын
Zerbewww
@Riborwahz
@Riborwahz 2 жыл бұрын
From hackerloi I know now CPU is more needed than ram Yeah?
@hrsh042
@hrsh042 2 жыл бұрын
2gb enough for tasks as this
@hrsh042
@hrsh042 2 жыл бұрын
It's a virtual machine, only 2 gb of total ram is allotted to it.
@Riborwahz
@Riborwahz 2 жыл бұрын
Oh yeah VM but why would he give so many core to VM
@harry4628
@harry4628 2 жыл бұрын
@@Riborwahz He didnt give 12 core to vm. Its just the processor specs shown there.
@Riborwahz
@Riborwahz 2 жыл бұрын
@@harry4628 OK
@bahai9706
@bahai9706 2 жыл бұрын
777th like
@Riborwahz
@Riborwahz 2 жыл бұрын
1:05 hacker loi PC was Amd ryzen 9 Ram-2GB Me:why?😵
@pupplemupple
@pupplemupple 2 жыл бұрын
it's a VM
@nils-erikolsson3539
@nils-erikolsson3539 2 жыл бұрын
Virtual Machines, one with Win10, one with Kali. Memory given to each VM is 2GB perhaps?
@rAjAbhinand98
@rAjAbhinand98 2 жыл бұрын
It is a virtual machine
@rAjAbhinand98
@rAjAbhinand98 2 жыл бұрын
His real pc will have Intel core i9 6464747474774 gb ram Nvida rtx 3080ti
@naninunenoaiueo8140
@naninunenoaiueo8140 6 ай бұрын
😪 number hack
@blackbrothelsinhempsteadny8345
@blackbrothelsinhempsteadny8345 2 жыл бұрын
black community involved
@umerhassan6534
@umerhassan6534 Жыл бұрын
Your voice is not matching with your face.
How to tell if your PC is hacked?!
9:02
Loi Liang Yang
Рет қаралды 95 М.
Remotely Control Any PC with an image?!
12:42
Loi Liang Yang
Рет қаралды 142 М.
버블티로 체감되는 요즘 물가
00:16
진영민yeongmin
Рет қаралды 112 МЛН
Survival skills: A great idea with duct tape #survival #lifehacks #camping
00:27
Самое Романтичное Видео ❤️
00:16
Глеб Рандалайнен
Рет қаралды 5 МЛН
Detect Hackers & Malware on your Computer (literally for free)
16:38
Signs Your PC Has Been Hacked
14:49
Britec09
Рет қаралды 72 М.
how hackers hack any website in 8 minutes 6 seconds?!
8:06
Loi Liang Yang
Рет қаралды 59 М.
How To Write A Penetration Testing Report
37:06
HackerSploit
Рет қаралды 60 М.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 1,7 МЛН
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,2 МЛН
Remotely Control Any Phone and PC with this Free tool!
17:15
Loi Liang Yang
Рет қаралды 789 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 257 М.
How to not get hacked: real example
13:55
The PC Security Channel
Рет қаралды 388 М.
تجربة أغرب توصيلة شحن ضد القطع تماما
0:56
صدام العزي
Рет қаралды 16 МЛН
Хотела заскамить на Айфон!😱📱(@gertieinar)
0:21
Взрывная История
Рет қаралды 6 МЛН
Hisense Official Flagship Store Hisense is the champion What is going on?
0:11
Special Effects Funny 44
Рет қаралды 2,9 МЛН
OZON РАЗБИЛИ 3 КОМПЬЮТЕРА
0:57
Кинг Комп Shorts
Рет қаралды 1,4 МЛН