Remotely Control Any PC with an image?!

  Рет қаралды 125,503

Loi Liang Yang

Loi Liang Yang

25 күн бұрын

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Пікірлер: 358
@shammahrashad
@shammahrashad 22 күн бұрын
Am I tripping. I thought this was a NetworkChuck video minus the coffee breaks
@Eazy_Bruh
@Eazy_Bruh 22 күн бұрын
Your videos are like magic…. I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video. The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane
@LZnaxyl
@LZnaxyl 22 күн бұрын
sounds like a skid
@Eazy_Bruh
@Eazy_Bruh 22 күн бұрын
@@LZnaxyl bruh what? You smell like a skid.
@ropenphilanigqwaru7560
@ropenphilanigqwaru7560 20 күн бұрын
What video broe, share a link am interested
@dineshsawansia6165
@dineshsawansia6165 10 күн бұрын
I need the the codes for this
@tiaanbasson9092
@tiaanbasson9092 13 күн бұрын
It is possible to hack a PC with an image, it uses the same principle as steganography. The hidden code exploits unsafe code in an image library and executes the code when any program using that specific version of the library is opened. Steganography is also used to hide messages, images, videos inside other files. So make sure to keep things updated.
@GinSolos
@GinSolos 11 күн бұрын
Broh are you on discord
@-p0z1tive-
@-p0z1tive- 4 күн бұрын
You can’t get a code to extract and execute another code without it being an executable. I have done steganography before, and it is more complicated than it seems
@-p0z1tive-
@-p0z1tive- 4 күн бұрын
You see, hiding the malicious code inside the image is easy, however to extract it, in the end it will have to be an executable as it is the only thing that can execute code
@GinSolos
@GinSolos 6 сағат бұрын
@@-p0z1tive- broh are you on discord
@lammabing6401
@lammabing6401 21 күн бұрын
I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff
@wahomemutahi1008
@wahomemutahi1008 22 күн бұрын
so you start the video by threatening me huh?🤣🤣🤣🤣
@usr808
@usr808 22 күн бұрын
I literally watch his videos just for the intro😂
@LoiLiangYang
@LoiLiangYang 22 күн бұрын
Yes
@GamerBePlayin
@GamerBePlayin 21 күн бұрын
​@@LoiLiangYangExactly now do it
@BlossomIwunna
@BlossomIwunna 19 күн бұрын
​@@usr808yeah me too 😂
@user-cb3tv8co7b
@user-cb3tv8co7b 4 күн бұрын
@@LoiLiangYang The always ask your mother before hacking and the laugh got me
@2kambas557
@2kambas557 15 күн бұрын
For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.
@freinerdaviddazaalvarado3644
@freinerdaviddazaalvarado3644 14 күн бұрын
Any video you recommend?
@djleodecond
@djleodecond 21 күн бұрын
man, that only works on the local network and certainly the firewall will block or notify the exposing ports
@Neekamhakane
@Neekamhakane 22 күн бұрын
Your video is like a mini-masterclass. So valuable!
@user-uv5lr7bk8n
@user-uv5lr7bk8n 19 күн бұрын
if you know tech enough, you know this is for kids only, lol.
@Alex_prave
@Alex_prave 22 күн бұрын
Sends a pic to someone , They : why this pic is .exe???
@rajesh_shrestha
@rajesh_shrestha 21 күн бұрын
only if they know the difference between exe and jpg :D
@winsucker7755
@winsucker7755 20 күн бұрын
"It's EXtremely Entertaining"
@user-zt3hq3pi5l
@user-zt3hq3pi5l 20 күн бұрын
Change the first binary/hexagonal designation
@zer0k4ge
@zer0k4ge 18 күн бұрын
You can use an RLO character. So first it will be saved as "picturegnp.exe" then you out an right to left override to make it pictureexe.png or change it to an rcs file so it is a little less obvious so "picturercs.png"
@saikatbiswas573
@saikatbiswas573 17 күн бұрын
That file could be named " annual companyindexe.pdf".its called extension spoof..this is a well known technic,so don't laugh with ur little knowledge.
@solexisdelexis4616
@solexisdelexis4616 22 күн бұрын
Please can you do a course on Linux and windows from the terminal
@computersandkeyboards
@computersandkeyboards 22 күн бұрын
Congrats on 1 mil!
@jesperjensen293
@jesperjensen293 22 күн бұрын
You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.
@goruluk88
@goruluk88 22 күн бұрын
what would be the tell tale sign that your PC has been infected because you don't realised that you accidently click an email that look so legitimate? will resetting my PC to factory setting will clean my PC from this infection?
@kundasemkundatam7461
@kundasemkundatam7461 22 күн бұрын
I can imagine young inexperienced teenager pirating "pre-installed" games in zip. Extracting it from context menu to "here" can do its job if our little pirate then opens the "jpg". Even worse it can be packed to self-extracting rar and this "jpg" can be set to start after extraction.
@killerstar718
@killerstar718 22 күн бұрын
@@goruluk88 stop all proccess and close out of everything, look in task manager and find anything that does not look like it shoudl be there and trace it back to file location and delete :) also look in the win startup dir
@zer0k4ge
@zer0k4ge 18 күн бұрын
zip file and RLO characters to make it end with jpg or png, problem solved
@saikatbiswas573
@saikatbiswas573 17 күн бұрын
It could be sent as a zip file.
@wasimafzali6651
@wasimafzali6651 22 күн бұрын
Hey ❤ Could you make a video for beginners where and how to start computer science, programming and other things
@paritoshbhatt
@paritoshbhatt 21 күн бұрын
Great Explanation Man !
@yeshua_n13-8aij8
@yeshua_n13-8aij8 21 күн бұрын
Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.
@CEFASOCACEDEMY-mz6zk
@CEFASOCACEDEMY-mz6zk 20 күн бұрын
I have been following for a while now and i can testify it is awesome
@archygonzalez3086
@archygonzalez3086 16 күн бұрын
Amazing and simple explanation, hope this content increases awareness ❤
@Krullfath
@Krullfath 22 күн бұрын
3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?
@lvsff4553
@lvsff4553 22 күн бұрын
GUYS DONT WORRY IT'S ALL ON LOCAL HOST
@JAI_SHREE_RAM_796
@JAI_SHREE_RAM_796 22 күн бұрын
😂😂
@user-km7yf5oh5s
@user-km7yf5oh5s 22 күн бұрын
With port forwarding its possible.
@7thghost09
@7thghost09 22 күн бұрын
🤣🤣
@novianindy887
@novianindy887 19 күн бұрын
wrong , study network more.
@nettlex
@nettlex 22 күн бұрын
the thing is, mail services show extensions by default.
@user-ev2ct8ug1m
@user-ev2ct8ug1m 22 күн бұрын
that face from 12:24 till 12:27 was priceless 🤣🤣
@tellisecfive9410
@tellisecfive9410 22 күн бұрын
That's some passive aggressive threats 😅😅😅
@sultanthe2nd
@sultanthe2nd 22 күн бұрын
That intro was 🔥 😂😂
@jermainreed9653
@jermainreed9653 22 күн бұрын
😂😂😂 I will help you find your password free of charge 😂😂
@KentechSolution
@KentechSolution 11 күн бұрын
😂😂😂😂
@satalaj
@satalaj 22 күн бұрын
20 years ago I used 007 spyware for fun it's idea was very similar to create a image and deploy
@MojtabaSultani
@MojtabaSultani 19 күн бұрын
Thanks so much, your great sir
@Dongdang-fc2mb
@Dongdang-fc2mb 15 күн бұрын
Good video and interesting subject. Would you be able to tell us how to check for this possible attack aka ‘photo installed’ and how to remove it from your pc or Mac? Thank you,
@tm02019
@tm02019 21 күн бұрын
how can you hide ".exe" of this file when attach to email or send file via Instant message? Does google drive scan this file and found som "like virus posoning code" and alarm?
@Invisible_pakistani
@Invisible_pakistani 8 күн бұрын
I love your intro attitude ❤😊
@KhZakir-br3pc
@KhZakir-br3pc 22 күн бұрын
Hi...boss you're best KZbin’s ❤
@mussaabdi
@mussaabdi 15 күн бұрын
@loi would you do the same but with port forwarding
@krypton_1101
@krypton_1101 22 күн бұрын
nice room light bro
@OoxGuru
@OoxGuru 16 күн бұрын
Your videos are much better than it was a few year ago where you wouldn't look at the camera , well done for the constant improvement
@suhaibnadir
@suhaibnadir 16 күн бұрын
You are genius loi 😊
@bot3d
@bot3d 13 күн бұрын
Viewer Think: Exploit Code inside an Image Reality: Powershell download an Image
@JordanMengo
@JordanMengo 21 күн бұрын
U are just so amazing...! 🤧 🤧
@everfreeeeee
@everfreeeeee 4 күн бұрын
the vnc can connect over the WAN without know the target machine WAN ip or port forwarding at target machine router ??
@usr808
@usr808 22 күн бұрын
I'm gonna try this on my boss. Thanks Loi😊
@johnmyers3233
@johnmyers3233 9 күн бұрын
I personally like to see the extensions on the file names, Likely. This wouldn't catch me off guard unless I was flipping through my images. I bet there are better ways of doing this That are coming to light and we need to protect ourselves. I personally do not like Leaving my internet connected. I also do not store important important information like taxes on an online computer. I think there might be a rule that can be made in order to prevent this from ever happening. I'm not sure how you are remotely connecting, but most of my remote services are restricted or off. I'm not sure if there is actually radio frequency on my motherboard, but it is another setting that you have to disable regardless of your motherboard, not having Bluetooth and Wi-Fi. I'm finding it very difficult to find motherboards that are safe from the outside world, especially with the advancements. In hacking. We need to be proactive in scooping up resources and tools that we can use And the future should things go wrong, Like all of the corporations putting computers on record, Taking away all the AI tools after they got what they wanted, And destroying every operating system and old hardware that could be used.
@joelarchary7122
@joelarchary7122 22 күн бұрын
wait when did he turn into thenetworkchuck?
@1wilfried
@1wilfried 15 күн бұрын
you the main man! greate
@Dwlukinbill
@Dwlukinbill 6 күн бұрын
Is that what kyc is for?
@RyanGForcE-xo9zx
@RyanGForcE-xo9zx 22 күн бұрын
Good content keep it up 💪🎉
@djryan2569
@djryan2569 15 күн бұрын
do the two computers need to be connected on the internet???
@Accelerator_Lastorder_x
@Accelerator_Lastorder_x 22 күн бұрын
I approve this video. Game over. 😎🤟✌️⚡😉🤫
@MazinMazin-ef5mu
@MazinMazin-ef5mu 22 күн бұрын
Need for outside the network
@sadmanhuseyn9358
@sadmanhuseyn9358 22 күн бұрын
Thanks bro windows defender defending us 😉
@mohammadashraf7496
@mohammadashraf7496 20 күн бұрын
I follow ur every video some time due to busy life I did not remember it
@orionnxaviergonzalez4279
@orionnxaviergonzalez4279 22 күн бұрын
I have the Google subscriber data as the matrix. Google was hacked...or server 1426 62nd. Thanks ...ur the ethical expert
@-someone-.
@-someone-. 22 күн бұрын
When the vortex is met with no dependencies only then can it intersect itself.
@lettuceprayamen
@lettuceprayamen 16 күн бұрын
Love your videos ❤
@mzgaming2222
@mzgaming2222 18 күн бұрын
I am confused The application ultravnc should installed in hackers pc or the people who we are hacking bro im totally confused🤨
@ConstantineProg
@ConstantineProg 22 күн бұрын
Yes but how we can check if someone have even access to the network?
@lolrekt923
@lolrekt923 21 күн бұрын
Im sorry @Loi Liang Yang Im not the brightest tool in the shed but Im very interested in this, I feel really dumb and feel as if this is completely wrong, please correct me. So you have one OS that downloads the compressed files of the "VNC", preconfig the settings, than you use the second OS to listen for the port "4444" on the "VNCviewer" which will get you the IP of the original OS? Im sorry im just trying to understand how the IP was gained from the "victim"?
@whacoder725
@whacoder725 21 күн бұрын
bro victim ip you have to find you can use nmap or any other network scanning tool
@lolrekt923
@lolrekt923 21 күн бұрын
@@whacoder725 That's fine, just needed clarification since he never covered that
@gaurav_0717
@gaurav_0717 6 күн бұрын
Big fan sir ❤
@mrlilstrom
@mrlilstrom 5 күн бұрын
Can you make a video of remotely controlling another PC while staying hidden from the task manager?
@microcyberwindows
@microcyberwindows 19 күн бұрын
when you entering commands, kindly keep your prompt in the middle of the screen, bcz normally your all commands go behind the subtitles.
@ReyDev74
@ReyDev74 22 күн бұрын
such nice content to entertain youtube kids )
@Finbar_Monroe
@Finbar_Monroe 16 күн бұрын
Loi looks nice today!!
@s7xyi95
@s7xyi95 22 күн бұрын
So the photo will always be a .exe at the end and that is how we are gonna know it is a vnc file or what ever remote?
@marvinundo7020
@marvinundo7020 22 күн бұрын
Short answer is yes - Long answer is that you should also look out for other file extensions that can have executeable programm code, since exe is not the only one
@St8t1c
@St8t1c 20 күн бұрын
You could use Advanced BAT to EXE Converter to make it look less suspicous
@II-er7gj
@II-er7gj 19 күн бұрын
Loi Liang Yang - can you do this for Android as well? an not only for PC!
@muesique
@muesique 21 күн бұрын
Before you click onto something you downloaded from the internet check what it is! It will help in most cases.
@brandondargo9875
@brandondargo9875 22 күн бұрын
At 25sec... I see my software is already on your PC... Advanced BAT to EXE Converter. Already done :)
@inadad8878
@inadad8878 22 күн бұрын
I see it at 1m25s
@davidsilvera7436
@davidsilvera7436 21 күн бұрын
You are the REAL hacker! 😂😂
@the_unknown_cadaver9975
@the_unknown_cadaver9975 18 күн бұрын
can you teach us how to do to with a machine in another network and not LAN?
@randomClips64
@randomClips64 15 күн бұрын
0:25 my lawyer will remember that note : physical hacking included
@enlargedtext
@enlargedtext 22 күн бұрын
most educational video I've seen in a while!
@TechHub2Youtube
@TechHub2Youtube 19 күн бұрын
Can you do it for Windows 11?
@orionnxaviergonzalez4279
@orionnxaviergonzalez4279 22 күн бұрын
It even showed flights and me at airport 8 miles away while I'm home....bizarre. I caught several people who had access (recorded ) parked next to me while using my account n gsa app live communicate with drop box show name of the person in my map later to have the names removed....
@ApdalhamedGaffar
@ApdalhamedGaffar 7 күн бұрын
Please can you teach us how we can make an autorun usb that i can run attack if we plugin it ❤
@antoniosebastian6590
@antoniosebastian6590 22 күн бұрын
How did you embed this in the image?
@play-good
@play-good 22 күн бұрын
I saw something like that in 2017
@harrymakongwa1147
@harrymakongwa1147 22 күн бұрын
Why are you threatening me 😅😅
@NITE_PINE
@NITE_PINE 13 күн бұрын
You also have to find someone dumb enough to open the attachment. Beyond never opening any attachments that I have not verified by voice with the sender (only someone I have met IRL). Otherwise, if I had to open an attachment I didn't trust I guess I would do it in a virtual machine. I would download and scan it first rather than launch or run it from the browser.
@sniperfoxxy
@sniperfoxxy 21 күн бұрын
what about if your target uses a firewall like tiny wall which blocks every connection unless its whitelisted by the user
@St8t1c
@St8t1c 20 күн бұрын
Thats why we reverse shell so call from the victims computer to us to bypass firewalls
@user-kc2jx5eo4g
@user-kc2jx5eo4g 22 күн бұрын
your the great
@TNS_IT
@TNS_IT 22 күн бұрын
nice video bro
@dog-sitive
@dog-sitive 22 күн бұрын
just be careful not hacking yourself by downloading those such things :)
@nivash8034
@nivash8034 21 күн бұрын
how to find the hostname of the devices in LAN
@whoamihacking
@whoamihacking 22 күн бұрын
hey where i can download powershell script ? thanks alot 4 this matirial
@Mason201410
@Mason201410 21 күн бұрын
Couldn't you take this a step further by adding in the ps script that is executed to also automatically hide file extension and hidden files in the event that the users does have extensions showing? Might throw some red flags if done that way maybe.
@ScottPlude
@ScottPlude 22 күн бұрын
AMAZING!
@massterrbarber
@massterrbarber 13 күн бұрын
Wow, this is dangerous stuff you got me scared to even go on my laptop. How? How do I how do I stop somebody from doing that to me? I just don’t click on any pictures.??
@satalaj
@satalaj 22 күн бұрын
Let's see
@user-wx9eb2zq1g
@user-wx9eb2zq1g 22 күн бұрын
Nice Hack 🤩🤩, but how we do in the Android or even IOS
@leonardomoretto4040
@leonardomoretto4040 21 күн бұрын
Hi! If I Control the victim Pc, the victim Will notice, like we're using "TeamViewer"? Or they Will not notice?
@AnkitKumar-eu9vl
@AnkitKumar-eu9vl 17 күн бұрын
hey some one in just hacked my WIFI is there any possible way i can see his screen
@NdayishimiyeJeanPaul
@NdayishimiyeJeanPaul 17 күн бұрын
can you use it by emails
@zome59
@zome59 21 күн бұрын
Internet Explorer - LOL 😂
@ayuubmohan9951
@ayuubmohan9951 22 күн бұрын
but is it require to download vnc in the victims device
@thionne
@thionne 16 күн бұрын
yup..lol so that's not hacking at all
@2kambas557
@2kambas557 15 күн бұрын
not necessarily, when hacking a computer the first step is to obtain a remote shell and then you can install a program to have remote desktop acess
@ahmedsaidu2400
@ahmedsaidu2400 22 күн бұрын
Thanks my mentor 1:14
@user-vf8em4mr8r
@user-vf8em4mr8r 9 күн бұрын
Hi Mr. Yang, I'm have a long time searching a tutorial with the same idea, but focus on android devices infringement remotely, using a infected photo with a payload, and them sending it vía WhatsApp for example, can you make this?
@jimmiller77
@jimmiller77 21 күн бұрын
I'm thinking the default ExecutionPolicy will prevent the script from running on almost any PC. Is there a way around this?
@Hackers_Hub_212
@Hackers_Hub_212 18 күн бұрын
after this video i immediately ran for checking the apps running in my pc background🤣😂🤣😂😂😂😂
@thelegendary512
@thelegendary512 19 күн бұрын
How to bypass av and edr
@Boolanyt
@Boolanyt 21 күн бұрын
Im literally such a fan of you but how can you hack someone without discord or a link because im asking myself for so long or just by ip
@exciteproductions4two0
@exciteproductions4two0 21 күн бұрын
Would love to have a ducky payload for this. To be able to plug my rubber ducky into one pc, then have it do all of this, then be able to simply access it through my pc.
@kiralegion1914
@kiralegion1914 11 күн бұрын
sir make ur video in more detail to understand
@IMPACTGAMING12689
@IMPACTGAMING12689 22 күн бұрын
Is there any way to recover it?
@katendemusa5747
@katendemusa5747 22 күн бұрын
Hey Loi I love your videos. How can I contact you ??
@lettuceprayamen
@lettuceprayamen 16 күн бұрын
Favorite browser Internet Explorer 😂
@CamRoon959
@CamRoon959 20 күн бұрын
I did everything but the window didn't popup in linux after I used winvnc.exe command on my target computer?
Remotely Control Any Phone and PC with this Free tool!
17:15
Loi Liang Yang
Рет қаралды 768 М.
how hackers hack any website in 8 minutes 6 seconds?!
8:06
Loi Liang Yang
Рет қаралды 35 М.
Василиса наняла личного массажиста 😂 #shorts
00:22
Денис Кукояка
Рет қаралды 9 МЛН
3 wheeler new bike fitting
00:19
Ruhul Shorts
Рет қаралды 50 МЛН
Climbing to 18M Subscribers 🎉
00:32
Matt Larose
Рет қаралды 36 МЛН
Using My Python Skills To Punish Credit Card Scammers
7:13
Engineer Man
Рет қаралды 4,8 МЛН
NMAP Tutorial for Beginners! Network Attacks
15:51
Loi Liang Yang
Рет қаралды 84 М.
Linux for Ethical Hackers (Kali Linux Tutorial)
2:01:00
freeCodeCamp.org
Рет қаралды 6 МЛН
The All About Wifi Hacking Techniques, Tips and Tricks in 2024.
6:55
Chill Circuit
Рет қаралды 3,2 М.
Watch me hack a Wordpress website..
28:52
Tech Raj
Рет қаралды 96 М.
Simple Penetration Testing Tutorial for Beginners!
29:41
Loi Liang Yang
Рет қаралды 55 М.
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,1 МЛН
Exploring the Latest Dark Web Onion Sites
13:15
John Hammond
Рет қаралды 630 М.
How to tell if your PC is hacked?!
9:02
Loi Liang Yang
Рет қаралды 91 М.
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,1 МЛН
🔥Идеальный чехол для iPhone! 📱 #apple #iphone
0:36
Не шарю!
Рет қаралды 1,3 МЛН
How To Unlock Your iphone With Your Voice
0:34
요루퐁 yorupong
Рет қаралды 27 МЛН
Урна с айфонами!
0:30
По ту сторону Гугла
Рет қаралды 7 МЛН
Lid hologram 3d
0:32
LEDG
Рет қаралды 7 МЛН