Remotely Control Any PC with an image?!

  Рет қаралды 181,484

Loi Liang Yang

Loi Liang Yang

Күн бұрын

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/...
Full Web Ethical Hacking Course: www.udemy.com/...
Full Mobile Hacking Course: www.udemy.com/...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangya...
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Пікірлер: 482
@Eazy_Bruh
@Eazy_Bruh 5 ай бұрын
Your videos are like magic…. I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video. The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane
@LZnaxyl
@LZnaxyl 5 ай бұрын
sounds like a skid
@Eazy_Bruh
@Eazy_Bruh 5 ай бұрын
@@LZnaxyl bruh what? You smell like a skid.
@ropenphilanigqwaru7560
@ropenphilanigqwaru7560 5 ай бұрын
What video broe, share a link am interested
@dineshjiyoutube
@dineshjiyoutube 5 ай бұрын
I need the the codes for this
@shmmh
@shmmh 5 ай бұрын
Am I tripping. I thought this was a NetworkChuck video minus the coffee breaks
@chrismachabee3128
@chrismachabee3128 4 ай бұрын
Network chuck's got a different haircut.
@dipakmalode8237
@dipakmalode8237 29 күн бұрын
Awesome work, Dale valsko ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!
@jesperjensen293
@jesperjensen293 5 ай бұрын
You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.
@goruluk88
@goruluk88 5 ай бұрын
what would be the tell tale sign that your PC has been infected because you don't realised that you accidently click an email that look so legitimate? will resetting my PC to factory setting will clean my PC from this infection?
@kundasemkundatam7461
@kundasemkundatam7461 5 ай бұрын
I can imagine young inexperienced teenager pirating "pre-installed" games in zip. Extracting it from context menu to "here" can do its job if our little pirate then opens the "jpg". Even worse it can be packed to self-extracting rar and this "jpg" can be set to start after extraction.
@mjmares
@mjmares 5 ай бұрын
@@goruluk88 stop all proccess and close out of everything, look in task manager and find anything that does not look like it shoudl be there and trace it back to file location and delete :) also look in the win startup dir
@zer0k4ge
@zer0k4ge 5 ай бұрын
zip file and RLO characters to make it end with jpg or png, problem solved
@saikatbiswas573
@saikatbiswas573 5 ай бұрын
It could be sent as a zip file.
@Alex_prave
@Alex_prave 5 ай бұрын
Sends a pic to someone , They : why this pic is .exe???
@rajesh_shrestha
@rajesh_shrestha 5 ай бұрын
only if they know the difference between exe and jpg :D
@winsucker7755
@winsucker7755 5 ай бұрын
"It's EXtremely Entertaining"
@user-zt3hq3pi5l
@user-zt3hq3pi5l 5 ай бұрын
Change the first binary/hexagonal designation
@zer0k4ge
@zer0k4ge 5 ай бұрын
You can use an RLO character. So first it will be saved as "picturegnp.exe" then you out an right to left override to make it pictureexe.png or change it to an rcs file so it is a little less obvious so "picturercs.png"
@saikatbiswas573
@saikatbiswas573 5 ай бұрын
That file could be named " annual companyindexe.pdf".its called extension spoof..this is a well known technic,so don't laugh with ur little knowledge.
@mmkgamingchannel9918
@mmkgamingchannel9918 29 күн бұрын
Metaspyclub is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work !!
@wahomemutahi1008
@wahomemutahi1008 5 ай бұрын
so you start the video by threatening me huh?🤣🤣🤣🤣
@usr808
@usr808 5 ай бұрын
I literally watch his videos just for the intro😂
@LoiLiangYang
@LoiLiangYang 5 ай бұрын
Yes
@GamerBePlayin
@GamerBePlayin 5 ай бұрын
​@@LoiLiangYangExactly now do it
@Blossom_Iwunna
@Blossom_Iwunna 5 ай бұрын
​@@usr808yeah me too 😂
@Es7z-x7r
@Es7z-x7r 5 ай бұрын
@@LoiLiangYang The always ask your mother before hacking and the laugh got me
@djleodecond
@djleodecond 5 ай бұрын
man, that only works on the local network and certainly the firewall will block or notify the exposing ports
@nirvaangoel8172
@nirvaangoel8172 Ай бұрын
Is that true?
@djleodecond
@djleodecond Ай бұрын
@@nirvaangoel8172 yes
@Styrofoamiskindabad
@Styrofoamiskindabad 13 күн бұрын
I don't know about this since the victim is actively listening on port 4444 to receive connections, so how can firewall block the connection from the port when the client is actively listening on the port?
@RinkuRinku-pb1qp
@RinkuRinku-pb1qp 29 күн бұрын
There is no doubt that you will rise fast at the apex of your career Perry Moskva . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
@lammabing6401
@lammabing6401 5 ай бұрын
I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff
@Krullfath
@Krullfath 5 ай бұрын
3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?
@solexisdelexis4616
@solexisdelexis4616 5 ай бұрын
Please can you do a course on Linux and windows from the terminal
@MarkGakobo
@MarkGakobo Ай бұрын
an easy was is to use RAT (remote access tool).although UltraVNC can be used for this there are some better RATs which are hacker base and can perform better like njRAT,DarkComet.
@AutomotiveWorld-k2q
@AutomotiveWorld-k2q 2 ай бұрын
😅.really u r very smart n intelligence 😅 bcz im following u already 3.5 years done 😅😊
@cantbeserious9802
@cantbeserious9802 2 ай бұрын
How can anyone learn when you’re teaching so quick without thorough instructions for people to pick up on?
@uglefisken
@uglefisken Ай бұрын
Wow excellent explanation.... Thank you Sir for bringing so much effort and time to make people like us safe and we can feel comfort and breeze when surfing as it is or was supposed to be... And at the same time understand and comply with the issues that are out there so we have the possibility to actually do something with it and be a part of the solution.. Excelllent.. Thank you Sir again, for your hard time and efforts to making us SECURE and Safe....!!! People like him are so important theese days... Its just amasing....You got yourself a Subber indeed....!
@OoxGuru
@OoxGuru 5 ай бұрын
Your videos are much better than it was a few year ago where you wouldn't look at the camera , well done for the constant improvement
@2kambas557
@2kambas557 5 ай бұрын
For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.
@freinerdaviddazaalvarado3644
@freinerdaviddazaalvarado3644 5 ай бұрын
Any video you recommend?
@ItzXenom
@ItzXenom 3 ай бұрын
Any vídeos on that?
@LifeLevelUp-dbr
@LifeLevelUp-dbr 4 күн бұрын
Bro please any video or way you can explain this more
@Neekamhakane
@Neekamhakane 5 ай бұрын
Your video is like a mini-masterclass. So valuable!
@PhamHuy-j4e
@PhamHuy-j4e 5 ай бұрын
if you know tech enough, you know this is for kids only, lol.
@johnmyers3233
@johnmyers3233 5 ай бұрын
I personally like to see the extensions on the file names, Likely. This wouldn't catch me off guard unless I was flipping through my images. I bet there are better ways of doing this That are coming to light and we need to protect ourselves. I personally do not like Leaving my internet connected. I also do not store important important information like taxes on an online computer. I think there might be a rule that can be made in order to prevent this from ever happening. I'm not sure how you are remotely connecting, but most of my remote services are restricted or off. I'm not sure if there is actually radio frequency on my motherboard, but it is another setting that you have to disable regardless of your motherboard, not having Bluetooth and Wi-Fi. I'm finding it very difficult to find motherboards that are safe from the outside world, especially with the advancements. In hacking. We need to be proactive in scooping up resources and tools that we can use And the future should things go wrong, Like all of the corporations putting computers on record, Taking away all the AI tools after they got what they wanted, And destroying every operating system and old hardware that could be used.
@satalaj
@satalaj 5 ай бұрын
20 years ago I used 007 spyware for fun it's idea was very similar to create a image and deploy
@Dongdang-fc2mb
@Dongdang-fc2mb 5 ай бұрын
Good video and interesting subject. Would you be able to tell us how to check for this possible attack aka ‘photo installed’ and how to remove it from your pc or Mac? Thank you,
@wasimafzali6651
@wasimafzali6651 5 ай бұрын
Hey ❤ Could you make a video for beginners where and how to start computer science, programming and other things
@muesique
@muesique 5 ай бұрын
Before you click onto something you downloaded from the internet check what it is! It will help in most cases.
@brandondargo9875
@brandondargo9875 5 ай бұрын
At 25sec... I see my software is already on your PC... Advanced BAT to EXE Converter. Already done :)
@inadad8878
@inadad8878 5 ай бұрын
I see it at 1m25s
@davidsilvera7436
@davidsilvera7436 5 ай бұрын
You are the REAL hacker! 😂😂
@ANONYMOUS-PK313
@ANONYMOUS-PK313 5 ай бұрын
I love your intro attitude ❤😊
@usr808
@usr808 5 ай бұрын
I'm gonna try this on my boss. Thanks Loi😊
@space_penguin3593
@space_penguin3593 4 ай бұрын
Do both computers have to have it installed??
@II-er7gj
@II-er7gj 5 ай бұрын
Loi Liang Yang - can you do this for Android as well? an not only for PC!
@nettlex
@nettlex 5 ай бұрын
the thing is, mail services show extensions by default.
@microcyberwindows
@microcyberwindows 5 ай бұрын
when you entering commands, kindly keep your prompt in the middle of the screen, bcz normally your all commands go behind the subtitles.
@DaComputerSage
@DaComputerSage 5 ай бұрын
do the two computers need to be connected on the internet???
@gamer2.493
@gamer2.493 3 ай бұрын
Please can you teach the best app for phishing and how to use it
@user-ev2ct8ug1m
@user-ev2ct8ug1m 5 ай бұрын
that face from 12:24 till 12:27 was priceless 🤣🤣
@everfreeeeee
@everfreeeeee 5 ай бұрын
the vnc can connect over the WAN without know the target machine WAN ip or port forwarding at target machine router ??
@bot3d
@bot3d 5 ай бұрын
Viewer Think: Exploit Code inside an Image Reality: Powershell download an Image
@jesperjensen293
@jesperjensen293 4 ай бұрын
Does this not require a port forward at the target? most people are behind a router. or it dont matter as it's "calling" the attacker, where naturally port 4444 needs to be forwarded?
@mrlilstrom
@mrlilstrom 5 ай бұрын
Can you make a video of remotely controlling another PC while staying hidden from the task manager?
@CEFASOCACEDEMY-mz6zk
@CEFASOCACEDEMY-mz6zk 5 ай бұрын
I have been following for a while now and i can testify it is awesome
@orionnxaviergonzalez4279
@orionnxaviergonzalez4279 5 ай бұрын
I have the Google subscriber data as the matrix. Google was hacked...or server 1426 62nd. Thanks ...ur the ethical expert
@-someone-.
@-someone-. 5 ай бұрын
When the vortex is met with no dependencies only then can it intersect itself.
@adamtns
@adamtns 3 ай бұрын
does this also work with mobile phones?
@yeshua_n13-8aij8
@yeshua_n13-8aij8 5 ай бұрын
Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.
@benjaminamofa5043
@benjaminamofa5043 4 ай бұрын
Where did the powershell script, the one we need to polish come from?
@__shivansh__nigam7755
@__shivansh__nigam7755 4 ай бұрын
trying to do the thing but : getting error like :: 'x64' is not recognized as an internal or external command, operable program or batch file. same for x86.
@archygonzalez3086
@archygonzalez3086 5 ай бұрын
Amazing and simple explanation, hope this content increases awareness ❤
@mubarakkhalid7099
@mubarakkhalid7099 Ай бұрын
Good day sir. I need your help with something. How can someone hack a laptop using Kali linux Without coming in contact with the laptop you want to hack? What if you are connected to the same WiFi network?
@computersandkeyboards
@computersandkeyboards 5 ай бұрын
Congrats on 1 mil!
@s7xyi
@s7xyi 5 ай бұрын
So the photo will always be a .exe at the end and that is how we are gonna know it is a vnc file or what ever remote?
@marvinundo7020
@marvinundo7020 5 ай бұрын
Short answer is yes - Long answer is that you should also look out for other file extensions that can have executeable programm code, since exe is not the only one
@St8t1c
@St8t1c 5 ай бұрын
You could use Advanced BAT to EXE Converter to make it look less suspicous
@jermainreed9653
@jermainreed9653 5 ай бұрын
😂😂😂 I will help you find your password free of charge 😂😂
@KentechSolution
@KentechSolution 5 ай бұрын
😂😂😂😂
@Antony-cg3tf
@Antony-cg3tf 4 ай бұрын
😂😂😂😂😂😂
@DrJay_PhD
@DrJay_PhD 4 ай бұрын
so basically, you need to already have access to the target machine to open the ports and point to the hacker machine? so... when does the actual hacking start?
@Mason201410
@Mason201410 5 ай бұрын
Couldn't you take this a step further by adding in the ps script that is executed to also automatically hide file extension and hidden files in the event that the users does have extensions showing? Might throw some red flags if done that way maybe.
@kerryfreudenthaler2986
@kerryfreudenthaler2986 4 ай бұрын
How come ever remote-control video we have to use the Tarkets machine to download something or run some code is there any way possible to just hack into it?
@mussaabdi
@mussaabdi 5 ай бұрын
@loi would you do the same but with port forwarding
@Dwlukinbill
@Dwlukinbill 5 ай бұрын
Is that what kyc is for?
@lil_rill
@lil_rill 21 күн бұрын
Please can we get a video tutorial on how to remotely control an apple ios iphone, either a RAT or through a terminal, or if you can get us the Pegasus spyware
@randomClips64
@randomClips64 5 ай бұрын
0:25 my lawyer will remember that note : physical hacking included
@CodeToad_
@CodeToad_ Ай бұрын
Wait do they need to install the program too?
@paritoshbhatt
@paritoshbhatt 5 ай бұрын
Great Explanation Man !
@leonardomoretto4040
@leonardomoretto4040 5 ай бұрын
Hi! If I Control the victim Pc, the victim Will notice, like we're using "TeamViewer"? Or they Will not notice?
@ElTinTin90
@ElTinTin90 5 ай бұрын
Hi Mr. Yang, I'm have a long time searching a tutorial with the same idea, but focus on android devices infringement remotely, using a infected photo with a payload, and them sending it vía WhatsApp for example, can you make this?
@Finbar_Monroe
@Finbar_Monroe 5 ай бұрын
Loi looks nice today!!
@mr.haristotle
@mr.haristotle 5 ай бұрын
can you teach us how to do to with a machine in another network and not LAN?
@enlargedtext
@enlargedtext 5 ай бұрын
most educational video I've seen in a while!
@tm02019
@tm02019 5 ай бұрын
how can you hide ".exe" of this file when attach to email or send file via Instant message? Does google drive scan this file and found som "like virus posoning code" and alarm?
@LoneDarkWarrior013
@LoneDarkWarrior013 4 ай бұрын
decode and zip it
@tm02019
@tm02019 4 ай бұрын
@@LoneDarkWarrior013 I don't think AV engines of cloud services can not scan compressed files.
@LoneDarkWarrior013
@LoneDarkWarrior013 4 ай бұрын
@@tm02019 encoded and zip is to protect the extension of the exe file that you convert to jpg file. its really make your trojan file as jpg file, but when victim open the file, they fuccked up
@ApdalhamedGaffar
@ApdalhamedGaffar 5 ай бұрын
Please can you teach us how we can make an autorun usb that i can run attack if we plugin it ❤
@suhaibnadir
@suhaibnadir 5 ай бұрын
You are genius loi 😊
@pythonpractical
@pythonpractical Ай бұрын
Does it work over itnernet?. how it rcognize the local IP if it is from internet?.. can someone explain it.
@TechHub2Youtube
@TechHub2Youtube 5 ай бұрын
Can you do it for Windows 11?
@joelarchary7122
@joelarchary7122 5 ай бұрын
wait when did he turn into thenetworkchuck?
@autolover10000
@autolover10000 3 ай бұрын
just a quick question ., when i have doje all that wiol i be able to control the other pc? and does it worl with phones?
@mzgaming2222
@mzgaming2222 5 ай бұрын
I am confused The application ultravnc should installed in hackers pc or the people who we are hacking bro im totally confused🤨
@riajtech1699
@riajtech1699 4 ай бұрын
in the victims pc
@nirvaangoel8172
@nirvaangoel8172 Ай бұрын
If I close the image jpg window, will I still have access on my linux to the screen and stuff?
@BrodarkrobotBrookDarline
@BrodarkrobotBrookDarline 2 ай бұрын
Loi Master, My main issue is this : the delivery method. the antivirus are shouting laudly that there is virus. can you make it more real world senario bypassing the gmail antivirus scan, etc ... ? thanks
@lolrekt923
@lolrekt923 5 ай бұрын
Im sorry @Loi Liang Yang Im not the brightest tool in the shed but Im very interested in this, I feel really dumb and feel as if this is completely wrong, please correct me. So you have one OS that downloads the compressed files of the "VNC", preconfig the settings, than you use the second OS to listen for the port "4444" on the "VNCviewer" which will get you the IP of the original OS? Im sorry im just trying to understand how the IP was gained from the "victim"?
@whacoder725
@whacoder725 5 ай бұрын
bro victim ip you have to find you can use nmap or any other network scanning tool
@lolrekt923
@lolrekt923 5 ай бұрын
@@whacoder725 That's fine, just needed clarification since he never covered that
@Styrofoamiskindabad
@Styrofoamiskindabad 13 күн бұрын
​@whacoder725 bro this is a bit advanced he won't understand this and it's not related to this video
@attheplay
@attheplay 3 ай бұрын
What kind of people say Thank You for recevied the message " You have been hacked " lol 😂😂😂
@otymo4904
@otymo4904 4 сағат бұрын
I want to, but without going to the victims machine....do i have to run cmd on the victims machine?
@ConstantineProg
@ConstantineProg 5 ай бұрын
Yes but how we can check if someone have even access to the network?
@AnkitKumar-eu9vl
@AnkitKumar-eu9vl 5 ай бұрын
hey some one in just hacked my WIFI is there any possible way i can see his screen
@crashtheimf
@crashtheimf 4 ай бұрын
Love this guy
@XXXX-zf8fl
@XXXX-zf8fl 11 сағат бұрын
My friend got a virus on his pc and I cant go to his house to fix it , and he is not that smart to understand what im telling him, thanks for this tutorial😂❤
@IMPACTGAMING12689
@IMPACTGAMING12689 5 ай бұрын
Is there any way to recover it?
@ayuubmohan9951
@ayuubmohan9951 5 ай бұрын
but is it require to download vnc in the victims device
@thionne
@thionne 5 ай бұрын
yup..lol so that's not hacking at all
@2kambas557
@2kambas557 5 ай бұрын
not necessarily, when hacking a computer the first step is to obtain a remote shell and then you can install a program to have remote desktop acess
@excessive_gamer
@excessive_gamer 3 ай бұрын
is there any way to copy the code for 9:08
@riajtech1699
@riajtech1699 4 ай бұрын
what happens when the victim shutdown or restart the system will the connection be established or we have to do the process again
@nikhildang6983
@nikhildang6983 2 ай бұрын
why use the x86 version of winvnc?
@sniperfoxxy
@sniperfoxxy 5 ай бұрын
what about if your target uses a firewall like tiny wall which blocks every connection unless its whitelisted by the user
@St8t1c
@St8t1c 5 ай бұрын
Thats why we reverse shell so call from the victims computer to us to bypass firewalls
@paddymcgrath605
@paddymcgrath605 4 ай бұрын
Ncat
@NdayishimiyeJeanPaul
@NdayishimiyeJeanPaul 5 ай бұрын
can you use it by emails
@Ankit_zero
@Ankit_zero 5 ай бұрын
Can i use it to control an Android phone 📱????
@MojtabaSultani
@MojtabaSultani 5 ай бұрын
Thanks so much, your great sir
@leblebit0zu9435
@leblebit0zu9435 5 ай бұрын
do u post videos somewhere other than youtube, i dont think youtube will let u show real hacking tbh.
@patcileinify
@patcileinify 5 ай бұрын
?🙏
@ElinaJefrita
@ElinaJefrita 5 күн бұрын
LAN NETWORK only??
@3v1lm4nipul4t0r
@3v1lm4nipul4t0r 5 ай бұрын
Am using Linux what should i do
@michaljansky7270
@michaljansky7270 5 ай бұрын
how did you installl i got this eroor Error 0x80004005
@mohammadashraf7496
@mohammadashraf7496 5 ай бұрын
I follow ur every video some time due to busy life I did not remember it
@ReyDev74
@ReyDev74 5 ай бұрын
such nice content to entertain youtube kids )
@orionnxaviergonzalez4279
@orionnxaviergonzalez4279 5 ай бұрын
It even showed flights and me at airport 8 miles away while I'm home....bizarre. I caught several people who had access (recorded ) parked next to me while using my account n gsa app live communicate with drop box show name of the person in my map later to have the names removed....
@ahmedsaidu2400
@ahmedsaidu2400 5 ай бұрын
Thanks my mentor 1:14
@whoamihacking
@whoamihacking 5 ай бұрын
hey where i can download powershell script ? thanks alot 4 this matirial
@jimmiller77
@jimmiller77 5 ай бұрын
I'm thinking the default ExecutionPolicy will prevent the script from running on almost any PC. Is there a way around this?
@Nan-bara
@Nan-bara 5 ай бұрын
How do you get back a gmail account thats already been hacked and had the password changed?
@patcileinify
@patcileinify 5 ай бұрын
Feel it
@antoniosebastian6590
@antoniosebastian6590 5 ай бұрын
How did you embed this in the image?
Remotely Control Windows Through Discord Over The Internet
18:34
HELP!!!
00:46
Natan por Aí
Рет қаралды 76 МЛН
Из какого города смотришь? 😃
00:34
МЯТНАЯ ФАНТА
Рет қаралды 2,4 МЛН
They Chose Kindness Over Abuse in Their Team #shorts
00:20
I migliori trucchetti di Fabiosa
Рет қаралды 12 МЛН
FOREVER BUNNY
00:14
Natan por Aí
Рет қаралды 23 МЛН
NMAP Tutorial for Beginners! Network Attacks
15:51
Loi Liang Yang
Рет қаралды 118 М.
FREE Yungeen Ace Type Beat - "Just A Memory"
2:51
NickTmu III
Рет қаралды 8
How Hackers Hack CCTV Cameras
15:00
zSecurity
Рет қаралды 896 М.
Remotely Control Any PCs with this FREE software!
10:28
Loi Liang Yang
Рет қаралды 37 М.
Simple Penetration Testing Tutorial for Beginners!
13:08
Loi Liang Yang
Рет қаралды 51 М.
SHODAN Explained! (It's Scary Easy to do) | Let's Hack
7:58
Let's Hack
Рет қаралды 481 М.
60 Hacking Commands You NEED to Know
27:01
NetworkChuck
Рет қаралды 504 М.
Remotely Control PCs with Reverse Shells!? Easy hacker tool
9:56
Loi Liang Yang
Рет қаралды 60 М.
HELP!!!
00:46
Natan por Aí
Рет қаралды 76 МЛН