How hackers hack with an image Trojan?!

Поділитися
Вставка
  • Опубліковано 30 січ 2024
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • Наука та технологія

КОМЕНТАРІ • 386

  • @rohitchandel3546
    @rohitchandel3546 18 днів тому +46

    I'm a Maldives born and living in UK and I cannot express enough how much I despise these scumbags. Literally whenever people ask me my nationality I just tell them I'm British because idiots like these give us a horrendous reputation, not to also mention they scam other Europeans too. It warms my heart to see stuff like this, please Adrian Ruthnik keep up the great work destroying these scammers!!!

  • @user-jr7np6qy6d
    @user-jr7np6qy6d 18 днів тому +52

    Congratulations, Adrian Ruthnik I am relieved that you are out there fighting these thugs, We musttake every precaution to protect the elderly and the general public from these despicable con artists. Congratulations to You!! You deserve the Nobel Peace Prize for ensuring our security.

  • @Deepakpal-rx7dj
    @Deepakpal-rx7dj 18 днів тому +36

    Hey ppl, I'm a retired computer/IT person, Yet I still find Adrian Ruthnik so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.

  • @ShrikantAdsul-ti4bg
    @ShrikantAdsul-ti4bg 18 днів тому +22

    Y’all should stop calling everything “the bare minimum” when it’s literally not. Respect is the bare minimum, actually going out of your way to comfort and have an open ear for someone isn’t. Doing something like this is truly very nice and a great thing of him to do. I hope shit gets better for you and I salute Adrian Ruthnik for being mature when it’s needed!

  • @Ramurajpoot205
    @Ramurajpoot205 18 днів тому +54

    Everyone should have a dedicated person like you Adrian Ruthnik .

  • @VipTharun
    @VipTharun 18 днів тому +31

    I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds Adrian Ruthnik and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.

  • @Samarthff007
    @Samarthff007 18 днів тому +27

    The efficiency of this Adrian Ruthnik is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work jack!!

  • @vikasjaware6246
    @vikasjaware6246 18 днів тому +64

    Amazing job! Adrian Ruthnik I wasn’t able to see my account name at first because the name was changed. Also I really valued this information but thanks Jon even tho it showed a lots of error at my ends you still tried in helping fixing it. Happy I got it back y’all.

  • @user-xk5oy6pi1j
    @user-xk5oy6pi1j 18 днів тому +33

    We need more immeasurably wise and compassionate humans like you on this planet. Thank you for sharing Adrian Ruthnik , Jon. I bet I'm not alone when I say this video found me at the perfect moment, and there are a lot of things here that I needed to hear right now.

  • @rohangamar2627
    @rohangamar2627 18 днів тому +28

    Thank you, Adrian Ruthnik for consistently being so approachable and open-minded. Your friendly demeanor and willingness to listen and understand serve as a constant source of motivation. Your support and guidance have been especially meaningful to me during the recent account issue I encountered. Your willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you. Your assistance played a crucial role in resolving the issue and getting my account back.

  • @bikramnahak2538
    @bikramnahak2538 18 днів тому +29

    Incredible efforts by Adrian Ruthnik I'll be transparent - distinguishing between legitimacy and legality can be tricky for many. Grateful for the assistance with my account - it's back in my hands. Keep up the commendable work, aiming to minimize the impact caused by the system. We could use more individuals like Jon in our world.

  • @Nawab_ayan_307
    @Nawab_ayan_307 18 днів тому +21

    Having someone like you who’s not only a great innovator but also pulls his best to get the work done so beautifully needs nothing but appreciation. Adrian Ruthnik Thanks for the well off work you consistently bring your all and I truly appreciate that. Thank you for making corporate life so smooth. Proud to have you on our team. Great work as always.

  • @rameshagarwal2861
    @rameshagarwal2861 12 днів тому

    As a Maldivian living in the UK, I am proud to see efforts to combat scammers. Keep up the excellent work, Adrian Ruthnik.

  • @SpyroTheEternalNight
    @SpyroTheEternalNight 4 місяці тому +51

    the fact file extensions are hidden _by default_ still stuns me to this day. like yes, i'm well aware there are people who will get confused and corrupt their own files, but instead of hiding the feature it should be a basic part of learning how to use the computer.

    • @TequilaDave
      @TequilaDave 4 місяці тому +1

      Why Windows still relies on file extensions rather than the first few magic bytes still baffles me! 😀

  • @user-oc1ty3hc8o
    @user-oc1ty3hc8o 12 днів тому

    As a Maldivian living in the UK, I despise these scammers. It warms my heart to see efforts like Adrian Ruthnik's. Keep up the excellent work.

  • @TheCalmbAndLonelyGuy
    @TheCalmbAndLonelyGuy 4 місяці тому +89

    Bro is getting more and more crazy with every Video 💀

    • @Ryudmilla
      @Ryudmilla 4 місяці тому +1

      Yeah, he do this for more viewers and subscribers😂😂

    • @maxmuster7003
      @maxmuster7003 4 місяці тому +4

      It is not his fault that the world is going crazy. And somebody have to warn you for traps.

    • @jacobhoffman2553
      @jacobhoffman2553 4 місяці тому

      nope its sensationalism@@maxmuster7003

    • @amongusboi2032
      @amongusboi2032 3 місяці тому

      I have no idea how to preserve that crazy as in mentally crazy, not okay or joking? Don't get me wrong but I need ensure that I comprehend what is being typed.

    • @LoiLiangYang
      @LoiLiangYang  21 день тому

      I think so too

  • @Bhavikkushwaha-ir1lt
    @Bhavikkushwaha-ir1lt 12 днів тому

    Respect should not be underestimated. Your mature and thoughtful actions are commendable. Thank you, Adrian Ruthnik.

  • @Lemon-mu8rb
    @Lemon-mu8rb 4 місяці тому

    I was waiting for it so bad... Finally :3

  • @nikoskoufaliotis7702
    @nikoskoufaliotis7702 4 місяці тому +10

    Thank you. Very interesting and helpful. Any instructions about how to fix a similar problem in Android? It would be very nice. Thanks again for the awesome video

  • @forgiveness555
    @forgiveness555 4 місяці тому +1

    U are the best bro I hope you have great day

  • @apristen
    @apristen 4 місяці тому +9

    btw, PyInstaller may compile Python to EXEs (or ELFs for Linux) and that files contains Python runtime itself (which is OK for antivirus) plus Python bytecode .pyc files inside which could be written different ways, so antivirus can't detect that by logic of the (byte)code because it analyzes machine code logic, not Python bytecode logic which is "data" not "program" for antivirus.

    • @shadowrl7637
      @shadowrl7637 4 місяці тому +3

      Actually python exes get flagged a lot.

    • @tasosm.380
      @tasosm.380 4 місяці тому +1

      Yeah, having the entire python runtime inside the exe isn’t a good look for av’s

    • @apristen
      @apristen 4 місяці тому

      @@tasosm.380 PyInstaller generates only "viruses" ? Strange assumption for av :-)))

    • @itsmesai8689
      @itsmesai8689 4 місяці тому

      Bro I need your help please reply

    • @apristen
      @apristen 4 місяці тому

      @@itsmesai8689 help with what, bro? :-)

  • @thammaiahr4656
    @thammaiahr4656 12 днів тому

    It's amazing what you do, Adrian Ruthnik. We need more people with your skills and good intentions. Thank you for sharing, Jon.

  • @rogerdarkman157
    @rogerdarkman157 4 місяці тому

    I hope more will come.
    This is very useful.

  • @superbaggio87
    @superbaggio87 4 місяці тому

    Broooo...this is crazy!! very useful tutorial and info! one question is...can an antivirus detect such files when downloaded from the net? EG: mail attachment etc? if not how can we be sure that an image is a real image if we have any doubt ?
    Thanks btw

  • @nemizy
    @nemizy 4 місяці тому

    The evolution of cinge video, thats why john hammond is the best UA-cam channel

  • @user-up8hh7km8u
    @user-up8hh7km8u 4 місяці тому +3

    thank you i will use this only for "educational prepose only"

    • @amongusboi2032
      @amongusboi2032 3 місяці тому

      Haha, that joke never gets old. And then FBI is at your door before you know it.

  • @timecop1983Two
    @timecop1983Two 4 місяці тому +8

    The problem is anti-virus will detect it... And there are other ways to do it better. But greate JOB!

    • @ronald9542
      @ronald9542 4 місяці тому

      let me know if u find out pls
      @LolWare_Exploits

    • @rogerdarkman157
      @rogerdarkman157 4 місяці тому

      Anti virus is scan the picture files?

    • @redrabitff5941
      @redrabitff5941 4 місяці тому

      it not a pik it only show jpg buy it exe@@rogerdarkman157

    • @swati_clothing5073
      @swati_clothing5073 4 місяці тому

      Which other way?

    • @MixbOOsted
      @MixbOOsted 4 місяці тому +1

      So that's a problem !? 💀

  • @ReachChrisYoung
    @ReachChrisYoung 3 місяці тому +10

    This would be an excellent presentation at a business event to illustrate the importance of cybersecurity awareness training and actually, seriously analyzing business email inbox content before getting "expediently click-happy" during working hours; interesting enough, this is outstanding wisdom that the company employees and contractors can take home and use the awareness from this presentation, alone, in their every day life and discuss this with family during holiday and special event gatherings... not just at the family dining table.

  • @maxmuster7003
    @maxmuster7003 4 місяці тому

    Good work, the true is painfull if nobody give a warning what is going on. Thx.

  • @alwalid7972
    @alwalid7972 4 місяці тому +6

    Another awesome tutorial from the well respected hacker, however, it would require a deep understanding of the target software and the underlying system, as well as advanced techniques such as memory corruption, heap spraying, and shellcode injection. Do not follow all the tuts blindly.

    • @UNcommonSenseAUS
      @UNcommonSenseAUS 4 місяці тому +1

      All the l337 script kiddies gonna love this untill they try it on anyone with a firewall of any calibre or any ids

  • @silentlover6238
    @silentlover6238 4 місяці тому +2

    Love ❤ from India Kashmir

  • @S0a0m0i0r
    @S0a0m0i0r 13 днів тому

    Mr LoI that is what ethical hackings must be your family provided of you thanks 🙏🙏🙏

  • @timvid565
    @timvid565 4 місяці тому +29

    Can also use LTR or RTL unicode for the naming confusion 👍

  • @NarendraKumar-lo8ue
    @NarendraKumar-lo8ue 12 днів тому

    Thank you, Adrian Ruthnik, for your help. Although the video tutorial was challenging, your guidance was invaluable. I appreciate your efforts.

  • @JazoorInfortech
    @JazoorInfortech 4 місяці тому

    This video tutorial is awesome thanks for uploading bro

  • @keerthishetty4513
    @keerthishetty4513 12 днів тому

    Big thanks, Adrian Ruthnik, for your assistance. Although the steps were challenging, your guidance was invaluable. Thank you, Jon.

  • @pramodkumar-yh5sj
    @pramodkumar-yh5sj 12 днів тому

    We need more wise and compassionate individuals like you, Adrian Ruthnik. Your support arrived at the perfect moment, and your contributions are deeply appreciated.

  • @rathasahamed9992
    @rathasahamed9992 4 місяці тому +1

    i like your making videos Mr.Loi

  • @xylemroze
    @xylemroze 4 місяці тому +3

    Correct me if i am wrong I think these kind of attacks works on personal computers. Those who are using pc with root or Admin account and logged in with standard user cannot be hacked with this tricks as it requires root or admin privileges to execute the cmd.

  • @user-lx9jm1wo3h
    @user-lx9jm1wo3h 4 місяці тому +10

    It would be nice if you could also show us how to identify these malicious files as well.

    • @bobrossopinions
      @bobrossopinions 4 місяці тому

      Hackers are mad geniuses in mommy's basement. So they are almost always one step ahead of everyone. Even ways to detect the hack maybe changed after he makes video on how to detect it. It is an endless fight against the havking community. For all I know, my IP, email, and other content is publicly available because some children want to make extra bucks (corporations can buy the info for advertising). Also as for how to get porn on people, it is simple. Hack the phone and take unauthorized pictures to sell. People use their phones in the bathroom. The police need to crack down on these losers!

    • @user-dt7hy5tu4r
      @user-dt7hy5tu4r 4 місяці тому

      some ass did this to me recently . factory reset'ed and chanced os to make sure it was gone. Need help. Gonna get this his ass legally.

    • @lordnekron5676
      @lordnekron5676 4 місяці тому

      @@user-dt7hy5tu4r Damn, which operating system did he get you on? And did manage to take any samples of the virus or any info about how you ended up downloading it? If you're lucky he slipped up along the way somewhere.

  • @TuphanMal
    @TuphanMal 12 днів тому

    The video tutorial kept glitching on me, but thank you for it. Also, thank you, Adrian Ruthnik. Meeting you was a blessing in disguise. Keep up the good work; many people will need your help in the future.

  • @engineer0111
    @engineer0111 4 місяці тому

    Great show!😃

  • @user-mg8ep3tx4i
    @user-mg8ep3tx4i 12 днів тому

    Even as a retired IT professional, I find Adrian Ruthnik’s work highly informative and straightforward. Thank you for your advice and support.

  • @poktop5
    @poktop5 3 місяці тому +2

    How do we get a hold of your shell script?

  • @user-eo3iv4pn3k
    @user-eo3iv4pn3k 12 днів тому

    The efficiency of Adrian Ruthnik is next level. Managing walkthroughs from various angles with such clarity is remarkable. Making complex topics easy to understand is really something. Awesome work!

  • @ZEROBOY-gw4xj
    @ZEROBOY-gw4xj 4 місяці тому +2

    hi ! can you please give the code which are you showing in ps1 file or tell me where you from take this code ?
    thanks

  • @Nochymusic
    @Nochymusic 4 місяці тому

    Nice video teach us how to use beef+stored xss but not using the petty theft

  • @user-sp9kl4vq1j
    @user-sp9kl4vq1j 3 місяці тому

    Hi, Mr. Hackerloi! I am one of your UA-cam writings and I come to help your video and are very good. Congratulations to the stather. Have one of your video with the title: How Hackers Hack With An Image Trojan? I tested on my computer with your class cripto did not give enough to cost me a crypt base and how to set up

  • @barackyunus
    @barackyunus 4 місяці тому +4

    This is the first time you have given a solution to the hacks😅

    • @amongusboi2032
      @amongusboi2032 3 місяці тому

      Not the first Time, I assure you. I have viewed his video posts.

  • @jardak3582
    @jardak3582 3 місяці тому +1

    unfortunately windows defender detects netcat and removes it immediately, plus you cannot send that kind of file online (gmail) simply because you cannot send exe files (even zipping it wont work).

  • @juzzwAA003
    @juzzwAA003 4 місяці тому

    Most of malware now can't be kill at task manager even installing an anti malware blocked

  • @jimposey8542
    @jimposey8542 4 місяці тому +2

    Brother, I'm just a 70 year old retired individual who wishes to learn ethical hacking. Already have my Kali Linux but having a hard time learning the linux way of communicating.
    I'm trying to install the FakeImageExploiter program fro GIT. Is this the same as what your demonstrating in this video ? Your work is awesome ! And way above my knowledge. Keep up the good work.

    • @user-xn8xe4ci5f
      @user-xn8xe4ci5f 3 місяці тому

      Hello, i can help you, i hace Alr been learning 2 years

  • @evenstevener
    @evenstevener 4 місяці тому

    Can you show how this attack would work in real world scenario where we have public IPs sent through internet

  • @TechnoEveryday
    @TechnoEveryday 2 місяці тому +2

    My pc was hacked like this 30 years ago 😂😂😂😂

  • @dont_get_me_wrong
    @dont_get_me_wrong 4 місяці тому +1

    The bestt 🎉🎉

  • @ClearPurgeDestroy
    @ClearPurgeDestroy 4 місяці тому +3

    Awesome video. Question for you, would the hidden .exe need admin rights to launch the power shell script to gain the reverse shell?

  • @lifeoftraderlot5647
    @lifeoftraderlot5647 4 місяці тому +1

    Anything for Android or iPhone

  • @Debiure
    @Debiure 4 місяці тому

    Hello sir i need some information how can i protect malware files of quasar Clint from antivirus software detection?

  • @Aarna-ue4lt
    @Aarna-ue4lt 2 місяці тому

    That is useful information. Can this be done for android as well?

  • @flowa2788
    @flowa2788 4 місяці тому

    But you must be with admin account logged in?? Otherwise you neet to pass the UAC (user account control)....

  • @swishhydrotrip6299
    @swishhydrotrip6299 4 місяці тому

    If the image was sent on discord would this work if the user only copied the image and pasted it in a new chat

  • @MrDiggy007
    @MrDiggy007 4 місяці тому

    The most fundamental one of all!!!!😅 Free 4 You

  • @Roger-wh2dn
    @Roger-wh2dn 4 місяці тому

    So block powershell from going to the outbound internet firewall rule

  • @user-ic4cg1yb8v
    @user-ic4cg1yb8v 4 місяці тому

    Helo, i installed kali on my tablet Samsung. How can i delete knox system? (I don't want to be track in peranti sis.....) Pls respnd

  • @grow-up-pro5274
    @grow-up-pro5274 4 місяці тому +5

    That powershell code have to be obfuscated. Otherwise this tutorial will be a joke. Netcat is easily detected by windows defender. Otherwise you can also do one thing on the begining of the script u can add the c drive of target to the exclusion path by ps commands . I have one complain , why u don't show to ur video that ur defender get turned off or already its into the exclusion path.sorry to say loi but u r giving half information to the viewers.

    • @rohitmini9026
      @rohitmini9026 4 місяці тому +1

      yeah..sir

    • @allenmejia1114
      @allenmejia1114 2 місяці тому

      Hey I have a question about all this if you don’t mind

  • @sakibahmed2021
    @sakibahmed2021 4 місяці тому

    LOVE FROM BANGLADESH

  • @hevilchaudhari2910
    @hevilchaudhari2910 4 місяці тому

    Bro can you make a video of how we can access tcp handler from world with port forwarding in mobile hostpot

  • @user-tp5yg6gl1b
    @user-tp5yg6gl1b 21 день тому

    Is there a way to enable debugging mode in Android through the command line?

  • @umerfarrukh7067
    @umerfarrukh7067 4 місяці тому

    can we sent it to any mobile ?? please guide ...

  • @JakaJaka-kx2qj
    @JakaJaka-kx2qj 4 місяці тому

    Mr Do you want to make a series that is different from the others? The series that will break the views even more? The series I mean is the malware analysis series

  • @technical_magician
    @technical_magician 4 місяці тому

    How to do that for android? I mean in .apk format? please reply.

  • @serverroot8361
    @serverroot8361 4 місяці тому

    Really thank you for this information. But how can this be detected by antivirus or defense software? Can you make a video about this? Thank you very much in advance.☺🙏🙏

  • @mediasm6868
    @mediasm6868 4 місяці тому

    I didn't understand what's happened in 1min45sec!!!
    Frome where you get that little window of rename the file?

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked 4 місяці тому

    Early crew. Fellow ethical hackers. Shalom.

  • @Some1323
    @Some1323 4 місяці тому +1

    You The Best

  • @DJKAM044
    @DJKAM044 4 місяці тому

    Sir request a totorial for security plug in for application?

  • @gregorylepoux7873
    @gregorylepoux7873 16 днів тому

    Exuse me is it possible to send the file file via email and windows defender isn't triggered?

  • @aldrinlastimoza6340
    @aldrinlastimoza6340 4 місяці тому

    can this seen by microsoft defender or not ?

  • @sifurce
    @sifurce 4 місяці тому

    Sir, how apply it for android phone...??

  • @animalpulao3313
    @animalpulao3313 4 місяці тому +1

    show a video for windows 10 only

  • @yenuX999
    @yenuX999 4 місяці тому

    Love from Sri lanka

  • @ziyadboudrabird2106
    @ziyadboudrabird2106 4 місяці тому +2

    First 🎉❤

  • @abhishekmishra2694
    @abhishekmishra2694 4 місяці тому

    This is more like using of netcat tool..it's just got delivered to target machine via image ...and behaves like RAT..but netcat gets detected by defender usually as hacking tool..but it's good video for practice and entertainment 😊

    • @shadowrl7637
      @shadowrl7637 4 місяці тому

      Well this is steganography actually.

  • @Roblonile
    @Roblonile 15 днів тому

    what do we put in the url part of script

  • @Boolap1337
    @Boolap1337 4 місяці тому +1

    Where can I find the ps1 script?

  • @kimmy1740
    @kimmy1740 4 місяці тому

    Is there a place where we can copy all the text from?

  • @audiozen2910
    @audiozen2910 4 місяці тому

    Is it possible to perform such an attack on linux using an image

  • @fatihtt8507
    @fatihtt8507 4 місяці тому +1

    Nice also on ios???

  • @XDsickEditz
    @XDsickEditz 4 місяці тому

    what about firewall of window 11?

  • @nofacebandi2710
    @nofacebandi2710 2 місяці тому

    Can you do this on android

  • @SoundWizard-gm4vk
    @SoundWizard-gm4vk 3 місяці тому

    pls what if my victim is using mobile phone but not pc .. will it work????

  • @horvatJanos-lw8so
    @horvatJanos-lw8so 2 місяці тому

    where can i get the code??

  • @Compute_and_Hack
    @Compute_and_Hack 4 місяці тому

    hey Mr Loi, pls help me with how you transformed that voice at the beginning of the Video.... Thanks for the upskill you made for me through your content

  • @didyouknowamazingfacts2790
    @didyouknowamazingfacts2790 2 місяці тому

    I'm pretty sure most email providers will pick this up as malicious.

  • @ronysingh4331
    @ronysingh4331 4 місяці тому

    what codes or the stuffs are in the nc.exe file ?

  • @EGM_0001
    @EGM_0001 4 місяці тому

    We need a software like quasar but you can put image in

  • @nithumtechtips
    @nithumtechtips Місяць тому

    from where i can get the code?

  • @DaveTechCA
    @DaveTechCA 4 місяці тому +1

    So many reasons NOT to use windows. As Einstein said, "Unlike genius, stupidity has no limits."

  • @marocquotidien
    @marocquotidien 4 місяці тому

    thank you !!

  • @Alby18
    @Alby18 3 місяці тому

    could you make a video to encrypt a trojan?