How hackers hack with an image Trojan?!
Вставка
- Опубліковано 30 січ 2024
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Наука та технологія
I'm a Maldives born and living in UK and I cannot express enough how much I despise these scumbags. Literally whenever people ask me my nationality I just tell them I'm British because idiots like these give us a horrendous reputation, not to also mention they scam other Europeans too. It warms my heart to see stuff like this, please Adrian Ruthnik keep up the great work destroying these scammers!!!
Congratulations, Adrian Ruthnik I am relieved that you are out there fighting these thugs, We musttake every precaution to protect the elderly and the general public from these despicable con artists. Congratulations to You!! You deserve the Nobel Peace Prize for ensuring our security.
Hey ppl, I'm a retired computer/IT person, Yet I still find Adrian Ruthnik so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
Y’all should stop calling everything “the bare minimum” when it’s literally not. Respect is the bare minimum, actually going out of your way to comfort and have an open ear for someone isn’t. Doing something like this is truly very nice and a great thing of him to do. I hope shit gets better for you and I salute Adrian Ruthnik for being mature when it’s needed!
Everyone should have a dedicated person like you Adrian Ruthnik .
I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds Adrian Ruthnik and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.
The efficiency of this Adrian Ruthnik is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work jack!!
Amazing job! Adrian Ruthnik I wasn’t able to see my account name at first because the name was changed. Also I really valued this information but thanks Jon even tho it showed a lots of error at my ends you still tried in helping fixing it. Happy I got it back y’all.
We need more immeasurably wise and compassionate humans like you on this planet. Thank you for sharing Adrian Ruthnik , Jon. I bet I'm not alone when I say this video found me at the perfect moment, and there are a lot of things here that I needed to hear right now.
Thank you, Adrian Ruthnik for consistently being so approachable and open-minded. Your friendly demeanor and willingness to listen and understand serve as a constant source of motivation. Your support and guidance have been especially meaningful to me during the recent account issue I encountered. Your willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you. Your assistance played a crucial role in resolving the issue and getting my account back.
Incredible efforts by Adrian Ruthnik I'll be transparent - distinguishing between legitimacy and legality can be tricky for many. Grateful for the assistance with my account - it's back in my hands. Keep up the commendable work, aiming to minimize the impact caused by the system. We could use more individuals like Jon in our world.
Having someone like you who’s not only a great innovator but also pulls his best to get the work done so beautifully needs nothing but appreciation. Adrian Ruthnik Thanks for the well off work you consistently bring your all and I truly appreciate that. Thank you for making corporate life so smooth. Proud to have you on our team. Great work as always.
As a Maldivian living in the UK, I am proud to see efforts to combat scammers. Keep up the excellent work, Adrian Ruthnik.
the fact file extensions are hidden _by default_ still stuns me to this day. like yes, i'm well aware there are people who will get confused and corrupt their own files, but instead of hiding the feature it should be a basic part of learning how to use the computer.
Why Windows still relies on file extensions rather than the first few magic bytes still baffles me! 😀
As a Maldivian living in the UK, I despise these scammers. It warms my heart to see efforts like Adrian Ruthnik's. Keep up the excellent work.
Bro is getting more and more crazy with every Video 💀
Yeah, he do this for more viewers and subscribers😂😂
It is not his fault that the world is going crazy. And somebody have to warn you for traps.
nope its sensationalism@@maxmuster7003
I have no idea how to preserve that crazy as in mentally crazy, not okay or joking? Don't get me wrong but I need ensure that I comprehend what is being typed.
I think so too
Respect should not be underestimated. Your mature and thoughtful actions are commendable. Thank you, Adrian Ruthnik.
I was waiting for it so bad... Finally :3
Thank you. Very interesting and helpful. Any instructions about how to fix a similar problem in Android? It would be very nice. Thanks again for the awesome video
U are the best bro I hope you have great day
btw, PyInstaller may compile Python to EXEs (or ELFs for Linux) and that files contains Python runtime itself (which is OK for antivirus) plus Python bytecode .pyc files inside which could be written different ways, so antivirus can't detect that by logic of the (byte)code because it analyzes machine code logic, not Python bytecode logic which is "data" not "program" for antivirus.
Actually python exes get flagged a lot.
Yeah, having the entire python runtime inside the exe isn’t a good look for av’s
@@tasosm.380 PyInstaller generates only "viruses" ? Strange assumption for av :-)))
Bro I need your help please reply
@@itsmesai8689 help with what, bro? :-)
It's amazing what you do, Adrian Ruthnik. We need more people with your skills and good intentions. Thank you for sharing, Jon.
I hope more will come.
This is very useful.
Broooo...this is crazy!! very useful tutorial and info! one question is...can an antivirus detect such files when downloaded from the net? EG: mail attachment etc? if not how can we be sure that an image is a real image if we have any doubt ?
Thanks btw
The evolution of cinge video, thats why john hammond is the best UA-cam channel
thank you i will use this only for "educational prepose only"
Haha, that joke never gets old. And then FBI is at your door before you know it.
The problem is anti-virus will detect it... And there are other ways to do it better. But greate JOB!
let me know if u find out pls
@LolWare_Exploits
Anti virus is scan the picture files?
it not a pik it only show jpg buy it exe@@rogerdarkman157
Which other way?
So that's a problem !? 💀
This would be an excellent presentation at a business event to illustrate the importance of cybersecurity awareness training and actually, seriously analyzing business email inbox content before getting "expediently click-happy" during working hours; interesting enough, this is outstanding wisdom that the company employees and contractors can take home and use the awareness from this presentation, alone, in their every day life and discuss this with family during holiday and special event gatherings... not just at the family dining table.
Good work, the true is painfull if nobody give a warning what is going on. Thx.
Another awesome tutorial from the well respected hacker, however, it would require a deep understanding of the target software and the underlying system, as well as advanced techniques such as memory corruption, heap spraying, and shellcode injection. Do not follow all the tuts blindly.
All the l337 script kiddies gonna love this untill they try it on anyone with a firewall of any calibre or any ids
Love ❤ from India Kashmir
Mr LoI that is what ethical hackings must be your family provided of you thanks 🙏🙏🙏
Can also use LTR or RTL unicode for the naming confusion 👍
what is that?
Thank you, Adrian Ruthnik, for your help. Although the video tutorial was challenging, your guidance was invaluable. I appreciate your efforts.
This video tutorial is awesome thanks for uploading bro
Big thanks, Adrian Ruthnik, for your assistance. Although the steps were challenging, your guidance was invaluable. Thank you, Jon.
We need more wise and compassionate individuals like you, Adrian Ruthnik. Your support arrived at the perfect moment, and your contributions are deeply appreciated.
i like your making videos Mr.Loi
Correct me if i am wrong I think these kind of attacks works on personal computers. Those who are using pc with root or Admin account and logged in with standard user cannot be hacked with this tricks as it requires root or admin privileges to execute the cmd.
It would be nice if you could also show us how to identify these malicious files as well.
Hackers are mad geniuses in mommy's basement. So they are almost always one step ahead of everyone. Even ways to detect the hack maybe changed after he makes video on how to detect it. It is an endless fight against the havking community. For all I know, my IP, email, and other content is publicly available because some children want to make extra bucks (corporations can buy the info for advertising). Also as for how to get porn on people, it is simple. Hack the phone and take unauthorized pictures to sell. People use their phones in the bathroom. The police need to crack down on these losers!
some ass did this to me recently . factory reset'ed and chanced os to make sure it was gone. Need help. Gonna get this his ass legally.
@@user-dt7hy5tu4r Damn, which operating system did he get you on? And did manage to take any samples of the virus or any info about how you ended up downloading it? If you're lucky he slipped up along the way somewhere.
The video tutorial kept glitching on me, but thank you for it. Also, thank you, Adrian Ruthnik. Meeting you was a blessing in disguise. Keep up the good work; many people will need your help in the future.
Great show!😃
Even as a retired IT professional, I find Adrian Ruthnik’s work highly informative and straightforward. Thank you for your advice and support.
How do we get a hold of your shell script?
The efficiency of Adrian Ruthnik is next level. Managing walkthroughs from various angles with such clarity is remarkable. Making complex topics easy to understand is really something. Awesome work!
hi ! can you please give the code which are you showing in ps1 file or tell me where you from take this code ?
thanks
Nice video teach us how to use beef+stored xss but not using the petty theft
Hi, Mr. Hackerloi! I am one of your UA-cam writings and I come to help your video and are very good. Congratulations to the stather. Have one of your video with the title: How Hackers Hack With An Image Trojan? I tested on my computer with your class cripto did not give enough to cost me a crypt base and how to set up
This is the first time you have given a solution to the hacks😅
Not the first Time, I assure you. I have viewed his video posts.
unfortunately windows defender detects netcat and removes it immediately, plus you cannot send that kind of file online (gmail) simply because you cannot send exe files (even zipping it wont work).
Most of malware now can't be kill at task manager even installing an anti malware blocked
Brother, I'm just a 70 year old retired individual who wishes to learn ethical hacking. Already have my Kali Linux but having a hard time learning the linux way of communicating.
I'm trying to install the FakeImageExploiter program fro GIT. Is this the same as what your demonstrating in this video ? Your work is awesome ! And way above my knowledge. Keep up the good work.
Hello, i can help you, i hace Alr been learning 2 years
Can you show how this attack would work in real world scenario where we have public IPs sent through internet
My pc was hacked like this 30 years ago 😂😂😂😂
The bestt 🎉🎉
Awesome video. Question for you, would the hidden .exe need admin rights to launch the power shell script to gain the reverse shell?
😂😂😂
Anything for Android or iPhone
Hello sir i need some information how can i protect malware files of quasar Clint from antivirus software detection?
That is useful information. Can this be done for android as well?
But you must be with admin account logged in?? Otherwise you neet to pass the UAC (user account control)....
If the image was sent on discord would this work if the user only copied the image and pasted it in a new chat
The most fundamental one of all!!!!😅 Free 4 You
So block powershell from going to the outbound internet firewall rule
Helo, i installed kali on my tablet Samsung. How can i delete knox system? (I don't want to be track in peranti sis.....) Pls respnd
That powershell code have to be obfuscated. Otherwise this tutorial will be a joke. Netcat is easily detected by windows defender. Otherwise you can also do one thing on the begining of the script u can add the c drive of target to the exclusion path by ps commands . I have one complain , why u don't show to ur video that ur defender get turned off or already its into the exclusion path.sorry to say loi but u r giving half information to the viewers.
yeah..sir
Hey I have a question about all this if you don’t mind
LOVE FROM BANGLADESH
Bro can you make a video of how we can access tcp handler from world with port forwarding in mobile hostpot
Is there a way to enable debugging mode in Android through the command line?
can we sent it to any mobile ?? please guide ...
Mr Do you want to make a series that is different from the others? The series that will break the views even more? The series I mean is the malware analysis series
How to do that for android? I mean in .apk format? please reply.
Really thank you for this information. But how can this be detected by antivirus or defense software? Can you make a video about this? Thank you very much in advance.☺🙏🙏
I didn't understand what's happened in 1min45sec!!!
Frome where you get that little window of rename the file?
Early crew. Fellow ethical hackers. Shalom.
Free Palestine
You The Best
Sir request a totorial for security plug in for application?
Exuse me is it possible to send the file file via email and windows defender isn't triggered?
can this seen by microsoft defender or not ?
Sir, how apply it for android phone...??
show a video for windows 10 only
Love from Sri lanka
First 🎉❤
This is more like using of netcat tool..it's just got delivered to target machine via image ...and behaves like RAT..but netcat gets detected by defender usually as hacking tool..but it's good video for practice and entertainment 😊
Well this is steganography actually.
what do we put in the url part of script
Where can I find the ps1 script?
Is there a place where we can copy all the text from?
Is it possible to perform such an attack on linux using an image
Nice also on ios???
what about firewall of window 11?
Can you do this on android
pls what if my victim is using mobile phone but not pc .. will it work????
where can i get the code??
hey Mr Loi, pls help me with how you transformed that voice at the beginning of the Video.... Thanks for the upskill you made for me through your content
So you're technically a...
@@amongusboi2032 learner
I'm pretty sure most email providers will pick this up as malicious.
what codes or the stuffs are in the nc.exe file ?
We need a software like quasar but you can put image in
from where i can get the code?
So many reasons NOT to use windows. As Einstein said, "Unlike genius, stupidity has no limits."
thank you !!
could you make a video to encrypt a trojan?