Remotely Control Any PC with an image?!

Поділитися
Вставка
  • Опубліковано 1 лют 2025

КОМЕНТАРІ •

  • @Eazy_Bruh
    @Eazy_Bruh 8 місяців тому +43

    Your videos are like magic….
    I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video.
    The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane

    • @LZnaxyl
      @LZnaxyl 8 місяців тому +5

      sounds like a skid

    • @Eazy_Bruh
      @Eazy_Bruh 8 місяців тому +1

      @@LZnaxyl bruh what? You smell like a skid.

    • @ropenphilanigqwaru7560
      @ropenphilanigqwaru7560 7 місяців тому +2

      What video broe, share a link am interested

    • @dineshjiyoutube
      @dineshjiyoutube 7 місяців тому +1

      I need the the codes for this

  • @jesperjensen293
    @jesperjensen293 8 місяців тому +24

    You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.

    • @goruluk88
      @goruluk88 8 місяців тому +1

      what would be the tell tale sign that your PC has been infected because you don't realised that you accidently click an email that look so legitimate? will resetting my PC to factory setting will clean my PC from this infection?

    • @kundasemkundatam7461
      @kundasemkundatam7461 8 місяців тому +5

      I can imagine young inexperienced teenager pirating "pre-installed" games in zip. Extracting it from context menu to "here" can do its job if our little pirate then opens the "jpg".
      Even worse it can be packed to self-extracting rar and this "jpg" can be set to start after extraction.

    • @mjmares
      @mjmares 8 місяців тому

      @@goruluk88 stop all proccess and close out of everything, look in task manager and find anything that does not look like it shoudl be there and trace it back to file location and delete :) also look in the win startup dir

    • @zer0k4ge
      @zer0k4ge 7 місяців тому +5

      zip file and RLO characters to make it end with jpg or png, problem solved

    • @saikatbiswas573
      @saikatbiswas573 7 місяців тому +1

      It could be sent as a zip file.

  • @lammabing6401
    @lammabing6401 8 місяців тому +2

    I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff

  • @shmmh
    @shmmh 8 місяців тому +61

    Am I tripping. I thought this was a NetworkChuck video minus the coffee breaks

    • @chrismachabee3128
      @chrismachabee3128 7 місяців тому +2

      Network chuck's got a different haircut.

    • @mkturner12
      @mkturner12 Місяць тому

      @@chrismachabee3128 Yeah, of the face mostly

    • @ExoezBeams
      @ExoezBeams Місяць тому

      naa 💀 i thought i was the only one who watches networkchuck and him

  • @Alex_prave
    @Alex_prave 8 місяців тому +98

    Sends a pic to someone ,
    They : why this pic is .exe???

    • @rajesh_shrestha
      @rajesh_shrestha 8 місяців тому +7

      only if they know the difference between exe and jpg :D

    • @winsucker7755
      @winsucker7755 7 місяців тому +11

      "It's EXtremely Entertaining"

    • @user-zt3hq3pi5l
      @user-zt3hq3pi5l 7 місяців тому

      Change the first binary/hexagonal designation

    • @zer0k4ge
      @zer0k4ge 7 місяців тому +5

      You can use an RLO character. So first it will be saved as "picturegnp.exe" then you out an right to left override to make it pictureexe.png or change it to an rcs file so it is a little less obvious so "picturercs.png"

    • @saikatbiswas573
      @saikatbiswas573 7 місяців тому

      That file could be named " annual companyindexe.pdf".its called extension spoof..this is a well known technic,so don't laugh with ur little knowledge.

  • @dipakmalode8237
    @dipakmalode8237 3 місяці тому

    Awesome work, Dale valsko ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!

  • @2kambas557
    @2kambas557 7 місяців тому +9

    For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.

  • @OoxGuru
    @OoxGuru 7 місяців тому +1

    Your videos are much better than it was a few year ago where you wouldn't look at the camera , well done for the constant improvement

  • @wahomemutahi1008
    @wahomemutahi1008 8 місяців тому +128

    so you start the video by threatening me huh?🤣🤣🤣🤣

    • @usr808
      @usr808 8 місяців тому +15

      I literally watch his videos just for the intro😂

    • @LoiLiangYang
      @LoiLiangYang  8 місяців тому +41

      Yes

    • @GamerBePlayin
      @GamerBePlayin 8 місяців тому

      ​@@LoiLiangYangExactly now do it

    • @Blossom_Iwunna
      @Blossom_Iwunna 7 місяців тому +2

      ​@@usr808yeah me too 😂

    • @Es7z-x7r
      @Es7z-x7r 7 місяців тому

      @@LoiLiangYang The always ask your mother before hacking and the laugh got me

  • @RinkuRinku-pb1qp
    @RinkuRinku-pb1qp 3 місяці тому +1

    There is no doubt that you will rise fast at the apex of your career Perry Moskva . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!

  • @Krullfath
    @Krullfath 8 місяців тому +6

    3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?

  • @djleodecond
    @djleodecond 8 місяців тому +34

    man, that only works on the local network and certainly the firewall will block or notify the exposing ports

    • @nirvaangoel8172
      @nirvaangoel8172 4 місяці тому

      Is that true?

    • @djleodecond
      @djleodecond 4 місяці тому

      @@nirvaangoel8172 yes

    • @Styrofoamiskindabad
      @Styrofoamiskindabad 2 місяці тому

      I don't know about this since the victim is actively listening on port 4444 to receive connections, so how can firewall block the connection from the port when the client is actively listening on the port?

    • @technical1965
      @technical1965 Місяць тому

      ​@@StyrofoamiskindabadActually it it true you can use reverse shell to bypass the firewall but , reverse shells makes our pc easily exposed to the blue team hackers.

    • @4k1ra-f9y
      @4k1ra-f9y 26 днів тому

      Try connect ip public

  • @mmkgamingchannel9918
    @mmkgamingchannel9918 3 місяці тому

    Metaspyclub is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work !!

  • @Neekamhakane
    @Neekamhakane 8 місяців тому +1

    Your video is like a mini-masterclass. So valuable!

    • @PhamHuy-j4e
      @PhamHuy-j4e 7 місяців тому

      if you know tech enough, you know this is for kids only, lol.

  • @nettlex
    @nettlex 8 місяців тому +2

    the thing is, mail services show extensions by default.

  • @cantbeserious9802
    @cantbeserious9802 5 місяців тому

    How can anyone learn when you’re teaching so quick without thorough instructions for people to pick up on?

  • @wasimafzali6651
    @wasimafzali6651 8 місяців тому +2

    Hey ❤
    Could you make a video for beginners where and how to start computer science, programming and other things

  • @mkturner12
    @mkturner12 Місяць тому

    So, what's interesting is the lack of ini files in the newer distros of VNC>

  • @computersandkeyboards
    @computersandkeyboards 8 місяців тому +1

    Congrats on 1 mil!

  • @satalaj
    @satalaj 8 місяців тому +4

    20 years ago I used 007 spyware for fun it's idea was very similar to create a image and deploy

  • @usr808
    @usr808 8 місяців тому +10

    I'm gonna try this on my boss. Thanks Loi😊

  • @s7xyi
    @s7xyi 8 місяців тому +6

    So the photo will always be a .exe at the end and that is how we are gonna know it is a vnc file or what ever remote?

    • @marvinundo7020
      @marvinundo7020 8 місяців тому +3

      Short answer is yes - Long answer is that you should also look out for other file extensions that can have executeable programm code, since exe is not the only one

    • @z1t_real
      @z1t_real 7 місяців тому

      You could use Advanced BAT to EXE Converter to make it look less suspicous

  • @yeshua_n13-8aij8
    @yeshua_n13-8aij8 8 місяців тому

    Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.

  • @CEFASOCACEDEMY-mz6zk
    @CEFASOCACEDEMY-mz6zk 7 місяців тому

    I have been following for a while now and i can testify it is awesome

  • @uglefisken
    @uglefisken 3 місяці тому

    Wow excellent explanation.... Thank you Sir for bringing so much effort and time to make people like us safe and we can feel comfort and breeze when surfing as it is or was supposed to be... And at the same time understand and comply with the issues that are out there so we have the possibility to actually do something with it and be a part of the solution.. Excelllent.. Thank you Sir again, for your hard time and efforts to making us SECURE and Safe....!!!
    People like him are so important theese days... Its just amasing....You got yourself a Subber indeed....!

  • @attheplay
    @attheplay 6 місяців тому

    What kind of people say Thank You for recevied the message " You have been hacked " lol 😂😂😂

  • @archygonzalez3086
    @archygonzalez3086 7 місяців тому

    Amazing and simple explanation, hope this content increases awareness ❤

  • @Xtechiexx
    @Xtechiexx 7 місяців тому

    I love your intro attitude ❤😊

  • @johnmyers3233
    @johnmyers3233 7 місяців тому

    I personally like to see the extensions on the file names, Likely. This wouldn't catch me off guard unless I was flipping through my images. I bet there are better ways of doing this That are coming to light and we need to protect ourselves. I personally do not like Leaving my internet connected. I also do not store important important information like taxes on an online computer. I think there might be a rule that can be made in order to prevent this from ever happening. I'm not sure how you are remotely connecting, but most of my remote services are restricted or off. I'm not sure if there is actually radio frequency on my motherboard, but it is another setting that you have to disable regardless of your motherboard, not having Bluetooth and Wi-Fi. I'm finding it very difficult to find motherboards that are safe from the outside world, especially with the advancements. In hacking. We need to be proactive in scooping up resources and tools that we can use And the future should things go wrong, Like all of the corporations putting computers on record, Taking away all the AI tools after they got what they wanted, And destroying every operating system and old hardware that could be used.

  • @mrlilstrom
    @mrlilstrom 7 місяців тому

    Can you make a video of remotely controlling another PC while staying hidden from the task manager?

  • @Dongdang-fc2mb
    @Dongdang-fc2mb 7 місяців тому

    Good video and interesting subject. Would you be able to tell us how to check for this possible attack aka ‘photo installed’ and how to remove it from your pc or Mac?
    Thank you,

  • @user-ev2ct8ug1m
    @user-ev2ct8ug1m 8 місяців тому +3

    that face from 12:24 till 12:27 was priceless 🤣🤣

  • @solexisdelexis4616
    @solexisdelexis4616 8 місяців тому +4

    Please can you do a course on Linux and windows from the terminal

  • @jermainreed9653
    @jermainreed9653 8 місяців тому +42

    😂😂😂 I will help you find your password free of charge 😂😂

  • @microcyberwindows
    @microcyberwindows 7 місяців тому

    when you entering commands, kindly keep your prompt in the middle of the screen, bcz normally your all commands go behind the subtitles.

  • @randomClips64
    @randomClips64 7 місяців тому

    0:25 my lawyer will remember that
    note : physical hacking included

  • @joelarchary7122
    @joelarchary7122 8 місяців тому +3

    wait when did he turn into thenetworkchuck?

  • @paritoshbhatt
    @paritoshbhatt 8 місяців тому

    Great Explanation Man !

  • @__shivansh__nigam7755
    @__shivansh__nigam7755 6 місяців тому +1

    trying to do the thing but : getting error like :: 'x64' is not recognized as an internal or external command,
    operable program or batch file. same for x86.

  • @ChiefShaka
    @ChiefShaka 18 днів тому

    eductaionally speaking can i convert the command list into a txt file in notepad and change the title of the file to in this case email it to the person or computer we are hacking and when they open the file, auto run will kick in and then run that command automatically that you just did manually? Or would you in this case make the command prompt file stay the same, disguise the title and then boom the computer is hacked? Sorry I'm just super passionate about hacking and I ran into your videos and content and I'm determined of becoming one someday. Im going to school for it currently.

  • @muesique
    @muesique 8 місяців тому

    Before you click onto something you downloaded from the internet check what it is! It will help in most cases.

  • @matteotheKat
    @matteotheKat Місяць тому +1

    Mr loi. is this optional without kali linux?

  • @benjaminamofa5043
    @benjaminamofa5043 7 місяців тому

    Where did the powershell script, the one we need to polish come from?

  • @DrJay_PhD
    @DrJay_PhD 6 місяців тому

    so basically, you need to already have access to the target machine to open the ports and point to the hacker machine? so... when does the actual hacking start?

  • @Mason201410
    @Mason201410 8 місяців тому

    Couldn't you take this a step further by adding in the ps script that is executed to also automatically hide file extension and hidden files in the event that the users does have extensions showing? Might throw some red flags if done that way maybe.

  • @brandondargo9875
    @brandondargo9875 8 місяців тому +7

    At 25sec... I see my software is already on your PC... Advanced BAT to EXE Converter. Already done :)

  • @enlargedtext
    @enlargedtext 8 місяців тому +1

    most educational video I've seen in a while!

  • @spydog1462
    @spydog1462 Місяць тому

    What code should you put into power shell so the files go to a file in the drive instead of on the desktop?

  • @II-er7gj
    @II-er7gj 7 місяців тому

    Loi Liang Yang - can you do this for Android as well? an not only for PC!

  • @gamer2.493
    @gamer2.493 6 місяців тому

    Please can you teach the best app for phishing and how to use it

  • @jesperjensen293
    @jesperjensen293 6 місяців тому

    Does this not require a port forward at the target? most people are behind a router. or it dont matter as it's "calling" the attacker, where naturally port 4444 needs to be forwarded?

  • @spydog1462
    @spydog1462 Місяць тому

    What’s the best way to have this go unnoticed from anti virus?

  • @idkandidclmfao8242
    @idkandidclmfao8242 8 місяців тому +83

    this isn't hacking at all , im sorry but if it does require me to install something on my victims pc whats the point ?

    • @jaycee6438
      @jaycee6438 7 місяців тому +25

      It is a form of hacking… just like putting down a usb for a curious person to pick up and succumb to the curiosity of what’s on the USB…. the point of it is to get access

    • @saikatbiswas573
      @saikatbiswas573 7 місяців тому +7

      Its a type of malware delivery, hacker can send you a picture or pdf or a word file or anything by using email as an example pretend to be someone you know may b your company boss by spoofing their original email, once you open that file malware will automatically execute on your pc but you will see the original pdf or pic file. This is a well known technic used by hackers. They can use cross platform malware delivery technique.

    • @local-admin
      @local-admin 7 місяців тому

      😂 how many times has a person you know done something illogical. Humans are dumb

    • @AmitKumar-gi5wc
      @AmitKumar-gi5wc 7 місяців тому +5

      Noob

    • @21Powers824
      @21Powers824 7 місяців тому +3

      Merge it with a Pic and then send it to the and use the RLO character to make it look like a jpg and once they open it boom

  • @Fantasia_music
    @Fantasia_music 6 місяців тому

    lol the intro😂😂 try to hack me and i will help you find out your password

  • @suhaibnadir
    @suhaibnadir 7 місяців тому

    You are genius loi 😊

  • @sniperfoxxy
    @sniperfoxxy 8 місяців тому

    what about if your target uses a firewall like tiny wall which blocks every connection unless its whitelisted by the user

    • @z1t_real
      @z1t_real 7 місяців тому

      Thats why we reverse shell so call from the victims computer to us to bypass firewalls

    • @paddymcgrath605
      @paddymcgrath605 7 місяців тому

      Ncat

  • @spydog1462
    @spydog1462 Місяць тому

    How can you prevent the pop up asking if you’re okay with winvnc to make changes to your device? It’s unneeded and works fine without clicking on yes.

  • @everfreeeeee
    @everfreeeeee 7 місяців тому

    the vnc can connect over the WAN without know the target machine WAN ip or port forwarding at target machine router ??

  • @lil_rill
    @lil_rill 3 місяці тому

    Please can we get a video tutorial on how to remotely control an apple ios iphone, either a RAT or through a terminal, or if you can get us the Pegasus spyware

  • @massterrbarber
    @massterrbarber 7 місяців тому

    Wow, this is dangerous stuff you got me scared to even go on my laptop. How? How do I how do I stop somebody from doing that to me? I just don’t click on any pictures.??

    • @xenicmark
      @xenicmark 2 місяці тому

      Lol, just enable visible file extensions. You'll see what's an image and whats an executable.

  • @mzgaming2222
    @mzgaming2222 7 місяців тому +2

    I am confused The application ultravnc should installed in hackers pc or the people who we are hacking bro im totally confused🤨

  • @lolrekt923
    @lolrekt923 8 місяців тому

    Im sorry @Loi Liang Yang Im not the brightest tool in the shed but Im very interested in this, I feel really dumb and feel as if this is completely wrong, please correct me. So you have one OS that downloads the compressed files of the "VNC", preconfig the settings, than you use the second OS to listen for the port "4444" on the "VNCviewer" which will get you the IP of the original OS? Im sorry im just trying to understand how the IP was gained from the "victim"?

    • @whacoder725
      @whacoder725 8 місяців тому +1

      bro victim ip you have to find you can use nmap
      or any other network scanning tool

    • @lolrekt923
      @lolrekt923 8 місяців тому

      @@whacoder725 That's fine, just needed clarification since he never covered that

    • @Styrofoamiskindabad
      @Styrofoamiskindabad 2 місяці тому

      ​@whacoder725 bro this is a bit advanced he won't understand this and it's not related to this video

  • @space_penguin3593
    @space_penguin3593 7 місяців тому

    Do both computers have to have it installed??

  • @leblebit0zu9435
    @leblebit0zu9435 7 місяців тому +1

    do u post videos somewhere other than youtube, i dont think youtube will let u show real hacking tbh.

  • @kerryfreudenthaler2986
    @kerryfreudenthaler2986 6 місяців тому

    How come ever remote-control video we have to use the Tarkets machine to download something or run some code is there any way possible to just hack into it?

  • @mr.haristotle
    @mr.haristotle 7 місяців тому

    can you teach us how to do to with a machine in another network and not LAN?

  • @orionnxaviergonzalez4279
    @orionnxaviergonzalez4279 8 місяців тому

    I have the Google subscriber data as the matrix. Google was hacked...or server 1426 62nd. Thanks ...ur the ethical expert

    • @-someone-.
      @-someone-. 8 місяців тому +1

      When the vortex is met with no dependencies only then can it intersect itself.

  • @KhZakir-br3pc
    @KhZakir-br3pc 8 місяців тому

    Hi...boss you're best UA-cam’s ❤

  • @ayuubmohan9951
    @ayuubmohan9951 8 місяців тому +6

    but is it require to download vnc in the victims device

    • @thionne
      @thionne 7 місяців тому +1

      yup..lol so that's not hacking at all

    • @2kambas557
      @2kambas557 7 місяців тому +1

      not necessarily, when hacking a computer the first step is to obtain a remote shell and then you can install a program to have remote desktop acess

  • @spydog1462
    @spydog1462 Місяць тому

    How can you make this run every few minutes after running the exec.? So if you disconnect you don’t rely on the person running exe again.

  • @leonardomoretto4040
    @leonardomoretto4040 8 місяців тому +1

    Hi! If I Control the victim Pc, the victim Will notice, like we're using "TeamViewer"? Or they Will not notice?

  • @SakePL
    @SakePL Місяць тому

    Hey, is there any chance you have this script somewhere? We actually been doing things like reverse shell during school lectures, but this one is much much better.

  • @ElTinTin90
    @ElTinTin90 7 місяців тому

    Hi Mr. Yang, I'm have a long time searching a tutorial with the same idea, but focus on android devices infringement remotely, using a infected photo with a payload, and them sending it vía WhatsApp for example, can you make this?

  • @ConstantineProg
    @ConstantineProg 8 місяців тому

    Yes but how we can check if someone have even access to the network?

  • @spydog1462
    @spydog1462 Місяць тому

    How can you make this run on startup?

  • @tellisecfive9410
    @tellisecfive9410 8 місяців тому

    That's some passive aggressive threats 😅😅😅

  • @hballouz
    @hballouz 7 місяців тому

    are all these tutorials done with zero security in place, no way they work in real environments even with default minimal security settings.. correct me if im wrong

  • @mohammadashraf7496
    @mohammadashraf7496 7 місяців тому

    I follow ur every video some time due to busy life I did not remember it

  • @ApdalhamedGaffar
    @ApdalhamedGaffar 7 місяців тому

    Please can you teach us how we can make an autorun usb that i can run attack if we plugin it ❤

  • @mussaabdi
    @mussaabdi 7 місяців тому

    @loi would you do the same but with port forwarding

  • @sultanthe2nd
    @sultanthe2nd 8 місяців тому

    That intro was 🔥 😂😂

  • @bot3d
    @bot3d 7 місяців тому +3

    Viewer Think: Exploit Code inside an Image
    Reality: Powershell download an Image

  • @AnkitKumar-eu9vl
    @AnkitKumar-eu9vl 7 місяців тому +2

    hey some one in just hacked my WIFI is there any possible way i can see his screen

  • @JordanMengo
    @JordanMengo 8 місяців тому

    U are just so amazing...! 🤧 🤧

  • @adamtns
    @adamtns 5 місяців тому

    does this also work with mobile phones?

  • @Nan-bara
    @Nan-bara 7 місяців тому +1

    How do you get back a gmail account thats already been hacked and had the password changed?

  • @autolover10000
    @autolover10000 6 місяців тому

    just a quick question ., when i have doje all that wiol i be able to control the other pc? and does it worl with phones?

  • @NITE_PINE
    @NITE_PINE 7 місяців тому +1

    You also have to find someone dumb enough to open the attachment. Beyond never opening any attachments that I have not verified by voice with the sender (only someone I have met IRL). Otherwise, if I had to open an attachment I didn't trust I guess I would do it in a virtual machine. I would download and scan it first rather than launch or run it from the browser.

  • @loklishplays9562
    @loklishplays9562 8 місяців тому

    Wait, so to be able to execute this, we first need to find someones open computer / laptop. Silently enter the cmd and remote connect to our hacking machine on their computer, without anyone noticing we are using someone else computer?

    • @jajabink100
      @jajabink100 8 місяців тому

      basically this is like social engineering attack, first you prep the jpg file embedded with the powershell script to download the 2 vnc file, then set up a listener at your kali machine and wait the user to open ther jpg file

    • @loklishplays9562
      @loklishplays9562 8 місяців тому

      @@jajabink100 Yea, but a nice social engineering video teaching us this would be cool. You know any?

  • @abderrahimelayadi
    @abderrahimelayadi Місяць тому

    You are. The must inspired in this platform 🎉🎉🎉🎉 🧑‍💻🧑‍💻🧑‍💻🧑‍💻🔥 loi ling yang thank you so much 🙏

  • @mubarakkhalid7099
    @mubarakkhalid7099 3 місяці тому

    Good day sir.
    I need your help with something.
    How can someone hack a laptop using Kali linux Without coming in contact with the laptop you want to hack?
    What if you are connected to the same WiFi network?

  • @CodeToad_
    @CodeToad_ 3 місяці тому

    Wait do they need to install the program too?

  • @BrodarkrobotBrookDarline
    @BrodarkrobotBrookDarline 4 місяці тому

    Loi Master, My main issue is this : the delivery method. the antivirus are shouting laudly that there is virus. can you make it more real world senario bypassing the gmail antivirus scan, etc ... ? thanks

  • @Dwlukinbill
    @Dwlukinbill 7 місяців тому

    Is that what kyc is for?

  • @Cj_MS
    @Cj_MS 2 місяці тому

    My friend got a virus on his pc and I cant go to his house to fix it , and he is not that smart to understand what im telling him, thanks for this tutorial😂❤

  • @RyanGForcE-xo9zx
    @RyanGForcE-xo9zx 8 місяців тому

    Good content keep it up 💪🎉

  • @orionnxaviergonzalez4279
    @orionnxaviergonzalez4279 8 місяців тому

    It even showed flights and me at airport 8 miles away while I'm home....bizarre. I caught several people who had access (recorded ) parked next to me while using my account n gsa app live communicate with drop box show name of the person in my map later to have the names removed....

  • @alifebz5312
    @alifebz5312 7 місяців тому

    bruh Ive just watched the first minutes of this video and I gotta say im subscribing now coz dude lol it was funny asf

  • @clarencementor4862
    @clarencementor4862 8 місяців тому

    Just a stupid question. How is it possible to connect to a Class C IP address remotely, when you are separeted by a WAN IP address on both sides?

    • @Alayeluwa
      @Alayeluwa 8 місяців тому +1

      It’s not stupid. You cannot connect to a class C IP address from WAN unless there’s a kind of port forwarding set up which at that point will be the gateway/firewall translating the port forward to the local Class C associated with the port forwarding settings.

    • @clarencementor4862
      @clarencementor4862 8 місяців тому

      @@Alayeluwa Thank you.

    • @clarencementor4862
      @clarencementor4862 8 місяців тому

      What id you plant a physical device like an SBC in the remote network and connect through that device into a remote class C network. Lile in the movie: "The Girl with the Dragon Tatoo."

    • @Alayeluwa
      @Alayeluwa 7 місяців тому

      @@clarencementor4862 It’s possible and I can see some malicious devices bypassing a stateful firewall, especially if that rogue device phones home first like some malware usually phone their C2.
      On the other hand, you can always remote into a local network via the local network’s VPN account and talk to the local class addresses but most sensible network administrators will turn that feature off while creating VPN servers unless they are giving remote users access to a NAS storage; etc and that will only be the allowed on-premises resources the VPN accounts gets.

  • @MojtabaSultani
    @MojtabaSultani 7 місяців тому

    Thanks so much, your great sir