Your videos are like magic…. I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video. The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane
You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.
what would be the tell tale sign that your PC has been infected because you don't realised that you accidently click an email that look so legitimate? will resetting my PC to factory setting will clean my PC from this infection?
I can imagine young inexperienced teenager pirating "pre-installed" games in zip. Extracting it from context menu to "here" can do its job if our little pirate then opens the "jpg". Even worse it can be packed to self-extracting rar and this "jpg" can be set to start after extraction.
@@goruluk88 stop all proccess and close out of everything, look in task manager and find anything that does not look like it shoudl be there and trace it back to file location and delete :) also look in the win startup dir
I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff
You can use an RLO character. So first it will be saved as "picturegnp.exe" then you out an right to left override to make it pictureexe.png or change it to an rcs file so it is a little less obvious so "picturercs.png"
Awesome work, Dale valsko ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!
For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.
There is no doubt that you will rise fast at the apex of your career Perry Moskva . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?
I don't know about this since the victim is actively listening on port 4444 to receive connections, so how can firewall block the connection from the port when the client is actively listening on the port?
@@StyrofoamiskindabadActually it it true you can use reverse shell to bypass the firewall but , reverse shells makes our pc easily exposed to the blue team hackers.
Metaspyclub is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work !!
Short answer is yes - Long answer is that you should also look out for other file extensions that can have executeable programm code, since exe is not the only one
Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.
Wow excellent explanation.... Thank you Sir for bringing so much effort and time to make people like us safe and we can feel comfort and breeze when surfing as it is or was supposed to be... And at the same time understand and comply with the issues that are out there so we have the possibility to actually do something with it and be a part of the solution.. Excelllent.. Thank you Sir again, for your hard time and efforts to making us SECURE and Safe....!!! People like him are so important theese days... Its just amasing....You got yourself a Subber indeed....!
I personally like to see the extensions on the file names, Likely. This wouldn't catch me off guard unless I was flipping through my images. I bet there are better ways of doing this That are coming to light and we need to protect ourselves. I personally do not like Leaving my internet connected. I also do not store important important information like taxes on an online computer. I think there might be a rule that can be made in order to prevent this from ever happening. I'm not sure how you are remotely connecting, but most of my remote services are restricted or off. I'm not sure if there is actually radio frequency on my motherboard, but it is another setting that you have to disable regardless of your motherboard, not having Bluetooth and Wi-Fi. I'm finding it very difficult to find motherboards that are safe from the outside world, especially with the advancements. In hacking. We need to be proactive in scooping up resources and tools that we can use And the future should things go wrong, Like all of the corporations putting computers on record, Taking away all the AI tools after they got what they wanted, And destroying every operating system and old hardware that could be used.
Good video and interesting subject. Would you be able to tell us how to check for this possible attack aka ‘photo installed’ and how to remove it from your pc or Mac? Thank you,
trying to do the thing but : getting error like :: 'x64' is not recognized as an internal or external command, operable program or batch file. same for x86.
eductaionally speaking can i convert the command list into a txt file in notepad and change the title of the file to in this case email it to the person or computer we are hacking and when they open the file, auto run will kick in and then run that command automatically that you just did manually? Or would you in this case make the command prompt file stay the same, disguise the title and then boom the computer is hacked? Sorry I'm just super passionate about hacking and I ran into your videos and content and I'm determined of becoming one someday. Im going to school for it currently.
so basically, you need to already have access to the target machine to open the ports and point to the hacker machine? so... when does the actual hacking start?
Couldn't you take this a step further by adding in the ps script that is executed to also automatically hide file extension and hidden files in the event that the users does have extensions showing? Might throw some red flags if done that way maybe.
Does this not require a port forward at the target? most people are behind a router. or it dont matter as it's "calling" the attacker, where naturally port 4444 needs to be forwarded?
It is a form of hacking… just like putting down a usb for a curious person to pick up and succumb to the curiosity of what’s on the USB…. the point of it is to get access
Its a type of malware delivery, hacker can send you a picture or pdf or a word file or anything by using email as an example pretend to be someone you know may b your company boss by spoofing their original email, once you open that file malware will automatically execute on your pc but you will see the original pdf or pic file. This is a well known technic used by hackers. They can use cross platform malware delivery technique.
Please can we get a video tutorial on how to remotely control an apple ios iphone, either a RAT or through a terminal, or if you can get us the Pegasus spyware
Wow, this is dangerous stuff you got me scared to even go on my laptop. How? How do I how do I stop somebody from doing that to me? I just don’t click on any pictures.??
Im sorry @Loi Liang Yang Im not the brightest tool in the shed but Im very interested in this, I feel really dumb and feel as if this is completely wrong, please correct me. So you have one OS that downloads the compressed files of the "VNC", preconfig the settings, than you use the second OS to listen for the port "4444" on the "VNCviewer" which will get you the IP of the original OS? Im sorry im just trying to understand how the IP was gained from the "victim"?
How come ever remote-control video we have to use the Tarkets machine to download something or run some code is there any way possible to just hack into it?
Hey, is there any chance you have this script somewhere? We actually been doing things like reverse shell during school lectures, but this one is much much better.
Hi Mr. Yang, I'm have a long time searching a tutorial with the same idea, but focus on android devices infringement remotely, using a infected photo with a payload, and them sending it vía WhatsApp for example, can you make this?
are all these tutorials done with zero security in place, no way they work in real environments even with default minimal security settings.. correct me if im wrong
You also have to find someone dumb enough to open the attachment. Beyond never opening any attachments that I have not verified by voice with the sender (only someone I have met IRL). Otherwise, if I had to open an attachment I didn't trust I guess I would do it in a virtual machine. I would download and scan it first rather than launch or run it from the browser.
Wait, so to be able to execute this, we first need to find someones open computer / laptop. Silently enter the cmd and remote connect to our hacking machine on their computer, without anyone noticing we are using someone else computer?
basically this is like social engineering attack, first you prep the jpg file embedded with the powershell script to download the 2 vnc file, then set up a listener at your kali machine and wait the user to open ther jpg file
Good day sir. I need your help with something. How can someone hack a laptop using Kali linux Without coming in contact with the laptop you want to hack? What if you are connected to the same WiFi network?
Loi Master, My main issue is this : the delivery method. the antivirus are shouting laudly that there is virus. can you make it more real world senario bypassing the gmail antivirus scan, etc ... ? thanks
My friend got a virus on his pc and I cant go to his house to fix it , and he is not that smart to understand what im telling him, thanks for this tutorial😂❤
It even showed flights and me at airport 8 miles away while I'm home....bizarre. I caught several people who had access (recorded ) parked next to me while using my account n gsa app live communicate with drop box show name of the person in my map later to have the names removed....
It’s not stupid. You cannot connect to a class C IP address from WAN unless there’s a kind of port forwarding set up which at that point will be the gateway/firewall translating the port forward to the local Class C associated with the port forwarding settings.
What id you plant a physical device like an SBC in the remote network and connect through that device into a remote class C network. Lile in the movie: "The Girl with the Dragon Tatoo."
@@clarencementor4862 It’s possible and I can see some malicious devices bypassing a stateful firewall, especially if that rogue device phones home first like some malware usually phone their C2. On the other hand, you can always remote into a local network via the local network’s VPN account and talk to the local class addresses but most sensible network administrators will turn that feature off while creating VPN servers unless they are giving remote users access to a NAS storage; etc and that will only be the allowed on-premises resources the VPN accounts gets.
Your videos are like magic….
I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video.
The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane
sounds like a skid
@@LZnaxyl bruh what? You smell like a skid.
What video broe, share a link am interested
I need the the codes for this
You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.
what would be the tell tale sign that your PC has been infected because you don't realised that you accidently click an email that look so legitimate? will resetting my PC to factory setting will clean my PC from this infection?
I can imagine young inexperienced teenager pirating "pre-installed" games in zip. Extracting it from context menu to "here" can do its job if our little pirate then opens the "jpg".
Even worse it can be packed to self-extracting rar and this "jpg" can be set to start after extraction.
@@goruluk88 stop all proccess and close out of everything, look in task manager and find anything that does not look like it shoudl be there and trace it back to file location and delete :) also look in the win startup dir
zip file and RLO characters to make it end with jpg or png, problem solved
It could be sent as a zip file.
I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff
Am I tripping. I thought this was a NetworkChuck video minus the coffee breaks
Network chuck's got a different haircut.
@@chrismachabee3128 Yeah, of the face mostly
naa 💀 i thought i was the only one who watches networkchuck and him
Sends a pic to someone ,
They : why this pic is .exe???
only if they know the difference between exe and jpg :D
"It's EXtremely Entertaining"
Change the first binary/hexagonal designation
You can use an RLO character. So first it will be saved as "picturegnp.exe" then you out an right to left override to make it pictureexe.png or change it to an rcs file so it is a little less obvious so "picturercs.png"
That file could be named " annual companyindexe.pdf".its called extension spoof..this is a well known technic,so don't laugh with ur little knowledge.
Awesome work, Dale valsko ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!
For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.
Any video you recommend?
Any vídeos on that?
Bro please any video or way you can explain this more
Bro only came to make a noise and left😅😅
If any one know please let me know😅
Your videos are much better than it was a few year ago where you wouldn't look at the camera , well done for the constant improvement
so you start the video by threatening me huh?🤣🤣🤣🤣
I literally watch his videos just for the intro😂
Yes
@@LoiLiangYangExactly now do it
@@usr808yeah me too 😂
@@LoiLiangYang The always ask your mother before hacking and the laugh got me
There is no doubt that you will rise fast at the apex of your career Perry Moskva . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?
man, that only works on the local network and certainly the firewall will block or notify the exposing ports
Is that true?
@@nirvaangoel8172 yes
I don't know about this since the victim is actively listening on port 4444 to receive connections, so how can firewall block the connection from the port when the client is actively listening on the port?
@@StyrofoamiskindabadActually it it true you can use reverse shell to bypass the firewall but , reverse shells makes our pc easily exposed to the blue team hackers.
Try connect ip public
Metaspyclub is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work !!
Your video is like a mini-masterclass. So valuable!
if you know tech enough, you know this is for kids only, lol.
the thing is, mail services show extensions by default.
How can anyone learn when you’re teaching so quick without thorough instructions for people to pick up on?
Hey ❤
Could you make a video for beginners where and how to start computer science, programming and other things
So, what's interesting is the lack of ini files in the newer distros of VNC>
Congrats on 1 mil!
20 years ago I used 007 spyware for fun it's idea was very similar to create a image and deploy
I'm gonna try this on my boss. Thanks Loi😊
So the photo will always be a .exe at the end and that is how we are gonna know it is a vnc file or what ever remote?
Short answer is yes - Long answer is that you should also look out for other file extensions that can have executeable programm code, since exe is not the only one
You could use Advanced BAT to EXE Converter to make it look less suspicous
Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.
I have been following for a while now and i can testify it is awesome
Wow excellent explanation.... Thank you Sir for bringing so much effort and time to make people like us safe and we can feel comfort and breeze when surfing as it is or was supposed to be... And at the same time understand and comply with the issues that are out there so we have the possibility to actually do something with it and be a part of the solution.. Excelllent.. Thank you Sir again, for your hard time and efforts to making us SECURE and Safe....!!!
People like him are so important theese days... Its just amasing....You got yourself a Subber indeed....!
What kind of people say Thank You for recevied the message " You have been hacked " lol 😂😂😂
Amazing and simple explanation, hope this content increases awareness ❤
I love your intro attitude ❤😊
I personally like to see the extensions on the file names, Likely. This wouldn't catch me off guard unless I was flipping through my images. I bet there are better ways of doing this That are coming to light and we need to protect ourselves. I personally do not like Leaving my internet connected. I also do not store important important information like taxes on an online computer. I think there might be a rule that can be made in order to prevent this from ever happening. I'm not sure how you are remotely connecting, but most of my remote services are restricted or off. I'm not sure if there is actually radio frequency on my motherboard, but it is another setting that you have to disable regardless of your motherboard, not having Bluetooth and Wi-Fi. I'm finding it very difficult to find motherboards that are safe from the outside world, especially with the advancements. In hacking. We need to be proactive in scooping up resources and tools that we can use And the future should things go wrong, Like all of the corporations putting computers on record, Taking away all the AI tools after they got what they wanted, And destroying every operating system and old hardware that could be used.
Can you make a video of remotely controlling another PC while staying hidden from the task manager?
Good video and interesting subject. Would you be able to tell us how to check for this possible attack aka ‘photo installed’ and how to remove it from your pc or Mac?
Thank you,
that face from 12:24 till 12:27 was priceless 🤣🤣
Please can you do a course on Linux and windows from the terminal
😂😂😂 I will help you find your password free of charge 😂😂
😂😂😂😂
😂😂😂😂😂😂
when you entering commands, kindly keep your prompt in the middle of the screen, bcz normally your all commands go behind the subtitles.
0:25 my lawyer will remember that
note : physical hacking included
wait when did he turn into thenetworkchuck?
Great Explanation Man !
trying to do the thing but : getting error like :: 'x64' is not recognized as an internal or external command,
operable program or batch file. same for x86.
eductaionally speaking can i convert the command list into a txt file in notepad and change the title of the file to in this case email it to the person or computer we are hacking and when they open the file, auto run will kick in and then run that command automatically that you just did manually? Or would you in this case make the command prompt file stay the same, disguise the title and then boom the computer is hacked? Sorry I'm just super passionate about hacking and I ran into your videos and content and I'm determined of becoming one someday. Im going to school for it currently.
Before you click onto something you downloaded from the internet check what it is! It will help in most cases.
Mr loi. is this optional without kali linux?
Where did the powershell script, the one we need to polish come from?
so basically, you need to already have access to the target machine to open the ports and point to the hacker machine? so... when does the actual hacking start?
Couldn't you take this a step further by adding in the ps script that is executed to also automatically hide file extension and hidden files in the event that the users does have extensions showing? Might throw some red flags if done that way maybe.
At 25sec... I see my software is already on your PC... Advanced BAT to EXE Converter. Already done :)
I see it at 1m25s
You are the REAL hacker! 😂😂
most educational video I've seen in a while!
What code should you put into power shell so the files go to a file in the drive instead of on the desktop?
Loi Liang Yang - can you do this for Android as well? an not only for PC!
Please can you teach the best app for phishing and how to use it
Does this not require a port forward at the target? most people are behind a router. or it dont matter as it's "calling" the attacker, where naturally port 4444 needs to be forwarded?
What’s the best way to have this go unnoticed from anti virus?
this isn't hacking at all , im sorry but if it does require me to install something on my victims pc whats the point ?
It is a form of hacking… just like putting down a usb for a curious person to pick up and succumb to the curiosity of what’s on the USB…. the point of it is to get access
Its a type of malware delivery, hacker can send you a picture or pdf or a word file or anything by using email as an example pretend to be someone you know may b your company boss by spoofing their original email, once you open that file malware will automatically execute on your pc but you will see the original pdf or pic file. This is a well known technic used by hackers. They can use cross platform malware delivery technique.
😂 how many times has a person you know done something illogical. Humans are dumb
Noob
Merge it with a Pic and then send it to the and use the RLO character to make it look like a jpg and once they open it boom
lol the intro😂😂 try to hack me and i will help you find out your password
You are genius loi 😊
what about if your target uses a firewall like tiny wall which blocks every connection unless its whitelisted by the user
Thats why we reverse shell so call from the victims computer to us to bypass firewalls
Ncat
How can you prevent the pop up asking if you’re okay with winvnc to make changes to your device? It’s unneeded and works fine without clicking on yes.
the vnc can connect over the WAN without know the target machine WAN ip or port forwarding at target machine router ??
Please can we get a video tutorial on how to remotely control an apple ios iphone, either a RAT or through a terminal, or if you can get us the Pegasus spyware
Wow, this is dangerous stuff you got me scared to even go on my laptop. How? How do I how do I stop somebody from doing that to me? I just don’t click on any pictures.??
Lol, just enable visible file extensions. You'll see what's an image and whats an executable.
I am confused The application ultravnc should installed in hackers pc or the people who we are hacking bro im totally confused🤨
in the victims pc
Im sorry @Loi Liang Yang Im not the brightest tool in the shed but Im very interested in this, I feel really dumb and feel as if this is completely wrong, please correct me. So you have one OS that downloads the compressed files of the "VNC", preconfig the settings, than you use the second OS to listen for the port "4444" on the "VNCviewer" which will get you the IP of the original OS? Im sorry im just trying to understand how the IP was gained from the "victim"?
bro victim ip you have to find you can use nmap
or any other network scanning tool
@@whacoder725 That's fine, just needed clarification since he never covered that
@whacoder725 bro this is a bit advanced he won't understand this and it's not related to this video
Do both computers have to have it installed??
do u post videos somewhere other than youtube, i dont think youtube will let u show real hacking tbh.
?🙏
How come ever remote-control video we have to use the Tarkets machine to download something or run some code is there any way possible to just hack into it?
can you teach us how to do to with a machine in another network and not LAN?
I have the Google subscriber data as the matrix. Google was hacked...or server 1426 62nd. Thanks ...ur the ethical expert
When the vortex is met with no dependencies only then can it intersect itself.
Hi...boss you're best UA-cam’s ❤
but is it require to download vnc in the victims device
yup..lol so that's not hacking at all
not necessarily, when hacking a computer the first step is to obtain a remote shell and then you can install a program to have remote desktop acess
How can you make this run every few minutes after running the exec.? So if you disconnect you don’t rely on the person running exe again.
Hi! If I Control the victim Pc, the victim Will notice, like we're using "TeamViewer"? Or they Will not notice?
Hey, is there any chance you have this script somewhere? We actually been doing things like reverse shell during school lectures, but this one is much much better.
Hi Mr. Yang, I'm have a long time searching a tutorial with the same idea, but focus on android devices infringement remotely, using a infected photo with a payload, and them sending it vía WhatsApp for example, can you make this?
Yes but how we can check if someone have even access to the network?
How can you make this run on startup?
That's some passive aggressive threats 😅😅😅
are all these tutorials done with zero security in place, no way they work in real environments even with default minimal security settings.. correct me if im wrong
j'ai dirai oui
I follow ur every video some time due to busy life I did not remember it
Please can you teach us how we can make an autorun usb that i can run attack if we plugin it ❤
@loi would you do the same but with port forwarding
That intro was 🔥 😂😂
Viewer Think: Exploit Code inside an Image
Reality: Powershell download an Image
hey some one in just hacked my WIFI is there any possible way i can see his screen
U are just so amazing...! 🤧 🤧
does this also work with mobile phones?
How do you get back a gmail account thats already been hacked and had the password changed?
Feel it
just a quick question ., when i have doje all that wiol i be able to control the other pc? and does it worl with phones?
You also have to find someone dumb enough to open the attachment. Beyond never opening any attachments that I have not verified by voice with the sender (only someone I have met IRL). Otherwise, if I had to open an attachment I didn't trust I guess I would do it in a virtual machine. I would download and scan it first rather than launch or run it from the browser.
Wait, so to be able to execute this, we first need to find someones open computer / laptop. Silently enter the cmd and remote connect to our hacking machine on their computer, without anyone noticing we are using someone else computer?
basically this is like social engineering attack, first you prep the jpg file embedded with the powershell script to download the 2 vnc file, then set up a listener at your kali machine and wait the user to open ther jpg file
@@jajabink100 Yea, but a nice social engineering video teaching us this would be cool. You know any?
You are. The must inspired in this platform 🎉🎉🎉🎉 🧑💻🧑💻🧑💻🧑💻🔥 loi ling yang thank you so much 🙏
Good day sir.
I need your help with something.
How can someone hack a laptop using Kali linux Without coming in contact with the laptop you want to hack?
What if you are connected to the same WiFi network?
Wait do they need to install the program too?
Loi Master, My main issue is this : the delivery method. the antivirus are shouting laudly that there is virus. can you make it more real world senario bypassing the gmail antivirus scan, etc ... ? thanks
Is that what kyc is for?
My friend got a virus on his pc and I cant go to his house to fix it , and he is not that smart to understand what im telling him, thanks for this tutorial😂❤
Good content keep it up 💪🎉
It even showed flights and me at airport 8 miles away while I'm home....bizarre. I caught several people who had access (recorded ) parked next to me while using my account n gsa app live communicate with drop box show name of the person in my map later to have the names removed....
bruh Ive just watched the first minutes of this video and I gotta say im subscribing now coz dude lol it was funny asf
Just a stupid question. How is it possible to connect to a Class C IP address remotely, when you are separeted by a WAN IP address on both sides?
It’s not stupid. You cannot connect to a class C IP address from WAN unless there’s a kind of port forwarding set up which at that point will be the gateway/firewall translating the port forward to the local Class C associated with the port forwarding settings.
@@Alayeluwa Thank you.
What id you plant a physical device like an SBC in the remote network and connect through that device into a remote class C network. Lile in the movie: "The Girl with the Dragon Tatoo."
@@clarencementor4862 It’s possible and I can see some malicious devices bypassing a stateful firewall, especially if that rogue device phones home first like some malware usually phone their C2.
On the other hand, you can always remote into a local network via the local network’s VPN account and talk to the local class addresses but most sensible network administrators will turn that feature off while creating VPN servers unless they are giving remote users access to a NAS storage; etc and that will only be the allowed on-premises resources the VPN accounts gets.
Thanks so much, your great sir