Bro Can You Please Tell Me that I Made A Payload Using Kali Linux And Github Its Working Perfect But Apter I Close The Linux My Payload Also Close Please Help Me
Yes it is except..as per hacking phases first step gaining access and next step Maintaining access (which is persistent) .. you will have access whenever you want.
Know your target. Do the research. Every target has different triggers which may compelled them to almost automatically hit the yes yes install buttons. I have always wondered how they've done things like Pegasus where you don't need to click anything... I wonder how that is done automatically just sending over the air installs with the cell phone company would be my guess that's how they do it. Or through just having the imie # snd email is all the government neeeds to control your device.
I have mentioned clearly you can use cloud or use Kali with any port forwarding techniques.. I did it in cloud to show how to use cloud can be used as Cybersecurity lab.
@@pberacademy thank you for clarification I have trouble understanding a lot of what you say with your accent. And I'm a total noob... With no formal education in computers or anything like that, Im learning on my own only with reading and video. It's a lot to take in. Every time i have a direct question answered it helps me very much. So thank you again and I have subscribed your channel.
Brother I know you're teaching some advanced stuff but I don't think you realize adding in all the extra web server hosting is just confusing newbies. That should be for later videos. Just show how to run on localhost and then branch out to web
Yes you are right it .. this is basic to give idea about hacking and beginners understand the concept … video is only for educational purposes and awareness…
Please Subscribe The Channel, Leave a feedback comment, if you like my videos help me grow the channel 😊
Eagerly waiting for this sir 😊
Glad to hear it
new here but love this way of explaning
Thank you
This Chanel very good sir 😊 I want this 😊
Thank you
ok thanks mr good Bisar is a great action, we are all waiting and we have a lot of urgency, thank you very much
I hope the purpose will be ethical and I don’t encourage illegal activity and I am making this video only for educational purposes.
how can i watch chapter 2, it's not in playlist....please tell sir
So sorry it is flagged and video got removed …
@@pberacademy will you upload it again...??🥲
Bro Can You Please Tell Me that I Made A Payload Using Kali Linux And Github Its Working Perfect But Apter I Close The Linux My Payload Also Close Please Help Me
Yes it is except..as per hacking phases first step gaining access and next step Maintaining access (which is persistent) .. you will have access whenever you want.
Bhai ye payloads letest device par work nahi karta like android 11,12,13, pe
To tum ne kispe kiya?
I Got One Problem Bro : When we click that link again it shows that we are offline coming back from chrome..?
Elborate your issue pls
can i use this on windows
Yes you can
If the chrome browser is closed after connection does that make our connection disconnected??
Yes it is
And Actually Bro Own Run Beef in wan network..?
Port forwarding or use reverse proxy
Bro where is the rat tool video
UA-cam flagged and removed 😔
UA-cam flagged and removed 😔
15:31 how many you can bro 😂
?
You should show the process of tricking a user to run apk and show you getting a shell on device! Much love 😊
I have told about social engineering technique for delivering and running apk .. more over this is an educational video
Know your target. Do the research. Every target has different triggers which may compelled them to almost automatically hit the yes yes install buttons. I have always wondered how they've done things like Pegasus where you don't need to click anything... I wonder how that is done automatically just sending over the air installs with the cell phone company would be my guess that's how they do it. Or through just having the imie # snd email is all the government neeeds to control your device.
You have the answer
İf i close this link, everythink ok ?
Yes it will
This working for ios and safari ?
yes
I don't understand what you need to use a cloud o can't you just run beef off your Linux machine
I have mentioned clearly you can use cloud or use Kali with any port forwarding techniques.. I did it in cloud to show how to use cloud can be used as
Cybersecurity lab.
@@pberacademy thank you for clarification I have trouble understanding a lot of what you say with your accent. And I'm a total noob... With no formal education in computers or anything like that, Im learning on my own only with reading and video. It's a lot to take in. Every time i have a direct question answered it helps me very much. So thank you again and I have subscribed your channel.
ngrok exposes ip address in link how to hide it ??
Use proxy chain
Brother I know you're teaching some advanced stuff but I don't think you realize adding in all the extra web server hosting is just confusing newbies. That should be for later videos. Just show how to run on localhost and then branch out to web
sure , I will try my best
This is not useful it's just basics 🤷
Yes you are right it .. this is basic to give idea about hacking and beginners understand the concept … video is only for educational purposes and awareness…