But you can do that when you have lan access means some public setup their public side of network as a only wan so when new devices join they can only access the internet not the lan(they separate out each to their own vlan) in that case you can't discover anything therefore no hack
This is a great foundational introduction to wi-fi security and the flaws therein, but the attacks do not account for client isolation. most modern, open wifi networks enable client isolation to prevent devices seeing and communicating with each other. Not to say there are not potentially ways around that, but this is far less likely to be successful than say a MITM attack using a rouge access point.
Most guest WiFi networks now do it right and have each host independent on their own network, those who run a guest on a full class C or better are just asking for trouble. Thanks to the cloud based vendors that have that option built in.
Nice video and probably useful too. Would be more useful If the pop-up message would show the login details and the IP-address the login-attempt came from.
Wow Mr Pro hacker Loi I really appreciate your service just continue with your great work I have started gaining more ethical hacking knowledge from you I even don't know how to appreciate you
So why exactly is it so dangerous to have public folder share on when connecting to a public wifi? In what way can someone enter me if they dont even have any of my info.
The king of brute forcing returns. Come on dude these are like decade old attacks at this point. How long is someone going to drink coffee for while you try and bruteforce them?
I've worked in cyber for 3 years. Never knew about the session manager. I guess I am usually doing EDR or SIEMs, but my home network has literally constantly been pwnd by asshole colleagues. I'm completely blue, barely know any red team, but I guess my native Windows defenses are absolute shit. I just switched to using hardened Linux distros but even then IDK wtf I'm doing. Seems nearly impossible to keep people out of my systems.
Bruhh Mr. Loi deleted my comment I was asking him if he could make video on how to remotely control any pc or mobile because the previous ones aren't working why mr. loi? why?
Well if it wasn't deleted it should be because it's a ridiculous question. Mobile. What mobile? iOS or android? Which version? Which vendor? Which pc? Control how? via backdoor or ssh? Your question wasn't answered because it's a waste of time.
This is not real. Doesn't seems to be real. I'm sorry for my noob explanation, i admit that i'm noob. I was afraid of this, so i tried to protect myself. I'm not expert. When i look at network, it's empty. So no one is connected, we have single network, and three computers in our family. So. it just doesn't really work what he is trying to do. All computers are hidden, masked. And i see that he is using smb. If user doesn't have smb enabled, how hacker will hack it? Reminds me of some ''hacking'' videos about remote connection. But if connection is not setup, no one can get through. Something doesn't fit lol For example even if i have password "password", then no one can hack it (only possible through windows vulnerability). They can do it only if i will enable remote connection, smb. Am i right or not?
Hi Sir I'm Ankur studying BCA Cloud And Security, I'm a self learner and I want to be a cyber security professional.. I have few doubts but there's none I can ask it to of you please reply me out would me nice🙏🏻
@@zielony1212hacking evolves bro like the hack that works today won’t work tomorrow, why do you think phones update or computers release patches it evolves meaning you will have to find a new way to exploit , google and Apple are paying heavy to anyone who can hack and exploit into their syestem i think google is paying 2 million
I've enabled the logins but I never got the understanding of how to fucking differentiate malicious logins from literally just my logins, because there's like 12 different types of logins and some are automated and recurrent so filtering is annoying as shit. I guess it's interactive remote you want to find, but I've also seen compromised systems that didn't have any apparent remote logins. This has always been a serious pain point for me, if anyone has any tips, I'd be much obliged.
Metasploit is a framework based on cve's, it's won't give you access unless it's vulnerable, there is no such a thing Like a command will give u access directly, most cases need other ways to gain access, metasploit doesn't have exploits for all cves so u have to look at it manually
@@الوقايةخيرمنالعلاج-ظ1ق there is so many possible ways ( keep in mind that results might not be expected) 1- recon: scanning your target with network mapping tools such as nmap, u see what ports are open , version running services in the targe, this will help you to identify if the target vulnerable to any cves. Also u need to search for target's operation system u might find any vulnerabilities 2- social engineering: simply u convince your target to install a malicious software U can use also MITM attacks sometimes it's useful
4:17 this snippet will be so great for my job. When we lose an IP of an industrial controller we are pretty much screwed and have to work with Serial Would u know how could this snippet be translated to Windows CMD commands, please?
chatgpt will probably know, I did it with other types of command conversions. something along the lines of "convert the following command to work on windows cmd: "
arp -a in cmd prompt on windows will do a similar aspect. Though I'm not sure how you would lose a controller IP. Something like that should always be on a static IP.
Mr Loi, thanks for the contents. I have a question 🤔 The power shell scripts that alerts you that there's or was an attack. Did you write it yourself or is it built into Windows?!
@@realcoolguy123 Hey Bud, yes i figured it out in the end that it was a powershell scripting. I followed pretty much what he had typed on the screen until the last 'OK' at the end which kept giving me an error message. Not sure what i did wrong! Also, i was unable to save my written power shell scripting because it kept coming up with an error message file not found!
I learn more in 10mins than any other teacher ever taught me
Note: the target should have SMB port open to get connection from SMBClient request
Yh it's actually open more often than not, especially with people that are not savvy in this kind of stuff
@@blackcircuit77 Yeah, but I still find some vulnerable computers in my college often and they run windows 7
In metasploit there is a module for smb bruteforce attack
@@superhacker1569 Obviously there will be a module for smb brute forcing and no, port 445 is not always open
@@darknode4791lol negative nancy here
Lol welcome to Windows 95 and Intro to Cable Modem hacking 😂
You forgot the part where you're supposed to print "Help! I'm stuck in the printer!"
But you can do that when you have lan access means some public setup their public side of network as a only wan so when new devices join they can only access the internet not the lan(they separate out each to their own vlan) in that case you can't discover anything therefore no hack
how can you say ?
@@ONEGOALONEJOURNEY you just run a simple nmap scan
This is a great foundational introduction to wi-fi security and the flaws therein, but the attacks do not account for client isolation. most modern, open wifi networks enable client isolation to prevent devices seeing and communicating with each other. Not to say there are not potentially ways around that, but this is far less likely to be successful than say a MITM attack using a rouge access point.
you use windowstyle -hidden in the scheduled task it should only show the pop up warning and not the powershell window too
Most guest WiFi networks now do it right and have each host independent on their own network, those who run a guest on a full class C or better are just asking for trouble. Thanks to the cloud based vendors that have that option built in.
we don't even need powershell
Just vbs will do the popup
x=msgbox("title",7,"message")
This was amazing and the steps were well described. Thank you thank you!!
Nice my Singaporean brother. Keep it up
Nice video and probably useful too. Would be more useful If the pop-up message would show the login details and the IP-address the login-attempt came from.
This was one of the coolest video of yours "Handsome Hacker Loi"!
What a cool man, Mr. Loi.
Great video, I really appreciate the effort that went into making it. Keep up the great work.
Would u want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @issamelhassnaoui221
I hate that the defensive way looks more complicated than the hacking way 😂
thank you so much, im currently learing and your videos help alot
Would u want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @gustavganz2646
Wow Mr Pro hacker Loi I really appreciate your service just continue with your great work I have started gaining more ethical hacking knowledge from you I even don't know how to appreciate you
Easy....simple..and brilliant ❤❤❤❤❤
learn more in 10 mins, sir can create video about AD pentest?
Cool. I'm gonna also create windows pop-up brute-force attack.
Thank you!
the last code was not fully shown kinda left me hanging
how to access MOBILE DEVICES connected to same network
Thank you mr. Hacker loi. i learned a lot
Hi whr can i get full course
I am using a virtual machine and using netdiscover command,
i'm not able to find any connected devices. What should I do?
First you should put your vm in "nat mode", because by default is isolated
@@darioabbece3948 it is already in NAT mode still not working
good videos, but try enlarging your text-erea for us to read when you type
So why exactly is it so dangerous to have public folder share on when connecting to a public wifi? In what way can someone enter me if they dont even have any of my info.
Does android have a way to check the session times like displayed in this video? :)
Does this work on networks we've visited or all networks yet?
Grate video sir. can i use the same method on a phone insted of computer
The king of brute forcing returns. Come on dude these are like decade old attacks at this point. How long is someone going to drink coffee for while you try and bruteforce them?
I've seen people sit the whole day
This man, you're a gr8 teacher
Would you want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @iyke4djakes
So how do you perité y yourself from this?
wow... I am big fan of yours... super cool you are
I've worked in cyber for 3 years. Never knew about the session manager. I guess I am usually doing EDR or SIEMs, but my home network has literally constantly been pwnd by asshole colleagues. I'm completely blue, barely know any red team, but I guess my native Windows defenses are absolute shit. I just switched to using hardened Linux distros but even then IDK wtf I'm doing. Seems nearly impossible to keep people out of my systems.
this is why we use vpn, in case cool video 😊
Can I use this to find all hidden Facebook accounts of devices connected to my home network or what would I use to do that
how do i do that with Mac OS ?
Bro, my victim's lap haven't any password, SO what should I need to enter when the password is required to enter when needed?
Bruhh Mr. Loi deleted my comment I was asking him if he could make video on how to remotely control any pc or mobile because the previous ones aren't working why mr. loi? why?
Well if it wasn't deleted it should be because it's a ridiculous question. Mobile. What mobile? iOS or android? Which version? Which vendor? Which pc? Control how? via backdoor or ssh? Your question wasn't answered because it's a waste of time.
@@camelotenglishtuition6394 no no if u have seen his previous video you would have understand me but u didn't so I don't hv anything to say sry
@SuccessfullAspects I wouldn't bother with his videos. If you really want to learn how to hack just sign up for hack the box and learn :) good luck
it was probably autodeleted
@@ftincel finally someone who thinks positive thanks
The legend is back.
This is not real. Doesn't seems to be real. I'm sorry for my noob explanation, i admit that i'm noob. I was afraid of this, so i tried to protect myself. I'm not expert. When i look at network, it's empty. So no one is connected, we have single network, and three computers in our family. So. it just doesn't really work what he is trying to do. All computers are hidden, masked. And i see that he is using smb. If user doesn't have smb enabled, how hacker will hack it? Reminds me of some ''hacking'' videos about remote connection. But if connection is not setup, no one can get through. Something doesn't fit lol
For example even if i have password "password", then no one can hack it (only possible through windows vulnerability). They can do it only if i will enable remote connection, smb. Am i right or not?
Hi Sir I'm Ankur studying BCA Cloud And Security, I'm a self learner and I want to be a cyber security professional.. I have few doubts but there's none I can ask it to of you please reply me out would me nice🙏🏻
What's your doubt?
You'll never get a response for this UA-camr. You'll have to figure it out on your own.
Yeah, he's making videos for the people stuck in 2010 lol.
Do u recommend any forums/channels for noob to begin with
What do you mean?
@@zielony1212hacking evolves bro like the hack that works today won’t work tomorrow, why do you think phones update or computers release patches it evolves meaning you will have to find a new way to exploit , google and Apple are paying heavy to anyone who can hack and exploit into their syestem i think google is paying 2 million
@@zielony1212 this is outdated stuff
thank you for tech information
Thanks Mr Loi
I've enabled the logins but I never got the understanding of how to fucking differentiate malicious logins from literally just my logins, because there's like 12 different types of logins and some are automated and recurrent so filtering is annoying as shit. I guess it's interactive remote you want to find, but I've also seen compromised systems that didn't have any apparent remote logins. This has always been a serious pain point for me, if anyone has any tips, I'd be much obliged.
What is your microphone name?
Would be nice to prevent brute force attack before it happens. Once they're in could be too late.
have a strong password that is highly unlikely to be brute forced
I never connected to free, unsecured wifi even before I studied/practiced cybersecurity lol it always sketched me out.
So you can’t do anything if they use a security key to sign in.
Nice one Loi
yo hacker loi;; could you show us some tutorials on abusing AD features XD
Informative ❤
Why don't use metasploit to gain access into the system connected with wireless I need a tutorial please
Metasploit is a framework based on cve's, it's won't give you access unless it's vulnerable, there is no such a thing Like a command will give u access directly, most cases need other ways to gain access, metasploit doesn't have exploits for all cves so u have to look at it manually
But how gain access into any device connected with my network???
@@الوقايةخيرمنالعلاج-ظ1ق there is so many possible ways ( keep in mind that results might not be expected)
1- recon: scanning your target with network mapping tools such as nmap, u see what ports are open , version running services in the targe, this will help you to identify if the target vulnerable to any cves. Also u need to search for target's operation system u might find any vulnerabilities
2- social engineering: simply u convince your target to install a malicious software
U can use also MITM attacks sometimes it's useful
How do you know your phone or your device is hack
Is there any way I can see my google account password? I am logged in but I don't remember the password! Any help please how to?? 🙏🙏🙏🙏
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
brother plx bring sigma hacker course and make us sigma hacker and handsome like you Plx . 🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺
How to do this on rooter android termux?
I don’t understand what did you do in the password part? You entered a password
I want to watch your members only vedio please
Your thumbnail remind me of 😮
I need your halp
Can't we start hacking on windows
I wonder how many sysadmins in my country know about this(windows doesn't have logon logging by default) 😅
I like Hacker Loi! :)
Mr loi with another weapon
Mr hacker loi Nice job
I just want to say that I was first. Have a nice day
Am ditching everyone, so I'll never again have a need for one cell phone 📱 phoneless
.
amazing i liked it
Thanks you my master
4:17 this snippet will be so great for my job. When we lose an IP of an industrial controller we are pretty much screwed and have to work with Serial
Would u know how could this snippet be translated to Windows CMD commands, please?
chatgpt will probably know, I did it with other types of command conversions.
something along the lines of "convert the following command to work on windows cmd: "
arp -a in cmd prompt on windows will do a similar aspect. Though I'm not sure how you would lose a controller IP. Something like that should always be on a static IP.
@@summoner2100 Its not so useful, you need to be in the same range and subnet
@@summoner2100 And how to not lose it, now that you need to say to our customers that provides them theyre spare ones lol
@Loi Liang Yang: Why are you moving away from hacking? :(
he is not. youtube is just a terrible service. and he cannot teach the super cool stuff. he tried many times but youtube punished him
not working on phone only pc to pc
I 'll let them ...know who's MR hacker loi 😂😂😂😂😂😂
Firsr one here mr loi😻
No I was
Mr Loi, thanks for the contents.
I have a question 🤔
The power shell scripts that alerts you that there's or was an attack. Did you write it yourself or is it built into Windows?!
He shows you at the end of the video. you have to write it yourself and then attach it to the task
@@realcoolguy123 Hey was it Python he used to write it ?
@@ao4514 No. It is a powershell script. So it is written in the powershell scripting language.
@@realcoolguy123 Hey Bud, yes i figured it out in the end that it was a powershell scripting.
I followed pretty much what he had typed on the screen until the last 'OK' at the end which kept giving me an error message.
Not sure what i did wrong!
Also, i was unable to save my written power shell scripting because it kept coming up with an error message file not found!
What!!😳
I want a help from you about recover Facebook page . Can you help sir?
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
@@EmmaJack-y6g useless
can we set to 100 times of wrong password input then send alert? since alert in one time is very annoying
You think this is easy?
Now I know Mr Hacker Loi's password
Do a video on crypto wallet hack
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
nice
awsome!!!!
Awessssssome Loi
awesome
17 secs ago pretty good vid
nine times out of ten it wasnt him
Help me sir. Please
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
i am hacking tell me bro pleam my dream big hacker ok please tell me
I can't believe I forgot to like 🤣 . Don't worry I alwasy like mr hackerloi videos!
P E R F E C T !
Hacking In Sweet
Hey can you reset my Gmail for me please ... ???
CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me
Anyone who
Learn hacking
most wifi in my area are ap isolated so i cant see them
VPN can bypass certain restrictions imposed by AP Isolation.
👌
❤