Pro Hacker Demonstrates hacking other devices in Free Public Wi-Fis

Поділитися
Вставка
  • Опубліковано 18 лис 2024

КОМЕНТАРІ •

  • @iyke4djakes
    @iyke4djakes Рік тому +34

    I learn more in 10mins than any other teacher ever taught me

  • @thelonejedi538
    @thelonejedi538 Рік тому +19

    Lol welcome to Windows 95 and Intro to Cable Modem hacking 😂
    You forgot the part where you're supposed to print "Help! I'm stuck in the printer!"

  • @darknode4791
    @darknode4791 Рік тому +78

    Note: the target should have SMB port open to get connection from SMBClient request

    • @blackcircuit77
      @blackcircuit77 Рік тому +2

      Yh it's actually open more often than not, especially with people that are not savvy in this kind of stuff

    • @darknode4791
      @darknode4791 Рік тому

      ​@@blackcircuit77 Yeah, but I still find some vulnerable computers in my college often and they run windows 7

    • @superhacker1569
      @superhacker1569 Рік тому +2

      In metasploit there is a module for smb bruteforce attack

    • @darknode4791
      @darknode4791 Рік тому +3

      @@superhacker1569 Obviously there will be a module for smb brute forcing and no, port 445 is not always open

    • @BopperNoStopper
      @BopperNoStopper Рік тому

      @@darknode4791lol negative nancy here

  • @summoner2100
    @summoner2100 Рік тому +8

    you use windowstyle -hidden in the scheduled task it should only show the pop up warning and not the powershell window too

  • @ankanroy2
    @ankanroy2 Рік тому +6

    But you can do that when you have lan access means some public setup their public side of network as a only wan so when new devices join they can only access the internet not the lan(they separate out each to their own vlan) in that case you can't discover anything therefore no hack

  • @cloughy010199
    @cloughy010199 11 місяців тому +2

    This is a great foundational introduction to wi-fi security and the flaws therein, but the attacks do not account for client isolation. most modern, open wifi networks enable client isolation to prevent devices seeing and communicating with each other. Not to say there are not potentially ways around that, but this is far less likely to be successful than say a MITM attack using a rouge access point.

  • @superhacker1569
    @superhacker1569 Рік тому +1

    we don't even need powershell
    Just vbs will do the popup
    x=msgbox("title",7,"message")

  • @Mister.BreadBoard
    @Mister.BreadBoard 10 місяців тому +2

    I hate that the defensive way looks more complicated than the hacking way 😂

  • @eddys.3524
    @eddys.3524 Рік тому +2

    Nice video and probably useful too. Would be more useful If the pop-up message would show the login details and the IP-address the login-attempt came from.

  • @IsaacMuriithi-n5q
    @IsaacMuriithi-n5q 4 місяці тому +3

    the last code was not fully shown kinda left me hanging

  • @74mada
    @74mada Рік тому +3

    What a cool man, Mr. Loi.

  • @pietasdium5109
    @pietasdium5109 Рік тому +4

    This was amazing and the steps were well described. Thank you thank you!!

  • @NikhilLingale
    @NikhilLingale Рік тому +3

    how to access MOBILE DEVICES connected to same network

  • @bhudson62305
    @bhudson62305 Місяць тому

    Most guest WiFi networks now do it right and have each host independent on their own network, those who run a guest on a full class C or better are just asking for trouble. Thanks to the cloud based vendors that have that option built in.

  • @WillSmith63957
    @WillSmith63957 Рік тому +2

    Nice my Singaporean brother. Keep it up

  • @V-I-sitors
    @V-I-sitors Рік тому

    This was one of the coolest video of yours "Handsome Hacker Loi"!

  • @trysked268
    @trysked268 10 місяців тому

    learn more in 10 mins, sir can create video about AD pentest?

  • @matthewlundall5262
    @matthewlundall5262 29 днів тому

    good videos, but try enlarging your text-erea for us to read when you type

  • @vilaco-e4s
    @vilaco-e4s 26 днів тому

    Cool. I'm gonna also create windows pop-up brute-force attack.
    Thank you!

  • @satishbonam
    @satishbonam Рік тому

    Hi whr can i get full course

  • @cat_fury
    @cat_fury Рік тому

    Does this work on networks we've visited or all networks yet?

  • @juniorsalfu5786
    @juniorsalfu5786 4 місяці тому

    Grate video sir. can i use the same method on a phone insted of computer

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 Рік тому +12

    The king of brute forcing returns. Come on dude these are like decade old attacks at this point. How long is someone going to drink coffee for while you try and bruteforce them?

  • @MathCuriousity
    @MathCuriousity Місяць тому

    So why exactly is it so dangerous to have public folder share on when connecting to a public wifi? In what way can someone enter me if they dont even have any of my info.

  • @zaccampa4055
    @zaccampa4055 3 місяці тому

    I never connected to free, unsecured wifi even before I studied/practiced cybersecurity lol it always sketched me out.

  • @DailyPaywithKristie
    @DailyPaywithKristie 18 днів тому

    Can I use this to find all hidden Facebook accounts of devices connected to my home network or what would I use to do that

  • @rogermailes4814
    @rogermailes4814 Рік тому

    Wow Mr Pro hacker Loi I really appreciate your service just continue with your great work I have started gaining more ethical hacking knowledge from you I even don't know how to appreciate you

  • @portman8909
    @portman8909 9 місяців тому

    So you can’t do anything if they use a security key to sign in.

  • @wsanchezjrhuskies
    @wsanchezjrhuskies 4 місяці тому

    So how do you perité y yourself from this?

  • @issamelhassnaoui221
    @issamelhassnaoui221 Рік тому +4

    Great video, I really appreciate the effort that went into making it. Keep up the great work.

    • @maraharris4065
      @maraharris4065 11 місяців тому

      Would u want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @issamelhassnaoui221

  • @Acez_editz
    @Acez_editz 6 місяців тому

    How do you know your phone or your device is hack

  • @LkmasafivgJhmiop
    @LkmasafivgJhmiop Рік тому +9

    Yeah, he's making videos for the people stuck in 2010 lol.

    • @KR1SR1GH7
      @KR1SR1GH7 9 місяців тому

      Do u recommend any forums/channels for noob to begin with

    • @zielony1212
      @zielony1212 8 місяців тому +1

      What do you mean?

    • @Blueice294
      @Blueice294 8 місяців тому

      @@zielony1212hacking evolves bro like the hack that works today won’t work tomorrow, why do you think phones update or computers release patches it evolves meaning you will have to find a new way to exploit , google and Apple are paying heavy to anyone who can hack and exploit into their syestem i think google is paying 2 million

    • @BARRY725
      @BARRY725 7 місяців тому +1

      ​@@zielony1212 this is outdated stuff

  • @sarveshband1683
    @sarveshband1683 Рік тому +1

    I am using a virtual machine and using netdiscover command,
    i'm not able to find any connected devices. What should I do?

    • @darioabbece3948
      @darioabbece3948 Рік тому +1

      First you should put your vm in "nat mode", because by default is isolated

    • @sarveshband1683
      @sarveshband1683 Рік тому

      @@darioabbece3948 it is already in NAT mode still not working

  • @LofiLounge369
    @LofiLounge369 4 місяці тому

    I don’t understand what did you do in the password part? You entered a password

  • @kristian6305
    @kristian6305 Рік тому

    Does android have a way to check the session times like displayed in this video? :)

  • @Sandeepa-z8e
    @Sandeepa-z8e 10 місяців тому

    Bro, my victim's lap haven't any password, SO what should I need to enter when the password is required to enter when needed?

  • @Arupsir-pz2xc
    @Arupsir-pz2xc Рік тому

    Can't we start hacking on windows

  • @ankurdas6095
    @ankurdas6095 Рік тому +1

    Hi Sir I'm Ankur studying BCA Cloud And Security, I'm a self learner and I want to be a cyber security professional.. I have few doubts but there's none I can ask it to of you please reply me out would me nice🙏🏻

    • @RS_Tej
      @RS_Tej Рік тому

      What's your doubt?

    • @victormanuelramirez2502
      @victormanuelramirez2502 Рік тому

      You'll never get a response for this UA-camr. You'll have to figure it out on your own.

  • @WindowsMalwareTesting
    @WindowsMalwareTesting Рік тому +1

    thank you so much, im currently learing and your videos help alot

    • @maraharris4065
      @maraharris4065 11 місяців тому

      Would u want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @gustavganz2646

  • @Mechta252
    @Mechta252 Рік тому +3

    This is not real. Doesn't seems to be real. I'm sorry for my noob explanation, i admit that i'm noob. I was afraid of this, so i tried to protect myself. I'm not expert. When i look at network, it's empty. So no one is connected, we have single network, and three computers in our family. So. it just doesn't really work what he is trying to do. All computers are hidden, masked. And i see that he is using smb. If user doesn't have smb enabled, how hacker will hack it? Reminds me of some ''hacking'' videos about remote connection. But if connection is not setup, no one can get through. Something doesn't fit lol
    For example even if i have password "password", then no one can hack it (only possible through windows vulnerability). They can do it only if i will enable remote connection, smb. Am i right or not?

  • @Free-Palestine.....
    @Free-Palestine..... Рік тому

    What is your microphone name?

  • @michaelromero3696
    @michaelromero3696 7 місяців тому

    how do i do that with Mac OS ?

  • @djnikx1
    @djnikx1 Рік тому +2

    Would be nice to prevent brute force attack before it happens. Once they're in could be too late.

    • @realcoolguy123
      @realcoolguy123 Рік тому +2

      have a strong password that is highly unlikely to be brute forced

  • @الوقايةخيرمنالعلاج-ظ1ق

    Why don't use metasploit to gain access into the system connected with wireless I need a tutorial please

    • @takashisclh8766
      @takashisclh8766 Рік тому +1

      Metasploit is a framework based on cve's, it's won't give you access unless it's vulnerable, there is no such a thing Like a command will give u access directly, most cases need other ways to gain access, metasploit doesn't have exploits for all cves so u have to look at it manually

    • @الوقايةخيرمنالعلاج-ظ1ق
      @الوقايةخيرمنالعلاج-ظ1ق Рік тому

      But how gain access into any device connected with my network???

    • @takashisclh8766
      @takashisclh8766 Рік тому

      @@الوقايةخيرمنالعلاج-ظ1ق there is so many possible ways ( keep in mind that results might not be expected)
      1- recon: scanning your target with network mapping tools such as nmap, u see what ports are open , version running services in the targe, this will help you to identify if the target vulnerable to any cves. Also u need to search for target's operation system u might find any vulnerabilities
      2- social engineering: simply u convince your target to install a malicious software
      U can use also MITM attacks sometimes it's useful

  • @dakota-rt8kd
    @dakota-rt8kd 3 місяці тому

    Am ditching everyone, so I'll never again have a need for one cell phone 📱 phoneless
    .

  • @iyke4djakes
    @iyke4djakes Рік тому

    This man, you're a gr8 teacher

    • @maraharris4065
      @maraharris4065 11 місяців тому

      Would you want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @iyke4djakes

  • @Dewa-s3i
    @Dewa-s3i 7 днів тому

    I've worked in cyber for 3 years. Never knew about the session manager. I guess I am usually doing EDR or SIEMs, but my home network has literally constantly been pwnd by asshole colleagues. I'm completely blue, barely know any red team, but I guess my native Windows defenses are absolute shit. I just switched to using hardened Linux distros but even then IDK wtf I'm doing. Seems nearly impossible to keep people out of my systems.

  • @superhacker1569
    @superhacker1569 Рік тому

    Easy....simple..and brilliant ❤❤❤❤❤

  • @iTACHi.pubg404
    @iTACHi.pubg404 Рік тому +2

    Bruhh Mr. Loi deleted my comment I was asking him if he could make video on how to remotely control any pc or mobile because the previous ones aren't working why mr. loi? why?

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 Рік тому +2

      Well if it wasn't deleted it should be because it's a ridiculous question. Mobile. What mobile? iOS or android? Which version? Which vendor? Which pc? Control how? via backdoor or ssh? Your question wasn't answered because it's a waste of time.

    • @iTACHi.pubg404
      @iTACHi.pubg404 Рік тому

      @@camelotenglishtuition6394 no no if u have seen his previous video you would have understand me but u didn't so I don't hv anything to say sry

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 Рік тому

      @SuccessfullAspects I wouldn't bother with his videos. If you really want to learn how to hack just sign up for hack the box and learn :) good luck

    • @ftincel
      @ftincel Рік тому

      it was probably autodeleted

    • @iTACHi.pubg404
      @iTACHi.pubg404 Рік тому +1

      @@ftincel finally someone who thinks positive thanks

  • @arifurrahman0014
    @arifurrahman0014 Рік тому +1

    I need your halp

  • @ehl3717
    @ehl3717 Рік тому

    How to do this on rooter android termux?

  • @duncanochieng2462
    @duncanochieng2462 Рік тому

    I wonder how many sysadmins in my country know about this(windows doesn't have logon logging by default) 😅

  • @Khan-i8k
    @Khan-i8k 26 днів тому

    not working on phone only pc to pc

  • @Muhammad_Abubakar.936.
    @Muhammad_Abubakar.936. Рік тому

    I want to watch your members only vedio please

  • @DyNaMiTe-369
    @DyNaMiTe-369 Рік тому

    brother plx bring sigma hacker course and make us sigma hacker and handsome like you Plx . 🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺

  • @katherinefiori
    @katherinefiori Рік тому

    Is there any way I can see my google account password? I am logged in but I don't remember the password! Any help please how to?? 🙏🙏🙏🙏

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

  • @demotedc0der
    @demotedc0der Рік тому +1

    yo hacker loi;; could you show us some tutorials on abusing AD features XD

  • @infinitybrutal
    @infinitybrutal Рік тому +1

    Mr loi with another weapon

  • @Dewa-s3i
    @Dewa-s3i 7 днів тому

    I've enabled the logins but I never got the understanding of how to fucking differentiate malicious logins from literally just my logins, because there's like 12 different types of logins and some are automated and recurrent so filtering is annoying as shit. I guess it's interactive remote you want to find, but I've also seen compromised systems that didn't have any apparent remote logins. This has always been a serious pain point for me, if anyone has any tips, I'd be much obliged.

  • @amongusboi2032
    @amongusboi2032 Рік тому

    The legend is back.

  • @Lidar957
    @Lidar957 Рік тому

    @Loi Liang Yang: Why are you moving away from hacking? :(

    • @sassywoocooo
      @sassywoocooo Рік тому +1

      he is not. youtube is just a terrible service. and he cannot teach the super cool stuff. he tried many times but youtube punished him

  • @mountainidler
    @mountainidler Рік тому

    can we set to 100 times of wrong password input then send alert? since alert in one time is very annoying

  • @Oxdan_Praduction
    @Oxdan_Praduction 3 місяці тому

    this is why we use vpn, in case cool video 😊

  • @thebetterwayalways
    @thebetterwayalways Рік тому

    wow... I am big fan of yours... super cool you are

  • @NobFella
    @NobFella Рік тому

    You think this is easy?

  • @ao4514
    @ao4514 Рік тому

    Mr Loi, thanks for the contents.
    I have a question 🤔
    The power shell scripts that alerts you that there's or was an attack. Did you write it yourself or is it built into Windows?!

    • @realcoolguy123
      @realcoolguy123 Рік тому

      He shows you at the end of the video. you have to write it yourself and then attach it to the task

    • @ao4514
      @ao4514 Рік тому

      @@realcoolguy123 Hey was it Python he used to write it ?

    • @realcoolguy123
      @realcoolguy123 Рік тому

      @@ao4514 No. It is a powershell script. So it is written in the powershell scripting language.

    • @ao4514
      @ao4514 Рік тому +1

      @@realcoolguy123 Hey Bud, yes i figured it out in the end that it was a powershell scripting.
      I followed pretty much what he had typed on the screen until the last 'OK' at the end which kept giving me an error message.
      Not sure what i did wrong!
      Also, i was unable to save my written power shell scripting because it kept coming up with an error message file not found!

  • @RafsanTheGeneral
    @RafsanTheGeneral Рік тому

    I want a help from you about recover Facebook page . Can you help sir?

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

    • @RafsanTheGeneral
      @RafsanTheGeneral Рік тому

      @@EmmaJack-y6g useless

  • @BongzandTakudzwa
    @BongzandTakudzwa Рік тому

    Thanks Mr Loi

  • @Kingmaybach1
    @Kingmaybach1 Рік тому

    Your thumbnail remind me of 😮

  • @prolificmack4545
    @prolificmack4545 Рік тому

    Now I know Mr Hacker Loi's password

  • @eagle990
    @eagle990 Рік тому

    I 'll let them ...know who's MR hacker loi 😂😂😂😂😂😂

  • @okwudilichimaobi7380
    @okwudilichimaobi7380 Рік тому

    Nice one Loi

  • @hassanazizi7456
    @hassanazizi7456 Рік тому

    thank you for tech information

  • @المنهجالسلفالصالحين

    Mr hacker loi Nice job

  • @kvotheosem-sangue
    @kvotheosem-sangue Рік тому

    4:17 this snippet will be so great for my job. When we lose an IP of an industrial controller we are pretty much screwed and have to work with Serial
    Would u know how could this snippet be translated to Windows CMD commands, please?

    • @galrozental3332
      @galrozental3332 Рік тому +1

      chatgpt will probably know, I did it with other types of command conversions.
      something along the lines of "convert the following command to work on windows cmd: "

    • @summoner2100
      @summoner2100 Рік тому +1

      arp -a in cmd prompt on windows will do a similar aspect. Though I'm not sure how you would lose a controller IP. Something like that should always be on a static IP.

    • @kvotheosem-sangue
      @kvotheosem-sangue Рік тому

      @@summoner2100 Its not so useful, you need to be in the same range and subnet

    • @kvotheosem-sangue
      @kvotheosem-sangue Рік тому

      @@summoner2100 And how to not lose it, now that you need to say to our customers that provides them theyre spare ones lol

  • @Musician_Robert
    @Musician_Robert Рік тому

    I like Hacker Loi! :)

  • @Andrea_Bassi
    @Andrea_Bassi Рік тому

    Admininstrator user is disabled by default

  • @ahmedshaikh3438
    @ahmedshaikh3438 Рік тому

    Teach me how to find people illegally remotely accessing my MacBook pro

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

  • @cerealpeer
    @cerealpeer Рік тому

    nine times out of ten it wasnt him

  • @drac.jr.247
    @drac.jr.247 Рік тому

    Thanks you my master

  • @HenryAyaya-jx7bi
    @HenryAyaya-jx7bi Рік тому +1

    What!!😳

  • @Radhasoamiji___1
    @Radhasoamiji___1 Рік тому

    Anyone who
    Learn hacking

  • @acegear
    @acegear Рік тому

    most wifi in my area are ap isolated so i cant see them

    • @shadowsalah1484
      @shadowsalah1484 Рік тому +2

      VPN can bypass certain restrictions imposed by AP Isolation.

  • @rootcode
    @rootcode Рік тому +1

    Informative ❤

  • @okwudilichimaobi7380
    @okwudilichimaobi7380 Рік тому

    Do a video on crypto wallet hack

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

  • @Mezzosd
    @Mezzosd Рік тому

    amazing i liked it

  • @Earnest1G
    @Earnest1G Рік тому

    I just want to say that I was first. Have a nice day

  • @lucianjohr5569
    @lucianjohr5569 Рік тому

    Awessssssome Loi

  • @itscharlie0110
    @itscharlie0110 Рік тому

    Cheese

  • @MrEmityushkin
    @MrEmityushkin Рік тому

    +Plus

  • @SandeepBiddika-hx7cd
    @SandeepBiddika-hx7cd Рік тому

    i am hacking tell me bro pleam my dream big hacker ok please tell me

  • @adimchiogamba1932
    @adimchiogamba1932 Рік тому

    Firsr one here mr loi😻

  • @japantonn
    @japantonn Рік тому

    17 secs ago pretty good vid

  • @Memes-ry7tp
    @Memes-ry7tp Рік тому +1

  • @EyoabWende-zl3fs
    @EyoabWende-zl3fs Рік тому

    pls pls help me?!!!

  • @trigger.3nin3
    @trigger.3nin3 4 місяці тому

    👌

  • @jasminflores677
    @jasminflores677 Рік тому

    Help me sir. Please

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

  • @ОптоваяТорговляАлматы

    P E R F E C T !

  • @aminsec
    @aminsec Рік тому

    nice

  • @timecop1983Two
    @timecop1983Two Рік тому

    I can't believe I forgot to like 🤣 . Don't worry I alwasy like mr hackerloi videos!