Pro Hacker Demonstrates hacking other devices in Free Public Wi-Fis

Поділитися
Вставка
  • Опубліковано 19 гру 2024

КОМЕНТАРІ • 183

  • @iyke4djakes
    @iyke4djakes Рік тому +38

    I learn more in 10mins than any other teacher ever taught me

  • @darknode4791
    @darknode4791 Рік тому +82

    Note: the target should have SMB port open to get connection from SMBClient request

    • @blackcircuit77
      @blackcircuit77 Рік тому +2

      Yh it's actually open more often than not, especially with people that are not savvy in this kind of stuff

    • @darknode4791
      @darknode4791 Рік тому

      ​@@blackcircuit77 Yeah, but I still find some vulnerable computers in my college often and they run windows 7

    • @superhacker1569
      @superhacker1569 Рік тому +2

      In metasploit there is a module for smb bruteforce attack

    • @darknode4791
      @darknode4791 Рік тому +3

      @@superhacker1569 Obviously there will be a module for smb brute forcing and no, port 445 is not always open

    • @BopperNoStopper
      @BopperNoStopper Рік тому

      @@darknode4791lol negative nancy here

  • @thelonejedi538
    @thelonejedi538 Рік тому +19

    Lol welcome to Windows 95 and Intro to Cable Modem hacking 😂
    You forgot the part where you're supposed to print "Help! I'm stuck in the printer!"

  • @ankanroy2
    @ankanroy2 Рік тому +6

    But you can do that when you have lan access means some public setup their public side of network as a only wan so when new devices join they can only access the internet not the lan(they separate out each to their own vlan) in that case you can't discover anything therefore no hack

  • @cloughy010199
    @cloughy010199 Рік тому +3

    This is a great foundational introduction to wi-fi security and the flaws therein, but the attacks do not account for client isolation. most modern, open wifi networks enable client isolation to prevent devices seeing and communicating with each other. Not to say there are not potentially ways around that, but this is far less likely to be successful than say a MITM attack using a rouge access point.

  • @summoner2100
    @summoner2100 Рік тому +8

    you use windowstyle -hidden in the scheduled task it should only show the pop up warning and not the powershell window too

  • @bhudson62305
    @bhudson62305 3 місяці тому +1

    Most guest WiFi networks now do it right and have each host independent on their own network, those who run a guest on a full class C or better are just asking for trouble. Thanks to the cloud based vendors that have that option built in.

  • @superhacker1569
    @superhacker1569 Рік тому +1

    we don't even need powershell
    Just vbs will do the popup
    x=msgbox("title",7,"message")

  • @pietasdium5109
    @pietasdium5109 Рік тому +4

    This was amazing and the steps were well described. Thank you thank you!!

  • @WillSmith63957
    @WillSmith63957 Рік тому +2

    Nice my Singaporean brother. Keep it up

  • @eddys.3524
    @eddys.3524 Рік тому +2

    Nice video and probably useful too. Would be more useful If the pop-up message would show the login details and the IP-address the login-attempt came from.

  • @V-I-sitors
    @V-I-sitors Рік тому

    This was one of the coolest video of yours "Handsome Hacker Loi"!

  • @74mada
    @74mada Рік тому +3

    What a cool man, Mr. Loi.

  • @issamelhassnaoui221
    @issamelhassnaoui221 Рік тому +4

    Great video, I really appreciate the effort that went into making it. Keep up the great work.

    • @maraharris4065
      @maraharris4065 Рік тому

      Would u want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @issamelhassnaoui221

  • @Mister.BreadBoard
    @Mister.BreadBoard 11 місяців тому +2

    I hate that the defensive way looks more complicated than the hacking way 😂

  • @WindowsMalwareTesting
    @WindowsMalwareTesting Рік тому +1

    thank you so much, im currently learing and your videos help alot

    • @maraharris4065
      @maraharris4065 Рік тому

      Would u want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @gustavganz2646

  • @rogermailes4814
    @rogermailes4814 Рік тому

    Wow Mr Pro hacker Loi I really appreciate your service just continue with your great work I have started gaining more ethical hacking knowledge from you I even don't know how to appreciate you

  • @superhacker1569
    @superhacker1569 Рік тому

    Easy....simple..and brilliant ❤❤❤❤❤

  • @trysked268
    @trysked268 11 місяців тому

    learn more in 10 mins, sir can create video about AD pentest?

  • @vilaco-e4s
    @vilaco-e4s Місяць тому

    Cool. I'm gonna also create windows pop-up brute-force attack.
    Thank you!

  • @IsaacMuriithi-n5q
    @IsaacMuriithi-n5q 5 місяців тому +3

    the last code was not fully shown kinda left me hanging

  • @NikhilLingale
    @NikhilLingale Рік тому +3

    how to access MOBILE DEVICES connected to same network

  • @ArnoldElano
    @ArnoldElano 28 днів тому

    Thank you mr. Hacker loi. i learned a lot

  • @satishbonam
    @satishbonam Рік тому

    Hi whr can i get full course

  • @sarveshband1683
    @sarveshband1683 Рік тому +1

    I am using a virtual machine and using netdiscover command,
    i'm not able to find any connected devices. What should I do?

    • @darioabbece3948
      @darioabbece3948 Рік тому +1

      First you should put your vm in "nat mode", because by default is isolated

    • @sarveshband1683
      @sarveshband1683 Рік тому

      @@darioabbece3948 it is already in NAT mode still not working

  • @matthewlundall5262
    @matthewlundall5262 2 місяці тому

    good videos, but try enlarging your text-erea for us to read when you type

  • @MathCuriousity
    @MathCuriousity 2 місяці тому

    So why exactly is it so dangerous to have public folder share on when connecting to a public wifi? In what way can someone enter me if they dont even have any of my info.

  • @kristian6305
    @kristian6305 Рік тому

    Does android have a way to check the session times like displayed in this video? :)

  • @cat_fury
    @cat_fury Рік тому

    Does this work on networks we've visited or all networks yet?

  • @juniorsalfu5786
    @juniorsalfu5786 5 місяців тому

    Grate video sir. can i use the same method on a phone insted of computer

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 Рік тому +12

    The king of brute forcing returns. Come on dude these are like decade old attacks at this point. How long is someone going to drink coffee for while you try and bruteforce them?

  • @iyke4djakes
    @iyke4djakes Рік тому

    This man, you're a gr8 teacher

    • @maraharris4065
      @maraharris4065 Рік тому

      Would you want to hack a website for me and I’ll pay up to 300? Don’t have time or patience to do this myself @iyke4djakes

  • @wsanchezjrhuskies
    @wsanchezjrhuskies 5 місяців тому

    So how do you perité y yourself from this?

  • @thebetterwayalways
    @thebetterwayalways Рік тому

    wow... I am big fan of yours... super cool you are

  • @Dewa-s3i
    @Dewa-s3i Місяць тому

    I've worked in cyber for 3 years. Never knew about the session manager. I guess I am usually doing EDR or SIEMs, but my home network has literally constantly been pwnd by asshole colleagues. I'm completely blue, barely know any red team, but I guess my native Windows defenses are absolute shit. I just switched to using hardened Linux distros but even then IDK wtf I'm doing. Seems nearly impossible to keep people out of my systems.

  • @Oxdan_Praduction
    @Oxdan_Praduction 4 місяці тому

    this is why we use vpn, in case cool video 😊

  • @DailyPaywithKristie
    @DailyPaywithKristie Місяць тому

    Can I use this to find all hidden Facebook accounts of devices connected to my home network or what would I use to do that

  • @michaelromero3696
    @michaelromero3696 8 місяців тому

    how do i do that with Mac OS ?

  • @Sandeepa-z8e
    @Sandeepa-z8e 11 місяців тому

    Bro, my victim's lap haven't any password, SO what should I need to enter when the password is required to enter when needed?

  • @iTACHi.pubg404
    @iTACHi.pubg404 Рік тому +2

    Bruhh Mr. Loi deleted my comment I was asking him if he could make video on how to remotely control any pc or mobile because the previous ones aren't working why mr. loi? why?

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 Рік тому +2

      Well if it wasn't deleted it should be because it's a ridiculous question. Mobile. What mobile? iOS or android? Which version? Which vendor? Which pc? Control how? via backdoor or ssh? Your question wasn't answered because it's a waste of time.

    • @iTACHi.pubg404
      @iTACHi.pubg404 Рік тому

      @@camelotenglishtuition6394 no no if u have seen his previous video you would have understand me but u didn't so I don't hv anything to say sry

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 Рік тому

      @SuccessfullAspects I wouldn't bother with his videos. If you really want to learn how to hack just sign up for hack the box and learn :) good luck

    • @ftincel
      @ftincel Рік тому

      it was probably autodeleted

    • @iTACHi.pubg404
      @iTACHi.pubg404 Рік тому +1

      @@ftincel finally someone who thinks positive thanks

  • @amongusboi2032
    @amongusboi2032 Рік тому

    The legend is back.

  • @Mechta252
    @Mechta252 Рік тому +3

    This is not real. Doesn't seems to be real. I'm sorry for my noob explanation, i admit that i'm noob. I was afraid of this, so i tried to protect myself. I'm not expert. When i look at network, it's empty. So no one is connected, we have single network, and three computers in our family. So. it just doesn't really work what he is trying to do. All computers are hidden, masked. And i see that he is using smb. If user doesn't have smb enabled, how hacker will hack it? Reminds me of some ''hacking'' videos about remote connection. But if connection is not setup, no one can get through. Something doesn't fit lol
    For example even if i have password "password", then no one can hack it (only possible through windows vulnerability). They can do it only if i will enable remote connection, smb. Am i right or not?

  • @ankurdas6095
    @ankurdas6095 Рік тому +1

    Hi Sir I'm Ankur studying BCA Cloud And Security, I'm a self learner and I want to be a cyber security professional.. I have few doubts but there's none I can ask it to of you please reply me out would me nice🙏🏻

    • @RS_Tej
      @RS_Tej Рік тому

      What's your doubt?

    • @victormanuelramirez2502
      @victormanuelramirez2502 Рік тому

      You'll never get a response for this UA-camr. You'll have to figure it out on your own.

  • @LkmasafivgJhmiop
    @LkmasafivgJhmiop Рік тому +9

    Yeah, he's making videos for the people stuck in 2010 lol.

    • @KR1SR1GH7
      @KR1SR1GH7 10 місяців тому

      Do u recommend any forums/channels for noob to begin with

    • @zielony1212
      @zielony1212 9 місяців тому +1

      What do you mean?

    • @Blueice294
      @Blueice294 9 місяців тому

      @@zielony1212hacking evolves bro like the hack that works today won’t work tomorrow, why do you think phones update or computers release patches it evolves meaning you will have to find a new way to exploit , google and Apple are paying heavy to anyone who can hack and exploit into their syestem i think google is paying 2 million

    • @BARRY725
      @BARRY725 8 місяців тому +1

      ​@@zielony1212 this is outdated stuff

  • @hassanazizi7456
    @hassanazizi7456 Рік тому

    thank you for tech information

  • @BongzandTakudzwa
    @BongzandTakudzwa Рік тому

    Thanks Mr Loi

  • @Dewa-s3i
    @Dewa-s3i Місяць тому

    I've enabled the logins but I never got the understanding of how to fucking differentiate malicious logins from literally just my logins, because there's like 12 different types of logins and some are automated and recurrent so filtering is annoying as shit. I guess it's interactive remote you want to find, but I've also seen compromised systems that didn't have any apparent remote logins. This has always been a serious pain point for me, if anyone has any tips, I'd be much obliged.

  • @Free-Palestine.....
    @Free-Palestine..... Рік тому

    What is your microphone name?

  • @djnikx1
    @djnikx1 Рік тому +2

    Would be nice to prevent brute force attack before it happens. Once they're in could be too late.

    • @realcoolguy123
      @realcoolguy123 Рік тому +2

      have a strong password that is highly unlikely to be brute forced

  • @zaccampa4055
    @zaccampa4055 4 місяці тому

    I never connected to free, unsecured wifi even before I studied/practiced cybersecurity lol it always sketched me out.

  • @portman8909
    @portman8909 10 місяців тому

    So you can’t do anything if they use a security key to sign in.

  • @okwudilichimaobi7380
    @okwudilichimaobi7380 Рік тому

    Nice one Loi

  • @demotedc0der
    @demotedc0der Рік тому +1

    yo hacker loi;; could you show us some tutorials on abusing AD features XD

  • @rootcode
    @rootcode Рік тому +1

    Informative ❤

  • @الوقايةخيرمنالعلاج-ظ1ق

    Why don't use metasploit to gain access into the system connected with wireless I need a tutorial please

    • @takashisclh8766
      @takashisclh8766 Рік тому +1

      Metasploit is a framework based on cve's, it's won't give you access unless it's vulnerable, there is no such a thing Like a command will give u access directly, most cases need other ways to gain access, metasploit doesn't have exploits for all cves so u have to look at it manually

    • @الوقايةخيرمنالعلاج-ظ1ق
      @الوقايةخيرمنالعلاج-ظ1ق Рік тому

      But how gain access into any device connected with my network???

    • @takashisclh8766
      @takashisclh8766 Рік тому

      @@الوقايةخيرمنالعلاج-ظ1ق there is so many possible ways ( keep in mind that results might not be expected)
      1- recon: scanning your target with network mapping tools such as nmap, u see what ports are open , version running services in the targe, this will help you to identify if the target vulnerable to any cves. Also u need to search for target's operation system u might find any vulnerabilities
      2- social engineering: simply u convince your target to install a malicious software
      U can use also MITM attacks sometimes it's useful

  • @Acez_editz
    @Acez_editz 7 місяців тому

    How do you know your phone or your device is hack

  • @katherinefiori
    @katherinefiori Рік тому

    Is there any way I can see my google account password? I am logged in but I don't remember the password! Any help please how to?? 🙏🙏🙏🙏

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

  • @DyNaMiTe-369
    @DyNaMiTe-369 Рік тому

    brother plx bring sigma hacker course and make us sigma hacker and handsome like you Plx . 🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺

  • @ehl3717
    @ehl3717 Рік тому

    How to do this on rooter android termux?

  • @LofiLounge369
    @LofiLounge369 5 місяців тому

    I don’t understand what did you do in the password part? You entered a password

  • @Muhammad_Abubakar.936.
    @Muhammad_Abubakar.936. Рік тому

    I want to watch your members only vedio please

  • @Kingmaybach1
    @Kingmaybach1 Рік тому

    Your thumbnail remind me of 😮

  • @arifurrahman0014
    @arifurrahman0014 Рік тому +1

    I need your halp

  • @Arupsir-pz2xc
    @Arupsir-pz2xc Рік тому

    Can't we start hacking on windows

  • @duncanochieng2462
    @duncanochieng2462 Рік тому

    I wonder how many sysadmins in my country know about this(windows doesn't have logon logging by default) 😅

  • @Musician_Robert
    @Musician_Robert Рік тому

    I like Hacker Loi! :)

  • @infinitybrutal
    @infinitybrutal Рік тому +1

    Mr loi with another weapon

  • @المنهجالسلفالصالحين

    Mr hacker loi Nice job

  • @Earnest1G
    @Earnest1G Рік тому

    I just want to say that I was first. Have a nice day

  • @dakota-rt8kd
    @dakota-rt8kd 4 місяці тому

    Am ditching everyone, so I'll never again have a need for one cell phone 📱 phoneless
    .

  • @Mezzosd
    @Mezzosd Рік тому

    amazing i liked it

  • @drac.jr.247
    @drac.jr.247 Рік тому

    Thanks you my master

  • @kvotheosem-sangue
    @kvotheosem-sangue Рік тому

    4:17 this snippet will be so great for my job. When we lose an IP of an industrial controller we are pretty much screwed and have to work with Serial
    Would u know how could this snippet be translated to Windows CMD commands, please?

    • @galrozental3332
      @galrozental3332 Рік тому +1

      chatgpt will probably know, I did it with other types of command conversions.
      something along the lines of "convert the following command to work on windows cmd: "

    • @summoner2100
      @summoner2100 Рік тому +1

      arp -a in cmd prompt on windows will do a similar aspect. Though I'm not sure how you would lose a controller IP. Something like that should always be on a static IP.

    • @kvotheosem-sangue
      @kvotheosem-sangue Рік тому

      @@summoner2100 Its not so useful, you need to be in the same range and subnet

    • @kvotheosem-sangue
      @kvotheosem-sangue Рік тому

      @@summoner2100 And how to not lose it, now that you need to say to our customers that provides them theyre spare ones lol

  • @Lidar957
    @Lidar957 Рік тому

    @Loi Liang Yang: Why are you moving away from hacking? :(

    • @sassywoocooo
      @sassywoocooo Рік тому +1

      he is not. youtube is just a terrible service. and he cannot teach the super cool stuff. he tried many times but youtube punished him

  • @Khan-i8k
    @Khan-i8k Місяць тому

    not working on phone only pc to pc

  • @eagle990
    @eagle990 Рік тому

    I 'll let them ...know who's MR hacker loi 😂😂😂😂😂😂

  • @adimchiogamba1932
    @adimchiogamba1932 Рік тому

    Firsr one here mr loi😻

  • @ao4514
    @ao4514 Рік тому

    Mr Loi, thanks for the contents.
    I have a question 🤔
    The power shell scripts that alerts you that there's or was an attack. Did you write it yourself or is it built into Windows?!

    • @realcoolguy123
      @realcoolguy123 Рік тому

      He shows you at the end of the video. you have to write it yourself and then attach it to the task

    • @ao4514
      @ao4514 Рік тому

      @@realcoolguy123 Hey was it Python he used to write it ?

    • @realcoolguy123
      @realcoolguy123 Рік тому

      @@ao4514 No. It is a powershell script. So it is written in the powershell scripting language.

    • @ao4514
      @ao4514 Рік тому +1

      @@realcoolguy123 Hey Bud, yes i figured it out in the end that it was a powershell scripting.
      I followed pretty much what he had typed on the screen until the last 'OK' at the end which kept giving me an error message.
      Not sure what i did wrong!
      Also, i was unable to save my written power shell scripting because it kept coming up with an error message file not found!

  • @HenryAyaya-jx7bi
    @HenryAyaya-jx7bi Рік тому +1

    What!!😳

  • @RafsanTheGeneral
    @RafsanTheGeneral Рік тому

    I want a help from you about recover Facebook page . Can you help sir?

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

    • @RafsanTheGeneral
      @RafsanTheGeneral Рік тому

      @@EmmaJack-y6g useless

  • @mountainidler
    @mountainidler Рік тому

    can we set to 100 times of wrong password input then send alert? since alert in one time is very annoying

  • @NobFella
    @NobFella Рік тому

    You think this is easy?

  • @prolificmack4545
    @prolificmack4545 Рік тому

    Now I know Mr Hacker Loi's password

  • @okwudilichimaobi7380
    @okwudilichimaobi7380 Рік тому

    Do a video on crypto wallet hack

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

  • @aminsec
    @aminsec Рік тому

    nice

  • @polatatafu2642
    @polatatafu2642 Рік тому

    awsome!!!!

  • @lucianjohr5569
    @lucianjohr5569 Рік тому

    Awessssssome Loi

  • @cornonthecob4204
    @cornonthecob4204 Рік тому

    awesome

  • @japantonn
    @japantonn Рік тому

    17 secs ago pretty good vid

  • @cerealpeer
    @cerealpeer Рік тому

    nine times out of ten it wasnt him

  • @jasminflores677
    @jasminflores677 Рік тому

    Help me sir. Please

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

  • @SandeepBiddika-hx7cd
    @SandeepBiddika-hx7cd Рік тому

    i am hacking tell me bro pleam my dream big hacker ok please tell me

  • @timecop1983Two
    @timecop1983Two Рік тому

    I can't believe I forgot to like 🤣 . Don't worry I alwasy like mr hackerloi videos!

  • @ОптоваяТорговляАлматы

    P E R F E C T !

  • @Alphakoromakoroma
    @Alphakoromakoroma 18 днів тому

    Hacking In Sweet

  • @1AmbrellaProductionzInk
    @1AmbrellaProductionzInk Рік тому

    Hey can you reset my Gmail for me please ... ???

    • @EmmaJack-y6g
      @EmmaJack-y6g Рік тому

      CYBERDIGITALHELPDESK I'm happy right now for the service rendered he did a great job for me

  • @Radhasoamiji___1
    @Radhasoamiji___1 Рік тому

    Anyone who
    Learn hacking

  • @acegear
    @acegear Рік тому

    most wifi in my area are ap isolated so i cant see them

    • @shadowsalah1484
      @shadowsalah1484 Рік тому +2

      VPN can bypass certain restrictions imposed by AP Isolation.

  • @trigger.3nin3
    @trigger.3nin3 5 місяців тому

    👌

  • @Memes-ry7tp
    @Memes-ry7tp Рік тому +1