Linux serverlinux web serverNETWORK ADMINISTRATIONS

Remotely Control Any PCs with this FREE software!

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

source

by Loi Liang Yang

linux http server

42 thoughts on “Remotely Control Any PCs with this FREE software!

  • I love your channel, thanks. I would love to have your knowledge to deal with the pshycho s im dealing daily they feel god 😢

  • Long process and it will never work in real life hacking we need a quick and active method

  • i just came here to like the video and watch the add becuz Loi is awesome ya'll god why cant i be this smart cryyyy

  • It was all great till I heard bruteforce…😢It's highly unrealistic and unlikely. Perhaps I'll return to this conversation with a name of the necessary tool to create your bruteforce password list that is more relevant and likely. It takes the target's social media data , birthdays, friends, loved ones and creates many possible passwords that are not as easy.

  • Please do a tutorial on how to install armitage and metasploit on Windows

  • hey fbi, i am watching this only for educational purposes and for curiosity.

  • I wanna know this: is kali linux can run in a mobile phone as main OS if it is plz teach us how to do

  • Where can i download Kali, need a serious link, can you send it to me, please?

  • hello loi sir can you make video how youtuber reverse connection on scammer and expose them please make video how they excess scammer pc sir

  • but when the victim install the file they will not let to go in what can i do

  • make something new … your every vidoes is approximatily on remotily control

  • Hii bro i am Harish from Chennai , i am a great fan of your work bro , Bro i am recently getting into some cyber security stuff like hacking and cryptography like that so i use my kali in virtual box , The problem is we can't connect wifi to our virtual box so i decided to buy a wifi adaptor to connect to wifi network and it help me to do some pentesting but the real problem came here when i try to connect my wifi adaptor to kali my wifi is not scanning any nearby devices, i have installed all my drivers and configured but still my wifi adaptor not scanning any nearby devices , i have try many times but still i can't get why this problem occurs kindly consider this message and make me a solution for this bro thank you ( i am using TP link t2u plus AC600 wifi adaptor)

  • This would never work on a random computer, if i were to do this to someone trying to remote into my computer, how would I know the RDP username and password? Bruteforcing is not enough, many people don't have those passwords

  • to the unfamiliar/unpractised the effect is like watching a magician do a card trick. brief explainers and performed at pace. not much gained

  • Thank you Mr Loi Liang Yang aka Hacker Loi. You are the king of ethical hacking (EH), cyber security education & YouTube EH tutorials. ☘️ ☘️ ☘️ 👽 👽 👽 🦎🦎🦎

  • My phone hacked like pygasus software and backdoor मैं उससे पता नही लगा पा रहा हु आप कुछ बताए

  • Thanks for the content, but I guess the target is gonna be suspicious of the pop-ups and all the permissions granting and all that….
    Is there anyway it can be done without it triggering any suspicion to the target and could it be done on the WAN?

  • Can this remotely different network environment? seems like only same LAN then can happen right?

  • Podria hacer un vídeo como obtener la ip real cuando una web usa Clouflare?

Comments are closed.