Remotely Control Any Phone and PC with this Free tool!
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
I'm DCAing in Metaspyclub as well. ETH heavier DCA and ALGO. I'm taking your advice and starting Google tomorrow with a 50 dollar purchase and continuing Microsoft and Apple. VTI and VOO on another app and longterm portfolio. Here we go family!
ok will try
it works thnks
What side are you on as Metaspyclub divides the wealthy from the poor?
ok will try
it works thnks
Love the Metaspyclub content. I think this project is just as essential as HBAR and they both will be great movers
Metaspyclub trajectory is fascinating. Share your insights!
it's work for local who connected on the same wifi or from outside too by opening a port
Mr Loi thank you for making these excellent educational EH tutorials. I’m studying the CompTIA Security+ as part of the PGP-CEH. I find your EH video tutorials a great help & insight into how to learn & use these EH tools. Best wishes.
hello @Nerzhina please can I get your email address?
sir, very thanks for teaching us soo many intresting ethical hacking topics to us . now we are able controll , acsess, pcs with soo much knowledge becauseof you sir so thank you sir, uday kumar
Probably the most interesting question is how to cover your tracks or not be noticed at all, even after a forensic investigation.
Impossible
@@ashsharp1985 bro do you know how to get rid of such hacker in your devices?
Do it. Metaspyclub already in my bags. I had a Metaspyclub after ( your should I buy ) and I agreed and bought. I'm looking to stack more, too.
ok will try
it works thnks
this is really valuable, I think this is what scambaiting channels use to reverse connection
Thanks for teaching us all about hacking! 🙂
you are best of this domain thanks
Love your video!!! When trying to connect to a iphone what code is used? Do I have to be on the same network?
You are so funny, I'm a beginner but I enjoy learning from you
Haha Mr Loi is so funny..Love the way you explain sir. Thanks.
Good morning Definitely I learned very useful today. Maybe I learned two semesters ahead on computer network class. Thank you for your excellent video Cesar
thanks bro its nicely explainec you got a new subscriber
Awsome tutorial, thanks
Are you going to be attending Defcon this year? I missed the last couple due to Covid. It seems like this year it's not going to be at Caesars. It's going to be at the convention center as far as I can tell.
Love your videos Mr. Hacker Loi❤
Mate your a legend you’ve made me into a Hacker over the years Thank you bro 😂❤ I love it lol
Absolutely valuable. Thank you.
Whenever I watch your videos, I feel like I am still in 2010 or earlier :D. Thanks for making me to remember those days 🤣🤣🤣🤣
was easier back then but this still works if you know active recon using tools like shogun, google dorks etc... you can hate but this guide is still useful for learning.
A true fan is always on time
ye right
@@twoface1192❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤
True 😁
time on always is fan true A
Or you can just watch whenever
Awesome tutorial of Armitage Loi!
Thank you for another great video! No dancing around points or wasting time for ++content. Always getting right to the meat of what we clicked to see. This man’s ability to dump very detailed and thorough information in what many consider “rushed” or fast paced video is truly amazing. It seems wrong to even refer to it as a skill. Anyways.. I’ll be sure to use this for connecting to and testing my personal devices 😁 Thanks again 🙏🏽
Always engaging some other guys can be a little robotic in presentation u keep it interesting to absorb the information. My S9 has been rooted full factory reset will not clear it properly do u know a simple way a newbie like me can re-flash my device & stop this dude breaking in any pointers would b helpful cheers. I got the same problem with Brand new I phone 14 pro which I think is loading pegasus via the update to do with licence agreement(sneaky) when u set the phone up some dude has full hidden admin, the phone is clean my end no accounts nothing on it Cheers🤓
Thank you Loi ❤
Doing a good job is not always about impressive innovation. Sometimes it is only about doing something with plain dedication. Well done *Usespy.* This message is to recognize your contribution related to hacking. Your commitment has been exemplary and your hard work is an inspiration to everyone around you.
@@breannabryant2697no his a dummy
Thanks dude you a good man for sharing. *usespy* is indeed legit.
Thank you, this information is very helpful.
Please can you do a video to introduce tools like hydra ?
i Like your videos and your Skills you have a dreamy talent i cant undersatand well but i watch you all videos i wish and dream to have some skills like you💖
HEY LOI Your COURSES ARE COOL
Thank you Mr Loi Liang Yang for everything you're doing for us!!!
great video. im proud to be your student
thank u sir, Ill try it out
Beautifully explained, thanks Mr loi
I am an ameter and I would like an explanation: what is the name of that tool and is it in linux or is it installed separately
@@user-xt4yv4hh2zno his got no idea his a dummy
I'm so crazy over you..I bought all your courses and this video is a blast
I have zero knowledge on ethical hacking but I am interested in bug bounty and networking can I buy his course?
@@quezinmark8225 dont do that . all ethical hacking knowlege is available online for free. paying for it is a scam . doing research is a big part of hacking so if you cant even look up how to learn and end up getting scammed by youtubers maybe it isnt for you yet
@@quezinmark8225hack the box is a good platform to practice
@@quezinmark8225go and learn about advance networking first then u come to CEH
can u share it with me
Hoped for a open source Team Viewer alternative and this guy explains to me how to use exploits to attack clients on a network.
Very nice but for mobile payload you need Social engineering to convince the victom to by pass warninig message when setup the payload
You need a RAT and those require work or finding the right tool. No RAT (Remote Administration Tool), no joy unless the target is not the sharpest pencil....
Great content as always!! What was the Android software you used to test on? I want to setup an environment for following!
The world's best teacher thanks
I would like to see you do something on targeting spam mail. So I can track where it's coming from and put it to a stop. I hate to lose one of my good email addresses it keeps on getting hit.
I love how you say “Hosts” 😂😂😂
As expected hats off to you Mr. Hacker loi ❤
But u need to be in the same network and if someone have security like bothnet security like firewall in eset smart security premium i think u cant i didnt try it but i will try into my pc from my vps
u got my sub the second u said when u try to hack me... i love this guy!
I have been checking your work, thanks alot for sharing your knowledge. Have a good one!
Always on point!! Thank you Mr Loi Liang 👏🏿👏🏾👏🏽👏🏻👏🏽👏🏾👏🏿
Thought this was just going to be script kiddie lessons. I will try this after some of my CyberCert exam concepts as a lab. So Armitage is yet another UI for metasploit?
Like kage
Good presentation 🎉
Can this be ran on twisteros thro sudo ?
use to used this tool since backtrack 5r3
thats amazing man
I have to thank you for your work... you show how easy it is to have access to a system... and how someone should learn from your videos... how to be safe that is...lol
Windows 10 Pro 14393 is at least 7 years old there have been 11 new versions up to 22H2. This would be more interesting if you took a version of 2023 instead of 2016.
My feelings exactly. I got excited when I saw the video but then I saw the thumbnail and knew it was Armitage but hoped it would be something new for late stage win10 to early win11. Great video and explains what you need to know though, so that's what really counts and I give props for this one.
If he did that it wouldn’t work so that’s why he didn’t I guess
So are you saying this would only work on outdated systems? also would this method work for macs? or are macs a lot harder to hack?@@hardscope7744
Run Linux from a USB, not from inside Windows.
And can we use it for outside of our networks
You are a genius
you are really smart, prepared and clear when you explain things, congratulations
newbies, it won't work for you because he has his environments setup so that msfconsole is working. chances are your computer is patched/updated which is why you don't have any vulnerabilities. doesnt work in the real world due to MS updates
Thank goodness.
hey i love this i wish i could learn it all
*Usespy* , you're one of my favorite people on this planet.. (And I don't even know you personally). The way in which you present your work, the content and the access is just awesome. Thank you!! This project is unbelievably amazing and thanks....
introduction 0:00 "if you get caught hacking don't tell them you know who is mr.hacker loi" explaination 1:18 into the kali machine 1:58 "you need a computer to run this, without computer the tutorial ends here." Game over 14:50 "BOOM!" Conclusion 17:12
Thanks! Nice, "GAME OVER". hehe
So many people do it that you're not likely to be caught on the same day unless you admit to doing it. Just like doxxing, DDOSing and pirating media.
Thanks sir, learn something new
and please for the sestym Android it's work for who have version 11 or more of android on phone ?
Nicely done. Thanks for sharing
Whoa that's scary. If it's that easy, then what's stopping an average user from trying it? The only reason I watched this video is so that I can know what is really happening. Now I know what's happening. So now please give me a solution. Or at least guide me towards one! good work, good informative video. P.s. Also, how can I know what vulnerabilities my operating system has? Is there a tool or something to check it? You mentioned you're an ethical hacker. Have you informed Microsoft already about these? Did they release a patch yet?
😂you think the average person would even try?? Lol
Even for the recognition *Johnsonspy* gets, his skills is so underrated at least by most tech fans in general.I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive.
@@user-xt4yv4hh2zno its a dummy
@@elenaalice4391 no its a dummy
I never subscribed to your channel, but still, it's subscribed. Are you controlling my phone?
Great Video , next question how do i /we know if some one is doing this to my computer (how to detect)
Exactly.
dude crazy do more tutorials on this
Thank you Mr handsome hacker 😅 this is so powerful tool 😈
what release is this best working on?
hi,i just came across this.i can see this causing more havoc than good...maybe im wrong..few questions(only if you dont mind) ..when control is gained..can you also upload files onto the hacked device?and what footprint than those files create?if any?i.e: if this happens can anyone tell for sure that those files were hacked and uploaded from a hackers device?..thanks if you can answer..good video..peace
I like to think that the people that are intelligent enough to watch this video don't need clickbait thumbnails to know they want to watch it
what flavour do you use
From South Africa I'm saying Hiii to y'all
wow you are too much sir that's what we say here in Africa meaning you are absolutely a genius
What an excellent tool. How i missed this i dont know. Thank you for the video. Youve more than earned my measly sub
Thank you. Useful and valuable
Okay so i have question mr loi liang What If my target is outside my local network?
Beautifully explained, I have a question, we cannot hack devices that are not on the same network (same server)
@@CYBERSECURITY.101 can you hack any device even those aren't connected to the same network with this tool?
WoW Amazing .. Which kind of operating system use for this tool ?
Kali Linux
do this also work on laptop? and could this be transferred into a phone device?
The best channel that simply explains this field, thank from Palestine 🥰🥰
Free israel
F**e israel@@Herobrinepvper
FREE PALESTINE
@@SpreadIslam21 FREE ISRAEL
how is israel not free ? does this n4zi substrat that is this lie have to kill every palestinian they stole the houses from to finally "feel" "free"... and stop killing children ? @@Herobrinepvper
This is a good video, 👍🏼
Do you have to be connected to the same network as these devices to be able to find them?
Very useful info to know how to better secure endpoints in a network. Great tutorial!
does this work on a local network or WAN?
Big hello from Syria ❤
which curse is best for a beginner ?
Thank you teacher a lot of
Does subnetting circumvent these types of attacks
Wow. This video is really helpful.
Is it possible to access any application's data from the hacked device
Why should you hack Loi, when you can be his friend? He has as much space on his desktop as my teacher. Cool vid Loi.
HEY DUDE! WHAT SAFE GUARDS CAN WE SETUP ON THE DEVICE TO KEEP IT OUT, FIREWALL? WHAT?
Armitage could not connect to database.. armitage is not compatable with current metasploit. please share some solution if possible.
Thank You
Wow I love it Mr. Hacker Loi