HACKERLOI.pdf

preview_player
Показать описание
// Membership //

// Courses //

// Books //

// Social Links //

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Рекомендации по теме
Комментарии
Автор

Ay yes, now I can send my "Home work" to my teacher.

faceitlevel
Автор

This is really scary.. Thank you for spreading such amazing knowledge.

rahulprajapati
Автор

i love the simplicity of your tutorials, keep going !

abdeslam_blc
Автор

My favorite channel! Thank you Loi Liang Yang!

Osman.B
Автор

There’s is few of questions I need to ask you which can a iPhone be used to do ethical hacking using ISH or etc? What about even a Chromebook tablet? Also how can someone get data from the air?


Also forgot to ask is it possible for someone with ADHD to become one of the best hackers? Currently struggling honestly even trying to make decent living but not giving up hope yet. Thanks I feel like your the best person to answer this honestly and one of my favorite teachers here on YouTube.

ninjaassassin
Автор

mr loi you are really genius,
love your content and ur way of simplifying the information

abd-elrahmanmahmoud
Автор

Mr. Loi you have amazing brain and amazing way to learn us how we do it, THANK YOU.

DXWRATH
Автор

well.. 5:01 is the most important part. If you read WHAT you are opening there you will be just fine. Also, if you have the file in any other directory (in this case) you would not be trapped in a TCP reverse shell would you?

Suneeh
Автор

Mr. Loi, i love this channel can you make a full explanation of how to use CVSS in every type of metric, thank you!.

raixnmd
Автор

I Would Definitely open this file.













In my organization's production server.

alphaghost
Автор

i love this channel, you make things easy

ebeneizermaluleke
Автор

Next time I'm sending out CVs for job applications, I'm going to use this XP

rubenverster
Автор

Best in the game... Fav channel of all time... Much love 🔥🔥🔥

shadowcbt
Автор

Its only happen when the firewall and antivirus is disabled right? So keep your firewall and antivirus active and updated.

fndrsm
Автор

Excellent Mr. Hackerloi. Your the best

nuhluosman
Автор

Loi we want tutorials about hacking android phones, because they are the most uesd phones in the space 😁.
Guys hit like to rise up my comment

almatsumalmaadi
Автор

For those figuring out where the generated pdf is saved, the path is /root/.set

basantsub
Автор

I hope there will be a tutorial of how to detect if something happens to the user like this or a solution to avoid it like setting configuration or something. This makes me aware that not all doc/pdf files is safe. I wonder if this method is also applicable to videos. Like, when opening a video, it is also possible to get hacked.

ar-cielstarlingnemesis
Автор

HackerLoi you are my favorite Hacker to watch, you go through things quickly and precisely. Great job man.

dot_dot_pwn
Автор

How long does it take to payload generation to complete? It seems for me it takes a very long time or is just looping indefinently both with ubuntu and kali linux

hugovera
welcome to shbcf.ru