Remotely Control Any PC with an image?!

112,409
0
Published 2024-06-04
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web-ethical-hacking-cour…
Full Web Ethical Hacking Course: www.udemy.com/course/full-web-ethical-hacking-cour…
Full Mobile Hacking Course: www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD

// Social Links //
Website: www.loiliangyang.com/
Facebook: www.facebook.com/Loiliangyang/
Instagram: www.instagram.com/loiliangyang/
LinkedIn: www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

All Comments (21)
  • @djleodecond
    man, that only works on the local network and certainly the firewall will block or notify the exposing ports
  • @Eazy_Bruh
    Your videos are like magic…. I imagine the videos as “magical scrolls” and I have to study them if I want to do what you’re doing in that said video. The video you made where you can do a fresh windows install even if there’s an admin/company lock on the PC saved me from going insane
  • @shammahrashad
    Am I tripping. I thought this was a NetworkChuck video minus the coffee breaks
  • @Alex_prave
    Sends a pic to someone , They : why this pic is .exe???
  • @lammabing6401
    I'm not a hacker sort but this is pretty impressive, there are ways to kinda hide the exe, or make it less suspicious I'd imagine, besides most ppl wouldn't be alerted to any wrong going on at all. Your video's straight to the point, kept my attention. Thanks, great stuff
  • It is possible to hack a PC with an image, it uses the same principle as steganography. The hidden code exploits unsafe code in an image library and executes the code when any program using that specific version of the library is opened. Steganography is also used to hide messages, images, videos inside other files. So make sure to keep things updated.
  • @Neekamhakane
    Your video is like a mini-masterclass. So valuable!
  • @wasimafzali6651
    Hey ❤ Could you make a video for beginners where and how to start computer science, programming and other things
  • @Krullfath
    3:45 Why is your directory you're in called "UltraVnc_134" now instead of "UltraVnc_132"? Did you know certain anti viruses are able to detect this easily, and that this approach relies on user interaction and the operating system's handling of file extensions?
  • @2kambas557
    For those who don't understand anything, this is not the most ideal approach to carrying out an attack, the best approach is to get a remote shell first as it is less noisy and you don't run the risk of moving the mouse at the same time as the victim.
  • @jesperjensen293
    You can never email this, most servers rejects .exe as attachments, also in email the ".exe" will be visible to the victim, unlike in a USB stick it most likely look like an jpg file, if you can show how to send exe by email it would be a lot more interresting.
  • Steganography takes time to implement, and many safe walls to make it impossiable to use on a corporate network. But maybe will work on a everyday joe workstation.
  • @nettlex
    the thing is, mail services show extensions by default.
  • Amazing and simple explanation, hope this content increases awareness ❤