how Hackers Remotely Control Any phone!? check if your phone is already hacked now!
Vložit
- čas přidán 20. 08. 2021
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Věda a technologie
Account of mine also got hacked and I followed the method as explained in this video but I'm unable to proceed after recording the selfie video. Thank you Dale Valskov . It brings me immense joy to witness his name appearing frequently in comments, a clear indication of the commendable work he’s been doing.
In my case, I had no image of myself on it which clearly stated I am a step behind. Dale Valskov was God’s sent. I appreciate your tireless efforts in assisting me with the account recovery. Your professionalism and commitment to finding a solution were evident at every step. Thank you for making the process efficient and effective.
As a person and professional you couldn't get any better than Dale Valskov is a very reliable person and an excellent professional in the IT field. He is the type of person you want to work that's passionate, hardworking and knowledgeable. You’re The Best 100%
It's amazing what you do Dale Valskov We need a lot of people with your skills and set who have good intentions and spread love
Your work speaks volumes of the kind of man you are. efficient, organized and result oriented well done , Dale Valskov you're soo good at what you do
Dale Valskov . I really appreciate your efforts and dedication towards the work. May God bless you to keep showing your worth and skills like this in the future
Honestly, Dale Valskov I'm amazed by your consistent ability to deliver exceptional work every single time. Your willingness to lend a helping hand during my time of need is deeply appreciated. Thank you for your support and kindness.. I take pride in your capability to overcome any challenge and consistently achieve outstanding results regardless of the circumstances.
Kudos to you, Dale Valskov for your extraordinary dedication and hard work in helping me recover my account. Your efforts are truly commendable, and I encourage you to maintain this exceptional standard as you embark on future endeavors. The path ahead is filled with promise for someone of your caliber
Man sometimes I think how could anyone do something in a place they're not allowed to be when security cameras are now either decent enough and extremely cheap, very very good and reasonably priced, or expensive but you could zoom in to a detail half a pixel wide at least 130 feet away that was there 8 days ago. But then I see *Top phase Resolution* like this and understand there's still a balance between offense and defense.
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
how to find out the ip of the device i want to hack?
There is no doubt that you will rise fast at the apex of your career *Network Webster* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems.
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Great channel and very useful recommendation, many thanks for your efforts, may i ask when setting up the mirroring device you mentioned that it has to use the same Apple ID Account (child one), but does it need the same SIM card and number ? i.e. i have to set up the two devices one after the other using same Apple ID, SIM card then do the recommended setting changes thanks *DARK WEB DEMON* for the phone spying
I cannot imagine completing this project you *Network Webster* You are amazing. Thank you for being there for me. Not a single effort of yours will go in vain. You will be rewarded for your pain. Your hard work will bring you a lot of gains. Well done. Your achievements speaks itself about your capabilities. Slow and steady makes it to the top! Good job Ryan
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Network Webster🤣
Information on Point! Glad to have you watched your videos today
P R O C Y B E R S P Y . C O M W O R K S !!!!!
P R O C Y B E R S P Y . C O M W O R K S !!!!!
Even for the recognition *DARK WEB DEMON* gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive.
A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *DARK WEB DEMON* .Every time you do a good job, you polish yourself one more time. Shine on mate, well done. thanks alot
+1m more hackers concrat
how to find out the ip of the device i want to hack?
Anyone can get this thing right if you diligently go and find the right source , I have been able to carry out projects like this with some agency , And i have learnt that not everything is shown in these tutorials lately , still need some deep digging .
Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy
Not going to lie, but we are actually really proud to have an employee like you as part of our team. The job is done so gracefully and neatly. Very well done, dear *Network Webster* . First of all. Thank you for making the work environment so friendly and taking your responsibility seriously and completing the work gracefully! You deserve so much.
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Why the hell is everyone's comments doubled
@@AfricanLionBatthey are bots
@@AfricanLionBat bot scams
Why are all the comments by bots? This guy paid a lot of money lol.
Are these all bots ? They typed like a hell of a comment.
Yes , can someone please explain how these scammers are adding so many likes to their own comments and keep using the same goofy scams (meet my advisor for stocks / bitcoin/ et. ) and obviously certain people that work at CZcams are helping their “cousins “ always seemingly from the same part of the world , the same part of the world that has all the telemarketers? “ basically take over the CZcams comments
Scary
Same bot comments in Network chuck , Zsecurity, David bombal channel too
I WAS SKEPTICAL AFTER I HEARD ABOUT IT BUT RIGHT NOW I AM GLAD THAT I FINALLY MEET TECHNO PAWNS TEAM THEY GOT MY ACCOUNT RECOVERED
Sceptical I wasn’t due to personal experiences.
Do u believe in psychics and tarot readers?
Ty x ly x EF Dw
Fewer problems, more solutions - keep working like this and nothing will be able to stop you from reaching the top. Good job *Network Webster* Even the smallest of jobs well done will take you one step closer to the success you have always dreamed about. Keep it up Mate
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..
Its never too late to start from somewhere , I am lucky to have found this source, it’s the real thing :)
YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU THESPACEHACKERS..Com
Finally, I can use my Phone while it's lost!
🤣🤣🤣🤣 comment of the year
😂😂😂 good one
Can I use these steps to access any android device in the world, over the internet ?
@@user-ti6it9gv9t I don't think so
@@user-ti6it9gv9t Theoretically, yeah. But you need to have access to that device anyways so probably no
This is actually real and it works but the only hassle is you need to find someone who is familiar on how to get it done the right way, see how I got mine done
Since late 90s i was listening about hacking ,ports.handshakes....etc and since then i was always wanted to have someone just to put all tha thinks on a place and xplain ..no for harm anyone .not to intrude.just for curiosity of that new world that u could interact with the machines in a most engineering way!!Thnaks a lot for these *Top Phase Resolution* that make my dream come true!!!And also the way you explain them is the perfect way for me!! thanks a lot man!!
Quite interesting the system in which a lot of things are carried out in todays modern world , I enjoy technology so much but i still think it makes us more vulnerable , still has taken the world to greater heights though . Interesting Video by the way!
T H E S P A C E H A C K E R S . C O M
Can we use this on our phone in case it gets lost or stolen? Does it open any other vulnerabilities that someone else could have access too without our permission? Thanks !
Yes you an use it in your phone and no it will not make any vulnerability also you need to port forward your pc's ip so you can access your phone if it is in another network you can use ngrok to forward your ip if you restart your router you will lost your ip and get new one so you will have to regenerate the apk file
No it will not open any such vulnerability it will only work when the app is open also if the webpage to access the targeted phones is running inside your Lan it can't be accessed outside your local lan unless you want it to.
@@baratthuj thanks !
@@mooncraft2051 thanks !
100% yes but the only problem is connection relating issues. but yeah you can do it successfully
I think I have finally understood how easy you can get something like this done , you just need to find the right person for it and you’re there
YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU EAGLESPYNET
Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy
*⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT..................*
*⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT.................*
*⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT.................*
Same thing here , been trying for 2 weeks now and only end up getting disappointed
YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU EAGLESPYNET
I would really like to look deeply into this , it’s related to some assignments I have to get done, how does it work?
YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU THESPACEHACKERSCom
Same bro I really need this
wow even I didn’t think it was possible achieving something like this but I guess we learn new things everyday, glad I found the right people though
YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU THESPACEHACKERSCom
Thank u so much, interested in starting so soft during quarintine and just need a place to get started, thx for the support
I would appreciate if anyone can explain how do I do this using mobile??
YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU EAGLESPYNET
This is not a promo but the real deal guys, it looked sketchy working from the start but you proved my guilt wrong…you’re the best indeed!
Thank you .. my parents just bought for phone today as my birthday present and I've noticed there was a camera green dot on the right hand corner of my samsungA13
This is pretty advanced for me do u have basics to start learning?
Everything here in the video is actually real and quite easy to do , but the real hassle comes in finding the right person for it
T H E S P A C E H A C K E R S . C O M
90% of these comments are bogus. They're full of broken English and they say things that have nothing to do with this video. Go ahead and read them and ask "who the hell talks like this? What video dude they just watch?". Bots. Bad ones at that
Finally a Normal comment. 😭
When I type maindb.json it's showing no such directory
😂
True
hacked comments hehe
Great video , but this seems more applicable if you had physical access , yes? How would you do this on the targets device?
Great Video , Will love you to post more contents and recommend reliable sources for this sort of informations.
Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy
*⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT.................*
*⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT.................*
*⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT............l.....*
*⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT................*
Would be nice if you addressed issues that may come up along the way during these processes.
thank you for all you do on your channel. really helpful. i got robbed 3 times and my phones got stollen. do you think there is a way to locate them if give away my credential i used on them?
Your videos are incredibly well done. No critique, thanks for doing this *Top Phase Resolution*
just discovered your channel
one video later, you have my sub
Thank you hecker loi
i will not tell them from where i learned that all :)
This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute you. *Web back doors* . The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Alex & looking forward to seeing what you do next!
Bro, Your tutorials are totally on another level.
Bro Trying To Cover All Of Your Videos One Of The Best Channel
👍🏾
Good luck 😃🤞
Even hacking is bad but it makes you have a full control freedom to move to brake chain
That was an amazing work, what is it's mark of persistence and what r the factors that affects the connection between the attacker and the victim?
good question bro, i wanna know to, mr.loi pls reply
Bhai mujhe clear samajh nehi arahi kuch clear karoge hindi/Urdu me ?
Watching your videos, once it starts, there's no stopping it!
You just know how to keep me 'hooked'
Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy
Thank you so much for the information, this is absolutely insane that a single device can do all these things. And even though it is understood that this video is for demonstration only. What comes into mind is: what bad actor or criminal uses this type of device for malicious purposes, what kind of practices or techniques can be applied to defend ourselves from such a variety of attacks, which are kind of in between the physical and information type of attacks.
Sen turk musun ?
Hello, i need to access an account urgently but i dont have the login details. Please how do i do this😢
Via this mail below
grakkey
@
gmail
•
Finally found a CZcams channel that teaches you hacking techniques from beginning to end.. Thank you so much
Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy
Hey Loi, I've been learning alot from you and very grateful. I have a query, the apks are malwares that means they get detected by antivirus on the phone, is there a way to go around that?
maindb is missing for me
This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute you. *Top phase Resolution* . The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Olivia & looking forward to seeing what you
Hi nice explanation.But this technic works in those who are connected within the same network ????
Or connected different network devices also????
cant wait for ur next video!!
Thankyou sir ....me from India
I loves all your video ...and also love this sector...
You're the best bestest ever
You're doing a great job
Teaching us and the same time trying to teach us to protect our devices
Thank you so much
That was amazing 👍 keep making such interesting videos
your content is really important , but please, it's how a bout ios phones ? can you make a video about how to remote an apple ?
There is no doubt that you will rise fast at the apex of your career *Network Webster* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock
Tf is wrong with this comments section?
he is the best
Your Disclaimer is awesome 😂
I agree with you .
Hi sir, I am following your CZcams channel for almost an year now... I have also taken the Udemy course.
.
Can you please make a video on how to get a job as a fresher in CS industry or start freelancing in CS...
.
Or is there any special certification to get a job ?
Following
Hi The *Top Phase Resolution* I really liked the first impression of your hacking, I believe you are contributing your community value contribution. Thanks alot.
You have skills that I would like to discuss. You can choose the best option for that dialog. Any chance you visit SE region?
What's with all the spam comments?
He cracks me up when he says hacker loi 😆. Love his energy! Being hacked sucks! I'll never let my kids on main network again.
I know nothing about this man but I'm trying to learn it and understand it just to escape it.. how if the person can see everything you do or create to start fresh.
Why are all the comments like this😂
If someone has a pattern of continually "misunderstanding" you, there's a good chance you're getting manipulated. You could end up talking yourself in circles which will be draining, harm your mental health, and make you too emotional so that you can't think clearly. Many people like this are no different at their core than people who are OPENLY verbally and physically abusive, they're just more sneaky about it, and there's a good chance that the physical and/or verbal (aka overt) abuse is on its way. Covert abuse is very hard to spot but to get enough proof and clear the doubt you might be undergoing simply *MSG BRAVE NOTCH*
thank you for the video. If i could get to know the person who hacked my phone and lap and wanted to know the reason? I know not for money?
Great Info , but you've immediately inadvertently killed a few people in my neighborhood lol !
How to setup L3MON EXPLAIN
This is helpful especially keeping tab on your phone activity through your PC... I'll like you to do more about this, but IOS this time... iPhone remote accessing will be very helpful. Not mirroring, but wirelessly and remotely accessible. I really appreciate your work
Sadly, there is no payload online where you can remotely accsess an iphone unless it's jailbroken. There's probably experts who have made it though, but either wants to keep it to themselves or sell it.
Not a Hacker and i don't know computers of any kind but i'm sure your videos will help someone else.
It’s amazing how I’m thinking about your subject matter in my head about my relationship and CZcams sends you to me. Actual AI mind reading but I digress. I’m glad you were sent to me in a time of uncertainty about my relationship and the change in actions about my woman. New subscriber. Thank you *Top Phase Resolution* . I hope one day I can find someone as beautiful, natural and intelligent as you are.
Love you Sir
This the RAT method, i've been following this method and until now, i never got how to bypass the security check on Android (this is the most important) in other words, how to be FUD when runtime and scantime. Yeah, so many RATS out of there and so many Crypters out of there, i hope this is the good way than other RATS :)
🤔🤔🧐
This is a type of RAT...I think you need to read a lot more.
@@RjLevesque Do you read my comments ?
I said, this is the RAT method, and i know this is the RAT. just like an ordinary RAT on out of there.
Okk that's gr8 but how to this method on wan?
@@arjunnathvani6340 Just port forwarding using ngrok, done.
i wish i could understand ANY of this because someone has been controlling every phone i have had for more than 3 years...i have been in some terrible situations because i could not use my phone at certain times or because i could not access my contacts or apps...i cannot even explain how it is affecting my life...almost every aspect of my life has been affected and i am considered crazy or paranoid because i don't know how to prove it!
When my hell started I found these things on my devices. It’s been four months and I never knew what I was sitting on. I have the data and copies securely stored now with backups in another city. This created so much paranoia and loss it’s disgusting.
Where is the diffrence between systemctl start apache2 and service start apache 2?
Or are these the same thing
It's the same. Some distros don't have both, but mostly you can always use "sudo systemctl enable --now apache2"
@@lekrsu thx ✌🏻👍🏼
service apache2 start ... with service command, service name must be before the action (start.stop/restart etc ...)
Love from India ❣️
@@Anoni who are you
:DDDD
Excellent video mate but you were talking very fast and I was trying to keep up with you.
Most people are not IT knowledgeable and I am one of them too, i wasn't sure if you can hack a mobile remotely without having it physically with you to input some code
Is there a link for the Github page? Couldn't seem to find it.
Hahahaha classic Loi with 12345678 and asking the password in return, I learned that one in online RPGs lmao
my pass is 123456 now isnt it fair that you send me yours now , lol.
I used to tell people that passwords are replaced by asterisks when you post them. My password is ********.
See, it works
If you choose a password as 'incorrect', then whenever you forget it you will be told what it is by the server
thx for your knowlegde loi i already test it in my windows and mobile phone all successfully work
The efficiency of this *Top phase Resolution* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Mike !!!
The way that ur explaining it's amazing 👏 thanks 😊
Usually I view videos on 2x but this guy is so nice that I play his videos normally
What an odd way to live
Leul.
@@chillchilli2671 it's how i live... i can consume double amount of content like that
What is the software to get the mobile device online which you used to see on the screen? Is it a virtual phone or a tool just screencasting you mobile ?
This comment section is a cesspool of bots what the heck
I tried this yesterday, but it's really soooo unstable. Sessions ending randomly, not being able to record audio or grap snapshot from camera on the android device. Many error's. Very good tutorial though. But the actual exploit is not usefull at all. Not even persistent. However this is MY experience, i hope some of you guys had better experiences with *"exploit byte"* Even though it wasn't free i can proudly say that the job the offered was worth it :)
it’s not persistent??
Even for the recognition *top Phase resolution* gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive.
Is there a way to prove to the bank the transaction where done remotely? How to prove they by pass the 2FA? The mobile was static and horizontal, not acceleration or movements.
The malware could be SharkBot or Medusa and the bank Barclays. Thanks
This is inaccurate, android application needs install permission and runtime permission to be able to access the user's location, phone log, contacts, etc. If the user know that the app is asking suspicious permission they would not give it.
I'd say in 99% case this would not work.
At the begining he says you use social engineering. Also I guess this method aims the attacker (not the user) to install and give those permissions directly on the phone, and when all ready give/sell/return the phone to victim.
Dont forget he said to use social engineering e.g selling a used phone to a person not knowing you have installed an app that will become hell to him in a short or long run
Yep, this bullshit works only on CZcams.
@@macbook6507 Shut up little boy, you dont even know what you talking about.
You must Modify the generated apk so that it asks for a few permissions and merge it with another apk. Ez
Great Stuff! Can you do a video about BEEF?
He already did