how Hackers Remotely Control Any phone!? check if your phone is already hacked now!

Sdílet
Vložit
  • čas přidán 20. 08. 2021
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • Věda a technologie

Komentáře • 2,1K

  • @MYadamma-up3wq
    @MYadamma-up3wq Před 29 dny +138

    Account of mine also got hacked and I followed the method as explained in this video but I'm unable to proceed after recording the selfie video. Thank you Dale Valskov . It brings me immense joy to witness his name appearing frequently in comments, a clear indication of the commendable work he’s been doing.

  • @user-jq3bg8yg5o
    @user-jq3bg8yg5o Před 29 dny +130

    In my case, I had no image of myself on it which clearly stated I am a step behind. Dale Valskov was God’s sent. I appreciate your tireless efforts in assisting me with the account recovery. Your professionalism and commitment to finding a solution were evident at every step. Thank you for making the process efficient and effective.

  • @gamitkaruna3169
    @gamitkaruna3169 Před 29 dny +120

    As a person and professional you couldn't get any better than Dale Valskov is a very reliable person and an excellent professional in the IT field. He is the type of person you want to work that's passionate, hardworking and knowledgeable. You’re The Best 100%

  • @dog_is_vip
    @dog_is_vip Před 29 dny +128

    It's amazing what you do Dale Valskov We need a lot of people with your skills and set who have good intentions and spread love

  • @Harsh-kh6ce
    @Harsh-kh6ce Před 29 dny +126

    Your work speaks volumes of the kind of man you are. efficient, organized and result oriented well done , Dale Valskov you're soo good at what you do

  • @DARK_GAMING_14
    @DARK_GAMING_14 Před 29 dny +126

    Dale Valskov . I really appreciate your efforts and dedication towards the work. May God bless you to keep showing your worth and skills like this in the future

  • @user-ef8yn7kw1e
    @user-ef8yn7kw1e Před 29 dny +126

    Honestly, Dale Valskov I'm amazed by your consistent ability to deliver exceptional work every single time. Your willingness to lend a helping hand during my time of need is deeply appreciated. Thank you for your support and kindness.. I take pride in your capability to overcome any challenge and consistently achieve outstanding results regardless of the circumstances.

  • @MdJubber-oe4sc
    @MdJubber-oe4sc Před 29 dny +124

    Kudos to you, Dale Valskov for your extraordinary dedication and hard work in helping me recover my account. Your efforts are truly commendable, and I encourage you to maintain this exceptional standard as you embark on future endeavors. The path ahead is filled with promise for someone of your caliber

  • @FeYdIl
    @FeYdIl Před rokem +241

    Man sometimes I think how could anyone do something in a place they're not allowed to be when security cameras are now either decent enough and extremely cheap, very very good and reasonably priced, or expensive but you could zoom in to a detail half a pixel wide at least 130 feet away that was there 8 days ago. But then I see *Top phase Resolution* like this and understand there's still a balance between offense and defense.

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

    • @gospodarpropustenihprilika
      @gospodarpropustenihprilika Před 5 měsíci

      how to find out the ip of the device i want to hack?

  • @lahmacuncraft2765
    @lahmacuncraft2765 Před rokem +224

    There is no doubt that you will rise fast at the apex of your career *Network Webster* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems.

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

  • @muzikedit2128
    @muzikedit2128 Před rokem +194

    Great channel and very useful recommendation, many thanks for your efforts, may i ask when setting up the mirroring device you mentioned that it has to use the same Apple ID Account (child one), but does it need the same SIM card and number ? i.e. i have to set up the two devices one after the other using same Apple ID, SIM card then do the recommended setting changes thanks *DARK WEB DEMON* for the phone spying

  • @ugurkesen8678
    @ugurkesen8678 Před rokem +208

    I cannot imagine completing this project you *Network Webster* You are amazing. Thank you for being there for me. Not a single effort of yours will go in vain. You will be rewarded for your pain. Your hard work will bring you a lot of gains. Well done. Your achievements speaks itself about your capabilities. Slow and steady makes it to the top! Good job Ryan

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

    • @Amanda-cd6dm
      @Amanda-cd6dm Před rokem

      Network Webster🤣

  • @fatness9458
    @fatness9458 Před 2 lety +186

    Information on Point! Glad to have you watched your videos today

    • @reece3885
      @reece3885 Před 2 lety

      P R O C Y B E R S P Y . C O M W O R K S !!!!!

    • @reece3885
      @reece3885 Před 2 lety

      P R O C Y B E R S P Y . C O M W O R K S !!!!!

  • @swordemirhan5497
    @swordemirhan5497 Před rokem +205

    Even for the recognition *DARK WEB DEMON* gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive.

  • @Emin31013
    @Emin31013 Před rokem +238

    A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *DARK WEB DEMON* .Every time you do a good job, you polish yourself one more time. Shine on mate, well done. thanks alot

  • @oyunkacan1087
    @oyunkacan1087 Před 2 lety +54

    Anyone can get this thing right if you diligently go and find the right source , I have been able to carry out projects like this with some agency , And i have learnt that not everything is shown in these tutorials lately , still need some deep digging .

    • @sussanmarcum275
      @sussanmarcum275 Před 2 lety +1

      Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy

  • @titkatv3939
    @titkatv3939 Před rokem +354

    Not going to lie, but we are actually really proud to have an employee like you as part of our team. The job is done so gracefully and neatly. Very well done, dear *Network Webster* . First of all. Thank you for making the work environment so friendly and taking your responsibility seriously and completing the work gracefully! You deserve so much.

    • @munthasahamed9179
      @munthasahamed9179 Před rokem +2

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

    • @AfricanLionBat
      @AfricanLionBat Před rokem +4

      Why the hell is everyone's comments doubled

    • @ST-wd2xc
      @ST-wd2xc Před rokem +2

      @@AfricanLionBatthey are bots

    • @treidchimney
      @treidchimney Před 11 měsíci +1

      @@AfricanLionBat bot scams

  • @delunk5906
    @delunk5906 Před rokem +146

    Why are all the comments by bots? This guy paid a lot of money lol.

    • @pranavjohnjose5381
      @pranavjohnjose5381 Před 6 měsíci +10

      Are these all bots ? They typed like a hell of a comment.

    • @AlanW-ConstructionOnly
      @AlanW-ConstructionOnly Před 6 měsíci +5

      Yes , can someone please explain how these scammers are adding so many likes to their own comments and keep using the same goofy scams (meet my advisor for stocks / bitcoin/ et. ) and obviously certain people that work at CZcams are helping their “cousins “ always seemingly from the same part of the world , the same part of the world that has all the telemarketers? “ basically take over the CZcams comments

    • @JED4k
      @JED4k Před 4 měsíci

      Scary

    • @PHOENIX-lp5wo
      @PHOENIX-lp5wo Před měsícem

      Same bot comments in Network chuck , Zsecurity, David bombal channel too

  • @ronniekern4561
    @ronniekern4561 Před rokem +248

    I WAS SKEPTICAL AFTER I HEARD ABOUT IT BUT RIGHT NOW I AM GLAD THAT I FINALLY MEET TECHNO PAWNS TEAM THEY GOT MY ACCOUNT RECOVERED

    • @911deano1
      @911deano1 Před rokem

      Sceptical I wasn’t due to personal experiences.
      Do u believe in psychics and tarot readers?
      Ty x ly x EF Dw

  • @saohdsajd7768
    @saohdsajd7768 Před rokem +224

    Fewer problems, more solutions - keep working like this and nothing will be able to stop you from reaching the top. Good job *Network Webster* Even the smallest of jobs well done will take you one step closer to the success you have always dreamed about. Keep it up Mate

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

    • @munthasahamed9179
      @munthasahamed9179 Před rokem

      Finally someone who is willing to teach us younger guys instead of pushing some bs course on us. i gladly appreciate *Top Phase Resolution* hackers..

  • @nilayklc577
    @nilayklc577 Před 2 lety +18

    Its never too late to start from somewhere , I am lucky to have found this source, it’s the real thing :)

    • @tazstaats8541
      @tazstaats8541 Před 2 lety

      YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU THESPACEHACKERS..Com

  • @mo-s-
    @mo-s- Před 2 lety +173

    Finally, I can use my Phone while it's lost!

    • @macbook6507
      @macbook6507 Před 2 lety +10

      🤣🤣🤣🤣 comment of the year

    • @cyberanon2463
      @cyberanon2463 Před 2 lety +3

      😂😂😂 good one

    • @user-ti6it9gv9t
      @user-ti6it9gv9t Před 2 lety +2

      Can I use these steps to access any android device in the world, over the internet ?

    • @cyberanon2463
      @cyberanon2463 Před 2 lety +1

      @@user-ti6it9gv9t I don't think so

    • @mo-s-
      @mo-s- Před 2 lety +5

      @@user-ti6it9gv9t Theoretically, yeah. But you need to have access to that device anyways so probably no

  • @moviesandsongs7357
    @moviesandsongs7357 Před 2 lety +48

    This is actually real and it works but the only hassle is you need to find someone who is familiar on how to get it done the right way, see how I got mine done

  • @toonsworldturkiye
    @toonsworldturkiye Před rokem

    Since late 90s i was listening about hacking ,ports.handshakes....etc and since then i was always wanted to have someone just to put all tha thinks on a place and xplain ..no for harm anyone .not to intrude.just for curiosity of that new world that u could interact with the machines in a most engineering way!!Thnaks a lot for these *Top Phase Resolution* that make my dream come true!!!And also the way you explain them is the perfect way for me!! thanks a lot man!!

  • @merthankandemir1982
    @merthankandemir1982 Před 2 lety +26

    Quite interesting the system in which a lot of things are carried out in todays modern world , I enjoy technology so much but i still think it makes us more vulnerable , still has taken the world to greater heights though . Interesting Video by the way!

  • @glocky9089
    @glocky9089 Před 2 lety +153

    Can we use this on our phone in case it gets lost or stolen? Does it open any other vulnerabilities that someone else could have access too without our permission? Thanks !

    • @mooncraft2051
      @mooncraft2051 Před 2 lety +31

      Yes you an use it in your phone and no it will not make any vulnerability also you need to port forward your pc's ip so you can access your phone if it is in another network you can use ngrok to forward your ip if you restart your router you will lost your ip and get new one so you will have to regenerate the apk file

    • @baratthuj
      @baratthuj Před 2 lety +13

      No it will not open any such vulnerability it will only work when the app is open also if the webpage to access the targeted phones is running inside your Lan it can't be accessed outside your local lan unless you want it to.

    • @glocky9089
      @glocky9089 Před 2 lety +3

      @@baratthuj thanks !

    • @glocky9089
      @glocky9089 Před 2 lety +4

      @@mooncraft2051 thanks !

    • @DavidJohnson-su4os
      @DavidJohnson-su4os Před 2 lety +1

      100% yes but the only problem is connection relating issues. but yeah you can do it successfully

  • @STANDOFF-lw1hg
    @STANDOFF-lw1hg Před 2 lety +61

    I think I have finally understood how easy you can get something like this done , you just need to find the right person for it and you’re there

    • @tazstaats8541
      @tazstaats8541 Před 2 lety

      YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU EAGLESPYNET

    • @sussanmarcum275
      @sussanmarcum275 Před 2 lety

      Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy

    • @happytr535
      @happytr535 Před 2 lety

      *⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT..................*

    • @happytr535
      @happytr535 Před 2 lety

      *⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT.................*

    • @happytr535
      @happytr535 Před 2 lety

      *⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT.................*

  • @umutkaratas8709
    @umutkaratas8709 Před 2 lety +47

    Same thing here , been trying for 2 weeks now and only end up getting disappointed

    • @tazstaats8541
      @tazstaats8541 Před 2 lety

      YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU EAGLESPYNET

  • @game4free564
    @game4free564 Před 2 lety +19

    I would really like to look deeply into this , it’s related to some assignments I have to get done, how does it work?

    • @tazstaats8541
      @tazstaats8541 Před 2 lety

      YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU THESPACEHACKERSCom

    • @Hadi.ClashRoyale
      @Hadi.ClashRoyale Před rokem

      Same bro I really need this

  • @user-pb5lw3ic2i
    @user-pb5lw3ic2i Před 2 lety +17

    wow even I didn’t think it was possible achieving something like this but I guess we learn new things everyday, glad I found the right people though

    • @tazstaats8541
      @tazstaats8541 Před 2 lety

      YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU THESPACEHACKERSCom

  • @SoundsOfMaasai
    @SoundsOfMaasai Před rokem

    Thank u so much, interested in starting so soft during quarintine and just need a place to get started, thx for the support

  • @animasyonkrali2839
    @animasyonkrali2839 Před 2 lety +49

    I would appreciate if anyone can explain how do I do this using mobile??

    • @tazstaats8541
      @tazstaats8541 Před 2 lety

      YOUR ACT OF KINDNESS AND SERVICES,SHOWS HOW BIG HEART YOU HAVE FOR OTHERS THANKS TO YOU , WE DO APPRECIATE YOU EAGLESPYNET

  • @usepectivehackzonepageonig2644

    This is not a promo but the real deal guys, it looked sketchy working from the start but you proved my guilt wrong…you’re the best indeed!

  • @lorainebulikiobo255
    @lorainebulikiobo255 Před rokem +1

    Thank you .. my parents just bought for phone today as my birthday present and I've noticed there was a camera green dot on the right hand corner of my samsungA13

  • @luicotton5165
    @luicotton5165 Před rokem

    This is pretty advanced for me do u have basics to start learning?

  • @halityaprak8844
    @halityaprak8844 Před 2 lety +27

    Everything here in the video is actually real and quite easy to do , but the real hassle comes in finding the right person for it

  • @redveinborneo4673
    @redveinborneo4673 Před rokem +38

    90% of these comments are bogus. They're full of broken English and they say things that have nothing to do with this video. Go ahead and read them and ask "who the hell talks like this? What video dude they just watch?". Bots. Bad ones at that

  • @OnThaBlockProductionz
    @OnThaBlockProductionz Před 26 dny

    Great video , but this seems more applicable if you had physical access , yes? How would you do this on the targets device?

  • @ycfidan
    @ycfidan Před 2 lety +55

    Great Video , Will love you to post more contents and recommend reliable sources for this sort of informations.

    • @sussanmarcum275
      @sussanmarcum275 Před 2 lety

      Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy

    • @happytr535
      @happytr535 Před 2 lety

      *⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT.................*

    • @happytr535
      @happytr535 Před 2 lety

      *⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT.................*

    • @happytr535
      @happytr535 Před 2 lety

      *⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT............l.....*

    • @happytr535
      @happytr535 Před 2 lety

      *⬆️⬆️✅✅ GET IN TOUCH PROBLEM AND SOLUTION FOR SOCIAL MEDIA ACCOUNT................*

  • @exciteproductions4two0

    Would be nice if you addressed issues that may come up along the way during these processes.

  • @alassanekeita5290
    @alassanekeita5290 Před rokem

    thank you for all you do on your channel. really helpful. i got robbed 3 times and my phones got stollen. do you think there is a way to locate them if give away my credential i used on them?

  • @mertfurkan6091
    @mertfurkan6091 Před rokem

    Your videos are incredibly well done. No critique, thanks for doing this *Top Phase Resolution*

  • @xamone3172
    @xamone3172 Před rokem

    just discovered your channel
    one video later, you have my sub

  • @alexjr977
    @alexjr977 Před 2 lety +3

    Thank you hecker loi
    i will not tell them from where i learned that all :)

  • @youtubeKaDiR_
    @youtubeKaDiR_ Před rokem +1

    This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute you. *Web back doors* . The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Alex & looking forward to seeing what you do next!

  • @abubakersiddique761
    @abubakersiddique761 Před 11 měsíci

    Bro, Your tutorials are totally on another level.

  • @thecorner2405
    @thecorner2405 Před 2 lety +32

    Bro Trying To Cover All Of Your Videos One Of The Best Channel

  • @charanreddy8856
    @charanreddy8856 Před 2 lety +25

    That was an amazing work, what is it's mark of persistence and what r the factors that affects the connection between the attacker and the victim?

    • @DavidJohnson-su4os
      @DavidJohnson-su4os Před 2 lety +1

      good question bro, i wanna know to, mr.loi pls reply

    • @sahilkabir8350
      @sahilkabir8350 Před 2 lety

      Bhai mujhe clear samajh nehi arahi kuch clear karoge hindi/Urdu me ?

  • @thekontuli2828
    @thekontuli2828 Před 2 lety

    Watching your videos, once it starts, there's no stopping it!
    You just know how to keep me 'hooked'

    • @sussanmarcum275
      @sussanmarcum275 Před 2 lety

      Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy

  • @cancicek4294
    @cancicek4294 Před rokem

    Thank you so much for the information, this is absolutely insane that a single device can do all these things. And even though it is understood that this video is for demonstration only. What comes into mind is: what bad actor or criminal uses this type of device for malicious purposes, what kind of practices or techniques can be applied to defend ourselves from such a variety of attacks, which are kind of in between the physical and information type of attacks.

  • @dewandamaine7023
    @dewandamaine7023 Před 6 měsíci +51

    Hello, i need to access an account urgently but i dont have the login details. Please how do i do this😢

  • @olgav3412
    @olgav3412 Před 2 lety

    Finally found a CZcams channel that teaches you hacking techniques from beginning to end.. Thank you so much

    • @sussanmarcum275
      @sussanmarcum275 Před 2 lety

      Am so grateful I work with best tools, software to hack ⚙️and his been a trustworthy

  • @wealthwavehub
    @wealthwavehub Před 3 měsíci

    Hey Loi, I've been learning alot from you and very grateful. I have a query, the apks are malwares that means they get detected by antivirus on the phone, is there a way to go around that?

  • @mynameis3077
    @mynameis3077 Před 2 lety +3

    maindb is missing for me

  • @arifeyalcn1815
    @arifeyalcn1815 Před 10 měsíci

    This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute you. *Top phase Resolution* . The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Olivia & looking forward to seeing what you

  • @dsreddy1530
    @dsreddy1530 Před 2 lety

    Hi nice explanation.But this technic works in those who are connected within the same network ????
    Or connected different network devices also????

  • @teeyaar
    @teeyaar Před 2 lety +3

    cant wait for ur next video!!

  • @architojha216
    @architojha216 Před 2 lety +3

    Thankyou sir ....me from India
    I loves all your video ...and also love this sector...

  • @ayaz0316
    @ayaz0316 Před rokem

    You're the best bestest ever
    You're doing a great job
    Teaching us and the same time trying to teach us to protect our devices
    Thank you so much

  • @harshalmore8284
    @harshalmore8284 Před 2 lety +14

    That was amazing 👍 keep making such interesting videos

  • @Mass1010
    @Mass1010 Před 3 měsíci +11

    your content is really important , but please, it's how a bout ios phones ? can you make a video about how to remote an apple ?

  • @djhulk8980
    @djhulk8980 Před rokem

    There is no doubt that you will rise fast at the apex of your career *Network Webster* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock

  • @fonphoenix
    @fonphoenix Před 2 lety +7

    Tf is wrong with this comments section?

  • @user-el7tt9eq6s
    @user-el7tt9eq6s Před 2 lety +39

    he is the best

  • @CoderState
    @CoderState Před rokem

    Your Disclaimer is awesome 😂
    I agree with you .

  • @cryptobits229
    @cryptobits229 Před 2 lety +8

    Hi sir, I am following your CZcams channel for almost an year now... I have also taken the Udemy course.
    .
    Can you please make a video on how to get a job as a fresher in CS industry or start freelancing in CS...
    .
    Or is there any special certification to get a job ?

  • @flixcalmistir
    @flixcalmistir Před rokem

    Hi The *Top Phase Resolution* I really liked the first impression of your hacking, I believe you are contributing your community value contribution. Thanks alot.

  • @ceovenusworld4108
    @ceovenusworld4108 Před 2 lety

    You have skills that I would like to discuss. You can choose the best option for that dialog. Any chance you visit SE region?

  • @abeautifulcity3301
    @abeautifulcity3301 Před 9 měsíci +4

    What's with all the spam comments?

  • @jesika3
    @jesika3 Před rokem

    He cracks me up when he says hacker loi 😆. Love his energy! Being hacked sucks! I'll never let my kids on main network again.

  • @apachecortez2167
    @apachecortez2167 Před rokem

    I know nothing about this man but I'm trying to learn it and understand it just to escape it.. how if the person can see everything you do or create to start fresh.

  • @mauman1323
    @mauman1323 Před 2 lety +6

    Why are all the comments like this😂

  • @Claveraphae
    @Claveraphae Před 2 lety +3

    If someone has a pattern of continually "misunderstanding" you, there's a good chance you're getting manipulated. You could end up talking yourself in circles which will be draining, harm your mental health, and make you too emotional so that you can't think clearly. Many people like this are no different at their core than people who are OPENLY verbally and physically abusive, they're just more sneaky about it, and there's a good chance that the physical and/or verbal (aka overt) abuse is on its way. Covert abuse is very hard to spot but to get enough proof and clear the doubt you might be undergoing simply *MSG BRAVE NOTCH*

  • @fathimamubeena3993
    @fathimamubeena3993 Před rokem

    thank you for the video. If i could get to know the person who hacked my phone and lap and wanted to know the reason? I know not for money?

  • @shellydurham7562
    @shellydurham7562 Před rokem

    Great Info , but you've immediately inadvertently killed a few people in my neighborhood lol !

  • @linux1781
    @linux1781 Před 2 lety +4

    How to setup L3MON EXPLAIN

  • @threalinsideout1368
    @threalinsideout1368 Před 2 lety +5

    This is helpful especially keeping tab on your phone activity through your PC... I'll like you to do more about this, but IOS this time... iPhone remote accessing will be very helpful. Not mirroring, but wirelessly and remotely accessible. I really appreciate your work

    • @YoureHot
      @YoureHot Před 2 lety

      Sadly, there is no payload online where you can remotely accsess an iphone unless it's jailbroken. There's probably experts who have made it though, but either wants to keep it to themselves or sell it.

  • @elviraarriaga1424
    @elviraarriaga1424 Před 2 lety

    Not a Hacker and i don't know computers of any kind but i'm sure your videos will help someone else.

  • @bamte9147
    @bamte9147 Před rokem

    It’s amazing how I’m thinking about your subject matter in my head about my relationship and CZcams sends you to me. Actual AI mind reading but I digress. I’m glad you were sent to me in a time of uncertainty about my relationship and the change in actions about my woman. New subscriber. Thank you *Top Phase Resolution* . I hope one day I can find someone as beautiful, natural and intelligent as you are.

  • @jojoop6604
    @jojoop6604 Před 2 lety +3

    Love you Sir

  • @nkrtzd99
    @nkrtzd99 Před 2 lety +4

    This the RAT method, i've been following this method and until now, i never got how to bypass the security check on Android (this is the most important) in other words, how to be FUD when runtime and scantime. Yeah, so many RATS out of there and so many Crypters out of there, i hope this is the good way than other RATS :)

    • @dietrichdietrich7763
      @dietrichdietrich7763 Před 2 lety

      🤔🤔🧐

    • @RjLevesque
      @RjLevesque Před 2 lety

      This is a type of RAT...I think you need to read a lot more.

    • @nkrtzd99
      @nkrtzd99 Před 2 lety +1

      @@RjLevesque Do you read my comments ?
      I said, this is the RAT method, and i know this is the RAT. just like an ordinary RAT on out of there.

    • @arjunnathvani6340
      @arjunnathvani6340 Před 2 lety

      Okk that's gr8 but how to this method on wan?

    • @nkrtzd99
      @nkrtzd99 Před 2 lety +1

      @@arjunnathvani6340 Just port forwarding using ngrok, done.

  • @krissiemichele7828
    @krissiemichele7828 Před rokem

    i wish i could understand ANY of this because someone has been controlling every phone i have had for more than 3 years...i have been in some terrible situations because i could not use my phone at certain times or because i could not access my contacts or apps...i cannot even explain how it is affecting my life...almost every aspect of my life has been affected and i am considered crazy or paranoid because i don't know how to prove it!

  • @Web3Prep
    @Web3Prep Před rokem +1

    When my hell started I found these things on my devices. It’s been four months and I never knew what I was sitting on. I have the data and copies securely stored now with backups in another city. This created so much paranoia and loss it’s disgusting.

  • @MrEnisg76
    @MrEnisg76 Před 2 lety +3

    Where is the diffrence between systemctl start apache2 and service start apache 2?
    Or are these the same thing

    • @lekrsu
      @lekrsu Před 2 lety +3

      It's the same. Some distros don't have both, but mostly you can always use "sudo systemctl enable --now apache2"

    • @MrEnisg76
      @MrEnisg76 Před 2 lety

      @@lekrsu thx ✌🏻👍🏼

    • @FunkyDream91
      @FunkyDream91 Před 2 lety +1

      service apache2 start ... with service command, service name must be before the action (start.stop/restart etc ...)

  • @kvmishra5941
    @kvmishra5941 Před 2 lety +24

    Love from India ❣️

  • @souhailshamaissem7564

    Excellent video mate but you were talking very fast and I was trying to keep up with you.
    Most people are not IT knowledgeable and I am one of them too, i wasn't sure if you can hack a mobile remotely without having it physically with you to input some code

  • @nirvaangoel8172
    @nirvaangoel8172 Před rokem +1

    Is there a link for the Github page? Couldn't seem to find it.

  • @Nortindevtech
    @Nortindevtech Před 2 lety +7

    Hahahaha classic Loi with 12345678 and asking the password in return, I learned that one in online RPGs lmao

    • @DavidJohnson-su4os
      @DavidJohnson-su4os Před 2 lety

      my pass is 123456 now isnt it fair that you send me yours now , lol.

    • @kelsier.luthadel
      @kelsier.luthadel Před 2 lety

      I used to tell people that passwords are replaced by asterisks when you post them. My password is ********.
      See, it works

  • @kelsier.luthadel
    @kelsier.luthadel Před 2 lety +8

    If you choose a password as 'incorrect', then whenever you forget it you will be told what it is by the server

  • @KamenRidePram
    @KamenRidePram Před 2 lety

    thx for your knowlegde loi i already test it in my windows and mobile phone all successfully work

  • @ayseldemiryurek
    @ayseldemiryurek Před 10 měsíci

    The efficiency of this *Top phase Resolution* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Mike !!!

  • @walidamrani8361
    @walidamrani8361 Před 2 lety +7

    The way that ur explaining it's amazing 👏 thanks 😊

  • @ElliotAlderson835
    @ElliotAlderson835 Před 2 lety +60

    Usually I view videos on 2x but this guy is so nice that I play his videos normally

  • @kalsekar100
    @kalsekar100 Před 16 dny

    What is the software to get the mobile device online which you used to see on the screen? Is it a virtual phone or a tool just screencasting you mobile ?

  • @caffeinati
    @caffeinati Před 2 lety +4

    This comment section is a cesspool of bots what the heck

  • @danishzehaenarmy4071
    @danishzehaenarmy4071 Před 2 lety +3

    I tried this yesterday, but it's really soooo unstable. Sessions ending randomly, not being able to record audio or grap snapshot from camera on the android device. Many error's. Very good tutorial though. But the actual exploit is not usefull at all. Not even persistent. However this is MY experience, i hope some of you guys had better experiences with *"exploit byte"* Even though it wasn't free i can proudly say that the job the offered was worth it :)

    • @JB-fh1bb
      @JB-fh1bb Před 2 lety

      it’s not persistent??

  • @toprakerdogmus1605
    @toprakerdogmus1605 Před rokem

    Even for the recognition *top Phase resolution* gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive.

  • @josediez7609
    @josediez7609 Před rokem

    Is there a way to prove to the bank the transaction where done remotely? How to prove they by pass the 2FA? The mobile was static and horizontal, not acceleration or movements.
    The malware could be SharkBot or Medusa and the bank Barclays. Thanks

  • @nrico6666
    @nrico6666 Před 2 lety +12

    This is inaccurate, android application needs install permission and runtime permission to be able to access the user's location, phone log, contacts, etc. If the user know that the app is asking suspicious permission they would not give it.
    I'd say in 99% case this would not work.

    • @1DusDB
      @1DusDB Před 2 lety +4

      At the begining he says you use social engineering. Also I guess this method aims the attacker (not the user) to install and give those permissions directly on the phone, and when all ready give/sell/return the phone to victim.

    • @macbook6507
      @macbook6507 Před 2 lety

      Dont forget he said to use social engineering e.g selling a used phone to a person not knowing you have installed an app that will become hell to him in a short or long run

    • @upupaepops6700
      @upupaepops6700 Před 2 lety +1

      Yep, this bullshit works only on CZcams.

    • @upupaepops6700
      @upupaepops6700 Před 2 lety

      ​@@macbook6507 Shut up little boy, you dont even know what you talking about.

    • @matias.quiroga
      @matias.quiroga Před 2 lety

      You must Modify the generated apk so that it asks for a few permissions and merge it with another apk. Ez

  • @365hype
    @365hype Před 2 lety +8

    Great Stuff! Can you do a video about BEEF?