How hackers hack with an image Trojan?!



// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

23 comments
  1. I hate Kali/Debian/Ubuntu, so I use manjaro. I wrote a bash script that installs all of the same tools as kali (plus some of my own additions) automatically.

  2. yeah bro you do really basic stuff please show how to make your rat undetected its cool you showing "how to hack " but its not in a real environment cuz today its not so easy to do this please show this man Loi Liang Yang my brother from another mother

  3. unfortunately windows defender detects netcat and removes it immediately, plus you cannot send that kind of file online (gmail) simply because you cannot send exe files (even zipping it wont work).

Comments are closed.