Protect Against Hackers!

  Рет қаралды 134,670

ebola man

ebola man

Күн бұрын

• Educational Purposes Only •
» Skool Community: www.skool.com/anonymous-9484
» GitHub: github.com/EbolaMan-YT
» Patreon: / ebolaman
0:00 Intro
0:21 Explanation
1:01 Basic TCP Connection
2:10 Remote Program Execution
2:57 Reverse Shell
3:35 One Liner
4:06 Hide Code in Program
5:10 Mitigate/Prevent
5:24 Outro

Пікірлер: 276
@yssoloman
@yssoloman 7 ай бұрын
"you know sometimes geometry dash isnt even worth it" 💀💀
@vk8a8
@vk8a8 6 ай бұрын
Guess what
@ry4nlol
@ry4nlol 6 ай бұрын
Thats how I got a virus too lololl
@_North
@_North 6 ай бұрын
Not ggdhsudhdhsgsggwerrrrrr
@Shareluiz6981
@Shareluiz6981 6 ай бұрын
Yeah I got gdps editor yey
@bumblisbeethe2
@bumblisbeethe2 5 ай бұрын
Nah I have 3000 hours in that😊
@scriptchore8298
@scriptchore8298 11 ай бұрын
This is lovely.. Straight and direct to the point.. Been looking for this exact information for years and had to figure this out on my own. Wish i had found this then
@ebolaman_
@ebolaman_ 11 ай бұрын
haha same, that’s why i make these vids
@daireduke9081
@daireduke9081 6 ай бұрын
@@ebolaman_ just wonderin if youre questioning why he wanteed that info that bad
@Yuma_roblox
@Yuma_roblox 6 ай бұрын
you make the best "for educational purposes" videos!
@user-bv3nk7bu9o
@user-bv3nk7bu9o 6 ай бұрын
We are going to use this only for education purposes
@Some-Dude220
@Some-Dude220 6 ай бұрын
Or are we? **Vsauce music kicks in**
@retrobuild4614
@retrobuild4614 7 ай бұрын
Very informative video about cybersecurities.
@Love-yv1fc
@Love-yv1fc 11 ай бұрын
I hope bro, I will see more practical stuff like this in future❤😊
@mukos.
@mukos. 6 ай бұрын
Is there any change to get that code of bazch file
@loganhess-hc2kf
@loganhess-hc2kf 3 ай бұрын
gotta luv the • Educational Purposes Only •
@fuckbitchesgehmoney
@fuckbitchesgehmoney 6 ай бұрын
Now this is a solid channel for explaining basic attacks
@DaddyKxixz
@DaddyKxixz 6 ай бұрын
Believe it or not this channel is the only channel that i can do the tuts from and it acc works for me like if i do it from another channel somehow it wont work,.
@moondeVries1
@moondeVries1 6 ай бұрын
Your profile is really good for animations 😊
@aminlee5
@aminlee5 11 ай бұрын
Bro love your content You got one sub ❤
@vladislavkaras491
@vladislavkaras491 6 ай бұрын
Great explanation! Thanks!
@nitrogaming7565
@nitrogaming7565 11 ай бұрын
W vid ebola🔥🔥🔥
@Envying
@Envying 11 ай бұрын
Could you do a video on rootkits?
@TheHiddenFiless
@TheHiddenFiless 6 ай бұрын
First lie of the year: I am going to use this for educational purpose only 😊
@chainbreaker8909
@chainbreaker8909 6 ай бұрын
'This if for educational purposes "only" I forgot to mention that' ~ when everyone is about to close the video.
@alexfrikha856
@alexfrikha856 11 ай бұрын
Legendary brother ❤
@ebolaman_
@ebolaman_ 11 ай бұрын
thank you 🤝
@Sebastian_ok.
@Sebastian_ok. 5 ай бұрын
@@ebolaman_ great video but where do i find the one liner code i dont see it on your github
@rmzfr
@rmzfr 6 ай бұрын
Thanks for the tut!
@TRASHcanGei
@TRASHcanGei 7 ай бұрын
you mate any chance of gettin the one liner? i do have permission to use it on my brother so the only thing standing between me and using this is the one liner how do i get it? any chance of uploading it or smth?
@ATC24PTFS
@ATC24PTFS 5 ай бұрын
Thanks for the information !! this really will help me 🧐🧐💀💀
@Allan4PF
@Allan4PF 7 ай бұрын
What about connecting to Bluetooth speaker and turning it off?
@benfen8798
@benfen8798 6 ай бұрын
yo im in a minecraft war with my friend and this is perfect to find his base coordinates, thank you
@Some-Dude220
@Some-Dude220 6 ай бұрын
Bro has possibilities to get access to his credit card, search history, steal personal information but uses it only to get minecraft coordinates. You really are something my guy!
@benfen8798
@benfen8798 6 ай бұрын
@@Some-Dude220 thanks for the ideas, gigachad. I'm not wanting to go to prison for stealing bro's coordinates, so I won't do anything else
@Some-Dude220
@Some-Dude220 6 ай бұрын
@@benfen8798 that’s good. Next time try to get full access to his PC and delete system32, that way not only did you find his base, but he can’t even fight you :)
@SebastianSMV
@SebastianSMV 6 ай бұрын
crazy how easy it can be to take control of someones pc if you have malicious intent and know what you are doing, great vid tho
@pinguinhd2005
@pinguinhd2005 6 ай бұрын
Mad a py script that sets itself in auto start and it a pretty good backdoor
@adrianpinggera4831
@adrianpinggera4831 6 ай бұрын
Can we get this powershell ohne Liter code
@vpexmc
@vpexmc 6 ай бұрын
Is it possible for them to still connect if your wifi/internet is disabled while exitting?
@SlimeyDev
@SlimeyDev 6 ай бұрын
what is the powershell code?
@Opsec0
@Opsec0 5 ай бұрын
3:35 where can i find the one liner code?
@LOLbruh9
@LOLbruh9 2 ай бұрын
yep too
@ItzKraytix6
@ItzKraytix6 6 ай бұрын
I will love to try this thing for "Educational purposes"😈💀
@im_andrei1010
@im_andrei1010 6 ай бұрын
never knew you were interested in gd!
@account-t2j
@account-t2j 6 ай бұрын
bro was a criminal himself💀💀 0:03
@madamsmith9175
@madamsmith9175 Ай бұрын
You could create in c++ to inject code into calc
@attached3245
@attached3245 5 ай бұрын
what would occur if this program was run while not connected to the internet? would it pickup the attack where it left off once you connect?
@user-mi8tu5ln4c
@user-mi8tu5ln4c 6 ай бұрын
when I type in NC in my windows search my command prompt pops up , do I got some 2 worry about 😭😭
@ahhfdhxhdj5312
@ahhfdhxhdj5312 11 ай бұрын
Im new to listeners and remote access. Does the attacker have to be in the same network as the victim or can they be in 2 different networks?
@ebolaman_
@ebolaman_ 11 ай бұрын
my example only shows it when’s it’s on the same network, they CAN be on different networks except then you need to do something called port forwarding
@ahhfdhxhdj5312
@ahhfdhxhdj5312 11 ай бұрын
@@ebolaman_ I would like to know more about it, is it hard to include it into the "script" that you wrote in the video?
@ebolaman_
@ebolaman_ 11 ай бұрын
@@ahhfdhxhdj5312 no its actually the easiest part, just I would recommend using a programming language that isn't open source like batch, C# would be my choice
@opensearch-
@opensearch- 8 ай бұрын
@@ebolaman_ can you make a tutorial on how to ban any kid
@user-is3dw2bh5v
@user-is3dw2bh5v Ай бұрын
correct me if i am wrong but in real life scenario of batchcraft one has to allow incoming connections on the attacker's side and on victims side they don't right? would this be in a large WAN (such as internet ) considered port forwarding by attacker?
@nothink0945
@nothink0945 7 ай бұрын
But how do i get the .bat file because i dont think anyone would download netcat for no reason
@thafuga7979
@thafuga7979 6 ай бұрын
In the real word you wouldn't use netcat as a reverse tcp shell. This was just a basic demonstration of how reverse shells work. You would either code your own or use one of metasploit's modules (this is used mainly for pentesting). Real attacker would most likely inject his reverse shell code into legitimate software (this is mostly done to cracked software) and distribute it as much as possible. There are some automated tools that let you do this undetected and fast such as cobalt strike, focused mainly on red team operations. However they cost A LOT. A LOT
@ahmadabuzitoon1742
@ahmadabuzitoon1742 3 ай бұрын
how can i get the netcat tool ?
@Stefzoo
@Stefzoo 6 ай бұрын
oh! One more step! This is for educational purposes only!!
@ro7yt212
@ro7yt212 5 ай бұрын
how do i get the reverseshell.txt file?
@MushibugyoTensei
@MushibugyoTensei 6 ай бұрын
Finally i can prank my schoolmates and friends
@easystun066
@easystun066 7 ай бұрын
If you need to have the ip address in the code so your victim gets hacked does that mean he has your ip address and he could technically use it against you?
@ebolaman_
@ebolaman_ 7 ай бұрын
he needs his own ip address not yours
@alvemaster
@alvemaster 7 ай бұрын
In theory he would be able to find your ip as long as he knows someone is connected. However if the attacker uses a well set up VPN it would display the wrong ip and it would be extremely hard to locate the attacker. But VPNs are not foolproof either. Remember, dont go around hacking peoples devices. A well trained technician with federal tech will always be better than you.
@Black_Ghost69
@Black_Ghost69 7 ай бұрын
​@@alvemaster yea we are just skids not a blackhat
@logicguy4029
@logicguy4029 7 ай бұрын
@@alvemaster A VPN LOL
@palapapa0201
@palapapa0201 6 ай бұрын
@@ebolaman_What?
@Indodapro
@Indodapro 3 ай бұрын
yo, anyone know how to do this on a pc with a different public ip?
@dbozz6344
@dbozz6344 7 ай бұрын
dont you still need net cat to connect to a server 2 listen or sum cus u showed how to start cmd with a powershell cmd but i still need nc to listen. Or does the attacker just need nc and why? how does that work.
@thafuga7979
@thafuga7979 6 ай бұрын
In the case of a reverse tcp shell. An attacker would need to have open listening port and an active netcat listener.
@thafuga7979
@thafuga7979 6 ай бұрын
If you are talking about creating a reverse shell in a device separate from your local network, you would also need to open port on your router to allow outside connections or port-forward respective port by a service such as ngrok
@user-gb4yz5ze5q
@user-gb4yz5ze5q 6 ай бұрын
i wanna try is this on a friend where can i get the code that you put in that game?👍👍
@sl_gamer131
@sl_gamer131 6 ай бұрын
hi! this video was extremely helpful but i couldnt see the oneliner shell code you copied so can you please send it?
@Epicgamerlol3245
@Epicgamerlol3245 4 ай бұрын
I love the video's! but where do i download netcat?
@getcxz
@getcxz 5 ай бұрын
this video is great! where can i find the source code so i can test this?
@vGqlqxy
@vGqlqxy 6 ай бұрын
yo this is fire imma try it
@Meletion1
@Meletion1 11 ай бұрын
How do I hide the shell how do I create it?
@ebolaman_
@ebolaman_ 11 ай бұрын
i can help on discord
@Pass_4_Cash_-wz2cc
@Pass_4_Cash_-wz2cc 11 ай бұрын
W channel
@awesomeisrael3216
@awesomeisrael3216 5 ай бұрын
even better is if you get The Hak5 rubber ducky, it can open command prompt and paste this code it, so all you have to do I plug in the USB and your done
@beerypilas7790
@beerypilas7790 6 ай бұрын
can we get the code that u run there and its gonna give us acces like u did there?
@javierantonordonez6168
@javierantonordonez6168 5 ай бұрын
can you paste here the comand?, i cant see it with your lovely camara
@BlackBearFTW_
@BlackBearFTW_ 6 ай бұрын
How would you make this persistent tho, so it automatically reconnects when the victim restarts their device
@Just_Shadow-_-
@Just_Shadow-_- 5 ай бұрын
i don’t know if that’s actually possible in bash scripts but you could try to make it create a file and then add lines of code that put another program(made with the same script) into the start folder so it automatically runs when pc boots
@sourdoughbread952
@sourdoughbread952 Ай бұрын
Yeah thanks for educating me😁😄😃😀🙂😈
@ethaphu5589
@ethaphu5589 6 ай бұрын
Can something like this be done/happen to me, without downloading anything, just solely having unrestricted communication (no firewall/intranet) between me and the attacker? Can you make a video regarding this?
@koreanfever3132
@koreanfever3132 6 ай бұрын
If your talking about reverse connection, No, Unless you have specific settings that automatically download random exe files from the internet, because a hacker can't connect to your pc/laptop unless you actually "allow" them like in this scenario the only way he could connect to the vm computer is through a exe. Just make sure you have a reliable anti-virus and keep up-to-date . It's suggested to use a local account because if a hacker does get into your pc anyhow, they won't get ultimate access to your computer, So you could keep your important files in a secured space (Through encrypting the files, which can be done from command prompt itself) . Don't save passwords to your browser and use a password manager like Bitwarden. Do not forget to logout from websites after your done as well. That's all I guess, Hope it helps you :)
@ethaphu5589
@ethaphu5589 6 ай бұрын
@@koreanfever3132 My theory, (from someone that is ignorant on the subject, so, I'm sorry) was: that depending on the way the network contact is made with the attacked computer, vulnerabilities can be explored to gain access to a computer. For example, with Minecraft, where log4j vulnerability enabled remote code execution.. this is basically a "send network packets this way and you can do whatever you'd like". Maybe other things could be made right? Like maybe spoofing being something else towards commonly installed programs that might be listening network?
@koreanfever3132
@koreanfever3132 6 ай бұрын
Well yeah that's a thing but I mean that's why anti-viruses exist, they detect and won't allow suspicious network packets to go through without verification. Hackers will always find a way to hack your pc but that also means that anti-viruses also get better. You should be careful around the net so yes its possible but if you know what your doing then its very less likely.@@ethaphu5589
@LordsonSekyi
@LordsonSekyi 18 күн бұрын
pls teach to create the batch craft and also, I would like to know the codes in the revshell .
@chadchad7827
@chadchad7827 6 ай бұрын
how can i get access to my friends discord account! hell download anything i give him if it needs to be a file help plz!
@GoofyGuestMemes
@GoofyGuestMemes 6 ай бұрын
Where do I get The one liner
@raultudorescu4891
@raultudorescu4891 6 ай бұрын
very funny thing, was literally playing geometry dash when i was watching this lol
@mcshorts7520
@mcshorts7520 7 ай бұрын
How did u create the exes and what language
@ebolaman_
@ebolaman_ 7 ай бұрын
c#
@mayukhchakraborty5364
@mayukhchakraborty5364 6 ай бұрын
2021 lockdown made our school to use zoom, and some people started to just have fun. I remember making a fake software called zoom hack client, with all installers and so, but it would say that installation failed, but actually would install a C++ program that's connected to firebase realtime database. Then I used that to see all the connected PCs, and have complete access to their PCs, like cmd and screenshot softwares and so on! All the screenshots would have been saved as some random uid .dll and I would just rename it to png while viewing.
@hiddenguy67
@hiddenguy67 6 ай бұрын
what a harmless prank!
@returningsoontm
@returningsoontm 6 ай бұрын
Bro probably caught at least 10 ppl watching ph with his "hacked client"
@mayukhchakraborty5364
@mayukhchakraborty5364 6 ай бұрын
@@returningsoontm Oh boy i did. The screenshots were embarrassing (6+ tabs)
@hiddenguy67
@hiddenguy67 6 ай бұрын
but did you have any business there@@mayukhchakraborty5364
@yum2978
@yum2978 6 ай бұрын
how did you get ppl to download your program?
@lollol673
@lollol673 2 ай бұрын
what is the power shell command?
@miku
@miku 6 ай бұрын
Isn't that Danganronpa music? gosh this takes me back...
@davidmolnar0
@davidmolnar0 5 ай бұрын
where to download nc.exe?
@user-np6oq9mh8k
@user-np6oq9mh8k 5 ай бұрын
wouldnt the victim know theres a RAT on their pc when they get random programs popping up? how would the attacker prevent this
@frantakana13
@frantakana13 6 ай бұрын
where is the link PLS
@sphoofxd2499
@sphoofxd2499 11 ай бұрын
Actually fire
@sphoofxd2499
@sphoofxd2499 11 ай бұрын
This is not an automated message that ebola paid for ;)
@ebolaman_
@ebolaman_ 11 ай бұрын
@@sphoofxd2499 🤣
@orren6999
@orren6999 11 ай бұрын
@@sphoofxd2499 or is it
@scphuggerroblox
@scphuggerroblox 5 ай бұрын
@@ebolaman_this is not a automated message that @sphoofxd2499 paid for
@shockd6235
@shockd6235 5 ай бұрын
May i ask how did you learn
@user-vx5jk1ud1n
@user-vx5jk1ud1n 6 ай бұрын
I wonder how... if not those weird youtube hacks tutorial
@Bobplays_
@Bobplays_ 7 ай бұрын
how do you install netcat tho
@pandastudio5789
@pandastudio5789 6 ай бұрын
good video
@weedeater4
@weedeater4 7 ай бұрын
hey man do you know where i could get the power shell one liner id copy it but theres always something covering it btw fire video man
@ebolaman_
@ebolaman_ 7 ай бұрын
desc
@Kattoe
@Kattoe 7 ай бұрын
​@@ebolaman_it isn't in the description
@Pallet_
@Pallet_ 6 ай бұрын
@@ebolaman_ I don't see it in the desc, just timestamps and your github
@abhradeepde2357
@abhradeepde2357 6 ай бұрын
@@ebolaman_ cap
@kzxay_And_clover
@kzxay_And_clover 17 күн бұрын
@@ebolaman_ i don't see it
@orren6999
@orren6999 11 ай бұрын
Another W
@ebolaman_
@ebolaman_ 11 ай бұрын
thx 👊
@portokalcho8632
@portokalcho8632 3 ай бұрын
Can you give me a link to the one liner bc i cant find it 🙏🙏🙏
@mukos.
@mukos. 6 ай бұрын
How can i get code for batch file
@filippozanrosso7679
@filippozanrosso7679 6 ай бұрын
where I download Netcat? and can you pls put the one line code thanks
@LOLbruh9
@LOLbruh9 2 ай бұрын
Nmap
@100Procentnoob
@100Procentnoob 11 ай бұрын
banger
@ebolaman_
@ebolaman_ 11 ай бұрын
W
@orren6999
@orren6999 11 ай бұрын
Hej Gurt
@Buggeds
@Buggeds 4 ай бұрын
What if I downloaded something like this what do I do?
@shotbydemon
@shotbydemon 9 ай бұрын
could you make a video on how to remtoly connect to other peoples pc. sort of like how chrome remote works but without any device needing "admin permisson"
@ebolaman_
@ebolaman_ 9 ай бұрын
kzfaq.info/get/bejne/hp6jiseUr7nWgZ8.htmlsi=s2NWQBQuL1TeJZTm
@LollokillTV
@LollokillTV 6 ай бұрын
day one of asking for the one liner since its not in the description pwetty pwease
@SenqR1
@SenqR1 6 ай бұрын
Please make more videos like this because my info got life got leaked to my family because i was dumb enough to download a trojan horse virus.
@Moehre_B
@Moehre_B 6 ай бұрын
where can i find the shell script?
@DrippyVR_Official
@DrippyVR_Official 5 ай бұрын
I wish I watched this before I got hacked
@AC-pr2si
@AC-pr2si 11 ай бұрын
How do you create the exe file?
@ebolaman_
@ebolaman_ 11 ай бұрын
visual studio C#
@andrewliu6592
@andrewliu6592 6 ай бұрын
visual studio (general)/mingw (c/c++)
@WolfSniper1
@WolfSniper1 7 ай бұрын
thank you very much👍👍👍👏👏👏
@ZGPAK
@ZGPAK 6 ай бұрын
Thank God I have a up-to-date antivirus and I don't download anything from Internet malicious even though I can download it by accident but I am very cautious of downloading anything
@thafuga7979
@thafuga7979 6 ай бұрын
I mean any decent reverse shell would not be detected by a simple AV. Just do not download cracked things and you should be good.
@crispy7661
@crispy7661 6 ай бұрын
Port forwarding but if it was on the same network
@IDKTECHSPERTS
@IDKTECHSPERTS 6 ай бұрын
One I downloaded something to hack MC by uncle foiler and it didn’t run but I was hacked bc I ran anti virus and I found it and deleted it and then chrome chrashed whole quarantining so yh
@SebTheRula
@SebTheRula 6 ай бұрын
When i go to my firewall settings: parental controls can get trough ur firewall. Me: HOW DO I REMOVE THAT
@BananPc
@BananPc 28 күн бұрын
Whats a good up to date anti virus?
@georgemandolfo4562
@georgemandolfo4562 4 ай бұрын
how do u get windows vm?
@user-ut4bw4tk2y
@user-ut4bw4tk2y 7 ай бұрын
is there a download link ?
@poisonousdynasty
@poisonousdynasty 6 ай бұрын
4444 is about to be so overused.
@Therealhamster28
@Therealhamster28 6 ай бұрын
if the other person does not have netcat will this still work
@ebolaman_
@ebolaman_ 6 ай бұрын
yes
@Therealhamster28
@Therealhamster28 6 ай бұрын
where do you find the powershell code you used, and if its on your github what is it called@@ebolaman_
@ZAVNEX
@ZAVNEX 6 ай бұрын
Is it still possible when the victim's offline?
@johnwillnotpost
@johnwillnotpost 6 ай бұрын
lol can u send the powershell code? education purposes only too
@dotggfam
@dotggfam 11 ай бұрын
:) u epic
@xoxogamewolf7585
@xoxogamewolf7585 6 ай бұрын
i literally made a reverse shell once
NMAP Tutorial for Beginners! Network Attacks
15:51
Loi Liang Yang
Рет қаралды 89 М.
MEMZ.BAT
16:06
dragonfire_177
Рет қаралды 545
Cat Corn?! 🙀 #cat #cute #catlover
00:54
Stocat
Рет қаралды 15 МЛН
Best father #shorts by Secret Vlog
00:18
Secret Vlog
Рет қаралды 22 МЛН
БОЛЬШОЙ ПЕТУШОК #shorts
00:21
Паша Осадчий
Рет қаралды 11 МЛН
Clowns abuse children#Short #Officer Rabbit #angel
00:51
兔子警官
Рет қаралды 72 МЛН
How To Become Invisible Online
24:06
Hallden
Рет қаралды 2,8 МЛН
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,2 МЛН
Dangerous Hacking Gadgets You Can Still Buy
8:38
Next Tech
Рет қаралды 307 М.
How to bust a tech support scammer
9:03
Jim Browning
Рет қаралды 406 М.
Learn Reverse Engineering (for hacking games)
7:26
cazz
Рет қаралды 1 МЛН
Nmap Tutorial to find Network Vulnerabilities
17:09
NetworkChuck
Рет қаралды 2,7 МЛН
Remotely Control Any Phone and PC with this Free tool!
17:15
Loi Liang Yang
Рет қаралды 808 М.
Use Your Home PC from ANYWHERE???
25:35
Kalos Likes Computers
Рет қаралды 1,3 МЛН
Top 10 Hacking Tools In Kali Linux You Must Know.
7:31
Zilox
Рет қаралды 440 М.
Cat Corn?! 🙀 #cat #cute #catlover
00:54
Stocat
Рет қаралды 15 МЛН