Тёмный

5 Signs Your Computer Has Been Hacked 

Loi Liang Yang
Подписаться 1,1 млн
Просмотров 1,7 млн
50% 1

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Наука

Опубликовано:

 

7 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 1,9 тыс.   
@LoiLiangYang
@LoiLiangYang 4 года назад
Task manager, netstat, wireshark, firewall and antivirus.
@flamess007
@flamess007 4 года назад
Thank you master ♡♡
@skunkhead2007
@skunkhead2007 4 года назад
So ok then how as im still relativly new to Linux how do i detect if any one is hacking my Linux Os? i use as the norm Parrot sec or Kali Linux?
@skunkhead2007
@skunkhead2007 4 года назад
do i run top or htop from aa terminal then dissconect any unwated traffic
@kivisaur
@kivisaur 4 года назад
How can i open closed videos? Thanks!
@areaofeffect100
@areaofeffect100 3 года назад
@@hackers13 huh?
@bryanalexander4176
@bryanalexander4176 3 года назад
The hacker who are visually remote access my computer watching me watching this video : *Nerveously sweating*
@knifulaifu
@knifulaifu 3 года назад
Lmaoo
@majeedmx7016
@majeedmx7016 3 года назад
do you mean to saay FBI?
@jeffsmith6340
@jeffsmith6340 3 года назад
I'm
@spline5243
@spline5243 3 года назад
@@majeedmx7016 fbi cant "visually remote access" your screen....
@slomow-1540
@slomow-1540 3 года назад
I can feel FBI is coming
@edeak1645
@edeak1645 3 года назад
The hacker watching me watching this video : *Interesting*
@philipjfry4465
@philipjfry4465 3 года назад
@Amano Kun Interesting
@LuizZignani
@LuizZignani 3 года назад
Why i think your comment will get 1k likes
@edeak1645
@edeak1645 3 года назад
@@LuizZignani same
@TLMX722
@TLMX722 3 года назад
Oh hello there i have been watching u
@Kawaii-Chino
@Kawaii-Chino 3 года назад
Very interesting
@dreimar1796
@dreimar1796 3 года назад
"open task Manager and look for potentially malicious program running..." - Cortana spotted!!
@shadowlord0162
@shadowlord0162 3 года назад
so true
@0623kaboom
@0623kaboom 3 года назад
@SaimonSSL um try windows is the virus ... who needs the bloatware ... 90% of the junk running on windows 10 is not needed but windows forces it anyway ...
@Timic83tc
@Timic83tc 3 года назад
halo ai cia
@stuffandthangs3953
@stuffandthangs3953 3 года назад
@SaimonSSL You cant even spell Cortana right after it was spelt in front of you. Incompetence.
@merhusdagon
@merhusdagon 3 года назад
@@stuffandthangs3953 Clown comment. He is clearly trying to joke around.
@alejosandu
@alejosandu 3 года назад
how to become paranoid in 10 minutes
@BastianTheGreatestCreatorEver
@BastianTheGreatestCreatorEver 3 года назад
true lol
@Praneeth_-
@Praneeth_- 3 года назад
Fr
@daelaenor
@daelaenor 3 года назад
@@laflame3460 Nah, you're fucked. Everything's already infected with malware by the time you read this. Jk, I don't know what I'm talking about.
@laflame3460
@laflame3460 3 года назад
@Cityscapes It downloaded folder normal folder I didnt even open it
@doufmech4323
@doufmech4323 3 года назад
@@laflame3460 you can never be sure but it is not unlikely that you have a virus. I would say 70% you got infected.
@ytawesomegaming3216
@ytawesomegaming3216 3 года назад
Had to watch this on my phone because my computer would close the tab for no reason.
@ihaveagoddamnplanarthur
@ihaveagoddamnplanarthur 3 года назад
hmmm
@firecorex994
@firecorex994 3 года назад
Well...
@cabbagememes2852
@cabbagememes2852 3 года назад
Hmmm 🧐
@mrstarfish
@mrstarfish 3 года назад
thats one of the signs that you got hacked
@tib1281
@tib1281 3 года назад
@@mrstarfish thats one of the signs that you missed the joke
@JimmyJohnJahames
@JimmyJohnJahames 3 года назад
when you try to un-hack your pc but you end up hacking the hacker
@leg4985
@leg4985 3 года назад
thats just exagerated swaggers
@bigchungus14hvh12
@bigchungus14hvh12 3 года назад
@@leg4985 the exxaggerated swagger of a blck teen
@JimmyJohnJahames
@JimmyJohnJahames 3 года назад
@Zrobilive lol
@DarthVaston
@DarthVaston 3 года назад
@Zrobilive most of the time the attacker's IP you see, it's not his real one.
@yaboiothman984
@yaboiothman984 3 года назад
Actual fucking gigachad
@kirjian
@kirjian 3 года назад
"huh, let's see the task manager..." *finds powershell running* *SWEATING PROFUSELY*
@Mr.Wayne.1
@Mr.Wayne.1 3 года назад
Same. Is that a normale one or is every powershell a virus/tracker???
@maxime1768
@maxime1768 3 года назад
@@Mr.Wayne.1 if you don't have a powershell window open, i guess it's a virus
@axellor9836
@axellor9836 3 года назад
@@Mr.Wayne.1 if you didn't download it or don't have it opened then it is very likely a virus
@Iqbal1808
@Iqbal1808 3 года назад
well i have windows defender notification icon running, frick
@axellor9836
@axellor9836 3 года назад
@@Iqbal1808 uh oh, seems like you're screwed
@Wiki1184
@Wiki1184 3 года назад
Wasn't even thinking about the possibility I got hacked until I saw this recommended, now I'm paranoid for no reason.
@aeptacon
@aeptacon 3 года назад
LOL
@gowororigejunua439
@gowororigejunua439 2 года назад
Lol
@ducodarling
@ducodarling 3 года назад
Signs you've been hacked: 1) You're using windows 2) It's connected to the internet 3) You've installed something on it
@wladfan
@wladfan 2 года назад
stfu apple user
@wladfan
@wladfan 2 года назад
@@YousefSadiq then "stfu non-windows user"
@wladfan
@wladfan 2 года назад
@@YousefSadiq then "stfu Duco Darling" is appropriate
@u1richh
@u1richh 2 года назад
Signs you've been hacked: 1) Own a computer 2) It's connected to the internet
@wladfan
@wladfan 2 года назад
@@u1richh ever heard about the Mirai botnet? Literally anything that can connect to internet can get hacked
@usernamequaalquerr
@usernamequaalquerr 3 года назад
**tries to open task manager** Task manager has been disabled by your administrator. *this is fine*
@drishalballaney6590
@drishalballaney6590 3 года назад
aah we need some defense for this now :D
@whyamiherelol4616
@whyamiherelol4616 3 года назад
man get to like the support and call the support system for help
@semicolumnn
@semicolumnn 3 года назад
sudo.. oh wait shit
@Skullkid16945
@Skullkid16945 3 года назад
@@godric443 Was just fixing to say, always good to have alternatives in case one is compromised. Task Manager, ProcessHacker, Process Explorer, etc. Even better if you have them on DVD-R which can't be modified. That way you can still run the software and not worry about it being deleted or modified in a way that disables it. Although would be funny if they noticed and kept ejecting your CD Drive XD
@toyb-chan7849
@toyb-chan7849 3 года назад
You can activate it again in the group policy editor
@modern8925
@modern8925 3 года назад
Me: *gets this video reccomended after downloading 40+ Minecraft mods* also me: "Im in danger"
@imoutofnameideas5601
@imoutofnameideas5601 3 года назад
*chuckles* "I'm in danger"
@XZ1.
@XZ1. 3 года назад
@yupyipit fabric is usually safe, but forge has many breaches
@XZ1.
@XZ1. 3 года назад
@yupyipit neither did I. It sounds very fishy and I think he got the virus from something else, but he told me it was after he used the client with the mod
@XZ1.
@XZ1. 3 года назад
@yupyipit yeah
@Zysperro
@Zysperro 3 года назад
40? Das a rookie number. I've been rocking 2 shady launchers with hundreds of manually installed mods on them back in 2015 XD Never got a virus afaik.
@emperornero1932
@emperornero1932 3 года назад
A big sign is when a Indian guy is asking you to buy gift cards to fix the issue
@rabidbeaver167
@rabidbeaver167 3 года назад
Or any support for that matter.
@AI-zd4yb
@AI-zd4yb 3 года назад
"hello your computer has virus" ~not an India guy but has deep indian accent
@uncovidvaxxforthestrongand3582
@uncovidvaxxforthestrongand3582 3 года назад
@@rabidbeaver167 lol okay then
@xxxzz8413
@xxxzz8413 3 года назад
Cut off the internet wire
@EIRE55
@EIRE55 3 года назад
Jim Browning is an expert on that..............he knows them all...;-D
@KoltPenny
@KoltPenny 3 года назад
My first suspicion would be that "hacker" file in the desktop.
@sethadkins546
@sethadkins546 3 года назад
A few things: If you notice a remote shell is running on your system, don't just kill it and be done with it. Always check for backdoors and the like, persistence is an important step in the attack process. You won't always see the shell pop up in the task manager, especially if it's a meterpreter shell. Meterpreter can migrate to other processes (and usually will because windows defender will often automatically kill remote shells if they don't), so you have to look for other things such as abnormal resource usage or unusual calls if you have Sysinternals tools. Just because you have your firewall up does not mean you are safe. A hacker might be able to bypass his way around it, and most will know that disabling it altogether is an easy way to get spotted. Always check for suspicious permissions when it comes to the firewall, and use a router based firewall whenever possible since a system based firewall can be easily disabled or bypassed.
@JatinBhuyan
@JatinBhuyan 3 года назад
What you just said, gone above my head bro, a video would have been useful for it i think.
@joeyhensley9199
@joeyhensley9199 3 года назад
Taskkill /F /T /PID NNN
@gowororigejunua439
@gowororigejunua439 2 года назад
Lol
@craigheard2504
@craigheard2504 2 года назад
Those are great points. Thanks for bringing it up. Persistence is the goal, you’re right. That’s a jackpot for malicious actors. Thanks for the router based firewall information too.
@ease2sleep940
@ease2sleep940 2 года назад
I don't know my elbow from my bum hole when it comes to this stuff so anything said sounded like alien lingo to myself and anyone with a basic knowledge of pc functions lol.
@ildefonsogiron4034
@ildefonsogiron4034 3 года назад
Sign no. 1: at startup, it greets you with a "welcome to windows" screen.
@Skullkid16945
@Skullkid16945 3 года назад
@S T Ξ Λ L T H Windows is quite the bloated and chatty OS built to mine the user for data. Constantly sending "anonymous" analytics data to Microsoft and etc. Average American citizen's data is usually worth around 5 - 6 ish USD I think, not fully sure though. Either way, they can collect that data from millions and they make quick bucks selling it to advertising companies. Ever wondered why when you do most things on the internet, you see ads related to that, or suggesting things you only just recently looked at or searched on google?
@noclip_st
@noclip_st 3 года назад
@@Skullkid16945 yes, Microsoft collects the user data. So does Apple, Google, Facebook, you name it. If you are that paranoid over Microsoft's data collection, what if I tell you that every android phone with google assistant enabled is listening to your conversations ALL THE TIME? Probably even when assistant is disabled, though I have no proof for that. This in fact is most likely why you're seeing ads related to stuff you've spoken about, it's because google is listening to you more than anyone else. Microsoft began as a software company/operating system maker, but Google began their operation as a serach engine developer and their primary profits come from ads. You're trying to portray Microsoft as an ultimate bad guy but it's far from truth
@hhhhhh-vi6sq
@hhhhhh-vi6sq 3 года назад
@@Skullkid16945 but if you get ads on google related to what you just looked up on fucking google wouldnt it be google who sells the data?
@tranhanna7524
@tranhanna7524 3 года назад
@@Skullkid16945 Good god your name broke youtube. It crosses the right panel of youtube going all the way to the right edge of the screen.
@memehuman7263
@memehuman7263 3 года назад
@@Skullkid16945 Is there's youtube link on ur name?
@hbarchromeE
@hbarchromeE 3 года назад
Me: opening never gonna give you up on youtube My FBI agent and the guy hacking my pc: fuck
@hans-gg7tr
@hans-gg7tr 3 года назад
The best Anti Virus is most of the times common sense.
@Aoi-lol
@Aoi-lol 2 года назад
cute pfp
@gowororigejunua439
@gowororigejunua439 2 года назад
Nope
@AnshuOP69
@AnshuOP69 2 года назад
Antivirus is a virus itself
@System64MC
@System64MC 3 года назад
"First thing you wanna do is right click the taskbar and select task manager" me on linux: _sad tux noises_
@System64MC
@System64MC 3 года назад
@Jay Rozes I get better performance on Linux, plus I like the distro I use, it's very stable and fast
@auricom242
@auricom242 3 года назад
top
@sirrobertwalpole1754
@sirrobertwalpole1754 3 года назад
@@System64MC based?
@System64MC
@System64MC 3 года назад
@@sirrobertwalpole1754 I'm on Zorin, based on Ubuntu
@System64MC
@System64MC 3 года назад
@@sirrobertwalpole1754 I'll take a look at it, thank you
@cpatz1000
@cpatz1000 3 года назад
You can always do netstat -b in an elevated cmd and it will show the executable file with that connection.
@theconfusedpenguin4612
@theconfusedpenguin4612 2 года назад
Thank you so much
@leemichael2883
@leemichael2883 2 года назад
could do yea
@reported7274
@reported7274 2 года назад
@@amateruss command prompt with admin rights.
@Avadonia
@Avadonia Год назад
"The requested operation requires elevation."
@namaanda5349
@namaanda5349 3 года назад
I'm a regular windows user, and I'm using task manager since windows 7 era to monitor my whole system. Thanks for the additional tips.
@gowororigejunua439
@gowororigejunua439 2 года назад
Nope
@dumarserittard7289
@dumarserittard7289 2 года назад
@@gowororigejunua439 wth dude you're everywhere
@BreadMaster-rz7ub
@BreadMaster-rz7ub 3 года назад
Easier way to stop them from stealing your info: Unplug your Ethernet cable
@dyna6448
@dyna6448 2 года назад
Best solution here
@BreadMaster-rz7ub
@BreadMaster-rz7ub 2 года назад
They hacked into your router? Unplug it.
@somerandomperson7
@somerandomperson7 2 года назад
They hacked into your grandmas life support? Unplug it.
@SAMURAIoriginal
@SAMURAIoriginal 2 года назад
im on wireless
@balala7567
@balala7567 Год назад
@@SAMURAIoriginal unplug your router
@danielgilbert4570
@danielgilbert4570 3 года назад
Dude, solid video! Thanks for sharing. I like that you show both sides of the hack! Good work man! At work, I usually reboot the workstation if I think a customer opened a phishing payload. Because I have some offensive experience, it makes me realize that unless they’ve established persistence, they’ll need to exploit again :). Obviously if you have physical access to network interface you can also disconnect that too. Anyway, great video!
@akairink2170
@akairink2170 3 года назад
Hackers will be very dissapointing after looking at my balance
@0623kaboom
@0623kaboom 3 года назад
they look at my balance and send me money ...
@BlackieNuff
@BlackieNuff 2 года назад
For the Task Manager tip to be of any use, the user must already be familiar with all the normal processes that should consistently or can occasionally appear there. I keep a Notepad with the complete list of everything in the Services list, the Startup list (from the msconfig dialog) as well as the task Manager list. Anytime I remove/disable or add/enable software, I update the list. Studying those lists and getting a general familiarity with them is crucial. Do I have everything memorized that I can recite every item for memory? Of course not. But upon looking at the list, I can recognize what should or should not be there. And if I am not sure, my Notepad list/record helps me make a distinction as to whether I'm merely not recognizing something that's always been there, or if it's something "new" that I did not authorize.
@smokescreen2146
@smokescreen2146 Год назад
You made the list after you got hacked, then what?
@BlackieNuff
@BlackieNuff Год назад
@@smokescreen2146 What do you mean "then what?" ?? I am pretty sure the answer is in what I said : memorize/familiarize yourself with the items, know at a glance what should and should not appear in that list. If you have something specific in mind, you're gonna have to use your words and explain it. I am not a mind-reader and I am not fluent in dumbed-down Textinese.
@BlackieNuff
@BlackieNuff Год назад
@@smokescreen2146 It just occurred to me what you meant : The answer still should be obvious... Google it.
@BlackieNuff
@BlackieNuff Год назад
Seems I have to spell this out .... TO MAKE TASK MANAGER REFERENCE LIST : 1. Open Task Manager. 2. Select "Processes" tab. 3. Look over all items. If you do not know/recognize a process, or cannot deduce with certainty what it is : a. Do a local computer Search for that process to determine its location - sometimes just knowing where it is can verify its legitimacy. b. If finding it on the computer, the location still does not clear anything up for you as to what it is or if it is safe, GOOGLE IT.
@smokescreen2146
@smokescreen2146 Год назад
@@BlackieNuff There are over 120 processes running on my machine right now with just Firefox opened, and they keep changing and re-ordering themselves, so good luck memorizing and spotting them. Like I said you made your list after you already got hacked, and not before so it is useless. Some Trojans can also pretend to be legitimate processes (e.g. scvhost) and can even hide themselves from appearing on Task Manager. Anyway why are you listening to someone who teaches hacking for advice on how to stop hackz?
@MD-ki7qw
@MD-ki7qw 3 года назад
I’ve been looking for videos like this when I was young! I’m glad to have found these years later! I hope to probably get into networking and coding again it has always interested me and I went to college for it before they shut down on me twice But if I can learn now for a hobby that would be cool! Maybe someday I can make it a career again
@urest
@urest 3 года назад
Hey can u hack someone for me
@Shigbeard
@Shigbeard 2 года назад
I will add just one thing: Be careful with just willy nilly ending tasks. Some tools are able to do some techno-sorcery and tie themselves to a critical windows process, meaning that if you kill it you'll trigger a bluescreen of death. The malware would remain running once you reboot as it'll likely also be configured to set itself up on startup. I wont name any tools that I know possess this ability, but I will assure you they exist and it's best to rely on an antivirus to do the cleanup for you if you don't know what you are doing.
@FingerprintGamer
@FingerprintGamer 2 года назад
just paste the shortcut to startuup folder andd every sftware hs that ability
@ThePower1037
@ThePower1037 2 года назад
I just got a malicious clone of syscruntime140.dll, and it lived through a complete cloud reinstall of windows 11.
@SciK.
@SciK. Год назад
@@ThePower1037 keyword is cloud
@arminhorvath-
@arminhorvath- 3 года назад
me who has just reinstalled windows 2 days ago: *interesting*
@steampunklimbo
@steampunklimbo 3 года назад
ello, yu computeh has viros
@user-vi3pi9rf7w
@user-vi3pi9rf7w 3 года назад
I'm *"Stephen Jordan"* from Microsoft
@advinhon
@advinhon 3 года назад
ello sir, your computeh has viros
@simulping4371
@simulping4371 3 года назад
**discord crashes**
@IndellableHatesHandles
@IndellableHatesHandles 2 года назад
"zir, you have a wirus on your dextop."
@tonzku.
@tonzku. 2 года назад
Ma'em i em Jonh smith from moocresooft. Please doonleed GoTwo Assist pleas.
@norbeekash2699
@norbeekash2699 2 года назад
919 highly skilled hacker disliked the video. Honestly I don't know how somebody can dislike something this informative
@ease2sleep940
@ease2sleep940 2 года назад
I can see why there is dislikes. People who know nothing come here trying to learn how to find out if they got hacked and get bombarded with crap loads of very tech lingo and get lost in the first 2 minutes or less lol. You see? A person would already have to have learned some technical stuff to even begin to comprehend any of this info. :-s. You see now?
@Kate-qw9er
@Kate-qw9er Год назад
I am doing Loi'c course on Udemy and have got to say that he is a really good teacher. You guys are so lucky that he had this really important video up on RU-vid for free...I am too as I am fending off an attacker...Thanks Loi, your awesome! 😊
@MarkDunn
@MarkDunn 3 года назад
Who else checked to see if PowerShell was running on your computer right now.
@IndellableHatesHandles
@IndellableHatesHandles 2 года назад
Yeah, mostly because I found GTA V was slower than usual.
@dubyag4124
@dubyag4124 3 года назад
Pro tip: if you know the hacker's IP, this will help you find the hacker.
@conservadont
@conservadont 3 года назад
this is exactly what I was gonna comment lol, but how would you actually know? like if you don't have their IP
@0623kaboom
@0623kaboom 3 года назад
or you will find the machine they are spoofing or doing a remote access from ... and get the wrong person ... you need to strip the header packet to find the final destination to get the ultimate end user of the process ... most tools DONT do this ... so they stop at the first IP and call it a day ... but the packet can then be rerouted from the remote machine to the hacker or yet another remote machine and so on ... .
@brunodosreis
@brunodosreis 2 года назад
This is a good start, but you should also research how they gained access in the first place
@errorlevel1113
@errorlevel1113 3 года назад
This is the first actually good video about detecting when you get hacked.
@davidtolle9533
@davidtolle9533 3 года назад
This is a lot to take in but it seems very in depth so thank you!
@NikoNemo
@NikoNemo 4 года назад
It will be great to show the same for Linux too! I would like to ask You as a Wordpress websites creator if You can create some videos for Wordpress vulnerability...
@MrCybiz
@MrCybiz 3 года назад
Imagine disabling a hacker's connection after watching this video xD
@IndellableHatesHandles
@IndellableHatesHandles 2 года назад
I wonder if they could restart it again.
@bf6081
@bf6081 3 года назад
Good video. New subscriber here, I've already gone threw a few of your video's and find them interesting. I'm new to learning IT, and trying to learn on my own but I find your video's really helpful.
@Barafu
@Barafu 3 года назад
There are 117 back doors into Windows 10 and only a handful are closable without crashing internet access. If you close too many doors, Windows 10 will detect it and shut off your internet access. One of the back doors that are well known is the INTELME back door. Most of them are telemetry ports, update ports, location tracing ports, meta data ports and webpage remote viewing ports.
@gopalethical
@gopalethical 3 года назад
Great video, very informative and straight forward. Keep it up
@whamer100
@whamer100 3 года назад
well i certainly feel better about my system now, nothing looked out of the ordinary
@lemonacidrounds7293
@lemonacidrounds7293 2 года назад
Me too, although I don't have an antivirus program cause its often screwing up my games
@riseandshinemrfriman5925
@riseandshinemrfriman5925 2 года назад
Everything looking "in order" doesn't mean much. Read up on rootkits. Malware designed to remain hidden.
@zioxei
@zioxei 2 года назад
not even the homework folder?
@devinries2512
@devinries2512 3 года назад
Just came across your channel. Your content is engaging and insightful! Thank you for putting in the effort on these video I appreciate it!
@Dddsasul
@Dddsasul 3 года назад
This is cool but I think the netstat -b would help more. It's almost impossible to identify anything based on numbers so if you know the exe you can at least make educated guesses or google them
@abhigoswami3812
@abhigoswami3812 4 года назад
This video is really helpful for me. Thank you, Sir. :)
@504octo
@504octo 2 года назад
I skip most of the steps by searching for the source file and then deleting from the registry with admin rights anything related to it. Reboot and you'll be ok. No need to go through all the networking stuff. Unless you got into the deepweb unprotected and had to format c:/>. Good video though 👌
@SerandibBroadcast
@SerandibBroadcast 3 года назад
I really learned this today. Thank you for the video, Sir.
@skylerxiomara
@skylerxiomara 3 года назад
Now i need to do a 5yr IT Course just trying to determine if my PC is hacked
@AndyHerbert254
@AndyHerbert254 Год назад
One interesting thing I once noticed: if you want to have remote RDP access, you can open ports on your PC and network. However, with a program like Glasswire I observed tons of external IPs from other countries attempting to access that remote port. Of course the PC on the remote end was password protected (no stupid 4 digit PINs either) so it's quite unlikely that the password would be cracked and access granted (assuming RDP forcibly disconnects after so many attempts). However, this did increase the total incoming traffic into the PC and network (adding to xfinity's data cap). So with this in mind, one way to ensure hackers can't gain access over remote shell or RDP is by using a local VPN and only allowing outgoing traffic over the VPN (except for public servers). A good router firewall like pf/opnsense will make it easy to create a secure and encrypted firewall which is far easier and more secure than opening ports on the router.
@ezekieloruven
@ezekieloruven Год назад
RDP is well known to not have a fail 2 ban system (it allows unlimited attempts to access) and, further, the Administrator users are always automatically added to the allowed list of users to connect by RDP (unless you explicitly remove them). Just never, ever open an RDP port to the internet. If you need remote access, connect to your network by VPN and then use RDP with local IPs tunneled over the VPN.
@GuyWhoChad
@GuyWhoChad 2 года назад
I left my wireless keyboard in my sister's room and she started smashing it and it was connected to my pc so i fricking thought i was hacked 😂😂
@AndrewYouTube866
@AndrewYouTube866 3 года назад
Good video....makes you want to look at your system and see if anyone is trying on you.
@nmHispana
@nmHispana 11 месяцев назад
I have an ex landlord who has psychopath traits and not did he steal my cell phone while moving in, but while not at home he had access to my router and computer. I've always strongly suspected he's hacked my computer and was listening to my conversations, then prior to moving out and while changing the home address to my new location, I found under one of my accounts that my current delivery instructions had been removed and replaced with a new message to be delivered to his home instead. I'd also discovered a cell phone and another devise was connected through my routers wifi known network connections.
@bxnni2927
@bxnni2927 4 года назад
This video came up so early, im still sleepy but i need to watch
@springw3546
@springw3546 3 года назад
One obsessive stalker/ hacker has been inside my computer for many years. When I typed “netstat”, the data came out fine. After that, I typed “netstat/?”, the information came out fine. When I typed “netstat-ano”, nothing came out. This hacker did some program on the script. He tried to block me to delete his hacking IP address in task manager. Please help. Besides that, he has been using manipulating Bank of America(BAC) for several years, without his manipulation, BAC stock price would be over $70/share before Covid-19 market dropping last year. After I bought Wells Fargo(WFC), Li auto limited(Li), NIO Limited (NIO), Pfizer Inc. (PFE) several months ago, he has been manipulating their price and frequently dragged their price down and controlling their price. Trying to ban my voice, he disabled all reviews functions on my several laptop computers Google, Yahoo and other major sites.
@Anequit
@Anequit 3 года назад
@@springw3546 netstat-ano don't exist.. do netstat -ano
@alishanawar4872
@alishanawar4872 3 года назад
@@springw3546 r u a boomer?
@BladeOfLight16
@BladeOfLight16 2 года назад
If you think you've been hacked, the only real thing to do is to nuke the system from orbit: reinstall everything back to factory default (or at least from clean installation media). Trying to detect or root out every single back door is a fool's errand.
@5secondsago15yearsago4
@5secondsago15yearsago4 3 года назад
After watching this, all files I see on my computer with any slight strange names are the potential impostors
@Paco8478
@Paco8478 3 года назад
this video reminds me of those times when you see a movie/game about surviving on a deserted island and you are like exited on what you “would do” if you end in that situation, i’ll be like “I just defeated a hacker!”
@okwepullup
@okwepullup 3 года назад
one of the signs was that i got this in my recommended
@Kitulous
@Kitulous 3 года назад
2:22 him: executables captions: execute the bolts me: execute the BALLS
@cellophanezebra4663
@cellophanezebra4663 3 года назад
Hate those moments when your browser crashes or Steam opening for no reason and you think your hacked.
@SianWinstanley
@SianWinstanley 3 года назад
Good info for intermediate Windows users, not too easy for beginners. But am liking and commenting for the YT algo.
@BlueRice
@BlueRice 3 года назад
the fact window 10 is easier to hacked into than previous window...
@TechnMetal
@TechnMetal 3 года назад
Nice England
@naoaquieopatrickpatrick8565
@naoaquieopatrickpatrick8565 3 года назад
@@TechnMetal Nice Epanishe
@lsudo
@lsudo 3 года назад
WoW english you good teach can ? Don't take this seriously it's just a joke 😂
@Otto_Heiskanen
@Otto_Heiskanen 3 года назад
Well, no shit sherlock, u can just disable taskmanager and apps and u have full control
@recode8453
@recode8453 3 года назад
well it has ten windows
@bunakkaptan
@bunakkaptan 3 года назад
Good to know... thanks dude..... I am enlightened
@delicrux
@delicrux 3 года назад
End task is not always the best. Should right click select goto process then Right click select end process tree. This is how you kill process from the root. It is also important to find out what started the process and if it is a file that can and should be removed.
@Brujerizmobg
@Brujerizmobg 2 года назад
thats actually very good advices u gave here, but 1 thing, netstat will be completly useless, because on a normal machine u wont have like 5 active connections like urs cause urs is fresh instal, instead u would have maybe a 100, so the person needs to be very advanced and to know which application with which IP is comunicating, and that is a lot of additional work to do and track.
@onevastanus
@onevastanus 3 года назад
If you have Windows 10 your computer comes pre-hacked. Signs of hacking: The software is very difficult to remove. The software takes control of your computer so you cannot use it. The software steals all your info. The software makes your computer slow and hard to use. The software fills your computer with junk that you don't want or need.
@robert-raked
@robert-raked Год назад
literally everything microsoft installs by default
@sebastiansmal4423
@sebastiansmal4423 3 года назад
Let be honest, everybody is checking now task manager
@lemonacidrounds7293
@lemonacidrounds7293 2 года назад
I did, power shell's running but its an important program that needs to run.
@Shawali-Explains
@Shawali-Explains Год назад
for sure the best way to be safe is to save all important Doc to an offline drive it shouldn't be available and whenever used first disconnect the cable.
@Metal_Tao
@Metal_Tao 3 года назад
Thank you! This video is... Amazing??? Really demystify CMD too!
@Uiwujwk
@Uiwujwk 4 года назад
Yang Make a video about linux and unix risk factors
@niohyork
@niohyork 3 года назад
Yes but you missed the most important tactic, just f pull the dam network plug. 😑
@tukangbobo
@tukangbobo 3 года назад
Correct, I waste time TB the windows the hacker already encrypt all my data.
@angelinasouren
@angelinasouren 3 года назад
And make sure that the locks on your door take 8 hours to pick.
@deedewald1707
@deedewald1707 3 года назад
@@angelinasouren That back door is unlocked !
@Syrno
@Syrno Год назад
Ive got a weird problem thats been around for a few months, since I think may 17th 2022, where windows security immediately closes, along with some other security things, and some software from my computer(armorycrate which is for ASUS computers) and the taskbar does not work but apps can still be clicked on, and search bars never finish searching anything(in file explorer as its all I can open, and settings) Ive tried a dozen things and theyve never worked, Ive checked files in task manager and I cant find anything, my dad always jumps straight to scorched earth with "just restart the computer, you can save docs but otherwise you're letting hackers steal your credit card info and other things" but nothing has happened, I feel it in my gut that its some absurd bug or error cause by hardware issues(my battery had a bulge but I havent been able to check so I feel like it could have ruptured or messed with the boards I really dont know) or just some setting that I dug 12 layers deep and toggled but wont ever remember where I went to get to it. Its frustrating and I dont want to just torch my laptop.
@StarMidnight
@StarMidnight 3 года назад
My pc just got hacked... they hacked my webcam and microphone. I didn't notice I was hacked until I was watching RU-vid and suddenly, my pc randomly said "We are an anonymous religion." I checked what it was, and when I hovered into the microphone thing at the bottom right in Windows 10, it said "Test is using your microphone." That's when I started to really panic. I also had my cam up, well my desktop(dell) had that default cam that you can push back to hide it or not. In this case, my cam was up, and I noticed it had that white glow. After that, I saw myself on my own screen, and saw that they recorded me. They even had the nerve to put themselves into my wallpaper. Of course, I first checked my accounts and turned off my wifi. There wasn't any important files in my desktop anyway. They locked up my desktop, like there was this black screen with some Password thing. I tried to restart again and again, and did "Bitlocker." It still didn't work. This was my first time getting hacked, and I was really sacred. Please reply to me asap if you have any idea on how to deal with this.
@sandstormxfishingtv3596
@sandstormxfishingtv3596 4 года назад
Very informative. :D
@GnomeEU
@GnomeEU 2 года назад
No normal user can do anything with this information. At least recommend some tools that send process hashes to virustotal or something. Seeing running processes or networking traffic doesn't tell you anything about it being malicious or not. You can replace system files, hide files from task manager, hide connections from netstat etc. And no normal user would even know 50% of the harmless system connections and system processes running.
@conceptofeverything8793
@conceptofeverything8793 2 года назад
True. The latter part. Even at this point I realise my OS had been hacked, but there's not much to do about it since they can always go deeper into the layers.
@Wheezy.s
@Wheezy.s 3 года назад
thank you for listing 5 things about knowing how my computer has been hacked
@tarunsharma1428
@tarunsharma1428 4 года назад
Thankyou very much for making this.. But you didnt show how to remove it completly😑😥
@persona5hacked574
@persona5hacked574 3 года назад
Well.. Good Hackers do not let you know that you are hacked and even tho you understand it in some how, they leave no traces.. so
@___-ih4ty
@___-ih4ty 3 года назад
Right click go to the source and remove completely dont end task it will just restart
@monkey5174
@monkey5174 3 года назад
why did this appear in my recommended lol
@SlvmberParty
@SlvmberParty 2 года назад
The hacker watching how I try to kill the process named "WidnowsCrytycalProkess": *nervously sweating*
@disappointment6750
@disappointment6750 3 года назад
For all you worried powershell starts on startup so close it if it opens again well uh I guess try to find the file that’s making it open
@ColoqueNombreAqui
@ColoqueNombreAqui 3 года назад
FBI spying us all: So funny son 😂
@char7035
@char7035 3 года назад
I'm confused about the netstat -ano part. How do I tell what's normal and what isn't?
@rogueanuerz
@rogueanuerz Год назад
look at the incoming port
@paulussantosowidjaja93
@paulussantosowidjaja93 3 года назад
Thank you for the learning. Cool channel. Cheers!
@GGGG-ro9sd
@GGGG-ro9sd 3 года назад
For the netstat -ano, how should I know which one is suspicious process when there are many connections with your so called funny IPs ongoing? Thank you.
@toggledfire4148
@toggledfire4148 3 года назад
To know is simply finding a non 443 and 80 in foreign address
@toggledfire4148
@toggledfire4148 3 года назад
Look closely at 4:34
@Hyxtryx
@Hyxtryx 3 года назад
@@toggledfire4148 Wrong. Hackers could use port 443 also. If you have a NAS storage drive, you might see 445 connected to another IP address within your network. If you use Steam, you might see 27039. Any of the ones that say "LISTENING" could be malware waiting for a hacker to connect. A better way is to use whois to lookup all the foreign IP addresses you see in netstat and see if any of them are from China or Russia or something you don't recognize. They will usually be something you recognize like Microsoft or a website you've visited recently. If your router is set up correctly, nobody on the internet should be able to make unsolicited connections to your PC, unless your router has been hacked and ports are being forwarded. If you do see a legitimate hacker connection in netstat, you most likely already have malware on your PC and it is initiating outbound connections. This video is a bad example, since the hacking was done from within the local network. If you ever see that happening you have worse things to worry about, since not only is your PC hacked, but another device on your network is also. He also failed to mention that a root kit can hide itself from Task Manager so you wouldn't see it in there.
@abdelhakimehan6209
@abdelhakimehan6209 4 года назад
thanks for this content, really nice to have some knowledge of security
@Alex_MB
@Alex_MB 2 года назад
first sign: you have a hacker.bat file on desktop and yes, it is easy to find suspicious connections and processes if you already know them, but if not...
@tobeforgottenisworsethande8995
@tobeforgottenisworsethande8995 7 месяцев назад
Now you got me thinking my phone is hacked and always listening to me. My people other than Google
@Tunex084
@Tunex084 3 года назад
Thank you for these information. However, you haven’t explained in detail how we can stop our systems being hacked. You mention an app, but I would like to know if the app can block hackers. Thank you.
@phobics9498
@phobics9498 3 года назад
Have an antivirus, dont bypass warnings antivirus gives you, have common sense, dont download anything sketchy and even if you do you'll probably be fine if your antivirus isnt itself a virus but dont do it anyways. Beware of phishing. The only time your system is going to be "hacked" is if you have a virus, the computer isnt like facebook that can just be hacked as it only exists in your machine.
@Tunex084
@Tunex084 3 года назад
@@phobics9498 thanks very much.
@___-ih4ty
@___-ih4ty 3 года назад
Just use common sense and don’t download random things. I recommend Malwarebytes to scan from time to time and a windows defender offline full scan which is already on your computer. Remember to read links carefully because grabifies can look like real links and double check sites you type in before going to them.
@miguelservetus9534
@miguelservetus9534 2 года назад
@@___-ih4ty Could you explain how to double check a site? Thanks.
@___-ih4ty
@___-ih4ty 2 года назад
@@miguelservetus9534 Sorry I’m a week late didn’t notice the comment. You can paste links and downloads on VirusTotal and it’ll scan it.
@supernova655
@supernova655 3 года назад
just install Bitdefender or Kaspersky and that is
@Nietabs
@Nietabs 10 месяцев назад
Yeah. my task manager ended task on it's own, screen went blank and only the task manager is on screen but minimized, then the screen went back on then files are refreshed like nothing happened. My computer been acting strangely, slower than usual and random shutdowns. Can't put a finger on it, whether it's hardware or software. I ran full system scans on both malwarebyte and windows defender, yet no viruses were detected. Files sometimes show then disappear within a second when i login on my windows, so i'm quite suspicious
@BhaktaRobin
@BhaktaRobin 2 года назад
in other words: almost impossible to tell unless the hacker uses too much data or cpu
@rootshell101
@rootshell101 4 года назад
Amazing 😍❤
@gowororigejunua439
@gowororigejunua439 2 года назад
Nope
@Platinum199
@Platinum199 3 года назад
Me without a computer: interesting... Edit: holy shit why is such a simple comment causing a war in the reply’s, I guess this is the internet after all When I say I don’t have a computer I don’t mean a phone since some people think phones are computers. I don’t have a actual computer a PC or a laptop is what I mean. I’m actually surprised and disappointed I had to explain this
@egg4389
@egg4389 3 года назад
Same lol
@kevinflaherty1
@kevinflaherty1 3 года назад
How the fuck do you not have a computer in 2021 lmao
@Platinum199
@Platinum199 3 года назад
@@kevinflaherty1 not everyone has a computer or needs one really, I just use my phone and ps4 and they do the job. But I might get a laptop soon
@sebafa0911
@sebafa0911 3 года назад
@@kevinflaherty1 because someone may be poor? Duh
@elijah2715
@elijah2715 3 года назад
Same 😂
@arminviktor4979
@arminviktor4979 2 года назад
Nice, I kind of kind went about it the same. This is great confirmation
@anthonyharrow3891
@anthonyharrow3891 3 года назад
connections can be obfuscated so the first part is just discovery but yea you really do need something like wireshark to do analysis at the packet level. now, what are you supposed to do when the hacker also encrypts their connection?
@muhammadikhsan3547
@muhammadikhsan3547 3 года назад
no one : baljeet : *Hello Your Computer Has Virus*
@sweetmelon3365
@sweetmelon3365 3 года назад
4:45 how do i tell that's a hacker listening and not a normal connection?
@chilledramen8241
@chilledramen8241 2 года назад
so my dad has a laptop from 2018 or something and the fans on it run at max for long periods of time throughout the day even when it's closed, should that be anything to worry about?
@chillyman7340
@chillyman7340 3 года назад
Thank you so much man, really helpful , great video 😁.
@immunetea2525
@immunetea2525 3 года назад
Seriously, i didn't understand a bit , still watched the full video
@Spartan11117777
@Spartan11117777 3 года назад
Do you watch Mr. Robot? 😃
@brazilpaes
@brazilpaes 3 года назад
@@Spartan11117777 Pathetic socialist show.
@HyperspaceQ
@HyperspaceQ 3 года назад
Very impressed! Sub'd!
Далее
How To Know Who Is Using My WiFi from a Hacker
3:15
Просмотров 38 тыс.
How to tell if your PC is hacked?!
9:02
Просмотров 94 тыс.
Gặp 2 thánh troll | CHANG DORY | ometv
00:42
Просмотров 24 млн
Редакция. News: 124-я неделя
52:01
Просмотров 1,3 млн
13 Signs your Computer has been Hacked and What to do?
6:33
Remotely Control Any PC with an image?!
12:42
Просмотров 140 тыс.
Signs Your PC Has Been Hacked
14:49
Просмотров 71 тыс.
Finding WEIRD Typosquatting Websites
24:26
Просмотров 344 тыс.
let's hack your home network // FREE CCNA // EP 9
30:16
Remotely Control Any Phone and PC with this Free tool!
17:15
Все Смартфоны vivo Серии V30!
24:54
Просмотров 26 тыс.