3,944,223 views 362 on YTPak
32,032 5,650

Published on 09 Jun 2015 | about 1 year ago

www.facebook.com/JoseIsFunny
To use this video in a commercial player or in broadcasts, please email licensing@storyful.com
If you didn't see the original here it is: www.youtube.com/watch
This is not a how to, but a demo. I'll be hacking into the computers in the back, that are on their own network. if you google the tools below you could certainly figure out how to do this yourself.
I did my best to edit out my hashes, and waiting time. Entire hack from beginning to end took about 2 hours. Once inside you have as much control as the owner of the computer.

Tools used:
Kali Linux
*Aircrack-ng suite
*Responder.py
*Metasploit (Armitage) for brevity and aesthetic purposes
*Veil-Evasion
*BeEF
*Meterpreter (Payload)

'The Complex' Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
creativecommons.org/licenses/by/3.0/

This Video is also meant to double as ASMR enjoy.

Loading related videos...