4,389,103 views 386 on YTPak
35,715 6,283

Published on 09 Jun 2015 | over 2 years ago

www.facebook.com/JoseIsFunny
To use this video in a commercial player or in broadcasts, please email licensing@storyful.com
If you didn't see the original here it is: www.youtube.com/watch
This is not a how to, but a demo. I'll be hacking into the computers in the back, that are on their own network. if you google the tools below you could certainly figure out how to do this yourself.
I did my best to edit out my hashes, and waiting time. Entire hack from beginning to end took about 2 hours. Once inside you have as much control as the owner of the computer.

Tools used:
Kali Linux
*Aircrack-ng suite
*Responder.py
*Metasploit (Armitage) for brevity and aesthetic purposes
*Veil-Evasion
*BeEF
*Meterpreter (Payload)

'The Complex' Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
creativecommons.org/licenses/by/3.0/

This Video is also meant to double as ASMR enjoy.
Customize Your Hybrid Embed Video Player!

6-digit hexadecimal color code without # symbol.

 

Report video function is under development.

 


Loading related videos...