HamzaMehboob
|Subscribers
Liked videos
http://www.facebook.com/JoseIsFunny
To use this video in a commercial player or in broadcasts, please email licensing@storyful.com
If you didn't see the original here it is: https://www.youtube.com/watch?v=csgrXFCtPqI
This is not a how to, but a demo. I'll be hacking into the computers in the back, that are on their own network. if you google the tools below you could certainly figure out how to do this yourself.
I did my best to edit out my hashes, and waiting time. Entire hack from beginning to end took about 2 hours. Once inside you have as much control as the owner of the computer.
Tools used:
Kali Linux
*Aircrack-ng suite
*Responder.py
*Metasploit (Armitage) for brevity and aesthetic purposes
*Veil-Evasion
*BeEF
*Meterpreter (Payload)
'The Complex' Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/
This Video is also meant to double as ASMR enjoy.
Family status