We hired a real hacker to hack our email | Real Experiment

Поділитися
Вставка
  • Опубліковано 10 гру 2024

КОМЕНТАРІ • 390

  • @CaroleKing-z1v
    @CaroleKing-z1v 19 днів тому +64

    I want to access an account I do not have the login details, I have tried everything possible but all failed. Please help can someone help me out?

  • @curious_cripple
    @curious_cripple 6 місяців тому +68

    Not a great experiment and the entire comments section is nothing but bots

  • @Muaahaa
    @Muaahaa 11 місяців тому +109

    Big fan of the scammers that scam criminals. Keep up to good work, friends.

  • @MytrickAg
    @MytrickAg 4 місяці тому +96

    Adrian Ruthnik's dedication to their clients' security needs is evident in their thorough and effective methodologies. Their proactive approach ensures we stay ahead of potential threats. Adrian's meticulous methodologies involve thorough risk assessments, detailed planning, and proactive implementation of security measures. They continuously monitor and update our systems to keep pace with evolving threats. This dedication to staying ahead of potential risks has been crucial in maintaining our security.

  • @Bhanumati-i5r
    @Bhanumati-i5r 4 місяці тому +88

    Their professionalism and ethical approach to hacking services are what set Adrian Ruthnik apart from others. They deliver reliable and effective security solutions without compromising ethics. Adrian's professionalism is evident in every aspect of their

  • @Shyamgami144
    @Shyamgami144 4 місяці тому +19

    work, from their detailed security assessments to their transparent communication with clients. Their ethical approach ensures that all solutions are implemented with the highest standards of integrity. This combination of professionalism and ethics has set them apart as a leader in the field.

  • @sujaygaming007
    @sujaygaming007 4 місяці тому +84

    Adrian Ruthnik's proactive measures have significantly enhanced our cybersecurity posture. Their dedication to protecting our data is evident in the comprehensive solutions they provide. Adrian's proactive approach involves continuous monitoring, regular security updates, and preemptive measures to counter potential threats. This dedication to proactive security has greatly enhanced our cybersecurity posture, ensuring that our data remains protected at all times. Their commitment to our security has been evident in every aspect of their work.

  • @JeanJeudy-kr8bn
    @JeanJeudy-kr8bn 7 місяців тому +133

    I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds *skillful recovery* and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.

    • @GaryDouglass
      @GaryDouglass 7 місяців тому

      Their name was spelled as *skillful recovery* ...... And are specialized with the recovery of hacked/disabled/locked/banned social media networks....

  • @davethewebguy
    @davethewebguy 11 місяців тому +85

    Neat - and I am still watching the rest of the video. But I'm put off a little by the assumption that the IP used by the person who first showed up in a log isn't using a proxy or VPN of some sort. That would be the first assumption, and surely after all those torrent downloads were listed. At that point it's confusing to hear "the owner of this IP did this or that" because in all likelihood it's not "the owner" but dozens of "owners".

    • @benjaminfphillips
      @benjaminfphillips 11 місяців тому +2

      @paulus9660 You're correct in saying that you'd be unlikely to host a proxy from your own connection, but the assumption here from me would be that it's a compromised machine.

    • @charlesmiller8107
      @charlesmiller8107 11 місяців тому +5

      No hacker worth his salt would do this without using a VPN.

    • @clomok
      @clomok 10 місяців тому

      I guess there are a lot of hackers out there not worth their salt. Probably a good thing

  • @KiloSierra1
    @KiloSierra1 6 місяців тому +14

    "We hired a real hacker" translated from clickbait into real talk is, "We hired a teenage script kiddie".

  • @lariojaalta890
    @lariojaalta890 11 місяців тому +41

    A few people mentioned errors in the video but the first one that stood out to me was your definition of a brute force attack because it is innacurate
    A brute force attack 100% does not require a dictionary. A dictionary attack, which is a type of brute force attack, requires a dictionary. Additionally, there are certainly tools available to bypass brute force protections. To name a few 'older' tools - FireProx from Black Hills and IP Rotate from Port Swigger.

    • @unblockabl
      @unblockabl 9 місяців тому +1

      "RAT" at 13:40 stands for "Remote Access Trojan", not "Remote access tool" aswell

  • @itsmaxim01
    @itsmaxim01 11 місяців тому +48

    I was expecting a VPN ad to pop out at any time. Great video, congrats for not doing any ad/sponsor bullshit.

    • @dotnet9830
      @dotnet9830 11 місяців тому +1

      use sponsor block

    • @itsmaxim01
      @itsmaxim01 11 місяців тому

      @@dotnet9830 can’t get that on mobile. double-tapping the RHS of the screen isn’t that much effort though 👍

    • @dhupee
      @dhupee 10 місяців тому +3

      Sumsub is the sponsor lmao

    • @itsmaxim01
      @itsmaxim01 10 місяців тому

      @@dhupee who’s that

    • @dhupee
      @dhupee 10 місяців тому +2

      ​@@itsmaxim01wait, really?
      It's your first time in this channel isn't it?

  • @mohamedfares518
    @mohamedfares518 11 місяців тому +73

    wow the quality of your content is professional and this video is so informative, i've been following you since the how to disappear online video and i knew you'd eventually get more subscribers

    • @Sumsubcom
      @Sumsubcom  11 місяців тому +8

      Wow! You’re one of the olds! 🚀

    • @D2EvilDaveGG
      @D2EvilDaveGG 11 місяців тому

      Same here!!

    • @AnomalousURL
      @AnomalousURL 9 місяців тому

      As a pentester this video is fucking dumb. Its just social engineering and stupid people. This was pointless clickbait and idiots like u sucked it up.

    • @megameman3875
      @megameman3875 6 місяців тому +2

      ​@@Sumsubcombro stop the bots

  • @Unity_and_Peace
    @Unity_and_Peace 11 місяців тому +14

    The Level of Production Quality Is Out Of This World ! 🔥

    • @Sumsubcom
      @Sumsubcom  11 місяців тому +3

      Thank you for appreciation! ❤️

  • @stefanjohansson2373
    @stefanjohansson2373 11 місяців тому +4

    4:18 “Hacker” opening emails in HTML and triggering tracking pixel. Ridiculous and definitely nothing you do from your home IP.

    • @chiroyce
      @chiroyce 11 місяців тому

      IIRC Google and Apple have email tracking prevention that proxies the requests for the tracking pixels, but there are certain email clients that will reveal your home IP.

  • @kibetandrew5622
    @kibetandrew5622 9 місяців тому +8

    This is a professional presentation.

  • @chaitanya218
    @chaitanya218 4 місяці тому

    The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly

  • @SayanDeb-cg5zq
    @SayanDeb-cg5zq 4 місяці тому

    The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!

  • @vikash__paswan__007
    @vikash__paswan__007 4 місяці тому

    Hey ppl, I'm a retired computer/IT person, Yet I still find *Adrian hacks online on the WEB* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.

  • @mradamdavies
    @mradamdavies 9 місяців тому +1

    Credential stuffing is actually pretty effective these days. Most normal people are lazy and don't use unique passwords.

  • @mirzu42
    @mirzu42 11 місяців тому +3

    I wouldnt say this is a realistic spear phishing attack.
    If this was a real email used by a real person who someone skilled was spesifically targetting they could have been more successful.
    There are multiple videos on youtube where influencers give some cybersecurity expert rights to try and hack them and they usually succeed even though they know they are being targeted.
    A real person getting targeted isnt prone to just phishing attacks.

  • @da_cat
    @da_cat 11 місяців тому +25

    A russian ...with a Mac pc ...doing hacking ...do you want me to unsubscribe your channel?

    • @rgtechyt9267
      @rgtechyt9267 11 місяців тому

      Why

    • @da_cat
      @da_cat 11 місяців тому

      if i have to describe it to you then i don't have to describe it to you@@rgtechyt9267

    • @Fent415
      @Fent415 11 місяців тому

      😂😂😂😂

    • @haloball12
      @haloball12 11 місяців тому

      Might aswell say they use termux 💀

    • @AnonymousUnknownToEveryone
      @AnonymousUnknownToEveryone 5 місяців тому

      northkorean hackers who did high profile cyberattacks and bank heist have used macs....older generations of macs are cheaper to get and are more conveinient to run linux on a dual boot

  • @Player101-hc
    @Player101-hc 5 місяців тому

    I have lost my main email because of a scam..now i am suffering because i have every single details on those gmail..And this video inspired me and i will try to get my email back.

  • @SpeedUPCommeDhab
    @SpeedUPCommeDhab 11 місяців тому +3

    14:31 this is networkchuck not loi liang yang 😂

  • @kentharris7427
    @kentharris7427 8 місяців тому

    It is very hard to do password recovery on an Email account short of a trojan which of course requires the user to launch it. The other way is if the user uses the same WPA Wi-Fi password as the Email account's password. Of course you would have to be in proximity of the Wi-Fi for access. As you know a WPA Wi-Fi password creates a password hash file which can be brute forced with a GPU. An 8 character password can be recovered in 8-9 hours or less with a 4090 GPU. Personally I use passphrases such as "My-House-Is-Guarded-By-Mushrooms"

  • @amansaiyed5909
    @amansaiyed5909 11 місяців тому +10

    Great level content ❤ keep it up ❤

    • @Sumsubcom
      @Sumsubcom  11 місяців тому +2

      Thank you 🙌

  • @xGARIDx
    @xGARIDx 11 місяців тому +6

    This is so interesting content, love it :) i didn't know about torrent logging part that was surprising

  • @code_dictator
    @code_dictator 11 місяців тому +2

    6:51 yo what's hackerloi doing there?

  • @thefakedev-y1b
    @thefakedev-y1b 6 місяців тому

    This is better than my employers Phishing course!

  • @AshleyGeorge-ct9ev
    @AshleyGeorge-ct9ev 3 місяці тому +3

    I want to access an account I do not have the login details, I have tried everything possible but all failed. Please help can someone help me out?

  • @raylopez99
    @raylopez99 11 місяців тому +2

    Subscribed, good stuff. I thought the hired hacker would simply break into the house where the PC is, which is 100% guaranteed to work (once the hacker has physical control of the PC then they can get whatever they want, I suppose unless the hard drive is 100% encrypted which is rare).

  • @freez8829
    @freez8829 11 місяців тому +6

    12:39 I gotta say that you are a bit outdated in terms of "methods". If it is an attack from the inside, if the hacker has access to your computer or router it can redirect the domain to a local address that emulates the website and uses the real certificate. Unfortunately you cannot protect yourself against that kind of attack, if the hacker got control, well it got control

    • @surewhynot6259
      @surewhynot6259 11 місяців тому +4

      My dude. What do you think certificates are for? The attacker would need access to the cert owner's private key to prove to visitors that he "owns" the site.

    • @freez8829
      @freez8829 11 місяців тому

      @@surewhynot6259 OpenSSL -> Generate CA -> Install CA -> Generate certificate using CA -> Done. I can do this in 1 minute. To install the CA you need access to his computer so

    • @RobiTheRob
      @RobiTheRob 11 місяців тому

      ​@@surewhynot6259if the hacker had access to your computer, I guess he could import a self signed certificate to your cert store's trusted root certs and use that. Maybe that's what he meant?
      Which begs the question, why would an attacker do that if they already are in your network and could just loot, persist or laterally move? Whichever may be the aim?

  • @allnewtrends6472
    @allnewtrends6472 11 місяців тому +4

    Loved it, very informative

    • @Sumsubcom
      @Sumsubcom  11 місяців тому +1

      Glad it was helpful!

  • @chipcook5346
    @chipcook5346 10 місяців тому +1

    This is fine. Illuminating and entertaining. Still, I'm sure I'm not alone. I'd rather have Bradley tell us.

  • @nemtudom5074
    @nemtudom5074 10 місяців тому +1

    14:36 *Really?* Norton AVG and mcaffee?
    Those are malware at this point, dont shill for them

  • @aiham_awd
    @aiham_awd 10 місяців тому

    Looks like bro executed his disappearance plan

  • @ronjitmahakud282
    @ronjitmahakud282 4 місяці тому

    CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*

  • @akashsxo
    @akashsxo 11 місяців тому

    It’s always either the user or the system is weak,if both not,then it’s invincible.

  • @OpulentOverlordsLegacy
    @OpulentOverlordsLegacy 7 місяців тому

    The hacker downloading "The boss baby" Lmfao.

  • @AMELIASUPRA-uf3wd
    @AMELIASUPRA-uf3wd 11 місяців тому +2

    Brother best hacking book konse hai to learn Hacking

  • @NanoElec
    @NanoElec 10 місяців тому +1

    So because the first 2 did not provide the service that they should have, did the escrow give you back the money?

  • @andrefava658
    @andrefava658 2 місяці тому

    super work as usual

  • @alistairmathie7632
    @alistairmathie7632 8 місяців тому +2

    6:39 we all do love a good bit of "fair cry"

  • @major4045
    @major4045 9 місяців тому

    What did you used for tracking own mail?

  • @pixlyana
    @pixlyana 11 місяців тому +2

    Hi sumsub! wish u Happy New year 2024🎉

  • @AshaA-pr5dj
    @AshaA-pr5dj 9 місяців тому +1

    Is there any way to track number location ?

  • @thegamingstudio7895
    @thegamingstudio7895 9 місяців тому

    Great Content Keep it up brother 😘

  • @clomok
    @clomok 10 місяців тому +1

    What happened with the brute force attempt?
    Is there brute force protection available on private cpanel email servers?

  • @JamesRichardWiley
    @JamesRichardWiley 9 місяців тому

    Apparently hackers range from highly skilled to careless and stupid and targeted victims range from alert and cautious to gullible and trusting.
    I don't trust anything online that contains wrong information, misspelled words or an offer of free money.

  • @harshsawant6695
    @harshsawant6695 11 місяців тому

    Can I get a link to the paper referenced at 10:35?

  • @0Ciju0
    @0Ciju0 6 місяців тому +1

    The comment section on this video is tripping me out... I feel like I'm either far too stoned, half the comments are bots, or possibly a mixture of the two. Why is "Skillful Recovery" randomly bolded and in half of the comments..? Was this YT channel named something differently up until recently; am I missing something here?

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked 11 місяців тому +2

    Early crew. Hehe. Fellow ethical hackers 🎉👌🏼🤝. Happy New Year 🎊🥳!!

  • @MsHojat
    @MsHojat 8 місяців тому

    Note that the public peer to peer downloads based on IP address, it could be from anyone in the household such as family or roommates. Because of this it can be quite unreliable; not that it's particularly useful in the first place.

  • @justtobad4052
    @justtobad4052 9 місяців тому

    Great presentation video.

  • @petehiggins33
    @petehiggins33 7 місяців тому

    Why is a password that takes 48,000 years to crack "risky"? 13:48

  • @brahimtube11
    @brahimtube11 9 місяців тому

    bro your videos is fire ..

  • @Logined85
    @Logined85 11 місяців тому

    where there is fraudulence, malevolence, frauds and crime there is always the misunderstanding called "russia"

  • @40NoNameFound-100-years-ago
    @40NoNameFound-100-years-ago 11 місяців тому +1

    Thank you, I have learned alot from this video.

  • @maverick.404
    @maverick.404 11 місяців тому +3

    Thats Jim Browning?

    • @b07x
      @b07x 11 місяців тому +1

      When you buy Jim Browning from a uranium facility

    • @Andralamusja
      @Andralamusja 11 місяців тому

      This man is a legend 🙏

  • @techy_thanos
    @techy_thanos 11 місяців тому +1

    Informative 🐱

  • @alvinavilamban6875
    @alvinavilamban6875 11 місяців тому

    its informative. I subscribe 😊

  • @catalincazacu3319
    @catalincazacu3319 6 місяців тому +1

    What if they use a proxy chain ?

  • @ragul1978
    @ragul1978 11 місяців тому

    The Content >>>>>❤

  • @king_james_official
    @king_james_official 11 місяців тому +1

    14:34 mcaffee norton and avg 😂😂😂

  • @Handlecantbelongerthan30chaac
    @Handlecantbelongerthan30chaac 11 місяців тому +1

    so they either scam you or use basic techniques. id expect more for those prices.

  • @shareb1t
    @shareb1t 11 місяців тому +2

    ngl interesting experiment but they were just kids trying to get into email, there is more modern methods these days

    • @honey_bunny00
      @honey_bunny00 9 місяців тому

      You mean secondary methods for today so any example?

  • @KABELO2123
    @KABELO2123 9 місяців тому

    I like this kind of Job

  • @petesky101
    @petesky101 11 місяців тому

    you forgot the share the link of the study you mentioned in the video.

  • @koseiplays457
    @koseiplays457 11 місяців тому +2

    great content. learned alot

    • @Sumsubcom
      @Sumsubcom  11 місяців тому +1

      Glad it was helpful!

  • @purpleghost96
    @purpleghost96 7 місяців тому

    I have a challenge. Two emails of mine that were taken over.

  • @HackerJohn
    @HackerJohn 11 місяців тому

    Nice Video

  • @trzaking
    @trzaking 7 місяців тому

    A RAT is a remote access Trojan. Not a remote assistance tool as you stated.

  • @luzaw4957
    @luzaw4957 9 місяців тому +1

    These are not real hacks. A real hack could involve someone knocking on your door, getting to know you, making friends, spending time with you, gathering information about your family and loved ones, and using social engineering tactics for a year or even several years. :D

    • @akibuny
      @akibuny 8 місяців тому

      what happened to you

  • @prabhdeepsingh-r9h
    @prabhdeepsingh-r9h 9 місяців тому

    "I lost my phone in India. Can someone please help me or give me advice on where to find it?Hey there! Don't forget to keep an eye out for any comments on this post. The channel admin and other people might have something interesting to say. So, join in on the conversation and let's make this post even more engaging!

  • @jorgecaostalwart
    @jorgecaostalwart 4 місяці тому

    Thank you for the tip.

  • @stephensteele2844
    @stephensteele2844 11 місяців тому

    Your hacker likes the doctor house movies eh?

  •  6 місяців тому

    whats funny here scammers are using spoofing email lol but they didnt know that was just a test !

  • @KRETOSHIGHLIGHTS
    @KRETOSHIGHLIGHTS 11 місяців тому +1

    2:14 bober kurwa

  • @schneiderf1233
    @schneiderf1233 11 місяців тому

    The Google hacking side is about scanning websites, not remote ips?

  • @bijudonbosco
    @bijudonbosco 10 місяців тому

    It's always "John" 💀

  • @yeaqub0134
    @yeaqub0134 11 місяців тому +4

    It's new year and it's the first UA-cam video I am watching this year.

  • @Wu33up
    @Wu33up 6 місяців тому

    Cool. My IP changed week ago and now I see bunch of porn torrents from this new IP😂

  • @DigitalSpark-l9g
    @DigitalSpark-l9g 11 місяців тому +6

    appreciate your wonderful videos would love if you launch a course based on practical hacking and cyber security :)

  • @quotesoflife207
    @quotesoflife207 11 місяців тому

    Very nice experiment

  • @shameerahamed8287
    @shameerahamed8287 8 місяців тому +1

    quality content, well defined, flawless, im speechless.

  • @birendarkumar303
    @birendarkumar303 4 місяці тому

    There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!

  • @DrukpaGamer-kx4gr
    @DrukpaGamer-kx4gr 11 місяців тому +2

    Great experiment and with good explanation.

  • @mohakarlos6351
    @mohakarlos6351 11 місяців тому +1

    Pro pleas help me how to remove my computer (sophos home) 😢

  • @uzytkownikinternetu9032
    @uzytkownikinternetu9032 6 місяців тому

    2:13 hahaha
    email name in polish is crazy

  • @kevdagoatfrl
    @kevdagoatfrl 5 місяців тому

    But one question what if the hacker was to set up multiple proxy chains to change his ip constantly what would you do then or is it not possible to know who it is at that point?

  • @AlexAdetimirin
    @AlexAdetimirin 6 місяців тому +1

    Beautiful piece!
    Thank you!!

  • @Asadneon
    @Asadneon 11 місяців тому +1

    nice content keep it up

    • @Sumsubcom
      @Sumsubcom  11 місяців тому +1

      Appreciate it :)

  • @repairstudio4940
    @repairstudio4940 11 місяців тому

    Nice watch out @DavidBombal this is so well done! 🎉

  • @novianindy887
    @novianindy887 11 місяців тому +15

    so the hacker failed? 🤣 whats the point of this video..LOL

    • @misredemption
      @misredemption 11 місяців тому +5

      The point is to create awareness to not trust these darkweb hacker goons.

    • @pranjitborgohain6711
      @pranjitborgohain6711 5 місяців тому

      @@misredemptionAw Aw

  • @MrSpecialjonny
    @MrSpecialjonny 11 місяців тому +1

    if you feel the need to tell us its real, its more than likely its not

  • @Manoj-rq4wb
    @Manoj-rq4wb 4 місяці тому

    Thank you, *TECH SAFE GUARDIAN* . Your presence has made this entire process much more comfortable, and I am truly grateful for it. Working alongside you is a pleasure, and your dedication to your role serves as an inspiration to me. I will always remember the help and support you’ve provided me with.

  • @atofigg8918
    @atofigg8918 8 місяців тому

    this is a very good video that tells the people u cant be hacked unless u complete the action by yourself good work buddy

  • @thetransferaccount4586
    @thetransferaccount4586 10 місяців тому

    nice one there

  • @AmericanPsychoz
    @AmericanPsychoz 11 місяців тому

    Most people would block images or if someone is using a bot they would just block the images

  • @commanderpaladin
    @commanderpaladin 11 місяців тому +1

    How could you find a "hacker" if he used a vpn?

    • @systumummm011
      @systumummm011 11 місяців тому

      Through social engineering 🙃