Adrian Ruthnik's dedication to their clients' security needs is evident in their thorough and effective methodologies. Their proactive approach ensures we stay ahead of potential threats. Adrian's meticulous methodologies involve thorough risk assessments, detailed planning, and proactive implementation of security measures. They continuously monitor and update our systems to keep pace with evolving threats. This dedication to staying ahead of potential risks has been crucial in maintaining our security.
Their professionalism and ethical approach to hacking services are what set Adrian Ruthnik apart from others. They deliver reliable and effective security solutions without compromising ethics. Adrian's professionalism is evident in every aspect of their
work, from their detailed security assessments to their transparent communication with clients. Their ethical approach ensures that all solutions are implemented with the highest standards of integrity. This combination of professionalism and ethics has set them apart as a leader in the field.
Adrian Ruthnik's proactive measures have significantly enhanced our cybersecurity posture. Their dedication to protecting our data is evident in the comprehensive solutions they provide. Adrian's proactive approach involves continuous monitoring, regular security updates, and preemptive measures to counter potential threats. This dedication to proactive security has greatly enhanced our cybersecurity posture, ensuring that our data remains protected at all times. Their commitment to our security has been evident in every aspect of their work.
I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds *skillful recovery* and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.
Neat - and I am still watching the rest of the video. But I'm put off a little by the assumption that the IP used by the person who first showed up in a log isn't using a proxy or VPN of some sort. That would be the first assumption, and surely after all those torrent downloads were listed. At that point it's confusing to hear "the owner of this IP did this or that" because in all likelihood it's not "the owner" but dozens of "owners".
@paulus9660 You're correct in saying that you'd be unlikely to host a proxy from your own connection, but the assumption here from me would be that it's a compromised machine.
A few people mentioned errors in the video but the first one that stood out to me was your definition of a brute force attack because it is innacurate A brute force attack 100% does not require a dictionary. A dictionary attack, which is a type of brute force attack, requires a dictionary. Additionally, there are certainly tools available to bypass brute force protections. To name a few 'older' tools - FireProx from Black Hills and IP Rotate from Port Swigger.
wow the quality of your content is professional and this video is so informative, i've been following you since the how to disappear online video and i knew you'd eventually get more subscribers
IIRC Google and Apple have email tracking prevention that proxies the requests for the tracking pixels, but there are certain email clients that will reveal your home IP.
The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly
The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!
Hey ppl, I'm a retired computer/IT person, Yet I still find *Adrian hacks online on the WEB* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
I wouldnt say this is a realistic spear phishing attack. If this was a real email used by a real person who someone skilled was spesifically targetting they could have been more successful. There are multiple videos on youtube where influencers give some cybersecurity expert rights to try and hack them and they usually succeed even though they know they are being targeted. A real person getting targeted isnt prone to just phishing attacks.
northkorean hackers who did high profile cyberattacks and bank heist have used macs....older generations of macs are cheaper to get and are more conveinient to run linux on a dual boot
I have lost my main email because of a scam..now i am suffering because i have every single details on those gmail..And this video inspired me and i will try to get my email back.
It is very hard to do password recovery on an Email account short of a trojan which of course requires the user to launch it. The other way is if the user uses the same WPA Wi-Fi password as the Email account's password. Of course you would have to be in proximity of the Wi-Fi for access. As you know a WPA Wi-Fi password creates a password hash file which can be brute forced with a GPU. An 8 character password can be recovered in 8-9 hours or less with a 4090 GPU. Personally I use passphrases such as "My-House-Is-Guarded-By-Mushrooms"
Subscribed, good stuff. I thought the hired hacker would simply break into the house where the PC is, which is 100% guaranteed to work (once the hacker has physical control of the PC then they can get whatever they want, I suppose unless the hard drive is 100% encrypted which is rare).
12:39 I gotta say that you are a bit outdated in terms of "methods". If it is an attack from the inside, if the hacker has access to your computer or router it can redirect the domain to a local address that emulates the website and uses the real certificate. Unfortunately you cannot protect yourself against that kind of attack, if the hacker got control, well it got control
My dude. What do you think certificates are for? The attacker would need access to the cert owner's private key to prove to visitors that he "owns" the site.
@@surewhynot6259 OpenSSL -> Generate CA -> Install CA -> Generate certificate using CA -> Done. I can do this in 1 minute. To install the CA you need access to his computer so
@@surewhynot6259if the hacker had access to your computer, I guess he could import a self signed certificate to your cert store's trusted root certs and use that. Maybe that's what he meant? Which begs the question, why would an attacker do that if they already are in your network and could just loot, persist or laterally move? Whichever may be the aim?
CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*
Apparently hackers range from highly skilled to careless and stupid and targeted victims range from alert and cautious to gullible and trusting. I don't trust anything online that contains wrong information, misspelled words or an offer of free money.
The comment section on this video is tripping me out... I feel like I'm either far too stoned, half the comments are bots, or possibly a mixture of the two. Why is "Skillful Recovery" randomly bolded and in half of the comments..? Was this YT channel named something differently up until recently; am I missing something here?
Note that the public peer to peer downloads based on IP address, it could be from anyone in the household such as family or roommates. Because of this it can be quite unreliable; not that it's particularly useful in the first place.
These are not real hacks. A real hack could involve someone knocking on your door, getting to know you, making friends, spending time with you, gathering information about your family and loved ones, and using social engineering tactics for a year or even several years. :D
"I lost my phone in India. Can someone please help me or give me advice on where to find it?Hey there! Don't forget to keep an eye out for any comments on this post. The channel admin and other people might have something interesting to say. So, join in on the conversation and let's make this post even more engaging!
There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
But one question what if the hacker was to set up multiple proxy chains to change his ip constantly what would you do then or is it not possible to know who it is at that point?
Thank you, *TECH SAFE GUARDIAN* . Your presence has made this entire process much more comfortable, and I am truly grateful for it. Working alongside you is a pleasure, and your dedication to your role serves as an inspiration to me. I will always remember the help and support you’ve provided me with.
I want to access an account I do not have the login details, I have tried everything possible but all failed. Please help can someone help me out?
I know someone that can help you
Tell me who is that
Crackey, that's what he is known for, he is a renowned hacker
How do I get to this guy?
Crackey
Not a great experiment and the entire comments section is nothing but bots
The only real comment
Real
Big fan of the scammers that scam criminals. Keep up to good work, friends.
Even scammers are criminals 😢
Adrian Ruthnik's dedication to their clients' security needs is evident in their thorough and effective methodologies. Their proactive approach ensures we stay ahead of potential threats. Adrian's meticulous methodologies involve thorough risk assessments, detailed planning, and proactive implementation of security measures. They continuously monitor and update our systems to keep pace with evolving threats. This dedication to staying ahead of potential risks has been crucial in maintaining our security.
Their professionalism and ethical approach to hacking services are what set Adrian Ruthnik apart from others. They deliver reliable and effective security solutions without compromising ethics. Adrian's professionalism is evident in every aspect of their
work, from their detailed security assessments to their transparent communication with clients. Their ethical approach ensures that all solutions are implemented with the highest standards of integrity. This combination of professionalism and ethics has set them apart as a leader in the field.
Adrian Ruthnik's proactive measures have significantly enhanced our cybersecurity posture. Their dedication to protecting our data is evident in the comprehensive solutions they provide. Adrian's proactive approach involves continuous monitoring, regular security updates, and preemptive measures to counter potential threats. This dedication to proactive security has greatly enhanced our cybersecurity posture, ensuring that our data remains protected at all times. Their commitment to our security has been evident in every aspect of their work.
I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds *skillful recovery* and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.
Their name was spelled as *skillful recovery* ...... And are specialized with the recovery of hacked/disabled/locked/banned social media networks....
Neat - and I am still watching the rest of the video. But I'm put off a little by the assumption that the IP used by the person who first showed up in a log isn't using a proxy or VPN of some sort. That would be the first assumption, and surely after all those torrent downloads were listed. At that point it's confusing to hear "the owner of this IP did this or that" because in all likelihood it's not "the owner" but dozens of "owners".
@paulus9660 You're correct in saying that you'd be unlikely to host a proxy from your own connection, but the assumption here from me would be that it's a compromised machine.
No hacker worth his salt would do this without using a VPN.
I guess there are a lot of hackers out there not worth their salt. Probably a good thing
"We hired a real hacker" translated from clickbait into real talk is, "We hired a teenage script kiddie".
A few people mentioned errors in the video but the first one that stood out to me was your definition of a brute force attack because it is innacurate
A brute force attack 100% does not require a dictionary. A dictionary attack, which is a type of brute force attack, requires a dictionary. Additionally, there are certainly tools available to bypass brute force protections. To name a few 'older' tools - FireProx from Black Hills and IP Rotate from Port Swigger.
"RAT" at 13:40 stands for "Remote Access Trojan", not "Remote access tool" aswell
I was expecting a VPN ad to pop out at any time. Great video, congrats for not doing any ad/sponsor bullshit.
use sponsor block
@@dotnet9830 can’t get that on mobile. double-tapping the RHS of the screen isn’t that much effort though 👍
Sumsub is the sponsor lmao
@@dhupee who’s that
@@itsmaxim01wait, really?
It's your first time in this channel isn't it?
wow the quality of your content is professional and this video is so informative, i've been following you since the how to disappear online video and i knew you'd eventually get more subscribers
Wow! You’re one of the olds! 🚀
Same here!!
As a pentester this video is fucking dumb. Its just social engineering and stupid people. This was pointless clickbait and idiots like u sucked it up.
@@Sumsubcombro stop the bots
The Level of Production Quality Is Out Of This World ! 🔥
Thank you for appreciation! ❤️
4:18 “Hacker” opening emails in HTML and triggering tracking pixel. Ridiculous and definitely nothing you do from your home IP.
IIRC Google and Apple have email tracking prevention that proxies the requests for the tracking pixels, but there are certain email clients that will reveal your home IP.
This is a professional presentation.
The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly
The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!
Hey ppl, I'm a retired computer/IT person, Yet I still find *Adrian hacks online on the WEB* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
Credential stuffing is actually pretty effective these days. Most normal people are lazy and don't use unique passwords.
I wouldnt say this is a realistic spear phishing attack.
If this was a real email used by a real person who someone skilled was spesifically targetting they could have been more successful.
There are multiple videos on youtube where influencers give some cybersecurity expert rights to try and hack them and they usually succeed even though they know they are being targeted.
A real person getting targeted isnt prone to just phishing attacks.
A russian ...with a Mac pc ...doing hacking ...do you want me to unsubscribe your channel?
Why
if i have to describe it to you then i don't have to describe it to you@@rgtechyt9267
😂😂😂😂
Might aswell say they use termux 💀
northkorean hackers who did high profile cyberattacks and bank heist have used macs....older generations of macs are cheaper to get and are more conveinient to run linux on a dual boot
I have lost my main email because of a scam..now i am suffering because i have every single details on those gmail..And this video inspired me and i will try to get my email back.
14:31 this is networkchuck not loi liang yang 😂
It is very hard to do password recovery on an Email account short of a trojan which of course requires the user to launch it. The other way is if the user uses the same WPA Wi-Fi password as the Email account's password. Of course you would have to be in proximity of the Wi-Fi for access. As you know a WPA Wi-Fi password creates a password hash file which can be brute forced with a GPU. An 8 character password can be recovered in 8-9 hours or less with a 4090 GPU. Personally I use passphrases such as "My-House-Is-Guarded-By-Mushrooms"
Great level content ❤ keep it up ❤
Thank you 🙌
This is so interesting content, love it :) i didn't know about torrent logging part that was surprising
6:51 yo what's hackerloi doing there?
This is better than my employers Phishing course!
I want to access an account I do not have the login details, I have tried everything possible but all failed. Please help can someone help me out?
Subscribed, good stuff. I thought the hired hacker would simply break into the house where the PC is, which is 100% guaranteed to work (once the hacker has physical control of the PC then they can get whatever they want, I suppose unless the hard drive is 100% encrypted which is rare).
What?😂
12:39 I gotta say that you are a bit outdated in terms of "methods". If it is an attack from the inside, if the hacker has access to your computer or router it can redirect the domain to a local address that emulates the website and uses the real certificate. Unfortunately you cannot protect yourself against that kind of attack, if the hacker got control, well it got control
My dude. What do you think certificates are for? The attacker would need access to the cert owner's private key to prove to visitors that he "owns" the site.
@@surewhynot6259 OpenSSL -> Generate CA -> Install CA -> Generate certificate using CA -> Done. I can do this in 1 minute. To install the CA you need access to his computer so
@@surewhynot6259if the hacker had access to your computer, I guess he could import a self signed certificate to your cert store's trusted root certs and use that. Maybe that's what he meant?
Which begs the question, why would an attacker do that if they already are in your network and could just loot, persist or laterally move? Whichever may be the aim?
Loved it, very informative
Glad it was helpful!
This is fine. Illuminating and entertaining. Still, I'm sure I'm not alone. I'd rather have Bradley tell us.
14:36 *Really?* Norton AVG and mcaffee?
Those are malware at this point, dont shill for them
Looks like bro executed his disappearance plan
CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*
It’s always either the user or the system is weak,if both not,then it’s invincible.
😅
The hacker downloading "The boss baby" Lmfao.
Brother best hacking book konse hai to learn Hacking
So because the first 2 did not provide the service that they should have, did the escrow give you back the money?
super work as usual
6:39 we all do love a good bit of "fair cry"
What did you used for tracking own mail?
Hi sumsub! wish u Happy New year 2024🎉
Is there any way to track number location ?
Great Content Keep it up brother 😘
What happened with the brute force attempt?
Is there brute force protection available on private cpanel email servers?
Apparently hackers range from highly skilled to careless and stupid and targeted victims range from alert and cautious to gullible and trusting.
I don't trust anything online that contains wrong information, misspelled words or an offer of free money.
Can I get a link to the paper referenced at 10:35?
The comment section on this video is tripping me out... I feel like I'm either far too stoned, half the comments are bots, or possibly a mixture of the two. Why is "Skillful Recovery" randomly bolded and in half of the comments..? Was this YT channel named something differently up until recently; am I missing something here?
Early crew. Hehe. Fellow ethical hackers 🎉👌🏼🤝. Happy New Year 🎊🥳!!
Note that the public peer to peer downloads based on IP address, it could be from anyone in the household such as family or roommates. Because of this it can be quite unreliable; not that it's particularly useful in the first place.
Great presentation video.
Why is a password that takes 48,000 years to crack "risky"? 13:48
bro your videos is fire ..
where there is fraudulence, malevolence, frauds and crime there is always the misunderstanding called "russia"
Thank you, I have learned alot from this video.
Thats Jim Browning?
When you buy Jim Browning from a uranium facility
This man is a legend 🙏
Informative 🐱
its informative. I subscribe 😊
What if they use a proxy chain ?
The Content >>>>>❤
14:34 mcaffee norton and avg 😂😂😂
so they either scam you or use basic techniques. id expect more for those prices.
ngl interesting experiment but they were just kids trying to get into email, there is more modern methods these days
You mean secondary methods for today so any example?
I like this kind of Job
you forgot the share the link of the study you mentioned in the video.
great content. learned alot
Glad it was helpful!
I have a challenge. Two emails of mine that were taken over.
Nice Video
A RAT is a remote access Trojan. Not a remote assistance tool as you stated.
These are not real hacks. A real hack could involve someone knocking on your door, getting to know you, making friends, spending time with you, gathering information about your family and loved ones, and using social engineering tactics for a year or even several years. :D
what happened to you
"I lost my phone in India. Can someone please help me or give me advice on where to find it?Hey there! Don't forget to keep an eye out for any comments on this post. The channel admin and other people might have something interesting to say. So, join in on the conversation and let's make this post even more engaging!
Thank you for the tip.
Your hacker likes the doctor house movies eh?
whats funny here scammers are using spoofing email lol but they didnt know that was just a test !
2:14 bober kurwa
The Google hacking side is about scanning websites, not remote ips?
It's always "John" 💀
It's new year and it's the first UA-cam video I am watching this year.
Cool. My IP changed week ago and now I see bunch of porn torrents from this new IP😂
appreciate your wonderful videos would love if you launch a course based on practical hacking and cyber security :)
Very nice experiment
quality content, well defined, flawless, im speechless.
There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
Great experiment and with good explanation.
Pro pleas help me how to remove my computer (sophos home) 😢
2:13 hahaha
email name in polish is crazy
But one question what if the hacker was to set up multiple proxy chains to change his ip constantly what would you do then or is it not possible to know who it is at that point?
Beautiful piece!
Thank you!!
nice content keep it up
Appreciate it :)
Nice watch out @DavidBombal this is so well done! 🎉
so the hacker failed? 🤣 whats the point of this video..LOL
The point is to create awareness to not trust these darkweb hacker goons.
@@misredemptionAw Aw
if you feel the need to tell us its real, its more than likely its not
Thank you, *TECH SAFE GUARDIAN* . Your presence has made this entire process much more comfortable, and I am truly grateful for it. Working alongside you is a pleasure, and your dedication to your role serves as an inspiration to me. I will always remember the help and support you’ve provided me with.
this is a very good video that tells the people u cant be hacked unless u complete the action by yourself good work buddy
nice one there
Most people would block images or if someone is using a bot they would just block the images
How could you find a "hacker" if he used a vpn?
Through social engineering 🙃