How do hackers hide themselves? - staying anonymous online

Поділитися
Вставка
  • Опубліковано 2 лют 2025

КОМЕНТАРІ • 858

  • @edrickreyes-melendez4215
    @edrickreyes-melendez4215 3 роки тому +4270

    Great video! But you failed to mention that hackers use hoodies and glasses to stay hidden too haha

    • @collinsinfosec
      @collinsinfosec  3 роки тому +479

      Now you are a true hacker Edrick 😎

    • @jackjaconelli5593
      @jackjaconelli5593 2 роки тому +1

      Wrong, they use it because the sunlight hurt their eyes

    • @ladvargleinad7566
      @ladvargleinad7566 2 роки тому +83

      What he ACTUALLY forgot was to mention covering up the camera.

    • @xansurnamehere
      @xansurnamehere 2 роки тому +61

      @@ladvargleinad7566 you mean deleting the camera's drivers and/or completely removing it from the device (same for microphone)

    • @ladvargleinad7566
      @ladvargleinad7566 2 роки тому +39

      @@xansurnamehere And how is that supposed to fix anything? What if someone hacks your computer, reinstalls the drivers, and while they are still there, add a little spyware to said drivers? Or what if the camera has backup drivers on its own, separate, hidden partition?
      Covering it up or physically removing it is the safest way.

  • @nx2913
    @nx2913 8 місяців тому +303

    I'm amazed that he stops to make you learn what an IP is (most basic cyber security content) but then he speeds up when the things start to get complicated and tricky.

    • @Rog3rTheSm1th
      @Rog3rTheSm1th 5 місяців тому +1

      I don’t understand your point. Was the video too fast or too slow for you?

    • @__Zed
      @__Zed 5 місяців тому +30

      ​@@Rog3rTheSm1thhe means that the video would he more informative if he focused more on explaining more complicated things instead of the pure basics

    • @NotBot-420
      @NotBot-420 5 місяців тому

      I love how some hackers will tell you that "the Complete Hackers Handbook" is the hacking "Bible" and it doesn't contain one single line of code. Not 1. Just jargon. I still liked the video. But I get your point. Hated when people would say Lurk Moor or whatever it was. Just tell me the steps, I'll look it up myself. Just tell me what to look up. That's how I knew if someone was full of crap. They pull that magicians never tell their secrets bs.

    • @PJFunnyBunny-yl7co
      @PJFunnyBunny-yl7co 3 місяці тому

      Thought it was great🤓
      ​@@Rog3rTheSm1th

  • @yourpersonaldatadealer2239
    @yourpersonaldatadealer2239 3 роки тому +2809

    Can’t tell if it’s the malfunctioning yt algorithm propagating it’s own inevitable demise or the feds wasting their time with honeypot videos again but either way, a gem of a channel and some novel content I look forward to learning.

  • @fliporflop7119
    @fliporflop7119 3 роки тому +642

    they are in dark rooms with a hoodie on and type erratically green text on a black background, they have a world map with red connecting lines that make a sound when moving around, computer screen turns black and a bunch of pop-ups of random images with beep sounds appear and after drinking the sixth can of dr pepper they say :
    "I'm In"

    • @Razrman
      @Razrman 2 роки тому +5

      🤣👍🏻👏🏻

    • @pixelrunner2775
      @pixelrunner2775 2 роки тому +32

      don't forget the anonymous mask and audible mentions of "hacking into the mainframe"

    • @awii.neocities
      @awii.neocities Рік тому +3

      "They have a world map with red connecting lines that make a sound when moving around"
      You just reminded me of Uplink.

    • @B-MoreCity
      @B-MoreCity Рік тому +2

      Ok you need to stop! 😂🤣😂🤣

    • @siliconvalley9347
      @siliconvalley9347 Місяць тому

      Funny 😂

  • @kaledrutus2554
    @kaledrutus2554 Рік тому +364

    Actually, Ross Ulbricht was caught through an old email that he had advertised Silk Road on in Reddit, then, when they knew who he was they traced him to a library, and then a female and make FBI agents distracted him by pretending to have an argument while another rushed his laptop, so he couldn’t press the kill code button he’d set up previously, they also messaging him through Silkroad at that exact time and caught him with his laptop open and everything logged in 😅

    • @puddyI
      @puddyI 10 місяців тому +29

      moral of the story? Mind ya own business at all times

    • @CaptainJeanLucPicard
      @CaptainJeanLucPicard 8 місяців тому

      @@puddyI Yep.

    • @sneezydeezymcdeluxe7015
      @sneezydeezymcdeluxe7015 6 місяців тому +11

      I don't think it was reddit where he posted his email, pretty sure it was some forum.

    • @vcekal
      @vcekal 6 місяців тому +6

      actually it was on bitcointalk not Reddit

    • @rizlam441
      @rizlam441 5 місяців тому +1

      i think the email thing and femaill fbi thing was from alpha02 story idk

  • @AbdulAhad-oq6lz
    @AbdulAhad-oq6lz 3 роки тому +101

    He’s not saying you should be a hacker but you could be a hacker 😂

    • @collinsinfosec
      @collinsinfosec  3 роки тому +30

      I never said anything 😂

    • @AbdulAhad-oq6lz
      @AbdulAhad-oq6lz 3 роки тому +3

      @@collinsinfosec LOL 😂

    • @DaBodyGuard1
      @DaBodyGuard1 2 роки тому +1

      What's the alternative to being the predator? Being the prey

  • @Alex-to4iz
    @Alex-to4iz Рік тому +67

    4:50 something worth mentioning is that installing your own vpn server on some random vps could be a security risk depending on your threat model. Federal agencies can detect your ip address is the only one connecting to that server and thus deduce the outgoing traffic from that server is effectively yours. Also, wireguard should be prefered over openvpn if you actually need to setup a vpn server for some reason.

  • @mohsinattiq8810
    @mohsinattiq8810 3 роки тому +262

    Staying anonymous is one thing.. what about removing digital identity ? People who grew up in digital age and not knowing how bad things can get.. what steps can one take to wipe out this data ?

    • @collinsinfosec
      @collinsinfosec  3 роки тому +187

      Great point. Especially if you had parents, family, employers who posted photos and info about you online. There are digital privacy laws where you can request for your information to be taken down. But this is dependent on where live and even then there will still be an online footprint you left. Best possible option is to never make the online trail in the first place. That's not easy nowadays.

    • @ntseinfo3082
      @ntseinfo3082 2 роки тому +1

      @@collinsinfosec Po

    • @Endless_Jaguar
      @Endless_Jaguar Рік тому +47

      If your like me, then your GenX parents keep posting your personal info on every social media site. So, the first step is to abandon parents.

    • @ElohiSilverEarthVentures
      @ElohiSilverEarthVentures Рік тому +9

      ​@@Endless_Jaguarhey now that's not nice, they're just trying to show off they're kid that they're proud of. But I totally feel ya, I'm opposite and am extremely protective over my kids photos ever getting posted on internet. Especially, after a time I Googed his sisters name & shockingly on the first page that came up i saw a nude photo of hers that'd been reposted on a hella shaddy website, that had her little brothers photo on her wall right behind her, totally clear as day. I was pissed to say the least. Got that sh*t pulled down immediately.

    • @goodbusiness9674
      @goodbusiness9674 Рік тому

      @yx-su5qftry and actually have a conversation with them about it or just login to their account lmao

  • @mozesmegyesi6916
    @mozesmegyesi6916 3 роки тому +586

    You are not a script kiddie. Thank you for the lesson. This is fantastic.

    • @userou-ig1ze
      @userou-ig1ze 3 роки тому +29

      if the compliment is 'you are not a script kiddie' then you label the person basically a script kiddie

    • @bikdigdaddy
      @bikdigdaddy 3 роки тому +8

      Who said tho that he's a script kiddie

    • @ausmanx1161
      @ausmanx1161 3 роки тому +22

      @@bikdigdaddy he said it to himself in the video

    • @fernandoblazin
      @fernandoblazin 3 роки тому +8

      ima script kiddie thanks now im near to matrix level

    • @userou-ig1ze
      @userou-ig1ze 3 роки тому +5

      @@fernandoblazin Needless to say (and that's the point of it), calling somone 'not a script kiddie' is rather something else entirely than not('a script kiddie'). But even assuming this is as simple as !a == b is the same as a==!b (which, ignoring all context, may not be unreasonable!) it would simply make you 'not a script kiddie' not 'matrix level'. An alternative interpretation is for example, you are simply no programmer at all.

  • @Lupinicus1664
    @Lupinicus1664 3 роки тому +565

    Good presentation and very clear, concise and useful information. As a 'security professional' (and someone interested in security since before the internet) this is exactly the kind of straightforward yet entertaining content we need more of.

    • @collinsinfosec
      @collinsinfosec  3 роки тому +28

      Thank you for the kind words. I am going to try to improve on my video presentation.

    • @rune.theocracy
      @rune.theocracy 2 роки тому +1

      Try Mental Outlaw if you haven't yet!

    • @Lupinicus1664
      @Lupinicus1664 2 роки тому +2

      @@rune.theocracy thank you, I already subscribe to him, good advice though.

    • @ImxxFuZe
      @ImxxFuZe 7 днів тому

      Anything you'd recommend for a layman who's interested in cybersec? Things that MUST be learned, Things to avoid knowing, tips/tricks?

  • @sleaf6
    @sleaf6 2 роки тому +47

    If I was selling bad things on the internet and I felt I was about to get caught; I’d make a UA-cam channel and as such, talking about OPSEC, appear as a red herring.
    Hypothetically

  • @michellenoirstudios
    @michellenoirstudios Рік тому +14

    4:09 I'm glad you mentioned that VPNs introduce intermediaries. I feel like a lot of people either forget or don't know about this and perhaps don't think about it before deciding when to use a VPN.

  • @khankhaaaan
    @khankhaaaan 2 роки тому +7

    Your style is simple yet detailed, I haven't come across another related you tube channel that keeps it simple to the point and clearly examined. Subbed!

  • @women-mw1uh
    @women-mw1uh 3 роки тому +23

    just found your videos. i'm a sys admin looking to get into cyber security and your videos are genuinely informative and enjoyable to watch. don't worry, you're definitely not a script kiddie. i'd know, i was one lool. keep it up man

  • @nizzinesworkshop2636
    @nizzinesworkshop2636 2 роки тому +11

    god damnit I fell off my chair laughing when you said "security professionals like you and I"!

  • @bennewman4675
    @bennewman4675 Рік тому +3

    Some people do silly things with out thinking. And then get found out

  • @sorrefly
    @sorrefly 2 роки тому +326

    6:50 don't underestimate vulnerabilites with virtualization. TailOS discourages indeed the virtualization approach because the host machine can fully control and check what's going on in the VM

    • @collinsinfosec
      @collinsinfosec  2 роки тому +26

      Great point!

    • @0xdamian595
      @0xdamian595 2 роки тому +5

      Ssshhh

    • @PiMpMyCoMpUtEr
      @PiMpMyCoMpUtEr 2 роки тому

      yes but being totally 100% anonymous is kindly impossible. Tails offer a way to get more % in anonymity. That's it. It's the same debate as with confinements and vaccines... Just gain more % here and here.

    • @ajigi7913
      @ajigi7913 2 роки тому +4

      Yeah but u can spoof any info that you connect with to a rdp so its a win win

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked Рік тому +1

      True. Many, including myself at one point, thought VMs won't leak malware, but they can. Just as malware can hop partitions to jump to different OSs. (;

  • @TimwiTerby
    @TimwiTerby 2 роки тому +147

    Awesome demonstrations there, but personally I would have liked to see more about how criminals who use these stealth techniques actually get tracked and ultimately caught; I imagine there's a very interesting story there as well

    • @collinsinfosec
      @collinsinfosec  2 роки тому +42

      A video to follow-up on this topic is a great idea 👍

    • @0xdamian595
      @0xdamian595 2 роки тому

      Ddw had stories.. not that I know or anything as a useless script kiddie wannabe

    • @edwardmacnab354
      @edwardmacnab354 Рік тому +2

      NSA has enormous resources ,money , techs , and proprietary software . Get in if you dare , but get out before they can target you , because they WILL get you if you don't !

    • @Hasblock
      @Hasblock Рік тому

      This comment's a year old but look up seytonic or mental outlaw. Often times, it's the user unintentionally outting themselves by mixing their public and private identities I.e. using their anonymous email to sign up for Instagram, reusing their private email across multiple websites

    • @Bestemotion007
      @Bestemotion007 Рік тому

      ​@@collinsinfosecsir i need help
      Please help me anyone

  • @drowningfish6086
    @drowningfish6086 2 роки тому +34

    I feel weird about a lot of VPN's, although they claim to have a "no log policy," I've heard of many instances in which VPN companies helped the police in finding cyber criminals.

    • @flat-earther
      @flat-earther 2 роки тому +3

      Drowning I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @Soaringkiwi1
      @Soaringkiwi1 2 роки тому +4

      From prior experience, government agencies do show up to the datacenter and usually either takes the drives or make a copy of them.

    • @theantianimeassociation7574
      @theantianimeassociation7574 Рік тому

      that’s because VPNs are used to protect regular citizens, not criminals

    • @YaBoiKuma
      @YaBoiKuma Рік тому +24

      Waay late to the party but here's an explanation:
      Any internet service provider, vpn company or other internet service owner based in the 14 eyes (basically NA, West EU, Australia) is legally required to comply with proper orders from law enforcement.
      In such cases they WILL demand all logs and any relevant information pertaining to their investigation.
      And the laws do allow businesses to lie about keeping no logs if it's for the sake of complying with said laws.
      Conversely, countries outside of the 14 eyes may have more lax laws around that stuff (think Sweden and the MulvadVPN cases).
      In short: if you're hoping that your vpn will allow you to escape those pesky glowies, ensure that the vpn is either a decentralized service (Tor/IP2P) or based outside the 14eyew

    • @foreverneverever7151
      @foreverneverever7151 Рік тому

      @@flat-earther🤡

  • @Yourcybersecuritybuddy
    @Yourcybersecuritybuddy Місяць тому

    When delivering a lecture on this subject, I was astounded by the extent to which many hackers overlook these fundamental principles. Admittedly, much has evolved over time, necessitating commensurate adaptations.

  • @maxdemian6312
    @maxdemian6312 2 роки тому +5

    Now I know how to operate my own Silk Road without getting caught

  • @sydniehi3054
    @sydniehi3054 3 роки тому +140

    Great content man, I just found your channel and its awesome! I’m going to school for computer science, I really wanna focus on encryption and cybersecurity, so your content is an attention grabber. Keep up the good work, posting a video more in depth like what you showed at the end would be pretty interesting!

    • @collinsinfosec
      @collinsinfosec  3 роки тому +5

      Thank you Sydnie!

    • @MrCipek1221
      @MrCipek1221 3 роки тому +5

      Keep up and don't make mistake I did! When you struggle with something, give yourself a time. Don't give up because you think something us "too hard". You just don't have enough knowledge to solve this problem. So educate urself and attempt one more time :)

    • @flat-earther
      @flat-earther 2 роки тому +1

      Sydnie I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @sydniehi3054
      @sydniehi3054 2 роки тому

      @@MrCipek1221 I’m super late to this reply but thank you for the advice. It means a lot, especially with this degree you have a lot of people who aren’t willing to help or who have kind of like god complex.

  • @CA-FE-C0-FF-EE-00
    @CA-FE-C0-FF-EE-00 2 роки тому +8

    Tails for privacy: ye
    Tails for hacking: no

  • @Tapport
    @Tapport 2 роки тому +33

    I was waiting for a VPN ad all video. Awesome job on this, nice to see some digestible content about hacking that isn't from a conference or experts react video. 👍

    • @flat-earther
      @flat-earther 2 роки тому

      Tapport I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @Tapport
      @Tapport 2 роки тому

      @@flat-earther I recommend you stop spamming UA-cam comments with flat earth shit, lmao. Embarrassing.

    • @flat-earther
      @flat-earther 2 роки тому

      @@Tapport So does denying the globe automatically mean flat earth to you?

    • @Tapport
      @Tapport 2 роки тому +3

      @@flat-earther I honestly don’t care what shape you think the earth is, it’s still irrelevant to this video or my comment.

  • @Chris-ki7rt
    @Chris-ki7rt 3 роки тому +3

    this video was better than a 1 year course i did in cyber security

  • @annis750
    @annis750 2 роки тому +6

    Finally!!! Someone that can speak CLEARLY about this topic! Subscribed

  • @nacholibreri
    @nacholibreri 11 місяців тому +1

    THIS ^ has been the most useful explanation! I have been researching each of these components individually, but you now put it all together in a series of steps. Maybe I am slow on the uptake… or just was distracted with Life… but this really helps with my own personal OPSEC! Thanks!

  • @antc1611
    @antc1611 2 роки тому +4

    You Rock I'm getting a laptop soon .
    I'm just starting off .
    I'm learning how to code and read it .
    It's tricky but I'll figure it out !!!

  • @AchwaqKhalid
    @AchwaqKhalid 3 роки тому +43

    Nothing but straightforward pieces of information 👌
    If only other UA-cam videos are made this way.

  • @Cybermondo
    @Cybermondo 3 роки тому +37

    Hey Grant really nice video! How about to do a video with the techniques used to trace back this kind of be anonymous strategy? I mean some reverse engineering

    • @collinsinfosec
      @collinsinfosec  3 роки тому +10

      Hi Cybermondo, I like the idea!

    • @Cybermondo
      @Cybermondo 3 роки тому +1

      @@collinsinfosec I will wait for it then ;)

    • @ironheadrondo5596
      @ironheadrondo5596 2 роки тому

      The Grugq is very good and has a few lectures going through the takedown of lulsec and another smaller one.

    • @Parker8752
      @Parker8752 2 роки тому

      @@ironheadrondo5596 I seem to recall the takedown of lulsec basically boiled down to one of the members being really, really bad at opsec, so once they arrested that guy, they were able to get him to get other members to reveal themselves over their now compromised private chat.

  • @droidevlib
    @droidevlib Рік тому +1

    You revealed it; now they may be in danger.

  • @Bees-are-awsome
    @Bees-are-awsome Рік тому +3

    when you're searches and watches on UA-cam puts on the watch list.

  • @diveallz1044
    @diveallz1044 Рік тому +1

    Enjoyed the video man. I couldn't stop laughing Everytime I started typing something I thought you weren't going to mention...you started mentioning it🤦😅

  • @zeveroarerules
    @zeveroarerules 3 роки тому +19

    You know what's real anonymous money?
    Cash.

    • @AnotherBadRep
      @AnotherBadRep 2 роки тому

      Very True

    • @overlord5068
      @overlord5068 Рік тому

      Cash will completely disappear in a few years
      Everything will be digital

    • @ronjones3977
      @ronjones3977 10 місяців тому

      ​@@overlord5068few years no ......few decades maybe

  • @eddielopez2373
    @eddielopez2373 2 роки тому +5

    I think where I’ve been going wrong is I’ve only managed stealthiness. I’m gonna give stealthinessness a try.

  • @SirPiggyy
    @SirPiggyy 2 роки тому +3

    Great Video, I’m somewhat knowledgeable but I loved how you broke down certain things for beginners

  • @gubeivxkisdhgo-y5w
    @gubeivxkisdhgo-y5w 3 місяці тому +3

    They rent a basement in a remote area. Put some hoddies and glasses when going out.

  • @hammerfist8763
    @hammerfist8763 2 роки тому +24

    Staying anonymous offline is the bigger challenge.

    • @KenBurnett144
      @KenBurnett144 2 роки тому +2

      🤔🤔🤔 Interesting and thought provoking statement, I believe this might be the comment of the century... 🤔🤔🤔
      # Comment Of The Century, "Staying anonymous offline is the bigger challenge."
      - Hammer Fist

    • @proof_26xx
      @proof_26xx 2 роки тому +11

      @@KenBurnett144 its not that deep

    • @NotBot-420
      @NotBot-420 5 місяців тому

      @@proof_26xx "Moisture is the essence of Wetness" - Zoolander.

  • @cheesygerit2299
    @cheesygerit2299 3 роки тому +18

    Tbh writing style is covered so damn less in such videos so props for talking about it even if it was just a second and in a list of thing to identify you
    most people dont even know about that

    • @dev_hazelify
      @dev_hazelify 2 роки тому

      I impersonated a long time ago (half a decade minimum) and one of the main things I used was writing style which made it quite difficult for people to figure out it was me even when they became suspicious. (I don't suggest you try impersonating, it gets messy.) It's one of those details that people don't really think about but makes a lot of difference.

  • @angelastandridge2729
    @angelastandridge2729 2 роки тому +1

    Yes please do go into more depth...I'm very interested. Thankyou 🙌🏼

  • @Teagan-fi7zf
    @Teagan-fi7zf 5 місяців тому

    your ability to keep the content fresh and exciting is incredible! ️

  • @TECHYPRC
    @TECHYPRC 6 місяців тому +1

    Lmao owner of silk road : they think i am dumb enough to use mine when i can just use someone else's😂

  • @trevor7355
    @trevor7355 2 роки тому +1

    This helped with my cybersecurity class, thanks!

  • @boltiband.PalakBhatia
    @boltiband.PalakBhatia 2 роки тому +1

    Garrett Evans Wow thank you Garrett, you've made my day!

  • @AVINASH__SHARMA
    @AVINASH__SHARMA Рік тому +3

    Ready to hack neighbours wifi 😎.

  • @DhruvCanada
    @DhruvCanada 3 роки тому +2

    wow i was *literally thinking of this rn!*

  • @dunar1005
    @dunar1005 Рік тому +1

    1:23 still, the reason he got caught was none of those. But the NSA cross referencing old posts of him that had a similar name to his later used username. then they claimed it was done by some unfixed exploit in his market. But of course we know they just checked their data collection.

  • @sergetheijspartner2005
    @sergetheijspartner2005 Рік тому +2

    If a hacker uses all of these methods, how would you go about finding them?

    • @glaszn
      @glaszn 2 місяці тому

      maltego

  • @vasiovasio
    @vasiovasio Рік тому +1

    Objective and Useful video! Thank you Grant!

  • @Sacred-Profane
    @Sacred-Profane 7 місяців тому

    I can barley navigate my cable guide . This stuff is a different type of genius

  • @chrisjones9132
    @chrisjones9132 2 роки тому +1

    Buying a laptop with monero is way mega suspicious. Drive somewhere random and get one from Craigslist with some cash.

    • @flat-earther
      @flat-earther 2 роки тому

      Chris Jones I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @chrisjones9132
      @chrisjones9132 2 роки тому

      @@flat-earther The earth is a globe

    • @flat-earther
      @flat-earther 2 роки тому

      @@chrisjones9132 I suggest watching the series first to learn information you probably haven't heard before.

    • @dawnfire82
      @dawnfire82 Рік тому

      @@flat-earther FFS, I've literally flown around it. Stupid crackpots and their bullcrap...

  • @stonetrench117
    @stonetrench117 2 роки тому +1

    Also that DNS thing is so terrifying!

  • @dylanmorin8174
    @dylanmorin8174 Рік тому +1

    What i still don’t understand is how you can remain anonymous if you must first connect to anything through your local ISP?

    • @freeone69
      @freeone69 5 місяців тому

      u use public networks. go in disguise. back in the day people were war driving and using unencrypted home wifis.

  • @wankstagg4220
    @wankstagg4220 2 роки тому +1

    This guy is onto something!

  • @Kyler-r3n
    @Kyler-r3n 8 місяців тому

    Now I know how much effort that person put in to disrupt my normal life thanks...

  • @SharkMochi
    @SharkMochi 2 роки тому +1

    It's actually a miracle that ulbricht didn't get caught sooner. So many opsec failures lmfao

  • @valdimer11
    @valdimer11 Місяць тому

    To be honest. At 6:00 minute mark, everything youve done is more than enough as long as you've done all previous steps. I have never heard of anyone getting caught under these circumstances. It's usually because people mix their darknet and clearnet activity or use any identifying material online, such as profiles with actual names, clearnet email addresses, use personal IPs etc.
    Unless you are specifically being targeted, it's going to monumentally difficult and resource intensive to track you down.

  • @imprincesswolfy2565
    @imprincesswolfy2565 2 роки тому +2

    1:15 isn’t an ID supposed to link a name with a photograph?
    Like, if you show an ID with a name and a different face than yours then they’re not going to accept it, fake or real.
    What’s DPR supposed to do about that?

    • @pokuzhermes4566
      @pokuzhermes4566 8 місяців тому

      ID, identity card or Just identity, djizezzz! Identity of what, a human being? They probably didnt have any photograps of ptolemy or the likes. But they probably wasnt concerned with People Stealing their identity cuz there was No Camera at the time ect.

  • @moistbucket6921
    @moistbucket6921 3 роки тому +29

    My dear FBI agent,
    I am watching this video only for education reasons, please don't barge into my house.
    yours dearly,
    MoistBuckket

  • @LotusTheWise
    @LotusTheWise Рік тому +1

    I think my security is compromised lol
    I googled about a mission in watchdogs 2 and this showed up a few days later

  • @gmackmin
    @gmackmin 4 місяці тому

    Very grateful, everything works perfectly. Keep it up!

  • @terryscott524
    @terryscott524 Рік тому

    don't forget to verify the checksum of any file that you download with a checksum of that file provided from a known good source

  • @Perqd
    @Perqd 2 роки тому +3

    Step 11: Tell everyone on youtube how to do it but refer to yourself as a script kiddie so no one finds out your criminal activity >:)

    • @flat-earther
      @flat-earther 2 роки тому

      savage, I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @Perqd
      @Perqd 2 роки тому

      @@flat-earther wat

    • @flat-earther
      @flat-earther 2 роки тому

      @@Perqd I suggest watching it to learn stuff you might have not heard before.

    • @Perqd
      @Perqd 2 роки тому

      @@flat-earther nah, i know basic physics I don't need to watch this bullshit

    • @flat-earther
      @flat-earther 2 роки тому

      @@Perqd I think it's unscientific to criticize without willing to investigate.
      BTW your comment is shadow banned.

  • @TehM4dcow
    @TehM4dcow 2 роки тому +1

    seriously tho, if you are learning how to become a hacker, there is no way you do not know what an IP address is...

  • @justineliason
    @justineliason 2 роки тому

    Lmaoo etf bro said he used his real picture in the fake id as if it would work if he put another person picture😂

  • @JownieDesigner
    @JownieDesigner 2 роки тому

    15k likes and 0 dislikes. This is a gem

    • @Leeengold
      @Leeengold 2 роки тому

      Dislikes arent shown anymore. No matter the video

  • @hornball8711
    @hornball8711 Рік тому +12

    To whom it may concern: I am not here because I want to shop or be part of the dark web, I am here for educational purposes. Thank you

    • @LazarusAugment
      @LazarusAugment 8 місяців тому +1

      my intent is 200% malicious 😂

  • @NightTerror0
    @NightTerror0 2 роки тому +5

    as a certified script kiddie I found this video very helpful

  • @oncecrowned
    @oncecrowned Рік тому

    thanks i needed this so i can hack the entirety of google without being caught

  • @TheStevenWhiting
    @TheStevenWhiting 2 роки тому

    0:11 Lack of spending on IT. If you treat your IT staff like shit, they aren't going to bother doing any real work. Certainly not bother to look for breaches.

  • @Nimrod336
    @Nimrod336 2 роки тому +2

    Proxys...hops and exits...

  • @scottbrady6240
    @scottbrady6240 9 місяців тому

    BY NOT HACKING PEOPLE THEY THINK THEY KNOW

  • @Iwantapplez109
    @Iwantapplez109 2 роки тому +3

    >shows how to harden opsec onlin
    >uses windows as the host OS

  • @JonMurray
    @JonMurray 8 місяців тому +1

    Great video man. New subscriber ✌🏻

  • @lukealadeen7836
    @lukealadeen7836 2 роки тому

    I work in IT and that's the only reason I'm here

  • @surfingbilly9654
    @surfingbilly9654 2 роки тому +1

    great video with some useful tips i have never thought about before. thanks grant!

  • @RanCham727
    @RanCham727 Місяць тому +1

    Physical security and opsec (operational security) are not the same thing.

  • @sumanbyte
    @sumanbyte 2 роки тому +4

    Looking forward with more videos like this.

  • @quackersna
    @quackersna 2 роки тому +2

    Offensive security...love that term ✌️

  • @spamlogs2701
    @spamlogs2701 2 роки тому +1

    You need your face to match the id thats the point of it.
    Dont blame yourself your not a criminal so you wouldn’t understand

  • @flallal8543
    @flallal8543 3 роки тому +62

    Hey Grant, i love your videos, i'm a penetrastion tester and cybersecurity student and your videos inspired me a lot.

    • @collinsinfosec
      @collinsinfosec  3 роки тому +4

      Hi Flallal! Thank you for the kinds words.

    • @flat-earther
      @flat-earther 2 роки тому

      flallal I suggest watch a 13 part series called _What on earth happened_ by Ewaranon to learn that the earth is not a globe.
      I got it in my about tab.

    • @user-gh5zo7vx4b
      @user-gh5zo7vx4b 2 роки тому

      @@flat-earther are u disabled

  • @spike178
    @spike178 Рік тому +1

    Just break into somebody's house and use their computer for a hacking, some rich dudes summer house empty for 6+ months a year.

  • @xenostim
    @xenostim 2 роки тому +2

    I thought the way to use proxychains was to give it a list of proxy servers to select from, and chain together several of them. Why did you just give it localhost?
    Also, in case people are interested, the way to protect a network against DNS tunneling is through DNS Inspection, which security appliances can do.

  • @kashshhds8824
    @kashshhds8824 Рік тому

    We need to follow hacker protocol and protect our selfs

  • @lancemarchetti8673
    @lancemarchetti8673 Рік тому +6

    Great points.
    At the end of the day if your DNS is still controlled by your ISP, vpns, anonymizing services won't help much. Unless you maybe have a PFsense unbound router setup using a service like Quad9 to cloak your DNS.

    • @davidf_bs
      @davidf_bs 7 місяців тому

      Hi Lance, how do you find out if your dns is controlled by your isp?

  • @waldoungerer9851
    @waldoungerer9851 9 місяців тому +1

    thanks brother. basic but good

  • @blenderocean
    @blenderocean Рік тому

    If you take a basic scenario of a simple machine setup, xp service pack 3 with no anti virus or firewall and a basic connection to it, what are the chances that a remote connection would be identified. The example given here is top level, not an isolated machine in some dead beat dump of a one person band business.
    It is probably unlikely that any connection over the net would even be known by anybody.

  • @black53342
    @black53342 3 роки тому +5

    Hii Grant, I love this video. Rich in info as always.

  • @KomentarSaya
    @KomentarSaya 2 роки тому

    dont forget to destroy your memory (RAM) and Hard Drive, always use fresh hard drive or buy second used

  • @krypinz
    @krypinz 2 роки тому +1

    Well, if your in cyber security. What is the best DNS to use? and how do you protect yourself better?

  • @internetparrot9753
    @internetparrot9753 2 роки тому +1

    I knew most of this stuff but this was great review thank u

  • @Y2-_
    @Y2-_ 2 роки тому +1

    So crazy what worlds are out there…

  • @911Glokk
    @911Glokk Рік тому

    Since a live session won’t save downloaded software a hacker wouldn’t use Tails.
    They would use something like Kali or ParrotOS.

  • @LZ2SM
    @LZ2SM 2 роки тому

    By using a goodie inside a dimly lit room

  • @huckleberryfinn8795
    @huckleberryfinn8795 3 роки тому +19

    You're supposed to use your real picture on a fake ID, that way you can actually use it. That had absolutely nothing to do with Ross Ulbricht getting caught.

    • @collinsinfosec
      @collinsinfosec  3 роки тому +43

      Good point. However, it did. He used nine fake IDs, all with different names, etc. He used these IDs to sign up for server rentals across the world. He didn't have to use a real picture of himself to gain access to these servers, he could have provided any type of ID. If it really did come down to having to use a real photograph, it could have been more use to limit his exposure. Nine fake IDs with the same picture, different names implies someone is hiding their real identity. He could have limited his evidence. It ended up catching up to him in the end.

    • @maneee1748
      @maneee1748 2 роки тому +5

      @@collinsinfosec ehhh yes and no...it does look bad but when they found the 9 IDs package Ross said he had no knowledge of it and refused the package and didn't get arrested... Although at that point they were alrdy on his trail so it didn't matter much regardless

  • @illuminixx
    @illuminixx Рік тому

    You forgot about a dozen unique identifiers that firefox logs with your header

  • @kurosakiichigo241
    @kurosakiichigo241 3 роки тому +2

    Nice video bro learn a lot . Thanks for sharing

  • @hamzashahzad9530
    @hamzashahzad9530 2 роки тому +2

    IN THE CLOSET!

  • @JackOfAllRAIDs
    @JackOfAllRAIDs 10 місяців тому +1

    *Mentions to use Tails on a live USB then shows using Kali.

  • @Dominik1986
    @Dominik1986 День тому

    Very very informative video, thank you 👍