Hi John, access is actually really cheap. Even for Russian clients it is even cheaper. Hackers don't have time to compromise all networks, there is an excess of free access and simply nobody has time for those companies. Often it happens that someone encrypts a company, an investigation starts and it is found that the initial access was obtained two years ago. The company has a backdoor in the network for two years, and only after two years someone encrypts it, which is a relatively common thing. Hackers simply don't have time.
How could hackers infect a whole company with viruses and take over the whole network and data (it starts with phishing email and infecting one computer i know , i mean the next step after you get into the network )? is there a way you can provide us with exemples on how it works and most importantly how to avoid it and make sure if one computer is infected the hacker won't be able to do much ?
You are better off just hiring a professional based off the way you're asking this question. Proper segmentation and controls are complicated and not something you can fit into a UA-cam video
It's always people who are the weakest link. A large portion of people do not understand basic web surfing fundermentals and just click on anything and everything.
@@Dotrund yes i know that , every company has it's own infra and network , i just want to see an exemple in action (if possible @_JohnHammond :) ! ) and mainly i mean what are most used way to infect a whole network "in a general way speaking" how malware can travel inside network to infect other devices.
These days cybercriminals use crypto exchanges in nations that are not either in America or not allies with America. For example, Russia. Then after that, they mix the coins with monero or BTC mixers and either use cash mules to deposit money in their bank accounts or use other people's names and get a debit card and cash out at an ATM. Most of the time they get caught by getting comfortable. The vast majority of these people are just IT nerds and lack smart smarts that's why they slip up.
i say i like it when john gets banned and then does ban evade the cyber criminals banning him from their services the outlaws to the good cyber crime fighters on the Internet
I would still love a video or video series about the isreali intellegence program called pegasus heard alot of rumors of its prowess but have yet to see any real evidence of its existence anyhoo it could be a cool video 🙂🙏
There's a ton of evidence of its existence. A bunch of EU states have bought it directly from NSO group in Israel to spy on journalists and politicians. At least this is what the European committee claimed a few months ago about Poland,Greece and some more.
i am a ethical hacker, and if i was as smart as some hackers i could probably earn a lot of money. Why can't these damn criminal hackers use their skills for good in ethical hacking to earn more money?
@@nittani. So Black Hats just deal with the chance that the FBI will come after them? Is the Money worth Committing their crimes for a Couple Hundred Thousand Dollars or Less For them to eventually get Caught? Some of these Blacks Hats are Talented But they fall to the wrong Path and it Surprises me none of them Consider how much money can be paid with a Skilled Ethical hacker making money.
Hyyy John can you plzz show pratical of installing and using flare cuz you r using and I am not understanding how did you do that like what is flare is it hard to set up yada yada yada ?.
I just love how John gets banned on sight on these forums. The outlaw to the outlaws.
Umm no... He's a snitch to the outlaws.
He's the law
Thats got to be the best forgot password message I've ever seen.
Hi John, access is actually really cheap. Even for Russian clients it is even cheaper. Hackers don't have time to compromise all networks, there is an excess of free access and simply nobody has time for those companies. Often it happens that someone encrypts a company, an investigation starts and it is found that the initial access was obtained two years ago. The company has a backdoor in the network for two years, and only after two years someone encrypts it, which is a relatively common thing. Hackers simply don't have time.
0days can be better than access, because they provide access to countless systems
This is why we cant have nice things John Hammond🤣🤣🤣🤣🤣🤣🤣🤣. Really amazing work you put in
is your instance of Flare a demo? how to get the hands on the real product and maybe know the pricing beforehand? Thank you John
You need to be an established security researcher/ethical hacker and prove it to them
How could hackers infect a whole company with viruses and take over the whole network and data (it starts with phishing email and infecting one computer i know , i mean the next step after you get into the network )? is there a way you can provide us with exemples on how it works and most importantly how to avoid it and make sure if one computer is infected the hacker won't be able to do much ?
Don't click links.
You are better off just hiring a professional based off the way you're asking this question. Proper segmentation and controls are complicated and not something you can fit into a UA-cam video
@@EnjoyCocaColaLight Yea, but sometimes people do when you have +300 employee ... and it happens, every day and everywhere
It's always people who are the weakest link. A large portion of people do not understand basic web surfing fundermentals and just click on anything and everything.
@@Dotrund yes i know that , every company has it's own infra and network , i just want to see an exemple in action (if possible @_JohnHammond :) ! ) and mainly i mean what are most used way to infect a whole network "in a general way speaking" how malware can travel inside network to infect other devices.
How do these people get paid if user info can be traced through crypto I dont get it?
These days cybercriminals use crypto exchanges in nations that are not either in America or not allies with America. For example, Russia.
Then after that, they mix the coins with monero or BTC mixers and either use cash mules to deposit money in their bank accounts or use other people's names and get a debit card and cash out at an ATM.
Most of the time they get caught by getting comfortable. The vast majority of these people are just IT nerds and lack smart smarts that's why they slip up.
Heard of Kevin mitnick?
@@timebeargaming yes, he's one of the best hackers in the world.
@@timebeargaming Am I missing something here?
They got really good info. It's really helpful.
THE TITLE CHANGED
Happy Onam 😊
Man, are these Egyptian Pounds in 00:21 ? 😂😂
i say i like it when john gets banned and then does ban evade the cyber criminals banning him from their services the outlaws to the good cyber crime fighters on the Internet
True for phones too?
Always Arm in the AD
14:04 answer: whack-a-mole, game of cat and mouse
PLEASE MAKE A PART 2
I'd be happy if i get atleast a grand for my computer. I will sell it out and get a cheap server rack. Xd 😂😂
Cents on the dollar. Most of the time it costs you more in electricity than is actually paid for the connection.
♻
Yeah? Well they'll never find it coming through their letterbox
Love you from India ❤❤❤❤
Sunshine is the best disinfectant 😊❤
wonder if they have ltt for sale LOL
So what? We can't even reach it, it's only for security professionals.
You can just manualy search for those links, the only thing flare does is gater the info faster. Just Dow load tor and you can watch the same sites
they picked you out lmao that's wild
You are amazing and smart! 😂
Bro we need more videos on dark web
Great work btw!
How did OMNI forums know it's you? :D
Hello!
Bwahahaha Did you find my info yet? 🙃
Best ❤
Do more
Nice :D
lol, internet it's amazing
Newsflash, y̵o̵u̵ ̵c̵o̵u̵l̵d̵ ̵b̵e̵ "you are", for sale on the Dorkweb.
Not my computer
it so cool
No it's not
?
@@iluvpandas2755 My computer is not for sale on the dark web
Sure it is. It's just that the content on your computer is worthless.
Whats the interface of this website😂
I would still love a video or video series about the isreali intellegence program called pegasus heard alot of rumors of its prowess but have yet to see any real evidence of its existence anyhoo it could be a cool video 🙂🙏
There's a ton of evidence of its existence. A bunch of EU states have bought it directly from NSO group in Israel to spy on journalists and politicians. At least this is what the European committee claimed a few months ago about Poland,Greece and some more.
I feel is a waste of time, eveyvideo shows nothing at the end.
cool video Justin Roiland
i am a ethical hacker, and if i was as smart as some hackers i could probably earn a lot of money. Why can't these damn criminal hackers use their skills for good in ethical hacking to earn more money?
Easier for the darker route than the rightous route
@@nittani. So Black Hats just deal with the chance that the FBI will come after them? Is the Money worth Committing their crimes for a Couple Hundred Thousand Dollars or Less For them to eventually get Caught? Some of these Blacks Hats are Talented But they fall to the wrong Path and it Surprises me none of them Consider how much money can be paid with a Skilled Ethical hacker making money.
Except it isn't, because my computer is secure.
Getting a little clickbaity with the titles, John. I like your content but let's keep it real. could be != is
Sure, fixed 😉
@@_JohnHammond Amazing, thanks!
your account is currently banned hahaha
"assigned to THEM" even though the text clearly says "him"... jesus christ you people need help.
👁👄👁
Not first lol
Hyyy John can you plzz show pratical of installing and using flare cuz you r using and I am not understanding how did you do that like what is flare is it hard to set up yada yada yada ?.
How can I hack my friends computer without him knowing? Asking for a friend.
Stop