Always remember to use 2FA. If this guy had 2FA on his account (assuming his phone company had provided this feature), the first attack won't have work. Even if she changes the password, she still won't be able to get into the account without also acquiring his phone.
That's effectively what the SMS "send a pin to the phone" was. She convinced the support rep to circumvent it. The person, not the technology, was the flaw there. Get that far, move his phone number to a new device, and you trip over why SMS based 2FA has mostly disappeared from anywhere competent, because the weaknesses exactly her attack is designed to pivot to then exploit were used *heavily* when 2fa originally started to take off, primarily over SMS.
Take a few security courses and you'll discover that this show just touches the tip of the iceberg. If some cyber criminal is targeting you for a purpose you'd have to be locked up like Fort Knox to prevent intrusion.
@Dog C4 Wow I feel bad for you. But this is an example of why advocating for security and privacy is important. You should tell your experience as much as you can as a warning to others. It hasn't happened to me but I tend to be paranoid, so when I give warnings ppl say 'Oh he's paranoid.' So my words fall on deft ears. As for brand names I found it doesn't matter. Hardware is related to reliability.... and from my experience I stay away from Dell. I still use a google account but i switched to Firefox. And recently was found not so private; reversing anonymous statistical data is doable. So now I switched to the Brave browser. The desktop version can also connect through the TOR net. I use bitwarden to create long password and maintain them but i only use my phone to access that; the network at my workplace is behind a proxy so privacy is not guaranteed. I hope your life is back to normal. Ppl say you shouldn't live in fear but living without taking precautions is careless. Please share your story.
How to basic hack First to last step 1. Go on your mothers/fathers room 2.now try to locate the bag 3.now if you locate it get the Credit card info 4.enjoy your item
It not your cell phone company protecting you - its the outsourced call center guy in a developing country who doesn't really care, they just have KPIs of successfully (no complaint from the caller) calls per hour. That's their metric, thats what they get paid to work to.
So basically he made him download a Remote Desktop and keystroke logger and gave him access to his pc. Lol I could teach someone to do that in 5 minutes
I mean that guy literally just sent you a rat not even great work it wasn’t even sophisticated maybe if the rat locked your screen and set cookie loggers on it then you could say that he’s very good at his job or remove cookie logger and add keylogger
My hackers are people I live with, they changed my device cams to one of those that can see through the tape & at night.. Like the scanner cams at train stations that see through your luggage or your infrared cctv cams that can capture in the dark.. Unlike your regular device cams that would just capture a black screen in the dark
so couple things i undertand this informative. Number 1 call centres have security which is taken vey seriously especially about customers information. the process is air tight now and getting tighter by the year. Secondly you'd have to be a real moron to allow download something that gives someoen access to your pc.
"do you have any of those little things you put over the camera on the laptop?"
yeah, its called tape
Shutter
FLEX TAPE
"Because now at least, I know what I have to fix"
No you don't.
Abdou Benbada dude .. that sounded so epic
This is literally my homework assignment
so this is the video I have to thank for all those security questions when I call to get a better deal at my internet provider.
7:40 yep, she's a Russian hacker
cyka blyat? LOL
Never trust a crying baby!
Why are noone wearing neon sunglasses, mohawks and leather trenchcoats?
Fake hackers
Cuz wrench is taking off his mask and jacket
7:21 Miracle Happened
Had me crackin up....
Lmao
LOOL
lol
@@uvbe didn't get it
Always remember to use 2FA.
If this guy had 2FA on his account (assuming his phone company had provided this feature), the first attack won't have work. Even if she changes the password, she still won't be able to get into the account without also acquiring his phone.
That's effectively what the SMS "send a pin to the phone" was. She convinced the support rep to circumvent it. The person, not the technology, was the flaw there. Get that far, move his phone number to a new device, and you trip over why SMS based 2FA has mostly disappeared from anywhere competent, because the weaknesses exactly her attack is designed to pivot to then exploit were used *heavily* when 2fa originally started to take off, primarily over SMS.
These people amaze me because none of this makes sense in my head
Take a few security courses and you'll discover that this show just touches the tip of the iceberg. If some cyber criminal is targeting you for a purpose you'd have to be locked up like Fort Knox to prevent intrusion.
@Dog C4 Wow I feel bad for you. But this is an example of why advocating for security and privacy is important. You should tell your experience as much as you can as a warning to others. It hasn't happened to me but I tend to be paranoid, so when I give warnings ppl say 'Oh he's paranoid.' So my words fall on deft ears.
As for brand names I found it doesn't matter. Hardware is related to reliability.... and from my experience I stay away from Dell.
I still use a google account but i switched to Firefox. And recently was found not so private; reversing anonymous statistical data is doable. So now I switched to the Brave browser. The desktop version can also connect through the TOR net.
I use bitwarden to create long password and maintain them but i only use my phone to access that; the network at my workplace is behind a proxy so privacy is not guaranteed.
I hope your life is back to normal. Ppl say you shouldn't live in fear but living without taking precautions is careless.
Please share your story.
Is there anything we can put on the laptop or cell to protect?
How to basic hack
First to last step
1. Go on your mothers/fathers room
2.now try to locate the bag
3.now if you locate it get the Credit card info
4.enjoy your item
Skid Hackers during this video: *Right that downright that down*
he knows your history
It not your cell phone company protecting you - its the outsourced call center guy in a developing country who doesn't really care, they just have KPIs of successfully (no complaint from the caller) calls per hour.
That's their metric, thats what they get paid to work to.
original meaning of hacker is so twisted by modern mass media
so which things you will fix ?
awesome guys keep it up
banu prathap ,
no longer public
When I want to try and make something personal go protect my devices but I'm not smart enough or logical to do it 😑
ryanizer11 u
9:08 i really thought them lines on the ground was Ethanet cabels hhhhhhh
Aaaannnd my camera is now covered with Blue-Tac
Whos here from CAB240
IFB240
@@FocusedLoop been awaiting this reply
Name this music
7:20 is a miracle
Lol I missed it at first.
How to any fb hacked??
Which model of SDR is connect to the Mac? 8:27
Dan Tentler is pretty good. Is he still around for real?
The video wasn't playing
i don't have any online information except my wrong address and even if he can know my address he wouldn't even reach it lol
Very interesting :)
A full video and no mention of 2 factor authentication?
She convinced the Deepak to by pass it, remember it's a "Social" engineering hack.
Lol, just realized this is 7 yrs old.
Ok I know this is weird but I think Jess is REALLLLY CUTE
DAVID ALBERGO yes .. it IS weird
How the hell is that weird? Lol. However, I'm rather fond of Marina....
So basically he made him download a Remote Desktop and keystroke logger and gave him access to his pc. Lol I could teach someone to do that in 5 minutes
teach me
those mic on earphones aren't that good in order to receive baby cry, and the guy on the other side would be like "what baby?"
they're calling from the computer and sending the crying baby voice to the caller from computer
Great piece.
QQQQQUUUUUUUTTTTTTTTT WEEK 1 YOSHAAAAA
all i want to do now is run my antivirus
Worlds greatest hackers vs anonymous,fancy bear,cyber wolf the greatest was ever 3 massive hacker groups
and after watching this I am thinking that someone can even screw up my antivirus 😑😑😑
Sayan Chakraborty not even hard lol. its funny to see how many people rely on their av and feel safe with it :D
A200K Yes lol
1:05 samy kamkar is a legend
Too bad, I have a fool proof plan.
Wtf what a engineer😂
This is scary
I mean that guy literally just sent you a rat not even great work it wasn’t even sophisticated maybe if the rat locked your screen and set cookie loggers on it then you could say that he’s very good at his job or remove cookie logger and add keylogger
I stills use tape to cover my camera
My hackers are people I live with, they changed my device cams to one of those that can see through the tape & at night.. Like the scanner cams at train stations that see through your luggage or your infrared cctv cams that can capture in the dark.. Unlike your regular device cams that would just capture a black screen in the dark
Now I'm scared of kids ambushing me with martial arts. #cobrakai
Black Lanner watch out for me then cause i have both of those qualities.
6:50 ish you clicked a link - just dont lol
hey thumbs up samy kamkar
She is Good.
With social engineering.. u can hack anything ;)
JE VEUX CETTE VIDEO en langue francais
Holy shit! Im gonna change all my passwords and take a shower.
Any Nirma students here !!!
*i want her instagram or twitter please*
Now that a tricky mother
lmao he just used BEeF
so couple things i undertand this informative.
Number 1 call centres have security which is taken vey seriously especially about customers information. the process is air tight now and getting tighter by the year. Secondly you'd have to be a real moron to allow download something that gives someoen access to your pc.
You reuploaded a video without permission.
Don't blame me when you get a copyright strike.
Maxim Terra at least someone commented it
in 30 seconds she has my personal email adress..
i want to live in that place😁
you say hackers are everywhere... then talk about targets of hacking.
Fail intro?
Nemesi what the fuck are you saying
Nemesi found another script kiddies that declares the intro is wrong🤦🏼♀️
Fail intro you are the only person who comment that here
lol. i would have hacked you in a second. network engineering gotta love it.