@@mainejhaku5615 How do you know hackertin00 is a man? Could be just like Trinity that hacked the IRS D-base. Neo said with his best Keanu Reeves impersonation "I thought you were a guy". "Most guys do!" bwahhhaah
Absolutely true. It's easier to mitigate hardware and software exploits than to educate the entire population, and have it adhere to its lessons though. But both are absolutely necessary.
I have to admit that when my dad passed away years ago (and so does POA at that time) all honest attempts to get access to accounts to get my mom all setup almost all failed. I quickly learned to, "Be my dad". and I was able to gain access to almost all accounts so my mom had as smooth a transition to being the account(s) holder as possible.
Hello, Are you willing to earn up to $7,000 weekly by yourself without sending your money to anyone? Interested persons only. 100% guaranteed...+17252151143
I don't think he's at much risk from these people. They agreed to participate most likely to help bring awareness that things like this can and do happen.
I’ve worked in a lot of call centres and you’re always told you can’t speak to someone not named on the account no matter what, this person will probably lose there job
Maybe not for that company. In fact up until not long ago such policies weren't a practice in every major or minor companies so people that dox or hack would gain access to the ISP- as shown in this video then take advantage
So not only did Kevin Roose, a long time tech-writer, click on a phishing email link that came from some random url different than the one it claimed to, he used an insecure browser that had an active exploit serious enough that it allowed arbitrary fake login prompts to appear in the future. Kevin then ALSO never noticed the fake login prompts even once and filled in his credentials into the fake prompts repeatedly? Kevin also somehow does not have 2FA set up on his lastpass account (which is impossible)?! OR, or... just possibly this is BS made up for the video of a worst case scenario, the kind your grandma would get into.
Yes. Im quite convinced that was for the show of it. But the thing is. Most of that could and evidently IS being done without anyone noticing it. Theres ways to get around pretty much all of that.
It actually is a likely thing to happen since people would be to uninformed to notice that something sus is happening, I mean if you look at the amount of successful scammers who literally talk to their victims to gain access to their computers, it really wouldn't surprise me if they would fall for this "trap"
You still won't be safe, there have been hackers here in Canada that fabricated entire companies to get information. There has been an incident with a woman desperate for a job post-lockdown and has been contacted by an "IT company" based in Vancouver, the woman even checked the company before responding to their email, it looked way too legit.
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
Hello, Are you willing to earn up to $7,000 weekly by yourself without sending your money to anyone? Interested persons only. 100% guaranteed...+17252151143
rule 1 of hacking keep it simple you dont need to break into a secure network if the human on the end of the phone will give you everything you need you dont need to hack a high tech security system if the door can be opened by just popping the hinge pins
°Entering DEFCON you better erase your browsing history, Wifi, Bluetooth. Me : *bump to someone* I'm so sorry Sir Him: It's okay Mr. S&M *Sweating heavily*
Just in case you wanna hack someone’s Facebook, Snapchat, Twitter, Instagram.twitter and TikTok.. contact *hackertin00* on instagram he is available for ya..he is very much reliable
I was overwhelmed that I could see the texts,pictures, chat list and all files in my husband's account shortly after contacting *hackertin00* on Instagram. Now its not just suspicion, I have facts and evidences against him.
Except the phone doesn't store an image of your fingerprint, it stores a hash. Your fingerprint is deconstructed into a digital key, run through a hashing algorithm then compared with the hash on file. At present, it's mathematically impractical to reverse the hash back into the fingerprint file (same techniques used to encrypt passwords). Further, if you have an iPhone (last time I checked - probably same for Android too, but I don't know the hardware ins and outs), the fingerprint hashing chips are completely isolated from the rest of the phone and are firmware-locked to the logic board, making it impossible for all intents and purposes to extract the fingerprint hash without physical access to the chip. Even then the fingerprinting chips are encrypted, with the key residing on the paired logic board so you can't swap it into another device. This is why the FBI had so much trouble breaking into the San Bernadino shooter's phones a few years ago. To get in, they cloned the phone to a virtual device then brute-forced the PIN, resetting the VM when it locked itself out. So rest assured, the fingerprint on your phone is by FAR one of the least interesting things a remote hacker would want to go for. They'd more likely create a social engineering profile to find important dates (birthdays, anniversaries, etc) to you and use that to guess your PIN.
@@aaronriggan2373 If you have root access can't you just flash the fingerprint scanner to whatever malicious firmware? As long as you have a bidrectional comms channel to that system, looks like you can't really secure your fingerprints Your comment addresses weird scenarios. Here, a malicious actor has root access to your device. Do we have hardware-level security capable of preventing the fingerprint from being accessible?
@@TheHellogs4444 My understanding is that on an iPhone, hardware-level protections do exist. The fingerprint reader is completely isolated from the logic board and is more or less unreachable from the OS. Its software can't be overwritten and because it's hardware encrypted, you can't even physically swap it with a malicious one. I will say it's been probably half a decade since I was repairing iPads so if I'm wrong and someone can point me to some good articles about i-device security, that would be fantastic.
To be fair to the companies. If they stuck to their guns and wouldn't provide any info if that WAS a real customer who was having issues there would be a lot of yelling,lawsuits or they would've lost a customer. There's no middle ground here.
Facts...maybe the agent she was speaking with is a very soft person, I do customer service and regardless of the situation, the customer could even be going through hell, I apologize and let them know that with the account security been verified there's nothing that I can do to help you.
This video is used for training by charter communications. Notice the banner in the video says 2023 but it’s been posted 5 years ago. Pay attention folks.
They're really good, but on social understanding. But the success of a hacker's skill seem to be caused more on their target's incompetence rather than their own. Had the phone guy given it a second thought what he's doing, and had he fine read the link and thought about the download, plus maybe even downloading some anti virus software that pops up on suspicious downloaded files then maybe neither of them would've succeeded.
this reporter is the type of person to believe this African boy: hello i have 10million dollars worth of gold bars to give you just send me 100 dollars paypal and all ur passwords ty Reporter : yes
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
Every system can be used, misused or abused. Are there such events as DEFCON for hackers figuring out how to create Synergy for everyone from the Internet of Things?
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
vishing is NOT calling up a company and pretending to be a customer. it is soliciting over the phone, calling someone making them think you are a company they belong to or have service through, and getting them to give you their info, because they know "the company" has it already. in some cases, even using prerecorded message systems to make them seem like an official company. it is "voice phishing", hence the name. phishing is the same thing, but through email. what she is doing is just social engineering. pretending to be someone you are not, or having authority you don't, in order to get something you shouldn't have access to.
Wow, you've just discovered the conspiracy of video editing.. You know.. Adding a b-roll shot of the video even though it wasn't caught _in the moment_. What a great detective.
@@mulletman1705 Guess webcams came before laptops and not laptops before web cams. I have a thinkpad t410, t430, dell d630 and d430 which all were built without webcam seems I need to ask Lenovo and dell for some money back since the laptops can't function without a webcam.
Any phone in the world can be hacked by using a little known method. but with the help of *hackertin00* on instagram .a trustworthy and genius hacker have ever meet on the internet *hackertin00* you can get access back to your device,you can as well get your disable account back. thanks a lot *hackertin00*
"I can make you homeless",
This line took the reporter to an another level of misery.. 😂
Razou Noudi I never believe it when I saw a comment about hackjamal1 on Instagram until he helps me recover my old account you can try him too
Blonde Lady: "i can make someone who works at your cellphone company's support department homeless"
It reminds him of who he is...
ua-cam.com/video/C7NwhkeYR0Y/v-deo.html
@@mainejhaku5615 How do you know hackertin00 is a man? Could be just like Trinity that hacked the IRS D-base. Neo said with his best Keanu Reeves impersonation "I thought you were a guy". "Most guys do!" bwahhhaah
The biggest threat is not the security of technologies, its the people.
Absolutely true. It's easier to mitigate hardware and software exploits than to educate the entire population, and have it adhere to its lessons though.
But both are absolutely necessary.
Isn't that what makes human engineering so much fun though?
@@paul-anthonym.9607 No, that's what makes social engineering so disappointing and anxiety inducing.
What about AI
well said... people like to outsource everything even their personal data security.
Netflix wants to know that woman's location
We found *the daughter*
@Stephen Muller lol looks like we got some msfvenom kids
@@rvxn or a big elaborate scam lmao
Very soon when Netflix find her. A new movie; The mom Hacker
JAMTARA 😂😁
Best live demo of social engineering ever... Girl has skills 😍
I have to admit that when my dad passed away years ago (and so does POA at that time) all honest attempts to get access to accounts to get my mom all setup almost all failed. I quickly learned to, "Be my dad". and I was able to gain access to almost all accounts so my mom had as smooth a transition to being the account(s) holder as possible.
wow crazy this world is a mess
🤦
Imagine Using the Cry baby sound all of the sudden, an Ad starts to play 😂
You don't have to be a hacker of her level to use a basic adblock
Hahahha
@@namankohli1061 whoosh
@@namankohli1061 that's why I said imagine 😂
😂😂
😂 Imagine this guys wife being the support staff that answers the call.
That would be some funny, funny schit :D
Damn, bots going hard on this video
@@vladiiidracula235 nah dude Hackertin00 is legit 😏
that vissing woman is goood... i mean her skills.
Thanks for d clarification 😂😂😉
Its phishing
he said it correctly, vishing is using your voice to get information rather than text
Jessica has the good looks
@@trtrhr you sure you wouldn't fall for a social engineering attack from a red teamer or a professional black hat?
I watched this video 'coz it wouldn't go off my recommended list. It was totally worth watching. A wake-up call to every one of us.
Hello, Are you willing to earn up to $7,000 weekly by yourself without sending your money to anyone? Interested persons only. 100% guaranteed...+17252151143
This guy is in such a risk, like imagine if one of them betrays him...
This thought gave me anxiety for him.
I don't think he's at much risk from these people. They agreed to participate most likely to help bring awareness that things like this can and do happen.
Among Us
@@aniketroy03 😏😏🤣🤣
In my opinion what women did only works with a very bad provider, good tech support never break protocol even if your crying children is dying.
😂😂
Well, twitter was recently hacked with the exact same technique
@@mrunfunny 😂😂
@@mrunfunny we'll your security is only as powerful as your weakest link so the representative if they are emotionally dumb we are ducked
@@mrunfunny it used social engineering, but they didn't use a baby afaik
I’ve worked in a lot of call centres and you’re always told you can’t speak to someone not named on the account no matter what, this person will probably lose there job
Maybe not for that company. In fact up until not long ago such policies weren't a practice in every major or minor companies so people that dox or hack would gain access to the ISP- as shown in this video then take advantage
This episode happened more than 4 years before your post. Security was more lax then.
as they should
So not only did Kevin Roose, a long time tech-writer, click on a phishing email link that came from some random url different than the one it claimed to, he used an insecure browser that had an active exploit serious enough that it allowed arbitrary fake login prompts to appear in the future. Kevin then ALSO never noticed the fake login prompts even once and filled in his credentials into the fake prompts repeatedly? Kevin also somehow does not have 2FA set up on his lastpass account (which is impossible)?!
OR, or... just possibly this is BS made up for the video of a worst case scenario, the kind your grandma would get into.
Yes. Im quite convinced that was for the show of it. But the thing is. Most of that could and evidently IS being done without anyone noticing it. Theres ways to get around pretty much all of that.
kriss3d please inbox me your email
Your comment is 2 months old, this video is 3 years old. A lot has changed.
It actually is a likely thing to happen since people would be to uninformed to notice that something sus is happening, I mean if you look at the amount of successful scammers who literally talk to their victims to gain access to their computers, it really wouldn't surprise me if they would fall for this "trap"
Yes and no
0:08 Listen...
YEEEHAAAWWW!!
Winsky Kusuma YEEEEEEEHAWWWW
Why it so addictive? I hv been listening to it for a day now.
Innocent reporter: *enters defcon*
Hackers:
EEEEE AWWW
@@Turplemaple6318 yeeeehhaaww
In other words Phishing is Social Engineering shortened down.
You Here Mr.Bam
Phishing
Vishing, Voice phIshing
actually so much more. this example was very simple. a good social engineer can actually infiltrate a company.
@@JipSlinger try me, they will never get me
Moral to the story is don't click emails you aren't expecting, and never use SMS backups. Just a couple ways to medigate predators.
You still won't be safe, there have been hackers here in Canada that fabricated entire companies to get information. There has been an incident with a woman desperate for a job post-lockdown and has been contacted by an "IT company" based in Vancouver, the woman even checked the company before responding to their email, it looked way too legit.
Somewhere out there, there is a struggling mother with a crying baby, who right now disliked this video. LOL
This is what my neighbours think of me when I say that I'm a software engineer.
oh my god that lady hacker just hacked my feelings
This
@Stephen Muller Wow so random def a scammer
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
@Stephen Muller simp
*Ad starts playing during the call
Ad: HOTEL? TRIVAGO
Hello, Are you willing to earn up to $7,000 weekly by yourself without sending your money to anyone? Interested persons only. 100% guaranteed...+17252151143
Ad Blocker.
Give that lady an oscar for her acting skill.
The thumbnail looks like a prank video, like she’s at dinner and she’s reacting to the prank happening next to her
A human being is a multitude of unfixable 0-day exploits.
I'm a simple guy i saw a beautiful lady in thumbnail & clicked the video 💛
Right there bro, I felt same ❤️
Me: Clicks on a link in a mail
Hacker: NO YOOOUUU gave me your passwords 😂😂😂
The real one is not there he/she will never come out and attended these shows,
And you know this how? :D
@@tweetdezweet there's always better but sometimes better is also illegal
@@hippityhop9522 and because some hackers do illegal things they wouldn't attend a hacker conference?
the guy who hacked the car was so cool. he should be in a movie or netflix
0:36 he kinda looks like Samy Kamkar
He is Sammy kamkar
@GRIZZLI He's more famous for taking down my space.
@@zeroscript8906 And the host went after some other hackers instead of spending time with him.
@GRIZZLI haha
Using the world wide web and clicking on anything suspicious is like driving a car and testing how many trees you can pass through at max speed.
rule 1 of hacking keep it simple
you dont need to break into a secure network if the human on the end of the phone will give you everything you need
you dont need to hack a high tech security system if the door can be opened by just popping the hinge pins
Yes. Systems nowadays are very secure with 2fa etc. But theres one thing that is very weak, the user
°Entering DEFCON you better erase your browsing history, Wifi, Bluetooth.
Me : *bump to someone* I'm so sorry Sir
Him: It's okay Mr. S&M
*Sweating heavily*
In IOS I believe there was an exploit to gain complete control over a phone by sending WiFi packets
1:35
Him: who are you gonna call
Me: ghost busters
(Sorry)
@@thailovely217 ok I don't care
Addicted to defcon 🤩😍
That woman should play "among us"
Feeling sad for her bf, all I could do is to wish him "Stay Strong"
Honestly after seeing this no one would ever want to be her bf. Anyways she is damn cute.
@@evilprince2009 why what the hell she do?
Loved every second of this vid
01:37 She should have said Ghostbusters.
thank you
a heaven for hackers and hell for multiplayer games
goosebumps
Old but gold
5:22 "and I could burn this whole place to the ground if they don't return my red swingline stapler");
As soon as a pretty lady looks at me smiling, boom. I'm hacked. So vulnerable.
Just in case you wanna hack someone’s Facebook, Snapchat, Twitter, Instagram.twitter and TikTok.. contact *hackertin00* on instagram he is available for ya..he is very much reliable
I was overwhelmed that I could see the texts,pictures, chat list and all files in my husband's account shortly after contacting *hackertin00* on Instagram. Now its not just suspicion, I have facts and evidences against him.
This guy is questioning his whole existence when she steals his identity/information
It’s scary how the access to a phone or computer and internet can change a persons life in one instant.
okay I watched this on television one day and was trying to find it like forever but couldn't. Now it came in my recommendations itself 0_0
Hacker: I could have made you homeless.
My parents(after seeing the video): today we will cut our wifi connection.
Sad part, the actual ones never tell what they can do.
Gotta master that ez doublespeak, brother. We in the big leagues now. 🕸️
I want to learn this level of security knowledge
At the end, the interviewer looked like he was about to throw up.
@@caroltope9037 Uh, ok. Sorry to hear that.
@Li'l Squeak I know, looked it up. Very sketchy.
The only thing i couldnt doctor is your fingerprint
Well here we are now with fingerprint scanners on the phones. Its getting worse.
Except the phone doesn't store an image of your fingerprint, it stores a hash. Your fingerprint is deconstructed into a digital key, run through a hashing algorithm then compared with the hash on file. At present, it's mathematically impractical to reverse the hash back into the fingerprint file (same techniques used to encrypt passwords).
Further, if you have an iPhone (last time I checked - probably same for Android too, but I don't know the hardware ins and outs), the fingerprint hashing chips are completely isolated from the rest of the phone and are firmware-locked to the logic board, making it impossible for all intents and purposes to extract the fingerprint hash without physical access to the chip. Even then the fingerprinting chips are encrypted, with the key residing on the paired logic board so you can't swap it into another device. This is why the FBI had so much trouble breaking into the San Bernadino shooter's phones a few years ago. To get in, they cloned the phone to a virtual device then brute-forced the PIN, resetting the VM when it locked itself out.
So rest assured, the fingerprint on your phone is by FAR one of the least interesting things a remote hacker would want to go for. They'd more likely create a social engineering profile to find important dates (birthdays, anniversaries, etc) to you and use that to guess your PIN.
@@aaronriggan2373 If you have root access can't you just flash the fingerprint scanner to whatever malicious firmware? As long as you have a bidrectional comms channel to that system, looks like you can't really secure your fingerprints
Your comment addresses weird scenarios. Here, a malicious actor has root access to your device. Do we have hardware-level security capable of preventing the fingerprint from being accessible?
@@TheHellogs4444 My understanding is that on an iPhone, hardware-level protections do exist.
The fingerprint reader is completely isolated from the logic board and is more or less unreachable from the OS. Its software can't be overwritten and because it's hardware encrypted, you can't even physically swap it with a malicious one.
I will say it's been probably half a decade since I was repairing iPads so if I'm wrong and someone can point me to some good articles about i-device security, that would be fantastic.
*Ronaldhacks01_ on √nsta* helped me in having access to my husband phone without him knowing.. he can help you..
Anyone like to earn $1000 through Hacking within 24 hrs.Plz contact +916383806495 in whatsapp
We were doing this in the early 2000's I do believe it's still going on today.
Aiden Pearce: "Hold My Bear!"
The fact that its from 3 years ago scares the f outta me
To be fair to the companies. If they stuck to their guns and wouldn't provide any info if that WAS a real customer who was having issues there would be a lot of yelling,lawsuits or they would've lost a customer. There's no middle ground here.
Facts...maybe the agent she was speaking with is a very soft person, I do customer service and regardless of the situation, the customer could even be going through hell, I apologize and let them know that with the account security been verified there's nothing that I can do to help you.
This video is used for training by charter communications. Notice the banner in the video says 2023 but it’s been posted 5 years ago. Pay attention folks.
Great video
Imagine swiggy add popping up during the youtube play..😂
0:07 *hacker cowboy activating*
Savage to the core!!
Girl got mad skills. This was really impressing.
They're really good, but on social understanding. But the success of a hacker's skill seem to be caused more on their target's incompetence rather than their own.
Had the phone guy given it a second thought what he's doing, and had he fine read the link and thought about the download, plus maybe even downloading some anti virus software that pops up on suspicious downloaded files then maybe neither of them would've succeeded.
I think there is a big difference between Fraudsters and hackers.
Being able to be both makes you more dangerous
superb
This is terrifying.
I wanted to attend it this year, but sadly there's COVID :/
Oh yeah...
I am you. Now that’s power.
Detecting vulnerability in people is easier than detecting vulnerability in machine
this reporter is the type of person to believe this
African boy: hello i have 10million dollars worth of gold bars to give you just send me 100 dollars paypal and all ur passwords ty
Reporter : yes
It's supposed to represent old people
2:41 baby crying video is paused, still making sound. LOL
Espetacular.
good ho gya G😂
ye to meri pasand la hacker h😍
Special love🖤🖤
Contact justi_hack on IG he is fast 💯
6:00 LOL, the idea of becoming a hermit and trow your computer into deepest ocean after know how you are vulnerable
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
Moral of the story: NEVER BE SUCH A MORON TO REQUEST A HACKER TO HACK YOU
NEVER BE in a way of a black hat hacker
What happen when ad suddenly appears?😂😂🕺..
seven years ago. i never gonna use my cellphone on bathroom again.
Every system can be used, misused or abused. Are there such events as DEFCON for hackers figuring out how to create Synergy for everyone from the Internet of Things?
The first ule of a hacker is not to tell his secrets.
otherwise companies gets all the information and can run their shady business more safely
Floor looks rad.
Its nice to see everyone got their good boy haircuts just in time for the big boy pants hacker convention
and this why i dont use one password for more passwords
LMAO @ 5:39 Looks like he's about to cry and barf at the same time.
@@perkinskurt6147 I guess this guy is also trying to scam people...
I love this hacking attempts
Snap...
Some one in a cell phone company lost their job due to this
After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process
I learned this from my I.t. Class. I’m exposing this to everyone I know, Goddamn.......
Bro let’s chat inbox me your email
vishing is NOT calling up a company and pretending to be a customer. it is soliciting over the phone, calling someone making them think you are a company they belong to or have service through, and getting them to give you their info, because they know "the company" has it already. in some cases, even using prerecorded message systems to make them seem like an official company. it is "voice phishing", hence the name. phishing is the same thing, but through email.
what she is doing is just social engineering. pretending to be someone you are not, or having authority you don't, in order to get something you shouldn't have access to.
"If my evilness is working correctly"
0:35 is that Samy Kamkar
The guy who accidentally hacked MySpace
Do the Floor is covered by wires or it is just the Floor design.
Awesome
This how powerful technology is.
? which baby is crying ? UA-cam Video Is Paused...
Wow, you've just discovered the conspiracy of video editing.. You know.. Adding a b-roll shot of the video even though it wasn't caught _in the moment_. What a great detective.
@@skatterpro and u are an asshole who believe everything on UA-cam
That's how they hack , they make you believe first
@@bahubali2126 nono, Gurk is correct here.
Woosh
She looks more or less like brandi love
A man of culture
Has anyone seen "Elliot Alderson" in the conference?
"If my evilness is working correctly 😂😂😂😂😂"
In the thumbnail that lady looked damn beautiful 💕
Another reason why I like using laptops with no webcams. cant hack what is not there.
By that logic you shouldn't like using laptops
@@mulletman1705 Guess webcams came before laptops and not laptops before web cams. I have a thinkpad t410, t430, dell d630 and d430 which all were built without webcam seems I need to ask Lenovo and dell for some money back since the laptops can't function without a webcam.
Any phone in the world can be hacked by using a little known method. but with the help of *hackertin00* on instagram .a trustworthy and genius hacker have ever meet on the internet *hackertin00* you can get access back to your device,you can as well get your disable account back. thanks a lot *hackertin00*
1:36
Who are you gonna call???
-GHOSTBUSTERS
dararara rara dararararara GHOSTBUSTERS!
Damn