Discord Malware - "i hacked MYSELF??"

Поділитися
Вставка
  • Опубліковано 19 гру 2024

КОМЕНТАРІ •

  • @_JohnHammond
    @_JohnHammond  3 роки тому +375

    For the frenzy of folks that are concerned YoOuUUuU LLEeeEAAaKKEEDdA TOOKKkKEKEENNNNN!N!N!N!!nn1n1hhbjgngn:
    No. If you got clever and looked at individual frames, the one you see returns an Unauthorized. Others have been obscured.
    Thank you for your concern. :)

    • @wrng-i9f
      @wrng-i9f 3 роки тому +12

      Very nice video

    • @DoorThief
      @DoorThief 3 роки тому +16

      I feel like I was called out on this, lol

    • @nikolanojic6861
      @nikolanojic6861 3 роки тому +3

      Dosent tokens change with time

    • @XenorioWasTaken
      @XenorioWasTaken 3 роки тому +16

      If you stitch together the frames where the working token is visible, you can make out about half of a token. Just to be sure, i would advise changing your password as that generates a new authentication token and invalidates the old one. You wouldn't even have had to blur any tokens if you did that before releasing the video.

    • @_JohnHammond
      @_JohnHammond  3 роки тому +44

      Yes, passwords were changed before releasing the video ;)

  • @jamesoneill2606
    @jamesoneill2606 3 роки тому +451

    Please don't stop explaining the simple stuff, I've learned loads thanks.

    • @Khusyasy
      @Khusyasy 3 роки тому +1

      same

    • @ajayk643
      @ajayk643 3 роки тому

      Then why did you see these kind of videos

    • @ajayk643
      @ajayk643 3 роки тому

      John Hammond thanks for this video😍😍

    • @trouty7947
      @trouty7947 3 роки тому +4

      It's good to remember every video, especially when they're popular, will have a lot of new people that this is literally their first in depth look at malware analysis. So it's always worth explaining for the new guys.

    • @oltn7142
      @oltn7142 3 роки тому +1

      same here

  • @flightstatic4662
    @flightstatic4662 3 роки тому +277

    I don't think I have ever heard anyone say "please send me malware" before

    • @ko-Daegu
      @ko-Daegu 3 роки тому +2

      it's all over Twitter if you follow at least one malware analyst

    • @recommendastra_hack_zoneon709
      @recommendastra_hack_zoneon709 3 роки тому +2

      A ban was placed on my Ticktok, PSN account which affected my score but all Thanks To #global_hackweiser1 i got all access to my banned accounts within some minutes which i summon the trust to work with him after i saw most of his good recommandations on You-Tube. You trully a Man of your word.💯

    • @recommendastra_hack_zoneon709
      @recommendastra_hack_zoneon709 3 роки тому +2

      A ban was placed on my Ticktok, PSN account which affected my score but all Thanks To #global_hackweiser1 i got all access to my banned accounts within some minutes which i summon the trust to work with him after i saw most of his good recommandations on You-Tube. You trully a Man of your word.💯

    • @tamilxctf4075
      @tamilxctf4075 3 роки тому +5

      @@recommendastra_hack_zoneon709 y spam.exe

    • @bitten2up
      @bitten2up 2 роки тому

      tbh I said that to someone who was infected with this malware so then I can report the links

  • @xFalduR
    @xFalduR 3 роки тому +99

    I'm only 5 minutes in, but i feel its relevant to say I appreciate the "easy baby stuff" being reiterated for people like me. I'm learning python for data science. I don't know what all of these imports do. So when you explain every import or at least give basic descriptions of what they do, it really helps me follow along.

    • @JonSnyderfudge
      @JonSnyderfudge 3 роки тому +4

      Lol yup. Never assume our knowledge base. Those that already know python can easily skip forward that part if they want.

    • @cedricvillani8502
      @cedricvillani8502 3 роки тому +1

      Ok well lol, if your actually learning python you KNOW what import does. Lmao think about the word for a moment…… hmmm do a little work looking up maybe? No? Just wait for someone to do it for you?

    • @xFalduR
      @xFalduR 3 роки тому +6

      @@cedricvillani8502 not only are you pretentious, you also can't read. That's astounding.

    • @issecret1
      @issecret1 3 роки тому +3

      @@cedricvillani8502 yes. Feel free to lose your mind over this fact

    • @shawazonfire
      @shawazonfire Рік тому

      Well said, I think that's probably the reason I like this guy's videos. Clear, comprehensive step by step instructions and explanations.

  • @davidfrischknecht8261
    @davidfrischknecht8261 3 роки тому +122

    That ".il" file is actual CIL (Common Intermediate Language, formerly known as MSIL) code that C# and VB source code files are compiled down to before they're turned into executables.

  • @matthewlandry1352
    @matthewlandry1352 3 роки тому +26

    Omg..can’t wait for this I started seeing a lot of discord trojans in the news last year and I would love to here more in depth analysis.

  • @highvisibilityraincoat
    @highvisibilityraincoat 3 роки тому +66

    This will blow up. So many script kiddies on DS

    • @_JohnHammond
      @_JohnHammond  3 роки тому +44

      I tried to make this as cl1ckb@!t as possible 😎

    • @JarredRandom
      @JarredRandom 3 роки тому +8

      @@_JohnHammond i think youve succeeded in making it that

    • @JimTheScientist
      @JimTheScientist 3 роки тому +4

      I see them every day. Lots of the exploits people use “generators” for (python scripts you can find on GitHub) are electron related. So many ways to download files to other people’s computers and to crash other people’s computers.

    • @JarredRandom
      @JarredRandom 3 роки тому +1

      @@JimTheScientist lol hey jim, fancy seeing you here!

    • @highvisibilityraincoat
      @highvisibilityraincoat 3 роки тому +5

      JimTheScientist electron is a shit piece of software and I wish permanent annoyance on its devs and applications that use it. should not crash because of a video codec issue

  • @Sans-eg6fl
    @Sans-eg6fl 3 місяці тому

    I've been watching these deconstruction videos while i have free time at school. It's fairly interesting how easy it is to learn how viruses/malware act and what they look for. I barely know how to code, yet you make it so easy to learn how these things behave.

  • @djoser4977
    @djoser4977 2 роки тому +1

    THC For (4) L(ife)
    9-TetraHydroCannabinol (THC) is a chemical component in Weed and Hasj.
    Probably a smoker.
    nice vid btw, Learned a lot!

  • @Kurowe.
    @Kurowe. 2 роки тому +2

    I hope more of you guys look into this Discord malware, a lot of this stuff is going undetected and creating a lot of headaches and some of these stealers have keyloggers, gets login sessions from your browsers etc.

  • @JimTheScientist
    @JimTheScientist 3 роки тому +26

    This is going to be interesting. I’ve studied RCE attacks and Trojans on discord, as well as some more tame malware. I can say that discord is really bad in the security area, but it’s not much to worry about as there are few people who know how to do the attacks and how they work.
    Edit: I’ve started watching the video, and I’ve seen almost this exact same script before while moderating a server

    • @Odsku
      @Odsku 3 роки тому +6

      More advanced scripts add malicious js to discord core modules it allows the malware to keep persistence while having a low detection rate

    • @DM-qm5sc
      @DM-qm5sc 3 роки тому

      That's ok, only a few people know how these attacks work

    • @Odsku
      @Odsku 3 роки тому +1

      @@DM-qm5sc only the RCE are private but the scripts are well public

    • @tlocto
      @tlocto 3 роки тому

      oh hey jim fancy seeing you here

    • @JimTheScientist
      @JimTheScientist 3 роки тому

      @@tlocto hello

  • @MrTubeMeToo
    @MrTubeMeToo Рік тому

    Thanks for making it 'approachable'. I am a beginner in all of this and your quick description of the basic commands is extrememely helpful. It allows me to continue to follow what you are doing and also learn about a wide variety of commands. Of course, further real study is necessary but your presentation helps one broaden understanding of the overall field to be studied. Thanks.

  • @keissetje
    @keissetje 3 роки тому +6

    Holy smokes, how can it be so easy to retrieve all your discord data without logging in essentially. I wouldn't have guessed that discord is saving these tokens as plaintext in your appdata folder. Very nice video! You've got another sub :)

    • @ayva1106
      @ayva1106 2 роки тому +1

      Late comment, but they're finally releasing a beta tests that encrypts your tokens... and it only took them a few years

    • @MakotoIchinose
      @MakotoIchinose 2 роки тому +1

      @@ayva1106 And even then it's still compromised. People found out malware that circumvented it and managed to reverse engineer it for documentation.

  • @lethalboar6755
    @lethalboar6755 3 роки тому +5

    Great video John, would love to see you de-obfuscate that JavaScript!

  • @superpowerforhire
    @superpowerforhire 3 роки тому +20

    This is much better, John. You’ve dissect each components and explained thoroughly. Rather than rushing always.

  • @Marten..
    @Marten.. 3 роки тому +2

    one of your most easy to understand videos yet. well explained. learned a lot. thank you John!

  • @hubsoftecommerce
    @hubsoftecommerce 3 роки тому +1

    cant wait for 200k so excited !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @shivashiva8021
    @shivashiva8021 3 роки тому +10

    I am eagerly waiting .

  • @omniflas_2065
    @omniflas_2065 Рік тому

    I love these kind of videos, fun new channel to nerd out to. :) Joined the Discord as well! :p

  • @shawazonfire
    @shawazonfire Рік тому

    i'm not gonna lie to you bro, the way you teach is excellent and i appreciate your videos more than you could ever imagine... ever...

  • @edumeli02
    @edumeli02 2 роки тому

    Learning new stuff with you is always great. You always manage to draw my attention for a whole hour.

  • @andyburton5912
    @andyburton5912 3 роки тому +1

    Was doing exchange patching a week ago and they reference @john Hammond gist love it

  • @wtfdoiputhere
    @wtfdoiputhere 3 роки тому

    Honestly I've not watched a full malware analysis vid from you but this one rly interesting and honestly very well written

  • @jdbjdb2
    @jdbjdb2 3 роки тому +7

    The delay is to prevent maxing out discord API requests so it's maximum efficiency

  • @jonoisedev
    @jonoisedev 3 роки тому

    I literaly saw this on my youtube feed and inmediately went to make popcorn!!

  • @jaygeemmo
    @jaygeemmo 3 роки тому

    ive learned allot from this and that says something because time enrolled in college for this and I feel like these breakdowns help immensely for someone like myself.

  • @randallsalyer
    @randallsalyer 3 роки тому +1

    You always have great videos!

  • @DoorThief
    @DoorThief 3 роки тому +1

    Love your content, John! It's really fun to step through code with you.

  • @mrjoeymelo
    @mrjoeymelo 3 роки тому

    Great content! Thank you for your contribution and for taking the risk of exposing yourself. Very informative.

  • @nv_takeout
    @nv_takeout 2 роки тому +1

    Recently stumbled upon some of your malware analysis videos and boy am I hooked! love your approach, you make things super easy to understand even for someone with little to no coding knowledge. I hope soon I can find some videos on your channel about learning to program in some of these languages that you work in with malware :) some more gamer-catered stuff would be awesomeee too! thanks John for some very entertaining videos!

  • @ayva1106
    @ayva1106 2 роки тому +1

    25:51 uid and avatar are both public values so there's no need to censor them

  • @alincraciunescu
    @alincraciunescu 3 роки тому

    You are the best! Thank you for explaining also for the beginners.

  • @Nitradoz
    @Nitradoz 3 роки тому +2

    200k! good job man you deserve it :)

  • @kylelarson7840
    @kylelarson7840 3 роки тому

    Hey John a little off topic for this video, but your terminator vid, (among all the others!) really helped me pass the eJPT in less than 4 hours last week. Thanks for all great content man!

  • @elthxr4692
    @elthxr4692 3 роки тому

    You're making it happen John ! :) BigUps . Learned lot from you my Guy !! Hopefully more to come. Peace

  • @dedkeny
    @dedkeny 3 роки тому

    I thought it was clickbait, but DAMN!! legit content

  • @swpq_
    @swpq_ 3 роки тому +4

    19:00 It's not stealing your passwords on the browsers, discord is literally just a browser and so is chrome/opera. So it is checking in the browsers for discord tokens;;

    • @swpq_
      @swpq_ 3 роки тому +2

      20:20 MFA might be safe, but the tokens it makes, really aren't. From my experience they don't re-generate new ones.

    • @uslph.
      @uslph. 3 роки тому +1

      @@swpq_ your token changes 100% when your password does and maybe when you change your username.

    • @swpq_
      @swpq_ 3 роки тому

      @@uslph. yeah buddy i know

  • @apollogeist8513
    @apollogeist8513 3 роки тому

    Congrats on 200k!

  • @aravbudhiraja
    @aravbudhiraja 3 роки тому

    ayy congrats on 200k John!

  • @NevRS32
    @NevRS32 2 роки тому

    51:50 Hammond enters the freaking Matrix... xD You know a content creator is entertaining when you don't understand shit, and still watches until the end, entertained!

  • @TheHyperplayer
    @TheHyperplayer 3 роки тому +10

    I would advise you to use solid colored bars instead of pixelation since there is currently a promising tool in development that can reverse pixelation to some extend.

    • @eericjacobson
      @eericjacobson 2 роки тому +3

      hollywood isnt real bro

    • @LuciSheppyLive
      @LuciSheppyLive Рік тому

      Reversing pixelation requires context and information, now I haven't actually seen the pixelated part in this video but unless the pixelated content is unambiguously readable as any character, an algorithm won't know either, I bet you'd be able to get an approximation of what it could look like but that may just be as unreadable as it already is, but less pixelated

    • @lonelyanthem
      @lonelyanthem Рік тому

      @@eericjacobson neural networks exist, and they've been in use for years.

  • @aalekhmotani3877
    @aalekhmotani3877 Рік тому

    you are genius, you are exceptional tutor, thank you, thank you so much, i got a project idea from this vid.

  • @algalib2631
    @algalib2631 3 роки тому

    YOUR explanation is Osm!!!🖤🖤🖤

  • @cassandradawn780
    @cassandradawn780 3 роки тому +75

    by the end of the premiere you're gonna have 200k.

  • @WeirdDuck781
    @WeirdDuck781 3 роки тому +1

    If you open the webhook URL you can identify the name of the webhook, the Guild ID and Channel ID. That information is kinda basic but might help when reporting to Discord

  • @rahealmazumder6811
    @rahealmazumder6811 3 роки тому

    Great video John! Many thanks :-)

  • @rabbitear0
    @rabbitear0 3 роки тому

    Great Video, and learned a bunch!

  • @Koszilla
    @Koszilla 3 роки тому

    This is going to be an amazing video!

  • @dtvdavid
    @dtvdavid Рік тому

    Instant pressed like, as I saw the Triforce. :)

  • @crazymonkeyVII
    @crazymonkeyVII 3 роки тому

    Absolutely fantastic content!

  • @driden1987
    @driden1987 3 роки тому

    Awesome content as always, John 👏🏻

  • @charismaticmedia8585
    @charismaticmedia8585 3 роки тому

    Love your videos sir .Hope you have a great day.

  • @hk5716
    @hk5716 3 роки тому +1

    it could be the location for discord tokens in those browser since discord uses electron which uses chromium which chrome and a lot of other browsers also use, so it might be that cookies are stored there.

    • @KnightOfEvil
      @KnightOfEvil 3 роки тому

      The path has leveldb which is a nosql db where chromium stores it's cookies and local storage

  • @Basieeee
    @Basieeee 3 роки тому

    I Love you John. Great video again, interpreted languages is cool to reverse. Congratz on the 200k :)

  • @LokiCDK
    @LokiCDK Рік тому

    Oh wow! I'm impressed.
    Only importing that actually used functions, not the whole libraries.

  • @dommbrown
    @dommbrown 2 роки тому

    Love ya work chap! Sub'd

  • @diarm.hunter6822
    @diarm.hunter6822 2 роки тому

    "NSFW_allowed: "yes" " 25:57
    Nice, John

  • @Carr7.0
    @Carr7.0 3 роки тому

    yes i am interested in more discord stuff
    and yes it is bad, but it's good to see and know what is actually out there

  • @TehIdiotOne
    @TehIdiotOne 3 роки тому

    By no means the most advanced malware i've seen, like it does rely on a lot of user error to work, but still nice breakdown

  • @Apo16-ss
    @Apo16-ss 3 роки тому

    Awsome video man. I appreciate it a lot

  • @tocraft573
    @tocraft573 3 роки тому +38

    Props to this guy managing to get a discord nuker/token logger to 1 hour

    • @aty4282
      @aty4282 3 роки тому +7

      @@recommendastra_hack_zoneon709 hope it gets banned again, tiktok does not deserve users

    • @IkeVoodoo
      @IkeVoodoo 3 роки тому

      @@aty4282 Its a bot, he is so shit and one of the worst people ngl (the person running the bot)

    • @aty4282
      @aty4282 3 роки тому

      @@IkeVoodoo goddamn, cant believe that i fell for the classic ones

  • @Enigmahax
    @Enigmahax 3 роки тому

    really good explication, please keep this up

  • @krlst.5977
    @krlst.5977 3 роки тому

    Great video, man. As always :)

  • @viks9759
    @viks9759 3 роки тому +1

    After 15 years I ran into my first virus. Now what virus or what it was i do not know, i do know i downloaded a script from a discord for FiveM.
    2-3 hours later things started to go spooky.
    1. Programs became slow, some were not responding.
    2. When the game (FiveM) refused to close (Alt -F4) did not work or F8 quit < neither responded.
    3. Ctrl + Alt + Delete not responding never opened up.
    4. CMD - Administrator did not work at all BUT regular CMD did work.
    5. I then did normal CMD start, did command "net user" >>>> i then saw i no longer had "Administrator" a new user was active and mine was no longer active <
    6. At this point I got shit scared and pulled my internet as a first step. Then I tried to start my “Firewall” as I had it turned off for millions of reasons. I could no longer turn it on . Im guessing because of the lack of “Administrator” privilege i lost
    7. I held in Shift - clicked restart < in order to try to start the computer in “safe mode” not even that worked.
    8. I ran a full system check with the windows, first It came with 0 warnings or nothing, but then about 10 min later a windows pop up window came up saying 2 timestamps where 2 major threats had been discovered. I then realized what It was, and it was not possible to remove them as I already guessed.
    9. I luckily had a Malwarebytes program on my USB drive. Keep in mind any download did not work at this point. The USB worked, I ran a system check, and found some files it could remove.
    10. Now I thought well if I can at least maybe delete the program it uses to attack and gain access i may be able to stop and save the files. But then I thought if I lost the Administrator, I guess it would be possible for him/her to port forward through the internet without the current malware he/she used right?
    Anyways…….i did not take the chances and i ended up with pulling out all of my harddrives, connected my “Wavlink Docking Station” and deleted everything from scratch. I do know some malware may survive….but i then also ended up and decided to make a full reinstall on the windows. I did research and heard it is POSSIBLE for malware to still be in the system...if anyone can give me an idea of how rare that is please give me a comment.
    15 years….never experienced anything like this. I am not an expert nor an IT person. Simply computer interest and a gamer over many years.
    My question is to any of you experts here. Is there ANYTHING more I could have done in this scenario? Did I do anything wrong?
    Wish i had Johns expertise, best regards Simon

  • @bryanvuyk
    @bryanvuyk 3 роки тому +1

    Seriously the best content creator out there. Love the videos. Keep them coming.

  • @falcongamingdev8810
    @falcongamingdev8810 3 роки тому +1

    that sever crasher is probably allowing the person to join servers and spam the server with that users token

  • @DoorThief
    @DoorThief 3 роки тому +3

    I definitely want to see your deobfuscuate that js code :D

  • @WeirdDuck781
    @WeirdDuck781 3 роки тому +2

    Someone attempted to scam me with this script with mild differences. They were targetting a programmer discord server where most people would have python installed and double clicking the script they gave you would actually run it if you installed python to execute with IDLE.
    He sends the script with the first lines as if he needs help with discord bot programming. The first few lines show up in discord but the rest wont thats how he tricked people into downloading and running it.
    EDIT: The script would send this information through a Discord Webhook to their discord server. Already reported it

  • @vittthevecc1390
    @vittthevecc1390 3 роки тому

    This seems very intresting. Can't wait to see it

  • @ajayk643
    @ajayk643 3 роки тому

    Thanks for this video sir

  • @cubernetes
    @cubernetes 3 роки тому +3

    25:09 leaked invalid ("unathorized") token

  • @JonSnyderfudge
    @JonSnyderfudge 3 роки тому

    Looked like that first sketchy website at 33:50 was a peertube instance. It was probably a community dedicated for malware videos.

  • @syrefaen
    @syrefaen 3 роки тому

    Oh its a fun series keep it up!

  • @acticfl
    @acticfl 3 роки тому

    I was thinking if i should like this video - then you pointed out your TLOZ shirt. You win

  • @picardftw1313
    @picardftw1313 3 роки тому

    yikes. .. follow up on what more you learn about this for sure lol.
    dropped a like. already subbed.

  • @MaksBrochu
    @MaksBrochu 3 роки тому +1

    54:55 I was kind of expecting a "it's bad mmmkay?"

  • @jonny-mp3
    @jonny-mp3 3 роки тому

    Hey John, love the Malware stuff. Would love to see some Dynamic Analysis with some ransomware or something , cheers

  • @buleini
    @buleini 3 роки тому

    YT buried my comment from 21 hours ago, but at 1:50- will it run? Yesterday I found I have two Python apps installed from the Windows apps store dating back to 2019. File handler was not enabled though

  • @dieSpinnt
    @dieSpinnt 3 роки тому

    Sometimes you make me really nervous, John.
    No, not the tokens, the clumsiness in the shell:P
    echo %LOCALAPPDATA% ... or cd %APPDATA% jFYI
    But never mind, thanks for the video :)

  • @a_commenter
    @a_commenter 3 роки тому

    35:05 The twitter account was contained in the pastebin before it was removed

  • @sentinalprime8838
    @sentinalprime8838 3 роки тому

    amazing content john

  • @DZ-lm4le
    @DZ-lm4le 3 роки тому

    you have a new sub
    keep it up.

  • @Jack-zr4kc
    @Jack-zr4kc 3 роки тому

    For the Browsers It takes The Tokens From Them, Because Some People Log into to them. Like you said :)

  • @colbyhartman9467
    @colbyhartman9467 Рік тому

    Hey never say your stupid you are smarter than I am 💯 on that iv learned more with you explaining what you are talking about so keep it up have a good day or night brother

    • @colbyhartman9467
      @colbyhartman9467 Рік тому

      And as a phone guy that watch your videos keep it up

  • @funguslars
    @funguslars 3 роки тому +10

    I love how the token stealer disguises as a token stealer 🤣

  • @Nahemii
    @Nahemii 3 роки тому

    Time to scream at you to continue to decode the javascript horror

  • @Zahid8080
    @Zahid8080 2 роки тому

    wow Ed Sheeran into malware xD
    Love from India vro

  • @hypedz1495
    @hypedz1495 2 роки тому

    ah yes.. john.. john hammond does it again.

  • @narayanyadav8591
    @narayanyadav8591 3 роки тому

    thank you posting a topic of choice.

  • @lucasedkins2095
    @lucasedkins2095 2 роки тому

    I liked at the Zelda shirt. Thanks!

  • @HomelessDeamon
    @HomelessDeamon 3 роки тому

    Yooo Hammond cool haircut 👌

  • @radomane
    @radomane 3 роки тому +2

    I'm pretty sure the password cache of Chrome etc. uses your Windows user creds to encrypt the passwords, so accessing them would at least require some user action.

    • @IkeVoodoo
      @IkeVoodoo 3 роки тому +1

      nope, Chrome uses window's CryptUnprotecData() if i remember correctly (i believe it is from windows.h file).

    • @radomane
      @radomane 3 роки тому +1

      Yeah nvm, as long as you are signed in you can call CryptUnprotecData, and dumping the passwords can easily be done in python, lol.

  • @vgarzareyna
    @vgarzareyna 3 роки тому

    John! Do the thing!

  • @buleini
    @buleini 3 роки тому +14

    Ok, seeing this premiere I think I can do two unfair bets right now. 1. Bet I'm subscribing here. 2. There's something malicious on my son's PC.

    • @IkeVoodoo
      @IkeVoodoo 3 роки тому

      Depends if he downloaded it...

  • @Carlosponceahora
    @Carlosponceahora 3 роки тому +1

    Ok John I stopped at second 0:36 as I have one question before I continue....What is the best Zelda game ?

  • @nanvinor
    @nanvinor 3 роки тому +1

    Do you prefer Virtual Box over Hyper-V manager or other softwares? And if you have some spare time, I would love to know the reason behind your choice of Virtualization software! Kind regards.

  • @mehmetedex
    @mehmetedex 3 роки тому

    I am entertained way more than watching LiveOverflow

  • @marckerkvliet2999
    @marckerkvliet2999 3 роки тому

    Great video!

  • @CardiffDrumAndBass
    @CardiffDrumAndBass 3 роки тому

    Pastebin actually deny Wayback Machine in their robots.txt file:
    User-agent: ia_archiver
    Disallow: /
    Shame - maybe Google webcache might work for finding deleted stuff since they disallow /raw but do allow the paste ID path

  • @EddiePenta
    @EddiePenta 3 роки тому

    I believe it is grabbing also grabbing Chrome, Opera and Brave tokens. The file structure generated by get_tokens seem to also work for those other directories listed