That 'hacker' at the start is 100% an Indian Microsoft support rep lmao. He knows jack shit about actual hacking, he's just rambling with well-known keywords
i never comment but hearing "scanned over 60,000 ports" had me dying, makes it sound like some labor intensive work. takes two seconds. Also found it funny how the "security" expert said someoen could get exact location from a IP address......
@@l1tch_ when he said, "exact", he really meant.... somewhere within a few counties away.... mine comes up showing 24 miles away.. I also was shaking my head when the dude is talking about scanning the 65000 ports... Thats the most basic thing someone can do...
As a certified penetration testing engineer (a legal hacker), this is one of the most hilarious videos I've seen. The process that the "hacker" is describing at 04:10 is referred to as "being a script kiddie." Essentially, anyone can take a bunch of scripts and commands that they do not understand, run them and hope for something to happen. Putting that aside, obtaining someone's IP address is largely insignificant in over 90% of cases. This is due to two reasons: CGNAT and closed ports. CGNAT is a situation where the ISP uses network address translation to map their clients' IP addresses, similar to what a home router does. As a result, multiple individuals share the same public IP address, and when someone tries to access it, they are actually accessing the ISP's router instead of the intended device. In most cases, people aren't even aware that they're behind a CGNAT. This is quite common due to the limited availability of IPv4 addresses, and the need to aggregate them using CGNAT. The second reason, closed ports, pertains to the majority of ISPs using firewalls that block HTTP/SSH/Telnet on the public interfaces of their clients' routers. This means that while the client and the ISP itself can access them, no one from the outside is permitted. This is also extremely common practice. Even in the unlikely scenario that your ISP does not block these ports and you are not behind CGNAT, if someone accessed your router, they would only be able to... change its settings, and that's assuming they would break the admin password or have an exploit for this particular software version. Seriously, they would only be able to view and change your wifi settings, disconnect you from the internet, change the admin / user password and so on. To access your LAN remotely, the router would need to have the option of creating a local VPN server, which most consumer-grade routers do not have. While it is possible to upload a different pre-configured firmware to the router which does have this option, such as OpenWRT, assuming it is supported by this particular router model, it is extremely dangerous as it would disconnect you from the internet and cause your public IP address to change in most cases. The small minority of individuals who have their own public IP addresses, use dynamic addressing, which means the public IP address changes after every reboot of the router. Finally, to end this rant, it is physically impossible to infect you with an email via Gmail's web interface without even opening it. This is Hollywood nonsense. It may be possible with an obscure email provider, or a local client like Thunderbird or Outlook, but not if you're using the web interface of a popular email service provider, i.e. like an overwhelming majority of people.
Gotta hate all these channels like this one and tekkitrealm who put in there videos complete bullshit like getting hacked by just receiving an email, or thinking that using a script that some one else made makes you a hacker 😂
@@somebody8986 Yeah, I honestly don't follow any of them and stumbled across this video accidentally - through YT's recommendations. At least they usually make it obvious at the very beginning, so we know which channels to avoid ;D
Yeah, I cringed pretty hard any time he was talking. Dude literally just did a scan with nmap lol. Sorry, Mr hummus, but this "hacker" is an absolute joke.
How common is CGNAT really? It's unheard of where I live. I would hate not being able to port forward whatever I want. It's such a basic thing that I've come to take for granted, it would be a complete deal breaker.
"I find scripts on the dark-web and replace the ip-address with your ip-address" Dude you were talking to a professional script-kiddie. Not to mention this dude only ran one script and was like "ah no open ports, your un-hackable bro"
@@Guna89420 to be fair "well stoles is better than poorly made" very much applies here, especially for you or anyone who wants to learn, looking at good sources and trying them out is a great way to learn. But don't call yourself a professional if all you do is copy and past some stuff without knowledge/ kust replacing the IP.
He'a a dumb f*k. You cannot use a damn IP to do anything. Best he can is to DDOs and scan for ports but what good is that when every router uses DYANAMIC IP. Fr I am angered by this video.
There’s a lot of misinformation in this. First, you do not need a vpn to access TOR (dark web), in fact it’s discouraged. Secondly, someone grabbing your IP does not mean anything! They cannot find vulnerabilities in your network or windows and the worst they can do is DDOS you and grab your approximate location (city and state). Plus, most IPs are dynamic, which means they switch automatically, so if someone grabs your IP, it’s likely to change the next day or two anyways! I like this guy’s content, but this is packed with misinformation.
You don't need to use a VPN but it really shouldn't be discouraged, while it does give another point that you could be theoretically penetrated from or have data leaked it is the least likely point, and accessing without could point all your traffic to one exit node, making it easier to identify you, whereas with multiple VPN servers it should make it harder for anyone to ever be sure they are even watching the same person if they are observing you from the exit node. I agree it is a bit silly in places but certainly using a VPN shouldn't be considered worse than not using one on the Dark Web, even if the reality is you likely won't be hacked either way, though it does matter which VPN you use as some are more complacent with security and data breaches than others, and some are more cooperative with "Government Agencies" than others are.
Well you can be hacked with just an IP but the victim would have to be running a program like a webserver with vulnerable code on it or a old version of a smb server, but normal people likely arent doing that, it takes effort to open a port and link the program to that port
@@eyephpmyadmin6988 yes, I’m just simplifying it for this channel’s audience, which I’m assuming most have not tampered with any network if they believe an IP can get them hacked. But yeah ur right.
The "hacker" is talking a load of bullshit with buzzwords, I bet he just created a Netflix account and logs into it "to prove he can hack people" and then claims he has no idea who it is...
Do you even know what brute forcing is aka cracking. I’ll give you a run down of how you do it you need a leacher then a word list and you need to know the email address provide you are looking to crack the accounts of you also need residential rotating proxy’s you also need a config to use with the leacher. The leacher uses the proxies and the config in combination with the word list to scan for accounts. don’t comment on stuff you know nothing about.
This guys channel is perfect Smart enough to know how to fuck around Dumb enough to find out Funny enough to share with everybody in an entertaining way
The hacker in the video is basically what’s called as ScriptKiddie I.e he’s too much reliable on scripts that he finds and then the rest is Luck. When you gave him your IP address, What he essentially did is something called as NMap port scan which is basically a network tool to check all open ports of a system associated with an IP address. While it’s true for the reconnaissance stage of the hack and also, here the IP address points to the mobile phone and mobile phones tend to have low open ports and also, if there are open ports, in majority of scenarios there won’t be a pre existing script that a “Script Kidde” can use and get away with it. Better find good hackers next time.
that virus program that you said you were worried about at the end. don't be because its just a really old program that i used almost 15 years ago to mess with the computers at my middle school. brought back alot of memories seeing that lol. . funny to see that the virus program survived that long and someone put it on the dark web.
I've heard some things about how "IP cannot be used to hack you" it CAN but you have to do some fanangling by doing things like port forwarding and other things, which you would have to intentionally enable (which is what im assuming this hacker was looking for)
A lot of this content is cashing in on the "dark web super scary" sentiment. One thing to bear in mind is that some devices can compromise networks without you even realizing. People don't understand what "port forwarding" is and assume it's an involved process. Sometimes it's as simple as ticking a box on a firmware install for your new NAS box. In general though, if you're a normal user with normal user things. There's very little risk involved with getting your IP leaked. The worst that might happen is DDoS, which can be solved relatively easily for most users. For larger companies or even people who work from home with more "advanced" network needs, there's for sure a risk of finding an exposed port to pivot into your network.
with an IP you can do a LOT.. remote hosting, download keyloggger steal victims info.. Geolocate adress with IP.. find info on who lives there, where they grew up , who they are related to..commonly used security questions for banking apps or most security questions are easily found on most peoples social media pages ( their dogs name , best friends name , what street they grew up on , mothers maiden name ) Linked in profiles. not to mention the malice one could cause with swatting attacks/ DDOS attacks if they wanted... )
@@jasoncalahaisen7224 Woah Woah Woah You absolutely cannot do most of these things with JUST an IP address. You cannot just remote host/sftp files onto someone's PC without a TON of setup on both ends, including pre-shared keys usually. This is not a situation where you just grab someone's IP and throw files at them. Geolocation is very broad, at most you'll get a state and maybe a city. Not enough information for anything. Maybe useful when tied to other DOX information, but only if your social media is poorly managed. And that's a different issue. You absolutely cannot SWAT someone based on an IP. I like that you're passionate about security, that's great and we need more people like that in the world. But leaking IPs is not a large data breach. if anything, the scariest thing Mr. Homeless did was leak a phone number. With SIM swapping you can pivot that into a massive breach (assuming it wasn't a burner for that explicit reason).
@@jasoncalahaisen7224 yes that however requires a lot of OSINT and only the most dedicated of hackers who will do dedicated attacks will go that for (I mean this in the realm of geolocating, using social media to find answers to security questions, and discovering large amounts of PII) also iirc keyloggers won't work purely off of IP, neither will stealing someones info unless you mean that this attacker is already on the network. remote hosting im pretty sure you also can't do to someone unless once again, they have things like port forwarding and other unsafe things enabled (which are usually by default disabled)
@@RoeyAA it can be ticking a box yes, but usually its behind a bunch of things that the average user will never access or even see in their lifetime use of a standard os like mac or windows which was my primary point
Yes, this exactly! The amount of misinformation in this is crazy. First, you DO NOT need a vpn for the dark web, in fact it’s discouraged. Everything is routed through TOR servers, so a vpn is a vulnerability. PLUS, IPs can’t be used to directly hack you! Most IPs are dynamic anyways which means they are switching by themselves, so if someone’s pulls your IP, your IP will not be the same IP tomorrow
Yeahhh, this video is very misleading lol. I can literally post my IP here, and the worst thing that would happen, is that I can get DDOS'ed. Also, there is a lot of wrong information in this video. You can not hack someone by just sending an email to a person. 🤣
@@relklarsen I guess that the mail thing is like a zero days that actually happened on iphone SMS's so basically similar type of vuln and about the IP i mean you can run port scanning on someone's network via their IP and find vuln that you can exploit
To put this straight, This Man Installs 100+ Viruses on his Computer, Makes a fridge a gadget, and went to the dark web and INSTANTLY regrets it I've got to say... You are one interesting person.
Couldn't watch past the 5 minute mark. This is an atrocious lack of information that really hurt me physically. So much false information that could've easily been filtered out by just simply asking or even hiring (as you're already going as far as paying) a penetration testing specialist. Heck, even someone with any minimal background in networking and software development can see from a mile away the amount of bogus claims that "hacker" made in just a few seconds. Every single sentence that came out of that guy's mouth is either 100% made up fiction from Hollywood or straight up admitting to literal copying and pasting stuff he finds online. Imagine getting paid for being a skid publicly for almost 650 thousand easily impressionable people that now will be even more fearful about navigating the internet. I really never say this type of stuff, but it was definitely the channel owner's responsibility to not share false information on his channel. So little could've made so much of a difference.... But the views!
Bottom line is if a real hacker wants to get your info and destroy you then it's very easy. But you have to give them a reason. There has to be files they want, money, secrets or something worth spending hours of time. I went down the rabbit hole and came to realization that anyone with a brain & free time can do things most of the public can't imagine. Movies/Games don't even begin to shine a light on the amount of vulnerabilities people leave open.
Pssst you don't really need a VPN on Tor. Unless you're paying for your VPN with something like XMR and you use completely fake info. You're not as secure as you think.
@@drcgaming4195 There is an attack that can be done on tor networks where if somebody owns a large amount of machines in the tor network, theres a chance that somebody could connect and get routed all through machines that they own. That would de anonymize you and show your actual IP to the person or group owning those machines. I usually use a VPN as well, just in the extremely rare possibility that happens. Then, they would have to try to get my actual IP from the VPN provider, which hopefully wouldn't give it up. but maybe im just paranoid for that lol
Ive been here since the beginning of siege and seeing your content expand and grow into some Michael Reeves shit is so insane, love it :) keep this up its very creative :D
as a CISSP CEH this video is super hilarious..just dramatic Hollywood script kiddie stuff. The "hacker" talking about copying dark web commands and swapping ips, then describing that he ran nmap and couldn't get in is just too much lol
I love how he puts his life at the deepest risks and seems fine and still jokes around lol! keep being awesome man! but just remember be careful! Things will get messy
It's possible, but you would have to have cooperation from their ISP (or have hacked them), since ISPs keep logs of which account is using what IP at what time.
Actually hacking is not a big thing. If you update the router, modem, windows, drivers nonstop, and you not opening ports randomly on your router and not using apps that is sketchy, you are 96% safe. 90% of the time, human stupidity lets the hackers inside the systems.
the ''custom neon sign'' in the background just gets me LOL. Like have a real sign which actually tells something, like your yt channel name. But no instead, you go for something that says what it is, ''custom neon sign''. LOL.
There's nearly no way that IP address (non-VPN use) matters unless you were running a server that had a vulnerability (ex. SMB exploit EternalBlue used in the famous WannaCry ransomware), or unless you cared about getting Denial-of-Serviced for a while (and couldn't readily get a new IP). There's generally no security risk at all, only a privacy risk; namely when it comes to governments knowing what you're doing (although they have other methods too, so it's not like a proxy/VPN makes a person private), or potentially certain commercial organizations like for pirated content, assuming that certain US ISPs are still forwarding client information to these companies.
Lmfao that so called "Most reputable hacker" is some dude who just learned to scan for ports with scripts. If he thinks scanning for open ports is enough to find vulnerabilities then this guy isnt qualified to be even a Network associate.
I am waiting for him to upload a video with the title being "I changed my wifi I changed my computers I moved to another country I got a new bank account I sold my house"
I recently got hacked. I lost so much. My windows/Microsoft account got deleted I lost most of important documents, my minecraft I've had since 2013. Lost my Genshin account that I've spent hundreds on. Had all my social media hacked. Had money stolen. Hopefully this can help me laugh about my situation.
I am a cyber sec student and I can tell you all that he says is just garbage with no sense. Also he mixed everything all he learnt to prove him a REAL HACKER
This whole video pisses me off, they found god damn script kiddies saying that using TOR without a VPN is bad, heads up ITS NOT in fact DONT USE VPNS FOR PRIVACY unless you know what you are doing, on TOR anyway you are routed between many nodes meaning that if effectively your own VPN or proxy network
I’m sorry but! You could technically definitely get Geo located with your IP (if) you are using wi-FI or wi-FI based router/access point 😅 Because if they all told you impossible then maybe I’ll be the only person who might connected the dots to figuring it out "in theory” because I never tested that out 😅
Mr. Homeless is literally every fear of Muta regarding dark-web personified
hahaha
i just checkd if its the best and even avast is better
Dude this made me fuckin laugh so fuckin hard
"OH NO THEY HAVE MY PUBLIC IP"
*unplugs router and plugs it back in*
"glad we dodged that bullet"
fr. This video is just crap.
😂
You implying that it will renew automatically with a different one?
@@thatdrh That was the joke, man. The OP obviously knows (hence the quotes and format) that internal IPs are different from public ISP IPs.
@@thatdrh That was the joke, man. The OP obviously knows (hence the quotes and format) that internal IPs are different from public ISP IPs.
That 'hacker' at the start is 100% an Indian Microsoft support rep lmao. He knows jack shit about actual hacking, he's just rambling with well-known keywords
i never comment but hearing "scanned over 60,000 ports" had me dying, makes it sound like some labor intensive work. takes two seconds. Also found it funny how the "security" expert said someoen could get exact location from a IP address......
@@l1tch_ general location but not exact lmao
@@somebody8986 and sometimes it’s just the location of where your ISP is
@@l1tch_ It is possible to get an exact address from an IP and im not talking about longitude and latitude
@@l1tch_ when he said, "exact", he really meant.... somewhere within a few counties away.... mine comes up showing 24 miles away.. I also was shaking my head when the dude is talking about scanning the 65000 ports... Thats the most basic thing someone can do...
As a certified penetration testing engineer (a legal hacker), this is one of the most hilarious videos I've seen. The process that the "hacker" is describing at 04:10 is referred to as "being a script kiddie." Essentially, anyone can take a bunch of scripts and commands that they do not understand, run them and hope for something to happen. Putting that aside, obtaining someone's IP address is largely insignificant in over 90% of cases. This is due to two reasons: CGNAT and closed ports. CGNAT is a situation where the ISP uses network address translation to map their clients' IP addresses, similar to what a home router does. As a result, multiple individuals share the same public IP address, and when someone tries to access it, they are actually accessing the ISP's router instead of the intended device. In most cases, people aren't even aware that they're behind a CGNAT. This is quite common due to the limited availability of IPv4 addresses, and the need to aggregate them using CGNAT. The second reason, closed ports, pertains to the majority of ISPs using firewalls that block HTTP/SSH/Telnet on the public interfaces of their clients' routers. This means that while the client and the ISP itself can access them, no one from the outside is permitted. This is also extremely common practice.
Even in the unlikely scenario that your ISP does not block these ports and you are not behind CGNAT, if someone accessed your router, they would only be able to... change its settings, and that's assuming they would break the admin password or have an exploit for this particular software version. Seriously, they would only be able to view and change your wifi settings, disconnect you from the internet, change the admin / user password and so on. To access your LAN remotely, the router would need to have the option of creating a local VPN server, which most consumer-grade routers do not have. While it is possible to upload a different pre-configured firmware to the router which does have this option, such as OpenWRT, assuming it is supported by this particular router model, it is extremely dangerous as it would disconnect you from the internet and cause your public IP address to change in most cases. The small minority of individuals who have their own public IP addresses, use dynamic addressing, which means the public IP address changes after every reboot of the router.
Finally, to end this rant, it is physically impossible to infect you with an email via Gmail's web interface without even opening it. This is Hollywood nonsense. It may be possible with an obscure email provider, or a local client like Thunderbird or Outlook, but not if you're using the web interface of a popular email service provider, i.e. like an overwhelming majority of people.
Gotta hate all these channels like this one and tekkitrealm who put in there videos complete bullshit like getting hacked by just receiving an email, or thinking that using a script that some one else made makes you a hacker 😂
@@somebody8986 Yeah, I honestly don't follow any of them and stumbled across this video accidentally - through YT's recommendations. At least they usually make it obvious at the very beginning, so we know which channels to avoid ;D
Yeah, I cringed pretty hard any time he was talking. Dude literally just did a scan with nmap lol. Sorry, Mr hummus, but this "hacker" is an absolute joke.
yeah, "if theres an exploit in the router" - big if there homie
How common is CGNAT really? It's unheard of where I live. I would hate not being able to port forward whatever I want. It's such a basic thing that I've come to take for granted, it would be a complete deal breaker.
Every video I saw today had VPN sponsor and now when it's finally relevant it's sponsored by food.
you cant even use Tor browser if you aren't using vpn
Probably because it's very unlikely to actually protect you, outside of making it a little harder to figure out your physical area.
This man is the definition of what schools say not to do and why those warnings exist
i like to think that all of this stuff started because of him modding on r6 and then he fell down the rabbit hole lmao
The whole thing has been a ploy to find a hacker capable of giving him the ultimate R6 hacks.
@@GetOffMyPhoneGoogle lmaooo i hope one day like his last video will be a video linking everything hes done back to being banned on siege
@@GetOffMyPhoneGoogle He just woke up one day and decided there's gonna be acog on the 416 again no matter the cost
trollwaffen BUF
@@jz7383 yes
You really should've paid a reputable company to do a pentest on yourself. It takes more than "I did a Nmap scan and done" just for hacking.
“I Paid A Hacker To Hack Me” Congrats, you've played yourself.
good job copying another comment dude
@Static The guy Based posted it 40 min ago, this guy 37 min ago, i will not reply anymore.
@@davidooow6678 sihehu
@@davidooow6678 Who asked tho?
uh, tha-that's the idea??
This hacker just reminds me of the con when they say your computer is infected, no threat unless you are dumb. Not a hacker.
Coincidence? Or something much worse? Part 3 coming soon 😱
Great video man glad to see your evolution from community controllers
yo what was the anti virus software i need to buy that shits
Free meals... i can just eat dirt
@@gospodinzvijer Frfr
this was an amazing video i've been waiting so long for it can't wait for ep 3
We all know real hackermen are legally obligated to say "I'm in" after pressing ENTER.
Therefore, this must be a double-agent hecker.
"I find scripts on the dark-web and replace the ip-address with your ip-address" Dude you were talking to a professional script-kiddie.
Not to mention this dude only ran one script and was like "ah no open ports, your un-hackable bro"
Agreed
I'm not knowledgable bout this stuff but am trying to learn. Even I had a hol up moment when the hacker said they just copy stuff.
@@Guna89420 to be fair "well stoles is better than poorly made" very much applies here, especially for you or anyone who wants to learn, looking at good sources and trying them out is a great way to learn.
But don't call yourself a professional if all you do is copy and past some stuff without knowledge/ kust replacing the IP.
I'm pretty sure his point was that anyone could hack someone using readily available code, not that that was the method he used.
@@Guna89420 This is what most hackers do and is why you never want to be the lowest hanging fruit.
you found what we call a "script kiddy"
He'a a dumb f*k. You cannot use a damn IP to do anything. Best he can is to DDOs and scan for ports but what good is that when every router uses DYANAMIC IP. Fr I am angered by this video.
Yeah, as far as he did so far, it was just scanning for open ports, which from a mobile hotspot wouldn't be allowed or work anyway.
@@WindowsDaily The way I remember you need to be on the network to scan for ports. Dumb shit anyways.
A what
lol I haven't heard that term in a long time 😂😂😂
There’s a lot of misinformation in this. First, you do not need a vpn to access TOR (dark web), in fact it’s discouraged. Secondly, someone grabbing your IP does not mean anything! They cannot find vulnerabilities in your network or windows and the worst they can do is DDOS you and grab your approximate location (city and state). Plus, most IPs are dynamic, which means they switch automatically, so if someone grabs your IP, it’s likely to change the next day or two anyways! I like this guy’s content, but this is packed with misinformation.
Thanks for the info, I find it all interesting either way
You don't need to use a VPN but it really shouldn't be discouraged, while it does give another point that you could be theoretically penetrated from or have data leaked it is the least likely point, and accessing without could point all your traffic to one exit node, making it easier to identify you, whereas with multiple VPN servers it should make it harder for anyone to ever be sure they are even watching the same person if they are observing you from the exit node.
I agree it is a bit silly in places but certainly using a VPN shouldn't be considered worse than not using one on the Dark Web, even if the reality is you likely won't be hacked either way, though it does matter which VPN you use as some are more complacent with security and data breaches than others, and some are more cooperative with "Government Agencies" than others are.
Well you can be hacked with just an IP but the victim would have to be running a program like a webserver with vulnerable code on it or a old version of a smb server, but normal people likely arent doing that, it takes effort to open a port and link the program to that port
@@eyephpmyadmin6988 yes, I’m just simplifying it for this channel’s audience, which I’m assuming most have not tampered with any network if they believe an IP can get them hacked. But yeah ur right.
Why is it discouraged to use a vpn on dark web?
Loved the Kitboga feature! Homie is a force of nature when it comes to pissing scammers off
man this whole video is a nightmare. can’t wait to see how this concludes
0 replies???? It’s been 2 days
Hi Crypto NWO! I used to watch your videos few years ago
omg crypto ! i hope ur videos get sponsers soon, u deserve it :)
The "hacker" is talking a load of bullshit with buzzwords, I bet he just created a Netflix account and logs into it "to prove he can hack people" and then claims he has no idea who it is...
Do you even know what brute forcing is aka cracking. I’ll give you a run down of how you do it you need a leacher then a word list and you need to know the email address provide you are looking to crack the accounts of you also need residential rotating proxy’s you also need a config to use with the leacher. The leacher uses the proxies and the config in combination with the word list to scan for accounts. don’t comment on stuff you know nothing about.
This guys channel is perfect
Smart enough to know how to fuck around
Dumb enough to find out
Funny enough to share with everybody in an entertaining way
The hacker in the video is basically what’s called as ScriptKiddie I.e he’s too much reliable on scripts that he finds and then the rest is Luck. When you gave him your IP address, What he essentially did is something called as NMap port scan which is basically a network tool to check all open ports of a system associated with an IP address. While it’s true for the reconnaissance stage of the hack and also, here the IP address points to the mobile phone and mobile phones tend to have low open ports and also, if there are open ports, in majority of scenarios there won’t be a pre existing script that a “Script Kidde” can use and get away with it. Better find good hackers next time.
Or maybe not some "hacker" from the darkweb, but someone who works in cyber security and knows his stuff xD
It’s a script kitty not kidde 😐
@@uncanny4038 no it ain't
@@uncanny4038purr
that virus program that you said you were worried about at the end. don't be because its just a really old program that i used almost 15 years ago to mess with the computers at my middle school. brought back alot of memories seeing that lol. . funny to see that the virus program survived that long and someone put it on the dark web.
well... it could be a modified version.
I've heard some things about how "IP cannot be used to hack you" it CAN but you have to do some fanangling by doing things like port forwarding and other things, which you would have to intentionally enable (which is what im assuming this hacker was looking for)
A lot of this content is cashing in on the "dark web super scary" sentiment. One thing to bear in mind is that some devices can compromise networks without you even realizing. People don't understand what "port forwarding" is and assume it's an involved process. Sometimes it's as simple as ticking a box on a firmware install for your new NAS box.
In general though, if you're a normal user with normal user things. There's very little risk involved with getting your IP leaked. The worst that might happen is DDoS, which can be solved relatively easily for most users.
For larger companies or even people who work from home with more "advanced" network needs, there's for sure a risk of finding an exposed port to pivot into your network.
with an IP you can do a LOT.. remote hosting, download keyloggger steal victims info.. Geolocate adress with IP.. find info on who lives there, where they grew up , who they are related to..commonly used security questions for banking apps or most security questions are easily found on most peoples social media pages ( their dogs name , best friends name , what street they grew up on , mothers maiden name ) Linked in profiles.
not to mention the malice one could cause with swatting attacks/ DDOS attacks if they wanted...
)
@@jasoncalahaisen7224 Woah Woah Woah
You absolutely cannot do most of these things with JUST an IP address.
You cannot just remote host/sftp files onto someone's PC without a TON of setup on both ends, including pre-shared keys usually. This is not a situation where you just grab someone's IP and throw files at them.
Geolocation is very broad, at most you'll get a state and maybe a city. Not enough information for anything. Maybe useful when tied to other DOX information, but only if your social media is poorly managed. And that's a different issue.
You absolutely cannot SWAT someone based on an IP.
I like that you're passionate about security, that's great and we need more people like that in the world. But leaking IPs is not a large data breach.
if anything, the scariest thing Mr. Homeless did was leak a phone number. With SIM swapping you can pivot that into a massive breach (assuming it wasn't a burner for that explicit reason).
@@jasoncalahaisen7224 yes that however requires a lot of OSINT and only the most dedicated of hackers who will do dedicated attacks will go that for (I mean this in the realm of geolocating, using social media to find answers to security questions, and discovering large amounts of PII) also iirc keyloggers won't work purely off of IP, neither will stealing someones info unless you mean that this attacker is already on the network. remote hosting im pretty sure you also can't do to someone unless once again, they have things like port forwarding and other unsafe things enabled (which are usually by default disabled)
@@RoeyAA it can be ticking a box yes, but usually its behind a bunch of things that the average user will never access or even see in their lifetime use of a standard os like mac or windows which was my primary point
He lied to you about a lot of things lmaooo. They need more than just your ip address to get into your network.
Yes, this exactly! The amount of misinformation in this is crazy. First, you DO NOT need a vpn for the dark web, in fact it’s discouraged. Everything is routed through TOR servers, so a vpn is a vulnerability. PLUS, IPs can’t be used to directly hack you! Most IPs are dynamic anyways which means they are switching by themselves, so if someone’s pulls your IP, your IP will not be the same IP tomorrow
Yeahhh, this video is very misleading lol. I can literally post my IP here, and the worst thing that would happen, is that I can get DDOS'ed. Also, there is a lot of wrong information in this video. You can not hack someone by just sending an email to a person. 🤣
@@relklarsen yep!
@@relklarsen I guess that the mail thing is like a zero days that actually happened on iphone SMS's so basically similar type of vuln and about the IP i mean you can run port scanning on someone's network via their IP and find vuln that you can exploit
@AAAA yeah, he doesn’t lmao
there's a point you just have to throw that laptop out for national security sake
I watched this man go from perfectly sane to being the literal definition of insanity
I’m a Junior in college right now majoring in Cybersecurity. I’ve wanted to drop out so many times. your videos have inspired me to learn all I can!
thank you
Heard the salary is good later on
I always love Muta appearances on other channels, a small crossover event is still a crossover event
Hiring a hacker to find vulnerabilities in your system is like hiring a robber to see if you're house can be robbed, which is surprisingly effective
weeee, your hacker knows how to do a portscan, big fckn deal.
I may be getting hacked but this seems like a great time to sponsor Hello Fresh
Average day for basically homeless: ah yes let's pay someone to hack me
Jesus I started watching this guy YEAAARS ago like 2017 and now bro is married with a child and I still live with my mom
Where the bloody hell is part 3 man
That one FBI agent watching this: 👁👄👁
Funny how Muta is actually the only one that knows what he's talking about. Not even that "Cloud Security Engineer" guy.
"Im currently inside of a FBI safe house hiding from hackers - Dark Web Pt.10"
To put this straight, This Man Installs 100+ Viruses on his Computer, Makes a fridge a gadget, and went to the dark web and INSTANTLY regrets it I've got to say... You are one interesting person.
Thank you for risking possibly everything for the sake of entertaining us. You’re amazing 😂
best crossover episode, some ordinary gamers and basically homeless
Couldn't watch past the 5 minute mark.
This is an atrocious lack of information that really hurt me physically.
So much false information that could've easily been filtered out by just simply asking or even hiring (as you're already going as far as paying) a penetration testing specialist. Heck, even someone with any minimal background in networking and software development can see from a mile away the amount of bogus claims that "hacker" made in just a few seconds.
Every single sentence that came out of that guy's mouth is either 100% made up fiction from Hollywood or straight up admitting to literal copying and pasting stuff he finds online.
Imagine getting paid for being a skid publicly for almost 650 thousand easily impressionable people that now will be even more fearful about navigating the internet.
I really never say this type of stuff, but it was definitely the channel owner's responsibility to not share false information on his channel. So little could've made so much of a difference.... But the views!
This guy is more of a script kiddie, NOT a hacker.
You definitely gave him everything by downloading his antivirus lol. He now has all your files
Hacker - runs nmap scan
Basicly Homeless- Woahhh
I am just laughing watching a skid and a person using intense music to pretend like "wow guys i am going to get hacked what a cool hacker"
Isn’t this what hackers do anyways? Expect without your consent.
“If I gave you my IP address, what could you do?” Depends. How bad did you piss me off lol
Homeless and Muta should make a series together because his entire job is cyber security
“Was it maybe 10,000 viruses” took me out this dude is really the most wreckless man on the internet 🤣
Give my man a Netflix series already
Whenever I see this, I remember the story of a mad man in a psychiatric hospital who kept tapping and tapping and tapping to ...see more
I absolutely love how all my favorite RUclipsrs are coming together on projects.
🤡🤡🤡
the fact that this isnt sponsored by a vpn is incredible
“I Paid A Hacker To Hack Me” Congrats mate, you just played yourself.
This video ain’t sponsored by a vpn it’s sponsored by hello fresh because that’s what you need to stay safe on the dark web😂😂
Bottom line is if a real hacker wants to get your info and destroy you then it's very easy. But you have to give them a reason. There has to be files they want, money, secrets or something worth spending hours of time. I went down the rabbit hole and came to realization that anyone with a brain & free time can do things most of the public can't imagine. Movies/Games don't even begin to shine a light on the amount of vulnerabilities people leave open.
Whats the name of some vulnerabilities ?
Pssst you don't really need a VPN on Tor. Unless you're paying for your VPN with something like XMR and you use completely fake info. You're not as secure as you think.
A VPN should have no effect on TOR, since it pretty much is a VPN itself
this is exactly what i was thinking
tor already reroutes traffic through multiple places, so why would you use another vpn???
@@drcgaming4195 There is an attack that can be done on tor networks where if somebody owns a large amount of machines in the tor network, theres a chance that somebody could connect and get routed all through machines that they own. That would de anonymize you and show your actual IP to the person or group owning those machines. I usually use a VPN as well, just in the extremely rare possibility that happens. Then, they would have to try to get my actual IP from the VPN provider, which hopefully wouldn't give it up.
but maybe im just paranoid for that lol
BRUH man knows how to make cliffhangers better than TV series writers in 12 minutes
Bro has kids he used no VPN. He's lucky he ain't dead and his family.
Ive been here since the beginning of siege and seeing your content expand and grow into some Michael Reeves shit is so insane, love it :) keep this up its very creative :D
cant believe he did all this just to scam hellofresh out of some free meals for his family
as a CISSP CEH this video is super hilarious..just dramatic Hollywood script kiddie stuff. The "hacker" talking about copying dark web commands and swapping ips, then describing that he ran nmap and couldn't get in is just too much lol
love the ending, he was so nice to let you use his antivirus software :p
I love how he puts his life at the deepest risks and seems fine and still jokes around lol!
keep being awesome man! but just remember be careful! Things will get messy
So much teasing ! We need the next uploaf !
Basically Homeless and Kitboga chatting is elite
you cannot geolocate ips precisely. itll only give you the approximate location of the address(like a city/region)
It's possible, but you would have to have cooperation from their ISP (or have hacked them), since ISPs keep logs of which account is using what IP at what time.
This is the first time I have ever seen a RUclipsr make a sponsor worth watching.
Either kitboga is the luckiest man in the world or his social security number is just a coincidence
Me :my IP address will not be exposed hacker: steals my IP address in two seconds.
Am I the only one who noticed the audio is COMPLETELY desynced from the video??? Like minutes off lol
yh
Yeah it's the same for me too. Like someone tried to edit out the hellofresh ad but cut the audio and not the video
yess I thought my computer was damaged or bugged but thank God its not.
I gave away my ip address to a hacker.
5 minutes later...
This video is sponsored by hellofresh!
this feels like a netflix documentary
You cannot even call a virtual machine totally safe, a potential vulnerability in your VM can cause your main system to be owned
Actually hacking is not a big thing.
If you update the router, modem, windows, drivers nonstop, and you not opening ports randomly on your router and not using apps that is sketchy, you are 96% safe.
90% of the time, human stupidity lets the hackers inside the systems.
As is usually: 99% social engineering, 1% hacking
the ''custom neon sign'' in the background just gets me LOL. Like have a real sign which actually tells something, like your yt channel name. But no instead, you go for something that says what it is, ''custom neon sign''. LOL.
Great now we get to wait 4 more months for part 3. Then 4 more for part 4 and then 4 more for part 5... We might maybe finish this series before 2025.
Hell yeah
Its been 7 months and still no conclusion.
There's nearly no way that IP address (non-VPN use) matters unless you were running a server that had a vulnerability (ex. SMB exploit EternalBlue used in the famous WannaCry ransomware), or unless you cared about getting Denial-of-Serviced for a while (and couldn't readily get a new IP). There's generally no security risk at all, only a privacy risk; namely when it comes to governments knowing what you're doing (although they have other methods too, so it's not like a proxy/VPN makes a person private), or potentially certain commercial organizations like for pirated content, assuming that certain US ISPs are still forwarding client information to these companies.
Dude used to play siege with some fruits.
Congrats, anyway.
im honestly surprised that this guys youtube channel is still being operated by him and not taken over
Terrifying intro and then suddenly, "This video is sponsored by Hello Fresh" 😂
Lmfao that so called "Most reputable hacker" is some dude who just learned to scan for ports with scripts.
If he thinks scanning for open ports is enough to find vulnerabilities then this guy isnt qualified to be even a Network associate.
I am waiting for him to upload a video with the title being "I changed my wifi I changed my computers I moved to another country I got a new bank account I sold my house"
This is a great channel. Glad I stumbled upon it
I recently got hacked. I lost so much. My windows/Microsoft account got deleted I lost most of important documents, my minecraft I've had since 2013. Lost my Genshin account that I've spent hundreds on. Had all my social media hacked. Had money stolen. Hopefully this can help me laugh about my situation.
That link is not a part2
- "I scanned 65535 ports"
- uses kali linux
And you paid him 💀💀💀💀💀
I feel like I’ve been waiting so long for this and it’s finally happening 😭😭💕 I’m so pumped
Basically Homeless, It would be cool if you could make a computer powered on aa batteries.
Not gonna lie. I want this man to be my dad, and idk why it took me a month to finally realize it.
I am a cyber sec student and I can tell you all that he says is just garbage with no sense. Also he mixed everything all he learnt to prove him a REAL HACKER
for someone not exactly security wise you did really good for the most part
"Yo, basically homeless?"
"Yeah, whassup?"
mutahar definitely knows a lot about all this stuff. he definitely knows about security, thats for sure. its awesome you brought him on here.
nah not really
@@sa1t938 lol
2:29 “I hate grocery shopping” online shopping: am I a joke to you?
cant wait to wait another 5 months for the next part
How did a random Siege youtuber turn into this genius? Solid uploaf yet again.
His main content is web security now
This whole video pisses me off, they found god damn script kiddies saying that using TOR without a VPN is bad, heads up ITS NOT in fact DONT USE VPNS FOR PRIVACY unless you know what you are doing, on TOR anyway you are routed between many nodes meaning that if effectively your own VPN or proxy network
Facts
I’m sorry but!
You could technically definitely get Geo located with your IP (if) you are using wi-FI or wi-FI based router/access point 😅
Because if they all told you impossible then maybe I’ll be the only person who might connected the dots to figuring it out "in theory” because I never tested that out 😅
You know its a good day when basically homeless posts