10 Levels of Password Hacking

Поделиться
HTML-код
  • Опубликовано: 15 ноя 2024

Комментарии • 513

  • @Ardens.
    @Ardens.  5 месяцев назад +93

    To try everything Brilliant has to offer-free-for a full 30 days, visit brilliant.org/Ardens/ . You’ll also get 20% off an annual premium subscription.

    • @RameshKumarPkeezhara
      @RameshKumarPkeezhara 5 месяцев назад +1

      first 🤓🤓🤓

    • @number1-willstetsonsimp
      @number1-willstetsonsimp 5 месяцев назад +7

      brilliant stop sponsoring every fucking youtube video i watch

    • @tinpotgaming
      @tinpotgaming 5 месяцев назад +1

      @@number1-willstetsonsimp you're not the only one

    • @Torger726
      @Torger726 5 месяцев назад

      One thing quantum computers are millions of times faster then regular computers and this is early quantum computers so in the future they could be much much faster so a brute force will go from taking 20 years to 2 seconds (yes they are that fast)

    • @dwyl183
      @dwyl183 4 месяца назад

      @@Torger726 hi n

  • @mineyoucraftube1768
    @mineyoucraftube1768 4 месяца назад +689

    you forgot the "call the person and openly ask for their password" it works more often than some would think...

    • @starplane1239
      @starplane1239 4 месяца назад +109

      "Hey its me, your (insert family or associate). I meant put some money onto (account) for you. Whats the password again?"
      Hearing that with no expectations of an attack or when you are stressed/very busy is all it takes for you to speak before you think.

    • @Okuu__Gaming_1
      @Okuu__Gaming_1 4 месяца назад

      Idk man, fairly sure I'd notice if my dead father called me.​@@starplane1239

    • @eestaashottentotti2242
      @eestaashottentotti2242 4 месяца назад +6

      So. What is your password?

    • @Okuu__Gaming_1
      @Okuu__Gaming_1 4 месяца назад +28

      Bold of you to assume I know my password

    • @andrewscruggs5906
      @andrewscruggs5906 4 месяца назад +10

      Especially now that PayPal, SoFi, etc are all using these third parties that just ask for your BANK PASSWORD to be able to transfer money from bank to their accounts, basically normalizing this behavior and calling it "secure"

  • @nabra97
    @nabra97 5 месяцев назад +475

    "Dumpster diving attack has something to do with retrieving passwords from the cache or something, right? Oh, it's literal dumpster diving. Nevermind"

  • @King_of_Clovers
    @King_of_Clovers 4 месяца назад +1146

    Level 11: Typing a bunch of stuff without touching the touch pad or mouse and then muttering "I'm in."
    Works every time.

    • @MRFRIMPLETONgaming
      @MRFRIMPLETONgaming 4 месяца назад +32

      thats why i use it all the time

    • @cameleon2mur80
      @cameleon2mur80 4 месяца назад +21

      you know that you can navigate a web page with only the keyboard and when filling in multiple things it's way faster then reaching for a mouse or touchpad so it's not bullshit if it's like they guessed the things with hints though in reality the dude probably just going to run a shortcut so they're just going to be using the mouse

    • @gemstonepuppet
      @gemstonepuppet 4 месяца назад +4

      @@cameleon2mur80yapping

    • @limeylime8027
      @limeylime8027 3 месяца назад +1

      Bro on some penguins of Madagascar ass shit

    • @Fluffernater
      @Fluffernater 3 месяца назад +1

      ​@@gemstonepuppetcrying

  • @EpicMiniMeatwad
    @EpicMiniMeatwad 5 месяцев назад +1022

    The most powerful technique of all: Social engineering.
    Can have the tightest security in the world, but a man's lips is the loosest.

    • @averagejoey2000
      @averagejoey2000 5 месяцев назад +61

      but what about a woman's lips?

    • @artzified
      @artzified 5 месяцев назад +27

      ​@@averagejoey2000bad down

    • @kylesnotepic
      @kylesnotepic 4 месяца назад +11

      isnt social engineering almost the same as phishing?

    • @lone.faerie
      @lone.faerie 4 месяца назад +59

      ​@@kylesnotepic Phishing is a form of social engineering

    • @Aaa-vp6ug
      @Aaa-vp6ug 4 месяца назад +1

      @@averagejoey2000same as a man of similar demographics

  • @agranero6
    @agranero6 5 месяцев назад +286

    Dumpster diving worked ... in the 60s and 70s. My University printed the new users passwords on a shared printer accessible to all professors and post graduates. The sheet got there until someone get to claim it allowing a lot of time for anyone to copy it.

    • @neoleonor7140
      @neoleonor7140 Месяц назад +2

      Aren't there no computers in the 60s or 70s

    • @iexist_nt
      @iexist_nt Месяц назад

      ​@@neoleonor7140there were, but very basic

    • @BentleyGaming-roblox
      @BentleyGaming-roblox Месяц назад +3

      ​@neoleonor7140 there was in 1962 I think
      Before 1962 we only used PCs for Rockets and shi-

    • @agranero6
      @agranero6 Месяц назад

      ​@@neoleonor7140 Off course there were: IBM 360 was launched in 1964, PDP 11 was launched in 1970, Centurion in 1964. Even microcomputers: Sphere was from 1975.

    • @agranero6
      @agranero6 Месяц назад +1

      @@BentleyGaming-roblox But there were mainframes: PDP-1 was from 1959, IBM 360 was from 1962. In my University they used a PDP-11 to control the particle accelerators (a Pelletron and a LINAC yeah old stuff) since the 70s.

  • @Dragongaga
    @Dragongaga 5 месяцев назад +172

    As a sidenote, it's much more efficient to make a password longer, than to add special characters, as the amount of possible passwords is the number of allowed characters to the power of the amount of positions. So simply making a passworld longer increases cracking time exponentially, while forcing the user to use a special character increases the time linearly and also makes the password much harder to remember

    • @krkngd-wn6xj
      @krkngd-wn6xj 4 месяца назад +31

      This assumes a brute force attack. Dictionary attacks don't care that much about it.

    • @DeepFleeceheart
      @DeepFleeceheart 4 месяца назад +21

      When i rented from a friend of mine who was paranoid about his cyber security, his wifi pasword was literally 100 characters long...which required him to keep it in a digital document he messaged to me to copy and paste....completely obviating the point of such a long password

    • @Mysteri0usChannel
      @Mysteri0usChannel 4 месяца назад +14

      The safest password I ever used was a three verse poem. Easy to remember because it rhymes and insanely long.

    • @AkiraTheCatgirl0
      @AkiraTheCatgirl0 4 месяца назад +13

      If anyone's curious, I did some math:
      There's 52 possible letters you can use (26 lowercase and 26 uppercase) and 42 numbers/symbols. If you have an 8 character password with just letters, then you have 52^8, or 5.3×10^13 possible combinations. With special characters and numbers, you'd then have 84^8, or 2.5×10^15 combinations. Adding a ninth character to a password with only letters brings the possibilities to 2.8×10^15, about 12% more than making a character special.
      Say we have the same 8 character password, but a number and special character are required. Most people would only put one of each in their password, so a hacker might reasonably assume this. Interestingly, the password is not much better, with a total of 10*32*52^6*8*7, or 3.5×10^14 passwords possible. This is an increase of 663%, whereas adding a 9th letter increases the number by 5,200%, and assuming any character could be anything increases by 4,637%. This last scenario typically only happens if someone has a password manager.

    • @Dragongaga
      @Dragongaga 4 месяца назад +2

      @@AkiraTheCatgirl0 kudos to you for actually crunching the numbers

  • @yazan12090
    @yazan12090 5 месяцев назад +402

    That condom analogy caught me off guard lmaooo

    • @Echani3007
      @Echani3007 5 месяцев назад +13

      On a cyber security video, why does this not surprise me…

    • @kwameappiahkumi5833
      @kwameappiahkumi5833 5 месяцев назад +8

      So true, imagine watching the video in public and with no headphones

    • @nabra97
      @nabra97 5 месяцев назад

      I mean, condoms prevent you from receiving malicious (viruses) or just unwanted in a particular case (sperm) genetic data, which is not far from cybersecurity

    • @MintBunHunter
      @MintBunHunter 5 месяцев назад

      ​@@kwameappiahkumi5833 no living soul should ever watch any videos in public

    • @Blitzedzz
      @Blitzedzz 4 месяца назад +1

      Lmaol!!!!!

  • @cameleon2mur80
    @cameleon2mur80 4 месяца назад +182

    so many people got into my alt account to dox me that they can't even dox me anymore because there's 200 devices all in different places

    • @actuallyasriel
      @actuallyasriel 4 месяца назад +16

      That's pretty funny NGL

    • @cameleon2mur80
      @cameleon2mur80 4 месяца назад +64

      @@actuallyasriel if you think that is funny you haven't seen my sandbox the viruses are breaking each other by infecting the other viruses

    • @timmy2670
      @timmy2670 4 месяца назад

      @@cameleon2mur80
      *Natural selection*

    • @queengames8421
      @queengames8421 4 месяца назад +90

      @@cameleon2mur80 Bro that's not a sandbox that's a petri dish

    • @cameleon2mur80
      @cameleon2mur80 4 месяца назад +25

      yo i got a biologist and a historian in the comments lets go

  • @updated_autopsy_report
    @updated_autopsy_report 5 месяцев назад +54

    number 1 lesson in cybersecurity, you are always the vunerability. called the phishing attack one right off the bat

    • @Beanzops
      @Beanzops 2 месяца назад +1

      Did you update the report?

  • @megamanstarforce4315
    @megamanstarforce4315 4 месяца назад +43

    Level 11: Rule based attack
    Basically a dictionary attack, however, an attacker has a list of predefined rules such as "replace the letter a with @" or "add a number to the end to the password" or "capitalise the first letter". These are useful for working with those pesky password policies. Although these attacks can still take a long time depending on the target

    • @megamanstarforce4315
      @megamanstarforce4315 4 месяца назад +11

      Level 12: Password spraying attacks
      A lot of services will block you if you attempt to try to log into a person's account too many times. Hence, attackers will only try 2-3 common passwords per an account before trying the next one. This is really good if you have hundreds of known or easily guessable accounts

  • @Szzyzzzy
    @Szzyzzzy 5 месяцев назад +173

    8:11 unexpect user on your family plan💀

  • @Arceus3251
    @Arceus3251 4 месяца назад +83

    "I know jackshit about cyber security"
    I hold a degree in cyber security. This is significantly more than "jackshit"
    Very informative, cheers!

    • @dubbyplays
      @dubbyplays 4 месяца назад +4

      If anyone knew as much as he said here, people's secuirty would be way safer and have a better life

    • @Arceus3251
      @Arceus3251 4 месяца назад +6

      @@dubbyplays It'd put me out of a job, though

    • @Omio9999
      @Omio9999 4 месяца назад

      @@Arceus3251 I wouldn't be so sure - social engineering tactics are a tactic anyone in security-focal roles can absolutely capitalize on, and from there, you have an effective attack vector.
      Human error is notably the most likely breach of security, and when you compare "human stupidity" versus "the size of the universe", you will find the former _vastly more infinite._

  • @bushhawk5460
    @bushhawk5460 Месяц назад +3

    Here's one insanely impractical one:
    Using CPU vulnerabilities like Meltdown, a threat actor can probe a locked machine and try a password character by character. Since the CPU has already loaded the correct passwort into memory, the actor can see if the character is correct, based on how long the response takes. A correct character gets a slightly slower response, at which point the actor can start trying the next character until the whole password is know.

  • @NighstarLayla
    @NighstarLayla 4 месяца назад +37

    I like to imagine that Shitbird is used for Twitter

  • @alekseyp.9124
    @alekseyp.9124 4 месяца назад +27

    The real twist is that this video was not sponsored by a VPN or a password manager.

  • @andrewpinedo1883
    @andrewpinedo1883 5 месяцев назад +40

    6:05 Huh, I'd like to see at least ONE reference to the term 'adversary in the middle attack' actually being used. I've always heard MITM or on-path attack.

  • @bloswi
    @bloswi 4 месяца назад +8

    3:59 Imagine having that exact password and it randomly showing up here

  • @danwl9708
    @danwl9708 5 месяцев назад +62

    Don’t delete the data in the drive, format the drive instead so that data recovery tools can’t even detect the file even existed. Don’t use ‘quick’ format options as that doesn’t override data that was on the drive in the first place.
    Deleting and removing data have very different meanings. Deleting removed the symbolic link to the file (so programs like RecycleBin can detect the file and restore the contents in the exact same directory of where the file was deleted), erasing it makes any data unreadable.

    • @Amplifimusic
      @Amplifimusic 5 месяцев назад +10

      there's tools that overwrite drives with random bit values and then format to totally shred any residual data as I think some filesystems can retain a cache or something

    • @greensheen8759
      @greensheen8759 5 месяцев назад +5

      Formatting doesn't affect the data, it's still visible to recovery tools. You need to overwrite it as well or use full disk encryption

    • @svyetochka
      @svyetochka 5 месяцев назад +13

      Can i physicaly burn it

    • @kaiduwu
      @kaiduwu 5 месяцев назад +12

      ​@@svyetochkaum I'm sure that'd work as long as you do significant damage

    • @omnitroph1501
      @omnitroph1501 4 месяца назад +9

      @@svyetochka Yes. This is significantly more effective than any software-based solution.

  • @JamesTDG
    @JamesTDG 4 месяца назад +5

    Fun fact: if you memorize alt codes, you can generate a secure numeric string using more fancy ASCII characters. I actually hide a couple of these characters in my passwords just because I can, and it's fun hearing blackmailers get confused when an old account finally gets breached. Just make sure you use alt codes you can easily remember, like 256, 69, or 42.
    I'm not on my computer RN, so I can't demonstrate what these examples would be, but if you're crazy enough, you can have a password that uses only alt codes, and I'm considering integrating it as part of the arg handbook

    • @mineyoucraftube1768
      @mineyoucraftube1768 4 месяца назад

      @@JamesTDG 204 and similar are fun too, along with emojis, just make sure you don't need that account on other devices because emojis can be hard to match sometimes

  • @hamzamotara4304
    @hamzamotara4304 5 месяцев назад +16

    Having the password at 4:04 was either brilliant or accidental but I love it either way.

    • @The_Dr_Fate
      @The_Dr_Fate 4 месяца назад

      what password? i didnt notice any other paswords except k_O8v3

  • @pentasquare
    @pentasquare 5 месяцев назад +772

    Man in the middle rolls better on the tongue. I'll keep using it or else also rename hangman to hangperson

    • @CuppzGeo
      @CuppzGeo 5 месяцев назад +44

      no hangman is more iconic

    • @sleepynova4840
      @sleepynova4840 5 месяцев назад +15

      its a joke....

    • @silvunar
      @silvunar 5 месяцев назад

      transwomen are holding up our infrastructure so they had to change it smh

    • @gollossalkitty
      @gollossalkitty 5 месяцев назад +1

      But he did use it....

    • @LowQualityShitposts
      @LowQualityShitposts 5 месяцев назад +15

      lol let’s play a game of hangperson

  • @Lampe2020
    @Lampe2020 5 месяцев назад +55

    7:29 Okay, that one was unexpected!

    • @brawldude2656
      @brawldude2656 5 месяцев назад +11

      just under 1234567 and above 1234567890
      **visible confusion**

  • @FsFs3mk-u9n
    @FsFs3mk-u9n 5 месяцев назад +109

    6:13
    *That one illegal hacker woman that was offended by the name be like*

    • @jaceyjohnson8922
      @jaceyjohnson8922 5 месяцев назад +10

      The fuck are you talking about

    • @gabrielarrhenius6252
      @gabrielarrhenius6252 5 месяцев назад +28

      @@jaceyjohnson8922 man-in-the-middle > adversary-in-the-middle... Like who cares that it is "man" in this case, it is man as in human and not man

    • @yagomizuma2275
      @yagomizuma2275 5 месяцев назад +1

      The scrungle

    • @CCheukKa
      @CCheukKa 5 месяцев назад +6

      ​@@gabrielarrhenius6252I think you mean huperson

    • @macchiato_1881
      @macchiato_1881 5 месяцев назад

      @@jaceyjohnson8922 are you stupid or something

  • @infinity_squared1
    @infinity_squared1 4 месяца назад +9

    2:45 might as well worry about your vrginity getting stolen too

  • @larrytale3401
    @larrytale3401 4 месяца назад +4

    The best brute force hacking tool: RNG to make a variable length string + RNG to fill each character of it + GPU = profit, or just use the infinite monkeys with typewriters

    • @iexist_nt
      @iexist_nt Месяц назад

      The monkeys said they were hungry. Anyone got infinite bananas I could borrow

  • @randommemer1080
    @randommemer1080 5 месяцев назад +17

    7:03 nice choice of anime right there

  • @CozyBoat275
    @CozyBoat275 4 месяца назад +3

    1:40 Actually, you would be shocked how many people would toss away sensitive data on paper or hard drives. It's extremely likely, and usually with older generations, that their passwords are written down.
    Or passwords are literally just, password123.

  • @first_time2950
    @first_time2950 4 месяца назад +3

    People laughing about the "treat your passwords like condoms" part but the one that made me laugh the most was "shitbird"

  • @bootmii98
    @bootmii98 3 месяца назад +6

    1:30 evidently you haven't seen my mother's work laptops

    • @SupersuMC
      @SupersuMC 12 дней назад +1

      Still have my old laptops sitting around because E-waste poisoning is no joke.

    • @bootmii98
      @bootmii98 12 дней назад

      @@SupersuMC Hers have the password taped over the camera, really shows her priorities

  • @soul_slayer707
    @soul_slayer707 4 месяца назад +4

    man i love your references,
    "unless you are taking a train in tokyo during rush-hour" XD

  • @scottyhohman7704
    @scottyhohman7704 5 месяцев назад +6

    Ayoo, I'm glad to see you're back! Hope to see more. Great video

  • @LemarSullivan821
    @LemarSullivan821 Месяц назад +5

    sponsor ends at 5:26. you're welcome

    • @XxMr_eggxX
      @XxMr_eggxX Месяц назад

      It's usually exactly one minute long so if you skip one minute 70% of the time you'll skip just the ad

  • @ShockInazuma
    @ShockInazuma 4 месяца назад +2

    I love how “shitbird” is a common password.

  • @UnderScorePT
    @UnderScorePT 5 месяцев назад +4

    When the police goes on a manhunt, I hope they change it to person-thingy-hunt too.

  • @Zerotwo-ilovehiro
    @Zerotwo-ilovehiro 3 месяца назад

    "Unless you're on a train. In Tokyo,at rush hours, and then having your password stolen should be the least of your worries" had me cracking up

  • @F0UR3V3R
    @F0UR3V3R 4 месяца назад +3

    2:10
    I did this once to get on the family computer.

  • @peika8324
    @peika8324 4 месяца назад +1

    Is funny that as I progressed in my university cs study. I now understand more and more of what people are referring to, which is great cause I genuinely enjoy uni and learn a lot off actual useful cool shet.
    Edit: also my professor once told me most attacks actually came from within, because people can’t do much when the “attackers” is within the protections

  • @miladmoro88
    @miladmoro88 4 месяца назад +4

    8:13 Always use your passwords like a .... , well, thanks, I leaned it well.😂

  • @collinkim9839
    @collinkim9839 4 месяца назад +4

    the "unexpected member of the family plan"

  • @servicer6969
    @servicer6969 5 месяцев назад +9

    2:03 Green me stay alone ramp

  • @XxguaxinimxX.
    @XxguaxinimxX. 4 месяца назад +1

    I would love to see a video like this with the best hash function specific for storing passwords!

  • @Wrulfy
    @Wrulfy 4 месяца назад +2

    Another unusual type of attack is Clairvoyance

  • @AySz88
    @AySz88 Месяц назад

    3:51 Length is more important, and the latest recommendations from NIST emphasize length, not numbers and symbols. It used to be assumed a (one) short password would be easier to remember even if complex, but now we use lots of accounts, and in the "real world" the old rules cause vulnerabilities by people writing them down (see dumpster diving, shoulder surfing) or reusing them (credential stuffing).

  • @Manuelslayor
    @Manuelslayor 4 месяца назад +2

    Level 2: You do not reliably destroy data by beating it. First, fry it in the microwave, then bake it in the offen and then smash it.

  • @stopcensoringmen5044
    @stopcensoringmen5044 5 месяцев назад +1

    That Winney the Poo meme about S.Q.L. or "sEqUeL" was a personal attack.

    • @Zooiest
      @Zooiest 4 месяца назад

      Where's squeal

  • @Produciones_Basado
    @Produciones_Basado 5 месяцев назад +112

    Rainbow table is not pasword:ifyouhackemeyouaregay

    • @TheMaxGuy
      @TheMaxGuy 4 месяца назад +9

      hacks you immediately (for legal reasons this is a joke)

    • @qwqDarkness
      @qwqDarkness 4 месяца назад

      p♂️ass♂️word

    • @AnNobody_
      @AnNobody_ 4 месяца назад +3

      I mean thats rainbow so i guess

    • @IisLasagna
      @IisLasagna 4 месяца назад +1

      Which gay is this? The umbrella term for the lgbt+ or the dude who doesn't wear socks

    • @danielthecake8617
      @danielthecake8617 4 месяца назад

      The guys who says "homo" after doing something straight.

  • @marioood
    @marioood 5 месяцев назад +2

    the art for this one is awesome.....................

  • @lu2000luk
    @lu2000luk 5 месяцев назад +7

    Its been a minute, but hes back...

  • @Mizuryryn
    @Mizuryryn 4 месяца назад +1

    Level 11: An Hacking Organization level captable to Defeat AES-256 in just couple days
    Level 12: A Guy who eats AES-256 as breakfast

  • @gabrielarrhenius6252
    @gabrielarrhenius6252 5 месяцев назад +6

    My collage teachers still call it man-in-the-middle attacks

    • @piroman85
      @piroman85 5 месяцев назад +1

      I dont think many people know, or care, about politicizing IT terminology

    • @gabrielarrhenius6252
      @gabrielarrhenius6252 5 месяцев назад

      @@piroman85 so true, so when it happens it is just stupid

    • @gabrielarrhenius6252
      @gabrielarrhenius6252 5 месяцев назад

      @ReaverSoul no

    • @gam8ligant
      @gam8ligant 4 месяца назад

      @@gabrielarrhenius6252 He is, you're just stupid.

  • @leosh9026
    @leosh9026 2 месяца назад +2

    Level 12: Asking (remember to say the magic word)

    • @sonyamainprize6407
      @sonyamainprize6407 Месяц назад

      Level 13 super brute force if level 12 doesn’t work Super brute force well basically always work because in like a few tries it’s like brute force, but But it’s the most efficient possible it gets more efficient every time you do it

  • @snacku7
    @snacku7 4 месяца назад +8

    5:27 where the sponsor ends

    • @Cat-yy5bo
      @Cat-yy5bo 3 месяца назад +2

      Thank you, sir

    • @barknaik8890
      @barknaik8890 2 месяца назад

      You are the goat 💯

  • @PCGxt-c4g
    @PCGxt-c4g 5 месяцев назад +3

    2:03 Just Format your HDD (without fast formatting), not destroying your computer

    • @brenatevi
      @brenatevi 5 месяцев назад +1

      That is not a guarantee. For hard drives, if you really want to be secure, you need to destroy them. One way is degaussing.

  • @sriramn1809
    @sriramn1809 5 месяцев назад

    The "credential stuffing attack" is probably more dangerous now.
    Now that we have Ai, in theory, it can probably guess each person's tendency and common words used in the password. Making it guess similar passwords that the users probably have.
    And this is wayyy more efficient than brute forcing attacks or dictionary attacks.
    So everyone, dont just make different passwords, make them different enough

  • @roy-ub7sy
    @roy-ub7sy 5 месяцев назад +1

    Very smooth ad-roll intro

  • @nathanc6443
    @nathanc6443 4 месяца назад +1

    What is your math confort level? 4:30
    Me: 1+1

  • @Jalan-Api
    @Jalan-Api 5 месяцев назад +1

    Yippie!! Finally I can crack the password of my pc I lost 2 years ago and didn't totally just found it

  • @echoawoo7195
    @echoawoo7195 4 месяца назад

    #2
    Yeah destroying drives is better than not, but mechanical destruction can often still be reversed (does make it harder, though)
    It's like how shredding doesn't make the documents secure, the info is still there, it's just mixed up. With enough patience (and lots of tape), you can unscramble it. So then they started cross shredding too, but, again, the data is still there, it's just harder to recover.
    This is why really sensitive documents are splotched with the same type of off black ink. But if it was a color printer you need to splotch each base color, too, or else the data is still recoverable.
    Then you cross shred it making it completely unrecoverable.
    If it was written, though, the only thing you can do is write over it with different characters, one at a time.
    And it has to be letters, not scribbles, because the scribbles are too uniform and the writing divets can still be seen. The only fix is to write actual characters down, multiple per single character spot. And you can often still pick out the individual letters, so it just creates a phase space where the answer still exists, but you have to parse an absolutely ton of crap.

  • @_GhostMiner
    @_GhostMiner 5 месяцев назад +2

    *6:31** this should be "squeel". I heard one guy pronounce it like that*

  • @Jojosloes
    @Jojosloes 5 месяцев назад +7

    To be clear, any divice works for dumpster diving. Cheap smart divices hold your wifi passwords, usally unencrypted. Also the part about him destorying the divice isnt a joke. Deleting files from a hard drive doesn't delete them. And even writing over them isnt always effective. Ssd's should be fine with wiping tho (not sure check yourself)

  • @xlil_Dragonfire
    @xlil_Dragonfire 4 месяца назад

    The Shoulder Surfing sounds so dumb that I thought you made it up

  • @ExpirisYT
    @ExpirisYT 4 месяца назад

    As someone who developed a working cross-platform brute forcing script it is really easy to break into accounts even if its a "level 1" hacking method.

  • @lordaragon901
    @lordaragon901 4 месяца назад

    “If brute force doesn’t work, you aren’t using enough of it”

  • @zetertheduck
    @zetertheduck 2 месяца назад

    For brute force, do special characters really help that much? The alphabet, lower and upper case, give you 52 characters, numbers give you an additional 10, and so do the standard 10 special characters. Wouldn't it be better to just add more characters?

  • @Verklunkenzwiebel
    @Verklunkenzwiebel 5 месяцев назад +1

    complex passwords are difficult for the user, versus passphrases which are easy for the user but hard to crack. Your thoughts on that?

  • @debmalyalodh1
    @debmalyalodh1 3 месяца назад

    Dictionary Attack
    PC: Use a dictionary to steal someones password
    School:*GETS HEADSHOT BY 1800 PAGES OF WORDS*

    • @damy2433
      @damy2433 3 месяца назад

      I mean if somebody threw my country's dictionary at me I'd probably die or get severe brain damage

    • @debmalyalodh1
      @debmalyalodh1 3 месяца назад +1

      @@damy2433 I know right?

  • @everywheretea
    @everywheretea 5 месяцев назад +1

    Don't forget about side channel attacks

  • @Sam_Hue
    @Sam_Hue 5 месяцев назад

    3:59 which is now made to a couple seconds thanks to your video

  • @EdwardDriver
    @EdwardDriver 5 месяцев назад +2

    Shitbird is a reference to talltales walking dead game series

  • @monchete9934
    @monchete9934 26 дней назад

    Number 11: Oopsie daisy, your company accidentally made the database indexable on search engines

  • @AGentooUser
    @AGentooUser 5 месяцев назад +1

    So that's why micros*ft tracks everything one does including his keyboard!

  • @Feenecks
    @Feenecks 4 месяца назад

    Dumper Diving works wonders in immersive sim games.

  • @ChatGPT-IV
    @ChatGPT-IV 4 месяца назад

    Phishing is almost always successful in accessing a victim's account if the target is a child or an older person. These scammers can even trick you into handing over your account's token, thinking you're giving away someone else's information or hacking somebody else's account. Your sucess rate is 101% if it's related to cracked softwares, game expoits or adding google extension by developer mode.

  • @gFamWeb
    @gFamWeb 5 месяцев назад +1

    I feel like those "top most used passwords" lists are misleading. They're obviously not sourced from proper databases, since those passwords are irretrievable. So they must be sourced from either full database dumps of insecure databases, or lists of compromised credentials. The latter, especially is always going to lean towards easy passwords. The former, dumps from databases that were insecurely storing passwords, might be a more accurate view of the kinds of passwords used in general, but it's still only a small view.

  • @lowrhyan567
    @lowrhyan567 4 месяца назад

    Brute force goes hard, not only in this context.

  • @Garfield_Minecraft
    @Garfield_Minecraft 20 дней назад +1

    brute force + quantum computer = absolute disaster
    6:10 ah yes feminism 😂

  • @TheBedLump_Sans
    @TheBedLump_Sans 5 месяцев назад +2

    no way ardens is alive!

  • @Multihuntr0
    @Multihuntr0 4 месяца назад

    06:30 Oh heck, that one got me. Exactly how I feel on the matter, too.

  • @Huslaka
    @Huslaka 4 месяца назад

    what a thorough and engaging review, learned a lot!

  • @christopheremmanuel1615
    @christopheremmanuel1615 24 дня назад

    i pulled off the shoulder surfing on my friend
    can't beleive that happened

  • @I-did-September-11th
    @I-did-September-11th 4 месяца назад

    Brute force is my favorite method.
    One time I logged in my friends school computer that way.

  • @casualsatanist5808
    @casualsatanist5808 3 месяца назад

    "This is impossible! Never in my life would I be able to get this right!"
    Guessing: 😏

  • @bread_girl_jane
    @bread_girl_jane Месяц назад

    just remember: your strongest password security is only as strong as your dumbest employee.

  • @Golem642
    @Golem642 5 месяцев назад +2

    Why did my wifi crash once you said wifi eavesdropping??
    Ardens what did you do ?

  • @5upertnt_ng73
    @5upertnt_ng73 3 месяца назад

    here's my foolproof measure against phishing attacks; I just don't check my email lol

  • @derptomistic
    @derptomistic 4 месяца назад

    If you're reading this, it's been too long. Change your passwords before you forget again for six months.
    There's always a high likelihood your current credentials were included in a data breach. ALWAYS.

  • @xurir0sbiggestfan714
    @xurir0sbiggestfan714 2 месяца назад

    What position are you trying to get in your field of work if you dont mind me asking

  • @linusdoesstuff625
    @linusdoesstuff625 4 месяца назад

    I used the looking over shoulder tactic to snipe my sister's tablet password.

  • @Jovian_Man
    @Jovian_Man 3 месяца назад

    2:03 No, if you just delete it permanently, it is retrievable, and recoverable, even if it’s overwritten, so instead you smash the hard drive or SSD and destroy it into oblivion, or in more violent situations, the entire computer.

  • @clock3505
    @clock3505 3 месяца назад

    4:13 Tsar bomba with 1 second prep time

  • @andycole5957
    @andycole5957 Месяц назад

    I thought brute force attacks were almost complete useless now due to systems having limited wrong attempts before locking the account and sending out warnings.

  • @omicron166
    @omicron166 3 месяца назад

    2:44 oh yes, the classic doujin plot

  • @TheStarMachine2000
    @TheStarMachine2000 4 месяца назад +1

    I hate that some companies will limit how LONG your passwords can be. Good luck every trying to get through the chorus of YMCA, but no, can't have passwords more rhan 18 characters long!

  • @memecat5774
    @memecat5774 4 месяца назад

    Thanks for letting me know those stuff, now I will go evil

  • @SangleyP
    @SangleyP 4 месяца назад

    Alternative method: Tortur- "Enhanced Interrogation Techniques"

  • @Nipppppppppp
    @Nipppppppppp 5 месяцев назад

    Incredible use of memes, 100/10

  • @fwepbwep5752
    @fwepbwep5752 5 месяцев назад

    aaaa why are your drawings so adorablee ,w,

  • @raviormetal1653
    @raviormetal1653 11 дней назад

    What about mentioning the current attempts to remove passwords alltogether using Passkeys?

  • @gentlesoul221
    @gentlesoul221 2 месяца назад

    Brute force is like bogo, it could take between 1 and infinity attempts to get the right answer