Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers: US: amzn.to/3wqukgC UK: amzn.to/43PHFev Getting Started Becoming a Master Hacker US: amzn.to/4bmGqX2 UK: amzn.to/43JG2iA Network Basics for hackers: US: amzn.to/3yeYVyb UK: amzn.to/4aInbGK // Occupy The Web SOCIAL // X: twitter.com/three_cube Website: hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: ruclips.net/video/YJUVNlmIO6E/видео.html&pp=iAQB Mr Robot: ruclips.net/video/3yiT_WMlosg/видео.html&pp=iAQB Hackers Arise / Occupy the Web Hacks: ruclips.net/video/GxkKszPVD1M/видео.html&pp=iAQB // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Have you been hacked? 04:42 - Brilliant add 07:05 - Indicators of being hacked 07:49 - Your computer is much slower 08:53 - Strange behaviour of your system 10:14 - Unusual activity in your email or messaging apps 10:57 - Dark web data dumps 13:08 - Use different passwords 14:59 - Alerts that someone is trying to access your account 15:39 - Browser fingerprinting 17:37 - You can no longer access some of your online accounts 19:39 - Unexpected pop-ups or directs 20:56 - Your email appears on the Dark Web Data Dumps 23:03 - Friends or Colleagues are receiving emails from you that you did not send. 25:19 - Unknown charges to your bank or credit 25:51 - Your Anti-Virus/Malware is disabled 27:51 - Indicators of compromise 29:04 - Unknown services running on Kali 33:13 - Unknown services running on Windows 36:50 - Windows CMD : netstat 37:32 - Windows SysinternalsSuite 40:47 - Windows Wireshark 44:42 - Learn your system 46:16 - Getting a message asking for money 47:26 - How does your DEMO work? 51:31 - Outro00:00 - Intro 04:42 - Brilliant add 07:05 - Indicators of being hacked 07:49 - Your computer is much slower 08:53 - Strange behaviour of your system 10:14 - Unusual activity in your email or messaging apps 10:57 - Dark web data dumps 13:08 - Use different passwords 14:59 - Alerts that someone is trying to access your account 15:39 - Browser fingerprinting 17:37 - You can no longer access some of your online accounts 19:39 - Unexpected pop-ups or directs 20:56 - Your email appears on the Dark Web Data Dumps 23:03 - Friends or Colleagues are receiving emails from you that you did not send. 25:19 - Unknown charges to your bank or credit 25:51 - Your Anti-Virus/Malware is disabled 27:51 - Indicators of compromise 29:04 - Unknown services running on Kali 33:13 - Unknown services running on Windows 36:50 - Windows CMD : netstat 37:32 - Windows SysinternalsSuite 40:47 - Windows Wireshark 44:42 - Learn your system 46:16 - Getting a message asking for money 47:26 - How does your DEMO work? 51:31 - Outro hack hacked compromise computer hacked my computer has been hacked cybersecurity indicators of compromise tor proxy chains linux android iphone ios tails tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hack #hacked #privacy
The efficiency of this *_Strategic techies_* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Jack !!!
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
Having someone like you who’s not only a great innovator but also pulls his best to get the work done so beautifully needs nothing but appreciation. *_Strategic techies_* Thanks for the well off work you consistently bring your all and I truly appreciate that. Thank you for making corporate life so smooth. Proud to have you on our team. Great work as always.
wish this dude would just use his normal speaking voice, when he is actually explaining something a little more technical, he reverts back to his normal self. Any other time it is just made up fluff because he just loves to hear himself talk...
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
It’s always a pleasure to work with someone as dedicated as you, *_Perry Moskva_* Your ability to turn complex ideas into clear, actionable steps is truly impressive. The way you handled every part of this project shows just how much you care about delivering the best possible result.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
Hey ppl, I'm a retired computer/IT person, Yet I still find *_Top phase resolution_* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
do you know by any chance what could be the problem with my computer when i just got my bios upgraded, but when I launch wow I get a warning that says upgrading bios is recommended?
@@nefelibata4190This seems extremely unlikely to me. In all my years of gaming, going back to the late 80's, I've never had a game state anything about my BIOS at all, let alone an explicit statement about it requiring an update. I would take a screenshot of this warning, or use your phone to snap an image, and do a web search for that message. If this warning is directing you to a particular location to perform this "update" it is definitely not legit. You should be updating your BIOS and chipset firmware (and drivers) fairly regularly anyway, as there is almost never a reason no to, other than laziness and the issues that can arise from not doing it properly. However, you should only be acquiring these updates from the motherboard manufacturer or laptop manufacturer and, if possible, you can perform a SHA256 checksum to verify the integrity of the files.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
I appreciate *_Strategic techies_* unique ability to identify weaknesses in a system, setup scenarios that line up nicely for exploitation, and to know exactly how to exploit these. It's a skill. Many of us can identify some weaknesses around us, even the ones that are contributing to our misery (like in government systems), but we can't follow to exploit these. That's the difference between a hacker and you.
After following every step mentioned in the video without success, I believed luck had abandoned me. However, my gratitude goes to *_Strategic techies_* for surpassing expectations and helping me with my page recovery. Your generosity and technical expertise are truly exceptional. Kudos to individuals like you!
Fantastic work, *_Strategic techies_* it's incredibly satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is essential. You truly deserve recognition and appreciation for keeping us safe. Keep up the outstanding performance!
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
You can more often than not discover you were actually hacked. File accesses, installs you didn’t install…open ports…hell, look for edited metadata. So so so soooo many ways. Hackers aren’t gods bro.
That’s the great thing aboot this video. David and guest explain how to arm yourself with enough information to go from Yes or “I don’t know” - to Yes or No.
*_Perry Moskva_* willingness to assist and offer valuable advice speaks volume about your character and the supportive environment you cultivate. I'm incredibly grateful to have someone like you.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
I was talking to my brother across the country just last night about a book he just published. As soon as we hung up, he went to Amazon and the book was suggested in the "Pick up where you left off" screen. He had never typed the name before. Yup, they are listening. *_Perry moskva_*
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
*_Perry moskva_* , ngl..you've been a positive impact in my previous relationship. Had a bunch of an eye opener when I discovered your channel. I confidently say my EQ has increased exponentially ever since I found your channel. Thank you for all the knowledge you give to men and women out here. You a real one 💯.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
Outstanding job done by *Strategic techies* I'm so glad you're out there battling these vile con artists like my Ex. We must take every precaution to protect the general people and the elderly from these vile con artists!!! Bravo to you!! You ought to be awarded the Nobel Prize for protecting me and getting my child custody. Big up, brother.....
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
One time I had my mouse moving on its own. I calmed down and started to think of a solution. Then I got up from my chair just to find out that I was sitting on my wireless mouse that I forgot was plugged in and all the mouse movements were just my pants moving across the sensor.
One time I have problems with my computer. Even though I clicked the mouse once, several tabs opened up on my browser. I also had issues with my printer. No troubleshooting that I tried helped, and the printer company couldn’t figure out what it was going on, after wasting half a package of paper, trying to get me to test it. My sister, who worked at a manufacturing plant at the time, ask one of her friends if they knew. He said, “She needs a new mouse.” He leant her an extra mouse that he had for me to test. Bingo, everything worked perfectly after I plugged in his mouse!
This channel is the sole exception where I haven't skipped the promo ads. Your finesse in effortlessly integrating promotional content within your videos is genuinely impressive. Sometimes, it takes a moment to recognize that you're endorsing anything; I commend *Strategic techies* for your adept execution in this aspect
The ones I found irritating on people's PC's are compromised web browsers, changing the homepage and flogging the browser with ads, and others denying access to folders/disabling antivirus. Someone's booting to safe mode helps as only necessary processes start up but quite often we have had to rebuild the OS to remove any lingering files. Hopefully, saving critical files from the HDD after removing it. So many traps out there😳
Thank you OTW & David. I learned a bunch tonight! It is now way past my bedtime but it is worth it to stay up & learn! It is so scary these days with the scammers and cyberattacks!!! Missed the safe, good old days!!! 😂
I'm not going to lie, we are actually really proud to have a devoted ethical hacker like you. The job is done so gracefully and neatly. Very well done, *_Perry Moskva_* First of all. Thank you for making the work environment so friendly and taking your responsibility seriously and completing the work gracefully! You deserve so much.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
@@KeebHoard I just had one yesterday get his DocuSign account compromised. Received a request for signature and clicked through it all. We don't sign anything, we request signatures, so don't know wtf he was thinking.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Working on a helpdesk and the stories I heard of these people (that weren't hacked 99.9%) are insane. Freezing the mobile phone in ice, throwing a brick through the TV since the hackers were in it are some of the sad stuff Ive seen. Mental health is a thing.
It's quite troublesome when your privacy is invaded. Mental health is a thing. The sad part is that those people could easily be viewed as insane, despite truly being under threat. Gangstalking and Harassment as a Service is also a thing.
@@Dewa-s3i Those people I talked to weren't gang stalked or harassed though. It is very rare of these things to happen. Often it's the elderly people that are technically inept to know what's happening and are interpreting stuff that is happening on their devices the wrong way. These people need to be taken serious though but NEVER being encouraged in their wrong interpretations. I've seen a computer repair "expert" tell the customer to get the IP changed and get a new modem just to get the customer out of the store. Result: every day a call from the person.
It ain’t that much of a mental health issue, humans are wired to be scared of things THEY DO NOT UNDERSTAND. Some get more scared than others. Education is the only solution for this.
Thank you very much for the video and everything you put into this. I've learnt far more from this video than what I've done. Trying to find out online myself. Gosh thank you so much! God bless 🙏
I love when OTW is on your show! I am almost to graduate with a degree in CS with an emphasis on cybersecurity. When I can afford it I’ve been wanting to go through the Hackers Arise Courses, hopefully sooner than later! 😊 Thanks for continuing to host OTW!! He never disappoints!!!
With continued perseverance, you are on the path to overcoming challenges and finding solutions effortlessly. Kudos to *_Strategic techies_* for consistently moving closer to your desired success. Every achievement, regardless of size, propels you towards your dreams. Keep up the great work!
A far more useful piece of software would be one that scrutinizes known processes and inform you that they're regular processes, and leave the unknown ones more exposed. It's daunting for anyone to know and google every single process thats going on, nevermind looking up every single target IP address, no one is gonna do that but those with a ton of time on their hands and real concerns.
@@joonglegamer9898 how is the software supposed to know what is "regular processes" when everyone's running different pieces of software, both bought and freeware stuff? Also, people install and uninstall software on their PCs all the time, so it would be difficult for someone to write software to do what you're asking
That is a basic, or layperson description of "Intrusion Detection System" or IDS. Basically this attempts to keep a model of a healthy system, and detect when any type or appearance of events within a system show an EXCEPTION to the healthy model attributes (this includes various objects, but also various actions). Thus, they generate "exceptions" which percolate up the IDS. As other commenters are noting, it's actually IMPOSSIBLE to have a complete, detailed, undefeatable model or inventory of "healthy system" since this would have to include the entire universe of extant software, and also all possible system behaviors, so that is entirely too massive to model. Our guest is right that at the level of "Nation State" hacking it's so sophisticated that even opponent nations cannot guarantee to detect the hack payload or it's activity, so individual users would be at even more disadvantage.
@@scroopynooperz9051 Thats the easy part. As he said, most of it is not malware but standard processes, even with that, there's no chance that each individual out there knows what standard processes are for Windows alone.
BTW how many have realised that the only kind of " REPAIR " - or - " worldwide social revolution "... must be co-ordinated and followed through, by: hakkers
I’m truly impressed by how far you’ve come *_Strategic techies_* . Your progress inspires confidence, and I believe you’ll continue to excel and deliver even better work for others in the future. Your dedication and hard work have truly paid off, making you an inspiration to others in your field. Thank you for your outstanding work, and I’m proud of all you’ve achieved. Keep up the great work!!
OTW's books must be great. He has no hesitation in recommending Sysinternals which also has association with some great tech books on details of how Windows works (the Sysinternals project was originally independent, but eventually was brought on board MSFT, with the contractual provision that they not be neutered, but maintained and still provide reasonable insight into Operating System internals). I'll make sure to put OTW books on the list and get them. I'm already somewhat sophisticated, but everything here rings not only true, but is also the EFFECTIVE way of finding out about one's system. I cannot recommend "Process Explorer" enough. That tool, which I deem "killer app", alone, can act as a "Swiss Army Knife" of insight into our machine.
*_Perry Moskva_* , your unwavering dedication played a pivotal role in the successful recovery of my page. Your exceptional talents and qualities have been a true blessing. Your work speaks volumes about your capabilities and excellence. Thank you for everything you do.
David, with almost 3M followers (congrat), I understand that you are trying to enlarge your audience, but this was a very entry level (even not ccna) video that any junior IT guy know already (probably 'hacker' or 'hacking' should even not be present in the title). May I suggest that you classify your video with level/difficulty please ? like entry, beginner, medium, advance, expert, then your audience can choose your content by level ? I would love to really hear your invitee on a more advance/expert video to benefit from his daily experience and long career. All the best.
21:33 how can we know that this exactly is not one step closer to us, we need to type in our email, now they have our email, ip, browser, location......
What about multiple text messages everyday telling me my phone is at risk for something, payments are due, etc. always with a link I don't click on. Always delete and block number. Next day I get identical messages from different numbers.
Lol the guy kept calling it “pawned” it’s pronounced “Powned” like owned but with a P. Gave me a good laugh. Ah, the golden days of gaming are long gone and it’s a word you never hear anymore.
But I can’t regain control due to two-factor authentication. Honestly, I’ve been putting efforts into following the instructions but I still can’t. All thanks *Strategic techies* , His relentless dedication and strategic approach resolving this issue have been truly impressive. This achievement is a testament to your exceptional negotiation skills and commitment.
Love hearing OTW s point of view 👑 We should sometime see ways to prevent hacker to hack our system and OTW Linux and becoming and networking don't go into serious deeps of securing our selfs
I been hacked many times and almost every check shows no new accounts, things look very normal but its hidden so well that I think its the Bios thats infected and the main OS can't detect it.
hey david bombal can you discuss deeper IPS/IDS (Intrusion Prevention Systems/Intrusion Detection Systems) is a security mechanism that detects intrusions based on attack signatures. IPS/IDS can detect various attacks such as buffer overflows, Trojans, worms, and SQL injections, safeguarding your network environment.
Mouse moving without you touching it will give you a big fright, I know! However, sometimes it's just dust affecting the laser. Don't Panic, try another mouse first.
Yeah the Linux basic for hackers is a very good book and I do recommend it for software engineers, QA and Pen testers. As almost every server runs on Linux, and there's a popular free game for that!
I came here to reveal the identity of otw but then I noticed you have other videos of him on your channel without his identity hidden lmao, that braxon phone is awesome btw 😂
We have a hacker in the apartments I live in and are using a simple technic to steal personal information from anyone using a WiFi network! I received a text massage immediately after doing a money transfer which showed the exact amount of the transfer! How do I report it? Will the police really want the information I can give them?
This video is amazing, but I am more intrigued how the guest is doing his side of the stream? I would love to go faceless like that in my content as well, I also love that you can see his voice pattern in the background. Any insight on how this is accomplished? Anyone?
Hey guys I have a question. I've been wanting to buy OTW's courses because I love the way he teaches, but some say his stuff isn't worth the price. For the people who've taken his courses, what do you guys think?(Not saying anything is true btw just looking for more info)
I rarely see this but sometimes my mouse moves fast and on its own towards the X button to close a window, it does nothing afterwards, and doesn't happen regularly, but would that be a malfunction or a hacker?
Thanks David my friend í just learned about this. I have a windows PC my Brother in law got used and I seen it's very slow and I seen this in task manager too. You got me to remember more. I been using the system from 2000 and yeah the hacker is right.. I'll tell my brother we need to delete windows it's not safe there spyware and malware in it. So I'll put linux on it no more windows garbage héhe thanks my friend. I wish you and me could chat il would love to learn from you and he'll who knows we learn from each other right.. 😊
Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers:
US: amzn.to/3wqukgC
UK: amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: amzn.to/4bmGqX2
UK: amzn.to/43JG2iA
Network Basics for hackers:
US: amzn.to/3yeYVyb
UK: amzn.to/4aInbGK
// Occupy The Web SOCIAL //
X: twitter.com/three_cube
Website: hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: ruclips.net/video/YJUVNlmIO6E/видео.html&pp=iAQB
Mr Robot: ruclips.net/video/3yiT_WMlosg/видео.html&pp=iAQB
Hackers Arise / Occupy the Web Hacks: ruclips.net/video/GxkKszPVD1M/видео.html&pp=iAQB
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Have you been hacked?
04:42 - Brilliant add
07:05 - Indicators of being hacked
07:49 - Your computer is much slower
08:53 - Strange behaviour of your system
10:14 - Unusual activity in your email or messaging apps
10:57 - Dark web data dumps
13:08 - Use different passwords
14:59 - Alerts that someone is trying to access your account
15:39 - Browser fingerprinting
17:37 - You can no longer access some of your online accounts
19:39 - Unexpected pop-ups or directs
20:56 - Your email appears on the Dark Web Data Dumps
23:03 - Friends or Colleagues are receiving emails from you that you did not send.
25:19 - Unknown charges to your bank or credit
25:51 - Your Anti-Virus/Malware is disabled
27:51 - Indicators of compromise
29:04 - Unknown services running on Kali
33:13 - Unknown services running on Windows
36:50 - Windows CMD : netstat
37:32 - Windows SysinternalsSuite
40:47 - Windows Wireshark
44:42 - Learn your system
46:16 - Getting a message asking for money
47:26 - How does your DEMO work?
51:31 - Outro00:00 - Intro
04:42 - Brilliant add
07:05 - Indicators of being hacked
07:49 - Your computer is much slower
08:53 - Strange behaviour of your system
10:14 - Unusual activity in your email or messaging apps
10:57 - Dark web data dumps
13:08 - Use different passwords
14:59 - Alerts that someone is trying to access your account
15:39 - Browser fingerprinting
17:37 - You can no longer access some of your online accounts
19:39 - Unexpected pop-ups or directs
20:56 - Your email appears on the Dark Web Data Dumps
23:03 - Friends or Colleagues are receiving emails from you that you did not send.
25:19 - Unknown charges to your bank or credit
25:51 - Your Anti-Virus/Malware is disabled
27:51 - Indicators of compromise
29:04 - Unknown services running on Kali
33:13 - Unknown services running on Windows
36:50 - Windows CMD : netstat
37:32 - Windows SysinternalsSuite
40:47 - Windows Wireshark
44:42 - Learn your system
46:16 - Getting a message asking for money
47:26 - How does your DEMO work?
51:31 - Outro
hack
hacked
compromise
computer hacked
my computer has been hacked
cybersecurity
indicators of compromise
tor
proxy chains
linux
android
iphone
ios
tails
tails linux
invisible online
hide identity
privacy
kali linux
online privacy
internet security
online privacy and security
online privacy tips
online privacy guide
internet security tutorial
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hack #hacked #privacy
hello devid sir i have idea i want explain you but my english not good
ليش ماتسوي ترجمه للعربيه😢😢
@@kadwasach4294 اذا كان فيديو مترجم سيكون رائعا
Can this be posted to spotify and as a video episode? Please please
Please tell OTW it's powned not pawned
The efficiency of this *_Strategic techies_* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Jack !!!
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
Having someone like you who’s not only a great innovator but also pulls his best to get the work done so beautifully needs nothing but appreciation. *_Strategic techies_* Thanks for the well off work you consistently bring your all and I truly appreciate that. Thank you for making corporate life so smooth. Proud to have you on our team. Great work as always.
wish this dude would just use his normal speaking voice, when he is actually explaining something a little more technical, he reverts back to his normal self. Any other time it is just made up fluff because he just loves to hear himself talk...
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
It’s always a pleasure to work with someone as dedicated as you, *_Perry Moskva_* Your ability to turn complex ideas into clear, actionable steps is truly impressive. The way you handled every part of this project shows just how much you care about delivering the best possible result.
wtf are you even talking about
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
Hey ppl, I'm a retired computer/IT person, Yet I still find *_Top phase resolution_* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
do you know by any chance what could be the problem with my computer when i just got my bios upgraded, but when I launch wow I get a warning that says upgrading bios is recommended?
@@nefelibata4190This seems extremely unlikely to me. In all my years of gaming, going back to the late 80's, I've never had a game state anything about my BIOS at all, let alone an explicit statement about it requiring an update. I would take a screenshot of this warning, or use your phone to snap an image, and do a web search for that message. If this warning is directing you to a particular location to perform this "update" it is definitely not legit. You should be updating your BIOS and chipset firmware (and drivers) fairly regularly anyway, as there is almost never a reason no to, other than laziness and the issues that can arise from not doing it properly. However, you should only be acquiring these updates from the motherboard manufacturer or laptop manufacturer and, if possible, you can perform a SHA256 checksum to verify the integrity of the files.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
I appreciate *_Strategic techies_* unique ability to identify weaknesses in a system, setup scenarios that line up nicely for exploitation, and to know exactly how to exploit these. It's a skill. Many of us can identify some weaknesses around us, even the ones that are contributing to our misery (like in government systems), but we can't follow to exploit these. That's the difference between a hacker and you.
After following every step mentioned in the video without success, I believed luck had abandoned me. However, my gratitude goes to *_Strategic techies_* for surpassing expectations and helping me with my page recovery. Your generosity and technical expertise are truly exceptional. Kudos to individuals like you!
Fantastic work, *_Strategic techies_* it's incredibly satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is essential. You truly deserve recognition and appreciation for keeping us safe. Keep up the outstanding performance!
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
The question of "Have you ever been hacked?" does not have a Yes/No answer. The two possible responses are Yes, and, "I don't know."
The video explains how to find out and things to look for.
this guy gets it
You can more often than not discover you were actually hacked. File accesses, installs you didn’t install…open ports…hell, look for edited metadata. So so so soooo many ways. Hackers aren’t gods bro.
That’s the great thing aboot this video. David and guest explain how to arm yourself with enough information to go from Yes or “I don’t know” - to
Yes or No.
So is this guy a Hacker then?
Me and my hacker watching this together.
dudeee soo trueee 😮💨
😅
Lol my hacker to...omg people dumb. ❤❤❤
😑
hahaaha
*_Perry Moskva_* willingness to assist and offer valuable advice speaks volume about your character and the supportive environment you cultivate. I'm incredibly grateful to have someone like you.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
I was talking to my brother across the country just last night about a book he just published. As soon as we hung up, he went to Amazon and the book was suggested in the "Pick up where you left off" screen. He had never typed the name before. Yup, they are listening. *_Perry moskva_*
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
*_Perry moskva_* , ngl..you've been a positive impact in my previous relationship. Had a bunch of an eye opener when I discovered your channel. I confidently say my EQ has increased exponentially ever since I found your channel. Thank you for all the knowledge you give to men and women out here. You a real one 💯.
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
Outstanding job done by *Strategic techies* I'm so glad you're out there battling these vile con artists like my Ex. We must take every precaution to protect the general people and the elderly from these vile con artists!!! Bravo to you!! You ought to be awarded the Nobel Prize for protecting me and getting my child custody. Big up, brother.....
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
One time I had my mouse moving on its own. I calmed down and started to think of a solution. Then I got up from my chair just to find out that I was sitting on my wireless mouse that I forgot was plugged in and all the mouse movements were just my pants moving across the sensor.
Lies
When yout cursor moves without you having an act
actual mouse or clicking anything, you've been hacked/compromised.
This could be VNC-spyware ! The attacker moves his mouse and so your mouse will be moved !
Next time, have a shower before.
One time I have problems with my computer. Even though I clicked the mouse once, several tabs opened up on my browser. I also had issues with my printer. No troubleshooting that I tried helped, and the printer company couldn’t figure out what it was going on, after wasting half a package of paper, trying to get me to test it. My sister, who worked at a manufacturing plant at the time, ask one of her friends if they knew. He said, “She needs a new mouse.” He leant her an extra mouse that he had for me to test. Bingo, everything worked perfectly after I plugged in his mouse!
This channel is the sole exception where I haven't skipped the promo ads. Your finesse in effortlessly integrating promotional content within your videos is genuinely impressive. Sometimes, it takes a moment to recognize that you're endorsing anything; I commend *Strategic techies* for your adept execution in this aspect
The ones I found irritating on people's PC's are compromised web browsers, changing the homepage and flogging the browser with ads, and others denying access to folders/disabling antivirus. Someone's booting to safe mode helps as only necessary processes start up but quite often we have had to rebuild the OS to remove any lingering files. Hopefully, saving critical files from the HDD after removing it. So many traps out there😳
Thank you OTW & David. I learned a bunch tonight! It is now way past my bedtime but it is worth it to stay up & learn! It is so scary these days with the scammers and cyberattacks!!! Missed the safe, good old days!!! 😂
Everyone has been hacked. Every single one of us
what about creating a few videos centered on mobile security, android and ios? would be really useful
they are there but not just from OTW, but other guuests. browse through his channel
I'm not going to lie, we are actually really proud to have a devoted ethical hacker like you. The job is done so gracefully and neatly. Very well done, *_Perry Moskva_* First of all. Thank you for making the work environment so friendly and taking your responsibility seriously and completing the work gracefully! You deserve so much.
nice bot
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Thank you very much for the service and everything you put into this. I've learnt far more from this service than what I've done. Trying to find out online myself. Gosh thank you so much! God bless Perry 🙏
“Malfunctioning users” the IT admin part of me felt that. They’re 95% of the issue.
Malfunctioning NPCs u mean? Lol
the biggest vulnerability on a system is the human factor
The average user is so completely clueless.
@@KeebHoard I just had one yesterday get his DocuSign account compromised. Received a request for signature and clicked through it all. We don't sign anything, we request signatures, so don't know wtf he was thinking.
pebkac=1
Thanks, David, for all your videos
You're welcome!
@@davidbombalCan you please make a video on how to install blackarchlinux as dual boot using bootable pendrive please 🥺
When I went to school for computer science, I was told once you get hacked, it’s not your PC anymore. If you have been hacked, you can be totally clueless about it. You find out about most hacks even on high security systems, they usually sit and watch for a while after getting in and everyone is totally clueless until they make their move.
Working on a helpdesk and the stories I heard of these people (that weren't hacked 99.9%) are insane. Freezing the mobile phone in ice, throwing a brick through the TV since the hackers were in it are some of the sad stuff Ive seen. Mental health is a thing.
It's quite troublesome when your privacy is invaded. Mental health is a thing. The sad part is that those people could easily be viewed as insane, despite truly being under threat. Gangstalking and Harassment as a Service is also a thing.
@@Dewa-s3i Those people I talked to weren't gang stalked or harassed though. It is very rare of these things to happen. Often it's the elderly people that are technically inept to know what's happening and are interpreting stuff that is happening on their devices the wrong way. These people need to be taken serious though but NEVER being encouraged in their wrong interpretations. I've seen a computer repair "expert" tell the customer to get the IP changed and get a new modem just to get the customer out of the store. Result: every day a call from the person.
It ain’t that much of a mental health issue, humans are wired to be scared of things THEY DO NOT UNDERSTAND. Some get more scared than others. Education is the only solution for this.
Thank you very much for the video and everything you put into this. I've learnt far more from this video than what I've done. Trying to find out online myself. Gosh thank you so much! God bless 🙏
As always we love your videos. Thank you OTW and David. ❤
Thank you! Glad you like them!
I don't the question is "Have you been hacked?". But have sites that hold our personal info been hacked?
I love when OTW is on your show! I am almost to graduate with a degree in CS with an emphasis on cybersecurity. When I can afford it I’ve been wanting to go through the Hackers Arise Courses, hopefully sooner than later! 😊 Thanks for continuing to host OTW!! He never disappoints!!!
AMAZING program content was off the hook !!! loved it thanks Gentlemen it leaves me with hope for the real good guys !! all the best keep it coming ..
With continued perseverance, you are on the path to overcoming challenges and finding solutions effortlessly. Kudos to *_Strategic techies_* for consistently moving closer to your desired success. Every achievement, regardless of size, propels you towards your dreams. Keep up the great work!
Great Info!!😃
A far more useful piece of software would be one that scrutinizes known processes and inform you that they're regular processes, and leave the unknown ones more exposed.
It's daunting for anyone to know and google every single process thats going on, nevermind looking up every single target IP address, no one is gonna do that but those with a ton of time on their hands and real concerns.
@@joonglegamer9898 how is the software supposed to know what is "regular processes" when everyone's running different pieces of software, both bought and freeware stuff?
Also, people install and uninstall software on their PCs all the time, so it would be difficult for someone to write software to do what you're asking
That is a basic, or layperson description of "Intrusion Detection System" or IDS. Basically this attempts to keep a model of a healthy system, and detect when any type or appearance of events within a system show an EXCEPTION to the healthy model attributes (this includes various objects, but also various actions). Thus, they generate "exceptions" which percolate up the IDS.
As other commenters are noting, it's actually IMPOSSIBLE to have a complete, detailed, undefeatable model or inventory of "healthy system" since this would have to include the entire universe of extant software, and also all possible system behaviors, so that is entirely too massive to model. Our guest is right that at the level of "Nation State" hacking it's so sophisticated that even opponent nations cannot guarantee to detect the hack payload or it's activity, so individual users would be at even more disadvantage.
@@scroopynooperz9051 Thats the easy part. As he said, most of it is not malware but standard processes, even with that, there's no chance that each individual out there knows what standard processes are for Windows alone.
YES!! X•ACT•LY ! Novice enquiring neurons need a launching pad...further pattern/non-pattern recognition beams out of incremental confidence...
BTW how many have realised that the only kind of " REPAIR " - or - " worldwide social revolution "... must be co-ordinated and followed through, by: hakkers
happy new year to everybody specially to OTW you are the man
I’m truly impressed by how far you’ve come *_Strategic techies_* . Your progress inspires confidence, and I believe you’ll continue to excel and deliver even better work for others in the future. Your dedication and hard work have truly paid off, making you an inspiration to others in your field. Thank you for your outstanding work, and I’m proud of all you’ve achieved. Keep up the great work!!
Thank you, gentleman, for the great podcast, as aways is a leasure of watching! Thank and all the best to all of you 🙏
ThankYou David and Master OTW.
Cool information! Thank you, David!
Edit: Especially thank you, OTW, and your books are awesome!
Awesome, thank you!
OTW's books must be great. He has no hesitation in recommending Sysinternals which also has association with some great tech books on details of how Windows works (the Sysinternals project was originally independent, but eventually was brought on board MSFT, with the contractual provision that they not be neutered, but maintained and still provide reasonable insight into Operating System internals). I'll make sure to put OTW books on the list and get them. I'm already somewhat sophisticated, but everything here rings not only true, but is also the EFFECTIVE way of finding out about one's system. I cannot recommend "Process Explorer" enough. That tool, which I deem "killer app", alone, can act as a "Swiss Army Knife" of insight into our machine.
@@davidbombal You welcome!
good info! thanks! 🤨
Thanks. Wonderful. Please cover a how to handle aggressive data interception in the workplace (abuse of power)
*_Perry Moskva_* , your unwavering dedication played a pivotal role in the successful recovery of my page. Your exceptional talents and qualities have been a true blessing. Your work speaks volumes about your capabilities and excellence. Thank you for everything you do.
David, with almost 3M followers (congrat), I understand that you are trying to enlarge your audience, but this was a very entry level (even not ccna) video that any junior IT guy know already (probably 'hacker' or 'hacking' should even not be present in the title). May I suggest that you classify your video with level/difficulty please ? like entry, beginner, medium, advance, expert, then your audience can choose your content by level ? I would love to really hear your invitee on a more advance/expert video to benefit from his daily experience and long career. All the best.
Excellent video. Thank you.
21:33 how can we know that this exactly is not one step closer to us, we need to type in our email, now they have our email, ip, browser, location......
Mouse moving is not always a sign of being hacked, it could also be a broken mouse synthesizer or a defective mouse touchpad
My bloody credit card was compromised again for the second time this year, and I am super careful and cannot explain how it’s happened
It could be a disgruntled employee working in the business you purchased from selling on customers credit card details.
@@snowflakemelter7171 Or a card skimmer in a common location he shops at that's well hidden
What about multiple text messages everyday telling me my phone is at risk for something, payments are due, etc. always with a link I don't click on. Always delete and block number. Next day I get identical messages from different numbers.
Me checking my Task Manager and I have "Service Host..." In my Processes
Make a video on is my phone hacked
Lol the guy kept calling it “pawned” it’s pronounced “Powned” like owned but with a P. Gave me a good laugh. Ah, the golden days of gaming are long gone and it’s a word you never hear anymore.
it was weirdthis guy sounds old. I'm assuming he's so old it was before the pwn days.
But I can’t regain control due to two-factor authentication. Honestly, I’ve been putting efforts into following the instructions but I still can’t. All thanks *Strategic techies* , His relentless dedication and strategic approach resolving this issue have been truly impressive. This achievement is a testament to your exceptional negotiation skills and commitment.
Is Virus Total in Process Explorer worth enabling? I thought he would have talked about it during Process Explorer talk.
7:58 start of the signs of one being hacked
Thanks man for again bringing otw please cover bitcoin forensics topic with otw🙏🙏
Cyber crimes will definitely not end well for anyone that tries. Its game. In the end they can always be found.
Love hearing OTW s point of view 👑
We should sometime see ways to prevent hacker to hack our system and OTW Linux and becoming and networking don't go into serious deeps of securing our selfs
Thanks very much David!!
Keep on doing what you're doing David, you two are an inspiration, thank you.
Thank you! I appreciate that!
old/new world, right !?!
Thank you for your support! Much appreciated!
@@davidbombal You are welcome. I am Sascha on LinkedIn
it seems to be a "PEBCAD" issue, techy tells customer\client. (problem exists between chair and desk)
I been hacked many times and almost every check shows no new accounts, things look very normal but its hidden so well that
I think its the Bios thats infected and the main OS can't detect it.
If your mouse is moving by itself, your home may be haunted! 😅
hey david bombal can you discuss deeper IPS/IDS (Intrusion Prevention Systems/Intrusion Detection Systems) is a security mechanism that detects intrusions based on attack signatures. IPS/IDS can detect various attacks such as buffer overflows, Trojans, worms, and SQL injections, safeguarding your network environment.
I think we are been hacked we just don’t recognize it
David my favorite channel! Always good content 👍
Thank you! Glad you enjoy it!
i had a couple emails that had been hacked... thanks david, and hacker...
Thank you David! Much appreciated.
Mouse moving without you touching it will give you a big fright, I know! However, sometimes it's just dust affecting the laser.
Don't Panic, try another mouse first.
Love your videos. Especially these kind. Looking forward to more!
Yeah the Linux basic for hackers is a very good book and I do recommend it for software engineers, QA and Pen testers.
As almost every server runs on Linux, and there's a popular free game for that!
You are amazing sir I learned Linux and ccna from your RUclips channel I think you make the most practical vedios on the internet
Thank you very much! I appreciate that!
Sir I have a question which is the best programming language I should learn for hacking
And also apart from programming languages what more should I learn for hacking
@@GOD_GAMMING.-990 if you need to ask that then you never looked around for the answer. It's C of course.
Thank you!! Sir
You're welcome!
I came here to reveal the identity of otw but then I noticed you have other videos of him on your channel without his identity hidden lmao, that braxon phone is awesome btw 😂
We have a hacker in the apartments I live in and are using a simple technic to steal personal information from anyone using a WiFi network! I received a text massage immediately after doing a money transfer which showed the exact amount of the transfer! How do I report it? Will the police really want the information I can give them?
There's no doubt in my mind that someone had me as a target from July 13-Aug. No doubt. Hacked daily from my soul
Everyone be aware current Win 11 Task Manager does NOT look like that. The Task Manager shown in the video is an older version
this is breathtakingly lame.
Thank you David
You're welcome!
This video is amazing, but I am more intrigued how the guest is doing his side of the stream? I would love to go faceless like that in my content as well, I also love that you can see his voice pattern in the background. Any insight on how this is accomplished? Anyone?
Hey guys I have a question. I've been wanting to buy OTW's courses because I love the way he teaches, but some say his stuff isn't worth the price. For the people who've taken his courses, what do you guys think?(Not saying anything is true btw just looking for more info)
I'm a simple cyber guy;
I see new David Bombal & OTW, I click like.
You're a smart guy
Which metasploit malware otw sir use david sir can you help me plz
The more ppl learn how to hack. The higher the chance u been hack in everything, especially if ur targeted
no point of change passwords? they always finds out?
Thanks a lot 🙏 🎉
David bombal we dey look your videos always Nigeria ❤
Thank you! And welcome Nigeria!!
@davidbombal I really want become a hacker but unfortunately I don't know any programming language how do I do
werey wan hack tinubu
@@davidbombalسوي ترجمه لفيديوهاتك 😢
I rarely see this but sometimes my mouse moves fast and on its own towards the X button to close a window, it does nothing afterwards, and doesn't happen regularly, but would that be a malfunction or a hacker?
I appreciate this vid. Thank you both.
Thanks David my friend í just learned about this. I have a windows PC my Brother in law got used and I seen it's very slow and I seen this in task manager too. You got me to remember more. I been using the system from 2000 and yeah the hacker is right.. I'll tell my brother we need to delete windows it's not safe there spyware and malware in it. So I'll put linux on it no more windows garbage héhe thanks my friend. I wish you and me could chat il would love to learn from you and he'll who knows we learn from each other right.. 😊
David bombal a real chad 🔥
Great video, I see what ya done here.
hi i need help ....... how can i get help? police won't help me?
thanks for the video David!!
For studying network, what u suggest? Brilliant has courses of network? like OSI and TCP/IP etc? cheers
Thank you!
You're welcome!
thank you very informed
I kinda get the feeling that this guest could be a Hacker...maybe I am just being paranoid?
He's back! Great! 🎉
Hope you enjoyed the video!
Always. Thank you both 🙏
Thanks Chris for that guess.
basically backup your files ince a week or month . no way out :/
keep different password and longer ones