How Super Hackers Take Total Control With One Click🎙Darknet Diaries Ep. 82: Master of Pwn

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 216

  • @CONNECTSEOUK
    @CONNECTSEOUK Год назад +84

    This podcast singlehandedly beat covvid .
    now im studying Practical ethical hacking .
    Thanks Jack

    • @Synthematix
      @Synthematix Год назад

      Youre too stupid to be a hacker, posting a picture of yourself proves this.

  • @hangingwithvoid360
    @hangingwithvoid360 Год назад +120

    the VM exploit should have been well over 10 mill reward. That is the most devastating vulnerability. the entire point of a VM is so that you'll be safe while bug testing. Imagine the consequences.

    • @AfricanLionBat
      @AfricanLionBat Год назад

      ​@inannabanana4404criminally controlled?

    • @Binxalot
      @Binxalot Год назад +4

      No kidding, I wonder if it's possible to break out of a nested vm?

    • @seansingh4421
      @seansingh4421 5 месяцев назад

      Actually they were developed for serverspace first (VMware vSpehere, Proxmox) to maximize processing power while reducing hardware overhead. Pretty nifty tech actually and then it found its well earned place in cybersecurity.

  • @schizsec9886
    @schizsec9886 Год назад +34

    I'm currently studying Cybersecurity as a bachelor's program. I thank you Jack for the podcast as background for studies and when I do hacking challenges :)

    • @w花b
      @w花b Год назад +1

      Let's gooo

    • @trezy6040
      @trezy6040 Год назад

      do u have a socials I could use some help im not yet into college

  • @dreamchaser7559
    @dreamchaser7559 Год назад +38

    No computer is indeed secure.
    Once you become the target, your days are numbered.😢

    • @Stopinvadingmyhardware
      @Stopinvadingmyhardware Год назад +1

      Making terrorist threats?

    • @cooldude-ky4ni
      @cooldude-ky4ni Год назад +3

      @@Stopinvadingmyhardware probably a victim like myself, if someone wants in your system you can spend thousands trying to protect yourself... still had to format my rig.

  • @ruined5900
    @ruined5900 Год назад +14

    Love listening to this I even started listening to your old stuff writing foe your new stuff keep up the great work!

  • @gtccold
    @gtccold Год назад +6

    I literally checked your channel 20 mins ago for new content lol. I sleep now to this. Thank you

    • @shire-lee
      @shire-lee Год назад +2

      perfect sleep time background, i used to play cyberpunk to these podcasts and it felt so right

  • @timetraveler0002
    @timetraveler0002 Год назад +159

    if i become a hacker can i finally delete my internet history? 😂

    • @Hellohellohello803
      @Hellohellohello803 Год назад

      You can already do that dumbass. 😂

    • @zac2577
      @zac2577 Год назад +25

      Client side yes, server side never, however it would take a really skilled hacker for client side

    • @GrimMetropolis
      @GrimMetropolis Год назад +52

      Unfortunately, you're online. You've already lost. Welcome to the club

    • @trevorjohnson2168
      @trevorjohnson2168 Год назад +11

      Such a lame joke by now.. and if you need to become a hacker to delete your history, you should probably be in jail.

    • @varad6435
      @varad6435 Год назад +8

      U don't need to be a hAcKEr to delete ur browser's search history

  • @Keiphton27
    @Keiphton27 Год назад +7

    Best podcast out there.
    Keep doing what you do Jack!

  • @gregrodgers3350
    @gregrodgers3350 Год назад +2

    Good even down to the final seconds. Always enjoy the closing quips and music.

  • @myname-mz3lo
    @myname-mz3lo Год назад +8

    imagine getting 10k and a laptop for finding a zero day that is worth millions...

  • @headlights-go-up
    @headlights-go-up Год назад +12

    Thank you for all you do, Jack. I am forever a fan

  • @PeacelordApropos
    @PeacelordApropos Год назад +9

    Is it possible Jack is warning us that no website is safe. Ever?

    • @BarbaricaSkateboards
      @BarbaricaSkateboards Год назад +11

      Sounds like it... From my experience, the only way to protect yourself is to turn off your computer, unplug the battery, toss it into the trash, then live like the amish...

    • @serizawalimboo4668
      @serizawalimboo4668 Год назад +2

      @@BarbaricaSkateboards lol

  • @onradioactivewaves
    @onradioactivewaves Год назад +2

    4:03 "Microsoft Edge Bug" 👏 what a beautiful name for that heap of code 😂

  • @mikemeetstec
    @mikemeetstec Год назад +13

    Jack makes the best videos hands down.

    • @saygo-png
      @saygo-png Год назад +2

      He brings very experienced people on, just to talk about surface level information you could find reading page 1 search engine results. This podcast would be so much better if he actually used the knowledge of the guests instead of just using them as a cool prop.

    • @mikemeetstec
      @mikemeetstec Год назад +2

      @@saygo-png Everyone is entitled to their own opinion but I’d disagree. I feel you can truly tell he’s passionate about what he does and that’s the most inspiring aspect of his videos. Even if one doesn’t care about the topics he seems to bring them to life and makes you interested in Cybersecurity. That’s why I like his videos so much. I’d rather listen to him bring on entertaining guests on his show and explain what they’re saying in layman terms than a uninteresting lecture on the same topic where I don’t fully grasp on what’s being discussed.

    • @Entropy67
      @Entropy67 Год назад +3

      @@saygo-png if he wants it to work on RUclips, he has to make it comprehensible for the largest group of people. I wish there were more technical stuff too ...

    • @angtang01
      @angtang01 Год назад +3

      @@Entropy67 Yeah, I think the main purpose is to feed people with leads so they can take terms to search engines, many may find this stuff interesting as a hobby and just be casual.

    • @Entropy67
      @Entropy67 Год назад +1

      @@angtang01 and everyones at a different level of knowledge in their own path, so being as general as possible is best. I wish there was like an outtakes section or something where they could rant on more complex in-depth topics, but I'm not really complaining. These vidoes are already very entertaining.

  • @pjotrboboy900
    @pjotrboboy900 Год назад +1

    This is by far the best podcast out there! Thanks guys for such a well written and produced tech show. And im not even in tech. Bravo!

  • @CaseyStrouse
    @CaseyStrouse Год назад +2

    Nice to hear his voice! Those router hacking boys and their videos are awesome.

  • @ZoeyR86
    @ZoeyR86 Год назад +7

    The best hackers are the ones who are never known

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked Год назад +1

    As a bug bounty hunter, I can confirm (classic meme) that this is help for bug bounty is amazing. :3

  • @Lief_Erikson
    @Lief_Erikson Год назад +3

    Listening while working. Love your content.

  • @KTFCUTL
    @KTFCUTL Год назад +3

    Essentially they use their conference to "intern" out others hard work. They provide a "prize" but the attacks and all information gathered is prperty of the conference and it's owners. Therefore they can then turn around and sell the individual attackers hard work that took them months/years as security prevention information to the respective browser companies....

    • @myname-mz3lo
      @myname-mz3lo Год назад +2

      yep. 10k prize for a vulnerability that is worth millions

  • @0therun1t21
    @0therun1t21 Год назад +13

    That virtual machine escape is scary, damn!
    I just had another weird experience of some dude sitting in front of our house in his car, leaving right before dawn when I got up to take care of our animals, he drove down the street, turned around, came back and snapped his head around to stare at me while driving back by. I was at the back door while this happened so how did he know where I was in order to whip his head around to stare right at me? He must have been watchung our kitchen window. It was definitely strange, seems like something more than stealing our wi fi. I don't do anything wrong so I don't get it.
    I haven't noticed this kind of thing happening in several years. Maybe it's because I started talking to someone again because they owe me money, who knows, just wanted to document this in a public place.

    • @Legiitpwn
      @Legiitpwn Год назад +4

      Put some cameras up

    • @jaymethodus3421
      @jaymethodus3421 Год назад +2

      Don’t worry. We’re there to protect you. Carry on normally and all will be well.
      The Source has spoken.

    • @0therun1t21
      @0therun1t21 Год назад

      @@Legiitpwn Good idea.

    • @0therun1t21
      @0therun1t21 Год назад +1

      @@jaymethodus3421 Thank you, Source!

    • @JohnRobertPotter
      @JohnRobertPotter Год назад

      He probably grabbed your 4 way handshake if anything

  • @fsecofficial
    @fsecofficial Год назад

    I like it a lot better when you are being yourself man. It is a huge diff.

  • @surewhatever8843
    @surewhatever8843 Год назад +1

    If you’re an world class ethical hacker, how do you protect yourself from wealthy, powerful, and dangerous actors wanting/demanding your services?

  • @Entropy67
    @Entropy67 Год назад +5

    Wow, I really wanna join these guys but i don't really know where to start with reversing, idk, Firefox or something to find a vulnerability... I can barely understand my own programs reversed... compiler does some mysterious things. Or I need to learn more. 😥

    • @CipherAndre
      @CipherAndre Год назад +1

      I think they run decompilers that aren't perfect enough to recompile, but enough so to reverse engineer.. In this case to find working exploits. E. G MacBook air network exploit

    • @rakdosrok5816
      @rakdosrok5816 Год назад +1

      ​@@CipherAndreghidra is your friend there, or similar programs.

    • @rakdosrok5816
      @rakdosrok5816 Год назад +1

      With IT and OT industries, it's always about more and more learning is required. Which is one of the reasons I love the IT field. But if you're wanting/needing to decompile something ghidra will be your friend. Another tip. Osint osint osint. Research research research. It can be extremely mind meltingly boring at times but it's worth it when you find exactly what you're wanting/needing already made for you or at least poc'd at least a little.

    • @Entropy67
      @Entropy67 Год назад +1

      @@rakdosrok5816 Thankfully I'm getting a degree in computer science in a cybersecurity stream, hopefully I get to learn more systematically from there to supplement all of my self taught stuff. It can get dizzying, the sheer number of stuff that there is to learn, not knowing where to start. I feel just being active in picking up on new stuff and learning the fundamentals and commonly used tools (and their principles ofc) over time is building up a knowledge base in my head that I can rely on in the future. Just feels like an infinite process lol

  • @JaykPuten
    @JaykPuten Год назад +4

    Of course some hackers can't travel for particular reasons, like in some countries having a criminal record will not let you have a passport (like the US) some aren't interested in the title etc
    Saying who's the best hacker is like saying which religion is real while standing in Jerusalem, I'm pretty sure someone is gonna argue with you

  • @rugerdie4054
    @rugerdie4054 Год назад +10

    So these are some of the most expensive vulnerablities, too bad they can't submit the bug to a corporation via their dedicated BBPs.
    It's not a solution for the corporation. It's a solution for trend micro and they just happen to do good by providing information on vulnerabilities to the corporation it's going to affect.
    Corporation should still have a dedicated VDP and BBP along with continuous security testing via pen test depending on the corporations risk profile.
    Love your podcast brother.

  • @Nopejams
    @Nopejams Год назад

    YOU’RE THE MASTER OF KNOWLEDGE, INFORMATION OR INSIGHT! Let it be known!

  • @cygmoid
    @cygmoid 11 месяцев назад

    Man, sounds like cyber fiction. Amazing show

  • @the_good_news
    @the_good_news Год назад +2

    Finally my motivation routine for my 4.0 GPA let’s go

    • @shadowuaw-0001
      @shadowuaw-0001 Год назад +2

      I wish I knew, about the existence of half the careers this dude covers, when I was getting into junior year of high school, lol.

    • @noneofyourbusiness8625
      @noneofyourbusiness8625 Год назад +1

      ​@shadowuaw-0001 yeah I would of actually tried in school.. never had any direction

  • @IsaacSMILE
    @IsaacSMILE Год назад

    Background house music on this episode is very nice. (2 tracks)

  • @shadowuaw-0001
    @shadowuaw-0001 Год назад

    Once again, another absolutely epic one!

  • @__D222
    @__D222 Год назад +2

    We love the stories but it would be great if you could give solution or the way to avoid the problems mentioned Jack.

    • @SleepyMagii
      @SleepyMagii Год назад

      Learn more than you know now, become dangerous

  • @johngerken4263
    @johngerken4263 5 месяцев назад

    This takes E-Sports to a whole new level... 😅

  • @Iris_and_or_George
    @Iris_and_or_George Год назад

    23:20 He is associated with the gaming community and looks at things differently? He is a speedrunner for sure!

  • @Unpopularopinion1960
    @Unpopularopinion1960 Год назад +2

    If you win the competition you end up on the FBI watch list

    • @rakdosrok5816
      @rakdosrok5816 Год назад +1

      Oh it's much easier to get onto some kind of list than you think. Just searching for osint topics or exploits will flag your internet traffic automatically by the nsa and homeland, and if you gain enough flags then you get noted down as potential danger or as a possible asset. Nuclear topics are the easiest way to get onto a list, especially if you start learning out to build things...

  • @SuperShadowmetal
    @SuperShadowmetal Год назад

    nice story, thanks for it.

  • @Tchatarero36
    @Tchatarero36 Год назад

    Great Content ...

  • @officialghetty
    @officialghetty Год назад

    Listening from LA 🌴

  • @UsernamedJory
    @UsernamedJory Год назад

    It’s 11pm 🕚 on a hot rainy night in Chicago & I’m just 👀in’ for a story… long day = short attention span if ya know what I mean! Tried of death & distraction, who’s that kid… hacker dude, darknet that’s the one… my old time Radio 📻 of the 20th century replacement & eventually improvement… you’ve finally found a murder less mystery !🎉 & Much appreciated all around! Thanks 🙏

  • @CleVerCPO
    @CleVerCPO Год назад

    Amazing story 5:41

  • @bugs-lk3jf
    @bugs-lk3jf Год назад

    Great Content

  • @killitgameing658
    @killitgameing658 Год назад

    No click exploits like that are exactly why. Security researchers don't even use a traditional operating system. They typically use something like cubes OS, which is hyper compartmentized And I can understand why people might not want to go that far, but you also can't just use a regular VM either. Because you actually need to get a hardened VM that has the proper security measures and the proper shit in place Because here's something else that might blow a couple people's minds. A virtual machine usually is not a security tool. It's a compatibility tool. So, the vast majority of virtual machines are not designed to be secure.

  • @Trizzer89
    @Trizzer89 Год назад +1

    If they dont think they are the best, they can at least say they are the best transparent hackers in the world

  • @bassmechanic237
    @bassmechanic237 7 месяцев назад +1

    PWN is pronounced OWNED. The "p" instead of "o" was placed because it was ironic to misspell stuff on purpose back in the 90s, as O is next to P on a qwerty keyboard. Just like we spelled porn as pRon. This is just as bad as most people mispronouncing nuclear as new-ku-lur, library as lye-berry, and ask as axe. We arrived at Idiocracy once COVID hit. Average IQ is hovering in the low 90s these days lol.

  • @offensivewireless
    @offensivewireless 2 месяца назад

    Master Pedro!

  • @felymorenotarango3360
    @felymorenotarango3360 21 день назад

    The confortable numb ranking boutique the relax and parking of phantom

  • @GhidoraKidora
    @GhidoraKidora Год назад

    Is there a way where black jackets can submit the work they do, kind of like when a student submitted like a capstone project or a thesis paper or a combination of the two or all...

  • @VRTechSims
    @VRTechSims Год назад +2

    If you know of them, and their names or even their handles... then they ain't the best. 🤦‍♂
    The fact this needs to be explained.... 💩

  • @macmaniac3080
    @macmaniac3080 Год назад

    Big up to that massive background soundtrack!! 🎉😊

  • @Crftbt
    @Crftbt Год назад

    Please interview more competition winners. :)

  • @zac2577
    @zac2577 Год назад +2

    Ask google whos the best hacker they say kevin mitnick lol

  • @KenSherman
    @KenSherman Год назад

    Thought in another episode you referenced Kevin Mitnik was/is the greatest (all-time)?

  • @ianm00n
    @ianm00n Год назад

    Getting into host computer from virtual machine? that sounds crazy.

    • @nightmare5554
      @nightmare5554 11 месяцев назад

      Been possible for ages unfortunately

  • @Moochi4
    @Moochi4 Год назад

    I wanna see how a hacker gets past a antivirus like Kaspersky and Bitdefender it would be cool sense Kaspersky has system watcher and all that

  • @backgroundnoise__
    @backgroundnoise__ Год назад

    posted just as I started to work :)

  • @Pototoes949
    @Pototoes949 Год назад +1

    Razor and Blade are pretty good hackers

  • @KFLawless1412
    @KFLawless1412 Год назад +1

    Tesla hackers are so cool! I'm friends with some guys that have pwned Teslas at conferences before

  • @ERROR-Musik474
    @ERROR-Musik474 Год назад +1

    The best hacker is the one we don't know about.

  • @mejiqal
    @mejiqal 7 месяцев назад

    real hackers never protect their computers in the sense that people think, real hackers their computer from outside seem like ordinary computer with no protection and even not antivirus ...why??? because the moment your computer very well secured, you under scope..which mean you watched...because to secure computer well its not easy task...so the real deal hackers their computer under scaning look like ordinary computer...and under this conditions they do stuff secretly ...they basically blend their computers with all ordinary computers...

    • @LEKIPE1
      @LEKIPE1 5 месяцев назад

      Facts. An AV is like a spyware because they scan your PC all the time

  • @luvly8724
    @luvly8724 11 месяцев назад

    Hearing samsung got breached just breaks my heart

  • @KyleDownsFTW
    @KyleDownsFTW Год назад

    My man!

  • @maddercat
    @maddercat Год назад +1

    I don't know whether to be scared or inspired. lol

  • @Farrcast7
    @Farrcast7 5 месяцев назад

    whats the tracklist for this episode

  • @AckReikTheGreatest07
    @AckReikTheGreatest07 Год назад

    Have they found the NSA backdoor yet?

  • @radiosnmore
    @radiosnmore Год назад

    How do u defend against a screen overlay attack……. Happens at random….only visual cue is a slight dimming of the screen then back to regular when they stop …. Advice..

  • @SumBrennus
    @SumBrennus Год назад

    First line of this episode: Who is the world's greatest hacker? My GF pointed at me. She is so sweet she thinks I'm 733t.

    • @strat5520
      @strat5520 Год назад

      She thinks you're TEET ?

  • @Ricocase
    @Ricocase 2 месяца назад

    Does zdi grant cves?

  • @ministryoftruth2869
    @ministryoftruth2869 Год назад

    What's the best browser

  • @Airbornefighter-hr7lt
    @Airbornefighter-hr7lt 4 месяца назад

    How has this guy only got 320l subscribers,

  • @lukewi7186
    @lukewi7186 Год назад +1

    One click seems to be wildly underestimating the complexity of hacking

    • @noneofyourbusiness8625
      @noneofyourbusiness8625 Год назад

      It only takes one click from the victim to install a virus

    • @jpennel25
      @jpennel25 Год назад

      2 clicks

    • @--Morpheus--
      @--Morpheus-- Год назад +1

      So pegasus and pegasus2 arent as fancy as they are claimed to be? What exactly are you saying..?

    • @cw6043
      @cw6043 Год назад

      click one malicious link or notification ;)

  • @paulgreene9997
    @paulgreene9997 Год назад +1

    I think the best hackers in the world are people that will never enter a contest and will never be known to the general public.

  • @AbandonedVoid
    @AbandonedVoid Год назад +2

    Never knew Seth Rogen was into hacking

  • @bluntyful
    @bluntyful Год назад

    You guys are good 😊

  • @Tuffest_Leader
    @Tuffest_Leader Год назад

    I recognize GeoHot’s voice haha

  • @djombock
    @djombock Год назад

    Hi friend!!!

  • @FunnySNAIL-lp3hd
    @FunnySNAIL-lp3hd Год назад

    who is best? answers depend on their exploit kits

  • @local-admin
    @local-admin Год назад

    30:22 😮

  • @yanielo
    @yanielo Год назад

    whats with 0day broski?

  • @Stopinvadingmyhardware
    @Stopinvadingmyhardware Год назад

    Just wait until the real criminals get these exploits and then you too can get sexually assaulted and have your life ruined.

  • @2trains182
    @2trains182 Год назад +2

    Most hackers aren't real hackers...... most of them can't even hack the fbi lol!

  • @suntracker844
    @suntracker844 4 месяца назад

    Zerodium don't pay for all 0days only software of some vendors mostly FANG

  • @raddastronaut
    @raddastronaut 9 месяцев назад

    Ten cent.
    Of course they have one of the best teams 😂😂

  • @pipo3665
    @pipo3665 Месяц назад

    Pop Quiz Answer: John McAfee

  • @felymorenotarango3360
    @felymorenotarango3360 21 день назад

    Alter ego the book of training of bitcóin is pasatime

  • @DonteeWeaver
    @DonteeWeaver Год назад +1

    👀

  • @moonsoren9209
    @moonsoren9209 Год назад

    🎯 Key Takeaways for quick navigation:
    00:35 🌊 Flow is a mental state of effortless engagement, where time seems to fly by, distractions are minimized, and a sense of oneness with the task is experienced. It's linked to positive emotions, creativity, accomplishment, increased productivity, enhanced learning, and academic achievement.
    01:33 🧠 Flow is associated with specific changes in neural activity in regions related to attention, self-awareness, and self-consciousness, but many questions about its neuroscience remain.
    02:31 💡 Flow is more likely to occur in activities that are intrinsically motivating, strike a balance between personal skill level and challenge, and have clear goals with opportunities for assessing progress.
    03:59 ⚙️ To increase the chances of experiencing flow, create a quiet environment, break tasks into small segments, set challenging but achievable goals, and avoid focusing too much on achieving flow, as it may hinder the experience.
    Made with HARPA AI

    • @alexBaldman
      @alexBaldman Год назад

      Wrong fucking video idiot lol

  • @Monica-p2z7q
    @Monica-p2z7q Год назад

    That exactly what they did to me. Now I am totally ruined! What are you gonna do for me to be safe to just play games or even text anyone? Google keeps taking my pictures that are showing the hacks or the PsycOp's the government are doing to me. Do I just ignore these things?! Ass holes! Hackers suck because I am Not secure at all!!

  • @stelios2223
    @stelios2223 Год назад

    👏

  • @kec420
    @kec420 Год назад

    This guy sounds like seth rogen lol

  • @user-xn2rn4xy3v
    @user-xn2rn4xy3v Год назад

    Uploading at 3am EST, smh.

  • @theepharmacy7424
    @theepharmacy7424 Год назад

    Guys am going to be a black hat 😂 hacker ☣️

  • @myname-mz3lo
    @myname-mz3lo Год назад +1

    this company incentivises corporations not to pay out for zero days because now they can get em for free...

  • @noanyobiseniss7462
    @noanyobiseniss7462 Год назад +1

    120 days is FAR too long.

  • @blissbyrne
    @blissbyrne Год назад

    Trend Micro 4 evs .

  • @StrapDraco
    @StrapDraco Год назад

    ok i need some help
    so my roblox account just got hacked and i want to pull the person who did it ip and get all the info back to my account and the roblox pin but idk how to please someone help

  • @alanzamora6504
    @alanzamora6504 Год назад

    Great work dude * excellent _ the ( net ) is just a ( web ) * once you get caught _ is like a labyrinth program inside a ( maze ) * best way is ( not ) to go in ( but ) ....?

  • @jchastain789
    @jchastain789 Год назад

    Mf crazy. Awesome

  • @nas8326
    @nas8326 Год назад

    Jack sounds like Ai kinda effeminate Ai negl

  • @dozi3r
    @dozi3r 8 месяцев назад

    Had to down thumb to hopefully get the algo to rec a different video. I've heard this one so many times because of autoplay

  • @KBMecom
    @KBMecom 6 дней назад

    russians u know...