How Super Hackers Take Total Control With One Click🎙Darknet Diaries Ep. 82: Master of Pwn

Поделиться
HTML-код
  • Опубликовано: 28 июн 2023
  • The Pwn2Own contest challenges the world's greatest hackers to find vulnerabilities in common software, phones, and OSes -- and tech companies pay big bucks for it.
    Visit darknetdiaries.com/episode/82/ for a list of sources, full transcripts, and to listen to all episodes.
  • НаукаНаука

Комментарии • 209

  • @zaelectricalltd1
    @zaelectricalltd1 Год назад +74

    This podcast singlehandedly beat covvid .
    now im studying Practical ethical hacking .
    Thanks Jack

    • @Synthematix
      @Synthematix Год назад

      Youre too stupid to be a hacker, posting a picture of yourself proves this.

  • @hangingwithvoid360
    @hangingwithvoid360 Год назад +107

    the VM exploit should have been well over 10 mill reward. That is the most devastating vulnerability. the entire point of a VM is so that you'll be safe while bug testing. Imagine the consequences.

    • @AfricanLionBat
      @AfricanLionBat 9 месяцев назад

      ​@inannabanana4404criminally controlled?

    • @Binxalot
      @Binxalot 8 месяцев назад +1

      No kidding, I wonder if it's possible to break out of a nested vm?

    • @seansingh4421
      @seansingh4421 Месяц назад

      Actually they were developed for serverspace first (VMware vSpehere, Proxmox) to maximize processing power while reducing hardware overhead. Pretty nifty tech actually and then it found its well earned place in cybersecurity.

  • @dreamchaser7559
    @dreamchaser7559 Год назад +29

    No computer is indeed secure.
    Once you become the target, your days are numbered.😢

    • @Stopinvadingmyhardware
      @Stopinvadingmyhardware Год назад +1

      Making terrorist threats?

    • @cooldude-ky4ni
      @cooldude-ky4ni Год назад +2

      @@Stopinvadingmyhardware probably a victim like myself, if someone wants in your system you can spend thousands trying to protect yourself... still had to format my rig.

  • @schizsec9886
    @schizsec9886 Год назад +32

    I'm currently studying Cybersecurity as a bachelor's program. I thank you Jack for the podcast as background for studies and when I do hacking challenges :)

    • @w花b
      @w花b Год назад +1

      Let's gooo

    • @trezy6040
      @trezy6040 11 месяцев назад

      do u have a socials I could use some help im not yet into college

  • @gtccold
    @gtccold Год назад +6

    I literally checked your channel 20 mins ago for new content lol. I sleep now to this. Thank you

    • @shire-lee
      @shire-lee Год назад +2

      perfect sleep time background, i used to play cyberpunk to these podcasts and it felt so right

  • @ruined5900
    @ruined5900 Год назад +14

    Love listening to this I even started listening to your old stuff writing foe your new stuff keep up the great work!

  • @Keiphton27
    @Keiphton27 Год назад +7

    Best podcast out there.
    Keep doing what you do Jack!

  • @gregrodgers3350
    @gregrodgers3350 Год назад +2

    Good even down to the final seconds. Always enjoy the closing quips and music.

  • @onradioactivewaves
    @onradioactivewaves Год назад +2

    4:03 "Microsoft Edge Bug" 👏 what a beautiful name for that heap of code 😂

  • @headlights-go-up
    @headlights-go-up Год назад +12

    Thank you for all you do, Jack. I am forever a fan

  • @Lief_Erikson
    @Lief_Erikson Год назад +3

    Listening while working. Love your content.

  • @myname-mz3lo
    @myname-mz3lo Год назад +6

    imagine getting 10k and a laptop for finding a zero day that is worth millions...

  • @shadowuaw-0001
    @shadowuaw-0001 Год назад

    Once again, another absolutely epic one!

  • @CaseyStrouse
    @CaseyStrouse Год назад +2

    Nice to hear his voice! Those router hacking boys and their videos are awesome.

  • @timetraveler0002
    @timetraveler0002 Год назад +144

    if i become a hacker can i finally delete my internet history? 😂

    • @Hellohellohello803
      @Hellohellohello803 Год назад

      You can already do that dumbass. 😂

    • @zac2577
      @zac2577 Год назад +22

      Client side yes, server side never, however it would take a really skilled hacker for client side

    • @GrimMetropolis
      @GrimMetropolis Год назад +45

      Unfortunately, you're online. You've already lost. Welcome to the club

    • @trevorjohnson2168
      @trevorjohnson2168 Год назад +10

      Such a lame joke by now.. and if you need to become a hacker to delete your history, you should probably be in jail.

    • @varad6435
      @varad6435 Год назад +7

      U don't need to be a hAcKEr to delete ur browser's search history

  • @pjotrboboy900
    @pjotrboboy900 Год назад +1

    This is by far the best podcast out there! Thanks guys for such a well written and produced tech show. And im not even in tech. Bravo!

  • @PeacelordApropos
    @PeacelordApropos Год назад +8

    Is it possible Jack is warning us that no website is safe. Ever?

    • @BarbaricaSkateboards
      @BarbaricaSkateboards Год назад +8

      Sounds like it... From my experience, the only way to protect yourself is to turn off your computer, unplug the battery, toss it into the trash, then live like the amish...

    • @serizawalimboo4668
      @serizawalimboo4668 Год назад +1

      @@BarbaricaSkateboards lol

  • @ZoeyR86
    @ZoeyR86 Год назад +5

    The best hackers are the ones who are never known

  • @mikemeetstec
    @mikemeetstec Год назад +13

    Jack makes the best videos hands down.

    • @saygo-png
      @saygo-png Год назад +2

      He brings very experienced people on, just to talk about surface level information you could find reading page 1 search engine results. This podcast would be so much better if he actually used the knowledge of the guests instead of just using them as a cool prop.

    • @mikemeetstec
      @mikemeetstec Год назад +2

      @@saygo-png Everyone is entitled to their own opinion but I’d disagree. I feel you can truly tell he’s passionate about what he does and that’s the most inspiring aspect of his videos. Even if one doesn’t care about the topics he seems to bring them to life and makes you interested in Cybersecurity. That’s why I like his videos so much. I’d rather listen to him bring on entertaining guests on his show and explain what they’re saying in layman terms than a uninteresting lecture on the same topic where I don’t fully grasp on what’s being discussed.

    • @Entropy67
      @Entropy67 Год назад +3

      @@saygo-png if he wants it to work on RUclips, he has to make it comprehensible for the largest group of people. I wish there were more technical stuff too ...

    • @angtang01
      @angtang01 Год назад +3

      @@Entropy67 Yeah, I think the main purpose is to feed people with leads so they can take terms to search engines, many may find this stuff interesting as a hobby and just be casual.

    • @Entropy67
      @Entropy67 Год назад +1

      @@angtang01 and everyones at a different level of knowledge in their own path, so being as general as possible is best. I wish there was like an outtakes section or something where they could rant on more complex in-depth topics, but I'm not really complaining. These vidoes are already very entertaining.

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked Год назад +1

    As a bug bounty hunter, I can confirm (classic meme) that this is help for bug bounty is amazing. :3

  • @SuperShadowmetal
    @SuperShadowmetal Год назад

    nice story, thanks for it.

  • @Tchatarero36
    @Tchatarero36 Год назад

    Great Content ...

  • @bugs-lk3jf
    @bugs-lk3jf Год назад

    Great Content

  • @fsecofficial
    @fsecofficial 11 месяцев назад

    I like it a lot better when you are being yourself man. It is a huge diff.

  • @GhidoraKidora
    @GhidoraKidora Год назад

    Is there a way where black jackets can submit the work they do, kind of like when a student submitted like a capstone project or a thesis paper or a combination of the two or all...

  • @officialghetty
    @officialghetty Год назад

    Listening from LA 🌴

  • @0therun1t21
    @0therun1t21 Год назад +11

    That virtual machine escape is scary, damn!
    I just had another weird experience of some dude sitting in front of our house in his car, leaving right before dawn when I got up to take care of our animals, he drove down the street, turned around, came back and snapped his head around to stare at me while driving back by. I was at the back door while this happened so how did he know where I was in order to whip his head around to stare right at me? He must have been watchung our kitchen window. It was definitely strange, seems like something more than stealing our wi fi. I don't do anything wrong so I don't get it.
    I haven't noticed this kind of thing happening in several years. Maybe it's because I started talking to someone again because they owe me money, who knows, just wanted to document this in a public place.

    • @Legiitpwn
      @Legiitpwn Год назад +4

      Put some cameras up

    • @jaymethodus3421
      @jaymethodus3421 Год назад +2

      Don’t worry. We’re there to protect you. Carry on normally and all will be well.
      The Source has spoken.

    • @0therun1t21
      @0therun1t21 Год назад

      @@Legiitpwn Good idea.

    • @0therun1t21
      @0therun1t21 Год назад +1

      @@jaymethodus3421 Thank you, Source!

    • @JohnRobertPotter
      @JohnRobertPotter Год назад

      He probably grabbed your 4 way handshake if anything

  • @cygmoid
    @cygmoid 7 месяцев назад

    Man, sounds like cyber fiction. Amazing show

  • @johngerken4263
    @johngerken4263 Месяц назад

    This takes E-Sports to a whole new level... 😅

  • @backgroundnoise__
    @backgroundnoise__ Год назад

    posted just as I started to work :)

  • @IsaacSMILE
    @IsaacSMILE Год назад

    Background house music on this episode is very nice. (2 tracks)

  • @JaykPuten
    @JaykPuten Год назад +4

    Of course some hackers can't travel for particular reasons, like in some countries having a criminal record will not let you have a passport (like the US) some aren't interested in the title etc
    Saying who's the best hacker is like saying which religion is real while standing in Jerusalem, I'm pretty sure someone is gonna argue with you

  • @CleVerCPO
    @CleVerCPO Год назад

    Amazing story 5:41

  • @surewhatever8843
    @surewhatever8843 10 месяцев назад +1

    If you’re an world class ethical hacker, how do you protect yourself from wealthy, powerful, and dangerous actors wanting/demanding your services?

  • @Entropy67
    @Entropy67 Год назад +4

    Wow, I really wanna join these guys but i don't really know where to start with reversing, idk, Firefox or something to find a vulnerability... I can barely understand my own programs reversed... compiler does some mysterious things. Or I need to learn more. 😥

    • @CipherAndre
      @CipherAndre Год назад +1

      I think they run decompilers that aren't perfect enough to recompile, but enough so to reverse engineer.. In this case to find working exploits. E. G MacBook air network exploit

    • @rakdosrok5816
      @rakdosrok5816 Год назад +1

      ​@@CipherAndreghidra is your friend there, or similar programs.

    • @rakdosrok5816
      @rakdosrok5816 Год назад +1

      With IT and OT industries, it's always about more and more learning is required. Which is one of the reasons I love the IT field. But if you're wanting/needing to decompile something ghidra will be your friend. Another tip. Osint osint osint. Research research research. It can be extremely mind meltingly boring at times but it's worth it when you find exactly what you're wanting/needing already made for you or at least poc'd at least a little.

    • @Entropy67
      @Entropy67 Год назад +1

      @@rakdosrok5816 Thankfully I'm getting a degree in computer science in a cybersecurity stream, hopefully I get to learn more systematically from there to supplement all of my self taught stuff. It can get dizzying, the sheer number of stuff that there is to learn, not knowing where to start. I feel just being active in picking up on new stuff and learning the fundamentals and commonly used tools (and their principles ofc) over time is building up a knowledge base in my head that I can rely on in the future. Just feels like an infinite process lol

  • @KyleDownsFTW
    @KyleDownsFTW Год назад

    My man!

  • @Iris_and_or_George
    @Iris_and_or_George Год назад

    23:20 He is associated with the gaming community and looks at things differently? He is a speedrunner for sure!

  • @UsernamedJory
    @UsernamedJory Год назад

    It’s 11pm 🕚 on a hot rainy night in Chicago & I’m just 👀in’ for a story… long day = short attention span if ya know what I mean! Tried of death & distraction, who’s that kid… hacker dude, darknet that’s the one… my old time Radio 📻 of the 20th century replacement & eventually improvement… you’ve finally found a murder less mystery !🎉 & Much appreciated all around! Thanks 🙏

  • @__D222
    @__D222 Год назад +2

    We love the stories but it would be great if you could give solution or the way to avoid the problems mentioned Jack.

    • @SleepyMagii
      @SleepyMagii 10 месяцев назад

      Learn more than you know now, become dangerous

  • @KTFCUTL
    @KTFCUTL Год назад +2

    Essentially they use their conference to "intern" out others hard work. They provide a "prize" but the attacks and all information gathered is prperty of the conference and it's owners. Therefore they can then turn around and sell the individual attackers hard work that took them months/years as security prevention information to the respective browser companies....

    • @myname-mz3lo
      @myname-mz3lo Год назад +2

      yep. 10k prize for a vulnerability that is worth millions

  • @KenSherman
    @KenSherman Год назад

    Thought in another episode you referenced Kevin Mitnik was/is the greatest (all-time)?

  • @the_good_news
    @the_good_news Год назад +2

    Finally my motivation routine for my 4.0 GPA let’s go

    • @shadowuaw-0001
      @shadowuaw-0001 Год назад +2

      I wish I knew, about the existence of half the careers this dude covers, when I was getting into junior year of high school, lol.

    • @noneofyourbusiness8625
      @noneofyourbusiness8625 Год назад +1

      ​@shadowuaw-0001 yeah I would of actually tried in school.. never had any direction

  • @Crftbt
    @Crftbt Год назад

    Please interview more competition winners. :)

  • @Godlovesu591
    @Godlovesu591 Год назад +2

    If you win the competition you end up on the FBI watch list

    • @rakdosrok5816
      @rakdosrok5816 Год назад +1

      Oh it's much easier to get onto some kind of list than you think. Just searching for osint topics or exploits will flag your internet traffic automatically by the nsa and homeland, and if you gain enough flags then you get noted down as potential danger or as a possible asset. Nuclear topics are the easiest way to get onto a list, especially if you start learning out to build things...

  • @zac2577
    @zac2577 Год назад +2

    Ask google whos the best hacker they say kevin mitnick lol

  • @nobodyO1
    @nobodyO1 Год назад +2

    If you know of them, and their names or even their handles... then they ain't the best. 🤦‍♂
    The fact this needs to be explained.... 💩

  • @Nopejams
    @Nopejams Год назад

    YOU’RE THE MASTER OF KNOWLEDGE, INFORMATION OR INSIGHT! Let it be known!

  • @Pototoes949
    @Pototoes949 Год назад +1

    Razor and Blade are pretty good hackers

  • @Farrcast7
    @Farrcast7 Месяц назад

    whats the tracklist for this episode

  • @radiosnmore
    @radiosnmore Год назад

    How do u defend against a screen overlay attack……. Happens at random….only visual cue is a slight dimming of the screen then back to regular when they stop …. Advice..

  • @maddercat
    @maddercat Год назад +1

    I don't know whether to be scared or inspired. lol

  • @KFLawless1412
    @KFLawless1412 Год назад +1

    Tesla hackers are so cool! I'm friends with some guys that have pwned Teslas at conferences before

  • @rugerdie4054
    @rugerdie4054 Год назад +10

    So these are some of the most expensive vulnerablities, too bad they can't submit the bug to a corporation via their dedicated BBPs.
    It's not a solution for the corporation. It's a solution for trend micro and they just happen to do good by providing information on vulnerabilities to the corporation it's going to affect.
    Corporation should still have a dedicated VDP and BBP along with continuous security testing via pen test depending on the corporations risk profile.
    Love your podcast brother.

  • @Anon_1003
    @Anon_1003 Год назад

    Have they found the NSA backdoor yet?

  • @Moochi4
    @Moochi4 Год назад

    I wanna see how a hacker gets past a antivirus like Kaspersky and Bitdefender it would be cool sense Kaspersky has system watcher and all that

  • @macmaniac3080
    @macmaniac3080 Год назад

    Big up to that massive background soundtrack!! 🎉😊

  • @djombock
    @djombock Год назад

    Hi friend!!!

  • @ministryoftruth2869
    @ministryoftruth2869 Год назад

    What's the best browser

  • @Trizzer89
    @Trizzer89 Год назад +1

    If they dont think they are the best, they can at least say they are the best transparent hackers in the world

  • @ERROR-Musik404
    @ERROR-Musik404 Год назад +1

    The best hacker is the one we don't know about.

  • @killitgameing658
    @killitgameing658 9 месяцев назад

    No click exploits like that are exactly why. Security researchers don't even use a traditional operating system. They typically use something like cubes OS, which is hyper compartmentized And I can understand why people might not want to go that far, but you also can't just use a regular VM either. Because you actually need to get a hardened VM that has the proper security measures and the proper shit in place Because here's something else that might blow a couple people's minds. A virtual machine usually is not a security tool. It's a compatibility tool. So, the vast majority of virtual machines are not designed to be secure.

  • @bassmechanic237
    @bassmechanic237 4 месяца назад +1

    PWN is pronounced OWNED. The "p" instead of "o" was placed because it was ironic to misspell stuff on purpose back in the 90s, as O is next to P on a qwerty keyboard. Just like we spelled porn as pRon. This is just as bad as most people mispronouncing nuclear as new-ku-lur, library as lye-berry, and ask as axe. We arrived at Idiocracy once COVID hit. Average IQ is hovering in the low 90s these days lol.

  • @bluntyful
    @bluntyful Год назад

    You guys are good 😊

  • @luvly8724
    @luvly8724 7 месяцев назад

    Hearing samsung got breached just breaks my heart

  • @Airbornefighter-hr7lt
    @Airbornefighter-hr7lt 14 дней назад

    How has this guy only got 320l subscribers,

  • @local-admin
    @local-admin Год назад

    30:22 😮

  • @ianm00n
    @ianm00n 11 месяцев назад

    Getting into host computer from virtual machine? that sounds crazy.

    • @nightmare5554
      @nightmare5554 7 месяцев назад

      Been possible for ages unfortunately

  • @Tuffest_Leader
    @Tuffest_Leader Год назад

    I recognize GeoHot’s voice haha

  • @FunnySNAIL-lp3hd
    @FunnySNAIL-lp3hd Год назад

    who is best? answers depend on their exploit kits

  • @raddastronaut
    @raddastronaut 6 месяцев назад

    Ten cent.
    Of course they have one of the best teams 😂😂

  • @yanielo
    @yanielo Год назад

    whats with 0day broski?

  • @SumBrennus
    @SumBrennus Год назад

    First line of this episode: Who is the world's greatest hacker? My GF pointed at me. She is so sweet she thinks I'm 733t.

    • @strat5520
      @strat5520 10 месяцев назад

      She thinks you're TEET ?

  • @mejiqal
    @mejiqal 3 месяца назад

    real hackers never protect their computers in the sense that people think, real hackers their computer from outside seem like ordinary computer with no protection and even not antivirus ...why??? because the moment your computer very well secured, you under scope..which mean you watched...because to secure computer well its not easy task...so the real deal hackers their computer under scaning look like ordinary computer...and under this conditions they do stuff secretly ...they basically blend their computers with all ordinary computers...

    • @LEKIPE1
      @LEKIPE1 Месяц назад

      Facts. An AV is like a spyware because they scan your PC all the time

  • @user-hx5ux5ti4h
    @user-hx5ux5ti4h 11 месяцев назад

    That exactly what they did to me. Now I am totally ruined! What are you gonna do for me to be safe to just play games or even text anyone? Google keeps taking my pictures that are showing the hacks or the PsycOp's the government are doing to me. Do I just ignore these things?! Ass holes! Hackers suck because I am Not secure at all!!

  • @2trains182
    @2trains182 Год назад +2

    Most hackers aren't real hackers...... most of them can't even hack the fbi lol!

  • @stelios2223
    @stelios2223 Год назад

    👏

  • @lukewi7186
    @lukewi7186 Год назад +1

    One click seems to be wildly underestimating the complexity of hacking

    • @noneofyourbusiness8625
      @noneofyourbusiness8625 Год назад

      It only takes one click from the victim to install a virus

    • @jpennel25
      @jpennel25 Год назад

      2 clicks

    • @--Morpheus--
      @--Morpheus-- Год назад +1

      So pegasus and pegasus2 arent as fancy as they are claimed to be? What exactly are you saying..?

    • @cw6043
      @cw6043 9 месяцев назад

      click one malicious link or notification ;)

  • @AbandonedVoid
    @AbandonedVoid Год назад +2

    Never knew Seth Rogen was into hacking

  • @DonteeWeaver
    @DonteeWeaver Год назад +1

    👀

  • @StrapDraco
    @StrapDraco Год назад

    ok i need some help
    so my roblox account just got hacked and i want to pull the person who did it ip and get all the info back to my account and the roblox pin but idk how to please someone help

  • @kec420
    @kec420 Год назад

    This guy sounds like seth rogen lol

  • @moonsoren9209
    @moonsoren9209 Год назад

    🎯 Key Takeaways for quick navigation:
    00:35 🌊 Flow is a mental state of effortless engagement, where time seems to fly by, distractions are minimized, and a sense of oneness with the task is experienced. It's linked to positive emotions, creativity, accomplishment, increased productivity, enhanced learning, and academic achievement.
    01:33 🧠 Flow is associated with specific changes in neural activity in regions related to attention, self-awareness, and self-consciousness, but many questions about its neuroscience remain.
    02:31 💡 Flow is more likely to occur in activities that are intrinsically motivating, strike a balance between personal skill level and challenge, and have clear goals with opportunities for assessing progress.
    03:59 ⚙️ To increase the chances of experiencing flow, create a quiet environment, break tasks into small segments, set challenging but achievable goals, and avoid focusing too much on achieving flow, as it may hinder the experience.
    Made with HARPA AI

    • @alexBaldman
      @alexBaldman Год назад

      Wrong fucking video idiot lol

  • @noanyobiseniss7462
    @noanyobiseniss7462 Год назад +1

    120 days is FAR too long.

  • @paulgreene9997
    @paulgreene9997 Год назад +1

    I think the best hackers in the world are people that will never enter a contest and will never be known to the general public.

  • @theepharmacy7424
    @theepharmacy7424 Год назад

    Guys am going to be a black hat 😂 hacker ☣️

  • @Stopinvadingmyhardware
    @Stopinvadingmyhardware Год назад

    Just wait until the real criminals get these exploits and then you too can get sexually assaulted and have your life ruined.

  • @blissbyrne
    @blissbyrne Год назад

    Trend Micro 4 evs .

  • @user-xn2rn4xy3v
    @user-xn2rn4xy3v Год назад

    Uploading at 3am EST, smh.

  • @jchastain789
    @jchastain789 Год назад

    Mf crazy. Awesome

  • @nas8326
    @nas8326 Год назад

    Jack sounds like Ai kinda effeminate Ai negl

  • @dhruvgulati1667
    @dhruvgulati1667 Год назад +1

    First here

  • @FundingSecured
    @FundingSecured Год назад +1

    First!

  • @myname-mz3lo
    @myname-mz3lo Год назад +1

    this company incentivises corporations not to pay out for zero days because now they can get em for free...

  • @linusgoblin
    @linusgoblin Год назад

    Jack i deeply love your podcast but its so annoying to me that when i got a notification and get hyped 9/10 its an old episode i already listened. Can you explain why you do these reuploads?

  • @48512
    @48512 Год назад

    If your a financially wealthy hacker can you give me $100k im trying to get a farm here in the Philippines

    • @ImARealHumanPerson
      @ImARealHumanPerson Год назад +2

      Lmao

    • @48512
      @48512 Год назад

      Not kidding either. Fuck laughing it's sad when hackers get caught with a shitload of cash or crypto and gets forfeited back to the government. Might us we'll help me out or anyone that will put it too good use hell I'll put your own money on your books for commissary if shtf or when it's needed I don't need flashy cars or clothes just a farmland where I can build a home fruit bearing trees well water plenty right here in the islands one more if your in the run crash at my place pretty good investment a rich hacker can afford

    • @671Neuhof
      @671Neuhof Год назад

      Ok send me your PayPal

  • @dozi3r
    @dozi3r 5 месяцев назад

    Had to down thumb to hopefully get the algo to rec a different video. I've heard this one so many times because of autoplay

  • @alanzamora6504
    @alanzamora6504 Год назад

    Great work dude * excellent _ the ( net ) is just a ( web ) * once you get caught _ is like a labyrinth program inside a ( maze ) * best way is ( not ) to go in ( but ) ....?

  • @millacentbystander2992
    @millacentbystander2992 Год назад

    Come on bro the Hispanic community needs a win!
    Own that shit ....well done bro.

  • @hugofrederico7054
    @hugofrederico7054 Год назад

    Pls stop t troll...