Hacking challenge at DEFCON

Поделиться
HTML-код
  • Опубликовано: 12 дек 2024

Комментарии • 970

  • @yuvadeep8
    @yuvadeep8 5 лет назад +1611

    The biggest threat is not the security of technologies, its the people.

    • @skatterpro
      @skatterpro 4 года назад +13

      Absolutely true. It's easier to mitigate hardware and software exploits than to educate the entire population, and have it adhere to its lessons though.
      But both are absolutely necessary.

    • @paulonjog
      @paulonjog 4 года назад +5

      Isn't that what makes human engineering so much fun though?

    • @skatterpro
      @skatterpro 4 года назад +1

      @@paulonjog No, that's what makes social engineering so disappointing and anxiety inducing.

    • @bharath_mangalore
      @bharath_mangalore 4 года назад

      What about AI

    • @Alessandro-hu4iy
      @Alessandro-hu4iy 4 года назад

      well said... people like to outsource everything even their personal data security.

  • @raz0u
    @raz0u 4 года назад +2655

    "I can make you homeless",
    This line took the reporter to an another level of misery.. 😂

    • @willamskaren5312
      @willamskaren5312 4 года назад +5

      Razou Noudi I never believe it when I saw a comment about hackjamal1 on Instagram until he helps me recover my old account you can try him too

    • @theartistformerlyknownaspi4068
      @theartistformerlyknownaspi4068 4 года назад +36

      Blonde Lady: "i can make someone who works at your cellphone company's support department homeless"

    • @troyserapio485
      @troyserapio485 4 года назад +3

      It reminds him of who he is...

    • @linuxservices3195
      @linuxservices3195 4 года назад

      ruclips.net/video/C7NwhkeYR0Y/видео.html

    • @ashemgold
      @ashemgold 4 года назад +3

      @@mainejhaku5615 How do you know hackertin00 is a man? Could be just like Trinity that hacked the IRS D-base. Neo said with his best Keanu Reeves impersonation "I thought you were a guy". "Most guys do!" bwahhhaah

  • @dandeeteeyem2170
    @dandeeteeyem2170 4 года назад +111

    Best live demo of social engineering ever... Girl has skills 😍

  • @allancohen
    @allancohen 4 года назад +171

    I have to admit that when my dad passed away years ago (and so does POA at that time) all honest attempts to get access to accounts to get my mom all setup almost all failed. I quickly learned to, "Be my dad". and I was able to gain access to almost all accounts so my mom had as smooth a transition to being the account(s) holder as possible.

  • @diwakardayal954
    @diwakardayal954 4 года назад +865

    Imagine Using the Cry baby sound all of the sudden, an Ad starts to play 😂

  • @rvxn
    @rvxn 4 года назад +868

    Netflix wants to know that woman's location

    • @aty4282
      @aty4282 4 года назад +24

      We found *the daughter*

    • @rvxn
      @rvxn 4 года назад +12

      @Stephen Muller lol looks like we got some msfvenom kids

    • @aty4282
      @aty4282 4 года назад

      @@rvxn or a big elaborate scam lmao

    • @abduljabbarissiak5585
      @abduljabbarissiak5585 4 года назад +11

      Very soon when Netflix find her. A new movie; The mom Hacker

    • @regamename
      @regamename 4 года назад +2

      JAMTARA 😂😁

  • @827023685
    @827023685 6 лет назад +1914

    that vissing woman is goood... i mean her skills.

    • @milindm9634
      @milindm9634 6 лет назад +59

      Thanks for d clarification 😂😂😉

    • @winskykusuma5127
      @winskykusuma5127 5 лет назад +65

      Its phishing

    • @abbudi222
      @abbudi222 5 лет назад +92

      he said it correctly, vishing is using your voice to get information rather than text

    • @samuelromansantos5473
      @samuelromansantos5473 4 года назад +12

      Jessica has the good looks

    • @westernvibes1267
      @westernvibes1267 4 года назад +29

      @@trtrhr you sure you wouldn't fall for a social engineering attack from a red teamer or a professional black hat?

  • @anees_ahmad_pazhayidath
    @anees_ahmad_pazhayidath 4 года назад +145

    😂 Imagine this guys wife being the support staff that answers the call.

    • @atlantic_love
      @atlantic_love 4 года назад +1

      That would be some funny, funny schit :D

    • @vladiiidracula235
      @vladiiidracula235 3 года назад +3

      Damn, bots going hard on this video

    • @redacted5035
      @redacted5035 3 года назад +1

      @@vladiiidracula235 nah dude Hackertin00 is legit 😏

  • @SeekerofTruth1
    @SeekerofTruth1 4 года назад +624

    In my opinion what women did only works with a very bad provider, good tech support never break protocol even if your crying children is dying.

    • @techzone2009
      @techzone2009 4 года назад +25

      😂😂

    • @mrunfunny
      @mrunfunny 4 года назад +180

      Well, twitter was recently hacked with the exact same technique

    • @parthpatel9602
      @parthpatel9602 4 года назад

      @@mrunfunny 😂😂

    • @parthpatel9602
      @parthpatel9602 4 года назад +57

      @@mrunfunny we'll your security is only as powerful as your weakest link so the representative if they are emotionally dumb we are ducked

    • @somilmishra9192
      @somilmishra9192 4 года назад +5

      @@mrunfunny it used social engineering, but they didn't use a baby afaik

  • @BharathRamMS
    @BharathRamMS 4 года назад +44

    I watched this video 'coz it wouldn't go off my recommended list. It was totally worth watching. A wake-up call to every one of us.

    • @jacksonphillip7916
      @jacksonphillip7916 4 года назад

      Hello, Are you willing to earn up to $7,000 weekly by yourself without sending your money to anyone? Interested persons only. 100% guaranteed...+17252151143

  • @Smidday1
    @Smidday1 4 года назад +87

    I’ve worked in a lot of call centres and you’re always told you can’t speak to someone not named on the account no matter what, this person will probably lose there job

    • @Anti-FreedomD.P.R.ofSouthKorea
      @Anti-FreedomD.P.R.ofSouthKorea 2 года назад +7

      Maybe not for that company. In fact up until not long ago such policies weren't a practice in every major or minor companies so people that dox or hack would gain access to the ISP- as shown in this video then take advantage

    • @Ms.Robot.
      @Ms.Robot. Год назад +6

      This episode happened more than 4 years before your post. Security was more lax then.

    • @antond5846
      @antond5846 Год назад +3

      as they should

  • @troys1426
    @troys1426 4 года назад +184

    This guy is in such a risk, like imagine if one of them betrays him...

    • @chltebano8892
      @chltebano8892 4 года назад +2

      This thought gave me anxiety for him.

    • @AethersHill
      @AethersHill 4 года назад +16

      I don't think he's at much risk from these people. They agreed to participate most likely to help bring awareness that things like this can and do happen.

    • @aniketroy03
      @aniketroy03 4 года назад +6

      Among Us

    • @damileftmewiglessinboca7894
      @damileftmewiglessinboca7894 4 года назад

      @@aniketroy03 😏😏🤣🤣

  • @iamajmalhassan
    @iamajmalhassan 4 года назад +39

    This is what my neighbours think of me when I say that I'm a software engineer.

  • @googleyoutubechannel8554
    @googleyoutubechannel8554 4 года назад +539

    So not only did Kevin Roose, a long time tech-writer, click on a phishing email link that came from some random url different than the one it claimed to, he used an insecure browser that had an active exploit serious enough that it allowed arbitrary fake login prompts to appear in the future. Kevin then ALSO never noticed the fake login prompts even once and filled in his credentials into the fake prompts repeatedly? Kevin also somehow does not have 2FA set up on his lastpass account (which is impossible)?!
    OR, or... just possibly this is BS made up for the video of a worst case scenario, the kind your grandma would get into.

    • @kriss3d
      @kriss3d 4 года назад +101

      Yes. Im quite convinced that was for the show of it. But the thing is. Most of that could and evidently IS being done without anyone noticing it. Theres ways to get around pretty much all of that.

    • @diplomat1837
      @diplomat1837 4 года назад +4

      kriss3d please inbox me your email

    • @amkoraiem
      @amkoraiem 4 года назад +24

      Your comment is 2 months old, this video is 3 years old. A lot has changed.

    • @evakuncic1913
      @evakuncic1913 4 года назад +10

      It actually is a likely thing to happen since people would be to uninformed to notice that something sus is happening, I mean if you look at the amount of successful scammers who literally talk to their victims to gain access to their computers, it really wouldn't surprise me if they would fall for this "trap"

    • @EmongTimothy
      @EmongTimothy 4 года назад

      Yes and no

  • @malcolmmutambanengwe3453
    @malcolmmutambanengwe3453 4 года назад +98

    Somewhere out there, there is a struggling mother with a crying baby, who right now disliked this video. LOL

  • @EliteTruckRepairs
    @EliteTruckRepairs 5 лет назад +63

    Moral to the story is don't click emails you aren't expecting, and never use SMS backups. Just a couple ways to medigate predators.

    • @iAMaReaperGotprobZ
      @iAMaReaperGotprobZ 4 года назад +4

      You still won't be safe, there have been hackers here in Canada that fabricated entire companies to get information. There has been an incident with a woman desperate for a job post-lockdown and has been contacted by an "IT company" based in Vancouver, the woman even checked the company before responding to their email, it looked way too legit.

  • @BAMsPG
    @BAMsPG 4 года назад +181

    In other words Phishing is Social Engineering shortened down.

    • @saifallah040
      @saifallah040 4 года назад

      You Here Mr.Bam

    • @rinreborn7364
      @rinreborn7364 4 года назад +1

      Phishing

    • @gokoo123
      @gokoo123 4 года назад +11

      Vishing, Voice phIshing

    • @JipSlinger
      @JipSlinger 4 года назад

      actually so much more. this example was very simple. a good social engineer can actually infiltrate a company.

    • @rinreborn7364
      @rinreborn7364 4 года назад +1

      @@JipSlinger try me, they will never get me

  • @winskykusuma5127
    @winskykusuma5127 5 лет назад +340

    0:08 Listen...
    YEEEHAAAWWW!!

  • @Seekdeen1
    @Seekdeen1 4 года назад +209

    oh my god that lady hacker just hacked my feelings

    • @timespeed1910
      @timespeed1910 4 года назад +1

      This

    • @winstonzheng8882
      @winstonzheng8882 4 года назад +3

      @Stephen Muller Wow so random def a scammer

    • @franciegrant9785
      @franciegrant9785 4 года назад

      After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process

    • @glipk
      @glipk 4 года назад +1

      @Stephen Muller simp

  • @senimanbahadur6811
    @senimanbahadur6811 4 года назад +69

    °Entering DEFCON you better erase your browsing history, Wifi, Bluetooth.
    Me : *bump to someone* I'm so sorry Sir
    Him: It's okay Mr. S&M
    *Sweating heavily*

    • @vladiiidracula235
      @vladiiidracula235 3 года назад

      In IOS I believe there was an exploit to gain complete control over a phone by sending WiFi packets

  • @jinongmilik6149
    @jinongmilik6149 4 года назад +82

    *Ad starts playing during the call

    • @suparnobhattacharya6345
      @suparnobhattacharya6345 4 года назад +7

      Ad: HOTEL? TRIVAGO

    • @jacksonphillip7916
      @jacksonphillip7916 4 года назад

      Hello, Are you willing to earn up to $7,000 weekly by yourself without sending your money to anyone? Interested persons only. 100% guaranteed...+17252151143

    • @jayj1268
      @jayj1268 4 года назад +1

      Ad Blocker.

  • @BellyBacon
    @BellyBacon 4 года назад +6

    Using the world wide web and clicking on anything suspicious is like driving a car and testing how many trees you can pass through at max speed.

  • @operationdabardos1236
    @operationdabardos1236 4 года назад +41

    The real one is not there he/she will never come out and attended these shows,

    • @tweetdezweet
      @tweetdezweet 4 года назад

      And you know this how? :D

    • @hippityhop9522
      @hippityhop9522 4 года назад +5

      @@tweetdezweet there's always better but sometimes better is also illegal

    • @tweetdezweet
      @tweetdezweet 4 года назад

      ​@@hippityhop9522 and because some hackers do illegal things they wouldn't attend a hacker conference?

  • @midimusicforever
    @midimusicforever 4 года назад +21

    A human being is a multitude of unfixable 0-day exploits.

  • @farhan787
    @farhan787 4 года назад +19

    Me: Clicks on a link in a mail
    Hacker: NO YOOOUUU gave me your passwords 😂😂😂

  • @enricmm85
    @enricmm85 4 года назад +50

    01:37 She should have said Ghostbusters.

  • @juneradar
    @juneradar 4 года назад +11

    The thumbnail looks like a prank video, like she’s at dinner and she’s reacting to the prank happening next to her

  • @ytvideoedit7055
    @ytvideoedit7055 4 года назад +26

    Give that lady an oscar for her acting skill.

  • @Sarge92
    @Sarge92 3 года назад +10

    rule 1 of hacking keep it simple
    you dont need to break into a secure network if the human on the end of the phone will give you everything you need
    you dont need to hack a high tech security system if the door can be opened by just popping the hinge pins

    • @JamilKhan-hk1wl
      @JamilKhan-hk1wl 2 года назад

      Yes. Systems nowadays are very secure with 2fa etc. But theres one thing that is very weak, the user

  • @chillndie
    @chillndie 4 года назад +16

    I'm a simple guy i saw a beautiful lady in thumbnail & clicked the video 💛

  • @UmarMunir94
    @UmarMunir94 4 года назад +18

    the guy who hacked the car was so cool. he should be in a movie or netflix

    • @金田一天馬
      @金田一天馬 4 года назад +1

      0:36 he kinda looks like Samy Kamkar

    • @zeroscript8906
      @zeroscript8906 4 года назад +1

      He is Sammy kamkar

    • @金田一天馬
      @金田一天馬 4 года назад

      @GRIZZLI He's more famous for taking down my space.

    • @金田一天馬
      @金田一天馬 4 года назад

      @@zeroscript8906 And the host went after some other hackers instead of spending time with him.

    • @金田一天馬
      @金田一天馬 4 года назад

      @GRIZZLI haha

  • @zenoxs5699
    @zenoxs5699 4 года назад +19

    1:35
    Him: who are you gonna call
    Me: ghost busters
    (Sorry)

    • @zenoxs5699
      @zenoxs5699 4 года назад +1

      @@thailovely217 ok I don't care

  • @fridayknight1387
    @fridayknight1387 4 года назад +7

    Hacker: I could have made you homeless.
    My parents(after seeing the video): today we will cut our wifi connection.

  • @ndcrichards5805
    @ndcrichards5805 4 года назад +8

    5:22 "and I could burn this whole place to the ground if they don't return my red swingline stapler");

  • @firstwarning140
    @firstwarning140 4 года назад +9

    That woman should play "among us"

  • @HardTrancid
    @HardTrancid 11 месяцев назад +2

    We were doing this in the early 2000's I do believe it's still going on today.

  • @Muuip
    @Muuip 4 года назад +4

    Every system can be used, misused or abused. Are there such events as DEFCON for hackers figuring out how to create Synergy for everyone from the Internet of Things?

  • @neuronneuron3645
    @neuronneuron3645 4 года назад +7

    This guy is questioning his whole existence when she steals his identity/information

  • @darkflux
    @darkflux 4 года назад +4

    vishing is NOT calling up a company and pretending to be a customer. it is soliciting over the phone, calling someone making them think you are a company they belong to or have service through, and getting them to give you their info, because they know "the company" has it already. in some cases, even using prerecorded message systems to make them seem like an official company. it is "voice phishing", hence the name. phishing is the same thing, but through email.
    what she is doing is just social engineering. pretending to be someone you are not, or having authority you don't, in order to get something you shouldn't have access to.

  • @Bloosworld24
    @Bloosworld24 4 года назад +24

    Feeling sad for her bf, all I could do is to wish him "Stay Strong"

    • @nahiandev
      @nahiandev 4 года назад +1

      Honestly after seeing this no one would ever want to be her bf. Anyways she is damn cute.

    • @triaie
      @triaie 3 года назад +1

      @@nahiandev why what the hell she do?

  • @meylaul5007
    @meylaul5007 4 года назад +9

    At the end, the interviewer looked like he was about to throw up.

    • @meylaul5007
      @meylaul5007 4 года назад

      @@caroltope9037 Uh, ok. Sorry to hear that.

    • @meylaul5007
      @meylaul5007 4 года назад

      @Li'l Squeak I know, looked it up. Very sketchy.

  • @talhababar5497
    @talhababar5497 4 года назад

    good ho gya G😂
    ye to meri pasand la hacker h😍
    Special love🖤🖤

  • @fesh2458
    @fesh2458 4 года назад +46

    this reporter is the type of person to believe this
    African boy: hello i have 10million dollars worth of gold bars to give you just send me 100 dollars paypal and all ur passwords ty
    Reporter : yes

    • @hobogrifter
      @hobogrifter 4 года назад +1

      It's supposed to represent old people

  • @anshumk
    @anshumk 4 года назад +18

    The only thing i couldnt doctor is your fingerprint
    Well here we are now with fingerprint scanners on the phones. Its getting worse.

    • @aaronriggan2373
      @aaronriggan2373 4 года назад +5

      Except the phone doesn't store an image of your fingerprint, it stores a hash. Your fingerprint is deconstructed into a digital key, run through a hashing algorithm then compared with the hash on file. At present, it's mathematically impractical to reverse the hash back into the fingerprint file (same techniques used to encrypt passwords).
      Further, if you have an iPhone (last time I checked - probably same for Android too, but I don't know the hardware ins and outs), the fingerprint hashing chips are completely isolated from the rest of the phone and are firmware-locked to the logic board, making it impossible for all intents and purposes to extract the fingerprint hash without physical access to the chip. Even then the fingerprinting chips are encrypted, with the key residing on the paired logic board so you can't swap it into another device. This is why the FBI had so much trouble breaking into the San Bernadino shooter's phones a few years ago. To get in, they cloned the phone to a virtual device then brute-forced the PIN, resetting the VM when it locked itself out.
      So rest assured, the fingerprint on your phone is by FAR one of the least interesting things a remote hacker would want to go for. They'd more likely create a social engineering profile to find important dates (birthdays, anniversaries, etc) to you and use that to guess your PIN.

    • @TheHellogs4444
      @TheHellogs4444 4 года назад

      ​@@aaronriggan2373 If you have root access can't you just flash the fingerprint scanner to whatever malicious firmware? As long as you have a bidrectional comms channel to that system, looks like you can't really secure your fingerprints
      Your comment addresses weird scenarios. Here, a malicious actor has root access to your device. Do we have hardware-level security capable of preventing the fingerprint from being accessible?

    • @aaronriggan2373
      @aaronriggan2373 4 года назад +1

      @@TheHellogs4444 My understanding is that on an iPhone, hardware-level protections do exist.
      The fingerprint reader is completely isolated from the logic board and is more or less unreachable from the OS. Its software can't be overwritten and because it's hardware encrypted, you can't even physically swap it with a malicious one.
      I will say it's been probably half a decade since I was repairing iPads so if I'm wrong and someone can point me to some good articles about i-device security, that would be fantastic.

    • @santamaria9456
      @santamaria9456 4 года назад

      *Ronaldhacks01_ on √nsta* helped me in having access to my husband phone without him knowing.. he can help you..

    • @senthilnathannathan4683
      @senthilnathannathan4683 4 года назад

      Anyone like to earn $1000 through Hacking within 24 hrs.Plz contact +916383806495 in whatsapp

  • @aryanprasad6734
    @aryanprasad6734 4 года назад +5

    a heaven for hackers and hell for multiplayer games

  • @gabitzu3456
    @gabitzu3456 4 года назад +7

    0:07 *hacker cowboy activating*

  • @susanswanson4079
    @susanswanson4079 4 года назад +4

    To be fair to the companies. If they stuck to their guns and wouldn't provide any info if that WAS a real customer who was having issues there would be a lot of yelling,lawsuits or they would've lost a customer. There's no middle ground here.

    • @Jev435
      @Jev435 4 года назад +3

      Facts...maybe the agent she was speaking with is a very soft person, I do customer service and regardless of the situation, the customer could even be going through hell, I apologize and let them know that with the account security been verified there's nothing that I can do to help you.

  • @JesseJames-qb1wt
    @JesseJames-qb1wt Год назад +1

    This video is used for training by charter communications. Notice the banner in the video says 2023 but it’s been posted 5 years ago. Pay attention folks.

  • @piesofshit5578
    @piesofshit5578 5 лет назад +7

    What's the cellphone company?

  • @kgnambiar7739
    @kgnambiar7739 4 года назад +3

    Do the Floor is covered by wires or it is just the Floor design.

  • @moryakantha5782
    @moryakantha5782 4 года назад +14

    Aiden Pearce: "Hold My Bear!"

  • @sam.mankar
    @sam.mankar 4 года назад +5

    0:35 is that Samy Kamkar
    The guy who accidentally hacked MySpace

  • @magnusm4
    @magnusm4 4 года назад +5

    They're really good, but on social understanding. But the success of a hacker's skill seem to be caused more on their target's incompetence rather than their own.
    Had the phone guy given it a second thought what he's doing, and had he fine read the link and thought about the download, plus maybe even downloading some anti virus software that pops up on suspicious downloaded files then maybe neither of them would've succeeded.

  • @SP1DYEE
    @SP1DYEE 4 года назад +1

    2:41 why the video is paused.

  • @SaurabhBarnwal14
    @SaurabhBarnwal14 4 года назад +5

    2:41 baby crying video is paused, still making sound. LOL

  • @peacefultube45
    @peacefultube45 5 лет назад +6

    Addicted to defcon 🤩😍

  • @NikSy
    @NikSy 4 года назад +3

    Imagine swiggy add popping up during the youtube play..😂

  • @dhavalkotak1751
    @dhavalkotak1751 4 года назад +2

    Detecting vulnerability in people is easier than detecting vulnerability in machine

  • @superslug2516
    @superslug2516 4 года назад +7

    "My husband is like........"
    He: shying 2:00

    • @caroltope9037
      @caroltope9037 4 года назад

      I was overwhelmed that I could see the texts,pictures, chat list and all files in my husband's account shortly after contacting *hackertin00* on Instagram. Now its not just suspicion, I have facts and evidences against him.

  • @TBTeams4
    @TBTeams4 4 года назад +2

    It’s scary how the access to a phone or computer and internet can change a persons life in one instant.

  • @prakhar.indoria
    @prakhar.indoria 4 года назад +3

    Sad part, the actual ones never tell what they can do.

  • @infernus42254
    @infernus42254 2 года назад

    Gotta master that ez doublespeak, brother. We in the big leagues now. 🕸️

  • @RaviKumar-do1ng
    @RaviKumar-do1ng 4 года назад +6

    I think there is a big difference between Fraudsters and hackers.

    • @Ntshembisomnisi
      @Ntshembisomnisi 4 года назад +1

      Being able to be both makes you more dangerous

  • @Ryan-xq3kl
    @Ryan-xq3kl 4 года назад +1

    Its nice to see everyone got their good boy haircuts just in time for the big boy pants hacker convention

  • @jainpranayr
    @jainpranayr 4 года назад +3

    The fact that its from 3 years ago scares the f outta me

  • @averagesomebodynobody
    @averagesomebodynobody 4 года назад +2

    Loved every second of this vid

  • @shaunnasworkshop
    @shaunnasworkshop 4 года назад +5

    LMAO @ 5:39 Looks like he's about to cry and barf at the same time.

    • @ActuallyAudacity
      @ActuallyAudacity 4 года назад +1

      @@perkinskurt6147 I guess this guy is also trying to scam people...

  • @madhivanan4155
    @madhivanan4155 4 года назад +1

    What happen when ad suddenly appears?😂😂🕺..

  • @anupamsingh3409
    @anupamsingh3409 4 года назад +7

    Some one in a cell phone company lost their job due to this

    • @franciegrant9785
      @franciegrant9785 4 года назад

      After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process

  • @seriedrive550
    @seriedrive550 8 месяцев назад

    seven years ago. i never gonna use my cellphone on bathroom again.

  • @zahash1045
    @zahash1045 4 года назад +15

    Moral of the story: NEVER BE SUCH A MORON TO REQUEST A HACKER TO HACK YOU

    • @furdiburd
      @furdiburd Год назад +1

      NEVER BE in a way of a black hat hacker

  • @sandeepsahu8743
    @sandeepsahu8743 4 года назад +2

    Has anyone seen "Elliot Alderson" in the conference?

  • @c99rahul
    @c99rahul 4 года назад +26

    As soon as a pretty lady looks at me smiling, boom. I'm hacked. So vulnerable.

    • @nancywestbrooks5780
      @nancywestbrooks5780 4 года назад

      Just in case you wanna hack someone’s Facebook, Snapchat, Twitter, Instagram.twitter and TikTok.. contact *hackertin00* on instagram he is available for ya..he is very much reliable

    • @caroltope9037
      @caroltope9037 4 года назад

      I was overwhelmed that I could see the texts,pictures, chat list and all files in my husband's account shortly after contacting *hackertin00* on Instagram. Now its not just suspicion, I have facts and evidences against him.

  • @25vinessen
    @25vinessen 4 года назад

    Do you have the same video in french, please?

  • @ashemgold
    @ashemgold 4 года назад +3

    "The ONLY way to get around this is with bio-implants and AI chips inserted into the brain" we were told, but it was a BAAAD idea.

  • @amarmkulkarni
    @amarmkulkarni 4 года назад

    0:33
    He is Samy Kamkar

  • @legendarypo183
    @legendarypo183 4 года назад +13

    And that's y Edward Snowden taped his webcam and has a top level security in his laptop.......i wished i had basic computer skills atleast...😂

  • @attahissan5825
    @attahissan5825 4 года назад +1

    I am you. Now that’s power.

  • @sonulohani
    @sonulohani 4 года назад +4

    The first ule of a hacker is not to tell his secrets.

    • @rudrasaraswat3077
      @rudrasaraswat3077 4 года назад +1

      otherwise companies gets all the information and can run their shady business more safely

  • @RyanEwers-i9v
    @RyanEwers-i9v 8 месяцев назад +1

    Hopefully he didn't decide to choke his chicken during those two days of being spied on...

  • @xymare1748
    @xymare1748 4 года назад +3

    and this why i dont use one password for more passwords

  • @noahbernstein4133
    @noahbernstein4133 4 года назад

    I fear for the nearby Starbucks public wifi

  • @salmanabedin1313
    @salmanabedin1313 4 года назад +3

    There you go, RUclips!
    I freaking watched it!
    Now for God's sake, leave me be!

    • @sebastianelytron8450
      @sebastianelytron8450 4 года назад +1

      I sorted by new and this was first comment, nice to know i'm not alone lmfao

    • @salmanabedin1313
      @salmanabedin1313 4 года назад

      @@sebastianelytron8450 I am wondering, are you at all into contents that preach about freedom on the internet?

    • @sebastianelytron8450
      @sebastianelytron8450 4 года назад

      @@salmanabedin1313 That makes no sense

    • @salmanabedin1313
      @salmanabedin1313 4 года назад

      @@sebastianelytron8450 He he. Never mind. Worth a shot.

  • @mitsosmitsarasss
    @mitsosmitsarasss 4 года назад +2

    1:36
    Who are you gonna call???
    -GHOSTBUSTERS
    dararara rara dararararara GHOSTBUSTERS!

  • @bluebear25519
    @bluebear25519 4 года назад +7

    6:00 LOL, the idea of becoming a hermit and trow your computer into deepest ocean after know how you are vulnerable

    • @franciegrant9785
      @franciegrant9785 4 года назад

      After all the hassle in my marriage and after several suspictions that my partner was seeing someone else,I thought asking for divorce would have been a better pill to swallow but on the other hand, I hired the computer wizard *hackertin00* via Instagram and he got me real evidence to follow my instincts. Now I am in a better place. he can hack every social process

  • @davidpowell3347
    @davidpowell3347 2 года назад

    Is there any protection in not using cell phones for any business/payments/banking ? Not having any "apps" installed?

  • @zanidd
    @zanidd 4 года назад +3

    I wanted to attend it this year, but sadly there's COVID :/

  • @MarcA75
    @MarcA75 4 года назад +2

    Girl got mad skills. This was really impressing.

  • @ovaidwani
    @ovaidwani 4 года назад +9

    She looks more or less like brandi love

    • @andy4274
      @andy4274 4 года назад +1

      A man of culture

  • @JayDwayneShow
    @JayDwayneShow 3 года назад

    "If my evilness is working correctly 😂😂😂😂😂"

  • @OndrejMusicIsMine
    @OndrejMusicIsMine 4 года назад +12

    Was hoping to see some serious coding skills. In both scenarios, he needed to contribute by giving away crucial info first.

    • @JonVlogs123
      @JonVlogs123 4 года назад +2

      Someone with great programming skills (computer and/or social programming), can more easily find vulnerabilities in these types of systems than someone who doesn't understand how these social and computer systems function. Think about what social influencers/celebrities or digital devices really are or can be used as by investors, that is, in addition to entertainment sources for a mass audience. Social programming is often more expedient than computer programming. Now a combination of the two is powerful.

  • @aphonos4600
    @aphonos4600 2 года назад

    "Mom can we watch Ben Shapiro?"
    "No we have Ben Shapiro at home"

  • @jasjeetsingh6220
    @jasjeetsingh6220 4 года назад +4

    In the thumbnail that lady looked damn beautiful 💕

  • @rakeshlella2795
    @rakeshlella2795 4 года назад

    That baby crying video was on pause throughout the call. Search that video. 1:41 minutes video.

  • @mugaguest1
    @mugaguest1 4 года назад +7

    Another reason why I like using laptops with no webcams. cant hack what is not there.

    • @mulletman1705
      @mulletman1705 4 года назад

      By that logic you shouldn't like using laptops

    • @mugaguest1
      @mugaguest1 4 года назад

      @@mulletman1705 Guess webcams came before laptops and not laptops before web cams. I have a thinkpad t410, t430, dell d630 and d430 which all were built without webcam seems I need to ask Lenovo and dell for some money back since the laptops can't function without a webcam.

    • @lisamaurerr8311
      @lisamaurerr8311 4 года назад

      Any phone in the world can be hacked by using a little known method. but with the help of *hackertin00* on instagram .a trustworthy and genius hacker have ever meet on the internet *hackertin00* you can get access back to your device,you can as well get your disable account back. thanks a lot *hackertin00*

  • @xkupi
    @xkupi 3 года назад +2

    When you have a grammy in acting.

  • @tyrannosaurus62
    @tyrannosaurus62 5 лет назад +4

    I learned this from my I.t. Class. I’m exposing this to everyone I know, Goddamn.......

    • @diplomat1837
      @diplomat1837 4 года назад

      Bro let’s chat inbox me your email

  • @absofjelly
    @absofjelly 3 года назад

    DEFCON 23! What did they have to talk about at DEFCON 1? How to fake the sound of a dialup modem?

  • @sumitwadhwa8823
    @sumitwadhwa8823 4 года назад +4

    funny even after losing his account, he's still calling it 'My cell phone company' instead of naming n shaming the company on the video

  • @souvikghosh6966
    @souvikghosh6966 4 года назад +2

    05:23 the homeless part