This is how hackers hack you using simple social engineering

Поделиться
HTML-код
  • Опубликовано: 12 дек 2024

Комментарии • 88

  • @lloowik
    @lloowik 8 лет назад +469

    In conclusion, never trust a baby

  • @greensteve9307
    @greensteve9307 8 лет назад +1466

    Fuck that is scary.

  • @Jesus_Christ_is_Lord_
    @Jesus_Christ_is_Lord_ 8 лет назад +773

    lmao this is definitely one of the funniest hacking methods

  • @realeques
    @realeques 8 лет назад +77

    0:33 GHOSTBUSTEEEEEEEEEEEEEERRRRRRS!

    • @lecorbak
      @lecorbak 8 лет назад +5

      so I'm not the only one to hear it.

  • @Wifi_Cable
    @Wifi_Cable 8 лет назад +38

    This is the kind of video jobs need to show when they talk about social engineering.

  • @FuzzyLogicxxx
    @FuzzyLogicxxx 8 лет назад +803

    I've changed all my passwords to "incorrect", So whenever I forget, It will tell me "Your password is incorrect."

  • @zojacheung1738
    @zojacheung1738 8 лет назад +28

    A crying baby (sounds), a phone call, plus a low paid, inept operator.

  • @korvokorvo
    @korvokorvo 8 лет назад +120

    That's horrifying...

  • @Mellowspark1
    @Mellowspark1 8 лет назад +66

    That's nothing, my grandson hacked a gibson.

    • @zikzakfr
      @zikzakfr 8 лет назад +1

      With the help of the "rainbow" binders?

    • @Mellowspark1
      @Mellowspark1 8 лет назад +1

      Zik Zak I think he used a Visual Basic GUI apparently all the leet kids use it.

    • @zikzakfr
      @zikzakfr 8 лет назад

      Ah ah ah, these scriptkiddies. Sigh...

    • @Mellowspark1
      @Mellowspark1 8 лет назад +4

      Zik Zak Sometimes he goes to our star bucks with his Alienware laptop and then he boots up hackertyper.com to impress the people around him. #HackThePlanet

    • @BrawnyBuddha
      @BrawnyBuddha 8 лет назад +1

      I dont know what that combination of words means but I'm giggling uncontrollably from it.

  • @huzaifaansari8688
    @huzaifaansari8688 8 лет назад +118

    awesome....

  • @CaptainZazaa
    @CaptainZazaa 8 лет назад +378

    I think I'm in love...

  • @dannne88
    @dannne88 8 лет назад +4

    Is there more? Want to see the rest.

  • @snooks5607
    @snooks5607 8 лет назад +57

    this crap has been widespread knowledge at least since mitnick, a quarter century ago. strong identification is a difficult problem that requires systematic change on government level. until then big businesses are willing to swallow losses, even from a lawsuit in order to be competitive. so only way to get them to stop is to spam them with abuse. after they close the loopholes it'll suck having to get a notarized permission to reset lost account access but maybe that'll teach people to be more careful while we're waiting for some proper, modern id method.

  • @therealkzero
    @therealkzero 8 лет назад +190

    It's not vishing. It's phishing. I have no idea why they divided it up into different categories...it's the same damn thing. It's like Biking. Does anyone go Miking? Mountain Biking?

  • @Justincrediblebrah
    @Justincrediblebrah 8 лет назад +7

    shame the phone company

  • @lamenlore9518
    @lamenlore9518 8 лет назад +156

    Who is this girl in the video? I have a wife but I think its legal to be married in two separate states right?

    • @el_presidente
      @el_presidente 8 лет назад +269

      she can steal your wife's identity ( ͡° ͜ʖ ͡°)

  • @DeaPeaJay
    @DeaPeaJay 8 лет назад +10

    I learned this already watching Face on the A-Team

  • @MalMilligan
    @MalMilligan 8 лет назад +8

    So cool. Yeah it's just a matter of maintaining Standard Operating Procedures at every place that has "secure" information on clients. And if she had not gotten it this time she might have the next time or the time after that. Nicely done.

  • @hassan.3520
    @hassan.3520 8 лет назад +40

    this looks like some buzzfeed level of cringe tier shit, also there is only one hacker and he is called 4chin

    • @mooviies
      @mooviies 8 лет назад

      who is this 4chan?

  • @Son0fHobs
    @Son0fHobs 8 лет назад +33

    Clever grifter, she's got skills, playing the ignorant mother card. Well done.

  • @JohmathanBSwift
    @JohmathanBSwift 8 лет назад +17

    There are back ups .You would be alerted and depending on how you set your alerts up, this wouldn't happen." Maybe I'll call your cell phone provider ". Her first call , she nails who his cell phone provider is. Maybe they deleted sometime out of the video, but I generally don't get that fast of a response from any customer service. You have to admit , that was quick. Jess uses my girlfriends name, what ? Did he give her his girlfriends name .Then, I thought when we got married. Joint account laws would, anyways.None of that makes any sense what so ever.Generally , the 4 digit number is used after the account is fully set up for a cross reference in verification. I do like the baby crying though. I'll have to remember that one. Maybe this is true to some degree, but it seems a little suspicious.

    • @mooviies
      @mooviies 8 лет назад +23

      There's other videos in this series. I think he asked to be hacked like a month ago or something like that. So they had all the time they need to collect information. Another hacker had also obtain access to his laptop, camera and all. He even showed him that he registered his camera and what he was doing on his laptop.

    • @JohmathanBSwift
      @JohmathanBSwift 8 лет назад

      A MONTH ?

  • @notanalien2732
    @notanalien2732 8 лет назад +34

    lol I'm trying to imagining a guy doing this and it would never work

    • @epsleon
      @epsleon 8 лет назад +31

      It's easy. I technically do it to myself every time I try to complain about shit or have stuff changed.
      They always ask for a password that I never remember (because I never use the same password). They give me a few tries and if I don't guess it correctly they let me change it.
      That's what happens when you put minimum wage workers, or outsource to some third world country, in charge of extremely valuable information. They don't give enough of a shit to protect that info or learn why it should be protected. They get treated like shit, so all it takes is a bit of kindness and acting befuddled to get past most (the only time it hasn't worked was with my bank, luckily).
      Fortunately my info is relatively secure, as I use different names too. So even if someone other than me did get access, they would only have it with that company.

    • @xocreme
      @xocreme 8 лет назад +3

      No he would just shoot up the office instead of calling

  • @goosebumps1334
    @goosebumps1334 8 лет назад +140

    Well she got the Information anyone can and would need to hack first of all, the issue is not what's after you get the Phone Number/Name etc.. the issue is with how you get it..
    a hacked wouldn't just have the person hes calling standing there and telling him his Girlfriends name, or Phone number, without even the phone number you'd know Their Personal Home address Email/Full name, just with the phone number, and by that you'd have it much easier to trick the Employees...but that's a great video though!

  • @hummus9915
    @hummus9915 8 лет назад +9

    everyone be scared of everything all of the time!

  • @Mareritt
    @Mareritt 8 лет назад +22

    This is how I think boogie2988 basically got hacked.

    • @ElynourRummyng
      @ElynourRummyng 8 лет назад +1

      nope. that was different.

    • @Mareritt
      @Mareritt 8 лет назад +1

      crossfireultra2000 How so?

    • @ElynourRummyng
      @ElynourRummyng 8 лет назад +5

      Mareritt actually, upon further investigation. yes. he was hacked by this same method. however it took advantage of two step verification.

    • @Mareritt
      @Mareritt 8 лет назад +1

      crossfireultra2000 Yeah, that's what I gathered from his video explaining it. It sounded like they were doing social phishing for info to break into his accounts.

    • @ElynourRummyng
      @ElynourRummyng 8 лет назад +3

      Mareritt they do the method, not for email, but for the persons sim card. cuz most people have 2 step verification and they can bypass that with their sim.

  • @stephanep795
    @stephanep795 8 лет назад +60

    Who get hacked? There is no evidence that she really called a phone company. Wasn't it a friend of her letting us think that she called a phone company?

  • @lollal3527
    @lollal3527 8 лет назад +1

    gg

  • @stevenseagal4987
    @stevenseagal4987 8 лет назад

    Ssn is 5127 lol

  • @bzilla2252
    @bzilla2252 8 лет назад +65

    They are not even good actors....a support person is not going to change your password over the freaking phone.

    • @atozed.photography
      @atozed.photography 8 лет назад +179

      Not every one will, but some absolutely will do what you ask of them if you are convincing enough. People are gullible, and low paid base tier service operators will tend to care far more about the distressed sounding overworked mother currently on their line than the company they probably feel is slighting/overworking/underpaying them. Either that or they'll do it just to get the call over, or to get a good survey score. There's tons of reasons an agent will fall for this, and very very few that they will catch on or hold to the guns of policy. Hell, a good number of companies don't even protect well against social engineering, it very well could be the company's policy to "help".

  • @dhirajp4u1
    @dhirajp4u1 8 лет назад +12

    What did she hack? got person's email address? and to get that she first had to get his phone number and then spoof it and finally get lucky by making a fool of an operator. I can get the email address by asking directly to that person :D.

    • @theslvrbullt
      @theslvrbullt 8 лет назад +42

      I think you stopped watching the video too early. She also manipulated them to give her an account on his plan as well as let her change his password, effectively locking him out of his account and giving her control. Social Engineering may seem silly, but it's just as effective, if not more so, than prodding for vulnerabilities in a system. Sometimes, the only way in is by poking the operator.
      EDIT: It may seem like a silly example, but... The "Microsoft Support" scam is an example of social engineering. We'd be smart enough to realize someone from Microsoft isn't going to randomly call us, but you'd be surprised how many people out there fall for this.
      www.howtogeek.com/176605/tell-your-relatives-no-microsoft-wont-call-you-about-your-computer/

    • @dhirajp4u1
      @dhirajp4u1 8 лет назад +3

      She can never block primary account holder from accessing the account. What she did is set a password for secondary person. Primary account holder can just make a call and set everything right in a minute.

  • @Lunatic5306
    @Lunatic5306 8 лет назад +10

    "vishing" wtf is vishing??? lmao

    • @Halcy_n
      @Halcy_n 8 лет назад +12

      It's essentially phishing using a phone.

    • @CBLondon
      @CBLondon 8 лет назад +4

      Phishing over a voice call.

    • @Lunatic5306
      @Lunatic5306 8 лет назад +2

      That explains it!

    • @Lunatic5306
      @Lunatic5306 8 лет назад +2

      Stank you guys smelly much!

    • @ElynourRummyng
      @ElynourRummyng 8 лет назад +1

      wtf?

  • @patrickpuma
    @patrickpuma 8 лет назад +1

    fishing

  • @falkoneification
    @falkoneification 8 лет назад

    AWALT

  • @uguu2023
    @uguu2023 8 лет назад +3

    The title needs to be changed, this is no where near the definition of "hack".

    • @Lunatic5306
      @Lunatic5306 8 лет назад +27

      As a former hacker, i must say you are 100% wrong! Doesn't matter in which way you "hack" as long as you gain access towards your objective, mission accomplished.

    • @BortPlate
      @BortPlate 8 лет назад

      Nice try, toll. By your logic, every time I open my soda bottle or even *my own email account* I'm "hacking".

    • @HKstyleD
      @HKstyleD 8 лет назад +12

      +Bort Plate Its gaining access to something you shouldn't have access to. unless you mean you can't access your soda because you're too fat. which doesnt count

    • @BortPlate
      @BortPlate 8 лет назад

      Okay Leon, so I'm not supposed to have access to your lunch at work, and thus you hide it under a bag of moldy cheese. I lift said cheese and gain access. I'm a hacker. Fantastic.

    • @HKstyleD
      @HKstyleD 8 лет назад +5

      +Bort Plate 1. that makes you a thief.
      2. to clarify, it is gaining access to DATA that you shouldn't have access to. so yes if you steal my food on world of warcraft you are a bonefide hacker