Zik Zak Sometimes he goes to our star bucks with his Alienware laptop and then he boots up hackertyper.com to impress the people around him. #HackThePlanet
this crap has been widespread knowledge at least since mitnick, a quarter century ago. strong identification is a difficult problem that requires systematic change on government level. until then big businesses are willing to swallow losses, even from a lawsuit in order to be competitive. so only way to get them to stop is to spam them with abuse. after they close the loopholes it'll suck having to get a notarized permission to reset lost account access but maybe that'll teach people to be more careful while we're waiting for some proper, modern id method.
It's not vishing. It's phishing. I have no idea why they divided it up into different categories...it's the same damn thing. It's like Biking. Does anyone go Miking? Mountain Biking?
So cool. Yeah it's just a matter of maintaining Standard Operating Procedures at every place that has "secure" information on clients. And if she had not gotten it this time she might have the next time or the time after that. Nicely done.
There are back ups .You would be alerted and depending on how you set your alerts up, this wouldn't happen." Maybe I'll call your cell phone provider ". Her first call , she nails who his cell phone provider is. Maybe they deleted sometime out of the video, but I generally don't get that fast of a response from any customer service. You have to admit , that was quick. Jess uses my girlfriends name, what ? Did he give her his girlfriends name .Then, I thought when we got married. Joint account laws would, anyways.None of that makes any sense what so ever.Generally , the 4 digit number is used after the account is fully set up for a cross reference in verification. I do like the baby crying though. I'll have to remember that one. Maybe this is true to some degree, but it seems a little suspicious.
There's other videos in this series. I think he asked to be hacked like a month ago or something like that. So they had all the time they need to collect information. Another hacker had also obtain access to his laptop, camera and all. He even showed him that he registered his camera and what he was doing on his laptop.
It's easy. I technically do it to myself every time I try to complain about shit or have stuff changed. They always ask for a password that I never remember (because I never use the same password). They give me a few tries and if I don't guess it correctly they let me change it. That's what happens when you put minimum wage workers, or outsource to some third world country, in charge of extremely valuable information. They don't give enough of a shit to protect that info or learn why it should be protected. They get treated like shit, so all it takes is a bit of kindness and acting befuddled to get past most (the only time it hasn't worked was with my bank, luckily). Fortunately my info is relatively secure, as I use different names too. So even if someone other than me did get access, they would only have it with that company.
Well she got the Information anyone can and would need to hack first of all, the issue is not what's after you get the Phone Number/Name etc.. the issue is with how you get it.. a hacked wouldn't just have the person hes calling standing there and telling him his Girlfriends name, or Phone number, without even the phone number you'd know Their Personal Home address Email/Full name, just with the phone number, and by that you'd have it much easier to trick the Employees...but that's a great video though!
crossfireultra2000 Yeah, that's what I gathered from his video explaining it. It sounded like they were doing social phishing for info to break into his accounts.
Mareritt they do the method, not for email, but for the persons sim card. cuz most people have 2 step verification and they can bypass that with their sim.
Who get hacked? There is no evidence that she really called a phone company. Wasn't it a friend of her letting us think that she called a phone company?
Not every one will, but some absolutely will do what you ask of them if you are convincing enough. People are gullible, and low paid base tier service operators will tend to care far more about the distressed sounding overworked mother currently on their line than the company they probably feel is slighting/overworking/underpaying them. Either that or they'll do it just to get the call over, or to get a good survey score. There's tons of reasons an agent will fall for this, and very very few that they will catch on or hold to the guns of policy. Hell, a good number of companies don't even protect well against social engineering, it very well could be the company's policy to "help".
What did she hack? got person's email address? and to get that she first had to get his phone number and then spoof it and finally get lucky by making a fool of an operator. I can get the email address by asking directly to that person :D.
I think you stopped watching the video too early. She also manipulated them to give her an account on his plan as well as let her change his password, effectively locking him out of his account and giving her control. Social Engineering may seem silly, but it's just as effective, if not more so, than prodding for vulnerabilities in a system. Sometimes, the only way in is by poking the operator. EDIT: It may seem like a silly example, but... The "Microsoft Support" scam is an example of social engineering. We'd be smart enough to realize someone from Microsoft isn't going to randomly call us, but you'd be surprised how many people out there fall for this. www.howtogeek.com/176605/tell-your-relatives-no-microsoft-wont-call-you-about-your-computer/
She can never block primary account holder from accessing the account. What she did is set a password for secondary person. Primary account holder can just make a call and set everything right in a minute.
As a former hacker, i must say you are 100% wrong! Doesn't matter in which way you "hack" as long as you gain access towards your objective, mission accomplished.
+Bort Plate Its gaining access to something you shouldn't have access to. unless you mean you can't access your soda because you're too fat. which doesnt count
Okay Leon, so I'm not supposed to have access to your lunch at work, and thus you hide it under a bag of moldy cheese. I lift said cheese and gain access. I'm a hacker. Fantastic.
+Bort Plate 1. that makes you a thief. 2. to clarify, it is gaining access to DATA that you shouldn't have access to. so yes if you steal my food on world of warcraft you are a bonefide hacker
In conclusion, never trust a baby
Fuck that is scary.
lmao this is definitely one of the funniest hacking methods
0:33 GHOSTBUSTEEEEEEEEEEEEEERRRRRRS!
so I'm not the only one to hear it.
This is the kind of video jobs need to show when they talk about social engineering.
I've changed all my passwords to "incorrect", So whenever I forget, It will tell me "Your password is incorrect."
A crying baby (sounds), a phone call, plus a low paid, inept operator.
That's horrifying...
That's nothing, my grandson hacked a gibson.
With the help of the "rainbow" binders?
Zik Zak I think he used a Visual Basic GUI apparently all the leet kids use it.
Ah ah ah, these scriptkiddies. Sigh...
Zik Zak Sometimes he goes to our star bucks with his Alienware laptop and then he boots up hackertyper.com to impress the people around him. #HackThePlanet
I dont know what that combination of words means but I'm giggling uncontrollably from it.
awesome....
I think I'm in love...
Is there more? Want to see the rest.
this crap has been widespread knowledge at least since mitnick, a quarter century ago. strong identification is a difficult problem that requires systematic change on government level. until then big businesses are willing to swallow losses, even from a lawsuit in order to be competitive. so only way to get them to stop is to spam them with abuse. after they close the loopholes it'll suck having to get a notarized permission to reset lost account access but maybe that'll teach people to be more careful while we're waiting for some proper, modern id method.
It's not vishing. It's phishing. I have no idea why they divided it up into different categories...it's the same damn thing. It's like Biking. Does anyone go Miking? Mountain Biking?
shame the phone company
Who is this girl in the video? I have a wife but I think its legal to be married in two separate states right?
she can steal your wife's identity ( ͡° ͜ʖ ͡°)
I learned this already watching Face on the A-Team
So cool. Yeah it's just a matter of maintaining Standard Operating Procedures at every place that has "secure" information on clients. And if she had not gotten it this time she might have the next time or the time after that. Nicely done.
this looks like some buzzfeed level of cringe tier shit, also there is only one hacker and he is called 4chin
who is this 4chan?
Clever grifter, she's got skills, playing the ignorant mother card. Well done.
There are back ups .You would be alerted and depending on how you set your alerts up, this wouldn't happen." Maybe I'll call your cell phone provider ". Her first call , she nails who his cell phone provider is. Maybe they deleted sometime out of the video, but I generally don't get that fast of a response from any customer service. You have to admit , that was quick. Jess uses my girlfriends name, what ? Did he give her his girlfriends name .Then, I thought when we got married. Joint account laws would, anyways.None of that makes any sense what so ever.Generally , the 4 digit number is used after the account is fully set up for a cross reference in verification. I do like the baby crying though. I'll have to remember that one. Maybe this is true to some degree, but it seems a little suspicious.
There's other videos in this series. I think he asked to be hacked like a month ago or something like that. So they had all the time they need to collect information. Another hacker had also obtain access to his laptop, camera and all. He even showed him that he registered his camera and what he was doing on his laptop.
A MONTH ?
lol I'm trying to imagining a guy doing this and it would never work
It's easy. I technically do it to myself every time I try to complain about shit or have stuff changed.
They always ask for a password that I never remember (because I never use the same password). They give me a few tries and if I don't guess it correctly they let me change it.
That's what happens when you put minimum wage workers, or outsource to some third world country, in charge of extremely valuable information. They don't give enough of a shit to protect that info or learn why it should be protected. They get treated like shit, so all it takes is a bit of kindness and acting befuddled to get past most (the only time it hasn't worked was with my bank, luckily).
Fortunately my info is relatively secure, as I use different names too. So even if someone other than me did get access, they would only have it with that company.
No he would just shoot up the office instead of calling
Well she got the Information anyone can and would need to hack first of all, the issue is not what's after you get the Phone Number/Name etc.. the issue is with how you get it..
a hacked wouldn't just have the person hes calling standing there and telling him his Girlfriends name, or Phone number, without even the phone number you'd know Their Personal Home address Email/Full name, just with the phone number, and by that you'd have it much easier to trick the Employees...but that's a great video though!
everyone be scared of everything all of the time!
This is how I think boogie2988 basically got hacked.
nope. that was different.
crossfireultra2000 How so?
Mareritt actually, upon further investigation. yes. he was hacked by this same method. however it took advantage of two step verification.
crossfireultra2000 Yeah, that's what I gathered from his video explaining it. It sounded like they were doing social phishing for info to break into his accounts.
Mareritt they do the method, not for email, but for the persons sim card. cuz most people have 2 step verification and they can bypass that with their sim.
Who get hacked? There is no evidence that she really called a phone company. Wasn't it a friend of her letting us think that she called a phone company?
gg
Ssn is 5127 lol
They are not even good actors....a support person is not going to change your password over the freaking phone.
Not every one will, but some absolutely will do what you ask of them if you are convincing enough. People are gullible, and low paid base tier service operators will tend to care far more about the distressed sounding overworked mother currently on their line than the company they probably feel is slighting/overworking/underpaying them. Either that or they'll do it just to get the call over, or to get a good survey score. There's tons of reasons an agent will fall for this, and very very few that they will catch on or hold to the guns of policy. Hell, a good number of companies don't even protect well against social engineering, it very well could be the company's policy to "help".
What did she hack? got person's email address? and to get that she first had to get his phone number and then spoof it and finally get lucky by making a fool of an operator. I can get the email address by asking directly to that person :D.
I think you stopped watching the video too early. She also manipulated them to give her an account on his plan as well as let her change his password, effectively locking him out of his account and giving her control. Social Engineering may seem silly, but it's just as effective, if not more so, than prodding for vulnerabilities in a system. Sometimes, the only way in is by poking the operator.
EDIT: It may seem like a silly example, but... The "Microsoft Support" scam is an example of social engineering. We'd be smart enough to realize someone from Microsoft isn't going to randomly call us, but you'd be surprised how many people out there fall for this.
www.howtogeek.com/176605/tell-your-relatives-no-microsoft-wont-call-you-about-your-computer/
She can never block primary account holder from accessing the account. What she did is set a password for secondary person. Primary account holder can just make a call and set everything right in a minute.
"vishing" wtf is vishing??? lmao
It's essentially phishing using a phone.
Phishing over a voice call.
That explains it!
Stank you guys smelly much!
wtf?
fishing
AWALT
The title needs to be changed, this is no where near the definition of "hack".
As a former hacker, i must say you are 100% wrong! Doesn't matter in which way you "hack" as long as you gain access towards your objective, mission accomplished.
Nice try, toll. By your logic, every time I open my soda bottle or even *my own email account* I'm "hacking".
+Bort Plate Its gaining access to something you shouldn't have access to. unless you mean you can't access your soda because you're too fat. which doesnt count
Okay Leon, so I'm not supposed to have access to your lunch at work, and thus you hide it under a bag of moldy cheese. I lift said cheese and gain access. I'm a hacker. Fantastic.
+Bort Plate 1. that makes you a thief.
2. to clarify, it is gaining access to DATA that you shouldn't have access to. so yes if you steal my food on world of warcraft you are a bonefide hacker