I couldn't believe it when I read about pompompurin, it's hard to believe people are getting caught like that in 2023. But it also speaks to how exhausting it must be for cybercriminals to cover their tracks every single time without fail. With that much heat it's genuinely at the point where if you mess up once, you're done.
For cybercriminals, there is always a tradeoff, good opsec means they have reduced efficiency and low or no risk of getting caught, bad opsec means more efficiency but higher risk of getting caught
Well, pompo is not haker .. He is just a 20 year old kid who used to sell stolen data. WHY HE USED DAMN SAME VPN TO LOGIN INTO BOTH , HIS PERSONAL AND CRIMINAL BIZ ACCOUNT ???
@@Corecarex Opsec stands for Operational Security, its a measure of how an attacker can stay hidden from authorities or the victims they are targetting
Another fun one that was created a while ago is endless-ssh. This is quoted from the git repo "Endlessh is an SSH tarpit that very slowly sends an endless, random SSH banner. It keeps SSH clients locked up for hours or even days at a time. The purpose is to put your real SSH server on another port and then let the script kiddies get stuck in this tarpit instead of bothering a real server." Like I said fun. So even if they use hydra, they won't get anywhere.
Just wanted to add in retrospect , protect your physical machine from HID attacks. Check your usb logs if you think somethings off. With all these automated tools a monkey can use its not only possible its probable. I just had a friend that had $70k stolen , from her phone by someone with a duck or an omg. Moral of the story, lock your ish down , every way. Be well all..
Remain 100% clean, and the feds wouldn't dare intrude. That's just the secret, maintain your privacy and don't penetrate into systems without a valid and written agreement
I honestly feel like I didn't learn shit from this video, you kinda just told us about tools and techniques but barley touched on how these are actually used in the field. Nice video tho
I'm doing cyber sec degree just now, the first year on my course is the same as computer science. I'm actually considering swapping to computer science because I am really enjoying that side of things. It's totally your choice, what do you want to end up doing? Look into it and the roles etc and if your leaning more to sec then choose that.
I have a video in my backlog to overview my study process, information retention techniques, and activities I am currently attempting to implement to help.
Bro you say some stuff that makes me feel like ypu dont actually know what your talking about like confusing opsec with osint.. 150k subs i guess im wrong tho.?
OPSEC and OSINT are different, but often can go together. OSINT is the collection of publically available information from any number of sources. OPSEC relates to keeping your identity private / anonymous through your physical and digital footprints. Poor OSINT is poor OPSEC. If people are able to collect information about you through publically available information and are able to reveal your identity, for example, people (and criminals) will brag about their riches / flaunt their wealth on social media. Even without revealing what one does, they are providing publically available information. Take a look at the story of 'hushpuppi' as a popular example.
Many hackers get caught while using a VPN because often a VPN will drop for a fraction of a second, thus leaking your original IP. Of course there are additional methods that you could use however many people just believe their VPN will protect them.
@@legion465 I am not sure what you are saying ? Law enforcements can request information from many VPN supplies, and those that say do not log anything or are out of reach of the law enforcements only can protect you so far. If you was using a VPN and it drops, then your original IP (from your ISP) that you are using as you start your VPN is then captured, thus this can be connected to a person. There are lots of ways to be caught, but normally Businesses are not interested in pursing unless you do something big.
Part of catching criminals is using Threat Intelligence. Threat Intelligence is gathered in multiple ways, including Honeypots, Darkweb forum insiders and telematics from internet security tools.
How can a layman dload t-pot but not f himself over. He mentioned it's volatile? I have no clue. My fb got hacked good though and the hacker literally calls me. 18 times....
I got hacked who can I hire to catch them all I want is there address I will fix them once I get a address. Please contact me if you have a company or person who can do this, not waiting on our government ,
Bro please suggest what i do Situation :- I learn all the basic skills for hacking Solve 300+ ctf Hackthebox rank(pro hacker) Tryhackme rank (master) Portswigger learning pathway completely most of labs I need internship for experience What can i do how i get free internship How i approach , what i add in resume, list some certificate in order and how to approach for internship
I couldn't believe it when I read about pompompurin, it's hard to believe people are getting caught like that in 2023. But it also speaks to how exhausting it must be for cybercriminals to cover their tracks every single time without fail. With that much heat it's genuinely at the point where if you mess up once, you're done.
For cybercriminals, there is always a tradeoff, good opsec means they have reduced efficiency and low or no risk of getting caught, bad opsec means more efficiency but higher risk of getting caught
Well, pompo is not haker .. He is just a 20 year old kid who used to sell stolen data.
WHY HE USED DAMN SAME VPN TO LOGIN INTO BOTH , HIS PERSONAL AND CRIMINAL BIZ ACCOUNT ???
@@rahulramteke3338what kind of efficiency
@@rahulramteke3338 what is opsec
@@Corecarex Opsec stands for Operational Security, its a measure of how an attacker can stay hidden from authorities or the victims they are targetting
I’ve watched mental outlaw for 2 years now, never knew what opsec meant but just rolled with it, thanks for clearing that up.
Another fun one that was created a while ago is endless-ssh. This is quoted from the git repo "Endlessh is an SSH tarpit that very slowly sends an endless, random SSH banner. It keeps SSH clients locked up for hours or even days at a time. The purpose is to put your real SSH server on another port and then let the script kiddies get stuck in this tarpit instead of bothering a real server." Like I said fun. So even if they use hydra, they won't get anywhere.
Hydra 💀
Just wanted to add in retrospect , protect your physical machine from HID attacks. Check your usb logs if you think somethings off. With all these automated tools a monkey can use its not only possible its probable. I just had a friend that had $70k stolen , from her phone by someone with a duck or an omg. Moral of the story, lock your ish down , every way. Be well all..
@@DDBAA24 i literally have nothing on my computer . I'm pretty sure I could be hacked but the question is why would they bother
Very informative and overall great video!
This is so interesting, Great watch.
Happy to help!
I’m thinking about making a similar video but in documentary format
Pls do it!
Waiting
Weird self plug
@@jmd489 what are you saying?
@@terminal_cat He comments on many videos just to promote himself.
you can get caught as long as you are not Elliot Alderson
Need a spin off
More videos like this!👍
Noted!
Thank you from a fellow Collins.
Thanks for the informative video, Grant! Quick question: What model is the ultrawide monitor behind you?
great video!
Great video I learned a lot
fire content my brudda
Gotta say I love the beard!
Nice video, there is however something wrong with the links in the description of the video.
Thanks for letting me know. Some of the links has the ":" at the end. These should be changed now.
AWESOME MAN!
Cool vid, just wanted to mention though that I think you're mispronouncing fallible, should be fa·luh·bl
This was a dope video. Noice job.
Hi Grant, I know who is hacking my phone. How do I prove it?
Fantastic video
why do you have a 9bit binary thing in the background
Love ur videos
Thank you!
Me too, an autobiography.
Remain 100% clean, and the feds wouldn't dare intrude.
That's just the secret, maintain your privacy and don't penetrate into systems without a valid and written agreement
no way
Because feds are sooo known for not involving innocent people into their crap. Riiiight.
Great video can you make how to not get caught?
ruclips.net/video/BWVyp0wYpgA/видео.html
I honestly feel like I didn't learn shit from this video, you kinda just told us about tools and techniques but barley touched on how these are actually used in the field. Nice video tho
Could someone suggest to me that I should go for a Cyber security Bachelors degree or a Computer science bachelors degree?
both have their own tradeoffs but i would have chosen cyber sec degree and then gofor certifications.. then you will have double opportunity for job
@@ytg6663 Thanks . 🙂❤️🥀
@@ytg6663u mean after degree u go for. a certification
@GHG so Basically CS is better?
I'm doing cyber sec degree just now, the first year on my course is the same as computer science. I'm actually considering swapping to computer science because I am really enjoying that side of things. It's totally your choice, what do you want to end up doing? Look into it and the roles etc and if your leaning more to sec then choose that.
Can you please tell us how to take notes while studying cybersecurity? Should we take digital notes or use traditional pen and paper method?
You can also on paper don’t worry
I have a video in my backlog to overview my study process, information retention techniques, and activities I am currently attempting to implement to help.
Tel eh meh tree?... have i been saying it wrong?
Help me out my foon is hacked
Monero cant be tracked
also got 👆same issue but reaching out to 2𝗙𝗮𝗿𝘆𝗮𝗻 got all my lost funds recovered successfully…
👍
Nizzz!
Cool but it’s pronounced “Tell-‘em a tree”
The scammer who hacked my business, i have your locations where you went, who you visited, just across the tracks.
SpaceUK
was waiting for this
💯 FREE PUM. ..
bro acting like he knew him 😂
So you want a Cyber Criminal Freed ?
Bro you say some stuff that makes me feel like ypu dont actually know what your talking about like confusing opsec with osint.. 150k subs i guess im wrong tho.?
OPSEC and OSINT are different, but often can go together. OSINT is the collection of publically available information from any number of sources. OPSEC relates to keeping your identity private / anonymous through your physical and digital footprints. Poor OSINT is poor OPSEC. If people are able to collect information about you through publically available information and are able to reveal your identity, for example, people (and criminals) will brag about their riches / flaunt their wealth on social media. Even without revealing what one does, they are providing publically available information. Take a look at the story of 'hushpuppi' as a popular example.
You didn't get what he said, he explained it well
he explained the difference in the vid..?
You look like Zelensky slim version catching Russian Hackers.
Free pompompurin tho
So you want a Cyber Criminal Freed ?
@@SteveGillham yes
@@jinxscript ok 😟
but if the hacker use VPN ip is not real
Many hackers get caught while using a VPN because often a VPN will drop for a fraction of a second, thus leaking your original IP.
Of course there are additional methods that you could use however many people just believe their VPN will protect them.
@@SteveGillham ok if FBI Say take me real IP, logs VPN service take
@@legion465 I am not sure what you are saying ?
Law enforcements can request information from many VPN supplies, and those that say do not log anything or are out of reach of the law enforcements only can protect you so far.
If you was using a VPN and it drops, then your original IP (from your ISP) that you are using as you start your VPN is then captured, thus this can be connected to a person. There are lots of ways to be caught, but normally Businesses are not interested in pursing unless you do something big.
The title is misleading. Honeypot is used for threat Intel and not for catching criminals 👎
Part of catching criminals is using Threat Intelligence.
Threat Intelligence is gathered in multiple ways, including Honeypots, Darkweb forum insiders and telematics from internet security tools.
he didn't just talk about honeypots the whole vid lmao
How can a layman dload t-pot but not f himself over. He mentioned it's volatile? I have no clue. My fb got hacked good though and the hacker literally calls me. 18 times....
T-Mobile Uber instacart AT&t have the same customer service they've cracked they've robbed me and my wife of $8,000 please do something about that
also got 👆same issue but reaching out to 2𝗙𝗮𝗿𝘆𝗮𝗻 got all my lost funds recovered successfully…
I got hacked who can I hire to catch them all I want is there address I will fix them once I get a address. Please contact me if you have a company or person who can do this, not waiting on our government ,
Bro please suggest what i do
Situation :-
I learn all the basic skills for hacking
Solve 300+ ctf
Hackthebox rank(pro hacker)
Tryhackme rank (master)
Portswigger learning pathway completely most of labs
I need internship for experience
What can i do how i get free internship
How i approach , what i add in resume, list some certificate in order and how to approach for internship
Your trying to be a hacker or get a job?... you need to find 0day in system
Monero cant be tracked