Sounds like I just need to create a website that's secure enough to keep out bots and script kiddies while looking so obvious like a honeypot that no legitimate hackers ever try to get in
Unfortunately, three-letter agencies steal most of their good work through legal coercion, and tend to actually be pretty terrible at the whole "hacking" thing so we get these embarrassing pot-shots at the low-hanging fruit instead
I always thought the idea of a pot full of honey was flawed due to its space consuming shape as opposed to a cylindrical can or something akin to a keg, more so along the lines of a coffee can.thank you for your video, very informative.
I assume they're shaped like that for easier handling/tying with string/whatever, as are other jars and pots. It's probably important for liquid containers to be an easily holdable shape since they're heavier than dry product
but then the handle could waste space when stacking the contaniers together (if on sides). Keep in mind that honey can crystalise so you need to have wide opening to get it out.
Making large pots in the past fully cylindrical was impractical, higher skill to make it right and higher chance of it getting fucked up during firing. If it gets knocked over you also lose all the contents whereas a pot shape retains a significant portion.
Me watching this video out of interest, and random curiosity... Then realizing it could technically be a honeypot, and now people think I'm some kind of hackerman
Several years ago I had a home FTP server port-forwarded and on 2 occasions someone tried using a default login. They didn't get in since I configured my server properly.
Seen a couple videos so far and definitely dropping a sub. You should consider making an OPSEC video or series I think a lot of people would like that.
I think alot of people (even some of those who _aren't_ Normies) seriously need that tutorial, real bad...because I see alotta people fall for'em and take'em seriously.
@@Pieguy223 on almost every mainstream site: to 4-chan to Twitter to Discord (to name just a very few here). And in some instances are chained together in usage. such as: 4-Chan and Discord here. (Meaning here: That a fed may try to communicate or chat with you via 4-chan but then may invite you on there ((to Ensnare/bait you)) to a discord server to then try getting a confession/voice recording out of you.)
This is off topic, but with your fondess of free software and security, what are your thoughts on React OS? I'm new to the channel, and I'm curious what you think, since it's not Linux / Unix like.
@@samuelfreeman5483 I honestly think that ReactOS is mostly a waste of time. The very talented programmers who run that project should rather use their time to improve wine. Pretty much the only advantage ReactOS has over wine is that you can run Windows drivers natively - in theory. But that means that you have to use a system that's basically Windows internally, which is so inferior to *nix system that it's not worth the hassle. It would be better to add a compatibility layer to wine that could do the same thing without making it a stand-alone OS. As it is, even if it worked as intended, there just isn't any good use for such a system.
I know this is about honeypots but just needed to say this. Forwarding SSH to WAN is something I'd not do at all, no matter what account is allowed to login. If you have a server, just tunnel into the local network for ssh and everything else that is even vaguely security relevant. OpenVPN rules.
Now the hackers will have to use game theory to figure out whether your computer is a honeypot or is just trying to make them think it is a honeypot, and actually stores real information, or whether it is designed to make it look like the latter and is actually the former.
He talked about how to get BTC anonymously but how do you get monero anonymously? How do you reload your monero there? Why do people run whole monero nodes on their tor browser? Do you get paid for running them nodes? I only came here because I had no clue what a Honeypot was but my questions could probably make up a whole new episode
My philosophies revolve around making a completely real and dedicated system connected to practically nothing. A pseudo-network pretending to be doing everything it should be. No cut corners. Impractically expensive, but immensely practical.
This is quite an interesting watch... but why would the regular internet user want to avoid honeypots? Are there malicious honeypots out there that want to catch innocent people in order to hack them, steal their information and whatnot? It would be great to know.
A honeypot is usually used to blackmail businessmen. Usually an attractive person tailored to the preferences of the target. An example can be found in the movie "The Interview"
So are attackers getting into the actual network through a honeypot or is an isolated from the real network? Are attackers getting real information or falsified information that appears to be real?
Talk about gentoo single gpu passtrough, I'd post the reddit or gitlab link to an interesting script repo that I've found, but YT shadowbans me when I do it even if I replace . with (dot) in the url.
"CIA fellas glow in the dark" ~ one of the top 3 greatest men to ever live (paraphrased for youtube). The other 2 are Jesus and Gaddafi. With Jesus being 1 and Terry being 2. The bonus 4th is an Austrian war hero, artist and politician who's name slips my mind. He was a homeless immigrant from a poor family who was decorated twice for bravery in the first world war and rose to lead the country he emigrated to a few years later, very inspirational story. One of the few true men of action if you will. Say what you want about the man but he had a belief, he stepped out of his comfort zone to act on it, and he almost won, he almost literally took over the world, that's pretty cool imo.
Thank you. I feel like this is information that I had parts of but never like the full picture. It's like you filled in all the color for me and I just had the outlines of things.
So... in short. It is like building a house without a door with a house inside with a door locked. The person goes in the big house easily and starts getting into the smaller house, but leaves because he can't. So you reinforce the outer house with a door that has a lock on it and bar the house inside. The person goes back and unlocks the door outside, but is stuck with the inside and tries to bring a hammer to break down the door inside. You meanwhile build a bar on the door outside and make the door inside be metal instead. The person goes, breaks the door outside and once inside, he cannot do anything, so he leaves and is afraid because he knows he was under surveilance so he leaves permamently. Then another guy comes around, but cannot even get through the first door, because now... it is made of metal too with a good lock and a bar behind it.
This episode was sponsored by Honey, the free browser extension that saves you money while selling your information.
wait..
with honey you save money
By stealing your cookies lol
This channel is a Honeypot
You re welcome
Delicious 😋
Confirmed. Mental Outlaw is glowing.
@@ixp8605 mental outglow
Glow sac pot
Your*
*clicks video
*question in title is answered within 3 seconds
how is this possible
no
@@yasyasmarangoz3577 :(
I disagree. Can you explain how the question has been answered in the first 3 seconds and why you think so?
@@amir3515 sorry, first 13 seconds
@@aetvrna ah ok!
4:05
So you're saying hackers will overlook my top secret files if I store them in a single folder on a VM labeled "Top Secret"?
No, "medium secret " is better
@@hicknopunk I prefer my secrets medium-rare
yeah
no one would be that dumb
@@MelancholySky kek
or you could triple fake them and say bottom secret
I love honey. Honey is the food that never expires
Sponsored by Honey
Unlike my credit card which is why I love paper money, including you
ok elon musk's son
This comment was sponsored by honey
Herro xi xianping!
Thank you. This was interesting to learn.
Kick bricks glowie
Monka
They even need to avoid Honeypots.
Quit pinging my devices fedboi
Ahh, yes. But didn't you guys invent these?
YOU RUN THEM OVER WITH YOUR CAR
THEY GLOW IN THE DARK
IT'S WHAT YOU DO
You're a man of culture
*bleep cia bleep*
Terry knew how to use ingenious analog methods to combat digital age surveillance.
Plot twist: this video itself is a honey pot for people trying to avoid honey pots for illegal purposes
Me who got it recommended to be and was just like: what?
I really love how he just answers the question right away, no B's intro, no asking the question that's in the title.
The hero we need, but don't deserve.
B's?
Sounds like I just need to create a website that's secure enough to keep out bots and script kiddies while looking so obvious like a honeypot that no legitimate hackers ever try to get in
10000 IQ 🧠
So it's basically trying to outsmart the hacker's outsmarting
Unfortunately, three-letter agencies steal most of their good work through legal coercion, and tend to actually be pretty terrible at the whole "hacking" thing so we get these embarrassing pot-shots at the low-hanging fruit instead
You may have outsmarted me, but I outsmarted your outsmarting!
Too much flexing is giving me a headache.
The automated attacks are one of the key exceptions where you actuly do gain security through obscurity.
I always thought the idea of a pot full of honey was flawed due to its space consuming shape as opposed to a cylindrical can or something akin to a keg, more so along the lines of a coffee can.thank you for your video, very informative.
I assume they're shaped like that for easier handling/tying with string/whatever, as are other jars and pots. It's probably important for liquid containers to be an easily holdable shape since they're heavier than dry product
Lyr QK Wouldn't they just have handles then??
but then the handle could waste space when stacking the contaniers together (if on sides).
Keep in mind that honey can crystalise so you need to have wide opening to get it out.
Making large pots in the past fully cylindrical was impractical, higher skill to make it right and higher chance of it getting fucked up during firing. If it gets knocked over you also lose all the contents whereas a pot shape retains a significant portion.
@bob bobthebobbobofbobby I like this idea
POV: You're a whitehat that accidentally logged into a honeypot server
White hats are killing the people of faith
The real honeypot is always in the comments.
[proceeds to disclose entire OPSEC procedures]
Is that an r/LPT reference ?
I'm your 100th liked person
"How to avoid glowies" any% world record attempt.
I like how you answered what a honeypot is right off the bat, instead of leading us on with an intro and filler to pad for time
That I can respect. I hate when people milk content :/
Me watching this video out of interest, and random curiosity...
Then realizing it could technically be a honeypot, and now people think I'm some kind of hackerman
Now here I was thinking this video would show me a deep history of the dangers of pots that have honey contained in them, maybe one day.
Several years ago I had a home FTP server port-forwarded and on 2 occasions someone tried using a default login. They didn't get in since I configured my server properly.
Kind of a risk port-forwarding an FTP server. At least use SFTP with pubkey or even better set up a VPN.
@@minepro1206 I did have encryption set up on it, and I stopped having it be port-forwarded years ago.
@@GregoryKarastergios FTPS?
@@minepro1206 Yes
@@GregoryKarastergios Just realised you are probably Greek. Δύσκολο να βρεις Έλληνες εδω 😄.
I use honeypot to collect network worms and malwares in LAN, and identify infected PCs/laptops..
Ok your 45
@@Lusidan Don't diss my man Mohammad like that :(
Thank you Mohammad, very nice! 🙂 👍
@@Lusidan u really think that someone remotely knowledgeable about cybersecurity would have their Id pic and full name on yt?
@@autosneak1618 Y E S. .Mohammad is based lol
Seen a couple videos so far and definitely dropping a sub. You should consider making an OPSEC video or series I think a lot of people would like that.
He did, recently.
@@Supertimegamingify when? Or what is it called?
@@yes-jz5hd Bad Opsec
Opsec! Opsec! Opsec! Oi! Oi! Oi!
I really appreciate your videos. They’ve inspired me to pull the trigger and get a degree in cybersecurity
This man really just explained in the first 15 seconds. Absolute chad behavior.
*me not knowing any form of code or website creation"
"Ah yes I shall use this to catch many hackers"
Next week: *Who are the Glow Boys and how to avoid them*
I think alot of people (even some of those who _aren't_ Normies) seriously need that tutorial, real bad...because I see alotta people fall for'em and take'em seriously.
@@tzardnickolasthelitromanov On what chat networks?
@@Pieguy223 on almost every mainstream site: to 4-chan to Twitter to Discord (to name just a very few here).
And in some instances are chained together in usage. such as: 4-Chan and Discord here.
(Meaning here: That a fed may try to communicate or chat with you via 4-chan but then may invite you on there ((to Ensnare/bait you)) to a discord server to then try getting a confession/voice recording out of you.)
@@tzardnickolasthelitromanov are you sure you're not just a schizo
Damn, new videos everyday. You work hard dude, keep it up.
Love the content.
Came for pots of honey, stayed for antivirus protection
why is this channel so damn good?
he fine too
That thumbnail, haha.
The name is weird though. Honeypots catch weasels not bears
or honeybadgers
or ants
or Jews
Bears eat honey, and it's more directly referencing Winnie the poo. Go back to the short bus.
Well, with that thumbnail alone, there would be one country whose citizen can't watch this video.
said country already blocked youtube already lol
Be not afraid to speak the name of your enemy
@@randombrit13 west Taiwan
@@tsukuyomi7948 you are a good human,
@@tsukuyomi7948 East East Turkistan
This is off topic, but with your fondess of free software and security, what are your thoughts on React OS? I'm new to the channel, and I'm curious what you think, since it's not Linux / Unix like.
Pretty awful
@@gayusschwulius8490 yeah, but I hope it gets better. It really is a cool project.
@@samuelfreeman5483 I honestly think that ReactOS is mostly a waste of time. The very talented programmers who run that project should rather use their time to improve wine.
Pretty much the only advantage ReactOS has over wine is that you can run Windows drivers natively - in theory. But that means that you have to use a system that's basically Windows internally, which is so inferior to *nix system that it's not worth the hassle. It would be better to add a compatibility layer to wine that could do the same thing without making it a stand-alone OS. As it is, even if it worked as intended, there just isn't any good use for such a system.
Alternative title:
Mental Outlaw teaches you how do buy drugs for 11 minutes
Love your videos, how is it possible that you upload everyday with that content quality 😀 keep it up 💪
KNAWLEDGE
Flareivecdershi
Kuz internet = yes
is it possible he's got a team of people helping?
The feds are punching the air rn seeing this video
"And I would've been able to get away with it too, if it wasn't for you goddarn meddlin' Script-Kiddies"
This video is glowing so bright jfc
I just thought i was gonna watch an actual meme guide of how to avoid honeypots if you’re happen to be a bear
Plot twist: dude's always talking bad about google but uploads to TH-cam (just kidding keep up the good work)
Today on "So you got into CS but don't know what you got yourself into"...
It's more toward IT rather than CS imo
Nope getting it quit well
Me and the boys when Mental Outlaw uploads: 😎
Me and the boys when Mental Outlaw has car engines in the background:
I know this is about honeypots but just needed to say this.
Forwarding SSH to WAN is something I'd not do at all, no matter what account is allowed to login. If you have a server, just tunnel into the local network for ssh and everything else that is even vaguely security relevant. OpenVPN rules.
That works really well for the #1 reason people use ssh... connecting to rented VPS's
I consider every website a honeypot essentially. Especially google and Microsoft sites.
I know it's a small win, but it feels good to know that their opsec is so bad.
I thought my girlfriend was a honeypot when she brought up crime statistics
1356 moment
@@My_Old_YT_Account cringe
@@CEOofAutism sadly the statistic is true though
Cringe
When I saw the thumbnail and title, I genuinely thought that literal pots of honey were dangerous.
But no, this was actually pretty interesting : o
I thought I was watching Adam Ragusea
"Please, Mr. Criminal, run this proprietary software on your system so I can make sure you're cool to commit crimes with."
And people fell for this?
I put HoneyPot as the device name for my main computer, also it's a windows machine
Now the hackers will have to use game theory to figure out whether your computer is a honeypot or is just trying to make them think it is a honeypot, and actually stores real information, or whether it is designed to make it look like the latter and is actually the former.
Based mind games
thanks for just telling me straight up without 5 hours of intros
Plot twist!
This video IS the honeypot and we're all on a list now!
I've been watching a few of these videos halfway through, and all of it has been going waaaaaayyyy over my head, but some of it is still good info lol
He talked about how to get BTC anonymously but how do you get monero anonymously? How do you reload your monero there? Why do people run whole monero nodes on their tor browser? Do you get paid for running them nodes? I only came here because I had no clue what a Honeypot was but my questions could probably make up a whole new episode
My philosophies revolve around making a completely real and dedicated system connected to practically nothing. A pseudo-network pretending to be doing everything it should be. No cut corners. Impractically expensive, but immensely practical.
Terry Davis would be proud.
Man this really be oriented towards the average /g/ user.
This is quite an interesting watch... but why would the regular internet user want to avoid honeypots? Are there malicious honeypots out there that want to catch innocent people in order to hack them, steal their information and whatnot? It would be great to know.
Mostly malicious ads and popups
@@sunbleachedangel I see.
A honeypot is usually used to blackmail businessmen. Usually an attractive person tailored to the preferences of the target. An example can be found in the movie "The Interview"
So you're telling me Portal 2 might really be an experiment and Chell's escape gave the bots an idea on what they're dealing with
Everything's a form of honeypot now. Except honeypots ironically, they're mostly corn syrup.
When you make your actual server look like a honey pot
Missed opportunity for a Honey ad.
You ever just stumble into a mid-level lecture on a course you've never studied? Cuz this feels a lot like that.
*No!* *pooh!* *you'll get the flu!*
Aight I'll see myself out before a foreign agent tries any funny business.
That's a great way to nuke your social credit score!
Go to Gulag
That's good advice: stay out of sticky situations!
I thought this might be clickbait quite the opisite good shit sir
I hate those honeypots! i hate when i ride a bike into them and almost die!
You bro what linux setup do you use ? Can you show off your desktop setup and your thoughts ?
Yo, I thought you were actually going to explain honey pots
I feel Scammed
You should do a video on x86 vs ARM
Is Protonmail and protonvpn a honeypot?
no
We're all on a watch list now
I am now on a mossad watch list loool
Not the type of honey pot I was looking for, but stayed for a bit.
I was literally asking internally wtf a honeypot is while watching a different video of yours earlier today lol
I remember learning about honeypots from the interview. Shit probably wasn’t accurate but still funny as shit
Maybe the real honeypots were the friends we made along the way
Honey is a free browser extension designed to save you money wtf are you talking about
thank yuo dr comer
Def getting fed vibes from you...
Missed opportunity for a Honey sponsorship
Man he's glowing so hard it looks like he drank a bottle of glowstick juice
4chin is a honeypot, watch out for glowies!
Don't care the glowies can go and suck my toe.
honestly clicked this expecting a meme but this is kinda interesting
So are attackers getting into the actual network through a honeypot or is an isolated from the real network? Are attackers getting real information or falsified information that appears to be real?
Talk about gentoo single gpu passtrough, I'd post the reddit or gitlab link to an interesting script repo that I've found, but YT shadowbans me when I do it even if I replace . with (dot) in the url.
@Nicefisher eh Idk. The reddit post is on r/Gentoo, post name is "gentoo single gpu vfio passthrough scripts"
pov: you clicked and failed the test
"CIA fellas glow in the dark" ~ one of the top 3 greatest men to ever live (paraphrased for youtube). The other 2 are Jesus and Gaddafi. With Jesus being 1 and Terry being 2. The bonus 4th is an Austrian war hero, artist and politician who's name slips my mind. He was a homeless immigrant from a poor family who was decorated twice for bravery in the first world war and rose to lead the country he emigrated to a few years later, very inspirational story. One of the few true men of action if you will. Say what you want about the man but he had a belief, he stepped out of his comfort zone to act on it, and he almost won, he almost literally took over the world, that's pretty cool imo.
@@hellomynameisjoao God guides my fingers brother!
@@alexvermaak1759 Most based comment I have ever seen. I like your list of heroes.
This dude is way better than mutahar on stuff like this it seems.
What is that wind in the background lol?
Ah Honey Pots, this takes me back to the one I built.
hmm what if you coukd make ur real server look like a honey pot if somebody gets in ever?
Seeing an ai go up against this would be interesting
Someone wanna create a honey pot for big tech and the government, to see how much access they really have??
Thank you. I feel like this is information that I had parts of but never like the full picture.
It's like you filled in all the color for me and I just had the outlines of things.
The fact that I got recommended this makes me a little suspicious about who is now watching me
Why is TH-cam recommending this
So... in short. It is like building a house without a door with a house inside with a door locked. The person goes in the big house easily and starts getting into the smaller house, but leaves because he can't. So you reinforce the outer house with a door that has a lock on it and bar the house inside. The person goes back and unlocks the door outside, but is stuck with the inside and tries to bring a hammer to break down the door inside. You meanwhile build a bar on the door outside and make the door inside be metal instead. The person goes, breaks the door outside and once inside, he cannot do anything, so he leaves and is afraid because he knows he was under surveilance so he leaves permamently. Then another guy comes around, but cannot even get through the first door, because now... it is made of metal too with a good lock and a bar behind it.
Best youtube channel
I'm new to this stuff. What is a glowie?
Isn't it better to disable password login overall and use private key + password instead of changing the root user?
I had no idea what this was about, I thought I was going into this to watch a video about honey.
me, a good little boy who has never committed a crime: oh boy!