Watch this hacker break into a company

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ก.ย. 2024
  • Social engineers, or people hackers, specialize in getting you to share information you shouldn't -- like personal details that could lead to a password being stolen. Laurie Segall reports.

ความคิดเห็น • 2.9K

  • @ScipioWasHere
    @ScipioWasHere 8 ปีที่แล้ว +5600

    Spoiler Alert: The company was Yahoo

    • @dah5096
      @dah5096 8 ปีที่แล้ว +47

      home depot and target on episode 2 and 3

    • @plpchlr8688
      @plpchlr8688 8 ปีที่แล้ว +16

      or microsoft....

    • @williamdillery2740
      @williamdillery2740 7 ปีที่แล้ว +147

      Microsoft tech support is like 90% Indian

    • @markwhoeverdafuck4114
      @markwhoeverdafuck4114 7 ปีที่แล้ว +64

      Yeah the fake tech support William

    • @videogyar2
      @videogyar2 7 ปีที่แล้ว +2

      It could be any company, really.

  • @adamd0ggg2
    @adamd0ggg2 7 ปีที่แล้ว +463

    A cyber security guy gave a lecture in my class once and he said "The most difficult part of cyber security is the people". "You can rewrite code, you can isolate networks, but people like to be helpful and that is all it takes for a hacker to get in"

    • @YTStoleMyUsername
      @YTStoleMyUsername ปีที่แล้ว +1

      This is true. People believe that most people are not very trusting of others but in fact, studies have shown that people are much more trusting of strangers than we'd assume.
      One of the studies I remember they called a bunch of random people, told them to flip a coin, and if it was heads, they win money. If it was tails, they didn't win.
      It was split evenly 50/50 on who reported heads and tails, meaning people weren't lying to say they got heads just to win the fake prize. They actually believed the caller and flipped a coin. Pretty interesting.
      This sort of psychology can be quite fascinating, especially since we don't know exactly how or why it all works the way it does.

    • @stefHin
      @stefHin 10 หลายเดือนก่อน

      A quote that I remember is "if there is a conflict between security and usability, usability always wins".
      An example for this is that if employees are required to use long and complicated passwords, they will start writing them down on a piece of paper on their workplace.
      I also know a company where there was a requirement to use second factor authentication to access certain data, and the session regularly expired while looking through the data. Only took 1 day until someone wrote a "stay alive" script that prevented the expiry.
      If you restrict the user rights on computers too much (e.g. keep them from installing software they actually need), employees will start working on their private PCs and transfer data.
      If employees are required to change their passwords regularly, they will only change a minor detail about it (e.g. change a digit at the end of it)
      I think this goes in a similar direction - you can totally make an IT system quite secure, but you really need to be careful how it impacts usability. This, combined with, as you said, general helpfulness and trust in other people's good intentions will always be a weakness.
      Imo, if social engineering is done well (involving publicly available information about a company or private data that makes things seem plausible, almost everyone will fall for it. I include myself here btw. If someone really did his research on me and crafts an email with believable content from a person or company I interact with, without any obvious red flags, it is quite likely that I will click a link or open an email attachment...

    • @LeonHuang-nj2nr
      @LeonHuang-nj2nr 9 หลายเดือนก่อน +2

      Yes sir 😺

    • @budgetarms
      @budgetarms 10 วันที่ผ่านมา +1

      yeah, it's said all the time, it's not surprising, I think that is has been said too much, everyone knows it

  • @alida004
    @alida004 8 ปีที่แล้ว +2771

    i wish i had this lads social skills

    • @Claytonnn
      @Claytonnn 8 ปีที่แล้ว +107

      Rhandy it's not even social skills, it's just lying. You have the skills to do this haha

    • @jona823a
      @jona823a 7 ปีที่แล้ว +207

      Everything is easy, if you know what you're doing

    • @bloodynachos
      @bloodynachos 7 ปีที่แล้ว +7

      just stick to the script and its easy as hell

    • @kukuricapica
      @kukuricapica 7 ปีที่แล้ว +28

      I recommend you to watch some defcon presentations on social engineering. It's really easy to convince people to give you the information. You have to understand that all he does was asking a guy to search a web-site. What they didn't tell you that somebody had to find that exploit, wrote a code/script... Not to mention they need to mess around his/theirs system and dig deep for flaws.

    • @michael_c137
      @michael_c137 7 ปีที่แล้ว +31

      guys, I think he was being sarcastic

  • @alprazo
    @alprazo 4 ปีที่แล้ว +166

    "Oh btw, Ken was fired"

    • @alprazo
      @alprazo 5 หลายเดือนก่อน

      @matthewmorrison3703 Nigga I don't even remember what this video is about

    • @ayushpandey8766
      @ayushpandey8766 2 หลายเดือนก่อน

      😂😂

  • @allmyducksinarow
    @allmyducksinarow 4 ปีที่แล้ว +282

    When used for crime, these kinds of people are called manipulators and sociopaths. This guy was smart enough to make a good living off of being conniving and convincing. Pretty cool dude.

    • @V-ANews
      @V-ANews 3 ปีที่แล้ว +13

      Ya alot of the top hackers change sides after they are caught by fbi and are asked for a good plea deal or no jail at all if they would instead use their knowledge and help the government

    • @centurion_ratslayer
      @centurion_ratslayer 3 ปีที่แล้ว

      It's just fun

    • @callofdutyblackops9
      @callofdutyblackops9 3 ปีที่แล้ว +23

      That's not sociopathy, Sociopathy is someone who doesn't have the ability to form their own emotions, and can't really comprehend why emotions are important, and they can become great a miming emotions, so yes sociopaths are great manipulators, but there's a whole bunch of impulse stuff that comes along with it.

    • @paogruniverse
      @paogruniverse 3 ปีที่แล้ว +2

      @@callofdutyblackops9 agreed, and I'll add to grace that Being used for crime or not it's still manipulation.

    • @narcleptik
      @narcleptik 2 ปีที่แล้ว

      What a crockof shit he's stealing

  • @jesperrasmussen4047
    @jesperrasmussen4047 7 ปีที่แล้ว +2069

    Watch this hacker break into a company > Watch this random guy make a phone call and install remote desktop.

    • @clarencedf1100
      @clarencedf1100 7 ปีที่แล้ว +40

      lol yeah that is what I thought too

    • @adamwebster1652
      @adamwebster1652 7 ปีที่แล้ว +68

      I like to think he had Social Engineering Toolkit on Kali on that laptop installing his own propagating java backdoor.

    • @BantuBeiraMar
      @BantuBeiraMar 7 ปีที่แล้ว +21

      Hardly a random guy.

    • @BantuBeiraMar
      @BantuBeiraMar 7 ปีที่แล้ว +5

      Adam Webster well, he did write it.

    • @pauolive7239
      @pauolive7239 6 ปีที่แล้ว +39

      never heard about privilege escalation? if he hacks a pc inside a company, he can access to the whole

  • @cscarlton24
    @cscarlton24 8 ปีที่แล้ว +1315

    I need to hack into my customer's brains

    • @himenchiemsp2086
      @himenchiemsp2086 8 ปีที่แล้ว +1

      I think that's impossible

    • @xMaverickFPS
      @xMaverickFPS 8 ปีที่แล้ว +68

      use a hatchet.

    • @Khatisgood
      @Khatisgood 8 ปีที่แล้ว

      njice nice meme nice nice meme nice meme

    • @smekminfisk
      @smekminfisk 8 ปีที่แล้ว +1

      Yes, learn your marketing.

    • @nightsinder
      @nightsinder 8 ปีที่แล้ว +5

      its not impossible, its possible. We have something called a brain inplant where a chip gets inplanted in your brain, after thats done you can hack it. They inplant these chips into paralyzed people in some countrys like America so they can gain control of parts of their body. So with a chip inplanted in your brain hackers can manipulate the signals and make harm. This tech is many years old so google it if you dont believe me.
      You can do same thing with cookroaches and other insects aswell, Google cyber cookroach, inplant a chip into his antennas and you can control the cookroach like a robot.

  • @_exttt
    @_exttt 8 ปีที่แล้ว +1795

    2:18
    "We gotta grow up a bit"
    *sees spider-man blanket and mannequin in background"
    ok

    • @uc1hamadara13
      @uc1hamadara13 8 ปีที่แล้ว +18

      The day an Age where being a gee is still "Childish "

    • @andrewdimonda10
      @andrewdimonda10 8 ปีที่แล้ว +3

      Extritio I thought this same exact thing and scrolled down to see someone else did too lol

    • @PravSrpski
      @PravSrpski 8 ปีที่แล้ว +55

      It's not childish to be a fan of something

    • @mightymorphinetime
      @mightymorphinetime 8 ปีที่แล้ว +3

      lmfaaooooo

    • @Reiiyne
      @Reiiyne 7 ปีที่แล้ว +26

      That joke was actually a lil more funny because it's comin' from a weeb, haha.

  • @dylann9719
    @dylann9719 2 ปีที่แล้ว +138

    The most ironic sentence that came out of his mouth “I really suck with computers man” 😂😂😭

  • @kylemossi
    @kylemossi 8 หลายเดือนก่อน +19

    I find it very hard to believe that this script could, with a *single* input from a person, grant any useful access to anything, let alone enough to 'bring down the company'. This is hyperbolic to say the least.
    I've worked in Operations and tech support, I would never go to a page one of my clients told me to go to, I would vet it on a virtual machine....for THIS very reason.

    • @Pizza793
      @Pizza793 5 หลายเดือนก่อน

      I know right, this is news doing scare bs once again. Just clicking a link doesn’t give them access to your whole computer. Otherwise it be completely unsafe to surf the web, since clicking links is the entire process of surfing the web. These scam sites are always trying to get you to run executables. Why the heck would they bother if just clicking the link for the executable download was enough?

    • @Michael_Jackson187
      @Michael_Jackson187 20 วันที่ผ่านมา +4

      Yea it’s mostly bullshit unless he had some kind of zero-day that allowed him to get a reverse shell onto this dudes pc through RCE but I really doubt that.

  • @mrlevinielsen
    @mrlevinielsen 6 ปีที่แล้ว +1011

    "What do you think of when I say the word hacker?"
    um
    *inspect element*

    • @Dark_Rizz
      @Dark_Rizz 5 ปีที่แล้ว +14

      Yeah keep *inspecting robux in roblox dude*

    • @nightviper7354
      @nightviper7354 5 ปีที่แล้ว +1

      +MrLeviNielsen
      lmao😂😂😂

    • @nightviper7354
      @nightviper7354 5 ปีที่แล้ว +1

      but that's true

    • @blakebarbee7224
      @blakebarbee7224 5 ปีที่แล้ว +3

      @@Dark_Rizz Moron you can't hack robux by messing with inspect element. The currency is stored on secured roblox servers. I already tried with picto and failed.

    • @Dark_Rizz
      @Dark_Rizz 5 ปีที่แล้ว +12

      @@blakebarbee7224 that was a joke don't take it too serious you'll get heart attack LOL

  • @stillmillionair
    @stillmillionair 7 ปีที่แล้ว +1104

    For each thing he hacked he lost a single hair

  • @kylechoi56
    @kylechoi56 8 ปีที่แล้ว +154

    So CNN learned clickbait...

    • @ikennaunamadu4692
      @ikennaunamadu4692 6 ปีที่แล้ว +2

      Kyle Choi how was this Click Bait??

    • @jayson16
      @jayson16 6 ปีที่แล้ว +2

      ikenna unamadu title watch this hacker break into a company instead he just calls a bussiness man and let him go through a computer..

    • @jayson16
      @jayson16 6 ปีที่แล้ว

      Marcus 5_887_4 lol so the computer broke in the company?

    • @visvge4934
      @visvge4934 3 ปีที่แล้ว

      Boy does this comment age well

  • @multiwebinc
    @multiwebinc 4 ปีที่แล้ว +24

    I'm guessing the real problem here is not that Ken from support visited a website, it's that the remote desktop software on his computer wasn't configured to ask for authentication. All the website did was provide his computer's local IP address and then the hacker used that to connect to his computer. He could have easily done this completely without Ken from support's assistance by simply scanning the local network for computers that respond on whatever port they are using for RDP. That whole call to Ken from support was nothing but added dramatic effect.

    • @dominickhart3435
      @dominickhart3435 ปีที่แล้ว +1

      What if he wasnt given the local ip of the company?

    • @kylemossi
      @kylemossi 8 หลายเดือนก่อน

      @annaparker8234 I think this video give the wrong portrayal. I'm in tech so I know what you are talking about, which is totally logical, but this video definitely made it look like the user interaction was all it took to completely own them.

  • @chamalcabraal2619
    @chamalcabraal2619 4 ปีที่แล้ว +34

    Plot twist : The company was Twitter

  • @OkoYT
    @OkoYT 7 ปีที่แล้ว +884

    "we gotta grow up a bit" *he says sitting in front of a giant spiderman"

    • @elwoodwarren-kuelgen8874
      @elwoodwarren-kuelgen8874 7 ปีที่แล้ว +1

      ya

    • @estradiolvalerate8925
      @estradiolvalerate8925 6 ปีที่แล้ว +34

      dafuq is wrong with that?

    • @cyogian
      @cyogian 6 ปีที่แล้ว +60

      And here is another guy who thinks that growing up means giving up Anime & Cartoons.😂😂

    • @MeetYourArchitect
      @MeetYourArchitect 5 ปีที่แล้ว

      lmao

    • @johnpetun1180
      @johnpetun1180 5 ปีที่แล้ว +1

      We got lots of famous people who are fans of marvel. What’s wrong with that

  • @surlado9467
    @surlado9467 6 ปีที่แล้ว +1340

    ***Clicks link***
    Hacker: LMAO JUST HACKED YOU NOOB

    • @Arctic740
      @Arctic740 6 ปีที่แล้ว

      BOI DONT TRUST THE LINK I GOT RATTED!!!!!!

    • @untriptrip7542
      @untriptrip7542 6 ปีที่แล้ว

      lol you cant do that thats impossbile is this like some windows 7?

    • @surlado9467
      @surlado9467 6 ปีที่แล้ว

      untrip trip you’re brain dead. You’d need a JavaScript RCE exploit (all of them are patched) so it’s impossible

    • @P35-h4s
      @P35-h4s 6 ปีที่แล้ว

      leaking RC4 isnt hard lol no where near it

    • @trolltunes4286
      @trolltunes4286 6 ปีที่แล้ว

      go to d99q.cn if you want to get hacked lol
      Edit: actually don't go

  • @spookyeuh894
    @spookyeuh894 7 ปีที่แล้ว +437

    I think of the Hacker known as 4chan.

    • @mr.q7
      @mr.q7 7 ปีที่แล้ว +60

      He's the 400 pound man in the basement, right?

    • @aquaexnar3093
      @aquaexnar3093 7 ปีที่แล้ว +13

      Yeah, his real name is Chuck, and it's his mother's basement.

    • @zipzapfrik_shun6759
      @zipzapfrik_shun6759 6 ปีที่แล้ว +1

      Spooky euH

    • @hustlerzNcake
      @hustlerzNcake 6 ปีที่แล้ว +4

      Uh 4chan is a chat service.. not a hackers name.

    • @Zag22
      @Zag22 6 ปีที่แล้ว +13

      Broken Logic whoosh...

  • @motherflange
    @motherflange 4 ปีที่แล้ว +22

    My grandfather possessed exemplary hacking skills. He killed my grandmother with an axe in 1982.

  • @mrvic3952
    @mrvic3952 4 ปีที่แล้ว +20

    There are several levels of hack.
    He hacked his browser this way and that is all you need bro...

    • @m4n4nm4n4n
      @m4n4nm4n4n 4 ปีที่แล้ว

      i need hackers worldwide m4n4n@hotmail.com

  • @ybashb
    @ybashb 7 ปีที่แล้ว +92

    "Can you go to www.survey-pro.com"
    *i go to it*
    "Now we have full access to his computer."
    shit

    • @divanvanniekerk7161
      @divanvanniekerk7161 6 ปีที่แล้ว +2

      ticK Nearly clicked the link myself!

    • @dankemu2477
      @dankemu2477 6 ปีที่แล้ว

      I clicked it took me to a Telus survey

    • @michalhumaj1912
      @michalhumaj1912 6 ปีที่แล้ว +4

      that's bullshit, browser always prompts you if you are giving any sort of permission. On the other hand if the link downloaded the file, he would have to open it/run it. So I am really not sure how they have done it. Probably was oversimplified in this video

  • @ittotaq
    @ittotaq 8 ปีที่แล้ว +95

    Takes more than 2 minutes to reach a human voice when calling tech support...

    • @kenm908
      @kenm908 7 ปีที่แล้ว +34

      not when you work in the company

    • @LilaBear
      @LilaBear 5 ปีที่แล้ว

      No company I've ever worked for has had automated tech support. Every time I've called it's been a human straight away.

    • @CitizenPerkins
      @CitizenPerkins 3 ปีที่แล้ว +1

      Our internal "customers" were supposed to open problem tickets for help, not call someone in IT. Yea, that rarely worked -- especially for managers and higher. 🤣🤣🤣

  • @tjinspace7001
    @tjinspace7001 8 ปีที่แล้ว +347

    That's not a social problem it's an un-patched-browser problem..

    • @hnoobsho
      @hnoobsho 7 ปีที่แล้ว +35

      He could just as easily asked the operator to try an download a program to see if it works on his computer instead of leading him to a phishing website.

    • @tjinspace7001
      @tjinspace7001 7 ปีที่แล้ว +18

      Chuck Norris If it was that easy cybercrime statistics would be exponential.. Software bugs that can be leveraged are world-class-hard which is why bounties are so high and so sporadically claimed.. Social-engineering is very hit and miss that's why in the rare instances it works it usually doesn't get the attacker that far in to infrastrucure before getting response.
      The headlines you see every month or two are like one out of tens of thousands for that months. At the very least.

    • @robbywilliams8571
      @robbywilliams8571 7 ปีที่แล้ว +1

      nigga browser exploitation is trivial. just because people aren't partcipating in pwn2own or whatever fucking competition doesn't mean there aren't hundreds of fucking exploits being vantaged in the wild.
      computer security is a fucking joke. a 120k line program isn't ever going to be secure unless the entire fucking world audits it and every modification made is signed off on by every1

    • @tjinspace7001
      @tjinspace7001 7 ปีที่แล้ว

      yeah that's why world class hackers are digging in to nvidia driver code looking for sandbox escapes.. Stuff people pay bounties on is way bigger than 120k lines..

    • @PeterAbt
      @PeterAbt 7 ปีที่แล้ว +2

      TJ DEV as far i i understood the support guy opened a file... that he downloaded​ from that website... So i guess it wasn't the browser's fault...

  • @davidd8747
    @davidd8747 4 ปีที่แล้ว +41

    “Hello world”
    I’m in boys

    • @iiReTr0Z
      @iiReTr0Z 4 ปีที่แล้ว

      Print:(“hello, world”)

    • @lykourgospep2682
      @lykourgospep2682 3 ปีที่แล้ว

      @@iiReTr0Z python :)

    • @nightstarry6350
      @nightstarry6350 3 ปีที่แล้ว +2

      @@iiReTr0Z actually print("hello, world") :)

  • @revivalamt6991
    @revivalamt6991 4 ปีที่แล้ว +32

    for anyone wondering, he used metasploitable to create a reverse shell onto his computer

    • @steez4778
      @steez4778 4 ปีที่แล้ว +7

      *metasploit not metasploitable

    • @revivalamt6991
      @revivalamt6991 4 ปีที่แล้ว +4

      @@steez4778 the vm image is called metasploitable...

    • @steez4778
      @steez4778 4 ปีที่แล้ว +7

      @@revivalamt6991 metasploitable is a machine meant to be created to practice exploitation and pentesting, on the other hand metasploit is the one handles the exploits

    • @revivalamt6991
      @revivalamt6991 4 ปีที่แล้ว +3

      @@steez4778 yeah man i got confused

    • @pauljessica971
      @pauljessica971 4 ปีที่แล้ว +1

      Having tried all hack tools on TH-cam,I must say @andrewhack4 on Instagram is the only working one.

  • @shannoninalaska
    @shannoninalaska 6 ปีที่แล้ว +106

    "There are very, very bad people, which means it falls to the good people to try to fight it. We have so much potential to shape our culture, our values, our safety - if not us, then who?"
    Exactly the confirmation I needed to hear to clear up my own dilemma, and feelings of responsibility for others in my situation. I was unsure whether to pursue fighting a seemingly small issue, or concede to someone who is blatantly abusing their power and position because it would be much easier to just give in and a LOT less stressful. But, this guy just gave me more motivation to keep me going. And he is right.

    • @AlexYazanGames
      @AlexYazanGames 2 ปีที่แล้ว +1

      wth?

    • @shannoninalaska
      @shannoninalaska 2 ปีที่แล้ว

      @@AlexYazanGames nevermind, they won. I lost. But I gave them hell in the meantime. Evil does win sometimes.

    • @shannoninalaska
      @shannoninalaska 2 ปีที่แล้ว

      @@puchu_5001 nevermind. It's in the past. Evil neighbors and evil HOA in my old neighborhood in Florida. They attacked a single mom (and others before me too), vandalized my property, and I had to cash in what little retirement I had worth thousands of dollars in order to hire lawyers to fight them. My own lawyers scammed me too. I only lived in my house for 4 years. That was enough for me. You can't win against an evil HOA. Don't bother fighting them. There is no law that will protect you against them. 4 years of hell and that was the last straw. I moved to Alaska. No more HOA ever again.

    • @5kr3aminMunk33
      @5kr3aminMunk33 2 ปีที่แล้ว +7

      @@puchu_5001 she's in Alaska so she was probably in the midst of fighting with a bear; the bear obviously won, took her phone, then made this comment while pretending to be her. It's a very tragic story, and we watched it play out.

    • @AlexYazanGames
      @AlexYazanGames 2 ปีที่แล้ว

      @@5kr3aminMunk33 That’s very tragic. I feel very sad that Shannon died. 😔

  • @basnijland
    @basnijland 7 ปีที่แล้ว +9

    That guy he hacked was genuinely nice

  • @MaritaDiary
    @MaritaDiary 7 ปีที่แล้ว +528

    In my case, with great power comes great electric bills. fml.

    • @zxxczczczcz
      @zxxczczczcz 5 ปีที่แล้ว +2

      .

    • @nightviper7354
      @nightviper7354 5 ปีที่แล้ว

      my electricity bills are only 15$ per month

    • @nightviper7354
      @nightviper7354 5 ปีที่แล้ว

      but good one😂😂😂

    • @mekerr4299
      @mekerr4299 4 ปีที่แล้ว +1

      @@nightviper7354 old is no bill

    • @anemicsilence
      @anemicsilence 4 ปีที่แล้ว

      🤣🤣🤣👍

  • @LifeIsNotWorth
    @LifeIsNotWorth 3 ปีที่แล้ว +7

    me: going on the website and clicking here
    my brain: i hope its the wrong website

  • @tequilatyrant3992
    @tequilatyrant3992 4 ปีที่แล้ว +50

    "we should all grow up..." Says the guy with all the spiderman stuff in his living room loool

    • @ItsCrypticc
      @ItsCrypticc 4 ปีที่แล้ว +6

      Tequila Tyrant spider man isn’t just for kids, how could u think that? That is so stereotypical 😹😹😹

    • @tequilatyrant3992
      @tequilatyrant3992 4 ปีที่แล้ว +1

      It's just a joke bro.

    • @SparkzFortnite
      @SparkzFortnite 4 ปีที่แล้ว

      i was just about to say that🤣🤣🤣

  • @Zoxeo
    @Zoxeo 6 ปีที่แล้ว +37

    I truly believe that hackers will actually become our only protection in the future since the world evolves more around technology now

  • @raccgti73
    @raccgti73 8 ปีที่แล้ว +541

    all he did was RAT the dude xD

    • @CodeCommand
      @CodeCommand 8 ปีที่แล้ว +5

      lmao

    • @piziskewl
      @piziskewl 7 ปีที่แล้ว +92

      and got paid.

    • @therealorberon
      @therealorberon 7 ปีที่แล้ว +47

      with a link to a website? I didn't know you can do that so easily. unless the IT guy clicked on a prompt triggering some js code.

    • @raccgti73
      @raccgti73 7 ปีที่แล้ว +7

      I do cyber security for the USAF lol

    • @GiQQ
      @GiQQ 7 ปีที่แล้ว

      Pikachu Fizz So true

  • @cybercrimetoday4729
    @cybercrimetoday4729 5 ปีที่แล้ว +10

    I see a lot of off comments here, this man is bringing awareness, and considering just how many people and companies are affected every day, I support this work, and will now invite him to appear as a speaker at out awareness summit, well done.

  • @Yetipfote
    @Yetipfote 4 ปีที่แล้ว +24

    not gonna lie. The interviewer got a little bit wet when he told her he successfully hacked the entire company.

  • @Mika-85
    @Mika-85 2 ปีที่แล้ว +13

    That's unrealistic. If that IT guy simply visited the site without downloading anything and the companies corporate IT is even slightly up to date, there's no way he gained access to the computer just by opening a website...
    Either they're making up a story or the IT guy had automatic downloads enabled in his browser which resulted in him catching a drive by download. However no one working in IT should have automatic downloads enables anyway...

    • @thestarz5190
      @thestarz5190 ปีที่แล้ว

      Yeah

    • @Romy---
      @Romy--- ปีที่แล้ว

      Ahhh yes because hackers aren't masterminds. You have no clue what you're talking about. It definitely IS possible, and it's not about having "automatic downloads" enabled.

    • @thestarz5190
      @thestarz5190 ปีที่แล้ว +2

      It isn’t possible to get your computer hacked by opening a website

    • @thestarz5190
      @thestarz5190 ปีที่แล้ว

      Unless there’s a vulnerability but Microsoft would fix it fast

    • @lordreno8911
      @lordreno8911 ปีที่แล้ว

      I agree with this comment, unless that IT guy has a fully disabled firewall and has all the network ports in his pc fully open and unsecured, there is no way just entering a website would get you hacked.

  • @sayyamjain1607
    @sayyamjain1607 7 ปีที่แล้ว +154

    A known hacker is a failed hacker.

    • @ElynourRummyng
      @ElynourRummyng 7 ปีที่แล้ว +2

      Sayyam Jain how?

    • @syndicate286
      @syndicate286 6 ปีที่แล้ว +26

      Sayyam Jain not necessarily... it really depends on if your a white hat or black hat hacker

    • @lehends5683
      @lehends5683 5 ปีที่แล้ว +15

      You probably don't know what hacking is, there is 3 types of hackers, black hat hackers which as you said if they are know they are a failure, there is the grey hat they are neutral they hack but they do not steal any money they just do it for fun then there is the white hat like this guy, he helps companies to protect against black hat hackers

    • @nightviper7354
      @nightviper7354 5 ปีที่แล้ว +1

      not necessarely
      if I'm gonna be a black hat hacker, (there's 20% chance that I'll be one) and I'm known as for example: *3xploit* (my alias), that doesn't mean that I've failed
      as long as I am free and anonymous (my real identity isn't known), I'm successful hacker

    • @captainunderpants2816
      @captainunderpants2816 5 ปีที่แล้ว +4

      your on the FBI hit-list

  • @Stotic_Reader
    @Stotic_Reader 7 ปีที่แล้ว +5

    His mom sounds like she was a super hero.
    Great moral values.

  • @fabbyy7253
    @fabbyy7253 7 ปีที่แล้ว +21

    The second guy has a very thoughtful perspective on life. I think that is honorable. And well...we can be happy a big amounth of "hackers" are white hats. Makes life for the bad guys all the more difficult :-)

  • @Servergmr
    @Servergmr 4 หลายเดือนก่อน +1

    Apparently the stereotypical hackers use MacBooks with Kali Linux, that is so based. It's a literal Hackintosh, that is the opposite of the definition of Hackintosh, ironically enough.

  • @simonedaniel
    @simonedaniel 7 ปีที่แล้ว +135

    Social skills? That spiderman house will scare anybody off.

  • @my_dixie_rect8865
    @my_dixie_rect8865 5 ปีที่แล้ว +27

    I'd love to know how clicking a 'here' hyperlink gives somebody full access to another persons computer. This is over simplifying it to the extreme.

    • @peejpeejpeej
      @peejpeejpeej 5 ปีที่แล้ว +9

      i know right. complete bs. missing 1/2 the story

    • @Manman-wl1gj
      @Manman-wl1gj 4 ปีที่แล้ว +1

      @cat and lasagna the guy made a rat and that is what was installed on the victims computer the victim never executed the file so how does that work??? It doesn’t so yeah

    • @SchoolforHackers
      @SchoolforHackers 4 ปีที่แล้ว +2

      Actually it’s simple. The Browser Exploit Framework (BeEF) does exactly this, as well as other tools in Kali Linux.

  • @MrStephane9
    @MrStephane9 8 ปีที่แล้ว +23

    lol i went on the link and it opened 3 "node.js" files runing silently on my pc xD

  • @nirvaangoel8172
    @nirvaangoel8172 4 หลายเดือนก่อน +1

    How did he make the website? What did he use?
    That was insane!

  • @purvaramteke5436
    @purvaramteke5436 4 ปีที่แล้ว +9

    So we are gonna ignore the boys or scammers reposting their comments?

    • @m4n4nm4n4n
      @m4n4nm4n4n 4 ปีที่แล้ว

      i need hackers worldwide m4n4n@hotmail.com

  • @KevtechITSupport
    @KevtechITSupport 7 ปีที่แล้ว +8

    social engineering (people) are easy to manipulate, this is why you need to have IT meetings and educate users on all these items.

  • @Sana_a04
    @Sana_a04 5 ปีที่แล้ว +91

    I find it funny how a guy called David Kennedy ends up on the line with a guy called "Ken"

  • @asmcriminaL
    @asmcriminaL 7 ปีที่แล้ว +9

    ha we have been using these techniques since AOL. This is not "Hacking" this is "social engineering" most social engineers suck with real hacking skills, and real hackers suck at social engineering.

    • @Ausar0
      @Ausar0 7 ปีที่แล้ว +2

      asmcriminaL
      Social engineering is not separate from hacking.
      It's a different branch, sure, but social engineering is still technically hacking.

  • @ajc-ff5cm
    @ajc-ff5cm 2 ปีที่แล้ว

    The most vulnerable part of any network is the people.

  • @davesantos9473
    @davesantos9473 3 ปีที่แล้ว

    A hacker doesn't want to be known ever until death

  • @Mrwiseguy101690
    @Mrwiseguy101690 8 ปีที่แล้ว +21

    No command prompt? This guy's a noob

    • @Texnoable
      @Texnoable 6 ปีที่แล้ว

      1. It's called jokes

    • @itsMarcell
      @itsMarcell 3 ปีที่แล้ว

      No Inspect Element too? what a noob jk dont take this seriously

  • @AdrianJayeOnline
    @AdrianJayeOnline 6 ปีที่แล้ว +12

    This isn't an ordinary hack, by some random person. So it's more LIKELY to succeed. So let's see the mistakes. (our company practices) 1> Having an internal company number means nothing, we ask whose calling and verify that person. 2> If that person has a COMPANY asset. we would log onto that machine only 3> Generally we would not CLICK on any links, before doing so, we would CHECK the link by hovering over it 4> EVEN if we did, we have secure software/AV etc, which WILL and has detected rootkits, trojans etc, so if my machine was infected, IT security would get an alarm and lock us out, and/or our own machine software would do the same. 5> Permissions on the machine would pop up asking for a piece of software to be installed. 6> remoting into another machine we are the other machine, anything I click on, will install on that machine not mine, mine is behind a firewall............ basically a BS article, not realistic, of course companies get hacked, but this example is totally not real world, as a front line IT tech, we generally know everyone we work with and get a feeling for when something is wrong, of course things happen, but this particular example is non-sense. WELL it's American, what else do you expect... You guy's better wake up on your own government messing with you they are the real hackers... PEACE

    • @nightviper7354
      @nightviper7354 5 ปีที่แล้ว

      well, not all companies have AVs
      some are just too stupid
      and maybe we could use something like powersploit, to avpid AV?
      and as security developes, so does exploits
      just make an invisible 0-day exploit, and u're good to go
      no AV alarms

    • @stillmillionair
      @stillmillionair 2 ปีที่แล้ว

      Mate, im a bit late here but i know companies today who's ''databases'' are still run on fucking excel spreadsheets. Don't come all high and proud about your startup having good security practices. This is miles more common than you think.

    • @L_Lawliet1907
      @L_Lawliet1907 2 ปีที่แล้ว

      @@stillmillionair A bit late? Its been 4 years my guy

  • @EATMYKNIFExX
    @EATMYKNIFExX 8 ปีที่แล้ว +13

    Basically the boss paid the hacker guy who swindled him over the phone because he wasnt any good at knowing potential mailware would be by clicking "ok" on the site. So the Boss pays the people hacker (conman) and instantly fires that guy who let them in. Corporate bs, fsociety.

    • @SuperStruct
      @SuperStruct 8 ปีที่แล้ว +2

      If he could get on his computer he could release every credit card or bank acc thats linked to the company so yeah, fire him

    • @TheeZachChannel
      @TheeZachChannel 8 ปีที่แล้ว +7

      Companies will train employees, not fire them.

    • @SuperStruct
      @SuperStruct 8 ปีที่แล้ว

      Zach I agree, I don't think he would get fired.

    • @kennyelkhart
      @kennyelkhart 7 ปีที่แล้ว

      Intel Elite, most companies are wise and don't store that kind of information in plain text on an on-site database. Not encrypting banking information is suicide...

  • @jakemartinez6894
    @jakemartinez6894 4 ปีที่แล้ว +10

    That Spider-Man guy was high on himself

  • @iriswealth2658
    @iriswealth2658 3 ปีที่แล้ว +6

    I've always told the men I've had relationships with, the moment you are unfaithful is the moment you end our relationship. If I've ever felt so disconnected from my partner that I have felt myself drawn even into a hypothetical affair in my mind, I end the relationship. I've been in many abusive relationships (that I ultimately ended) but never once have I been unfaithful. Why? Because no failing relationship is worth sacrificing my morals and integrity for. No matter how it unfolds with a partner, there should be a base level of respect and empathy towards them as a human being. A failed relationship will not pollute your mind and foster insecurities anywhere near as much as being on the receiving end of adultery. I dind't know what was happening all along for years that she's been cheating until I met explore.hacker thanks guys..

    • @ForrestDix
      @ForrestDix 2 ปีที่แล้ว

      I heard an interesting thought experiment recently. If we were to live thousands of years, most of us would eventually become polyamorous. Because, you're bound to eventually meet/know more than one person who you love. And, it's essentially impossible for one person to meet all of your needs indefinitely. I think consensual non-monogamy is underrated.

  • @thehimboman
    @thehimboman 7 ปีที่แล้ว +8

    This dude has a strong Dax Shepard voice and I love it

  • @MentalMonkey2525
    @MentalMonkey2525 7 ปีที่แล้ว +5

    I really like the Josh Corman guy. All that Spider-Man stuff. He seems genuinely nice

  • @clutch_cadyy8628
    @clutch_cadyy8628 7 ปีที่แล้ว +6

    "Just by clicking that link hes given David full access to his computer"

  • @morrisjepekeijr1
    @morrisjepekeijr1 ปีที่แล้ว +1

    Damm.. thats some good social skills.... if you came here from the havard course , hit the like button.

  •  3 ปีที่แล้ว +3

    1:49 "to show you this demo, WE'VE AGREED to not use the company's name" this is how you know that neither the journalist nor the company are based within the EU, where GDPR is in place.

    • @sao5060
      @sao5060 2 ปีที่แล้ว

      Good for you?

    • @sao5060
      @sao5060 2 ปีที่แล้ว

      Might not even mean that- I doubt it does. It’s just text.

  • @danb7001
    @danb7001 8 ปีที่แล้ว +33

    I just watched 3 minutes of explaining the word pentest. It's not that interesting.

    • @xSiiefHDx
      @xSiiefHDx 6 ปีที่แล้ว

      damn phrazzal tropix here

  • @stponyt
    @stponyt 7 ปีที่แล้ว +12

    Watch this hacker break into my heart

  • @I7itI3ullT
    @I7itI3ullT 7 ปีที่แล้ว +25

    Hasnt Devid Kennedy written the SEToolkit?

  • @Edenthedjguy-wedding-djs
    @Edenthedjguy-wedding-djs 4 ปีที่แล้ว

    Why is a senior technology correspondent surprised by this?

  • @johnc8209
    @johnc8209 ปีที่แล้ว +1

    Whitehat hackers>Blackhat hackers

  • @jordanlemon5115
    @jordanlemon5115 8 ปีที่แล้ว +79

    This dude is talking about growing up but he still got a life size statue of spiderman

    • @donibeh
      @donibeh 8 ปีที่แล้ว +23

      ain't nothing wrong with that.

    • @mud2479
      @mud2479 8 ปีที่แล้ว +14

      hey, he bought that statue, that`s what adults do, buy shit with your own money.

    • @isaiahdaniels5643
      @isaiahdaniels5643 7 ปีที่แล้ว +3

      Yeah, and you have a picture of Aleks as your profile pic. You also have a username Gravity Sandwich. Also, you failed to punctuate your sentence. Did you fail the fifth grade?
      Ever read spiderman? It's not aimed towards children.

    • @ClockworkRBLX
      @ClockworkRBLX 6 ปีที่แล้ว +2

      too many manchildren here, defending the grown adult with spiderman merch

    • @agu9302
      @agu9302 5 ปีที่แล้ว

      @@ClockworkRBLX Who cares about Spider-Man merch lol

  • @XxBillyGoatNinjaxX
    @XxBillyGoatNinjaxX 7 ปีที่แล้ว +15

    "Some creepy dude in a basement?"
    *Shows a guy with a fedora. Lel

  • @fluueW
    @fluueW 6 ปีที่แล้ว +4

    "what do you think when i say the word hacker? some creepy dude in a basement?" wtf no xD

  • @naghs2726
    @naghs2726 2 ปีที่แล้ว

    This dude in his Spider-Man room says we have to grow up

  • @radoadam4774
    @radoadam4774 2 ปีที่แล้ว +10

    The government and government officials are the biggest hackers. That is why we need such people (hackers) to be able to defend ourselves against those who are trying to control us. Beautiful video. I wish a lot of success in my career.

  • @maxim87
    @maxim87 5 ปีที่แล้ว +23

    0:24 "can I jus just get your credit card number" ffs lmao

  • @Speedster404
    @Speedster404 6 ปีที่แล้ว +61

    A true captain America!

  • @MemoriesDestroyUs
    @MemoriesDestroyUs 7 ปีที่แล้ว +204

    remote desktop isnt hacking lol

    • @MemoriesDestroyUs
      @MemoriesDestroyUs 7 ปีที่แล้ว +11

      lolman8776 click bait title

    • @qualitytunes7369
      @qualitytunes7369 7 ปีที่แล้ว +29

      ur a fucking idiot, hes a social engineer do you even understand what hacking even is

    • @Ausar0
      @Ausar0 7 ปีที่แล้ว +14

      MemoriesDestroyUs
      Fucking hell there are way too many elitists when it comes to hacking.
      Bro, "hacking" is LITERALLY just gaining unauthorized access to something. It does not matter how you do it. Even watching somebody type in their password is technically hacking.

    • @superchargemario
      @superchargemario 7 ปีที่แล้ว +5

      well techniqally it is, hacking is a term meaning you gain access to somthing you shouldn't be able to and that what the hacker did and What he did was trick a person to go to a malicious website he created it a bit like spear phishing. Probably used abit of java script to make the victim to download a file that let the hacker to gain access.

    • @persiangulfcat
      @persiangulfcat 7 ปีที่แล้ว +4

      Remote desktop IS hacking if the person was not willing to provide you with a login in the first place.

  • @redditman9267
    @redditman9267 4 ปีที่แล้ว +13

    They literally showed him using metasploit, he was in a meterpreter command promt

    • @SakshamGaming
      @SakshamGaming 4 ปีที่แล้ว

      was he in kali linux?

    • @redditman9267
      @redditman9267 4 ปีที่แล้ว

      Saksham Gaming we can’t tell but at the beginning it showed a meterpreter prompt so it could be anything, windows Mac kali etc

  • @jumpwhistlefart
    @jumpwhistlefart 2 ปีที่แล้ว

    "If not us, then who?" Dude.

  • @jacobmyszka8869
    @jacobmyszka8869 8 ปีที่แล้ว +58

    Ha "I'm not good at computers." 😂😂😂

    • @bodybagz677
      @bodybagz677 6 ปีที่แล้ว +3

      Cool Videos its a fact doe all he did was make him install a keylogger

  • @hamzashar2750
    @hamzashar2750 5 ปีที่แล้ว +40

    imagine the guy he called watching this video 😂😂😂🤘

  • @HiBruv
    @HiBruv 8 ปีที่แล้ว +4

    Hey guys what's up its Scarce here and today we got a lot of news now this ones from David Kennedy you all know who David Kennedy is, a huge channel with 6 subs well he actually managed to hack into a company thats right this guy actually hacked into a company through IT support. That's all guys thanks for watching peace.

  • @gaiseric9518
    @gaiseric9518 2 ปีที่แล้ว +1

    This happens to roblox all the time and the company does nothing about it.

  • @Serjo777
    @Serjo777 หลายเดือนก่อน

    Just by visiting a site, without doing _anything_ else, he was able to access his PC? How is that supposed to work?

    • @Redwan777
      @Redwan777 13 วันที่ผ่านมา

      It's more smoke than fire. He probably did run a malicious script and gained some control of his browser but no way did he take control of the computer in 2 minutes. Trusting he actually knows thing or two, it's probably the first step to getting full access of the computer and not the last

  • @maxfitzy1371
    @maxfitzy1371 7 ปีที่แล้ว +4

    Now +900k know how to hack into the pentagon

  • @daanboleij7289
    @daanboleij7289 8 ปีที่แล้ว +57

    am i the only one who thought is was the company instead of a company as in prison break

    • @RealityClubX
      @RealityClubX 8 ปีที่แล้ว +5

      Daan Boleij How do you even remember that rofl

    • @mullenrocks23
      @mullenrocks23 8 ปีที่แล้ว +5

      lol thats funny you remember that. Prison break is coming back!

    • @daanboleij7289
      @daanboleij7289 8 ปีที่แล้ว +2

      SP_23 haha ikr i also dunno how i just thought about that xD

  • @SeanArcherXXX
    @SeanArcherXXX 8 ปีที่แล้ว +15

    And how exactly do you get access to my computer if I click on a link in a browser again? If it were that simple half of the people would be hackers, and the other half hacked...

    • @prosincr
      @prosincr 8 ปีที่แล้ว +4

      Sean Archer because he wrote the website. He can put whatever he wants into the link.

    • @SeanArcherXXX
      @SeanArcherXXX 8 ปีที่แล้ว +11

      Dilip Tien No, he can't put whatever he wants. Last I checked, script that runs in a browser runs in a sandbox, meaning it has no access outside the browser, unless the user is dumb enough to install something by clicking that link (and giving that something permissions to run)... So yeah, a hijack attack most definitely can start with a link, but if the person ONLY clicks on the link and does nothing else, I don't think the attacker will get anything... So really, clicking on a link alone can't expose your computer.
      But if someone thinks/knows differently, I'd like to read a better explanation than "he can do whatever he wants because he wrote the website".

    • @prosincr
      @prosincr 8 ปีที่แล้ว +3

      Sean Archer well he clicked on the link no? he can put anything he wants in the link.

    • @sebastiankohleroberg2980
      @sebastiankohleroberg2980 7 ปีที่แล้ว

      He had no firewall, seriously lol.

    • @lcbp2009
      @lcbp2009 7 ปีที่แล้ว +1

      Then... how do people get virus/trojan on their computer? Does the hacker break into somebody house and install virus/trojan on the computer? DDOS attack rely on zombie computers have been infected with virus. So if clicking on a link is not enough to give somebody access to your computer then how is it done?

  • @myoaungaung-er3ug
    @myoaungaung-er3ug 2 ปีที่แล้ว +1

    i wish had this social skills

  • @angelicastella5018
    @angelicastella5018 3 ปีที่แล้ว +1

    He is reliable

  • @Ace-qx3mu
    @Ace-qx3mu 7 ปีที่แล้ว +5

    Social engineering is something I practice on a daily basis. It is easy, if you know what your doing. You have to have the right mindset. Just because you know how to do it, doesn't mean you can do it effectively.

  • @DystopicEdits
    @DystopicEdits 6 ปีที่แล้ว +40

    0:43 "How my I help you" lmao

  • @holden_tld
    @holden_tld 7 ปีที่แล้ว +11

    who is this 4chan guy?

    • @3-bits286
      @3-bits286 4 ปีที่แล้ว

      LMAO. Love that clip

  • @oscwavcommentaccount
    @oscwavcommentaccount 4 ปีที่แล้ว +3

    This is like a grabify link, but you get full remote access.

    • @animationnkdh3774
      @animationnkdh3774 4 ปีที่แล้ว

      Yes, however this link is much harder to get, you have to make it yourself you cant just get it from a website.

    • @bencebence4515
      @bencebence4515 4 ปีที่แล้ว

      @@animationnkdh3774 *angry BeEF XSS Framework noises*

  • @NeedingSleep
    @NeedingSleep 3 ปีที่แล้ว +2

    This man is so good at acting tho...

  • @AntAnt
    @AntAnt 7 ปีที่แล้ว +5

    did anyone go to the website he said

    • @Exotic36
      @Exotic36 6 ปีที่แล้ว

      Ant Yes

  • @TheOne-fu1nh
    @TheOne-fu1nh 5 ปีที่แล้ว +6

    Well, i need a hacker to give me back my 2 minutes and 55 seconds

  • @MarkelFacts
    @MarkelFacts 5 ปีที่แล้ว +8

    and people think i’m a hacker when i open inspect element

  • @asharullah353
    @asharullah353 2 ปีที่แล้ว

    So what was the IT guy supposed to do?

  • @otto.x5328
    @otto.x5328 7 ปีที่แล้ว +59

    00:34 Lmfao this "hacker" doesn't even know how to escalate privileges when "getsystem" doesn't work. You can see he just gives up and spawns a shell anyways with shit privileges. And LOL he fuckin' misspelled "getsystem" twice! xD

    • @outviteslb8143
      @outviteslb8143 7 ปีที่แล้ว +28

      BAHAHAHAHAHAHAHAHA DUDE im like that when chicks around i wanna fucking stick my usb in her 3.0

    • @stevenw2933
      @stevenw2933 7 ปีที่แล้ว +20

      thats actually unlikely to be the same person. years ago i was interviewed by global news in canada and when the crew came to my house a lot of the stuff was edited and sometimes if things were not shot the way they want they will just have a pair of hands and make it look like its you to the casual viewer. They tell you that they are doing this upfront.

    • @fire_breathing_turtle
      @fire_breathing_turtle 7 ปีที่แล้ว +4

      It's the guy with the vape shirt. You can see his sleeve tattoo.

  • @stan2880
    @stan2880 6 ปีที่แล้ว +7

    "That was easy" lmao

  • @uniqueuser6707
    @uniqueuser6707 8 ปีที่แล้ว +5

    Dark is the absence of light. Cold is the absence of heat... Was going to comment that this came from Albert Einstein, but that was a fictional story... Where did this quote come from? lol

    • @jesbinj
      @jesbinj 8 ปีที่แล้ว +1

      what?

    • @smekminfisk
      @smekminfisk 8 ปีที่แล้ว +2

      U WOT M8?

  • @ChaosCrumpet24
    @ChaosCrumpet24 3 ปีที่แล้ว

    This is why I click ZERO links

  • @musicisitall
    @musicisitall 2 ปีที่แล้ว

    AN ADULT with spiderman stuff in his house. GROW UP DUDE.

  • @DreiKamm
    @DreiKamm 7 ปีที่แล้ว +4

    was about to go to the website XD

  • @zeusdigger2775
    @zeusdigger2775 4 ปีที่แล้ว +6

    PLEASE READ { Hire A Private Investigator}
    Establishing your company’s best defense is much like dealing with natural disasters, the best defense against cybercriminals is being proactive. You won’t know when or how a disaster may hit, but you can minimize the damage and recover quickly if it does.
    Attackers have grown creative over the years by requiring payments that are nearly impossible to trace, which helps cybercriminals remain anonymous. Prevention for DDOS attacks and ransomware attacks typically involves setting up and testing backups as well as applying ransomware protection in security tools. Security tools such as email protection gateways are the first line of defence, while endpoints are a secondary defence. Intrusion Detection Systems (IDSs) are sometimes used to detect ransomware command-and-control to alert against a ransomware system calling out to a control server.This type of services requires an expertise and that's where we come in.
    Alright listen up if you have experienced any of these.. Over the years, attackers have grown creative over the years by requiring payments that are nearly impossible to trace, which helps cybercriminals remain anonymous.Webghost33 on teleegram , is a cyberspace expert and professional cyberspace expert. They can help if you're ever exposed to internet scams and cybersecurity breach such as Business Email Compromise too.They can can help get it restored and track down the person who did it in many cases. Do you want to install spyware on a cellphone, smartphone or computer? Do you know if you have spyware on your computer or mobile devices? Reputation Management? Control your online reputation but removing false information and getting your positive message out. Cyber Stalkers? Don’t be harassed or stalked online. Find the person responsible and put an end to it all. Cheating Spouse? Find out for sure what your spouse is up to with our Digital Investigation services. Perhaps my hacking professionalism has helped in various aspects like; Removing links and posts, eradicate being Cyber Bullied or Cyber Stalked, Locate Missing People, Computer Security Training, Background Checks, Cyber Extortion, Relationships, Nationwide Employment Background Check, Tracking, Online Dating Scams, Cyber Frauds, cyber-espionage, criminal gangs or the pursuit of data. We aim to make all kind online protections for our valuable clients. Reach out on w'app 1 414 909 3913

    • @miragemerchant3795
      @miragemerchant3795 4 ปีที่แล้ว

      thanks for the info. I've also heard of Webghost

    • @mattjakob8838
      @mattjakob8838 4 ปีที่แล้ว +1

      That's true. I was a victim of scam and someone gave me webghost's contact, i was able to recover my funds from a scammer in South Africa.
      great and professional hacker. There are scammers and there are hackers. Great hacker will help you recover your funds and hack scammers . webghost33 would help you clear any virus detection and security threat. very good and i have confirmed it