Тёмный

How do hackers get caught? - the hunt for the hacker. 

Grant Collins
Подписаться 214 тыс.
Просмотров 94 тыс.
50% 1

Опубликовано:

 

26 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 110   
@CubensisEnjoyer
@CubensisEnjoyer Год назад
I couldn't believe it when I read about pompompurin, it's hard to believe people are getting caught like that in 2023. But it also speaks to how exhausting it must be for cybercriminals to cover their tracks every single time without fail. With that much heat it's genuinely at the point where if you mess up once, you're done.
@rahulramteke3338
@rahulramteke3338 Год назад
For cybercriminals, there is always a tradeoff, good opsec means they have reduced efficiency and low or no risk of getting caught, bad opsec means more efficiency but higher risk of getting caught
@ytg6663
@ytg6663 Год назад
Well, pompo is not haker .. He is just a 20 year old kid who used to sell stolen data. WHY HE USED DAMN SAME VPN TO LOGIN INTO BOTH , HIS PERSONAL AND CRIMINAL BIZ ACCOUNT ???
@ytg6663
@ytg6663 Год назад
​@@rahulramteke3338what kind of efficiency
@Corecarex
@Corecarex Год назад
​@@rahulramteke3338 what is opsec
@rahulramteke3338
@rahulramteke3338 Год назад
@@Corecarex Opsec stands for Operational Security, its a measure of how an attacker can stay hidden from authorities or the victims they are targetting
@CodingKillua
@CodingKillua Год назад
you can get caught as long as you are not Elliot Alderson
@Gr8Poseidon
@Gr8Poseidon Год назад
Need a spin off
@DDBAA24
@DDBAA24 Год назад
Another fun one that was created a while ago is endless-ssh. This is quoted from the git repo "Endlessh is an SSH tarpit that very slowly sends an endless, random SSH banner. It keeps SSH clients locked up for hours or even days at a time. The purpose is to put your real SSH server on another port and then let the script kiddies get stuck in this tarpit instead of bothering a real server." Like I said fun. So even if they use hydra, they won't get anywhere.
@lunar7240
@lunar7240 Год назад
Hydra 💀
@DDBAA24
@DDBAA24 Год назад
Just wanted to add in retrospect , protect your physical machine from HID attacks. Check your usb logs if you think somethings off. With all these automated tools a monkey can use its not only possible its probable. I just had a friend that had $70k stolen , from her phone by someone with a duck or an omg. Moral of the story, lock your ish down , every way. Be well all..
@edwardmacnab354
@edwardmacnab354 4 месяца назад
@@DDBAA24 i literally have nothing on my computer . I'm pretty sure I could be hacked but the question is why would they bother
@SmoltingWassie
@SmoltingWassie Год назад
I’ve watched mental outlaw for 2 years now, never knew what opsec meant but just rolled with it, thanks for clearing that up.
@Delbzy
@Delbzy Год назад
This is so interesting, Great watch.
@collinsinfosec
@collinsinfosec Год назад
Happy to help!
@RealCyberCrime
@RealCyberCrime Год назад
I’m thinking about making a similar video but in documentary format
@drummerboy6358
@drummerboy6358 Год назад
Pls do it!
@terminal_cat
@terminal_cat Год назад
Waiting
@jmd489
@jmd489 Год назад
Weird self plug
@terminal_cat
@terminal_cat Год назад
@@jmd489 what are you saying?
@lcsth
@lcsth Год назад
@@terminal_cat He comments on many videos just to promote himself.
@sambajuice7071
@sambajuice7071 Год назад
Very informative and overall great video!
@pranavsivvam5880
@pranavsivvam5880 Год назад
Thanks for the informative video, Grant! Quick question: What model is the ultrawide monitor behind you?
@DannyBoyInsanity
@DannyBoyInsanity Год назад
great video!
@ogbooker4538
@ogbooker4538 Год назад
fire content my brudda
@cyberjay9146
@cyberjay9146 Год назад
Great video I learned a lot
@ericouhl5423
@ericouhl5423 Год назад
Gotta say I love the beard!
@kazhiroma9736
@kazhiroma9736 Год назад
More videos like this!👍
@collinsinfosec
@collinsinfosec Год назад
Noted!
@c4v3studio54
@c4v3studio54 Год назад
AWESOME MAN!
@VRixxo123
@VRixxo123 8 месяцев назад
I honestly feel like I didn't learn shit from this video, you kinda just told us about tools and techniques but barley touched on how these are actually used in the field. Nice video tho
@chasemedsker
@chasemedsker Год назад
Fantastic video
@x0rZ15t
@x0rZ15t Год назад
Nice video, there is however something wrong with the links in the description of the video.
@collinsinfosec
@collinsinfosec Год назад
Thanks for letting me know. Some of the links has the ":" at the end. These should be changed now.
@TheNathanSproul
@TheNathanSproul Год назад
Cool vid, just wanted to mention though that I think you're mispronouncing fallible, should be fa·luh·bl
@MikeJohnCore
@MikeJohnCore Год назад
This was a dope video. Noice job.
@michaelhavers1
@michaelhavers1 Год назад
Me too, an autobiography.
@austinbowman6512
@austinbowman6512 Год назад
Love ur videos
@collinsinfosec
@collinsinfosec Год назад
Thank you!
@mbonuchinedu2420
@mbonuchinedu2420 Год назад
Remain 100% clean, and the feds wouldn't dare intrude. That's just the secret, maintain your privacy and don't penetrate into systems without a valid and written agreement
@zamasu5917
@zamasu5917 Год назад
no way
@poolhalljunkie9
@poolhalljunkie9 25 дней назад
Because feds are sooo known for not involving innocent people into their crap. Riiiight.
@sotecluxan4221
@sotecluxan4221 Год назад
Nizzz!
@guilherme5094
@guilherme5094 Год назад
👍
@girl4632
@girl4632 Год назад
Monero cant be tracked
@Corecarex
@Corecarex Год назад
Great video can you make how to not get caught?
@collinsinfosec
@collinsinfosec Год назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-BWVyp0wYpgA.html
@pearpo
@pearpo Месяц назад
Cool but it’s pronounced “Tell-‘em a tree”
@itsjustarainyday
@itsjustarainyday Год назад
Tel eh meh tree?... have i been saying it wrong?
@Tooi-1grote-rotzooi
@Tooi-1grote-rotzooi Год назад
Help me out my foon is hacked
@black53342
@black53342 Год назад
Can you please tell us how to take notes while studying cybersecurity? Should we take digital notes or use traditional pen and paper method?
@PenTest3r
@PenTest3r Год назад
You can also on paper don’t worry
@collinsinfosec
@collinsinfosec Год назад
I have a video in my backlog to overview my study process, information retention techniques, and activities I am currently attempting to implement to help.
@wantmoney5533
@wantmoney5533 Год назад
Could someone suggest to me that I should go for a Cyber security Bachelors degree or a Computer science bachelors degree?
@ytg6663
@ytg6663 Год назад
both have their own tradeoffs but i would have chosen cyber sec degree and then gofor certifications.. then you will have double opportunity for job
@wantmoney5533
@wantmoney5533 Год назад
@@ytg6663 Thanks . 🙂❤️🥀
@solomn7990
@solomn7990 Год назад
​@@ytg6663u mean after degree u go for. a certification
@wantmoney5533
@wantmoney5533 Год назад
@GHG so Basically CS is better?
@alfonzo7822
@alfonzo7822 Год назад
I'm doing cyber sec degree just now, the first year on my course is the same as computer science. I'm actually considering swapping to computer science because I am really enjoying that side of things. It's totally your choice, what do you want to end up doing? Look into it and the roles etc and if your leaning more to sec then choose that.
@edoh6381
@edoh6381 Год назад
SpaceUK
@CwosontIsGod
@CwosontIsGod Год назад
was waiting for this
@ssenyondwafred156
@ssenyondwafred156 Год назад
💯 FREE PUM. ..
@balllord3546
@balllord3546 Год назад
bro acting like he knew him 😂
@SteveGillham
@SteveGillham Год назад
So you want a Cyber Criminal Freed ?
@jinxscript
@jinxscript Год назад
Free pompompurin tho
@SteveGillham
@SteveGillham Год назад
So you want a Cyber Criminal Freed ?
@jinxscript
@jinxscript Год назад
@@SteveGillham yes
@SteveGillham
@SteveGillham Год назад
@@jinxscript ok 😟
@fevicoI
@fevicoI Год назад
The title is misleading. Honeypot is used for threat Intel and not for catching criminals 👎
@SteveGillham
@SteveGillham Год назад
Part of catching criminals is using Threat Intelligence. Threat Intelligence is gathered in multiple ways, including Honeypots, Darkweb forum insiders and telematics from internet security tools.
@kiiturii
@kiiturii Год назад
he didn't just talk about honeypots the whole vid lmao
@derekroberts5931
@derekroberts5931 Год назад
How can a layman dload t-pot but not f himself over. He mentioned it's volatile? I have no clue. My fb got hacked good though and the hacker literally calls me. 18 times....
@legion465
@legion465 Год назад
but if the hacker use VPN ip is not real
@SteveGillham
@SteveGillham Год назад
Many hackers get caught while using a VPN because often a VPN will drop for a fraction of a second, thus leaking your original IP. Of course there are additional methods that you could use however many people just believe their VPN will protect them.
@legion465
@legion465 Год назад
@@SteveGillham ok if FBI Say take me real IP, logs VPN service take
@SteveGillham
@SteveGillham Год назад
@@legion465 I am not sure what you are saying ? Law enforcements can request information from many VPN supplies, and those that say do not log anything or are out of reach of the law enforcements only can protect you so far. If you was using a VPN and it drops, then your original IP (from your ISP) that you are using as you start your VPN is then captured, thus this can be connected to a person. There are lots of ways to be caught, but normally Businesses are not interested in pursing unless you do something big.
@lonelykroe133
@lonelykroe133 Год назад
T-Mobile Uber instacart AT&t have the same customer service they've cracked they've robbed me and my wife of $8,000 please do something about that
@MollyBurke-d5q
@MollyBurke-d5q Год назад
also got 👆same issue but reaching out to 2𝗙𝗮𝗿𝘆𝗮𝗻 got all my lost funds recovered successfully…
@steveflickinger2538
@steveflickinger2538 9 месяцев назад
I got hacked who can I hire to catch them all I want is there address I will fix them once I get a address. Please contact me if you have a company or person who can do this, not waiting on our government ,
@suckyourmoyher
@suckyourmoyher Год назад
Hack your opps not innocent people
@dhanrajbharadwaj3891
@dhanrajbharadwaj3891 Год назад
Bro please suggest what i do Situation :- I learn all the basic skills for hacking Solve 300+ ctf Hackthebox rank(pro hacker) Tryhackme rank (master) Portswigger learning pathway completely most of labs I need internship for experience What can i do how i get free internship How i approach , what i add in resume, list some certificate in order and how to approach for internship
@UltraBoiDanielSalama
@UltraBoiDanielSalama Год назад
Your trying to be a hacker or get a job?... you need to find 0day in system
@berserkone
@berserkone Год назад
You look like Zelensky slim version catching Russian Hackers.
@Coffeemancer
@Coffeemancer Год назад
why do you have a 9bit binary thing in the background
@girl4632
@girl4632 Год назад
Monero cant be tracked
@MollyBurke-d5q
@MollyBurke-d5q Год назад
also got 👆same issue but reaching out to 2𝗙𝗮𝗿𝘆𝗮𝗻 got all my lost funds recovered successfully…
@zac2577
@zac2577 Год назад
Bro you say some stuff that makes me feel like ypu dont actually know what your talking about like confusing opsec with osint.. 150k subs i guess im wrong tho.?
@collinsinfosec
@collinsinfosec Год назад
OPSEC and OSINT are different, but often can go together. OSINT is the collection of publically available information from any number of sources. OPSEC relates to keeping your identity private / anonymous through your physical and digital footprints. Poor OSINT is poor OPSEC. If people are able to collect information about you through publically available information and are able to reveal your identity, for example, people (and criminals) will brag about their riches / flaunt their wealth on social media. Even without revealing what one does, they are providing publically available information. Take a look at the story of 'hushpuppi' as a popular example.
@HoloScope
@HoloScope Год назад
You didn't get what he said, he explained it well
@kiiturii
@kiiturii Год назад
he explained the difference in the vid..?
Далее
Where People Go When They Want to Hack You
34:40
Просмотров 1,8 млн
The FBI's Hunt to Destroy a Hero Hacker
37:41
Просмотров 2,7 млн
TailsOS Guide For The Ultra Paranoid
35:32
Просмотров 434 тыс.
Malware Development: Processes, Threads, and Handles
31:29
Learn Reverse Engineering (for hacking games)
7:26