Тёмный

i HACKED my wife’s web browser (it’s SCARY easy!!) 

NetworkChuck
Подписаться 4 млн
Просмотров 3,9 млн
50% 1

Follow this project for FREE with Linode -- Sign up for Linode here: ntck.co/linode and you get a $100 Credit good for 60 days as a new user!
You can hack ANYONE (Ethically of course) using BeEF! It’s super simple and there are so many different ways to use BeEF to hack! With BeEF you can educate your family and friends that their web browsers and mobile devices are never safe while having a little bit of fun with it and learning something new!! BeEF is the browser exploitation framework and can be used with other popular hacking tools like Metasploit.
How to install BeEF on Ubuntu and port forward: ntck.co/beefubuntu
🔥🔥Join the NetworkChuck membership: ntck.co/Premium
**Sponsored by Linode
SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️NetworkChuck membership: ntck.co/Premium
☕☕ COFFEE and MERCH: ntck.co/coffee
Check out my new channel: ntck.co/ncclips
🆘🆘NEED HELP?? Join the Discord Server: / discord
STUDY WITH ME on Twitch: bit.ly/nc_twitch
READY TO LEARN??
---------------------------------------------------
-Learn Python: bit.ly/3rzZjzz
-Get your CCNA: bit.ly/nc-ccna
FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: / networkchuck
Twitter: / networkchuck
Facebook: / networkchuck
Join the Discord server: bit.ly/nc-discord
0:00 ⏩ Intro
2:43 ⏩ STEP ONE: set up your Linux server
2:58 ⏩ Installing BeEF
5:55 ⏩ STEP TWO: Hack someone (ethically of course)
6:58 ⏩ What can you do with it?
7:44 ⏩ Social engineering
9:05 ⏩ Hacking their LastPass!
9:55 ⏩ Identify LAN Subnets, see HTP servers, and fingerprint the local network
11:13 ⏩ Redirect their Browser to Rickroll
12:10 ⏩ you can even use BeEF to hack a Phone!
13:00 ⏩ Outro
AFFILIATES & REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)
My network gear: geni.us/L6wyIUj
Amazon Affiliate Store: www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: geni.us/aBeqAL
#Linode #BeEF #Hacking

Наука

Опубликовано:

 

4 июн 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 4,1 тыс.   
@NetworkChuck
@NetworkChuck 2 года назад
Follow this project for FREE with Linode -- Sign up for Linode here: ntck.co/linode and you get a $100 Credit good for 60 days as a new user! You can hack ANYONE (Ethically of course) using BeEF! It’s super simple and there are so many different ways to use BeEF to hack! With BeEF you can educate your family and friends that their web browsers and mobile devices are never safe while having a little bit of fun with it and learning something new!! BeEF is the browser exploitation framework and can be used with other popular hacking tools like Metasploit. How to install BeEF on Ubuntu and port forward: ntck.co/34DOea6 🔥🔥Join the NetworkChuck membership: ntck.co/Premium **Sponsored by Linode 0:00 ⏩ Intro 2:43 ⏩ STEP ONE: set up your Linux server 2:58 ⏩ Installing BeEF 5:55 ⏩ STEP TWO: Hack someone (ethically of course) 6:58 ⏩ What can you do with it? 7:44 ⏩ Social engineering 9:05 ⏩ Hacking their LastPass! 9:55 ⏩ Identify LAN Subnets, see HTP servers, and fingerprint the local network 11:13 ⏩ Redirect their Browser to Rickroll 12:10 ⏩ you can even use BeEF to hack a Phone! 13:00 ⏩ Outro
@AhmedMOHAMED-hl1hd
@AhmedMOHAMED-hl1hd 2 года назад
dude linode is trash they banned my email on first time ever to signup for fraud ?? for real i even tried another gmail and i even created a new email all banned like wtf even their support does not want to reply for my email explaining my case and asking for answers
@contentdeleted4978
@contentdeleted4978 2 года назад
Make a video or short on how to recognize and identify bad links. Or how to identify if its safe
@Mr.Pandey28
@Mr.Pandey28 2 года назад
What happens if someone use a vmware to run the linux server then do this ? Can we still catch them ?
@AhmedMOHAMED-hl1hd
@AhmedMOHAMED-hl1hd 2 года назад
@@Mr.Pandey28 just finished trying that and i am still trying to reach it with other devices so far only vmware can reach the hook
@Datenkralle
@Datenkralle 2 года назад
Haha nice try, but i will not click on your links. ;) It would be also nice, if you can tell us how to defend against this hack. Are browser extensions like "NoScript" a good idea?
@moodlic2526
@moodlic2526 2 года назад
HIM: "remember, this for educational purposes only" Amateur Hackers watching: "oh yeah this is very educational"
@TheMessanger
@TheMessanger 2 года назад
GET linode HE gets some you pay a month! NICE socail engineering hack but at least we learned how dangerous those text messages we get on our phone or email are.
@5dollasubwayfootlong
@5dollasubwayfootlong 2 года назад
Is phishing really considered hacking now...? Tech illiteracy is scary nowadays.
@tanuk7136
@tanuk7136 2 года назад
@@5dollasubwayfootlong this isn't really phising sense it allows you to take control of someone device (hacking) it isn't just scaming them or giving them a virus
@kwasioliver8836
@kwasioliver8836 2 года назад
This is solely for educational purpose😈😈
@tacotaquero1680
@tacotaquero1680 2 года назад
The video: teaches how to hack the government of any country and destroy it* Also the video: this is only for educational purposes
@Jeracraft
@Jeracraft 2 года назад
This could potentially explain a lot...My life has been flipped upside down, being just hacked myself my subscribers directed me to this video
@fateerah851
@fateerah851 2 года назад
Hi jeracraft
@Gruttling
@Gruttling 2 года назад
Sup
@sixantelopegamez5220
@sixantelopegamez5220 2 года назад
Lol
@yesthank4969
@yesthank4969 2 года назад
Yea my main account was hacked and some one posted a mobox video what ever it was
@spaks6193
@spaks6193 2 года назад
Lmao
@robertdelossantos633
@robertdelossantos633 Год назад
Hello network Chuck , I wanted to thank you for the information that you are teaching, I'm 62 yrs. old and I have to replay your videos a few times but I love that your Straight to the point. Anyway once again thank you and be safe Robert
@brentharris6666
@brentharris6666 Год назад
This is awesome. My wife is a bit careless with her information and thinks it's just a joke. This will be good to show her how scary it could be.
@j800r_aswell
@j800r_aswell 2 года назад
The truly terrifying thing is how easy this is. If you are even remotely competent with a computer you could pull this off and potentially devastate someone’s browser security.
@Jduekengn
@Jduekengn 11 месяцев назад
how do you do it? if i try to hook a browser then nothing happens. wether its my own hosted website or the demo
@Borisaurus8826
@Borisaurus8826 7 месяцев назад
@@Jduekengn are you on the panel
@Jduekengn
@Jduekengn 7 месяцев назад
@@Borisaurus8826 in the website which opens when i activate beef?
@Renzelgivennns
@Renzelgivennns Год назад
This is the most comprehensive, understandable, well-presented historical spy site overview I have heard from any online agency. I have subscribed to and shared your channel with friends around the world. Whoever created *Pentagon Codes* that particular spy site deserves the highest of journalistic accolades. Bravo!
@tactiks7468
@tactiks7468 Год назад
This guy is the hacker version of Jerry rig everything, his voice, mannerisms, wow! Love you channel man!
@bao6429
@bao6429 2 года назад
Anyone can get this thing right if you diligently go and find the right source , I have been able to carry out projects like this with some agency , And i have learnt that not everything is shown in these tutorials lately , still need some deep digging .
@reece3885
@reece3885 2 года назад
Thats why i am stucked with using procyberspy.com for all my hacking related services , they are fast and trust worthy
@kestonsmith1354
@kestonsmith1354 2 года назад
@Max Trenton I call nonsense on your comment. People deserve to know that people are wasting their time and plotting against them. I am an ethical hacker and I saved people lives against domestic violence abusers because of this. And those very same people were husbands/wives/children that plotted to kill their spouses/significant other for financial gain, real estate or just pure evilness. Guess what I stopped people from getting killed and alerted the authorities and the clients involved.
@adamfuller3035
@adamfuller3035 2 года назад
@@kestonsmith1354 u responded to a bot
@Rust_Rust_Rust
@Rust_Rust_Rust 2 года назад
@@kestonsmith1354 hacker gets fooled by youtube bot.
@Snakebitesspider
@Snakebitesspider 3 месяца назад
thats alot of likes
@complainergamer
@complainergamer Год назад
NIce, I'll teach my kids a lesson now. Switching careers and getting into IT/Security. It's a must have these days. Great work man!
@tahmidchowdhury7672
@tahmidchowdhury7672 Год назад
That's Scary, by the way I am taking lot of Cybersecurity classes at my school. I think the only way to protect yourself is checking your logs every time and don't click links if you are not sure who sent you.
@solarpath3333
@solarpath3333 2 года назад
Great work Chuck. I always leave with value , watching you flow with speedy execution.
@fettahbabayev7857
@fettahbabayev7857 2 года назад
#ProCyberspy has the knowledge and know how to find the right tools to for both private & public accounts using skill, empathy and wisdom.
@scali5948
@scali5948 4 месяца назад
Oh my hacker friends would love this, I’ll make sure to share + subscribe
@rajchauhan-xh3vo
@rajchauhan-xh3vo Год назад
You got a new subscriber...what an engaging way of teaching... fabulous
@tentrot4420
@tentrot4420 2 года назад
When you don't have friends so you hack yourself:
@superkool7
@superkool7 2 года назад
Always pumped to see a new upload! You’ve your channel brother
@xxovereyexx5019
@xxovereyexx5019 Год назад
Why so many bot comments on here
@bhadrik
@bhadrik Месяц назад
He will put cource on that soon.
@paintingpictures8773
@paintingpictures8773 2 года назад
Quite interesting the system in which a lot of things are carried out in todays modern world , I enjoy technology so much but i still think it makes us more vulnerable , still has taken the world to greater heights though . Interesting Video by the way!
@reece3885
@reece3885 2 года назад
Thats why i am stucked with using procyberspy.com for all my hacking related services , they are fast and trust worthy
@Snakebitesspider
@Snakebitesspider 3 месяца назад
You got alot of likes
@paramsodha7936
@paramsodha7936 2 года назад
Yea please don't mind me I am 100% going to use this for educational purposes ONLY
@wandersonvieira1210
@wandersonvieira1210 Год назад
Continue making videos with subtitles, I'm Brazilian and I love your videos
@DownTownDowns
@DownTownDowns Год назад
Literally the perfect RU-vidr. Great content, presentation, explanation, everything - all great. But good god man everytime you slurp the coffee I feel the rage of one billion hornets piercing my ear drums and I want to die. I really want to watch all your videos but I can't do it
@Natsukashigame
@Natsukashigame Год назад
There isn't a thing such as the best RU-vidr ha ha, he's good in what he's doing but also he does some mistakes
@ChrisMedley
@ChrisMedley 2 года назад
Would love to see a video on detection, defending, blocking (aside from disabling JavaScript which is the best way, but might be too late)
@darksy_tv9891
@darksy_tv9891 2 года назад
Clear cache and web hooks
@mohamadgaruab4389
@mohamadgaruab4389 2 года назад
I'm new to trading and I find it difficult using these strategies well. Where can I find a legit broker? that will manage my account and also teach me how to trade
@adamweah8037
@adamweah8037 2 года назад
@@mohamadgaruab4389 Check up Helen Howard Pratea She's really one of the best and legit advisor out there right now
@ashwinaditi1039
@ashwinaditi1039 2 года назад
@@adamweah8037 i got into the market last year , but i havent been profitable in my trades , How do i get in touch with her
@adamweah8037
@adamweah8037 2 года назад
@@ashwinaditi1039 just put her name on google and you will be directed to her website
@MrPokemon7777
@MrPokemon7777 2 года назад
Him: "I'm going to show you how to do it, it's easy" Also Him: "DO NOT DO THIS!"
@Darksouldier145
@Darksouldier145 2 года назад
Him: I’m going to show you how to make your family learn, it’s easy also him: do not do this to everybody it will take you into Prison
@modmah7191
@modmah7191 2 года назад
LMAO
@MrPokemon7777
@MrPokemon7777 2 года назад
@@DataVerxx 🤖 🤫
@gouranshsachdeva6097
@gouranshsachdeva6097 Год назад
Its my first video i watched on this channel and its awesome . Thanks
@antondeswardt2027
@antondeswardt2027 Год назад
Makes you wonder what links to click in the description xD. Nice video
@ratzusu
@ratzusu 2 года назад
This is perfect. Me and my friend have an intense game where we do anything to rickroll eachother. Very helpful...
@aaaaaa-hh8cq
@aaaaaa-hh8cq Год назад
This is terrifying ! You shouldn't get hacked just by opening a link ... How can we protect ourselves from this?
@whangggggg
@whangggggg Год назад
Analyze the link before clicking it... Use links analysers...
@phillydee3592
@phillydee3592 Год назад
By not clicking on links that you know where it comes from..
@JohnT-GNM
@JohnT-GNM Год назад
is there any way to check to see if I have been compromised in this fashion ?
@Ahmed-fq3kz
@Ahmed-fq3kz 5 месяцев назад
You can't be hacked if you open A link
@mxrtinpx
@mxrtinpx 4 месяца назад
​@@Ahmed-fq3kz Oh, yes you can, big time. Cookie hijacking is the worst and all it takes is one click on a malicious link.
@nobias6172
@nobias6172 Год назад
there is so much emotion emitted with such little reason. content creators are mini politicians
@user-it4kc4qm1d
@user-it4kc4qm1d 3 месяца назад
God forbid the man wants to build a brand and is passionate about what he does.
@bao6429
@bao6429 2 года назад
*Great Video , Will love you to post more contents and recommend reliable sources for this sort of informations.*
@reece3885
@reece3885 2 года назад
Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use
@reece3885
@reece3885 2 года назад
Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use
@Snakebitesspider
@Snakebitesspider 3 месяца назад
Yo uhh do you know you got a lot of likes?
@dubsessed9790
@dubsessed9790 3 месяца назад
​@Snakebitesspider there are a bunch of comments like this on this video. They are bought comments by the channel to boost their algorithm. That's why they sound so "off"
@frickinjoe
@frickinjoe 2 года назад
"don't click any links you don't know about for sure" "just click the link in my description" LMFAO
@kevinwong_2016
@kevinwong_2016 2 года назад
🏳️‍🌈😰👇👉👈
@sussanmarcum275
@sussanmarcum275 2 года назад
I confidently refer you all to him his been a grate talented man.....$
@TheOgana1
@TheOgana1 11 месяцев назад
The best programming RU-vidr with only Legit content🔥. Thank you for all you do, I really enjoyed all your videos
@my-nf3rj
@my-nf3rj 2 года назад
#procyberspy is good
@teknobuddie2612
@teknobuddie2612 2 года назад
Him: *"Don't do it! It is illegal and you will get caught."* Also Him: "I am gonna walk you through every single step."
@yawasubonteng6518
@yawasubonteng6518 2 года назад
Your tutorials are just fun... you're good at what you do. thanks
@highlyactivecannabis3344
@highlyactivecannabis3344 Год назад
He is def a good teacher I learn fast from him and easy to understand. ! Keep them coming😂
@haithamalmasri8341
@haithamalmasri8341 Год назад
I have done a course about this but this is just the basics for a normal user but when it gets mixed up with Linux OS it's gonna be hella scary.
@nirvaangoel8172
@nirvaangoel8172 Год назад
Awesome! Keep it up! Can you please make a video about creating your own website that you can send out to friends and family to prank?
@nirvaangoel8172
@nirvaangoel8172 Год назад
Why DM?
@parsonsmarcus
@parsonsmarcus 2 года назад
The biggest risk for "hacks" like this are the social engineering ones where you might think that you are on a legit page, but you're not. JavaScript can't control your computer, force you to download and install files you don't want or do a lot of the scarier things that executable programs can do because it runs in a sandbox where it has a very limited scope of what it can do by design. Even the "online/offline" portion of this is misleading because it really just means "connected/not connected" which is as simple as closing that browser tab. The biggest thing is to make sure you're on a page owned by the company or person you're visiting, which is the same thing you should have already been doing.
@kjantzer
@kjantzer 2 года назад
^ This - always verify the url is correct, particularly when opening from a remote source like email. This video is more about "phishing"
@WreeperXD
@WreeperXD 2 года назад
yes
@sussanmarcum275
@sussanmarcum275 2 года назад
I confidently refer you all to him his been a grate talented man.....$
@AScotsDude
@AScotsDude 2 года назад
@@kjantzer Good advice. One thing to note though - if BEEF is used with a XSS vulnerability in the website then the domain part of the URL will be correct so we can't rely on that. BEEF was originally designed for exploiting XSS not phishing (which is essentially shown in this video).
@kahongai2028
@kahongai2028 5 месяцев назад
I was looking at the comments and I was interested in what the online/offline mean. Does it mean closing the browser is good enough in disconnecting the hook? Or if I was hooked once, I will be hooked forever like I will go online again after opening browser again?
@sixthkid6
@sixthkid6 Год назад
Very educational, however, I think its prudent to explain some more of the behind the scene stuff. Such as hows and whys of beef. For instance I would be interested in learning WHY beef even exists, or how is it actually controlling everything. I think it would also be quite helpful to show different methods for figuring out if you have been hacked.
@TomTKK
@TomTKK Год назад
Well if you want to learn, why not find that out yourself?
@Bamcrafting
@Bamcrafting Год назад
Don’t ever do this extremely dangerous thing but imma tell 5 million people how to do it in 5 simple steps
@bao6429
@bao6429 2 года назад
You actually always make great videos chuck, Learnt quite a lot and I have come to realise how technology really is an advantage and vulnerability . Keep doing the good work , I found your video trying to learn something on seeing what my girl be doing , guess this is a great start haha ..
@judithlowder9539
@judithlowder9539 2 года назад
the best Cyber experts are procyberspy.com
@sussanmarcum275
@sussanmarcum275 2 года назад
I confidently refer you all to him his been a grate talented man.....$
@SABRE-ls5fu
@SABRE-ls5fu 2 года назад
This is insanely easy, wow I've learned so much watching your channel.. I still haven't bit the bullet and got fully into cyber security, just messing around about a year now but. I think I speak for quite alot of us when I say we really appreciate you sharing your knowledge with us!!
@figjam6505
@figjam6505 4 месяца назад
This is really good for showing your family and friends how vulnerable they are if they make bad digital security choices. Have you done a video on how to mitigate these sort of attacks or what to do if you have been targeted?
@TheTeladras
@TheTeladras Год назад
@networkChuck you forgot to mention, of how is a phishing session closed, once it is initiated? The assumption is that closing the tab will be enough? And one additional question would be, does beef also have a reach on this informations as well?
@code9mill
@code9mill 2 года назад
Love the part where he pranks his wife
@SIMULATAN
@SIMULATAN 2 года назад
as a beginner audio / video editor, i can really hear the pain the editor must've felt cutting out the audio... poor dood
@_.KLYDE._
@_.KLYDE._ 2 года назад
For anyone that has background noise issues. RTX Voice is your friend. I use that with VoiceMeeter and my 30 dollar mic sounds crispy clean with no background noise.
@fog-
@fog- 2 года назад
@@_.KLYDE._ ok
@almaefogo
@almaefogo 2 года назад
@@_.KLYDE._ in my 1050 ti rtx doenst work well but the Asus two way noise cancelation works like a charm I'd say it works even better from the videos I saw, the only thing is you need a specific motherboard.
@CrampavanAdventures
@CrampavanAdventures 2 года назад
@@_.KLYDE._ RTX voice used to much utilisation of my 3070 to warrant using it.
@_.KLYDE._
@_.KLYDE._ 2 года назад
@@CrampavanAdventures Are you sure you're not using Nvidia's other program? RTX Voice is only using 1.5% cpu, 2.7% GPU, and 35MB memory with a 1070TI. I have zero issues with my PC.
@AKZKZ1
@AKZKZ1 Год назад
Top vid! Make a vid on protection from this Chuck!
@TopMusicsEnglish
@TopMusicsEnglish 11 месяцев назад
BRUH!! STOP DRINKIN COFFEE MAN ,I SEE IT EVERY TIME IN THE VIDEO ! 😂and yeah i do like coffee
@shawnmendrek3544
@shawnmendrek3544 Месяц назад
It's to make you want to buy his coffee. It's a subliminal thing. Not saying he is doing something bad, just my take on it.
@Dethflash
@Dethflash 2 года назад
What sort of defense would work best against this type of attack on a home network?
@PatThePerson
@PatThePerson 2 года назад
Noscript
@ruansamuel8894
@ruansamuel8894 2 года назад
wonderful channel. I have to improve my English soon to watch without pauses 😂, a hail from Brazil
@Stray0
@Stray0 2 месяца назад
"I'm colorblind so I might get the colors wrong." *gets both colors wrong* XD
@visionaeon
@visionaeon Месяц назад
He got it wrong but... he ain't wrong, ain't he?
@fkagamingcrafts6756
@fkagamingcrafts6756 Год назад
it totally reminds me of those ashley madison redirects when you click on a link of a person who on tinder, or some other marriage or dating site works. You sign up, bam they pwn your info. My eyes have been opened to new attacks on a security level that most people would not be attentive too even if they did do a dns look up of the specified link sent to them. This may seem simple, but this is like pishing 303 or higher advanced classes on detecting a scam site or otherwise. I dispise how you force coffee down our throats, but you bring up very valuable points on cyber security. We may disagree on some things, but you are providing knowledge to the people. cheers sir!
@elfrancisco9954
@elfrancisco9954 2 года назад
Man this video just took my paranoia to a whole new level. Cant wait to try it out as well.
@moeadany2924
@moeadany2924 2 года назад
That target need to be online it won’t work if it offline
@nalixl
@nalixl 8 месяцев назад
I didn't think much of it (could have built it myself) until the part where you could scan someone's private network through an apparently otherwise uncompromised browser. I mean, how on earth does a well built browsers sandbox even permit acces to the rest of a person's private network without anyone realizing?
@cyberthreatsdefenders
@cyberthreatsdefenders Год назад
Hi Chuck, what device do you use to write on the screen? Thanks.
@NickSneaky
@NickSneaky 2 года назад
Imagine simply going to your sister then she asks you how the hell did you do that You: BeEF Her: What? You: Beef.
@mastergarchomp9068
@mastergarchomp9068 Год назад
I can't believe this class is just to prank my family 🙄
@catharsis222
@catharsis222 Год назад
My mom, grandma, sister, girlfriend would all fall for that. There’s one connective thread that ties them all together, and I just cannot think of what it is….
@icecold_mont2x735
@icecold_mont2x735 2 года назад
1. Abuse - Leave immediately 2. Failed discussions - Converse then seek therapy 3. Repeated neglect - take care of you 4. Repeated lies - protect yourself 5. No appreciation - Seek gratitude from service 6. Suspect cheating - Seek assistance of Targettrappers . Be there for yourself
@nonyabusiness6084
@nonyabusiness6084 2 года назад
I needed to read that right now.
@MrBigMoneyMan909
@MrBigMoneyMan909 Год назад
The data your LAN subnet scan returned are the top and bottom addresses of the subnets and your gateway. Every subnet has an address at the top and the bottom that can’t be used as hosts
@b07x
@b07x 2 года назад
from the intro, I thought it was going to be some next level vulnerability that would bypass the sandbox 😂this is basic nice video though
@panmateusz
@panmateusz 2 года назад
Yeah, it's not even a vulnerability it's just a casual website that have live control on js code. Simple, but might work for people that will not check the url before inserting their critical data.
@Muaahaa
@Muaahaa 2 года назад
Yeah, probably best thing it offers is login pages for different authenticators, though they could probably be updated. That said, it isn't all that hard to copy some HTML and CSS to do that yourself.
@sharkbun
@sharkbun 2 года назад
The video is very intuitive but scary. So one quick question, how do you know if your browser is hooked? What are the signs? Any tools to detect it? Thanks man, you are always the best
@apexgamingshorts4805
@apexgamingshorts4805 2 года назад
You have to stay on the beef website
@imanidiotanyway6393
@imanidiotanyway6393 Год назад
@@apexgamingshorts4805 so if I close the tab i am okay?
@medusa9041
@medusa9041 Год назад
@@imanidiotanyway6393 yes
@medusa9041
@medusa9041 Год назад
@@imanidiotanyway6393 The real use of this is in XSS vulnerable websites. You’d inject the code into an actual website, and visitors wouldn’t know any better. The bad actor could then make a fake login pop up for the website to harvest credentials.
@DmitryShubin-ym4pj
@DmitryShubin-ym4pj 5 месяцев назад
The thing which could be the most interesting one for this software was not shown in the video. As I see, all modern (for the moment video was filmed) browsers allow to intergrate agent software which interacts with Beef complex. And transfers all information from 'client side' to 'server side'. If it is so, the most interesting point is how it is possible (is it a bug or a feature). I suppose that authors should have more information about how it works. I see some parallels with SQL injection attack (I mean in terms how browser become compromised) but I would be glad to hear how it really works (or worked if this vulnerability is already fixed).
@QWERTY-mq6yd
@QWERTY-mq6yd Год назад
You are very colorblind 😂😂 ❤ loved the video
@Mohib74
@Mohib74 Год назад
Very good editing which software you use for editing and video cuts
@jennifereileenmartinez2104
@jennifereileenmartinez2104 2 года назад
I tried and it’s amazingly good. Thanks for the great content…
@NNNedlog
@NNNedlog 2 года назад
I loved the way he said "what do you think, we hack ourselves real quick?"
@drkwrk5229
@drkwrk5229 2 года назад
Got completely numb to such comments, everone who launch an attack be it ethical or malicious will hack themselfs real quick before going live. It's such a normal thing to test an offensive strategy.
@sussanmarcum275
@sussanmarcum275 2 года назад
I confidently refer you all to him his been a grate talented man.....$
@ObeyMiniNinja
@ObeyMiniNinja Год назад
I love when you pranked your wife.
@jetfire3008
@jetfire3008 Год назад
is it just me or is it funny that hes using beef and his name is chuck now i want a chuck roast
@DanKing79
@DanKing79 2 года назад
You can also inject the beef hook url into a website as part of a man in the middle attack, hook browsers without sending people to a phishy website
@SomnoNaut
@SomnoNaut 2 года назад
How would you put yourself between the URL clicked and the destination?
@lifeisshorts001
@lifeisshorts001 2 года назад
This video also teaches you to always check the website URL to make sure no one is trying to hack you
@L2002
@L2002 2 года назад
this video is overrated, it's more like phishing not hacking. when you open the website, it only gets harmless info just like any other website you visit. and if the website asks you for Google Password, maybe don't give your password to an unknown website?!
@L2002
@L2002 2 года назад
@fatopossum you mean autofilled password? Explain?
@zadekeys2194
@zadekeys2194 2 года назад
@fatopossum which is why you should not use your browser to store all your passwords. Use a good password manager + 2fa.
@zadekeys2194
@zadekeys2194 2 года назад
URL's can be masked or hidden in images. Not clicking a legit URL / not clicking at all is not sufficient to protect you.
@DePhoegonIsle
@DePhoegonIsle 2 года назад
@fatopossum you realize, that Edge & Chrome will throw a hissy fit about the google passwords right? They really attempt no populate them on 3rd party sites.
@zatnut1921
@zatnut1921 Год назад
His poor wife getting all those rick rolls
@Techyfit
@Techyfit Год назад
Man you the best, you just make a hard thing so eazy just like that, big Respect for you Gee you the best, I'm spammimg thumbs up here🤝🏻🐐
@RobTheMusician1
@RobTheMusician1 2 года назад
Imagine if the government ran this on their websites
@mopioline65
@mopioline65 2 года назад
it's all stored in logs on every webserver. every webserver keeps a log of who visits it by IP. That said, if it's using HTTPS without a keylogger in use (like this one is) your data will be encrypted but the IP will still be visible.
@wqtermelcn
@wqtermelcn 2 года назад
@@mopioline65 eh not EVERY webserver keeps a log i know a few that dont.
@handsanitizer2457
@handsanitizer2457 2 года назад
@@wqtermelcn yeah, they tell you they don't.
@nathanielslawski2993
@nathanielslawski2993 2 года назад
never knew you were colourblind. I am too, deuteranomaly. This is why I want to get into cyber security, colourblindness won't affect me much at getting the job, unlike other jobs.
@nathanielslawski2993
@nathanielslawski2993 2 года назад
i got into Linux when I was very young too, on a kali Linux live usb. played around with BeEF, the Google phishing site hasn't changed since. xD
@twentyeightO1
@twentyeightO1 2 года назад
Backend development of apps and web-apps is also an option as there you wont be dealing with colors.
@ahmadsabboura2779
@ahmadsabboura2779 Год назад
How do you do the screendrawing/writing thingy? It's so cool! Way better than a mouse highlight
@kaithecreatorrr
@kaithecreatorrr Год назад
It would’ve been nice to get an explanation on how to know if your browser has been hijacked. Maybe there is a video where he covered it already?
@marvinpadilla8737
@marvinpadilla8737 Год назад
Yes sir please, what might be the best solution for a hacked browser?
@mirnamontanez5497
@mirnamontanez5497 Год назад
@@marvinpadilla8737 *Future_Imperative* can trace (iOS/Smartphone/Ipad) the phone location history timelines (full), social media apps, texts and calls by only phone number and I want to thank them because of them I was able to see everything on target’s phone anonymously.
@mirnamontanez5497
@mirnamontanez5497 Год назад
@@marvinpadilla8737 Reach out to *Future Imperative Corps* He will get the hacking done in a short period of time
@mirnamontanez5497
@mirnamontanez5497 Год назад
@@marvinpadilla8737 *FUTURE IMPERATIVE CORPS* 💯💯💯 He got *5.6 K* IG followers. The real page has over 5.6k followers and their website is on their page.
@mirnamontanez5497
@mirnamontanez5497 Год назад
Send him a Dm and wait for response if you have requests related to situations of hacking phones, thwarting hacking from your devices, recover lost password, recover hacked/disabled/locked account, trace GPS etc, he got you covered👍
@wonderofu6951
@wonderofu6951 2 года назад
"Sure, you can try" he said, "You won't even be able to 'hack' me if you had access to my computer" he said, DW its my friend, I got perms
@thepianolegend5145
@thepianolegend5145 2 года назад
Awesome video. I had some questions. What happens if the user closes the tab? Will you lose access? And if the user shuts down their machine will the hacker still maintain access?
@thenoobsquad7514
@thenoobsquad7514 2 года назад
yes you lose access but you can make it so you dont
@stemgerlamo599
@stemgerlamo599 Год назад
This was one of best , you help me man i apreciate
@toddymctodd506
@toddymctodd506 Год назад
Find myself watching these vids at school and while im chilling!
@Jordan-rv8gl
@Jordan-rv8gl 2 года назад
You always have amazing content with terrific editing! Love the way you explain difficult subjects (you make them fun!).
@astral6749
@astral6749 2 года назад
Imagine hacking your wife's computer only to find out that she's cheating on you.
@noalear
@noalear 2 года назад
I think a lot of men would find that they are.
@VioletteToussaint
@VioletteToussaint 2 года назад
Usually with small children they just don't have any time or energy for that anyway...
@crisgiovany4188
@crisgiovany4188 4 месяца назад
Thank u chuck for keeping us safe ✅✅
@TomMyfield-tr2tg
@TomMyfield-tr2tg 3 месяца назад
You're like Stan Prokopenko for Cyber 😁👏👏👏
@mihailvelinov7122
@mihailvelinov7122 2 года назад
Thank you for all your work Chuck. Thanks to you I was inspired to learn networking and mess with all the amazing technologies around it an year and a half ago. Now I'm working as an System Administrator and can't thank you enough for what you've done!
@Blessed2bFresh
@Blessed2bFresh 2 года назад
Did you have prior IT experience prior? I'm genuinely curious about your journey
@tstcikhthys
@tstcikhthys 2 года назад
Just to be clear, this isn't really "hacking" into the person's browser so much as it is just a potential phishing attack. The browser doesn't have any vulnerabilities that you're exploiting. Any website can show alerts and such, so it's no different to every other website out there.
@scottstevens2752
@scottstevens2752 Год назад
You sound very knowledgeable bro, but in my opinion I believe this is hacking if I'm wrong, I'll humbly admit my error, but if people can access peoples passwords and re direct them to other websites I would believe this is hacking.
@tstcikhthys
@tstcikhthys Год назад
@@scottstevens2752 It's like Hollywood's definition of hacking, which is exaggerated and ridiculous. If I had my password written on a post-it note and you saw it and used it to log into a computer as me, you didn't "hack" me. Hacking requires exploiting vulnerabilities in a computer.
@scottstevens2752
@scottstevens2752 Год назад
@@tstcikhthys Thank you for correcting me, (who says this on You Tube lol)? :)
@astro3
@astro3 Год назад
@@tstcikhthys ^^
@ali_T-
@ali_T- Год назад
Yea he is right. They blocked my link. Even though they redirected who sent the link 😂😂😂
@indy2l
@indy2l Год назад
I love the part where he trolls his wife.
@Showbiz1235
@Showbiz1235 Год назад
😂
@Helo45123
@Helo45123 6 месяцев назад
my friend is about to get rickrolled 20 times a day
@sharwinshreds
@sharwinshreds 2 года назад
That is crazy, will be using it to prank friends 😂😂
@aboudi0507
@aboudi0507 2 года назад
Hey chuck, wanted to know if I can use proxychain with the mysterioum mining
@SereniumAlts
@SereniumAlts 6 месяцев назад
bro is casually teaching us how to hack 💀💀
@i_inf0din254
@i_inf0din254 Год назад
This is actually kinda neat, I may use this on the mother in law, she's recently been a victim of a fishing scam and honestly, she acts super afraid of tech these days because of that, but honestly she kinda should be careful of what she's clicking too.
@canadian2707
@canadian2707 Год назад
a fisherman scam
@Berrymacquinnee
@Berrymacquinnee Год назад
There is no doubt that you will rise fast at the apex of your career *Pentagon Codes* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock!
@Zerael071
@Zerael071 2 года назад
Great video. I have a question Chuck. I’m colorblind too. How did you work with all those switch and router wires in networking? Oranges, yellow, greens, reds, etc. How were you able to tell which wires were which?
@Zerael071
@Zerael071 2 года назад
@Crossroads yeah. I try that now but there are so many different shades of the same colors that it’s kind of difficult. But I guess if I’m working with the same wire colors, that should definitely be doable. Makes sense. Thank you 🙏🏾 😁 puts me at ease a bit lol
@dohyea6093
@dohyea6093 2 года назад
The correct answer is ask a non colorblind person to help you. You can't "learn" to see something you can't see. There is an app for smartphones that can identify colors for you, so that might work.
@Zerael071
@Zerael071 2 года назад
@@dohyea6093 oh yeah. I forgot about the app. I tried that out years ago. And I’m sure the accuracy has gotten better as technology has progressed. Thank you 🙏🏾
@eyjzdrkxjqzfuhqyzybf
@eyjzdrkxjqzfuhqyzybf 2 года назад
If you're working with other people, they should get a habit of identifying things in a way that anyone can understand (numbers, words, random strings, musical notes…).
@tonioyendis4464
@tonioyendis4464 Год назад
This is why I always run an internet security system on all my devices.
@rosalli729
@rosalli729 Год назад
3:13 "here we have our beef options" i want it medium rare :)
@ashishprabhune4059
@ashishprabhune4059 2 года назад
Keeping making more videos like this because a lot of people really need this and it’s not always explained in details like you’ve done , Check the comments also they have reviewed a reliable source I tried .
@judithlowder9539
@judithlowder9539 2 года назад
Reached out to my friends yesterday on how to get help to access text messages that I already deleted and one was so sure of procyberspy.com which was the reason I had to use their service , I got to them three days ago , I think it’s a very smart service they’re providing because I personally deleted this messages myself , but what can I say I think they’re the best at what they do because I’m really amazed on how they recovered messages I had deleted years ago .
@Brandjess11
@Brandjess11 2 года назад
👆This team of professionals are experts who loves to take on challenges and mostly working on providing quality services to their customers.
Далее
How To Access the DARK WEB in 2024 (3 Levels)
15:20
Просмотров 3,6 млн
i created malware with Python (it's SCARY easy!!)
25:18
KICHKINTOYDAN KATTA JAVOB 😂👍
00:54
Просмотров 241 тыс.
how to HACK a password // Windows Edition
12:22
Просмотров 1,3 млн
3 Levels of WiFi Hacking
22:12
Просмотров 1,5 млн
let's hack your home network // FREE CCNA // EP 9
30:16
30 Windows Commands you CAN’T live without
14:35
Просмотров 2,2 млн
Instagram OSiNT
9:45
Просмотров 1,8 млн
Топ-3 суперкрутых ПК из CompShop
1:00
Pratik Cat6 kablo soyma
0:15
Просмотров 8 млн
5 САМОДЕЛОК ИЗ DVD ПЛЕЕРА
10:10
Просмотров 42 тыс.
ПК с Авито за 3000р
0:58
Просмотров 1,7 млн
КАК GOOGLE УКРАЛ ANDROID?
17:44
Просмотров 89 тыс.