Тёмный

Showing a Craigslist scammer who's boss using Python 

Engineer Man
Подписаться 537 тыс.
Просмотров 6 млн
50% 1

Опубликовано:

 

26 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 4 тыс.   
@donwilson
@donwilson 6 лет назад
You know you're on a programming video when the comments are full of "a better way to do this would be to..."
@kevinmuller3425
@kevinmuller3425 6 лет назад
@@erikpowa lol there are still people saying python is not real Programming? Damn
@deathcoder
@deathcoder 6 лет назад
crowdrefactoring
@blair3549
@blair3549 6 лет назад
Yes, because this is a really ineffective and futile attempt to waste the time of phishers. Skiddies gave him their ad revenue, though.
@RayTC
@RayTC 6 лет назад
guize i totally made a minecraft fortntie mod so im obviously a master progremmer and i know what a script is so im leet haxxor
@eternaldreamerofsleep
@eternaldreamerofsleep 6 лет назад
DIOhydrogen Monoxide is this bait?Whatever,I only know a bit of HTML :/
@Aighthandle
@Aighthandle 2 года назад
The great thing about this white hat kind of project is there’s always more work to be done. Great for intermediate beginners that like trolling as a force for good
@tiptopanteater7713
@tiptopanteater7713 2 года назад
wasting peoples time is where trolling started. simple, effective and literally never gets old.
@drew9017
@drew9017 2 года назад
More of a red hat lol
@terminatorfishstudios
@terminatorfishstudios 2 года назад
Red hat hacking, good guys but taking an illegal and destructive approach.
@ryanolsen294
@ryanolsen294 Год назад
@@terminatorfishstudios lol
@wheezybackports6444
@wheezybackports6444 Год назад
@@terminatorfishstudios legality != morals
@199NickYT
@199NickYT 6 лет назад
Yes, there are better ways to do it. Yes, you should share them here. No, you shouldn't berate Engineer Man for not doing them. He did 90% of the work that cost 10% of the time here. He isn't going to turn his 5 minute video into half an hour just to squeeze out that last 10%. It's a proof of concept, people.
@EngineerMan
@EngineerMan 6 лет назад
Thanks for noticing this important fact which it seems many are missing.
@istvandeak8232
@istvandeak8232 6 лет назад
ofc you are not going to show all the parts! I don't even know who was that stupid to think you gonna... nice job! :) ;) btw I just like to rat them & destroy all of their equipment! :D perament damage! :P
@r3wturb0x51
@r3wturb0x51 6 лет назад
that 10% is the difference between pwning the scamming bastard and being swatted like a fly. besides, i could make something much better in around 10 minutes.
@199NickYT
@199NickYT 6 лет назад
r3wturb0x alright, you have ten minutes.
@dreamsteal4773
@dreamsteal4773 6 лет назад
BPNave lmao
@toolbelt
@toolbelt 2 года назад
That was a delight to watch. I’m learning Python and I find this so inspiring.
@moreish7193
@moreish7193 2 года назад
me too :)
@lennyshoe
@lennyshoe 2 года назад
Same here!
@oppenguin6462
@oppenguin6462 2 года назад
same
@connormclean4220
@connormclean4220 2 года назад
Yea things like this are brilliant for learners because it makes them actually want to learn more and try this out . This is a great little project and videos like this is literally how I got into coding and actually started coding in my free time
@roguishowl3915
@roguishowl3915 2 года назад
Me three ✌🏻
@bfwebster
@bfwebster 6 лет назад
Great video. :-) Reading through the comments, I'm reminded of the classic joke: Q: How many programmers does it take to change a light bulb? A: 35. One to actually change the bulb and 34 to say after the fact, "I could have done that better."
@EngineerMan
@EngineerMan 6 лет назад
Can't stop laughing at this. Thanks.
@jcadult101
@jcadult101 6 лет назад
None, it's a hardware problem.
@Me63422
@Me63422 6 лет назад
lol
@chegomez841
@chegomez841 6 лет назад
you only need one. you said it yourself.
@luigielite1
@luigielite1 6 лет назад
Here's my answer: one to actually change the bulb and 34 to use stackoverflow to figure out on how to do it.
@gabrielh7517
@gabrielh7517 6 лет назад
Breaking news man in Nigeria with no family or friends dies with millions of dollars of cash he had been trying to give away
@gedgar2000
@gedgar2000 6 лет назад
Damn, I KNEW that Nigerian email sounded legit!
@gabrielh7517
@gabrielh7517 6 лет назад
@@gedgar2000 we all missed out 😓
@jtc1947
@jtc1947 6 лет назад
GABRIEL! FANTASTIC! You have a GREAT SENSE OF HUMOR!
@definitiveentertainment1658
@definitiveentertainment1658 6 лет назад
Gabriel Hormuth Man in Nigeria? He’s a Nigerian Prince with close ties to First Nigerian Bank, thank you very much!!
@justincase1898
@justincase1898 6 лет назад
WHERE do i send my SSN# and moms maiden name
@kookyflukes9749
@kookyflukes9749 6 лет назад
I have no idea what just happened but I'm glad it did
@TheValorantGuy
@TheValorantGuy 6 лет назад
He created a file to send 1000 emails to scammers inboxes to make them go threw each email and password so he cant tell real emails from fake ones
@MBA2804
@MBA2804 6 лет назад
oh no, its infinite emails.
@williamfunes2740
@williamfunes2740 6 лет назад
Control yourself...control yourself.. .THATS WHAT SHE SAID!!!!
@DebugCat
@DebugCat 6 лет назад
@William Funes not funny :L
@williamfunes2740
@williamfunes2740 6 лет назад
@@DebugCat the office...when they tell Michael he can't say anything inappropriate.
@CecilMerrell
@CecilMerrell 2 года назад
To make it harder for him to sort through the list, you should just random select from the list of top 10k commonly used passwords instead of auto generating them.
@hereandnow3156
@hereandnow3156 Год назад
Isn't it also likely the scammer would be able to reasonably discard the fake data he sent by looking at the time and the IP address they are coming from?
@yousif6982
@yousif6982 Год назад
@@hereandnow3156 yeah he definitely shouldve used a vpn and something like the rockyou password list to be safer and more effective, still a good idea though
@JohhnyBasedDepartmentDab
@JohhnyBasedDepartmentDab Год назад
@@hereandnow3156 That is what i was also wondering
@peterhindes56
@peterhindes56 Год назад
​@@hereandnow3156only if he logs the IP with the username and password otherwise he's going to have to comb through access logs that he may or may not have
@bonbonbonbons
@bonbonbonbons Год назад
​@@hereandnow3156Use proxying
@setnaffa
@setnaffa 6 лет назад
504 Nigerian Princes disliked the video...
@hurshiej7208
@hurshiej7208 6 лет назад
Mike Morgan they just want to share their millions of dollars is that really so hard to believe
@blameburr8722
@blameburr8722 6 лет назад
AC3 Of Cards Error 404: Millions of dollars not found
@nathanielluke2084
@nathanielluke2084 6 лет назад
Mike Morgan dude, some nigerians are still stuck at the moon
@feliciameyer4530
@feliciameyer4530 6 лет назад
Is it bad that it took me legit ten seconds to realize 504 meant the amount of dislikes and not a joke about timeout errors?
@parveensingh3834
@parveensingh3834 6 лет назад
Don't forget us Indians :p
@ChristmasEve777
@ChristmasEve777 6 лет назад
Unless you have that thing running all the time (looping), then your requests will all basically be in one giant block with 8 character passwords. It would be easy for him to crop them out. It would be better to kick them out slower with a bigger name base that's more randomized with passwords that are better randomized (including length). And run it constantly.
@Noobsaibot21
@Noobsaibot21 6 лет назад
True. But chances are, the scammer wont get an awful lot of legitimate emails (I would hope in this day and age) so leaving this running on a cloud VM 24/7 with a few extra providers would make spotting real stuff almost impossible. This is great stuff and should certainly be made available to 419baiter too. Love it :)
@glock21guy
@glock21guy 6 лет назад
Would be even easier if he's saving the remote IP address with them all, especially if it's going into a database where he could just use a limit and group on the select.
@kiveynen
@kiveynen 6 лет назад
They're also all yahoo adresses. So .. he could just delete all of those without losing too much data :D
@landonpowell6296
@landonpowell6296 6 лет назад
Seriously. It'd take 30 seconds to make a regex that'd clean this shit up. Emails are all in this format: /[a-z]*\d@yahoo\.com/g Passwords are all in this format: /.{8}/g If he's got the know-how to make a phishing page, he's got the know-how to make a regex that fixes your shit.
@MattTrevett
@MattTrevett 6 лет назад
And different TLDs for the e-mail address. Make the random number length variable and sometimes come before the name. Maybe throw in a dictionary as well.
@dislikebutton966
@dislikebutton966 2 года назад
Imagine if you had one of those emails and were wondering how scammers gets your email 😂
@2oqh
@2oqh Год назад
These aren’t unrealistic at all so guaranteed atleast a few of them are real 😂😂
@thatonehenward4275
@thatonehenward4275 Год назад
the password though.
@MintBunHunter
@MintBunHunter 6 месяцев назад
Nathan9
@slydog784
@slydog784 2 года назад
You need to run this as a service across multiple IPs over several days/weeks so he can’t easily delete your responses.
@cardinal9009
@cardinal9009 2 года назад
I bet that website is one of hundreds he uses unfortunately
@mrjpz
@mrjpz 2 года назад
@@cardinal9009 never ever have i seen someone else use this for a pfp. I cropped my pic up more though
@cardinal9009
@cardinal9009 2 года назад
@@mrjpz first time I've seen someone like that as well. one more word and I'll crop my pic up more too.
@mrjpz
@mrjpz 2 года назад
@@cardinal9009 ru-vid.comUgkxIq_FBPgezSOpIPVl0WiQd0mrzAFjGsik if you watch this clip you can see we're multiplying
@Mmmkay..
@Mmmkay.. Год назад
awww look guys twins 😊
@IAmTheRealKen
@IAmTheRealKen 6 лет назад
A way to make this more convincing would be to have a 1000 most common passwords json file and a 10 most common email providers json file (or just a list), load those and it will be very convincing. Also, you could make it randomly sleep or get it done in batches as well if he stores a created_at time.
@EngineerMan
@EngineerMan 6 лет назад
There's definitely going to be some better ways to do it.
@IAmTheRealKen
@IAmTheRealKen 6 лет назад
Yep, and I bet there's probably even better ways than what I came up with. Such is life. :) Nice video, btw.
@WadeMeredith
@WadeMeredith 6 лет назад
Eh, this statement applies to literally everything in life. This vid was fast and got the point across. Awesome stuff. Subbed.
@nickfarley2268
@nickfarley2268 6 лет назад
Engineer Man like using python 3
@hedleypanama
@hedleypanama 6 лет назад
On the new python 3.6 you can write in the last line print(f'sending username {username} password {password} ')
@gazehound
@gazehound 6 лет назад
You know this mans legit because he uses incognito mode
@TraceguyRune
@TraceguyRune 6 лет назад
I use it all the time on public computers. Don't have to worry about logging myself out. No cookies, no cache, no history, I'm safe
@DontBeSynical
@DontBeSynical 6 лет назад
Apathy FBI OPEN UP
@jerejere69
@jerejere69 6 лет назад
TraceguyRune key loggers
@MrHippi1234
@MrHippi1234 6 лет назад
shows how ignorant you are about incognito mode.
@michael2775
@michael2775 6 лет назад
Shows how stupid you are. Jokes are a thing, you know?
@tylermorris84
@tylermorris84 Год назад
I think this is my new favorite channel... My apartment complex made us register times to use facilities during Covid. They released the availability to register for gym/spa/exercise room EXACTLY 7 days in advance, and they all got booked immediately through the UI- it was very competitive. So, I back-engineered the site and wrote a python script to sign up for whatever future gym times I wanted. It never failed. I love to see other quality abuses of python!
@asapbembyy4614
@asapbembyy4614 2 года назад
Maybe a better idea is to try to make passwords seem legit, also adding random names or literally the whole dictionary, cuz not everyone makes their passwords in symbols, but instead words or phrases, so if he just scrolls through the yahoo and passwords lists and find a combination that seems unique, he will know which one is the real one and which one is not.
@4esv
@4esv 2 года назад
@badrobots statistics, like how 2/3 of doctors are male or how 3/4 of all software engineers are men
@jar3040
@jar3040 2 года назад
@badrobots tmw genz
@martinchki
@martinchki 2 года назад
or he can just delete all of the emails and passwords starting from -email- and as password, -password-. The 2 ints he used to see where emails and passwords go.
@Ramsesian
@Ramsesian 2 года назад
@badrobots yikes
@Shezza_1212
@Shezza_1212 2 года назад
@badrobots Cool, but who cares
@rich1051414
@rich1051414 Год назад
You should randomize the length of the password, and randomize the domain of the email. As it is, all he has to do is filter out all yahoo domains with a password length of 8, and he would have minimal loss of acquired real passwords.
@wujeonghyun6865
@wujeonghyun6865 Год назад
exactly
@ikyyntts7807
@ikyyntts7807 Год назад
yeah thought his generation algo was a bit dodgy, no last names, no full stops or underscores etc, just one name, one letter, same domain, all random 8 char passwords
@deildegast
@deildegast 10 месяцев назад
there is always room for improvement, but to show how easy you can overload a spammer with a short python program really opened my eyes on what you(anyone really) can do.
@casewhite5048
@casewhite5048 6 лет назад
he is just going to delete everything from yahoo during that time span
@casewhite5048
@casewhite5048 6 лет назад
As long as they all come in at different times during the week night and day yeah that could work otherwise simple sorting could clear them
@TheRijintube
@TheRijintube 6 лет назад
from random import randint as r random_provider = ['@gmail.com', '@yahoo.com', '@hotmail.com', '@outlook.com'][r(0,4)]
@edism
@edism 6 лет назад
Nonce validation would have prevented this issue from occurring. However he could be logging IPs and other request data along with the form values.
@bextract0
@bextract0 6 лет назад
it's quite easy to filter out as they were all sent in a short time span, all with a yahoo email from the same address, not to mention that they all follow the same structure for name generation, and that the passwords use special characters in passwords (which im not sure craigslist does).
@SimonNitzsche
@SimonNitzsche 6 лет назад
the scammer also could store the ip addresses, to prevent this attack if the whh is not using a ton of proxies.
@midnari
@midnari 2 года назад
I've been learning C for the last two months and I'm so damn happy that I can understand what you're doing. I doubt I could implement it right now, but just understanding it is so cool to me.
@zaftmonkeynuts5052
@zaftmonkeynuts5052 2 года назад
Yeah, one thing I’ve learned from programming is understanding the code and actually implementing it to something are totally different.
@midnari
@midnari 2 года назад
@@zaftmonkeynuts5052 That's the point of studying, isn't it? Learning, enjoying, practicing the code. Yeah, I can't use Python, but I'm learning the foundation necessary to pick it up in the future. I can craft little things in "C" at the moment, and yeah... It's a different syntax, but the same fundamental rules apply. The joy is that - two months ago- I couldn't even program a "Hello World" script. I can now. Shoot, I've made some extremely awesome things that would take YOU two seconds to do. Even then, Good Lord, I see the vast difference between me in December and me now. Feels good, man.
@Solaceon
@Solaceon 2 года назад
I feel this completely! I have to understand something and set an objective in mind in order to learn it. As a little kid, those connections were formed by Neopets. I picked up a really impressive amount of HTML and CSS for a 6-8 year old. I was aiming to learn Python next, but alas life had other plans. I had a passion, but as I got older nothing helped make things "click". I lost that passion for years. But then RU-vid started recommending me these more advanced "taking down scammers" videos and for the first time in forever I'm forming these connections and I'm absorbing it all like a sponge. I'm so freaking excited! The other day I made a simple little thing in Python that responds to birthday posts on Facebook with a "thank you" so I didn't have to do it myself. Such an easy little project but I did it myself and it feels so damn good!!
@TrueComboKing
@TrueComboKing 2 года назад
@@midnari I agree, it’s literally the same feeling as listening to someone bad mouth you in a foreign language and you coming eight back at them and speaking that same language. It just feels good. By all regards, coding in all its forms, is a new language and the feeling you get from understanding it and learning to implement it is the best feeling in the world.
@tcg1_qc
@tcg1_qc Год назад
I understand most of it but I don't really know Python so I was a bit confused at some of the things he did, like the .join(random + for loop). How does that work? You can just put a loop inside a function parameter and it will make the function execute every time it loops? Or does it make the random function execute 8 times and add the characters together?
@goharjoa
@goharjoa 2 года назад
Excellent. Excellent. If I had your skills, I'd do the same to these scammers and con artists. Keep up the good work.
@ohtug
@ohtug 2 года назад
con artist gives them too much credit lol
@jacobhinger5039
@jacobhinger5039 2 года назад
He shows us the code and how to implement it yourself.
@2oqh
@2oqh Год назад
@@jacobhinger5039 only applicable to a very specific situation, he probably wants to know how to do it for a more diverse list of scams, etc
@leonenaj
@leonenaj 6 лет назад
I love this because it literally only took 5 minutes of your time, and yet it is such a nasty little trick. Bravo sir
@TNTxCreations
@TNTxCreations 6 лет назад
He definitely had some planning off camera and maybe even tested it before. Still a cool idea and didn't waste any time showing the viewer.
@Arteafact
@Arteafact 6 лет назад
This is honestly not that hard to do and doesn't require that much knowledge, maybe he prepared for it, but if you know how to send requests in python, then it's completely feasible to write this sort of thing off the top of your head
@varbaek
@varbaek 6 лет назад
CabinDoor A seasoned security professional could do this without Python in 10 secs if there are no CSRF tokens present. Maybe a minute or two if you need to provide a valid CSRF token. It's that easy.
@EngineerMan
@EngineerMan 6 лет назад
I'll be waiting for the 10 second video. Let me know when you post that on RU-vid.
@varbaek
@varbaek 6 лет назад
Engineer Man Not even going to bother showing how this is done in Burp. I do testing like this for a living.
@djangogeek
@djangogeek 6 лет назад
I don't know anything about coding and I don't know anything about python. But I also hate scammers. And I found the speed and clarity of this presentation very satisfying. Especially the part where all the fake emails start popping up to waste this guys time lol 10/10 l33tHax0r ^^
@reflectionsofme
@reflectionsofme 6 лет назад
same
@djangogeek
@djangogeek 6 лет назад
lol Not django as in the programming language or the bounty hunter but django as in the character in my avi from the gba series boktai =)
@Balloonbot
@Balloonbot 6 лет назад
Same. I work with coders and they seem like geniuses to me
@joshplant
@joshplant 6 лет назад
This comment pretty much sums up my reaction to this video lol
@bananaconsaging8864
@bananaconsaging8864 6 лет назад
The one thing is. I like to study programming start with HTML and C# just to start of but hell the tutorials on yt are a bunch of indians with cringy-monotone english accent. Creepy it is.
@duanesmeckert6079
@duanesmeckert6079 6 лет назад
A couple extra ideas: 1) I did similar, but I grabbed tom sawyer off Project Gutenberg and used it for usernames. 2) The user agent can be long, like 2k long. The user agent gets logged. The log is often on tmpfs, Which is smaller than the user space. (It just crashed, Idon't know why. ) 3) randomly generate the domain from the same words so he can't just delete all yahoo addresses. 4) the domain is hosted on godaddy, you should report it to godaddy abuse.
@elijahhayes8349
@elijahhayes8349 6 лет назад
I work in computer repair and I get numerous people coming in and calling due to scammers. This just brings me all types of joy. Keep up the good work.
@natec.2346
@natec.2346 6 лет назад
This is the first video I’ve seen of yours and it definitely won’t be the last. Keep up the great work!
@lohithArcot
@lohithArcot 6 лет назад
Nate C. Same here
@samlugo6450
@samlugo6450 6 лет назад
Nate C. me too😎😎
@bawad
@bawad 6 лет назад
Nice regex trick, I'm going to steal that! I would have used a vim macro, but I like the search and replace better.
@EngineerMan
@EngineerMan 6 лет назад
Steal away man!
@MrDevianceh
@MrDevianceh 6 лет назад
Hi +99baddawg, I like your videos. Keep it up!
@ronyan
@ronyan 6 лет назад
Yeah I don't know why I forgot you could do this in replace, saves a lot of time.
@robin888official
@robin888official 6 лет назад
In general better search for line endings, though, before forging a pattern for your lines..
@Microphunktv-jb3kj
@Microphunktv-jb3kj 6 лет назад
is that some addon/plugin.. ? how can i do it in vscode?
@andyengle
@andyengle 6 лет назад
Nice job! Similar story: I was being texted non-stop from some outfit in Miami that said "we buy junk cars!" in English and in Spanish, along with their phone number, which was a disposable Metro PCS mobile number. After repeatedly asking them to take me off of their spam list, they ignored me every time; they hung up on me, never took my name off their list, and kept texting me. So I thought, if they want phone calls, they're gonna get some phone calls. I opened a Twilio account and put $20 on it, then wrote a script that told them what my number was and that I wanted it removed from their spam list. I wrote a simple PHP script to call the Twilio APIs and then put it to work, calling every two minutes for hours on end. I never heard from them again.
@EngineerMan
@EngineerMan 6 лет назад
Haha, I love this.
@TheTrueSmitch
@TheTrueSmitch 6 лет назад
Next time, run with different emails other than Yahoo as well in order to prevent them from filtering. Ideal solution would be Proxies, run it for at least 24 hours, and the email ending change in order to prevent ANY form of filtering out the results you placed . Because right now if I was that scammer, I’d just remove all emails ending in Yahoo that were sent in within a time frame, or just remove by IP.
@TheTrueSmitch
@TheTrueSmitch 6 лет назад
Sounds illegal :D
@cassiusspacetrain2852
@cassiusspacetrain2852 6 лет назад
cool but he'll just filter the @yahoo.com since they will be sequential. a better way to pwn this cockgoblin would be to randomize the concatenation of the email service, and set a random timer to drip post into his form. so he might get one in 5 minutes, or 2 hours. let it run in the torrent computer since that thing just sits all day, and maybe run a dynamic VPN as well. that would cripple any data collection effort due to the inability to validate submissions
@keep7smiling
@keep7smiling 6 лет назад
Or you could just mine bitcoin with the same computer instead of scamming a scammer without any profit
@f0rhex831
@f0rhex831 6 лет назад
Thorsten Böhme where in the wolrd was he "SCAMMING" a scammer?
@oh1125
@oh1125 6 лет назад
Mine bitcoin? This video has nothing to do with making money. He doesn't like being scammed, so he fucked with the scammer's day. Also, this isn't 2017. It's almost 2019. Who the fuck mines bitcoin and wants to degrade their computer over time and have an electricity bill of $150+ every month? You are clearly a child.
@FlanneryYT
@FlanneryYT 6 лет назад
Thorsten Bohme, Mining Bitcoin is actually no longer profitable. If this was 2010, maybe, but it's not.
@josephguzman4737
@josephguzman4737 6 лет назад
What are you talking about? I mine bitcoin on the weekend for fun in nevada. I always fine thoes shiny coins in abandoned silver mines
@dewybmt
@dewybmt 6 лет назад
As someone new to python and still relatively inexperienced with programming this was a fun video to see work in action and the context made it entertaining to think about. I want to find more videos of contextual coding that are more demonstrative like this and less about "the technicality of the programming process'. It gives me ideas to try!
@ethanpet113
@ethanpet113 6 лет назад
Should probably have tested also ';DROP TABLE USERNAMES;
@dniam9859
@dniam9859 6 лет назад
Ah... SQLi
@commonsense31
@commonsense31 6 лет назад
You just became my number one creator.
@theowinters6314
@theowinters6314 6 лет назад
Should have thrown in a couple Bobby Tables into the list, just in case he isn't sanitizing his data.
@EngineerMan
@EngineerMan 6 лет назад
Little Bobby Tables.
@jpe1
@jpe1 6 лет назад
For those who don’t read xkcd, the suggested username would be: Bobby’); drop table usernames; drop table passwords; Depending on the Webserver and back end database this might possibly work, though probably not.
@thatsamorais584
@thatsamorais584 6 лет назад
@@jpe1 I like this idea as a concept better, using the request url to attack the hacker's data, over littering the data.
@8BitShadow
@8BitShadow 6 лет назад
Mmm yes. Using SQL injection, but for the greater good lol. But alas, let's be honest, he's probably just ripped the code from somewhere and hardly edited it at all, which most likely would have sanitation already implamented.
@jpe1
@jpe1 6 лет назад
dragon spirit(aka shadow999999) good programmers write good code; *great* programmers steal great code. (The actual line from Eric Raymond’s *The Cathedral and the Bazaar* is less pithy, something like “great programmers know what to rewrite and reuse” but I like this version better)
@IFGchannel931
@IFGchannel931 Год назад
Nice! To make it even better, the e-mail domains could be randomized, passwords could be less random (there are too many special characters in them), maybe some longer then others, and you could space out the rate in which the info is sent.
@nAna36628
@nAna36628 Год назад
The scammer seeing a bunch of emails getting logged in just 2 minutes: interesting
@rottsrool
@rottsrool 2 года назад
Love what you do, thanks from all us non tech savvy people 👍
@theentirestateofalaska.4983
@theentirestateofalaska.4983 2 года назад
Non programmers you mean.
@soldiergaming2722
@soldiergaming2722 6 лет назад
Lol That must pissed him off, and you did that in a matter of minutes! You're good!
@EngineerMan
@EngineerMan 6 лет назад
I certainly hope it pissed him off! Ha.
@blasttrash
@blasttrash 6 лет назад
lol if his backend is tracking your ip, he can delete them away using a simple regex db trick too. :P you should use multiple ips on top of multiple vpn proxies to confuse the scammer even more.
@giakomoventura2088
@giakomoventura2088 6 лет назад
blasttrash using prohy trought python for each request ... beter using random dns ... that dosent request password
@amethystjean1744
@amethystjean1744 2 года назад
This is awesome. Thank you for doing this. I also love seeing inside python as I don't know how to do that but it makes it seem like something that would be cool to learn more about.
@dheibeljr
@dheibeljr 2 года назад
No time like the present to learn! Python isn't that hard and there are TONS of resources and the learning curve has been made so shallow, you could totally teach yourself if you wanted to. You got this!
@KennyJacobs
@KennyJacobs 2 года назад
Me: Stumbles on to this video Me: Heads on over to my spam folder Me: Opens the first email that looks like a phishing attempt Me: Let's the fun begin... Thanks for this awesome tutorial. I haven't laughed this hard in a long time.
@LilYet
@LilYet 2 года назад
ok
@bobfromwork
@bobfromwork 2 года назад
I mean sadly it's gonna be easy for him to just exclude all emails from yahoo with 8 chars of password, but it's a decent idea.
@ZacklFair
@ZacklFair 2 года назад
you can always do more or less chars in between. takes 1 change in the code. or add more randomness i suppose. but thats not for a 5 minute video i guess :>
@Berryss
@Berryss 6 лет назад
I know im gonna need requests I know im gonna need os I know im gonna need random I know im gonna need string I know im gonna need json
@TraceguyRune
@TraceguyRune 6 лет назад
I'm more of a Java guy. Why was OS needed?
@AbCd-kq3ky
@AbCd-kq3ky 6 лет назад
os.urandom (docs.python.org/3.5/library/os.html#os.urandom)
@hybby
@hybby 6 лет назад
BoliBerrys so needy
@TamirYankevich
@TamirYankevich 6 лет назад
Dude this is savage, way to restore justice in the world 😁🙌🏽
@kopjjipj5743
@kopjjipj5743 6 лет назад
unfortunately it's just a minor inconvenience, no matter how many fake combos you put in the hackers use an automated tool to test them anyways, it won't take long to find the real ones.
@bcoda
@bcoda 6 лет назад
*social justice *0.00001% of the world
@spike4850
@spike4850 6 лет назад
Tamir Yankevich wtf? What has this got to do with restoring world justice? Lmao
@TraceguyRune
@TraceguyRune 6 лет назад
Daniel Hernandez I found 10,000 names, and ran it twice. The more we do the more time it takes scammers to run their automated process.
@Mrkonc
@Mrkonc Год назад
You know, even almost 5 years later I still use this video and what it taught me. Thanks Engineer Man!
@omegaz2398
@omegaz2398 6 лет назад
Improvement: 1. hide your IP address using tor network to prevent the scammer blacklist out your IP. 2. randomize 'yahoo.com' email with more email providers. 3. deploy to cloud server, randomize the intervals and bomb that service for a couple of days. HAHA.
@ArjenJongeling
@ArjenJongeling 6 лет назад
Omega Z there’s always an IP address. Scammer groups list on IP addresses and ignores entries where the count is 2 or more.
@ryanmickelwait1521
@ryanmickelwait1521 6 лет назад
Arjen J but tor uses random ip
@Palewhitegamer
@Palewhitegamer 6 лет назад
I would personally use a list of common passwords alongside legit emails: currently, this input is too easily filtered out just from the uniform password length, but also the non-legit emails. Something like this will only work as a time waster if it has a shred of believability.
@philipphoehn3883
@philipphoehn3883 6 лет назад
Arjen J he's talking about hiding YOUR IP address
@Palewhitegamer
@Palewhitegamer 6 лет назад
...in the context of making this seem more legitimate for the scammer, which changing your IP address would do, but you'd have to change it for *every* 'upload' of this to the form; and ensure none of it is repeated, which is an ass unless you have a spare server lying around. And RE your previous comment - that's an oversimplification of how Tor works. You're basically bouncing your traffic through everyone else's, making it harder for an external individual to see what your traffic has been to someone else's, but it's not perfect.
@robertgoss4842
@robertgoss4842 2 года назад
You're amazing. You are doing noble work. Just glad you're on the side of goodness and light.
@Draghful
@Draghful 2 года назад
I'm gonna be totally honest here... These videos are the most satisfying thing I've seen in the past 3 years. :)
@kricku
@kricku 6 месяцев назад
"Wow. All these people with random passwords of the same length logged in at the same time from the same place" :P
@Lykon
@Lykon 2 года назад
From the console right click on "copy as curl". After that simply go and convert curl to python request. So you can skip the basic request code part.
@bradarmstrong3952
@bradarmstrong3952 2 года назад
I love the casual way he uses the scammer's setup against the scammer!
@Stoney_Eagle
@Stoney_Eagle 6 лет назад
You learn something every day... Didn't know you could regex replace in a code editor. Awesome!
@ghenulo
@ghenulo 6 лет назад
It depends on the editor.
@nikhilsingh6759
@nikhilsingh6759 6 лет назад
what editor was it though? coz i don't think you can do it in IDLE
@Stoney_Eagle
@Stoney_Eagle 6 лет назад
@@nikhilsingh6759 he's using atom
@f1f1s
@f1f1s 6 лет назад
Initially, I read it as “Showing a Craiglist scammer, and this scanner is a boss using Python”. Nice garden path sentence!
@richmo619
@richmo619 6 лет назад
I missed the part after you said "hello everyone". ha ha ha
@manorothpitlordextraordina4041
@manorothpitlordextraordina4041 2 года назад
Would have been cool to add variable lengths in the passwords / emails so that the submissions aren’t so uniform. It would be fairly trivial for him to purge the database of all email/password combinations of a certain length.
@dead_protagonist
@dead_protagonist 2 года назад
right.. most people use gmail anyway
@MotorcycleRebuilds
@MotorcycleRebuilds Год назад
he could just filter the yahoo emails out
@mikenephilly
@mikenephilly 6 лет назад
I just wasted time looking at this video thinking you were going to troll a scammer with Monty Python quotes.
@EngineerMan
@EngineerMan 6 лет назад
Sorry to have let you down.
@coolamp
@coolamp 6 лет назад
I would love to see what you could do to the fake steam websites that scammers on rocket leuge use. they get people's steam accounts, steal people's items, and sell them off for real money. it's super effective because of all the little kids that play rocket leuge, and they use websites like steomcommunity-profiles-32327.000webhostapp.com/tommy, since website preveiw in steam DMS only shows the "steomcommunity-profiles" part people could easily misread it.
@VenalityAF
@VenalityAF 6 лет назад
Damn dude he apologized, you should feel like shit, not like you would've had anything better to do anyways
@UncleKennysPlace
@UncleKennysPlace 6 лет назад
something, something, dead parrot, something.
@threynolds2
@threynolds2 6 лет назад
There IS a video of someone trolling a scammer with movie quotes on RU-vid. I saw it the other day.
@Davioc04
@Davioc04 Год назад
I dream of a World where everyone has an app being fed with codes like that, running in background for just a few seconds a day.
@roboppi6368
@roboppi6368 2 года назад
I just want you to know that thanks to you and your videos, I finally know what to study. Thank you. I was so lost but just watching you work cleared everything for me.
@jdavis460
@jdavis460 2 года назад
Wish I was that cleaver to write those programs would love to keep flooding the scammer’s with junk.
@justjosh1400
@justjosh1400 2 года назад
Great video idea. I think a more efficient approach would be to send it over time. Because what he's going to do as a scammer is see everything that came in at a start time and end time notice that he got 10000 or so while phishing. Most likely he will just delete all the data that came in during a certain time frame.
@theprophet333
@theprophet333 6 лет назад
"What can I do? Let's spam his inbox with fake emails and passwords." -And the like button was hit, less than a minute in.
@anuragpramanik6095
@anuragpramanik6095 2 года назад
The whole world uses vs code and it’s auto completion. This legend still uses Atom and rocks. Great video man.
@PedroCristian
@PedroCristian 2 года назад
Real programmers use butterflies...
@polarcat0156
@polarcat0156 2 года назад
@@PedroCristian real programmers write it on paper and use ocr to get the code
@itsyaboivoid
@itsyaboivoid 3 месяца назад
​@@polarcat0156real programers use punch cards and assemble everything theirself
@desireisfundamental
@desireisfundamental 6 лет назад
Where is the python ? I thought you were going to release a python to some scammer on the street !?
@ForsakenClarity
@ForsakenClarity 6 лет назад
you're probably joking but if you aren't, Python is a coding language
@FIGNAS83
@FIGNAS83 6 лет назад
Hahahahaha, good one 😂
@robinranabhat3125
@robinranabhat3125 6 лет назад
are you one of those "SHOW BOBS AND VEGENA" or "BORAT" kind of guy ?
@rkaynedsalt4392
@rkaynedsalt4392 6 лет назад
python is a programming language
@nathanquoin
@nathanquoin 6 лет назад
haha lol
@Dad-979
@Dad-979 2 года назад
I wish I was this smart, it’s all I can do to make a damn telephone call.
@Spinxaslt
@Spinxaslt 6 лет назад
Not sure if anyone mentioned, but you could have tried SQL injection, as he might not be escaping it. Could blow up the whole database if you wanted to.
@jpriddy
@jpriddy 6 лет назад
I thought that's what he would be doing, but this is pretty cool too.
@abramspamers6456
@abramspamers6456 6 лет назад
You probably don't want to upload videos of yourself committing a crime on the internet. Sending fake logins to a scam site to be annoying is quite different from attacking it.
@0x8badf00d
@0x8badf00d 6 лет назад
My middle name is "'); DROP TABLE loot;". How is that illegal? :-) I wouldn't consider a little SQL injection as attacking, it's more like poking and anything this simple that can't tolerate it deserves it. But probably not a good idea to tell anyone that you're the hero of the day.
@grooviec
@grooviec 6 лет назад
how do you know there's an sql database behind this login page?
@v380riMz
@v380riMz 6 лет назад
roma98 yeah, mostly it’s just a simple html which sends the input to a .txt file on the phishers pc, or in some cases just shows it on a command prompt.
@G0ingN0va
@G0ingN0va 2 года назад
I've only just come across your channel and I'm amazed at how swiftly you deal with scammers. Have you ever considered teaming up with Jim Browning or, Scambaiter et al? If any of you guys combined you'd destroy scammers globally in a matter of minutes! Great channel. Subscribed!
@TrueComboKing
@TrueComboKing 2 года назад
I’d love to see them do more than ruin a scammers day. Those scammers in India are the absolute sickest people I’ve ever heard speak. The second they don’t get their way, they start cursing the other party out and….idk why but they always like to add insults about the other parties mom, lol. These guys are insanely good at what they do. I’d love it if they took it one step further and messed with the temperature control settings in one of those “call centers”. I don’t know if that’s possible though, they probably don’t have a smart thermostat to hack. It would be funny though to turn their heater up to the highest setting and watching them squirm as they try to turn it down, lol
@Elxroid
@Elxroid 9 месяцев назад
man literally put scraping to shame because of how well a site was formatted
@Lykon
@Lykon 2 года назад
That form name and url seems a random code. Are you sure the request is always the same? That may be used as a unique ID. If that's the case your code isn't doing anything, but simply overwriting with a new username and password all the time. I would have verified that those fields and url were always the same. Or, if they changed, also looped that with random shit inside my code. Field names could just be part of a "any" type data structure accepting all sort of shit. This means you can maybe even do more damage.
@F39Productions
@F39Productions 2 года назад
ya those look like csrf tokens
@pluto9000
@pluto9000 2 года назад
Totally
@YISTECH
@YISTECH 2 года назад
my thoughts exactly
@Christian-mn8dh
@Christian-mn8dh 2 года назад
hmm
@helxis
@helxis 6 лет назад
Cute, but you didn't perform some basic checks. Given that the username and password elements appeared to be named randomly, it is possible they are generated dynamically per each request of the main page (as well as the submission URL). The web server could simply be accepting your requests but not recording them as a result. Also, the email addresses are formulaic enough that they could be easily stripped out. I would have gone for a dictionary and a large pool of domain names.
@bloodless2010
@bloodless2010 6 лет назад
Yep. First thing I saw was this, chances are it was some anti-CSRF PHP script making the fields for the POST vars randomised. Everyone is complaining about how easy it would be for the guy to remove them from his db, I doubt they even got there in the first place!
@alakani
@alakani 6 лет назад
*tags your username with {{Citation needed}}* :P Nah that's a good point though. Either way, the whole domain is down now
@babybirdhome
@babybirdhome 6 лет назад
This guy missed step one: send a report to the hosting provider. By spending time coding this first, the site gets to exist longer and harvest more legitimate accounts. The fake accounts don't do anything to protect the victims. It's as trivial to test fake accounts as it is to generate them in the first place.
@caseyjones466
@caseyjones466 Год назад
I have no idea what you just did, but thank you for scamming a scammer.
@louiseboyle9618
@louiseboyle9618 2 года назад
Well if your IP is logged when you post your form, it will be easy for him to figure out which credential are legit or not 🙄
@LuminousWhispers11
@LuminousWhispers11 2 года назад
In which case hopefully, he was using a VPN or proxy.
@popular_dollars
@popular_dollars 6 лет назад
How apropos that the json file probably included "Jason" somewhere.
@Jivvi
@Jivvi 6 лет назад
Jayson, Jase, and Jace, but no Jason.
@GAS.M3
@GAS.M3 6 лет назад
I wish I was as smart as you with computers. Awesome work 👍🏻
@snø_music0
@snø_music0 6 лет назад
alxM3 stop wishing and learn something then . dont be lazy
@GAS.M3
@GAS.M3 6 лет назад
lil trap thnx mom I will
@Templarfreak
@Templarfreak 6 лет назад
There's a difference between being having so little understanding of something that you don't even know where you should begin and thus anywhere you try to start is just an impossible hell, and being lazy. It just so happens that with programming, it's basically impossible to start anywhere that feels productive and like you're actually learning something especially when most people go around berating people that are trying to learn and points them to extremely overly complicated thick manuals and online resources that don't get to what you're trying to learn until 100s of hours of reading that also requires college-level understanding of math and computer science to begin to understand said thick manuals anyway thus making it totally pointless, when all someone really needs is some help. Wow what a rant LOL But that's why channels like this are so awesome, these videos are actually really helpful in learning the concepts involved while showing production and payoff immediately for something you may want to do.
@devonc3948
@devonc3948 6 лет назад
Templarfreak I started to type something similar and gave up, but the starting point and direction is absolutely a deterrent to many in any new expertise
@Lalaland.001
@Lalaland.001 6 лет назад
Python, SQL, JAVA, PHP, C++and other programming languages take about three months to really learn, there are a plethora of tutorials here on youtube. The books are for absolute nerds that want to go really deep, but to get the basics of a programming language down takes three months max. After that you get to learn the intricacies of the language on the job. There are plenty of ICT companies looking for interns and people willing to learn it for free. They will give you the courses needed for free and you get a job to boot. see what I did there... anyways stop bi&^%% about something being hard, it's only hard, if you never get of your lazy ass to actually give it a shot and by shot I mean you actually go out and do something about it.
@dude_adm
@dude_adm 6 лет назад
That's awesome thank you for this. Mechanical engineer here, always wanted to work more on the little coding knowledge I have this has been inspiring and entertaining. Subscribed
@andrentaz
@andrentaz 2 года назад
Some random Luke: "nice! I hate scams too!" Also, some random Luke seeing his email being randomly generated: "well, that explains a lot 🧐👀" Great vid though :)
@raquelocasio8588
@raquelocasio8588 Год назад
I love this. Someone needs to create a meetup where coders get together once a week and hit scammers like this over coffee. Great job!
@teksaucee
@teksaucee 2 года назад
not all heroes wear capes lol
@dzbro1194
@dzbro1194 5 месяцев назад
The Scammer: ignore all yahoo emails with 8 character passwords
@Arkryal
@Arkryal 6 лет назад
A great example of data poisoning. Obviously, you could randomize the send interval, the email domain, and proxy-hop to obfuscate the origin of each request. Another technique I've had fun with... submit the Anti Virus test string, lol. This rarely works, but when it does, it's hysterical. They store the collected data as plain text and upload it to cloud storage like Dropbox, google drive etc, where it's flagged as a virus and promptly deleted. It confuses the fuck out of the novice scammer. Looking at the unconvincing password phish, I'd assume either your target had no discernible skill, or they were specifically targeting idiots (which may be the case... you can run a scam for longer if tech-savvy people just ignore you). In a more advanced attack, if you knew anything about their collection methods and how the data was processed after collection, you could do a lot more damage. SQL injection for example. Even seemingly trivial things like using UTF32 characters (especially hybrid glyphs like the Ninja Cat emoji) can really fuck up the collection, and a lot of scammers don't regex those things out, or they do it in the java script on the form page which you can easily bypass. One thing to be aware of.... they may validate email addresses before committing them. They have a mailing list, they bait those specific people and only collect passwords from people who they sent messages to. In many real-world scenarios, this wouldn't work all that well in practice. For that reason a simple DDOS would be of greater utility. This is probably a phish specifically for craigslist accounts for use in spamming. If it were a general cred-sweep targeting email accounts, you could have some fun with that by honey-potting an account and handing it over. A RAT in your Dropbox, maybe some bullshit "classified emails" between US intelligence officers, something that will let you screw with them once they take the bait. I know the point here was to fuck with them quickly, but sometimes it's fun to draw out the engagement.
@jeanclaudevanslamme
@jeanclaudevanslamme 6 лет назад
It would've been a bit more effective if he used a list of common street and pet names to generate passwords, although if the scammer has a script to verify phished login creds then this didn't do much anyway =(
@jesvinpalatty9112
@jesvinpalatty9112 2 года назад
Hey Cool work, You could have also made an array of email domains and randomly assign it to name strings to confuse the scammer more. Coz he may simply filter the @yahoo domain guys now but with randomizing the domain the scammer will be more confused
@johnavernia1026
@johnavernia1026 Год назад
I'm a beginner, I know nothing about programmer until several months ago when I started doing CS courses for fun. And man, I'm so happy that I could actually understand about 70% what he was doing in this video. After more courses and finishing more fun programming projects, hopefully, my understanding would've reach 100%. Awesome video and fuck those scammers!
@arnoldcaines9012
@arnoldcaines9012 2 года назад
I like your vids. They're short and to the point. I don't know any better so I'll trust that you're actually being a headache to scammers. Maybe you'll encourage other with similar skills to do the same and life will become difficult for scammers.
@filipoda123
@filipoda123 2 года назад
Bro the comments dissapeared lol
@Intikus
@Intikus 2 года назад
The scammers got him back
@filipoda123
@filipoda123 2 года назад
@@Intikus HAHHAHA BEST WHAT IVE SEEN TODAY LMFAO
@markaholt
@markaholt 2 года назад
This is f'n awesome.
@guitarmeetsscience
@guitarmeetsscience 2 года назад
Nice! Maybe randomizing a set of emails (yahoo, gmail, aol) etc would really add to his confusion. I like it!
@stoneblue1795
@stoneblue1795 6 лет назад
You are causing a guy in India sitting in a cave to have to put his flute down, thereby upsetting his cobra that was rising from a basket. Now he has a pissed off cobra. Your fault, you must be overridden with guilt.
@MasterArrow
@MasterArrow 6 лет назад
Pissed off a cobra with a python
@darkability1393
@darkability1393 6 лет назад
MasterArrow GODDAMNIT I WAS GONNA MAKE THE SAME JOKE
@MasterArrow
@MasterArrow 6 лет назад
@@darkability1393 RIP
@aves8964
@aves8964 6 лет назад
Read that as shitting in a cave. Why. Why me? Why am I like this.
@brads2041
@brads2041 6 лет назад
When I grow up, I wanna be just like you :) This is awesome.
@SpanishFluency
@SpanishFluency 6 лет назад
the scammer can add in the php file these: $subj = "Login from".$ip." "; in now he can delete all the fake logins, that came from the same ip address. ;) and he can also prevent you from entering his fake website by blocking your IP using IP deny Manager in cPanel :D The Best way to make a scammer crazy is by reporting his Phishing Page to Google Safe Browsing and spambots. and the phishing page will be down in 24 hour.
@whydafuck
@whydafuck 6 лет назад
but what's the fun in that?
@thegiddyjoy
@thegiddyjoy 6 лет назад
Then you actually get to fuck with him...
@justinstar9710
@justinstar9710 6 лет назад
I suppose the real question is, would you rather watch this, or a guy on the internet reporting sites to Google?
@SymphonyOfTerror
@SymphonyOfTerror 6 лет назад
You're overestimating the intelligence of a phisher that literally mashes their keyboard to generate entropy. Check out all the "asdasdasd" in the URL and form keys at 1:35.
@NOLlFE1
@NOLlFE1 6 лет назад
Now we can use proxy list to prevent that :)????? ezpz
@pchasco
@pchasco 2 года назад
A fun little prank, but if the guy has any brains he will just exclude all of those that were submitted within a short timeframe or possibly by your IP address if he logged it.
@stiljohny
@stiljohny 2 года назад
nice work man... you could have create an array for the email domain and randomly take from there , cause now he has loads of yahoo, easy pattern !! nice video!
@longnaaaaaaaaaaaaaaaaaaaaame
@longnaaaaaaaaaaaaaaaaaaaaame 2 года назад
yeah slighlty more dedication wouldve ruined the scammers career
@SensSword
@SensSword 2 года назад
What's he doing logged in as root in terminal?
@Aaron_b_c
@Aaron_b_c 6 лет назад
Why not just use a faker library?
@EngineerMan
@EngineerMan 6 лет назад
No reason I couldn't have.
@turboflush
@turboflush 6 лет назад
I don't know why you would thumb down this. Thank you for doing this for those that are powerless against these scammers
@reactworld2975
@reactworld2975 2 года назад
That generation pattern was so obvious, that i would filter out these in seconds.. This might look impressive to the uninitiated, but to a coder this looks just lazy and pretty low-effort.
@GamerFigure
@GamerFigure 2 года назад
because thats exactly what it is. lazily written code that could be further optimized with +- 5 mins of your time.
@tossajalumen401
@tossajalumen401 2 года назад
yep! Totally junior-dev stuff
@TalesFromTheSlumsOfMumbai
@TalesFromTheSlumsOfMumbai 2 года назад
make a better one then bro i wouldn't mind watching that
@huntergaylor1533
@huntergaylor1533 2 года назад
dude it took him like 5 minuets lol ofc its low effort how much did you expect with that timeframe
@AvanaVana
@AvanaVana 2 года назад
Agree, any scammer with the basic level of skill needed to set up that scam will also just instantly delete all those entries in whatever csv file that php script writes and the scammer then reads in excel (most likely)
@kaderiddle3492
@kaderiddle3492 2 года назад
People talking about the code and the efficiency of it and meanwhile I started a day ago and have no idea what’s going on.
@ISZAudio
@ISZAudio 6 лет назад
Is no one else going to talk about this guy running his python interpreter as root or not including a shebang at all? No? Just me? Alrighty then...
@avova
@avova 6 лет назад
Yeah, I loled hard. Dude runs stuff as root and think he is a "hacker".
@biiki007
@biiki007 6 лет назад
avova how does he think he is a hacker? 😂😂
@Davesoft
@Davesoft 6 лет назад
Hehe, yeah, it's a script kiddie video. Beards don't visit ad-laden websites for a simple list of names
@Twat2024
@Twat2024 6 лет назад
you guys are extremely arrogant , i have no idea about code , but you guys just sound like a bunch of jerks
@Davesoft
@Davesoft 6 лет назад
Sky "i have no idea about code" there there, one day you'll see what we see :) Imagine seeing a crowbar next to your front door, and the door is still closed. Nomatter what you do with that crowbar, the criminal is looooong from here and entirely unaffected by what you do. That's what this video is. Waving a crowbar around telling people he's batman. The counter-scam bubble is worth tapping, it seems.
@elementalsigil
@elementalsigil 6 лет назад
Thanks for fighting a battle that many of us do not know how to. Scamming takes good money and confidence out of consumers and does significant damage over time as we lose faith in good commerce.
@rayyy6384
@rayyy6384 2 года назад
why no comments?
@richardhamilton2344
@richardhamilton2344 2 года назад
because kekeke
@artificial_photon
@artificial_photon 2 года назад
He probably mass deleted it using python lol
@EternalEmpr3ss
@EternalEmpr3ss 2 года назад
@@artificial_photon lmao thats probably actually what happened
@rileylutz2563
@rileylutz2563 2 года назад
I’m imagining him laying out this process in a video now 😂 “I can’t stand commenters and I thought this would be a fun way to waste the commenters time and hopefully teach you some python😊”
@jordanmaris1641
@jordanmaris1641 6 лет назад
1. Add more variety to passwords / emails (change domain) 2. Use subprocesses to run your loop threaded (increase sending speed)
@djmarkalmond
@djmarkalmond 6 лет назад
you are a genius... thank you from all of us non tech people who've been scammed in the past!
@MrSavindrasingh
@MrSavindrasingh 6 лет назад
This one video is enough to get a glimpse of your skills. You earned a subscriber.
@Imwright720
@Imwright720 6 лет назад
Some kind of fun. I have only a basic understanding of what you did but I love it when people scam back.