How hacking actually looks like.

Tổng Hợp



Let me show you what hacking actually looks like.
You’ve probably seen many movies where hacking is portrayed like this – *random windows open, they display random text scrolling very fast, doesn’t make any sense*

In this video, let’s see what real hacking actually looks like.

Breaches
Believe me or not, your password is probably already out there publicly available on the Internet without even. your knowledge. This might feel a bit unconvincing, but it’s true there is a chance. Even mine existed publicly on the Internet without even me knowing it until recently when I finally found out that my credentials are already stolen and available for literally anyone to see. I had to then change my passwords on all my websites immediately.

Fun fact : There is a breach compilation available on the Internet that contains literally 1.4 billion email password combinations! Think about it! 1.4 billion!

The best way to stay safe from data breaches is to use a different password for every website. Use a password manager like Dashlane to generate random unique passwords for every website you use.
Download Dashlane :

Social Engineering
This is literally, you giving away your username and password to a stranger on the Internet. Hackers can pretend to be someone else to try to extract your critical information like your credentials directly from you.
For example, let’s say you get a link like this from someone , and this link claims that you can get Instagram likes instantly for free of cost. You click on the link, and you’re taken to a very convincing website that claims to offer you free likes for your Instagram posts. If you put your Instagram credentials right there thinking that this is a legit website, well, you’re hacked! This is called Phishing, it is one of the several types of social engineering.

A hacker can also install a RAT on your device through social engineering. A RAT is nothing but a malware that gives the hacker remote access to your device. By installing a RAT, the hacker will be able to do literally anything like, stealing your credentials for different websites with a key logger, stealing your photos and videos, finding your exact GPS location, or even operate your device’s camera or microphone without your knowledge.

My YouTube channel almost got hacked by social engineering :

Man in the Middle attacks
Now, this type of hacking is not very likely to occur, but there is chance that you get hacked by Man in the Middle attacks. In this attack, a hacker can put himself as the Man in the Middle between you and the Internet.
Let’s say you’re browsing Internet from a public Wifi network. Anyone who is using the same wifi network will be able to put themselves as the Man in the Middle, and they can see your Internet traffic, and even modify it.
This means, they will be able to see everything that you are sending and receiving from the Internet using the Public WiFi.
But, as I said, it is very unlikely to happen. Because most websites nowadays use HTTPS connection which means the traffic between you and the website is encrypted, and no Man In the Middle will be able to extract this internet traffic. But you’re still at risk if you’re using a website that doesn’t use HTTPS over HTTP. In such a case, you may want to use a VPN to stay secure while browsing. You can watch the video I made about VPN to know more about why it’s a good idea to always use a VPN , I will make sure to leave the link in the description.

Watch the video I made about VPN :

Support on Patreon :

Follow me on Instagram :
Like my Facebook Page :
Website :
Blog :

Thanks for watching!
SUBSCRIBE for more videos!

Nguồn: https://baogiaxevn.com/

Xem thêm bài viết khác: https://baogiaxevn.com/tong-hop/

29 thoughts on “How hacking actually looks like.

  1. Is dark web really safe to browse? Watch the video I made about it : https://bit.ly/2A74HDO

    EDIT : I'm LITERALLY sorry for using the word LITERALLY again and again, I mean LITERALLY!

  2. I have a question if the hacker paste my username and password on the internet and it's publicly available to anyone then how can I find it? …Google dorks??

  3. I Got my cheating girlfriend’s Instagram account hacked by David, an ethical hackerr. He’s a genius at all he does. You can hitt himm up on 4 6 9 – 3 3 6 – 8 8 5 6..

  4. My email is apparently breached on 1 site, but how can I know which site is it? Have I been pwned website doesn't tell that?

  5. It bothers me so much that this video says "How" instead of "What" and hasn't been corrected despite having over 1 million views.

  6. Interesting facts thanks I'm now safe I recommend this site called password strength master put in a password and it will say about how long the password will get hacked if u put like Randome letters and numbers it can say it will probably get hacked in trillions of years or if it's really easy like 123 it will get hacked in seconds I used the site you said called pwnd I didn't get hacked yay

  7. Why does everyone think hacking is just matrix code? Matrix code is language with 1 and 0 btw, everyone thinks it looks like this
    01001001011000100010101010000110110111010111011111000111
    10100001000111001011101011001111010101001010110100010101010, Why???

  8. What we the audience see: 267567886548887655789876566789987666667888829398383838383837363828292982736364648 (written in 0.5 seconds)
    What’s really happening: hdjdjdnnrjdufhhdjdjejdhrjfnfbbfgdhdjfnfjfndbdjdkdkfnfjfnffjjfnfhfjfjfnfmmfjfj

  9. lately my husband stay glued to his phone, he doesn't give me attentions

    like he used to, I kept thinking if I've became so ugly already, but

    the answer was and still NO. So when i was making my search, i found a

    post of a lady showering praises on a man called HACKINGSOLUTIONS33@GMAIL.COM who helped

    her out, quickly I jumped on the way to contact him through his GMAIL and HANGOUT. I was shocked and overwhelmed that i could read

    his texts, see pictures, emails and all that after he completed my job. I

    am pleased to tell you people about him…………

  10. lately my husband stay glued to his phone, he doesn't give me attentions

    like he used to, I kept thinking if I've became so ugly already, but

    the answer was and still NO. So when i was making my search, i found a

    post of a lady showering praises on a man called HACKINGSOLUTIONS33@GMAIL.COM who helped

    her out, quickly I jumped on the way to contact him through his GMAIL and HANGOUT. I was shocked and overwhelmed that i could read

    his texts, see pictures, emails and all that after he completed my job. I

    am pleased to tell you people about him…………

  11. Just have a 30 character password that is mixs between letter number symbols, random not simple terminology,

  12. So the unlimited money generation for games is a social engineering
    How many did this
    😔😔👇🏻👇🏻👇🏻

  13. lately my husband stay glued to his phone, he doesn't give me attentions

    like he used to, I kept thinking if I've became so ugly already, but

    the answer was and still NO. So when i was making my search, i found a

    post of a lady showering praises on a man called HACKINGSOLUTIONS33@GMAIL.COM who helped

    her out, quickly I jumped on the way to contact him through his GMAIL and HANGOUT. I was shocked and overwhelmed that i could read

    his texts, see pictures, emails and all that after he completed my job. I

    am pleased to tell you people about him…………

  14. lately my husband stay glued to his phone, he doesn't give me attentions

    like he used to, I kept thinking if I've became so ugly already, but

    the answer was and still NO. So when i was making my search, i found a

    post of a lady showering praises on a man called HACKINGSOLUTIONS33@GMAIL.COM who helped

    her out, quickly I jumped on the way to contact him through his GMAIL and HANGOUT. I was shocked and overwhelmed that i could read

    his texts, see pictures, emails and all that after he completed my job. I

    am pleased to tell you people about him…………

Leave a Reply

Your email address will not be published. Required fields are marked *