We hired a real hacker to hack our email | Real Experiment

preview_player
Показать описание
In this video experiment, we delve into the intricate world of email hacking. Through a controlled and informative demonstration, we have found a professional hacker to expose the email hacking.
We will highlight the potential dangers and vulnerabilities in the realm of email security, and we aim to illustrate how cybercriminals exploit weaknesses in the system to gain unauthorized access to personal and corporate email accounts.

Join us on this thought-provoking journey to uncover the dark side of cybercrime as we strive to bring awareness to the omnipresent threat of email hacking and illustrate how its mechanics can be better understood to ensure a safer digital future.

#sumsub #experiment #email #emailhacking

00:00 We got hacked
00:54 Before experiment
02:32 Real Experiment pt.1
06:50 Real Experiment pt.2
13:20 How to protect yourself?

Sumsub — empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.

More about us:
Рекомендации по теме
Комментарии
Автор

Adrian Ruthnik's dedication to their clients' security needs is evident in their thorough and effective methodologies. Their proactive approach ensures we stay ahead of potential threats. Adrian's meticulous methodologies involve thorough risk assessments, detailed planning, and proactive implementation of security measures. They continuously monitor and update our systems to keep pace with evolving threats. This dedication to staying ahead of potential risks has been crucial in maintaining our security.

MytrickAg
Автор

Their professionalism and ethical approach to hacking services are what set Adrian Ruthnik apart from others. They deliver reliable and effective security solutions without compromising ethics. Adrian's professionalism is evident in every aspect of their

yzrfjyl
Автор

Adrian Ruthnik's proactive measures have significantly enhanced our cybersecurity posture. Their dedication to protecting our data is evident in the comprehensive solutions they provide. Adrian's proactive approach involves continuous monitoring, regular security updates, and preemptive measures to counter potential threats. This dedication to proactive security has greatly enhanced our cybersecurity posture, ensuring that our data remains protected at all times. Their commitment to our security has been evident in every aspect of their work.

sujaygaming
Автор

Not a great experiment and the entire comments section is nothing but bots

curious_cripple
Автор

work, from their detailed security assessments to their transparent communication with clients. Their ethical approach ensures that all solutions are implemented with the highest standards of integrity. This combination of professionalism and ethics has set them apart as a leader in the field.

Shyamgami
Автор

I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds *skillful recovery* and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.

JeanJeudy-krbn
Автор

"We hired a real hacker" translated from clickbait into real talk is, "We hired a teenage script kiddie".

KiloSierra
Автор

Big fan of the scammers that scam criminals. Keep up to good work, friends.

Muaahaa
Автор

Neat - and I am still watching the rest of the video. But I'm put off a little by the assumption that the IP used by the person who first showed up in a log isn't using a proxy or VPN of some sort. That would be the first assumption, and surely after all those torrent downloads were listed. At that point it's confusing to hear "the owner of this IP did this or that" because in all likelihood it's not "the owner" but dozens of "owners".

davethewebguy
Автор

wow the quality of your content is professional and this video is so informative, i've been following you since the how to disappear online video and i knew you'd eventually get more subscribers

mohamedfares
Автор

I was expecting a VPN ad to pop out at any time. Great video, congrats for not doing any ad/sponsor bullshit.

itsmaxim
Автор

A few people mentioned errors in the video but the first one that stood out to me was your definition of a brute force attack because it is innacurate

A brute force attack 100% does not require a dictionary. A dictionary attack, which is a type of brute force attack, requires a dictionary. Additionally, there are certainly tools available to bypass brute force protections. To name a few 'older' tools - FireProx from Black Hills and IP Rotate from Port Swigger.

lariojaalta
Автор

A russian ...with a Mac pc ...doing hacking ...do you want me to unsubscribe your channel?

da_cat
Автор

The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly

chaitanyakumar
Автор

4:18 “Hacker” opening emails in HTML and triggering tracking pixel. Ridiculous and definitely nothing you do from your home IP.

stefanjohansson
Автор

Hey ppl, I'm a retired computer/IT person, Yet I still find *Adrian hacks online on the WEB* so informative and straight forward. Thanks for your advise and helping the work and love watching.

vikash__paswan__
Автор

This is so interesting content, love it :) i didn't know about torrent logging part that was surprising

xGARIDx
Автор

The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!

SayanDeb-cgzq
Автор

The Level of Production Quality Is Out Of This World ! 🔥

Unity_and_Peace
Автор

Credential stuffing is actually pretty effective these days. Most normal people are lazy and don't use unique passwords.

mradamdavies
visit shbcf.ru