10 Levels of Password Hacking

preview_player
Показать описание

came back just to leave again
FTC disclaimer: This video was sponsored by Brilliant

Рекомендации по теме
Комментарии
Автор

Level 11: Typing a bunch of stuff without touching the touch pad or mouse and then muttering "I'm in."

Works every time.

King_of_Clovers
Автор

you forgot the "call the person and openly ask for their password" it works more often than some would think...

mineyoucraftube
Автор

The most powerful technique of all: Social engineering.

Can have the tightest security in the world, but a man's lips is the loosest.

EpicMiniMeatwad
Автор

"Dumpster diving attack has something to do with retrieving passwords from the cache or something, right? Oh, it's literal dumpster diving. Nevermind"

nabra
Автор

That condom analogy caught me off guard lmaooo

yazan
Автор

Dumpster diving worked ... in the 60s and 70s. My University printed the new users passwords on a shared printer accessible to all professors and post graduates. The sheet got there until someone get to claim it allowing a lot of time for anyone to copy it.

agranero
Автор

As a sidenote, it's much more efficient to make a password longer, than to add special characters, as the amount of possible passwords is the number of allowed characters to the power of the amount of positions. So simply making a passworld longer increases cracking time exponentially, while forcing the user to use a special character increases the time linearly and also makes the password much harder to remember

Dragongaga
Автор

8:11 unexpect user on your family plan💀

Szzyzzzy
Автор

so many people got into my alt account to dox me that they can't even dox me anymore because there's 200 devices all in different places

cameleonmur
Автор

"I know jackshit about cyber security"

I hold a degree in cyber security. This is significantly more than "jackshit"

Very informative, cheers!

Arceus
Автор

number 1 lesson in cybersecurity, you are always the vunerability. called the phishing attack one right off the bat

updated_autopsy_report
Автор

The real twist is that this video was not sponsored by a VPN or a password manager.

alekseyp.
Автор

I like to imagine that Shitbird is used for Twitter

NighstarLayla
Автор

Level 11: Rule based attack
Basically a dictionary attack, however, an attacker has a list of predefined rules such as "replace the letter a with @" or "add a number to the end to the password" or "capitalise the first letter". These are useful for working with those pesky password policies. Although these attacks can still take a long time depending on the target

megamanstarforce
Автор

6:05 Huh, I'd like to see at least ONE reference to the term 'adversary in the middle attack' actually being used. I've always heard MITM or on-path attack.

andrewpinedo
Автор

Don’t delete the data in the drive, format the drive instead so that data recovery tools can’t even detect the file even existed. Don’t use ‘quick’ format options as that doesn’t override data that was on the drive in the first place.
Deleting and removing data have very different meanings. Deleting removed the symbolic link to the file (so programs like RecycleBin can detect the file and restore the contents in the exact same directory of where the file was deleted), erasing it makes any data unreadable.

danwl
Автор

6:13
*That one illegal hacker woman that was offended by the name be like*

tbpvqmo
Автор

Having the password at 4:04 was either brilliant or accidental but I love it either way.

hamzamotara
Автор

Ayoo, I'm glad to see you're back! Hope to see more. Great video

scottyhohman
Автор

Level 11: An Hacking Organization level captable to Defeat AES-256 in just couple days
Level 12: A Guy who eats AES-256 as breakfast

Mizuryryn