Linux serverNETWORK ADMINISTRATIONSsmtp server liux

We hired a real hacker to hack our email | Real Experiment

In this video experiment, we delve into the intricate world of email hacking. Through a controlled and informative demonstration, we have found a professional hacker to expose the email hacking.
We will highlight the potential dangers and vulnerabilities in the realm of email security, and we aim to illustrate how cybercriminals exploit weaknesses in the system to gain unauthorized access to personal and corporate email accounts.

Join us on this thought-provoking journey to uncover the dark side of cybercrime as we strive to bring awareness to the omnipresent threat of email hacking and illustrate how its mechanics can be better understood to ensure a safer digital future.

#sumsub #experiment #email #emailhacking

00:00 We got hacked
00:54 Before experiment
02:32 Real Experiment pt.1
06:50 Real Experiment pt.2
13:20 How to protect yourself?

Sumsub — empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.

More about us:
https://sumsub.com

https://www.instagram.com/sumsubcom/
https://www.linkedin.com/company/18232778/admin/

source

by Sumsub

linux smtp server

34 thoughts on “We hired a real hacker to hack our email | Real Experiment

  • Lmao Ill show ya what I can do for free this shi is embarrasing 😭

  • This is too fucking funny. I pray for anyone that takes this joke of a video seriously.

  • A few people mentioned errors in the video but the first one that stood out to me was your definition of a brute force attack because it is innacurate

    A brute force attack 100% does not require a dictionary. A dictionary attack, which is a type of brute force attack, requires a dictionary. Additionally, there are certainly tools available to bypass brute force protections. To name a few 'older' tools – FireProx from Black Hills and IP Rotate from Port Swigger.

  • The video at 14:32 isnt from Loi Liang Yang but from @NetworkChuck, unless they had a collab – would be cool to state correct sources when using others videos

  • the ip address for me, does not show what ive downloaded and i dont use torrents. idk if the ip gives the right info

  • @Sumsub what i have to study for be like you?

  • I held a busy roadside rally protesting the massive switch to toll roads in Texas during Governor Rick Perry's "open for business" scurge against Texans. Any country with the money can lease the toll roads and charge American drivers anything they wished. Corruption and big money is in the construction of the toll roads. The people fought hard and loud. At my rally I had a clipboard on the table that had information including my email address. They hacked that email address making it so I could not log into it. The joke was on them because we didn't use that email for the group. All they got was emails saying things like Merry Christmas to a friend, or pictures of my neighbors cute dog. So I had a good laugh. But it did prove to me anyone can hack another's email. That was Yahoo email btw.

  • Subscribed, good stuff. I thought the hired hacker would simply break into the house where the PC is, which is 100% guaranteed to work (once the hacker has physical control of the PC then they can get whatever they want, I suppose unless the hard drive is 100% encrypted which is rare).

  • Fun Fact : 99% of cyber criminal forum hacking service provider and sellers are all scammers, including the owners of the forums themselves. Its no big surprises. Same goes for darkweb stores and "hacker-for-hire" services present there, 99% of them are all scams as well. People are just hyped because they think such people are "god like" hackers or some bs due to excess consumption of hacking movies or delusion from the impression of what the media has created in people's mind about hackers, so people believe these guys are legit and ultra skilled, not knowing they're just scammer skids. Anyway, nice video and thanks for spreading more awareness to people.

  • The Google hacking side is about scanning websites, not remote ips?

  • It’s always either the user or the system is weak,if both not,then it’s invincible.

  • wow! you really oversimplified this shit!
    1. dawg you located a S5 server. proxychains lmfao
    2. the 3rd guy was a skid
    3. dementiasec is better than all of these

  • RAT is Remote Access Trojan. Not Remote Assistance Tool.

  • iknowwhatyoudownload is really inaccurate if you use a vpn or proxy. its shows data for all users of that specific endpoint. Which could be hundreds of users aggregated under 1 ip.

  • if you feel the need to tell us its real, its more than likely its not

  • This is so interesting content, love it 🙂 i didn't know about torrent logging part that was surprising

Comments are closed.