We hired a real hacker to hack our email | Real Experiment
376,332
Published 2023-12-31
We will highlight the potential dangers and vulnerabilities in the realm of email security, and we aim to illustrate how cybercriminals exploit weaknesses in the system to gain unauthorized access to personal and corporate email accounts.
Join us on this thought-provoking journey to uncover the dark side of cybercrime as we strive to bring awareness to the omnipresent threat of email hacking and illustrate how its mechanics can be better understood to ensure a safer digital future.
#sumsub #experiment #email #emailhacking
00:00 We got hacked
00:54 Before experiment
02:32 Real Experiment pt.1
06:50 Real Experiment pt.2
13:20 How to protect yourself?
Sumsub — empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.
More about us:
sumsub.com/
twitter.com/Sumsubcom
www.instagram.com/sumsubcom/
www.linkedin.com/company/18232778/admin/
All Comments (21)
-
I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds skillful recovery and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.
-
"We hired a real hacker" translated from clickbait into real talk is, "We hired a teenage script kiddie".
-
Big fan of the scammers that scam criminals. Keep up to good work, friends.
-
Neat - and I am still watching the rest of the video. But I'm put off a little by the assumption that the IP used by the person who first showed up in a log isn't using a proxy or VPN of some sort. That would be the first assumption, and surely after all those torrent downloads were listed. At that point it's confusing to hear "the owner of this IP did this or that" because in all likelihood it's not "the owner" but dozens of "owners".
-
I was expecting a VPN ad to pop out at any time. Great video, congrats for not doing any ad/sponsor bullshit.
-
wow the quality of your content is professional and this video is so informative, i've been following you since the how to disappear online video and i knew you'd eventually get more subscribers
-
A few people mentioned errors in the video but the first one that stood out to me was your definition of a brute force attack because it is innacurate A brute force attack 100% does not require a dictionary. A dictionary attack, which is a type of brute force attack, requires a dictionary. Additionally, there are certainly tools available to bypass brute force protections. To name a few 'older' tools - FireProx from Black Hills and IP Rotate from Port Swigger.
-
Not a great experiment and the entire comments section is nothing but bots
-
This is so interesting content, love it :) i didn't know about torrent logging part that was surprising
-
Great Content Keep it up brother 😘
-
This is a professional presentation.
-
The Level of Production Quality Is Out Of This World ! 🔥
-
nice one there
-
Great presentation video.
-
The hacker downloading "The boss baby" Lmfao.
-
Thank you, I have learned alot from this video.
-
its informative. I subscribe 😊
-
Informative 🐱
-
I have lost my main email because of a scam..now i am suffering because i have every single details on those gmail..And this video inspired me and i will try to get my email back.
-
Great video