We hired a real hacker to hack our email | Real Experiment

376,332
0
Published 2023-12-31
In this video experiment, we delve into the intricate world of email hacking. Through a controlled and informative demonstration, we have found a professional hacker to expose the email hacking.
We will highlight the potential dangers and vulnerabilities in the realm of email security, and we aim to illustrate how cybercriminals exploit weaknesses in the system to gain unauthorized access to personal and corporate email accounts.

Join us on this thought-provoking journey to uncover the dark side of cybercrime as we strive to bring awareness to the omnipresent threat of email hacking and illustrate how its mechanics can be better understood to ensure a safer digital future.

#sumsub #experiment #email #emailhacking



00:00 We got hacked
00:54 Before experiment
02:32 Real Experiment pt.1
06:50 Real Experiment pt.2
13:20 How to protect yourself?



Sumsub — empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.

More about us:
sumsub.com/
twitter.com/Sumsubcom
www.instagram.com/sumsubcom/
www.linkedin.com/company/18232778/admin/

All Comments (21)
  • @JeanJeudy-kr8bn
    I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds skillful recovery and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.
  • @KiloSierra1
    "We hired a real hacker" translated from clickbait into real talk is, "We hired a teenage script kiddie".
  • @Muaahaa
    Big fan of the scammers that scam criminals. Keep up to good work, friends.
  • @davethewebguy
    Neat - and I am still watching the rest of the video. But I'm put off a little by the assumption that the IP used by the person who first showed up in a log isn't using a proxy or VPN of some sort. That would be the first assumption, and surely after all those torrent downloads were listed. At that point it's confusing to hear "the owner of this IP did this or that" because in all likelihood it's not "the owner" but dozens of "owners".
  • @itsmaxim01
    I was expecting a VPN ad to pop out at any time. Great video, congrats for not doing any ad/sponsor bullshit.
  • @mohamedfares518
    wow the quality of your content is professional and this video is so informative, i've been following you since the how to disappear online video and i knew you'd eventually get more subscribers
  • @lariojaalta890
    A few people mentioned errors in the video but the first one that stood out to me was your definition of a brute force attack because it is innacurate A brute force attack 100% does not require a dictionary. A dictionary attack, which is a type of brute force attack, requires a dictionary. Additionally, there are certainly tools available to bypass brute force protections. To name a few 'older' tools - FireProx from Black Hills and IP Rotate from Port Swigger.
  • @curious_cripple
    Not a great experiment and the entire comments section is nothing but bots
  • @xGARIDx
    This is so interesting content, love it :) i didn't know about torrent logging part that was surprising
  • @Unity_and_Peace
    The Level of Production Quality Is Out Of This World ! 🔥
  • I have lost my main email because of a scam..now i am suffering because i have every single details on those gmail..And this video inspired me and i will try to get my email back.