Watch this hacker break into a company

3,936,266
0
Published 2016-06-01
Social engineers, or people hackers, specialize in getting you to share information you shouldn't -- like personal details that could lead to a password being stolen. Laurie Segall reports.

All Comments (21)
  • @adamd0ggg2
    A cyber security guy gave a lecture in my class once and he said "The most difficult part of cyber security is the people". "You can rewrite code, you can isolate networks, but people like to be helpful and that is all it takes for a hacker to get in"
  • When used for crime, these kinds of people are called manipulators and sociopaths. This guy was smart enough to make a good living off of being conniving and convincing. Pretty cool dude.
  • @alida004
    i wish i had this lads social skills
  • @davesteve8562
    It was like performing a circus that's not interesting in my relationship,my girlfriend started portraying this kind of attitude that made me shook my head saying THIS GIRL IS REALLY SOMETHING ELSE... I informed a computer geek and he told me about @explore.hacker on instagram . I went up to them,i just gave her username and in 30mins he got me into her account without notifying her and then found out that she was seeing another guy.
  • @dylann9719
    The most ironic sentence that came out of his mouth “I really suck with computers man” 😂😂😭
  • Watch this hacker break into a company > Watch this random guy make a phone call and install remote desktop.
  • @mrlevinielsen
    "What do you think of when I say the word hacker?" um inspect element
  • @evelynneli4690
    I can but thank them for their awesome 😎 services when I desperately needed to find out what my suspicious cheating spouse what up to on his phone hiddeneyecyberbase. com made it possible and easy
  • @_exttt
    2:18 "We gotta grow up a bit" *sees spider-man blanket and mannequin in background" ok
  • @kylemossi
    I find it very hard to believe that this script could, with a single input from a person, grant any useful access to anything, let alone enough to 'bring down the company'. This is hyperbolic to say the least. I've worked in Operations and tech support, I would never go to a page one of my clients told me to go to, I would vet it on a virtual machine....for THIS very reason.
  • @motherflange
    My grandfather possessed exemplary hacking skills. He killed my grandmother with an axe in 1982.
  • @multiwebinc
    I'm guessing the real problem here is not that Ken from support visited a website, it's that the remote desktop software on his computer wasn't configured to ask for authentication. All the website did was provide his computer's local IP address and then the hacker used that to connect to his computer. He could have easily done this completely without Ken from support's assistance by simply scanning the local network for computers that respond on whatever port they are using for RDP. That whole call to Ken from support was nothing but added dramatic effect.
  • @OkoYT
    "we gotta grow up a bit" *he says sitting in front of a giant spiderman"
  • @ittotaq
    Takes more than 2 minutes to reach a human voice when calling tech support...