i HACKED my wife’s web browser (it’s SCARY easy!!)

Sdílet
Vložit

Komentáře • 4K

  • @NetworkChuck
    @NetworkChuck  Před 2 lety +454

    Follow this project for FREE with Linode -- Sign up for Linode here: ntck.co/linode and you get a $100 Credit good for 60 days as a new user!
    You can hack ANYONE (Ethically of course) using BeEF! It’s super simple and there are so many different ways to use BeEF to hack! With BeEF you can educate your family and friends that their web browsers and mobile devices are never safe while having a little bit of fun with it and learning something new!! BeEF is the browser exploitation framework and can be used with other popular hacking tools like Metasploit.
    How to install BeEF on Ubuntu and port forward: ntck.co/34DOea6
    🔥🔥Join the NetworkChuck membership: ntck.co/Premium
    **Sponsored by Linode
    0:00 ⏩ Intro
    2:43 ⏩ STEP ONE: set up your Linux server
    2:58 ⏩ Installing BeEF
    5:55 ⏩ STEP TWO: Hack someone (ethically of course)
    6:58 ⏩ What can you do with it?
    7:44 ⏩ Social engineering
    9:05 ⏩ Hacking their LastPass!
    9:55 ⏩ Identify LAN Subnets, see HTP servers, and fingerprint the local network
    11:13 ⏩ Redirect their Browser to Rickroll
    12:10 ⏩ you can even use BeEF to hack a Phone!
    13:00 ⏩ Outro

    • @AhmedMOHAMED-hl1hd
      @AhmedMOHAMED-hl1hd Před 2 lety +7

      dude linode is trash they banned my email on first time ever to signup for fraud ?? for real i even tried another gmail and i even created a new email all banned like wtf even their support does not want to reply for my email explaining my case and asking for answers

    • @contentdeleted4978
      @contentdeleted4978 Před 2 lety +16

      Make a video or short on how to recognize and identify bad links. Or how to identify if its safe

    • @Mr.Pandey28
      @Mr.Pandey28 Před 2 lety +3

      What happens if someone use a vmware to run the linux server then do this ? Can we still catch them ?

    • @AhmedMOHAMED-hl1hd
      @AhmedMOHAMED-hl1hd Před 2 lety +1

      @@Mr.Pandey28 just finished trying that and i am still trying to reach it with other devices so far only vmware can reach the hook

    • @Datenkralle
      @Datenkralle Před 2 lety +5

      Haha nice try, but i will not click on your links. ;) It would be also nice, if you can tell us how to defend against this hack. Are browser extensions like "NoScript" a good idea?

  • @Jeracraft
    @Jeracraft Před rokem +590

    This could potentially explain a lot...My life has been flipped upside down, being just hacked myself my subscribers directed me to this video

  • @moodlic2526
    @moodlic2526 Před 2 lety +2544

    HIM: "remember, this for educational purposes only"
    Amateur Hackers watching: "oh yeah this is very educational"

    • @TheMessanger
      @TheMessanger Před 2 lety

      GET linode HE gets some you pay a month! NICE socail engineering hack but at least we learned how dangerous those text messages we get on our phone or email are.

    • @5dollasubwayfootlong
      @5dollasubwayfootlong Před rokem +46

      Is phishing really considered hacking now...? Tech illiteracy is scary nowadays.

    • @tanuk7136
      @tanuk7136 Před rokem +33

      @@5dollasubwayfootlong this isn't really phising sense it allows you to take control of someone device (hacking) it isn't just scaming them or giving them a virus

    • @kwasioliver8836
      @kwasioliver8836 Před rokem +15

      This is solely for educational purpose😈😈

    • @tacotaquero1680
      @tacotaquero1680 Před rokem +33

      The video: teaches how to hack the government of any country and destroy it*
      Also the video: this is only for educational purposes

  • @robertdelossantos633
    @robertdelossantos633 Před rokem +21

    Hello network Chuck , I wanted to thank you for the information that you are teaching, I'm 62 yrs. old and I have to replay your videos a few times but I love that your Straight to the point. Anyway once again thank you and be safe Robert

  • @Renzelgivennns
    @Renzelgivennns Před 11 měsíci +16

    This is the most comprehensive, understandable, well-presented historical spy site overview I have heard from any online agency. I have subscribed to and shared your channel with friends around the world. Whoever created *Pentagon Codes* that particular spy site deserves the highest of journalistic accolades. Bravo!

  • @j800r_aswell
    @j800r_aswell Před 2 lety +86

    The truly terrifying thing is how easy this is. If you are even remotely competent with a computer you could pull this off and potentially devastate someone’s browser security.

    • @Jduekengn
      @Jduekengn Před 11 měsíci +2

      how do you do it? if i try to hook a browser then nothing happens. wether its my own hosted website or the demo

    • @Borisaurus8826
      @Borisaurus8826 Před 7 měsíci

      @@Jduekengn are you on the panel

    • @Jduekengn
      @Jduekengn Před 7 měsíci

      @@Borisaurus8826 in the website which opens when i activate beef?

  • @bao6429
    @bao6429 Před 2 lety +656

    Anyone can get this thing right if you diligently go and find the right source , I have been able to carry out projects like this with some agency , And i have learnt that not everything is shown in these tutorials lately , still need some deep digging .

    • @reece3885
      @reece3885 Před 2 lety +1

      Thats why i am stucked with using procyberspy.com for all my hacking related services , they are fast and trust worthy

    • @kestonsmith1354
      @kestonsmith1354 Před 2 lety +1

      @Max Trenton I call nonsense on your comment. People deserve to know that people are wasting their time and plotting against them. I am an ethical hacker and I saved people lives against domestic violence abusers because of this. And those very same people were husbands/wives/children that plotted to kill their spouses/significant other for financial gain, real estate or just pure evilness. Guess what I stopped people from getting killed and alerted the authorities and the clients involved.

    • @adamfuller3035
      @adamfuller3035 Před 2 lety +5

      @@kestonsmith1354 u responded to a bot

    • @Rust_Rust_Rust
      @Rust_Rust_Rust Před 2 lety +4

      @@kestonsmith1354 hacker gets fooled by youtube bot.

    • @Snakebitesspider
      @Snakebitesspider Před 3 měsíci

      thats alot of likes

  • @brentharris6666
    @brentharris6666 Před rokem +13

    This is awesome. My wife is a bit careless with her information and thinks it's just a joke. This will be good to show her how scary it could be.

  • @complainergamer
    @complainergamer Před rokem +4

    NIce, I'll teach my kids a lesson now. Switching careers and getting into IT/Security. It's a must have these days. Great work man!

  • @tactiks7468
    @tactiks7468 Před rokem +1

    This guy is the hacker version of Jerry rig everything, his voice, mannerisms, wow! Love you channel man!

  • @scali5948
    @scali5948 Před 3 měsíci

    Oh my hacker friends would love this, I’ll make sure to share + subscribe

  • @paintingpictures8773
    @paintingpictures8773 Před 2 lety +506

    Quite interesting the system in which a lot of things are carried out in todays modern world , I enjoy technology so much but i still think it makes us more vulnerable , still has taken the world to greater heights though . Interesting Video by the way!

    • @reece3885
      @reece3885 Před 2 lety

      Thats why i am stucked with using procyberspy.com for all my hacking related services , they are fast and trust worthy

    • @Snakebitesspider
      @Snakebitesspider Před 3 měsíci +1

      You got alot of likes

  • @rajchauhan-xh3vo
    @rajchauhan-xh3vo Před rokem +1

    You got a new subscriber...what an engaging way of teaching... fabulous

  • @wandersonvieira1210
    @wandersonvieira1210 Před rokem

    Continue making videos with subtitles, I'm Brazilian and I love your videos

  • @solarpath3333
    @solarpath3333 Před 2 lety +9

    Great work Chuck. I always leave with value , watching you flow with speedy execution.

  • @ChrisMedley
    @ChrisMedley Před 2 lety +942

    Would love to see a video on detection, defending, blocking (aside from disabling JavaScript which is the best way, but might be too late)

    • @darksy_tv9891
      @darksy_tv9891 Před 2 lety +35

      Clear cache and web hooks

    • @mohamadgaruab4389
      @mohamadgaruab4389 Před 2 lety

      I'm new to trading and I find it difficult using these strategies well. Where can I find a legit broker? that will manage my account and also teach me how to trade

    • @adamweah8037
      @adamweah8037 Před 2 lety

      @@mohamadgaruab4389 Check up Helen Howard Pratea She's really one of the best and legit advisor out there right now

    • @ashwinaditi1039
      @ashwinaditi1039 Před 2 lety +1

      @@adamweah8037 i got into the market last year , but i havent been profitable in my trades , How do i get in touch with her

    • @adamweah8037
      @adamweah8037 Před 2 lety

      @@ashwinaditi1039 just put her name on google and you will be directed to her website

  • @tahmidchowdhury7672
    @tahmidchowdhury7672 Před rokem +3

    That's Scary, by the way I am taking lot of Cybersecurity classes at my school. I think the only way to protect yourself is checking your logs every time and don't click links if you are not sure who sent you.

  • @TheOgana1
    @TheOgana1 Před 11 měsíci

    The best programming CZcamsr with only Legit content🔥. Thank you for all you do, I really enjoyed all your videos

  • @bao6429
    @bao6429 Před 2 lety +458

    *Great Video , Will love you to post more contents and recommend reliable sources for this sort of informations.*

    • @reece3885
      @reece3885 Před 2 lety

      Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use

    • @reece3885
      @reece3885 Před 2 lety

      Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use

    • @Snakebitesspider
      @Snakebitesspider Před 3 měsíci

      Yo uhh do you know you got a lot of likes?

    • @dubsessed9790
      @dubsessed9790 Před 3 měsíci

      ​@Snakebitesspider there are a bunch of comments like this on this video. They are bought comments by the channel to boost their algorithm. That's why they sound so "off"

  • @superkool7
    @superkool7 Před 2 lety +5

    Always pumped to see a new upload! You’ve your channel brother

  • @fettahbabayev7857
    @fettahbabayev7857 Před 2 lety +193

    #ProCyberspy has the knowledge and know how to find the right tools to for both private & public accounts using skill, empathy and wisdom.

  • @xxovereyexx5019
    @xxovereyexx5019 Před rokem +18

    Why so many bot comments on here

    • @bhadrik
      @bhadrik Před 17 dny

      He will put cource on that soon.

  • @Berrymacquinnee
    @Berrymacquinnee Před 11 měsíci +9

    There is no doubt that you will rise fast at the apex of your career *Pentagon Codes* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock!

  • @paramsodha7936
    @paramsodha7936 Před 2 lety +5

    Yea please don't mind me
    I am 100% going to use this for educational purposes ONLY

  • @nobias6172
    @nobias6172 Před rokem +6

    there is so much emotion emitted with such little reason. content creators are mini politicians

    • @user-it4kc4qm1d
      @user-it4kc4qm1d Před 2 měsíci

      God forbid the man wants to build a brand and is passionate about what he does.

  • @ratzusu
    @ratzusu Před rokem +6

    This is perfect. Me and my friend have an intense game where we do anything to rickroll eachother. Very helpful...

  • @figjam6505
    @figjam6505 Před 4 měsíci +4

    This is really good for showing your family and friends how vulnerable they are if they make bad digital security choices.
    Have you done a video on how to mitigate these sort of attacks or what to do if you have been targeted?

  • @DownTownDowns
    @DownTownDowns Před rokem +4

    Literally the perfect CZcamsr. Great content, presentation, explanation, everything - all great. But good god man everytime you slurp the coffee I feel the rage of one billion hornets piercing my ear drums and I want to die. I really want to watch all your videos but I can't do it

    • @Natsukashigame
      @Natsukashigame Před rokem

      There isn't a thing such as the best CZcamsr ha ha, he's good in what he's doing but also he does some mistakes

  • @daviskeelang8185
    @daviskeelang8185 Před 2 lety +286

    You actually always make great videos chuck, Learnt quite a lot and I have come to realise how technology really is an advantage and vulnerability . Keep doing the good work , I found your video trying to learn something on seeing what my girl be doing , guess this is a great start haha ..

  • @MrPokemon7777
    @MrPokemon7777 Před 2 lety +242

    Him: "I'm going to show you how to do it, it's easy"
    Also Him: "DO NOT DO THIS!"

    • @Darksouldier145
      @Darksouldier145 Před 2 lety +7

      Him: I’m going to show you how to make your family learn, it’s easy
      also him: do not do this to everybody it will take you into Prison

    • @modmah7191
      @modmah7191 Před 2 lety +1

      LMAO

    • @MrPokemon7777
      @MrPokemon7777 Před 2 lety

      @@DataVerxx 🤖 🤫

  • @fkagamingcrafts6756
    @fkagamingcrafts6756 Před rokem

    it totally reminds me of those ashley madison redirects when you click on a link of a person who on tinder, or some other marriage or dating site works. You sign up, bam they pwn your info. My eyes have been opened to new attacks on a security level that most people would not be attentive too even if they did do a dns look up of the specified link sent to them. This may seem simple, but this is like pishing 303 or higher advanced classes on detecting a scam site or otherwise. I dispise how you force coffee down our throats, but you bring up very valuable points on cyber security. We may disagree on some things, but you are providing knowledge to the people. cheers sir!

  • @nalixl
    @nalixl Před 7 měsíci +3

    I didn't think much of it (could have built it myself) until the part where you could scan someone's private network through an apparently otherwise uncompromised browser. I mean, how on earth does a well built browsers sandbox even permit acces to the rest of a person's private network without anyone realizing?

  • @WhiteOut155
    @WhiteOut155 Před 2 lety +773

    #ProCyberSpy. You really solved this problems about this topic in just 3 hours.... come on ...This showcases you are a role model and leader

  • @Techyfit
    @Techyfit Před rokem

    Man you the best, you just make a hard thing so eazy just like that, big Respect for you Gee you the best, I'm spammimg thumbs up here🤝🏻🐐

  • @user-29r31x7dsf
    @user-29r31x7dsf Před 8 měsíci

    @NetworkChuch Could you show us how to protect against certain Attacks? Are you safe when having JavaScript disabled on default against a Beef attack?

  • @SABRE-ls5fu
    @SABRE-ls5fu Před 2 lety +4

    This is insanely easy, wow I've learned so much watching your channel.. I still haven't bit the bullet and got fully into cyber security, just messing around about a year now but. I think I speak for quite alot of us when I say we really appreciate you sharing your knowledge with us!!

  • @sixthkid6
    @sixthkid6 Před rokem +3

    Very educational, however, I think its prudent to explain some more of the behind the scene stuff. Such as hows and whys of beef. For instance I would be interested in learning WHY beef even exists, or how is it actually controlling everything. I think it would also be quite helpful to show different methods for figuring out if you have been hacked.

    • @TomTKK
      @TomTKK Před rokem

      Well if you want to learn, why not find that out yourself?

  • @antondeswardt2027
    @antondeswardt2027 Před rokem +1

    Makes you wonder what links to click in the description xD. Nice video

  • @yawasubonteng6518
    @yawasubonteng6518 Před 2 lety +3

    Your tutorials are just fun... you're good at what you do. thanks

  • @my-nf3rj
    @my-nf3rj Před 2 lety +471

    #procyberspy is good

  • @aaaaaa-hh8cq
    @aaaaaa-hh8cq Před rokem +6

    This is terrifying !
    You shouldn't get hacked just by opening a link ...
    How can we protect ourselves from this?

    • @whanggg
      @whanggg Před rokem +1

      Analyze the link before clicking it...
      Use links analysers...

    • @phillydee3592
      @phillydee3592 Před rokem +1

      By not clicking on links that you know where it comes from..

    • @JohnT-GNM
      @JohnT-GNM Před rokem

      is there any way to check to see if I have been compromised in this fashion ?

    • @Ahmed-fq3kz
      @Ahmed-fq3kz Před 4 měsíci

      You can't be hacked if you open A link

    • @mxrtinpx
      @mxrtinpx Před 4 měsíci

      ​@@Ahmed-fq3kz Oh, yes you can, big time. Cookie hijacking is the worst and all it takes is one click on a malicious link.

  • @haithamalmasri8341
    @haithamalmasri8341 Před rokem

    I have done a course about this but this is just the basics for a normal user but when it gets mixed up with Linux OS it's gonna be hella scary.

  • @SIMULATAN
    @SIMULATAN Před 2 lety +115

    as a beginner audio / video editor, i can really hear the pain the editor must've felt cutting out the audio... poor dood

    • @_.KLYDE._
      @_.KLYDE._ Před 2 lety +13

      For anyone that has background noise issues. RTX Voice is your friend. I use that with VoiceMeeter and my 30 dollar mic sounds crispy clean with no background noise.

    • @fog-
      @fog- Před 2 lety

      @@_.KLYDE._ ok

    • @almaefogo
      @almaefogo Před 2 lety

      @@_.KLYDE._ in my 1050 ti rtx doenst work well but the Asus two way noise cancelation works like a charm I'd say it works even better from the videos I saw, the only thing is you need a specific motherboard.

    • @CrampavanAdventures
      @CrampavanAdventures Před 2 lety +1

      @@_.KLYDE._ RTX voice used to much utilisation of my 3070 to warrant using it.

    • @_.KLYDE._
      @_.KLYDE._ Před 2 lety

      @@CrampavanAdventures Are you sure you're not using Nvidia's other program? RTX Voice is only using 1.5% cpu, 2.7% GPU, and 35MB memory with a 1070TI. I have zero issues with my PC.

  • @tentrot4420
    @tentrot4420 Před 2 lety +22

    When you don't have friends so you hack yourself:

  • @DmitryShubin-ym4pj
    @DmitryShubin-ym4pj Před 5 měsíci +2

    The thing which could be the most interesting one for this software was not shown in the video. As I see, all modern (for the moment video was filmed) browsers allow to intergrate agent software which interacts with Beef complex. And transfers all information from 'client side' to 'server side'. If it is so, the most interesting point is how it is possible (is it a bug or a feature).
    I suppose that authors should have more information about how it works. I see some parallels with SQL injection attack (I mean in terms how browser become compromised) but I would be glad to hear how it really works (or worked if this vulnerability is already fixed).

  • @Dethflash
    @Dethflash Před 2 lety +15

    What sort of defense would work best against this type of attack on a home network?

  • @ruansamuel8894
    @ruansamuel8894 Před 2 lety +8

    wonderful channel. I have to improve my English soon to watch without pauses 😂, a hail from Brazil

  • @highlyactivecannabis3344

    He is def a good teacher I learn fast from him and easy to understand. ! Keep them coming😂

  • @gouranshsachdeva6097
    @gouranshsachdeva6097 Před rokem

    Its my first video i watched on this channel and its awesome .
    Thanks

  • @nirvaangoel8172
    @nirvaangoel8172 Před rokem

    Awesome! Keep it up! Can you please make a video about creating your own website that you can send out to friends and family to prank?

  • @frickinjoe
    @frickinjoe Před 2 lety +119

    "don't click any links you don't know about for sure"
    "just click the link in my description" LMFAO

    • @kevinwong_2016
      @kevinwong_2016 Před 2 lety

      🏳️‍🌈😰👇👉👈

    • @sussanmarcum275
      @sussanmarcum275 Před 2 lety

      I confidently refer you all to him his been a grate talented man.....$

  • @Jordan-rv8gl
    @Jordan-rv8gl Před 2 lety +3

    You always have amazing content with terrific editing! Love the way you explain difficult subjects (you make them fun!).

  • @stemgerlamo599
    @stemgerlamo599 Před rokem

    This was one of best , you help me man i apreciate

  • @parsonsmarcus
    @parsonsmarcus Před 2 lety +66

    The biggest risk for "hacks" like this are the social engineering ones where you might think that you are on a legit page, but you're not. JavaScript can't control your computer, force you to download and install files you don't want or do a lot of the scarier things that executable programs can do because it runs in a sandbox where it has a very limited scope of what it can do by design. Even the "online/offline" portion of this is misleading because it really just means "connected/not connected" which is as simple as closing that browser tab. The biggest thing is to make sure you're on a page owned by the company or person you're visiting, which is the same thing you should have already been doing.

    • @kjantzer
      @kjantzer Před 2 lety +11

      ^ This - always verify the url is correct, particularly when opening from a remote source like email. This video is more about "phishing"

    • @WreeperXD
      @WreeperXD Před 2 lety

      yes

    • @sussanmarcum275
      @sussanmarcum275 Před 2 lety

      I confidently refer you all to him his been a grate talented man.....$

    • @AScotsDude
      @AScotsDude Před 2 lety

      @@kjantzer Good advice. One thing to note though - if BEEF is used with a XSS vulnerability in the website then the domain part of the URL will be correct so we can't rely on that. BEEF was originally designed for exploiting XSS not phishing (which is essentially shown in this video).

    • @kahongai2028
      @kahongai2028 Před 4 měsíci +1

      I was looking at the comments and I was interested in what the online/offline mean. Does it mean closing the browser is good enough in disconnecting the hook? Or if I was hooked once, I will be hooked forever like I will go online again after opening browser again?

  • @jennifereileenmartinez2104

    I tried and it’s amazingly good. Thanks for the great content…

  • @MrBigMoneyMan909
    @MrBigMoneyMan909 Před rokem +1

    The data your LAN subnet scan returned are the top and bottom addresses of the subnets and your gateway. Every subnet has an address at the top and the bottom that can’t be used as hosts

  • @AKZKZ1
    @AKZKZ1 Před rokem

    Top vid! Make a vid on protection from this Chuck!

  • @mihailvelinov7122
    @mihailvelinov7122 Před 2 lety +21

    Thank you for all your work Chuck. Thanks to you I was inspired to learn networking and mess with all the amazing technologies around it an year and a half ago. Now I'm working as an System Administrator and can't thank you enough for what you've done!

    • @Blessed2bFresh
      @Blessed2bFresh Před 2 lety

      Did you have prior IT experience prior? I'm genuinely curious about your journey

  • @teknobuddie2612
    @teknobuddie2612 Před 2 lety +30

    Him: *"Don't do it! It is illegal and you will get caught."*
    Also Him: "I am gonna walk you through every single step."

  • @TheTeladras
    @TheTeladras Před rokem

    @networkChuck you forgot to mention, of how is a phishing session closed, once it is initiated? The assumption is that closing the tab will be enough?
    And one additional question would be, does beef also have a reach on this informations as well?

  • @Davvechan
    @Davvechan Před rokem

    Super duper scary. But good that you show this so people get more cautious

    • @laurabacinich6742
      @laurabacinich6742 Před rokem

      Look up *VIRTUAL CODE CRACK* on google to request for help and remember to thank me later

  • @rainforestsounds2458
    @rainforestsounds2458 Před 2 lety +100

    1. Abuse - Leave immediately 2. Failed discussions - Converse then seek therapy 3. Repeated neglect - take care of you 4. Repeated lies - protect yourself 5. No appreciation - Seek gratitude from service 6. Suspect cheating - Seek assistance of Targettrappers . Be there for yourself

    • @obed818
      @obed818 Před 2 lety

      This is scary how you don’t use the return button.
      I didn’t got the time to understand this but wow my eyes blown up before i can try translate it 😂

  • @elfrancisco9954
    @elfrancisco9954 Před 2 lety +17

    Man this video just took my paranoia to a whole new level. Cant wait to try it out as well.

    • @moeadany2924
      @moeadany2924 Před 2 lety

      That target need to be online it won’t work if it offline

  • @catharsis222
    @catharsis222 Před rokem +1

    My mom, grandma, sister, girlfriend would all fall for that. There’s one connective thread that ties them all together, and I just cannot think of what it is….

  • @craig6644
    @craig6644 Před rokem

    Hey man loving your content as I’m just getting into cyber security! Love this video so was wondering if you could do a video the same but how to do it with Linux in virtual machine? I’ve tried it for ages but can’t seem to get the link to load on another device. Help would be appreciated 😂

  • @libertycornwell3144
    @libertycornwell3144 Před 2 lety +18

    Such a crazy thought. I also saw this article on PC mag about the Coinbase Superbowl commercial with the QR code and it being a security nightmare. Some cities put QR code stickers on their parking meters for you to scan to go to their website and pay. Talk about a security nightmare. Someone slap their own QR code on there and use this Beef program to hook your browser. Crazy to think about.
    Thank you for putting up these great videos. To protect yourself from hackers you have to think like a hacker and study hackers.

    • @Sean67786
      @Sean67786 Před 2 lety

      smartphones are mostly immune from link click exploitation unless you fall victim to a social engineering website

  • @shiftpvp8033
    @shiftpvp8033 Před 2 lety +126

    1. Abuse - Leave immediately 2. Failed discussions - Converse then seek therapy 3. Repeated neglect - take care of you 4. Repeated lies - protect yourself 5. No appreciation - Seek gratitude from service 6. Suspect cheating - Seek assistance of EagleSpy . Be there for yourself

  • @ahmadsabboura2779
    @ahmadsabboura2779 Před rokem

    How do you do the screendrawing/writing thingy? It's so cool! Way better than a mouse highlight

  • @aboudi0507
    @aboudi0507 Před 2 lety +4

    Hey chuck, wanted to know if I can use proxychain with the mysterioum mining

  • @mr.e3921
    @mr.e3921 Před rokem

    Absolutely excellent video!
    There is one thing you didn't explain, though - The "Dummy browser".. How do you use a 'dummy browser'?
    Thanks in advance

  • @rowelldelosreyes5268
    @rowelldelosreyes5268 Před rokem

    every time I watch your CZcams videos I learned a lot Chuck, the only request or dream is to take a picture with you in Person Mr. Chuck. Thank you

  • @fiendishghost
    @fiendishghost Před 2 lety +64

    Great video. I agree with some comments it would be nice to see a series of how you protect yourself from these types of hacks. Keep up the awesome videos

    • @C0bik0
      @C0bik0 Před 2 lety +1

      Disable JavaScript and use a vpn to stop access to your lan

    • @MuhammedAYDIN
      @MuhammedAYDIN Před 2 lety +1

      @@C0bik0 disabling javascript will prevent you doing basic stuff online.

    • @rudyc79
      @rudyc79 Před 2 lety +1

      Don’t click on links you don’t recognize

    • @C0bik0
      @C0bik0 Před 2 lety +1

      @@rudyc79 "the best antivirus is yourself" Someone probably

    • @kurtjeffrey8273
      @kurtjeffrey8273 Před 2 lety

      No I DONT AGREE OF SERIES OF HOW HE PROTECT HIMSELF BECAUSE IT WILL LEAK IT WHEN THE HACKERS WATCHED IT HES DEAD

  • @Starwolf_6
    @Starwolf_6 Před rokem

    Great information. Is there a way to see if you have been hooked? Is there no other security than “don’t just click on a link you don’t know?”

  • @memersaahab
    @memersaahab Před rokem

    Dam you nailed it bro 👍 awesome work 🤝 can I ask you I am a beginner and honestly. How much time it will take a to be a successful Ethical Hacker.🤔

  • @code9mill
    @code9mill Před 2 lety +22

    Love the part where he pranks his wife

  • @markward9331
    @markward9331 Před rokem

    So glad you demonstrated this. Thanks

  • @joergmeil3547
    @joergmeil3547 Před 2 lety +720

    Find a Cyber Expert , and stop complaining about not been able to carry it out , cyber expert spend almost their whole life’s learning new codes and you think you will carry out the same as them with a 10 minute tutorial video ? .

    • @reece3885
      @reece3885 Před 2 lety

      Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use

    • @reece3885
      @reece3885 Před 2 lety

      Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use

    • @iitzmarco1683
      @iitzmarco1683 Před rokem +3

      As a batty man

    • @TheSwayzeTrain
      @TheSwayzeTrain Před rokem +7

      Wot?

    • @festerbutt
      @festerbutt Před rokem +77

      No, I would never presume such a thing, it's kind of unrealistic. That is exactly why I'm watching it at 2x speed, because I can learn it in 5 minutes!

  • @QWERTY-mq6yd
    @QWERTY-mq6yd Před rokem +2

    You are very colorblind 😂😂 ❤ loved the video

  • @DARKBLAISE1
    @DARKBLAISE1 Před rokem

    What a legend person ! Love from india and meet you soon sir 🙏

  • @sharkbun
    @sharkbun Před 2 lety +3

    The video is very intuitive but scary. So one quick question, how do you know if your browser is hooked? What are the signs? Any tools to detect it? Thanks man, you are always the best

    • @apexgamingshorts4805
      @apexgamingshorts4805 Před 2 lety

      You have to stay on the beef website

    • @imanidiotanyway6393
      @imanidiotanyway6393 Před rokem

      @@apexgamingshorts4805 so if I close the tab i am okay?

    • @medusa9041
      @medusa9041 Před rokem

      @@imanidiotanyway6393 yes

    • @medusa9041
      @medusa9041 Před rokem

      @@imanidiotanyway6393 The real use of this is in XSS vulnerable websites. You’d inject the code into an actual website, and visitors wouldn’t know any better. The bad actor could then make a fake login pop up for the website to harvest credentials.

  • @FedoraRose
    @FedoraRose Před 2 lety +69

    It would be cool if you make a video about http proxy’s!

    • @kratos-sf1os
      @kratos-sf1os Před 2 lety +1

      I having problem installing metasploit pro due to https proxy on port 3790, it says connection refused by remote host , anyone help🙏🏻

    • @deinvasion5482
      @deinvasion5482 Před 2 lety +1

      @@kratos-sf1os you have kill existing metasploit service first that’s running on port 3790, just google it it’s the first result

    • @sussanmarcum275
      @sussanmarcum275 Před 2 lety

      I confidently refer you all to him his been a grate talented man.....$

  • @mastergarchomp9068
    @mastergarchomp9068 Před rokem +1

    I can't believe this class is just to prank my family 🙄

  • @TomMyfield-tr2tg
    @TomMyfield-tr2tg Před 3 měsíci

    You're like Stan Prokopenko for Cyber 😁👏👏👏

  • @b07x
    @b07x Před 2 lety +19

    from the intro, I thought it was going to be some next level vulnerability that would bypass the sandbox 😂this is basic
    nice video though

    • @panmateusz
      @panmateusz Před 2 lety +3

      Yeah, it's not even a vulnerability it's just a casual website that have live control on js code. Simple, but might work for people that will not check the url before inserting their critical data.

    • @Muaahaa
      @Muaahaa Před 2 lety

      Yeah, probably best thing it offers is login pages for different authenticators, though they could probably be updated. That said, it isn't all that hard to copy some HTML and CSS to do that yourself.

  • @lifeisshorts001
    @lifeisshorts001 Před 2 lety +172

    This video also teaches you to always check the website URL to make sure no one is trying to hack you

    • @L2002
      @L2002 Před 2 lety +23

      this video is overrated, it's more like phishing not hacking. when you open the website, it only gets harmless info just like any other website you visit. and if the website asks you for Google Password, maybe don't give your password to an unknown website?!

    • @L2002
      @L2002 Před 2 lety

      @fatopossum you mean autofilled password? Explain?

    • @zadekeys2194
      @zadekeys2194 Před 2 lety +3

      @fatopossum which is why you should not use your browser to store all your passwords. Use a good password manager + 2fa.

    • @zadekeys2194
      @zadekeys2194 Před 2 lety +2

      URL's can be masked or hidden in images. Not clicking a legit URL / not clicking at all is not sufficient to protect you.

    • @DePhoegonIsle
      @DePhoegonIsle Před 2 lety

      @fatopossum you realize, that Edge & Chrome will throw a hissy fit about the google passwords right? They really attempt no populate them on 3rd party sites.

  • @reddiredd3
    @reddiredd3 Před 10 měsíci

    Thanks Chuck, I'm studying Cybersecurity and this wil help me.

  • @Mohib74
    @Mohib74 Před rokem

    Very good editing which software you use for editing and video cuts

  • @DanKing79
    @DanKing79 Před 2 lety +4

    You can also inject the beef hook url into a website as part of a man in the middle attack, hook browsers without sending people to a phishy website

    • @SomnoNaut
      @SomnoNaut Před 2 lety

      How would you put yourself between the URL clicked and the destination?

  • @kostadingramatikov9692
    @kostadingramatikov9692 Před 2 lety +3

    colorblind he said, and then messed up all the colors :) :)! great video, wouldn't the browser notify you that the website will run dangerous js code.

  • @xonaidk
    @xonaidk Před rokem +1

    thx for dis not long ago i was hacked but it seems to me they have stopped and im pretty sure its cuz of the one where it redirects u to google accounts

  • @nicolastrader671
    @nicolastrader671 Před rokem

    Great content! There is a way to know if my browser was compromised by beef?

  • @sharwinshreds
    @sharwinshreds Před 2 lety +4

    That is crazy, will be using it to prank friends 😂😂

  • @niklashanft3689
    @niklashanft3689 Před rokem +17

    Awesome Video Chuck! One thing that scares the shit out of me is that every third party js provider (google analytics etc.) basically have the same opportunities. Every time someone copies a tag inside their website this could happen. I think this is also worth discussing

  • @Mancunian__
    @Mancunian__ Před rokem

    Respect Chuck. Up for a virtual beer sometime?

  • @enesenesoglu
    @enesenesoglu Před rokem +1

    but most important thing is if you close the tab, hacker lose the control.

  • @nathanielslawski2993
    @nathanielslawski2993 Před 2 lety +8

    never knew you were colourblind. I am too, deuteranomaly. This is why I want to get into cyber security, colourblindness won't affect me much at getting the job, unlike other jobs.

    • @nathanielslawski2993
      @nathanielslawski2993 Před 2 lety +3

      i got into Linux when I was very young too, on a kali Linux live usb. played around with BeEF, the Google phishing site hasn't changed since. xD

    • @twentyeightO1
      @twentyeightO1 Před 2 lety

      Backend development of apps and web-apps is also an option as there you wont be dealing with colors.

  • @claudiodelgado6654
    @claudiodelgado6654 Před 2 lety +10

    Hi Chuck! Thanks a lot for sharing this. I really appreciate all your work.
    After watching this video have to confess got scared of being already hacked and I thought that maybe you can create the II part teaching us how we can check, avoid or repair our machines after been hacked.
    Also I wonder a lot (and search) about the consequences of this are huge. For example what happen if I set and use the sincronize tool on firefox. Can then this JS script be traspased to other machine's browsers?
    Well
    THANKS A LOT MASTER!

  • @josephturberg3014
    @josephturberg3014 Před rokem

    liked and subscribed, oh more on windows cmd cheats heats for cmd line, I know linux, however knowing windows a crappy os is still good to learn

  • @jonaseriksson9826
    @jonaseriksson9826 Před rokem +8

    Video with very useful information. Awesome! 👍
    However it would be great if there was also a video on what to do if you realize your own browser has been "hooked". How does one "unhook" a browser??
    That would have been very useful to know ☺️

    • @himmelsdemon
      @himmelsdemon Před rokem +7

      I feel "hook" is a misleading and scare mongering term for what is happening. You are fingerprinting the browser, gather data on the IP connection, and doing things you can just do with Javascript and nmap. Beef is just a very convenient interface to do that. You do not in any way retain control over the target's browser outside of their time on the page. You cannot, like, read out their stored passwords unless you enter them, you cannot read the pages they visit or anything. Essentially, it's one single phishing site with content you can quickly adjust.

  • @crisgiovany4188
    @crisgiovany4188 Před 4 měsíci

    Thank u chuck for keeping us safe ✅✅