Комментарии:
So is system so now map it ! Someone could access to devices here all devices a network ? It's already a network there one could watch it already record keyboard so humans just repeat someone in a loop once all normal is recorded it could be programmed to alert system about unusual talk ? To privileged authorities so can have this ? Similarly it could do same with urls they click on and is ? So there is system torturing me so those hacker should exist against that funny system that plays a game continuously for years same thing ! If they do not exist I will just burn this phone something done that to eyes ! Again out of that phone we live there I hate that text ? Before they called it brand ? !now just random alphabets ? So what is that it can't be ? So connected humans ! In visual interface ? That is bad to that ? So will you give access to public about your phone making a local network we could have network named Gulmuti ! Connected devices ready to execute a command or send a request to other company or network ? Once you have that network may those devices just browsing web could help do something in hacking ? One thing could be done a attack sending requests wasting resources of someone in that web thing then it goes on may be government has that type of access on it ? Why that ? 🤣 Someone they torture themselves exploring bad content just because someone else can see it or that to someone ? I hate this thing do not like it ? !
ОтветитьSame thing applies to defence and attack stuff does it ? See that metasploit and terminal is boring ?
ОтветитьCan someone map that whole system for a hacker to think on it ?
ОтветитьSo here they have a system called country ? And people in it ? See what it does ? Programs that person's mind for that place that is media ? So it has they said organs of state ! And they have work to do and it has been exploited by someone that is what history of my country says ? Right now it has a economic problem ? Or someone just exploited that weakness in economic process of system ? Hey that not ok so those international organisations of helping countries ? Who controls it ? That to a system see money or wealth flows from there a perfect place to exploit countries ?
ОтветитьWhy hack why ? For information that is useful or to exploit someone or a group ! Can you please write a book to use that concept into life or world other concepts just eyes on screen and fingers on keyboard ! With a group of hackers we could just have paradigm of living in place and then hack it ? Build on it in mind ? Look life our life we create information all day ? And holly books promise recording of that and a punishment of reward see it is a process ? ! And that evil corp see those process in life are not just good and evil ? Let's classify those and do further hacking into it ? Can you do that ? Then weakness in a paradigm of a society and getting access to that society ? See that access to has so many levels of privileges right now you have on screen or a device ? But look international organisations have access to government and laws to ? But for good and educational purposes only ? Other wise you will burn by doing it in mind ? Right here ! So why hack that society that is why I never think ? Does the government controls what the public is allowed to access on internet ?
ОтветитьIf U are scada ingeneer and put you into jail,u are lucky 😆
ОтветитьHacking PLCs? Yeaah today little more open-source protocol with two libraries at least decade avaiable
Ответитьwhats the name of the hacking tv show?
ОтветитьWhat's a spooftooph equivalent for parrot?
Ответитьgod i love his voice i could listen to him all day
Ответитьjust got some police chase video by using google dorks. ezas
ОтветитьI would love to see how to hack an exe file, I am new to this amazing world of hacking. I just found your channel and I love it. I am also a huge fan of Mr. Robot. :()
ОтветитьI actually went to school with the person/hacker who created the flash drive to keyboard, "firmware"
Ответитьbro u didn't do a spoiler alert !
Ответитьcan you please do a u3-pwn video it’s kinda old but it’s definitely cool
ОтветитьReminds me of the Enron logo
ОтветитьWait Mr Bombal is it actually possible to make a regular usb a rubber ducky? I could have swore it csnt be since on has a board/chip that allows typing
ОтветитьPlease I will love to get some of the books 🎉
ОтветитьGood discussion
Ответитьhe dont hack shelia, he use her cyber connection to hack those person she know and spend time. And i think your channel it's really the best of those channel for securites, becouse you are not inside wanna power and fame and you are like tunning fallowers and other contirubtors to computer science. And i think we should have discord of your team creation, if you have money to do that. Becouse internet need freelancer like you, becouse discord of offical softwares like kali linux and friends have not lot of patieence and problem with talking about security.
ОтветитьBro my epic games account got hacked someone changed my account email I'd and password i don't know what to do, I lost a lot of valuable products please help
Ответитьi would love it if he would do all of them
ОтветитьI love hacking because it never works.
Ответитьwhy are hackers always so full of themselves
ОтветитьHi my kid google account is blocked thats why i have to use my dads account By: Alyan Khan
ОтветитьTest
ОтветитьI am pakistani big fan mr robot for u z maje the video for fb hack acc recover it plzplz 😢
ОтветитьNot calling Darlene a sidekick 😅 great interview though
ОтветитьToo funny, on being anti social "Ive been working on it, ive been doing ok", says the man blacked out wearing dark hoodie whose face we can't see.
Ответитьits a very true "Real hacking" can take a very long time, days , weeks or even months
ОтветитьI still don't understand why he didn't use the MAC from the police car to directly connect to the prison
ОтветитьThis was interesting. Thank you for sharing. : )
ОтветитьI am trying to figure out a tool that will allow me to check for default credentials (admin/password for example) on my external facing websites and networking gear. Any suggestions would be very much appreciated. Being able to crawl for subdomains, finding logon forms, then running a default credential scan/attack would be fantastic. Tried burp but that was a pain… Hydra?
ОтветитьLove Mr Robot.
ОтветитьLove it please continue with the content.
ОтветитьAwesome video
ОтветитьI wish I had some hackers friends
ОтветитьWhy do Yanks drag a story out
.. Boring 😴😴😴😴😴😴😴
Malik also played the young Pharo prince in "Night at the Museum"
Ответитьthis guy is really a nerd about mr.robot
ОтветитьSomething I really love about David’s videos, especially when he has people on his channel, is that he asks the questions that WE as the viewers would ask if we were sitting where he is.
ОтветитьAnybody teaching others how to hack should be jail for life for the damage they do and cause to others.
ОтветитьHow does he sit so still for that long?
ОтветитьNo device holding a SIM card has ever been safe
ОтветитьBooks? Meh!
ОтветитьThis is dumb
Ответитьdo the first hack, when he is hacking a restaurant ownner! great content btw!
ОтветитьCan we get a pdf of this because I am in pakistan so I can't even afford but want to learn
Ответить