• 3 months ago

Category

📚
Learning
Transcript
00:00What's going on everybody? Hacker Glenn here. Okay, so we're gonna be talking
00:03about leaked passwords this time, right? I know you've been wondering, how do your
00:07passwords get leaked? Why do they get leaked? What can hackers do with your
00:13passwords? How do you know that your passwords are actually leaked? So we're
00:17gonna answer them. So for one, how does this happen? Well, we get information from
00:23the SQL database. Once we get into your database, you're pretty much fucked
00:27because we can pretty much see things in clear text. Like, we'll pretty much see
00:31something like this. So you see right here, this is a list of passwords. Now, of
00:37course, this is on GitHub and this is like a generation, like a generator that
00:41you would use to brute-force passwords. But I'm just using this as an example. We
00:45see stuff like this. We'll see the username and passwords from a list that
00:49somebody posted on the dark web or they posted on Pastebin or, you know, they
00:54just, or you just paid for it and then they just sent it to you. I mean, there's a
00:59variety of different ways this can come about, but it pretty much looks like this.
01:02So we get into that database. Let's say if we bought the password for somebody,
01:07like somebody leaked the password to us for a financial gain. That's something
01:11that is done with us. Yeah, hackers will actually pay people to get the passwords
01:15to elevate our privileges. Pretty much elevate your privileges so you have
01:19more access to resources, i.e. more passwords. Now, people do dummy stuff like
01:25keep the password written down in a specific area that's secret so they
01:30remember it. We could find access to that. Now, once again, once we get into that
01:35database, it's pretty much over with because we can get all of this
01:38information and then we just leak it online. Now, here's the thing. When a
01:42database is hit, I guarantee you we can get a name, phone number, password, and
01:48then we can get your regular name and then your username. Those four
01:52categories, I guarantee you can always be gotten in database leaks. So let's say
01:57in this leak, I got your phone number, right? Now, I did a video about SIM
02:00spoofing. Go check that out. It's the one that got uploaded right
02:04before this one. Pretty much use SIM spoofing. Now, I have your phone number.
02:09Now, I have your phone number and I SIM spoofed you. I can now use these
02:14passwords on your accounts because the authentication is going to come to my
02:18phone. So, now I pretty much have the passwords to your bank accounts. I have
02:22the password to your social media. I mean, a database leak, that's why companies pay
02:28out so much money because it's not just a social media. We can get access to
02:32anywhere on any website you go and it's not hard to find you neither. All we have
02:37to do is say forgot password and put a number in there. There's only so many
02:41banks, like the most popular banks. I can just try them all. I'll find you in one
02:44of those banks. Now, I got your bank information. I'm going to transfer all
02:48your money from your account to, let's say, a PayPal account or to just a little
02:53phantom account. I can do that. Now, you lost all your money, your social media.
02:57Let's say I posted some crazy stuff and say if it's racist, sexist, or whatever. I
03:02got your ban on social media. You lost all your money and then because of this,
03:06I can also take out certain loans. You're not going to know that the loans are
03:10going to be going through because I'm going to change that address to another
03:14address. People will just be getting the wrong mail but I'm messing up your
03:17account and I can verify everything because I already have the
03:21password into your stuff. I already have your email passwords. I have everything.
03:24So, because of that, I can pretty much do whatever I wanted. I mean, it's really
03:29wild. Like, these are the type of things, database leaks. These are the type of
03:34things that occur with database leaks and then the social engineering. Let's
03:37say I got your bank password, right? If I need to social engineer you to get your
03:41email password, I can do that. Now, I got your email password and your bank
03:45password and that's how I'm able to do everything that I described earlier. All
03:49I need is information that links you as a target and I can get
03:53everything else. That is the true power of hackers.

Recommended