• 2 months ago
Facebook: https://www.facebook.com/HackerGlenn

Merch: https://www.teepublic.com/stores/hackerglenn

Youtube: https://www.youtube.com/channel/UCTYIZU_5Pg5rTcqJCt9AQHA

Instagram:
https://www.instagram.com/hacker_glenn/

Tiktok:https://www.tiktok.com/@hacker_glenn

Backup Tiktok: https://www.tiktok.com/@hackerglennbackup

ello:
https://ello.co/hackerglenn
Transcript
00:00so I actually got a very good question what can hackers access on your phone
00:05and on your computer so let's get into this so let's say we got a virus in
00:11there right we already can see all the files and download all the files that
00:15you have so that's the first step now I actually made a little video a long time
00:20ago talking about this so here's a great example kind of new but of course I
00:25wouldn't tell you guys something unless I knew what I was talking about so doing
00:28this you see malwarebytes is right here oh crap wrong folder activate my back
00:37door go back over here it's right here download text.txt see that seeing the
00:51file to where it's not here once I hit download that was successful and that
00:58was right here
01:01so that is just a classic example as I said that was one of the older videos I
01:06made on my tik-tok but it still reigns true even more today so we have a virus
01:11in that computer we have access to all of your files so that little black
01:15screen that comes up when someone troubleshoots that black screen allows
01:19us to move through the computer in a different way than you would you click
01:24on you know folders and everything we just change directories make
01:28directories upload something download something change passwords everything
01:33from that prompt that prompt is very powerful so we pretty much gain access
01:37to that we control your entire computer the next thing is your browser we have
01:42access to your browser history so any porn sites as you visited anything that
01:47you don't want anybody to see we have access to it and we can use that to
01:51blackmail you now to poke someone browser I'll make a video about that
01:56later on now the next thing we have access to your bank account and finances
02:00because normally you people like to keep your password on your computer so we'll
02:06have access to that we'll be able to view all the passwords that are saved on
02:11there for one we're gonna download all the files on your computer we're gonna
02:15check the normal spots downloads desktop temp videos pictures such like
02:23that next up is pictures any of those illicit photos that you don't want
02:27anyone to see we'll be able to have access to that and we'll blackmail you
02:31we'll have access to your email because we can actually open up remote desktop
02:36protocol on your computer and move through that computer the same way how
02:41you would now next up is your camera system because we're on the computer a
02:47lot of times you all like to autofill passwords so I'm in your computer I
02:51opened up Chrome not using a black screen I can't open up Chrome using the
02:56black screen of course but use the remote desktop protocol I'm on your
02:59computer open up your camera system and now I'm able to see all throughout your
03:04home so that means that I have a recording of people taking showers I
03:08recording people walking through the house naked I have the recordings of
03:11everything your whole life I'm able to see and guess what I can just put it out
03:16there online cuz I can blackmail you hey I got a picture of you cheating on your
03:20husband either you give me $10,000 or I'm gonna ruin your marriage that's
03:25another thing we have access to other IOT devices IOT thermostats IOT stove
03:32IOT refrigerator we have access to that because IOT devices operate off of an
03:38app on your phone a lot of them you're gonna use a user interface on the
03:43computer because it's autofilled we can go in there with a thermometer I can
03:47turn the temperature up to a hundred degrees give someone a heat stroke or I
03:52can turn the temperature down to below zero and somebody could freeze to death
03:55that's something else we have access to your ring doorbell system as well we can
04:01turn that off so let's say if a hacker wants to blackhead hacker wants to get
04:05into your house we don't want to get recorded we'll turn off your ring
04:09doorbell run up in there with some guns and then make you give us whatever you
04:13know we need it could be administrative password to an account that has three
04:17million dollars in it it could be anything but that's another thing we
04:21could do now I'm gonna throw this out there you probably think about this your
04:25social media accounts as well so your Facebook YouTube Instagram tik-tok
04:30Twitter will have access to all of that mainly because a two-factor
04:33authentication will be able to hack now of course you have sim spoofing but when
04:37we're on that computer another form of two-factor authentication is the sense
04:42of it to an email so I can have two-factor authentication sent to your
04:46email that I also have control over since I have control of your account and
04:50get into your well social media account and guess what you're not gonna know
04:54because I didn't choose to send the two-factor authentication to your phone
04:58now of course you know we're gonna have access to your router and switch let's
05:02say if you have a firewall we can have access to that run an exploit gain
05:06access to that firewall and turn off a lot of rules that you have set up so we
05:10can send in transmissions now in let's say your router for example I can change
05:16your DNS to a mine so that's man-in-the-middle attack so I can
05:20constantly see everything that's going through your network then I can also
05:23have it to where once you open up a video or a file on there it opens up a
05:27virus or ransomware so we have access to your entire life

Recommended