hobune Channels Contact About Donate

The DANGERS of connecting to a Hackers Honeypot & How To Protect Yourself!

Back to video page | Download comments jsonl

Comments (archived 2022-07-02 13:52; 26 top, 49 total comments)

OPtimal 2020-09-17 18:01:35

"Don't connect to public Wi-Fi" is like the "Stranger Danger" of the 21st century except this time it's more dangerous

17 likes
Aaron 2020-09-18 20:59:00

Once the modules are already installed on your device how do you get them off? I feel like I've been a victim of this.

0 likes
J R 2020-09-17 20:51:44

Also if you try to reverse-shell into a honeypot get ready to lose your machine.

1 like
N.W.A /IceCube 2020-09-17 20:17:04

could you consider making a video about intel managment engine.
that works even of computer is on powered off state, that have an entirely os 'minix' and dedicated network card that uses seperate resources from operating system.

0 likes
Jayendra Kumar Gupta 2020-10-24 01:35:30

WE MOSTLY NEED LONG Infographic VIDEOS MAANN..

0 likes
johnathan nnisman 2020-09-17 17:42:14

Nice now am ganna go and connect to public wifi with my non existing laptop

2 likes
harry 2020-09-17 19:35:06

Hey! Can i contact you in DMs about some stuff, i want to get into this kind of stuff but need some help <3

0 likes
Yujaw Manandhar 2020-09-18 03:40:51

Please make tutorial videos...

1 like
Gordo Quata 2020-09-18 08:57:34

What If They Connect To An Https Website ? Will U Still Be Able To Capture Cookies , Fingerprints Etc ?

1 like
Nakleh Zeidan 2020-09-17 20:56:29 (edited 2020-09-17 20:56:42 )

Hey crypto do you have any course available?

2 likes
Shalin Pather 2020-09-18 04:30:25

Hey Crypto, is this the same thing as the "evil twin?"

1 like
Replies (2)
New Species 2020-09-18 08:58:20

evil twin can be the same as the evil portal, but the information sent through the network accually makes it to the real website e.g. fake google but you accually get signed in etc.. This can also be done with the dnsspoof module

1 like
Shalin Pather 2020-09-18 09:33:16

@New Species Got it, thanks.

0 likes
VastraKai 2020-09-17 23:19:13

Bro, you are amazing!!

1 like
Kapoor K 2020-09-17 17:06:32

Amazing broo

0 likes
Mike Hussy 2020-09-17 17:52:18

You are the best in youtube sir do you have any course ?

4 likes
shivang upadhyay 2020-09-19 04:55:43

okay now i am hooked

1 like
Andrei Girban 2020-09-17 18:36:21

Hello , matrix terminal effect tutorial please

1 like
Replies (1)
nonasuomynona 173 2020-09-17 18:40:51

1.Apt install cmatrix
2.Cmatrix

0 likes
Sean Davenport 2020-09-18 02:28:08

I just got my Mark VII Tactical today

1 like
Epic Typhlosion 2020-09-17 20:38:12

Tl;dw, use a VPN, always

6 likes
Replies (6)
MEAT AND POTATOES 2020-09-18 13:20:46

Also proxy's for extra safety

0 likes
Shiny 345 2020-09-18 18:37:57

using self-hosted VPN is always a better option, too.

but beware, always update the VPN package on the server.

1 like
MEAT AND POTATOES 2020-09-18 19:22:30

@Shiny 345 Ok thanks dude

1 like
WinDS 2020-09-24 19:31:41

@MEAT AND POTATOES Whats a proxy? If you don't mind telling me and giving an example 👀

0 likes
MEAT AND POTATOES 2020-09-25 07:00:30 (edited 2020-09-25 07:01:11 )

@WinDS A proxy server is a computer system or router that functions as a relay between client and server. It helps prevent an attacker from invading a private network and is one of several tools used to build a firewall.
Thats the defenision. It can also be used for attackers.

0 likes
WinDS 2020-09-25 12:21:50

@MEAT AND POTATOES Thank you man!!

0 likes
a ogunnaike 2020-09-17 17:06:53

Wanna learn from you, do you have a tutorial on hacking?

2 likes
Replies (9)
Fu des 2020-09-17 17:11:43

go watch nullbyte, hackersploit, john hammond

0 likes
Fu des 2020-09-17 17:27:46

@U X agreed i have 4 years experience of it and i can say thats it better to start with programming, networking and linux knowledge but still its great to see those videos just for fun

2 likes
pranay thammineni 2020-09-17 18:06:05

@U X yeah ...but can you guys help me with starting to learn hacking...and sources or something like that

0 likes
Fu des 2020-09-17 18:09:50 (edited 2020-09-17 18:10:20 )

@pranay thammineni just type "ethical hacking" on google and start learning, but still its better to start with programming, python is the best for cybersec

1 like
Fu des 2020-09-17 18:10:39

@pranay thammineni and after you know how to code, then learn hacking

0 likes
pranay thammineni 2020-09-17 18:13:17

@Fu des but is there a certain standard of programming or just need to have some knowledge of programming..?

0 likes
Fu des 2020-09-17 18:55:07

@pranay thammineni just basics can fit, but i recommend you to have like medium level knowledge to know whats going on

0 likes
shubham kumar 2020-09-19 15:34:21

@U X totally agree with your point 🙃

0 likes
a ogunnaike 2020-09-27 16:33:23

@Fu des thanks already followed them weeks ago

0 likes
Mihai Cristian 2020-09-17 22:55:21

And...what's that useless matrix for ?

2 likes
Replies (2)
Odsku 2020-09-18 04:24:17

Visual effects

1 like
ZeusCybersec 2020-09-27 16:09:20

Its called c matrix( a script for visual effects)

1 like
Enter JS 2020-09-17 17:05:08

Crypto First !!!

2 likes
Replies (1)
Sun Tzu 2020-09-17 17:34:28

U r 2nd

1 like
Soyeb Khan 2020-09-17 17:25:33

I am from Bangladesh 🇧🇩

1 like
Anonymous Abdallah 2020-09-17 21:40:42

Go analog

1 like
Nikhil Maan 2020-09-17 17:24:48

Face reveal

2 likes
Replies (1)
ItsQber 2020-09-17 17:40:22

Seriously man ? Just look at his pic...

0 likes
Dhruv 2020-09-17 19:46:04

Bhai kya batana chahta ho

1 like
Dov Gun 2020-09-17 17:04:56

So early 20 seconds

2 likes
Replies (1)
Enter JS 2020-09-17 17:06:51

i got in 6 sec

2 likes