I Paid a Hacker to Hack Me

1,040,926
0
Published 2023-01-20
Coincidence? Or something much worse?

Please check out everyone who helped me create this video:

Cyber security experts, go tell them to upload more
‪@tenfoldsecurity9258‬

Funny educational content about topics you'll probably like if you're here
‪@SomeOrdinaryGamers‬

Calls scammers and makes them rage for hours, truly inspirational 😂
‪@KitbogaShow‬


Chapters:

00:00 I Gave Dark Web Hackers My Info (Pt. 1)

01:00 I didn't use a VPN...

02:09 Ft. The Hacker I Paid to Hack Me

02:45 Describing how a "script kiddie" attempts hacking

03:15 Is it possible to get hacked with just your IP address?

03:40 Ft. @KitbogaShow, was it the viruses?

05:10 Is someone after me?

05:30 Ft. @SomeOrdinaryGamers or is it coincidence?

06:34 What precautions did I take when I visited the dark web in part 1?

07:23 The slip up... maybe?

07:38 Tenfold security

09:02 GETTING HACKED

10:22 What about the dark web virus?



Edit: Adding this information here to satisfy anyone who may be curious about the comments claiming the information in this video is incorrect. I never want to misinform anybody. I know most of you come here for fart jokes or eating raw beans from a can, but still.... that's no free pass to misinform people.

Comment 1) "You cannot be hacked with only your IP address."
This statement is false. There are scenarios in which it is dangerous if a skilled "hacker" gets your IP address. For example, if you are running a Minecraft server on an outdated version of Windows, you could be vulnerable. In this scenario, all a skilled hacker would need is your IP address to potentially start accessing your system. Another scenario might be if you have an outdated/used router and just recently installed 10k~ malicious programs and intentionally disabled all of windows safety features... 😅 like I did the other day lol. Prob could have given more context as to what previously happened.

Comment 2) "What about CGNAT and dynamic IP addresses"
CGNAT is basically where your ISP will pool you with other houses/businesses and you'll have the same IP address. In this case, you cannot be hacked with only your IP address. It would be virtually impossible at that point. But if your internet is provided to your house via a wall jack in the US, you likely are given a specific IP address that is dynamic and will change occasionally. So once your IP address changes, you're safe. But, if you're being "hacked" using the method mentioned in comment 1, you'll never know you're being hacked. You will be vulnerable until your IP address changes, which sometimes takes months. & at that point, a good hacker will have likely created a new way to gain access to the system without needing your IP address.

Comment 3) "This 'Dark Web Hacker' is a script kiddie"
He's describing how easy it is for any uneducated kid to get on the dark web and start hacking. He's not describing his own process. That's my bad, I cut out too much of what he said. He spoke for hours, so I was trying to piece together the relevant parts. I'll be more carful with this type of editing.

Comment 4) "You don't need a VPN on the dark web"
It seems as though this is a debated topic. Some say a VPN creates another layer of security, some say it makes you less secure. In my case, a VPN might have added a much needed layer of security given I was clicking random links all across the dark web. In some cases, clicking a link in a web browser can run a malicious script. Now, could one of those scripts have grabbed my actual IP address? I'm not sure, that's why I paid a hacker to hack me.

Comment 5) "You can not hack someone by just sending an email to a person."
This statement is false. There are scenarios in which using a locally installed email program on an outdated system leaves you vulnerable by someone simply sending you the email and it loading within that program. It's extremely unlikely, but possible. You do not need to worry if you're using web based email.

Comment 6) "You cannot be geolocated with your IP address"
IP addresses do reveal your geolocation, but not your precise location like a home address does. That's pretty common knowledge. I think some viewers thought the video was implying that someone could know the exact coordinates of my left toe with my IP address.

I felt compelled to share these in depth answers in order to give some of my long time viewers and supporters the peace of mind that I'm not just going to give you a bunch of lies in a video. The scenario I'm in is incredibly unique. In 99.999999% of cases, you are not as vulnerable as this laptop is.



business: [email protected]


   • My Faith - Where I Got the Name  
Thank you all for watching! Baby number 2 comes any day now, see you soo

All Comments (21)
  • @voqp
    Mr. Homeless is literally every fear of Muta regarding dark-web personified
  • @Xiellion
    "OH NO THEY HAVE MY PUBLIC IP" unplugs router and plugs it back in "glad we dodged that bullet"
  • As a certified penetration testing engineer (a legal hacker), this is one of the most hilarious videos I've seen. The process that the "hacker" is describing at 04:10 is referred to as "being a script kiddie." Essentially, anyone can take a bunch of scripts and commands that they do not understand, run them and hope for something to happen. Putting that aside, obtaining someone's IP address is largely insignificant in over 90% of cases. This is due to two reasons: CGNAT and closed ports. CGNAT is a situation where the ISP uses network address translation to map their clients' IP addresses, similar to what a home router does. As a result, multiple individuals share the same public IP address, and when someone tries to access it, they are actually accessing the ISP's router instead of the intended device. In most cases, people aren't even aware that they're behind a CGNAT. This is quite common due to the limited availability of IPv4 addresses, and the need to aggregate them using CGNAT. The second reason, closed ports, pertains to the majority of ISPs using firewalls that block HTTP/SSH/Telnet on the public interfaces of their clients' routers. This means that while the client and the ISP itself can access them, no one from the outside is permitted. This is also extremely common practice. Even in the unlikely scenario that your ISP does not block these ports and you are not behind CGNAT, if someone accessed your router, they would only be able to... change its settings, and that's assuming they would break the admin password or have an exploit for this particular software version. Seriously, they would only be able to view and change your wifi settings, disconnect you from the internet, change the admin / user password and so on. To access your LAN remotely, the router would need to have the option of creating a local VPN server, which most consumer-grade routers do not have. While it is possible to upload a different pre-configured firmware to the router which does have this option, such as OpenWRT, assuming it is supported by this particular router model, it is extremely dangerous as it would disconnect you from the internet and cause your public IP address to change in most cases. The small minority of individuals who have their own public IP addresses, use dynamic addressing, which means the public IP address changes after every reboot of the router. Finally, to end this rant, it is physically impossible to infect you with an email via Gmail's web interface without even opening it. This is Hollywood nonsense. It may be possible with an obscure email provider, or a local client like Thunderbird or Outlook, but not if you're using the web interface of a popular email service provider, i.e. like an overwhelming majority of people.
  • @JMCGhost
    This man is the definition of what schools say not to do and why those warnings exist
  • @daylen577
    That 'hacker' at the start is 100% an Indian Microsoft support rep lmao. He knows jack shit about actual hacking, he's just rambling with well-known keywords
  • @elemesht
    Every video I saw today had VPN sponsor and now when it's finally relevant it's sponsored by food.
  • @WeatherWX
    You really should've paid a reputable company to do a pentest on yourself. It takes more than "I did a Nmap scan and done" just for hacking.
  • The hacker in the video is basically what’s called as ScriptKiddie I.e he’s too much reliable on scripts that he finds and then the rest is Luck. When you gave him your IP address, What he essentially did is something called as NMap port scan which is basically a network tool to check all open ports of a system associated with an IP address. While it’s true for the reconnaissance stage of the hack and also, here the IP address points to the mobile phone and mobile phones tend to have low open ports and also, if there are open ports, in majority of scenarios there won’t be a pre existing script that a “Script Kidde” can use and get away with it. Better find good hackers next time.
  • @coloniser.-
    i like to think that all of this stuff started because of him modding on r6 and then he fell down the rabbit hole lmao
  • @Xiellion
    you found what we call a "script kiddy"
  • @CryptoNWO
    man this whole video is a nightmare. can’t wait to see how this concludes
  • @cashdoo
    “I Paid A Hacker To Hack Me” Congrats, you've played yourself.
  • @LtdResources
    This hacker just reminds me of the con when they say your computer is infected, no threat unless you are dumb. Not a hacker.
  • Loved the Kitboga feature! Homie is a force of nature when it comes to pissing scammers off
  • @Sarcastican_
    We all know real hackermen are legally obligated to say "I'm in" after pressing ENTER. Therefore, this must be a double-agent hecker.
  • "I find scripts on the dark-web and replace the ip-address with your ip-address" Dude you were talking to a professional script-kiddie. Not to mention this dude only ran one script and was like "ah no open ports, your un-hackable bro"
  • @band0x1337
    There’s a lot of misinformation in this. First, you do not need a vpn to access TOR (dark web), in fact it’s discouraged. Secondly, someone grabbing your IP does not mean anything! They cannot find vulnerabilities in your network or windows and the worst they can do is DDOS you and grab your approximate location (city and state). Plus, most IPs are dynamic, which means they switch automatically, so if someone grabs your IP, it’s likely to change the next day or two anyways! I like this guy’s content, but this is packed with misinformation.
  • @sneakynova
    I watched this man go from perfectly sane to being the literal definition of insanity
  • I always love Muta appearances on other channels, a small crossover event is still a crossover event