Skip to player
Skip to main content
Skip to footer
Search
Connect
Watch fullscreen
Like
Comments
Bookmark
Share
Add to Playlist
Report
What can hackers access on laptops and phone
Hacker_Glenn
Follow
9/24/2024
Facebook: https://www.facebook.com/HackerGlenn
Merch: https://www.teepublic.com/stores/hackerglenn
Youtube: https://www.youtube.com/channel/UCTYIZU_5Pg5rTcqJCt9AQHA
Instagram:
https://www.instagram.com/hacker_glenn/
Tiktok:https://www.tiktok.com/@hacker_glenn
Backup Tiktok: https://www.tiktok.com/@hackerglennbackup
ello:
https://ello.co/hackerglenn
Category
📚
Learning
Transcript
Display full video transcript
00:00
so I actually got a very good question what can hackers access on your phone
00:05
and on your computer so let's get into this so let's say we got a virus in
00:11
there right we already can see all the files and download all the files that
00:15
you have so that's the first step now I actually made a little video a long time
00:20
ago talking about this so here's a great example kind of new but of course I
00:25
wouldn't tell you guys something unless I knew what I was talking about so doing
00:28
this you see malwarebytes is right here oh crap wrong folder activate my back
00:37
door go back over here it's right here download text.txt see that seeing the
00:51
file to where it's not here once I hit download that was successful and that
00:58
was right here
01:01
so that is just a classic example as I said that was one of the older videos I
01:06
made on my tik-tok but it still reigns true even more today so we have a virus
01:11
in that computer we have access to all of your files so that little black
01:15
screen that comes up when someone troubleshoots that black screen allows
01:19
us to move through the computer in a different way than you would you click
01:24
on you know folders and everything we just change directories make
01:28
directories upload something download something change passwords everything
01:33
from that prompt that prompt is very powerful so we pretty much gain access
01:37
to that we control your entire computer the next thing is your browser we have
01:42
access to your browser history so any porn sites as you visited anything that
01:47
you don't want anybody to see we have access to it and we can use that to
01:51
blackmail you now to poke someone browser I'll make a video about that
01:56
later on now the next thing we have access to your bank account and finances
02:00
because normally you people like to keep your password on your computer so we'll
02:06
have access to that we'll be able to view all the passwords that are saved on
02:11
there for one we're gonna download all the files on your computer we're gonna
02:15
check the normal spots downloads desktop temp videos pictures such like
02:23
that next up is pictures any of those illicit photos that you don't want
02:27
anyone to see we'll be able to have access to that and we'll blackmail you
02:31
we'll have access to your email because we can actually open up remote desktop
02:36
protocol on your computer and move through that computer the same way how
02:41
you would now next up is your camera system because we're on the computer a
02:47
lot of times you all like to autofill passwords so I'm in your computer I
02:51
opened up Chrome not using a black screen I can't open up Chrome using the
02:56
black screen of course but use the remote desktop protocol I'm on your
02:59
computer open up your camera system and now I'm able to see all throughout your
03:04
home so that means that I have a recording of people taking showers I
03:08
recording people walking through the house naked I have the recordings of
03:11
everything your whole life I'm able to see and guess what I can just put it out
03:16
there online cuz I can blackmail you hey I got a picture of you cheating on your
03:20
husband either you give me $10,000 or I'm gonna ruin your marriage that's
03:25
another thing we have access to other IOT devices IOT thermostats IOT stove
03:32
IOT refrigerator we have access to that because IOT devices operate off of an
03:38
app on your phone a lot of them you're gonna use a user interface on the
03:43
computer because it's autofilled we can go in there with a thermometer I can
03:47
turn the temperature up to a hundred degrees give someone a heat stroke or I
03:52
can turn the temperature down to below zero and somebody could freeze to death
03:55
that's something else we have access to your ring doorbell system as well we can
04:01
turn that off so let's say if a hacker wants to blackhead hacker wants to get
04:05
into your house we don't want to get recorded we'll turn off your ring
04:09
doorbell run up in there with some guns and then make you give us whatever you
04:13
know we need it could be administrative password to an account that has three
04:17
million dollars in it it could be anything but that's another thing we
04:21
could do now I'm gonna throw this out there you probably think about this your
04:25
social media accounts as well so your Facebook YouTube Instagram tik-tok
04:30
Twitter will have access to all of that mainly because a two-factor
04:33
authentication will be able to hack now of course you have sim spoofing but when
04:37
we're on that computer another form of two-factor authentication is the sense
04:42
of it to an email so I can have two-factor authentication sent to your
04:46
email that I also have control over since I have control of your account and
04:50
get into your well social media account and guess what you're not gonna know
04:54
because I didn't choose to send the two-factor authentication to your phone
04:58
now of course you know we're gonna have access to your router and switch let's
05:02
say if you have a firewall we can have access to that run an exploit gain
05:06
access to that firewall and turn off a lot of rules that you have set up so we
05:10
can send in transmissions now in let's say your router for example I can change
05:16
your DNS to a mine so that's man-in-the-middle attack so I can
05:20
constantly see everything that's going through your network then I can also
05:23
have it to where once you open up a video or a file on there it opens up a
05:27
virus or ransomware so we have access to your entire life
Recommended
3:38
|
Up next
What Can Hackers Access on Your phone
Hacker_Glenn
9/30/2024
2:46
How to Start Hacking Computers and systems
Hacker_Glenn
11/5/2024
3:13
Can Your Phone get Hacked from Going on a Website
Hacker_Glenn
10/22/2024
3:49
How to get hacked easily with social engineering
Hacker_Glenn
9/22/2024
3:17
How to Know your Phone is Hacked
Hacker_Glenn
10/9/2024
4:21
How you Get hacked From clicking on a link
Hacker_Glenn
9/29/2024
3:27
How Hackers get Your IP address on Xbox and Playstation
Hacker_Glenn
10/7/2024
4:21
How to know your email got hacked
Hacker_Glenn
9/29/2024
3:43
Having a Virus on your computer Camera Turning on
Hacker_Glenn
10/2/2024
4:32
Hacking an Alexa and Seeing People in Their Homes
Hacker_Glenn
10/6/2024
3:54
How to know you have a Virus on Your Computer
Hacker_Glenn
10/4/2024
3:48
Flipper Zero Hacks Controlling Computers Going to Scam Sites (Educational Purposes only)
Hacker_Glenn
11/3/2024
2:44
Most Common Places To Get Hacked #hacking #hackedagain #hackernews #trend #trending #trendingnow #hackerspace #computerhacking #phonehacking #cybersecurity
Hacker_Glenn
11/4/2024
3:00
Flipper Zero Using Keyloggers to Help your Business Grow
Hacker_Glenn
10/31/2024
3:05
Flipper Zero Hacks Used in School (educational Purposes Only)
Hacker_Glenn
11/2/2024
3:59
Devices More Powerful Than The Flipper Zero: Wifi Pineapple Hacking
Hacker_Glenn
11/4/2024
3:21
Ways People Did the Cash App Money Glitch
Hacker_Glenn
10/18/2024
7:12
Life of a Real-life hacker_ Devices more powerful than the Flipper Zero_ Omg Plug
Hacker_Glenn
9/5/2024
1:45
Jailbreaking the iPhone 16
Hacker_Glenn
9/11/2024
2:52
Hacking the iPhone 16, Can the iPhone 16 get hacked #iphone15promax #iphone16promax #iphone16pro
Hacker_Glenn
9/11/2024
2:15
Hackers in the Hood #hacking #Hacker #flipperzero #hackingcomputers #hackingrobots #fantasy #hack #hacks #trendingsongs #trendingreels #trendingreels2024 #hood #hoodcomedy #trendingnow #howto #computerscience #blackpeople #trendingnow
Hacker_Glenn
11/23/2024
2:17
How Hackers Could Beat The Power Rangers #hacking #hacker #flipperzero #powerrangers #hackingcomputers #hackingrobots #fantasy #hack #hacks #trend #trendingreels #trending #trendingnow #howto #computers #computerscience
Hacker_Glenn
11/23/2024
2:47
Devices More Powerful Than The Flipper Zero: Rubber Ducky Hacking
Hacker_Glenn
11/22/2024
2:25
How to Hack the Tesla 1X Robots with Nmap (Educational Purposes only)
Hacker_Glenn
11/22/2024
3:29
How Hackers Could Stop Independence Day in 20 Minutes
Hacker_Glenn
11/21/2024