Skip to player
Skip to main content
Skip to footer
Search
Connect
Watch fullscreen
Like
Bookmark
Share
Add to Playlist
Report
What can hackers access on laptops and phone
Hacker_Glenn
Follow
9/24/2024
Facebook: https://www.facebook.com/HackerGlenn
Merch: https://www.teepublic.com/stores/hackerglenn
Youtube: https://www.youtube.com/channel/UCTYIZU_5Pg5rTcqJCt9AQHA
Instagram:
https://www.instagram.com/hacker_glenn/
Tiktok:https://www.tiktok.com/@hacker_glenn
Backup Tiktok: https://www.tiktok.com/@hackerglennbackup
ello:
https://ello.co/hackerglenn
Category
📚
Learning
Transcript
Display full video transcript
00:00
so I actually got a very good question what can hackers access on your phone
00:05
and on your computer so let's get into this so let's say we got a virus in
00:11
there right we already can see all the files and download all the files that
00:15
you have so that's the first step now I actually made a little video a long time
00:20
ago talking about this so here's a great example kind of new but of course I
00:25
wouldn't tell you guys something unless I knew what I was talking about so doing
00:28
this you see malwarebytes is right here oh crap wrong folder activate my back
00:37
door go back over here it's right here download text.txt see that seeing the
00:51
file to where it's not here once I hit download that was successful and that
00:58
was right here
01:01
so that is just a classic example as I said that was one of the older videos I
01:06
made on my tik-tok but it still reigns true even more today so we have a virus
01:11
in that computer we have access to all of your files so that little black
01:15
screen that comes up when someone troubleshoots that black screen allows
01:19
us to move through the computer in a different way than you would you click
01:24
on you know folders and everything we just change directories make
01:28
directories upload something download something change passwords everything
01:33
from that prompt that prompt is very powerful so we pretty much gain access
01:37
to that we control your entire computer the next thing is your browser we have
01:42
access to your browser history so any porn sites as you visited anything that
01:47
you don't want anybody to see we have access to it and we can use that to
01:51
blackmail you now to poke someone browser I'll make a video about that
01:56
later on now the next thing we have access to your bank account and finances
02:00
because normally you people like to keep your password on your computer so we'll
02:06
have access to that we'll be able to view all the passwords that are saved on
02:11
there for one we're gonna download all the files on your computer we're gonna
02:15
check the normal spots downloads desktop temp videos pictures such like
02:23
that next up is pictures any of those illicit photos that you don't want
02:27
anyone to see we'll be able to have access to that and we'll blackmail you
02:31
we'll have access to your email because we can actually open up remote desktop
02:36
protocol on your computer and move through that computer the same way how
02:41
you would now next up is your camera system because we're on the computer a
02:47
lot of times you all like to autofill passwords so I'm in your computer I
02:51
opened up Chrome not using a black screen I can't open up Chrome using the
02:56
black screen of course but use the remote desktop protocol I'm on your
02:59
computer open up your camera system and now I'm able to see all throughout your
03:04
home so that means that I have a recording of people taking showers I
03:08
recording people walking through the house naked I have the recordings of
03:11
everything your whole life I'm able to see and guess what I can just put it out
03:16
there online cuz I can blackmail you hey I got a picture of you cheating on your
03:20
husband either you give me $10,000 or I'm gonna ruin your marriage that's
03:25
another thing we have access to other IOT devices IOT thermostats IOT stove
03:32
IOT refrigerator we have access to that because IOT devices operate off of an
03:38
app on your phone a lot of them you're gonna use a user interface on the
03:43
computer because it's autofilled we can go in there with a thermometer I can
03:47
turn the temperature up to a hundred degrees give someone a heat stroke or I
03:52
can turn the temperature down to below zero and somebody could freeze to death
03:55
that's something else we have access to your ring doorbell system as well we can
04:01
turn that off so let's say if a hacker wants to blackhead hacker wants to get
04:05
into your house we don't want to get recorded we'll turn off your ring
04:09
doorbell run up in there with some guns and then make you give us whatever you
04:13
know we need it could be administrative password to an account that has three
04:17
million dollars in it it could be anything but that's another thing we
04:21
could do now I'm gonna throw this out there you probably think about this your
04:25
social media accounts as well so your Facebook YouTube Instagram tik-tok
04:30
Twitter will have access to all of that mainly because a two-factor
04:33
authentication will be able to hack now of course you have sim spoofing but when
04:37
we're on that computer another form of two-factor authentication is the sense
04:42
of it to an email so I can have two-factor authentication sent to your
04:46
email that I also have control over since I have control of your account and
04:50
get into your well social media account and guess what you're not gonna know
04:54
because I didn't choose to send the two-factor authentication to your phone
04:58
now of course you know we're gonna have access to your router and switch let's
05:02
say if you have a firewall we can have access to that run an exploit gain
05:06
access to that firewall and turn off a lot of rules that you have set up so we
05:10
can send in transmissions now in let's say your router for example I can change
05:16
your DNS to a mine so that's man-in-the-middle attack so I can
05:20
constantly see everything that's going through your network then I can also
05:23
have it to where once you open up a video or a file on there it opens up a
05:27
virus or ransomware so we have access to your entire life
Recommended
3:38
|
Up next
What Can Hackers Access on Your phone
Hacker_Glenn
9/30/2024
2:46
How to Start Hacking Computers and systems
Hacker_Glenn
11/5/2024
3:13
Can Your Phone get Hacked from Going on a Website
Hacker_Glenn
10/22/2024
3:49
How to get hacked easily with social engineering
Hacker_Glenn
9/22/2024
3:17
How to Know your Phone is Hacked
Hacker_Glenn
10/9/2024
4:21
How you Get hacked From clicking on a link
Hacker_Glenn
9/29/2024
3:27
How Hackers get Your IP address on Xbox and Playstation
Hacker_Glenn
10/7/2024
4:21
How to know your email got hacked
Hacker_Glenn
9/29/2024
3:43
Having a Virus on your computer Camera Turning on
Hacker_Glenn
10/2/2024
4:32
Hacking an Alexa and Seeing People in Their Homes
Hacker_Glenn
10/6/2024
3:54
How to know you have a Virus on Your Computer
Hacker_Glenn
10/4/2024
3:48
Flipper Zero Hacks Controlling Computers Going to Scam Sites (Educational Purposes only)
Hacker_Glenn
11/3/2024
2:44
Most Common Places To Get Hacked #hacking #hackedagain #hackernews #trend #trending #trendingnow #hackerspace #computerhacking #phonehacking #cybersecurity
Hacker_Glenn
11/4/2024
3:00
Flipper Zero Using Keyloggers to Help your Business Grow
Hacker_Glenn
10/31/2024
3:05
Flipper Zero Hacks Used in School (educational Purposes Only)
Hacker_Glenn
11/2/2024
3:59
Devices More Powerful Than The Flipper Zero: Wifi Pineapple Hacking
Hacker_Glenn
11/4/2024
3:21
Ways People Did the Cash App Money Glitch
Hacker_Glenn
10/18/2024
7:12
Life of a Real-life hacker_ Devices more powerful than the Flipper Zero_ Omg Plug
Hacker_Glenn
9/5/2024
1:45
Jailbreaking the iPhone 16
Hacker_Glenn
9/11/2024
2:52
Hacking the iPhone 16, Can the iPhone 16 get hacked #iphone15promax #iphone16promax #iphone16pro
Hacker_Glenn
9/11/2024
2:15
Hackers in the Hood #hacking #Hacker #flipperzero #hackingcomputers #hackingrobots #fantasy #hack #hacks #trendingsongs #trendingreels #trendingreels2024 #hood #hoodcomedy #trendingnow #howto #computerscience #blackpeople #trendingnow
Hacker_Glenn
11/23/2024
2:17
How Hackers Could Beat The Power Rangers #hacking #hacker #flipperzero #powerrangers #hackingcomputers #hackingrobots #fantasy #hack #hacks #trend #trendingreels #trending #trendingnow #howto #computers #computerscience
Hacker_Glenn
11/23/2024
2:47
Devices More Powerful Than The Flipper Zero: Rubber Ducky Hacking
Hacker_Glenn
11/22/2024
2:25
How to Hack the Tesla 1X Robots with Nmap (Educational Purposes only)
Hacker_Glenn
11/22/2024
3:29
How Hackers Could Stop Independence Day in 20 Minutes
Hacker_Glenn
11/21/2024