Skip to player
Skip to main content
Search
Connect
Watch fullscreen
Like
Bookmark
Share
More
Add to Playlist
Report
What Can Hackers Access on Your phone
Hacker_Glenn
Follow
1 year ago
Facebook: https://www.facebook.com/HackerGlenn
Merch: https://www.teepublic.com/stores/hackerglenn
Youtube: https://www.youtube.com/channel/UCTYIZU_5Pg5rTcqJCt9AQHA
Instagram:
https://www.instagram.com/hacker_glenn/
Tiktok:https://www.tiktok.com/@hacker_glenn
Backup Tiktok: https://www.tiktok.com/@hackerglennbackup
ello:
https://ello.co/hackerglenn
Category
📚
Learning
Transcript
Display full video transcript
00:00
what's going on everybody this is Hacker Glenn here so we're gonna be talking
00:03
about how hackers pretty much we get into your iPhones we blackmail you we
00:08
fuck that shit up destroy your life all over just that little device in your
00:12
pocket let's get into this now for one normally how we would hack phones would
00:17
be from a disk and we'll get an IP address from it then we'll you know see
00:22
technologies on it and try to break into it that way now let's say we have the
00:26
actual physical phone in our hand we'll try to brute force it we'll plug in a
00:31
rubber ducky or something that can pretty much continually run a script
00:35
over and over again saying try these numbers try these numbers until we
00:39
eventually get in another thing we could do you know we steal your phone we can
00:43
plug it into our computer we can run exploits and bypass authentication like
00:48
literally if a hacker has your phone guarantee you they have bypassed it
00:52
guarantee you just because we don't know your pattern or your combination
00:56
doesn't mean shit we'll have software exploits that could break through all
01:00
that bullshit that we can get in there and get what we need now once we get
01:04
into that phone then we could do whatever we need to whether it's grab
01:08
pictures to blackmail you with because you all take some pretty illicit
01:12
pictures on those phones that you won't upload over online like my personal
01:17
opinion if you really want to blackmail somebody you got to get their phone get
01:21
that phone I guarantee you're gonna find something always now while we're
01:28
actually in the phone let's say we go through the other method where we ran
01:31
scans and then we got in there from port scanning now once I'm in there of course
01:37
we're gonna want to go to your camera but before anything I'm gonna want to
01:41
jailbreak that device the reason why I'm gonna jailbreak it is so I have full
01:45
administrative control over that device see all your phones are not in
01:50
administrative mode they're in customer mode administrative mode is pretty much
01:54
I can change the boot load up like that little image that you see or that video
01:59
that you see those applications that you cannot get rid of that's because you're
02:03
in customer mode in administrative mode I can install anything on there I can
02:07
install something on there to send out transmissions I can make yourself a
02:11
botnet I can do that because once I jailbreak it I pretty much brought down
02:16
all the defenses of that phone because normally if you try to run an exploit on
02:20
a phone a lot of times it won't run because you don't have permission and
02:24
that's one of the reasons why they don't give you pseudo or administrative
02:29
permissions on these phones so I'll do that I'll run up your data yeah because
02:34
there's a lot of data is gonna be sent back from me running scripts gaining
02:38
information so while I'm actually on your phone right now I can do something
02:43
called pivoting where I pivot from that IP address into another one and run
02:48
exploits on other devices in your house so I'm in your phone I got all this stuff
02:52
to blackmail you I got your private pictures your text messages your
02:56
address book I'll also send a text message from your phone to your friend
03:00
saying hey it's an emergency click on this link because I need you to bail me
03:04
out of jail or anything they'll click on that they'll give me their IP address
03:08
now it's another device for me to hack so off of your one phone I'll probably
03:13
have about 50 to 60 victims and they'll all think it's coming from you they'll
03:17
blame you ruin your life I got private information like pictures of you cheating
03:22
or just new pictures now I'm gonna blackmail you so you can continue to pay
03:26
me money pretty much I don't ruin your whole life just from me gaining access
03:31
to that little device in your pocket hack the planet Joker hacker so deaf
Be the first to comment
Add your comment
Recommended
5:35
|
Up next
What can hackers access on laptops and phone
Hacker_Glenn
1 year ago
3:13
Can Your Phone get Hacked from Going on a Website
Hacker_Glenn
1 year ago
3:17
How to Know your Phone is Hacked
Hacker_Glenn
1 year ago
3:49
How to get hacked easily with social engineering
Hacker_Glenn
1 year ago
4:21
How you Get hacked From clicking on a link
Hacker_Glenn
1 year ago
2:46
How to Start Hacking Computers and systems
Hacker_Glenn
1 year ago
4:21
How to know your email got hacked
Hacker_Glenn
1 year ago
3:27
How Hackers get Your IP address on Xbox and Playstation
Hacker_Glenn
1 year ago
4:32
Hacking an Alexa and Seeing People in Their Homes
Hacker_Glenn
1 year ago
3:43
Having a Virus on your computer Camera Turning on
Hacker_Glenn
1 year ago
3:54
How to know you have a Virus on Your Computer
Hacker_Glenn
1 year ago
3:00
Flipper Zero Using Keyloggers to Help your Business Grow
Hacker_Glenn
1 year ago
2:44
Most Common Places To Get Hacked #hacking #hackedagain #hackernews #trend #trending #trendingnow #hackerspace #computerhacking #phonehacking #cybersecurity
Hacker_Glenn
1 year ago
3:48
Flipper Zero Hacks Controlling Computers Going to Scam Sites (Educational Purposes only)
Hacker_Glenn
1 year ago
3:05
Flipper Zero Hacks Used in School (educational Purposes Only)
Hacker_Glenn
1 year ago
3:59
Devices More Powerful Than The Flipper Zero: Wifi Pineapple Hacking
Hacker_Glenn
1 year ago
3:21
Ways People Did the Cash App Money Glitch
Hacker_Glenn
1 year ago
2:15
Hackers in the Hood #hacking #Hacker #flipperzero #hackingcomputers #hackingrobots #fantasy #hack #hacks #trendingsongs #trendingreels #trendingreels2024 #hood #hoodcomedy #trendingnow #howto #computerscience #blackpeople #trendingnow
Hacker_Glenn
1 year ago
2:17
How Hackers Could Beat The Power Rangers #hacking #hacker #flipperzero #powerrangers #hackingcomputers #hackingrobots #fantasy #hack #hacks #trend #trendingreels #trending #trendingnow #howto #computers #computerscience
Hacker_Glenn
1 year ago
2:47
Devices More Powerful Than The Flipper Zero: Rubber Ducky Hacking
Hacker_Glenn
1 year ago
2:25
How to Hack the Tesla 1X Robots with Nmap (Educational Purposes only)
Hacker_Glenn
1 year ago
3:29
How Hackers Could Stop Independence Day in 20 Minutes
Hacker_Glenn
1 year ago
3:04
Hacking Tesla 1X Robots: Shell Code Hacking (Educational Purposes only) #hack #hackerspace #hacking #hackingtools #hackerman #hacks #lifehacks #ethicalhacker #tesla #teslarobots #1x #1xbet#1xrobot #robotics #trendingreelsvideo #trendingnow #trendingpost #
Hacker_Glenn
1 year ago
2:13
Hacking Tesla 1X Robots With Buffer Overflow #hacking #hackingtool #hackers #hack #hacks #trendingsongs #trendingreels #trendingreelsvideo #tesla #teslarobot #1xbet #1xbetregistration #bufferoverflow #malware
Hacker_Glenn
1 year ago
2:25
How to Hack the Tesla Robot 1X #hacking #hackingtool #trendingnow #trendingreels2024 #trendingreels #hackerman #hacks #robot #Robotics #robots #trendingnow #hack #1xbet
Hacker_Glenn
1 year ago
Be the first to comment