Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Youtube Hacking Method

      Recommended Posts

      Staff

      1. Go here

      Hidden Content

        Give reaction to this post to see the hidden content.

      2. Type in the username you want to steal.

      3. Click on "Verify your identity" highlighted in blue.

      4. Enter in any email address you have access to, press continue.

      5. Where it says "Last password you remember" type in your targeted username and a set of numbers like "123".

      6. Where it says "When was the last time you were able to sign in to your Google Account?" go to the channel of your targeted username and see when their last activity was. Use this information, if the channel has no activity then type in a random date.

      7. Where it says "When did you create your Google Account?" refer to step 6. Press continue.

      8. Skip "Other Google products you use", press continue.

      9. You should see a message like "You will receive an email at the contact email address you provided once we've validated your responses (usually within a few hours)". Wait for the email to come.

      10. You will receive an email like "We received your request to recover your Google Account 'target', and we’d like to evaluate your account more closely. To continue the account recovery process, please visit: (a link will appear under this text). Click the link.

      11. Okay, here is the niche in this. The link will show you the email attached to the YouTube account. (Example:

      Hidden Content

        Give reaction to this post to see the hidden content.
      ).

      12. Now it is up to you to exploit the Email. Once you've gained access to it you can use the regular password reset steps through YouTube and the account is yours.

       

      Tips -

      1. Check to see if the Email has expired by signing up with the same Email at the providers website (Hotmail, Yahoo, AOL, etc). If this works you can go right ahead and reset the YouTube account password.

      2. Check the password reset info on the given email, in some cases you can even guess their secret password by using the DOX you get from their email.

      Share this post


      Link to post
      Share on other sites
      Guest Resorver

      I am new to this website 

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you’ll learn
              Ethical Hacking
              Linux Commands
              Kali Linux
              Creating a Secure Environment
              Footprinting
              Scanning
              Website Penetration Testing
              Wireless Cracking
              Man in the Middle Attacks
              System Hacking
              Python Programming Fundamentals
              Coding Custom Pentesting Tools
              Tips for Building a Career in Cyber Security
          Requirements
              An eager and open mind!
          Description
          If you would like to learn ethical hacking in 2020, you are going to LOVE this course! Learn ethical hacking, penetration testing, Kali Linux and Python hacking with over 28 hours of HD video tutorials! We will cover the following topics:
              How to setup a Kali Linux system
              Essential Linux system commands
              How to create a secure penetration testing environment
              Footprinting
              Scanning
              Website penetration testing
              WPA2 wireless network cracking
              Man in the middle attacks
              System hacking
              Python programming fundamentals
              Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)
              Tips for building a career in cyber security
          This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the tutorials is available within the discussion forum.
          Still not sold? Check out some of these great reviews!
          “Great course, beginner friendly. And most importantly, great instructor and great community.”
          “It’s really detailed and helps you get started well!”
          “Thank you for all the changes and all the new stuff you keep adding. I have more than a few ethical hacking courses and this is the best one, at least so far. I had my doubts when I got it due to it being so short but I am really happy that I did. Great job, keep it up!”
          Thank you for taking the time to read this and we hope to see you in the course!Who this course is for:
              Students who are interested in ethical hacking and network security.
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Options :
          1-Whois
          2-Port Scanner
          3-Ping
          4-GeoIP
          5-DNS Lookup
          6-Admin Finder
          7-Get Response Headers
          8-Reverse IP
          9-Cloudflare Bypasser

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Dorks Eye Google Hacking Dork Scraping and Searching Script
          Dorks Eye is a script I made in python 3. With this tool, you can easily find Google Dorks. Dork Eye collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google's search bots.
          Dorks Eye has tested it so far on:
              Kali Linux     Parrot Security     BlackArch     Termux This list would be expanded

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Contains:
          Black Hat Python – Python Programming For Hackers And Pentesters
          Gray Hat Python – Python Programming For Hackers And Reverse
          Hacking – Hacking Practical Guide For Beginners (Hacking With Python)
          Hacking With Python – The Ultimate Beginners Guide

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Tools Contains:
          Havij
          NetDatabaseScanner
          Open Web Spider
          Quick Web
          Site Hog
          Snippets Manager
          Spider mail
          SQL Injection
          SQL Map Project
          The Mole
          ZeroTeam ™ MD5 Password Encryptor
          Acunetix Web Vulnerability Scanner
          Advanced Deface Creator 1.3
          Anonymous DNS Extractor-2013
          Anonymous FTP Stealer
          Anonymous Text Encrypter
          Anonymous Tinypaste Uploader
          Ashiyane SQL Scanner
          Base64 Image Encoder-Decoder
          BTI Admin Page Finder v2
          BTI HTML Encoder-Decoder
          BTI Multi Site Checker
          BTI Reverse IP Domain Check v2
          ChromePasswordDecryptor
          CSS Minifier v2
          Deface Page Created
          Dork Searcher Setup v1091
          dorkinj
          DorkTools
          Eternals WebBrowser
          Explode Web Scanner
          ezDataBase_Defacer
          Fiddler Web Debugger Setup
          Gklspy
          Google URL Extractor
          Gr3eNoX LFi Exploiter
          Hacker’s Browser v2.0
          Injection Framework - Automatized Sql Injection Tool
          Iron Web application Advanced Security testing Platform
          Joomla Security Scanner
          JSQL-Injection
          Mass Dork Scanner v1.0.0.1
          Multi Vuln Checker
          nmap
          Spider mail
          SQL Exploiter Pro v2.10
          SQL Helper
          SQLI-Hunter_v1.1
          SQLI-Hunter_v1.2
          SQL-Inject-Me-master
          sqlmap_win_v01
          sqlmap-0.9
          sqlninja-0.2.6-r1
          SQLSentinel_v_0.3
          Surf Excuse
          Survey Bypasser
          Tiny URL Shortener
          Vulcan Cleaner
          Vuln Hunter
          vulnerability master
          wapiti-2.3.0-win32-standalone
          Warbot VersaoSQL Tool v1.0 Alpha Build 6
          Web Source Tools
          WebCruiser
          WebCruiserPro
          Websecurity Scanner 0.9
          Website Blocker v2
          WebSurgery-Setup-1.1.1
          XCodeExploitScannerSept
          xSQL SCanner
          Size: 141MB
          Download: Free for Users PRIV8