Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Youtube Hacking Method

      Recommended Posts

      Staff

      1. Go here

      Hidden Content

        Give reaction to this post to see the hidden content.

      2. Type in the username you want to steal.

      3. Click on "Verify your identity" highlighted in blue.

      4. Enter in any email address you have access to, press continue.

      5. Where it says "Last password you remember" type in your targeted username and a set of numbers like "123".

      6. Where it says "When was the last time you were able to sign in to your Google Account?" go to the channel of your targeted username and see when their last activity was. Use this information, if the channel has no activity then type in a random date.

      7. Where it says "When did you create your Google Account?" refer to step 6. Press continue.

      8. Skip "Other Google products you use", press continue.

      9. You should see a message like "You will receive an email at the contact email address you provided once we've validated your responses (usually within a few hours)". Wait for the email to come.

      10. You will receive an email like "We received your request to recover your Google Account 'target', and we’d like to evaluate your account more closely. To continue the account recovery process, please visit: (a link will appear under this text). Click the link.

      11. Okay, here is the niche in this. The link will show you the email attached to the YouTube account. (Example:

      Hidden Content

        Give reaction to this post to see the hidden content.
      ).

      12. Now it is up to you to exploit the Email. Once you've gained access to it you can use the regular password reset steps through YouTube and the account is yours.

       

      Tips -

      1. Check to see if the Email has expired by signing up with the same Email at the providers website (Hotmail, Yahoo, AOL, etc). If this works you can go right ahead and reset the YouTube account password.

      2. Check the password reset info on the given email, in some cases you can even guess their secret password by using the DOX you get from their email.

      Share this post


      Link to post
      Share on other sites
      Guest Resorver

      I am new to this website 

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              What Raspberry Pi
              Where To Buy In Cheap Price
              Setup Raspberry Pi as Portable Hacking Machine
              WIFI Network Jamming
              Protect Your WiFi From Jamming
              WiFi Password Hacking
              Protect Your WiFi Password From Hacking
          Requirements
              Basic Computer & IT Skills
              PC/Laptop/Mobile
              Raspberry Pi and Accesories
              Hacking Attitude
          Description
          In this WiFi Hacking with Raspberry Pi - Black Hat Hackers Special! course, I will teach you how to setup raspberry pi for various type of wifi hacking technics and DIY projects which are used by black hat hackers and ethical hackers too. I designed this course in such a manner that you can easily learn from this course even if you don’t have any previous knowledge about raspberry pi or hacking.
          I can assure you from this course you will learn something new that no one will teach you in any other course. So, Click on Enroll to join this course and start learning how to hack with raspberry pi.
          This course is designed for beginners and professionals, if you are a beginner you want to start from zero or if you are a professional and want to improve your hacking skills so this course will increase your knowledge about hacking.
          In this course, you'll learn how the Black Hat Hackers use the Raspberry Pi to perform various advanced hacking techniques to hack any wifi password no matter it's using any types of security  WEP/WPA/WPA2 Wi-Fi encryption key and also you will learn jamming any wifi connection and disconnect any device from any wifi using the Raspberry Pi.
          Notice: This course is only for educational purposes and all the attacks that have been carried out are in my own Penetration testing lab and against my own devices. Do not perform any hacks on other people's networks if you don't have permission to do so. I will not be responsible for your actions,
          Who this course is for:
              Anyone Who Wants To Become an Ethical Hacker, Penetration Tester or Black Hat Hackers
              Anyone Who Wants To Learn Hacking Using Raspberry Pi Like Black Hat Hackers
              Anyone Who Wants To Learn How To Hack WiFi Passwords Like Black Hat Hackers
              Anyone Who Wants To Learn How To Jam WiFi Like Black Hat Hackers
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Understanding of RFID
              Use of RFID related hardware
              How to clone LF RFID tag
              How to crack HF Mifare Classic Encryption Key
          Requirements
              Basic Linux command and installation
          Description
          RFID is an acronym for ‘radio frequency identification’ and refers to a technology whereby digital data encoded in RFID tags or smart labels captured by reader via radio waves.
          In this course, students will learn the vulnerability of RFID and take this opportunity to know the secret of the tags.  Students will know how to clone the different types of RFID tag for analysis or even pentesting.
          Disclaimer:
          Hardware Ninja is an official reseller of the ProxGrind products from Sneak Technology including Proxmark 3, ChameleonMini/Tiny and grants approval by RRG International Limited to delivery official training using their products.
          Who this course is for:
          Hardware Analyst and Pentester


          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              A much higher skill level as a pentester or a hacker.
              Be able to pentest any network.
              Help in preparation for the OSCP exam.
              Using manual hacks as opposed to automated tools.

          Requirements
              Intermediate expertise with pentesting or hacking.
              Completion of 'Ethical Hacking Using Hands on Training' or any ethical hacking course is a plus.
              Comfortable using the Linux command line interface (CLI).
              Comfortable learning bits of programming code such as Python and PHP.
              Comfortable creating virtual machines.
              Hardware and software capable of handling virtualization.
              Comfortable with the English language.
          Description
          Welcome to Ethical Hacking - Capture the Flag Walkthroughs v2!
          If you're like me, you can't get enough information on pentesting/hacking techniques. We want more, more, more!
          This course picks up where v1 left off using all-new capture the flag exercises,  all new step-by-step video tutorials, and hands-on labs.
          You've taken enough ethical hacking courses. You know about the different pentesting tools but you're just not quite sure how to use them in a real-world pentest.  Congratulations! You came to the right course!
          Using the hacking methodology, this course will teach you how to use pentesting tools to enumerate and gain root access. Throughout the course, you will learn the different attack vectors used to exploit a target.
          You'll learn Python, PHP scripting and tricks of the trade that will astound you!
          This is not a course for beginners, bug hunters or wanna-be script kiddies. Anyone enrolling should have a good command of the Linux terminal and be able to follow written step-by-step instructions. Each step of every capture the flag exercise is covered in a video tutorial.
          You've taken the ethical hacking courses, you've been introduced to the tools and the methodology. This course brings it all together showing students how to perform an actual pentest and gain root access.
          Students step through each of the Capture the Flags (CTF) walkthroughs learning how to footprint a target, enumerate the target for possible vulnerabilities, analyze the vulnerabilities and exploit the target to gain root access. Each CTF demonstrates the advance techniques and different attack vectors used by professional pentesters and hackers.
          Students having completed the Syberoffense Ethical Hacking course can now put to use what they have learned. You've seen the tools, heard all the war stories, now learn to hack like you've been wanting to.
          Don't cheat yourself! Check out the free preview of the first module of the course. Students have a lifetime of access and more CTF exercises will be added over time.
           
          Who this course is for:
              Those wanting to see the pentesting tools and hacking methodology being used.
              This course is not for those new to ethical hacking.
              Those wanting to be learn advance pentesting/hacking techniques.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              A much higher skill level as a pentester or a hacker.
              Ability to better pentest networks.
              Basic tools and techniques in vulnerability assessment and exploitation
              Understanding the hackers methodology
              Using understanding of penetration testing process and life-cycle
          Requirements
              MAC or PC capable of handling virtualizatio
              At least 4 GB of RAM (8 GB Preferred)
              Completion of 'Ethical Hacking Using Hands on Training' or any ethical hacking course (recommended).
              Comfortable using the Linux command line interface (CLI).
              Comfortable learning bits of programming code such as Python and PHP.
              Comfortable creating virtual machines.
              Comfortable with the English langauge.
          Description
          You've taken enough ethical hacking courses. You know about the  different pentesting tools but you're just not quite sure how to use  them in a real-world pentest.
          Congratulations! You came to the right course!
          Students  having completed the Syberoffense Ethical Hacking course can now put to  use what they have learned. You've seen the tools, heard all the war  stories, now learn to hack as you've always wanted to.
          Using  the hacking methodology, this course will teach you how to use those  pentesting tools to enumerate and gain root access. Over the span of the  course, you will learn the different attack vectors used to exploit a  target.
          You'll learn Python, PHP scripting and tricks of the trade that will astound you!
          This  is not a course for beginners, bug hunters or wanna-be script kiddies.  Anyone enrolling should have a good command of the Linux terminal and be  able to follow written step-by-step instructions. Each step of every  capture the flag exercise is covered in a video tutorial.
          You've  taken the ethical hacking courses, you've been introduced to the tools  and the methodology. This course brings it all together showing students  how to perform an actual pentest and gain root access.
          Students  step through each of the Capture the Flags (CTF) walkthroughs learning  how to footprint a target, enumerate the target for possible  vulnerabilities, analyze the vulnerabilities and exploit the target to  gain root access. Each CTF demonstrates the advanced techniques and  different attack vectors used by professional pentesters and hackers.
          Students  having completed the Syberoffense Ethical Hacking course can now put to  use what they have learned. You've seen the tools, heard all the war  stories, now learn to hack like you've been wanting to.
          Don't  cheat yourself! Check out the free preview of the first module of the  course. Students have a lifetime a access and more CTF exercises will be  added over time.
          Who this course is for:
              Those wanting to see the pentesting tools and hacking methodology being used.
              Those wanting to be learn advance pentesting/hacking techniques.
              This course is not for those new to ethical hacking.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              95+ ethical hacking &security video lectures.
              Start from 0 to become pro hacker.
              Learn ethical hacking & the different types of hackers.
              Learn to install a hacking lab & needed softwares.
              Learn kali linux commands and basics of using terminal.
              Basic to adnvance Ethical hacking.
              Hack and secure server and client operating system.
              Create undetecable backdoors.
              Learn to secure and protect any network from hackers and loss of data.
              step by step instructions for instalation of virtual boc and creating your virtual environment.
              Learn basics of website and its technology.
              what is websitre and its components.
              Gathering information about website like black hat hackers do.
              learn to crack wifi password of any security level WEP,WPA,WPA2.
              World class tools for gatting best results.
              All the attacks are performed live.

          Requirements
              Internet Connection & Computer (minimum 4gb RAM or more).
              Basic computer skill.
              Wireless networking card.
          Description
          Welcome to Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:Z
          This Ethical Hacking tutorial provides basic and advanced concepts of Ethical Hacking. Our Ethical Hacking tutorial is developed for beginners and professionals.
          Ethical hacking tutorial covers all the aspects associated with hacking. Firstly, we will learn how to install the needed software. After this, we will learn the 4 type of penetration testing section which is network hacking, gaining access, post exploitation, website hacking.
          In network hacking section, we will learn how networks work, how to crack Wi-Fi keys and gain access the Wi-Fi networks. In Gaining access section, we will learn how to gain access to the servers and personal computers. In the post-exploitation section, we will learn what can we do with the access that we gained in the previous section. So we learn how to interact with the file system, how to execute a system command, how to open the webcam. In the website hacking section, we will learn how the website works, how to gather comprehensive information about website. In the end, we will learn how to secure our system from the discussed attacks.
          The course is divided into four main sections so let's see what we are going to learn:
          Network Penetration Testing
          Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works.
          Gaining access
          Gaining access attack is the second part of the network penetration testing. In this section, we will connect to the network. This will allow us to launch more powerful attacks and get more accurate information. If a network doesn't use encryption, we can just connect to it and sniff out unencrypted data. If a network is wired, we can use a cable and connect to it, perhaps through changing our MAC address. The only problem is when the target use encryption like WEP, WPA, WPA2. If we do encounter encrypted data, we need to know the key to decrypt it, that's the main purpose of this section.
          Post-Connection Attacks
          All the attacks that we performed in the pre-connection and gaining access section, we weren't connected to a network. In this section, we are going to be talking about post-connection attack that means the attacks that we can do after connecting to the network. Now, it doesn't matter that the network is a wireless or a wired network and it doesn't matter that the target was using the WEP or WPA key, we can launch all of the attacks that we're going to talk about in this section.
          Website / Web Application Hacking
          In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the  dangerous vulnerabilities to hack into websites.
          Who this course is for:
              Anyone interested in learning ethical hacking
              Anyone interested in  how hackers hack computer systems
              Anyone interested in  how to secure systems from hackers
          Notes:
              This course is created for educational purposes only, all the attacks are launched in my own lab or against systems that I have permission to test.
          Who this course is for:
              ethical hacker
              cyber security
              penetration testing
              network penetration testing
              python developer
              programmer
              coder
              data science
              web developer
              port programmer
              computer network
              hacker
              computer fundamentals
              it skill
              computer skill
              network hacking

          Hidden Content
          Give reaction to this post to see the hidden content. Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.