Cybercrime is Not Hacking!
In the news, cybercrime is often mentioned in connection to "hacking". Also when accounts get stolen, people say "my account got hacked". But is this really hacking? How does cybercrime actually look like?
LiveOverfont (advertisement): shop.liveoverflow.com
Protect yourself from phishing: • Crazy Steam Phishing Page
Checkout some hacking videos:
Total beginner: • The Secret step-by-ste...
Boomer Gamers: • Researching MissingNo ...
Zoomer Gamers: • I Spent 100 Days Hacki...
Developers: • How Docker Works - Int...
Bughunters: • Good vs. Bad Security ...
Hackers: • Finding 0day in Apache...
Haxx0rs: • Exploiting Java Tomcat...
Chapters:
00:00 - Intro
00:34 - Site Walkthrough
01:58 - Cybercrime Organization
02:41 - The Cybercrime Recruitment Funnel
03:44 - Website Builder Services
04:45 - How the Money Flows
05:45 - Cybercrime is like a Business!
07:37 - Hacking vs. Cybercrime
09:00 - How to Learn Hacking
09:39 - Report Phishing Sites
10:02 - shop.liveoverflow.com advertisement
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
2nd Channel: / liveunderflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Streaming: twitch.tvLiveOverflow/
→ TikTok: / liveoverflow_
→ Instagram: / liveoverflow
→ Blog: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
As a red teamer, I wish our internal phishing tools were this nice.
Be the change you want to see!
LOL I was thinking the same. I've made a few automation tools in python to help build a portable attack infrastructure. Nothing this fancy though!
@@noxxum dont mind if i take a look on this tools?
wget --page-requisites is your friend 😂
Funny how the tool he was showing has a Russian interface. Being a Russian developer myself I can tell we sometimes have better internal tools compared to what we ship to clients/customers. That being said, I condemn the scammers behind it and wish they used their talents for creating the legal business instead.
Thank you for pointing out that this really ISNT hacking. It bothers me when people call cyber crime actions "hacks" because that's not what it is at all.
It's only because of media, "Massive Rockstar hack by teenager" gets more clicks than "teenager uses a re-used password to access a group chat"
Apparently editing a public Google doc is also considered "hacking" today, google news says...
Fun fact: Browsing Google results is considered "hacking" by the french law if the website's owner decides that the result was not supposed to be indexed (it is considered an "intrusion into an automated system")
@@gusfl2 to be expected, they're french after all xD
@@rpe There is also that American person, who found security numbers in a government (or school, id remember) site encoded in base64. He report it that it is unsafe, and they accused him of hacking. Anyway he is fine.
@@xrafter I know about this, but let's forget about the details for a bit to consider that "hacking" someone without harm and then sharing the details with the subject of a "hack" is more security research than hacking and should be rewarded... It's not like picking a front door lock and filming someone naked just to tell the to change the lock.
This is a very cool to new flair to get into on your channel; awesome work :)
hi
@@appie776 🤣 ikr, i just watched kali purole and then i saw this video... now he is here
As a dude who hates the term "my account got hacked", this really hits hard with my opinion on this, brilliant video!
As someone who combats this on the daily, This is such a good video, really informative. Thanks for this video LiveOverflow ♥
@@hello-iw9pd Such sweeping blanket statements are only good for intellectually lazy jokes, but I don't see anything here granting that joke.
This isn't 'hacking'. This is social engineering. (as far as your example) But, people think that no matter what what crime, if it has to do with a computer, it's hacking.
It is just good old fraud…
Debatable, social engineering is hacking the human psyche and using the results against the intended victim. Hacking, in the general sense, is making a thing do something for which it wasn’t intended.
What about these people that are buying cheats and destroying everybody in a videogame? Do you think it's okay to call them hackers? Personally I'm always really annoyed when I see people calling them Hackers!
@@Reth_Hard The ones who buys hacks aren't hackers. You can call them cheaters or users of a mod menu. The one who made the cheat can be called hacker, modder, master. The one who makes are generally more dangerous since he is the one making the stuff, and he can pay people to use it to ruin a game, or a service. They can also make it as a service, which means they sell it to others.
@@Reth_Hard if they cheat in a game they are cheaters
I hope your move went well without issue, glad to have you back making great content as always!
Gotta love that ChatGPT prompt in the end where you told it to replace "Do X not crime" with IT, hacking, cybersecurity or computer science related terms and the 4 first results it spat out were Do IT not crime Do hacking not crime Do cybersecurity not crime Do computer science not crime ...and then you proceded to say that "ChatGPT said 'do hacking not crime'"
Wie immer ein geniales Video, welches gesellschaftliche Aufmerksamkeit auf ein international immer noch zunehmendes Problem lenkt
I don't speak Deutsch. Can you translate. I don't have translate feature anymore.
Hey man love the videos. Random question.. Where’d you get that crew neck? it looks really comfortable haha
Nice workshop mate. Love that Prusa MK3 in the back!!
Maybe you will make a video about minecraft cheating comm? Recently there were ppl fedded so maybe it's interesting enough for a video. Great content btw
love ya man and ur content, keep on updating always 🙂
Ooh, I can finally "use a secure font". One more step of the xkcd security recommendations complete :p
Let me download it real quick... it will increase my security like 10vpns i bought
cool minecraft chunck unloading hashmap profile picture!
@@eswee6780 It's just the bitwise xor of the X and Y coordinates, didn't realize this pattern also showed up in Minecraft chunk loading!
How did you create the font? What programs did you use?
somehow the camera footage looks to me like it was weirdly stretched in the vertical direction or cropped somehow. I don't know what it is but something feels just off... (not only in this video, but also in the past)
And Microsoft wanted to hide the address-bar some time ago.
Finally someone who highlighted this difference. Really nice of you.
Hi! I've to do research about different types of buffer overflows attacks on 64bit systems for my bachelor thesis. Do you have any suggestions?
How on earth have I asked myself this question yesterday?! It was exactly: "Why is Hacker News called the way it is?"
Excellent video, very informative!
Awesome video as always!! Always wanted to get into threat hunting :)
hi mr. Cosmodium
@@gameboyv1790 heya!👋😄
@@CosmodiumCS how are you
Nice initiative . Thank you
Read “Hackers: Heroes of the Computer Revolution”, they spend a good amount of time on the definition. It goes back to MIT and the Tech Model Railroad Club there. I came up in a period, the 80’s and 90’s, when it was considered a term of endearment. The press destroyed it, and there’s no going back.
the add of your font sounded like an ad for a vpn service
These unskilled workers will graduate to top tier Microsoft support employees.
This is a great idea for my portfolio. Thanx
How do the "Safe browsing project" decide what to block? It keeps blocking my 100% non-phishing selfhosted services on my own domain
You probably inherited a blacklisted IP address from the previous renter of your VPS or something
Well. I host at my own house with the same static ip. Had it for 3 years or more
@@flemmingss Your server may have been pwned and serve malicious pages without you knowing.
Reminds me how people call me a hacker when ever I'm coding or modding a game.
Well, you can do some game hacking that also modding, And vice versa. However, you might not call it hacking which is fine. Some game hacking is craking games code to find bugs to bypass certain workaround to gain big rewards. sometimes u don't even need game code you just jump around and try to find bugs.
In Asia, most of the law enforcement messed up the words “hacking” == “cybercrime”, their concept is fundamentally wrong. Thank you so much to pointing it out. We hack, therefore we are.
Introducing the QuirkyClip™ Collection by SpaceX, a unique blend of the original clip art's shortcomings and the spirit of space exploration. This collection doesn't try to be cool or impressive; it simply embraces the limitations of traditional clip art while incorporating a space theme. Here's what to expect from the QuirkyClip™ Collection: 1. Pixelated Charm: The QuirkyClip™ Collection features low-resolution, pixelated images reminiscent of early digital design. These images have a certain nostalgic appeal, and they'll certainly give your projects a distinct, retro look. 2. Silly Imagery: The collection includes a variety of comical, offbeat images inspired by both SpaceX's achievements and the whimsical nature of old-school clip art. These designs are perfect for adding a touch of humor and lightheartedness to your projects. 3. Limited Selection: The QuirkyClip™ Collection comes with a small, curated library of space-themed designs. The limited selection encourages you to explore your creativity within these constraints and challenges you to make the most of the available designs. 4. Compatibility Challenges: This collection stays true to the compatibility issues that were common with old clip art, requiring you to find inventive ways to integrate these designs into your projects. It's a fun, creative challenge that harkens back to the early days of digital design. The QuirkyClip™ Collection by SpaceX is for those who appreciate the original clip art's limitations and want to incorporate them into their creative projects. This collection doesn't pretend to be cutting-edge or sophisticated; it's simply a fun, nostalgic nod to the early days of digital design with a space exploration twist. If you're looking for something different and enjoy a creative challenge, the QuirkyClip™ Collection may be just what you need.
Someone tried to do this to me just a few days ago. They wanted me to vote for their team in a CS tournament. As soon as it requested my steam login I knew it was fake.
When is the next minecraft video coming out?
That marketplace looks familiar. Does its name start with "L" and have four letters?
leez
yes
lolz team, yes
@@coolestguy94 i wasn't gonna say the name. I remember people from cheating communities telling me this is where they buy accounts from cheaply and cheat on CSGO with them.
Never seen such a beautiful phishing tool
I mean *some* cybercrime is definitely hacking. I mean when you hear stories of stuff like committing insider trading by breaking into news wire agencies or researching zero days in order to crack ATMs its hard not to call that hacking.
@@DoubleOhSilver Well yeah duh my point is just that some cybercrime is hacking. In fact saying that cybercrime != hacking is a bit ridiculous considering how most of the early hackers (Wozniak, Cpt Crunch, Mitnick the CCC etc) were all definitely committing crimes.
@@zaper2904 the crimes they were committing were all copyright and licensing issues. They were creating a new computing age with software that competed with the top dogs of the time. They weren't trying to phish for information like credit cards or gaming info (even if it would have been a thing at the time.) It's just not comparable.
@@3v068 Breaking into companies and stealing source code getting free international phone calls and in many cases taking down telephone exchanges due to negligence is just "copyright and licensing issues"?
@@DoubleOhSilver I'm saying that while I can see why LiveOverFlow might say that cybercrime isn't real hacking because most people that watch his channels are probably beginners who genuinely might try to download SET and trick their friends into giving them their Snap-chat login in reality everything but the most bottom of the barrel PAAS and RAAS operations still do involve actual hacking. Hell even with a very generic RAAS operation while the affiliate of the cybergang and the gang itself might not be hackers the initial access vendor they probably acquired access from into the company network is an actual hacker.
The line is really blurry
What is this site called
It's so sad to see that Criminals are more organised than civilians
The way he is defending "hacking" and talking about its beauty was on another level 😂
Thank you for the phishing tutorial
Hackers are motivated by their curiosity but criminals just want sensitive data no matter the method they use
Wow wtf 🎉❤mind blown Thankyou
Have always called the users of these "proggys" "script kiddies." Though it is a funny how unaware the kiddies are of the backdoors they themselves now have opened on their own systems when using the proggy but that's another topic all in itself, can't say they don't thoroughly deserve what they get though. Being the example you pointed out I guess you could say "Proggys as a Service" now.
I've stumbled upon one of these on accident but for banking pages
I see Russian language in UI - I know this will be some kind of scam or hacking
that page template looked a lot like the elon musk cryptocurrency scam one. specifically the one that was linked when peeps fucked with linus tech tips yt account. also i'm kinda surprised i recognized that forum. probably cuz the color scheme is quite unique lmao.
I reported to youtube 3 such scamming attempts...not sure if the channels were banned.
most under rated video on the youtube
why?
Hacking means to use your ability in a way that is new and wasn't accounted for. Hacking is not necessarily a thing only in Computer Science, but in every other discipline too. You can be a hacker in your kitchen by doing something that was never accounted for and using loopholes to create a new dish or an existing dish by using a very different recipe.
I prefer to use ESR's definitions and refer to cybercrime as cracking and everything else that doesn't fall into the crime category as being hacking.
Dunno it doesn't happen often but if like someone find a vulnerability to take complete control of a system. And then use it on a megacorperation and leak all the totally legitimate definitely not at all questionable things there doing.. id still call that hacking
@LiveOverflow but... Social Engineering is STILL hacking. It's non technical hacking but still hacking. And phishing is just one type of social engineering attack. You're right Hacking is not always a cybercrime and Cybercrime is not same as hacking. But the example you gave, was a bit narrow in my opinion. If not done with permission, Phishing is cybercrime is social engineering is hacking. Phishing fits all categories.
my phone is doing a wired thing on its own out of the blue is it hacked as I am good with tech but not at this level advice from you or viewers would be nice
Without knowing what your phone's doing in more detail, it's impossible to say for certain. But it's highly unlikely that your phone has been "hacked"; in the worst case, it's just been infected with malware.
@@OpenKeith well to be open with you it working on it own opening random things sometimes the screen is frozen for short time then when I hit the power button then it goes back to normal it has been happening for some time now ps is there any email you have might have I can send some screen recording I made on this any help would really help me out as it my work phone
My phone can be touched by my breath. Try to breathe on your screen, if it does it then your screen is just sensitive to breathe and it can react to it but if not, then you downloaded a malware which broke your phone. If it is the second I suggest you to choose "wipe all data" in phone's settings but before this you have to save important information that your phone keeps because everything is going to be erased and your phone will start as if you first bought it
Excellent..
haha classic SKID phishing :( btw: typo in der beschreibung, beim twitch link
Finally someone pointed it out
Short answer it is basically like the Mafia, but online, so Cybermafia
Cyber crime im engeren Sinne oder im weiteren Sinne?
This seems more like category social engineering than “hacking” for sure.
hmm i mean this case of cybercrime was not hacking, but i definitely wouldn’t say cybercrime is never hacking
god I love free advertisements
people no longer using the word "cracking"?
whats being cracked here?
This video should be shared everywhere. Liveoverflow's teachings are what kept me from doing stupid things when I was younger. If he never provided insight like this, I would've lost myself in those forums and chatrooms instead of finding the beauty in hacking. It's videos like this that I think more people need to see. Demystifying the actions of these script kiddies is the best thing we can do for our technologically oriented youth.
identify scam webs and how to make it sustainable economic bussyness. with out random exploting data mining
Just wait until you realize you’re never safe if you use the same password on a lot of websites.
I encountered the same page as they tried to hack me through steam. I understood that it was fake through an image in the "https" part of the url
that's a weird minecraft video
Holy shit, is that SaaS cybercrime tools?
Oh great now we've got AI Ad reads, whats next AI generated Videos?
AI generated ads?
I used to accept every friend request on steam, wait for them to message me with their spam and then use a simple script to flood their backend with random generated but legitimate looking logins by using a dictonary of words and names. Now that I've learned that they seem to validate the credentials before storing them I feel a bit dumb :P
honestly not a bad idea still because it would still take them a little longer to find valid credentials. having used to have cracked fortnite accounts and sold them it all depends on what proxies theyre using to check the accounts (which only if theyre buying this tool theyre probably pretty good) so if u kept your script running for a while it would most definitely piss them off lol
@@vices816 😂 it is automatically process. If you give them invalid log they didn't put it in base
Push!
calling this hacking is akin to calling people who use cheat menus in videogames hackers.
I hope this saved some of those kids from being the 21 century equivalent of pickpockets
Phishing is about the lamest thing someone can do.
just being in some arabic country is enough not to get caught even with very bad OPSEC, there is just a lot of people doing this kinda thing its crazy. i know 10 people who do this kinda shit who live on the same street.
ох уж эти russion "hackers"
Нет!! Нет!!
I see hacking as a tool, just like a knife, you can use it to do good and evil. But it's just a tool, just gaining access to something thinking outside the box weather it's legal or ilegal.
really nice video
One question, I assume if you can find access to the crime forums and go through all the security processes, you'll have at least some knowledge of the web, so why couldn't you create the website yourself? Seems like you'd have to be pretty tech savvy to find those forums.
The forum shown in the video is quite popular in Russia. It is advertised on a variety of KZhead channels and some of them have nothing to do with IT. Also the forum itself is on the clearnet. So there may be people who don't know much, but want easy money And why do it from scratch if all the sites and tutorials are already provided
While I agree with the sentiments shared, it's a bit "age-ist" (not trying to condemn, just pointing out a generalization) to assume teenagers are the the ones doing this (I think it would help to point out how they're targetted to be the primary audience, maybe if that were the case?). We're all equal opportunity schmucks! lol
Can someone explain, if exploit dev is slowly dying because of the migration to more secure programming languages + whatever other reasons, doesn't that mean that hacking in its entirety is going to die along with it? Exploit dev is the root of all hacking isn't it? The exploit developers are the real hackers that develop the exploits that the rest of us just use in our day to day jobs as pentesters, red teamers etc.
So cybercrime is sometimes hacking but most of the time is not
lolz is not quite a criminal forum, like at all.., it's social engineering
what is the forum called?
I have always used the word hacking so it’s hard to break a habit
Kick ass.
I love your videos, they are always informative and inspirational. However I have to disagree with you on this one. I don’t think you can redefine a word because you don’t like how some people use it. Hacking is an action, by the definition you used, attacking a system to cause corruption, or learning systems through disassembly and probing. Hacking doesn’t care about intent. If you use exploits to learn about and gain access to an operating system you have in an virtual machine, that is hacking and it is legal. Now if you do the same thing but to your bosses computer, you can learn just as much, but it is illegal, and is a cybercrime. The exact same thing done on two different computers, both are hacking, one is a cybercrime, the other is not. Not all hacking is cybercrime, but ‘most’ cybercrime involves hacking. That’s because it’s hard to do crime on a computer without involving some kind of attack on a system you don't own. However I kinda agree with you on whether or not phishing scams are hacks or not. There is a big push to separate hackers based on intent. That’s what ‘white hat’ hacking vs ‘black hat’ hacking is. Both are hacking but one has malicious intent, the other doesn’t. Another term that’s being used is ‘ethical hacking’. The reason is because ‘black hat’ hacking has given hacking a bad name, so the terms white hat and ethical hacking are used to bring more people into the world of hacking while trying to get rid of the crime stigma that hacking has. And I feel it is better to call yourself a white hat hacker, or an ethical hacker then it is to say that any hacking that is also a crime is not hacking.
Well.... This was smooth..... 😂😂😂
Are you drinking mate my guy ???
This is exactly how people get bank account information 😂
Your argumentation against the usage of the word "hacking" is flawed. You say it can't be hacking because it's criminal.
It's the same thing when pleb teenagers buy cheats from shady russian forums and everyone calls them hackers.
This guy is stoned in every video look at his eyes
Xed
настроить api :skull:
API? markets? that sounds like it should be easy to take down by the police, what?
Most of these forums and hackers are located in Russia. And yeah, Russians don’t scam other Russians, so the police will never come to them until they start making thousands dollars per day
@@chitadrita9826 Russians don't scam other Russians oftentimes because the Russian police does not take them down then. This happens sometimes with Ransomware, they check geolocation or language or something like that before encrypting files and the Russian police is fine with it as long as they only target foreigners.
6:26 ... to be fair, as seen at 6:16, they are using Windows. They probably can't hide from anyone who wants to go after them 😂
The modern script kiddy :D
I agree immensely.. Theres stupid kids going around calling themself "hackers" bc they can Skid a Stub off github LOL
@liveoverflow, please pin the url for reporting phishing sites in the comments. thanks
Hello from Russia So familiar site xd Привет работяги, хуле он контору палит то
Внатуре
ряльна
Можешь прислать адрес, я его потерял
@@devincartwright3309 zelenka tochka guru, но он щас лежит вроде.
вооот оно форум истинной свободы !