How to watch a closed (hidden) VK video and open the invisible to the eye


How to watch private videos on PC

First, let's figure out how to see hidden videos in VK through a computer or laptop. Below we will look at the main methods.

Ask the user to share

If you want to watch a specific video on VK, ask the person to open access to it. If the video does not contain any confidential information, and you explain the reason for your interest, the user may agree. Alternatively, you can provide a link to view it on some other service.

Add as a friend

In a situation where access is limited only to other people's users, you can add yourself as a friend. Submit a request and perhaps you will be included in the “selected” group. After this, the path to watching videos of interest opens.

Use ID

One of the common methods is to watch hidden VK videos of a person by ID. This is a personal identifier that is assigned in relation to communities and specific users.

The action algorithm is as follows:

  1. Find the ID of the person you are going to watch a private video with. To do this, go to its page and copy the numbers in the search bar that will appear after the ID.
  2. Insert the line vk.com/video.php?act=tagview&id=ID or vkontakte.ru/video.php?id=ХХХХХХ into the browser URL bar, where ID or ХХХХХХ is the resulting character set. Try different options.
  3. Click on the Enter button and enjoy the videos.

Knowing how to watch hidden videos using ID VK, you do not always get access to restricted content. If a person has blocked the video with privacy settings, it will not be available. In this case, try using the methods discussed above - ask for access or add as a friend.

Via browser code

The method discussed above can be optimized and implemented through the browser source code. Do the following:

  • Right-click on the desired VK page and select View page code.

  • Press the combination Ctrl+F for an exact search.
  • Enter Video or Albums (for photos) in the line that appears.
  • Find the IDs you need.
  • Close the source code page.
  • In the browser page, enter vk.com/idхххххх, where instead of хххххх substitute the user ID.
  • Place “?z=” after the identifier (remove the quotes), and then enter the identifier copied earlier. The final line may look like this: vk.com/id15684646368?z=video4844846764486.

Using this method, you can watch closed videos or albums of people you don’t know. As in the case discussed above, this method does not always work.

Through mutual friends

If you have mutual friends, you can contact a friend of the user who has posted the content you are interested in. Ask to download the video and forward it, while maintaining anonymity. When choosing this option, give preference to people you trust.

Special services

As an alternative, use special platforms that allow you to watch closed VK videos. We note right away that this method also does not give a 100% result, but it’s worth a try.

One of the options is Vkontakte.doguran.ru. This is a popular page where you can watch private videos, photos or other content. To solve this problem, copy the link to the page you are interested in, paste it into a special field on the site, and then click Send. Working with the interface is not difficult, and the available tips allow you to quickly navigate the capabilities of the platform.

Use the services of hackers

This is the most risky option, because it requires advance payment. At the same time, performers rarely guarantee results. In this case, there is a high risk of losing money and not getting results.

With eyes wide shut

Video surveillance is used primarily for security purposes, so don’t expect funny pictures from the first hacked camera. You may be lucky enough to quickly find an HD broadcast from an elite brothel, but more often you will come across boring views of deserted warehouses and parking lots with VGA resolution. If there are people in the frame, they are mostly the waiters in the lobby and the hoggers in the cafe. It’s much more interesting to watch the operators themselves and the work of all sorts of robots.


Real and formal observation

Other articles in the issue:

Xakep #218. Look with all your eyes

  • Contents of the issue
  • Subscription to "Hacker" -30%

IP cameras and webcams are often confused, although they are fundamentally different devices. A network camera, or IP camera, is a self-sufficient surveillance tool. It is controlled via a web interface and independently transmits the video stream over the network. Essentially, it is a microcomputer with its own Linux-based OS. The Ethernet (RJ-45) or Wi-Fi network interface allows direct connection to the IP camera. Previously, proprietary client applications were used for this, but most modern cameras are controlled via a browser from any device - be it a computer or a smartphone. As a rule, IP cameras are always on and accessible remotely. This is exactly what hackers take advantage of.


Robot in the library archive

A webcam is a passive device that is controlled locally from a computer (via USB) or laptop (if it is built-in) through an operating system driver. This driver can be of two different types: universal (pre-installed in the OS and suitable for many cameras from different manufacturers) and custom-written for a specific model. The hacker’s task here is different: not to connect to the webcam, but to intercept its video stream, which it broadcasts through the driver. The webcam does not have a separate IP address and a built-in web server. Therefore, hacking a webcam is always a consequence of hacking the computer to which it is connected. Let's put the theory aside for now and practice a little.


Glasses n-n-nada?

How to watch restricted content on your phone

Now let's look at how to watch a private VK video on a smartphone. Here you can use the same methods discussed above. The exception is the option to view the source code, because you won’t be able to perform such an operation on a smartphone. As an alternative, you can try to watch and download content through special applications that can be found in Google Play:

  1. Download video from VK.
  2. Video for VK.
  3. Video Downloader.

Let us immediately note that to use such applications you must have access to your profile or a direct link.

Knowing how to watch a private video on a social network, you get access to videos of interest even if there are viewing restrictions. In the comments, share what methods you use to solve such a complex problem.

INFO

The first mention of GoAhead in Hacker dates back to 2002, and last year it was found to contain a vulnerability leading to RCE.
GoAhead in particular is susceptible to stack overflows, which can be caused by a simple HTTP GET request. The situation is further complicated by the fact that Chinese manufacturers modify GoAhead in their firmware, adding new holes.


Pour in, honey!

Today, more than a million IP cameras and IP video recorders from different manufacturers allow you to remotely access their settings without any authorization. A Python script that automates an attack on vulnerable devices has already been posted on GitHub. The problem was discovered in early 2021 while reversing DVR firmware manufactured by Dahua Technology. A little later it turned out that it affects more than a thousand models from different manufacturers. They simply replicated each other's mistakes. The author promised to give time for correction and not to disclose all the details yet, but he is ready to share them privately by email with all security specialists. If you have a CEH (Certified Ethical Hacker) certificate or similar, you can try it.


Let's add some brightness!

In the code of other firmware there are such mistakes as curved conditional transitions. Such a camera allows access if you enter the wrong password or simply press the “Cancel” button several times. During our research, I came across more than a dozen of these cameras. So, if you are tired of trying out default passwords, try clicking Cancel - there is a chance you will suddenly gain access.

Medium and high-end cameras are equipped with rotating mounts. Having hacked this one, you can change the angle and fully examine everything around. It can be especially fun to play tugging the camera when, in addition to you, someone else is trying to control it at the same time. In general, the attacker gains full control of the camera directly from their browser by simply accessing the desired address.


Camera control

When they talk about thousands of vulnerable cameras, I want to take a closer look at at least one. I suggest starting with the popular manufacturer Foscam. Remember what I said about service entrances? So Foscam cameras and many others have them. In addition to the built-in admin account, the password for which is recommended to be set when you turn on the camera for the first time, there is another account - operator. Its default password is empty, and rarely anyone thinks to change it.


Login as an operator and add new accounts

In addition, Foscam cameras have very recognizable addresses due to the template registration. In general, it looks like xxxxxx.myfoscam.org:88, where the first two xx are Latin letters, and the next four are a serial number in decimal format.

If the camera is connected to an IP video recorder, you can not only monitor remotely in real time, but also view previous recordings.


Watching the recording from the backup

How does a motion detector work?

Professional surveillance cameras are equipped with an additional sensor - a motion detector, which works even in complete darkness thanks to an IR receiver. This is more interesting than always-on IR illumination, since it does not unmask the camera and allows it to conduct covert surveillance. People always glow in the near-infrared range (at least when they are alive). As soon as the sensor detects movement, the controller starts recording. If the photocell signals low light, the backlight is additionally switched on. And exactly at the moment of recording, when it’s too late to close yourself from the lens.

Cheap cameras are simpler. They do not have a separate motion sensor, but instead use frame comparison from the webcam itself. If the picture differs from the previous one, it means that something has changed in the frame and you need to record it. If the movement is not recorded, then the series of frames is simply deleted. This saves space, traffic and time for subsequent rewinding of the video. Most motion detectors are customizable. You can set a trigger threshold so that any movement in front of the camera is not logged, and set up additional alerts. For example, send SMS and the latest photo from the camera directly to your smartphone.


Setting up the camera motion detector

A software motion detector is much inferior to a hardware one and often becomes the cause of incidents. During my research, I came across two cameras that continuously sent alerts and recorded gigabytes of “compromising evidence.” All alarms turned out to be false. The first camera was installed outside a warehouse. It was overgrown with cobwebs that shook in the wind and drove the motion detector crazy. The second camera was located in the office opposite the blinking router. In both cases the threshold was too low.

Anti-peeping protection

The first thing that comes to most people's minds after being shown how to easily hack cameras is to cover them with duct tape. Owners of webcams with a shutter believe that the problem of voyeurism does not concern them, and in vain. Eavesdropping is also possible, since in addition to the lens, the cameras have a microphone.

Developers of antiviruses and other software protection systems use confusing terminology to promote their products. They scare you with camera hacking statistics (which are really impressive if you include IP cameras), and they themselves offer a solution for controlling access to web cameras, which is technically limited.

The security of IP cameras can be increased by simple means: by updating the firmware, changing the password, port, and disabling default accounts, as well as enabling IP address filtering. However, this is not enough. Many firmwares have unresolved errors that allow access without any authorization - for example, using the standard address of a web page with LiveView or the settings panel. When you find yet another leaky firmware, you just want to update it remotely!


Help update the firmware of a vulnerable camera

Hacking a webcam is a completely different matter. This is always the tip of the iceberg. Usually, by the time the attacker gained access to it, he had already managed to frolic on local disks, steal the credentials of all accounts, or make the computer part of a botnet.

The same Kaspersky Internet Security prevents unauthorized access only to the webcam video stream. It won't prevent a hacker from changing its settings or turning on the microphone. The list of models it protects is officially limited to Microsoft and Logitech webcams. Therefore, the “webcam protection” function should be taken only as an addition.

How to unblock a video on VK

Previously, before the social network VKontakte did not have a secure connection via the https protocol, it was almost easy to access blocked content. However, at the moment there is only one unofficial way by which you can view blocked and restore hidden videos. Copy this link https://vk.com/v />.

You can also use standard tools on the site itself using a computer. Click “Help”, in the window that opens we state the essence of the matter, attaching the subject of the conversation using the “Attach” button, click “Send”.

If the truth is yours, then most likely the record will be unblocked. By the way, this is exactly how copyright holders often act when they want their video or music to be removed from the VKontakte network.

How to hide video albums

On VKontakte, you can hide not only a single video, but also the entire video album. This function will be useful for those who are puzzled by how to hide all videos in VK at once. The hidden album can be updated with new files over time.

There is no need to configure any additional settings for them. They will be automatically closed for viewing by other users. The procedure is performed in several stages:

  1. Going to the “My Videos” section, you need to select the “Albums” tab. To create a new album, click on “New Album”. This button is located in the upper right corner of the page.
  2. In the window that opens, you need to enter the name of the album and select privacy information.

  3. Finally, click the “Save” button.

If you need to hide an already created video album, you need to perform the same steps, first clicking on the edit icon. It can be found directly on the album. Privacy settings will be exactly the same.

Watching blocked VK videos

As a rule, the reasons for blocking video recordings are stated directly on the page with a corresponding notification about the impossibility of viewing. Gaining access to content directly depends on the motives named there. However, it often happens that access to the recording is denied for technical reasons.

    The most common problem is notification that a video has been deleted by a user or the administration of a social network. If such a situation arises, the only solution is to search for alternative videos, usually displayed next to the unavailable one.

Most entries are integrated into VKontakte from the YouTube video hosting site. Due to this, you can also try to find an entry on this resource. There should be no difficulties with searching, since the name of the entry is always displayed.

Rating
( 1 rating, average 4 out of 5 )
Did you like the article? Share with friends:
For any suggestions regarding the site: [email protected]
Для любых предложений по сайту: [email protected]