Тёмный

Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable 

David Bombal
Подписаться 2,6 млн
Просмотров 213 тыс.
50% 1

It's just crazy scary what these cables can do. They look like normal USB cables, but are not! In this video we login to Apple MacOS and Linux computers :)
======
Scripts:
======
Apple macOS Rickroll: davidbombal.wi...
Linux Rickroll: davidbombal.wi...
=======================
Buy Hak5 coolness here:
=======================
Buy Hak5: davidbombal.wi...
================================
Hacking Android and iOS devices:
================================
OMG with Android and Apple iPad: • So you think your phon...
=============
Setup Videos:
=============
OMG Cable setup: • O.MG: From zero to hero Hak5
Rubber Ducky setup: • How I did it (hak5 rub...
================
Connect with me:
================
Discord: / discord / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombalyoutube: / davidbombal
keylogger
keylogging
key logger
hak5 keylogger
macos keylogger
hak5
omg cables
omg cable
apple
apple macos
linux
ubuntu
ubuntu hack
linux hack
rubber ducky
hak5 rubber ducky
hak5 omg cable
omg cable android
omg cable ios
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#omgcable #hak5 #rubberducky

Наука

Опубликовано:

 

5 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 407   
@davidbombal
@davidbombal 3 года назад
It's just crazy scary what these cables can do. They look like normal USB cables, but are not! In this video we login to Apple MacOS and Linux computers :) ====== Scripts: ====== Apple macOS Rickroll: davidbombal.wiki/applerickroll Linux Rickroll: davidbombal.wiki/linuxrickroll ======================= Buy Hak5 coolness here: ======================= Buy Hak5: davidbombal.wiki/gethak5 ================================ Hacking Android and iOS devices: ================================ OMG with Android and Apple iPad: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-7YpJQT55_Y8.html ============= Setup Videos: ============= OMG Cable setup: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-V5mBJHotZv0H.htmlak5 Rubber Ducky setup: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-A2JNBpUotZM.html ================ Connect with me: ================ Discord: discord.com/invite/usKSyzbTwitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombalRU-vid: ru-vid.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
@swarnajeevan1345
@swarnajeevan1345 3 года назад
i sorted that out
@Gglsucksbigballz
@Gglsucksbigballz 3 года назад
Almost as “crazy scary” that the content creator thinks people will heed his advise.
@daymelrensoli8096
@daymelrensoli8096 3 года назад
Please what laptop are using?????
@fukushima4670
@fukushima4670 3 года назад
Where there are hosts... there will always be tapeworms and other assorted parasites. Some humans are just really evolved parasites.
@rogersepeda
@rogersepeda 3 года назад
You couldn’t use that on a government computer, they’ll find out right away . You can’t plug in anything. Maybe a cac reader but even at that I’m not sure if that’s even allowed.
@lodewykblignaut7844
@lodewykblignaut7844 3 года назад
It's scary how clueless I am about things like this. Thanks Mr Bombal for educating people about the danger of technology. This can help keep me and my family safe from dangers like this. 🙏😁
@davidbombal
@davidbombal 3 года назад
You're welcome!
@JohnTurner313
@JohnTurner313 2 года назад
3:30 This is not a problem with any OS, and using it against a Linux or Mac computer says nothing whatsoever about the OS capabilities. The cable is a hardware device that requires physical access to install. If a bad actor has physical access to your computer to install that cable, there are any number of ways to get past all operating systems. Physical access generally means game over.
@Fostravel
@Fostravel 2 года назад
Exactly. Good potential review, flawed by misleading logic/clickbait?
@hardik.satasiya
@hardik.satasiya 2 года назад
yes you are 100% right, if you have physical access anything is possible ... it's not OS-dependent, I can stand there and watch someone enter a password 😁
@freedustin
@freedustin 2 года назад
@@hardik.satasiya yeah but you can't reverse shell thru your eyeballs now can you?
@hardik.satasiya
@hardik.satasiya 2 года назад
@@freedustin neither anyone will plug suspicious wire and tell ok dude I plugged in now just fire reverse shell and browse my pc ... and how it's related to OS? 🤔 and may be I don't even need reverse shell, I can just type password and open regular shell if I need
@freedustin
@freedustin 2 года назад
@@hardik.satasiya Well that's a lie. I see people jacking charge cables all the time and using them. It's not OS related, I didn't even mention OS at all, this even works on phones. Regular shell? So what? Can you exfiltrate data protected by an IDS with that? Nope.
@alexbik
@alexbik 2 года назад
It's a neat cable, but let's get one thing straight: You are not 'attacking' MacOS, nor are you attacking Linux, you are attacking the hardware. Obviously, an operating system can never be more secure than the hardware it runs on.
@windmael47
@windmael47 2 года назад
MFA is almost an industry standard within enterprise. Password never guarantees safety, apart from this USB something as simple as dictionary attack can break the login. So Apple could at least provide optional MFA for login to protect us from such threats. Great video anyway, thanks!
@z00h
@z00h 2 года назад
@@windmael47 MFA is an industry standard to log on into laptops in enterprise applications? Which industry is it?
@edgay
@edgay 2 года назад
@@z00h Utopia 😸
@z00h
@z00h 2 года назад
@@edgay it clearly must be haha. @Jonni stop smoking dat krak boyyyy.
@dorab.theitexplorer6462
@dorab.theitexplorer6462 3 года назад
Oh you made me remember an incident! My friend in some governmental sector told me that they brought several new computers..they run some tests and they discovered that some PC cables have antennas in them to send data to the building cross the street. I think this is the same concept
@davidbombal
@davidbombal 3 года назад
Similar kind of idea. Just scary that this looks just like a normal cable.
@michaelfabulous5574
@michaelfabulous5574 Год назад
Lol I know what your talking about! Lol too old right? Like James bond. Lol
@fernandosantos3576
@fernandosantos3576 3 года назад
Word of advice: do not "shove" an "innocent" pen drive or an "innocent" cable that you just found into any of your devices. Be also aware that an "innocent" charging point may be not as innocent as it seems...
@elham7459
@elham7459 3 года назад
Don't let that innocent-looking pen drive or cable take your device's innocence.
@lhffan
@lhffan 2 года назад
Same with all cables you find in computer store
@erlicthemad
@erlicthemad 2 года назад
Why you use a usb condom if you need a charge from an untrusted port.
@jaysongalicia8142
@jaysongalicia8142 3 года назад
This is the most frustrating thing to happen, getting hack and Rick rolled at the same time. Thanks David for this kind of video, so people realize the danger of a random USB cable that they pick up somewhere.
@eternialogic
@eternialogic 3 года назад
A very good reason for a CEO to have his own bug sniffer crew that checks new hardware and old ones often.
@HighSpeedNoDrag
@HighSpeedNoDrag 3 года назад
Nothing New for CEOs and other Corporate Entities to have "Stand By" Counter Crews on contract, on notice.
@JSp3ct0r
@JSp3ct0r 3 года назад
Yes please!! A video on how to get a reverse shell would be awesome! Also, this is extremely scary. Never leave your laptop/phone unattended in a public place. Amazing content as always!!
@davidbombal
@davidbombal 3 года назад
Thank you! Will create that video 😀
@snipeminecrafter3001
@snipeminecrafter3001 3 года назад
NetworkChuck made a video on that! Go check it out man! it's awesome!
@juliusrowe9374
@juliusrowe9374 3 года назад
Great content as always David! Would love to see the reverse shell demo with the OMG cable!
@mrse7en196
@mrse7en196 3 года назад
David to Everyone who wants to learn Networking: Never gonna give you up!! Never gonna let you down!!!
@MangolikRoy
@MangolikRoy 3 года назад
Now I have to pay really serious attention bcz on of my friend buy some stuffs from hak5 and this cable too while watching your video Help me GOD!! 😅
@zadkieladdae8145
@zadkieladdae8145 3 года назад
David, do a tour video on your home office setup. Thanks your for your endless effort.
@filipandersson1415
@filipandersson1415 2 года назад
Interesting. I'm a novice when it comes to IT and up until this point in my life I would have trusted a cable like that. This ends now. Thanks David!
@educastellini
@educastellini 3 года назад
-Great content Professor David Bombal...!!! -So, these keylogger and reverse shell tools are getting easier to use every day. -About 10 years ago I programmed in devices such as cellular microcontrollers and nini laptops exactly this type of system (keyloggers and reverse shell) for my government operators, nowadays they sell these same tools on the internet that 15 year old boys can buy with his father's credit card on the Internet to take credentials of his colleagues of High school. -Times are really changing...!!! -Thanks for the knowledge Professor David...!!!
@blork74
@blork74 3 года назад
You made the mistake because you allowed this cable to be connected to your computer. That's what I learned from this video thanks so much David.
@nathansnow
@nathansnow 2 года назад
How interesting 🤔 I wrote a simple Java keylogger a while back that gets deployed within an image and runs on opening. It then runs as a background process and logs chunks of approximately 1000 keystrokes which then get sent to a MySQL database
@Bob-of-Zoid
@Bob-of-Zoid 3 года назад
Well, a hacker would have to have physical access to the device, or get you to use their cable: Being a Linux user, I never heard anyone saying that Linux can prevent all attacks from anyone with physical access to the device, but I have seen plenty of times people reporting on vulnerabilities in Linux as a "Big Problem" and leaving out the part that it can only happen with physical access! Linux can also be penetrated otherwise, but for the most part only if the user does not use good security practices. With Windows even that's not enough: It's not like you can keep Microsoft out!
@ChrisHillASMR
@ChrisHillASMR 2 года назад
linux is only as good as ur ssh password/key. if u can man in the middle ur toast.
@klote82
@klote82 3 года назад
This is the only technology based channel that I watch. How the hell do you stay on top of all this hacking stuff? Lol, I love it! Kali is really the best OS for hacking, cracking, sniffing!
@szabi0112
@szabi0112 3 года назад
OMG! I am really scared! Awesome video David as always. Please carry on! Thank you so much for the demonstration.
@PicyPoe
@PicyPoe 2 года назад
0:01 I am pretty sure we all just got trolled by David! It is not about the cable, but the MONITOR!!!! Looks at that MONSTER!
@MrMeek79
@MrMeek79 2 года назад
a very unique and new way to rick roll people. This is crazy that you can have keyloggers in a cable
@edwinaag
@edwinaag 3 года назад
Shud be a way to detect which cable is an OMG cable or a regular one. Just in case you put 2 cables together.
@farazhassan6417
@farazhassan6417 2 года назад
This is because you plugged the OMG cable, Hacking or Keylogging for many is only a danger when it is done remotely, by having access phisically and putting a device which records and replay would be last thing for me . . . because nobody has so much access to my device. Sure great work and information. Cheers!
@nickrathmann3204
@nickrathmann3204 2 года назад
Hey, I would like to see if you could do the same key logging and applying payloads on an Mac book, if a usb c to usb c OMG cable is used to charge it. Because I think this might be a really good way to get trapped, especially if your laptop is out of battery like it often happens to students in a library or on campus in general. And if the OMG cable is also capable of key logging your iPhone if you use Face ID to open it up, because you aren’t really typing. Really enjoying your content and definitely never borrowing a cable again!!
@grosgogogogt
@grosgogogogt 2 года назад
the miniaturization to be able to put it in a cable is incredible
@PS_Tube
@PS_Tube Год назад
That's scary stuff ! Imagine setting up these multiple cables at free charging points... Hundreds or thousands of devices can get accessed by malicious parties.
@erlicthemad
@erlicthemad 2 года назад
Interesting, I heard of this vulnerability. First time seen a demo of it in action. A good reason to know your cables, and always run with minimal access.
@natureiscrazy
@natureiscrazy 3 года назад
Only attack my own devices for learning purposes ♥️ going to try get one for my Birthday 🎉
@davidbombal
@davidbombal 3 года назад
It's a great product!
@MultiAlbon
@MultiAlbon 2 года назад
​@@davidbombal lol, at first normally attack own devices, to learn and be faster when like to attack someone else. :D That login for linux, password was taken and put inside the script before. Even that cable can open everything, for combination (numbers,letters&caracters) need more time! If someone go to the prison because of this way, you are that person who teach "victims" to make another victims! Who like to go in prison..? It is very simple! 1 go near to station of police.. 2 take a stone.. 3 shoot one glass door or window in that buildin. 4 Done! Just wait little, someone will come and tell you the place :D Keyloger, exist from very very long time, i know from 2002. There was a program (free download) + pay for full. It works hidden and send to the email info; small screen position of mouse click, keyboard, links you visitet and much more... In my idea, a professional keyloger needed for... Relationship or parents who give devices to kids under 18! That makes better life to understand more your kids and partner. You already have started to teach or show unique thinks, but try to teach for better ideas and pushing them to a dangerous game. Some childrens understand fast and is like a game for them to do this things... Thanks and sorry for JUDGING YOU.
@z08840
@z08840 2 года назад
@@MultiAlbon "That makes better life to understand more your kids and partner." - ahahahah, oh my gosh, this is hilarious :D
@MultiAlbon
@MultiAlbon 2 года назад
@@z08840 lol, that is funy for you? Good to know youre kid!
@z08840
@z08840 2 года назад
@@MultiAlbon lol, you know I'm a kid? Good to know you are an imВeсilе! :D
@RTechTips
@RTechTips 3 года назад
These are just some examples, I am totally agreed with you. Even anything connected or download can hack your system. That's so easy only way to avoid it do not connect with untrusted or let it be happen . I am using reverse shell but for monitoring purposes but that is also a very easy task. Avoid anything which is not your or just ignore it. Everything is secured when you have it otherwise forget security
@hussaini24
@hussaini24 3 года назад
Will love to see the reverse shell video sir. Thanks for the videos, we really are learning from them.
@keithrodgers1030
@keithrodgers1030 2 года назад
So many ways in , screen mirroring, sharing, key logging, wifi & Bluetooth once you have these enabled, then their is pairing to smart tvs using streaming. Best way is to shutdown your appliance and unplug the power. One other point on ac mains switch the positive & negative poles then they switch on the appliance remotely.
@SapphireKR
@SapphireKR 3 года назад
Hey David loved the video! Can you please make a video on how to counter & protect outself from this type of stuff?
@LouisSerieusement
@LouisSerieusement 3 года назад
a friend of mine use to build fake usb key like that few years ago but having it so small that it fits into clables is frightening ! I would love to see the circuitboard of this ! (Edit: I found pictures of the inside !) Thanks a lot :)
@davidbombal
@davidbombal 3 года назад
You're welcome!
@LordLarryWho
@LordLarryWho 2 года назад
Reverse shells are just as possible on Mac OS, you just have to escape the colons in the script
@lawabidingcitizen5032
@lawabidingcitizen5032 3 года назад
Does it capture password if it's an auto fill from password manager?
@Jimbo898
@Jimbo898 3 года назад
Can you imagine passing these things out at tech conferences as part of a swag bag? I would think they would be able to install a tunnel feature that could run a payload after the first login, to compromise password integrity, open ports and services create a VPN to tunnel out to a, drop server to collect all the goodies.
@davidbombal
@davidbombal 3 года назад
Hak5 did just that and spoke about it in this video: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-CpmCoX6kn38.html
@shashankkshekarchaturvedi8390
@shashankkshekarchaturvedi8390 2 года назад
Thank you David Bombal for this amazing video. It’s rare to find such quality content online. Could you please make a video on reverse shell on IPhone using Mac
@Will-kt5jk
@Will-kt5jk 3 года назад
For some reason, the explaining the same technique, finishing with the tagline "as you can see, I've been able to Rickroll you" reminded me of Patrick Stewart on Extras, explaining various plots to Ricky Gervais' character, ending with the tagline: "then all of their clothes fall off" followed by "but it's too late... ...I've seen everything"
@jnb756
@jnb756 3 года назад
if you have enough physical access to my laptop to plug a cable into it you have more than enough access to use about 40 different ways to gain access to it even though it is running Linux. One thing you may want to explain is you are not going to capture keystrokes from the laptop with that cable - you didn't say that you could but you didn't say you couldn't either, as there is no way for the cable to man in the middle the keyboard of a laptop. What is truly frightening are the wireless keyboard capture devices - simply sit next to someone with a wireless keyboard and log everything they type. I believe they only work on Bluetooth wireless keyboards at this time due to the different frequencies and such between different manufacturers but it's only a matter of time before all wireless keyboards are leaking secrets
@Lar_ry
@Lar_ry 2 года назад
its not hard to sniff random packets that float around the air... I have opened car doors in a very similar way.
@angulion
@angulion 2 года назад
This really has nothing to do with security of the OS. Remove physical access and we see then. Edit, the logger/typer being embedded into the cable is interesting though.
@mukut5ul
@mukut5ul 2 года назад
Amazing, now I know why u need to be careful while downloading any file or copying from usb
@Esscarra
@Esscarra 3 года назад
Yes! More omg content! A video on reverse shell would be very welcomed!
@elmi108
@elmi108 3 года назад
Best advice from David Bombal "Learn how to hack but do not go to jail".
@tigreonice2339
@tigreonice2339 Год назад
Rewatching this video 1 year later I think if you buy a mechanical keyboard it could have a keylogger hardware software inside. Maybe its too much crazy ....but are weird times 😮
@hellocreed
@hellocreed 3 года назад
Excuse me Mr.Bombal but I couldn't help but notice a typo in the title...I think its 'login' instead of 'logon'...anyways the video was awesome...as always ; )
@tulasideviful
@tulasideviful 3 года назад
This was fascinating, thanks, David. I'm in love with that curved long screen. Where can I buy one? 😊💻
@coomservative
@coomservative 3 года назад
they are not practical, look up 4k curved screen regret
@stevejohnson1321
@stevejohnson1321 2 года назад
If you have access to the machine, many Ubuntu etc. can be accessed as root through the repair console. I won't describe it here, but easy enough to find out. Ubuntu is as secure as you want to make it, which may mean disabling this under grub.
@abdulbasit-jj8qf
@abdulbasit-jj8qf 3 года назад
CRAZY!!!! Love all your contents DAVID.... please make a video on how to get a persistent reverse shell...
@0day__
@0day__ 3 года назад
You are the best David
@davidbombal
@davidbombal 3 года назад
Thank you!
@VBLN
@VBLN 2 года назад
I would like to see Apple investigate this, because they are pretty good when it comes to fake charger connection, but I believe you would be fully compromised by the time Apple can prevent the attack
@sdeb729
@sdeb729 2 года назад
Amazing video, amazing hardware. Thank you for opening our eyes to this tech. It would be nice to see your recommendations at the end of this video as to what can be done to defeat this sort of attack beyond the obvious thing to only use a charging cable purchased from a reputable source.
@Aaron48219
@Aaron48219 Год назад
Being an IT admin, I'm going to buy 20 of these and replace all the employees USB cables at their desks just to Rick roll everybody at once.
@Makulax
@Makulax 3 года назад
I used keyloggers 20 yrs ago. The wired one is just a bit more fancy.
@Body_Model
@Body_Model 3 года назад
A little suspicious if you would connect a cable to someone's computer without the owner of the device not suspecting anything.
@KalaniMakutu
@KalaniMakutu 3 года назад
Well, there are some that look just like a normal Apple or Samsung cable. I know that on my desk, I have a cable there plugging in my keyboard, another to charge my phone, a few to hook up peripherals, and my docking station. I certainly wouldn’t expect someone to replace the cable I use to charge my phone with a malicious one while I am away at lunch. I can’t think how many times I’ve left my backpack unattended at my desk while I step away for a meeting. My computer may be in my presence at all times, but all my peripherals? I’m away from those 16+ hours per day!
@Body_Model
@Body_Model 3 года назад
@@KalaniMakutu Doesn't the person who will be doing the keylogging has to be near you, another red flag.
@KalaniMakutu
@KalaniMakutu 3 года назад
@@Body_Model No. The keylogger can log about 220 page of text internally, as well as trigger remotely via timers, geofencing, or manually. Near is also a misnomer, because unaided using nothing more than an iPhone, you can reliably access the cable over 100m away. If you’re willing to add a parabolic dish at the phone (or laptop) side pointed towards the cable, it will work up to a mile away line of sight, or less if there is some obstruction… Still really far though. Or, you can connect it to the internet via a wifi network or cellular hotspot, and then access it from anywhere. The first few features allows you to landmine, or just log data to come retrieve a few weeks later.
@Body_Model
@Body_Model 3 года назад
@@KalaniMakutu I'm a little bit confused, he is using the cable connected to the laptop and the other end is connected to his phone, right?
@idhantsood1105
@idhantsood1105 3 года назад
People usually think that Mac and Linux are virus-free but they can also be hacked as excellently demonstrated in the video! Keep up the great job.
@tonyman1106
@tonyman1106 3 года назад
If it connected to a network it can be hacked
@chiroyce
@chiroyce 3 года назад
Anything is hackable - it's just that Windows is the easiest to hack.
@themedleb
@themedleb 3 года назад
Well, anything is hackable, but this is not a virus.
@mrniceguy6050
@mrniceguy6050 2 года назад
By the looks of it this is a hardware hack which has nothing to do with the virus sensitivity of the OS.
@chiroyce
@chiroyce 2 года назад
@@mrniceguy6050 Yep. Dangerous, but not the OS's fault.
@RyanHarris-sh9vf
@RyanHarris-sh9vf 6 месяцев назад
Very useful information if I didn’t already know bout tha cord
@manaspant1929
@manaspant1929 3 года назад
Even a simple cable can create disaster for you 😨😨 mindblowing demo
@Netsh3ll
@Netsh3ll 3 года назад
You changed my life sir
@ramnikTDM
@ramnikTDM 3 года назад
Sir on of the frist ones and want to be like Kevin mitnik in future,my role model is Kevin mitnik and you r my inspiration ❤️
@CliffCarmichael
@CliffCarmichael 3 года назад
of course you want to lol
@gjsatru3383
@gjsatru3383 3 года назад
Hey Ramnik try to be yourself not Kevin mitnick . Kevin mitnick never thought he would be someone lol
@ramnikTDM
@ramnikTDM 3 года назад
@@gjsatru3383 thank you,its true I understood. ❤️
@shreeshaaithal-
@shreeshaaithal- 3 года назад
Yes David bombol again with the beast videos
@TheChessJPriya
@TheChessJPriya 3 года назад
Thanks for your Content. It really helps us
@kakau5758
@kakau5758 3 года назад
Please do a video on reverse shell attack. That's so awesome!!
@karanb2067
@karanb2067 3 года назад
Amazing vid! I would love a msfconsole and msfvenom tutorial coming from you.
@SystemDemon
@SystemDemon 3 года назад
Show me the reverse shell David :D. One problem though I don't have the financial state to buy this. But I would love to see it
@gamingandtech5151
@gamingandtech5151 3 года назад
Everyone is first until they refresh the comments 😂😂
@Littlefighter1911
@Littlefighter1911 3 года назад
2:29 I stopped here because I saw the URL that I'm all to familiar with. I'm not going to get rick-rolled! But I'm in the mood for watching it myself.
@mundoin5583
@mundoin5583 3 года назад
Ah Jokes on the O.MG i never connect my phone via cable to my PC work or the leisure one :D this looks like a fun gadget though.
@KalaniMakutu
@KalaniMakutu 3 года назад
I have a keyboard connected to my Laptop’s docking station though. It’d never cross my mind if someone swapped out or even added a cable behind my monitor.
@snoopfall3201
@snoopfall3201 3 года назад
Mr.David you are very scary and dangerous man.
@DiSHTiX
@DiSHTiX 3 года назад
The cable is what it is .. a keyboard with a low powered wifi *see below why you shouldnt be worried* 1-That keyboard can only get access once it captured your password. Most keyboards are either hardwired or wireless...so this is already limiting its use. I doubt this USB works like a good old software keylogger therefore its useless if not connected inbetween the keyboard. 2-Which OS is running is irrelevant.. except for the attacker who has to program the scripts specifically to execute commands for that OS. Therefore the title is misleading it is not related to macOS, Linux etc now suddenly having a new vulnerability. But the specific keyboard driver could possibly be disabled if uncommon. 3- Any sensible person in 2021 is using a passwd mgr such as Bitwarden, 1Pass, KeePass etc etc. By letting the software input the passwords for you, this bypasses this device. Sure, it grabs your passmgr password but with 2F authentication it prevents a login from a new location/device. For those doing sensitive stuff inside a VM.. the VM itself would not be compromised but key inputs to the VM will be logged, but you'll use your passmgr inside the VM.. so thats covered. 4-The wifi provided is low power, therefore its range is expected to be rubbish. The first concrete wall, electrical equipment etc it encounters will severely cut its range, the attacker will have to remain very close by or come back at a later stage. 5-Use cases, good option in open plan office space, meeting rooms etc.. quick replacement when a client is out the door and the room isnt locked. It would be awesome if it had 4G connectivity with dyndns, making it instantly remote accessible for the attacker. But nobody is gonna randomly leave these cables lying around, and especially now with covid, people have become alienated using stuff thats not theirs. Just my 2c... that I'm not worried about this device at all. It has use cases but its gimmicky at best. Oh, and David. Good video, thanks for this one and the other explaining how it works :)
@jorgelima5695
@jorgelima5695 2 года назад
It is scary to see how easy it has become to inconspicuously intercept a keyboard - PC link. However, I think this video is misleading with the conclusion that a particular OS is insecure. What's the surprise that one can login in any computer, if one gets hold of the login credentials and has physical access to it? That doesn't imply that the system is insecure. That is the same to say, I watched someone else logging in and now I can also do it, therefore the system is insecure. I suppose that this specific eavesdropping attack could be mitigated with an encrypted keyboard link, but that would require specialized hardware, rather than a safer OS.
@johneandre9206
@johneandre9206 3 года назад
Excellent video!!! I'll see the reverse shell video too..
@gifthlongwane8664
@gifthlongwane8664 3 года назад
Thank You Sir David for the video.
@davidbombal
@davidbombal 3 года назад
You are very welcome
@yutubl
@yutubl 2 года назад
Sometimes my browser on my Windows 10 HP Notebook/Laptop PC behaves as being remote controlled, just as you showed: automatic behaviour - not initiated by PCs local keyboard or mouse. This happened only connected via WiFi WLAN (Telekom speedport) shared with my neighbour, sometimes wired connected to USB keyboard and USB mouse (Trust brand).
@351gt
@351gt Год назад
Did you end up making the reverse shell video to access devices that I own, that I’ve left at home, so I can access them from a mile away?
@BobSmith-kd6lq
@BobSmith-kd6lq 3 года назад
Holy begeebus! How can this be allowed? Huge props for telling us about it
@sorinmiliescu
@sorinmiliescu 2 года назад
To be quite Frank, I don't believe that the range of that embedded access point is up to a mile. More likely it will have trouble penetrate a brick/concrete wall at a few meters away
@lauradove1240
@lauradove1240 Год назад
Complete tech troglodyte here... If I turn off my internet access whenever I'm not using the computer/cell, will this help keep me safe? Thanks for all you're sharing. Though I don't understand much, I'm learning.
@Megaheropap
@Megaheropap 3 года назад
Thanks for finally doing a Mac video! How can we fully remove the keylogger and prevent it?
@patrickdee7365
@patrickdee7365 3 года назад
Deny all usb access and permit every single time
@strandvaskeren
@strandvaskeren 2 года назад
Any usb device can claim to be a keyboard and and a usb keyboard works right after power on, way before any OS is loaded, you can use a usb keyboard to get into bios at boot and so on. Only way to prevent it is by filling your computers usb slots with hot glue, making sure no one can ever fit a usb device to the computer. However 2-factor authentication can make the keylogging rather useless - sure the hacker keylogged your username, password and the confirmation code texted to your smartphone, but next time the hacker tries to use your username and password, he/she will have a really hard time getting hold of the new confirmation code received by your smartphone, the old confimation code doesn't work anymore.
@daemdae2097
@daemdae2097 2 года назад
Hey, David Thank you so much for your videos. I got a question for the omg cable, if the target unplugged the omg cable will it be exploitable, or will it be disconnected?
@user-yw4cf3yd2w
@user-yw4cf3yd2w 2 года назад
The fact that the communication between keyboard and computer is not encrypted is hardly surprising. How would you perform this attack if it was encrypted?
@Gr33n37
@Gr33n37 3 года назад
How you doing Mr.bombal, am from Uganda(Africa) am interested in the separate video on how to create a strong reverse shell to a computer even when its shutdown I can still have access. Thanks
@abdulmuiz2000
@abdulmuiz2000 3 года назад
This cable is crazy thank you sir for the eye opening info
@Pafkatax
@Pafkatax Год назад
2:34 :DDDDavid has some meme culture.
@andredavis3350
@andredavis3350 3 года назад
you get more widescreen monitor upgrades than I've ever seen! What happened to the LG 34WK95U-W and the Apple display XDR?
@Linux1972
@Linux1972 3 года назад
So, we have to have to have the user connected by the OMG cable and we can capture the keystrokes wirelessly via the app on our phone. What if the user has a wireless keyboard? Wouldn't it be a little ominous if suddenly a cable was running from it?
@z08840
@z08840 2 года назад
ominous and useless - wireless devices only use cables for charging :)
@scottym50
@scottym50 3 года назад
A great video as usual. I always learn something from your great videos. Thank you.
@mrphraner
@mrphraner 2 года назад
this video in itself deserves a subscription
@sgtfoose8842
@sgtfoose8842 2 года назад
Think of it what happens if the office cleaning company, walks into the office of an important person, swaps their phone charging cable? Everyone has one on their desk right? Companies need to start implement random checks I suppose?
@Jimbo898
@Jimbo898 3 года назад
David try it with a software overlay keyboard and see if that captures it. How about biometric login? How about a reverse payload to your device?
@iakashx
@iakashx 3 года назад
Yes David. I am curious how can we get rev shell from OMG cable.
@seltzerr
@seltzerr 2 года назад
imagine someone playing a rhythm game and all they just see is just random keys
@kishorkumarpaul5159
@kishorkumarpaul5159 3 года назад
Hello sir, Thanks to you first. Your work is really great. Now come to the main topic. From your giveaways i had got Ethical hacking for beginners course and completed that some days ago. Now I'm continue with network+. But I thought that I need to know more about security. That's why I want a security+ course so that I can increase my knowledge about that.
@ZhivkoLefterov101
@ZhivkoLefterov101 2 года назад
Hello David, THanks for the great video! you should try this but when there is JumpCloud client installed on the Mac/Linux/Windows. will it work again? Is the user which you scan a local one or its a cloud account like JumpCloud account? thanks
@moysevalentine6117
@moysevalentine6117 3 года назад
nice video. learnt something helpful today... my question is, how do we know a cable that has keylogger. can you make a video on how we can know each cable.
@fliporflop7119
@fliporflop7119 3 года назад
This woudn't work with Abylon Logon on windows because it uses hardware key (Chip card, RFID token, USB stick or CD DVD)..also uses 2FA.
@v300
@v300 2 года назад
In Linux, you can choose what VendorID and what DeviceID can be plugged in. On my workstation at work, I have allowed existing devices to be plugged in and everything else is denied. Once in a while when I get a new device or a thumb drive I edit this file.I also get a message in the logs that a device failed to be recognized.
@markolafploeg3265
@markolafploeg3265 2 года назад
Wauw...shows the importants of MFA solutions...
@pz1
@pz1 3 года назад
At 4:50 you said you knew the laptop password but would still be able to capture the password with the cable. How’s that work with a laptop when you can’t run the cable from the specific detachable keyboard to the computer as a middleman?
@mulletman1705
@mulletman1705 2 года назад
To plug that cable into the Linux laptop the hacker is already standing in front of the keyboard, I don't think it makes Linux insecure that someone csn type a password on the keyboard
Далее
skibidi toilet multiverse 042 Trailer
01:57
Просмотров 2,9 млн
MacOS Sequoia is AWESOME - Try these 8 things FIRST!
14:57
Do NOT Plug This USB In! - Hak5 Rubber Ducky
11:37
Why You Should NEVER Use These Apps On Your Mac...
12:51
17 Hacker Tools in 7 Minutes - ALL Hak5 Gear
6:54
Просмотров 431 тыс.
I got hacked by an iPhone Cable.
10:07
Просмотров 9 млн
Hack With SMS | SMS Spoofing like Mr. Robot!
11:32
Просмотров 1,1 млн
Introducing the NEW 🐤 USB Rubber Ducky
7:59
Просмотров 230 тыс.
#техноблогер #айфон #iphone16promax
0:24
Mac USB
0:59
Просмотров 27 млн
Скучнее iPhone еще не было!
10:48
Просмотров 618 тыс.