Тёмный
No video :(

How Malware Works 

Mental Outlaw
Подписаться 657 тыс.
Просмотров 134 тыс.
50% 1

Опубликовано:

 

24 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 304   
@Mygary
@Mygary 4 года назад
Your bank account: 😴 Your social media account: 😴 Your Runescape login: 😳😰
@TheIsioisi
@TheIsioisi 3 года назад
The true treasure is in my habbo hotel account
@flowgangsemaudamartoz7062
@flowgangsemaudamartoz7062 3 года назад
@@TheIsioisi My Rule34 account is my personal treasure, it needs to be protected and kept reachable.
@JR-ef3by
@JR-ef3by 3 года назад
@@flowgangsemaudamartoz7062 bruh
@MrSam1804
@MrSam1804 2 года назад
0$ in my bank account, but those 3rd age items tho 😳😳😳
@JmKrokY
@JmKrokY 2 года назад
😣
@egg5474
@egg5474 4 года назад
Can’t get malware on templeOS god handles all my networking needs
@bosschad8273
@bosschad8273 4 года назад
The guy that programed temple os was bat shit crazy, not a good role model, you can believe in whatever religion you want but I'm good without a bible thumping system developed by someone with schizophrenia. I run Arch BTW.
@kernalpenguin
@kernalpenguin 4 года назад
spiting fax
@raskr8137
@raskr8137 4 года назад
templeOS comments are really getting old now
@pinko7429
@pinko7429 4 года назад
@@bosschad8273 tldr u wrong
@bosschad8273
@bosschad8273 4 года назад
@@pinko7429 Well, keep acting like a child then.
@No-uc6fg
@No-uc6fg 3 года назад
My favourite ransomware is gotta be "Reisenware". It asked for the user to get a certain amount of points in a Touhou game.
@sophiakuno5003
@sophiakuno5003 3 года назад
not just a certain amount of points: you had to get an insanely high score on lunatic difficulty
@FlipNdip579
@FlipNdip579 3 года назад
My man infected himself too.
@No-uc6fg
@No-uc6fg 3 года назад
@@FlipNdip579 Extreme measures are needed to improve.
@TorutheRedFox
@TorutheRedFox 3 года назад
*rensenware
@FlipNdip579
@FlipNdip579 3 года назад
@@TorutheRedFox r u dat anoyin kid who corects ppl whiel they spoke?
@whyeddy9702
@whyeddy9702 4 года назад
thumbnail game is stronger than ever
@naoltitude9516
@naoltitude9516 4 года назад
I was gonna say that :(
@censoredterminalautism4073
@censoredterminalautism4073 4 года назад
They are too powerful. I can't stop clicking on them.
@Mygary
@Mygary 4 года назад
WhyEddy he’s starting to reveal his power level
@jerrymartin7019
@jerrymartin7019 3 года назад
@@michealsmith9150 Lmao glow more
@jd-raymaker
@jd-raymaker 4 года назад
the only reason I use a reverse shell is to get the flag.txt
@Supakills101
@Supakills101 3 года назад
Is this a pentesting joke?
@jd-raymaker
@jd-raymaker 3 года назад
@@Supakills101 CTF :)
@slyns533
@slyns533 3 года назад
I only want user.txt and root.txt
@borat1
@borat1 3 года назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-VUeMyaTtYuw.html
@crazy4gta1
@crazy4gta1 3 года назад
As someone who takes class on this, your videos teach me more about this stuff than a 2 hour lecture
@lucasjames8281
@lucasjames8281 2 года назад
Lol, stop paying for that class then
@slayer_hazard8993
@slayer_hazard8993 2 года назад
what have you learnt in cybersecurity so far?
@crazy4gta1
@crazy4gta1 2 года назад
@@slayer_hazard8993 truth be told thats no longer my career path now. I just started training to become a pilot.
@_c_h_1_c_k_3_n__11
@_c_h_1_c_k_3_n__11 2 года назад
@@crazy4gta1 those are my top two career choices, would you mind sharing the route to getting a job in either of these fields?
@bryced7126
@bryced7126 6 месяцев назад
school is lectureware
@BryanJenks
@BryanJenks 4 года назад
Was worried that clicking on the thumbnail would give me malware
@Kristibek
@Kristibek 3 года назад
What's a better way of learning how malware works than experiencing yourself?
@Yuriyalloween
@Yuriyalloween 4 года назад
Yep, I knew it was going to be an ecchi thumbnail.
@alexkubrat3868
@alexkubrat3868 2 года назад
The F*** is ecchi?
@zenmastakilla
@zenmastakilla 2 года назад
@@alexkubrat3868 Lurk more.
@alexkubrat3868
@alexkubrat3868 2 года назад
@@zenmastakilla What?
@GamerBoy705_yt
@GamerBoy705_yt 2 года назад
@@alexkubrat3868 look it up..
@alexkubrat3868
@alexkubrat3868 2 года назад
@@GamerBoy705_yt I dunno man.
@kekistanifreedomfighter4197
@kekistanifreedomfighter4197 4 года назад
man, if only malware was as cool & good looking as corona-chan. then i wouldn't have to worry about getting anything malicious whet downloading my retro game ISOs & game cracks.
@JmKrokY
@JmKrokY 2 года назад
Bruh
@supermasterfighter
@supermasterfighter 2 года назад
Coomer
@JanuszBiedronka
@JanuszBiedronka 4 года назад
This is like the tutorial stage for luke smiths channel
@uszanowanko5678
@uszanowanko5678 4 года назад
Very interesting thumbnail I need to tell you
@MentalOutlaw
@MentalOutlaw 4 года назад
Glad you like it
@PyPylia
@PyPylia 4 года назад
@@MentalOutlaw He didn't say he liked it, just said it was interesting.
@tharushasarange
@tharushasarange 4 года назад
@@PyPylia So?
@PyPylia
@PyPylia 4 года назад
@@tharushasarange Just saying.
@BattousaiHBr
@BattousaiHBr 3 года назад
@@PyPylia true, but for the record, he liked it. and so did i.
@sakuranakamoto8327
@sakuranakamoto8327 4 года назад
Hey dude I'm a fan of your videos :) Your reverse shell explaination is worded slightly wrong. A reverse shell does spawn a shell on the compromised computer. In Linux the process is along the lines of: 1) Create socket on victim comp via socket syscall 2) Connect back to attackers computer which is listening for a connection via connect syscall 3) Make STDIN, STDOUT, STDERR for process on victim computers go to socket created in step 1 via dup2 syscall 4) Spawn a shell on victim computer via execve syscall. STDIN, STDOUT, STDERR for the spawned shell on victim computer will now go through the socket and appear on the listening client on the attackers computer. Input to the listening client will be sent back to the shell on the victim computer. A bind shell is slightly different in that the victim computer does not connect back to attacker computer. Instead it opens up a listening port on the victim computer.... The attacker then connects to the listening port on the victim computer. In both cases however, the shell is running on the victims computer. One of advantages of a reverse shell over s bind shell is it's easier to get past a firewall by connecting out to a commonly allowed outbound port, e.g port 80 or 443.
@bdnugget
@bdnugget 4 года назад
255 likes 0 dislikes. I'm scared to upvote because I don't want to overflow it
@PixelTrik
@PixelTrik 4 года назад
This comment didn't age well.
@bdnugget
@bdnugget 4 года назад
@@PixelTrik Wait until it overflows again and reaches close to 255 again
@sigmundfreud4472
@sigmundfreud4472 3 года назад
A redditor! Explain yourself!
@Kristibek
@Kristibek 3 года назад
Don't worry that won't happen. They upgraded to 64-bit integers a long time ago which support 9 quintillion likes/dislikes (around there)
@fatihbaskin2000
@fatihbaskin2000 Год назад
@@Kristibek A star system can easily overflow it
@getout6174
@getout6174 2 года назад
"and your runescape account" that felt real, u ok man
@goalhornfanatic9449
@goalhornfanatic9449 2 года назад
I love the anime thumbnails, cause it actually makes me click, which results in me studying for class. 😂
@minuteworld7027
@minuteworld7027 2 года назад
glad I found this channel, love this type of humor and explanations.
@ilovesmosh2012
@ilovesmosh2012 3 года назад
ah yes... the extortion key... my favorite key...
@syedia
@syedia 3 года назад
That thumbnail makes me want to use Windows lol
@coldbrew6104
@coldbrew6104 Год назад
A lesson to remember: KEEP YOUR BACKUPS OFFLINE
@StrangeIndeed
@StrangeIndeed 4 года назад
memes aside, I love the videos where you explain technical stuff c:
@FallenAngelZero00
@FallenAngelZero00 2 года назад
I like this Thumbnail better. Although I give you extra points for using the Malwarebytes knock of Gypsy Danger mech in that one. 👍
@idkidk9204
@idkidk9204 3 года назад
Catchy thumbnail check, good content check, wait something is wrong
@bioemiliano
@bioemiliano 3 года назад
So Reversed Shell is what they use in those "Destroying a scammer's computer!!1!1!" videos
@noah2575
@noah2575 3 года назад
Loved the thumbnail 10/10
@JoeKis
@JoeKis 4 года назад
Blursed thumbnail mate
@Calajese
@Calajese 4 года назад
Oh hell yeah, give me more weeb shit on the thumbnails
@isaack5601
@isaack5601 Год назад
2:38 it actually gets sent to government databases as well. Entire buildings dedicated to online data from the USA citzens
@nodnarb5
@nodnarb5 9 месяцев назад
I was typing in my onedrive on microsoft word today and my entire computer froze up once I started writing fiction about imaginary mind control weapons. I couldn't type a single letter after that for at least 5 mins. The only thing that happened was the screen would go to a word that said "VISION" and block everything else out. Then I checked my computer memory and I magically regained like 27 gb of unaccounted for memory.
@vnc.t
@vnc.t 2 года назад
The safe way is to store your stuff in txt files renamed to exe files that are inside of c:\system32
@meercat1880
@meercat1880 2 года назад
just recently switched to linux because of your channel :) thank you for a new hobby too
@Ultrajamz
@Ultrajamz 4 года назад
Can you talk a bit about password managers and if any are in anyway hardened against keyloggers or copy/paste monitoring?
@longlostwraith5106
@longlostwraith5106 3 года назад
When your system is compromised, all bets are off.
@eldarlrd
@eldarlrd 2 года назад
Password managers are stupid, just make text file(s) with your passwords in them, change them a bit, maybe apply some basic encryption like Playfair, add extra letters, etc. Encrypt the text file with gpg or smth, and then put them on an encrypted USB flash drive.
@ContraIsBased
@ContraIsBased 2 года назад
dumb non related normie question,but how exactly facebook tracks your PC (the actual device)
@kaderpdi1982
@kaderpdi1982 2 года назад
@@ContraIsBased i think facebook target phones rather than computer since an app could do more than the website
@GamerBoy705_yt
@GamerBoy705_yt 2 года назад
@@ContraIsBased They track your activity mostly. Have you ever seen the "Be the first one of your friends to like this page" on alot of websites? They actually report back to Facebook that you've visited that page (yep, every single page with that embed this), and they can tailor ads suited to what you just visited. For example, maybe you just visited a blog about parenting your new-born baby or something, then you might suddenly see ads for baby products. Google does about the same, but in a different way. Almost every site has Google ads, and they also get to know what sites you visit. This might not seem like a big deal, but you probably visit hundreds or even thousands of webpages everyday. With all those data, these companies can build a shockingly accurate and scary profile of you. God forbid you have logged into a Google account in your browser, they can track literally every single website you visit regardless of the presence of any ads or trackers.
@cowcode
@cowcode 2 года назад
Can't get malware on my old PC that keeps crashing, One time I actually got ransomware but It crashed before it could encrypt my files. And as I said, It was my OLD PC
@stewartzayat7526
@stewartzayat7526 4 года назад
Oh no. Not my runescape account!
@jamie9419
@jamie9419 3 года назад
beat me to it
@pissedputin7738
@pissedputin7738 3 года назад
Glad I found this channel!
@Tokmurok
@Tokmurok 2 года назад
When the hacker records the poo sock. 😱
@adnanasif7241
@adnanasif7241 3 года назад
11:39 "maybe give them even more nudes"🤣🤣🤣 I laughed so hard.
@novaTopFlex
@novaTopFlex 5 месяцев назад
According to your definition of malware, proprietary software is a form of malware.
@alperkaya8919
@alperkaya8919 2 года назад
I have used reverse shells much but I didn't know that they are considered as malware
@oglostingaming
@oglostingaming 2 года назад
“And even your RuneScape account” Ouch
@ViddyOJames
@ViddyOJames 3 года назад
these days people don't even do the malware part, they just send you extortion spam
@rupen42
@rupen42 3 года назад
Do you need to execute/open a malware file for it to run? Can you get malware from *only* having the file in your hard drive? Can you get malware from visiting a website and not downloading or running any files?
@Drexaan
@Drexaan 3 года назад
yeah always asked myself that too
@zephyr4299
@zephyr4299 2 года назад
From my understanding. No. However if you touch any part of that websites page, all bets are off.
@wyattlynch1614
@wyattlynch1614 2 года назад
Yes you can get malware from just visiting a website. Infact it can even be able to get credit card info. Look up drive by downloading and ip logging links. Anyone can get your ip just by you clicking on a link. your ip is connected to many things such as your house address, email, and other stuff. when you visit a website in the traffic will be your ip address. ip addresses are basically just your computer's signature.
@xt2607
@xt2607 2 года назад
@@wyattlynch1614 your ip most of the time isnt even accurate about your city how will it be your address bruh
@logmaster534
@logmaster534 2 года назад
@@wyattlynch1614 having someone's ip is pretty useless. Drive by downloads are real though but you didn't answer if they can run without you executing them.
@iaobtc
@iaobtc 3 года назад
Put Facebook, Amazon, and Google's logos on the screen in that order
@juzujuzu4555
@juzujuzu4555 4 года назад
Saddam virus in 1992 ruined many of my Amiga games.
@censoredterminalautism4073
@censoredterminalautism4073 4 года назад
That's sad.
@_MPP_
@_MPP_ 4 года назад
That's sad, damn, without the n.
@TheRealFaceyNeck
@TheRealFaceyNeck 4 года назад
Has someone been a victim of ransomware on a Unix-like system? Info I found said WannaCry needed WINE, something probably not on most servers? Outside of intentionally setting up a guest virtual machine to run WannaCry on a customly-setup environment for that purpose.
@shortcutz6491
@shortcutz6491 4 года назад
I would be interested to learn about this as well!
@VictorRodriguez-zp2do
@VictorRodriguez-zp2do 4 года назад
WannaCry only works on wine if you have a drive pointing to your home directory. If you don't have any wine drive pointing to your home directory there's nothing to worry about.
@mobrine8659
@mobrine8659 3 года назад
Ransomware doesn't necessarily need to be compiled. If you want to target unix systems your best bet is to use some wide used scripting language with only preinstalled modules by most unix systems, and even use gpg on host target if you can't encrypt using your script...
@tablettablete186
@tablettablete186 2 года назад
Absolutely!!! Pretty much all the servers in the news, since it is very, very likely they use Linux
@distinctjackal9016
@distinctjackal9016 2 года назад
Well i think there are other Suspicious apps on linux whom you have to give sudo access to so that they can hack your computer
@chad4628
@chad4628 Год назад
That thumbnail 💀💀💀
@Kuroo39
@Kuroo39 4 года назад
Cute thumbnail
@godkillerspear1911
@godkillerspear1911 8 месяцев назад
Nice thumbnail.
@notchtc
@notchtc 4 года назад
sauce?
@sinject_
@sinject_ 3 года назад
earth chan and corona chan sorry that im 5 months late
@wtfuredead
@wtfuredead 3 года назад
@@sinject_ u hero
@senatuspopulusqueromanum
@senatuspopulusqueromanum 3 месяца назад
static.wikia.nocookie.net/joke-battles/images/3/3a/Corona_chan_meets_earth_chan_by_glee_chan_ddse78i-pre.png/revision/latest?cb=20200324214934
@midimusicforever
@midimusicforever 2 года назад
Good stuff!
@matts8791
@matts8791 2 года назад
Should include information about botnets. Botnets are everywhere.
@Kristibek
@Kristibek 3 года назад
This got randomly recommended to me lol
@joshcureton
@joshcureton 4 года назад
best channel out there
@bosschad8273
@bosschad8273 4 года назад
Good basic info, if only Iphone users could be convinced that viruses are only a tiny area in the scope of malware.
@materialknight
@materialknight 2 года назад
11:37 Ultimate Recursive Power Move!: const I_Have_User_N00dz === True function extort_User_For_N00dz() { while (I_Have_User_N00dz === True) { extort_User_For_N00dz() } } extort_User_For_N00dz()
@processorbot8761
@processorbot8761 4 года назад
great video!!! :-D
@Ryan-kb6xp
@Ryan-kb6xp 2 года назад
I was hoping for a RuneScape reference at some point
@tonynova
@tonynova 2 года назад
When you want to click on the video for the title bit thumbnail makes you wanna skip it
@kavanagharchie
@kavanagharchie 2 года назад
Virus aren't capable of self replicating they require a host cell. But good video
@nodnarb5
@nodnarb5 9 месяцев назад
@0:00-0:19 what is that type of display called? I used to see that in Gamefaqs and sometimes in comment sections...what is that and how is it made?
@kurakurakii3792
@kurakurakii3792 3 года назад
i came for the thumbnail-chan and im extremely disappointed. take my 'like' bruh
@noah2575
@noah2575 3 года назад
Pfft I’m on windows 98 so I’m safe.
@strider6294
@strider6294 3 года назад
@@trp225 archlinux w/xfce and Chicago95 theme I'm on windows 95 so im safe
@FlipNdip579
@FlipNdip579 3 года назад
I'm still using windows 1.0 so I'm safe.
@RickRollMaster101
@RickRollMaster101 2 года назад
i use DOS so i am safe
@tablettablete186
@tablettablete186 2 года назад
I don't have a computer, so I am safe
@kaliroot9754
@kaliroot9754 3 года назад
how to prevent exploit using vulnerability
@MrGentlemanism
@MrGentlemanism 3 года назад
Cool, thanks.
@xuntan
@xuntan 3 года назад
We all know you clicked on this video because of the thumbnail. Don't even try hiding it.
@karstensingh343
@karstensingh343 2 года назад
I was expecting this to be a joke video based on the thumbnail. Im not sure if i should be disappointed or not
@therealb888
@therealb888 3 года назад
That thumbnail earned you sub!
@purpl3x774
@purpl3x774 3 года назад
12:24 uh oh
@rollo2828
@rollo2828 4 года назад
How can i encrypt my files??pls tell
@alexkubrat3868
@alexkubrat3868 2 года назад
Question: Why the thumbnail looks so weird?
@xstrmex6060
@xstrmex6060 2 года назад
dam that thumbnail tho
@stansen7862
@stansen7862 4 года назад
My man .. what portion of this channel's audience of crypto-neckbeards running obscure linux distributions do you reckon has "nudes of the end-user that are saved to their desktop"?
@lolibear
@lolibear 4 года назад
the windows portion normies
@WigWamSupernova
@WigWamSupernova 3 года назад
IDK about you but I personally, I save my nudes as a dynamic background
@ikolatsla9278
@ikolatsla9278 2 года назад
Nice thumbnail
@user-in3ue2jy5x
@user-in3ue2jy5x 4 года назад
infosec chad
@kasufert
@kasufert 3 года назад
based thumbnail game
@mota8344
@mota8344 2 года назад
nice thumbnail
@monolit15
@monolit15 2 года назад
Sheesh just put a respirator on the Ethernet cable
@misterkoneko2389
@misterkoneko2389 2 года назад
Where's the waifu malware ???
@MisterFrodo
@MisterFrodo 2 года назад
Not my runescape account! Theyre going to be rude to that gf i bought and cause her to break up with me D’:
@VitalTechnology_
@VitalTechnology_ 2 года назад
Man... that thumbnail was clickbait ;c
@dexah4842
@dexah4842 3 года назад
mmmm, mmmmmALWARE! NOT TASTY!
@yeppiidev
@yeppiidev 3 года назад
Thumbnail: 😱
@harrydave1512
@harrydave1512 4 года назад
Based
@HEAVENSENT05
@HEAVENSENT05 2 года назад
Is getting malware on arch linux a thing, ive never had a virus compared to windows
@omokok1877
@omokok1877 4 года назад
I'm bout to bu
@chaos0987654321
@chaos0987654321 2 года назад
god i wish i was in that thumnail
@VulcanOnWheels
@VulcanOnWheels 2 года назад
7:50 Shouldn't that be, "might have *come*"?
@BradenBest
@BradenBest 2 года назад
unplugging your computer when ransomware pops up may not be a good idea. The GUI window isn't spawned until the application requests a window object from the API. There is nothing stopping a ransomware from encrypting all of your files and then spawning the GUI window to tell you your files are encrypted. Why would it play its hand early? You might think that you should unplug your computer just in case the designer of the ransomware was dumb and played their hand early, but what if doing so bricks your PC? You don't know that it _doesn't_ encrypt your OS files. If the ransomware uses a rootkit, there is absolutely nothing to stop it from bypassing the locks Windows places on "in use" files and just encrypting your boot sector and kernel. That would take, what, 5 seconds? If you shut off your computer in that case, your computer's gone. Plus, once your hard drive is infected, where are you gonna plug it in to recover your files? Are you sure that's a good idea considering the malware is _on_ that hard drive? That's what I would do if I designed a ransomware: infect the hard drive, infect the MBR, make the autorun infect any computer the hard drive is plugged into (the whole reason it's considered dangerous to plug in a rogue thumbdrive), use a rootkit, run all the encryption, encrypt the kernel, encrypt the MBR, then throw up the window saying the files are already encrypted and that shutting down will brick your computer, but also write another dialogue box for the rootkit to run if they shut down the computer and start it back up with a bricked Windows. Shutting down and restarting takes you back to the malware screen. Plugging the hard drive into another computer will most likely infect it etc etc. My point is I would cover every scenario I could think of. So real malware would probably be much worse.
@IsmaelWensder
@IsmaelWensder Год назад
My only experience with ransomware was once, using Windows 7, I disabled the antivirus thinking it was a false positive alert, I was quite wrong. Several programs were installed, and I managed to activate the antivirus and turn off the internet, which seems to have stopped the ransomware, soon after I discovered that some files had been encrypted, nothing very important, but I found a printscreen of my desktop, and a complete dump of all the information that was in Google Chrome. I removed the virus but the system was no longer the same, Chrome always insisted as "managed by your organization", so I formatted the hd.
@abdullahtshabal9522
@abdullahtshabal9522 3 года назад
bank account and facebook account password gets hacked: i sleep runescape account gets hacked: real shit
@blacklotus432
@blacklotus432 2 года назад
where does he get that thumbnail asking for a friend of course
@BrandiStrong74
@BrandiStrong74 2 года назад
Thumbnail lol
@StudioHawaii
@StudioHawaii 2 года назад
what the heck is the thumb nail
@williamcase426
@williamcase426 Год назад
NOT MY RUNESCAPE ACCOUNT
@tanakim
@tanakim 2 года назад
Need saucc
@user-fp9pd7fz7h
@user-fp9pd7fz7h 3 года назад
no, anything but my runescape account. noooo!
@classii1830
@classii1830 3 года назад
thumbnail is what
@Gigachad-mc5qz
@Gigachad-mc5qz 2 года назад
by the picture in the beginning most software and windows is malware lmao
@Sitwayen
@Sitwayen 2 года назад
high quality click bait ;)
@mrbruh6687
@mrbruh6687 2 года назад
Malware authors that make malware to make money are nerds
@kaliroot9754
@kaliroot9754 3 года назад
how exploits works ??
@lightningvini
@lightningvini 3 года назад
by the definitio you stated at the beginning, Windows 10 is malware.
@ThatSkiFreak
@ThatSkiFreak 2 года назад
Everything is malware with enough mental gymnastics or technicalities.
@nadiequintero9981
@nadiequintero9981 4 года назад
Your personality is really bland, but I really like your content. Hope you grow bigger.
Далее
How AntiVirus Works
9:55
Просмотров 167 тыс.
What are Honeypots, and How to Avoid Them.
10:52
Просмотров 399 тыс.
What happens when you visit the most infected website?
13:43
Free Coding Tool Distributes Malware
42:12
Просмотров 132 тыс.
How To Secure and Anonymize Your Online Activity
25:10
Просмотров 457 тыс.
What Enterprise-Grade malware looks like
20:09
Просмотров 59 тыс.
malware ain't what it used to be
20:37
Просмотров 846 тыс.
Cybersecurity Iceberg Explained
1:06:38
Просмотров 151 тыс.