Тёмный

USB Ninja Cable with Kevin Mitnick 

Cyber Protection Magazine
Подписаться 636
Просмотров 25 тыс.
50% 1

Be careful when using USB charging cables. Cyber Protection Magazine has teamed up with KnowBe4 and their Chief Hacking Officer Kevin Mitnick to show you what can happen when using a cable from an unknown source.
More cybersecurity knowledge and stories:
cyberprotection-magazine.com

Наука

Опубликовано:

 

12 мар 2021

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 56   
@tyronejay5510
@tyronejay5510 3 года назад
Hes such a pro that he doesnt care if he shows his password
@simonp37
@simonp37 Год назад
Passwords are easy to guess. Using multifactor authentication is the key ;-)
@jaysonjoy6467
@jaysonjoy6467 Год назад
A real hacker never put any credentials in browser. They save these kind of credentials which is not much important
@ivory1233
@ivory1233 Год назад
my mojmmuy said you are meanie
@kevinalexander4959
@kevinalexander4959 2 года назад
I read this guys book, Ghost in the Wires when i was in college on the bus everyday. Back in the day this guy trolled and hacked FBI officials and was always a step ahead of them. He knew when they were coming for him. Freaking hilarious.
@wss_maze.7819
@wss_maze.7819 2 года назад
yeah the doughnut story is pretty damn funny
@ivory1233
@ivory1233 Год назад
can you read it to me?
@stefanstruik
@stefanstruik Год назад
Hello @Cyber Protection Magazine, can you share with me the payload used in this video? Thanks
@coneheadzmusic1460
@coneheadzmusic1460 11 месяцев назад
I received a ninja cable once…I made the mistake of letting it into my house, and one night after everyone was asleep I woke up and saw the usb cable standing at the foot of my bed dressed in all black from head to toe. He was also wearing this strange mask! Anyways, he used this really secretive karate technique, and before I knew it, we were all stuck to the wall with Chinese stars. He took everything from us, least of all, my trust in ninja cables in the future. Such a shame!
@samshingler8186
@samshingler8186 9 месяцев назад
🤣🤣🤣🤣
@jeremiahonah8736
@jeremiahonah8736 2 года назад
How can the cable be setup and what is the name of this Bluetooth. Please quick answer
@sergiomauricio9290
@sergiomauricio9290 2 года назад
Mitnick the best
@stark6314
@stark6314 3 года назад
Yes that cable is dangerous
@ivory1233
@ivory1233 Год назад
hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
@pabloorellana4223
@pabloorellana4223 7 дней назад
Soy argentina donde lo consigo
@Fm-ss4uj
@Fm-ss4uj 2 года назад
What are counter measures ? How easy is it to detect if your computer is compromised.
@CyberProtectionMagazine
@CyberProtectionMagazine 2 года назад
Counter measures in general: a good cybersecurity hygiene. For this case in particular: make sure you only buy certified cables. And how to detect an attack: it really depends on the payload, sophisticated attacks can be almost invisible. Then again, most attacks can be detected with the right tools.
@Fm-ss4uj
@Fm-ss4uj 2 года назад
@@CyberProtectionMagazine thanks for the input. I'm starting my certifications now from the ground up. I'm already thinking of what improvements if any I can make in cyber security.So looking at different attacks,defenses to gage what's out there.
@ivory1233
@ivory1233 Год назад
no
@janenyamburanjoroge56
@janenyamburanjoroge56 2 года назад
Where can I get that cable?
@bombastickmister7956
@bombastickmister7956 Год назад
Only real question here
@ivory1233
@ivory1233 Год назад
alabama
@skunkgrowusa
@skunkgrowusa 3 года назад
where is the ducky code for this?
@ivory1233
@ivory1233 Год назад
top gun mavric
@Potter_3810
@Potter_3810 2 года назад
Please make a video on how to block it
@Marthastewart209.
@Marthastewart209. 2 года назад
You can use a usb blocker (physical device) to block data transfer. It essentially turns a data cable into a power charging only cable
@Potter_3810
@Potter_3810 2 года назад
Thanks bro
@saleh.alqahtani
@saleh.alqahtani 2 года назад
From where i can buy this cable ?
@Naz_Y3m3n
@Naz_Y3m3n 2 года назад
Hak5
@ivory1233
@ivory1233 Год назад
call 911 for it and theyll send it to you just give them your adress
@trichert7360
@trichert7360 3 года назад
Some sites detect log in from strange, different ip , bah you are caught
@trichert7360
@trichert7360 3 года назад
And the video was made BEFORE popular password manager compromise
@Abdullah_Al-Sammarraie
@Abdullah_Al-Sammarraie 3 года назад
bah,I use a vpn for a reason
@mareikestatt4520
@mareikestatt4520 3 года назад
Well, as in the scenario, both are in the same network. Both have the same public ip, so it really doesn't matter and there is no way websites can check anything. Same browser, same ip, even same fingerprint, since the entire browser session gets copied. It's really game over for the victim, because they might be able to turn off 2FA, change passwords, backup email, everything
@pavelyankouski4913
@pavelyankouski4913 2 года назад
I bet he will hack Google at the end of a career and then he will run to a Cuba
@ivory1233
@ivory1233 Год назад
nah thats to basic
@riajtech1699
@riajtech1699 3 года назад
The Google Chrome must fix this issue
@tinu949
@tinu949 3 года назад
Google Chrome is the issue
@riajtech1699
@riajtech1699 3 года назад
@@tinu949 but its the same case on every browser
@kurdmajid4874
@kurdmajid4874 3 года назад
@@riajtech1699 not tor
@riajtech1699
@riajtech1699 3 года назад
@@kurdmajid4874 what tor ??
@kurdmajid4874
@kurdmajid4874 3 года назад
@@riajtech1699 its a web browser its how people acess the dark web its the most secured browser
@starviptv6544
@starviptv6544 2 года назад
📚LOL 💾🧀🐀 - wave airs are dangerously loud .
@ivory1233
@ivory1233 Год назад
so are my farts
@hackzgamezyt
@hackzgamezyt 3 года назад
Wait this has been out for awhile, is there still not a security update for this?
@syphaxxxxx
@syphaxxxxx 3 года назад
Like keyloggers has been out for years , but no security update can catch them , i guess the same thing is going with usb ninja
@seanfaherty
@seanfaherty 2 года назад
On a windows machine you can make USBs need permission. Works on a rubber ducky but people will give the cable permission .
@ivory1233
@ivory1233 Год назад
nah i just use my Dora the explorer phone and she protects me from hostile nucellar threats from north Korea
@albertcurielx
@albertcurielx 2 года назад
WTFFFFFFFFFFFFFFFF omG!
@hametoapnoke9357
@hametoapnoke9357 Год назад
Ueyye
@Sector404
@Sector404 2 года назад
Hello @Cyber Protection Magazine, can you share with me the payload used in this video? Thanks
@ivory1233
@ivory1233 Год назад
your so dumb you cant even tag someone properly
@Sector404
@Sector404 Год назад
​@@ivory1233 Is that how you talk to your dad? It can only be by mistake that you received a brain, a spinal cord would be more than enough for you.
Далее
🔴Ютуб закрывают... Пока?
00:39
Просмотров 1,7 млн
Survive 100 Days In Nuclear Bunker, Win $500,000
32:21
Best of Kevin Mitnick: FBI Doughnuts
4:07
Просмотров 21 тыс.
Kevin Mitnick: Live Hack at CeBIT Global Conferences 2015
1:11:56
Watch this hacker break into a company
2:56
Просмотров 3,9 млн
How Hackers Move Through Networks (with Ligolo)
20:01
Просмотров 262 тыс.
Kevin Mitnick: How to Troll the FBI | Big Think
2:29
Просмотров 666 тыс.