Since this video has been getting attention again, and the occasional comment by would be internet detectives pointing out the IE window at 2:51, I thought I would point out a few things. No, the video isn't staged, why did I open that page, because I was curious if anything would happen. At this point I wasn't sure if I would have to remake this with SP0 to get the effect I was looking for (the whole concept for this video came about because I remembered reading on a tech support forum that exposing unpatched XP ot . Google.com is weirdly the only site that works on IE6, I don't know why, but even if I had wanted to I would not have been able to download anything (hence why I install FF at 5:30). I had to use a method where I converted a zip to an iso and uploaded it to proxmox to transfer files to do that. Why does this work? The unpatched eternalblue vulnerability on SP3 & the fact I exposed it directly to the internet (not behind NAT). (Reverse engineering of the worm: ua-cam.com/video/iC04nkklPY0/v-deo.html). It is worth noting that using non NaT'd internet was much more common in the Windows XP era than it is today, for people wondering how I did this, if you look at the browser I'm using, this is actually a proxmox VM on a dedicated cloud server, which allowed me to just choose one of the IPs for the internet. So is Windows XP safe behind a NAT, or with the firewall enabled? Yes and no. The windows firewall, even on XP works as advertised (unless you run malware that nullifies it), so you would not get networmed. The trouble is, if you wanted to connect the system to the internet, you're likely going to end up using an outdated browser which leads to the same trouble. In addition, if by any means, the system were to get infected, escalating privileges and pivoting to anything else on the machine is trivial. I might make a video testing this at some point. The only way that it is reasonable to use Windows XP is in a very controlled environment for a specific task. IE legacy software to control a machine. If you must use it online, using a modern backported browser such as supermium is a very good idea: github.com/win32ss/supermium.
@@techactivate781 I didn't know (at the time of recording) if windows XP sp3 was vulnerable to networms (that is getting infected with no interaction).
I have used my XP system online, just the default IE 6. It has no other software, I have used for the kali linux penetration system, armitage, there hasn't been any trouble with it while it was connected, but that is true that simply having had a system like this connected, with antivirus about twenty years ago would lead to getting a virus. Or even just twelve years back.
Things to consider: - Windows XP is used by: - some military operations - as backend for machines for medical purposes (e.g. X-Ray, MRT, ...) - as backend for CNC-machines - as terminal backend for pos-Systems (Point Of Sale) - as terminal backend for ATMs - SysOps are reluctant for changes, if systems are running - If you would change the software on some machines, they would loose their certificates allowing them to be run. - Networking a Windows XP machine is that much more comfortable than sneaker-netting it. If you think about it, the scan for Windows XP machines connected to the internet starts to make an awful lot of sense!
my pos system runs windows 10, can't say the same for other stores and those other devices and on top of that, our pos's are only connected to the network for software updates, and even then still have 0 internet access
@@tnolentin If they aren't already hit, they're all on internal closed off systems or cut off from any external devices at all. The military doesn't operate on the open web.
Microsoft extended support solely because so many machines still used XP, think the last was some commercial/developer subscription, I was surprised when I had a scan and the system was running XP I expect they could have fixed the holes in the operating system, as they still have issues now, people will always look for the backdoor no matter what.
Reminds me of league of legends old anticheat (although it would close the game if you had executables with certain names open). I'm not sure what the intention is, if I read about the malware I'm gonna think it's not malware?
I have a malware on my pc that when i search something like "Avast Antivirus Download for Windows 11" or search for any antivirus it instantly crashes my browser.
@@EricParkerprobably to block users from searching how to remove it. Maybe the malware has a vulnerability? It makes sense. Back in the Vista days, you couldn't just use your phone to look up the malware. Single pc family? Now you can't look up how to fix it.
Once went to a new client who said their Win 2000 server was running slow. Turns out their onsite 'expert' had put it in the router's dmz cause they didn't know about port forwards. It was running slow because everyone else in the world was running their own software on it.
i'm thinking an external firewall that didn't have proper routing tables set up? i mean, a dmz and port forwarding is about the same difficulty. maybe they threw it in dmz, deleted routing tables, then quit?
I run win XP sp3 on internet daily. it runs fast as hell on 512mb ram and 1 .5 gig hd. it NEVER spies on me or does sneaky windows crap in the back ground. i actually have 32 gigs ram and 1.5 terabytes of ssd HD. i use a firewall called "tiny firewall" that i've used since 2001 and i dug thru the OS years ago to shut off many services. i know each and every folder , file and dll in win32, it would be impossible for one person to know all the os files and folders and dll's and what they do and dependencies in win 10 or 11. it does exactly what i tell it to and NOTHING i don't ask it to- THAT my friends in never going to be the case with any windows operating system since xp and never will be in the future. its small clean fast and MINE! i double boot it with mint virgina and am getting used to linux now slowly but i will always love my XP!!
@@brodriguez11000 You have to have an actual firewall in IPv6 because the router issues globally routable IPs to every IPv6 enabled device. That said I do also have static private IPs on my devices too, which I use for the same reason I have static IPv4 allocations on my router.
It's more like you pay them money for them to tell you that you don't actually control the system and by using it you're already being exposed to risk (in addition to your data exposed to breaches in their data centers)
Every time I buy a new phone or set up a new laptop or other system I diligently configure all of the privacy and security settings to make the device more secure and to protect my privacy. Every time they update or upgrade my devices, they methodically go in and undo all of those changes. It's like being stripped naked and shoved outdoors to expose you to the elements. They want you to be as vulnerable as possible because your data is a commodity and profit overrides every other concern.
The funny thing is, malware in this environment is so competitive with other malware that there are actually good reasons for the malware itself to enable and install security features and software to try to mitigate the threat to its operation posed by other malware.
there are hackers who fix the way they broke into the system, because they know they likely wont be caught with their operation, but if others exploit the weakness who are not so carefull. at that point other hackers are a security threat to your own operation
Firewalls becoming commonplace is probably among the TOP reasons computer viruses have declined so much since the 2000s. Yes, there is still tons of malware, but the days of computer worms infecting millions of PCs via the internet are (hopefully) over.
@@papajohnscookie NAT is only commonplace on IPV4, IPV6 has no concept of NAT. All IPV6 addresses are globally routable, the only thing standing between you and the world is a firewall in IPV6. There is an unofficial NAT for IPV6, but its use is heavily discouraged by some IPV6 purists.
@@johnata6396 A router on IPv6 by default will block unsolicited traffic from routing into your private network, achieving the same effect NAT did (but with NAT it was a happy side-effect of how it needs to work, rather than intentional) but without breaking the global routing when you are connecting from an IPv6 client outwards. Basically rather than port forwarding, if you want to run a service on IPv6 you add a firewall rule to allow traffic over that port to that client. By not using NAT, every client has every port available for use, whereas with NAT if you port forward then that port can only be used with that one client. This makes running services that have default ports easier, rather than needing a proxy in the middle to figure out which physical server it needs to forward to.
Oh i learned that the hard way, followed by hacking attempts on the RDP port, instantly banning the main "Administrator" account. And that's why the built-in account should be passworded, even if it's disabled by default.
Windows XP is still extensively targeted, as it is still used heavily in embedded and point of sale applications, as well as systems set up once and never modified because they never stopped working. Windows 95 would see much less malware on the internet, it's used in far fewer places as XP. There's also not as much to gain from running a bot net of Windows 95 boxes, or ransoming their disks. What would be spicy would be an early version of Windows NT, such as 3.X or 4.0 on the open net. Those are similar to modern windows under the hood, and are susceptible to pretty much every exploit in the book for the Windows operating system, winnuker and ping of death, for instance.
It's also a lot more work to make something run on both NT and Win9x/DOS systems as it's a completely different kernel. Way more NT around, and always (since its introduction, pretty much) has been in more professional environments. And if you're trying to exploit specific vulnerabilities, it'll just be a headache.
Many people in the comments seem to have missed, that Eric disabled the firewall completely, no AV of any kind etc. An XP machine will be just fine, if it's firewalled, updated as far as it can be and you only open the exact port(s) that you need and only forward those on the router. I've been running a SOAP/REST web application (written in Delphi XE) on a XP SP3 VM for a little more than a decade. Why XP and not Win 7, 8 or 10? 120MB RAM used vs 800 MB RAM used, plus double CPU usage and a 6-fold increase in taken HDD space. I scan its VHD montly, with various AV scanners - nothing ever touches it. But it's protected by a Linux-driven firewall distro, behind NAT, the router exposes just 1 single port and I only allow connection to that port from specific subnets on the internet. No hacking into that, almost no way.. What Eric did, is like leaving an old luxury car, completely unlocked, all windows down, key in the ignition, on a dark city center street. It would get stolen in no-time. But once you enable the built-in security as you should (no key, lock all doors and windows etc) and add a few modern features (immobilizer, security guard etc), your car most likely won't get touched at all. So keep that in mind when watching this.
Thank you for your reply! I have always heard that the hard truth with these outdated OS's is that you won't get instantly infected from being on the internet UNLESS you have p clue what your doing, in which popular opinion suggests otherwise (though, it keeps clueless people from experimenting on these systems with no experience, so not all bad) I wish he would have made it more clear that he made himself more vulnerable and that there were still ways to keep these systems somewhat safe-ish, rather then stroking this popular opinion, which isn't as one sided as people think it is. I hope these comments like yours get more likes!
On top of that It's stated in the intro that the system is directly connected to open internet, not like a typical modern home setup that uses a router and nat your connection to isp wan then nat again to the internet So it essentially has a public IP right at that computer which is a really bad idea TBH, I don't think even windows 10/11 will survive with the same setup
A fun thing to do is turn on logging on the firewall and watch the huge number of scans and probes that continuously happen. Thankfully, we have firewalls that work.
Not just XP, set up a google cloud with some services exposed and firewall logging on and watch how fast a feeding frenzy fills up firewall logs. google will start charging for logging from end of 2024
From what I understand the machine is in some sort of DMZ (demilitarized zone) where all of its ports and activity is exposed to the internet which is not a realistic scenario with routers unless you specifically do it. You can use XP with internet connection perfectly fine under normal circumstances as your router doesn't expose any ports to the outside. Even Windows 10/11 in DMZ could get infected, so this video doesn't make much sense on blaming outdated systems for that.
I was thinking the same as I use XP for streaming movies across my LAN, I imagine you can get this result on any system if you proactively open it up, i can see Eric is confused by the processes in the task manager, not knowing if they are supposed to be there or not. Would be interesting to see Dave's garage do this same test.
I most think this is not to blame old systems, but to have fun. Also what you explained about routers is already explained in the beginning of the video.
Well, Windows 8 onwards has antivirus natively. Even if they are connected to a DMZ, as soon as the infection attempt begins, Defender should try to act, assuming the user does not disable it, of course. Maybe the result wouldn't be the same, just speculating...
Yes exactly. This is showing what would happen if you connected windows xp directly to the internet TODAY, as would have been the case with anyone using a dialup modem back in the day. Today, not really an issue
It was mentioned in the video but in XP's time people were usually directly connected to the Internet. When using dial-up Internet you get assigned a public IP address directly, no router no NAT no nothing. Same was true for a long time with cable and DSL Internet. Pretty much until people started having more than one device that can connect to the Internet and the need for a router. Then came WiFi and and soon enough ISPs were just shipping modem+router+WiFi combo boxes and now everyone has an implied "firewall" in the form of NAT. That's also where DMZ became a thing, now that you have a NAT box, you need to give users a way to replicate the functionality. And actually no a properly configured Windows 10 isn't automatically vulnerable if put directly on the Internet, or even a Windows XP machine back then. XP is so vulnerable because it's unpatched to all the new exploits that came out. These things exploit bugs in servers that Windows runs in the background for file sharing and remote desktop. A fully patched Windows 10 should have all of the known ones fixed, so it's mostly safe to expose RDP and SMB directly on the Internet, because it'll work as intended and deny access correctly. I'm not saying it's a good idea, but it shouldn't get instantly infected like XP would with its hundreds of known vulnerabilities. People do that all the time to set up game servers and stuff and remotely manage them with RDP. Just, you block off those ports from the Internet and set up a VPN server instead so you can remote in from that. Windows 10 will be XP levels of vulnerable once it's as old as XP is today and new exploits are found. I actually ran XP directly on the Internet back then, had the firewall on as you'd expect and an antivirus. Never caught anything. The main attack vector back then was Java/Flash on websites and malicious ActiveX applets in IE, or just snuck into file downloads on sketchier sites and crap you downloaded on Kazaa/eMule/LimeWire.
Things to do when using the internet on XP: - Install anti-virus software - Turn on the firewall - Use new, safe browsers for Windows XP like Supermium, etc
2044??? I seriously doubt it'll be possible after 2027. I mean, how could anybody power up computers and network them together after our epoch's abrupt cataclysm?
....but it was the best windows OS lol. Windows 3.5 for the win! XP was great but nothing fancy. It was a nice change from the garbage 7/8/whatever those funny flow bubble menu ones were.
This one was too funny with all the random obviously safe processes with totally inconspicuous names such as "ftp" and "conhoz" (published by Microsoft compilation Inc. Ltd. Corp. TM)
Yes, FTP is safe, it is a client, conhoz is oubious that it is fake, the real program is "conhost" the parent of cmd it is NOT stored in TEMP and has not this 2024 looking icon
Being a bit of a minimalist single minded freak, only doing a few things at a time, shutting excess processes down, you get the hang of who/which processes looks legit even without any programming/system admin knowledge. Buuut, the bloated operating systems coming out of Redmond nowdays makes it harder and harder to see the sus programs.
@@blakecarson6555It’s funny how he specifically mentions that in the beginning of the video, but so many people in the comments still don’t get it. I guess it goes to show how little most people know about networking.
@@thecooldude9999 true. I think the only reason I know some of this stuff is because of an old Cisco networking cert. And I'm CERTAIN that I'm way behind the times nowadays, because I took that course when xp was brand new.
thats why routers have firewalls, unlike before where all the ports on your ip address were open to the outside world combine this with windows xp being full of security vulnerabilities, and its no surprise this can happen.
XP was primarily single-threaded To make more efficient use of more cores you want to split tasks off into more processes so they can run concurrently. Some OS tasks inherently need to have one copy running per thread available on the CPU (eg 2 copies per CPU core that has hyper-threading, 1 per core that doesn't). So being lean doesn't necessarily mean it was more efficient, quite the opposite.
one thing you dont make clear is that you are connecting to internet without firewall and you have all the ports open. if you did this with a new computer and turned off the firewall you would be in danger of malwares too, since people can connect to your computer using port scanners. if you have a windows xp computer and connect to internet using your router there shouldnt be any danger
Most of ISPs give same IP Address to multiple people making exposing services impossible without tunneling unless customer asks isp to give them a dedicated IP while isn't any best practice such machine should be pretty much safe from network vectors and the only danger would be user's actions and for the browsers nobody gotta find a zero day on mypal just to get in your computer because your average folk are likely not a targeted person they would instead target more high profile people.
@@iner1_ That's not entirely accurate. If cgnat didn't allow port forwarding at all you wouldn't have functional internet. You just can't assign your own port forwards with cgnat.
Since home routers usually have tight firewalls by default, the average person is unlikely to get hit this hard. But hackers are after valuable business, not us. Businesses and governments typically have their ports open to serve legitimate users. Unless you deliberately remove your firewall, Windows XP is not nearly this unsafe. It's still not a good idea to use it for anything you care about, but this is not a realistic representation of what the average person would experience.
@@shivanshshivi811 A firewall creates rules for a network and blocks communication that looks suspicious, usually if it's unsolicited. Part of this process is closing ports. You have to manually whitelist ports to open (this is called Port Forwarding) in order to allow other people to connect at any time. If you have any other questions, Google them, I'm not your encyclopedia
@@shivanshshivi811 it means you tell your computer to listen for incoming messages but only messages that say they want to enter with a certain ’key’ number, this is the port (it’s just a number). if you have a server application, it will listen for messages on some port number. usually, in your router’s settings, you will have to set it to send messages with that port number to specifically to your computer
LOL I run win XP sp3 on internet daily. it runs fast as hell on 512mb ram and 1 .5 gig hd. it NEVER spies on me or does sneaky windows crap in the back ground. i actually have 32 gigs ram and 1.5 terabytes of ssd HD. i use a firewall called "tiny firewall" that i've used since 2001 and i dug thru the OS years ago to shut off many services. i know each and every folder , file and dll in win32, it would be impossible for one person to know all the os files and folders and dll's and what they do and dependencies in win 10 or 11. it does exactly what i tell it to and NOTHING i don't ask it to- THAT my friends is never going to be the case with any windows operating system since xp and never will be in the future. its small clean fast and MINE! i double boot it with mint virgina and am getting used to linux now slowly but i will always love my XP!
"Have you ever wondered if it's true you can instantly get malware? In this video we discover how dangerous XP really is." I can see why many are displeased with the video... since even the description doesn't really tell you what is up. The title as well completely leaves out the "worst case, intended risk scenario". I know it was mentioned in the video... but it's easy to miss. Kinda proven in my eyes because many seem to explain it in the comments as well.
@@Kel_Rowan Disable any protection then download to My Music folder and install? Yes, you can do it that easily in latest Win11, Mac, Ubuntu and etc too. So what's the point of this low effort cut video? Even if you install 10 AV software, disable it all then download and install malware. It's also work.
1. How did you know the worm was manually installed? I could be a shoddy attack 2. He admitted that he disabled XPs security features. He said that he turned off the firewall and connected straight to the internet without a router in between.
@@fred-youtube You're too easy to con. Yes he said that but he didn't tell you this.. You see at 2:49 - 2:50 that worm is searched and "My Music" is magically open in between. So yes, he's just disable all protection, download the worm and execute it. You can do that in your latest OS right now.
@@Ryan-pz2wh yes, especially after the op pinpoint his lazy cut but people still intend to believe this low-effort staged. It's sad how hard good people can help victim from bad guy😮💨
To be clear though, you deliberately set it up to be as vulnerable as possible. I have a laptop running Windows XP with all updates and patches installed (most critically the patch against EternalBlue) and it's been a seamless experience. Surprisingly capable machine - by which, I mean, it can do 1080p video streaming! Anyhow, even though I think it's basically safe to use, I'd still never log into anything important on it :P but it's definitely not a "connect and get pwned" situation.
I remember running Windows 2000 around year 2000 and even then, I did configure it to close *every TCP port* it listens by default. Then you don't need firewall because you have zero ports open. Would work perfectly well for Windows XP, too. And yes, getting all the default ports closed is pretty hard because Microsoft practically backdoored Windows by default to make it easier to connect to LAN. If you run WinXP today, I wouldn't be overly surprised if it gets infected with all the TCP ports closed.
and remember windows also gets backdoors for authorities, not like it matters in 99% of the cases. Can be a pain once they are public ofc but then they often are just patched out anyways.
@@Ramog1000 No backdoor has ever been demonstrated. If you think about the special government registry values in Windows registry, those are used by administrators of government office computer networks to avoid trusting Microsoft certificates and only trust their own certificates.
@@RandomDude-Z840 For making a disingenious video? It's titled suggesting that merely connecting to the internet with XP will lead to infection, but turns out he deliberately didn't have any AV running, disabled even the humble built-in firewall, _and_ seemed to intentionally infect it with something in order to get the ball rolling.
This video is the equivalent to the one "Checking the BMW X5 security level against thieves" in which the first instruction is, "Park it at night in dangerous área with the Windows opened"
"Windows XP wor..." On taskbar... No, you definitely didn't search for Windows XP worms I used Windows 7 as my main OS until 2022, I used WinXP on virtual machine, both were connected to the internet. I was sometimes running antivirus scans as you did tn the end of your video. But get no malwares
As an experienced IT and cybersecurity professional, I need to address several critical issues and inaccuracies in your video, highlighting why your approach is not only misguided but potentially harmful. Recklessness: Connecting Windows XP to the internet without any security measures is irresponsible and dangerous. No one in their right mind would do this-they'd at least have the firewall on. By performing this stunt and declaring XP dangerous online, you ignore fundamental cybersecurity practices essential for protecting systems. XP is no more dangerous than Windows 11 with all firewalls and security turned off. Misleading Assertions: Your claims about Windows XP's firewall and antivirus inadequacy oversimplify the issue. XP's security was appropriate for its time, and modern operating systems have evolved to counter contemporary threats. With necessary POSReady updates and other security fixes, XP can be much more secure than you show in your video, especially if additional security measures are implemented. Technical Inaccuracies: Your superficial malware analysis lacked depth and the necessary tools for thorough examination. This could mislead viewers about the nature and handling of malware. You failed to mention that modern viruses often can't run properly on XP, that much ransomware is incompatible, and that XP isn't filled with bloatware or default spyware like Windows 11. Presentation Flaws: You did not discuss the importance of legacy system management, patch management, and the role of virtual machines in safely running outdated software. Instead of merely showing vulnerabilities, you should have highlighted best practices for securing systems, the importance of regular updates, and modern cybersecurity tools. Additional Points: Conducting such an experiment without proper safeguards is foolish. Contrary to your approach, I have used Windows XP securely online for years with all necessary protections in place and no infections. There are security solutions that can make XP more secure than a stock Windows 11 installation, despite its inherent vulnerabilities. You also failed to show what happens if you do this on a newer OS. Turning off the firewall and security on any computer will cause issues, regardless of OS, especially if your router is old and many ports are open. Under the right circumstances, a Windows 11 PC could be just as vulnerable as the XP install in your video. If your experiment was conducted on a VM, it further diminishes the relevance of your findings. In the retro community, videos like this scare potential retro gamers away with misinformation. It would be more beneficial if you clarified the misinformation and provided relevant info on how to secure an XP install rather than promoting fearmongering. Your video could have been a valuable educational resource, but it falls short of being useful.
I love your counter argument: I always love to hear other opinions, especially if criticisms, so I can get a more full picture instead of assuming stuff and get in trouble. If only people like you could make a video explaining the stuff with a visal guide, it would be amazing for anyone else but making videos is not that easy and this comment does a lot on its own. Thank you, thakst peple like you who exists and choose to give their opinion instead of saying "nah, who cares, I don't want to waste time typing something nobody is gonna read". I would also have read without replying but I felt the need to let you know how grateful I was to you for sharing this pearl of IT knowledge. (excuse me for mistakes I made, I'm not an English speaker and it's 4 AM with no sleep due to test anxiety, too lazy to check back what I wrote and use GPT to correct my stuff)
@@dubbyplaysthank you for this, I’ve personally built a lot of retro rigs so seeing the positive reaction to my rebuke is encouraging; I will eventually do a video response to further insinuate my experience.
Hi! No hate, loved this video. I wanted to ask about your search at 2:53, where it said "xp sp3 worm"? Are you sure you didn't just... install the malware yourself and claim that you got it remotely?
manually disabling router firewalls and purposely opening all ports will do this - however, literally just having the default firewall on your router on blocks almost all attacks like this. my XP computer that i’ve had running since 2017 hasn’t been infected once just from leaving the firewall up.
My first o/s (back in the early 2000's) was XP; even running it through a DSL modem with firewall turned on, it was still a security cesspool. You didn't have to visit shady sites, viruses came wrapped in so many different ways
dunno what are you talking about, used XP since 2006 (not sure), got my own pc at around 2008, XP SP1, then SP2, then 2000 SP4, SP3, got about everything possible could be, even got "winlocker" for searching a nice p....n vid (lol), but reblocked my machine straight from it (lol) and deleted (woaahh) with no issues. XP SP3 was not so bad at security, and Outpost Security did a powerful job to stop 85-90 troubles from being on your pc (never used since 2013-2014) Dunno how do you get malware, i've periodically checked my non-protected XP SP3 machine with newest signature bases - and no trojans or malwares got into it, lol
Why do you download something from Uptodown in the first place? This place is riddled with infected software. My bare metal XP machine is on the internet today and fine by knowing what I do and how I browse and only download from genuine sources.
@@davidvanderklauw this is not about "best" this is only about "it will work, for most times". Google Chrome 49.0 Firefox 52 Maybe yandex.browser (Russian fork of Chrome) will work Opera 12.18 will work but for very basic things, and it works FAST. And supports FTP (wow) Some users used Brave or Dolphin or even UC but i can't trust these chinese things
I know for Malwarebytes has scan rootkits disabled by default in their settings. So it seems as why Malwarebytes is not detecting the actual problems causing all of that to run at startup. I guess for the rootkit case it doesn't want to uninstall a "rootkit" that isn't one or some crazy bizarre anti-cheat that accesses Dom 0.
Amazing video, was thinking of doing this at some point, looks like it's not too different from connecting windows XP to the internet in its hayday without an antivirus. In an ever changing world Windows XP provides a feeling of home for those of us who grew up with the internet before everyone was on it. :D
@@yeltsinreyesblandon7362 I had to redo a few systems that were Windows 11… You cannot set them up without Internet connection unless you get the fancy command prompt incantation and boot sequence.
@@yeltsinreyesblandon7362 its because in this video he opened every single port, completely disabling the firewall, similar to connecting your computer directly into the modem. on modern windows versions there is actual security in place to prevent that, but of course not on windows xp with its default settings
@@yeltsinreyesblandon7362 As long as you: Don't disable your router's firewall Don't disable your PCs firewall Don't disable microsoft defender Don't run an incredibly outdated version of w11 then you're still not safe from malware because Windows 11 itself is malware. Switch to linux if you care about avoiding malware
Why is this surprising at all? Probably the same thing would happen with any modern OS without firewall, and connected directly to the internet without router/gateway.
I'm running Windows 10 Pro 22H2 with all updates, Windows Defender completely disabled (MsMpEng.exe), firewall on, PC running 24/7 for years, no issues. Have no antivirus running.
@@doicenti9033 You have the firewall running and most likely behind a router, what doesn't translate most ports to your PC. So in this case your computer's setup is way different than the XP shown in the video.
As someone who literally uses an XP computer for daily use and browsing (early XP, only has net framework 2.0) I can still say it's reliable. While it is slower while loading newer websites with a bazillion moving images and stuff on em, its still usable. I dont know HOW you got so many viruses just by logging online.
Pay attention people. He says he Purposely set up the network to bypass safety features, These same bypasses will allow your windows 11 pc to blow up in the same/similar fashion. I still have an XP computer I use daily. Totally safe and fine and been up and running stabile for years. What I personally would find amusing is if this Streamer didn't run this VM sanboxed and it actually has access to his network. oooops.
This video is fake, look at the taskbar at 2:50 You will see he googled xp sp3 worm. So turns out. Its safe for windows xp to connect! Edit: If your router is behind, its safe
i just realized this was uploaded on my birthday lmfao, good video, i actually always wondered what happened what would happen if you were to do something like this
I still have some memories regarding connecting unprotected XP to the internet. I think I was about 12-13 years old at the time, and I was trying to get my cousin's computer fixed. So I decided to do what I knew best, which is reinstall Windows - but the only disc I had on hand was a SP-less Windows XP, so I used that. It took *seconds* after connecting to the internet, the desktop was already filled with all sorts of shortcuts and the entire computer froze like a minute later. Pretty sure some of these icons lead straight to prn, or they pretended to (now that I think about it, some of these shortcut icons might have been my first exposure to this kind of content...). I panicked and told my cousin to call a proper IT guy to get it done 😶
NGL I still have a gaming XP PC and sometimes use it online, I do have an Antivirus still running on it and haven't noticed anything weird, no personal data is stored on this pc. Its just kinda cool being able to surf the web, watch videos or listen to music on this PC. Just takes me back to simpler times in my life. Specs - 8Core FX8350, 8g of ram (4 useable) 500gb SSD, GTX 780ti.
I also have an old pc for gaming some older games cause windows 11 compatibility is bs. but I don't connect it to internet I download files and scan it in the newer pc and windows then transfer it via a external HDD.
@@crescious3231 No, not at all. He was spreading misinformation about Windows XP security while disabling his firewall and manually installing a worm (2:50).
Wild that I find this video while setting up my childhood VM with XP, lol. I'm not too worried, but I'll be sure to keep it as secure as possible. Malware is a part of my childhood that I DON'T wanna re-experience. Came here from PCGamer and SomeOrdinaryGamers, btw.
What is a real trip is starting with MS DOS, then Windows 3.1, Win 95, Win98, Win98SE, XP, Win7, and so on. Install sequentially on the same box and watch the evolution of the screens and options. Remember the whole world came up the mountain through this path. Win3.11 (networking) was my first encounter with Windows being used commercially. It crashed every now and then but could be rebooted very quickly. You can still find this old stuff around. DOS installed from three diskettes. Windows 95 installed from 11 diskettes. Then the growing software came out on CD.
well, the title is a bit missleading: you are not just connecting it to the internet but rather exposing it to the internet. if you would do this without a public ip (wich is normally the case btw.) nothing really would happen. there would only be a risk if a pc on the same network would have it's own public ip.
Gotta be honest I was semi-surprised when you restarted that Malware Bytes was even present on the PC still. Some of the older stuff was very good at making sure they knew you weren't in control anymore.
When I got back into computer a little over 15 years ago. Another tech was loading a fresh install of Windows 2000 server and it started crashing. So he asked me to come upstairs and see what it was crashing. Upon watching it load up. I noticed it did something that told me it was being infected asap. He was plugged into a network provider that was a wisp and there security they had was garbage. I put a router between the two and problem solved. Great video and I forgot about some of those tricks. The malware closing the anti-virus and other clean up tools. Machines was getting infected so fast. The place I worked at was accused more than once of doing it just to get more money. At bad caps to that. Nobody wanted a PC anymore.
I have some old PCs that I mess around with, and I don't connect them to the internet for this exact reason. I would hate to have the system become a target, and potentially have malware spread to other systems on the network.
so you worry for having a way beyond standard way to connect to the internet and disabling firewall on purpose? This is more like a whatif scenario than anythign else.
I’m calling bull on this. Where did he get the ISO from? It’s probably already infected… I ran XP on my old machine not that long ago to create an old DOS gaming setup, didn’t have any of these issues…
2:23 XP's firewall is what prevents the machine from accepting random connections ,yet you get out of your way to disable it ...Why ? If you do the same on newer windows it will get attacked too.
don't forget that a standard router nowerdays doesn't let most things through except you tell it to. But why even make a comment out of it, its clear from the start that this is only a what if scenario.
The difference between now and "back in the day" is that now we have apps that can scan the entire public IPv4 address space in less than 15 minutes (see apps like masscan) so it's trivial to find systems that have vulnerable services exposed publicly. For the IPs at 12:31, instead of just hitting the IP in the browser, you need to look at the end of the command to get the full URL. It's downloading an MSI installer disguised as a PNG file.
It'd be pretty scary trying to run Windows XP unironically for a PC nowadays, when a system reaches its final updates and isn't supported anymore it's pretty easy to make something that bypasses all of its security protocols, then before you know it you're hit with every virus under the sun and your run is done. Hopefully Windows 11 gets massively improved or Windows 10 support never ends.
What is this nonsense? You've got rid of all the built-in protection mechanisms (however weak), fired up the beyond old IE and went on to browse malicious websites. I bet you can do the same with windows 11. Go on, disable the defender and the firewall (and UAC for good measure) and do the same. I'd never watch your content, but it was shoved through xda-developer news. I guess, it's time to ban them from my feed. For the record, I have a couple of vintage XP PCs, which are perfectly fine for more than 10 years. There are proper techniques to isolate and protect them (including a couple of AV solutions that support xp to this day). And of course you would limit your browsing substantially with only known good sources.
I feel this was set up to fail. No NAT and no firewall. This probably isn’t a realistic setup. I wouldn’t put my 2024 Mac running up to date OS directly on the WAN.
what I find hillarious is acting as if doing the exact same thing with no protection on any OS would yield similiar results. Excellent way to scare people into telemetry
The bit at the beginning about "not exposing your computer to the internet directly anymore" is a bit incorrect though. 1. NAT is no better than having a firewall set to reject all inbound traffic that's not a reply. NAT is not for security, NAT is to mitigate the fact there aren't enough IPv4's around. The internet is much worse because of it. 2. Lots and lots of devices have IPv6 connectivity nowadays, and IPv6 has no need for NAT or port forwarding. The firewall is even more important though.
Open all ports, turn off the firewall, use no router and browser around on suspicion websites. What normal user does that? Try Win 11 and you will have the same result.
Cool "xp sp3 wor..." site opened at 2:50 dude. So, you searched for XP malware and your VM is now infected after you did? Yeah, im sure it got infected on its own.
I mean if your running it for a service you can block it from being on the Internet and put a firewall between it and the rest of your network port forwarding only the protocols you need/want.
If you are connecting to the internet through a router (which implements NAT) you shouldn't be in much danger. And then if your VM in VirtualBox is using a NAT network interface, you are doubly safe. I run old Windows VMs in order to let scammers connect to them and make their lives a misery and I've never randomly picked up any malware, other than what the scammers put on my VMs. :)
Nah, Chad. You are pretty much safe and the only way he got infected is due to having no firewall, no nat and having every TCP/UDP port open which by default on a router, these ports are blocked/closed off by the router's firewall to prevent such things.
Don't delete your VM - you'll be fine. My work used Windows XP with a full unrestricted internet connection until April 2021. If you think 7 years out of support is bad, you'd be shocked to know my work didn't have ANY past security updates installed to their XP machines except Service Pack 3, which means those PCs only had security updates that were made up until 2008.
Had to check the upload date to confirm this was not an April fools. Not even talking about the IE window, if an OS comes pre-installed with a firewall thats how you should have tested it. If u buy a car and u take off the brakes can't complain it crashes on the first corner
OMG, this means I have to upgrade my XP PC !! I'm running XP on a 12th gen Intel I9 core with 64GB RAM and an M2 ssd. I get awesome performance!!
7 місяців тому+30
You installed the worm yourself. It says on the title of the browser tab "xp sp3 worm" at 2:54. Computers don't infect themselves like that. Don't make your viewers fools of themselves.
doesn't really matter, if you connect to the internet the way he did it can happen even without userinteraction. Having firewalls on pc and router is precisely why we don't see this anymore. Saying this doesn't happen if you disable the exact protections against it is like saying that you will not die if you drink a lethal amount of poison.
Technically it says “xp sp3 wor…”, so you can’t be 100% sure. It could be something else like “workgroups” (first suggestion from Google), which could make sense if he was trying to check the network sharing settings. I agree that it is suspicious but I could give him the benefit of the doubt. Having the uncut footage would be nice though.
This video would've been so much more interesting if you had just kept the default firewall enabled. I doubt any other windows would fare well without firewall
A very good video. There is only one thing that was slightly confusing, unless I simply took what you said the wrong way somehow. It seemed like you were claiming that back in the Windows XP days, that there was no way to put a computer behind a hardware firewall, and that the only way to run Windows XP was to directly connect the modem to the computer that Windows XP was running on. If I am understanding that right, all I have to say is that is incorrect. I've been online since 1994, and right when I switched to a broadband connection, I was running a hardware router with configurable firewall (port forwarding, blocking, etc, etc, etc). I've run a variety of BBS Servers (Renegade BBS, Telegard BBS, Mystic BBS and Synchronet BBS) as well as web servers (Apache, and some others) as well as FTP servers, and -- you get the idea. I used a Dynamic DNS service in order to keep track of my ip address so that my domain name was kept current and pointed to my hardware router. While it is true that MOST PEOPLE were indeed plugging the broadband modem directly into one computer, the more tech savvy of us were using hardware routers and running servers from home. That is a different idea than the claim that it wasn't possible to run a hardware router back then, and that plugging the modem directly into the machine was allegedly the only option.
Up until a couple years ago I had a Windows XP machine running in my music studio and connected to the net with no virus software, just the standard Firewall, and never had any issues.
As you've got Security Center I'm guessing this is the Service Pack 2 edition of XP. Curious to know what'd happen if you ran the OG/unpatched release back from 2001 ? I imagine it'd just like my first week at uni when we all plugged our laptops into our room network ports: Within an hour we all got hit with Sasser and our systems would randomly restart all throughout the day 😆
This was scary to watch. Makes a good case study for updating Windows. Also impressive knowledge of working your way around Windows and finding out what the malware and virus do!
Apart from what was said in the other comment, there are also many industrial automation equipment that still run on windows xp. I work in a company that provides image processing solutions to the industry and there are projects we developed 15-20 years ago still out there running on production lines who would be perfect targets for ransomware if connected to the internet (which is quite likely since most people operating these lines have no idea about IT security). As you can imagine, companies would be more than willing to pay good bucks in order to get their lines back working as fast as possible.
Disabled automatic updates on purpose (yes XP is EOL but who knows, if there are some updates available). Also a running FTP.exe does not imply complete control over all files. And most people in fact were behind routers when XP was introduced. This showcase is pure academic.
Absolutely any OS would get instantly infected without fire-wall. Still using XP and w7 as personal preference at home to this day and never had a single issue for the past 15+ years.
i really like the video is really, really interesting, i never thought about what happend if you connect XP to the internet, the malware in those days is crazy, that's why i love watching this type of videos, keep it up!
Simply unchecking autoruns does not disable those programs without a reboot, which was not done until after Malwarebytes had been run eliminating the files beforehand.
Is it true that you'll be infected within 30 minutes of connecting online using Windows XP? Or is it because you're injecting some malware using the host computer?
Since this video has been getting attention again, and the occasional comment by would be internet detectives pointing out the IE window at 2:51, I thought I would point out a few things.
No, the video isn't staged, why did I open that page, because I was curious if anything would happen. At this point I wasn't sure if I would have to remake this with SP0 to get the effect I was looking for (the whole concept for this video came about because I remembered reading on a tech support forum that exposing unpatched XP ot . Google.com is weirdly the only site that works on IE6, I don't know why, but even if I had wanted to I would not have been able to download anything (hence why I install FF at 5:30). I had to use a method where I converted a zip to an iso and uploaded it to proxmox to transfer files to do that.
Why does this work?
The unpatched eternalblue vulnerability on SP3 & the fact I exposed it directly to the internet (not behind NAT). (Reverse engineering of the worm: ua-cam.com/video/iC04nkklPY0/v-deo.html). It is worth noting that using non NaT'd internet was much more common in the Windows XP era than it is today, for people wondering how I did this, if you look at the browser I'm using, this is actually a proxmox VM on a dedicated cloud server, which allowed me to just choose one of the IPs for the internet.
So is Windows XP safe behind a NAT, or with the firewall enabled?
Yes and no. The windows firewall, even on XP works as advertised (unless you run malware that nullifies it), so you would not get networmed. The trouble is, if you wanted to connect the system to the internet, you're likely going to end up using an outdated browser which leads to the same trouble. In addition, if by any means, the system were to get infected, escalating privileges and pivoting to anything else on the machine is trivial. I might make a video testing this at some point.
The only way that it is reasonable to use Windows XP is in a very controlled environment for a specific task. IE legacy software to control a machine. If you must use it online, using a modern backported browser such as supermium is a very good idea: github.com/win32ss/supermium.
@@EricParker by curious what would happen u mean attention wise or for after the experiment
@@techactivate781 I didn't know (at the time of recording) if windows XP sp3 was vulnerable to networms (that is getting infected with no interaction).
@@EricParker No, what I was saying is if you opened that IE tab to see public reaction, test it somewhere else, or for some other reason.
I have used my XP system online, just the default IE 6. It has no other software, I have used for the kali linux penetration system, armitage, there hasn't been any trouble with it while it was connected, but that is true that simply having had a system like this connected, with antivirus about twenty years ago would lead to getting a virus. Or even just twelve years back.
Eternal blue vulnerability was patched by Microsoft for XP, Windows 8 and Server 2003 on May 13th 2017? Update MS17-010
Things to consider:
- Windows XP is used by:
- some military operations
- as backend for machines for medical purposes (e.g. X-Ray, MRT, ...)
- as backend for CNC-machines
- as terminal backend for pos-Systems (Point Of Sale)
- as terminal backend for ATMs
- SysOps are reluctant for changes, if systems are running
- If you would change the software on some machines, they would loose their certificates allowing them to be run.
- Networking a Windows XP machine is that much more comfortable than sneaker-netting it.
If you think about it, the scan for Windows XP machines connected to the internet starts to make an awful lot of sense!
what if those get hacked
my pos system runs windows 10, can't say the same for other stores and those other devices
and on top of that, our pos's are only connected to the network for software updates, and even then still have 0 internet access
Wager treatments and water supplies too, and many many many industrial machines
@@tnolentin If they aren't already hit, they're all on internal closed off systems or cut off from any external devices at all. The military doesn't operate on the open web.
Microsoft extended support solely because so many machines still used XP, think the last was some commercial/developer subscription, I was surprised when I had a scan and the system was running XP I expect they could have fixed the holes in the operating system, as they still have issues now, people will always look for the backdoor no matter what.
Gonna be honest.. I thought you had to at least browse around and what not. Not expecting them to be able to infect you just by being online
That's the danger with old out of support OSes. On newer OSes (in my other videos) I do have to, in this one I didn't run anything manually.
it's crazy how much vulerabilities get discovered in Windows over time. There are certainly still undiscovered ones in 10 and 11
@@EricParker would I be fine on 7 with a anti virus?
@@22shadzno
@@22shadzno
Lol! The way the malware instantly crashed your browser when you searched for it is hilarious.
Reminds me of league of legends old anticheat (although it would close the game if you had executables with certain names open). I'm not sure what the intention is, if I read about the malware I'm gonna think it's not malware?
Now that’s firewall
I have a malware on my pc that when i search something like "Avast Antivirus Download for Windows 11" or search for any antivirus it instantly crashes my browser.
10:47 btw
@@EricParkerprobably to block users from searching how to remove it. Maybe the malware has a vulnerability?
It makes sense. Back in the Vista days, you couldn't just use your phone to look up the malware. Single pc family? Now you can't look up how to fix it.
Windows XP: Spyware comes from the internet
Windows 11: Spyware comes pre-installed
windows 11 should be: i am spyware
@@sauliusvitkauskas8741
Windows 10: Spyware comes pre-installed
Windows 11: I am the spyware.
@@sauliusvitkauskas8741 That’s what he said, you just didn't get it.
fr?
Since W10 already pre-installed
Once went to a new client who said their Win 2000 server was running slow. Turns out their onsite 'expert' had put it in the router's dmz cause they didn't know about port forwards. It was running slow because everyone else in the world was running their own software on it.
🤣🤣🤣
Ah yes, the on-site IT “experts” 😂
That's a terrible move, and I'm 11
i'm thinking an external firewall that didn't have proper routing tables set up? i mean, a dmz and port forwarding is about the same difficulty. maybe they threw it in dmz, deleted routing tables, then quit?
this wouldn't have happened if you used Windows XP Gangster Edition
Common rookie mistake that one
The what edition
@@AI_PaulGangster edition
Windows XP Gangster Edition was discontinued in 2014. he should’ve upgraded to Windows 7 Ghetto Edition.
I run win XP sp3 on internet daily.
it runs fast as hell on 512mb ram and 1 .5 gig hd.
it NEVER spies on me or does sneaky windows crap in the back ground.
i actually have 32 gigs ram and 1.5 terabytes of ssd HD.
i use a firewall called "tiny firewall" that i've used since 2001 and i dug thru the OS years ago to shut off many services.
i know each and every folder , file and dll in win32, it would be impossible for one person to know all the os files and folders and dll's and what they do and dependencies in win 10 or 11.
it does exactly what i tell it to and NOTHING i don't ask it to- THAT my friends in never going to be the case with any windows operating system since xp and never will be in the future.
its small clean fast and MINE!
i double boot it with mint virgina and am getting used to linux now slowly but i will always love my XP!!
This video is great example why router's all have a firewall built-in.
Artifact of how IPv4 does things ( NAT ). IPv6 has an actual firewall.
@@brodriguez11000 You have to have an actual firewall in IPv6 because the router issues globally routable IPs to every IPv6 enabled device. That said I do also have static private IPs on my devices too, which I use for the same reason I have static IPv4 allocations on my router.
@@SynthwaveDuck Why
@@alpharudiger1193 Every address unique. Every address identfiable. A chicken in every port. Two apps in every layer. Stop all the downloading
@@SynthwaveDuck I dont understand what you mean XD
Good thing those days are gone, now we willingly let corporations install built-in spyware in our OS’s
It's more like you pay them money for them to tell you that you don't actually control the system and by using it you're already being exposed to risk (in addition to your data exposed to breaches in their data centers)
Every time I buy a new phone or set up a new laptop or other system I diligently configure all of the privacy and security settings to make the device more secure and to protect my privacy.
Every time they update or upgrade my devices, they methodically go in and undo all of those changes.
It's like being stripped naked and shoved outdoors to expose you to the elements. They want you to be as vulnerable as possible because your data is a commodity and profit overrides every other concern.
Laughs in AME 10 / 11
Windows 10 ameliorated is the real windows. Don’t let micronuts fool you with their bad apple impersonation.
Install GNU/Linux if you don't want to
The funny thing is, malware in this environment is so competitive with other malware that there are actually good reasons for the malware itself to enable and install security features and software to try to mitigate the threat to its operation posed by other malware.
A malware enabling its own anti-other viruses just to keep minding its job is the most wtf funny and worrying thing I ever heard about computers
Literal evolution and natural selection happening lmfao
there are hackers who fix the way they broke into the system, because they know they likely wont be caught with their operation, but if others exploit the weakness who are not so carefull. at that point other hackers are a security threat to your own operation
Firewalls becoming commonplace is probably among the TOP reasons computer viruses have declined so much since the 2000s. Yes, there is still tons of malware, but the days of computer worms infecting millions of PCs via the internet are (hopefully) over.
Yes that and obviously a big reason is because NAT is commonplace now.
@@papajohnscookie NAT is only commonplace on IPV4, IPV6 has no concept of NAT. All IPV6 addresses are globally routable, the only thing standing between you and the world is a firewall in IPV6.
There is an unofficial NAT for IPV6, but its use is heavily discouraged by some IPV6 purists.
Why would anyone want that to stop? I feel like we need more of that so people don't get too cocky.
Now, getting computers infected is all about conning them into something that bypasses their security.
@@johnata6396 A router on IPv6 by default will block unsolicited traffic from routing into your private network, achieving the same effect NAT did (but with NAT it was a happy side-effect of how it needs to work, rather than intentional) but without breaking the global routing when you are connecting from an IPv6 client outwards.
Basically rather than port forwarding, if you want to run a service on IPv6 you add a firewall rule to allow traffic over that port to that client. By not using NAT, every client has every port available for use, whereas with NAT if you port forward then that port can only be used with that one client. This makes running services that have default ports easier, rather than needing a proxy in the middle to figure out which physical server it needs to forward to.
Fun Fact: There's machines online that sniff for older windows connecting to the internet that are vulnerable and auto infect them
Oh i learned that the hard way, followed by hacking attempts on the RDP port, instantly banning the main "Administrator" account. And that's why the built-in account should be passworded, even if it's disabled by default.
@@Sypaka Hahaha yup but not many know that. There's other gnarly stuff to by-pass the password and give yourself admin over the admin :)
How do they do that? Are they periodically pinging every possible IP address just to see if there's anything new connected or something?
@@amitakartokdude just said how like 2min into the video
Pov you feed a victorian child a gas station burito
Next Vid: I travel back in time to 2009 and then I click on every ad.
Would love to do one on spy sherrif but AFAIK it's lost media.
Kinda cool how these worms just keep spreading themselves.
@@EricParker As in, make a normal clicking on only sketchy ads vid, but style it like if it's from 2009. (also, FIND DA MALWARE!!!)
@@EricParker I recall SpySheriff being part of a huge Malware collection somewhere, although I do not know if that collection still exists today
Do this!
@@Kizoky. I had spysheriff installed on a vm once, it shouldn't really be hard to find
Windows XP is still extensively targeted, as it is still used heavily in embedded and point of sale applications, as well as systems set up once and never modified because they never stopped working.
Windows 95 would see much less malware on the internet, it's used in far fewer places as XP. There's also not as much to gain from running a bot net of Windows 95 boxes, or ransoming their disks.
What would be spicy would be an early version of Windows NT, such as 3.X or 4.0 on the open net. Those are similar to modern windows under the hood, and are susceptible to pretty much every exploit in the book for the Windows operating system, winnuker and ping of death, for instance.
my thoughts exactly. Plenty of ATMs as well, IIRC
It's also a lot more work to make something run on both NT and Win9x/DOS systems as it's a completely different kernel. Way more NT around, and always (since its introduction, pretty much) has been in more professional environments. And if you're trying to exploit specific vulnerabilities, it'll just be a headache.
Look at any old-timey SCO when a company's IT is messing with it, and you'll see they're running Windows XP or PE with poorly secured BIOS usually.
NT 3.x or 4.0 will have a layer of security by having APIs so old it can't run the viruses /s
@@redstone0234 big brain
Needs a unregistered hypercam watermark and some 009 Soundsystem
A clips channel could remedy that
That's my jam.
Bro spoke instead of writing shit in notepad, incomprehensible
Based memories unlocked
I need to do this. So far I've used bandicam 😂😂😂😂
Many people in the comments seem to have missed, that Eric disabled the firewall completely, no AV of any kind etc. An XP machine will be just fine, if it's firewalled, updated as far as it can be and you only open the exact port(s) that you need and only forward those on the router. I've been running a SOAP/REST web application (written in Delphi XE) on a XP SP3 VM for a little more than a decade. Why XP and not Win 7, 8 or 10? 120MB RAM used vs 800 MB RAM used, plus double CPU usage and a 6-fold increase in taken HDD space. I scan its VHD montly, with various AV scanners - nothing ever touches it. But it's protected by a Linux-driven firewall distro, behind NAT, the router exposes just 1 single port and I only allow connection to that port from specific subnets on the internet. No hacking into that, almost no way.. What Eric did, is like leaving an old luxury car, completely unlocked, all windows down, key in the ignition, on a dark city center street. It would get stolen in no-time. But once you enable the built-in security as you should (no key, lock all doors and windows etc) and add a few modern features (immobilizer, security guard etc), your car most likely won't get touched at all. So keep that in mind when watching this.
Thank you for your reply! I have always heard that the hard truth with these outdated OS's is that you won't get instantly infected from being on the internet UNLESS you have p clue what your doing, in which popular opinion suggests otherwise (though, it keeps clueless people from experimenting on these systems with no experience, so not all bad)
I wish he would have made it more clear that he made himself more vulnerable and that there were still ways to keep these systems somewhat safe-ish, rather then stroking this popular opinion, which isn't as one sided as people think it is. I hope these comments like yours get more likes!
Your comment is GOLD.
thank you. i knew i was smelling some serious bullshit.
On top of that
It's stated in the intro that the system is directly connected to open internet, not like a typical modern home setup that uses a router and nat your connection to isp wan then nat again to the internet
So it essentially has a public IP right at that computer which is a really bad idea
TBH, I don't think even windows 10/11 will survive with the same setup
It's never ok to run eol os my dude(unless it has not access to the internet at all )
A fun thing to do is turn on logging on the firewall and watch the huge number of scans and probes that continuously happen. Thankfully, we have firewalls that work.
You should add a click sound - sounding like a Geiger counter.
@@mikkelbreiler8916that's a fun idea
A fun thing to do is to write a comment that you just completely made up based on the very little you know about networking.
@@HarryScanlanwhy u gotta be a meanie
Not just XP, set up a google cloud with some services exposed and firewall logging on and watch how fast a feeding frenzy fills up firewall logs. google will start charging for logging from end of 2024
From what I understand the machine is in some sort of DMZ (demilitarized zone) where all of its ports and activity is exposed to the internet which is not a realistic scenario with routers unless you specifically do it.
You can use XP with internet connection perfectly fine under normal circumstances as your router doesn't expose any ports to the outside.
Even Windows 10/11 in DMZ could get infected, so this video doesn't make much sense on blaming outdated systems for that.
I was thinking the same as I use XP for streaming movies across my LAN, I imagine you can get this result on any system if you proactively open it up, i can see Eric is confused by the processes in the task manager, not knowing if they are supposed to be there or not. Would be interesting to see Dave's garage do this same test.
I most think this is not to blame old systems, but to have fun.
Also what you explained about routers is already explained in the beginning of the video.
Well, Windows 8 onwards has antivirus natively.
Even if they are connected to a DMZ, as soon as the infection attempt begins, Defender should try to act, assuming the user does not disable it, of course.
Maybe the result wouldn't be the same, just speculating...
Yes exactly. This is showing what would happen if you connected windows xp directly to the internet TODAY, as would have been the case with anyone using a dialup modem back in the day.
Today, not really an issue
It was mentioned in the video but in XP's time people were usually directly connected to the Internet. When using dial-up Internet you get assigned a public IP address directly, no router no NAT no nothing. Same was true for a long time with cable and DSL Internet. Pretty much until people started having more than one device that can connect to the Internet and the need for a router. Then came WiFi and and soon enough ISPs were just shipping modem+router+WiFi combo boxes and now everyone has an implied "firewall" in the form of NAT. That's also where DMZ became a thing, now that you have a NAT box, you need to give users a way to replicate the functionality.
And actually no a properly configured Windows 10 isn't automatically vulnerable if put directly on the Internet, or even a Windows XP machine back then. XP is so vulnerable because it's unpatched to all the new exploits that came out. These things exploit bugs in servers that Windows runs in the background for file sharing and remote desktop. A fully patched Windows 10 should have all of the known ones fixed, so it's mostly safe to expose RDP and SMB directly on the Internet, because it'll work as intended and deny access correctly. I'm not saying it's a good idea, but it shouldn't get instantly infected like XP would with its hundreds of known vulnerabilities. People do that all the time to set up game servers and stuff and remotely manage them with RDP. Just, you block off those ports from the Internet and set up a VPN server instead so you can remote in from that.
Windows 10 will be XP levels of vulnerable once it's as old as XP is today and new exploits are found. I actually ran XP directly on the Internet back then, had the firewall on as you'd expect and an antivirus. Never caught anything. The main attack vector back then was Java/Flash on websites and malicious ActiveX applets in IE, or just snuck into file downloads on sketchier sites and crap you downloaded on Kazaa/eMule/LimeWire.
When Conhoz.exe started up MalwareBytes just said "You know what fuck this I'm going to burger king"
going for the new whopper 🔥
Conhoz - A non-malicious process (C) 2024 Microsoft Compilation
@@thatoneglitchpokemon Microsoft compilation🤪🤪🤪
@@windws7137 yes ikr lol
"Screw you guys, i'm going home" - MalwareBytes, probably
Things to do when using the internet on XP:
- Install anti-virus software
- Turn on the firewall
- Use new, safe browsers for Windows XP like Supermium, etc
Can't wait 20yrs from now to see "What happens if you connect Windows 11 to the Internet in 2044?"
I'm getting a quantum computer soon in my house. So I can hack everything and ransomware everyone on earth.
2044??? I seriously doubt it'll be possible after 2027. I mean, how could anybody power up computers and network them together after our epoch's abrupt cataclysm?
Or just in 2030 since MS will have abandoned it already.
Disable all firewalls and antiviruses and connect now. It will end in same way.
God, I can hear the old-school techno beats just by seeing that Windows XP interface.
Omnibus 😅
Dreamscape!
to be honest - this was a trance music, not a techno
....but it was the best windows OS lol. Windows 3.5 for the win! XP was great but nothing fancy. It was a nice change from the garbage 7/8/whatever those funny flow bubble menu ones were.
@@nikostalk5730 🤓
- searches for a worm (2:50)
- disables the firewall
- says its unsafe
True bro
You're not supposed to notice that you jerk.
It's a shame that so many people are falling for this video. I believed it at first until the tab was pointed out to me. Bullshit
Ikr. He didn't even attempt to do minimum protection and claim it's dangerous
Totally
This one was too funny with all the random obviously safe processes with totally inconspicuous names such as "ftp" and "conhoz" (published by Microsoft compilation Inc. Ltd. Corp. TM)
Yes, FTP is safe, it is a client, conhoz is oubious that it is fake, the real program is "conhost" the parent of cmd it is NOT stored in TEMP and has not this 2024 looking icon
@@MickmickWashesThings_Official it was a joke dude
@@MickmickWashesThings_Official r/woosh
@@adds-kz3oc what did he say he deleted his comment
Being a bit of a minimalist single minded freak, only doing a few things at a time, shutting excess processes down, you get the hang of who/which processes looks legit even without any programming/system admin knowledge. Buuut, the bloated operating systems coming out of Redmond nowdays makes it harder and harder to see the sus programs.
I had no idea that just connecting machines with obsolete operating systems to the internet could get you malware.
It can't. He's specifically operating in a way that circumvents modern protections that are built into our routers.
@@blakecarson6555It’s funny how he specifically mentions that in the beginning of the video, but so many people in the comments still don’t get it. I guess it goes to show how little most people know about networking.
@@thecooldude9999 true. I think the only reason I know some of this stuff is because of an old Cisco networking cert. And I'm CERTAIN that I'm way behind the times nowadays, because I took that course when xp was brand new.
That's why the firewall was the single most useful thing to get turned on by default and implemented in all of our modem router combination.
thats why routers have firewalls, unlike before where all the ports on your ip address were open to the outside world
combine this with windows xp being full of security vulnerabilities, and its no surprise this can happen.
21 processes. Back when MS had lean operating systems. This was why XP was great.
XP was primarily single-threaded To make more efficient use of more cores you want to split tasks off into more processes so they can run concurrently. Some OS tasks inherently need to have one copy running per thread available on the CPU (eg 2 copies per CPU core that has hyper-threading, 1 per core that doesn't). So being lean doesn't necessarily mean it was more efficient, quite the opposite.
10000% this.
one thing you dont make clear is that you are connecting to internet without firewall and you have all the ports open. if you did this with a new computer and turned off the firewall you would be in danger of malwares too, since people can connect to your computer using port scanners. if you have a windows xp computer and connect to internet using your router there shouldnt be any danger
You'd only be in danger if you are running vulnerable or improperly configured software on your system
Most of ISPs give same IP Address to multiple people making exposing services impossible without tunneling unless customer asks isp to give them a dedicated IP while isn't any best practice such machine should be pretty much safe from network vectors and the only danger would be user's actions and for the browsers nobody gotta find a zero day on mypal just to get in your computer because your average folk are likely not a targeted person they would instead target more high profile people.
@@iner1_ true
Windows is so insecure it’s crazy. Like Linux is completely fine without a firewall as well you need to configure it to be insecure
@@iner1_ That's not entirely accurate. If cgnat didn't allow port forwarding at all you wouldn't have functional internet. You just can't assign your own port forwards with cgnat.
The real question is, why did you disable the firewall? and why did you search up 'xp sp3 worm'?
I guess he has no answer for that. This video is not good and spreads misimformation on the use of older versions of windows connected online in 2024
@@kevinsahm5577 Exactly!
@@jamesrustle7536 Im no IT professional
he streamed opening windows to the internet. watch that
@@elmitudou bruhh
Since home routers usually have tight firewalls by default, the average person is unlikely to get hit this hard. But hackers are after valuable business, not us. Businesses and governments typically have their ports open to serve legitimate users.
Unless you deliberately remove your firewall, Windows XP is not nearly this unsafe. It's still not a good idea to use it for anything you care about, but this is not a realistic representation of what the average person would experience.
what does "having port open" mean
@@shivanshshivi811 A firewall creates rules for a network and blocks communication that looks suspicious, usually if it's unsolicited. Part of this process is closing ports. You have to manually whitelist ports to open (this is called Port Forwarding) in order to allow other people to connect at any time.
If you have any other questions, Google them, I'm not your encyclopedia
@@shivanshshivi811 it means you tell your computer to listen for incoming messages but only messages that say they want to enter with a certain ’key’ number, this is the port (it’s just a number). if you have a server application, it will listen for messages on some port number. usually, in your router’s settings, you will have to set it to send messages with that port number to specifically to your computer
Computer with no firewall gets hacked... I don't think it would matter what system you had.
LOL
I run win XP sp3 on internet daily.
it runs fast as hell on 512mb ram and 1 .5 gig hd.
it NEVER spies on me or does sneaky windows crap in the back ground.
i actually have 32 gigs ram and 1.5 terabytes of ssd HD.
i use a firewall called "tiny firewall" that i've used since 2001 and i dug thru the OS years ago to shut off many services.
i know each and every folder , file and dll in win32, it would be impossible for one person to know all the os files and folders and dll's and what they do and dependencies in win 10 or 11.
it does exactly what i tell it to and NOTHING i don't ask it to- THAT my friends is never going to be the case with any windows operating system since xp and never will be in the future.
its small clean fast and MINE!
i double boot it with mint virgina and am getting used to linux now slowly but i will always love my XP!
@@justaguy-69 damn that's cool ngl
While a Linux server with firewall disabled: No problem in 9 years
@@justaguy-69 You sound like someone who would like Arch Linux.
That's why this video has a clickbait title.
"Have you ever wondered if it's true you can instantly get malware? In this video we discover how dangerous XP really is."
I can see why many are displeased with the video... since even the description doesn't really tell you what is up. The title as well completely leaves out the "worst case, intended risk scenario".
I know it was mentioned in the video... but it's easy to miss. Kinda proven in my eyes because many seem to explain it in the comments as well.
what's funny, he most certainly installed worms manually by himself. Look at 2:50 at the taskbar....
@@bernds6587 that's a really big ratio
1. 2:50 "xp sp3 worm"
2. disabled firewall
3. says its unsafe
2:50 nice browser window down there on the task bar, surely you werent doing anything with it?
worm installation
😞
he streamed the whole process because of commenters like you. check the stream out in case you wanna be proven wrong
He did it to show how easy it is to get infected on xp because there’s barely any security other than the firewall anymore.
@@Kel_Rowan Disable any protection then download to My Music folder and install? Yes, you can do it that easily in latest Win11, Mac, Ubuntu and etc too. So what's the point of this low effort cut video? Even if you install 10 AV software, disable it all then download and install malware. It's also work.
This is fake, he manually disabled all of XPs security features and then manually installed a worm 2:50 bottom right of taskbar.
1. How did you know the worm was manually installed? I could be a shoddy attack
2. He admitted that he disabled XPs security features. He said that he turned off the firewall and connected straight to the internet without a router in between.
@@fred-youtube You're too easy to con. Yes he said that but he didn't tell you this.. You see at 2:49 - 2:50 that worm is searched and "My Music" is magically open in between. So yes, he's just disable all protection, download the worm and execute it. You can do that in your latest OS right now.
@@AstralrAstralr-mj1trit’s so sad that people spread misinformation for views. It’s like discovering the truth is a massive effort today.
@@Ryan-pz2wh yes, especially after the op pinpoint his lazy cut but people still intend to believe this low-effort staged. It's sad how hard good people can help victim from bad guy😮💨
@@AstralrAstralr-mj1tr 21 thousand people liked this video and 1 thousand disliked it. In other words, 21 thousand people have low IQ.
To be clear though, you deliberately set it up to be as vulnerable as possible. I have a laptop running Windows XP with all updates and patches installed (most critically the patch against EternalBlue) and it's been a seamless experience. Surprisingly capable machine - by which, I mean, it can do 1080p video streaming!
Anyhow, even though I think it's basically safe to use, I'd still never log into anything important on it :P but it's definitely not a "connect and get pwned" situation.
on 2:50 you can see xp sp 3 worm on taskbar bruuuuuhhhh
@@pippinproductions definitely.
More people need to like so everyone will see
These people can sell their mothers for attention
watch the stream he did
@@elude3808 what did they mean by this?
Try it on Windows 95. I wonder if there is any active malware still compatible.
Probably not, I doubt most of the Internet functions on Windows 95
I was running WinXP x64 for a couple years. I got infected by something so stupid, which actually refused to run after deploy.
@@MarioKartSuperCircuit The Ping of Death, now I remember,
@@MarioKartSuperCircuit TO be honest, I was kinda surprised to learn XP malware is still actively out there.
Why Most of them are forever in internet , they are out of controle , and no human Not using them
I remember running Windows 2000 around year 2000 and even then, I did configure it to close *every TCP port* it listens by default. Then you don't need firewall because you have zero ports open. Would work perfectly well for Windows XP, too. And yes, getting all the default ports closed is pretty hard because Microsoft practically backdoored Windows by default to make it easier to connect to LAN.
If you run WinXP today, I wouldn't be overly surprised if it gets infected with all the TCP ports closed.
and remember windows also gets backdoors for authorities, not like it matters in 99% of the cases. Can be a pain once they are public ofc but then they often are just patched out anyways.
@@Ramog1000 No backdoor has ever been demonstrated. If you think about the special government registry values in Windows registry, those are used by administrators of government office computer networks to avoid trusting Microsoft certificates and only trust their own certificates.
What's the point of turning off the firewall? Just show us how the firewall is holding up in today's world
they're cooking you on twitter for very good reasons this is stupid
For what??
yeah it’s kind of dumb but who cares about what nerds on twitter say loooool
@@RandomDude-Z840 For making a disingenious video? It's titled suggesting that merely connecting to the internet with XP will lead to infection, but turns out he deliberately didn't have any AV running, disabled even the humble built-in firewall, _and_ seemed to intentionally infect it with something in order to get the ball rolling.
This video is the equivalent to the one "Checking the BMW X5 security level against thieves" in which the first instruction is, "Park it at night in dangerous área with the Windows opened"
"Windows XP wor..." On taskbar... No, you definitely didn't search for Windows XP worms
I used Windows 7 as my main OS until 2022, I used WinXP on virtual machine, both were connected to the internet. I was sometimes running antivirus scans as you did tn the end of your video. But get no malwares
As an experienced IT and cybersecurity professional, I need to address several critical issues and inaccuracies in your video, highlighting why your approach is not only misguided but potentially harmful.
Recklessness:
Connecting Windows XP to the internet without any security measures is irresponsible and dangerous. No one in their right mind would do this-they'd at least have the firewall on. By performing this stunt and declaring XP dangerous online, you ignore fundamental cybersecurity practices essential for protecting systems. XP is no more dangerous than Windows 11 with all firewalls and security turned off.
Misleading Assertions:
Your claims about Windows XP's firewall and antivirus inadequacy oversimplify the issue. XP's security was appropriate for its time, and modern operating systems have evolved to counter contemporary threats. With necessary POSReady updates and other security fixes, XP can be much more secure than you show in your video, especially if additional security measures are implemented.
Technical Inaccuracies:
Your superficial malware analysis lacked depth and the necessary tools for thorough examination. This could mislead viewers about the nature and handling of malware. You failed to mention that modern viruses often can't run properly on XP, that much ransomware is incompatible, and that XP isn't filled with bloatware or default spyware like Windows 11.
Presentation Flaws:
You did not discuss the importance of legacy system management, patch management, and the role of virtual machines in safely running outdated software.
Instead of merely showing vulnerabilities, you should have highlighted best practices for securing systems, the importance of regular updates, and modern cybersecurity tools.
Additional Points:
Conducting such an experiment without proper safeguards is foolish. Contrary to your approach, I have used Windows XP securely online for years with all necessary protections in place and no infections. There are security solutions that can make XP more secure than a stock Windows 11 installation, despite its inherent vulnerabilities.
You also failed to show what happens if you do this on a newer OS. Turning off the firewall and security on any computer will cause issues, regardless of OS, especially if your router is old and many ports are open. Under the right circumstances, a Windows 11 PC could be just as vulnerable as the XP install in your video. If your experiment was conducted on a VM, it further diminishes the relevance of your findings.
In the retro community, videos like this scare potential retro gamers away with misinformation. It would be more beneficial if you clarified the misinformation and provided relevant info on how to secure an XP install rather than promoting fearmongering.
Your video could have been a valuable educational resource, but it falls short of being useful.
I love your counter argument: I always love to hear other opinions, especially if criticisms, so I can get a more full picture instead of assuming stuff and get in trouble.
If only people like you could make a video explaining the stuff with a visal guide, it would be amazing for anyone else but making videos is not that easy and this comment does a lot on its own.
Thank you, thakst peple like you who exists and choose to give their opinion instead of saying "nah, who cares, I don't want to waste time typing something nobody is gonna read". I would also have read without replying but I felt the need to let you know how grateful I was to you for sharing this pearl of IT knowledge.
(excuse me for mistakes I made, I'm not an English speaker and it's 4 AM with no sleep due to test anxiety, too lazy to check back what I wrote and use GPT to correct my stuff)
@@dubbyplaysthank you for this, I’ve personally built a lot of retro rigs so seeing the positive reaction to my rebuke is encouraging; I will eventually do a video response to further insinuate my experience.
check the taskbar at 2:50 this video is bullshit
he literally failed to download a worm directly from the vm (2:50 last taskbar tab) then moves his mouse away to download it from his real pc
@@Chromeno yeah that's similar to what happens if I try to download a worm into my real XP rig, it just doesn't work.
the frame showing he manually installed the spyware: im about to ruin this man's whole career
Hi! No hate, loved this video. I wanted to ask about your search at 2:53, where it said "xp sp3 worm"? Are you sure you didn't just... install the malware yourself and claim that you got it remotely?
manually disabling router firewalls and purposely opening all ports will do this - however, literally just having the default firewall on your router on blocks almost all attacks like this. my XP computer that i’ve had running since 2017 hasn’t been infected once just from leaving the firewall up.
thats exactly what he did
oh I am sure he did.
😞
@@tumblingdryer8887why did you install windows XP in 2017? Just for fun?
My first o/s (back in the early 2000's) was XP; even running it through a DSL modem with firewall turned on, it was still a security cesspool. You didn't have to visit shady sites, viruses came wrapped in so many different ways
dunno what are you talking about, used XP since 2006 (not sure), got my own pc at around 2008, XP SP1, then SP2, then 2000 SP4, SP3, got about everything possible could be, even got "winlocker" for searching a nice p....n vid (lol), but reblocked my machine straight from it (lol) and deleted (woaahh) with no issues.
XP SP3 was not so bad at security, and Outpost Security did a powerful job to stop 85-90 troubles from being on your pc (never used since 2013-2014)
Dunno how do you get malware, i've periodically checked my non-protected XP SP3 machine with newest signature bases - and no trojans or malwares got into it, lol
Remember those days even the venerable Internet Explorer 6 used to acquire toolbars like turds on your shoe just from accessing the 'net
@@soupdragon151 Yeah, internet explorer was terrible
Why do you download something from Uptodown in the first place? This place is riddled with infected software. My bare metal XP machine is on the internet today and fine by knowing what I do and how I browse and only download from genuine sources.
uptodown is not so danger, just be careful about download links, mate!
bruh
What is the best browser for Windows XP these days?
@@davidvanderklauw this is not about "best" this is only about "it will work, for most times".
Google Chrome 49.0
Firefox 52
Maybe yandex.browser (Russian fork of Chrome) will work
Opera 12.18 will work but for very basic things, and it works FAST. And supports FTP (wow)
Some users used Brave or Dolphin or even UC but i can't trust these chinese things
@@davidvanderklauw Supermium (based on Chrome) and Mypal 68 (based on Firefox) are pretty good and well known for use on XP.
I know for Malwarebytes has scan rootkits disabled by default in their settings. So it seems as why Malwarebytes is not detecting the actual problems causing all of that to run at startup. I guess for the rootkit case it doesn't want to uninstall a "rootkit" that isn't one or some crazy bizarre anti-cheat that accesses Dom 0.
I noticed this recently, why isn't it on my default.
2:50
"xp sp3 wor ..." For what? Worm? As in forcibly installing one?
"Don't recommend channel".
"XP service pack 3 working product key", probably something like that
Amazing video, was thinking of doing this at some point, looks like it's not too different from connecting windows XP to the internet in its hayday without an antivirus. In an ever changing world Windows XP provides a feeling of home for those of us who grew up with the internet before everyone was on it. :D
Do it with Windows 11. I always install it with internet connection but now I´m paranoid
@@yeltsinreyesblandon7362 I had to redo a few systems that were Windows 11… You cannot set them up without Internet connection unless you get the fancy command prompt incantation and boot sequence.
@@yeltsinreyesblandon7362 its because in this video he opened every single port, completely disabling the firewall, similar to connecting your computer directly into the modem. on modern windows versions there is actual security in place to prevent that, but of course not on windows xp with its default settings
Hello Leo! 😄
@@yeltsinreyesblandon7362 As long as you:
Don't disable your router's firewall
Don't disable your PCs firewall
Don't disable microsoft defender
Don't run an incredibly outdated version of w11
then you're still not safe from malware because Windows 11 itself is malware. Switch to linux if you care about avoiding malware
Why is this surprising at all? Probably the same thing would happen with any modern OS without firewall, and connected directly to the internet without router/gateway.
I'm running Windows 10 Pro 22H2 with all updates, Windows Defender completely disabled (MsMpEng.exe), firewall on, PC running 24/7 for years, no issues. Have no antivirus running.
@@doicenti9033 you are likely behind a router.
No? Like a Linux Server is completely fine being directly attached to the internet. Windows XP has RCE as a feature so what can you expect.
@@doicenti9033 You have the firewall running and most likely behind a router, what doesn't translate most ports to your PC. So in this case your computer's setup is way different than the XP shown in the video.
@@lucsoft Sure is fine, because most ports and services are closed in the WAN direction. Hopefully the SSH moved from the default port too! :D
As someone who literally uses an XP computer for daily use and browsing (early XP, only has net framework 2.0) I can still say it's reliable. While it is slower while loading newer websites with a bazillion moving images and stuff on em, its still usable. I dont know HOW you got so many viruses just by logging online.
No firewall
Pay attention people. He says he Purposely set up the network to bypass safety features, These same bypasses will allow your windows 11 pc to blow up in the same/similar fashion. I still have an XP computer I use daily. Totally safe and fine and been up and running stabile for years. What I personally would find amusing is if this Streamer didn't run this VM sanboxed and it actually has access to his network. oooops.
Him:
1. Turns off the firewall
2. Searches up "xp sp3 worm"
3. Says XP is unsafe
💀
This video is fake, look at the taskbar at 2:50
You will see he googled xp sp3 worm.
So turns out. Its safe for windows xp to connect!
Edit: If your router is behind, its safe
i just realized this was uploaded on my birthday lmfao, good video, i actually always wondered what happened what would happen if you were to do something like this
You should do a video about how safe XP is on the internet... with the damn firewall turned on.
I still have some memories regarding connecting unprotected XP to the internet. I think I was about 12-13 years old at the time, and I was trying to get my cousin's computer fixed. So I decided to do what I knew best, which is reinstall Windows - but the only disc I had on hand was a SP-less Windows XP, so I used that. It took *seconds* after connecting to the internet, the desktop was already filled with all sorts of shortcuts and the entire computer froze like a minute later. Pretty sure some of these icons lead straight to prn, or they pretended to (now that I think about it, some of these shortcut icons might have been my first exposure to this kind of content...).
I panicked and told my cousin to call a proper IT guy to get it done 😶
NGL I still have a gaming XP PC and sometimes use it online, I do have an Antivirus still running on it and haven't noticed anything weird, no personal data is stored on this pc. Its just kinda cool being able to surf the web, watch videos or listen to music on this PC. Just takes me back to simpler times in my life. Specs - 8Core FX8350, 8g of ram (4 useable) 500gb SSD, GTX 780ti.
your fine this guy is connecting without a hardware router\firewall that normally stops this.
this guy doing clickbait videos, this is not ok for him
I also have an old pc for gaming some older games cause windows 11 compatibility is bs. but I don't connect it to internet
I download files and scan it in the newer pc and windows then transfer it via a external HDD.
OP wasn't clear, bit he is literally forcing a dorect open connection to the internet without a router, all ports open, and forewall off
Congrats on 7k subs :D
Can you explain the IE tab open at 2:53?
Why that is a forceful malware install
watch the stream he did
Which stream?
@@techactivate781 its on his live tab. he did a stream where he basically did this, but live. exposing windows XP to the internet
@@techactivate781 its on his live tab. he basically streamed the entire process (exposing windows xp to the internet)
What he doesn’t tell you is that he purposefully took down his firewall
Yes that is the point of this video. To see how quickly just being connected with no protections gets you infected.
@@crescious3231 No, not at all. He was spreading misinformation about Windows XP security while disabling his firewall and manually installing a worm (2:50).
Wild that I find this video while setting up my childhood VM with XP, lol. I'm not too worried, but I'll be sure to keep it as secure as possible. Malware is a part of my childhood that I DON'T wanna re-experience.
Came here from PCGamer and SomeOrdinaryGamers, btw.
2:50 look at the taskbar not sus at all
windows 95 sounds like fun
And Windows98SE would also be interesting. :)
What is a real trip is starting with MS DOS, then Windows 3.1, Win 95, Win98, Win98SE, XP, Win7, and so on. Install sequentially on the same box and watch the evolution of the screens and options.
Remember the whole world came up the mountain through this path.
Win3.11 (networking) was my first encounter with Windows being used commercially. It crashed every now and then but could be rebooted very quickly. You can still find this old stuff around.
DOS installed from three diskettes.
Windows 95 installed from 11 diskettes.
Then the growing software came out on CD.
well, the title is a bit missleading: you are not just connecting it to the internet but rather exposing it to the internet. if you would do this without a public ip (wich is normally the case btw.) nothing really would happen. there would only be a risk if a pc on the same network would have it's own public ip.
look at 2:50 on the task bar he downloaded a worm and infected the system manually
how do you use the internet without a public ip
this is sooo ironic. i just installed a XP ISO file lollll
if you install it get avast for it cause its free and using it a have my xp PC on the internet and haven't got a virus using it yet
@@fox.9879 I like the "yet" at the end
@@ElvenMans There's no such thing as 100% security.
you don't know what ironic means
@@fox.9879 yea i already got avast
Gotta be honest I was semi-surprised when you restarted that Malware Bytes was even present on the PC still.
Some of the older stuff was very good at making sure they knew you weren't in control anymore.
When I got back into computer a little over 15 years ago. Another tech was loading a fresh install of Windows 2000 server and it started crashing. So he asked me to come upstairs and see what it was crashing. Upon watching it load up. I noticed it did something that told me it was being infected asap. He was plugged into a network provider that was a wisp and there security they had was garbage. I put a router between the two and problem solved. Great video and I forgot about some of those tricks. The malware closing the anti-virus and other clean up tools. Machines was getting infected so fast. The place I worked at was accused more than once of doing it just to get more money. At bad caps to that. Nobody wanted a PC anymore.
I have some old PCs that I mess around with, and I don't connect them to the internet for this exact reason. I would hate to have the system become a target, and potentially have malware spread to other systems on the network.
if you are worried about it spreading to other systems on the network, put a firewall behind the device in the routers settings
if youre using a firewall the chance of getting a virus like this without going on weird websites is still very low
so you worry for having a way beyond standard way to connect to the internet and disabling firewall on purpose?
This is more like a whatif scenario than anythign else.
I’m calling bull on this. Where did he get the ISO from? It’s probably already infected…
I ran XP on my old machine not that long ago to create an old DOS gaming setup, didn’t have any of these issues…
the difference is, he ran this without a firewall, as explained in the start of the video
mf didn't heard the first two mins and is saying dumb stuffs
@@NeftisIsHere because it is and misleading, retard
2:23 XP's firewall is what prevents the machine from accepting random connections ,yet you get out of your way to disable it ...Why ? If you do the same on newer windows it will get attacked too.
don't forget that a standard router nowerdays doesn't let most things through except you tell it to.
But why even make a comment out of it, its clear from the start that this is only a what if scenario.
This test would have been great with the firewall turned on. I believe it would be very effective.
The difference between now and "back in the day" is that now we have apps that can scan the entire public IPv4 address space in less than 15 minutes (see apps like masscan) so it's trivial to find systems that have vulnerable services exposed publicly.
For the IPs at 12:31, instead of just hitting the IP in the browser, you need to look at the end of the command to get the full URL. It's downloading an MSI installer disguised as a PNG file.
It'd be pretty scary trying to run Windows XP unironically for a PC nowadays, when a system reaches its final updates and isn't supported anymore it's pretty easy to make something that bypasses all of its security protocols, then before you know it you're hit with every virus under the sun and your run is done.
Hopefully Windows 11 gets massively improved or Windows 10 support never ends.
Good video, I just discovered this channel. Something about it makes me think it will take off if you keep uploading consistently. Stay on the grind
What is this nonsense? You've got rid of all the built-in protection mechanisms (however weak), fired up the beyond old IE and went on to browse malicious websites. I bet you can do the same with windows 11. Go on, disable the defender and the firewall (and UAC for good measure) and do the same. I'd never watch your content, but it was shoved through xda-developer news. I guess, it's time to ban them from my feed.
For the record, I have a couple of vintage XP PCs, which are perfectly fine for more than 10 years. There are proper techniques to isolate and protect them (including a couple of AV solutions that support xp to this day). And of course you would limit your browsing substantially with only known good sources.
It's just another pointless clickbait video. I wish UA-cam wouldn't recommend this garbage.
I feel this was set up to fail. No NAT and no firewall. This probably isn’t a realistic setup. I wouldn’t put my 2024 Mac running up to date OS directly on the WAN.
what I find hillarious is acting as if doing the exact same thing with no protection on any OS would yield similiar results. Excellent way to scare people into telemetry
The bit at the beginning about "not exposing your computer to the internet directly anymore" is a bit incorrect though.
1. NAT is no better than having a firewall set to reject all inbound traffic that's not a reply. NAT is not for security, NAT is to mitigate the fact there aren't enough IPv4's around. The internet is much worse because of it.
2. Lots and lots of devices have IPv6 connectivity nowadays, and IPv6 has no need for NAT or port forwarding. The firewall is even more important though.
Open all ports, turn off the firewall, use no router and browser around on suspicion websites. What normal user does that? Try Win 11 and you will have the same result.
Don't forget injecting the VM with malware around 2:50
Cool "xp sp3 wor..." site opened at 2:50 dude. So, you searched for XP malware and your VM is now infected after you did? Yeah, im sure it got infected on its own.
OP faked his own video
agh, didn't know you could get infected just by being online! I guess I'm deleting my VM then, or will Windows 11's firewall apply to Virtualbox?
I mean if your running it for a service you can block it from being on the Internet and put a firewall between it and the rest of your network port forwarding only the protocols you need/want.
If you are connecting to the internet through a router (which implements NAT) you shouldn't be in much danger. And then if your VM in VirtualBox is using a NAT network interface, you are doubly safe.
I run old Windows VMs in order to let scammers connect to them and make their lives a misery and I've never randomly picked up any malware, other than what the scammers put on my VMs. :)
Nah, Chad. You are pretty much safe and the only way he got infected is due to having no firewall, no nat and having every TCP/UDP port open which by default on a router, these ports are blocked/closed off by the router's firewall to prevent such things.
Don't delete your VM - you'll be fine. My work used Windows XP with a full unrestricted internet connection until April 2021. If you think 7 years out of support is bad, you'd be shocked to know my work didn't have ANY past security updates installed to their XP machines except Service Pack 3, which means those PCs only had security updates that were made up until 2008.
Windows XP has wireless Internet support, and it works fine on my old 2005 laptop without problems
Had to check the upload date to confirm this was not an April fools. Not even talking about the IE window, if an OS comes pre-installed with a firewall thats how you should have tested it. If u buy a car and u take off the brakes can't complain it crashes on the first corner
OMG, this means I have to upgrade my XP PC !! I'm running XP on a 12th gen Intel I9 core with 64GB RAM and an M2 ssd. I get awesome performance!!
You installed the worm yourself. It says on the title of the browser tab "xp sp3 worm" at 2:54. Computers don't infect themselves like that. Don't make your viewers fools of themselves.
Bingo. This guy is full of it, just downvote this dumb video and move on.
That's literally the definition of a worm. They infect systems without requiring any interaction from a user.
doesn't really matter, if you connect to the internet the way he did it can happen even without userinteraction. Having firewalls on pc and router is precisely why we don't see this anymore.
Saying this doesn't happen if you disable the exact protections against it is like saying that you will not die if you drink a lethal amount of poison.
Technically it says “xp sp3 wor…”, so you can’t be 100% sure. It could be something else like “workgroups” (first suggestion from Google), which could make sense if he was trying to check the network sharing settings.
I agree that it is suspicious but I could give him the benefit of the doubt. Having the uncut footage would be nice though.
50000 ancient virus distribution servers coming online for the first time in decades when this guy connects his vm to the internet:
This video would've been so much more interesting if you had just kept the default firewall enabled. I doubt any other windows would fare well without firewall
A very good video. There is only one thing that was slightly confusing, unless I simply took what you said the wrong way somehow. It seemed like you were claiming that back in the Windows XP days, that there was no way to put a computer behind a hardware firewall, and that the only way to run Windows XP was to directly connect the modem to the computer that Windows XP was running on. If I am understanding that right, all I have to say is that is incorrect. I've been online since 1994, and right when I switched to a broadband connection, I was running a hardware router with configurable firewall (port forwarding, blocking, etc, etc, etc). I've run a variety of BBS Servers (Renegade BBS, Telegard BBS, Mystic BBS and Synchronet BBS) as well as web servers (Apache, and some others) as well as FTP servers, and -- you get the idea. I used a Dynamic DNS service in order to keep track of my ip address so that my domain name was kept current and pointed to my hardware router. While it is true that MOST PEOPLE were indeed plugging the broadband modem directly into one computer, the more tech savvy of us were using hardware routers and running servers from home. That is a different idea than the claim that it wasn't possible to run a hardware router back then, and that plugging the modem directly into the machine was allegedly the only option.
if you use windows 11 you'll have a remote attacker taking screenshots of your PC from first install
Up until a couple years ago I had a Windows XP machine running in my music studio and connected to the net with no virus software, just the standard Firewall, and never had any issues.
As you've got Security Center I'm guessing this is the Service Pack 2 edition of XP. Curious to know what'd happen if you ran the OG/unpatched release back from 2001 ? I imagine it'd just like my first week at uni when we all plugged our laptops into our room network ports: Within an hour we all got hit with Sasser and our systems would randomly restart all throughout the day 😆
Now I want to see what would happen if you connected Windows millennium edition to the internet.
God I'm old.
It would probably crash before you even got started good 😅
This was scary to watch. Makes a good case study for updating Windows. Also impressive knowledge of working your way around Windows and finding out what the malware and virus do!
It's not
Apart from what was said in the other comment, there are also many industrial automation equipment that still run on windows xp. I work in a company that provides image processing solutions to the industry and there are projects we developed 15-20 years ago still out there running on production lines who would be perfect targets for ransomware if connected to the internet (which is quite likely since most people operating these lines have no idea about IT security). As you can imagine, companies would be more than willing to pay good bucks in order to get their lines back working as fast as possible.
Disabled automatic updates on purpose (yes XP is EOL but who knows, if there are some updates available). Also a running FTP.exe does not imply complete control over all files. And most people in fact were behind routers when XP was introduced. This showcase is pure academic.
Absolutely any OS would get instantly infected without fire-wall. Still using XP and w7 as personal preference at home to this day and never had a single issue for the past 15+ years.
he manually infected it, look at 2:50 in the task bar lol
I know a person using the same combination.
Linux by default has it's built-in firewall disabled.
i really like the video is really, really interesting, i never thought about what happend if you connect XP to the internet, the malware in those days is crazy, that's why i love watching this type of videos, keep it up!
Delta Airlines was still running machines on XP Server. That's why they were hit so hard by the Crowdstrike problem.
Simply unchecking autoruns does not disable those programs without a reboot, which was not done until after Malwarebytes had been run eliminating the files beforehand.
Is it true that you'll be infected within 30 minutes of connecting online using Windows XP? Or is it because you're injecting some malware using the host computer?
he got his views and the NPCs in the comment section are none the wiser
@@ghettochicken8420 And also likely a few views from SomeOrdinaryGamers who found this video after watching his video.
Probably if you do what this guy did and literally disable every single protection available yeah. I could give it a try and verify it myself.
@@MatthewCenance look at the right side of the taskbar at 2:50 he manually infected the system after deliberately disabling all security features.
@@SkyenNovaApost a video of it.