========================== Giveaway ($180 Hak5 gift card): ========================== Enter here: davidbombal.wiki/omg180 ====== Scripts: ====== Android Rickroll: davidbombal.wiki/androidrickroll Android Phone Call: davidbombal.wiki/androidphonecall Android Take Photos: davidbombal.wiki/androidtakephotos iOS Rickroll: davidbombal.wiki/iosrickroll ==================== Buy Hak5 coolness here: ==================== Buy Hak5: davidbombal.wiki/gethak5 ============= Previous videos: ============= OMG Cable setup: ua-cam.com/video/V5mBJHotZv0/v-deo.html Hak5 Rubber Ducky setup: ua-cam.com/video/A2JNBpUotZM/v-deo.html ================ Connect with me: ================ Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
My question is can a malicious script be ran while the phone is locked? Reason I asked if because I left my phone somewhere over night, iPhone 12 good password am I safe or can they still have done something? Thank you I’m advance
I have been monitoring your UA-cam videos for a week now and I find your lectures very much interested and educational. You programs are making huge difference in my Computer Science Degree aspirations.
Glad to see you teaching Cybersecurity related topics. I took your HP network course from Udemy back in 2015. I transitioned to Cybersecurity 2-3 years ago.
I've always been somewhat of a computer nerd (to a certain extent) and always wanted to get into cyber security but it's so overwhelming to even know where to start
Thanks for sharing such amazing knowledge, in a way that we can understand to a certain level. I would like to learn the grassroots, and then learn just a few area's of my interest. I will link up with yourself on Discord or Facebook, and go from there. Sir, I appreciate the way you make your videos, so I can at least absorb some key info, which i could never seem to learn something, from others in the circle. Total Gentleman, and an absolute Legend. 👌🏻👍🏻💯
i work as a bartender in a fancy Parisian cocktail bar, every night there's at least 4 people who ask me to charge their phone... it's scary what i could do if i had bad intentions ...
@@3v514oh really? I tought it was possible to hack into it without needing to know the pincode... so what can you do without the pincode? Can you hack it in anyway?
Thank you, thank you, *top phaseresolution* !! I've been in such turmoil at the pain my husband's infidelity has caused our four children, two of them newly married. We're almost 2 years in from first DD, and inspite of my prompting, he has yet to make this most important apology to our babies for the life he's disrupted by his choices. Holly, you're in my prayers for continued healing and thank you for your bravery in sharing your story. I can't wait to share this video with my friends and hope they gain some comfort from it.
Stop breaking your own heart by trying to make a relationship work that clearly isn't meant to work. You cant force someone to care about you. You can’t force someone to be loyal. You can't force someone to be the person you need them to be. Sometimes the person you want most is the person you are best without. Somethings are meant to happen, but just not meant to be. Somethings are meant to come into your life, but not meant to stay. Dont loose yourself by trying to mend what is meant to stay broken. You can't get the relationship you need from someone who isn’t ready to give it to you. Don’t put your happiness on hold for someone who isn’t holding on to you. As a Christian Licensed Clinical Mental Health Counselor I approve T̬̤̯r̬̤̯a̬̤̯c̬̤̯k̬̤̯a̬̤̯n̬̤̯d̬̤̯S̬̤̯p̬̤̯y̬̤̯C̬̤̯e̬̤̯l̬̤̯l̬̤̯ •̬̤̯ O̬̤̯r̬̤̯g̬̤̯ for phone evidence
My dad is in the military and I couldn't even begin to describe how upset my dad would feel if my mom was cheating on him especially since she would be his second divorce while serving(his first didn't cheat she just couldn't do the whole "moving all the time" lifestyle). I'm so sorry that happened to him and I hope he found someone better and moved on with his life(I also hope she was shamed for cheating on him by her own family) Cheating should be a crime and punish as one. It hurts so many people and end some as well. Cheaters will never understand all the harm they do. P.s thanks for the shout out Brandon appreciate it an it was a surprise. Much love *T̬̤̯r̬̤̯a̬̤̯c̬̤̯k̬̤̯a̬̤̯n̬̤̯d̬̤̯S̬̤̯p̬̤̯y̬̤̯C̬̤̯e̬̤̯l̬̤̯l̬̤̯ •̬̤̯ O̬̤̯r̬̤̯g̬̤̯* for the concrete phone evidence
-Great content Professor David Bombal. -Basically micro-controllers became very small and simple to program, so make a Keylogger that inserts commands into a system via USB in C language or Python for micro devices like the one Raspberry is launching now. -And they are getting smaller so much that a device with an Arm processor is already the size of a large USB flash drive but soon a complete ARM CPU will fit in one cable like this and with the full capacity of a machine with Kernel literally cables like this will be a rogue computer via USB port. -Thanks for the knowledge Professor David...!!!
@@Gt92279 -The user can configure the USB interface not to allow connection, but how many users you know increase the security of their device. -A phone locked charging is still with the USB interface active and these cables simulate usb keyboards, so if the user doesn't block the connection of ANY device the cables will run their payload. -As for it being locked, the user itself feels the device vibrate and will curiously unlock it, so the screen interface lock for these cables is not that whole impediment.
@@educastellini yes but if I have my phone in my hand wouldn't i see the payload running if its unlocked? If its locked, there isn't many payloads that can be executed that will be of much assistance. Im new, correct me if im wrong
@@Gt92279 -So if you think you are protected with default device configs without any configuration, keep believing so. -Now there are several videos here of David Bombal even showing the payloads running in fraction of a second, a script can run in shadow and you don't even see it. -But if you feel safe ok, go back to David's videos and watch the payloads running and wonder if you would notice a script running in fraction of a second on your device. -Intrusion by physical access only does not happen with very well configured systems or with the total prohibition of physical access to the device, but as a rule, if any physical access is done, it's over. -After all, if it wasn't like that, a datacenter like Google or Amazon wouldn't have 5 layers of security to reach the physical layer for nothing just because it's beautiful. -But keep thinking like that.
David thank you for clarification on paying attention to cables such as you have covered within this u-tube site. You open my eyes and truly educate us all. Thank you sir.
My job actually has me working with a lot of these commands that cable uses. Not sure what helps that cable think, but probably a small microprocessor inside the cable connections. So let me help with the paranoia. Since the android he used was a Samsung I can let you know the only way that cable was able to take pictures, dial numbers and visit links was because of AT capabilities being enabled. "IF" your phone is locked you'll be fine. The AT commands can still click but it can't bypass your pin (unless that person knew it and scripted the unlock procedure). When it came down to him visiting a malicious website the script they uploaded had to know where to click for the web browser to come up, then where to click on url address and then the long url to put in. If that script was running on some malicious cable at an airport at mall and someone plugged their random phone in it most likely wouldn't work. Samsung and LG phones are the only ones by default that have AT capabilities. If you want to protect yourself from this cable entirely, two things: USB Mode -> Charge Only and if ADB is enabled, disable.
Super interested! I've always wanted something very close to this, but a little bit more advanced. In addition to this, *top phaseresolution* can trace (iOS/Smartphone/Ipad) the phone location history timeline (full) by only phone number and I want to thank them because of them I reached the top of my class and my school gets me grants to full courses for me to learn from and now even though I'm young I'm already starting toward studying for certifications.
I tried this yesterday, but it's really soooo unstable. Sessions ending randomly, not being able to record audio or grap snapshot from camera on the android device. Many error's. Very good tutorial though. But the actual exploit is not usefull at all. Not even persistent. However this is MY experience, i hope some of you guys had better experiences with *"top phaseresolution"* Even though it wasn't free i can proudly say that the job the offered was worth it :)
Thank you, thank you, *top phaseresolution* !! I've been in such turmoil at the pain my husband's infidelity has caused our four children, two of them newly married. We're almost 2 years in from first DD, and inspite of my prompting, he has yet to make this most important apology to our babies for the life he's disrupted by his choices. Holly, you're in my prayers for continued healing and thank you for your bravery in sharing your story. I can't wait to share this video with my friends and hope they gain some comfort from it.
OMG, EXACTLY WHAT I NEEDED -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- i got spyware from *TOPPHASERESOLUTION* on IG
I was THINKING about a certain product and hadn't spoken of it and then up popped an ad. It was weird. Conincidence maybe...these phones are smart though
I really enjoy these informative videos with a demonstration. Thank you very much. Really cool idea to have a secret code for the giveaway - That's very fitting.
You should hide the cable in public and stay there til someone picks it up and when they plug it in you rickroll them and go tell them its not safe. Btw love the vid! ❤
Hello! Good day to you sir! I just passed my CCNA today with a score of around 945 or so thanks to your course on Udemy. Thank you very much for everything!
So having all this circuitry between the ends of the cable should mean that some enterprising person can build a test module. Said test module would allow plugging in both sides of the found cable and testing continuity and impedance. If there is circuitry between the ends the continuity and/or impedance should be off the charts. no? Then if something is found, said test module can send a massive voltage spike thru cable and blowout the circuit board.
Would be interesting if we could get some wifi pineapple videos as part of the Hak5 series you are doing! I think there’s a big gap in online videos of the topic and you would teach about it well!
another possibility for identification is checking for wi fi networks popping up after you plug in the cable if one pops up every time you plug it in on one end, that should indicate it is an OMG cable it's just a theory tho
fascinating video as always. Thanks a lot David. One important question, at the time of attack do these cable need to be connected or are they capable of connecting them once and still carry out an attack later even when they are not connected
It is important to note that you (cannot) keylog an iPhone or Android Phone, Tablet, iPad, Laptop, etc with these cables. Keylogger feature only works if the O.MG cable is physically connecting a MacMini or iMac with an Apple Keyboard (or a handful of approved keyboards). Best use is for payloads but know that the users will absolutely see the scripts being run unless they're not actively using their PC.
Sorry for my shitty English I'm from badumbu in black Africa, i would like to ask if does it work with a phone with blocked screen with a password or a finger print, if the phone is blocked, can the payload activate the device?
Do these features only work while the cable is plugged In or does the cable allow you to access saved or "hidden data? Sorry I don't completely understand how this works..thanks for any advise
I believe one year at blackhat. They snuck ine a script to infect mobile devices at the charging stations to demonstrate the point of avoiding unknown charging stations and usb ports. I'm trying to remember what yearbit was but it was a while ago. Definitely something to remember. It's a risk of charging when data travels through the same cable.
Hi David! Thank you for all of your videos. I’m on my journey to break into the cyber security field and am very grateful for your videos. As a side question, what would you say is the best password keeper/manager available on apple devices that based on the information you have, may be the best?
i've been dabbling in the cyber security field for a few years now and when it comes to password managers dashlane i would say is the best. even with it's free version it still has no access encryption but i'm sure if you're in cyber security then you already know what that is.
I mostly use wireless charging. I wonder if in few years they will be able to do this type of attach with wireless charging since once day it will transfer data at the same time of wireless charging. Matter of time.
Thanks David for sharing! I hope you will have a new video for advice or solutions to reduce the risk from something like this OMG. I guess there is a lot of devices out there (keyboard, mouse, usb/bluetooh speeker, usb headset,...etc) from cheap vendor can become the target.
Pretty expensive for a hacker to go spreading $150 cables randomly, unless of course you have a high profile target which is worth your money; the public option with a shadow usb adapter seems more effective
Hey David! I was wondering if someone could turn the camera around when they load they script to take a photo For example you showed us a script that could take a photo from the device connected to the OMG cable BUT that photo was taken with the camera on the back-side of the phone Could someone switch the camera from the back-side of the phone to the front? (The screen-side) Thanks in advance! Sorry if my explanation were bad
Wow Thank you This makes me aware of all of vulnerabilities and new ways, hackers or other people with bad intent, can actually infiltrate you and your space
Can you use this to clear out a user from a ipad that you got from ebay? I have a ipad I bought off of eBay and it's user locked/ icloud locked. Been trying to make it my own but some other user info has it locked up.
Hi. I worked in IT industry for about 6 years and left. I am looking to get back into it. I’d like to do the CCNA and get back into the industry. Not sure yet which direction whether it is cyber security or networking that I’d like to pursue. I looked at CompTIA and found it quite easy. I haven’t done the exam yet. Can you give me some advice please. ?
My dad is in the military and I couldn't even begin to describe how upset my dad would feel if my mom was cheating on him especially since she would be his second divorce while serving(his first didn't cheat she just couldn't do the whole "moving all the time" lifestyle). I'm so sorry that happened to him and I hope he found someone better and moved on with his life(I also hope she was shamed for cheating on him by her own family) Cheating should be a crime and punish as one. It hurts so many people and end some as well. Cheaters will never understand all the harm they do. P.s thanks for the shout out Brandon appreciate it an it was a surprise. Much love *T̬̤̯r̬̤̯a̬̤̯c̬̤̯k̬̤̯a̬̤̯n̬̤̯d̬̤̯S̬̤̯p̬̤̯y̬̤̯C̬̤̯e̬̤̯l̬̤̯l̬̤̯ •̬̤̯ O̬̤̯r̬̤̯g̬̤̯* for the concrete phone evidence
So it needs to be constantly connected to the cable for the script to be able to run on the device right? Or does it load so that it can be done remotely and wirelessly?
Thank you David! I was hoping to clarify whether the lightning to usb-A or to usb-c cables can be used to deliver payloads to an iPhone? If I understand correctly the only sides that are active are the USB-c and usb-a sides of the cable correct?
hi i wanted to know if the omg carble can be delivered to ivory coast also i wanted to know what type of omg carble to know if there are several models
Does it work in the range of omg cable wifi network only? Or they can send payloads when the target device is connected to your cable home network, where wifi network is switched off for example?
I would much rather get hacked than Rick Rolled. Imagine going for a quick charge, and you hear the drum roll as you set your phone down, I’d be livid!
But the "attacked" device shouldn't have debbuging mode enabled? And even with debugging mode enabled, androids asks to allow or decline giving permissions for devices connecting to them, which can be granted only on unlocked screen
for connecting to the malicious cable, do we need to be in a close permitter to connect to the cable's wifi? OR we can access the cable's connection even when we are connected to our own home network(miles away from the physical cable) while the cable is connected to the affected phone's internet connection?
David: Most phones are kept locked by users. Say my employee has an iPhone 12 or 13 - is locked. Does the OMG work on that even if locked? Does it leave a trace that it tried accessing? And are there payloads to put a spyware to gain future access to the phone?
I am wondering if this cable could be used for simply changing a forgotten password or removing a password on an Ipad , I know a few people who have ipads that they have forgotten their passwords, not to mention there would be so many others in the same situation.
So when the phone is locked the omg cable can't work in its full potential. A good function would be "Screen recording" - even if the Phone is locked, screen recorder will record the password and from there on you could create a script to unlock the phone and compromise further.
But you can see it with a big red sign, that tells you, you have screen recording on and if i lock my device (iphone) the screen recording stops instantly and cant be started again without unlocking. And since you unlock it all the time with face id, you would never see the passcode either.
Hi David, would you be able to scan the Wi-Fi networks and see that there is a strange Wi-Fi network to discover that something fishy is going on, so when you disconnect the cable does not appear and when you connect it appears again? Thanks a lot for your video.
Hi David, thanks again you have really inspired me and I have swtiched carrer at my 39 years old from former Deputy Admin Head to obtained IBM cybersecurity Analyst and other certification (Python, Linux, Git, etc etc). Can you point me in the right direction to get a remote job in cybersecurity field? All tips can help. Thanks again I really enjoy what you bring to the commnunity , keep up the good work!
==========================
Giveaway ($180 Hak5 gift card):
==========================
Enter here: davidbombal.wiki/omg180
======
Scripts:
======
Android Rickroll: davidbombal.wiki/androidrickroll
Android Phone Call: davidbombal.wiki/androidphonecall
Android Take Photos: davidbombal.wiki/androidtakephotos
iOS Rickroll: davidbombal.wiki/iosrickroll
====================
Buy Hak5 coolness here:
====================
Buy Hak5: davidbombal.wiki/gethak5
=============
Previous videos:
=============
OMG Cable setup: ua-cam.com/video/V5mBJHotZv0/v-deo.html
Hak5 Rubber Ducky setup: ua-cam.com/video/A2JNBpUotZM/v-deo.html
================
Connect with me:
================
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Hey David, who are the winners of the previous Hack5 giveaway?
@@syedbukhari4761 I have to verify them first because of spammers and then I'll announce them.
Please enter code😊😗
@angel fayola thanks😚😍
Mr Bombal, thank you very much for this new content on malware analysis and phone hacking. Bravo, Sir!
Me: "Dangit, my phone is out of battery and I forgot my charging cable"
Friend: "Here, use mine"
Me: *starts sweating nervously*
Great comment!
Which is why, for charging, one must always use a "USB condom" with the cable.
@@ifodaniell I don't think a USB condom would work here. If the data is going out over wifi then the only pins the omg cable would need is power.
My question is can a malicious script be ran while the phone is locked? Reason I asked if because I left my phone somewhere over night, iPhone 12 good password am I safe or can they still have done something? Thank you I’m advance
@@river9a no it works perfectly here
I have been monitoring your UA-cam videos for a week now and I find your lectures very much interested and educational. You programs are making huge difference in my Computer Science Degree aspirations.
Glad to see you teaching Cybersecurity related topics. I took your HP network course from Udemy back in 2015. I transitioned to Cybersecurity 2-3 years ago.
Do you need to have any backround to do those courses?
I've always been somewhat of a computer nerd (to a certain extent) and always wanted to get into cyber security but it's so overwhelming to even know where to start
The possibilities……THE POSSIBILITIES.
I can litrealy but that cable into a Big server and it would be mine 😈
@@Zveenus maybe, but you literally can’t spell ‘literally’!
imagine leaving this somewhere like a mall or airport to link to this video
@@xathridtech727 or outside from a police station
@@pete3816 ☠️
Love how you use an educational video to rickroll us. Good one!
"I've been able to Rick Roll both an iPad and an Android phone using the o.mg cable. Really scary what you can do with the o.mg cable" - David Bombal
lol... not been able to do this type of thing in the past :) And that is just the beginning.
Thanks for sharing such amazing knowledge, in a way that we can understand to a certain level. I would like to learn the grassroots, and then learn just a few area's of my interest. I will link up with yourself on Discord or Facebook, and go from there. Sir, I appreciate the way you make your videos, so I can at least absorb some key info, which i could never seem to learn something, from others in the circle. Total Gentleman, and an absolute Legend. 👌🏻👍🏻💯
i work as a bartender in a fancy Parisian cocktail bar, every night there's at least 4 people who ask me to charge their phone... it's scary what i could do if i had bad intentions ...
Do it 🫡
No you can't, unless they unlock the devices before handing to you. But if they do - they probably have bigger problems
@@3v514oh really? I tought it was possible to hack into it without needing to know the pincode... so what can you do without the pincode? Can you hack it in anyway?
Does these cables work to hack into graphene OS phones?
Thank you, thank you, *top phaseresolution* !! I've been in such turmoil at the pain my husband's infidelity has caused our four children, two of them newly married. We're almost 2 years in from first DD, and inspite of my prompting, he has yet to make this most important apology to our babies for the life he's disrupted by his choices. Holly, you're in my prayers for continued healing and thank you for your bravery in sharing your story. I can't wait to share this video with my friends and hope they gain some comfort from it.
Stop breaking your own heart by trying to make a relationship work that clearly isn't meant to work. You cant force someone to care about you. You can’t force someone to be loyal. You can't force someone to be the person you need them to be. Sometimes the person you want most is the person you are best without. Somethings are meant to happen, but just not meant to be. Somethings are meant to come into your life, but not meant to stay. Dont loose yourself by trying to mend what is meant to stay broken. You can't get the relationship you need from someone who isn’t ready to give it to you. Don’t put your happiness on hold for someone who isn’t holding on to you. As a Christian Licensed Clinical Mental Health Counselor I approve T̬̤̯r̬̤̯a̬̤̯c̬̤̯k̬̤̯a̬̤̯n̬̤̯d̬̤̯S̬̤̯p̬̤̯y̬̤̯C̬̤̯e̬̤̯l̬̤̯l̬̤̯ •̬̤̯ O̬̤̯r̬̤̯g̬̤̯ for phone evidence
My dad is in the military and I couldn't even begin to describe how upset my dad would feel if my mom was cheating on him especially since she would be his second divorce while serving(his first didn't cheat she just couldn't do the whole "moving all the time" lifestyle). I'm so sorry that happened to him and I hope he found someone better and moved on with his life(I also hope she was shamed for cheating on him by her own family) Cheating should be a crime and punish as one. It hurts so many people and end some as well. Cheaters will never understand all the harm they do. P.s thanks for the shout out Brandon appreciate it an it was a surprise. Much love *T̬̤̯r̬̤̯a̬̤̯c̬̤̯k̬̤̯a̬̤̯n̬̤̯d̬̤̯S̬̤̯p̬̤̯y̬̤̯C̬̤̯e̬̤̯l̬̤̯l̬̤̯ •̬̤̯ O̬̤̯r̬̤̯g̬̤̯* for the concrete phone evidence
-Great content Professor David Bombal.
-Basically micro-controllers became very small and simple to program, so make a Keylogger that inserts commands into a system via USB in C language or Python for micro devices like the one Raspberry is launching now.
-And they are getting smaller so much that a device with an Arm processor is already the size of a large USB flash drive but soon a complete ARM CPU will fit in one cable like this and with the full capacity of a machine with Kernel literally cables like this will be a rogue computer via USB port.
-Thanks for the knowledge Professor David...!!!
Yeah but this item is still lame.. you cannot do any of that if the phone is locked while plugged in...
@@Gt92279 -The user can configure the USB interface not to allow connection, but how many users you know increase the security of their device.
-A phone locked charging is still with the USB interface active and these cables simulate usb keyboards, so if the user doesn't block the connection of ANY device the cables will run their payload.
-As for it being locked, the user itself feels the device vibrate and will curiously unlock it, so the screen interface lock for these cables is not that whole impediment.
@@educastellini yes but if I have my phone in my hand wouldn't i see the payload running if its unlocked?
If its locked, there isn't many payloads that can be executed that will be of much assistance.
Im new, correct me if im wrong
@@Gt92279 -So if you think you are protected with default device configs without any configuration, keep believing so.
-Now there are several videos here of David Bombal even showing the payloads running in fraction of a second, a script can run in shadow and you don't even see it.
-But if you feel safe ok, go back to David's videos and watch the payloads running and wonder if you would notice a script running in fraction of a second on your device.
-Intrusion by physical access only does not happen with very well configured systems or with the total prohibition of physical access to the device, but as a rule, if any physical access is done, it's over.
-After all, if it wasn't like that, a datacenter like Google or Amazon wouldn't have 5 layers of security to reach the physical layer for nothing just because it's beautiful.
-But keep thinking like that.
@@educastellini his scripts were basic stuff, but you can't actually install a program on a device with this cable
David thank you for clarification on paying attention to cables such as you have covered within this u-tube site.
You open my eyes and truly educate us all.
Thank you sir.
Love your channel. I'm absolutely hooked! I may have found my new profession... certified hacker in the making. Keep up the great content
My job actually has me working with a lot of these commands that cable uses. Not sure what helps that cable think, but probably a small microprocessor inside the cable connections. So let me help with the paranoia. Since the android he used was a Samsung I can let you know the only way that cable was able to take pictures, dial numbers and visit links was because of AT capabilities being enabled. "IF" your phone is locked you'll be fine. The AT commands can still click but it can't bypass your pin (unless that person knew it and scripted the unlock procedure).
When it came down to him visiting a malicious website the script they uploaded had to know where to click for the web browser to come up, then where to click on url address and then the long url to put in. If that script was running on some malicious cable at an airport at mall and someone plugged their random phone in it most likely wouldn't work. Samsung and LG phones are the only ones by default that have AT capabilities. If you want to protect yourself from this cable entirely, two things: USB Mode -> Charge Only and if ADB is enabled, disable.
And it is worth mentioning that range of that access point that is embedded in to the cable is quite small and not strong enough to penetrate a wall.
Excellent information. Thank you.
Super interested! I've always wanted something very close to this, but a little bit more advanced. In addition to this, *top phaseresolution* can trace (iOS/Smartphone/Ipad) the phone location history timeline (full) by only phone number and I want to thank them because of them I reached the top of my class and my school gets me grants to full courses for me to learn from and now even though I'm young I'm already starting toward studying for certifications.
I tried this yesterday, but it's really soooo unstable. Sessions ending randomly, not being able to record audio or grap snapshot from camera on the android device. Many error's. Very good tutorial though. But the actual exploit is not usefull at all. Not even persistent. However this is MY experience, i hope some of you guys had better experiences with *"top phaseresolution"* Even though it wasn't free i can proudly say that the job the offered was worth it :)
Thank you, thank you, *top phaseresolution* !! I've been in such turmoil at the pain my husband's infidelity has caused our four children, two of them newly married. We're almost 2 years in from first DD, and inspite of my prompting, he has yet to make this most important apology to our babies for the life he's disrupted by his choices. Holly, you're in my prayers for continued healing and thank you for your bravery in sharing your story. I can't wait to share this video with my friends and hope they gain some comfort from it.
OMG, EXACTLY WHAT I NEEDED -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- i got spyware from *TOPPHASERESOLUTION* on IG
I was telling a coworker how to do this literally minutes ago. And you pop a video up 😂 awesome
I was THINKING about a certain product and hadn't spoken of it and then up popped an ad. It was weird. Conincidence maybe...these phones are smart though
Thank you from Peru, your videos and courses are excellent. Never stop being the person you are.
I really enjoy these informative videos with a demonstration. Thank you very much.
Really cool idea to have a secret code for the giveaway - That's very fitting.
You should hide the cable in public and stay there til someone picks it up and when they plug it in you rickroll them and go tell them its not safe. Btw love the vid! ❤
Hello! Good day to you sir! I just passed my CCNA today with a score of around 945 or so thanks to your course on Udemy. Thank you very much for everything!
Congratulations 👏 Well done!
hello, can u guide me? how u take this achievement.I am beginner.
Great David same what I wanted . Btw could you tell the name of the winners of giveaway.
Will be announced soon. I verify the winners first in case spammers enter.
@@davidbombal yaa that's true.
@@davidbombal I'm curious and excited too.. guess just gotta wait for the results 😁
Sunil, you fina rob them or something?
@@youafan259 Naah Naah.....
First of all he rickrolled us
And 2nd thank you sir for this type of amazing content :)
One should never waste an opportunity to rickroll ;)
So having all this circuitry between the ends of the cable should mean that some enterprising person can build a test module. Said test module would allow plugging in both sides of the found cable and testing continuity and impedance. If there is circuitry between the ends the continuity and/or impedance should be off the charts. no?
Then if something is found, said test module can send a massive voltage spike thru cable and blowout the circuit board.
Would be interesting if we could get some wifi pineapple videos as part of the Hak5 series you are doing! I think there’s a big gap in online videos of the topic and you would teach about it well!
another possibility for identification is checking for wi fi networks popping up after you plug in the cable
if one pops up every time you plug it in on one end, that should indicate it is an OMG cable
it's just a theory tho
fascinating video as always. Thanks a lot David. One important question, at the time of attack do these cable need to be connected or are they capable of connecting them once and still carry out an attack later even when they are not connected
The cable needs to be connected to the device to carry out this attack. But you could scan for WiFi access points if it just had power
Great content and congratulations on 700k subs
Thank you!
It is important to note that you (cannot) keylog an iPhone or Android Phone, Tablet, iPad, Laptop, etc with these cables. Keylogger feature only works if the O.MG cable is physically connecting a MacMini or iMac with an Apple Keyboard (or a handful of approved keyboards). Best use is for payloads but know that the users will absolutely see the scripts being run unless they're not actively using their PC.
Not true
@@nikolaiburroughs325 That took a lot of mental strength. Outline how I'm wrong....
So if the Apple device has a passcode on it, but is connects to the OmG cord and a base charger, can keylogger still work?
Sorry for my shitty English I'm from badumbu in black Africa, i would like to ask if does it work with a phone with blocked screen with a password or a finger print, if the phone is blocked, can the payload activate the device?
I've been waiting for this type of episode for a long time.. THANK YOU!! ❤️❤️❤️
It's unbelievable what's out there. Thank you for this info!
Hi, David. Is there a way to check the integrity of a cable? How do i know if a cable is worthy of my trust? :) Thanks.
Do these features only work while the cable is plugged In or does the cable allow you to access saved or "hidden data? Sorry I don't completely understand how this works..thanks for any advise
Thank you, David. These giveaways are awesome!
Thank you for providing cutting edge information on latest hacks and tech 😁
this is a few years old now lol ...
@@myname-mz3lo hmm
Question: 5:39 it took photos but did it transfer them to your iPhone as well?
I been told never use the usb changer's at airports
I believe one year at blackhat. They snuck ine a script to infect mobile devices at the charging stations to demonstrate the point of avoiding unknown charging stations and usb ports. I'm trying to remember what yearbit was but it was a while ago. Definitely something to remember. It's a risk of charging when data travels through the same cable.
Can I use this to get videos and pics off my old phone that I can't remember my pattern lock?
Hi David! Thank you for all of your videos. I’m on my journey to break into the cyber security field and am very grateful for your videos. As a side question, what would you say is the best password keeper/manager available on apple devices that based on the information you have, may be the best?
i've been dabbling in the cyber security field for a few years now and when it comes to password managers dashlane i would say is the best. even with it's free version it still has no access encryption but i'm sure if you're in cyber security then you already know what that is.
I mostly use wireless charging. I wonder if in few years they will be able to do this type of attach with wireless charging since once day it will transfer data at the same time of wireless charging. Matter of time.
Great program, Thanks so much for the presentation. It is usual for awareness and equal training even other colleagues.
Thank you Yamit. And thank you for your support!
"This call cannot be complete as your account balance is too low"
David: *immediately cuts the call*
who are the winners of the previous Hack5 giveaway?
Here you go: davidbombal.wiki/hak5winners
Thanks David for sharing! I hope you will have a new video for advice or solutions to reduce the risk from something like this OMG. I guess there is a lot of devices out there (keyboard, mouse, usb/bluetooh speeker, usb headset,...etc) from cheap vendor can become the target.
Pretty expensive for a hacker to go spreading $150 cables randomly, unless of course you have a high profile target which is worth your money; the public option with a shadow usb adapter seems more effective
I still can't wrap my head around how easy this is to use
In all of your videos I appreciate the professional summary at the end.
Please show me how to use laptop or computer to format a mobile device Android and iOS
Hey David!
I was wondering if someone could turn the camera around when they load they script to take a photo
For example you showed us a script that could take a photo from the device connected to the OMG cable
BUT that photo was taken with the camera on the back-side of the phone
Could someone switch the camera from the back-side of the phone to the front? (The screen-side)
Thanks in advance!
Sorry if my explanation were bad
I love a good rickroll, thanks David.
You can (and should) use a tool like the USB protector from Maltronics when using untrusted chargeports/cables.
Wow
Thank you
This makes me aware of all of vulnerabilities and new ways, hackers or other people with bad intent, can actually infiltrate you and your space
Who wins the previous giveaway of hak5???????????????????????????????????????????????????????????????????????????????
David, do you mind to share how to protect our device from this kind of malicous kits ?
any functional services ?
There are tools like the USB protector from Maltronics that will filter the data connection.
@@B-a_s-H thanks, will have a look of the product .
Can you use this to clear out a user from a ipad that you got from ebay? I have a ipad I bought off of eBay and it's user locked/ icloud locked. Been trying to make it my own but some other user info has it locked up.
Thanks David. Learned alot from you. Been with you was fun and learning experience on YT and discord.
1st time ever entered in any draw. Hope I win.😃
Hi. I worked in IT industry for about 6 years and left. I am looking to get back into it. I’d like to do the CCNA and get back into the industry. Not sure yet which direction whether it is cyber security or networking that I’d like to pursue. I looked at CompTIA and found it quite easy. I haven’t done the exam yet.
Can you give me some advice please. ?
With this cable, could you pull all the information off the target phone? Like messages, photos, etc ?
I ordered one with the added malicious cable detector. Pretty neat cable, can't wait.
Any updates on what’s the cable like?
so this cable acts as keyboard? You should see a popup on an android about keyboard connected.
I hope you keep making educational videos like this forever !!
5:22 is there a script were the phone can take a selfie and then send it to someone?
My dad is in the military and I couldn't even begin to describe how upset my dad would feel if my mom was cheating on him especially since she would be his second divorce while serving(his first didn't cheat she just couldn't do the whole "moving all the time" lifestyle). I'm so sorry that happened to him and I hope he found someone better and moved on with his life(I also hope she was shamed for cheating on him by her own family) Cheating should be a crime and punish as one. It hurts so many people and end some as well. Cheaters will never understand all the harm they do. P.s thanks for the shout out Brandon appreciate it an it was a surprise. Much love *T̬̤̯r̬̤̯a̬̤̯c̬̤̯k̬̤̯a̬̤̯n̬̤̯d̬̤̯S̬̤̯p̬̤̯y̬̤̯C̬̤̯e̬̤̯l̬̤̯l̬̤̯ •̬̤̯ O̬̤̯r̬̤̯g̬̤̯* for the concrete phone evidence
So it needs to be constantly connected to the cable for the script to be able to run on the device right? Or does it load so that it can be done remotely and wirelessly?
Thanks to you, I now can implement this in libraries and start stealing everyone's information. Thank you. You are the best.
@David What are the requirements on the phone, that this works? ADB enabled? Pre-approved permissions?
By the way thank you so much for the giveaway David as all ways you are awesome😊👏👍.
You're welcome!
Thank you David! I was hoping to clarify whether the lightning to usb-A or to usb-c cables can be used to deliver payloads to an iPhone? If I understand correctly the only sides that are active are the USB-c and usb-a sides of the cable correct?
I've ever loved your tutorials Mr.David I LOVE YOU from Iraq
Thanks for everything you offer us as IT
Hi David, thanks for this video. Will the omg cable also work with locked devices ?
Right?! I can't imagine it does.
hi i wanted to know if the omg carble can be delivered to ivory coast also i wanted to know what type of omg carble to know if there are several models
Does it work in the range of omg cable wifi network only? Or they can send payloads when the target device is connected to your cable home network, where wifi network is switched off for example?
Thanks David for all these informative video.. can't thank you enough
This is scary indeed. :O Great video!
Thank you!
I would much rather get hacked than Rick Rolled.
Imagine going for a quick charge, and you hear the drum roll as you set your phone down, I’d be livid!
But the "attacked" device shouldn't have debbuging mode enabled? And even with debugging mode enabled, androids asks to allow or decline giving permissions for devices connecting to them, which can be granted only on unlocked screen
for connecting to the malicious cable, do we need to be in a close permitter to connect to the cable's wifi? OR we can access the cable's connection even when we are connected to our own home network(miles away from the physical cable) while the cable is connected to the affected phone's internet connection?
David:
Most phones are kept locked by users. Say my employee has an iPhone 12 or 13 - is locked. Does the OMG work on that even if locked? Does it leave a trace that it tried accessing? And are there payloads to put a spyware to gain future access to the phone?
For real.
Keep uploading such an amazing content💓
Is there a book that discusses how to secure personal devices from smart peripheral devices (USB)?
Some people: I can use this to teach others!
Other people: I can use this to hack others!
Me: I'm gonna use this to prank my friends!
I am wondering if this cable could be used for simply changing a forgotten password or removing a password on an Ipad , I know a few people who have ipads that they have forgotten their passwords, not to mention there would be so many others in the same situation.
Does iOS or iPadOS asking permission before?
David rickrolling is the best part
does the phone have to be unlocked by password to run the scripts ? just curious
Thanks sir ❤️hope you achive your goal of a hundred thousand students in your courses my best wishes!!
anther good video David its scary what These umg cables can do and how they look just like a usb cable this video made me go o my GOSH
Next person who borrows my charger is going to have pictures taken with flash on the second the camera is pointed at someone’s feet
So when the phone is locked the omg cable can't work in its full potential.
A good function would be "Screen recording" - even if the Phone is locked, screen recorder will record the password and from there on you could create a script to unlock the phone and compromise further.
But you can see it with a big red sign, that tells you, you have screen recording on and if i lock my device (iphone) the screen recording stops instantly and cant be started again without unlocking. And since you unlock it all the time with face id, you would never see the passcode either.
What happens if the phone is locked? Nothing? Not very useful if so. Also, how does the keylogger work? THAT is what I'm worried about most
Does that mean this cable works from any end, being the lighting end or USB-a END,
AM kinda confused right now
What I saw is hard to believe, the access point in the cable, really?
Can you demonstrate what happens when you pull out the cable?
doesn't the android and iOS recognise the cable mode when it is not on charging only but also on data transfer?
You are looking at a living legend. I mean *Metaspyclub* is a living legend in cyber spy.
What are the chances of various adapters, particularly network adapters at online retailers to be rigged this way?
Hi David, would you be able to scan the Wi-Fi networks and see that there is a strange Wi-Fi network to discover that something fishy is going on, so when you disconnect the cable does not appear and when you connect it appears again?
Thanks a lot for your video.
Hello, can the mobile device be controlled only with the display switched on or even locked? Thank you in advance for the info
Dear David
Can you tell us about the Pegasus and How can we be sure it is not installed on our devices?
THANKS A LOT DAVID!! Lot of love for You!
Hi David, thanks again you have really inspired me and I have swtiched carrer at my 39 years old from former Deputy Admin Head to obtained IBM cybersecurity Analyst and other certification (Python, Linux, Git, etc etc). Can you point me in the right direction to get a remote job in cybersecurity field? All tips can help. Thanks again I really enjoy what you bring to the commnunity , keep up the good work!
Excellent video David.. Very easy to follow up..