Hacking tool exposed by master hacker OccupyTheWeb

Поділитися
Вставка
  • Опубліковано 3 лис 2024

КОМЕНТАРІ • 81

  • @yanivhoffman
    @yanivhoffman  Рік тому +9

    Hi Everyone, another great video with master hacker OccupyTheWeb about Radio hacking. Enjoy!

  • @NathanHutton-s7s
    @NathanHutton-s7s 11 місяців тому +8

    Hey, it can NOT clone a credit card as was stated in the video. The EMV payment protocol states that the card must sign a cryptogram as part of the transaction verification. This is done inside the chip on the card, and the flipper cannot access this. It can however read the card number, expiry date (but not CCV).

  • @Alasdair-Morrison
    @Alasdair-Morrison Рік тому +18

    The Flipper Zero may not be able to operate on it's own above 1ghz, but with add on boards could go beyond that?

    • @nerfherder4284
      @nerfherder4284 8 місяців тому +1

      Best part is the GPIO and expansion boards allowing people to create added hardware, such as the new RP game add-on, or sniffers for other bands.

  • @nerfherder4284
    @nerfherder4284 8 місяців тому +3

    Codes for key fobs in modern cars use a rotating code. Using your flipper to clone your key fob can result in these codes being out of synch and rendering your fob useless. As people have mentioned it cannot clone a CC, people should not repeat information they have not tested themselves, that is why Amazon banned it: misinformation.

  • @nightmareapocalypse3471
    @nightmareapocalypse3471 Рік тому +35

    The flipper can pick up credit card tags but you can't clone a credit card. That's a misconception.

  • @redpillcommando
    @redpillcommando Рік тому +3

    Mr. Occupy, I just bought your getting started book. I also just got my flipper zero last month.

    • @yanivhoffman
      @yanivhoffman  Рік тому +2

      Superb! I will forward the message to OTW.

  • @SirOwlsSkin
    @SirOwlsSkin 11 місяців тому +4

    9:30 the flipper zero has bluetooth capabilities, which is 2.4 gHz. CFW will empower you to expand the ranges of certain antenna as well.

  • @Diddy291
    @Diddy291 Рік тому +7

    FZ can't replay credit card to terminal. It only can read data . Rest is encrypted. You can read and replay key cards and tags . First and most important is tha it say on box it is only for studying tests not for illegal use.

  • @Joke167
    @Joke167 Рік тому +4

    היי רק רוצה להגיד שהסרטונים שלך .זה רמה אחרת מעל כולם .כיף לראות את זה כל פעם מחדש ולקנות יידע.אשמח מאד אם תעשה סרטון על רמזורים .ועל התקיפה האחרונה שהייתה .❤❤תודה❤❤

  • @Index-o1234
    @Index-o1234 Рік тому +5

    Thank you for the clarificarion most people assume you can hack or pick up any radio frequency with a flipper and that as you pointed out is just not the case. Makes a nice little universal remote around the home but beyond that I don't know that it would be of much interest beyond that for most.

    • @crsv7armhl
      @crsv7armhl Рік тому

      You are correct. Now if you are actually trying to analyze and create your own signals from scratch its a great tool to learn on. Plus it is portable and has the NFC/RFID piece.
      I have created quite a few tools for it.

    • @SirOwlsSkin
      @SirOwlsSkin 11 місяців тому

      I managed to softlock an iPhone today that had bluetooth turned on. It had to be restarted once I ceased the attack. I managed to do this from about 30m away.
      Not sure why everyone's disappointed that they can't get arrested for credit card fraud, but they could use the RFID fuzzer to get arrested for B&E or theft just as easily.

    • @s_e_t_z3248
      @s_e_t_z3248 11 місяців тому

      @@SirOwlsSkinSame with BadKB exploits. I made a program that downloads a payload onto any windows PC in like 3ish hours without prior experience with DuckyScript. Its an awesome tool.

    • @nerfherder4284
      @nerfherder4284 8 місяців тому

      It has Bluetooth and a wifi expansion board you can plug into the GPIO

  • @Supp772
    @Supp772 Рік тому +3

    Its good to see OTW with you

  • @daniellowrie
    @daniellowrie Рік тому +2

    Thanks for the great video, Yaniv! And thank OTW for the great demos/explanations! Now I've got to save up for a Flipper 😅

  • @WPGinterceptor460Interceptor
    @WPGinterceptor460Interceptor 8 місяців тому +2

    18:45.. not sure where you got the older info but its wrong.. In the 70's and into the 80's we used Radio phones VHF int he 80's 90's we used 800 Mhz for cell phones, then dual band cell phones came out 800 mhz/ 1.8 Ghtz.. 800 Mhz had the long antennas on the brick phones, then the dual band mainly used the 1.8 GHZ thus the small antenna, but if you couldnt get a god 1.8 signal it would switch back to 800 mhz and vice versa..

    • @yanivhoffman
      @yanivhoffman  8 місяців тому

      Thx for the comment. Appreciate it

  • @giogioguz08211
    @giogioguz08211 5 місяців тому +1

    The Flipper Zero has a Wi-Fi Developer board that can go beyond that.

  • @funkymonk2254
    @funkymonk2254 Рік тому +1

    ThankYou Yaniv and Master OTW.

  • @sjoervanderploeg4340
    @sjoervanderploeg4340 Рік тому +4

    It can grab some info from your card yes, but it can not emulate a full EMV card.

    • @sjoervanderploeg4340
      @sjoervanderploeg4340 Рік тому

      It being "sub-GHz" is not its only downside, it is also limited in modulation types!

    • @sjoervanderploeg4340
      @sjoervanderploeg4340 Рік тому

      The sole reason for there not being enough radio hackers is simple, regulations.
      Here in the Netherlands people think it is actually harmful to sent out on the "FM band", because you could knock a radio out or whatever.

  • @marinob7433
    @marinob7433 Рік тому +2

    This was great as always, Yaniv thank you for your effort and time. And of course mr. OccupyTheWeb! keep educating us.

  • @nick_yt23
    @nick_yt23 Рік тому +5

    Smart lock for homes are more critical than cars fobs. Can these toys defeat the encryption of August, Yale, Nuki smart locks? This is the real question .

    • @scousersharkey5880
      @scousersharkey5880 Рік тому +1

      It depends if they use a rolling code or not, like car keys mostly use rolling codes apart from Honda apparently. ( I'm not 100% on the Honda thing but that's something that keeps popping up when I look into it.

    • @fireteamomega2343
      @fireteamomega2343 8 місяців тому

      Some of them are still susceptible to newer Bluetooth protocol exploits that can circumvent security. As far as a vanilla flipper out of the box no you wouldn't be able to do that.

  • @YTInnovativeSolution
    @YTInnovativeSolution Рік тому

    Can it be used as an automotive TPMS device? Such as an Autel tool used to trigger each wheel and read the current tire pressure?

    • @leolaxes
      @leolaxes Рік тому

      Not out of the box, depends on how the radio comms are inpmemted between the car and the tires.

  • @keybrent64
    @keybrent64 8 місяців тому

    I wonder if this is what happened to AT&T cell service going out recently

  • @yobb89
    @yobb89 9 місяців тому

    i got the flipper, and all my stuff i wanted to hack has encryption, car has rolling keyfob code, the thing has been collecting dust for 6 months

  • @scriptles
    @scriptles Рік тому +2

    As for jamming a fob to get it.. imagine you are at work and you just have access to someones keys a second.. u can press a button record it... replay it when you are closer to the car.... you dont even need to jam it always

    • @SirOwlsSkin
      @SirOwlsSkin 11 місяців тому +1

      This is dangerous as many remote entries use an evolving seed. The flipper will work to open the car once, and then neither the flipper nor the original remote will work again. I do have a 'tesla playlist' that I'm looking for someone to let me try out, however...

    • @scriptles
      @scriptles 11 місяців тому

      @@SirOwlsSkin So you are sorta wrong about how the codes work.
      If you use a flipper to replay a code by copying it while its not near a car.. then the flipper will work only once on the car.. then it wont work again.. the keyfob will not work only once until its "back in sync". Essentially you gotta press the button TWICE for it to work its not like oh it will never work again. And this also depends on if the car manufacturers ever get wise enough to just make it stop working but then customer complaints will skyrocket if they ever did that.
      The codes basically use a counter and each button press increases the counter.. the cars counter increases it expects the next code.. if pressing it in your pocket while yo uare far away did what you said it would people would be having major issues all over with accidental pocket bumps.. but thats not how that works... so its not fair to said what you just said especially when you do not know what you are talking about.

    • @nerfherder4284
      @nerfherder4284 8 місяців тому

      ​@@scriptlesthe point that it isn't as straightforward as most people think is a good one. Your explanation is more specific but the point is that people should be aware you can have adverse effects while using your flipper if you are not careful. Some electronics used inside the human body have sub GHz communication and can possibly be affected by a flipper.

    • @fireteamomega2343
      @fireteamomega2343 8 місяців тому

      ​@@scriptles
      It's not that simple it isn't just a counter it's a set of custom registers stored in your win module with wildcard bits for transmit length. These wildcards are used like an analog encryption algorithm. Meaning it becomes harder to read a bunch of data if you don't know the length of bit transfer and what is null and what is being read. The current shared checksum value is exchanged between your key fob register and the win module registers. When this happens the checksum values of the registers are changed in proportion to whatever it's programmed to do. So it's not really even an algorithm that rolls the codes so to speak. Ie. it's just programmed to multiply by five and divide by two for example applying to certain register values. Subsequently if the two don't match up then it won't ever likely resynchronize by simply pressing the key fob. As for your comment about people complaining well there's not many instances where this would occur other than a roll jam replay attack. And before anyone wonders about how it works with a second key fob they operate on a separate register. If you don't believe me go ahead and try it then have fun paying for the dealership to reprogram your ignition and keys.

  • @PhillyFixed
    @PhillyFixed Рік тому

    Don't forget extended-range low-band 5G operates at 700 MHz (e.g. T-Mobile in the United States).

  • @Asiegrist92
    @Asiegrist92 Рік тому +3

    Hi. Key fobs for modern vehicles and many older key fob versions utilize rotating signals that the car references from a generated list, once that signal is used, it is then removed from the list and a new signal is generated.
    I.... saw the preview clip of the video and figured I'd let you all know, in case you're like me and actually try to hack vehicles (For educational purposes, of course.)

    • @fmned0112
      @fmned0112 Рік тому

      Gotta capture an unrecieved signal and it will work one time only per instance recorded. Also may desync the key fob etc. If you don't know how to reprogram your remote be careful .

  • @peepopalaber
    @peepopalaber 8 місяців тому +1

    otw is a hack and not a "master" he isnt even a og.

  • @Daniel-Tiger
    @Daniel-Tiger Рік тому +2

    Why do they say sub gig when they could just say UHF?

    • @yanivhoffman
      @yanivhoffman  Рік тому +1

      Good point but we tried to simplify it

  • @mistereff7077
    @mistereff7077 9 місяців тому +1

    No it won't open up a car on a regular, there are switching algorithms that change the signal now the signal doesn't change if the fob is not responsive, so maybe you can get one use in specific situations but won't be recognized to start car. Half of what is said here is bs fantasy

    • @mistereff7077
      @mistereff7077 9 місяців тому

      I responded too soon now it is being addressed in vid about rolling codes

    • @mistereff7077
      @mistereff7077 9 місяців тому

      I responded too soon now it is being addressed in vid about rolling codes

    • @mistereff7077
      @mistereff7077 9 місяців тому

      I responded too soon now it is being addressed in vid about rolling codes

    • @mistereff7077
      @mistereff7077 9 місяців тому

      I responded too soon now it is being addressed in vid about rolling codes

  • @orion10x10
    @orion10x10 11 місяців тому +2

    OTW is such a U.S state department shill (he still has good information on security tools though)

    • @yanivhoffman
      @yanivhoffman  10 місяців тому

      whats on your mind, please share :-)

  • @OathAnonymous
    @OathAnonymous Рік тому

    Awesome

  • @ediTopAE
    @ediTopAE Рік тому +2

    היי יניב! סרטון טוב כמו תמיד!
    איך אפשר אולי ליצור איתך קשר?

  • @my-rules
    @my-rules Рік тому +1

    תודה

  • @CROWNSOLUTIONS
    @CROWNSOLUTIONS Рік тому

    Wow this looks the same interview as David bumble , he say the same thing

    • @yanivhoffman
      @yanivhoffman  Рік тому

      thx for the feedback. i didnt see that one with David and anyway i always ask my own question. yet i assume there are familiarities as the flipper zero is limited in capabilities and questions might be in some cases same

  • @joeschmo5171
    @joeschmo5171 9 місяців тому

    Guy Fawkes…really man? 🙄

  • @skeeter1070
    @skeeter1070 Рік тому

    Just started to learn it all I can do is open a tesla now

  • @czaszkagra
    @czaszkagra Рік тому +1

    I managed to capture keyfob signal (vm Jetta), then after replaying i had to pay 20 euro for reprogramming keyfob.hahahah
    Its great toy guys.

  • @DDBAA24
    @DDBAA24 Рік тому

    all this thing did ws exploit skillsets people took years to learn and put them on a tomagotchi . With years of self learning you develop discipline when using powerful tools for research. Its honestly insulting and a disappointment all in the quest or the almighty dollar. This is a technical device people are using as a practical joke or criminal activities.

  • @0RIPPER0
    @0RIPPER0 Рік тому +1

    Nice

  • @CosmicJesterX
    @CosmicJesterX Рік тому

    teslas all the day

  • @idratherbemoshing
    @idratherbemoshing Рік тому +1

    Your video is full of misconceptions, how about researching the product before making amature videos about it.

    • @yanivhoffman
      @yanivhoffman  Рік тому +2

      Thx for the feedback. Can you provide example of misconception ?