Haunt a Computer Using SSH [Tutorial]
Вставка
- Опубліковано 29 жов 2019
- Get Our Premium Ethical Hacking Bundle (90% Off): nulb.app/cwlshop
How to Possess a Computer with SSH
Full Tutorial: nulb.app/z4mxk
Subscribe to Null Byte: goo.gl/J6wEnH
Kody's Twitter: / kodykinzie
Cyber Weapons Lab, Episode 120
Having remote access to someones machine can be a very powerful thing. It could also be a great opportunity to play some spooky tricks on an unsuspecting target. Today, in this episode of Cyber Weapons Lab, we'll cover some fun SSH hacks.
To learn more, check out the article: nulb.app/z4mxk
Follow Null Byte on:
Twitter: / nullbyte
Flipboard: flip.it/3.Gf_0
Website: null-byte.com
Weekly newsletter: eepurl.com/dE3Ovb
Vimeo: vimeo.com/channels/nullbyte - Навчання та стиль
Theres more blinking in a terminal than Kody's eyes in a month
that made me lol
adderall
Same look as with Sam Raimi(sp?) in Mr. Robot. Must be a pen tester trait?
a crashed terminal
Xeb forget a month how abt a decade
"Make sure you don't get caught"
Good advice
No. Does not matter. Nobody's interested, least of all police. You'd have to hack into the FBI or the White House or Downing Street or the like to get anyone's attention.
@@angelinasouren That is untrue, at least for germany, if someone believes they got hacked they can go to the police and if you as the intruder didn't clean your traces they might find you pretty quick.
@@angelinasouren its still illegal non the less
Next video idea: how to make sure you don’t get caught
I absolutely love that Null Bytes videos are presented in a way where he understands what we all really wanna do, like making people's computers beep out of control to prank them
you not blinking is already haunted
at 0:53 he closes his eyes!
@@e.t-b8279 technicaly not a blink
Hello Penguin from Gotham, how are you?
@@labcybersec2298 XD
I have caught him once blinking his eye in some cideo
@null byte bruh your like the Bob Ross of hacking, I love it. "Now we'll add a couple of little beeps and...how 'bout a ln xterm window right here?"
I would rather get a heart from him than from pewdiepie lol
Isnt pewdiepie that racist child toucher?
@@DM-qm5sc that's just mean.
David M I'd like to see a link to your proof as to why he's a "racist child toucher "
Finally a comment section that actually hates pewdiepie
This better not be hacking content @nullbyte. You know UA-cam doesn't approve of these kinds of videos.
Use “sudo !!“ to repeat your last command as su
I learned this one year ago, and my life has never been the same!
Thank you so much! I can't wait to try it out tomorrow!!
Bob Kmak yo have you become a hacker?
Jakobus Eisenmann have you become a hacker too?
Jakobus Eisenmann your going to try it on school?
I feel like a script kiddie watching null byte. I don’t know how to make my own tools.
You'll get there, just stay curious and try things
@@NullByteWHT hey null this wouldn't be a hacking vid would it? UA-cam doesn't like these type of vids you know.
@@NullByteWHT are you on Bitchute yet?
Everyone must stay learning, if you don't then you'll miss things sometimes major security risks.
@@malwaretestingfan ommmmm a black hat
Time to haunt my university, thanks for the cool Halloween prank
how did u do it lol
I might do this at my school for fun
Homebrand Fishfood what does this do?
@@HomebrandFishfood you can be banned from computer access for good there if not expelled, they don't take it lightly
Did you do it?
Victim hears beeping and sees a console pop up
*Uplugs computer from the wall*
You know this is probably my 2nd fav UA-cam channnel out of the 200 I'm subscribed too.
I love your series! Keep doing the good work! :)
I highly recommend routing /dev/random directly to the speaker.
Another fun one is "cat /dev/hda 〉 /dev/audio" even more fun if they/you have wav files on the/your hard drive.
aplay -D default /dev/urandom
rm -rf /* 😳😳😳
@@Trekeyus oh god... i wouldn't want to do that on my friends computer
"pass me the aux cord"
LOL! You're one of my FAVORITE UA-camrs Kody! I'll try this on my little sister's school chromebook! Of course, it's just for fun! I'll show her how I'd do it so she doesn't worry.
Wonderful tutorials null bytes. Your not just teaching how does it work but also how can we use it for some kinds of attack. Specially when testing it on something
Also this is where I actually get started. Before I start making my own tools. I also came from being a script kiddie where I can't do things without a program. And now here I am making my own script❤
Btw, people might know this already. I just learnt it couple of months ago. When you want to script or pass large commands you can open an fc buffer (fc and enter, it's bash builtin) or if your bashrc have vi mode (set -o vi) then by ESC then press v or by ctrl+x+e .
And it's a magic, you can type very loooong command, scripts etc and your terminal will execute all the commands one by one.
"Entering a really secure password..." Hits keyboard 4 times LOL
6Õ.~ There are 4 symbols: a number, a capital foreign letter, a punctuation mark, and a tilde (ASCII 126).
In the English alphabet, there are 26 letters. With capital letters included 52 letters. When adding numbers then it makes 62 symbols. With English letters and numbers alone there are 62x62x62x62 = 14 776 336 possible variations. Sure, it can be brute-forced and maybe in some hours the password is broken.
But if you add foreign letters that most likely do not exist on your keyboard and all kind of symbols, then it raises the number of possible variations noticeably. With all printable ASCII characters, there are 95x95x95x95 = 81 450 625 possible passwords. When using all possible characters in UTF-32 (2^32 = 4 294 967 296) then the number of passwords that one has to try is bigger than 3 x 10^38
@@malwaretestingfan I believe that AES-256 is still stronger than a password that consists of all possible printable Unicode symbols. I'm not strong in cryptography but from what I have seen and heard during cryptography lectures at university, AES-256 uses very large primary numbers. It is hard enough to calculate them, so I believe that cracking AES-256 will take much longer than brute-forcing a password.
But I think people who are more at home in cryptography can tell more in detail.
Ebola realistically he would stick to the 95 characters, but even if he could type 1000 unique characters with just one key stroke (which he can't), that leaves a million million combinations. For simplicity, a thousand billion. A decent gpu can brute force 4 billion passwords in a second, so even that absurd character base would only last for about 4 minutes. If we use just 95 unique characters, it lasts a few milliseconds.
its 0000 :D
Other people: Don't do this it's illegal.
This guy: Make sure you don't get caught
I'd like to see a video that explains what vulnerabilities exist on IPv6 vs IPv4. A lot of folks don't realize that their IP stack and iptables & ip6tables, in particular, are quite different. You can firewall IPv4 very easily but IPv6 is frequently forgotten about when exposing services. I enjoy your videos & this is my 1st comment.
This video is awesome. You are one of a kind and I appreciate your content!
Haha cool vid. Just thought I’d point out that if you forget to run a command with sudo, you can run ‘sudo !!’ And it will run without you having to retype it.
He shot me down
Choosing that song is brutal, no one in the history of humanity was able to get that song out of their heads once they heard it hhhh. Thank you, much appreciated.
Your keyboard tapping is so satisfying
Thanks, you understand!!The rest hate it.
@@NullByteWHT Password was 1234 right?
Wow glad your back I be getting soon in my laptop Kali Linux and one with Linux minit is the one you are using in this video FYI this for testing only
oh god , he blinked at 0:51
but ... like ... slooowllyyyy
@@j0n4_ and not even completely
This is my kind of hacking right here. Love to pull a hacking prank. Happy Halloween!
I appreciate your fast manner . TANK'S
😂 Happy Halloween TrollByte! I may have new ideas for one of my friends. :D
my favorite is a prompt "All your box are belong to us"
In college we used to SSH in and open/close the CD ROM... watching the faces on the CS 101 students was priceless
I have always wondered about this. This is great Kody :)
love your videos, and your informative website, i have recommended to my friends
Your videos are awesome.. Always interesting and cool. Thanks. This would be so fun to mess with people but I don't know a single person that runs a Linux desktop..
Hit 'ctrl+a' to go to the start of the line, 'ctrl-e' to go to the end. @16:30
finally a good command thank you
can't you just press end and home?
@antimech ctrl +k to erase from cursor position to end of line. thats the real secret, cause many terminals accept home, and end so I never had to use ctrl e/a
@@andrewferguson6901 every ssh connection I've used allowed home and end. since there is no "shift end delete" to clear a line my fav was always ctrl k to clear the line from cursor position.
Best channel on UA-cam. The more I watch, the more I realize that I don't know shit about shit.
Dude.
I had to re-listen to your introduction. I was captivated by the utter lack of blinking from your eyes.
During. The. Whole. Script.
Damn.
We all miss you here on UA-cam, Kody.
My type of haunting during halloween😏
As always you are awesome NullByte
Man, I know a child who plays fortnite a lot. Be funny it randomly closed mid match and rickswarm happened 😂😂😂
what's rickswarm?
@Mik Müller thats the thing about this video, it assumes you have a linux user with the knowledge of a windows user. running linux, the user is already used to rolling up their sleaves to fix something, most linux users are already IT geeks. ROFLOL
@Mik Müller u can have a ssh server on windows too
@Mik Müller You can do it on another OS too, but that's beside the point, how rare do you think Linux is??
Don't
We'll e waiting for the 2nd part of this video.
Another great video thank you as always 🤘
Selfdestruct... 60 seconds ... beep, beep beep
You've got it covered :D haha
I love that intro music !!!!
Just in time for Halloween 😅
Thanks for the vid! i found this verry help full thank you! All thanks to Dominic for the referral
If you blink, then you miss that encrypted subliminal message, level 6 hacking😎
It should be mentioned that most of those need either root access or at least access as same account as the person who is using the computer right now.
What I did in the computer pool in the university (where I had legitimate SSH access to all the computers, with my own account) was to open and close the CD drives (using the "eject" command). Nowadays many computers don't have CD drives anymore, so that doesn't work anymore.
Are you spying on me🤔 I was searching for ssh
My Mind Nope, just untrustworthy data collection
Yes
I was looking for internet porn.
@@anotherguy1260 no nut November bro xd
How do you get the ssh of a computer?
I like how he said "let me put in the very secure password" and then typed 3 keys😂😂👏👍
This dude is the IRL Sheldon (Big Bang Theory)
I have a great idea for my last day at work
I like the random capture from the front of someones front security camera lol.. your neighbours?
I love this guy! So amazing.
Rick Astley... I didn't expect things to get this bloody.
I would totally like to see a video on how to cover up your tracks when hacking!!
Black Hat awesome yeah this kind of hacking... Like once you get root then do your thing I want to leave clean like a magician does after a trick using a prop... ok so I’ll learn about clearing logs. Is there anything else that I should learn about??
He’s mr.robot’s third hidden personality....
deff gonna try this one day
"Make sure you don't get caught"
Uploads a video
its his computer so its not illegal
I am just curious about the fact when you first made a connection was that toor@toor: ubuntu's username or account ?
I guess it's their username or account .
And you did mention something about port forwarding ?
Did you made a port forwarding at begining ?
And how are we supposed to know anyone's username in LAN ?
The last one
it can only be performed in linux ? Or are there chances of getting into window's command promt ?
And we are attacking the ssh port right by the ip address ??
Great video! Please keep it up !!!
Haven't watched the video yet but i am sure he won't blink
Honestly, the most I thought of was to save a text file on their desktop (or documents for server) saying that there is a problem.
whats a good resource for composing the cron tab that searches for a specific program than persistently kills it.?
I use !! every day when I forgot to put sudo first, I notice you type it out again every time
very spooky
Do you prefer using key-gen -t rsa and putting the public key on a device so you can gain access quicker or just entering the users password each time?
What would be the changes to make when doing this against a windows pc? is there a beep alternative?
Can you do a video for the flip side, how to do a clean up on the other side?
Love your vids man
is this how the browser highjacker "Rick Rolled" was made? *Edit* I guess it is I should wait till the end before i ask anything lol
Oh a little less demonic. Got it. Would't want the victim think he's about to be kidnappes to hell 😂😂
Great stuff, and I now know even more Linux stuff.
MHz: That's Hz :)
Man, this video is so good. I did some serious shit in one of my university computer labs. It scared the shit out of a lot of people. Even my department chairman was looking for the perpetrator through cctv. They couldn't trace it to me luckily.
Can you show me how to Install more SSD in my head so I can memorize what's going on
Lol now you can with neuralink
Google it "elon musk neuralink" actually UA-cam it and watch the CNET video it's like 18 mins
just use a notebook as your swap partition, cheap dirty hack that works.
I want a 10 tb one!!!!
never heard this guy laugh😂
good video tho
Sometime pranks are funny; sometimes they're not; sometimes you don't even know you're doing one.
Decades ago at work, we had network computers. (DOS/Word Perfect/Novell 2?, 88-ish I think.) We had also purchased some Intel? LanDesk? remote control software (a small TSR loaded after IPX network startup). We had maybe 40 computers and I was fixing the ones left on after hours. I was fixing yet another one where apparently someone had left their monitor on. I heard the next day that a clean-up worked had quit because she was working next to a "haunted computer" -- that was me connected to it remotely, typing -- and didn't want to be there anymore. I tried talking to my manager but to no avail.
OMG really?!?! that's a great story
still my nr 1 pentester !
He deserves more than other childish youtubers...
Master Teach Me!!
If you wanted to kill a single process, top is an overkill to get the pid. Taking the example here, a much quicker way would be killall firefox.
Lol, good fun Kodi but really you could-should of gone further! Still it's very amusing and I've just subscribed
*Hacks into computer*
*Makes the computer say "aeiou"*
I just thought of making a chrontab that beeps every hour on any Friday the 13th. Or just does something to creep the user out.
Oooooh you can crontab an april fools prank
This is really fun!!
Love your videos ✌️✌️
Nice, Sshpooky (okay that seems weird but you get the point)
It it necessary for the target computer to also be the same OS as the host computer ??? Linux 🖥 to Linux 🖥 ???
I think he blinked at... oh wait, nvm.
Spoopy Halloween Edition?
What app do you use?
8:33 Bomb has been planted
call vote on the map :
Could you please let me know the name of the book back of you called with the word CODES
Halloween themed tutorial?
What laptop do you use?
🤣 this is better than a Rick Roll via DigiSpark!
Thanks!
nice video you should teach sudo !! also ;-)
I'm gonna use this for making laptops at Starbucks play Costa adverts.
all those white girls with leggings won't see it coming
Don't forget Cafè Nero ads too😱
I have a wifi duck what kind of scrips can you recommend for trolling
What should be starting point ?