Menu: Overview: 0:00 Plug in cable: 1:21 Connect to Access point: 2:05 Connect to Webserver: 2:30 Load: 2:51 Run keyboard: 3:18 Look at WiFi Information: 4:15 Warning! 6:31 Get the cable from Hak5: shop.hak5.org/products/o-mg-cable OMG cable setup: o.mg.lol/setup Script/payload used: github.com/JeffTadashi/OMDucky/blob/master/scripts/Win-Get_SSID_Info-HTTP.omg.txt Python Server: gist.github.com/fabiand/5628006 ================ Connect with me: ================ Discord: discord.davidbombal.com Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal ================ Support me: ================ Join thisisIT: bit.ly/thisisitccna Or, buy my CCNA course and support me: DavidBombal.com: CCNA ($10): bit.ly/yt999ccna Udemy CCNA Course: bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10 ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P
UA-cam started to block/shadow ban pro trump youtubers and that messed up the recomendation algorithms ;) i still have random 5-8 year old videos in my feed even thou i currate my feed :(
For those who are curious to know that what exactly he was doing is that, he was using a Bad USB can which is a kind of HID device just like USB Rubber Ducky Which looks like a normal USB but acts like a keyboard, you can see the pre programmed usb rubber ducky codes in this video also. By the way great video!
Hey David. I appreciate this valuable content. I'd actually love to see how you did it. I really like your contents both here and on udemy. You're one of the few teachers that I really like on udemy
Thank you David. The information you provide is so critically valuable. I shared the link of this message to many in my circle. Again, most appreciated.
I like your clear english I am saying this because I am not an english man so I have alot of understanding problems watching other english videos... Keep it up senior Thanks alot
Though this was crazy informative and loved the video, I feel like if somebody is able to get a badusb into your computer and run commands, taking your wifi passwords is one of the least malicious things they could do
@@Belliger1991 Ehhhhhh be careful, there are some sketchy usb ports at public places or on trains or buses, that can intercept your data. Argubly i'd say a unknown usb port is worst than a unknown usb cable, as it can be connected to a micro computer, and actually read your phone data... Although you should be safe with both
ok so is no one going to point out the only way to transfer those to your own web server is if that device hosting the web server is on the same network as your target meaning you already have the wifi password... in other words this wouldnt work on a computer thats on a network you dont already have access to....... kinda pointless. now you could still use something like a bash bunny which has mass storage and transfer those files over to it but yea....
Interesting video. Thank you, David! I would really like to see how you did that. Are these cables commercially available? Just one suggestion: decide on one pronunciation of Kali, whichever it may be. You're the boss. ;-)
Don't trust you from the beginning the Kali dragon on the monitor gave it away However quite useful and handy for a social engineering trick great video overally reduces workload of cracking WiFi passwords
1. Thank you for the information 2. I think i don't need to know how you did it, but how can i stay safe with this kind of cable, keylogger, etc. Especially for non technical person, how to stay secure? Suggestions : a. Install a Personal Firewall & Network Monitoring (for PC & Smartphone) b. Block anonymous traffic (incoming, outgoing) c. Or maybe, you can make a list of suspicious URL based on your research. Then you can inform us, at least we can block those URL from our router.
-Thanks for the quality content .... !!! -I really have a certifications path to follow after finishing the first complete course that I finished from Cisco to CCNA. -And after the Jncia I did for Chuck's recommendation, it is to start on Monday and I will post there on Linkedin that for the final preparation for CCNA will be the course of master David "Cisco CCNA Packet Tracer Ultimate labs: CCNA 200-301 labs ", for the final preparation this past month, -After plunging my head into Linux for CompTIA Linux and then start preparing for what I am feeling as my future path as a Network Engineer, which is Cloud, I am very inclined to study Cloud and then do the CCNP Cloud , but it seems that there is no more so the way will be to make the Data Center. -But with certesa before the AWS certification I will take the automation course in python from master David, after all Python because it is a knowledge that really adds up. -But Kali is the safety certification that most calls my attention.
honestly.... I thought it's just a cable..... but after seeing your video ..... uuuuuu .... I'll never use third patty cable again.... tnx again .......
@@moviemenia9276 Lots of hard work for them to create a cable like this that contains an access point and a web server and still acts like a normal lightening cable
Hello David Bombal, I’m very big fan of you and your very amazing videos. Always watching it. This video is very interesting. I thought Apple products are secure :) now it seems it is not. Please let us know did you do it.
I'm sure there's a way of not opening a window and showing the keystrokes, right? I realize when it's dumping the keystrokes it's too fast for the user to counter but it still tells the user he's been compromised. And that's why I only charge stuff from my computer with a small A-A adapter that disconnects the USB data pins
Ok, so basically if I never connect a charger to a computer I should be fine..at least for now. I always charge from USB adapter and only ever attach to a computer if I need to do any command line shenanigans with Android permissions which is once or twice every year or two.
I'm just curious where you would find the code to copy and paste into the access point. Or how you would figure out what kind of code you need to write. I loved this video, you should make more explaining writing code and what does what. If that makes any sense lol
Menu:
Overview: 0:00
Plug in cable: 1:21
Connect to Access point: 2:05
Connect to Webserver: 2:30
Load: 2:51
Run keyboard: 3:18
Look at WiFi Information: 4:15
Warning! 6:31
Get the cable from Hak5: shop.hak5.org/products/o-mg-cable
OMG cable setup: o.mg.lol/setup
Script/payload used: github.com/JeffTadashi/OMDucky/blob/master/scripts/Win-Get_SSID_Info-HTTP.omg.txt
Python Server: gist.github.com/fabiand/5628006
================
Connect with me:
================
Discord: discord.davidbombal.com
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
================
Support me:
================
Join thisisIT: bit.ly/thisisitccna
Or, buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
Udemy CCNA Course: bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10
======================
Special Offers:
======================
Cisco Press: Up to 50% discount
Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
Link: bit.ly/ciscopress50
ITPro.TV:
itpro.tv/davidbombal
30% discount off all plans Code: DAVIDBOMBAL
Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P
for some reason somehow your accent sound like an english south afircan to me
That would be because I am originally from South Africa :)
David Bombal haha i knew it, it sounds so familiar that type of English. Do you speak Afrikaans also?
I want to work with sir..
Yes, but not so well.
Amazing! A step-by-step detailed tutorial is much awaited.
Thank you for watching!
You're something else, man. This is amazing.
Glad you think s Jamie!
w.. why does this thing appeared in reccommendations from nowhere.
Well... maybe because it is a cool video? :)
@@davidbombal I agree! I love this video!
UA-cam started to block/shadow ban pro trump youtubers and that messed up the recomendation algorithms ;) i still have random 5-8 year old videos in my feed even thou i currate my feed :(
More interesting why did you poke it )))
@@davidbombal oh my goodness promotion
For those who are curious to know that what exactly he was doing is that, he was using a Bad USB can which is a kind of HID device just like USB Rubber Ducky
Which looks like a normal USB but acts like a keyboard, you can see the pre programmed usb rubber ducky codes in this video also.
By the way great video!
Interesting video. I want to see how you did this!
I'll show you all the steps in another video :)
@@davidbombal do fast
@@davidbombal thanks
@David thanks
Absolutely, I wanna see it in another video and notice you’ve already given word on your goahead.
Q: How to trigger OCD?
A: Just say Kali or Kali everytime the word comes up.
Hey David. I appreciate this valuable content. I'd actually love to see how you did it. I really like your contents both here and on udemy. You're one of the few teachers that I really like on udemy
Very interesting and I want to see your next video, Sir. Thank you!
Thank you! I'll upload a video showing all the steps :)
Dude...ur the best at youtube who brings intersting topics
Thank you
I would love to see a video step-by-step on how you did this. This is really awesome.
Thank you David. The information you provide is so critically valuable. I shared the link of this message to many in my circle. Again, most appreciated.
love it i m always learning from you i mean learning from the best
Always love this channel...so many lesson here for my student :)
Salam hormat dari Indonesia Mr... hehehe
Thank you Ramadhan!
I also would love to learn a video step-by-step on how you did this. This is really great.
"The best way to predict the future is to create" great quote it infront of your desktop David sir
I like your clear english
I am saying this because I am not an english man so I have alot of understanding problems watching other english videos...
Keep it up senior
Thanks alot
Imagine being able to hang out with David for a few hours, what you could learn from him.
Holy crap, that was amazing. And a solid reminder about non-OEM and cheap replicas.
Cheers!
Glad you liked it Kenneth!
And I love to see how you did this! I've been a fan for a long time I just changed my account. I love your videos!
Thank you Nawid! I'll show all the steps in an upcoming video :)
I have uploaded a video with detailed steps here: ua-cam.com/video/V5mBJHotZv0/v-deo.html
@@davidbombal thank you so much sir, for the hard work. It definitely means alot❤️😁
Great video, David
Obviously, I want a full video on this. Hopefully I'll see it soon
Thank you Abdul. I'll upload a video showing the full process :)
Sir when will u upload the full video.i am waiting much.i m from Pakistan watching u. u r really good teacher@@davidbombal
David Bombal, you are a dangerous man 😎
lol.. Thank you!
Loved the video and the information!There is only one thing that is missing:Poddles.
Keep up with the great content!
lol... Poodle will be back! :)
@@davidbombal Great to hear that! :)
Of course we want to see how you did this...Well done Sir!!! Thank you for the video
Thanks, David. I learn a lot from you.
Omg. Criminals don't rest. Thanks for posting, David.
This is why I subscribed. Never took it seriously before😬
"The best way to predict future is to create it"
well said
I love that quote :)
That was amazing. Step by step please David.
Thank you Peter. I'll upload a video showing all the steps :)
Just wow!!!! I'm learning so many things from you... you are a great teacher.... :)
Thank you!
Though this was crazy informative and loved the video, I feel like if somebody is able to get a badusb into your computer and run commands, taking your wifi passwords is one of the least malicious things they could do
Note To Self..."If you forget you charger...Never Borrow One" lol
lol... exactly. Or only from people you really trust and not from people like me!
@@davidbombal 😂😂😂😂
Charger yes, cable no ;)
@@Belliger1991 Ehhhhhh be careful, there are some sketchy usb ports at public places or on trains or buses, that can intercept your data.
Argubly i'd say a unknown usb port is worst than a unknown usb cable, as it can be connected to a micro computer, and actually read your phone data...
Although you should be safe with both
@@Journetta yeah USB ports can be much more dangerous and can read all data and give your phone a virus or other malware.
eagerly waiting for more descriptive videos...
Interesting sir. Thank for enlightening us we need more knowledge from you
This is so nice❤.You have a nice voice.
Thank you!
Love you Bombal Keep doing magics. Yes we r in to watch usb video
Yes sir we are very excited to see how you did this awesome thing🥰🥰
David you should be the next James Bond!
Wow, that is scary.... Thanks for this eye opener video you shared to us....
you should have more than 1 million subs you are the best
Thank you! Hopefully one day :)
Very interesting. i like this. Thanks David 👍
ok so is no one going to point out the only way to transfer those to your own web server is if that device hosting the web server is on the same network as your target meaning you already have the wifi password...
in other words this wouldnt work on a computer thats on a network you dont already have access to.......
kinda pointless.
now you could still use something like a bash bunny which has mass storage and transfer those files over to it but yea....
I just subscribed and became a fan!!!
Yes sir sure! I want to learn how you done this sir!!
A really nice vedio sir!!🔥
Awesome video David
I am really amazed, Would love to see a step by step
Happy to hear that. I'll publish a full step by step video soon :)
I love to know more and all things related to the same field.
I will never give my phone to anyone if he/she say to me "I will charge your phone . Give me your phone"😂😀
Great video. No more convenience store cables for this guy. 😆
lol... exactly. Don't just trust any cable!
Fantastic work. Thank you. From the UK. But you already know that... 🤔
Cant wait for the next video on how you did it
Thank you Angelo. I show the full process here: ua-cam.com/video/V5mBJHotZv0/v-deo.html
Interesting video. Thank you, David! I would really like to see how you did that. Are these cables commercially available?
Just one suggestion: decide on one pronunciation of Kali, whichever it may be. You're the boss. ;-)
Thank you Andreas :) You can get the cables from hak5. Links in the description.
I have uploaded a video with detailed steps here: ua-cam.com/video/V5mBJHotZv0/v-deo.html
Very much interested to the next video
Thank you for this valuable information.
When ur laptop is so laggy that the run prompt won't even open till they typed all the keys already
David .... That was awesome!
Hi David many thanks for this demo
I would be very interested in seeing how you did this. Enjoy your week
My pleasure, Paul! Thank you :)
I have uploaded a video with detailed steps here: ua-cam.com/video/V5mBJHotZv0/v-deo.html
Wonderful demo! I like 👍
Glad you liked the video Zhi Mwar!
Mind boggling video.. superb 👍
Glad you enjoyed the video Debesh!
@@davidbombal 👍
Really shows why phones and devices should have dedicated charging ports or contactless charging
Very interesting! Definitely would want to know and learn how you did this.
Happy to hear that Vyas! I'll upload a video showing the step by step process :)
Okay, I'm definitely never using anything a stranger gives me.
Thanks for another great video David. What would be the best way to identify a compromise cable or usb drive? Can you create a video on that?
Yes plz show us how you did this? Thank you love all your videos and topics. Keep up the great work.
Thank you Tru Bit! I'll demonstrate all the steps in another video :)
Interesting content
Keep up the great work
Thanks, will do!
Another subscriber here. Great tutorials...
Thank you Glenn, and welcome!
This is interesting and slightly scary. Love it!
Glad you enjoyed the video David :)
Awesome! Keep rolling buddy!
Thank you! I'll keep uploading :)
Thank you for your valuable information sir.I really have a big curiosity to know how did you actually done this!!!
Gracias from TX, USA!
Thank you Ray!
Hey David, I like the video. Can you please make another video shows step by step setup? I hope you will make it soon. Thank you!!
Awesome video David, can you please elaborate on the server setup process also what else can be done with OMG cable.
Yes definitely i want you to explain to us how this works and the process. Thanks
I show the full process here: ua-cam.com/video/V5mBJHotZv0/v-deo.html
Don't trust you from the beginning the Kali dragon on the monitor gave it away
However quite useful and handy for a social engineering trick great video overally reduces workload of cracking WiFi passwords
I don't trust aapple 😂😂😂😂, they are not including a charger in the new set
lol... that is a great comment :)
1. Thank you for the information
2. I think i don't need to know how you did it, but how can i stay safe with this kind of cable, keylogger, etc. Especially for non technical person, how to stay secure?
Suggestions :
a. Install a Personal Firewall & Network Monitoring (for PC & Smartphone)
b. Block anonymous traffic (incoming, outgoing)
c. Or maybe, you can make a list of suspicious URL based on your research. Then you can inform us, at least we can block those URL from our router.
Awesome video👍
This title looks like "Your WiFe is mine!"
Lmfao
just love this guy
-Thanks for the quality content .... !!!
-I really have a certifications path to follow after finishing the first complete course that I finished from Cisco to CCNA.
-And after the Jncia I did for Chuck's recommendation, it is to start on Monday and I will post there on Linkedin that for the final preparation for CCNA will be the course of master David "Cisco CCNA Packet Tracer Ultimate labs: CCNA 200-301 labs ", for the final preparation this past month,
-After plunging my head into Linux for CompTIA Linux and then start preparing for what I am feeling as my future path as a Network Engineer, which is Cloud, I am very inclined to study Cloud and then do the CCNP Cloud , but it seems that there is no more so the way will be to make the Data Center.
-But with certesa before the AWS certification I will take the automation course in python from master David, after all Python because it is a knowledge that really adds up.
-But Kali is the safety certification that most calls my attention.
where did u get the fsociety mask from mr robot?
I will not let anyone plug his cable into my pc even my family members 😂
honestly.... I thought it's just a cable..... but after seeing your video ..... uuuuuu ....
I'll never use third patty cable again.... tnx again
.......
lol... that is the trap. Never just trust any cable again :)
but what just they use in such a tiny usb port ? nano tech ??
@@moviemenia9276 Lots of hard work for them to create a cable like this that contains an access point and a web server and still acts like a normal lightening cable
hmmmmmm.... understand....thanks for the info....
Hello David Bombal, I’m very big fan of you and your very amazing videos. Always watching it. This video is very interesting. I thought Apple products are secure :) now it seems it is not. Please let us know did you do it.
FBI: "How did you come into precession of such cable?"
Absolutely David, I definitely want to see the step by step instructions.
I have posted the detailed steps here: ua-cam.com/video/V5mBJHotZv0/v-deo.html
Jammer ek vloek, maar jy is Fokken Awesome!
lol... baie dankie!
Amazing. Thanks David. Please show us how you did it.
Great video ! By the way , isn't it Kali linux? Not Koli 🤔🤣
Amazing video!! Can u make another one showing how the attack works and what goes on behind the scenes?? Thanks!
Yes. I'll make a video showing the entire process :)
@@davidbombal Thank You !
Trust some's cable... ?! No way ! I've seen pretty weird stuff, so I'm not suprised.
lol... agreed Philip
Thanks David
Yeah I love it, and I have to bay this tool ASAP :)
lol... it is expensive, but is a great cable :)
Wow this is so amazing 👏
Glad you liked the video Nawid!
I'm sure there's a way of not opening a window and showing the keystrokes, right? I realize when it's dumping the keystrokes it's too fast for the user to counter but it still tells the user he's been compromised. And that's why I only charge stuff from my computer with a small A-A adapter that disconnects the USB data pins
Ok, so basically if I never connect a charger to a computer I should be fine..at least for now.
I always charge from USB adapter and only ever attach to a computer if I need to do any command line shenanigans with Android permissions which is once or twice every year or two.
I'm just curious where you would find the code to copy and paste into the access point. Or how you would figure out what kind of code you need to write. I loved this video, you should make more explaining writing code and what does what. If that makes any sense lol
I've never had a chance to see how hacking actually works apart from Hollywood movies.
Hopefully I can show you some really cool, real world examples :)
Yes David certainly would like to see how is it done
Glad to hear that Arshid. I'll upload a step by step video :)
Awesome ..I love it 😍