I Vulnerability Scanned The Entire Internet And Accidentally Made A Botnet

Поділитися
Вставка
  • Опубліковано 24 лис 2024

КОМЕНТАРІ • 284

  • @dooorrr
    @dooorrr Місяць тому +660

    inb4 FBI on Marcus again

    • @archersterling4044
      @archersterling4044 Місяць тому +14

      Surely a lot of people in blue will think what he did here was illegal
      hurr hurr you made my computer send a request
      Is not an ideal situation to be in

    • @dooorrr
      @dooorrr Місяць тому +14

      @@archersterling4044 Well, in this particular example it was done in more of a white hat manner but I guess if they really wanted they could make up some convoluted reasoning how it was illegal because muh exploit abuse and such

    • @sangeetguha51
      @sangeetguha51 Місяць тому +2

      Lol

    • @Jorn-sy6ho
      @Jorn-sy6ho Місяць тому

      JA! Je hoopt dat de FBI meekijkt

    • @UNcommonSenseAUS
      @UNcommonSenseAUS Місяць тому +2

      Bro too cool to just shodan

  • @DeviantOllam
    @DeviantOllam Місяць тому +163

    Wow, this certainly is a leg up on the old "change the text string displayed on the HP printer" attack ☺️

    • @chilversc
      @chilversc Місяць тому +26

      Ah, I do miss the number of times our college printers would declare themselves to be out of crayons or were having some form of existential crisis.

    • @shivkokroo6180
      @shivkokroo6180 26 днів тому

      Link? Can't find a reference.

    • @chilversc
      @chilversc 26 днів тому

      @@shivkokroo6180 used to be (back 2000/2001 at least) there was a utility to change the status display on HP printers, no authentication required.

    • @bootha-qv4je
      @bootha-qv4je 25 днів тому

      ​@@shivkokroo6180same question here, I wanna make my own printer says one fuckshit lmao

    • @CherryKayla
      @CherryKayla 12 днів тому

      Holy shit its the guy!!!!

  • @mad_mario_
    @mad_mario_ Місяць тому +79

    Hope ppl in charge will hear your call, thanks for your service brother ❤

  • @graemepennell
    @graemepennell Місяць тому +334

    News soon leaks "Kremlin printers suddenly start auto printing".....

    • @PvtAnonymous
      @PvtAnonymous Місяць тому +5

      well, that's why Runet was created, so that this doesn't happen.

    • @w花b
      @w花b Місяць тому +2

      ​@@PvtAnonymouswhat's that

    • @PvtAnonymous
      @PvtAnonymous Місяць тому +7

      @@w花b it's basically the "Great Firewall" Lite edition. A compilation of apps, services and websites that are supposed to create a sovereign Russian internet that doesn't rely on outside services. That even includes their own root certificates. Many government services or banks won't work outside of Russia even today. Or their access will be very limited (like streaming platforms). That also means, that outsiders can't really do as much anymore since CIDRs outside of Russia will be dropped by default.

    • @Ephicx
      @Ephicx Місяць тому +6

      @@PvtAnonymous It also has the added "benefit" of russian government being able to decrypt any and all russian traffic using those certificates because they hold the keys. You know, for security reasons...

    • @PvtAnonymous
      @PvtAnonymous Місяць тому +3

      @@Ephicx yup, that's part of the problem. It goes both ways: they can also take control of domestic services and harvest all the data they need since they don't need to ask foreign companies anymore. It's both a blessing and a curse.

  • @ehsnils
    @ehsnils Місяць тому +407

    Next up: "I accidentally messed up the entire internet using fake BGP requests"

    • @alfonzo7822
      @alfonzo7822 Місяць тому +5

      That's something I'm trying to learn more about. So many rabbit holes so little time!

    • @warlordkeys
      @warlordkeys Місяць тому +2

      you are a menace

    • @crissuper20
      @crissuper20 Місяць тому +5

      Im sure, one day, a random Networking guy at a telecom would do that

    • @lotarion
      @lotarion 21 день тому +1

      @@crissuper20 it has happened a couple times already, something tells me it can happen again

  • @michaelm1
    @michaelm1 Місяць тому +149

    My server has seen more than 50 recent attempts to connect to CUPS port. This is now being exploited. Anyone who has not secured their systems is probably compromised by now.

    • @MalwareTechBlog
      @MalwareTechBlog  Місяць тому +44

      So far I've only caught scanners in my honeypot, but I'm certain there is active exploitation happening. I'm not listed on Shodan, so I'm only seen attempts that scan the entire internet rather than targeting known CUPS servers.

    • @D.von.N
      @D.von.N Місяць тому +9

      Linux got CUPS patched up very soon after this came out, people just must not ignore the prompts for updates. On my MS system I print via a cable, the printer sitting next to me. I know what it is called so printing only there. And since keyboards and mouses (mice?) Can also be hacked wirelessly, considering going back to a wired mouse. Keyboard already is. Wireless one behaved strangely on Excel from time to time.

    • @kirill9064
      @kirill9064 Місяць тому

      @@D.von.N You mean someone broadcasts signal, sends🪟+R, and sends malicious comand?

  • @Google_Does_Evil_Now
    @Google_Does_Evil_Now Місяць тому +51

    You're a very good teacher. Easy to follow what you're saying.
    Wonder why the default isn't setup tighter. 0.0.0.0 is full open door. Amazing.

    • @patchshorts
      @patchshorts Місяць тому +7

      that just means it listens on all network interfaces, he also didn't accidentally make a botnet either

    • @Griimnak
      @Griimnak Місяць тому +1

      I learned something today because I always thought 0.0.0.0 isn't much different from 127.0.0.1.
      I just never thought into it much

  • @shaggy6249
    @shaggy6249 Місяць тому +4

    Can’t wait for the “I accidentally turned off the internet” video, keep up the good work Marcus!

    • @gehirndoper
      @gehirndoper Місяць тому

      If it cameyou would have to wait anyway, given no internet.

  • @pidojaspdpaidipashdisao572
    @pidojaspdpaidipashdisao572 Місяць тому +15

    I always knew that that bloody printer will be the end of me.

  • @terraflops
    @terraflops Місяць тому +10

    someone posted your video on mastodon -> first time watching this channel. really enjoyed your calm and easy to follow along explanation on the CUPS vulnerability.

    • @GabrielSykes
      @GabrielSykes 12 днів тому

      Just wait til you see his Wikipedia page.

  • @Dygear
    @Dygear Місяць тому +15

    Man, if I had a nickel for every time that happened to me ... I'd be flat broke.

  • @gispry
    @gispry 26 днів тому

    an informative video explained calmly with no background music and with a soothing voice. Great production, love your work

  • @wasefmahmud
    @wasefmahmud Місяць тому +17

    A legend like u should be getting millions of views

    • @MaddoeGgasvyw
      @MaddoeGgasvyw Місяць тому +1

      Faxx he bet white hat

    • @5nowChain5
      @5nowChain5 Місяць тому +2

      Hes getting mllions of hits for sure😂😂😂😂

    • @MaddoeGgasvyw
      @MaddoeGgasvyw Місяць тому

      @@5nowChain5 no cap them botnets spread faster den hiv

  • @NeonVisual
    @NeonVisual Місяць тому +56

    "Accidently"

    • @JimmyMatis-h9y
      @JimmyMatis-h9y Місяць тому +1

      came for this comment. 😊 thx for not disappointing!

    • @JimmyMatis-h9y
      @JimmyMatis-h9y Місяць тому

      lol. my first thought as well.

  • @notmyrealname4340
    @notmyrealname4340 Місяць тому +10

    Bro did not learn his lesson the first time

    • @MaddoeGgasvyw
      @MaddoeGgasvyw 29 днів тому +4

      No he aint he went from white to grey hat 🤣🤣🤣🤣

  • @javierarzon4853
    @javierarzon4853 Місяць тому

    You are awesome Mr Marcus, have been looking at your videos for Manny years, and they are are absolutely awesome . My blessings to you 😊

  • @dvast4942
    @dvast4942 25 днів тому +1

    You're a good person, I would have made a lot of money but you aren't me, you'e a good person indeed

  • @MiroslavObrtel
    @MiroslavObrtel Місяць тому

    Thanks Marcus for reigniting my desire to explore and curiosity ♥
    This is sick!

  • @stuffless
    @stuffless Місяць тому

    Thank you for explaining every part of the process so clearly. It is thanks to people like you I develop an everdeepening interest in cyber security

  • @behindYOUR6
    @behindYOUR6 Місяць тому +21

    Open the door 、its FBI

  • @patchshorts
    @patchshorts Місяць тому +46

    that is not what 0.0.0.0 means, it means a listen is happening on every ip of the host on that port, the listen mask isn't a firewall

    • @m8_981
      @m8_981 22 дні тому +2

      yea but he said "if the port is forwarded through the firewall".

    • @sablanex
      @sablanex 4 дні тому

      @@m8_981 which is the real problem here. If the server is behind a nat someone would have to explicitly add a rule to forward the packets to that ip and port. Unless they just plugged the server directly to the internet.

  • @5nowChain5
    @5nowChain5 Місяць тому +1

    You just created your own Orbitial Ion Cannon. Expect a knock on the door...

  • @xCheddarB0b42x
    @xCheddarB0b42x Місяць тому +17

    do not "scan the entire internet" kids
    unless you know, badged three letter indemnity

    • @FreeLovingAmerican
      @FreeLovingAmerican Місяць тому +1

      Ya... guy's a quack really. You don't accidentally install malware to create a botnet either lol.

    • @panagiwthspetroulios2075
      @panagiwthspetroulios2075 Місяць тому +16

      @@FreeLovingAmerican you didn't really understand the video

  • @impulsiveDecider
    @impulsiveDecider 13 днів тому

    Glad someone at my university notified my of that issue. I don't know if I would have heard about it another way.

  • @BryanEnsign
    @BryanEnsign Місяць тому

    This needs more views. Great work. The world is in trouble 🤦‍♂️

  • @nanostar6138
    @nanostar6138 Місяць тому +4

    Wow, you better get a Nobel peace prize soon mate!

  • @elhnston6589
    @elhnston6589 Місяць тому +1

    "Accidentally" .. That's brave.

  • @brendanmcgullion9358
    @brendanmcgullion9358 Місяць тому +11

    Jail Bait meant something different when I was growing up.

  • @sim00ps
    @sim00ps Місяць тому

    That amplification is incredible. Nice job chief

  • @user2200-t5z
    @user2200-t5z Місяць тому +1

    Nice, U not only great at performing but also great at presenting your work.

    • @MaddoeGgasvyw
      @MaddoeGgasvyw 29 днів тому

      Oh he great at performing alright he gunna need to perform new speech for usa after this 😂😂😂😂

  • @Sellbob
    @Sellbob Місяць тому +7

    Would love to see a video covering, how you contacted the respective parties and how someone like me could go about it.

    • @einname9986
      @einname9986 Місяць тому

      That would be really interesting + It'd be interesting how the situation develops. Do the respective governments react? Do these systems stop being vulnerable after some time?

    • @Sellbob
      @Sellbob Місяць тому +1

      ​@@einname9986 Could not agree more!

    • @Jimmy_Jones
      @Jimmy_Jones Місяць тому

      Probably just an email form on their websites

  • @maxdemontbron9720
    @maxdemontbron9720 Місяць тому

    Thanks for such high quality content.

  • @Chris-cv1ll
    @Chris-cv1ll Місяць тому +2

    And that is why it was given a high rating…

  • @KG-id3hk
    @KG-id3hk Місяць тому

    I LOVE THESE VIDEOS!!! Please keep making more

  • @guilherme5094
    @guilherme5094 Місяць тому

    Marcus's lawyer now:
    👀! I feel a slight tingling in my arm.

  • @matinmrv4213
    @matinmrv4213 Місяць тому +2

    Wow. Learnt alot. Thank you Marcus.

  • @tonycarter8440
    @tonycarter8440 Місяць тому +2

    Great breakdown Marcus! Now do ipv6 :-)

  • @anonuser2640
    @anonuser2640 Місяць тому

    10/10 video I watched it without skipping a second

  • @bliskenx7239
    @bliskenx7239 Місяць тому +2

    Great video mate. Legend!

  • @penvegan
    @penvegan Місяць тому +1

    Dude what the hell I didn't know you uploaded the weeks ago. UA-cam sucks.

  • @computerpastiche
    @computerpastiche Місяць тому

    amazing video and discovery! you're a natural for deftly presenting complex ideas in a digestible manner; this is endlessly interesting, thanks for sharing :·)

  • @Sam-y5o6j
    @Sam-y5o6j Місяць тому +2

    Wrote a high performance C++ scanner.. presumably because it's about three decades quicker than understanding massscan configuration.

  • @0xphk
    @0xphk Місяць тому

    Still searching for the printer to finally pickup my printouts :D well done

  • @nathanpendergrast6917
    @nathanpendergrast6917 Місяць тому +29

    bros trying to go back to jail

    • @MaddoeGgasvyw
      @MaddoeGgasvyw Місяць тому +1

      He cyber security genius

    • @runed0s86
      @runed0s86 29 днів тому +1

      ​@@MaddoeGgasvywNah, anyone can learn this stuff being ignorant doesn't make everyone else a genius.

    • @ExperimentalKana
      @ExperimentalKana 29 днів тому +1

      wait he was in jail?

    • @MaddoeGgasvyw
      @MaddoeGgasvyw 29 днів тому +4

      @@ExperimentalKana he was almost in jail he almost got 10 years back n 2017

    • @MaddoeGgasvyw
      @MaddoeGgasvyw 29 днів тому

      @@runed0s86 tbh ill say this hacking u kinda have to be genius not easy hack

  • @Synflood-dot-txt
    @Synflood-dot-txt Місяць тому

    Love your videos dude, thanks!

  • @sunsaktayho
    @sunsaktayho 24 дні тому

    so unfortunate to know you just have 100k subscriber while I just came to know you as a WannaCry Hero.

  • @stevenstark-com
    @stevenstark-com Місяць тому +1

    it seems to me that you likely just stumbled onto an existing botnet

  • @DaneSchell
    @DaneSchell Місяць тому +4

    Bro just gave the government back door access to those systems (if they didn't already have it) lol

    • @exodeus7959
      @exodeus7959 Місяць тому

      I would bet you they already know. He just stumbled onto this thinking it is some unknown exploit. Meanwhile our government’s probably have been using this exploit on their own citizens for years.

    • @ilyasessar7267
      @ilyasessar7267 Місяць тому

      🤣🤣🤣

  • @kevinnyawakira4600
    @kevinnyawakira4600 Місяць тому

    I want to be like you when i grow up. I like how you do amazing things accidently😂

  • @rogerkell4964
    @rogerkell4964 Місяць тому

    As a hearing impaired user, this was a really fun video to attempt to listen to.

    • @bdm1019
      @bdm1019 Місяць тому

      There are captions but you need to turn them on.

  • @evilmortyofficial
    @evilmortyofficial 6 днів тому

    NSA field day

  • @nagi603
    @nagi603 Місяць тому

    A subset could be some distributed/microservice pdf/etc printers that were open to all instead of just the service/users they are supposed to provide capability for. Like an open bucket. e.g.: "hey, we need to have our xls export also output pdf, and I don't where to start, so I spun up a pdf printer docker and as networking is also not my cup of tea, opened the firewall. Task done, next ticket please!"

  • @jacobcourtney5778
    @jacobcourtney5778 Місяць тому +1

    Yeah FBI, he is at it again

  • @ThisisFerrariKhan
    @ThisisFerrariKhan Місяць тому

    Bro must like them awkward conversations with the alphabets boys 🤣

  • @ryanpaaz
    @ryanpaaz Місяць тому

    Marcus, any thoughts on the frustration of the vulnerability disclosure process and how responsible disclosure was dismissed the the researcher had to prove their technical prowess? It looked like a no-win. From the story I heard he told the Devs and they dismissed it as something that wasn't a concern to them and had a less than productive discourse. Researcher posts results and a proof of concept and the Dev's are all bent out of shape that this happened. It didn't appear there was much way for the researcher to win, except let 'security through obscurity' reign.

  • @blackmennewstyle
    @blackmennewstyle Місяць тому +3

    The map with all the potential victims is definitely quite worrisome...
    Definitely something other malicious actors have definitely taken advantage of...

  • @flavio6179
    @flavio6179 Місяць тому

    Good video Marcus , thanks for sharing

  • @starnumber_alt
    @starnumber_alt 27 днів тому

    Now you gotta destroy another ransomware

  • @GoldenOni.
    @GoldenOni. 2 дні тому

    You Are my Hero!

  • @RandoWisLuL
    @RandoWisLuL 29 днів тому

    id love to set up 2 servers on different network connections and see what the 30,000+ servers would do to a setup.

  • @RobertElliotPahel-Short
    @RobertElliotPahel-Short 24 дні тому

    Love your content, commenting for more

  • @NiklasTerhorst
    @NiklasTerhorst Місяць тому +1

    "Obviously i not do this"
    Not sure how many ppl will create a botnet with some chatgpt knowledge just from your video about the cups exploit

  • @NotSure416
    @NotSure416 10 днів тому

    You should have posted notice to these systems by sending a message to their printer.

  • @Lebensgott
    @Lebensgott Місяць тому

    thanks for that informative video. i really have to check if anything is port forwarded, which shouldnt be forwarded... ^^

  • @ilex8015
    @ilex8015 26 днів тому

    Dude just accidently showed anyone how to ddos

  • @MrPyro91
    @MrPyro91 Місяць тому +1

    FBI warrant round 2

  • @OGB2
    @OGB2 Місяць тому

    "Hey guys look what I figured out how to do! Pretty cool huh? Guys?..."

  • @budgetarms
    @budgetarms 22 дні тому

    Isn't this the guy that stopped one of the most infamous virusses of all time, ...

  • @polymathx_
    @polymathx_ Місяць тому

    bro is building his own case file
    edit : his

  • @brandonb5394
    @brandonb5394 Місяць тому

    student here: so does this mean that this vulnerability for network-printer discovery gave access to these peoples networks or no? If so could someone explain how so.

  • @ocsanik502
    @ocsanik502 Місяць тому

    Why are people not firewalling the cups port?!

  • @BFG_10G
    @BFG_10G Місяць тому

    Don't let the FBI see this video.😆

  • @Cheezus-Crus7
    @Cheezus-Crus7 Місяць тому

    i remember when i setup my linux server for the first time in 2016... there was a lot of cupsd things happening and so i decided to shut the cupsd server down indefinitely and reboot.

  • @RockOfTruth_OFFICIAL_John14.6
    @RockOfTruth_OFFICIAL_John14.6 Місяць тому

    Thanks for sharing your insight to this type of network setup. If you had to choose between one and two AV security suites, which would you choose and what makes those vendors better than the rest?

    • @TRDiscordian
      @TRDiscordian Місяць тому

      AV is garbage, borderline scam. If you insist on using 3rd party AV do research on the pros/cons of different vendors.
      If you're corporate use DeepFreeze with WindowsDefender.

  • @BroomopUK
    @BroomopUK Місяць тому

    good luck with the SOAP

  • @Hexachroma
    @Hexachroma Місяць тому

    This might be the reason behind IA DDOS attack :(

  • @MacGuffin1
    @MacGuffin1 Місяць тому +12

    classic example of SW guys fucking up thinking they know networking.
    FYI Marcus be careful, your skating close to the edge again my bro, I love the video but maybe consider taking it down ;-)

    • @superslammer
      @superslammer Місяць тому +1

      I wholeheartedly agree. This seems very reckless.

    • @Google_Does_Evil_Now
      @Google_Does_Evil_Now Місяць тому

      What? He's pointing out the flaws and giving the fixes.
      He already contacted all the governments.
      These flaws are several years old and should be patched.
      Can it really be that difficult for the ISPs to contact and get customer to fix?
      Should be a law that if you connect to the internet that you take reasonable steps not to become part of attacks.

    • @freedustin
      @freedustin Місяць тому

      ISPs should just block the port. Who needs printing over the net but doesn't have VPN?

    • @MacGuffin1
      @MacGuffin1 Місяць тому

      @@freedustin ISPs should never block ports (for a whole raft of reasons) Admins should patch their stuff/block ports they dont need on their firewalls etc

    • @superslammer
      @superslammer Місяць тому

      @@freedustin Some ISPs probably do. Mine NATs us. I had to request a static IP to get out of it.

  • @Interminableable
    @Interminableable Місяць тому +3

    Hi Marcus, love your content and your in-depth explanations.
    Your description how the binding IP address varies stuff is somewhat inaccurate/misleading.
    Was this deliberate comment bait for network nerds?

    • @farhanrejwan
      @farhanrejwan Місяць тому +1

      thanks for your comment, it really helps the channel grow.

    • @Google_Does_Evil_Now
      @Google_Does_Evil_Now Місяць тому

      It looked accurate to me, but I'm just average user.
      What did you see inaccurate about it?
      0.0.0.0 means no restrictions on the IP.
      Is that not right?

  • @___aZa___
    @___aZa___ Місяць тому +1

    4:23 320TB if my math is correct :D

  • @SY1Mella
    @SY1Mella 26 днів тому

    Mad how much of a ballache it is to connect to my OWN printer sometimes

  • @SimonZerafa
    @SimonZerafa Місяць тому +2

    Oh No! Not again?! 😉🤷‍♂️

  • @moneyman6227
    @moneyman6227 Місяць тому

    Up next “I accidentally used a zero day rce on the whole internet😂”

  • @tagKnife
    @tagKnife Місяць тому +1

    Wait... This wouldnt happen to be the 3.8Tbps "ddos" cloudflare detected?

  • @kkuriboh
    @kkuriboh Місяць тому

    easiest botnet tutorial I've found, thanks for the information. now I must collect my billion dollars from the russian gobberment.

  • @zerodoinkthirty0
    @zerodoinkthirty0 Місяць тому

    Fascinating!

  • @JustaGuy-cool
    @JustaGuy-cool Місяць тому

    Great work

  • @MaddoeGgasvyw
    @MaddoeGgasvyw Місяць тому

    Next video " the fbi knock on my door again"

  • @nsacyber
    @nsacyber Місяць тому

    Ah, so it was YOU. FBI will be there shortly. ;)

  • @LordOdin
    @LordOdin 22 дні тому +1

    Pretty decent video other than the python statement being complete bullshit. I’ve made many pythons web servers that are capable of over 10GB/s on a single thread.

    • @MalwareTechBlog
      @MalwareTechBlog  22 дні тому +1

      It's basic common sense that the less time spent per system call, the higher the throughput. I don't necessarily doubt that someone could create a 10gb/s web server in Python, but based on your response to the discussion at hand, I do doubt that you could.

    • @LordOdin
      @LordOdin 22 дні тому

      🤷‍♂️ I’ll take that as a complement I guess
      I wasn’t saying that python isn’t slow. I was saying that it’s not a bad tool for this specific task. You said your self it took 40 minutes for the c code to run.. 1.8 million requests per second is 100% achievable with python if you are halfway decent at python. At least on the hardware you mentioned.
      We can make this a bit more constructive instead of an argument, I’ll write some code to do it when I get back from my trip to Europe.

    • @MalwareTechBlog
      @MalwareTechBlog  22 дні тому

      It's nothing about "being decent with python" it's an interpreted language, there is a massive overhead with each call. It's not going to even come close to C in terms of requests per second given identical hardware. If the hardware is maxing out at 1.8 million RPS, how are you going to increase that by adding more CPU cycles?

    • @LordOdin
      @LordOdin 19 днів тому

      @@MalwareTechBlog it is possible to write bad c code… Language is irrelevant if you write a pile of unoptimized slop. Good logic is more important than the speed of the language most of the time, especially in networking. The metrics you mention are fairly within reach from python based on my past experience. You are only doing 37,500 requests per second per thread on that system.
      If you are correct you would let me write the code and prove my self wrong.

    • @MalwareTechBlog
      @MalwareTechBlog  17 днів тому

      You're free to prove yourself as wrong as you want. I already know my C code will be faster.

  • @FragileMaleEggo
    @FragileMaleEggo Місяць тому +1

    Was IPv4 or IPv6 blast

  • @yzz__
    @yzz__ Місяць тому +3

    i’m just commenting to annoy the guy who got pissed at me for saying first

    • @2fated
      @2fated Місяць тому +1

      First

  • @_GhostMiner
    @_GhostMiner Місяць тому +1

    *4:34** Rookie mistake of not using a real language.*

  • @NoBody-tz4fb
    @NoBody-tz4fb Місяць тому

    "Accidentally" 😂😂😂

  • @lfcbpro
    @lfcbpro 29 днів тому

    Total noob here, but why would the systems have this port open in the first place?
    Is it for network printing or something along those lines?
    I wouldn't even know how to contact all of the authorities you had to, that is going above and beyond, well done sir.

  • @hex0rb0rb
    @hex0rb0rb Місяць тому

    Don't be at it again bro I love you

  • @shadowlord0162
    @shadowlord0162 13 днів тому

    is it already time to create the blackwall?

  • @scrapycholo2659
    @scrapycholo2659 Місяць тому

    When will you make skynet?

  • @Walid-Lamraoui
    @Walid-Lamraoui Місяць тому

    Like Always amazing video

  • @BruxoCp13
    @BruxoCp13 Місяць тому

    A laughed my arse off all the way through this lol

  • @subdueds
    @subdueds 6 днів тому

    this isn't fully how this works though, I worked with botnet development for a very long time before I was eventually caught up with law enforcement. For some reason, when doing a world scan with something like LRAB, or even just scanning SSH devices, no one knows why, but sometimes the devices just don't connect to your botnet, out of the maybe 10mil infectable devices you may have found, you might get 100 thousand and that is a very high estimate, and devices you can't seem to infect, other people will infect with no problem, but on your botnet it might be unstable or not connect at all, and people have tried fixing this by logging onto the devices and playing around with them, there seems to be no fix to this.
    Edit: Holy shit as I go back to finish the video you explain the literal problem I just commented about, like I get that you probably made a payload file that wasn't meant to re initiate itself, so it's sort of different but it's really not, this falls under the exact same issue.