On April Fool’s day I played “Congratulations” by PewDiePie on all my school’s smart boards to demonstrate how insecure they were. Because I spoofed MAC and IP addresses I was never caught, but I told administration anonymously and they fixed it.
Not gonna lie ive used these sorts of things for setting up shit on whole rooms with of PCs. EG when my tafe got a new server and every PC in the place needed around 10 network drives mapped. Sure i could of used a windows script to do it. But that would of meant having to put the USB in, open the file etc. With a bad USB i just had to go around to each PC. plug the USB in. Wait like 5-10sec and unplug it and it was done.
"I realise this is HTML" you are far better than youtubers, that put stock footage with js or binary code, and they think that this is "hacking footage"
BadUSB is the wrong description for that because you actually only talk about a usb device that makes keyboard inputs. BadUSB is actually the vulnerability in a certain type of USB Firmware which made it possible for hackers to modify the firmware so it does what it does.
What do you mean by "certain type of USB Firmware"? I believe you meant "every single USB firmware ever made because it is a fundamental design flaw in the USB spec".
I actually thought BadUSB was the one that charges capacitors and dumps a fuckton of voltage down the data lines, frying whatever USB controller it was plugged into...
I have one that I hide behind my family’s pc. It will randomly press the caps lock button over time. It’s simple to set up, but extremely infuriating and confusing to tell what is happening. I love it :)
The BadUSB has come a long way since its inception and this video does an excellent job of showing how it has evolved. It's a reminder to always be aware of the potential threat of physical access to our devices and the importance of keeping our systems secure. The comments also highlight the duality of technology, as it can be used for both malicious and practical purposes. This video is a must-watch for anyone interested in cybersecurity and the potential dangers of USB devices.
I love using a BadUSB for setting up new PCs, it becomes very tedious typing the same commands and credentials on 50+ PCs. I'd also love a nethunter video I tried forever to compile a kernel to get it to work on my Google Pixel but never got it to work so I just gave up and bought a USB Rubber Ducky and a Pi.
If youre an IT this is not only a hacking tool but a productivity tool as well, installing things in every computer offline is really really really tiring
My plan to use arduino is to make my garden automatic by making a robot with it But after watching this video i have new plan! Rick rolling people with Malduino!
Again, when the bad guy has physical access, you've already lost. On my end, it's really handy for the occasional headless system setup (the questionable lazy way, which I occasionally adore).
You don't have to have physical access. A lot of people would try a USB stick if they found one somewhere, so just plant it in the right place and let it work... Or you can make it look like a new one, in a package, and off you go.
I can see some good uses of the badUSB. For example... if you regularly work on computers, and generally start with the same things every time, setup a badUSB to run them for you automatically, so you can save some time. Just one example.
Could a security program monitor the key stroke speed. Allowing it to determine if the Keyboard is a person vs a BadUSB. Although you could just limit the BadUSB type rate.
I would totally want one of these if I knew it were possible to completely automate the entire Windows installation and post-installation setup and customization process.
You could make one that fit in place of the controller of a regular USB keyboard and worked as a regular keyboard, but also received commands via wifi or 2.4ghz + worked as keylogger
So, I would like to buy one of your Malduino UBS sticks, but I got a question, does it work with Swiss keyboards or other keyboards to? I mean the text I program on the Stick will it automatically type it in like own letters or will it when I would type Ä or something like that type "^" or something like that? Thank you in advance! lg
Amin - We are allowed, but they think they're safe since they shut off downloads. Except we're working from home now, and have always had vpn access, so we can plug anything into our own computers (Oops!) Security guard at a datacentre? Did you ever watch "Mr Robot"?
I just realized that I instinctively made a bad usb by using an Arduino version that just plugs into USB and can be programmed to emulate keyboard input. I just wanted to make my life easier by autotyping logins in a too restricted environment. It was a no-brainer.
What if it's plugged into a slow computer? Where Win+R takes like 5 seconds to open the run dialog? If it just acts as a keyboard it probably couldn't detect this delay and would type the command too early before the run dialog is opened, right?
If I made a BadUSB, I would make it open command prompt, and make it write a vbscript file that repeats a voice every hour and put it in startup folder. It would be in a hidden folder, to make it as hard to delete as possible. And while you’re here trying to find out how to do it, there’s a batch file eating up your storage space and making it even harder to delete.
With all the cool, yet terrifying stuff a BadUSB can do, it begs the question...can you use a BadUSB to run a TAS-like script that can play a PC game (for example, Trailmakers)?
I'm gonna make one of these that opens up a picture of a big yoshi when you plug it in... that's it. Maybe another that opens up a picture of kirby as Steve buscemi
>BadUSB are undetectable Not even close to true. You can set up some kind of password-authentication or "type this random word" test for when keyboards are plugged in, you can lock keyboards that type too fast, so on and so on.
Bro there is a problem on windows 7 drivers download for a long time and I live in Russia and everyone has Russian on computers. To make a backdoor, for example, you need English, you can solve everything num, you can combine keys and write any characters (English) but in Arduino (and I through the seytonic website I convert the code for a duck thief to arduino) there is no support for num keys, but you can change the language on the victim’s computer, but the problem with windows 7 basically doesn’t load the driver what to do? //www.amazon.co.uk/Badusb-arduino-Leonardo-USB-ATMEGA32U4/dp/B01N1EK01K
"Typing thousands of characters per minute" There's your detection vector, right there! Just equip security software to check for inhumanly-fast typing.
Better yet, checks by matching VID, PID, serial number and class. Only devices whose parameters all corresponded to a check on whitelisted devices (whitelisted by the user via sudo) would enumerate. Devices that decided to change class on the fly would have their access revoked, unless they were authorized to do so. More fail safe than checking for typing speed, as a malicious device can always emulate a real human typing.
Better mail them from a fake address and get the money on a bank account with fake info, but theoretically, if you have the means to do that, it could be a quite dangerous attack. You never know if a defence contractor CEO's assistant is going to buy one and plug it into their laptop at work, opening their whole secure company network up to intrusion.
@@sassyMcpussy I won't deny the efficacy of other types of attack, but when you do something entirely unusual, people are often unprepared. Companies and government organisations generally have strict rules about emails, and the general population is a little more wary of emails these days, but people might be less prepared for this kind of attack. Even if it's less effective, it at least poses a threat that should be recognised. Ignoring less effective threats leaves you open to unusual attacks.
is it possible to reprogram the USB ROM to act as a screen-grabber which feeds back over the web to a spy command centre? Would it be able to act like a virus, copying from USB stick to the laptop hub, then on to clean USB devices subsequently inserted? Would you like a USB stick from a laptop I have which I think has this infection?
Does the antivirus software Panda provide any protection to this, re it scans every usb stick the second it is plugged in, or is this just too little too late ?
What are the limitations of usb scripts? For example, I would need of a script to escalate privileges if I seek to do something more permanent wouldn't I? Based on Sandboxescaper exploits I guess I would target task scheduler to create non privileged routine to email screenshots from the affected computer every now and then with the content of the clipboard hoping for something important I guess. I mean I do not think I would need admin privileges to pull that off but I am a n00b, what would I know.
vbs files can send key strokes, windows will run vbs files without even so much as a warning prompt. mix that with a usb stick that has a autorun.ini on it and you got a budget badusb, but this depends on the os just blindly running autorun files which you see much less of nowadays.
1:13 They have to be detectable. If they are just HID keyboard you will get a pop up when you plug in one saying that you just have new keyboard with driver installed and ready to go. This happens only when you plug it in first time so pay attention.
They could be detected if Windows didn't tried to enumerate every device that is attached. A check on VIP, PID, serial number and class against a trusted devices list would solve this.
Hello . New subscriber here . I want to learn to make the kind of hacks you make . Whenever i watch your video it really inspires me to learn electronics and computer science in depth . Your breadth of knowledge inspires me . Could you share how you learnt all the things you know ? Would be really helpful for me . Thank you for making such amazing videos 🙂
My animation teacher went to each and every computer to install the correct version of Blender, then again to create a desktop shortcut. If i knew about this before I could have saved him a lot of time...
huh, interesting thing, has there been any cases of any malware from a PSP/N3DS SD card being found? (I just wanna know because I am planning on getting a few PSPs)
It's not just a keyboard though, there's more to them than that, hence why with the right flags and permissions you can deny any BadUSB from operating on your system, at least for Linux
Um, how about a prompt to “Trust HID device” with a further description of what happened and have a trusted HID list where you can add devices to be permanently trusted. Then, anytime a HID device is connected outside of the trusted list it cuts power to it and waits for the user to approve or deny access.
an easy way to make your pc invulerable to badusb is, have your computer just be really really slow and laggy so when u type stuff nothing happens for seconds and some of what u type is ignored the best kind of security through obscurity prove me wrong
How to brick a computer: install super f4, ctrl+alt+f4, repeat until you tell the OS to commit sudoku. Don't know if this is fixable with a reboot (since I don't have a computer to brick) but I figured this out after hitting it one too many times. Do with this info what you will
When you become a hacker just so you can rickroll people
yes
yes
yes
yes
yes
If you use a BadUSB for good, would that make it a GoodUSB?
Bad BadUSB
The end doesn’t justify the means.
What is good and what is bad? Different culture by culture, even person by person.
This is a hard philosophy question.
@@とふこ its generally bad to delete someones files using a badusb
@@iMadrid11But the "means" are what you tell the USB to do, no? So if you give it good commands..?
There are the hackers who actually want to deal damage
*and there’s the hackers who just rickroll people*
no
no
Yes
On April Fool’s day I played “Congratulations” by PewDiePie on all my school’s smart boards to demonstrate how insecure they were. Because I spoofed MAC and IP addresses I was never caught, but I told administration anonymously and they fixed it.
@@haxalicious Y u lying for
1:49 Payload - OSX Grab Minecraft Account Password and Upload to FTP
Payload - Hotdog Wallpaper
no
Joshua Estrada yes
im safe cuz im not using mc java xD
what ftp server
0:49 seriously that stock footage is amazing
yes :)
tru
tru
tru
Not gonna lie ive used these sorts of things for setting up shit on whole rooms with of PCs. EG when my tafe got a new server and every PC in the place needed around 10 network drives mapped. Sure i could of used a windows script to do it. But that would of meant having to put the USB in, open the file etc. With a bad USB i just had to go around to each PC. plug the USB in. Wait like 5-10sec and unplug it and it was done.
Australian?
no
So, a timesavingusb instead if a badusb?
Tafe? What do Australian trade schools have to do with servers?
Nah, with my 5400rpm hard drive, it will take years to even load chrome up
you can just set the delays for the script to go along with your potato of a computer lol
Apparently some Linux partition formats (like btrFS or EXT4) are a bit faster than ntfs (the normal Windows format).
if you have ridiculous quantities of small files ReiserFS is another good choice.
Internet explorer
Highly doubt a 5400 HDD would cause such problems. Maybe you need more ram, faster CPU or a fresh install of chrome.
A video on that? On nethunter? Sure mate! :D
thats a definitive yes we would love your take on Nethunter for beginners
yes
I found a USB stick outside, and when i took it home and plugged it in, it opened Chrome and took me to this video.
😂🤣
I can't stop laughing😂😂😂
i am want a badusb... with the solo purpose to rickroll people
DICE I am want badusb me also
@Justin Martone *bAd UbS*
I am want very stoopids for the sticko
i am want
No ur not
1:06 I would actually buy a BadUSB that gets people Rick Rolled
A N I M E
N
I
M
E
W E E B
E
E
B
Nethunter? Yea, cool!
@Amanda Archer get gut
@@vuraniute9571 lol wut
"I realise this is HTML"
you are far better than youtubers, that put stock footage with js or binary code, and they think that this is "hacking footage"
@astroj YES
@astroj they also use geektyper in some cases haahhahhah
My classmate once wanted to show how advanced he is on tiktok, so he opened cmd, made the color of the font green and typed tree C:\
@@toaddx BRUH
cmatrix all the way
BadUSB is the wrong description for that because you actually only talk about a usb device that makes keyboard inputs. BadUSB is actually the vulnerability in a certain type of USB Firmware which made it possible for hackers to modify the firmware so it does what it does.
Yup, this has been known as USB Rubber Ducky for several years. The malduino site even says it's inspired by hak5's rubber ducky.
What do you mean by "certain type of USB Firmware"? I believe you meant "every single USB firmware ever made because it is a fundamental design flaw in the USB spec".
MAFRIESE those brutal hackers are knights from the devil, aaarrrggg!!
I actually thought BadUSB was the one that charges capacitors and dumps a fuckton of voltage down the data lines, frying whatever USB controller it was plugged into...
@@WackoMcGoose I remember that. What was that one called?
3:55 now i can make a badusb and hack my school's mainframe computer just with this simple command lol
Do you trust Maltronics.com enuf to give them access to your school's mainframe ?
Yea mainframes are worth thousands of dollars. They totally let children near them.
YESSSS, amazing video! Let’s see some net hunter
yes
The hacker footage is just amazing! 😂🤣
Mário Lourenço rip grandpa.
@@scoutsownbucketofchicken2006 sneak 100
I have one that I hide behind my family’s pc. It will randomly press the caps lock button over time. It’s simple to set up, but extremely infuriating and confusing to tell what is happening. I love it :)
I always thought why my anti virus has a Keyboard security code that you need to click in with your mouse before it works. Now I know!
@CDR Systems LOL
The BadUSB has come a long way since its inception and this video does an excellent job of showing how it has evolved. It's a reminder to always be aware of the potential threat of physical access to our devices and the importance of keeping our systems secure. The comments also highlight the duality of technology, as it can be used for both malicious and practical purposes. This video is a must-watch for anyone interested in cybersecurity and the potential dangers of USB devices.
I love using a BadUSB for setting up new PCs, it becomes very tedious typing the same commands and credentials on 50+ PCs. I'd also love a nethunter video I tried forever to compile a kernel to get it to work on my Google Pixel but never got it to work so I just gave up and bought a USB Rubber Ducky and a Pi.
If youre an IT this is not only a hacking tool but a productivity tool as well, installing things in every computer offline is really really really tiring
My plan to use arduino is to make my garden automatic by making a robot with it
But after watching this video i have new plan! Rick rolling people with Malduino!
Again, when the bad guy has physical access, you've already lost. On my end, it's really handy for the occasional headless system setup (the questionable lazy way, which I occasionally adore).
You don't have to have physical access. A lot of people would try a USB stick if they found one somewhere, so just plant it in the right place and let it work... Or you can make it look like a new one, in a package, and off you go.
@@homelessrobot Yes but i said that You (the hacker) do not need physical access. This makes life much more easy.
This wouldn't work on linux, it's just that windows security sucks. Linux needs a password to do anything too extreme.
"A CD ROM" triggered my siri... on the device I was watching this video on.
I can now rickroll my teacher with my innocent usb every 5 minutes
Just found this channel and, honestly, I'm loving it so far.
Just wondering... why is the "real life hacker" writing C++ source code?
@BurninLitt14 r/woooosh
gimmy gumbo what is even r/whoooosh about what he said???😂😂🤦🏼♂️
@@jxnooo
Fake account he wont answer.
@@kansas813 r/woosh
@@rjpena6273 r/woooosh
I can see some good uses of the badUSB. For example... if you regularly work on computers, and generally start with the same things every time, setup a badUSB to run them for you automatically, so you can save some time. Just one example.
Yes we want kali nethunter video
Could a security program monitor the key stroke speed. Allowing it to determine if the Keyboard is a person vs a BadUSB. Although you could just limit the BadUSB type rate.
@@gwentarinokripperinolkjdsf683 That would be really annoying.
That was already possible in the 90s, but then you had to build it yourself and, of course, use a PS2 plug
Me: **becomes hacker**
People I hack: Why do I hear RickRoll music?
I made it in my Badusb script
SUDO KILLA hahahahha.... Ur a joke bro... You really bought a rubber ducky for 45 dollars? You can make it for 3 $ with arduino.
Rubberducky: "sucki sucki" , "only 3 Dollars!"
;D
I would totally want one of these if I knew it were possible to completely automate the entire Windows installation and post-installation setup and customization process.
Love the clip from Hak5, where you see Daren's hand busted. It was when it tried to hit Wez. God times...
"I realize this is HTML" you've gained a sub 😁
Usb rubber ducky is my go2
HEY YOUR TALKING ABOUT THE RUBBER DUCKY THATS WHAT I SIAD
when you use a BadUSB to install Malwarebytes on someone's computer
Simplist solution is a small prompt asking if you want to allow a new keyboard plugged in.
You could make one that fit in place of the controller of a regular USB keyboard and worked as a regular keyboard, but also received commands via wifi or 2.4ghz + worked as keylogger
Would it help if you keep holding a key on your keyboard to prevent the key combinations
The add was placed so Randomly xD I was waiting for it but didnt expect it there :P It was like BOOM buy my shit
Man, looking how Seytonic's editing is now, seeing it this primitive is...charming, tbh.
So, I would like to buy one of your Malduino UBS sticks, but I got a question, does it work with Swiss keyboards or other keyboards to?
I mean the text I program on the Stick will it automatically type it in like own letters or will it when I would type Ä or something like that type "^" or something like that?
Thank you in advance!
lg
You are going to find your answer at the Maltronics website help page
Now i know why we arent allowed to plug in USB's into our work computer (I am a security guard at a datacentre).
Why did you stop making videos
Amin - We are allowed, but they think they're safe since they shut off downloads. Except we're working from home now, and have always had vpn access, so we can plug anything into our own computers (Oops!)
Security guard at a datacentre? Did you ever watch "Mr Robot"?
@@jfan4reva Maybe you are allowed, at my datacentre not.
@@jfan4reva no i didnt watch mr robot, but it seems like a cool show. might watch it in the future
I just realized that I instinctively made a bad usb by using an Arduino version that just plugs into USB and can be programmed to emulate keyboard input. I just wanted to make my life easier by autotyping logins in a too restricted environment.
It was a no-brainer.
What if it's plugged into a slow computer? Where Win+R takes like 5 seconds to open the run dialog? If it just acts as a keyboard it probably couldn't detect this delay and would type the command too early before the run dialog is opened, right?
I'm not sure but it seems like 7 would buffer the keystrokes where 10 doesn't.
If I made a BadUSB, I would make it open command prompt, and make it write a vbscript file that repeats a voice every hour and put it in startup folder.
It would be in a hidden folder, to make it as hard to delete as possible.
And while you’re here trying to find out how to do it, there’s a batch file eating up your storage space and making it even harder to delete.
pls don't
lol the guy at 2:50 saying “cd” activates my siri
With all the cool, yet terrifying stuff a BadUSB can do, it begs the question...can you use a BadUSB to run a TAS-like script that can play a PC game (for example, Trailmakers)?
Wouldn't be surprised. Only issue could be RNG manipulation and such things, I'd imagine.
I'm gonna make one of these that opens up a picture of a big yoshi when you plug it in... that's it. Maybe another that opens up a picture of kirby as Steve buscemi
Kirby with human feet.
MalDuino is the perfect italian name
mario's better
More on the mobile kali Linux would be dope!!
I watched about it on National Geographic, when they hacked a bank using them, and now this whole video explaining the thing, really thanks !
>BadUSB are undetectable
Not even close to true. You can set up some kind of password-authentication or "type this random word" test for when keyboards are plugged in, you can lock keyboards that type too fast, so on and so on.
good luck implementing that
@@jacktheninja
github.com/LandonPowell/DuckyKiller
¯\_(ツ)_/¯
1:55 ooh that smmoth into ad haha
I like that you arre promoting these products.
Cool
Thumbnail: Dangerous? Yes. Of course *Bad*USB is dangerous.
Yeah, do a nethunter vid
Bro there is a problem on windows 7 drivers download for a long time and I live in Russia and everyone has Russian on computers. To make a backdoor, for example, you need English, you can solve everything num, you can combine keys and write any characters (English) but in Arduino (and I through the seytonic website I convert the code for a duck thief to arduino) there is no support for num keys, but you can change the language on the victim’s computer, but the problem with windows 7 basically doesn’t load the driver what to do? //www.amazon.co.uk/Badusb-arduino-Leonardo-USB-ATMEGA32U4/dp/B01N1EK01K
"Typing thousands of characters per minute" There's your detection vector, right there! Just equip security software to check for inhumanly-fast typing.
wouldn't that make gaming marco's a false positive?
Better yet, checks by matching VID, PID, serial number and class. Only devices whose parameters all corresponded to a check on whitelisted devices (whitelisted by the user via sudo) would enumerate. Devices that decided to change class on the fly would have their access revoked, unless they were authorized to do so. More fail safe than checking for typing speed, as a malicious device can always emulate a real human typing.
I'm sure typing speed can be adjusted to normal speed like 100 wpm
Huh... what if you get these and sell them on online exchange websites (e.g. Ebay) pretending them to be normal USB sticks?
Better mail them from a fake address and get the money on a bank account with fake info, but theoretically, if you have the means to do that, it could be a quite dangerous attack. You never know if a defence contractor CEO's assistant is going to buy one and plug it into their laptop at work, opening their whole secure company network up to intrusion.
@@shuriken188 in that case email attack would be much more effective
@@sassyMcpussy I won't deny the efficacy of other types of attack, but when you do something entirely unusual, people are often unprepared. Companies and government organisations generally have strict rules about emails, and the general population is a little more wary of emails these days, but people might be less prepared for this kind of attack. Even if it's less effective, it at least poses a threat that should be recognised. Ignoring less effective threats leaves you open to unusual attacks.
How do you do the Rick roll thing where instantly pulls up a video from UA-cam and can you make it instantly play video that is downloaded on the USB.
is it possible to reprogram the USB ROM to act as a screen-grabber which feeds back over the web to a spy command centre? Would it be able to act like a virus, copying from USB stick to the laptop hub, then on to clean USB devices subsequently inserted? Would you like a USB stick from a laptop I have which I think has this infection?
Thanks for the Great videos. Learned a ton from your channel. Net hunter video plz
Does the antivirus software Panda provide any protection to this, re it scans every usb stick the second it is plugged in, or is this just too little too late ?
Im assuming that the malduino is using an atmega32u4 for the usb hid compatibility?
exactly, i am currently building one
What are the limitations of usb scripts? For example, I would need of a script to escalate privileges if I seek to do something more permanent wouldn't I?
Based on Sandboxescaper exploits I guess I would target task scheduler to create non privileged routine to email screenshots from the affected computer every now and then with the content of the clipboard hoping for something important I guess. I mean I do not think I would need admin privileges to pull that off but I am a n00b, what would I know.
Is the board design files of your malduino open source? If yes, where can I get that?
vbs files can send key strokes, windows will run vbs files without even so much as a warning prompt. mix that with a usb stick that has a autorun.ini on it and you got a budget badusb, but this depends on the os just blindly running autorun files which you see much less of nowadays.
Isn't it possible to hold down a key when you insert the usb to stop it auto-running? Or doesn't it see it as a usb storage device?
I made my own BadUSB they work really well
I like the idea of sending messages through my computer from my phone like a remote control.
Its like a universal remote
1:13 They have to be detectable. If they are just HID keyboard you will get a pop up when you plug in one saying that you just have new keyboard with driver installed and ready to go. This happens only when you plug it in first time so pay attention.
They could be detected if Windows didn't tried to enumerate every device that is attached. A check on VIP, PID, serial number and class against a trusted devices list would solve this.
Hello . New subscriber here . I want to learn to make the kind of hacks you make . Whenever i watch your video it really inspires me to learn electronics and computer science in depth . Your breadth of knowledge inspires me . Could you share how you learnt all the things you know ? Would be really helpful for me . Thank you for making such amazing videos 🙂
My animation teacher went to each and every computer to install the correct version of Blender, then again to create a desktop shortcut.
If i knew about this before I could have saved him a lot of time...
I thought the dudes were gonna introduce TAILS for a second there 🤣
wait, isn't a bad usb with wireless capabilities just a wireless keyboard?
huh, interesting thing, has there been any cases of any malware from a PSP/N3DS SD card being found? (I just wanna know because I am planning on getting a few PSPs)
2:00 my ears started ringing here
For the alt+f4 script you could have the ducky make or download a script that loops & start that as a second stage.
the easiest solution would be that you would have to press the turn off button once to confirm doing such things, I think this could potentially work.
Can u make nethunter tutorial
Is your phone rooted? If so you can install Kali nethunter but make sure to have a backup file because you can screw up your phonr
@@hellothere7510 just use magisk module it's safe
@@tiktokauut I am really retarded for not thinking that
Bad USB: |:| tries to kill computer |:| | Computer: Yea no m8 | Bad USB: I REALLY GOTTA EMPHASIZE NO ONE CARES IF YOUR ALIVE
Amazing vedio we were need it thank u so much
Great video! I just noticed that I have the same keyboard as you :D
You could make a company now. You’ve got great USB making skills!
The fear of every school computer
It's not just a keyboard though, there's more to them than that, hence why with the right flags and permissions you can deny any BadUSB from operating on your system, at least for Linux
it is its just no one types that fast so that can set off some red flags
1:49 Minecraft password and login 😮
Oh shit now we are getting deeper
@@slicepie410 thats what she said
Hey kids hear of network sniffers?
Um, how about a prompt to “Trust HID device” with a further description of what happened and have a trusted HID list where you can add devices to be permanently trusted. Then, anytime a HID device is connected outside of the trusted list it cuts power to it and waits for the user to approve or deny access.
Good content bro 💙
So, I can program it to automatically get me to the chrome download site on a new computer? I like that
an easy way to make your pc invulerable to badusb is, have your computer just be really really slow and laggy so when u type stuff nothing happens for seconds and some of what u type is ignored
the best kind of security through obscurity prove me wrong
Why would you post this while I should be at school?
Who needs school when there's youtube?
@@Seytonic So true.. + yt has stuff to learn which u can rly need in life :D
@@Seytonic Read what I wrote, While I SHOULD be at school. I need something to entertain me when you don't upload videos...
@@OliviaWenya like what? :D
Unfortunately I can make videos only so fast :(
How to brick a computer: install super f4, ctrl+alt+f4, repeat until you tell the OS to commit sudoku. Don't know if this is fixable with a reboot (since I don't have a computer to brick) but I figured this out after hitting it one too many times. Do with this info what you will
If the 8 minute video wouldn't have had literally 3 ads I would have maybe even checked one of those things out this time.
How can you code a Malduino elite with Arduino?
build a R2D2 and give it a bad usb manipulator arm X3