How to Catch A Hacker In Your Computer

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 576

  • @ThioJoe
    @ThioJoe  Рік тому +68

    Sponsored: Get 25% off Blinkist premium and enjoy 2 memberships for the price of 1! Start your 7-day free trial by clicking here: www.blinkist.com/thiojoe

  • @virtual2288
    @virtual2288 Рік тому +664

    The hacker watching me watch this video :

    • @MalieDon
      @MalieDon Рік тому +45

      That's me rn💀

    • @tcmine
      @tcmine Рік тому +10

      @@MalieDon 🤨

    • @virtual2288
      @virtual2288 Рік тому

      @testvideos4837 I mean the computer itself. I don't even have a webcam on my monitor... Who even has a webcam with their PC. And even so just put it in the wall and bring it out when you need.

    • @Redo-it
      @Redo-it Рік тому +13

      ​@TESTVIDEOS I have a web cam that pops up when I click it

    • @0AThijs
      @0AThijs Рік тому

      @testvideos4837 🤯

  • @szr8
    @szr8 Рік тому +267

    6:39 A way to effect group policy editing changes on a Home edition is to do it on a Pro/Enterprise/Server version then go to the registry and export the policy that was set, copy the exported .reg file to a Home version and then merge into its registry.

    • @QuorraPlays
      @QuorraPlays Рік тому +7

      Thank you for this. Will definitely try it out next time I need it.🤯

    • @Valorshine
      @Valorshine Рік тому +20

      You can "hack" home edition and add group policy to this version of windows

    • @vnc.t
      @vnc.t Рік тому +1

      @@Valorshine yes

    • @I.____.....__...__
      @I.____.....__...__ Рік тому +14

      @@Valorshine Indeed. It only takes two lines of code and doesn't require downloading anything, the files are already present, they just need to be installed. Almost like using the "Windows Features" dialog.

    • @nuchemweinstock9978
      @nuchemweinstock9978 Рік тому +15

      You can also enable auditing by running the following commands as administrator
      Auditpol /set /subcategory:"Detailed File Share" /success:enable
      Auditpol /set /subcategory:"File System" /success:enable
      Auditpol /set /subcategory:"Detailed File Share" /failure:enable
      Auditpol /set /subcategory:"File System" /failure:enable

  • @Amonimus
    @Amonimus Рік тому +155

    Another trap potential: an autohotkey macro. You let the script run while you AFK, and if any button is pressed except the one specified, another script runs.

    • @-El.Inexperto
      @-El.Inexperto Рік тому +4

      uh i like it!

    • @walksanator
      @walksanator Рік тому +22

      So basically a "temp lockout" where if any key except the disable key is pressed a action occurs

    • @Lofote
      @Lofote Рік тому +3

      I don't get this trick however... why not just using Windows password and lock the computer when leaving the computer via Win+L or something like that?

    • @Amonimus
      @Amonimus Рік тому +21

      @@Lofote This video is about when that level has breached (or not set up). Maybe you just forgot to log out, someone has guessed the password, or hacked into remote desktop.
      Naturally, people normally wouldn't let others get to their computers, but there are additional ways to make it completely unusable to anyone beside you.

    • @lastchance1036
      @lastchance1036 6 місяців тому

      Make it F13 😉

  • @timehunter9467
    @timehunter9467 Рік тому +299

    The folder trick made me laugh, one guy who annoys scammers had a folder called “nudes” the scammer took a look and it was naked mole rats 🤣

    • @trog871
      @trog871 Рік тому +48

      This implies that mole rats wear clothes...

    • @nubidubi23
      @nubidubi23 Рік тому +24

      Kitboga :))

    • @I.____.....__...__
      @I.____.....__...__ Рік тому +6

      I've seen a different scam-baiter have a similar folder full of photos of Indians. I think it was Lewis or one of the other ones that stopped baiting a long time ago. 🤔

    • @itsmanasK
      @itsmanasK Рік тому +4

      Oh yeah clicking photos of naked rats is absolutely immoral.

    • @Windows7-fz3ws
      @Windows7-fz3ws Рік тому

      bro u actually got scammed 💀

  • @ronelm2000
    @ronelm2000 Рік тому +24

    It would also be useful to set up a trigger for if anyone tries to change Group Policy, as smarter malware might mess with that before copying anything.

  • @wngimageanddesign9546
    @wngimageanddesign9546 Рік тому +37

    Simply don't leave your computer unlocked. Create a desktop shortcut to immediately lock the OS and use it. You can even create a script to not only lock the screen but to display a fake background of some kind of work/development taking place to throw off the nosy busy bodies.

    • @FusionDeveloper
      @FusionDeveloper Рік тому +12

      Hahaha, that reminds me of a prank I did on my friends computer (while he watched me do it, so it was just for laughs) where I took a screenshot of the desktop with all the icons and then used photo editing to mildly warp the screen/icons, then set that as the wallpaper.
      Unfortunately, I didn't know the computer was used by other people and another person called their tech support friend to troubleshoot the problem with the distorted icons.
      Of course the normal looking icons were on top of the distorted ones, but it still looked messed up.

    • @SKCro.
      @SKCro. Рік тому +1

      Even better, use WinKey+L to instantly lock your computer. If you get into a habit of using it every time you walk away (and have bitlocker enabled), you'd have yourself a pretty secure PC :P

    • @AltonV
      @AltonV Рік тому +7

      With dynamic lock in windows you can pair your phone with bluetooth and have the computer automatically lock when the phone gets disconnected

    • @Lofote
      @Lofote Рік тому +5

      Exactly. Btw there is no need for a lock desktop icon, just use Win+L on the keyboard :)...

    • @CesarPeron
      @CesarPeron Рік тому +2

      @@Lofote Better to set it to activate the screensaver automatically after some downtime, it is much more user-proof. At least in 2 minutes, the session will be blocked.

  • @Jdbye
    @Jdbye Рік тому +10

    I think every Group Policy setting can be changed directly in the registry if you know where, regardless of whether you have Home or Pro versions of Windows. So that might be worth looking into for anybody stuck with Home.

  • @nostressyjessie
    @nostressyjessie Рік тому +19

    I do have to say I'm so glad you got away from troll content, as much as I loved it back then too, to something so much more useful overall to everyone. Definitely seems like a good pay it forward!

  • @SKCro.
    @SKCro. Рік тому +36

    Here's an easy-to-make "silent alarm" type of trap: Make a shortcut to a batch script that looks like a folder, and make that batch script write a file somewhere or otherwise alert you, then open the folder as normal. I dunno how to make CMD run silently though.
    You could also pull a prank and make it do the shutdown command instead, preferably with a custom message :P

    • @wojtekpolska1013
      @wojtekpolska1013 Рік тому +6

      "I dunno how to make CMD run silently though."
      just add " @echo off " at the start of a .bat file

    • @IsaacGeorgeYT
      @IsaacGeorgeYT Рік тому

      That stops the command being entered being shown, im pretty sure @SKCro wants to hide the CMD window entirely.

    • @wojtekpolska1013
      @wojtekpolska1013 Рік тому +2

      @@IsaacGeorgeYT nope, it hides the cmd prompt aswel (if echo off is at the very top)

    • @IsaacGeorgeYT
      @IsaacGeorgeYT Рік тому +1

      @@wojtekpolska1013 not if there’s echo output though, right??? When I start my mc server I have echo off but I still get console output

    • @SKCro.
      @SKCro. Рік тому +1

      @@wojtekpolska1013 That just hides the output, it doesn't hide the command prompt window itself. I guess I could configure it to run minimized but 1) they might notice the taskbar icon flash, and 2) it might start the explorer window minimized as well.

  • @TheMAZZTer
    @TheMAZZTer Рік тому +13

    Windows will cache icons so the folder token probably stopped working for that reason. I imagine the idea is once it's triggered once you don't necessarily care if you miss subsequent triggers, so it's fine if the icon cache causes it not to retrigger.
    Keep in mind auditing is off by default as it tends to slow down file access. So this may not be the best solution depending on your hardware. That said if you set it up for only specific files you're probably ok. Also keep in mind as you said lots of applications have legitimate reasons to sneak a peak at arbitrary files, but this extends beyond the search indexer. For example AV scanners, Windows Explorer trying to generate a thumbnail, etc so audits may not be as useful as you might think.

  • @GaryBeltz
    @GaryBeltz Рік тому +8

    My message for the shutdown would be something like "Warning! the self destruct sequence has been activated. The computer will explode in (seconds)

  • @izeo997
    @izeo997 Рік тому +4

    Canary token can also be used for defenders and security professionals because they can use to lure attackers into revealing their presence or actions.
    great content!

  • @Pilkey-SEK
    @Pilkey-SEK Рік тому +263

    Hackers watching this: 💀
    Edit: Guys stop liking this my notifications explode..........
    (Btw yes, my comment has 10x more likes than the creators lol)

  • @alexj.f.kennedy6084
    @alexj.f.kennedy6084 Рік тому +12

    Now thats an actual reason to consider getting the Pro Versions of Windows

    • @DFPercush
      @DFPercush Рік тому +3

      pro gives you the nice management console gui, but you can still do all these things from cmd/powershell and registry if you have a good reference handy. Some people in the comments are saying it's possible to install those features even in home, might want to come back and browse the comments section again. I will say though, when I did buy Windows I always bought Pro, but after all the BS with 11 I'm just done.

    • @internetdoggo4839
      @internetdoggo4839 Рік тому

      Microsoft-Activation-Scripts. look it up

  • @anthonynorton666
    @anthonynorton666 Рік тому +1

    Thank you. This is definitely bookmarked in case I need to use it and follow the instructions closer. Really appreciate your time in making this.

  • @null7581
    @null7581 Рік тому +9

    So this could help solve a very niche problem where I want to log every time a computer opens edits or changes ANY file and save the result to a .CSV file
    (yes I'm aware this would create billions of entries) I've been trying to narrow down what a malware is doing - and logging everything it touches is very valuable.

  • @Dezo365
    @Dezo365 Рік тому +3

    Saw this tech on a another tech UA-camr channel. Still gonna watch it anyways !

  • @ArchonLicht
    @ArchonLicht Рік тому +5

    If a hacker gets access to your machine and lists files not via RDP session with GUI but via some API calls or command line - the "token" won't be triggered, because there will be no showing of the icon. So it's rather unlikely this "token" will help you to know when you've been hacked - let alone CATCH the hacker.

  • @stultuses
    @stultuses Рік тому +17

    Your channel got a shout out by Linus Tech Tips
    Well done and well deserved because of your excellent content

  • @AvaWavaGD
    @AvaWavaGD Рік тому +6

    That is really useful. I was wondering if something could be similarly made for USB Drives, where it can log whoever accesses the drive, whether on the network or outside. Maybe even stopping access entirely?

  • @eliotcougar
    @eliotcougar Рік тому +9

    Here's an idea for unattended machines... Upon trigger, using powershell, add firewall rule that blocks all incoming/outgoing traffic, wait X minutes, then disable the rule...

    • @Lofote
      @Lofote Рік тому

      Or just disable the network card via PowerShell :)... No need for firewall rules.

    • @eliotcougar
      @eliotcougar Рік тому

      @@Lofote If you do that, you may lose all the custom non-persistent routes you may have added using route add commands on that network interface...

  • @joeshmoe000
    @joeshmoe000 Рік тому +13

    I think there's got to be a way to just make an EXE, VBS or whatever just be associated with a different file extension and icon. So it could appear as a folder, but it's actually code that runs and you could make it do whatever you want. This is actually a sketch thing though cause malware could potentially use the same idea.

    • @gabrielloredodematosfelix7807
      @gabrielloredodematosfelix7807 Рік тому +3

      That only works with people that have the setting disabled, and if the person is acessing your computer, probably they know if they have extensions enabled, and they will probably check if it's actually a folder(and if they see it in explorer, it will appear as X.exe)

    • @joeshmoe000
      @joeshmoe000 Рік тому +5

      @@gabrielloredodematosfelix7807 Maybe, but I'm wondering what would happen if you went in the registry and made a new file type, copy the folder file type data into it, and copy only the action part from the EXE file type. Now because folders never have a file extension, it would get hidden regardless of that setting, but it would run with the action of an EXE. It might not work, but I might try it sometime. I just don't want to completely mess up my system.

    • @Biggerman159
      @Biggerman159 Рік тому +1

      ​@@joeshmoe000 siiiiiiiiiick

  • @chromerims
    @chromerims Рік тому

    Thank you. Very clever traps and alerts using Windows files and folders.

  • @Xilent1
    @Xilent1 Рік тому +3

    @ThioJoe
    I'm still going to like the video cause I do. I'm just upset that you just NOW made this video. This should've been your 1st video. Great information

  • @realjameskii
    @realjameskii Рік тому +1

    The enable auditing one allowed me to make failed logins make a loud noise play, thanks

  • @poppies1215
    @poppies1215 Рік тому +12

    Hello Joe. Thank you for all the great tips!

  • @Alberos
    @Alberos Рік тому

    I will use it to fix..... this --> "What do you mean a file is in used? I closed everything. I said safely remove hardware! Again WHICH FILE IS IN USED!??".
    (I know, Windows said you "don't need" to do it but it still give me peace of mind when I saw my spinning disk external HDD's light goes off before I unplug it.)

  • @komieeecat
    @komieeecat Рік тому +3

    I don't know if you have a trojan virus and you want to remove it then the trigger activates, right? I think this will be a problem, because it will trigger it always when you turn up the pc (especially for shutdown task)

    • @DFPercush
      @DFPercush Рік тому +1

      That's when you boot into safe mode, or in extreme cases mount the partition offline and use dism or a live linux cd.
      But it only triggers if the trojan tries to access that same file again. It might, or it could take a while. Removing the trojan file wouldn't by itself trigger it, and anyway it's best to remove things when they aren't running.

  • @paulfrayne6519
    @paulfrayne6519 Рік тому +2

    This will be interesting to experiment with

  • @test-rj2vl
    @test-rj2vl Рік тому

    You don't need group policy. If you know programming you can simply subscribe to file events and then you can get your custom code called every time something happens. Kinda like Process Monitor by Sysinternals but write it yourself.

  • @pouet4608
    @pouet4608 Рік тому +7

    So you just monitor an action on a file. Anyway, the idea is interesting . Thank you for this video

  • @Lofote
    @Lofote Рік тому +3

    Hey there... I don't understand, why you use the Group Poilicy Editor. Just edit the security of the file or folder itself, unter Advanced there is "Auditing". No need for any group policy. Group policies are there to deploy things over a complete domain, i.e. all computers in a company.
    Also this all should work with Windows Vista and after, because while Windows NT had auditing since 3.1 in 1993, the scheduled task being triggered by an event was added in Windows Vista.

  • @XDSDDLord
    @XDSDDLord Рік тому +2

    Good ideas, thanks for this info.

  • @rytek4274
    @rytek4274 Рік тому +3

    Theo dropping the heat 🔥

  • @erikhicks07
    @erikhicks07 Рік тому +18

    Most competent intruders are going to be using Powershell/SSH and not moving your mouse or using the Explorer GUI

    • @gblargg
      @gblargg Рік тому +7

      The second approach should detect this.

    • @CigsInABlanket
      @CigsInABlanket Рік тому +3

      Still works.

    • @internetdoggo4839
      @internetdoggo4839 Рік тому +6

      This is defense-in-depth. Of course there's a way around it, but that doesn't mean it isn't worth implementing

    • @CigsInABlanket
      @CigsInABlanket Рік тому

      @@internetdoggo4839 Use the URL token, and have powershell request the url in the task scheduler.
      If you give a folder the same auditing perms as you would the txt file in the video, it will trigger as soon as someone tries to list the directory for the folder within powershell. Once you lock the task scheduler, the only way around it, far as I'm aware, is if they don't go into that folder.

    • @lower_level_gee-mah-tree-ah_TV
      @lower_level_gee-mah-tree-ah_TV Рік тому +3

      So is it normal to have a ssh shell open port on a tp link router from wal mart,? Port 22 and 80 is open , and a random device keeps popping up on the fing app that says iphone 5, and iphone 7 same device , how can there even be iphone 5 and ,,7 same dam time , but nobody on the network has a iphone and for the life of me, can someone please go indepth with the iocs of this parent monitoring spyware Bs, my location seems like there is some kinda beacon some where that keeps sniffing every new device I get and side loads 300 something apks of B's that just spanks all my permissions to hell and back , samsung had 500 apps , and android forums flat out lie, why can't normies actually get any help with this bs,

  • @SilvaLord321
    @SilvaLord321 Рік тому +2

    Your method is so smart! Out of curiosity, is there any real reason to shutdown the computer as opposed to just disabling the network adapters? Especially if you're likely to restore a backup anyway? Seems like false positives would be less annoying if all you have to do is reenable your network when you ascertain why it happened through event viewer.

    • @trueriver1950
      @trueriver1950 Рік тому +2

      Shutdown stops the malware doing any more local bad things it has on its to do list.
      However, with fast start, you might restart the malware on start. Ideally you want a full shutdown without any of the fast start stuff...

  • @kshitijlahoti8725
    @kshitijlahoti8725 Рік тому +2

    Can you make a method which doesn't require group policy editor though for people without pro editions. This is some very cool stuff which I would love to have on my laptop

  • @sonicdemon8692
    @sonicdemon8692 Рік тому +2

    If you just do the shutdown -s -t 4 -c "blah blah blah" it might take awhile for the computer to shutdown as it doesn't force close all the programs. My way to turn off the computer is to include the -f argument as it forces everything to close with no notice, so the command would look like : shutdown -s -f -t 4 -c "blah blah blah". Which will force all open programs to shutdown and speeds up the process allowing even less time for a hacker to do anything.

    • @KeinNiemand
      @KeinNiemand Рік тому

      Also just use -t 0 zo just instantly shut down

  • @Bosbesplayssss
    @Bosbesplayssss 4 місяці тому +1

    Thio single-handely keeping the old ones out there save from hackers 🤔

  • @rsearchtim
    @rsearchtim Рік тому

    Thanks for the video on auditing file access.

  • @blanktheunknown2735
    @blanktheunknown2735 Рік тому +1

    I have set this up to trigger a batch file that creates a log file with a snapshot of the active network connections with PID and a snapshot of active process.

  • @SirPigari
    @SirPigari 6 місяців тому +1

    I glad you have a VPN in Czech Republic

  • @gavincstewart
    @gavincstewart Рік тому +1

    excellent video! this is all great information to have and I would love to learn more about what I can do with task scheduler!

  • @MrMarbles
    @MrMarbles Рік тому +1

    thiojoe against the malware

  • @kim-hendrikmerk4163
    @kim-hendrikmerk4163 Рік тому +2

    On Linux you can take it as far as creating a custom service that encrypts your entire hdd with a public key if a file is accessed or some other conditions are met

  • @chiroyce
    @chiroyce Рік тому +15

    Would the first one work if it was a remote shell that copied the files over? I don't think that would be the same as double clicking the folder to open it but I could be wrong.
    edit: Saw the rest of the video, and yeah I guess most hackers would be using linux/a shell to gain access

    • @SuperMegaToto
      @SuperMegaToto Рік тому +2

      Yes! I was gonna say this!
      If you have a reverse shell that just runs CMD or PowerShell commands this wont work.
      So dumb. This technique will only catch people sneaking onto your PC

    • @FusionDeveloper
      @FusionDeveloper Рік тому

      An India based tech support scam "hacker" is likely using Windows.
      Although I just call them a "scammer", which is a completely shameful title with no redeeming qualities.

    • @CigsInABlanket
      @CigsInABlanket Рік тому

      @@SuperMegaToto This triggers whenever the file is access/modified, regardless of how it was. Go ahead, test it for yourself. Open/copy the file using powershell, and it will still trigger.

    • @chiroyce
      @chiroyce Рік тому

      ​@@FusionDeveloper But they're using remote desktop software, and that may not trigger the .ini file.

    • @chiroyce
      @chiroyce Рік тому

      @@CigsInABlanket They're talking about the first one which uses the desktop.ini file as a trigger, not the other methods ThioJoe mentioned.

  • @Draggie306
    @Draggie306 Рік тому +4

    Cool! Does this work if someone runs a command like tree, or indexes a list of file names on the computer using a Python script, for example? Or does it just trigger when the file is directly read?

  • @lahanlon
    @lahanlon Рік тому +1

    I would add a -f to the shutdown command in case something has been launched that interrupts normal shutdown.

  • @badpiggs
    @badpiggs Рік тому

    3:16 if you pause and use the < > keys right to the right of the space bar and next to the ? key you can see the token lol

  • @Chas_Reno
    @Chas_Reno Рік тому +1

    Very good .. how about you doing a blank desktop file without a name .... to hide these great tools, trick and more.

  • @LazyGigolo
    @LazyGigolo Рік тому +14

    How do I know 100 % sure, that my PC is malware and virus free ? Thanks

    • @ThioJoe
      @ThioJoe  Рік тому +12

      I suppose there is no way to be 100% certain unless you do a format and clean install

    • @RADIS370
      @RADIS370 Рік тому

      @@ThioJoe Not true.

    • @jmtradbr
      @jmtradbr Рік тому +3

      I'm on your system32 👁️👁️

    • @LazyGigolo
      @LazyGigolo Рік тому +2

      @@ThioJoe OK, then 95 %....

    • @DFPercush
      @DFPercush Рік тому

      Get any decent virus scanner, reboot into safe mode and run it. Even better, if you can boot from another partition or live cd/usb, run it from there. Just be sure to update the definitions. Offline scans like that prevent the malware from intercepting the file read operations and are the best way to detect root kits. Many years ago, McAffee had a boot CD called Stinger that you could boot from and scan your pc offline, I don't know if they still do that. Problem is it also detected pirated copies of Windows so we students had to figure out a way to spoof the results. XD

  • @prowler1567
    @prowler1567 Рік тому

    Thanks for the in depth info. Will refer back for reference. 👍

  • @desleycasey7412
    @desleycasey7412 Рік тому

    Many thanks for this video. Highly informative. Actually there is a way to add group policy editor to Windows 10 & 11 Home Editions which I came across and it works like a treat. As I have Windows 11 Home, by installing group policy editor as a batch file, I was able to undertake all the steps you outlined in this video. Thanks again. I feel more secure knowing that if a hack took place, I have a good chance to stop the hacker in their tracks.

  • @internetdoggo4839
    @internetdoggo4839 Рік тому

    Great video! I'll actually setup this honeypot, it seems very handy

  • @iivari6205
    @iivari6205 Рік тому +26

    Interesting features I wasn't aware of. However I don't think this is too useful in catching hackers. I find it way too unlikely a hacker would open your trap file, and even if they did, they'd already caused you a lot of other damage by then. When you start your computer again, the hacker would continue where they left off, this time being cautious about your trap file. However it's likely you or the system will fall to your trap yourself, causing you even more damage, trouble, and loss of work. So I just don't find it worth it. Nice idea though.

    • @EQ_EnchantX
      @EQ_EnchantX Рік тому +20

      Naming the folder something important like Crypto Wallet might cause a crypto wallet stealing virus to trigger the trap which could disable the internet and shutdown the computer and than warn you of such allowing you to fix it.
      Also if a hacker had remote access to your computer, they would most likely scan the hard drive to see what was on it, thus triggering the trap and disabling the network adapter causing them to be disconnected hopefully before they cause irreversible damage.

    • @thepolishtech1552
      @thepolishtech1552 Рік тому

      @@EQ_EnchantXespecialy if you put it on the root directory of C: for it to act the fastest

  • @dontkilImejay
    @dontkilImejay Рік тому +5

    I wound up in a shutdown loop, I had excluded the directory from indexing and from antivirus, but my PC was still shutting down within 5 seconds of booting, luckily gave me enough time to shift restart into safe mode to strip the task from scheduler and regedit. Wonder what was trying to access it...

    • @Lofote
      @Lofote Рік тому +2

      Maybe backup program? Or Dropbox, OneDrive or anything mirroring it to the cloud?

    • @thatpolishletter
      @thatpolishletter Рік тому

      i cant access task scheduler

    • @dontkilImejay
      @dontkilImejay Рік тому

      @@thatpolishletter you have to delete the task item from the sys32 directory it is in and also remove the regkey in safe mode

  • @Villager701
    @Villager701 Рік тому +1

    wow great video keep up the awesome work👍

  • @thatlooksdou
    @thatlooksdou 9 місяців тому

    Thanks for this information!

  • @R3_dacted0
    @R3_dacted0 Рік тому +11

    The scenario that immediately popped into my mind is accidentally triggering a shutdown loop.
    Say for instance that you didn't realize that a particular file is accessed on startup and that file triggers shutdown. Now just by booting up, you trigger the shutdown sequence.
    Could you fix that if it happened? Would booting into safe mode work?

    • @thatpolishletter
      @thatpolishletter Рік тому +3

      i got that problem

    • @itsmanasK
      @itsmanasK Рік тому

      @@thatpolishletter So how did you fix it?

    • @itsmanasK
      @itsmanasK Рік тому

      Thanks bruh..I was about to set this up but after reading your comment I've changed my mind

    • @thatpolishletter
      @thatpolishletter Рік тому

      @@itsmanasK safe mode

    • @itsmanasK
      @itsmanasK Рік тому

      @@thatpolishletter Genius 🧠

  • @omegahaxors9-11
    @omegahaxors9-11 Рік тому

    A similar technique used to be used in emails by both malicious actors and advertisers to effectively get read receipts on their emails.
    Ever wonder why image loading is disabled by default? Because by loading that image you're sending a signal to their servers.

  • @JuhaBaxton
    @JuhaBaxton Рік тому

    Nice - big shout out! THX!

  • @wildmanjeff42
    @wildmanjeff42 Рік тому

    Pretty cool ! Thanks for the video !

  • @walkingradiance9556
    @walkingradiance9556 Рік тому

    The video on group policy editor is helpful if the method requires the group policy editor.

  • @FBAMAP
    @FBAMAP Рік тому

    What if they are using a RAT software and they are not clicking on the folder to get access to what's inside the folder?

  • @_lun4r_
    @_lun4r_ Рік тому +14

    6:42 You do know that there actually is a way to get the group policy editor on Windows 10/11 Home, you just have to run specific commands to enable it as the file necessary is still on the system

    • @_lun4r_
      @_lun4r_ Рік тому

      did i see a scammer replying here
      UA-cam 1984 too

    • @I.____.....__...__
      @I.____.....__...__ Рік тому

      It's not technically "enabling" it, it's "installing" it from files already on the system, pretty much just like using the "Windows features" dialog.

    • @Lofote
      @Lofote Рік тому

      But Group Policy Editor isn't even needed here, you can directly set the Auditing from Windows Explorer under Security, Advanced :)...

  • @zanperat8663
    @zanperat8663 Рік тому

    Don't try it with folders!! I don't know why but for some reason it executed the code everytime my computer restarted. It was a problem since i had it to shutdown, so i couldn't access computer and needed to use my bootable linux to fix it. It wasn't hard to fix i just needed to delete the files. Then i made it with a txt and it worked like a charm. I also did that it text you an SMS message every time you open the file(i did it with nexmo, but there ar others posible candidates). Great video just don't do it with folders or at least don't do it with shutdown task.

  • @colbyhartman9467
    @colbyhartman9467 Рік тому +1

    That's good you could be in a middle of something and next thing you know your PC shuts down... That would be lovely

    • @colbyhartman9467
      @colbyhartman9467 Рік тому +1

      But I do like the idea but idk on the other side of it to

  • @GHXST6-9
    @GHXST6-9 Рік тому +3

    Damn helpful.

  • @bucketcom
    @bucketcom Рік тому

    My PC automatically turns off wifi when it goes to sleep, so hackers can only access my pc when it's awake and I'm on lmao

  • @theaceofcreativity0460
    @theaceofcreativity0460 Рік тому +1

    Hey Joe! I have gotten a ton of adds for apps that pay you for paying games, can you go over those?

  • @useless8695
    @useless8695 Рік тому

    3:36
    thio: clicks twice to open once
    Canary: *Triggered 3 times*

    • @ThioJoe
      @ThioJoe  Рік тому

      Top 10 Questions Science Still Can’t Answer

  • @androidlogin3065
    @androidlogin3065 Рік тому

    Policy editor way and task schedule working is based on that Windows be running, booting with external OS will bypass that.

  • @meboncent9868
    @meboncent9868 Рік тому +1

    Which Screen Recorder do you use my fellow Content Creator Your Video are Damn! Crips when you Pan Or Zoom them

  • @ChickenGamingFlamingoLegs
    @ChickenGamingFlamingoLegs Рік тому +1

    Now Imma put a text file in the folder saying the hacker’s IP 💀💀💀💀💀

  • @sycco42
    @sycco42 Рік тому +2

    the censoring of the url isnt well made, if you really wanna hide it (around 3 min)

  • @Rachinter
    @Rachinter 9 місяців тому

    Thank god i finally watched this video.

  • @lyger_playz
    @lyger_playz Рік тому +1

    My Task isn't triggering! It shows up on Event Viewer, and it's logging everything well, but cmd doesn't open up when I access the file. I've followed the tutorial 4 times now, restart from scratch every time, and the event viewer logging works, but the Task Scheduler isn't really working well. The History tab is empty in the task scheduler too.

    • @ThioJoe
      @ThioJoe  Рік тому +1

      A couple things I can think of. Have you selected the option to "run whether user is logged in or not?" Because if that is selected, for some reason the Command Prompt window will not show even if the "echo" command is run. It will only run in the background. If you're just testing things out and want it to display the window to know when it's triggered, change it to "Run only when user is logged on".
      As for the history tab, you have to actually enable the tracking of history, so perhaps that isn't enabled. To enable event history tracking, at the top bar of the Task Scheduler window, click "Actions" and look for "Enable All History Tasks" and click that. Now it should show event history. Be aware though, this seems to cause lag on the computer when it is triggered, so probably only enable it for testing. Hope that helps, let me know if that solves it.

  • @random_person618
    @random_person618 Рік тому +2

    I'm pretty sure your method works on previous versions of Windows as well, for example, Windows 8 Pro and not just Windows 10 or higher.

    • @Lofote
      @Lofote Рік тому +1

      Windows Vista or higher has those scheduled tasks depending on events.

  • @Voideddd
    @Voideddd Рік тому +2

    lol i love that thumbnail

  • @lIIlllIIllIII
    @lIIlllIIllIII Рік тому +2

    I do have a question. I noticed that my file will get triggered whenever a a gpu driver installs, a windows install or anything like that happens. Its a little sketchy to think that they are interacting with a txt file I have on my documents folder. Anyone have any clarifications or similar experiences???

  • @rob-toolsandtech2521
    @rob-toolsandtech2521 Рік тому +6

    Great video. You got my wheels turning. I could see a ton of additions and variations. Maybe have the file they directly access be a batch file with the icon changed. You could have that batch file trigger all kinds of things. You could trigger external things through services like IFTTT. Turn on security cameras, lock a closet door that might have valuables that might be stolen. Seems like the sky is the limit here. The file could be “sensitive financial information.docs.bat” and hide the file extension so all they see is “sensitive financial information.docs” and change the icon to match. The bat file could open other files for all kinds of purposes.

    • @nodrance
      @nodrance Рік тому +1

      You can run a batch file using the Windows event viewer method, or if you have an external server you can use a webhook and do whatever you like that way

  • @MikeTrieu
    @MikeTrieu Рік тому +13

    Eh, I dunno if I trust a third party website to automatically run an untrusted DLL for that canary thing. That seems like a recipe for disaster. Even if you currently trust that company, what if they sold off to a shadier one that doesn't respect its users? They could run cryptomining software on your box or worse.

    • @erikhicks07
      @erikhicks07 Рік тому +3

      Good point. Not only that but they're effectively tracking your usage/location. Which is probably why they're offering it as a 'free' service.

    • @DFPercush
      @DFPercush Рік тому +1

      I don't think it actually executes any code from the dll, the dll is just a resource container for the icon. Although it does seem a little suspicious that they wouldn't just use an .ico file.

    • @Anonymouzee
      @Anonymouzee Рік тому

      intrusive strategy... they can refactor the .dll anytime... :-)
      if it was "baloon.dll" i'd be suspicious... ;-))

    • @erikhicks07
      @erikhicks07 Рік тому +1

      @@DFPercush A malformed DLL might buffer overflow or exploit some other vulnerability.

  • @Damqq
    @Damqq Рік тому +3

    Interesting thing that you're not using -f flag for the shutdown command...

  • @JohnS-er7jh
    @JohnS-er7jh 11 місяців тому

    what about intrusion detection software, like Tripwire? Also anti virus that detects keyloggers or screen/video capture viruses?

  • @hacktheegg
    @hacktheegg Рік тому +1

    now, is your version portable?

  • @wolphin732
    @wolphin732 Рік тому

    12:00... the shutdown, you probably want to also use -f to force it to shutdown, and ignore anything which is trying to have the shutdown wait for them...

  • @androidlogin3065
    @androidlogin3065 Рік тому

    I am so sorry to say this, but any good sniffer attacant person the first thing that does when localy attacking a computer is to cut all it's remote access, then check if there is any live encryption so in case it is not, reboot with external OS to limit any traces, etc. and gain low lovel access to storage.
    Most of times it tooks less time to 1to1 copy the storage (with no so much special external cloning hardware) than to investivate and look for in place.
    If the attacker gains physical access to your running OS you are dead (in terms of security), no matter what you have, they simply can plug into motherboard wires an inyector/reader and make a full unencrypted read be copied to external media.
    That is why software full encripted drives put a barrier, but the attacker can also put a ram dumper and you are still dead.
    That is why i ever said, if you go away, just turn off the computer and have all your disks 100% software encripted (encription that runs inside the processor, not on the drive itself) and better if it is multi-layer with different encryption algoritms.
    And never have external access on the computer you use your data, for internet use a second PC and a USB thumb, etc.
    Paranoid way of view is the safe way and also it is not 100% safe.

  • @christinaedwards5084
    @christinaedwards5084 Рік тому

    If a hacker got into my pc, he’d be greeted by 20year old games. 😂

  • @aramondehasashi3324
    @aramondehasashi3324 Рік тому +1

    Oh man that thumbnail made me laugh so hard.

  • @theuriah01
    @theuriah01 Рік тому

    Can you please please PLEASE.... do an updated video on the best type of television money can buy you? I know you did one six years ago on OLED and QLED. PLEASE help us... 🙏🏾

  • @JacobP81
    @JacobP81 Рік тому

    6:44 There is a method to install Group Policy Editor on Windows Home

  • @Andrea_Bassi
    @Andrea_Bassi Рік тому

    Enabling audit on file system doesn't use resources slowing down the PC?

  • @Kelly--
    @Kelly-- Рік тому

    7:08 i've seen hackers like that before. they usually show up in groups, on chilly nights.

  • @gunslingerspartan
    @gunslingerspartan Рік тому

    the /force flag for gpupdate doesn't really do anything here, since all it will do is force all existing policies to also be re-applied, but gpupdate on it's own would apply the new policy you just made, all you are doing is increasing the processing load on your pc if you have other configurations enabled

  • @junaidahmadj
    @junaidahmadj Рік тому

    Thats a good idea 💡 thanks 😀

  • @Wol747
    @Wol747 Рік тому

    You download the program to set this up? How safe is that?

  • @Lampe2020
    @Lampe2020 Рік тому +1

    Can you please do a similar video for Linux?

  • @radim776
    @radim776 Рік тому +1

    3:48 you are from czechia?

  • @NoNamicekk
    @NoNamicekk Рік тому +5

    3:40 so are you American or Czech? 🤔