Cybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive Information

Поділитися
Вставка
  • Опубліковано 20 лис 2019
  • Cybersecurity expert Kevin Mitnick demonstrates how today’s “crackers”, “gearheads” and “cyberpunks” illegally access sensitive information from everyday people using modified gear and social engineering.
    Dr. Phil tells compelling stories about real people. The Dr. Phil Show is an American daytime talk show and TV series with host and personality Dr. Phil McGraw, who offers advice from his experience as a psychologist. The show provides the most comprehensive forum on mental health issues in the history of television. For over a decade, Dr. McGraw has used the show's platform to make psychology accessible to the general public by addressing important personal and social issues. Here on the Dr. Phil UA-cam channel, you will find the best moments, highlights, and segments from the TV show. We upload new videos every day, so make sure you subscribe and ring the bell for all notifications, so you don't miss a single one.
    Full episodes of the Dr. Phil Show premiere every weekday on CBS, with a new season premiering every fall in 2020, 2021, 2022, and 2023. Each full episode contains an interview or multiple interviews with doctors, teens, families, parents, kids, and more. The executive producers are Phil McGraw and showrunner Oprah Winfrey of OWN. Dr. Phil is the top-rated daytime talk show attracting millions of viewers every day alongside other talk shows, including The Ellen Show with Ellen DeGeneres, The Dr. Oz Show, The Kelly Clarkson Show, and The Steve Wilkos Show. Dr. Phil makes regular appearances on The Tonight Show Starring Jimmy Fallon, Jimmy Kimmel Live, and The Late Late Show with James Corden. Dr. Phil has also done crossovers with 90 Day Fiancé and Inside Edition.
    Do you want to be on the show? bit.ly/BeOnDrPhilShow
    www.drphil.com
    Facebook: / drphilshow
    Twitter: / drphil
    Instagram: / drphil
    TikTok: / drphil
    #DrPhil #PhilMcGraw #DrPhilShow
  • Розваги

КОМЕНТАРІ • 2,2 тис.

  • @angelagrayson222
    @angelagrayson222 4 роки тому +7503

    Oh lord, I hope my grandma doesn't watch this episode. She already is so paranoid about computers that she truly believes & is terrified she might accidentally hack into the pentagon by clicking on the wrong button while shes playing on her puzzle game. (The singular thing she uses her computer for is her puzzle game.)

    • @Colby00
      @Colby00 4 роки тому +72

      Lol

    • @johncloois3301
      @johncloois3301 4 роки тому +12

      @Megan Ziggler 🦃? 😜

    • @Sergio-fu7mv
      @Sergio-fu7mv 4 роки тому +273

      LOL. 😂
      Watch the one day she loses her fear, and uses it, you get to her house and she’s controlling Air Force One from a computer running windows 98’ with the secret service, and military surrounding her house. 😂😂

    • @johncloois3301
      @johncloois3301 4 роки тому +8

      @Megan Ziggler Thanks for indulging my dry, hammy humor. I'm just a turkey.

    • @johncloois3301
      @johncloois3301 4 роки тому +1

      @Megan Ziggler Why thank ya! Now I'm blushing and Kool-Aid Man grinning. I've been called some other food slang names that aren't so nice. 😋 So where ya from? If you want to say. I'm in Tampa, FL. Hope your TG was full of good food and fun!

  • @mikeock3164
    @mikeock3164 4 роки тому +10016

    dr phil is my favorite boomer

  • @Jackson_Zheng
    @Jackson_Zheng 8 місяців тому +90

    This guy was the reason I got into hacking. RIP Kevin. You'll be remembered by all in the community.

  • @oddstap6976
    @oddstap6976 4 роки тому +3209

    For all who don't know this is Kevin mitnick a famous hacker who was so good when he was being watched by the FBI he hacked them and had all personnel files on everyone working on his case and even knew which friends were informants.

    • @Dimmizer
      @Dimmizer 4 роки тому +38

      🤔🤔

    • @oddstap6976
      @oddstap6976 4 роки тому +296

      @@Dimmizer if your sceptical, feel free to verify this online.

    • @Pumpkinss
      @Pumpkinss 4 роки тому +493

      Now if that ain’t the biggest flex I don’t know what is

    • @imdanielmartinez
      @imdanielmartinez 4 роки тому +42

      Actually you can still see all the sessions online and/or on youtube of kevin mitnick's telnet during shimomura's packet sniffing. this was done in order to have clear evidence against kevin leading to his arrest.

    • @oddstap6976
      @oddstap6976 4 роки тому +9

      @@imdanielmartinez that's awesome I didn't know that

  • @marialyruiz749
    @marialyruiz749 4 роки тому +6361

    plot twist: he’s the hacker

    •  4 роки тому +35

      Kevin is the emperor of the Hackistan Empire.

    • @thetea237
      @thetea237 4 роки тому +5

      😂

    • @tellurye
      @tellurye 4 роки тому +276

      Actually he was - one of the best. Got MAJOR prison time, and is now a consultant. But he was one of the first.

    • @KainDracula
      @KainDracula 4 роки тому +11

      tellurye oh! I think they’re talking about Dr. Phil. not trying to be rude!! Just think you missed the joke, good day sir :)

    • @KainDracula
      @KainDracula 4 роки тому +4

      Marialy Ruiz that was for the guy I tagged...

  • @EbrahimKa
    @EbrahimKa 4 роки тому +615

    0:25 shes staring into my soul. Jesus

  • @onee
    @onee 4 роки тому +1347

    How to make parents who barely understand computers paranoid about computers, the Dr. Phil edition.

    • @ghostieeitsohg
      @ghostieeitsohg 3 роки тому +2

      Fr

    • @xeros4000
      @xeros4000 3 роки тому +10

      wish everybody was actually paranoid about computer safety. you are never gonna educate the older generations about security, but if they were actually paranoid about it would make them harder to target.

    • @vizender
      @vizender 3 роки тому +27

      @@xeros4000 no, because by making them paranoid, you are also making them more likely to call scam call centers when they see a « your computer has a virus installed » "advertisement"

    • @htg97
      @htg97 3 роки тому +1

      true. antivirus and vpn developers own them

    • @randyjuan7364
      @randyjuan7364 3 роки тому

      I found this video useful but I will forever appreciate *vesterfix* on ig for keeping his promise on my acc and getting my job done

  • @derpythecate6842
    @derpythecate6842 3 роки тому +871

    For the curious, this is relatively easy to do vs other forms of hacking. It's simply a microcontroller with human interface device (HID capabilities), hidden in the USB cable. As most hardware plugged into computers are not verified for their identity, you can masquerade as a normal keyboard.
    To sum it up, it opens the run window using Ctrl + R and then proceeds to execute one super long powershell command.
    Powershell commands can do everything on windows, such as downloading malware to steal your account hashes, stealing your wifi passwords (Windows very kindly gives you cleartext wifi passwords) and even your browser history in a matter of seconds. It also leaves little traces as it can download full exe files and execute them all in memory, leaving no clues on the disk, and the only clues are in the Windows logs or a full memory analysis.

    • @SanteriHietanen
      @SanteriHietanen 2 роки тому +21

      It’s also relatively easy to block. Even Defender can block it.

    • @rkvkydqf
      @rkvkydqf 2 роки тому +53

      @@SanteriHietanen Block what? A RubbyDuck or the downloaded malware?
      It's practically impossible to block a RubbyDuck without either using an overly complex or the way too simple solution. You can make it detect when the typing is too fast, but all an attacker needs to do is just make it slower. You can try identifying a person using keystroke dynamics and AI, but you can't do that very reliably.
      *The only defence left is pure common sense of not plugging in random phones, drives, cables, etc.*

    • @SanteriHietanen
      @SanteriHietanen 2 роки тому +64

      @@rkvkydqf Are you serious? It's not impossible to block. I don't know where you get that you wouldn't be able to block it. Easiest way is to literally have windows require admin password for it so that every UAC needs admin password. Second easiest way to block it is for example to limit access to powershell, the cmd prompt, and run command (as these are the most common ways a rubber ducky executes malicious code) You could block it only for USB. Whitelisting USB's works also. Even then if the script starts running antivirus will block the malware it's trying to insert.

    • @Wunderkind777
      @Wunderkind777 2 роки тому +23

      ​@@SanteriHietanen Yeah sure, Defender is blocking a HID device ahahahaha. weirdo

    • @SanteriHietanen
      @SanteriHietanen 2 роки тому +28

      @@Wunderkind777 Can you read? I explained it already. Defender doesn't block HID but it definitely blocks the malware it's trying to insert.

  • @calamarbronx83
    @calamarbronx83 4 роки тому +3407

    This is not the way most victims lose their info. It's call centers.

    • @red_wave7634
      @red_wave7634 4 роки тому +46

      Ok boomer

    • @MarcusAurelius12
      @MarcusAurelius12 4 роки тому +274

      @@red_wave7634 your moms a boomer

    • @porschepal7932
      @porschepal7932 4 роки тому +185

      No it's databases that get leaked due to vulnerabilities.

    • @calamarbronx83
      @calamarbronx83 4 роки тому +4

      @Phuk In-Yomam a stranger. Like the other person on the phone when you call tmobile or electric bill. It's all call centers

    • @iKennectz
      @iKennectz 4 роки тому +27

      People type in their sensitive information to register for online accounts everyday. Social media is the biggest factor in this. I work in a call center, and the data protection rules are strict enough that giving out a single name, address, number etc to anyone without them confirming their identity is gross misconduct and gets you fired, and no recording devices are allowed in the centers. I'm studying network security and I can guarantee you that people do not lose their information, they give it away. Targeted attacks on businesses can give some and then normally you would be targeted for them to get the rest of what they need from you.

  • @dicebagdaryl
    @dicebagdaryl 4 роки тому +3063

    "You're talking about a little, white..."
    Dr. Phil has an iPhone.

    • @deadpoolsunicorn3359
      @deadpoolsunicorn3359 4 роки тому +16

      Booker DeWitt
      Yup lol

    • @BuzzinVideography
      @BuzzinVideography 4 роки тому +81

      My Samsung came with a white cable...

    • @Nyxeme
      @Nyxeme 4 роки тому +68

      Name one celebrity who has an Android phone.
      Matter of fact, most Americans have an iPhone correct?

    • @rainiak8378
      @rainiak8378 4 роки тому +20

      M vSdV yes about 80% and the rest are laughed at

    • @tygervoods8358
      @tygervoods8358 4 роки тому +13

      @@rainiak8378 Most of the rest are sponsored by Samsung tho, Apple doesn't really even need to at this point lmao

  • @senseiharakiru3324
    @senseiharakiru3324 4 роки тому +542

    Everybody gansta until this dude shows up in Minecraft PVP

    • @petekki3362
      @petekki3362 4 роки тому +2

      Paska kommentti

    • @jasonshepherd4771
      @jasonshepherd4771 4 роки тому +7

      How about the droid attacks to the wookies?

    • @IBL15
      @IBL15 4 роки тому

      Spurdo Spärdönen ok kiva

    • @ohmybots8797
      @ohmybots8797 4 роки тому

      @@petekki3362 Uskon että olet hauska juhlissa. Tämä komedia on korkealaatuinen

    • @Chillbear47
      @Chillbear47 3 роки тому

      Ki-Adi Mundi loool

  • @GierlangBhaktiPutra
    @GierlangBhaktiPutra 3 роки тому +366

    Those who grown up during internet's early days might know his case. His arrest was a testament how our law enforcement was not ready with the new technology at that time. Kevin Mitnick was not a hacker in a sense that he did not bypass security through breaching the security hole in the code. He used social engineering, where users are the biggest security loophole itself. He is pretty smart tho, exploiting users to find his way into the system.

    • @zerohours.
      @zerohours. 2 роки тому +37

      The way he evaded capture by tapping the FBI. The way he changed how he walked by putting rocks in his shoes. This man was a master and forefather to what he know as social engineering today.

    • @PTEC
      @PTEC Рік тому +3

      What did he do?

    • @fokyewtoob8835
      @fokyewtoob8835 Рік тому +12

      That is in fact what a hacker is. The ultimate hacker is the hacker who can hack humans. Writing code is cool but there are already great tools and codes out there it helps to read them but what makes a good hacker imo is one who can social engineer

    • @LouSipher
      @LouSipher Рік тому +2

      Most of hacking is social engineering lmao

  • @deeabbott9270
    @deeabbott9270 4 роки тому +808

    Yeah that settles it. I'm going back to carrier pigeons.

    • @yt-sh
      @yt-sh 4 роки тому +30

      I am gonna inject a tracker in them

    • @mrplayafication
      @mrplayafication 4 роки тому +6

      To get around the surveillance that is technology all one has to do is use regular mail lol. Google's looking at every email but no written letters.

    • @nickknife9681
      @nickknife9681 4 роки тому +3

      @@mrplayafication hackers don't really need to read your emails to know what is happening, it's enough to see the frequency and point of origin and destination. All of that you have in the regular mail and regular mail is being tracked now as well.

    • @unh0lys0da16
      @unh0lys0da16 4 роки тому +5

      Luckily there is ip over avian carriers, you can google for the RFC

    • @redephant2907
      @redephant2907 4 роки тому +2

      Ok boomer

  • @techviking5559
    @techviking5559 4 роки тому +1503

    Guess dr. Phil is still using Windows 98, so he should be fine.

    • @FrankieTheOne
      @FrankieTheOne 4 роки тому +47

      That would be worst

    • @thephantom7841
      @thephantom7841 4 роки тому +23

      @@FrankieTheOne worse*

    • @berfranper
      @berfranper 4 роки тому +38

      The older the version the easiest it is to hack it, if you have a Windows XP computer that has never been updated it is probably vulnerable to an exploit (virus) called Eternalblue that allows the hacker to take control of the computer like you see in this video but completely remote and in a few minutes.

    • @StreetSmartification
      @StreetSmartification 4 роки тому

      No wonder he is slow

    • @cyberyou8237
      @cyberyou8237 3 роки тому +1

      @@berfranper i think he's joking

  • @sneezyofficial
    @sneezyofficial 10 місяців тому +98

    Rip to Kevin mitnick, a true legend and hero to the ethical hacking and cyber security world😕🙏

    • @djdudjiddj7490
      @djdudjiddj7490 10 місяців тому

      Damnn rip

    • @a-google-user07
      @a-google-user07 10 місяців тому

      R.I.P. The Greatest Hacker of all times.

    • @TheFinalIllusion
      @TheFinalIllusion 9 місяців тому

      What exactly did he “hack”? He was a good social engineer, but hardly a hacker. Idk if the dude even knew how to run computers other than what you see within old Leo Laporte videos.

    • @nykel3233
      @nykel3233 9 місяців тому

      Didn't do him any good, did it?

    • @Alexe829
      @Alexe829 9 місяців тому

      @@a-google-user07 What happened to him? Do u know? Tks I/a

  • @df8238
    @df8238 4 роки тому +237

    “Pixel 4”
    *Google has left the chat

    • @josephfarhat9505
      @josephfarhat9505 4 роки тому +2

      * correction Google has now shadowbanned this video*

    • @aduryant5265
      @aduryant5265 4 роки тому +4

      well he also didn't say "the Apple iPhone"

    • @tiltedclone8906
      @tiltedclone8906 4 роки тому

      I don't get it. Can someone explain?

    • @firstnamelastname-vt6et
      @firstnamelastname-vt6et 3 роки тому

      @@tiltedclone8906 it’s called Google Pixel 4. not that anybody cares

  • @emileenix6311
    @emileenix6311 4 роки тому +188

    We use Kevin’s cybersecurity training videos at work. He’s so good at explaining!

    • @theXops9
      @theXops9 2 роки тому +2

      Then explain to me how he needs to be 300 hundred feet from the target physical computer to inject the malware but then he says he controls it from virginia ? What a fckin joke

    • @DJMikz
      @DJMikz 2 роки тому +16

      @@theXops9 bro thats because the 300 feet its just for the bluetooth transmiter to "manually" start the hack and he have a virtual machine (vps) that is located in virginia so the mallware connects to the computer in virginia doesnt mean he uses the computer to hack its simply listening the payload for a session

    • @alqaadi9858
      @alqaadi9858 2 роки тому

      @@DJMikz by the way what’s windows defender doing

    • @vdofficialchannel9841
      @vdofficialchannel9841 2 роки тому

      @@alqaadi9858 ​ @alqaadi Some payloads or viruses in laymen terms are fully undectable by windows defender. Should look at base64 encoding and code obfuscation.

    • @aerion4077
      @aerion4077 2 роки тому

      @UClrPTgP2zgsHF7OVHv9M_nQ you're not too bright hey

  • @sweiland75
    @sweiland75 4 роки тому +29

    WOW! I haven't seen Kevin in over a decade since her appeared on The Screen Savers. This guy knows his stuff.

  • @laf522
    @laf522 3 роки тому +56

    I've read all Kevin's books. It crazy seeing him actually live.

    • @fiftycaliber2972
      @fiftycaliber2972 3 роки тому

      Wdym what is the book about

    • @laf522
      @laf522 3 роки тому +14

      @@fiftycaliber2972 his life. He started of as a social engineer. He was so good the cops told the judge that he should not be allowed access to a phone cause he could whistle into it and cause a nuclear missile to launch. Not joking. FBI chased him around America. Very interesting.

    • @joshuaoconnor8505
      @joshuaoconnor8505 3 роки тому +5

      @@laf522 he's lucky the CIA didn't kill him, this agency kills anyone who threatens the government or industries

  • @darkfoxa
    @darkfoxa 3 роки тому +8

    I like this. There's really not enough information in the mainstream media to let people see and hopefully understand how a hacker may gain access to a system.

  • @zaayd
    @zaayd 4 роки тому +43

    I love how Kevin Mitnick, former #1 fugitive in the 90's, is now tech support for Dr, Phil.

  • @Gameboy...
    @Gameboy... 4 роки тому +240

    They always say " easily" but they don't say how hard it was to acquire all that knowledge

    • @necaton
      @necaton 3 роки тому +8

      not too hard tho

    • @michaelreyes8879
      @michaelreyes8879 3 роки тому +106

      @@necaton said every script kiddie ever

    • @azraelinium1012
      @azraelinium1012 3 роки тому +3

      I would like to acquire that knowledge

    • @michaelkato8999
      @michaelkato8999 3 роки тому

      @@azraelinium1012 you cant

    • @larrylee2637
      @larrylee2637 3 роки тому +12

      @@azraelinium1012 the concept is simple, trick your victim into plugging a wireless keyboard receiver into the computer, and after seeing him does that, start to type commands that enables remote access.

  • @EnglishRain
    @EnglishRain 10 місяців тому +8

    RIP Kevin you were a wonderful human

  • @intellectualhybrid2
    @intellectualhybrid2 4 роки тому +10

    Dayumm they got mitnick on the show.
    Major props for a pro

  • @subhabratabasu9804
    @subhabratabasu9804 3 роки тому +37

    From an infamous black hat Hacker to a contributor to hacking society.

  • @L4marca
    @L4marca 4 роки тому +112

    Shoutout to Hak5. They have all you could need.
    Also, the remote button is just a gimmick. It's not even needed.

    • @enzobonggio1250
      @enzobonggio1250 3 роки тому

      I believe the remote is the bluetooth device that actually run the command. How it work if not?

    • @L4marca
      @L4marca 3 роки тому +18

      @@enzobonggio1250 The remote was just for demonstration.
      The cable is just waiting for the button to be pushed, after which the keystrokes are injected. It's just one or two extra lines of code.

    • @enzobonggio1250
      @enzobonggio1250 3 роки тому +5

      @@L4marca what kind of microcontroller is small enough to be hidden in a cable? Do you have a link to such a thing?

    • @ArnoldC97
      @ArnoldC97 3 роки тому

      where i can educate myself on this subject. to protect myself against such attacks of course.

    • @martimking1craft
      @martimking1craft 3 роки тому +2

      @@L4marca not a good advice

  • @forestriver437
    @forestriver437 4 роки тому

    This episode was blown out of proportion.

  • @IN-tm8mw
    @IN-tm8mw 4 роки тому +1

    which is why virtual nets and virtual port configurations are awesome. i also notice malware attacks when the system idle resources are higher then normal.

  • @ivangotyokes
    @ivangotyokes 4 роки тому +13

    Every single person there is just like "WTF...this is too much for me to comprehend".

  • @lauras4817
    @lauras4817 4 роки тому +54

    Waving to my hackers in my webcam after watching this clip

    • @Smithy223
      @Smithy223 4 роки тому +2

      Laura S who else waved after reading this comment

    • @Kekekepeeps
      @Kekekepeeps 4 роки тому

      FBI meeeee 😂😂

  • @pineslife5647
    @pineslife5647 3 роки тому +2

    Thanks phil, my bathroom camera needed one of these.

  • @Raduldo
    @Raduldo 4 роки тому +227

    Wait till my friend, the Nigerian prince hears of this.. Maybe thats what happend to that 8mil that I was promised.

    • @blakestam6235
      @blakestam6235 3 роки тому +2

      Because you are greedy,you wanna make quick money.😋

  • @landonpeckham7752
    @landonpeckham7752 3 роки тому +64

    This happened to a school when the pandemic started and a lot of kids had school laptops and hackers turned on the web cams. Since most kids have them in their rooms they saw the kids dressing and other private matters. Be careful with what you do online folks.

    • @benargee
      @benargee Рік тому +3

      I didn't hear this story but I did hear of a school that installed spying software like this before handing out school owned laptops for kids to take home.

    • @Alexe829
      @Alexe829 9 місяців тому

      Only when parents cop on . don't allow pc in a teenage bedroom! End of .

  • @LOL-hc5fv
    @LOL-hc5fv 4 роки тому +45

    there's nothing funnier than knowing the passwords of all your friends and bringing it up in a conversation

    • @vdofficialchannel9841
      @vdofficialchannel9841 2 роки тому +1

      Well there is your next project !. Use it ethically though. I suggest you make a RAT in a language like python or java so it is cross platform(MACOS, WINDOWS, Linux) and go!

    • @computeroid6162
      @computeroid6162 10 місяців тому

      OH MY GOSH, this just gave me so many hilarious ideas!!!

  • @datcan
    @datcan 4 роки тому

    Dr.phil is the grandad everyone wants

  • @DarkCode
    @DarkCode Рік тому +2

    Kevin Mitnick, a true legend of the game..

  • @spiralsage
    @spiralsage 10 місяців тому +5

    RIP Kevin. A legend and an inspiration. Regardless of the gatekeepers calling him a script kiddie, his story intrigued a lot of people and paved their way into security or tech.

  • @berfranper
    @berfranper 4 роки тому +10

    That is a bad USB (that's how they're called), they make the computer think they're a keyboard, once they're connected they start typing a command on the console. The command is programmed and loaded on the USB beforehand. You can do almost anything with it, from granting remote access to the computer to deleting files or pranking a friend.

  • @IffyEdem
    @IffyEdem Рік тому

    My cyber classes start tomorrow. I’m so excited 😊

  • @brittanysiebenhaar3627
    @brittanysiebenhaar3627 3 роки тому

    I love Dr.Phil. He does amazing work 💜 Dr. Phil and his wife Robin are such beautiful, pure souls💙

  • @Smithy223
    @Smithy223 4 роки тому +154

    Who brought Lester to Dr. Phil’s show

    • @extream360
      @extream360 4 роки тому +2

      Nice 😂 😂

    • @guanacojdm
      @guanacojdm 4 роки тому +3

      You’re so right he does sound like Lester lmao

    • @ZeroSpawn
      @ZeroSpawn 4 роки тому

      "that bank job that was you, right? Or somebody associated with you?"

    • @homiecamper7897
      @homiecamper7897 4 роки тому

      Planning for another heist with dr. Phill

    • @nicolasfeick6569
      @nicolasfeick6569 3 роки тому

      Hahaha

  • @finleyspencer5426
    @finleyspencer5426 4 роки тому +7

    Only with Utopia you can feel yourself truly protected.

  • @4esv
    @4esv Рік тому +1

    Good old Mitnick, truly one of the greats if not th GOAT.
    That said, for BadUSB attacks it is commonplace to do "PowerShell -WindowStyle hidden" and then injecting keystones intot the hidden window. Any payload large enough will take too long to be typed out on the run box which can be closed easily even by an inexperienced user.

  • @hasnainmalik8982
    @hasnainmalik8982 11 місяців тому +2

    Nobody will replace mr Kevin mitnick.. heats of sirr❤

  • @jahye3816
    @jahye3816 4 роки тому +22

    I never expected Kevin would meet Dr.Phil. It’s just confusing af

  • @loudmouthisaac9487
    @loudmouthisaac9487 4 роки тому +199

    he’s making it 10x harder than it actually is lmfao.

    • @kurs1val
      @kurs1val 4 роки тому

      @@jakebarringham7248 It is really easy. Takes 2 steps

    • @menace2societies
      @menace2societies 4 роки тому

      nah its already easy, what if he made it complex😂

    • @taumus1
      @taumus1 4 роки тому +39

      Kevin Mitnick specialized in social engineering for his hacking. I think it was Motorola where he needed some technical specs from, so he would just call the office and ask some lower level employee to send it to him, like he was in another apartment.

    • @lexluthor8072
      @lexluthor8072 4 роки тому +9

      lol,guys dont know who he was....he's the best hacker back in the days,the most wanted

    • @mustafakhalid9348
      @mustafakhalid9348 4 роки тому +1

      @xOr you don't know how it works don't you? If he was born 15 years later, hacking tools would be 15 years more up to date and he would adapt to the changes, he is talented he did great at THAT time could you imagine what he would do if he was born at this time were every script kiddy can hack anywhere?

  • @Arctic_silverstreak
    @Arctic_silverstreak 3 роки тому +2

    _Understandable, have a nice day_

  • @dawsonsanderson9108
    @dawsonsanderson9108 2 роки тому

    Reading Kevin’s book now. Really cool stuff

  • @shujamukhtar4563
    @shujamukhtar4563 4 роки тому +73

    At 1:46, Kevin being the greatest hacker still doesn't plug-in the cable in one go. Irony...

    • @m00se64
      @m00se64 3 роки тому +23

      The training for that exceeds one lifetime

    • @fiendfnm2828
      @fiendfnm2828 2 роки тому +10

      its the usb curse... it wont go until flipped 🙃

    • @saitamabaldy2566
      @saitamabaldy2566 2 роки тому +2

      he's not the greatest hacker of all time
      he's the most famous hacker of all time

    • @skinnyfeels6769
      @skinnyfeels6769 2 роки тому +1

      Every USB cable has three sides

  • @kaelin1654
    @kaelin1654 4 роки тому +200

    Lol I loved his title: “World’s Most Famous Hacker”

    • @Coffee5432
      @Coffee5432 4 роки тому +7

      he is one of the most famous hackers

    • @nanta18
      @nanta18 4 роки тому +39

      @@Coffee5432 maybe famous yeah but not the best. best one is someonewho nobody knows of😂

    • @strider029
      @strider029 4 роки тому +24

      @@nanta18 Well it depends on category if we are talking white hat then this guy ranks high but if were talking black hats then yes you're right they're definitely anonymous.

    • @ExoGamerful
      @ExoGamerful 4 роки тому +11

      Mitnick was the best of his era

    • @AlexMkd1984
      @AlexMkd1984 4 роки тому +1

      @@Coffee5432 bah he just dumb

  • @venoxedits9691
    @venoxedits9691 Рік тому

    Thanks for the tutorial

  • @solotrench6372
    @solotrench6372 3 роки тому +2

    Mitnick is the reason I’m in cyber security

  • @zackpack8
    @zackpack8 10 місяців тому +3

    RIP LEGEND, HERO and GOAT!!!

  • @Soul-zj3wi
    @Soul-zj3wi 4 роки тому +22

    In this case the cable not did anything it was the utility, the Bluetooth Transmitter did the work, and you can be in Virginia, but he said that the transmitter works from 300 feet, so you need 1 more person..

    • @sleptiq
      @sleptiq 4 роки тому

      What utility? Can you be more clueless?

    • @geogmz8277
      @geogmz8277 4 роки тому

      The "Virginia" reference is more to illustrate that not necessarily is someone remotely close to you.

  • @radoslavsheytanov3044
    @radoslavsheytanov3044 8 місяців тому +2

    RIP Kevin Mitnick. Great mind in the field of Computer Science and Cybersecurity.

  • @meghdoothdutta7084
    @meghdoothdutta7084 Рік тому

    Wow.. Nice Video... Thank you

  • @prata6938
    @prata6938 3 роки тому +4

    the cable thing is what i was worried about when my father bought an iphone cable from some sus brand, but luckily i found out that it’s somewhat legit

  • @ambermommasr1370
    @ambermommasr1370 4 роки тому +5

    Being watched is scary but more scary to me, is them putting photos of young children on your phone and then calling police on you!!

    • @maryvalentyne2553
      @maryvalentyne2553 4 роки тому +2

      Amber Nicole Massey yeah that’s what’s scariest to me. But hopefully they train units to know those signs but you just never know 😏

  • @greatdaddy4710
    @greatdaddy4710 2 роки тому

    The Cóndor did it again!!! Although it would amaze me if the malware would've been in -h mode.

  • @courtney_doe7431
    @courtney_doe7431 2 роки тому

    He called it a stick and I love it

  • @Snutz.D
    @Snutz.D 4 роки тому +6

    Was that "The Stone" sitting behind Dr. Phil? 1:47 "Can you smellll-l-l-l what The Stone is baking?"

  • @g_lise7103
    @g_lise7103 3 роки тому +2

    So basically the cable will then act as a keyboard and do input, great one :D

  • @zymh2433
    @zymh2433 10 місяців тому

    This video is the one i met Kevin Mitnick and can't believe he's gone. I got a lot of inspiration from Kevin Mitinick

  • @vtggas_2958
    @vtggas_2958 3 роки тому +2

    I hope someday knowledge on computers and cyber security will be like Kevin 👍

    • @vdofficialchannel9841
      @vdofficialchannel9841 2 роки тому +1

      Practice and repeat is the way to go.

    • @vtggas_2958
      @vtggas_2958 4 місяці тому +1

      ​@@vdofficialchannel9841Can't believe Kevin died💔...

  • @BigerBoy
    @BigerBoy 4 роки тому +18

    Plot twist: It is an Apple ad...

  • @peaceful4you408
    @peaceful4you408 3 роки тому +4

    Cybersecurity is so cool. I would love to get into that profession one day.

    • @tinu949
      @tinu949 3 роки тому +1

      Dude u do not know tha hardwork behind that
      So think twice

    • @ZhiLiangF
      @ZhiLiangF 3 роки тому

      @@tinu949 yea.. I cant even scratch the basic of programming yet😂😂

    • @goldengiorno6890
      @goldengiorno6890 2 роки тому +1

      @@tinu949 ikr i just started to learn about basic networking for a ccna exam and god damn it this shit's overwhelming. And the crazy thing is that network attacks are just a part of cyber security you need to have a strong knowledge about computer Hardware, software, programming as well python, c++, JavaScript... working with linux, scripting with bash, cracking software and that is just from the top of my head. Crazy stuff.

    • @v380riMz
      @v380riMz 2 роки тому +4

      ​@@goldengiorno6890 It takes years bro. I'm a 3rd years CySec student and the information is STILL overwhelming. You literally can't know everything. But in the end it all boils down to simple defending to keep out hackers; filter ports, setup an IDS/IPS consisting out of millions of rules, prepared SQL statements, input sanitization, least privilege policy, updating regurarily, password policies and keeping updated on the newest CVE's. Now this still scratches the surface, ofcourse giant webapps could have vulnerabilities, but how many of them are actual RCE's or SQLi's? Most companies only get hacked nowadays through human error such as opening phishing mails with infected files.

  • @Rhoxe
    @Rhoxe 4 роки тому +1

    Nice tip

  • @JohnDeschenes99
    @JohnDeschenes99 2 роки тому

    Kevin is the best! 🤘

  • @22222imimo
    @22222imimo 4 роки тому +11

    I have learned allot from Kevin back on 2005 especially the social engineering part i got my first job by proving to a manager how his system was weak one phone call in front of him to his it department pretending to be the cisco support team sending email to that guy and getting access to everything

  • @thatdamnmanhd7984
    @thatdamnmanhd7984 4 роки тому +99

    Oh wow 2019 people just learning about ratting.

    • @iCortex1
      @iCortex1 4 роки тому +1

      My thought exactly... Big ol yikes

    • @ElDiablo123
      @ElDiablo123 4 роки тому +1

      Didn't know they could do it this way tbh

    • @iCortex1
      @iCortex1 4 роки тому

      @@ElDiablo123 this way and a bunch of even scarier ones

    • @thatdamnmanhd7984
      @thatdamnmanhd7984 4 роки тому

      @@ElDiablo123 I do it through pastebin

    • @H3Guide
      @H3Guide 4 роки тому +1

      Its really not a big suprise when majority of people dont even like using computers, you expect them to know what a rat is. Lol

  • @terrordoidao8931
    @terrordoidao8931 Рік тому +1

    This guy was a legend

  • @Ronnocbot
    @Ronnocbot 3 роки тому +8

    The way they show the entire PowerShell exploit unblurred lol

    • @alexcorbett414
      @alexcorbett414 2 роки тому +1

      Why would they blur in anyways? You gonna run his script on your victims and give him access instead?

    • @Ronnocbot
      @Ronnocbot 2 роки тому +2

      @@alexcorbett414 it’s a liability that I’m sure they didn’t realize they were involving themselves in. With experience working in IT for about five years, this is not a good thing. A kid, or really anyone can get their hands on these easily and learn. Sure, they’re probably on google, but seeing it first hand on a tv show can spark someone’s internet. Trust me, back when I was in high school, seeing things like that is how I learned so quickly.
      Scripts for remote access are easy malleable and are not exclusive to giving only him access.

    • @alexcorbett414
      @alexcorbett414 2 роки тому +1

      @@Ronnocbot I totally agree with what you're saying about inspiring people. I just want to say that his script was most likely for some RAT meaning the other people will probably need that exact thing, I could be wrong though, I didn't pause it and read the script myself but I'm assuming he used a RAT since he was talking about using the webcam, microphone, etc. Maybe it was a meterpreter shell or something like that. Been a while since I used metasploit so I don't remember what you can really do.

  • @harrybanda
    @harrybanda 4 роки тому +5

    When did the Dr Phil Show become about tech?

  • @vivekgovila4148
    @vivekgovila4148 2 роки тому

    Very good video. Thank you for sharing your knowledge and wisdom. I have a query. Is it possible that we can open multiple tabs for a website which allows us to open just one tab officially?

  • @MassimilianoGraziani
    @MassimilianoGraziani 3 роки тому

    Great Kevin ever!

  • @TechySpeaking
    @TechySpeaking 2 роки тому +7

    This is NOT how the majority of attacks happen, especially on older citizens.
    It's much more likely they'll fall for spam calls or phishing links than "someone gave you a hacked USB cable for remote access to your computer"

    • @drabberfrog
      @drabberfrog 2 роки тому

      Yeah, all these videos where they demonstrate how hackers do things are really not helpful for the average person's security. Maybe if you're a government official or a CEO of a corporation you might have to worry about a hacker getting physical access to your computer or hacking your webcam but for the average person these attacks take too much effort and are not profitable. What is profitable is guessing the terrible passwords people use for every single website and "hacking" their accounts. All these videos do is distract from that elephant in the room. It makes sense why they do it, the average person is probably entertained and concerned a lot more by a crazy hacker pluging in a flash drive and instantly taking control of a computer (even though the hacker already had access to it for who knows how long with admin privileges.)

  • @benjaminturner286
    @benjaminturner286 4 роки тому +9

    0:24 Dr. Phil a freak 😳

  • @anonymous-0
    @anonymous-0 Рік тому

    Good to see this sort of information reaching the potentially uninformed..

  • @samsam-zu7zc
    @samsam-zu7zc 4 роки тому

    Please share the full video

  • @random3699
    @random3699 4 роки тому +194

    All he did was rat the other computer from a power cord that executed a command to powershell for the rat download.

    • @josephrodriguez5789
      @josephrodriguez5789 4 роки тому +37

      I know I couldn't help but laugh the whole time

    • @teddyjohnson284
      @teddyjohnson284 4 роки тому +9

      Ik.. mans used quasar RAT

    • @1127TOMI
      @1127TOMI 4 роки тому +3

      Lol yeah you can literally download quasar rat in 1min and do the same thing.

    • @OakedRS
      @OakedRS 4 роки тому +40

      And imagine how much Kevin got paid for this! Hilarious.

    • @catgirlow
      @catgirlow 4 роки тому +2

      lol ikr

  • @mynamesjeffhardly
    @mynamesjeffhardly 4 роки тому +5

    Good thing I don't have any money. I just sent the last of it to a Nigerian prince from my emails lol

  • @MrNateSPF
    @MrNateSPF 3 роки тому +2

    That's why whenever I get a phone randomly in the mail I don't use the charging cable that came with it. It hasn't happened yet but I'm ready if it ever does.

  • @hasrathmd1759
    @hasrathmd1759 4 роки тому

    Wow They Taught me a lot 😯

  • @strikelight
    @strikelight 4 роки тому +4

    Remote computer in Virginia... Bluetooth trigger 5 feet away from Target... Convincing victim to press button on Bluetooth trigger to activate the payload drop... Seems like a likely course of events. *Eyeroll*

    • @kelosad
      @kelosad 4 роки тому

      strikelight are you dumb?

    • @PolakPL2002
      @PolakPL2002 4 роки тому +1

      But you realize that the Bluetooth device is not necessary. There can just be fixed delay before sending keystroke.

  • @elonmusk452
    @elonmusk452 4 роки тому +25

    Once hackers learn about the pirate bay, they won’t need to hack people’s computer to find porn.

  • @kerrieleidig
    @kerrieleidig 3 роки тому +1

    You know what's crazy, I live in Philly & I used to shoot live bands' shows & one night I got to the venue & realized all my camera cards were full. So I went to an electronics store on South St. to buy one & they offered to sell me one of their used cards (which they said they personally wiped) for cheap & I bought it. I shot the band & when I got home, I popped the card into my laptop's card reader to find all these naked selfies of a young lady... verrrry graphic ones. It was disturbing because they seemed like selfies & not something she'd want strangers looking at... I wonder how many others saw & downloaded those pics before they sold me the card.

    • @chemmaz
      @chemmaz 3 роки тому

      And what did you do with the card?

  • @shwartz166
    @shwartz166 4 роки тому

    Thank you

  • @BuzzinVideography
    @BuzzinVideography 4 роки тому +6

    Just saying QUESAR RAT is the second most simple thing to do if you want to see inside a computer.
    Pretty sure you could get a copy online if you wanted. LOL

  • @welliton6533
    @welliton6533 2 роки тому +12

    to find a real hacker is quite difficult. I was tricked twice, and it took me six months to find a hacker who actually did the job. Moral of the story: I managed to do my job more before I did it, I lost it because of two bad people.

  • @note2owns
    @note2owns 4 роки тому

    One of Kevin's handles in his prime was Knight Lighting.

  • @angelicastella5018
    @angelicastella5018 3 роки тому

    He is reliable and competent

  • @edwardstevens734
    @edwardstevens734 4 роки тому +48

    “Your talking about a little..”
    Sixnine: Dr. Phil has a white iPhone

    • @BuzzinVideography
      @BuzzinVideography 4 роки тому

      Edward Stevens bruh. My Samsung came with a white cord too

  • @user-ge4uk9ui8y
    @user-ge4uk9ui8y 4 роки тому +7

    so the usb cable acted as a keyboard sending keys?

  • @m.necatisepetcioglu4391
    @m.necatisepetcioglu4391 2 роки тому

    I remember where people wrote down "Free Kevin" signs everywhere when he got arrested.

  • @kbto
    @kbto Рік тому

    If you want an explanation:
    USB can be used for more than data transfer, for example your keyboard and mouse are plugged in via USB which is exactly what is happening here. The little thick part on the end of the charging cable actually contains a very compact computer which pretends to be a keyboard and sends keystrokes to the computer.
    The keystrokes here are that it holds win+R to open the run window (which allows you to run executables with arguments) it calls the powershell executable with the arguments /w 1 /ep bypass, or windowstyle 1 (hidden) and execution policy bypass (let’s you execute scripts) then it starts a try{} routine (attempts to run code within, if error it exits) and uses net.webclient and invoke-expression to download a powershell script (list of commands) into memory and execute it.
    This opens a powershell script that runs in the background of the computer and most likely will take commands from a server, execute them, and send the output back to the server.
    This is what’s called a reverse shell, it is the first step for an attacker to gain access. Anything you can do on a computer and more is possible from a reverse shell, including downloading files from your pc and downloading additional malware to the PC.

  • @ryanejoe
    @ryanejoe Рік тому +3

    For those of you wondering how this is most likely done, its probably a modified usb rubber ducky, see a computer would scan a usb device and wont let it automatically run files on the flash drive,, but it lets HID(human-interface-devices) type things without a problem.. so a flash drive, would look like a flash drive but it would have code in it which will make it so that when the device is plugged in, it starts to type in commands which then downloads and runs malware... in this case he has made the cable become a keyboard using the same usb-rubber ducky concept

    • @SomeRandomPiggo
      @SomeRandomPiggo Рік тому +2

      A less technobabble way to put it is that the device acts like a keyboard, opens the Run dialog with Win+R and runs a command to download a payload (the spyware) and run it

    • @SomeRandomPiggo
      @SomeRandomPiggo 10 місяців тому

      @sabinawendy4244 ong

  • @bastijnvos1295
    @bastijnvos1295 4 роки тому +69

    Hacker has macOS, victim has Windows
    Classic

    • @Ordanbocker
      @Ordanbocker 4 роки тому +14

      Well macOS is Unix based, so it is able to run many tools that something such as Kali Linux could

    • @JuicyJayJoCercei
      @JuicyJayJoCercei 4 роки тому +1

      @@Ordanbocker Puppy Linux is best

    • @azazmir9340
      @azazmir9340 4 роки тому +3

      Well thats because 80% of the users use windows as their os. So, malwares are specifically created to target a particular os or a program. Wouldnt be surprise if something similar could happen on a macos but it might be abit difficult to say the least

    • @googleinc6033
      @googleinc6033 4 роки тому +21

      Macs get equally hacked, its just less common because they have such a small market share.

    • @FathinLuqmanTantowi
      @FathinLuqmanTantowi 4 роки тому

      @@googleinc6033 or worse, the malware is so advanced and non intrusive that it silently lives on people's macbooks

  • @littlekingryan4276
    @littlekingryan4276 3 роки тому +2

    my question is how did he modified that charger, and the steps >:), good purposes by the way

  • @hack-talk9098
    @hack-talk9098 10 місяців тому

    I’ve been praying to get this script

  • @839Bender
    @839Bender 3 роки тому +7

    I love how the dinosaurs are sitting in there chaires in fear and think: What if somebody could access all my non encrypted photos on my PC like this.