Cybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive Information
Вставка
- Опубліковано 20 лис 2019
- Cybersecurity expert Kevin Mitnick demonstrates how today’s “crackers”, “gearheads” and “cyberpunks” illegally access sensitive information from everyday people using modified gear and social engineering.
Dr. Phil tells compelling stories about real people. The Dr. Phil Show is an American daytime talk show and TV series with host and personality Dr. Phil McGraw, who offers advice from his experience as a psychologist. The show provides the most comprehensive forum on mental health issues in the history of television. For over a decade, Dr. McGraw has used the show's platform to make psychology accessible to the general public by addressing important personal and social issues. Here on the Dr. Phil UA-cam channel, you will find the best moments, highlights, and segments from the TV show. We upload new videos every day, so make sure you subscribe and ring the bell for all notifications, so you don't miss a single one.
Full episodes of the Dr. Phil Show premiere every weekday on CBS, with a new season premiering every fall in 2020, 2021, 2022, and 2023. Each full episode contains an interview or multiple interviews with doctors, teens, families, parents, kids, and more. The executive producers are Phil McGraw and showrunner Oprah Winfrey of OWN. Dr. Phil is the top-rated daytime talk show attracting millions of viewers every day alongside other talk shows, including The Ellen Show with Ellen DeGeneres, The Dr. Oz Show, The Kelly Clarkson Show, and The Steve Wilkos Show. Dr. Phil makes regular appearances on The Tonight Show Starring Jimmy Fallon, Jimmy Kimmel Live, and The Late Late Show with James Corden. Dr. Phil has also done crossovers with 90 Day Fiancé and Inside Edition.
Do you want to be on the show? bit.ly/BeOnDrPhilShow
www.drphil.com
Facebook: / drphilshow
Twitter: / drphil
Instagram: / drphil
TikTok: / drphil
#DrPhil #PhilMcGraw #DrPhilShow - Розваги
Oh lord, I hope my grandma doesn't watch this episode. She already is so paranoid about computers that she truly believes & is terrified she might accidentally hack into the pentagon by clicking on the wrong button while shes playing on her puzzle game. (The singular thing she uses her computer for is her puzzle game.)
Lol
@Megan Ziggler 🦃? 😜
LOL. 😂
Watch the one day she loses her fear, and uses it, you get to her house and she’s controlling Air Force One from a computer running windows 98’ with the secret service, and military surrounding her house. 😂😂
@Megan Ziggler Thanks for indulging my dry, hammy humor. I'm just a turkey.
@Megan Ziggler Why thank ya! Now I'm blushing and Kool-Aid Man grinning. I've been called some other food slang names that aren't so nice. 😋 So where ya from? If you want to say. I'm in Tampa, FL. Hope your TG was full of good food and fun!
dr phil is my favorite boomer
stop
Me too😛
He's adorbs.
That Guy me too
4 ever ok boomer
This guy was the reason I got into hacking. RIP Kevin. You'll be remembered by all in the community.
😮😢
this guy was the reason you became a virgin for life
Yes. RIP
What happened to him
he passed away in late 2023@@p34ky._
For all who don't know this is Kevin mitnick a famous hacker who was so good when he was being watched by the FBI he hacked them and had all personnel files on everyone working on his case and even knew which friends were informants.
🤔🤔
@@Dimmizer if your sceptical, feel free to verify this online.
Now if that ain’t the biggest flex I don’t know what is
Actually you can still see all the sessions online and/or on youtube of kevin mitnick's telnet during shimomura's packet sniffing. this was done in order to have clear evidence against kevin leading to his arrest.
@@imdanielmartinez that's awesome I didn't know that
plot twist: he’s the hacker
Kevin is the emperor of the Hackistan Empire.
😂
Actually he was - one of the best. Got MAJOR prison time, and is now a consultant. But he was one of the first.
tellurye oh! I think they’re talking about Dr. Phil. not trying to be rude!! Just think you missed the joke, good day sir :)
Marialy Ruiz that was for the guy I tagged...
0:25 shes staring into my soul. Jesus
🤣🤣
That genuinely scared me
0:21
I thought first it was a mannequin
Underrated
How to make parents who barely understand computers paranoid about computers, the Dr. Phil edition.
Fr
wish everybody was actually paranoid about computer safety. you are never gonna educate the older generations about security, but if they were actually paranoid about it would make them harder to target.
@@xeros4000 no, because by making them paranoid, you are also making them more likely to call scam call centers when they see a « your computer has a virus installed » "advertisement"
true. antivirus and vpn developers own them
I found this video useful but I will forever appreciate *vesterfix* on ig for keeping his promise on my acc and getting my job done
For the curious, this is relatively easy to do vs other forms of hacking. It's simply a microcontroller with human interface device (HID capabilities), hidden in the USB cable. As most hardware plugged into computers are not verified for their identity, you can masquerade as a normal keyboard.
To sum it up, it opens the run window using Ctrl + R and then proceeds to execute one super long powershell command.
Powershell commands can do everything on windows, such as downloading malware to steal your account hashes, stealing your wifi passwords (Windows very kindly gives you cleartext wifi passwords) and even your browser history in a matter of seconds. It also leaves little traces as it can download full exe files and execute them all in memory, leaving no clues on the disk, and the only clues are in the Windows logs or a full memory analysis.
It’s also relatively easy to block. Even Defender can block it.
@@SanteriHietanen Block what? A RubbyDuck or the downloaded malware?
It's practically impossible to block a RubbyDuck without either using an overly complex or the way too simple solution. You can make it detect when the typing is too fast, but all an attacker needs to do is just make it slower. You can try identifying a person using keystroke dynamics and AI, but you can't do that very reliably.
*The only defence left is pure common sense of not plugging in random phones, drives, cables, etc.*
@@rkvkydqf Are you serious? It's not impossible to block. I don't know where you get that you wouldn't be able to block it. Easiest way is to literally have windows require admin password for it so that every UAC needs admin password. Second easiest way to block it is for example to limit access to powershell, the cmd prompt, and run command (as these are the most common ways a rubber ducky executes malicious code) You could block it only for USB. Whitelisting USB's works also. Even then if the script starts running antivirus will block the malware it's trying to insert.
@@SanteriHietanen Yeah sure, Defender is blocking a HID device ahahahaha. weirdo
@@Wunderkind777 Can you read? I explained it already. Defender doesn't block HID but it definitely blocks the malware it's trying to insert.
This is not the way most victims lose their info. It's call centers.
Ok boomer
@@red_wave7634 your moms a boomer
No it's databases that get leaked due to vulnerabilities.
@Phuk In-Yomam a stranger. Like the other person on the phone when you call tmobile or electric bill. It's all call centers
People type in their sensitive information to register for online accounts everyday. Social media is the biggest factor in this. I work in a call center, and the data protection rules are strict enough that giving out a single name, address, number etc to anyone without them confirming their identity is gross misconduct and gets you fired, and no recording devices are allowed in the centers. I'm studying network security and I can guarantee you that people do not lose their information, they give it away. Targeted attacks on businesses can give some and then normally you would be targeted for them to get the rest of what they need from you.
"You're talking about a little, white..."
Dr. Phil has an iPhone.
Booker DeWitt
Yup lol
My Samsung came with a white cable...
Name one celebrity who has an Android phone.
Matter of fact, most Americans have an iPhone correct?
M vSdV yes about 80% and the rest are laughed at
@@rainiak8378 Most of the rest are sponsored by Samsung tho, Apple doesn't really even need to at this point lmao
Everybody gansta until this dude shows up in Minecraft PVP
Paska kommentti
How about the droid attacks to the wookies?
Spurdo Spärdönen ok kiva
@@petekki3362 Uskon että olet hauska juhlissa. Tämä komedia on korkealaatuinen
Ki-Adi Mundi loool
Those who grown up during internet's early days might know his case. His arrest was a testament how our law enforcement was not ready with the new technology at that time. Kevin Mitnick was not a hacker in a sense that he did not bypass security through breaching the security hole in the code. He used social engineering, where users are the biggest security loophole itself. He is pretty smart tho, exploiting users to find his way into the system.
The way he evaded capture by tapping the FBI. The way he changed how he walked by putting rocks in his shoes. This man was a master and forefather to what he know as social engineering today.
What did he do?
That is in fact what a hacker is. The ultimate hacker is the hacker who can hack humans. Writing code is cool but there are already great tools and codes out there it helps to read them but what makes a good hacker imo is one who can social engineer
Most of hacking is social engineering lmao
Yeah that settles it. I'm going back to carrier pigeons.
I am gonna inject a tracker in them
To get around the surveillance that is technology all one has to do is use regular mail lol. Google's looking at every email but no written letters.
@@mrplayafication hackers don't really need to read your emails to know what is happening, it's enough to see the frequency and point of origin and destination. All of that you have in the regular mail and regular mail is being tracked now as well.
Luckily there is ip over avian carriers, you can google for the RFC
Ok boomer
Guess dr. Phil is still using Windows 98, so he should be fine.
That would be worst
@@FrankieTheOne worse*
The older the version the easiest it is to hack it, if you have a Windows XP computer that has never been updated it is probably vulnerable to an exploit (virus) called Eternalblue that allows the hacker to take control of the computer like you see in this video but completely remote and in a few minutes.
No wonder he is slow
@@berfranper i think he's joking
Rip to Kevin mitnick, a true legend and hero to the ethical hacking and cyber security world😕🙏
Damnn rip
R.I.P. The Greatest Hacker of all times.
What exactly did he “hack”? He was a good social engineer, but hardly a hacker. Idk if the dude even knew how to run computers other than what you see within old Leo Laporte videos.
Didn't do him any good, did it?
@@a-google-user07 What happened to him? Do u know? Tks I/a
“Pixel 4”
*Google has left the chat
* correction Google has now shadowbanned this video*
well he also didn't say "the Apple iPhone"
I don't get it. Can someone explain?
@@tiltedclone8906 it’s called Google Pixel 4. not that anybody cares
We use Kevin’s cybersecurity training videos at work. He’s so good at explaining!
Then explain to me how he needs to be 300 hundred feet from the target physical computer to inject the malware but then he says he controls it from virginia ? What a fckin joke
@@theXops9 bro thats because the 300 feet its just for the bluetooth transmiter to "manually" start the hack and he have a virtual machine (vps) that is located in virginia so the mallware connects to the computer in virginia doesnt mean he uses the computer to hack its simply listening the payload for a session
@@DJMikz by the way what’s windows defender doing
@@alqaadi9858 @alqaadi Some payloads or viruses in laymen terms are fully undectable by windows defender. Should look at base64 encoding and code obfuscation.
@UClrPTgP2zgsHF7OVHv9M_nQ you're not too bright hey
WOW! I haven't seen Kevin in over a decade since her appeared on The Screen Savers. This guy knows his stuff.
I've read all Kevin's books. It crazy seeing him actually live.
Wdym what is the book about
@@fiftycaliber2972 his life. He started of as a social engineer. He was so good the cops told the judge that he should not be allowed access to a phone cause he could whistle into it and cause a nuclear missile to launch. Not joking. FBI chased him around America. Very interesting.
@@laf522 he's lucky the CIA didn't kill him, this agency kills anyone who threatens the government or industries
I like this. There's really not enough information in the mainstream media to let people see and hopefully understand how a hacker may gain access to a system.
Highly Agree!
I love how Kevin Mitnick, former #1 fugitive in the 90's, is now tech support for Dr, Phil.
They always say " easily" but they don't say how hard it was to acquire all that knowledge
not too hard tho
@@necaton said every script kiddie ever
I would like to acquire that knowledge
@@azraelinium1012 you cant
@@azraelinium1012 the concept is simple, trick your victim into plugging a wireless keyboard receiver into the computer, and after seeing him does that, start to type commands that enables remote access.
RIP Kevin you were a wonderful human
Dayumm they got mitnick on the show.
Major props for a pro
From an infamous black hat Hacker to a contributor to hacking society.
Shoutout to Hak5. They have all you could need.
Also, the remote button is just a gimmick. It's not even needed.
I believe the remote is the bluetooth device that actually run the command. How it work if not?
@@enzobonggio1250 The remote was just for demonstration.
The cable is just waiting for the button to be pushed, after which the keystrokes are injected. It's just one or two extra lines of code.
@@L4marca what kind of microcontroller is small enough to be hidden in a cable? Do you have a link to such a thing?
where i can educate myself on this subject. to protect myself against such attacks of course.
@@L4marca not a good advice
This episode was blown out of proportion.
which is why virtual nets and virtual port configurations are awesome. i also notice malware attacks when the system idle resources are higher then normal.
Every single person there is just like "WTF...this is too much for me to comprehend".
Because none of what he said made any sense at all
Waving to my hackers in my webcam after watching this clip
Laura S who else waved after reading this comment
FBI meeeee 😂😂
Thanks phil, my bathroom camera needed one of these.
Wait till my friend, the Nigerian prince hears of this.. Maybe thats what happend to that 8mil that I was promised.
Because you are greedy,you wanna make quick money.😋
This happened to a school when the pandemic started and a lot of kids had school laptops and hackers turned on the web cams. Since most kids have them in their rooms they saw the kids dressing and other private matters. Be careful with what you do online folks.
I didn't hear this story but I did hear of a school that installed spying software like this before handing out school owned laptops for kids to take home.
Only when parents cop on . don't allow pc in a teenage bedroom! End of .
there's nothing funnier than knowing the passwords of all your friends and bringing it up in a conversation
Well there is your next project !. Use it ethically though. I suggest you make a RAT in a language like python or java so it is cross platform(MACOS, WINDOWS, Linux) and go!
OH MY GOSH, this just gave me so many hilarious ideas!!!
Dr.phil is the grandad everyone wants
Kevin Mitnick, a true legend of the game..
RIP Kevin. A legend and an inspiration. Regardless of the gatekeepers calling him a script kiddie, his story intrigued a lot of people and paved their way into security or tech.
That is a bad USB (that's how they're called), they make the computer think they're a keyboard, once they're connected they start typing a command on the console. The command is programmed and loaded on the USB beforehand. You can do almost anything with it, from granting remote access to the computer to deleting files or pranking a friend.
My cyber classes start tomorrow. I’m so excited 😊
I love Dr.Phil. He does amazing work 💜 Dr. Phil and his wife Robin are such beautiful, pure souls💙
Hi
Who brought Lester to Dr. Phil’s show
Nice 😂 😂
You’re so right he does sound like Lester lmao
"that bank job that was you, right? Or somebody associated with you?"
Planning for another heist with dr. Phill
Hahaha
Only with Utopia you can feel yourself truly protected.
Good old Mitnick, truly one of the greats if not th GOAT.
That said, for BadUSB attacks it is commonplace to do "PowerShell -WindowStyle hidden" and then injecting keystones intot the hidden window. Any payload large enough will take too long to be typed out on the run box which can be closed easily even by an inexperienced user.
Nobody will replace mr Kevin mitnick.. heats of sirr❤
I never expected Kevin would meet Dr.Phil. It’s just confusing af
he’s making it 10x harder than it actually is lmfao.
@@jakebarringham7248 It is really easy. Takes 2 steps
nah its already easy, what if he made it complex😂
Kevin Mitnick specialized in social engineering for his hacking. I think it was Motorola where he needed some technical specs from, so he would just call the office and ask some lower level employee to send it to him, like he was in another apartment.
lol,guys dont know who he was....he's the best hacker back in the days,the most wanted
@xOr you don't know how it works don't you? If he was born 15 years later, hacking tools would be 15 years more up to date and he would adapt to the changes, he is talented he did great at THAT time could you imagine what he would do if he was born at this time were every script kiddy can hack anywhere?
_Understandable, have a nice day_
Reading Kevin’s book now. Really cool stuff
At 1:46, Kevin being the greatest hacker still doesn't plug-in the cable in one go. Irony...
The training for that exceeds one lifetime
its the usb curse... it wont go until flipped 🙃
he's not the greatest hacker of all time
he's the most famous hacker of all time
Every USB cable has three sides
Lol I loved his title: “World’s Most Famous Hacker”
he is one of the most famous hackers
@@Coffee5432 maybe famous yeah but not the best. best one is someonewho nobody knows of😂
@@nanta18 Well it depends on category if we are talking white hat then this guy ranks high but if were talking black hats then yes you're right they're definitely anonymous.
Mitnick was the best of his era
@@Coffee5432 bah he just dumb
Thanks for the tutorial
Mitnick is the reason I’m in cyber security
RIP LEGEND, HERO and GOAT!!!
In this case the cable not did anything it was the utility, the Bluetooth Transmitter did the work, and you can be in Virginia, but he said that the transmitter works from 300 feet, so you need 1 more person..
What utility? Can you be more clueless?
The "Virginia" reference is more to illustrate that not necessarily is someone remotely close to you.
RIP Kevin Mitnick. Great mind in the field of Computer Science and Cybersecurity.
Wow.. Nice Video... Thank you
the cable thing is what i was worried about when my father bought an iphone cable from some sus brand, but luckily i found out that it’s somewhat legit
Being watched is scary but more scary to me, is them putting photos of young children on your phone and then calling police on you!!
Amber Nicole Massey yeah that’s what’s scariest to me. But hopefully they train units to know those signs but you just never know 😏
The Cóndor did it again!!! Although it would amaze me if the malware would've been in -h mode.
He called it a stick and I love it
Was that "The Stone" sitting behind Dr. Phil? 1:47 "Can you smellll-l-l-l what The Stone is baking?"
So basically the cable will then act as a keyboard and do input, great one :D
This video is the one i met Kevin Mitnick and can't believe he's gone. I got a lot of inspiration from Kevin Mitinick
I hope someday knowledge on computers and cyber security will be like Kevin 👍
Practice and repeat is the way to go.
@@vdofficialchannel9841Can't believe Kevin died💔...
Plot twist: It is an Apple ad...
Cybersecurity is so cool. I would love to get into that profession one day.
Dude u do not know tha hardwork behind that
So think twice
@@tinu949 yea.. I cant even scratch the basic of programming yet😂😂
@@tinu949 ikr i just started to learn about basic networking for a ccna exam and god damn it this shit's overwhelming. And the crazy thing is that network attacks are just a part of cyber security you need to have a strong knowledge about computer Hardware, software, programming as well python, c++, JavaScript... working with linux, scripting with bash, cracking software and that is just from the top of my head. Crazy stuff.
@@goldengiorno6890 It takes years bro. I'm a 3rd years CySec student and the information is STILL overwhelming. You literally can't know everything. But in the end it all boils down to simple defending to keep out hackers; filter ports, setup an IDS/IPS consisting out of millions of rules, prepared SQL statements, input sanitization, least privilege policy, updating regurarily, password policies and keeping updated on the newest CVE's. Now this still scratches the surface, ofcourse giant webapps could have vulnerabilities, but how many of them are actual RCE's or SQLi's? Most companies only get hacked nowadays through human error such as opening phishing mails with infected files.
Nice tip
Kevin is the best! 🤘
I have learned allot from Kevin back on 2005 especially the social engineering part i got my first job by proving to a manager how his system was weak one phone call in front of him to his it department pretending to be the cisco support team sending email to that guy and getting access to everything
Oh wow 2019 people just learning about ratting.
My thought exactly... Big ol yikes
Didn't know they could do it this way tbh
@@ElDiablo123 this way and a bunch of even scarier ones
@@ElDiablo123 I do it through pastebin
Its really not a big suprise when majority of people dont even like using computers, you expect them to know what a rat is. Lol
This guy was a legend
The way they show the entire PowerShell exploit unblurred lol
Why would they blur in anyways? You gonna run his script on your victims and give him access instead?
@@alexcorbett414 it’s a liability that I’m sure they didn’t realize they were involving themselves in. With experience working in IT for about five years, this is not a good thing. A kid, or really anyone can get their hands on these easily and learn. Sure, they’re probably on google, but seeing it first hand on a tv show can spark someone’s internet. Trust me, back when I was in high school, seeing things like that is how I learned so quickly.
Scripts for remote access are easy malleable and are not exclusive to giving only him access.
@@Ronnocbot I totally agree with what you're saying about inspiring people. I just want to say that his script was most likely for some RAT meaning the other people will probably need that exact thing, I could be wrong though, I didn't pause it and read the script myself but I'm assuming he used a RAT since he was talking about using the webcam, microphone, etc. Maybe it was a meterpreter shell or something like that. Been a while since I used metasploit so I don't remember what you can really do.
When did the Dr Phil Show become about tech?
Very good video. Thank you for sharing your knowledge and wisdom. I have a query. Is it possible that we can open multiple tabs for a website which allows us to open just one tab officially?
Great Kevin ever!
This is NOT how the majority of attacks happen, especially on older citizens.
It's much more likely they'll fall for spam calls or phishing links than "someone gave you a hacked USB cable for remote access to your computer"
Yeah, all these videos where they demonstrate how hackers do things are really not helpful for the average person's security. Maybe if you're a government official or a CEO of a corporation you might have to worry about a hacker getting physical access to your computer or hacking your webcam but for the average person these attacks take too much effort and are not profitable. What is profitable is guessing the terrible passwords people use for every single website and "hacking" their accounts. All these videos do is distract from that elephant in the room. It makes sense why they do it, the average person is probably entertained and concerned a lot more by a crazy hacker pluging in a flash drive and instantly taking control of a computer (even though the hacker already had access to it for who knows how long with admin privileges.)
0:24 Dr. Phil a freak 😳
Good to see this sort of information reaching the potentially uninformed..
Please share the full video
All he did was rat the other computer from a power cord that executed a command to powershell for the rat download.
I know I couldn't help but laugh the whole time
Ik.. mans used quasar RAT
Lol yeah you can literally download quasar rat in 1min and do the same thing.
And imagine how much Kevin got paid for this! Hilarious.
lol ikr
Good thing I don't have any money. I just sent the last of it to a Nigerian prince from my emails lol
That's why whenever I get a phone randomly in the mail I don't use the charging cable that came with it. It hasn't happened yet but I'm ready if it ever does.
Wow They Taught me a lot 😯
Remote computer in Virginia... Bluetooth trigger 5 feet away from Target... Convincing victim to press button on Bluetooth trigger to activate the payload drop... Seems like a likely course of events. *Eyeroll*
strikelight are you dumb?
But you realize that the Bluetooth device is not necessary. There can just be fixed delay before sending keystroke.
Once hackers learn about the pirate bay, they won’t need to hack people’s computer to find porn.
You know what's crazy, I live in Philly & I used to shoot live bands' shows & one night I got to the venue & realized all my camera cards were full. So I went to an electronics store on South St. to buy one & they offered to sell me one of their used cards (which they said they personally wiped) for cheap & I bought it. I shot the band & when I got home, I popped the card into my laptop's card reader to find all these naked selfies of a young lady... verrrry graphic ones. It was disturbing because they seemed like selfies & not something she'd want strangers looking at... I wonder how many others saw & downloaded those pics before they sold me the card.
And what did you do with the card?
Thank you
Just saying QUESAR RAT is the second most simple thing to do if you want to see inside a computer.
Pretty sure you could get a copy online if you wanted. LOL
to find a real hacker is quite difficult. I was tricked twice, and it took me six months to find a hacker who actually did the job. Moral of the story: I managed to do my job more before I did it, I lost it because of two bad people.
Shut up
One of Kevin's handles in his prime was Knight Lighting.
He is reliable and competent
“Your talking about a little..”
Sixnine: Dr. Phil has a white iPhone
Edward Stevens bruh. My Samsung came with a white cord too
so the usb cable acted as a keyboard sending keys?
Ignas Yup
I remember where people wrote down "Free Kevin" signs everywhere when he got arrested.
If you want an explanation:
USB can be used for more than data transfer, for example your keyboard and mouse are plugged in via USB which is exactly what is happening here. The little thick part on the end of the charging cable actually contains a very compact computer which pretends to be a keyboard and sends keystrokes to the computer.
The keystrokes here are that it holds win+R to open the run window (which allows you to run executables with arguments) it calls the powershell executable with the arguments /w 1 /ep bypass, or windowstyle 1 (hidden) and execution policy bypass (let’s you execute scripts) then it starts a try{} routine (attempts to run code within, if error it exits) and uses net.webclient and invoke-expression to download a powershell script (list of commands) into memory and execute it.
This opens a powershell script that runs in the background of the computer and most likely will take commands from a server, execute them, and send the output back to the server.
This is what’s called a reverse shell, it is the first step for an attacker to gain access. Anything you can do on a computer and more is possible from a reverse shell, including downloading files from your pc and downloading additional malware to the PC.
For those of you wondering how this is most likely done, its probably a modified usb rubber ducky, see a computer would scan a usb device and wont let it automatically run files on the flash drive,, but it lets HID(human-interface-devices) type things without a problem.. so a flash drive, would look like a flash drive but it would have code in it which will make it so that when the device is plugged in, it starts to type in commands which then downloads and runs malware... in this case he has made the cable become a keyboard using the same usb-rubber ducky concept
A less technobabble way to put it is that the device acts like a keyboard, opens the Run dialog with Win+R and runs a command to download a payload (the spyware) and run it
@sabinawendy4244 ong
Hacker has macOS, victim has Windows
Classic
Well macOS is Unix based, so it is able to run many tools that something such as Kali Linux could
@@Ordanbocker Puppy Linux is best
Well thats because 80% of the users use windows as their os. So, malwares are specifically created to target a particular os or a program. Wouldnt be surprise if something similar could happen on a macos but it might be abit difficult to say the least
Macs get equally hacked, its just less common because they have such a small market share.
@@googleinc6033 or worse, the malware is so advanced and non intrusive that it silently lives on people's macbooks
my question is how did he modified that charger, and the steps >:), good purposes by the way
I’ve been praying to get this script
I love how the dinosaurs are sitting in there chaires in fear and think: What if somebody could access all my non encrypted photos on my PC like this.
The dinosaurs?
@@notgreatnotterrible48years63 the older generations ie