How Hackers Could Wirelessly Bug Your Office

  Рет қаралды 932,785

Motherboard

Motherboard

8 жыл бұрын

You think about securing your laptop, but what about your desk phone, monitor, or printer?
In the second episode of Can I Hack It?, made possible by Mr Robot on Amazon Prime, white hat hacker Ang Cui demonstrates hacks on “embedded devices”-objects that contain computing systems but that you wouldn’t necessarily think of as computers.
At his office in New York, Cui shows us how he can turn an office phone or printer into a bugging device using a piece of malware he calls “funtenna.” This exploit makes the equipment transmit data over radio frequencies so it can be picked up by an antenna-without the hacker ever having to go near the device.
It’s a pretty high-level hack, but as Cui says, if he’s thought of it, you can imagine someone else has.
Click here to watch Mr. Robot on Amazon Prime: amzn.to/29zli1w
Subscribe to MOTHERBOARD: bit.ly/Subscribe-To-MOTHERBOARD
Follow MOTHERBOARD
Facebook: / motherboardtv
Twitter: / motherboard
Tumblr: / motherboardtv
Instagram: / motherboardtv
More videos from the VICE network: www. vicevideo

Пікірлер: 904
@maxhale2382
@maxhale2382 7 жыл бұрын
I think the most important part of hacking is having as many windows open as possible. Preferably with scrolling multicolored text.
@suicidaljell
@suicidaljell 6 жыл бұрын
Max Hale that’s how you can tell they are deep in it.
@seanld444
@seanld444 6 жыл бұрын
Not true. You forgot the flashy fingers gliding across the keyboard like it's a race against time.
@iKingRPG
@iKingRPG 5 жыл бұрын
Max Hale when in command prompt do "color a" there. You are a hacker now. Congrats.
@rabbitdrink
@rabbitdrink 5 жыл бұрын
@@iKingRPG just do base64 -w 0 < /dev/urandom
@zxxczczczcz
@zxxczczczcz 5 жыл бұрын
@@rabbitdrink what does that do?
@qwertywtflol
@qwertywtflol 8 жыл бұрын
Sponsored by Amazon, the biggest collector of customer/consumer data on the planet.
@Falcrist
@Falcrist 8 жыл бұрын
Second biggest after Google IIRC. Also, don't forget about Microsoft and Apple.
@ElXtronic
@ElXtronic 8 жыл бұрын
& they still aint worth a damn thing.
@Jesus.the.Christ
@Jesus.the.Christ 7 жыл бұрын
Don't forget about the NSA.
@Falcrist
@Falcrist 7 жыл бұрын
Jesus Christ They're not a collector of customer/consumer data. They're a collector of *_EVERYONE'S_* data.
@Jesus.the.Christ
@Jesus.the.Christ 7 жыл бұрын
Falcrist What's the difference? Don't forget that government is a business. It's an overly large and cumbersome organization structured so that parts of it can make some people a lot of money.
@bdeflorence
@bdeflorence 4 жыл бұрын
It's called RF imposition. The Russians used this technique to bug the US Moscow embassy in the 70's. At the time, it required a very large antenna to collect the signals. Basically, the vibrations of the molecule of air (i.e. sound) will make any object in the room also vibrate, and that includes electronic circuit boards. As per Maxwell equations, as mentioned by the chap, a vibrating electronic circuit board, even if switched off, will generate an electronic signal. It then becomes just a matter of collecting that signal.
@jaqb17
@jaqb17 8 жыл бұрын
<a href="#" class="seekto" data-time="45">0:45</a> holy shit that setup!
@xteam29
@xteam29 8 жыл бұрын
Those 2 Dell monitors are just crazy!
@edg6779
@edg6779 7 жыл бұрын
2 dell monitors and a shit apple keyboard
@edg6779
@edg6779 7 жыл бұрын
***** i have a mechanical keyboard, 10k dpi mouse, h440 case with i5 4590 and a 760 but my monitor is a boring 1920x1080 60Hz dell :(
@joaobernardocosta
@joaobernardocosta 7 жыл бұрын
The funniest thing is that the chair is as expensive as one of those monitors.
@markrigsby2107
@markrigsby2107 7 жыл бұрын
jaqb17 Gotta love it
@jason-ge5nr
@jason-ge5nr 8 жыл бұрын
If this guy figured it out what has the NSA been able to do for the last 15 years
@CellularInterceptor
@CellularInterceptor 8 жыл бұрын
The government agencies have way better systems than demonstrated here. I can neither confirm nor deny its existence.
@Kyle.Moda.Deluca
@Kyle.Moda.Deluca 7 жыл бұрын
The POC being explained here is nothing new by no means! In the early 90's, Cult Of The Dead Cow (Hacker Group) went before Congress to speak about such things. They had fears that, if they can do it... so could other people. They spoke about a method known as tempest ( en.wikipedia.org/wiki/Tempest_(codename) ). They've known about this ability for quite some time now. It's just become super easy, since the advent of Wifi based devices!
@doublebubleguy12
@doublebubleguy12 7 жыл бұрын
I know it sounds impossible but I know a retired officer who use to work in a prison system back in the 90s. They used a database of files on all of their prisoners on an off grid intranet that could only be accessed via the prison system. Well it just so happened the FBI showed up asking for two prisoners that needed to be taken in for classified reasons not even telling the sheriff the reason for it. They pulled out a piece of paper with a screenshot of the two prisoners files which was obviously screenshotted from a computer within the off grid database. They had never been to the prison system before and it would have been impossible to gain access to the information over the internet since every computer was offline. The Sheriff asked the two agents how did they get that information as only that single prison system had it, the agent told the sheriff that it was classified information on how they obtained the screenshot from within the prison. The agents left with the two prisoners and told the sheriff that they were never there. Either two things I can think of that happened. "A" Their was an undercover agent disguised as a cop working their downloading information to a drive and sending it to the FBI which sounds kind of stupid considering they could have just asked the sheriff for the files on the prisoners or "B" They gained access through the power lines somehow.
@jason-ge5nr
@jason-ge5nr 7 жыл бұрын
the data storage facility in utah, the big one, has internet but they used the term 'airgapped' to describe all the connections to the outside world.
@vlad-pm2zr
@vlad-pm2zr 7 жыл бұрын
Question should be "what can they *not* do"
@Aaron-dt3xz
@Aaron-dt3xz 4 жыл бұрын
I like how the thumbnail just says motherboard with a guy pointing to a motherboard
@daxutuc
@daxutuc 3 жыл бұрын
I was searching this comment
@prakharmishra3000
@prakharmishra3000 3 жыл бұрын
@@daxutuc me too lol
@adrianmego1
@adrianmego1 4 жыл бұрын
The critical piece of information he gave is that there has to be an entry point into your network, and for him it was a CV containing malware. 80% of attacks are initiated this way, so - secure your endpoints or get decent mail service guys and gals...
@8224shivaram
@8224shivaram 5 жыл бұрын
This is one of the key reasons why following PCB design guidelines For Reduced EMI is so critical :P
@mrinalthakur3459
@mrinalthakur3459 4 жыл бұрын
Just shield the entire thing after finishing the population process
@RDHDShorts
@RDHDShorts 4 жыл бұрын
@@mrinalthakur3459 thats perfect and cheap also
@carterpeel625
@carterpeel625 3 жыл бұрын
@@RDHDShorts not cheap.
@Reth_Hard
@Reth_Hard 3 жыл бұрын
All my devices are wearing tin foil hats, including me.
@ibimon
@ibimon 8 жыл бұрын
By the way this is second time I see red balloon mentioned in security tech, looks like they're about to become pretty big. Good luck guys.
@maxp9292
@maxp9292 6 жыл бұрын
Good to now that we have willy billys support
@clashwithmoi8926
@clashwithmoi8926 5 жыл бұрын
what they are doing is super underappreciated. wired devices with embedded systems really need to start insulating components so that no information leaves the device wirelessly
@diggydice9041
@diggydice9041 5 жыл бұрын
Yep & my laptop is a Republic of Gamer's unit & even though I didn't know about blue-tooth for my pc, my neighbor did know & was busy trying to gain access when I caught him red handed...... When I buy again It'll be decked out in the best defensive stuff I can get/set-up. It really sucks how they violate people. peace
@genkiferal7178
@genkiferal7178 2 жыл бұрын
my understanding is that those devices are being used to jump from one device to another to transmit data that customers want to have transmitted - or have signed off on. Maybe a frig manufacturer wants customer usage info for marketing or product design reasons, for example.
@sapphiro
@sapphiro 8 жыл бұрын
You can bug me all you want, I have put a sticker tape on my phone's camera. All you can get is me moaning.
@WilliamSchlott
@WilliamSchlott 7 жыл бұрын
I'd rather get my girlfriend moaning thank you.
@nawman2033
@nawman2033 7 жыл бұрын
Fuckin hell William you sausage
@potato511
@potato511 7 жыл бұрын
and keylogs, and passwords and usernames, and facebook profiles which have pictures ;D
@mario6279
@mario6279 7 жыл бұрын
Benjamin Lafever yup that good old spyware
@AshisKumarSahoo1
@AshisKumarSahoo1 7 жыл бұрын
moan your mother's Maiden name and that should be it.
@jeffbrownstain
@jeffbrownstain Жыл бұрын
Six years later and this exploit has yet to be seen in the wild
@Plur307
@Plur307 8 жыл бұрын
Properly shielding electronics would make them not vulnerable to this hack. But the hack is still quite clever. All it takes is a thin sheet metal cover over the circuit boards to absorb almost all the emitted radio waves.
@RustyB5000
@RustyB5000 8 жыл бұрын
2 hours after this video was posted that guy disappeared from outside his apartment.
@keybraker
@keybraker 5 жыл бұрын
The problem with these old hacks, is that they are super easy to defend. People who have sensitive data use better printers, and not stupid ones obviously.
@nickigna
@nickigna 8 жыл бұрын
Feels like Motherboard is cranking up the paranoia on "everything hackers".
@JohnDoe-sp3dc
@JohnDoe-sp3dc 4 жыл бұрын
@@shenshenani5913 motherboard is NOT for analysts and other security professionals it's for uninformed tech illiterate people.
@egg-iu3fe
@egg-iu3fe 2 жыл бұрын
the real hackers to be afraid of are the ones in government. They are spying on you right now.
@gwengold1342
@gwengold1342 4 жыл бұрын
I would work for this guy for free just to gain knowledge
@dkipu266
@dkipu266 3 жыл бұрын
You could build all this, or pay Google or Amazon for the feeds they continuously collect from devices you use everyday. Even using a VPN Service is of marginal benefit if you’re going to authenticate to any of your online accounts, as those accounts and your devices registering to networks are going identify you when you authenticate. That said, what this team is doing is really important work, as these devices are very vulnerable, and for all of the dollars we spend securing PC’s and Tablets, a good pen test will show you how vulnerable your voice and printing devices are as well...this team takes it to a level.
@Flankymanga
@Flankymanga 4 жыл бұрын
You could say that every electronic device has it.... because what they are doing is turning an PCB copper path into transmitting antenna by quickly changing voltages and generating EM field. But there is a catch... you would not normally have connected a printer and a VoIP phone on the same corporate network. Meaning it has to go through either managed switch or a router - in which case there is a high chance that there would be a firewall rule to drop the packet.
@NetIncarnate
@NetIncarnate 8 жыл бұрын
Trust these guys to reference Neuromancer! Excellent work.
@gatekeeper9161
@gatekeeper9161 4 жыл бұрын
LOL WOW THIS KID FIGURED OUT WHAT SOME OF US HAVE BEEN BRUTALIZING FOR 20 YEARS AND MORE
@potato511
@potato511 7 жыл бұрын
<a href="#" class="seekto" data-time="195">3:15</a>.....oh god that look....they've already bugged us all burn everything!
@TheTarrMan
@TheTarrMan 7 жыл бұрын
So is this hack going to be involved one of the next episodes of Mr Robot? Pretty cool!
@XxprobertsonxX
@XxprobertsonxX 8 жыл бұрын
Motherboard video with a motherboard in the thumbnail. About time.
@christophervenkus1276
@christophervenkus1276 8 жыл бұрын
We had all better behave.
@Em.P14
@Em.P14 5 жыл бұрын
THEY HAD A VIPER MK II IN THAT SHELVE !!!AWESOME GUYS!
@hajiosama9352
@hajiosama9352 3 жыл бұрын
Where? Kindly mention time.
@Em.P14
@Em.P14 3 жыл бұрын
@@hajiosama9352 im sorry but this was 2 years ago, no chance that i would be able to remember that. Id have to rewatch the entire thing again
@ggvic7
@ggvic7 8 жыл бұрын
"through the network" is the key phrase. It's easy if you have direct access to the devices that you want to exploit if they're 2 feet away from you, like shown in the video, but if you're outside the network, you'll still need to bypass layers of security to get your software through. Still, pretty cool though.
@AeoIian
@AeoIian 7 жыл бұрын
Nice! May work well in open areas but not through bunkers of concrete.
@Granite
@Granite 8 жыл бұрын
Typically the door is wide open. This seems to be a bit excessive.
@mrepic789
@mrepic789 8 жыл бұрын
But how powerful (in watts) is the transmission
@furatkafir3819
@furatkafir3819 3 жыл бұрын
he receives only few meters away, i think it is not powerful
@mahmoudaboelsaoud253
@mahmoudaboelsaoud253 5 жыл бұрын
wow!, i wish to work and learn from and with these guys they look well talented
@JaySmith-rv4ro
@JaySmith-rv4ro 6 жыл бұрын
It kills me how people talk about how they’re so surveilled by the gov but are spied on and robbed (through tech) by their fellow man.
@jethro9341
@jethro9341 4 жыл бұрын
Those dudes had no idea what to do with themselves with a cute girl that close to them!
@elck3
@elck3 3 жыл бұрын
What would you do?
@jethro9341
@jethro9341 3 жыл бұрын
@@elck3 business as usual my dude
@rijaja
@rijaja 3 жыл бұрын
<a href="#" class="seekto" data-time="62">1:02</a> My phone is very insecure. Most of the time, it can't gather the courage to show me notifications when I get a text message. Unfortunately, phones still aren't accepted in therapy.
@mukhtarsalim
@mukhtarsalim 7 жыл бұрын
This is amazing and a great work
@savagescientist3835
@savagescientist3835 3 жыл бұрын
please add part 1 in description so i can see full series thank you
@MrGoatmeat
@MrGoatmeat 8 жыл бұрын
the London look X D
@burnzy3210
@burnzy3210 8 жыл бұрын
what?
@TBlasku
@TBlasku 8 жыл бұрын
He was referring to the gap between her teeth :)
@coolxify
@coolxify 5 жыл бұрын
Its supposed to mean the leather jacket black leather boots etc
@peterodriguez9191
@peterodriguez9191 4 жыл бұрын
London has fallen. Like the movie
@stevenpersoon
@stevenpersoon 5 жыл бұрын
For most, if not all embedded devices it's not possible to flash a microcontroller by JTAG or bootloader without extra external hardware. Also, devices without a dedicated antenna wouldn't be abled to transfer any reliable signal... And what about RF shields...
@furatkafir3819
@furatkafir3819 3 жыл бұрын
yes, i thought about this limitations too. even with new devices with possibility to upgrade firmware via internet there will be phisical limitations on transmitting power and receiving range, even if you use low bitrate protocol like LORA.
@INeedAttentionEXE
@INeedAttentionEXE 6 жыл бұрын
Anything that has RF in it thats embedded, uses the ARM archetechture :D. Lifes good
@ibimon
@ibimon 8 жыл бұрын
I suspected that HR ATS can be hacked trough applications, but didn't think it was as easy as he explained.
@maynardjohnson3313
@maynardjohnson3313 4 жыл бұрын
I don't think that any of Maxwell's equation has anything to say about the feasibility of hacking embedded devices. It sounds scholarly though.
@nokoru1
@nokoru1 5 жыл бұрын
<a href="#" class="seekto" data-time="402">6:42</a> "...and what makes it particularly impressive is how it can transmit data using radio frequencies..." wow!...wait...
@skinnybob_
@skinnybob_ 4 жыл бұрын
groundbreaking technology here
@MrMongo321
@MrMongo321 8 жыл бұрын
Brilliant!
@AnymMusic
@AnymMusic 5 жыл бұрын
I am so happy to have a hacker as a friend.
@codydixon9635
@codydixon9635 8 жыл бұрын
Some of those guys have setups to die for D:
@coolxify
@coolxify 5 жыл бұрын
Ijr
@coolxify
@coolxify 5 жыл бұрын
Lul ikr
@L3uX
@L3uX 8 жыл бұрын
Nsa has already been doing this years ahead.
@MrLogannator
@MrLogannator 8 жыл бұрын
Just look at DangerMouse
@MrLogannator
@MrLogannator 8 жыл бұрын
***** its the code name for the Nsa program that listens in on your phone call and monitors them
@beating2
@beating2 8 жыл бұрын
Snowden leaked documents on how NSA spying on their own people some 3 years ago.... You live in a cave or something......
@ultort
@ultort 8 жыл бұрын
Yes, it's well known, you can have a look to the "NSA Ant Catalog". But hacking to RF without modifications on a non emitting device is almost impossible because the signal will most likely be very small, maybe under the noise level. If you have wifi on a printer, you may be able to hack the wifi to transmit data via RF.
@arzoo_singh
@arzoo_singh 6 жыл бұрын
And way more then we know ....
@thedarkside13
@thedarkside13 4 жыл бұрын
<a href="#" class="seekto" data-time="55">0:55</a> My boy eating Noodles and Sriracha!...
@leweed3049
@leweed3049 Жыл бұрын
So cool, btw is this openSource?
@F1delF1estasMC
@F1delF1estasMC 8 жыл бұрын
uploaded by "motherboard", tumbnailof a guy pointing on a motherboard....
@dave.h4075
@dave.h4075 4 жыл бұрын
In a world that demands certification to prove our qualifications. How does a hacker prove that he is 'white hat', especially in his alone time.
@Clay7744
@Clay7744 4 жыл бұрын
Pay them enough to not want to be black hat
@dave.h4075
@dave.h4075 4 жыл бұрын
@@Clay7744 because 'enough' will always be sufficient? :))
@Clay7744
@Clay7744 4 жыл бұрын
@@dave.h4075 Then we make them kings (im a pen tester)
@dave.h4075
@dave.h4075 4 жыл бұрын
@@Clay7744 I guess the point I was trying to make is that one doesn't simply come out of the hive looking for the job unless someone spills the beans all be it few in some cases.
@maxwellkuagbenu4647
@maxwellkuagbenu4647 4 жыл бұрын
I'm love what you do. Please when do you started this.
@screwthenet
@screwthenet 5 жыл бұрын
All this has been foretold. And this is the type of crap that makes low tech or no tech so much more desirable.
@evanwetmore423
@evanwetmore423 8 жыл бұрын
Finds out massive exploit in phones... Uses a apple keyboard
@jelpy
@jelpy 7 жыл бұрын
Sgt UltraKill the fuck does this even mean
@cokbagus23
@cokbagus23 7 жыл бұрын
means a lot
@Linkz64
@Linkz64 6 жыл бұрын
Evan Knight an*
@Linkz64
@Linkz64 6 жыл бұрын
Evan Knight Apple*
@Linkz64
@Linkz64 6 жыл бұрын
Evan Knight Also have you ever heard of NSA? Google DangerDouse.
@MariaMartinez-qj7wc
@MariaMartinez-qj7wc 8 жыл бұрын
walala wow its so intresting how we are vulnerable no matter where...
@Matherofacts
@Matherofacts 8 жыл бұрын
+Samuel Mason It's an expression that comes from the French voilà which literally means see there.
@mrmagoo9901
@mrmagoo9901 8 жыл бұрын
Whats really interesting is that George Orwell had this figured out a long time ago and now we sit watching it happen to us in bewildered fascination...
@Matherofacts
@Matherofacts 8 жыл бұрын
When you say it in french it's pronounced vwallah. French is my second language. 
@HiAdrian
@HiAdrian 8 жыл бұрын
*+00 Gaudie* But your mouth has to actually make an *O* along the way, which is why plain "va" misses the mark.
@Matherofacts
@Matherofacts 8 жыл бұрын
Samuel Mason​ Yeah exactly, but after the V add a W sound like vwah. That's how they pronounce where I live.
@bollymolly6011
@bollymolly6011 4 жыл бұрын
Some how He's looks so happy about it
@adrianoldchannel2494
@adrianoldchannel2494 6 жыл бұрын
Beautiful.
@Stottage
@Stottage 8 жыл бұрын
This is amazing. Shame she has no idea what's going on
@ambassadorofpain1
@ambassadorofpain1 8 жыл бұрын
I'd say she actually did very well, it's difficult to explain technical concepts to people that aren't aware. She caught on quite quickly and understood the application value.
@mrmagoo9901
@mrmagoo9901 8 жыл бұрын
I don't think it's important that she understands the details...What's more important is that you understand
@tesseract342
@tesseract342 6 жыл бұрын
whats the point of having her if she does not contribute
@LordAugastus
@LordAugastus 8 жыл бұрын
why is motherboard now focusing on fear mongering to the non tech literate? Most hardware hacking relies on being with the machine this means....digital hacking is still a long and time intensive process.
@prestonwest2828
@prestonwest2828 7 жыл бұрын
I didnt see it as fear mongering. Seemed to me like those guys were eager to show just the capabilities are possible and educate the masses.
@LordAugastus
@LordAugastus 7 жыл бұрын
what capabilities? Hacking some phones apart and figuring out how to create a miniscule RF signal? a signal so weak that you would have to be in the room. right next to the printer to even detect. and did you see the processing speed? like a word a minute man, they spy will stand there like an idiot going hea man i just have to print something for 14 days straight. Just saying, nothing to fear people, as long as you have a mobile device, what ever country holds the company will probably have way to spy on you. So once again, wtf are you talking about, "educating", any reasonably educated man will see this video and laugh.
@spydergs07
@spydergs07 7 жыл бұрын
You do realize they could easily amplify their AM antenna receiver and be able to receive signals a few blocks away.
@existenz55
@existenz55 7 жыл бұрын
You can`t. RF signals are pretty weak (even if you build a monstrosity antenna, the signal that is sending will be week and you will not get it unless you are in the same room). I have a problem connecting to me WIFI on the second floor (using a 400$ WIFI ROUTER and external 100$ WIFI antena), imagine how big the antenna on the phones and printer are..
@CodeAsm
@CodeAsm 6 жыл бұрын
Directional antenna, and your only "recieving" the signal... your extracting data. thats not the same as weak wifi, thats also on a very very busy frequency (probably why its so "weak" for you aswell) all the neighbours uses Wifi, bluetooth is on wifi, alott of IoT devices, and some of those wireless led controled lamps might not be on wifi or bt, they are often on 2.4Ghz (or 433Mhz, wich also can be full of noise). get an directional antenna, send data out multiple times with a small checksum and wait a few hours for the password to be send over... im sure at night it even gets better. at day you collect and at night you recieve it. github.com/fulldecent/system-bus-radio
@myongpark
@myongpark 6 жыл бұрын
Hey, he used the word "theory" in the correct context! That's more impressive than the skills, or maybe an indicator of why he has them.
@_msnnanbakbshhsn
@_msnnanbakbshhsn 5 жыл бұрын
Is there a video talking about security vulnerabilities in hardware like processors and such.
@scodiofficer0012
@scodiofficer0012 4 жыл бұрын
*You can't hack our office,we all use Incognito Mode*
@Dex99SS
@Dex99SS 6 жыл бұрын
Funny how all of the "common office equipment" was "hacked by software only, never touching it"... Yet every one of them had their cases removed, wires hanging out, ribbon cables jumbled out the sides, alligator clips roughly plugged in supplying power, lol... None of this was done elegantly over a network via software. But instead, all of it is hypothetical via hardware mods, physically turning electronics into radios by adding RF transmitters to them... which is the large PCB hanging off of the ribbon and alligator clips. And if we are really pretending that we are sending RF out of circuitry which has no radio, no antenna, no tuner what so ever... and just glossing over the hardware issues there, pretending you can turn any resister, capacitor, and IC into a transmitter... Well, as a radio engineer who develops tower technologies / installs said tech, I can tell you that they would (if they could) transmit all of about a half an inch in distance... at best. Without dedicated amplifiers, tuned antennas, and a frequency capable of both distance and some level of penetration, it would be hopeless. And seeing as how most inexpensive two way radios, which are built for this task, can't even do all that well in a commercial building environment... i highly doubt your magic phone radio made out of software that looks like PCB's hanging off of ribbon cables out of the back of a busted open but never touched office phone is going to do much better. This entire piece is basically fluff...
@BigDaddy-yp4mi
@BigDaddy-yp4mi 6 жыл бұрын
You COMPLETELY missed what the fellow was talking about. It CAN and HAS been done for years...by NSA. Danger Douse was their program from over 10 years ago. He piggybacks on that. No microphone, no speaker, fuck with the currents going through them, they then emit radio energy in predefined contexts which can be picked up with SDR equipment and then decoded. The disassembled parts were for testing purposes. The stuff attached was to show there REALLY is stuff going on but to prove it, it has to be disassembled. Jesus, and to think people like you probably vote....
@jonesbbq307
@jonesbbq307 5 жыл бұрын
Then tell me how can a printer without any antenna emit any radio frequencies?
@jedi.knight7260
@jedi.knight7260 5 жыл бұрын
Colson Xu install malware on device which can be done remotely (that’s why a resume was sent to force someone to open and send the malware to printer) afterwards the wires and components of the device can be turned into radio transmitters. That’s why it’s called hacking, to change its original purpose into something that it wasn’t intended to do. The device is then FORCED to emit radio signals to a radio receiver using software instead of hardware and an AM antenna. A transmitter is a different kind of antenna that does the opposite job to a receiver since it turns electrical signals into radio waves that can travel thousands of kilometers around the earth. Hacking might not be your thing if your unable to search for knowledge since that’s what hackers do, they critically think and search for answers, rather then demand them.
@travismailsa1
@travismailsa1 5 жыл бұрын
Please use google when you ask such stupid questions. Do you know any current passing over a conductor produces EMF? Start there and use google
@travismailsa1
@travismailsa1 5 жыл бұрын
Its demonstration in this video, secondly the devices were taken apart to discover and then test these exploits, whereby they can then access them remotely and exploit what was DEMONSTRATED in this video.
@thomaslindell5448
@thomaslindell5448 5 жыл бұрын
Yah that bit rate is awesome
@Serj772
@Serj772 5 жыл бұрын
<a href="#" class="seekto" data-time="55">0:55</a>, is that guy in his undewear? hahah
@kman4thewin865
@kman4thewin865 4 жыл бұрын
IT LOOKS LIKE IT LMAO good eye
@Eremon1
@Eremon1 5 жыл бұрын
Don't piss that guy off!!
@joemammon6149
@joemammon6149 7 жыл бұрын
this is great for industrial espionage. learn all about their competitors' secrets within comforts of your office.
@prestonwest2828
@prestonwest2828 7 жыл бұрын
lol
@sultanmehmoodghaznavi6312
@sultanmehmoodghaznavi6312 3 жыл бұрын
I had this idea all the time but didn't knew it was possible.
@sergiogranadamoreno
@sergiogranadamoreno 8 жыл бұрын
nice to see victoria back in these vids
@TheMarcomm97
@TheMarcomm97 7 жыл бұрын
For some reason I have the feeling the US goverment has already been using it.
@chopstickftw0121
@chopstickftw0121 5 жыл бұрын
FEELS LIKE WATCH DOG 2!!!!!!
@siriperera6974
@siriperera6974 6 жыл бұрын
Actually, all this is already in play in every household. It is very easy to confirm yourself what this video says. Take that part at <a href="#" class="seekto" data-time="145">2:25</a> minutes about switching on the microphone on the phone (i think he mentioned switching the input/output ports). What he meant was just switching on the handsfree on the phone on without you knowing and without having the led light come on. When this happens, the microphone now on just completes the induction loop system that is your home. Now all your conversations are reflected in the magnetic modulations in the wiring in your home. All converted to FR signals etc and software radio will pick this up. But more so is that all the buzzes and pings and white noise sounds in your living space will modulate to your thinking, with that microphone in your phone switched on. Hence your thinking can be known by anybody who is listening or anybody who knows how to read tonal modulations. It is like learning a new language and with time you should be able to listen to your thinking in all the appliances around your home. But that is what they are doing at the moment. If there is such a thing as the funtenna software then they will get them downloaded via either your phone line or your internet line. In some cases they are both the same line. If you want to hear this signal coming into your home to switch on the handsfree for a listen in, you can do this by attaching an induction loop receiver to the access point for your phone line. You only need to tape it to the access point gadget - it will pick up the magnetic fluctuations from the phone access point.
@blackpage716
@blackpage716 5 жыл бұрын
look into the Nsa ANT catalogue mind blowing
@SportsIncorporated
@SportsIncorporated 5 жыл бұрын
Your best defense - is to not have anything worth stealing.
@gonzalo4658
@gonzalo4658 5 жыл бұрын
hold on there cowboy
@buzifalus
@buzifalus 5 жыл бұрын
Western society is already superfluous
@slovokia
@slovokia 8 жыл бұрын
It's so easy to snow non technical people with wizbang demonstrations. But how well does the tech actually work in the real world under realistic conditions?
@monsterpda
@monsterpda 8 жыл бұрын
Well, they used normal, real phones and printers in what seems to be a reasonable network to do the job. I don't think they'd invest that much money on something entirely hypothetical. I'm by no means an IT expert, but at least the physics of it are simple and sound.
@DriftJunkie
@DriftJunkie 8 жыл бұрын
It's easy to tinker with data that is transfered through devices. Just put a magnet to it. But rewriting software with radio waves is something that even I wouldn't think of seeing even in Action movies. From my electronic education, such things are not possible.
@monsterpda
@monsterpda 8 жыл бұрын
***** Nobody said anything about "rewriting software with radio waves". Aside from the fact that you transmit pretty much anything with radio waves, albeit relatively slowly, they said they used a PDF-Document to corrupt then printer and then use the network of this fictional office to change the firmware of the phones. Sounds legit to me, but then again, I'm not a pro. The radio waves were just used to transmit the gathered data to an outside receiver.
@neandercatz8877
@neandercatz8877 7 жыл бұрын
Peter Spalthoff Right and that the pdf changed the firmware but I don't think that these things are in anyway feasible
@spydergs07
@spydergs07 7 жыл бұрын
The PDF sent to a computer on a network, the same network that the printers are on is what changed the firmware in the printer. Since the PC and printer are on the same network, that is not only 100% achievable but not that hard. You can easily embed whatever code you want into a jpg/png, pdf, word, excel, etc. The printer then communicates with the phones on the network and gets the magnets to pick up sound vibrations and can transfer those. This is actually achievable even in real world applications. Not easy but achievable.
@coachmichaeldeer
@coachmichaeldeer 4 жыл бұрын
Do you have service in NY? Sounds cool!
@davdiaz24
@davdiaz24 7 жыл бұрын
JUST WOW! Sor interesting. I would love to work with these guys for free...
@alkeryn1700
@alkeryn1700 5 жыл бұрын
<a href="#" class="seekto" data-time="55">0:55</a> ls ls ls ls oh yeah i'm working l33t h4x0r
@HashimAziz1
@HashimAziz1 3 жыл бұрын
Hahahaha
@RobinToTheBatCave
@RobinToTheBatCave 8 жыл бұрын
the cia invest in this kind of stuff :| and you know who's buddies with the cia? the ceo of niantic (pokemon go). kinda creepy that pokemon go could be used as a trojan horse to plant software on everyone's iphones and android devices. pretty scary if you think about it, and might be a move to bypass apple's encryption (remember the whole fbi lawsuit?). if you have nothing to hide, then you should have nothing to worry about (that will be their argument if this is the case), but is completely losing all of your privacy really worth national security? murders and shootings are a product of society, and if the government doesn't recognise that and take action it is their fault, but people shouldn't have to give up their privacy because a government is lazy.
@KCFindsDesign
@KCFindsDesign 5 жыл бұрын
RobinToTheBatCave agreed
@kyleskwarek3893
@kyleskwarek3893 5 жыл бұрын
Well said
@ramsesrameez5430
@ramsesrameez5430 3 жыл бұрын
Now that's is what i am talking about. Hacking with a tiny mother board.
@-_IT_-
@-_IT_- 5 жыл бұрын
brilliant!
@austin7530
@austin7530 7 жыл бұрын
Cool shirt bro
@Crazy--Clown
@Crazy--Clown 6 жыл бұрын
Ya'll Finished Or Ya'll Done? *The shirt is gay*
@sudheer7595
@sudheer7595 4 жыл бұрын
Who came here at 2k19
@razzya2710
@razzya2710 3 жыл бұрын
2019 wasn’t that bad
@zachsylvester309
@zachsylvester309 4 жыл бұрын
Speakers can be microphones. *Takes out buzzer from the motherboard.
@nivalius
@nivalius 5 жыл бұрын
suddenly theme from Syndicate starts to play in my head
@ferna2294
@ferna2294 5 жыл бұрын
That´s why I don´t let incels inside my office.
@NegyoTV
@NegyoTV 8 жыл бұрын
Mr Robot is real?
@SlashZooka
@SlashZooka 8 жыл бұрын
ofcourse.
@avoqado89
@avoqado89 8 жыл бұрын
As is watch dogs!
@avoqado89
@avoqado89 8 жыл бұрын
***** I think I need to make a sacrifice to please the Blackhat gods to not spite me
@Ownage4lif31
@Ownage4lif31 8 жыл бұрын
+avoqado89 fuck blackhat. Grey or white hat is where it's at. Stealing is wrong
@rootsec8266
@rootsec8266 7 жыл бұрын
It's more fun than you think. ;)
@socrates_the_great6209
@socrates_the_great6209 4 жыл бұрын
So its not the wifi antenna inside the printer sending the signal? It must be?
@TheYamakasiize
@TheYamakasiize 4 жыл бұрын
Thats why I don’t use any technology and none in my possession. I am now commenting through a wooden stick and a rock tie to an owl.
@svp3rn0v47
@svp3rn0v47 3 жыл бұрын
The scary thing is that one hacker can "knock-out" a whole country.
@mmm053
@mmm053 4 жыл бұрын
If Michael Jackson was a Chinese woman, he'd look like this guy.
@WhopperFPV
@WhopperFPV 7 жыл бұрын
<a href="#" class="seekto" data-time="59">0:59</a> I didnt know you could bug a racing drone. What are you going to do turn the motors on and off?
@maidenfan237
@maidenfan237 4 жыл бұрын
im amazed and frightened at the same time lol
@STRAIGHTBOXMUSIC
@STRAIGHTBOXMUSIC 6 жыл бұрын
These guys are just doing hobbyist shit. Real world scenarios don't allow for you to experiment with cisco phones and open up printers in an office and encode bits to send through the air. Just place a bug in a wall socket or use a glass audio tap and transmit back to yourself. Stop making things 1980 by reinventing the wheel with old tech.
@DoesNotGiveAF
@DoesNotGiveAF 5 жыл бұрын
@mike benjamin Lol spoken exactly like someone who doesn't know shit and worse lacks respect for what he doesn't understand or for the people clearly smarter than him but feels the need to spread their some how justified and totally irrelevant ignorance with (such clever) "answers" that of course have NOTHING TO DO WITH THE MENTIONED APPROACH hence NO PHYSICAL ACCESS! Did you even listen to what he said they do? Because that IS EXACTLY how vulnerabilities are found and exploits developed in hardware and software alike, usually in combination of the two with IOT products.. In order to manipulate something to do what you want, you first have to understand how it works. How do you propose said "real world scenarios" work? They just think about proprietary hardware/software and with a wave of their 1337 wand magically h4x0rZ happens? Lmfao! Reverse engineering is literally a field of it's own and is usually a large part of hacking in many including the given context. Worst of all your comment of "hobbyist shit" is complete stupidity and nonsense.. THATS WHERE HACKERS AND HACKING CAME AND COME FROM DIP SHIT. Learn something before you go around talking shit because you look like a fuckin' twat to anyone with any knowledge of penetration testing and/or hacking, what it is, and what its about. Have a nice day!
@apnearocker
@apnearocker 4 жыл бұрын
How did it start with the resume?
@xorxpert
@xorxpert 6 жыл бұрын
I wonder why signals aren’t encrypted? I guess it could cause latency but signals in which you can easily just read its binary and convert is crazy, and that it’s just a string and not wrapped inside of packets
@mcoyid
@mcoyid 5 жыл бұрын
Mind Blown
@loisnana5720
@loisnana5720 5 жыл бұрын
for softwares,unlocking,hacking,website hacking dm @WhatsApp +1(323)6214182
@jimsinnovations2737
@jimsinnovations2737 4 жыл бұрын
wow id love to meet these guys an collaborate on projects
@TongTangTorq
@TongTangTorq 8 жыл бұрын
Would the hacker have to have access to the network that the phone/printer is on, in order to send it the software to produce RF signals of the audio?
@tomsbunk3790
@tomsbunk3790 5 жыл бұрын
The men in black jacket only smile while enjoying their coffee break..
@Maniacguy2777
@Maniacguy2777 4 жыл бұрын
Fantana technique is used by military people sending code messages through sound.
All The Ways To Hack Your Phone: Phreaked Out (Episode 3)
19:06
Motherboard
Рет қаралды 1,6 МЛН
Hack everything: re-purposing everyday devices - Matt Evans
50:39
Linux.conf.au 2012 -- Ballarat, Australia
Рет қаралды 798 М.
OMG😳 #tiktok #shorts #potapova_blog
00:58
Potapova_blog
Рет қаралды 3,6 МЛН
Vivaan  Tanya once again pranked Papa 🤣😇🤣
00:10
seema lamba
Рет қаралды 20 МЛН
когда повзрослела // EVA mash
00:40
EVA mash
Рет қаралды 1,3 МЛН
MEGA BOXES ARE BACK!!!
08:53
Brawl Stars
Рет қаралды 33 МЛН
I Designed My Own 16-bit CPU
15:46
AstroSam
Рет қаралды 1,9 МЛН
The Unhackable Email Service | Freethink Coded
5:50
Freethink
Рет қаралды 1,3 МЛН
Greatest Moments in Hacking History Samy Kamkar Takes Down Myspace
5:06
Jonathan S. Weissman (CSCPROF)
Рет қаралды 419
Shop tour|Mobile Repairing
5:56
Mobile Care-Jay Hriata
Рет қаралды 2,3 М.
How to Hack a Car: Phreaked Out (Episode 2)
12:16
Motherboard
Рет қаралды 2,9 МЛН
Supercon 2022: Samy Kamkar's Glowing Breath
40:25
HACKADAY
Рет қаралды 5 М.
Hacker's Guide to UART Root Shells
17:40
Flashback Team
Рет қаралды 463 М.
I got hacked by an iPhone Cable.
10:07
Mrwhosetheboss
Рет қаралды 9 МЛН
Aise Hacking Device Apne Dekhe Nahi Honge? | RealTalk Clips
17:01
RealTalk Clips
Рет қаралды 1,7 МЛН
Какой ПК нужен для Escape From Tarkov?
0:48
CompShop Shorts
Рет қаралды 272 М.
Main filter..
0:15
CikoYt
Рет қаралды 11 МЛН
Lid hologram 3d
0:32
LEDG
Рет қаралды 7 МЛН
iPhone 12 socket cleaning #fixit
0:30
Tamar DB (mt)
Рет қаралды 51 МЛН