That's right, you could win an ESPKey or a clear RFID badge from Red Team Alliance. Plus, we're extending last week's Miracle Fruit Tablets giveaway another week! Be one of 10 lucky winners to get an ESPKey, clear RFID badge, or set of Miracle Fruit tablets by entering this week's free giveaway now at gimme.scamstuff.com (no purchase necessary, giveaway ends 2/6/2020)
@The.Incredible.Mister.E5 жыл бұрын
I'm the winner. Fact.
@Dezzy6015 жыл бұрын
@@gaijinexec probably never :p
@Ashonthestreet5 жыл бұрын
I’m 90% sure the modern rouge is just Brian and Jason planning a super elaborate heist
@differntname28075 жыл бұрын
I want.
@JacobPeterzon5 жыл бұрын
Dude I had no idea sounds awesome though! :D Love the show!
@buzzbros20025 жыл бұрын
6:25 "It's open source man. If it doesn't work you can just fix it". The perfect argument!
@dafoex5 жыл бұрын
I love open source, but of course the people that could help fix things and don't are where we all fall flat on our faces.
@trones92044 жыл бұрын
@@dafoex ? I don't understand your comment. Who are "we"? How do "we" fall flat on our faces? Who are the people "that could help fix things"? OOP is incredibly easy to learn, so anyone willing to put in a bit of time can fix the open source software. I'm not trying to be rude, I am genuinely curious.
@buddergolem94633 жыл бұрын
@@trones9204 he means instead of using the knowledge to fix it they use it to exploit the issue for their benefit
@godjhaka73769 ай бұрын
@@buddergolem9463not in the case of Android or any mainstream open source project. only problem is people who refuse to Google, refuse to use their brain and create spam aka low-effort posts asking what they could easily solve with one google.
@edwardbarton16805 жыл бұрын
It's worth mentioning that the more expensive RFID tags use an active challenge-response system, where the number broadcast is different every time.
@BLavins5 жыл бұрын
It's also worth mentioning that those are rarely used in practice. As a security integrator, I can say my experience is that I may install 1 out of a 100. That is because it is more expensive and the sales guys like to sell the cheaper systems so they can upcharge and pocket the rest.
@BLavins5 жыл бұрын
And then of course, if they install REX Motions then forget about security. Give me a can of compressed air and I'm in. Security is only as good as your weakest link.
@brwa5176 Жыл бұрын
@@BLavins all the readers I'm familiar with use this challenge response approach.
@devonwilliams242311 ай бұрын
@@brwa5176I challenge this and expect a response
@Thegbiggamerz11 ай бұрын
@@brwa5176you must work for a higher end establishment then in my installation experience this is not the case. Either way I’m sure there are ways to defeat it
@cretin20255 жыл бұрын
I love the very strong attempt to provide an “everyday” reason to know all this throughout the channel. On the contrary there is also a successful attempt to scare me and yourselves. Keep up the power moves.
@KaitouKaiju5 жыл бұрын
@@tenchraven That sounds awesome and I wish I could be your player. No homo
@thetimebinder5 жыл бұрын
It's helps inform people of vulnerabilities in THEIR own security
@kellynolen4985 жыл бұрын
Knowing how to do it is literaly the only way to know how to stop it in the security bis not that i have a legit reason to know i just dont want to call a smith to break into my own car or house i also like to help my friends and coworkers out too when im there
@nicksurfs15 жыл бұрын
Kevin D I’ve been looking for tabletop RPGs with a sci-fi setting but have been unsuccessful. What do you play? I love D&D but I love cyberpunk dystopia more.
@marcuschen27795 жыл бұрын
I can imagine someone entering a building illegally and got caught. Police: "where did you learn how to do this?" Perp: " Because I'm a MODERN ROGUEEEE!!!"
@ModernRogue5 жыл бұрын
That will be a legendary police video
@AG.Floats5 жыл бұрын
Prep?
@JeremiahFrye5 жыл бұрын
Then you yell 'GO AWAY COP GUYS' and slam a flash bang into the ground before running away.
@marcuschen27795 жыл бұрын
@@AG.Floats oops is supposed to be perp short of perpetrator. But autocorrect...
@user-rl1eq8ml1h5 жыл бұрын
@@AG.Floatsa perp is a suspected criminal like a suspect
@saudade78425 жыл бұрын
I'm really enjoying the newer security/privacy based videos you guys are doing.
@Luminarigon5 жыл бұрын
Babak Javadi's glasses look like they were added in post.
@jimmyat5 жыл бұрын
I thought the same thing. They look like a snapchat filter
@wolfsden64795 жыл бұрын
I think that is the point of them they look cool.
@jimmyat5 жыл бұрын
Yeah it looks pretty cool.
@wolfsden64795 жыл бұрын
@@jimmyat my other thought is they may be anti face reconization.
@kyleo12365 жыл бұрын
If anyone knows the brand of those glasses, please post it. They look freaking awesome.
@NtGism5 жыл бұрын
Honestly, the episodes with these guys are great. Both in terms of content and subject but also in terms of presentation
@peternewson22755 жыл бұрын
These new modern rouge episodes have been A+, really great seeing this channel grow.
@CollinRobertsVlogs5 жыл бұрын
Hey Brian and Jason! Proudly been watching for nearly 10 years now. Much love and respect!
@ModernRogue5 жыл бұрын
wow! Thanks so much, man!
@windwalker57655 жыл бұрын
So, for the last couple years, I've been having a bunch of fun watching Modern Rogue, InRange TV, and Deviant's talks at various conventions. And now within a month or two, Deviant shows up on MR and InRange! It's like finding out your cool friends actually know each other and get along, it's friggin' awesome!
@SamBebbington5 жыл бұрын
RFID is a lot more secure nowadays, yes a few places still use easily cloneable cards, but most use some form of encryption and a a nonce (random number) to verify that both the card and the reader are not spoofing. If you try to copy a card, and you don’t know the encryption key, the card will refuse to send data. The skimmer is still an issue as far as I’m aware, but you still won’t be able to make a card if you do t know the encryption.
@studioxxswe5 жыл бұрын
thats my understanding as well.
@FatherPrax5 жыл бұрын
Yes and No. If you check out Deviant Ollam's channel, one of his talks he did mentioned that even the more secure systems, most of the time the readers also have a Prox system in-place and enabled as a built in backup. So while you may not be able to spoof at higher end card, you can still fool the sensor in other ways to trigger a door open.
@freman5 жыл бұрын
You also run into circumstances where an organisation doesn't control the whole building so while they have whizz bang encryption in their readers and protocols on the wire to the controller, they do dumb stuff like make building lifts with it's legacy system part of their security framework. Hell, I've seen the "break glass" emergency switches mounted *in* the public lobby area because the only way to get to the emergency stairs is through that door - rather than building a path that didn't require basically disabling security.
@BLavins5 жыл бұрын
As a security integrator myself, I will have to say that in my experience, the sales guys are still selling the unencrypted HID Prox readers. In fact, it is rare when I install anything encrypted. I have the Proxmark 3 and use it to clone company cards when I'm at a company that doesn't have a guest badge for IT vendors. I've cloned my own cards to transfer them to keyfobs instead so I don't have to carry my badge everywhere I go. Instead, it's right there on my keychain.
@BLavins5 жыл бұрын
@@freman In many places it's actually part of the fire code. Nothing they can do about it. I just did an office recently that wanted to have a fail secure crash bar on the stairwell door but fire code says it must be fail-safe so if the fire alarms go off then the doors unlock. This way the fire department can access the floor from the stairwell. It's fail-safe so that way if the power fails it will also be unlocked. The owner didn't like it but there was nothing he could do about it due to the fire code.
@taylorstem44545 жыл бұрын
1:39 the glasses looked like they where edited on
@LyvlonLP5 жыл бұрын
Thought i was the only one
@thecringelord55255 жыл бұрын
True
@RocketCityGardener5 жыл бұрын
dude has snapchat filter glasses
@JacobPeterzon5 жыл бұрын
Yeah It was big trippy first like 2 minutes I just stared! Like wait, what?
@troublewithweebles5 жыл бұрын
Came here to say this. Ten Points.
@matthewellisor58355 жыл бұрын
"There are different things to put in different places." -Babak
@aalleezzzz4 жыл бұрын
I work with this in Sweden and this is widely known in the security industry, I would love to see them explain with mifare which is the by far most used one in new/renovationer building. Possibly go into differences in mif/ mig lite and mif 4K.
@kiddochy57565 жыл бұрын
Look up Deviant Ollam's defcon talks they're really good
@OliviaWenya5 жыл бұрын
When you already know, but watches it anyway since it's the best collab ever.
@ChrisWCorp5 жыл бұрын
As someone getting into cybersecurity, these episodes are amazing.
@NZSpides4 жыл бұрын
If you're into cyber security, then you should have read about this years ago.... this is way old news
@boneappletee64163 жыл бұрын
@@NZSpides Everyone progresses at a different pace, with different starting points, end goals, and starts at a different time in their life.
@timp7885 жыл бұрын
I was kind of hoping that Deviant would use the back of his hand to open the lock.
@alexkantor82385 жыл бұрын
Oh yeah he's got a chip
@screwball695 жыл бұрын
Thats coming, they covered implants while they were there
@Volvary5 жыл бұрын
@@screwball69 It would just have been the perfect moment right now to make jason and bryan just flip their shit.
@screwball695 жыл бұрын
@@Volvary Agreed
@ThetaReactor5 жыл бұрын
Deviant Olaf, cyber-intrusion agent.
@kyvehvolvadan52605 жыл бұрын
I'd actually thought about this for some time, since I do work for an airport as a baggage handler. And to know it would be that easy for somebody to break into an airport using tools like this is just amazing to me.
@user-lw8jk6nv7l5 жыл бұрын
This is essentially the lost mythbusters episode that adam savage talked about.
@DarkFoxDK5 жыл бұрын
Not really. Tap to pay has a little more smarts than simple access cards, and aren't vulnerable to the types of attacks in this video.
@Hebdomad75 жыл бұрын
More credit cards than door access cards. Credit cards have a wee bit more security built in. Especially on the payment terminal. The lost mythbusters episode on that covered how easy it is to duplicate credit cards and do it from a distance. Chip and pin still remains the most secure but the danger of old RFID credit cards was the credit card number wasn't encrypted! This ment you could steal credit card numbers from wallets without touching them, hence all the RFID protection wallets have these days... Oh passports were also vulnerable to this.
@user-lw8jk6nv7l5 жыл бұрын
@@DarkFoxDK it is. Adam savage was doing some appearance at a convention irrc, and he said they were going to do a show on how vulnerable the chips are, but they decided not to due to legal reasons.
@SkaveRat5 жыл бұрын
well, the "legal reasons" were: "Credit card companies threatened to stop buying advertisements at discovery channel"
@DarkFoxDK5 жыл бұрын
@@user-lw8jk6nv7l Like Phil says, wireless credit cards, and chips aren't just static data being shouted out, which can then be copied. There's a cryptographic challenge and response process, which prevents straight up copying of the card as shown in this video, as the card's secret is never revealed directly. There are other vulnerabilities that are a lot more difficult to exploit, but it's not nearly as easy as copying an access card.
@StrokeMahEgo5 жыл бұрын
Company: "dang, that DeviantOllam fellow decoded our top master key, better install prox cards!" The following week: "Now he's got everyone's card code and is randomly badging in as other people! We have to stop him!" Deviant: /hides in elevator/
@---cr8nw5 жыл бұрын
Sir, with all due respect, how do I know you're not him? He could be any one of us, just using a cloned badge.
@AriosQarsute5 жыл бұрын
I see you saw Deviant's elevator talk.
@CWGminer4 жыл бұрын
@@---cr8nw He could be any one of us. He could be you, he could be me! He could even be-- **BLAM** *spy dies*
@jwayneair3 жыл бұрын
V, is that you??
@virgil24785 жыл бұрын
When the modern rogue posts a video... while I’m watching a modern rogue video Edit: I do appear to have spelt Rogue wrong. I have fixed it now.
@ModernRogue5 жыл бұрын
nice.
@jonathangrey21835 жыл бұрын
Spell it right R-O-G-U-E! --Brian
@JaxMerrick5 жыл бұрын
As Mother Nature intended.
@kp56025 жыл бұрын
Hey Virgil wheres your profile picture from? Ive seen it multiple times before.
@matthewellisor58355 жыл бұрын
@@jonathangrey2183 there is no "C"
@MrHowardPhillips5 жыл бұрын
I've been reading quite a few comments saying how newer cards are encrypted (chap smart cards). I work on large industrial and government systems almost daily and can tell you the number and types of things that are still 'secured' by the lowest level cards (26 bit) is scary. I have literally cloned a card in front of a security director of a weapons lab with one of those eBay blue guns and it still took them over a year to upgrade because the way government financing works.
@BLavins5 жыл бұрын
I hear you, man. Same here, I'm also a security integrator and I keep reading the same comments and think, "if they only knew."
@thezfunk5 жыл бұрын
Industry polling say that 26-bit, standard Weigand is still the majority of installations in the US. Some companies have moved to 'smart' cards (13.56MHz) but it is far, far lower conversion rate than you would hope/expect. These techniques will get you in most places today. When security people show this to C-Level executives they freak out, initially. Then, they ask how much will it cost to replace all the readers and rebadge every employee and they quickly sweep it under the rug. Trust me, rebadging hundreds, thousands, tens of thousands of employees for a changeover is a logistical nightmare.
@NZSpides4 жыл бұрын
@@thezfunk I wish I could tell you what I do, it is super scary the number of facilities in the US that are using ancient access technologies. A lot of the US is actually about a decade or more behind most of the rest of the world. I have stories.
@BoleDaPole4 жыл бұрын
imagine how old the systems are that North korea or Iran use to protect thier weapons systems.
@neonyeko5 жыл бұрын
I imagine that after destroying so many sources of "security", Jason begins scheming to destroy the sponsors of thier videos because they produce "security" and Murphy holds Jason back.
@zackthemaniac57545 жыл бұрын
And Jason Murphy holds Jason Murphy back?
@PoodlePuncher5 жыл бұрын
@@zackthemaniac5754 +1 lol
@demonman12345 жыл бұрын
Split personality's?
@neonyeko5 жыл бұрын
Murphy is the side of Jason Murphy that we see, Jason comes out when the cameras aren't rolling.
@Lamoboos223 Жыл бұрын
this was one of the exciting videos I ever seen, I loved the instructors and the interviewers. Thank you sm!
@Packman3325 жыл бұрын
"F*cking magnets, how do they work?" Terrific reference by that dude.
@mandc200224 жыл бұрын
Icp
@darkclownKellen3 жыл бұрын
Whoop whoop
@kdb6992923 жыл бұрын
Had to look through the comments as soon as I heard that to see who else caught it. Whoop! Whoop!
@JO-sg7wk5 жыл бұрын
Holly crap i know this is gonna be good. Ollam has 3, 1 hr long talks on YT about physical building security and its amazing. Mans hype
@Wondobar3 жыл бұрын
Can you link it please?
@batchampa5 жыл бұрын
The more interesting aspect of this video is related to what information you can get from bugging the readers. Cloning cards and replay attacks are only going to work against systems that aren't using cryptographic access cards
@NeilHyndman Жыл бұрын
This was one great video! I enjoyed every moment of it. Thank you for this video! Well done!
@l3d-3dmaker585 жыл бұрын
my god I LOVE this! it's so interesting to learn about, I'd love to see more of this pen testing strategies and absolutely demolishing the sense of security I have of buildings
@Dezzy6015 жыл бұрын
Oh there are tons of things that will demolish that sense of security :)
@pharynx0075 жыл бұрын
deviant does a pretty awesome talk here: kzbin.info/www/bejne/qJ_QlIWKo7mBeZo it's all about crazy physical penetration he's done.
@alexhamon92615 жыл бұрын
Check out Deviant's channel, hes got hours of to talks on how to beat locks, doors, access control systems, elevators, and how these all get applied to pen testing.
@eddiegrathwohl6245 жыл бұрын
Not gonna lie. I like this video just for the ad. I don't know anything about that specific company but i have always wanted that type of business to exist. Great video still.
@user-ox7id9he5v5 жыл бұрын
I can just imagine someone placing a RFID chip in a Sonic screwdriver prop and just using that to open doors where they work
@tohfawalker1595 жыл бұрын
Ashton Minden I believe someone did it with the London Underground rfid card and a sonic
@will_scarborough64874 жыл бұрын
I plan on doing that at school. I’m trying to find out the frequency that they use in their fobs, then I’m just gonna purchase one, strip it down, and put it in a sonic
@CWGminer4 жыл бұрын
I'm waiting for my proxmark in the mail, I'm totally gonna try that. Thanks for the idea.
@mikebik43654 жыл бұрын
@@will_scarborough6487 then you will go to jail for a felony.
@KENNETHCARNIE4 жыл бұрын
Genius
@peterh39435 жыл бұрын
THANKS FOR THE VALUTA CONVERSION - WAS A GREAT TOUCH ;)
@ActionJackson3215 жыл бұрын
*NEXT EPISODE:* Bi-fold prison wallet.
@FYCBigJezus5 жыл бұрын
with each episode this channel becomes more entertaining, intriguing and terrifying. I love it.
@tommy63225 жыл бұрын
I saw Deviants name in my notification and stopped what I was watching to start this
@theSpackster4 жыл бұрын
haha i used to work for a non-union automobile company, they used RFID badge readers outside the building to get in. i always thought about doing this given how easy it was, but i couldn't risk my job in that period of my life.
@Kamaropoulos5 жыл бұрын
This guy's glasses make him look like a cartoon.
@ddtrjared25965 жыл бұрын
I was gonna say looks like a snap chat filter
@maybeso15474 жыл бұрын
For me it was the painted on beard.
@Merlin0120015 жыл бұрын
i am glad to see the deviant out and about! i love the defcon talks he gives!
@ihavekalashnikovyoudomath92755 жыл бұрын
Watching these videos, I REALLY wanna see a heist movie that is so painfully accurate, it could be used as a how to guide.
@dannyvizor34035 жыл бұрын
I love the way Jason shakes people's hands to make sure they can't have too tight a grip
@connorohoare74705 жыл бұрын
The guy talking about the technology looks like his glasses are put on with cgi on his close up
@cherryfan00165 жыл бұрын
I’m SOOO glad I’m not the ONLY person who noticed that!!!
@adipuppi5 жыл бұрын
bruh
@yamumsyadas52155 жыл бұрын
Love your work you inspire me all the time PS. love your videos was just watching one as you posted
@MAYHEMSCO4 жыл бұрын
BRO I KNEW IT WAS BRIAN FROM SCAMSCHOOL!!! His voice is so unique. I was like wait a second....where's his Pointy mohawk
@losttownstreet34095 жыл бұрын
With a proper smartcard you may implement a full PKI with certification checks on the cards and a crypto-tunnel for every component. It was be done with some goverment ID-Cards for the public. A crypto-RFID-reader with full certification isn't cheap and you should have some security for the goverment issued usage certificates. Nowdays only the police some big companies uses this as it failed in implementation. My bank tested it 4 years for online banking. (Now there are forced implementation for lawyers, doc's and debt collection company).
@AflacMan135 жыл бұрын
How to stop a card cloner from cloning your card: 1) Get something to block the RFID. (passive) 2) Card Companies... install a momentary on/switch into the card. (active) - Literally just a pressable microswitch, something like a flat indent you press your finger into, that closes the circuit in the RFID circuit in the card, and BAM, allows the RFID circuit to function.
@mrkiky5 жыл бұрын
They could still clone it if they pressed that switch though, or if they hid their reader somewhere near the legit reader. The encrypted way is better because it allows the public to use their cards in the same way, and it makes them pretty much unspoofable.
@criticallook13524 жыл бұрын
+Daniel Nunya Bidnezz Best way to stop a card cloner from cloning your card is to *USE CASH.* :
@rodriquh5 жыл бұрын
This video is amazing. I had no idea 💡 it was that easy. $2 and a taco 🌮! Best line!
@Dr.Jiggles5 жыл бұрын
"fear not my paranoid and ignorant juggalos; she is not a scientist"
@JamiePineappleWyatt4 жыл бұрын
In Australia JayCar sells an RFID cloning "educational kit" that was capable of so much more than just RFID for just $30AUD and that's in a local store. It's very close to performing most of the features of the more expensive unit displayed here
@copuis5 жыл бұрын
that moment brian kinda learns that US banking tech (chip and pin, and RFID in debit cards) is 20 years behind the rest of the world
@mrkiky5 жыл бұрын
Seemed weird to me when he said "a couple of years ago" since I remember I had paywave visa cards 7 years ago in my backasswards country.
@iMadrid114 жыл бұрын
It wasn’t a long time ago Visa & Mastercard actually stopped The Mythbusters from releasing the RFID episode.
@NZSpides4 жыл бұрын
The US was actually first to get Apple Pay, which is leaps and bounds ahead of Chip an PIN (I finally have it where I live and use it wherever I get the oppertunity). Yes mag stripe is a joke, it's like he said, you may as well have your bank account written on a bit of paper. The banks here moved from MIFARE Classic (compromised 9 years ago) to MIFARE Plus (a bandaid patch to the Classic technology) a couple of year ago, better, but nothing compaired to Apple Pay and Google Wallet. Banks suck at security.
@copuis4 жыл бұрын
@@NZSpides again, US BANKING is 20 years behind (like it is a real thing) a branded (in this case apple) solution does not somehow make it a leap forward all the tech was already there (so much so, that apply talked to companies, and worked with them in bringing banking tech (again, already in use, and for many many many years before hand) into a form that made it easier the tech apple uses is 20+ years (in the sense of what is making the payment) face ID, or fingerprint, or pin, thats what you enter into the phone (the phone at that point is handling security, so the payment device, that is really the only difference, and again, isn't new)
@NZSpides4 жыл бұрын
Jeremy Sims I was referring to the point that every transaction with your account is unique. The actual technology after that hasn’t changed in years. Banks use insurance to cover the fraudulent transaction which helps them but screws the user that has to go change all their account info for payment sites.
@cyberneticwarmachine4 жыл бұрын
Couple years ago, the Dutch transit system used RFID card for opening gates/ credit. But with some cheap read/writer u could add "money" and travel for free.
@chroniclesofbap61704 жыл бұрын
I can'thelp seeing his glasses as a post-production special-effect
@flyingturtle1405 жыл бұрын
So I just discovered deviant ollam yesterday and was continuing my binge when I saw this vid
@jwayneair3 жыл бұрын
Yes. He is a gateway ‘drug’ into infocrack.
@TheUnnatural934 жыл бұрын
The most mind blowing part of this video was the $5 ESP chip being sold at a $80 price tag.
@CWGminer4 жыл бұрын
The ESP key that they use is the ESP chip loaded with custom firmware and additional hardware that automatically strips the wires when you press them into the slots on the chip. I'm not saying it's not pricey, but they're not just reselling it for a $75 markup.
@tzimiscelord84833 жыл бұрын
Its more like their selling their code for 75$ and the chip for convenience
@takeaim4203 жыл бұрын
Stoked to see Deviant on here!!
@AndrevusWhitetail5 жыл бұрын
"couple bucks" Try 10 for 1 dollar depending on the type. (Like the NTAG RFID tokens you can use to make Nintendo Amiibo's at home.)
@GIJew3 жыл бұрын
When you buy cards in bulk it makes out or less than $1/piece. Cards made by HID are a bit more expensive.
@bbq14235 жыл бұрын
This is legit just what I was going to search for when opening the KZbin app.
@TheHAPISBoyo5 жыл бұрын
Now i know how to get into the principals office
@prodbydramatic5 жыл бұрын
knowing is a fraction of the goal. Its like me sayin I know how to shoot like Micheal Jordan. or I could be like Kobe and Study and apply and be a legend 5X Champ #RipKobe24
@brucemartin84354 жыл бұрын
This cool as I work for a company that does dispensing cabinets for industrial supplies and the information can come in handy!
@dafoex5 жыл бұрын
I love how the WiFi network from the creds skimmer is called "Eve's Android". It looks inconspicuous because a random hotspot could be on, and its called "Eve" as in "Eavesdroper".
@terminatordoink4 жыл бұрын
Thanks for asking the right question. But please never ever interrupt them
@YouTubeWatcher90005 жыл бұрын
You should do a video of the best rogues throughout history
@CollinWillson5 жыл бұрын
The best combination of KZbinrs I've ever seen
@justjulian75034 жыл бұрын
I understand Brian is very excited about this stuff but he keep interrupting my man trying to explain how this tech works.
@BobShacklock5 жыл бұрын
Thanks, we have these readers all over our work and now I want to go pop one open!
@jwayneair3 жыл бұрын
It’s so easy, it’s anticlimactic af.
@kicksledkid5 жыл бұрын
I still can't believe the US is so far behind on contactless payments. We've had tap for the longest time here in Canada.
@GameCyborgCh5 жыл бұрын
you think the US is far behind? then come to germany.
@andyk25945 жыл бұрын
@@GameCyborgCh try austria, people get angry when you try and talk them into using cards instead of cash. EU is trying to remove 1 and 2 (euro-)cent coins since they are basically worthless... some people here are VERY opinionated on that idea
@AG.Floats5 жыл бұрын
It doesn't affect you. Not sure why people always care so much what the U.S does.
@GameCyborgCh5 жыл бұрын
@@andyk2594 1 and 2 cent coins are actually less than worthless, they cost more to make than they are worth
@kicksledkid5 жыл бұрын
@@andyk2594 I didn't say it effected me, just that I was surprised. Plus, I'm Canadian so it impossible not to deal with the US in some way.
@RuneInternational5 жыл бұрын
Good to see Deviant use the same great Wera screwdriver I carry in my work belt, for nearly all lock related jobs.
@Nckolas204 жыл бұрын
If I had this I would clone garage key cards in my city for free parking
@spencernichols93205 жыл бұрын
If you pick me I'd be thrilled I've watched your videos since scam school I work at a hotel in maintenance and I'd love to show my boss all of our flaws in our systems 😉 love all the red team alliance and modern rogue vids
@Laquoquious5 жыл бұрын
The bald guy’s glasses look like they are a cartoon.
@derekp66364 жыл бұрын
nifty episode, must feed the algorithm seymour
@ishaantrivedi99685 жыл бұрын
Never been here this early.... Wassup notification squad
@Bebop_29625 жыл бұрын
Love the conversions. Well done.
@milhousevanhoutan92355 жыл бұрын
So... I know of BSL3 laboratories that use rfid tech for access and they're working with anthrax....... Being afraid is the appropriate reaction. Also "look like you belong" is the best advice for pen testing.
@DavidMulderOne5 жыл бұрын
Didn't watch the entire video yet, but RFID is a pretty generic term and a lot of RFID systems (such as the one on payment cards) can literally not mathematically be cloned. My knowledge of access control systems is far more limited, but as far as I know some of them are the old 'number on a card' approach, but definitely not all.
@milhousevanhoutan92355 жыл бұрын
@@DavidMulderOne it's the one he says "Oh the light bar? That's" and he names it and says it can be cloned. Honestly though the bigger security measure is all the cameras and the relatively small staff. People know who's supposed to be there and who isn't. Also the on sight 24/7 FBI agent is pretty good too.
@johtajajore775 жыл бұрын
there is RIFD writers/readers available on Google play store... and phone can be used for broadcast that copies id or used to write on external chip I tested it to copy "key" to laundry room of my apartment building.. on external RIFD chip
@GreyHulk21565 жыл бұрын
Am I the only one who thinks "Dr. Venture"?
@daled41915 жыл бұрын
Omg yes!
@idHawk4 жыл бұрын
thanks for including IDR in the conversion :D
@richardpowell42815 жыл бұрын
Next stop Area 51 underground Bunker complex from Independence Day where they store the bodies and the spacecraft
@format63 жыл бұрын
Interesting. I really appreciate you showing pricing in NZD, thanks!
@pyille5 жыл бұрын
I love how they say that a esp8266 costs $80. It's like a 2 dollar device.
@5ch4um15 жыл бұрын
0,74 € on aliexpress... maybe he wanted to say "80 cents" instead of "80 bucks"? but this thing looks like a really nice toy for all sorts of projects, didn't know that this stuff got THAT cheap, definitely on my wishlist now!
@YounRangr3 жыл бұрын
I see now that im already subscribed to you guy but ive never, ever seen you until now
@jimmy84695 жыл бұрын
When you come to the modern rogue for their humor and possibly to learn a new skill... But leave scared shitless Thanks Jason and Brian :)
@cyanbit5 жыл бұрын
Othee guy's glasses look like they're really jankily tracking his face when he's looking into the camera and it's so surreal.
@mikethompson27454 жыл бұрын
Am I the only one who isn't as impressed or shocked by any of this as these guys pretend it is?
@pygmis4 жыл бұрын
1:29 love it how there is a translation for silly units to actual meaningful units
@rcblitzfpv83465 жыл бұрын
Last few vids have made me a billionaire Cheers guys LMAO
@airbmacndeehoc5 жыл бұрын
"Magnets are behind 99% of penetrations." 🤣 11:55
@criticallook13524 жыл бұрын
+airbmacndeehoc ...and here I was always under the impression that it was *_penises_* and *_dildos?!!_* :
@emmanuelrodriguez23464 жыл бұрын
Esp module: $80. Me: I bought them for $5 and are standing there just turning on the lights :O
@CWGminer4 жыл бұрын
The ESP chip is $5 but the ESP Key module that they use has the firmware already loaded, and it has special hardware to automatically strip the wires and connect to them when you shove them into the little slots on the chip.
@TheAkashicTraveller5 жыл бұрын
Do any of these RFID tag have two way communication? That way you could have the door controller send a random number have the tag sign it with it's private key and send it back. Much much harder to break or skim.
@CanadianSpaceGoose5 жыл бұрын
It's no longer surprising how easy it is to do this kind of stuff.
@freddynajar13215 жыл бұрын
Nice demonstration, very educational and clear.
@hollywoodhobie5 жыл бұрын
Two things. 1) I am a little disappointed Ollam didn't show off the rfid implant he has in his hand. Its like real life freakin magic. 2) RFID is used in a variety of playing cards (specifically casinos and televised poker tournaments) to be able to see what cards players have without having to have a table cam show what cards a player is holding.
@Atkrdu5 жыл бұрын
I'm not so sure about the electromagnetic thing. I hadn't thought of it & feel something if I'm on the phone too long. Plus, there's those people that get cancer in weird spots (ex: hand they hold it with, chest where they put in the pocket, brain).
@thomasherzog865 жыл бұрын
its a free world - you can believe it, but you should be aware that believing in it is proven to have more effect on your health than itself.
@kaine24165 жыл бұрын
"Magnets are behind 99% of penetrations" -Brian Brushwood (2020, colorized, KZbin)
@juweinert5 жыл бұрын
Don't know about the US, but in Germany security systems usually use temper protection. No chance you unscrew an access control panel without causing an alarm. I'd expect a more low key method like an additional cover which could be produced using flexible PCBs with black mask
@juweinert5 жыл бұрын
Just continued to watch. What? 95% of systems don't use tamper protection in the US?!?! So basically nobody knows how to build security systems over there? And temper protection is usually done by a single push switch instead of vulnarable magnet sensors. 100% reliable and older than LEDs and ICs themselves. Again, don't know about the US but I just can't imagine all of you being so incompetent...
@Robyrob77715 жыл бұрын
Guy in the burgundy shirt needs to SHUT UP! I was tired of his witless babbling by 3:30! Let the guest speaker show us what he has for us.
@michaelbrint71244 жыл бұрын
Quite the interesting line of thought for the everyday experience.. very informative, thank you.
@mmhhjj344 жыл бұрын
I just went to redteamalliace to look around opened there web site and only then realized that I just more or less opened a hackers link they probably now have access to all my information now