I didn't know you guys were tapping into the horror tech genre...
@EarLoaf6 ай бұрын
Real
@yahiaahmed53826 ай бұрын
وه
@stewycheese216 ай бұрын
legit shitting myself watching this video
@draconian_torch62516 ай бұрын
I work as an IT technician and this is hands-down one of the most interesting videos you've posted in a very long time. Absolutely invaluable for a quick look into how things are changing in our digital landscape on a daily basis.
@deltasixgaming6 ай бұрын
Cybersecurity needs to be looked at a Lot more especially since our lives have so much tech in them now
@TheW836 ай бұрын
My question as an IT tech is why this borat rat looks way more useful for actual user troubleshooting work than any of the software we’ve used.
@fbgmduck6 ай бұрын
yeah definitely most informative from even just a consumer standpoint as well. As someone who lost a GPU to a cracked Win10 a few months prior I've recently been learning about a lot of this stuff.
@atl6s6 ай бұрын
@@fbgmduck "lost a GPU to a cracked Win10" there is so much wrong with this anecdote that i believe you should stop using computers altogether.
@siphi75836 ай бұрын
Yeah msot other vids are just d1cking around
@cloroxbleach72626 ай бұрын
So the hacker doesn’t actually see a black terminal with fast moving green text 😔
@benwu79806 ай бұрын
That's only meant to be within the matrix, but there is a lot of customization of terminals on linux, so is easy to mimic.
@pedrus3576 ай бұрын
No. In this case the hacker developed a GUI in visual basic to track the victims IP.
@Karl_Kampfwagen6 ай бұрын
They do if they appreciate high contrast with low backlight, and less eye strain. It's not the Default, but I set my Command Line to display Green on Black, for authenticity, aesthetics, and aforementioned benefits for both human eyes and display devices
@samlevi47446 ай бұрын
That’s advanced hacking.
@SuperFizzah6 ай бұрын
He's not a true hacker, so he hasn't unlocked that yet.
@eros45106 ай бұрын
Malware analyst and digital forensics analyst here, super pleasantly surprised to see LTT do a video on my job and VX underground. They're one of the cooler parts of the info sec community. Very good surface level explanations on lots of different concepts here too!
@dj_chateau6 ай бұрын
Hard disagree. LTT is not part of the infosec community. Linus repeatedly has scare-mongered about the tools we use often and engages in clickbait said tools. This is just another video of him chasing a trend. This man has no business covering security considering he can't even get his own security in order in-house.
@luminatrixfanfiction6 ай бұрын
In your professional opinion, what's the best security measures for beefing a linux operating system. Any tricks? And what might be the best software tools to use for linux? Cheers. Edit: Also, is there anything I can do to prevent Spectre v2 and Inception exploits?
@johndank22096 ай бұрын
why is there all this cybersecurity stuff all of a sudden? everyone is talking about it now.
@luminatrixfanfiction6 ай бұрын
@@johndank2209 Because people are tired of being fk over with and having their personal data being stolen and sold to the highest bidder.
@lumikarhu6 ай бұрын
same here. except i do IR instead of DF plus I write my own malware too after hours, it's really fun to fight windows defender, crowd strike, sentinel1 etc as a lone wolf. to answer the comments here: @luminatrixfanfiction what ports are open on your linux box? close everything you don't need, update often, dont copy paste sudo commands from the internet, set up fail2ban, tune it and/or disable password login and only allow key logins, install & tune firewalld, same with selinux, you can try using vulnerability scanners, internet is your friend regarding linux hardening @johndank2209 you want the long or short answer? i'll give you a shorter one: Ransomware and/or ransomware as a service, data leaks, ease of extortion for millions thanks to people not thinking. hacking a computer is easy if it's not protected by EDR software costing tens of thousands of usd. and even then i find a way to bypass it 1-2 times a month on average (that i don't disclose because it's too fun lol)
@TheDexterousdrew6 ай бұрын
You guys need to do more videos like this. Interesting, educational, informative, and fun. Great idea!
@deleted-something6 ай бұрын
Me when I lend my computer to my friend for 2 seconds :
@ai-sponge-rehydrated-clips6 ай бұрын
Real
@yep35846 ай бұрын
REAL ASF
@wlaznydominik6 ай бұрын
real
@AndrewPCs6 ай бұрын
NO NOT REAL it’s ur little cousin wanting free robux
@Goldomnivore6 ай бұрын
But I just wanted to upgrade your RAM
@JoshuaHaglund6 ай бұрын
Back in the day, I discovered 45k-50K instances of the Nimda worm on the college campus network. I notified the professor of my findings. Shortly after, the Network Admin was let go for downloading "stuff".
@username86446 ай бұрын
Never understood why people download that stuff when you can stream
@atomictransfusion6 ай бұрын
@@username8644me neither but maybe that was before streaming
@Dynamicdrifting6 ай бұрын
Wtf did he download 💀
@dominicharvey60486 ай бұрын
what does that mean?
@fios45286 ай бұрын
@@username8644 this is a very sus comment if it's what I think stuff is
@vamsterr6 ай бұрын
"If we get infected, I dont own the company" is such an on point statement about company security and why its so hard to keep the weakest link from nearly always being the human element.. people dont care much if its not their stuff
@LuxuryNoCap6 ай бұрын
this is true. We will never get paid enough to truly care.
@adammiller90296 ай бұрын
The reason human's are the weakest point is because they are human. Its not about 'caring', humans can't be programmed. They're squishy water blobs they behave unpredictably even when they actively desire a particular outcome and have been trained on it. Humans are prone to things like errors and stress where as cybersecurity tools less so. Human could have a raging hard on for the company, that isn't going to make them a stalwart defense against a skilled social engineer attack.
@vengefulrat30536 ай бұрын
I think the more realistic POV is that the average company person, secretary or whichever can cause the infection, doesn't get paid enough to give a shit about the company.
@ghomerhust6 ай бұрын
if Denis Nedry had been paid a better wage, Jurassic Park would have worked, at least for a little while until the frog DNA kicked in.
@S4sch4_976 ай бұрын
@@LuxuryNoCap Oh, you certainly can be paid enough to care, most people just aren't
@ImMrLegitMate6 ай бұрын
Viruses are getting scarier and scarier nowdays.. Really good video to teach people to be more careful on the internet!
@hamishahern20556 ай бұрын
The cyber security 'experts' are all idiots, and couldn't even protect their Nana at a bingo club, even if their life depended on it.
@aesync6 ай бұрын
This is the first time I watched the whole sponsor segment because it was actually pretty interesting to see how these products work!
@Trainguyrom6 ай бұрын
Enterprise-grade antivirus is genuinely pretty cool. At a bank I worked at a new sysadmin downloaded some defanged test malware and we got to watch first as our Windows Server instances migrated the new files on the file server to its redundant partner, then to a remote site and then the redundant partner on the remote site, etc. and the AV identified and raised alarms to it every step of the way. So we knew #1 fileserver replication was working well, and #2 the AV successfully identified it and mitigated it every step of the way
@stretchx6 ай бұрын
The guy you mentioned, Marcus Hutchins, who defeated the wannacry virus has a KZbin channel and makes very informative videos on Cybersecurity and I.T Security in general. If you are doing any more videos like this, you should have him on. He is really interesting.
@ridderjaim36 ай бұрын
Wait, no videos about how to do credit card fraud?🤣
@kimag33246 ай бұрын
This would legitimately be one of the most interesting collaborations of all time. Marcus is super knowledgeable on this kind of stuff and the guy is quite literally a gold mine of information
@MalwareTechBlog6 ай бұрын
👀 hi
@moldytexas6 ай бұрын
@MalwareTechBlog bruh....
@Dogboy916 ай бұрын
The man, the myth, the savor of the internet and all IT desks. He was summoned.
@0xZ0F6 ай бұрын
5:40 The UAC (admin popup) bypass hasn't been "patched" because there is nothing to patch. It is trivial to bypass UAC on a default Windows install. This is an interesting thing to research, but here's the TL;DR. A long time ago people got annoyed by having UAC popup for everything. So, Microsoft made it so UAC only pops for some actions, not all, by default. Unless you manually restore UAC to it's full control, most people would consider it useless.
@Raivo_K6 ай бұрын
God i hated UAC when it came out with Vista. I loved Vista but hated UAC. Even tho Win 7 and later versions toned it down i never re-enabled it.
@yumri46 ай бұрын
@@Raivo_K It is useful to prevent unwanted admin actions. I am on 10 and i think the only times it comes up is when i am running unsigned code. I kind of run a lot of it since no one has time to sign all their code on git hub. Other than a few servers that mostly came from the pip and git commands i have not seen it in a while. Installed everything and now as i am not installing anything anymore nothing seems to trigger UAC but some github projects when it is set to default on windows 10.
@zNoah6 ай бұрын
I use an standard user by default, then use an admin user whenever UAC comes in. No point on bypassing UAC if the user is not admin xd
@blubblub37866 ай бұрын
Now that I think about it, I was doing that too at some point. I was working on some automated scripts and I figured out how to disable UAC, spawn my shell and enable UAC again after. I was using registry edits too... It did need to be run by an admin user tho, so on corporate pcs that would likely do nothing. Their apporach seems to delegte the shell execution, so it might actually be privilege escalation.
@MtnNerd6 ай бұрын
The frustrating thing is you still can't whitelist specific programs. It would be trivial to give it full control if you just had to click it the first time you opened a program. And default Windows still pops up every time I want to play a Steam game.
@JereVali6 ай бұрын
I work for a company I can't disclose, and work in environments that use ThreatLocker. I can swear that ThreatLocker is very good at what it does. Including stopping Microsoft from running it's own software because how it handles some parts of it's programming can look fishy.
@Nelo3906 ай бұрын
God bless the IT-Furry community
@realgoose6 ай бұрын
@@Nelo390😂😂
@FlyboyHelosim6 ай бұрын
Cool story, bro.
@ShadowByNine6 ай бұрын
That's probably one of the strongest sales pitch for threat locker, "it stops Microsoft programs"
@zackzeed6 ай бұрын
@@ShadowByNine Actually the best one yet tbh XD
@FanterA3336 ай бұрын
"this hard drive contains 25M pieces of malware" My family computer back when limewire was a thing: "those are rookie numbers"
@zeus1141Ай бұрын
@FanterA333 I've seen some crazy stuff as a remote tech support. I did saw a computer run with 1000+ viruses in it. We used to clean them for them (truly) to the best of our ability, but tbh... if i was in their pc. I wouldn't trust that PC anymore.
@matthewhartin47256 ай бұрын
I would suggest setting up a small scale model of a networking enviroment of a typical office and show from begining to end how this works. I would love to have such a video to show as a demo to our employees. We are a hospital hat was hit by randsomware a few years ago, and being able to show people how these things work and why certain security measures are crucial would be a godsend. Might even make a small series or a few PSA's to spread the word.
@stackedpringles57146 ай бұрын
Me just chilling with my neuralink. Linus with 25 million computer viruses:
@iissss98476 ай бұрын
The brain will explode.
@nickcps20006 ай бұрын
you got Binden'd!
@SamuTheFrog6 ай бұрын
@@iissss9847 Probably not. The wires are insanely thin, they can't push a signal strong enough to do anything. They're just sensors. Pretty simple sensors too, they just pickup the electricity from the brain. I'm not really into them being able to read, see, hear, and decode all my thoughts buuuuuuuuuuuuuuuuuut still. Nothing would happen with how the device actually works. It's pretty interesting.
@wowyoupunk3336 ай бұрын
@@SamuTheFrog🤓
@attackrobotics70096 ай бұрын
@@wowyoupunk333My boy is making fun of someone for being informed. Couldn't be me.
@r08zy6 ай бұрын
Long term cybersecurity staffer here, maybe I’m dead inside after all these years but this wasn’t shocking to me… it’s a great educational video for those outside of the industry though. Great work guys!
@resresres16 ай бұрын
What most movies/shows portray is people with terminals frantically writing lines of code to hack into something. So a lot people don't realize that these days it's mostly done by clicking on options in a GUI that someone has coded together for other people to use and you just have to figure out how to get it on someone else's computer.
@Bianchioltr18856 ай бұрын
@@resresres1 so you definitely dont work in cyber, yes everything is done trough a terminal and maybe burpsuite for pentesting but everything else is 100% terminal. these gui malwares are just made after the malware wasnt a threat anymore to get used by script kiddies, so idk where you get your info from but you should ask for a refund on your knowledge.
@hamishahern20556 ай бұрын
yea all you cybersecurity staff are all doing a shit job, that's what this video tells me.
@bighammer34646 ай бұрын
The pitch meeting went something like this: “So, you know how we got one virus, what if we just get them all now?”
@EkiToji6 ай бұрын
It's always worked for James Bond.
@bacon.cheesecake6 ай бұрын
Make all their computers immune, genius
@xp75756 ай бұрын
If you hack your own system it's a tax write off
@4RILDIGITAL6 ай бұрын
It's both fascinating and terrifying how simple these tools are and how easily a system can be compromised.
@WarrenGarabrandt6 ай бұрын
Threatlocker is actually pretty great. You can create policies for groups of machines, and then you can use their built in app policies to allow things like "all office suite programs" to whitelist them, or adobe reader, for example. The policy will allow future version to run automatically when a new version comes out, and you can even prevent older versions from running (such as if a vulnerability is found in an older version). You can also sandbox a program in a vm to see if it's malicious, and allow or block it based on that result. It's actually a very sick suite of tools.
@casey3603606 ай бұрын
I helped a company that leased systems for medical use develop tools to lock down their equipment remotely in the event of an attack. I was an intern there working on hardware, repairing circuit boards and testing cables/peripherals, they had me take a couple of the most popular systems including a dell latitude business tower and a Lenovo thinkcenter mini and had me desolder all of the networking hardware from the board. It was a stupid fun project. 10 years as an automotive mechanic and now I'm getting my BS of computer science in cyber security and computer forensics because of that project!
@f1nal_c4ll756 ай бұрын
I got into ITSec in ~2016 and even went on to study it in college. Currently work as a SOC Analyst (Security Operations Centre). VXUG, Smelly and staff do great things for the ITSec community. Love that you made a video on something like this. I can honestly say it's just the very tip of a iceberg that keeps getting deeper.
@txthys6 ай бұрын
ok but what is the password
@catto-z8q6 ай бұрын
@@txthys *monkey bonk gif*
@4132h6 ай бұрын
@@txthysTHE PASSWORD IS INFECTED !!!!!
@rbunpat6 ай бұрын
@@txthys lmfao (in case you're not /s-ing, it's infected)
@ilenastarbreeze49786 ай бұрын
@@txthys 12345 obviously, noone would guess it! Good for luggage
@mcash21896 ай бұрын
the truly scary part about this is not that the threat actor can take control of the infected system but that they can plant files on it I mean if possession is nine-tenths the law how exactly could you convince someone that the files on your computer are not yours
@rawhide_kobayashi6 ай бұрын
I mean... How are they going to know they're there at all? Like, we can't type this on youtube, but we know what type of thing you're thinking about. Nobody is busted for that type of thing because someone calls the authorities with a random claim that you possess it. There's a whole lot more that goes into it than that.
@PartyhatRS6 ай бұрын
@@rawhide_kobayashi On the 2nd re-read, I realise you meant something different as in a random accusation, not a random person finding it. That being said, I'm sure the police would find a way to get to someone's device if that kind of an accusation was made. Just look at all the fake rape accusations made, and men getting arrested because of it. No proof needed. You think police follow the law of needing proof? Lol
@rawhide_kobayashi6 ай бұрын
@@PartyhatRS I have no idea what you're talking about.
@PartyhatRS6 ай бұрын
@@rawhide_kobayashi Then you're pretty bad at comprehension.
@rawhide_kobayashi6 ай бұрын
@@PartyhatRS I actually got a perfect score in the reading comprehension portion of my ACT, tyvm. It is in fact YOU that has the poor reading comprehension, child. You've offered nothing but an unsubstantiated claim which is completely irrelevant to the topic at hand.
@videomasters24686 ай бұрын
I feel like this is one of those videos that is so educational for people, particularly "non-techies" that it needs sharing far and wide.
@ben_jammin2422 ай бұрын
6:11 the mix of fear and excitement is palpable. Love it
@enisylo6 ай бұрын
Honestly, that moment of silence followed by: "Anyway... good luck" is both hilarious, but very successfully portrays how genuinely concerning a lot of this stuff is. In some ways, it gives me the same kind of feeling that I get when I think about the reducing efficacy of antibiotics. Obviously not quite the same, but both give me the same kind of feeling.
@Serofyte6 ай бұрын
grandma's pc 1 second after using internet unsupervised
@ohioplayer-bl9em6 ай бұрын
Copy of copy of copy of shortcut to copy.exe
@GeorgeWashingtonLaserMusket6 ай бұрын
@@ohioplayer-bl9em Nana is that you?
@Essey2096 ай бұрын
Lindaaaaaaaaaaaaaa
@sloppypotato006 ай бұрын
I guess grandma is on call with indian Microsoft technicians called Philip White
@DavidLinn6 ай бұрын
my mom got a trojan on her Mac after only 1 year of use. I got rid of her Mac and she got an iPad
@MarekNowakowski6 ай бұрын
why does small malware offer more useful options than real apps on windows?
@tannermccoolman46476 ай бұрын
One time I discovered a C99-style backdoor on a server I was maintaining. Instead of deleting it, I just password protected it. It was honestly so useful because it had a ton of features and they were all very easy to access. The serious answer to your question though is that this is software made for customers with lots of alternative options, so the better the UI is, the easier the sales pitch is.
@TheW836 ай бұрын
That was my very first thought on seeing all the options. It all would be so useful for fixing remote user PCs.
@Xusemeh6 ай бұрын
because it is built by the user
@bgezal6 ай бұрын
Microsoft has been sued so many times for making software that competes with 3rd party software so they just leave everything half baked. Apple can bundle anything in mac-os without complaints or lawsuits.
@jan_harald6 ай бұрын
because at one point companies stopped caring about customers, and the design teams got disconnected from actual users and programmers so now it's more important to look "modern", than to actually be useful, because being useful is "ugly" to the designers due to all the "clutter" and partially also accessibility, I suppose, but that's always been a tertiary concern (like, text size, and spacing between buttons, and stuff)
@JohnnyNubs6 ай бұрын
As an old time computer builder/administrator, its very nice to see that you are letting us what the hell we are getting hit with. Who wants to venture into the dark realm just to learn about what your getting hit with? Not me! The strongest defense is knowing your opponents offense so you can counter react! Great job guy's, as i was nervous for ya just watching this clip.
@dalemazza16 ай бұрын
Its also worth mentioning that modern malware has sanbox escapes built in. These can run checks to see if the binary is being ran in a AV sandbox and then not fire. For example windoes defenders sandbox's hostname is "HAL9TH" so adding a check to see if the systems host name is this then exiting without firing can help
@Linealo6 ай бұрын
You should do this again, but the other way around: Install as many AVs and other security software you have access to or can get access to as possible, run them simultaneously / in parallel and see how badly they fight each other and how bad the system slows down by actually "friendly" programs and "optimizers". If the system still works after that, use this archive and see how much of it is actually caught in the process vs. how it performed now.
@repairman2be2506 ай бұрын
My understanding was those virus files are not executables and the ones zipped up are password protected. That system probably joke itself and not run properly with that many AV and or malware scanners running.
@johngaltline99336 ай бұрын
I seem to recall this video already existing, but it may not have been a LTT video.
@yashfiuqesybr6 ай бұрын
@@johngaltline9933 @Linealo @pcsecuritychannel does this types of tests
@Thomas_Needs_Coffee6 ай бұрын
13:35 Linus' face to not alone LOLOL.
@blackraen6 ай бұрын
12:43 My manager started this whole fucking thing with the team about opening tickets for any software we downloaded and wanted to install, documenting checksums and validation, etc, what algorithms were acceptable and which would be rejected. An absolutely inane campaign lasting weeks. I kept asking to meet with him about it until he finally agreed and I asked him, "Imagine yourself as a theoretical threat agent that had managed to infiltrate our vendor's website data, packaged and prepared a malware payload. Now, are you going to just change the file? Or are you going to modify the website to update the checksum as well so it 'matches' your modified package?" A day later, we received an email letting us know that manager approval was no longer a pre-requisite for software-install tickets and we could complete the installs without waiting for a manager, as long as documentation was in the ticket.
@purewaterruler6 ай бұрын
Wait that is so based
@shapelessed6 ай бұрын
@@purewaterruler Checksums are only useful when the content you're downloading is hosted on a third-party website. People frequently do that because hosting your own downloads is CRAZY expensive, especially for small and/or open-source projects.
@dallysinghson55696 ай бұрын
There are vastly less chances of geting something fishy from the vendor site via agent infiltration... What you'd more likely get is something that looks like the vendor site.
@adammiller90296 ай бұрын
Its almost like... tools like app locker are a thing... And that there are reasonable ways of going about managing what users can and cannot install. You should just publish packages users can install and disallow anything else. Users shouldn't be allowed to install random crap, and service desk analysts who hardly know their butt from a hole in the ground shouldn't be deciding what is 'safe' either. Just... freaking manage it properly.
@R2D2arthurge22 күн бұрын
That's why Penetration testers make so much money, but also they carry a reputation to uphold.
@user-rv2cu5nj6o6 ай бұрын
Linus, i L.O.V.E this video. I will be sharing this to all my Ops teams and e suite wannabes in my turf. We actually use threatlocker and it was amazing seeing them sponsoring you. They really are great folk. Pricey but great.
@c2thew6 ай бұрын
This was an amazing educational video. I bet you this helped some college level classes for the future. I appreciate the balance of entertainment and learning videos LTT does. It’s what makes this channel so enduring
@_odd1ty6 ай бұрын
You know its a serious ltt video when the background music completely stops, leaving this uncanny, uneasy feeling. "Am I really watching LTT. Where's the tunes???"
@repairman2be2506 ай бұрын
The music is scarier than the virus presented.
@LaughingOrange6 ай бұрын
Security by obscurity should only ever be the first layer of defense. In itself, it is not real security, but it can help slow down attackers or help weed out weak automated attacks.
@rjjhirad6 ай бұрын
It would be really cool to use a RAT in your next episode of secret shopper to report on if technicians are accessing your personal files. It's a known issue and a company's internal policy for safeguarding customers privacy is ABSOLUTELY a thing to consider when sending a PC off for repairs.
@AnotherAustin-z7b2 ай бұрын
Yeah lol just look at what happened to Hunter Biden when he got his computer repaired
@iyappansriram98546 ай бұрын
7:37 just the way he's worried about everything and then moves on to "anyways, good luck" has me laughing so hard 😂😂😂😂😂😂
@KnifeTheDark6 ай бұрын
Cool to see a more cyber focused video - VX underground are probably one of the most sacred resources we have in the industry - the team there are incredible with what they do
@controlfreak19636 ай бұрын
Security through obscurity is just one layer of defense in depth. I had a client that hired a consultant to write a public utility SCADA system report. The utility then then stuck it on their public web site because "freedom of information". The document had a clear layout of their SCADA network with all IP addresses. This is an example of no obscurity.
@herpderp62556 ай бұрын
As another guy who works in SCADA at a renewables company. You have no idea how hard I’m laughing right now
@sean3616 ай бұрын
As far as I know, FOIA doesn't create disclosure requirements for technical data deemed critical to infrastructure/operational security. In fact, there is clear language in FOIA (both Fed and at least some states), as well as court cases relating to this issue, that creates exemptions for such disclosures. Idk the exact organizational setting for your situation, but it might be worth looking into yourself if it's keeping you up at night 😅
@controlfreak19636 ай бұрын
@@sean361 My State has laws to keep some information from public view for public safety. This can be appealed to a judge for review but this type of document is easy to defend.
@dallysinghson55696 ай бұрын
Why TF a SCADA of important is accessible on the internet is just beyond me. Ideally they should be isolated from the internet but I guess we have to connect up everything so the vendor can RAT in.
@kuhluhOG6 ай бұрын
True, but it's really one you MUST NOT under any circumstance rely on it in any way. Especially when it comes to how networks are laid out, it's just more of a small annoyance at this point than anything else. Think of it like throwing a big paper towel over a tank for protection. It doesn't do a whole lot, but it's also not completely useless.
@kimag33246 ай бұрын
This is probably one of the most interesting videos i've seen on this channel. Am currently studying software in university and had my eyes glued to the screen the entire time!
@GeorgeWashingtonLaserMusket6 ай бұрын
Thanks to this video I have become a successful hackermans, gotten billion in bitecans, and retired to my own island in minecraft.
@ApocApocrypha6 ай бұрын
The scariest part of cybersecurity are the users, some never learn and still click every link or open any files they see.
@d0gg0z6 ай бұрын
super fun video, I do malware reversing for work; its cool to see a big channel like LTT giving people exposure to these topics in an easy to approach way. Great work! Hope to see more infosec type content in the future.
@tannermccoolman46476 ай бұрын
I've been hesitant to touch stuff like this because I don't want to give the false impression that I'm a security researcher. I have a ton of respect for what folks like yourself do.
@bluegizmo19836 ай бұрын
What's really scary is that for every one zero-day that gets reported and patched, there are probably at least 100 zero-days that get sold off to nefarious individuals that go unnoticed and unpatched!
@modarkthemauler6 ай бұрын
Yep, because if a zero-day is not used it's not noticed.
@jakobfindlay41366 ай бұрын
i think "Those that fail to learn from history are doomed to repeat it" is the right way to look at this
@Zhyrca6 ай бұрын
2:12 ah yes, the "I don't know what I expected" face. That made me laugh out loud.
@jokpo6 ай бұрын
good Video, great Topic. Shocking how easy this stuff is, when you got the right, or wrong, tools.
@Ram177226 ай бұрын
As a basic pentester that always wants to learn more about how exploits work and looking to learn about how malware is created, I learned so much in this video looking forward to see more videos related to cybersecurity
@ScaredDonut6 ай бұрын
You should paint the drive red and keep it in a safe 😂😂
@fajaradi12236 ай бұрын
Especially before Linus about firing somebody
@zeendaniels58096 ай бұрын
That doesn't work, at all... Didn't you see Resident Evil? Yep.
@itsmileyy6 ай бұрын
Won’t painting it red just make it go faster though
@jonjohnson28446 ай бұрын
We had something like Borat at college 25 years ago, it was built into a whack-a-mole game, you could do weird stuff like open the CD drive, put up dialogue boxes that said 'yes' or 'yes'
@nicholasneyhart3966 ай бұрын
I wrote something similar to screw with my uncle. Man worked in I.T. for 15 years and bragged about being immune to viruses, I had a dialog box that said Cupholder? Yes or Yes and opened his unused cd drive. It is terrifying how easy it is to make a similar attack.
@jonjohnson28446 ай бұрын
@@Sonyboj It was in the UK, I'm sure it was 'Net(something)', I've lost a lot of brain cells since then! Good fun though!
@stevewhite733528 күн бұрын
@@jonjohnson2844 Netbus :)
@n1k7er456 ай бұрын
Linus: We got hacked with one of our hardrive, we need more security! Also Linus: 25 million viruses BABY!
@the-answer-is-426 ай бұрын
15:17 Regarding the XZ backdoor, it was far, far more scary than that. They were actually backdooring ssh, which for those unaware is a common remote control software that you often use to interface with Linux servers. Ssh doesn't even use XZ directly, it's patched in by some versions of Linux, so the people who works on ssh would have no ability to detect it by just testing their own stuff. If it had gone undetected it could have backdoored a significant number of Linux servers, and no one would know.
@PhillipParr6 ай бұрын
12:55 This isn't a specific PHP problem, but will happen in any language where the developers are new / lazy / don't know what they're doing. It only seems more common in PHP because PHP is / used to be the biggest language most people started with. As always, when coding anything security related in your language of choice, make sure to research what the current recommended methods are because they change frequently.
@ccricers6 ай бұрын
It's the common problem of a tech product becoming too popular and low/cheap barrier to entry. Just like how the Wii was home to tons of shovelware.
@tannermccoolman46476 ай бұрын
You're absolutely correct. I'd go so far as to say that it probably wouldn't have been anywhere near the issue that it is were it not for WP themes. Design firms would get hired to make a theme, they would design something that looks really great, then they'd cut corners on functionality by having anything that couldn't be accomplished with ACF simply coded in house by a designer that knew just enough about hooks to be dangerous.
@sohantanna6256 ай бұрын
One of the best sponsors + video combo for real
@MrCoconutMadness6 ай бұрын
VX underground on LTT?
@acters1246 ай бұрын
I wish they shouted out their website and asked viewers to donate. its a great resource and great to donate to researchers who are in the front lines of stopping these advanced threats.
@jan_harald6 ай бұрын
@@acters124 well they did the next best thing, by showing the website (with url), and saying that it's available for free, but they paid just as a donation and it's understandable they don't want to directly give malware to people, don't want some kid RAT-ing the entire school or whatever
@duchyre6 ай бұрын
@tausifjahangir6 ай бұрын
Cyber bully: I'm going to hack your system. Linus: Let me know if you need help.
@waltewhitesPhD6 ай бұрын
We use Threatlocker at work. That software is stupid cool!!!
@Playingwith3D6 ай бұрын
"I Bought 25 Million Computer Viruses." Yes, I bought a windows 11 key too. Don't feel bad. 😂
@zeendaniels58096 ай бұрын
Windows needs a bought key now? I didn't know... For how long has been that way?
@yumri46 ай бұрын
@@zeendaniels5809 since windows 1.0 so around 34 years. The thing is most computers come with windows already activated so you the consumer do not need to buy the key though you kind of already paid for it in the price of the computer.
@Cyberpunk_20236 ай бұрын
@@zeendaniels5809 Quite a few years now. Usually needed if you don't have a registered version of windows. If you have no OS you can still get the disc witrh a key, but there are ways to get unregistered windows, install it and then you buy a alphanumeric key to activate.
@yumri46 ай бұрын
@@zeendaniels5809 since windows 1 which was in 1985 so 39 years. The thing is most computers come with windows already activated so you the consumer do not need to buy the key though you kind of already paid for it in the price of the computer.
@caeryllium6 ай бұрын
@@zeendaniels5809 that's how they make their money
@EclecticNero6 ай бұрын
I work in CyberSecurity and I want to add that keeping software and OS up-to-date is extremely important. Also, having a good sense of skepticism is essential, don't run executables you don't trust fully, don't always think messages coming from someone you know are legitimate.
@jeroenk35706 ай бұрын
Do you know if it make any difference if you work on a standard account without any administrative privileges? It seems like the save thing to do, but how do all these companies end op with encryption locked systems. The first thing any IT admin does is take away privileges.
@EclecticNero6 ай бұрын
@jeroenk3570 It makes a huge difference. It's a lot harder to give admin privilege to malware when you, a user without admin privilege, try to execute it, despite UAC bypass, if you're using a non admin user, you'll get an admin login prompt. Some malware can still mess in your user files, but the extent of the damage is more limited.
@jeroenk35706 ай бұрын
@@EclecticNero Thanks, I thought so, but I just wanted to make sure.
@LeftJoystick6 ай бұрын
A simple program like Borat Rat would be incredible for family tech support.
@martinmethod4276 ай бұрын
I mean... at that point you might want to invest into the software most schools use to monitor the computers the students use. These types of software are basically a toned down Borat Rat. That being said, It's a lot of power you're going to be handling, and you better be able to not let it go to your head.
6 ай бұрын
I mean you already have free to use programs like teamviewer quick support module.
@dreamy_336 ай бұрын
@@martinmethod427 borat RAT is actually just a skidded from another OPEN SOURCE rat called "DC Rat"
@TruthDoesNotExist6 ай бұрын
especially if they give you a hard time
@PartyhatRS6 ай бұрын
If you guys can't manage to not act maliciously on family or spy on them for whatever reason other than when diagnosing a problem (with their permission), then you don't really deserve family.
@TinyGiraffes6 ай бұрын
19:30 I love how devient olam, who's a commercial physical security expert youtuber, helped that guy when he got arrested. It's interesting seeing history being so modern.
@troygilbert11126 ай бұрын
We use threatlocker at work, and man, it really is the best product out there. Even better than the product is the support and people behind it. Once you get this thing down its a beast.
@hamishahern20556 ай бұрын
me: "so how many of these 650,000 files on this hard drive can threatlocker protect me from" threatlocker says "we only support up to 70,000 of those" me: "what about the rest?"
@troygilbert11126 ай бұрын
@hamishahern2055 uhhhh do you understand how threatlocker works??? If you did, then you'd know anything not baselined/policy matched is hitting a default deny. Danny is one of the great leaders in cybersecurity with an innovative and proactive approach
@miha4936 ай бұрын
I'm confused and sad, because compared to other remote access software, like team viewer, this thing are lightweight, easy and fast to setup and super functional. Literally thinking about switching to this thing for my remote access.
@ichsasa6 ай бұрын
nd with the source code of it you can remove All stuff what is scary so you can trust it more than in his current state xD
@Trainguyrom6 ай бұрын
VNC is a free and open source protocol, so you could start there :)
@kylek69226 ай бұрын
8:21 Did Linus accidentally quote Sasha? "Dirty wizard or homeless santa" was such a great line Sasha used... in Brüno lol
@JanPeterDeVries6 ай бұрын
"accidentally"
@RolloWolf896 ай бұрын
Whoever was in charge of the glitching and the intro needs a raise! XD
@werejoji6 ай бұрын
Zero Trust. Smelly: This drive has thousands of viruses. Me: I don't believe you.
@EnnoGotthold19986 ай бұрын
Thank you for this amazing video! It was beautiful to be educated in a video of this. :)
@iwontliveinfear6 ай бұрын
So cool seeing programs I use professionally in an LTT video.
@hakijin3 ай бұрын
Wow very cool mysterious hacker man guy. I know fear and respect your likeness for the way you have inserted your technical prowess so no chalantly
@Th0rnnTh0rnn6 ай бұрын
The website of the company i work for got hacked using the exact backdoor linus talked about. the server was running an older version because our web-host was lazy but we all running the latest version now with better security.
@PartyhatRS6 ай бұрын
Hope that host is fired.
@Th0rnnTh0rnn6 ай бұрын
@PartyhatRS I wish. We are still with them, but now I manage the website instead of them.
@Stoner-Thangs6 ай бұрын
I was randomly suggested here while listening to the song “Dupe - Mbappe”, good content 😅
@gerowen6 ай бұрын
So ThreatLocker does for Windows what Flatseal does for Flatpaks and let you micromanage permissions on an app by app basis. That's pretty cool.
@rasperss_51766 ай бұрын
Awesome video. Shout out to VX and going beyond WiFi hacking and showing a nice surface layer of sandboxing and inspecting real samples of malware.
@adamsvette6 ай бұрын
Cool. Definitely want to see more things with this. Maybe just make an entertainment focused video where two teams race try to hack each other. Like a scrapyard wars challenge.
@Benni1000games6 ай бұрын
13:04 how did not one editor catch that? Passwords in systems like WP are not encrypted they are hashed that is a huge difference.
@RedEvee6 ай бұрын
i guess thats a HDD Linus is alowed to drop
@roomie4rent6 ай бұрын
Really appreciate more infosec content on LTT lately. While zany PC builds are interesting, this is the kind of subject matter that can be more readily applied, especially among IT folks who don't have much time to game. I hope you guys stick to the trend.
@bartz0rt9286 ай бұрын
A good reason to just in general have user accounts with very few privileges. Scary stuff, good job shining a light on it.
@SilverSmrfr6 ай бұрын
Love these videos with focus on security.
@franktothemax6 ай бұрын
~2006 we would pose as WAY TOO YOUNG TO HAVE ANYTHING TO DO WITH A CHAT ROOM and offer photos of our not-real selves. We were in high school, and we’d provide jpegs that were actually exe’s. Once they opened it, it was open season on these gnarly creeps. They were always the same type of creep (we could see what they looked like) and it almost always ended in their computer being broken. I still don’t know how we did it.
@swordofdamoclesv2856 ай бұрын
Possible video idea: try to brute force breaking through a ransomware using a crap ton of GPUs, or see what other tools exist out there for potentially defeating said ransomware
@AnotherAustin-z7b2 ай бұрын
Just ask chatgpt for the password
@TheRealOderless635gnat6 ай бұрын
“It’s just a prank bro” The prank:
@demacherius16 ай бұрын
its amazing how nice the backends of those tools are.
@CharlieTheMost1196 ай бұрын
There was a RAT called Sub7 back in the late 90s that had an amazingly functional (and frighteningly powerful) UI. Better than most of the legitimate remote administration tools we have currently. Kind of scary how something with that functionality is still around.
@miriripunchie6 ай бұрын
The cute setup is an eternal part of this channel now I love it
@ImKevan6 ай бұрын
Reminds me of SUB7 back in the day, but honestly, I feel like the UI on S7 was actually better, it obviously didn't have the same number of features, but then again, it didn't need them back then. Super cool video.
@snowcoi6 ай бұрын
both Sub7 and ProRat were better for their time.
@MaxxDJ296 ай бұрын
I bet yall could make a locking case that covers the power and data ports on that drive, greatly reducing the chance someone picks it up and tries to use it for something… maybe a FP vid?
@arthuralford6 ай бұрын
Or, just lock it in a safe?
@HanZie826 ай бұрын
Keep ruffling those feathers. People need to know these things. Awesome video!
@wyrdpig6 ай бұрын
More fun, interesting software overviews of obscure or hidden stuff like this! SO interesting.
@oo-eo9pw6 ай бұрын
The quickest way to get ratted is to try to rat someone else. If you see this, don't try to download ratting software because you think you're hackerman now. You're just going to get hacked instead.
@AnotherAustin-z7b2 ай бұрын
I don't understand why that isn't the status quo. You would think any hacking or virus stuff on the internet would be instantly hacked. And they be watching so as soon as you steal something they steal it from you, or just steal all your info and blackmail you for trying to do shady stuff.
@NifarisRed6 ай бұрын
0:23 Hey my code is perfectly safe ....
@happybunny19866 ай бұрын
More LTT, yes please
@robertdascoli9496 ай бұрын
2:53 God would never let a single virus desecrate Terry's holy work. (RIP)
@maryseturcotte27116 ай бұрын
The FACE Linus make at 13:32 is just priceless! 😂😅
@Rick-vm8bl6 ай бұрын
Tanner lost me when he started going on about PHP and encryption. Thats not a PHP thing thats a crappy programmer thing. PHP supports the exact same encryption methods as all major languages. Also eval is disabled out of the box on PHP. You'd have to knowingly modify the configuration to make use of it.
@Mmaaikel6 ай бұрын
It’s a classic PHP bash without them knowing what they are talking about. Makes me question all their other points.
@sbqp36 ай бұрын
I wasn't aware so I looked it up. Seems like it's using bcrypt and salting by default, with Argon2 as an alternative. Seems very reasonable.
@mjdevlog6 ай бұрын
well atleast now i know the whole base64 to eval can be done in python too
@deleted-blank6 ай бұрын
What if I told you crappy programmer was the average programmer and something like php lends itself to the average more than others?
@perform12616 ай бұрын
@@deleted-blank stop calling me out like this!!!!!
@mrmattyboy6 ай бұрын
Not going to make much difference, but saying "wordpress has pretty bad encryption" was confusing until you mentioned passwords and realised you meant "hashing"
@tannermccoolman46476 ай бұрын
Haha I fumbled a stupid amount of words and terms while on set. I really need to stop showing up to shoots sleep deprived.
@mrmattyboy6 ай бұрын
@@tannermccoolman4647
@FarFromEngineering6 ай бұрын
@@tannermccoolman4647 The PHP/Wordpress section should be redone honestly, what Linus says there is approaching technobabble.
@DRocRSS20126 ай бұрын
This reminds me of "The Net" With Sandra Bullock
@ivanstefancic89386 ай бұрын
13:35 😂😂😂 Linus face reaction lmfao
@_Magnuss_6 ай бұрын
500$ for something like that is a real steal when you think about it in a corporate context. The value form of preventive training and pen testing of systems is priceless for most companies.