Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable

  Рет қаралды 209,565

David Bombal

David Bombal

2 жыл бұрын

It's just crazy scary what these cables can do. They look like normal USB cables, but are not! In this video we login to Apple MacOS and Linux computers :)
======
Scripts:
======
Apple macOS Rickroll: davidbombal.wiki/applerickroll
Linux Rickroll: davidbombal.wiki/linuxrickroll
=======================
Buy Hak5 coolness here:
=======================
Buy Hak5: davidbombal.wiki/gethak5
================================
Hacking Android and iOS devices:
================================
OMG with Android and Apple iPad: • So you think your phon...
=============
Setup Videos:
=============
OMG Cable setup: • O.MG: From zero to hero Hak5
Rubber Ducky setup: • How I did it (hak5 rub...
================
Connect with me:
================
Discord: / discord / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombalyoutube: / davidbombal
keylogger
keylogging
key logger
hak5 keylogger
macos keylogger
hak5
omg cables
omg cable
apple
apple macos
linux
ubuntu
ubuntu hack
linux hack
rubber ducky
hak5 rubber ducky
hak5 omg cable
omg cable android
omg cable ios
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#omgcable #hak5 #rubberducky

Пікірлер: 407
@davidbombal
@davidbombal 2 жыл бұрын
It's just crazy scary what these cables can do. They look like normal USB cables, but are not! In this video we login to Apple MacOS and Linux computers :) ====== Scripts: ====== Apple macOS Rickroll: davidbombal.wiki/applerickroll Linux Rickroll: davidbombal.wiki/linuxrickroll ======================= Buy Hak5 coolness here: ======================= Buy Hak5: davidbombal.wiki/gethak5 ================================ Hacking Android and iOS devices: ================================ OMG with Android and Apple iPad: kzfaq.info/get/bejne/bb-gfbSFmpvDiWw.html ============= Setup Videos: ============= OMG Cable setup: kzfaq.info/get/bejne/jJudda151Nq-pmR7.htmlak5 Rubber Ducky setup: kzfaq.info/get/bejne/d5h6gaWhutXYioE.html ================ Connect with me: ================ Discord: discord.com/invite/usKSyzbTwitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombalKZfaq: kzfaq.info Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
@swarnajeevan1345
@swarnajeevan1345 2 жыл бұрын
i sorted that out
@Gglsucksbigballz
@Gglsucksbigballz 2 жыл бұрын
Almost as “crazy scary” that the content creator thinks people will heed his advise.
@daymelrensoli8096
@daymelrensoli8096 2 жыл бұрын
Please what laptop are using?????
@fukushima4670
@fukushima4670 2 жыл бұрын
Where there are hosts... there will always be tapeworms and other assorted parasites. Some humans are just really evolved parasites.
@rogersepeda
@rogersepeda 2 жыл бұрын
You couldn’t use that on a government computer, they’ll find out right away . You can’t plug in anything. Maybe a cac reader but even at that I’m not sure if that’s even allowed.
@lodewykblignaut7844
@lodewykblignaut7844 2 жыл бұрын
It's scary how clueless I am about things like this. Thanks Mr Bombal for educating people about the danger of technology. This can help keep me and my family safe from dangers like this. 🙏😁
@davidbombal
@davidbombal 2 жыл бұрын
You're welcome!
@juliusrowe9374
@juliusrowe9374 2 жыл бұрын
Great content as always David! Would love to see the reverse shell demo with the OMG cable!
@JohnTurner313
@JohnTurner313 2 жыл бұрын
3:30 This is not a problem with any OS, and using it against a Linux or Mac computer says nothing whatsoever about the OS capabilities. The cable is a hardware device that requires physical access to install. If a bad actor has physical access to your computer to install that cable, there are any number of ways to get past all operating systems. Physical access generally means game over.
@Fostravel
@Fostravel 2 жыл бұрын
Exactly. Good potential review, flawed by misleading logic/clickbait?
@hardik.satasiya
@hardik.satasiya 2 жыл бұрын
yes you are 100% right, if you have physical access anything is possible ... it's not OS-dependent, I can stand there and watch someone enter a password 😁
@freedustin
@freedustin 2 жыл бұрын
@@hardik.satasiya yeah but you can't reverse shell thru your eyeballs now can you?
@hardik.satasiya
@hardik.satasiya 2 жыл бұрын
@@freedustin neither anyone will plug suspicious wire and tell ok dude I plugged in now just fire reverse shell and browse my pc ... and how it's related to OS? 🤔 and may be I don't even need reverse shell, I can just type password and open regular shell if I need
@freedustin
@freedustin 2 жыл бұрын
@@hardik.satasiya Well that's a lie. I see people jacking charge cables all the time and using them. It's not OS related, I didn't even mention OS at all, this even works on phones. Regular shell? So what? Can you exfiltrate data protected by an IDS with that? Nope.
@szabi0112
@szabi0112 2 жыл бұрын
OMG! I am really scared! Awesome video David as always. Please carry on! Thank you so much for the demonstration.
@educastellini
@educastellini 2 жыл бұрын
-Great content Professor David Bombal...!!! -So, these keylogger and reverse shell tools are getting easier to use every day. -About 10 years ago I programmed in devices such as cellular microcontrollers and nini laptops exactly this type of system (keyloggers and reverse shell) for my government operators, nowadays they sell these same tools on the internet that 15 year old boys can buy with his father's credit card on the Internet to take credentials of his colleagues of High school. -Times are really changing...!!! -Thanks for the knowledge Professor David...!!!
@klote82
@klote82 2 жыл бұрын
This is the only technology based channel that I watch. How the hell do you stay on top of all this hacking stuff? Lol, I love it! Kali is really the best OS for hacking, cracking, sniffing!
@jaysongalicia8142
@jaysongalicia8142 2 жыл бұрын
This is the most frustrating thing to happen, getting hack and Rick rolled at the same time. Thanks David for this kind of video, so people realize the danger of a random USB cable that they pick up somewhere.
@filipandersson1415
@filipandersson1415 2 жыл бұрын
Interesting. I'm a novice when it comes to IT and up until this point in my life I would have trusted a cable like that. This ends now. Thanks David!
@sdeb729
@sdeb729 2 жыл бұрын
Amazing video, amazing hardware. Thank you for opening our eyes to this tech. It would be nice to see your recommendations at the end of this video as to what can be done to defeat this sort of attack beyond the obvious thing to only use a charging cable purchased from a reputable source.
@erlicthemad
@erlicthemad 2 жыл бұрын
Interesting, I heard of this vulnerability. First time seen a demo of it in action. A good reason to know your cables, and always run with minimal access.
@JSp3ct0r
@JSp3ct0r 2 жыл бұрын
Yes please!! A video on how to get a reverse shell would be awesome! Also, this is extremely scary. Never leave your laptop/phone unattended in a public place. Amazing content as always!!
@davidbombal
@davidbombal 2 жыл бұрын
Thank you! Will create that video 😀
@snipeminecrafter3001
@snipeminecrafter3001 2 жыл бұрын
NetworkChuck made a video on that! Go check it out man! it's awesome!
@abumahraz5948
@abumahraz5948 2 жыл бұрын
Will love to see the reverse shell video sir. Thanks for the videos, we really are learning from them.
@Esscarra
@Esscarra 2 жыл бұрын
Yes! More omg content! A video on reverse shell would be very welcomed!
@dorab.theitexplorer6462
@dorab.theitexplorer6462 2 жыл бұрын
Oh you made me remember an incident! My friend in some governmental sector told me that they brought several new computers..they run some tests and they discovered that some PC cables have antennas in them to send data to the building cross the street. I think this is the same concept
@davidbombal
@davidbombal 2 жыл бұрын
Similar kind of idea. Just scary that this looks just like a normal cable.
@michaelfabulous5574
@michaelfabulous5574 Жыл бұрын
Lol I know what your talking about! Lol too old right? Like James bond. Lol
@farazhassan6417
@farazhassan6417 2 жыл бұрын
This is because you plugged the OMG cable, Hacking or Keylogging for many is only a danger when it is done remotely, by having access phisically and putting a device which records and replay would be last thing for me . . . because nobody has so much access to my device. Sure great work and information. Cheers!
@zadkieladdae8145
@zadkieladdae8145 2 жыл бұрын
David, do a tour video on your home office setup. Thanks your for your endless effort.
@shashankkshekarchaturvedi8390
@shashankkshekarchaturvedi8390 2 жыл бұрын
Thank you David Bombal for this amazing video. It’s rare to find such quality content online. Could you please make a video on reverse shell on IPhone using Mac
@alexbik
@alexbik 2 жыл бұрын
It's a neat cable, but let's get one thing straight: You are not 'attacking' MacOS, nor are you attacking Linux, you are attacking the hardware. Obviously, an operating system can never be more secure than the hardware it runs on.
@windmael47
@windmael47 2 жыл бұрын
MFA is almost an industry standard within enterprise. Password never guarantees safety, apart from this USB something as simple as dictionary attack can break the login. So Apple could at least provide optional MFA for login to protect us from such threats. Great video anyway, thanks!
@z00h
@z00h 2 жыл бұрын
@@windmael47 MFA is an industry standard to log on into laptops in enterprise applications? Which industry is it?
@edgay
@edgay 2 жыл бұрын
@@z00h Utopia 😸
@z00h
@z00h 2 жыл бұрын
@@edgay it clearly must be haha. @Jonni stop smoking dat krak boyyyy.
@scottym50
@scottym50 2 жыл бұрын
A great video as usual. I always learn something from your great videos. Thank you.
@karanb2067
@karanb2067 2 жыл бұрын
Amazing vid! I would love a msfconsole and msfvenom tutorial coming from you.
@abdulbasit-jj8qf
@abdulbasit-jj8qf 2 жыл бұрын
CRAZY!!!! Love all your contents DAVID.... please make a video on how to get a persistent reverse shell...
@fernandosantos3576
@fernandosantos3576 2 жыл бұрын
Word of advice: do not "shove" an "innocent" pen drive or an "innocent" cable that you just found into any of your devices. Be also aware that an "innocent" charging point may be not as innocent as it seems...
@elham7459
@elham7459 2 жыл бұрын
Don't let that innocent-looking pen drive or cable take your device's innocence.
@lhffan
@lhffan 2 жыл бұрын
Same with all cables you find in computer store
@erlicthemad
@erlicthemad 2 жыл бұрын
Why you use a usb condom if you need a charge from an untrusted port.
@blork74
@blork74 2 жыл бұрын
You made the mistake because you allowed this cable to be connected to your computer. That's what I learned from this video thanks so much David.
@nickrathmann3204
@nickrathmann3204 2 жыл бұрын
Hey, I would like to see if you could do the same key logging and applying payloads on an Mac book, if a usb c to usb c OMG cable is used to charge it. Because I think this might be a really good way to get trapped, especially if your laptop is out of battery like it often happens to students in a library or on campus in general. And if the OMG cable is also capable of key logging your iPhone if you use Face ID to open it up, because you aren’t really typing. Really enjoying your content and definitely never borrowing a cable again!!
@SapphireKR
@SapphireKR 2 жыл бұрын
Hey David loved the video! Can you please make a video on how to counter & protect outself from this type of stuff?
@eternialogic
@eternialogic 2 жыл бұрын
A very good reason for a CEO to have his own bug sniffer crew that checks new hardware and old ones often.
@HighSpeedNoDrag
@HighSpeedNoDrag 2 жыл бұрын
Nothing New for CEOs and other Corporate Entities to have "Stand By" Counter Crews on contract, on notice.
@shreeshaaithal-
@shreeshaaithal- 2 жыл бұрын
Yes David bombol again with the beast videos
@tulasideviful
@tulasideviful 2 жыл бұрын
This was fascinating, thanks, David. I'm in love with that curved long screen. Where can I buy one? 😊💻
@coomservative
@coomservative 2 жыл бұрын
they are not practical, look up 4k curved screen regret
@Will-kt5jk
@Will-kt5jk 2 жыл бұрын
For some reason, the explaining the same technique, finishing with the tagline "as you can see, I've been able to Rickroll you" reminded me of Patrick Stewart on Extras, explaining various plots to Ricky Gervais' character, ending with the tagline: "then all of their clothes fall off" followed by "but it's too late... ...I've seen everything"
@RTechTips
@RTechTips 2 жыл бұрын
These are just some examples, I am totally agreed with you. Even anything connected or download can hack your system. That's so easy only way to avoid it do not connect with untrusted or let it be happen . I am using reverse shell but for monitoring purposes but that is also a very easy task. Avoid anything which is not your or just ignore it. Everything is secured when you have it otherwise forget security
@daemdae2097
@daemdae2097 2 жыл бұрын
Hey, David Thank you so much for your videos. I got a question for the omg cable, if the target unplugged the omg cable will it be exploitable, or will it be disconnected?
@TheChessJPriya
@TheChessJPriya 2 жыл бұрын
Thanks for your Content. It really helps us
@grosgogogogt
@grosgogogogt 2 жыл бұрын
the miniaturization to be able to put it in a cable is incredible
@mrse7en196
@mrse7en196 2 жыл бұрын
David to Everyone who wants to learn Networking: Never gonna give you up!! Never gonna let you down!!!
@ZhivkoLefterov101
@ZhivkoLefterov101 2 жыл бұрын
Hello David, THanks for the great video! you should try this but when there is JumpCloud client installed on the Mac/Linux/Windows. will it work again? Is the user which you scan a local one or its a cloud account like JumpCloud account? thanks
@johneandre9206
@johneandre9206 2 жыл бұрын
Excellent video!!! I'll see the reverse shell video too..
@abdulmuiz2000
@abdulmuiz2000 2 жыл бұрын
This cable is crazy thank you sir for the eye opening info
@LouisSerieusement
@LouisSerieusement 2 жыл бұрын
a friend of mine use to build fake usb key like that few years ago but having it so small that it fits into clables is frightening ! I would love to see the circuitboard of this ! (Edit: I found pictures of the inside !) Thanks a lot :)
@davidbombal
@davidbombal 2 жыл бұрын
You're welcome!
@kakau5758
@kakau5758 2 жыл бұрын
Please do a video on reverse shell attack. That's so awesome!!
@MangolikRoy
@MangolikRoy 2 жыл бұрын
Now I have to pay really serious attention bcz on of my friend buy some stuffs from hak5 and this cable too while watching your video Help me GOD!! 😅
@BobSmith-kd6lq
@BobSmith-kd6lq 2 жыл бұрын
Holy begeebus! How can this be allowed? Huge props for telling us about it
@nathansnow
@nathansnow 2 жыл бұрын
How interesting 🤔 I wrote a simple Java keylogger a while back that gets deployed within an image and runs on opening. It then runs as a background process and logs chunks of approximately 1000 keystrokes which then get sent to a MySQL database
@edwinaag
@edwinaag 2 жыл бұрын
Shud be a way to detect which cable is an OMG cable or a regular one. Just in case you put 2 cables together.
@hellocreed
@hellocreed 2 жыл бұрын
Excuse me Mr.Bombal but I couldn't help but notice a typo in the title...I think its 'login' instead of 'logon'...anyways the video was awesome...as always ; )
@mrphraner
@mrphraner 2 жыл бұрын
this video in itself deserves a subscription
@andredavis3350
@andredavis3350 2 жыл бұрын
you get more widescreen monitor upgrades than I've ever seen! What happened to the LG 34WK95U-W and the Apple display XDR?
@Jimbo898
@Jimbo898 2 жыл бұрын
Can you imagine passing these things out at tech conferences as part of a swag bag? I would think they would be able to install a tunnel feature that could run a payload after the first login, to compromise password integrity, open ports and services create a VPN to tunnel out to a, drop server to collect all the goodies.
@davidbombal
@davidbombal 2 жыл бұрын
Hak5 did just that and spoke about it in this video: kzfaq.info/get/bejne/edaddtKJm9HSY2w.html
@dashcamdiariessa
@dashcamdiariessa 2 жыл бұрын
Nice new monitor Mr Bombal
@gifthlongwane8664
@gifthlongwane8664 2 жыл бұрын
Thank You Sir David for the video.
@davidbombal
@davidbombal 2 жыл бұрын
You are very welcome
@iakashx
@iakashx 2 жыл бұрын
Yes David. I am curious how can we get rev shell from OMG cable.
@luctiber
@luctiber 2 жыл бұрын
Hi David, amazing video… 2 question: how to identify an omg cable from regular ones (what if friends provide you a cable) and how to identify something is fishy on my laptop? Thanks
@MrMeek79
@MrMeek79 2 жыл бұрын
a very unique and new way to rick roll people. This is crazy that you can have keyloggers in a cable
@PicyPoe
@PicyPoe Жыл бұрын
0:01 I am pretty sure we all just got trolled by David! It is not about the cable, but the MONITOR!!!! Looks at that MONSTER!
@Bob-of-Zoid
@Bob-of-Zoid 2 жыл бұрын
Well, a hacker would have to have physical access to the device, or get you to use their cable: Being a Linux user, I never heard anyone saying that Linux can prevent all attacks from anyone with physical access to the device, but I have seen plenty of times people reporting on vulnerabilities in Linux as a "Big Problem" and leaving out the part that it can only happen with physical access! Linux can also be penetrated otherwise, but for the most part only if the user does not use good security practices. With Windows even that's not enough: It's not like you can keep Microsoft out!
@ChrisHillASMR
@ChrisHillASMR 2 жыл бұрын
linux is only as good as ur ssh password/key. if u can man in the middle ur toast.
@Jimbo898
@Jimbo898 2 жыл бұрын
David try it with a software overlay keyboard and see if that captures it. How about biometric login? How about a reverse payload to your device?
@Alain9-1
@Alain9-1 2 жыл бұрын
clean tutos as always
@351gt
@351gt Жыл бұрын
Did you end up making the reverse shell video to access devices that I own, that I’ve left at home, so I can access them from a mile away?
@0day__
@0day__ 2 жыл бұрын
You are the best David
@davidbombal
@davidbombal 2 жыл бұрын
Thank you!
@keithrodgers1030
@keithrodgers1030 2 жыл бұрын
So many ways in , screen mirroring, sharing, key logging, wifi & Bluetooth once you have these enabled, then their is pairing to smart tvs using streaming. Best way is to shutdown your appliance and unplug the power. One other point on ac mains switch the positive & negative poles then they switch on the appliance remotely.
@JohnMurphy-jh8pj
@JohnMurphy-jh8pj 2 жыл бұрын
Yes scary, but such a greet video. Thanks for the info and education.
@v300
@v300 2 жыл бұрын
In Linux, you can choose what VendorID and what DeviceID can be plugged in. On my workstation at work, I have allowed existing devices to be plugged in and everything else is denied. Once in a while when I get a new device or a thumb drive I edit this file.I also get a message in the logs that a device failed to be recognized.
@Makedonec007
@Makedonec007 2 жыл бұрын
It would be awesome to see a reverse shell on Mac and Windows!
@kishorkumarpaul5159
@kishorkumarpaul5159 2 жыл бұрын
Hello sir, Thanks to you first. Your work is really great. Now come to the main topic. From your giveaways i had got Ethical hacking for beginners course and completed that some days ago. Now I'm continue with network+. But I thought that I need to know more about security. That's why I want a security+ course so that I can increase my knowledge about that.
@moysevalentine6117
@moysevalentine6117 2 жыл бұрын
nice video. learnt something helpful today... my question is, how do we know a cable that has keylogger. can you make a video on how we can know each cable.
@Netsh3ll
@Netsh3ll 2 жыл бұрын
You changed my life sir
@Linux1972
@Linux1972 2 жыл бұрын
So, we have to have to have the user connected by the OMG cable and we can capture the keystrokes wirelessly via the app on our phone. What if the user has a wireless keyboard? Wouldn't it be a little ominous if suddenly a cable was running from it?
@z08840
@z08840 2 жыл бұрын
ominous and useless - wireless devices only use cables for charging :)
@user-fw7tk9uw9x
@user-fw7tk9uw9x Жыл бұрын
tried using the usb-c to lightning omg cable on my iPhone 12, tried the key logger and payload-nothing happened. I have an older iPad that still uses lightning and tried the key logger and payload and again nothing happened either. I connected the usb-c to my windows computer, I was able to send a payload, but key logger did not work. not sure what I'm doing wrong
@kollachaithanya1178
@kollachaithanya1178 2 жыл бұрын
waiting for that reverse shell vedio ✨
@hatsandboots
@hatsandboots 2 жыл бұрын
Am I right that for this cable to (mal)function the system needs a firmware update, and possibly a device driver installation? It's not just unplug one cable and plug in another.
@mukut5ul
@mukut5ul 2 жыл бұрын
Amazing, now I know why u need to be careful while downloading any file or copying from usb
@SystemDemon
@SystemDemon 2 жыл бұрын
Show me the reverse shell David :D. One problem though I don't have the financial state to buy this. But I would love to see it
@stevejohnson1321
@stevejohnson1321 2 жыл бұрын
If you have access to the machine, many Ubuntu etc. can be accessed as root through the repair console. I won't describe it here, but easy enough to find out. Ubuntu is as secure as you want to make it, which may mean disabling this under grub.
@VBLN
@VBLN 2 жыл бұрын
I would like to see Apple investigate this, because they are pretty good when it comes to fake charger connection, but I believe you would be fully compromised by the time Apple can prevent the attack
@PS_Tube
@PS_Tube Жыл бұрын
That's scary stuff ! Imagine setting up these multiple cables at free charging points... Hundreds or thousands of devices can get accessed by malicious parties.
@anonhollmuller4032
@anonhollmuller4032 2 жыл бұрын
greez! would you may tell me wich model your curved screen is? best regards and thank you for this video!
@lawabidingcitizen5032
@lawabidingcitizen5032 2 жыл бұрын
Does it capture password if it's an auto fill from password manager?
@LordLarryWho
@LordLarryWho 2 жыл бұрын
Reverse shells are just as possible on Mac OS, you just have to escape the colons in the script
@KapilDevMishra
@KapilDevMishra 2 жыл бұрын
how does it communicate with phone over WiFi/Bt/CellData?
@MickV13243
@MickV13243 2 жыл бұрын
When you had it plugged in to the laptop, would it still log the keys of the laptop's keyboard if there was no keyboard attached to the other end of the cable? Also, would love to see a reverse shell video
@_szyha
@_szyha 2 жыл бұрын
Nah, it prob only logs keys that go "through" the cable.
@supersilverhazeroker
@supersilverhazeroker 2 жыл бұрын
how does this work though.. surely the cable must start up some kind of script/program on the pc so should it show up in taskmanager or htop or something? how can you see wether a cable is a undercover keylogger?
@manaspant1929
@manaspant1929 2 жыл бұрын
Even a simple cable can create disaster for you 😨😨 mindblowing demo
@idhantsood1105
@idhantsood1105 2 жыл бұрын
People usually think that Mac and Linux are virus-free but they can also be hacked as excellently demonstrated in the video! Keep up the great job.
@tonyman1106
@tonyman1106 2 жыл бұрын
If it connected to a network it can be hacked
@chiroyce
@chiroyce 2 жыл бұрын
Anything is hackable - it's just that Windows is the easiest to hack.
@themedleb
@themedleb 2 жыл бұрын
Well, anything is hackable, but this is not a virus.
@mrniceguy6050
@mrniceguy6050 2 жыл бұрын
By the looks of it this is a hardware hack which has nothing to do with the virus sensitivity of the OS.
@chiroyce
@chiroyce 2 жыл бұрын
@@mrniceguy6050 Yep. Dangerous, but not the OS's fault.
@DMkiller100
@DMkiller100 2 жыл бұрын
Can you open this cable in a other Video? I ask me can i destroy this with a Magnet or something else and the cable is normal still working?
@pp-pl2zg
@pp-pl2zg 2 жыл бұрын
Wow, so enlightening!
@Gr33n37
@Gr33n37 2 жыл бұрын
How you doing Mr.bombal, am from Uganda(Africa) am interested in the separate video on how to create a strong reverse shell to a computer even when its shutdown I can still have access. Thanks
@iscofe3968
@iscofe3968 2 жыл бұрын
This is insane. Do you recommend typing while cable is unplugged? How to tell these omgcables from a clean one?
@O.MG-MG
@O.MG-MG 2 жыл бұрын
OMG (sold on Hak5) also has a Malicious Cable Detector ;)
@justinharmer4061
@justinharmer4061 2 жыл бұрын
So does it only capture key strokes while it’s plugged in, or does it actually install a keylogger on a target device?
@jnb756
@jnb756 2 жыл бұрын
if you have enough physical access to my laptop to plug a cable into it you have more than enough access to use about 40 different ways to gain access to it even though it is running Linux. One thing you may want to explain is you are not going to capture keystrokes from the laptop with that cable - you didn't say that you could but you didn't say you couldn't either, as there is no way for the cable to man in the middle the keyboard of a laptop. What is truly frightening are the wireless keyboard capture devices - simply sit next to someone with a wireless keyboard and log everything they type. I believe they only work on Bluetooth wireless keyboards at this time due to the different frequencies and such between different manufacturers but it's only a matter of time before all wireless keyboards are leaking secrets
@Lar_ry
@Lar_ry 2 жыл бұрын
its not hard to sniff random packets that float around the air... I have opened car doors in a very similar way.
@Makulax
@Makulax 2 жыл бұрын
I used keyloggers 20 yrs ago. The wired one is just a bit more fancy.
@natureiscrazy
@natureiscrazy 2 жыл бұрын
Only attack my own devices for learning purposes ♥️ going to try get one for my Birthday 🎉
@davidbombal
@davidbombal 2 жыл бұрын
It's a great product!
@MultiAlbon
@MultiAlbon 2 жыл бұрын
​@@davidbombal lol, at first normally attack own devices, to learn and be faster when like to attack someone else. :D That login for linux, password was taken and put inside the script before. Even that cable can open everything, for combination (numbers,letters&caracters) need more time! If someone go to the prison because of this way, you are that person who teach "victims" to make another victims! Who like to go in prison..? It is very simple! 1 go near to station of police.. 2 take a stone.. 3 shoot one glass door or window in that buildin. 4 Done! Just wait little, someone will come and tell you the place :D Keyloger, exist from very very long time, i know from 2002. There was a program (free download) + pay for full. It works hidden and send to the email info; small screen position of mouse click, keyboard, links you visitet and much more... In my idea, a professional keyloger needed for... Relationship or parents who give devices to kids under 18! That makes better life to understand more your kids and partner. You already have started to teach or show unique thinks, but try to teach for better ideas and pushing them to a dangerous game. Some childrens understand fast and is like a game for them to do this things... Thanks and sorry for JUDGING YOU.
@z08840
@z08840 2 жыл бұрын
@@MultiAlbon "That makes better life to understand more your kids and partner." - ahahahah, oh my gosh, this is hilarious :D
@MultiAlbon
@MultiAlbon 2 жыл бұрын
@@z08840 lol, that is funy for you? Good to know youre kid!
@z08840
@z08840 2 жыл бұрын
@@MultiAlbon lol, you know I'm a kid? Good to know you are an imВeсilе! :D
@TheSillybits
@TheSillybits 2 жыл бұрын
So that cable is emitting a wireless signal, is it possible to detect it somehow with a bluetooth or wifi device?
@makedredd299
@makedredd299 2 жыл бұрын
Hi David when you say that these omgcables have a range of 1 mile. Do you mean 1 metric mile or 1 imperial/standard mile (US, UK)?
@davidbombal
@davidbombal 2 жыл бұрын
1600m: Full test and details here: kzfaq.info/get/bejne/mMCCfbiVrs6umWQ.html
@makedredd299
@makedredd299 2 жыл бұрын
@@davidbombal Thanks!
@SystemDemon
@SystemDemon 2 жыл бұрын
Omg I want that cable. If I'm not in student dept I'll buy it for sure
@Megaheropap
@Megaheropap 2 жыл бұрын
Thanks for finally doing a Mac video! How can we fully remove the keylogger and prevent it?
@patrickdee7365
@patrickdee7365 2 жыл бұрын
Deny all usb access and permit every single time
@strandvaskeren
@strandvaskeren 2 жыл бұрын
Any usb device can claim to be a keyboard and and a usb keyboard works right after power on, way before any OS is loaded, you can use a usb keyboard to get into bios at boot and so on. Only way to prevent it is by filling your computers usb slots with hot glue, making sure no one can ever fit a usb device to the computer. However 2-factor authentication can make the keylogging rather useless - sure the hacker keylogged your username, password and the confirmation code texted to your smartphone, but next time the hacker tries to use your username and password, he/she will have a really hard time getting hold of the new confirmation code received by your smartphone, the old confimation code doesn't work anymore.
@ramnikTDM
@ramnikTDM 2 жыл бұрын
Sir on of the frist ones and want to be like Kevin mitnik in future,my role model is Kevin mitnik and you r my inspiration ❤️
@CliffCarmichael
@CliffCarmichael 2 жыл бұрын
of course you want to lol
@gjsatru3383
@gjsatru3383 2 жыл бұрын
Hey Ramnik try to be yourself not Kevin mitnick . Kevin mitnick never thought he would be someone lol
@ramnikTDM
@ramnikTDM 2 жыл бұрын
@@gjsatru3383 thank you,its true I understood. ❤️
@fusion9619
@fusion9619 2 жыл бұрын
So how do you detect an OMG cable or similar devices? Defense how?
@snoopfall3201
@snoopfall3201 2 жыл бұрын
Mr.David you are very scary and dangerous man.
@WillGilpin
@WillGilpin 2 жыл бұрын
This is why some secure orgs I've worked at superglue the cables in. Cost is higher if there's a fault, but sometimes it's worth it
@quadracer392
@quadracer392 2 жыл бұрын
I know this works via the cable but with normal key loggers, could you use an "on screen" keyboard to keep from logging your key strokes for passwords and sensitive info?
@KalaniMakutu
@KalaniMakutu 2 жыл бұрын
On-screen keyboards are presently immune from being captured by the O.MG Cable Keylogger. However, there is also payload support. If that is used while the user is signed in, there are a ton of ways that would let you capture on-screen content. As it can type a hundred characters per second, it’s reasonably easy to hide loading a malicious script with a momentary pop-up that looks similar to what you get when launching some apps for the first time.
@patrickdee7365
@patrickdee7365 2 жыл бұрын
You can just enable multiple log in prompts, she script assumes it has directly access after the first use
@strandvaskeren
@strandvaskeren 2 жыл бұрын
A usb device can tell the computer that it's a graphics card and watch what you're doing on the on screen keyboard.
Tails Linux USB with Persistence (Be invisible online in 7 minutes)
10:47
Slow motion boy #shorts by Tsuriki Show
00:14
Tsuriki Show
Рет қаралды 9 МЛН
Nastya and SeanDoesMagic
00:16
Nastya
Рет қаралды 31 МЛН
DEFINITELY NOT HAPPENING ON MY WATCH! 😒
00:12
Laro Benz
Рет қаралды 62 МЛН
The MOST private browser
8:14
Naomi Brockwell TV
Рет қаралды 855 М.
macOS vs Linux | the ULTIMATE comparison
12:12
uncover+
Рет қаралды 234 М.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 1,7 МЛН
hack like Mr. Robot
3:55
NetworkChuck
Рет қаралды 448 М.
Remotely Control Any Phone and PC with this Free tool!
17:15
Loi Liang Yang
Рет қаралды 820 М.
MacOS Is Horrible Until You Learn How To Use It
12:26
Bog
Рет қаралды 125 М.
Best Hacking Laptop 2023
33:44
David Bombal
Рет қаралды 912 М.
Hide secret files in music and photos (just like Mr Robot)
31:16
David Bombal
Рет қаралды 80 М.
Я купил первый в своей жизни VR! 🤯
1:00
Вэйми
Рет қаралды 2,8 МЛН
НОВЫЕ ФЕЙК iPHONE 🤯 #iphone
0:37
ALSER kz
Рет қаралды 270 М.
iPhone 15 Pro Max vs IPhone Xs Max  troll face speed test
0:33
Ноутбук за 20\40\60 тысяч рублей
42:36
Ремонтяш
Рет қаралды 379 М.