No video

How Hackers Could Wirelessly Bug Your Office

  Рет қаралды 934,072

Motherboard

Motherboard

Күн бұрын

You think about securing your laptop, but what about your desk phone, monitor, or printer?
In the second episode of Can I Hack It?, made possible by Mr Robot on Amazon Prime, white hat hacker Ang Cui demonstrates hacks on “embedded devices”-objects that contain computing systems but that you wouldn’t necessarily think of as computers.
At his office in New York, Cui shows us how he can turn an office phone or printer into a bugging device using a piece of malware he calls “funtenna.” This exploit makes the equipment transmit data over radio frequencies so it can be picked up by an antenna-without the hacker ever having to go near the device.
It’s a pretty high-level hack, but as Cui says, if he’s thought of it, you can imagine someone else has.
Click here to watch Mr. Robot on Amazon Prime: amzn.to/29zli1w
Subscribe to MOTHERBOARD: bit.ly/Subscrib...
Follow MOTHERBOARD
Facebook: / motherboardtv
Twitter: / motherboard
Tumblr: / motherboardtv
Instagram: / motherboardtv
More videos from the VICE network: www. vic...

Пікірлер: 898
@maxhale2382
@maxhale2382 7 жыл бұрын
I think the most important part of hacking is having as many windows open as possible. Preferably with scrolling multicolored text.
@suicidaljell
@suicidaljell 6 жыл бұрын
Max Hale that’s how you can tell they are deep in it.
@seanld444
@seanld444 6 жыл бұрын
Not true. You forgot the flashy fingers gliding across the keyboard like it's a race against time.
@iKingRPG
@iKingRPG 5 жыл бұрын
Max Hale when in command prompt do "color a" there. You are a hacker now. Congrats.
@rabbitdrink
@rabbitdrink 5 жыл бұрын
@@iKingRPG just do base64 -w 0 < /dev/urandom
@zxxczczczcz
@zxxczczczcz 5 жыл бұрын
@@rabbitdrink what does that do?
@qwertywtflol
@qwertywtflol 8 жыл бұрын
Sponsored by Amazon, the biggest collector of customer/consumer data on the planet.
@Falcrist
@Falcrist 8 жыл бұрын
Second biggest after Google IIRC. Also, don't forget about Microsoft and Apple.
@ElXtronic
@ElXtronic 8 жыл бұрын
& they still aint worth a damn thing.
@Jesus.the.Christ
@Jesus.the.Christ 8 жыл бұрын
Don't forget about the NSA.
@Falcrist
@Falcrist 8 жыл бұрын
Jesus Christ They're not a collector of customer/consumer data. They're a collector of *_EVERYONE'S_* data.
@Jesus.the.Christ
@Jesus.the.Christ 8 жыл бұрын
Falcrist What's the difference? Don't forget that government is a business. It's an overly large and cumbersome organization structured so that parts of it can make some people a lot of money.
@bdeflorence
@bdeflorence 4 жыл бұрын
It's called RF imposition. The Russians used this technique to bug the US Moscow embassy in the 70's. At the time, it required a very large antenna to collect the signals. Basically, the vibrations of the molecule of air (i.e. sound) will make any object in the room also vibrate, and that includes electronic circuit boards. As per Maxwell equations, as mentioned by the chap, a vibrating electronic circuit board, even if switched off, will generate an electronic signal. It then becomes just a matter of collecting that signal.
@sapphiro
@sapphiro 8 жыл бұрын
You can bug me all you want, I have put a sticker tape on my phone's camera. All you can get is me moaning.
@WilliamSchlott
@WilliamSchlott 8 жыл бұрын
I'd rather get my girlfriend moaning thank you.
@nawman2033
@nawman2033 8 жыл бұрын
Fuckin hell William you sausage
@potato511
@potato511 8 жыл бұрын
and keylogs, and passwords and usernames, and facebook profiles which have pictures ;D
@mario6279
@mario6279 7 жыл бұрын
Benjamin Lafever yup that good old spyware
@AshisKumarSahoo1
@AshisKumarSahoo1 7 жыл бұрын
moan your mother's Maiden name and that should be it.
@clashwithmoi8926
@clashwithmoi8926 5 жыл бұрын
what they are doing is super underappreciated. wired devices with embedded systems really need to start insulating components so that no information leaves the device wirelessly
@diggydice9041
@diggydice9041 5 жыл бұрын
Yep & my laptop is a Republic of Gamer's unit & even though I didn't know about blue-tooth for my pc, my neighbor did know & was busy trying to gain access when I caught him red handed...... When I buy again It'll be decked out in the best defensive stuff I can get/set-up. It really sucks how they violate people. peace
@genkiferal7178
@genkiferal7178 2 жыл бұрын
my understanding is that those devices are being used to jump from one device to another to transmit data that customers want to have transmitted - or have signed off on. Maybe a frig manufacturer wants customer usage info for marketing or product design reasons, for example.
@jaqb17
@jaqb17 8 жыл бұрын
0:45 holy shit that setup!
@xteam29
@xteam29 8 жыл бұрын
Those 2 Dell monitors are just crazy!
@edg6779
@edg6779 8 жыл бұрын
2 dell monitors and a shit apple keyboard
@edg6779
@edg6779 8 жыл бұрын
***** i have a mechanical keyboard, 10k dpi mouse, h440 case with i5 4590 and a 760 but my monitor is a boring 1920x1080 60Hz dell :(
@joaobernardocosta
@joaobernardocosta 7 жыл бұрын
The funniest thing is that the chair is as expensive as one of those monitors.
@markrigsby2107
@markrigsby2107 7 жыл бұрын
jaqb17 Gotta love it
@8224shivaram
@8224shivaram 5 жыл бұрын
This is one of the key reasons why following PCB design guidelines For Reduced EMI is so critical :P
@mrinalthakur3459
@mrinalthakur3459 4 жыл бұрын
Just shield the entire thing after finishing the population process
@RDHDShorts
@RDHDShorts 4 жыл бұрын
@@mrinalthakur3459 thats perfect and cheap also
@carterpeel625
@carterpeel625 3 жыл бұрын
@@RDHDShorts not cheap.
@Reth_Hard
@Reth_Hard 3 жыл бұрын
All my devices are wearing tin foil hats, including me.
@jason-ge5nr
@jason-ge5nr 8 жыл бұрын
If this guy figured it out what has the NSA been able to do for the last 15 years
@CellularInterceptor
@CellularInterceptor 8 жыл бұрын
The government agencies have way better systems than demonstrated here. I can neither confirm nor deny its existence.
@Kyle.Moda.Deluca
@Kyle.Moda.Deluca 8 жыл бұрын
The POC being explained here is nothing new by no means! In the early 90's, Cult Of The Dead Cow (Hacker Group) went before Congress to speak about such things. They had fears that, if they can do it... so could other people. They spoke about a method known as tempest ( en.wikipedia.org/wiki/Tempest_(codename) ). They've known about this ability for quite some time now. It's just become super easy, since the advent of Wifi based devices!
@doublebubleguy12
@doublebubleguy12 8 жыл бұрын
I know it sounds impossible but I know a retired officer who use to work in a prison system back in the 90s. They used a database of files on all of their prisoners on an off grid intranet that could only be accessed via the prison system. Well it just so happened the FBI showed up asking for two prisoners that needed to be taken in for classified reasons not even telling the sheriff the reason for it. They pulled out a piece of paper with a screenshot of the two prisoners files which was obviously screenshotted from a computer within the off grid database. They had never been to the prison system before and it would have been impossible to gain access to the information over the internet since every computer was offline. The Sheriff asked the two agents how did they get that information as only that single prison system had it, the agent told the sheriff that it was classified information on how they obtained the screenshot from within the prison. The agents left with the two prisoners and told the sheriff that they were never there. Either two things I can think of that happened. "A" Their was an undercover agent disguised as a cop working their downloading information to a drive and sending it to the FBI which sounds kind of stupid considering they could have just asked the sheriff for the files on the prisoners or "B" They gained access through the power lines somehow.
@jason-ge5nr
@jason-ge5nr 8 жыл бұрын
the data storage facility in utah, the big one, has internet but they used the term 'airgapped' to describe all the connections to the outside world.
@vlad-pm2zr
@vlad-pm2zr 7 жыл бұрын
Question should be "what can they *not* do"
@adrianmego1
@adrianmego1 4 жыл бұрын
The critical piece of information he gave is that there has to be an entry point into your network, and for him it was a CV containing malware. 80% of attacks are initiated this way, so - secure your endpoints or get decent mail service guys and gals...
@Aaron-dt3xz
@Aaron-dt3xz 4 жыл бұрын
I like how the thumbnail just says motherboard with a guy pointing to a motherboard
@daxutuc
@daxutuc 3 жыл бұрын
I was searching this comment
@prakharmishra3000
@prakharmishra3000 3 жыл бұрын
@@daxutuc me too lol
@ibimon
@ibimon 8 жыл бұрын
By the way this is second time I see red balloon mentioned in security tech, looks like they're about to become pretty big. Good luck guys.
@maxp9292
@maxp9292 6 жыл бұрын
Good to now that we have willy billys support
@Plur307
@Plur307 8 жыл бұрын
Properly shielding electronics would make them not vulnerable to this hack. But the hack is still quite clever. All it takes is a thin sheet metal cover over the circuit boards to absorb almost all the emitted radio waves.
@jeffbrownstain
@jeffbrownstain Жыл бұрын
Six years later and this exploit has yet to be seen in the wild
@nickigna
@nickigna 8 жыл бұрын
Feels like Motherboard is cranking up the paranoia on "everything hackers".
@JohnDoe-sp3dc
@JohnDoe-sp3dc 4 жыл бұрын
@@shenshenani5913 motherboard is NOT for analysts and other security professionals it's for uninformed tech illiterate people.
@egg-iu3fe
@egg-iu3fe 2 жыл бұрын
the real hackers to be afraid of are the ones in government. They are spying on you right now.
@Flankymanga
@Flankymanga 4 жыл бұрын
You could say that every electronic device has it.... because what they are doing is turning an PCB copper path into transmitting antenna by quickly changing voltages and generating EM field. But there is a catch... you would not normally have connected a printer and a VoIP phone on the same corporate network. Meaning it has to go through either managed switch or a router - in which case there is a high chance that there would be a firewall rule to drop the packet.
@dkipu266
@dkipu266 3 жыл бұрын
You could build all this, or pay Google or Amazon for the feeds they continuously collect from devices you use everyday. Even using a VPN Service is of marginal benefit if you’re going to authenticate to any of your online accounts, as those accounts and your devices registering to networks are going identify you when you authenticate. That said, what this team is doing is really important work, as these devices are very vulnerable, and for all of the dollars we spend securing PC’s and Tablets, a good pen test will show you how vulnerable your voice and printing devices are as well...this team takes it to a level.
@keybraker
@keybraker 6 жыл бұрын
The problem with these old hacks, is that they are super easy to defend. People who have sensitive data use better printers, and not stupid ones obviously.
@ggvic7
@ggvic7 8 жыл бұрын
"through the network" is the key phrase. It's easy if you have direct access to the devices that you want to exploit if they're 2 feet away from you, like shown in the video, but if you're outside the network, you'll still need to bypass layers of security to get your software through. Still, pretty cool though.
@RustyB5000
@RustyB5000 8 жыл бұрын
2 hours after this video was posted that guy disappeared from outside his apartment.
@stevenpersoon
@stevenpersoon 5 жыл бұрын
For most, if not all embedded devices it's not possible to flash a microcontroller by JTAG or bootloader without extra external hardware. Also, devices without a dedicated antenna wouldn't be abled to transfer any reliable signal... And what about RF shields...
@furatkafir3819
@furatkafir3819 3 жыл бұрын
yes, i thought about this limitations too. even with new devices with possibility to upgrade firmware via internet there will be phisical limitations on transmitting power and receiving range, even if you use low bitrate protocol like LORA.
@siriperera6974
@siriperera6974 6 жыл бұрын
Actually, all this is already in play in every household. It is very easy to confirm yourself what this video says. Take that part at 2:25 minutes about switching on the microphone on the phone (i think he mentioned switching the input/output ports). What he meant was just switching on the handsfree on the phone on without you knowing and without having the led light come on. When this happens, the microphone now on just completes the induction loop system that is your home. Now all your conversations are reflected in the magnetic modulations in the wiring in your home. All converted to FR signals etc and software radio will pick this up. But more so is that all the buzzes and pings and white noise sounds in your living space will modulate to your thinking, with that microphone in your phone switched on. Hence your thinking can be known by anybody who is listening or anybody who knows how to read tonal modulations. It is like learning a new language and with time you should be able to listen to your thinking in all the appliances around your home. But that is what they are doing at the moment. If there is such a thing as the funtenna software then they will get them downloaded via either your phone line or your internet line. In some cases they are both the same line. If you want to hear this signal coming into your home to switch on the handsfree for a listen in, you can do this by attaching an induction loop receiver to the access point for your phone line. You only need to tape it to the access point gadget - it will pick up the magnetic fluctuations from the phone access point.
@mrepic789
@mrepic789 8 жыл бұрын
But how powerful (in watts) is the transmission
@furatkafir3819
@furatkafir3819 3 жыл бұрын
he receives only few meters away, i think it is not powerful
@gatekeeper9161
@gatekeeper9161 4 жыл бұрын
LOL WOW THIS KID FIGURED OUT WHAT SOME OF US HAVE BEEN BRUTALIZING FOR 20 YEARS AND MORE
@gwengold1342
@gwengold1342 5 жыл бұрын
I would work for this guy for free just to gain knowledge
@JaySmith-rv4ro
@JaySmith-rv4ro 6 жыл бұрын
It kills me how people talk about how they’re so surveilled by the gov but are spied on and robbed (through tech) by their fellow man.
@savagescientist3835
@savagescientist3835 4 жыл бұрын
please add part 1 in description so i can see full series thank you
@socrates_the_great6209
@socrates_the_great6209 5 жыл бұрын
So its not the wifi antenna inside the printer sending the signal? It must be?
@ibimon
@ibimon 8 жыл бұрын
I suspected that HR ATS can be hacked trough applications, but didn't think it was as easy as he explained.
@rijaja
@rijaja 4 жыл бұрын
1:02 My phone is very insecure. Most of the time, it can't gather the courage to show me notifications when I get a text message. Unfortunately, phones still aren't accepted in therapy.
@potato511
@potato511 8 жыл бұрын
3:15.....oh god that look....they've already bugged us all burn everything!
@nokoru1
@nokoru1 5 жыл бұрын
6:42 "...and what makes it particularly impressive is how it can transmit data using radio frequencies..." wow!...wait...
@skinnybob_
@skinnybob_ 4 жыл бұрын
groundbreaking technology here
@MrGoatmeat
@MrGoatmeat 8 жыл бұрын
the London look X D
@burnzy3210
@burnzy3210 8 жыл бұрын
what?
@TBlasku
@TBlasku 8 жыл бұрын
He was referring to the gap between her teeth :)
@coolxify
@coolxify 5 жыл бұрын
Its supposed to mean the leather jacket black leather boots etc
@peterodriguez9191
@peterodriguez9191 4 жыл бұрын
London has fallen. Like the movie
@maynardjohnson3313
@maynardjohnson3313 4 жыл бұрын
I don't think that any of Maxwell's equation has anything to say about the feasibility of hacking embedded devices. It sounds scholarly though.
@briancrane7634
@briancrane7634 5 жыл бұрын
HE'S SAYING that ANY WIRE that can be made to vibrate mechanically IS an antenna that transmits an EM field...NO NEED for an embedded microphone or RF module...ANYTHING THAT HAS WIRES can be forced to be a transmitter...SCARY! [BTW NO printer manufacturer worries about security...they say: "That's the CUSTOMER'S PROBLEM! We make PRINTERS!]
@jethro9341
@jethro9341 4 жыл бұрын
Those dudes had no idea what to do with themselves with a cute girl that close to them!
@elck3
@elck3 4 жыл бұрын
What would you do?
@jethro9341
@jethro9341 4 жыл бұрын
@@elck3 business as usual my dude
@INeedAttentionEXE
@INeedAttentionEXE 6 жыл бұрын
Anything that has RF in it thats embedded, uses the ARM archetechture :D. Lifes good
@screwthenet
@screwthenet 6 жыл бұрын
All this has been foretold. And this is the type of crap that makes low tech or no tech so much more desirable.
@davidmyg7825
@davidmyg7825 5 жыл бұрын
i'm suspecting my neighbor is running some kind of illegal business famously known as "macau scamming" or "money game". everyday i saw more new recruit coming to his house every morning and never leave the door. they rarely come out and always hiding in house and everyday call for delivery. do you have any tech advice or solution?
@zachsylvester309
@zachsylvester309 4 жыл бұрын
Speakers can be microphones. *Takes out buzzer from the motherboard.
@XxprobertsonxX
@XxprobertsonxX 8 жыл бұрын
Motherboard video with a motherboard in the thumbnail. About time.
@Em.P14
@Em.P14 5 жыл бұрын
THEY HAD A VIPER MK II IN THAT SHELVE !!!AWESOME GUYS!
@hajiosama9352
@hajiosama9352 3 жыл бұрын
Where? Kindly mention time.
@Em.P14
@Em.P14 3 жыл бұрын
@@hajiosama9352 im sorry but this was 2 years ago, no chance that i would be able to remember that. Id have to rewatch the entire thing again
@TheYamakasiize
@TheYamakasiize 4 жыл бұрын
Thats why I don’t use any technology and none in my possession. I am now commenting through a wooden stick and a rock tie to an owl.
@imtatarin
@imtatarin 8 жыл бұрын
Soooo, what programming languages (and overall knowledge) is required in order to do something like this?
@jumasayeh4574
@jumasayeh4574 5 жыл бұрын
Stanis Baratheon well you'll have to know how to reflash hardware using the network, creat an ai that will find the best wire to use as antenna for your signal .. knowledge about radio signals and modulation, you'll have to know how to write a hex firmware for a phone , printer or whatever you're hacking .
@thatoneguy1205
@thatoneguy1205 3 жыл бұрын
it's not always just software, sometimes it's hardware, like eprom, and processing, like how I never would have figured out how signals are processed if I never learned the basics of electronic hardware, and a bit of software. also signals are generated by a electromagnetic inductor, using a analog signal, it reaches the other thing, and from there the analog ports on the processor turn the analog signal into digital signals, which are interpreted into binary. analog= wavy signal digital= sharp signal
@myongpark
@myongpark 7 жыл бұрын
Hey, he used the word "theory" in the correct context! That's more impressive than the skills, or maybe an indicator of why he has them.
@Granite
@Granite 8 жыл бұрын
Typically the door is wide open. This seems to be a bit excessive.
@christophervenkus1276
@christophervenkus1276 8 жыл бұрын
We had all better behave.
@AshleyVanSteenacker
@AshleyVanSteenacker 7 жыл бұрын
Well, moast of these things run some sort of linux and most devices just pass UI commands trough as root. Although this might not work on all devices. since some of them have a full on metal enclosure to reduce EMI. But then again. There is already a Botnet of IOT so I'm not surprised of anything anymore.
@Caleta280
@Caleta280 8 жыл бұрын
What if an office only used talking cups? How do you tap that?
@fancynet
@fancynet 8 жыл бұрын
OK, I know this is not really the point of this video, but the used phone here was officially considered "End of Life" since January 2015. I wonder if his malicious software could still be loaded to currently used models/firmware (considering there are still other 79XX Models which are officially supported by Cisco)
@thedarkside13
@thedarkside13 5 жыл бұрын
0:55 My boy eating Noodles and Sriracha!...
@Juniormintz584
@Juniormintz584 18 күн бұрын
Can this also be done using fm 📻 instead of am ? Why use such a low band frequency is that to avoid getting caught on car radio ? What’s up with that ?
@L3uX
@L3uX 8 жыл бұрын
Nsa has already been doing this years ahead.
@MrLogannator
@MrLogannator 8 жыл бұрын
Just look at DangerMouse
@MrLogannator
@MrLogannator 8 жыл бұрын
***** its the code name for the Nsa program that listens in on your phone call and monitors them
@beating2
@beating2 8 жыл бұрын
Snowden leaked documents on how NSA spying on their own people some 3 years ago.... You live in a cave or something......
@ultort
@ultort 8 жыл бұрын
Yes, it's well known, you can have a look to the "NSA Ant Catalog". But hacking to RF without modifications on a non emitting device is almost impossible because the signal will most likely be very small, maybe under the noise level. If you have wifi on a printer, you may be able to hack the wifi to transmit data via RF.
@arzoo_singh
@arzoo_singh 6 жыл бұрын
And way more then we know ....
@ramsesrameez5430
@ramsesrameez5430 3 жыл бұрын
Now that's is what i am talking about. Hacking with a tiny mother board.
@NetIncarnate
@NetIncarnate 8 жыл бұрын
Trust these guys to reference Neuromancer! Excellent work.
@sultanmehmoodghaznavi6312
@sultanmehmoodghaznavi6312 3 жыл бұрын
"Cheap radio is called Tom Cruise..." LoL I'm switching to analog phone after watching this.
@archygrey9093
@archygrey9093 3 жыл бұрын
Analogue is not very secure at all
@roaldjensen3120
@roaldjensen3120 4 жыл бұрын
Why not point a laser beam at the window you want to evesdrop into, then am / fm modulate instead of all that ?
@Serj772
@Serj772 5 жыл бұрын
0:55, is that guy in his undewear? hahah
@kman4thewin865
@kman4thewin865 5 жыл бұрын
IT LOOKS LIKE IT LMAO good eye
@codydixon9635
@codydixon9635 8 жыл бұрын
Some of those guys have setups to die for D:
@coolxify
@coolxify 5 жыл бұрын
Ijr
@coolxify
@coolxify 5 жыл бұрын
Lul ikr
@xorxpert
@xorxpert 6 жыл бұрын
I wonder why signals aren’t encrypted? I guess it could cause latency but signals in which you can easily just read its binary and convert is crazy, and that it’s just a string and not wrapped inside of packets
@felixxdenolo6793
@felixxdenolo6793 4 жыл бұрын
Next how hackers can steal your lunch from the break room cuz it definitely was not Ron
@jasonsalz7185
@jasonsalz7185 7 жыл бұрын
With such kind of wireless bugging. Is there any device/method to detect such bugging?
@AnymMusic
@AnymMusic 6 жыл бұрын
I am so happy to have a hacker as a friend.
@MathiasLM89
@MathiasLM89 8 жыл бұрын
I'm wondering why there hasn't been a Die Hard 4 scenario yet.. maybe someone is gearing up to make it extra spectacular?..
@F1delF1estasMC
@F1delF1estasMC 8 жыл бұрын
uploaded by "motherboard", tumbnailof a guy pointing on a motherboard....
@Maniacguy2777
@Maniacguy2777 5 жыл бұрын
Fantana technique is used by military people sending code messages through sound.
@Dex99SS
@Dex99SS 6 жыл бұрын
Funny how all of the "common office equipment" was "hacked by software only, never touching it"... Yet every one of them had their cases removed, wires hanging out, ribbon cables jumbled out the sides, alligator clips roughly plugged in supplying power, lol... None of this was done elegantly over a network via software. But instead, all of it is hypothetical via hardware mods, physically turning electronics into radios by adding RF transmitters to them... which is the large PCB hanging off of the ribbon and alligator clips. And if we are really pretending that we are sending RF out of circuitry which has no radio, no antenna, no tuner what so ever... and just glossing over the hardware issues there, pretending you can turn any resister, capacitor, and IC into a transmitter... Well, as a radio engineer who develops tower technologies / installs said tech, I can tell you that they would (if they could) transmit all of about a half an inch in distance... at best. Without dedicated amplifiers, tuned antennas, and a frequency capable of both distance and some level of penetration, it would be hopeless. And seeing as how most inexpensive two way radios, which are built for this task, can't even do all that well in a commercial building environment... i highly doubt your magic phone radio made out of software that looks like PCB's hanging off of ribbon cables out of the back of a busted open but never touched office phone is going to do much better. This entire piece is basically fluff...
@BigDaddy-yp4mi
@BigDaddy-yp4mi 6 жыл бұрын
You COMPLETELY missed what the fellow was talking about. It CAN and HAS been done for years...by NSA. Danger Douse was their program from over 10 years ago. He piggybacks on that. No microphone, no speaker, fuck with the currents going through them, they then emit radio energy in predefined contexts which can be picked up with SDR equipment and then decoded. The disassembled parts were for testing purposes. The stuff attached was to show there REALLY is stuff going on but to prove it, it has to be disassembled. Jesus, and to think people like you probably vote....
@jonesbbq307
@jonesbbq307 6 жыл бұрын
Then tell me how can a printer without any antenna emit any radio frequencies?
@jedi.knight7260
@jedi.knight7260 6 жыл бұрын
Colson Xu install malware on device which can be done remotely (that’s why a resume was sent to force someone to open and send the malware to printer) afterwards the wires and components of the device can be turned into radio transmitters. That’s why it’s called hacking, to change its original purpose into something that it wasn’t intended to do. The device is then FORCED to emit radio signals to a radio receiver using software instead of hardware and an AM antenna. A transmitter is a different kind of antenna that does the opposite job to a receiver since it turns electrical signals into radio waves that can travel thousands of kilometers around the earth. Hacking might not be your thing if your unable to search for knowledge since that’s what hackers do, they critically think and search for answers, rather then demand them.
@travismailsa1
@travismailsa1 5 жыл бұрын
Please use google when you ask such stupid questions. Do you know any current passing over a conductor produces EMF? Start there and use google
@travismailsa1
@travismailsa1 5 жыл бұрын
Its demonstration in this video, secondly the devices were taken apart to discover and then test these exploits, whereby they can then access them remotely and exploit what was DEMONSTRATED in this video.
@TheTarrMan
@TheTarrMan 7 жыл бұрын
So is this hack going to be involved one of the next episodes of Mr Robot? Pretty cool!
@Arek_R.
@Arek_R. 4 жыл бұрын
Yeah it works in "lab" enviroment. But if they would be to do it in real life scenario then theres 1000 things that could cause it to not work, in other words it's not that simple.
@BUrbbable
@BUrbbable 8 жыл бұрын
Time to put metal shielding in between isolation material when building my house :)
@cookman45
@cookman45 4 жыл бұрын
The house across the street was built with chicken wire throughout in the late 1800s and they can't get an internet signal and most places cannot send packages there because they say their address cannot be found!
@novovires5625
@novovires5625 8 жыл бұрын
Hacking and Machine learning Engineering are the most researched skills sets on the Market right now.......
@heartsfear9216
@heartsfear9216 5 жыл бұрын
still
@dave.h4075
@dave.h4075 4 жыл бұрын
In a world that demands certification to prove our qualifications. How does a hacker prove that he is 'white hat', especially in his alone time.
@Clay7744
@Clay7744 4 жыл бұрын
Pay them enough to not want to be black hat
@dave.h4075
@dave.h4075 4 жыл бұрын
@@Clay7744 because 'enough' will always be sufficient? :))
@Clay7744
@Clay7744 4 жыл бұрын
@@dave.h4075 Then we make them kings (im a pen tester)
@dave.h4075
@dave.h4075 4 жыл бұрын
@@Clay7744 I guess the point I was trying to make is that one doesn't simply come out of the hive looking for the job unless someone spills the beans all be it few in some cases.
@AeoIian
@AeoIian 7 жыл бұрын
Nice! May work well in open areas but not through bunkers of concrete.
@Dylann8245
@Dylann8245 5 жыл бұрын
Does this guy send resumes as an .exe?
@AdamBechtol
@AdamBechtol 5 жыл бұрын
:)
@evanwetmore423
@evanwetmore423 8 жыл бұрын
Finds out massive exploit in phones... Uses a apple keyboard
@jelpy
@jelpy 7 жыл бұрын
Sgt UltraKill the fuck does this even mean
@cokbagus23
@cokbagus23 7 жыл бұрын
means a lot
@Linkz64
@Linkz64 6 жыл бұрын
Evan Knight an*
@Linkz64
@Linkz64 6 жыл бұрын
Evan Knight Apple*
@Linkz64
@Linkz64 6 жыл бұрын
Evan Knight Also have you ever heard of NSA? Google DangerDouse.
@sultanmehmoodghaznavi6312
@sultanmehmoodghaznavi6312 3 жыл бұрын
I had this idea all the time but didn't knew it was possible.
@nivalius
@nivalius 5 жыл бұрын
suddenly theme from Syndicate starts to play in my head
@apnearocker
@apnearocker 5 жыл бұрын
How did it start with the resume?
@_msnnanbakbshhsn
@_msnnanbakbshhsn 5 жыл бұрын
Is there a video talking about security vulnerabilities in hardware like processors and such.
@LordAugastus
@LordAugastus 8 жыл бұрын
why is motherboard now focusing on fear mongering to the non tech literate? Most hardware hacking relies on being with the machine this means....digital hacking is still a long and time intensive process.
@prestonwest2828
@prestonwest2828 7 жыл бұрын
I didnt see it as fear mongering. Seemed to me like those guys were eager to show just the capabilities are possible and educate the masses.
@LordAugastus
@LordAugastus 7 жыл бұрын
what capabilities? Hacking some phones apart and figuring out how to create a miniscule RF signal? a signal so weak that you would have to be in the room. right next to the printer to even detect. and did you see the processing speed? like a word a minute man, they spy will stand there like an idiot going hea man i just have to print something for 14 days straight. Just saying, nothing to fear people, as long as you have a mobile device, what ever country holds the company will probably have way to spy on you. So once again, wtf are you talking about, "educating", any reasonably educated man will see this video and laugh.
@spydergs07
@spydergs07 7 жыл бұрын
You do realize they could easily amplify their AM antenna receiver and be able to receive signals a few blocks away.
@existenz55
@existenz55 7 жыл бұрын
You can`t. RF signals are pretty weak (even if you build a monstrosity antenna, the signal that is sending will be week and you will not get it unless you are in the same room). I have a problem connecting to me WIFI on the second floor (using a 400$ WIFI ROUTER and external 100$ WIFI antena), imagine how big the antenna on the phones and printer are..
@CodeAsm
@CodeAsm 6 жыл бұрын
Directional antenna, and your only "recieving" the signal... your extracting data. thats not the same as weak wifi, thats also on a very very busy frequency (probably why its so "weak" for you aswell) all the neighbours uses Wifi, bluetooth is on wifi, alott of IoT devices, and some of those wireless led controled lamps might not be on wifi or bt, they are often on 2.4Ghz (or 433Mhz, wich also can be full of noise). get an directional antenna, send data out multiple times with a small checksum and wait a few hours for the password to be send over... im sure at night it even gets better. at day you collect and at night you recieve it. github.com/fulldecent/system-bus-radio
@leobav2425
@leobav2425 5 жыл бұрын
So in essence, if the manufacturer used a dpdt switch that opened up the mic on the handset, you wouldn't be able to listen.
@dikatlon
@dikatlon 8 жыл бұрын
Why are they using the term hacking in this way? It is cracking. Hacking is something good, not evil.
@WayneJohnsonZastil
@WayneJohnsonZastil 8 жыл бұрын
Lol that was right next to the printer! he should demonstrate if bit further away!
@monsterpda
@monsterpda 8 жыл бұрын
I wonder too what the range of the antennas of regular non-wireless printers and phones are... The receiving and is less of an issue, you'd just need a bigger antenna and better amps.
@mrmagoo9901
@mrmagoo9901 8 жыл бұрын
Any wifi capable device can be hacked from anywhere
@monsterpda
@monsterpda 8 жыл бұрын
mr magoo Well, theoretically yes. But the method they suggest is a little less brute force and seems much more sneaky. The phones needn't be wifi capable either.
@mahmoudaboelsaoud253
@mahmoudaboelsaoud253 5 жыл бұрын
wow!, i wish to work and learn from and with these guys they look well talented
@MariaMartinez-qj7wc
@MariaMartinez-qj7wc 8 жыл бұрын
walala wow its so intresting how we are vulnerable no matter where...
@Matherofacts
@Matherofacts 8 жыл бұрын
+Samuel Mason It's an expression that comes from the French voilà which literally means see there.
@mrmagoo9901
@mrmagoo9901 8 жыл бұрын
Whats really interesting is that George Orwell had this figured out a long time ago and now we sit watching it happen to us in bewildered fascination...
@Matherofacts
@Matherofacts 8 жыл бұрын
When you say it in french it's pronounced vwallah. French is my second language. 
@HiAdrian
@HiAdrian 8 жыл бұрын
*+00 Gaudie* But your mouth has to actually make an *O* along the way, which is why plain "va" misses the mark.
@Matherofacts
@Matherofacts 8 жыл бұрын
Samuel Mason​ Yeah exactly, but after the V add a W sound like vwah. That's how they pronounce where I live.
@lnbadi
@lnbadi 8 жыл бұрын
Ok.. Cool idea and concept... except that those kind or radio frequencies are not able to penetrate anything thicker than a paper wall...
@protoolsfanatic7276
@protoolsfanatic7276 4 жыл бұрын
well this is a bit ( no pun intended)scary. this is from 2016 can you imagine what is going on in 2020?
@WhopperFPV
@WhopperFPV 7 жыл бұрын
0:59 I didnt know you could bug a racing drone. What are you going to do turn the motors on and off?
@durrani1983
@durrani1983 4 жыл бұрын
Wow white hat hacker is generous teaching others free of cost, hence succeeded in fooling every one that he is not helping his hacker dudes. Nice game man
@TongTangTorq
@TongTangTorq 8 жыл бұрын
Would the hacker have to have access to the network that the phone/printer is on, in order to send it the software to produce RF signals of the audio?
@pasoundman
@pasoundman 5 жыл бұрын
Normally phones aren't connected to printers though !
@thomaslindell5448
@thomaslindell5448 5 жыл бұрын
Yah that bit rate is awesome
@kekistanimememan170
@kekistanimememan170 Жыл бұрын
TEMPEST is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).
@tomsbunk3790
@tomsbunk3790 5 жыл бұрын
The men in black jacket only smile while enjoying their coffee break..
@Mukeshmiktecrep
@Mukeshmiktecrep 6 жыл бұрын
If this is hacking, why tear open the printer and connecting wires to it.
@wolfieblackheart4185
@wolfieblackheart4185 6 жыл бұрын
Reverse engineering technique to work out what devices similar are made of so they can program their software to suit
@khankhattak.
@khankhattak. 3 жыл бұрын
dont you need a printer which has wireless connectivity (wifi, bluetooth etc ) to hack it and send RF data to hackers pc?
@grilledme
@grilledme 4 жыл бұрын
So what should we do here if every technology we touch can be hacked so what's the point here?
@RicondaRacing
@RicondaRacing 4 жыл бұрын
This guy has a dream job
@exiledvoid2429
@exiledvoid2429 8 жыл бұрын
but he did not tell or show how much transmitting power needed for it's reciever can turn that signal into data, also he did not say how big or how much recieving sensitivity needed and how long and what kind of enviroment it receive or in there trems sniff that signal, just a reminder an AM signal is very suseptible on noise and jamming.
@native2704
@native2704 6 жыл бұрын
this is the type of magic i would do if i was a magician lol. best hacker
@leweed3049
@leweed3049 Жыл бұрын
So cool, btw is this openSource?
All The Ways To Hack Your Phone: Phreaked Out (Episode 3)
19:06
Motherboard
Рет қаралды 1,6 МЛН
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 1,6 МЛН
Kind Waiter's Gesture to Homeless Boy #shorts
00:32
I migliori trucchetti di Fabiosa
Рет қаралды 15 МЛН
女孩妒忌小丑女? #小丑#shorts
00:34
好人小丑
Рет қаралды 86 МЛН
Кадр сыртындағы қызықтар | Келінжан
00:16
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 267 М.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 1,9 МЛН
Detect Hackers & Malware on your Computer (literally for free)
16:38
Find Vulnerable Services & Hidden Info Using Google Dorks [Tutorial]
13:37
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,5 МЛН
The Fixers Using Recycled Laptop Batteries to Power Their Homes
11:08
Motherboard
Рет қаралды 1,7 МЛН
Remotely Control Any Phone and PC with this Free tool!
17:15
Loi Liang Yang
Рет қаралды 874 М.
Watch these hackers crack an ATM in seconds
5:42
CNET
Рет қаралды 6 МЛН
A DAY (NIGHT) in the LIFE of a NOC ENGINEER!
12:36
Custodian Data Centres
Рет қаралды 1,8 МЛН
Samy Kamkar's Crash Course in How to Be a Hardware Hacker
28:07
Kind Waiter's Gesture to Homeless Boy #shorts
00:32
I migliori trucchetti di Fabiosa
Рет қаралды 15 МЛН