So you think your phone or iPad are safe? Rubber Ducky script for mobile targets and Hak5 OMG cables

Sdílet
Vložit
  • čas přidán 9. 09. 2021
  • It's just crazy scary what these cables can do. They look like normal USB cables, but are not!
    ==========================
    Giveaway ($180 Hak5 gift card):
    ==========================
    Enter here:
    ======
    Scripts:
    ======
    Android Rickroll: davidbombal.wiki/androidrickroll
    Android Phone Call: davidbombal.wiki/androidphone...
    Android Take Photos: davidbombal.wiki/androidtakep...
    iOS Rickroll: davidbombal.wiki/iosrickroll
    ====================
    Buy Hak5 coolness here:
    ====================
    Buy Hak5: davidbombal.wiki/gethak5
    =============
    Previous videos:
    =============
    OMG Cable setup: • O.MG: From zero to hero
    Hak5 Rubber Ducky setup: • How I did it (hak5 rub...
    ================
    Connect with me:
    ================
    Discord: / discord
    Twitter: / davidbombal
    Instagram: / davidbombal
    LinkedIn: / davidbombal
    Facebook: / davidbombal.co
    TikTok: / davidbombal
    CZcams: / davidbombal
    hak5
    omg cables
    omg cable
    android
    apple phone
    apple ios
    rubber ducky
    hak5 rubber ducky
    hak5 omg cable
    omg cable android
    omg cable ios
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    #omgcable #hak5 #rubberducky
  • Věda a technologie

Komentáře • 1,1K

  • @davidbombal
    @davidbombal  Před 2 lety +111

    ==========================
    Giveaway ($180 Hak5 gift card):
    ==========================
    Enter here: davidbombal.wiki/omg180
    ======
    Scripts:
    ======
    Android Rickroll: davidbombal.wiki/androidrickroll
    Android Phone Call: davidbombal.wiki/androidphonecall
    Android Take Photos: davidbombal.wiki/androidtakephotos
    iOS Rickroll: davidbombal.wiki/iosrickroll
    ====================
    Buy Hak5 coolness here:
    ====================
    Buy Hak5: davidbombal.wiki/gethak5
    =============
    Previous videos:
    =============
    OMG Cable setup: czcams.com/video/V5mBJHotZv0/video.html
    Hak5 Rubber Ducky setup: czcams.com/video/A2JNBpUotZM/video.html
    ================
    Connect with me:
    ================
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    CZcams: czcams.com/users/davidbombal
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @syedbukhari4761
      @syedbukhari4761 Před 2 lety

      Hey David, who are the winners of the previous Hack5 giveaway?

    • @davidbombal
      @davidbombal  Před 2 lety +7

      @@syedbukhari4761 I have to verify them first because of spammers and then I'll announce them.

    • @chobanovqurban2055
      @chobanovqurban2055 Před 2 lety

      Please enter code😊😗

    • @chobanovqurban2055
      @chobanovqurban2055 Před 2 lety

      @angel fayola thanks😚😍

    • @tsaltslinger3268
      @tsaltslinger3268 Před 2 lety

      Mr Bombal, thank you very much for this new content on malware analysis and phone hacking. Bravo, Sir!

  • @starblaiz1986
    @starblaiz1986 Před 2 lety +812

    Me: "Dangit, my phone is out of battery and I forgot my charging cable"
    Friend: "Here, use mine"
    Me: *starts sweating nervously*

    • @davidbombal
      @davidbombal  Před 2 lety +80

      Great comment!

    • @ifodaniell
      @ifodaniell Před 2 lety +61

      Which is why, for charging, one must always use a "USB condom" with the cable.

    • @river9a
      @river9a Před 2 lety +8

      @@ifodaniell I don't think a USB condom would work here. If the data is going out over wifi then the only pins the omg cable would need is power.

    • @carlossolis9824
      @carlossolis9824 Před 2 lety +6

      My question is can a malicious script be ran while the phone is locked? Reason I asked if because I left my phone somewhere over night, iPhone 12 good password am I safe or can they still have done something? Thank you I’m advance

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

  • @aysenurprenses7212
    @aysenurprenses7212 Před rokem +24

    Great Work, *Metaspyclub* . Thankfully, I have all six of your tips mastered. It's all about self-care. You made me laugh out loud when you put that shaver up to her chats. Keep up the great work.

  • @lansanakabbah4520
    @lansanakabbah4520 Před 2 lety +18

    I have been monitoring your CZcams videos for a week now and I find your lectures very much interested and educational. You programs are making huge difference in my Computer Science Degree aspirations.

  • @jurasicpark1911
    @jurasicpark1911 Před 2 lety +287

    Super interested! I've always wanted something very close to this, but a little bit more advanced. In addition to this, *top phaseresolution* can trace (iOS/Smartphone/Ipad) the phone location history timeline (full) by only phone number and I want to thank them because of them I reached the top of my class and my school gets me grants to full courses for me to learn from and now even though I'm young I'm already starting toward studying for certifications.

    • @holliewhite5127
      @holliewhite5127 Před 2 lety

      Thank you, thank you, *top phaseresolution* !! I've been in such turmoil at the pain my husband's infidelity has caused our four children, two of them newly married. We're almost 2 years in from first DD, and inspite of my prompting, he has yet to make this most important apology to our babies for the life he's disrupted by his choices. Holly, you're in my prayers for continued healing and thank you for your bravery in sharing your story. I can't wait to share this video with my friends and hope they gain some comfort from it.

    • @feliciabenjamin1845
      @feliciabenjamin1845 Před 2 lety +1

      TOTALLY DISCREET AND ANONYMOUS -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- *TOPPHASERESOLUTION* on IG helped me spy on my significant others, I was able to retrieve clear cheating evidence , got access to all phone activities and past deleted ones

    • @maxxmaher5604
      @maxxmaher5604 Před 2 lety

      OMG, EXACTLY WHAT I NEEDED -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- i got spyware from *TOPPHASERESOLUTION* on IG

  • @Max189
    @Max189 Před 2 lety +151

    The possibilities……THE POSSIBILITIES.

    • @allenella5766
      @allenella5766 Před 2 lety +1

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

    • @Zveenus
      @Zveenus Před 2 lety +5

      I can litrealy but that cable into a Big server and it would be mine 😈

    • @pete3816
      @pete3816 Před 2 lety +20

      @@Zveenus maybe, but you literally can’t spell ‘literally’!

    • @xathridtech727
      @xathridtech727 Před rokem +13

      imagine leaving this somewhere like a mall or airport to link to this video

  • @Trendnet18
    @Trendnet18 Před 2 lety +27

    Glad to see you teaching Cybersecurity related topics. I took your HP network course from Udemy back in 2015. I transitioned to Cybersecurity 2-3 years ago.

    • @MyloMusica
      @MyloMusica Před 2 lety +1

      Do you need to have any backround to do those courses?

    • @jonathangaliano2617
      @jonathangaliano2617 Před rokem

      I've always been somewhat of a computer nerd (to a certain extent) and always wanted to get into cyber security but it's so overwhelming to even know where to start

  • @paulbittengle8540
    @paulbittengle8540 Před 2 lety +21

    David thank you for clarification on paying attention to cables such as you have covered within this u-tube site.
    You open my eyes and truly educate us all.
    Thank you sir.

  • @AllPileup
    @AllPileup Před rokem +7

    Love how you use an educational video to rickroll us. Good one!

  • @wingwing2683
    @wingwing2683 Před 2 lety +10

    Thanks David for sharing! I hope you will have a new video for advice or solutions to reduce the risk from something like this OMG. I guess there is a lot of devices out there (keyboard, mouse, usb/bluetooh speeker, usb headset,...etc) from cheap vendor can become the target.

  • @Ryalus
    @Ryalus Před 2 lety +7

    I really enjoy these informative videos with a demonstration. Thank you very much.
    Really cool idea to have a secret code for the giveaway - That's very fitting.

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

    • @barnettsolomon468
      @barnettsolomon468 Před 2 lety

      👆🇱🇷👆
      Do you need reliable and trusted cell phone monitoring service that is guaranteed to work everything and satisfy all your needs? Contact the name above 👆👆🇱🇷.,.,

  • @st-wq3kj
    @st-wq3kj Před 2 lety +15

    fascinating video as always. Thanks a lot David. One important question, at the time of attack do these cable need to be connected or are they capable of connecting them once and still carry out an attack later even when they are not connected

    • @davidbombal
      @davidbombal  Před 2 lety +8

      The cable needs to be connected to the device to carry out this attack. But you could scan for WiFi access points if it just had power

  • @olivierdelatouche9453
    @olivierdelatouche9453 Před rokem +11

    i work as a bartender in a fancy Parisian cocktail bar, every night there's at least 4 people who ask me to charge their phone... it's scary what i could do if i had bad intentions ...

    • @stephanox758
      @stephanox758 Před rokem

      Do it 🫡

    • @3v514
      @3v514 Před měsícem +1

      No you can't, unless they unlock the devices before handing to you. But if they do - they probably have bigger problems

  • @yamitvargas8065
    @yamitvargas8065 Před 2 lety +4

    Great program, Thanks so much for the presentation. It is usual for awareness and equal training even other colleagues.

    • @davidbombal
      @davidbombal  Před 2 lety

      Thank you Yamit. And thank you for your support!

    • @barnettsolomon468
      @barnettsolomon468 Před 2 lety

      👆🇱🇷👆
      Do you need reliable and trusted cell phone monitoring service that is guaranteed to work everything and satisfy all your needs? Contact the name above 👆👆🇱🇷

  • @Lairon2700
    @Lairon2700 Před 2 lety +2

    Thank you from Peru, your videos and courses are excellent. Never stop being the person you are.

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

    • @barnettsolomon468
      @barnettsolomon468 Před 2 lety

      👆🇱🇷👆
      Do you need reliable and trusted cell phone monitoring service that is guaranteed to work everything and satisfy all your needs? Contact the name above 👆👆🇱🇷., ,

  • @eduardomorales1564
    @eduardomorales1564 Před 2 lety +2

    One of your best videos David. Waou that was absolutely amazing!

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

  • @CallumMGiblinFilms
    @CallumMGiblinFilms Před 2 lety +5

    Would be interesting if we could get some wifi pineapple videos as part of the Hak5 series you are doing! I think there’s a big gap in online videos of the topic and you would teach about it well!

  • @kevinalexander4959
    @kevinalexander4959 Před 2 lety +9

    My job actually has me working with a lot of these commands that cable uses. Not sure what helps that cable think, but probably a small microprocessor inside the cable connections. So let me help with the paranoia. Since the android he used was a Samsung I can let you know the only way that cable was able to take pictures, dial numbers and visit links was because of AT capabilities being enabled. "IF" your phone is locked you'll be fine. The AT commands can still click but it can't bypass your pin (unless that person knew it and scripted the unlock procedure).
    When it came down to him visiting a malicious website the script they uploaded had to know where to click for the web browser to come up, then where to click on url address and then the long url to put in. If that script was running on some malicious cable at an airport at mall and someone plugged their random phone in it most likely wouldn't work. Samsung and LG phones are the only ones by default that have AT capabilities. If you want to protect yourself from this cable entirely, two things: USB Mode -> Charge Only and if ADB is enabled, disable.

    • @sorinmiliescu
      @sorinmiliescu Před rokem

      And it is worth mentioning that range of that access point that is embedded in to the cable is quite small and not strong enough to penetrate a wall.

    • @stergiosk
      @stergiosk Před 5 měsíci

      Excellent information. Thank you.

  • @Makedonec007
    @Makedonec007 Před 2 lety +1

    Thank you David! I was hoping to clarify whether the lightning to usb-A or to usb-c cables can be used to deliver payloads to an iPhone? If I understand correctly the only sides that are active are the USB-c and usb-a sides of the cable correct?

  • @user-og7de8ih4f
    @user-og7de8ih4f Před 2 lety +1

    Thanks David for all these informative video.. can't thank you enough

  • @educastellini
    @educastellini Před 2 lety +11

    -Great content Professor David Bombal.
    -Basically micro-controllers became very small and simple to program, so make a Keylogger that inserts commands into a system via USB in C language or Python for micro devices like the one Raspberry is launching now.
    -And they are getting smaller so much that a device with an Arm processor is already the size of a large USB flash drive but soon a complete ARM CPU will fit in one cable like this and with the full capacity of a machine with Kernel literally cables like this will be a rogue computer via USB port.
    -Thanks for the knowledge Professor David...!!!

    • @Gt92279
      @Gt92279 Před 2 lety +1

      Yeah but this item is still lame.. you cannot do any of that if the phone is locked while plugged in...

    • @educastellini
      @educastellini Před 2 lety +1

      @@Gt92279 -The user can configure the USB interface not to allow connection, but how many users you know increase the security of their device.
      -A phone locked charging is still with the USB interface active and these cables simulate usb keyboards, so if the user doesn't block the connection of ANY device the cables will run their payload.
      -As for it being locked, the user itself feels the device vibrate and will curiously unlock it, so the screen interface lock for these cables is not that whole impediment.

    • @Gt92279
      @Gt92279 Před 2 lety

      @@educastellini yes but if I have my phone in my hand wouldn't i see the payload running if its unlocked?
      If its locked, there isn't many payloads that can be executed that will be of much assistance.
      Im new, correct me if im wrong

    • @educastellini
      @educastellini Před 2 lety +1

      @@Gt92279 -So if you think you are protected with default device configs without any configuration, keep believing so.
      -Now there are several videos here of David Bombal even showing the payloads running in fraction of a second, a script can run in shadow and you don't even see it.
      -But if you feel safe ok, go back to David's videos and watch the payloads running and wonder if you would notice a script running in fraction of a second on your device.
      -Intrusion by physical access only does not happen with very well configured systems or with the total prohibition of physical access to the device, but as a rule, if any physical access is done, it's over.
      -After all, if it wasn't like that, a datacenter like Google or Amazon wouldn't have 5 layers of security to reach the physical layer for nothing just because it's beautiful.
      -But keep thinking like that.

    • @Gt92279
      @Gt92279 Před 2 lety

      @@educastellini his scripts were basic stuff, but you can't actually install a program on a device with this cable

  • @Maik_Budweg
    @Maik_Budweg Před 2 lety +4

    It's unbelievable what's out there. Thank you for this info!

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

  • @komaboi19
    @komaboi19 Před 2 lety

    Thank you, David. These giveaways are awesome!

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius...,,.

  • @jakubzawieja3837
    @jakubzawieja3837 Před 2 lety

    I've been waiting for this type of episode for a long time.. THANK YOU!! ❤️❤️❤️

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius..,.

  • @niaomi277
    @niaomi277 Před 2 lety +9

    Hi David! Thank you for all of your videos. I’m on my journey to break into the cyber security field and am very grateful for your videos. As a side question, what would you say is the best password keeper/manager available on apple devices that based on the information you have, may be the best?

    • @alexweston8964
      @alexweston8964 Před 2 lety

      i've been dabbling in the cyber security field for a few years now and when it comes to password managers dashlane i would say is the best. even with it's free version it still has no access encryption but i'm sure if you're in cyber security then you already know what that is.

  • @leeboyce9771
    @leeboyce9771 Před 2 lety

    In all of your videos I appreciate the professional summary at the end.

  • @papanito4802
    @papanito4802 Před 2 lety +1

    @David What are the requirements on the phone, that this works? ADB enabled? Pre-approved permissions?

  • @alexwest5412
    @alexwest5412 Před 2 lety +3

    Thank you for providing cutting edge information on latest hacks and tech 😁

  • @VihangaYaddehige
    @VihangaYaddehige Před 2 lety +3

    Hello! Good day to you sir! I just passed my CCNA today with a score of around 945 or so thanks to your course on Udemy. Thank you very much for everything!

    • @davidbombal
      @davidbombal  Před 2 lety +1

      Congratulations 👏 Well done!

    • @muhammadhamza6058
      @muhammadhamza6058 Před 2 lety +1

      hello, can u guide me? how u take this achievement.I am beginner.

  • @ianp6742
    @ianp6742 Před 2 lety +1

    I love a good rickroll, thanks David.

  • @full_disclosure_now5844

    THANKS A LOT DAVID!! Lot of love for You!

  • @aka5
    @aka5 Před 2 lety +15

    "I've been able to Rick Roll both an iPad and an Android phone using the o.mg cable. Really scary what you can do with the o.mg cable" - David Bombal

    • @davidbombal
      @davidbombal  Před 2 lety +3

      lol... not been able to do this type of thing in the past :) And that is just the beginning.

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

    • @barnettsolomon468
      @barnettsolomon468 Před 2 lety

      👆🇱🇷👆
      Do you need reliable and trusted cell phone monitoring service that is guaranteed to work everything and satisfy all your needs? Contact the name above 👆👆🇱🇷

  • @hefnerdon7462
    @hefnerdon7462 Před 2 lety

    I hope you keep making educational videos like this forever !!

  • @jefff502
    @jefff502 Před 2 lety +2

    Excellent demo David! Very interesting and useful!

  • @gabrielauriu
    @gabrielauriu Před rokem +2

    Hi, David. Is there a way to check the integrity of a cable? How do i know if a cable is worthy of my trust? :) Thanks.

  • @hostittx254
    @hostittx254 Před rokem +10

    It is important to note that you (cannot) keylog an iPhone or Android Phone, Tablet, iPad, Laptop, etc with these cables. Keylogger feature only works if the O.MG cable is physically connecting a MacMini or iMac with an Apple Keyboard (or a handful of approved keyboards). Best use is for payloads but know that the users will absolutely see the scripts being run unless they're not actively using their PC.

    • @nikolaiburroughs325
      @nikolaiburroughs325 Před rokem

      Not true

    • @hostittx254
      @hostittx254 Před rokem +2

      @@nikolaiburroughs325 That took a lot of mental strength. Outline how I'm wrong....

    • @enykid245
      @enykid245 Před rokem

      So if the Apple device has a passcode on it, but is connects to the OmG cord and a base charger, can keylogger still work?

    • @andrearossi5968
      @andrearossi5968 Před 8 měsíci

      Sorry for my shitty English I'm from badumbu in black Africa, i would like to ask if does it work with a phone with blocked screen with a password or a finger print, if the phone is blocked, can the payload activate the device?

  • @holliewhite5127
    @holliewhite5127 Před 2 lety +1

    Thank you, thank you, *top phaseresolution* !! I've been in such turmoil at the pain my husband's infidelity has caused our four children, two of them newly married. We're almost 2 years in from first DD, and inspite of my prompting, he has yet to make this most important apology to our babies for the life he's disrupted by his choices. Holly, you're in my prayers for continued healing and thank you for your bravery in sharing your story. I can't wait to share this video with my friends and hope they gain some comfort from it.

    • @zionacho7702
      @zionacho7702 Před 2 lety

      Stop breaking your own heart by trying to make a relationship work that clearly isn't meant to work. You cant force someone to care about you. You can’t force someone to be loyal. You can't force someone to be the person you need them to be. Sometimes the person you want most is the person you are best without. Somethings are meant to happen, but just not meant to be. Somethings are meant to come into your life, but not meant to stay. Dont loose yourself by trying to mend what is meant to stay broken. You can't get the relationship you need from someone who isn’t ready to give it to you. Don’t put your happiness on hold for someone who isn’t holding on to you. As a Christian Licensed Clinical Mental Health Counselor I approve T̬̤̯r̬̤̯a̬̤̯c̬̤̯k̬̤̯a̬̤̯n̬̤̯d̬̤̯S̬̤̯p̬̤̯y̬̤̯C̬̤̯e̬̤̯l̬̤̯l̬̤̯ •̬̤̯ O̬̤̯r̬̤̯g̬̤̯ for phone evidence

    • @Khymelder
      @Khymelder Před 2 lety

      My dad is in the military and I couldn't even begin to describe how upset my dad would feel if my mom was cheating on him especially since she would be his second divorce while serving(his first didn't cheat she just couldn't do the whole "moving all the time" lifestyle). I'm so sorry that happened to him and I hope he found someone better and moved on with his life(I also hope she was shamed for cheating on him by her own family) Cheating should be a crime and punish as one. It hurts so many people and end some as well. Cheaters will never understand all the harm they do. P.s thanks for the shout out Brandon appreciate it an it was a surprise. Much love *T̬̤̯r̬̤̯a̬̤̯c̬̤̯k̬̤̯a̬̤̯n̬̤̯d̬̤̯S̬̤̯p̬̤̯y̬̤̯C̬̤̯e̬̤̯l̬̤̯l̬̤̯ •̬̤̯ O̬̤̯r̬̤̯g̬̤̯* for the concrete phone evidence ..

  • @jainudeenahamedulla4959

    Excellent video David.. Very easy to follow up..

  • @ganjabass2357
    @ganjabass2357 Před rokem +55

    You are looking at a living legend. I mean *Metaspyclub* is a living legend in cyber spy.

  • @robertlemonsjr
    @robertlemonsjr Před 2 lety +16

    I was telling a coworker how to do this literally minutes ago. And you pop a video up 😂 awesome

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

    • @barnettsolomon468
      @barnettsolomon468 Před 2 lety

      👆🇱🇷👆
      Do you need reliable and trusted cell phone monitoring service that is guaranteed to work everything and satisfy all your needs? Contact the name above 👆👆🇱🇷

    • @jasmineconnell5985
      @jasmineconnell5985 Před 2 lety

      I was THINKING about a certain product and hadn't spoken of it and then up popped an ad. It was weird. Conincidence maybe...these phones are smart though

  • @Socversity
    @Socversity Před 2 lety

    Your way of explanation is really great, I’ve question- Does key-logger works on iPhone?

  • @GUS00070
    @GUS00070 Před 2 lety

    Excellent demo David! Very interesting and useful THANK YOU!! ❤️❤️❤️
    Thank you, David. These giveaways are awesome!

  • @alexjr977
    @alexjr977 Před 2 lety +20

    First of all he rickrolled us
    And 2nd thank you sir for this type of amazing content :)

  • @edrickreyes-melendez4215
    @edrickreyes-melendez4215 Před 2 lety +3

    I still can't wrap my head around how easy this is to use

  • @brizzle2339
    @brizzle2339 Před 2 lety

    Love your channel. I'm absolutely hooked! I may have found my new profession... certified hacker in the making. Keep up the great content

  • @n8sdesign
    @n8sdesign Před 2 lety

    Another great review of Hak5 gear!

  • @B-a_s-H
    @B-a_s-H Před 2 lety +3

    You can (and should) use a tool like the USB protector from Maltronics when using untrusted chargeports/cables.

  • @YuckNasty
    @YuckNasty Před rokem

    What language are you using to write the scripts? Are you using Swift and Kotlin respectively or are you running Python for both?

  • @Mroscar1827
    @Mroscar1827 Před rokem

    Wow
    Thank you
    This makes me aware of all of vulnerabilities and new ways, hackers or other people with bad intent, can actually infiltrate you and your space

  • @nomz318
    @nomz318 Před 2 lety +3

    Hey David!
    I was wondering if someone could turn the camera around when they load they script to take a photo
    For example you showed us a script that could take a photo from the device connected to the OMG cable
    BUT that photo was taken with the camera on the back-side of the phone
    Could someone switch the camera from the back-side of the phone to the front? (The screen-side)
    Thanks in advance!
    Sorry if my explanation were bad

  • @yasiritpro3238
    @yasiritpro3238 Před 2 lety +2

    I've ever loved your tutorials Mr.David I LOVE YOU from Iraq
    Thanks for everything you offer us as IT

  • @gjsatru3383
    @gjsatru3383 Před 2 lety +15

    Great David same what I wanted . Btw could you tell the name of the winners of giveaway.

    • @davidbombal
      @davidbombal  Před 2 lety +4

      Will be announced soon. I verify the winners first in case spammers enter.

    • @gjsatru3383
      @gjsatru3383 Před 2 lety +1

      @@davidbombal yaa that's true.

    • @Tarun_Kotagiri
      @Tarun_Kotagiri Před 2 lety +1

      @@davidbombal I'm curious and excited too.. guess just gotta wait for the results 😁

    • @youafan259
      @youafan259 Před 2 lety

      Sunil, you fina rob them or something?

    • @gjsatru3383
      @gjsatru3383 Před 2 lety

      @@youafan259 Naah Naah.....

  • @jamespowell3056
    @jamespowell3056 Před rokem +6

    I been told never use the usb changer's at airports

    • @playtester6635
      @playtester6635 Před rokem

      I believe one year at blackhat. They snuck ine a script to infect mobile devices at the charging stations to demonstrate the point of avoiding unknown charging stations and usb ports. I'm trying to remember what yearbit was but it was a while ago. Definitely something to remember. It's a risk of charging when data travels through the same cable.

  • @emilmackay1181
    @emilmackay1181 Před rokem

    You should hide the cable in public and stay there til someone picks it up and when they plug it in you rickroll them and go tell them its not safe. Btw love the vid! ❤

  • @adithyaps3606
    @adithyaps3606 Před 2 lety +2

    another possibility for identification is checking for wi fi networks popping up after you plug in the cable
    if one pops up every time you plug it in on one end, that should indicate it is an OMG cable
    it's just a theory tho

  • @theethicalhadwani4091
    @theethicalhadwani4091 Před 2 lety

    Thanks sir ❤️hope you achive your goal of a hundred thousand students in your courses my best wishes!!

  • @mariamakter8109
    @mariamakter8109 Před 2 lety

    Sir I have one question , I'm learning networking for hacking and i just finished the NET+ and some other course . Which cloud course you recommend for hacking .

  • @lokeshnaidu3855
    @lokeshnaidu3855 Před 2 lety +4

    Who wins the previous giveaway of hak5???????????????????????????????????????????????????????????????????????????????

  • @JeromeDemers
    @JeromeDemers Před 2 lety +2

    I mostly use wireless charging. I wonder if in few years they will be able to do this type of attach with wireless charging since once day it will transfer data at the same time of wireless charging. Matter of time.

  • @skywskyw
    @skywskyw Před 2 lety +2

    Hi David, thanks for this video. Will the omg cable also work with locked devices ?

    • @Brett_S_420
      @Brett_S_420 Před 2 lety +2

      Right?! I can't imagine it does.

  • @poketcg1592
    @poketcg1592 Před 2 lety +1

    I ordered one with the added malicious cable detector. Pretty neat cable, can't wait.

    • @Dougie6116
      @Dougie6116 Před rokem

      Any updates on what’s the cable like?

  • @amazingman2760
    @amazingman2760 Před 2 lety +1

    Thanks David. Learned alot from you. Been with you was fun and learning experience on YT and discord.
    1st time ever entered in any draw. Hope I win.😃

    • @allenella5766
      @allenella5766 Před 2 lety

      👆🇱🇷🇱🇷
      I appreciate the name above 👆👆he helped me to gain access to my deceitful husband phone without him knowing.he is a genius.

  • @LawlessCarrot
    @LawlessCarrot Před 2 lety

    Does the Lightening work on an iPhone (iOS)? I've know about this for the past year but skeptical on buying it.

  • @sankasoysa3504
    @sankasoysa3504 Před 2 lety

    Excellent video David.
    Are you able to unlock the device with the OMG cable?

  • @berserker6336
    @berserker6336 Před 2 lety

    Can this be used for remote management or monitoring on the device such as monitoring gps location, sent/receive texts/calls?

  • @ishan9050
    @ishan9050 Před 2 lety

    Great content once again. In case you remember, I request a time management video. Can we expect this month? Just asking🙂

  • @ehiebert1297
    @ehiebert1297 Před rokem

    Thanks for the video.
    Is there a way to test cable to find out if they are compromised in any way. It is good to know that the cables are out there, but if you purchase a cable on amazon or where ever is there a way to test them to see if they have any problems.

  • @idrissasow1595
    @idrissasow1595 Před rokem

    that was exactly what I needed , thank you so much

  • @Radical9535
    @Radical9535 Před rokem

    that is crazy I always wondered if something like this was possible just imagine the possibilities of other tech being copied in the same way such as wifi adapters routers other wires such as hdmi and so on!

  • @subhankarroy9503
    @subhankarroy9503 Před 2 lety +1

    Great content and congratulations on 700k subs

  • @Nohndz
    @Nohndz Před rokem

    Do these features only work while the cable is plugged In or does the cable allow you to access saved or "hidden data? Sorry I don't completely understand how this works..thanks for any advise

  • @noblog0
    @noblog0 Před rokem

    for connecting to the malicious cable, do we need to be in a close permitter to connect to the cable's wifi? OR we can access the cable's connection even when we are connected to our own home network(miles away from the physical cable) while the cable is connected to the affected phone's internet connection?

  • @Mirutomaru
    @Mirutomaru Před 2 lety +1

    Hello, can the mobile device be controlled only with the display switched on or even locked? Thank you in advance for the info

  • @Z0nd4
    @Z0nd4 Před rokem

    AMAZING. Thanks for this video, and I hope to do more videos like this!

  • @ThatBidsh
    @ThatBidsh Před 2 lety

    I was under the impression that the O.MG cable could only run scripts on the side that connects to a computer, was that just the first version? is there anything special you have to do to run ducky script on iOS?

  • @majiddehbi9186
    @majiddehbi9186 Před 2 lety

    What great session the knowledge u give Sir Bombal

  • @denverzimunya8303
    @denverzimunya8303 Před 2 lety

    Wow, thank you for this Eye opening Security Content 👏🏾👏🏾

  • @neelsmostert
    @neelsmostert Před rokem

    Few new uses for a ATINY85 or ESP. Great idea!

  • @ajr1labrynth441
    @ajr1labrynth441 Před rokem

    Amazing informative video I freaking love it people should truly pay attention!

  • @gonzalogermano2312
    @gonzalogermano2312 Před 2 lety

    Hi David, thanks again you have really inspired me and I have swtiched carrer at my 39 years old from former Deputy Admin Head to obtained IBM cybersecurity Analyst and other certification (Python, Linux, Git, etc etc). Can you point me in the right direction to get a remote job in cybersecurity field? All tips can help. Thanks again I really enjoy what you bring to the commnunity , keep up the good work!

  • @JotPb31
    @JotPb31 Před rokem

    Appreciate knowledge about this 🙏

  • @bennyblanxs2754
    @bennyblanxs2754 Před 2 lety

    You are a gentleman and a scholar! Thanks for the video!

  • @holyclout6173
    @holyclout6173 Před 2 lety

    Would this work if it’s connected into an outlet on the wall ? Or does it have to be connected into a laptop/computer

  • @steamlabstech
    @steamlabstech Před 2 lety

    Great video, I love the product from Hak5 and provide these to our student base, hoping that in time we can create videos half as good as yours.
    Keen to learn more about the LED lighting in your room!!

  • @sevalmi8681
    @sevalmi8681 Před rokem

    Does it work in the range of omg cable wifi network only? Or they can send payloads when the target device is connected to your cable home network, where wifi network is switched off for example?

  • @alikhanuana1025
    @alikhanuana1025 Před 2 lety

    Thank you Sir for such beautiful and informative video

  • @spreadislam6866
    @spreadislam6866 Před 2 lety +1

    Keep uploading such an amazing content💓

  • @kunalnanavati
    @kunalnanavati Před rokem

    So it needs to be constantly connected to the cable for the script to be able to run on the device right? Or does it load so that it can be done remotely and wirelessly?

  • @malcolmjordan6775
    @malcolmjordan6775 Před 2 lety +2

    With this cable, could you pull all the information off the target phone? Like messages, photos, etc ?

  • @wasimashraf8280
    @wasimashraf8280 Před 2 lety

    Thanks for this knowledge Sir 🤠

  • @alexandermorse1306
    @alexandermorse1306 Před 2 lety

    Can you see the messages of the compromised phone (like a GUI) from the phone that is controlling the payloads?

  • @JorgeRzezak
    @JorgeRzezak Před rokem

    Hi David, would you be able to scan the Wi-Fi networks and see that there is a strange Wi-Fi network to discover that something fishy is going on, so when you disconnect the cable does not appear and when you connect it appears again?
    Thanks a lot for your video.

  • @S2eedGH
    @S2eedGH Před 2 lety

    Great Explain Mr. David
    But what if the phone is locked? and what if I used this cable for charging, is it really charge the phone?

  • @saqibwilliam
    @saqibwilliam Před 2 lety

    Thanks for sharing it David.

  • @dharunkanna5261
    @dharunkanna5261 Před 2 lety

    David right now land here from Neal's stream really excited about next video with Neal and especially for giveaway 😀 ❤

  • @nicolaspencer590
    @nicolaspencer590 Před rokem

    Thanks for sharing such amazing knowledge, in a way that we can understand to a certain level. I would like to learn the grassroots, and then learn just a few area's of my interest. I will link up with yourself on Discord or Facebook, and go from there. Sir, I appreciate the way you make your videos, so I can at least absorb some key info, which i could never seem to learn something, from others in the circle. Total Gentleman, and an absolute Legend. 👌🏻👍🏻💯

  • @perfectgamer384
    @perfectgamer384 Před 2 lety

    Hello David, Very Interesting... All your content makes me to protect my identity more secure. So the OMG cables, Where do we buy that cables?

  • @nikhilchaudhary7706
    @nikhilchaudhary7706 Před 2 lety

    But can you get some data from the target device?
    Or control it in live?
    Or if i change to a custom rom or any OnePlus, huawei device that have different system , will it be able to understand that Interface?

  • @acetaslive9734
    @acetaslive9734 Před rokem

    arre you also able to exzcecute scripts in the background with this so you wouldnt even notice its actually running that or even can you make it retrieve information stored on the (for example) iphone

  • @tsionwilliamson1385
    @tsionwilliamson1385 Před 2 lety

    ive got a rasperry pi zero i can do simular things with because it runs the P1Pwn software its pretty cool only need a otg cable and a few seconds of physical access