USB Ninja Cable with Kevin Mitnick
Vložit
- čas přidán 12. 03. 2021
- Be careful when using USB charging cables. Cyber Protection Magazine has teamed up with KnowBe4 and their Chief Hacking Officer Kevin Mitnick to show you what can happen when using a cable from an unknown source.
More cybersecurity knowledge and stories:
cyberprotection-magazine.com - Věda a technologie
Hes such a pro that he doesnt care if he shows his password
Passwords are easy to guess. Using multifactor authentication is the key ;-)
A real hacker never put any credentials in browser. They save these kind of credentials which is not much important
my mojmmuy said you are meanie
I read this guys book, Ghost in the Wires when i was in college on the bus everyday. Back in the day this guy trolled and hacked FBI officials and was always a step ahead of them. He knew when they were coming for him. Freaking hilarious.
yeah the doughnut story is pretty damn funny
can you read it to me?
Hello @Cyber Protection Magazine, can you share with me the payload used in this video?
Thanks
I received a ninja cable once…I made the mistake of letting it into my house, and one night after everyone was asleep I woke up and saw the usb cable standing at the foot of my bed dressed in all black from head to toe. He was also wearing this strange mask! Anyways, he used this really secretive karate technique, and before I knew it, we were all stuck to the wall with Chinese stars. He took everything from us, least of all, my trust in ninja cables in the future. Such a shame!
🤣🤣🤣🤣
How can the cable be setup and what is the name of this Bluetooth. Please quick answer
Mitnick the best
Yes that cable is dangerous
hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
What are counter measures ? How easy is it to detect if your computer is compromised.
Counter measures in general: a good cybersecurity hygiene. For this case in particular: make sure you only buy certified cables. And how to detect an attack: it really depends on the payload, sophisticated attacks can be almost invisible. Then again, most attacks can be detected with the right tools.
@@CyberProtectionMagazine thanks for the input. I'm starting my certifications now from the ground up. I'm already thinking of what improvements if any I can make in cyber security.So looking at different attacks,defenses to gage what's out there.
no
where is the ducky code for this?
top gun mavric
Where can I get that cable?
Only real question here
alabama
From where i can buy this cable ?
Hak5
call 911 for it and theyll send it to you just give them your adress
Please make a video on how to block it
You can use a usb blocker (physical device) to block data transfer. It essentially turns a data cable into a power charging only cable
Thanks bro
Some sites detect log in from strange, different ip , bah you are caught
And the video was made BEFORE popular password manager compromise
bah,I use a vpn for a reason
Well, as in the scenario, both are in the same network. Both have the same public ip, so it really doesn't matter and there is no way websites can check anything. Same browser, same ip, even same fingerprint, since the entire browser session gets copied. It's really game over for the victim, because they might be able to turn off 2FA, change passwords, backup email, everything
I bet he will hack Google at the end of a career and then he will run to a Cuba
nah thats to basic
📚LOL 💾🧀🐀
- wave airs are dangerously loud .
so are my farts
Ueyye
The Google Chrome must fix this issue
Google Chrome is the issue
@@tinu949 but its the same case on every browser
@@riajtech1699 not tor
@@kurdmajid4874 what tor ??
@@riajtech1699 its a web browser its how people acess the dark web its the most secured browser
Wait this has been out for awhile, is there still not a security update for this?
Like keyloggers has been out for years , but no security update can catch them , i guess the same thing is going with usb ninja
On a windows machine you can make USBs need permission.
Works on a rubber ducky but people will give the cable permission .
nah i just use my Dora the explorer phone and she protects me from hostile nucellar threats from north Korea
WTFFFFFFFFFFFFFFFF omG!
Hello @Cyber Protection Magazine, can you share with me the payload used in this video?
Thanks
your so dumb you cant even tag someone properly
@@ivory1233 Is that how you talk to your dad?
It can only be by mistake that you received a brain, a spinal cord would be more than enough for you.