USB Ninja Cable with Kevin Mitnick

Sdílet
Vložit
  • čas přidán 12. 03. 2021
  • Be careful when using USB charging cables. Cyber Protection Magazine has teamed up with KnowBe4 and their Chief Hacking Officer Kevin Mitnick to show you what can happen when using a cable from an unknown source.
    More cybersecurity knowledge and stories:
    cyberprotection-magazine.com
  • Věda a technologie

Komentáře • 55

  • @tyronejay5510
    @tyronejay5510 Před 3 lety +27

    Hes such a pro that he doesnt care if he shows his password

    • @simonp37
      @simonp37 Před rokem

      Passwords are easy to guess. Using multifactor authentication is the key ;-)

    • @jaysonjoy6467
      @jaysonjoy6467 Před rokem +1

      A real hacker never put any credentials in browser. They save these kind of credentials which is not much important

    • @ivory1233
      @ivory1233 Před rokem

      my mojmmuy said you are meanie

  • @kevinalexander4959
    @kevinalexander4959 Před 2 lety +9

    I read this guys book, Ghost in the Wires when i was in college on the bus everyday. Back in the day this guy trolled and hacked FBI officials and was always a step ahead of them. He knew when they were coming for him. Freaking hilarious.

    • @wss_maze.7819
      @wss_maze.7819 Před 2 lety +1

      yeah the doughnut story is pretty damn funny

    • @ivory1233
      @ivory1233 Před rokem +1

      can you read it to me?

  • @stefanstruik
    @stefanstruik Před rokem +2

    Hello @Cyber Protection Magazine, can you share with me the payload used in this video?
    Thanks

  • @coneheadzmusic1460
    @coneheadzmusic1460 Před 10 měsíci +1

    I received a ninja cable once…I made the mistake of letting it into my house, and one night after everyone was asleep I woke up and saw the usb cable standing at the foot of my bed dressed in all black from head to toe. He was also wearing this strange mask! Anyways, he used this really secretive karate technique, and before I knew it, we were all stuck to the wall with Chinese stars. He took everything from us, least of all, my trust in ninja cables in the future. Such a shame!

  • @jeremiahonah8736
    @jeremiahonah8736 Před 2 lety

    How can the cable be setup and what is the name of this Bluetooth. Please quick answer

  • @sergiomauricio9290
    @sergiomauricio9290 Před 2 lety +1

    Mitnick the best

  • @stark6314
    @stark6314 Před 3 lety +1

    Yes that cable is dangerous

    • @ivory1233
      @ivory1233 Před rokem

      hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm

  • @Fm-ss4uj
    @Fm-ss4uj Před 2 lety

    What are counter measures ? How easy is it to detect if your computer is compromised.

    • @CyberProtectionMagazine
      @CyberProtectionMagazine  Před 2 lety

      Counter measures in general: a good cybersecurity hygiene. For this case in particular: make sure you only buy certified cables. And how to detect an attack: it really depends on the payload, sophisticated attacks can be almost invisible. Then again, most attacks can be detected with the right tools.

    • @Fm-ss4uj
      @Fm-ss4uj Před 2 lety

      @@CyberProtectionMagazine thanks for the input. I'm starting my certifications now from the ground up. I'm already thinking of what improvements if any I can make in cyber security.So looking at different attacks,defenses to gage what's out there.

    • @ivory1233
      @ivory1233 Před rokem

      no

  • @skunkgrowusa
    @skunkgrowusa Před 3 lety +1

    where is the ducky code for this?

  • @janenyamburanjoroge56
    @janenyamburanjoroge56 Před 2 lety +2

    Where can I get that cable?

  • @saleh.alqahtani
    @saleh.alqahtani Před 2 lety

    From where i can buy this cable ?

    • @ghalibali32
      @ghalibali32 Před 2 lety

      Hak5

    • @ivory1233
      @ivory1233 Před rokem

      call 911 for it and theyll send it to you just give them your adress

  • @Potter_3810
    @Potter_3810 Před 2 lety +1

    Please make a video on how to block it

    • @Marthastewart209.
      @Marthastewart209. Před 2 lety

      You can use a usb blocker (physical device) to block data transfer. It essentially turns a data cable into a power charging only cable

    • @Potter_3810
      @Potter_3810 Před 2 lety +1

      Thanks bro

  • @trichert7360
    @trichert7360 Před 3 lety

    Some sites detect log in from strange, different ip , bah you are caught

    • @trichert7360
      @trichert7360 Před 3 lety

      And the video was made BEFORE popular password manager compromise

    • @Abdullah_Al-Sammarraie
      @Abdullah_Al-Sammarraie Před 3 lety

      bah,I use a vpn for a reason

    • @mareikestatt4520
      @mareikestatt4520 Před 3 lety +1

      Well, as in the scenario, both are in the same network. Both have the same public ip, so it really doesn't matter and there is no way websites can check anything. Same browser, same ip, even same fingerprint, since the entire browser session gets copied. It's really game over for the victim, because they might be able to turn off 2FA, change passwords, backup email, everything

  • @pavelyankouski4913
    @pavelyankouski4913 Před 2 lety

    I bet he will hack Google at the end of a career and then he will run to a Cuba

  • @starviptv6544
    @starviptv6544 Před 2 lety

    📚LOL 💾🧀🐀
    - wave airs are dangerously loud .

  • @hametoapnoke9357
    @hametoapnoke9357 Před rokem

    Ueyye

  • @riajtech1699
    @riajtech1699 Před 3 lety

    The Google Chrome must fix this issue

    • @tinu949
      @tinu949 Před 3 lety +3

      Google Chrome is the issue

    • @riajtech1699
      @riajtech1699 Před 3 lety

      @@tinu949 but its the same case on every browser

    • @kurdmajid4874
      @kurdmajid4874 Před 3 lety

      @@riajtech1699 not tor

    • @riajtech1699
      @riajtech1699 Před 3 lety

      @@kurdmajid4874 what tor ??

    • @kurdmajid4874
      @kurdmajid4874 Před 3 lety +1

      @@riajtech1699 its a web browser its how people acess the dark web its the most secured browser

  • @hackzgamezyt
    @hackzgamezyt Před 3 lety

    Wait this has been out for awhile, is there still not a security update for this?

    • @syphaxxxxx
      @syphaxxxxx Před 3 lety

      Like keyloggers has been out for years , but no security update can catch them , i guess the same thing is going with usb ninja

    • @seanfaherty
      @seanfaherty Před 2 lety

      On a windows machine you can make USBs need permission.
      Works on a rubber ducky but people will give the cable permission .

    • @ivory1233
      @ivory1233 Před rokem

      nah i just use my Dora the explorer phone and she protects me from hostile nucellar threats from north Korea

  • @albertcurielx
    @albertcurielx Před 2 lety

    WTFFFFFFFFFFFFFFFF omG!

  • @Sector404
    @Sector404 Před 2 lety

    Hello @Cyber Protection Magazine, can you share with me the payload used in this video?
    Thanks

    • @ivory1233
      @ivory1233 Před rokem

      your so dumb you cant even tag someone properly

    • @Sector404
      @Sector404 Před rokem

      ​@@ivory1233 Is that how you talk to your dad?
      It can only be by mistake that you received a brain, a spinal cord would be more than enough for you.