10 HACKING tools you MUST know about!

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
What have I got here? An ordinary  cable to charge my device?   A dongle for connecting to Ethernet?  A nice innocent looking thumbdrive?   Actually, they might be malicious  tools that can hack your computer.   I just got back from DefCon, an awesome hacker  conference where you can learn how to pick locks,   intercept internet packets to steal passwords,  hack IoT devices, and wardrive to collect all   kinds of signals coming off all kinds of devices.  Or Maybe you just want to make blanket forts or   hire a violinist to walk around with you and  create a soundtrack to your conference experience.   You can do that at DefCon too. But one of the things that I dove into   at this year’s conference was tools  that look like everyday devices,   but actually hide something more sinister.   You may have something like this or  something like this laying around and not   really realize that it might actually  be a nefarious computer itself.   Darren Kitchen is the founder of Hak5, a  company that makes all kinds of awesome   gear to help people understand their  own digital vulnerabilities.   They are quite scary, uh, if you're not  familiar with cybersecurity.   In this video we’ll explore 10 hacking tools  they offer that you need to know about.   we’ll also look at how to tell if a  piece of hardware can be trusted, and   we’ll teach you how to protect yourself. Just a reminder that HAK5 didn’t sponsor this   episode, we actually don’t do show sponsors, we  thought that this was just really interesting   equipment that people should be aware  of, so that they can better protect   themselves in the digital world. Let’s get started with the famous   usb rubber ducky. You may recognize it from various   tv shows and movies. A rubber ducky.   It looks to you and I like a flash drive,  to a computer. It looks like a keyboard   and computers inherently trust keyboards, you  can plug this into the computer and it'll execute   keystrokes that you can pre-program // It would bypass all standard countermeasures by   emulating a plug in keyboard. It’s a great reason to not go   plugging random thumb drives into your  computer, because they could be executing   all kinds of malicious code. Next, the omg cable. lightning   connection on one end that you’d plug into  your iphone, and usb on the other.   it looks and feels just like one that you  may have, uh, but it's malicious.   While it’s indistignuisahble from a normal cable,  the big difference of course is that this one   has a computer inside of it with a wifi access  point that you can control from your phone   or anywhere in the world and do malicious things  with the computer that it's attached to.   You can connect to them from  your phone or laptop.   You can use that to trigger payloads. EEP   Number 3, the lan turtle A simple USB ethernet adapter,   but happens to have a little computer inside that  provides an attacker with remote access into this   device and thus remote access into your network. a, uh, attacker can plant this on a computer   and have persistent remote access into  that machine and also watch all of the   data that's going in between, and maybe even  tweak some of the data. So it's like, oh,   the computer's trying to go to this website.  Well, let's send 'em to that website instead.   Number 4, we have the adorable bash bunny This right here does similar USB attacks to the   USB rubber ducky except way more advanced. It does  multi-vector. So this can actually enumerate on   the computer as not only, uh, a keyboard, uh, but  also storage, serial and ethernet for windows and   Mac. So you can do, uh, attacks that are what  we call, bring your own network. The idea is I   can carry multiple payloads on this. I can flip  the switch right before I go up to my target,   plug it in and it'll execute keystrokes, it'll  show up as a network device, the computer is gonna   trust the network and say, oh great. Can I get on your network, a network of two,   just the computer and this, and then you can  perform a bunch of network attacks. // it's   actually a quad core Linux machine in here that  also has geofencing with Bluetooth. So you can   set it up so you can trigger it remotely. You can do what's called exfiltration,   which is a very fancy term for really an  involuntary backup. You might wanna call   it. it's important to back up your data and a  hacker might for you, <laugh> for you. That's   very kind. So with this device, there's numerous  techniques to get information out of the computer   and then save it to the SD card. Number 5, the key crock   This is a very smart keylogger. So unlike a  normal keylogger that you just plug in line   between the computer and the keyboard, that's just  gonna record cues, strokes. This will do that,   but it'll also stream them on the internet  to your own server and allow you to inject   your own keystrokes. So you can remotely control  the computer from afar injecting keystrokes at   will. This is just a discreet little adapter  that can plug in behind the computer.   Number 6: It's called the screen crab   and it gets screen grabs. It's got H D M I in and  HD M I out, uh, powers over USB. And you can plug   it in, say behind the television, it will record  the images to a micro SD card. And then it'll also   stream it over the web, allowing you to see what's  happening in real time and it's self hosted.   Which means that no one else gets access to  the data you’re collecting, it’s just you.   Number 7, the shark jack Darren   This allows you to Jack into a network. It looks  like little flash drive with a dongle here,   but it's actually for ethernet. So you plug this  into a network, flip the switch into attack mode   and plug this into your laptop or your phone. And  what will happen is this will boot it up. It's   a little Linux box with a bunch of pen testing  tools, and it will automatically do reconnaissance   on the network. So you can see what's happening  live and get live actionable reports. There are   ethernet jacks all over the conference center  and the hotels, uh, that are unattended. And   it would take just moments to take one of these  flip, the switch, the battery powered one makes   it even easier, plug it into the network. And the  light will change color depending on what you've   programmed it to do, what kind of actions. Remember all of these tools are double edged   swords that can also be used to help  people trouble shoot problems   They could just give it to unskilled  people and say, Hey, just plug these   in. And if the light turns red mark down  where that was and we'll remediate.   Finally we have 2 high powered tools that you’re  not going to mistakenly plug in, but your computer   might mistakenly connect to them via wifi. Number 8 is the wifi pineapple   The wifi pineapple is a rogue access point. You  might wanna call it a, uh, a hotspot honey pot,   Your phone, your tablet, your laptop probably  remembers every wifi network has ever joined   in the past and is constantly looking for those  networks. It's the reason why when you go home,   your device is automatically  connect to your home network.   So how does your phone see if one of your  remembered networks is nearby so that it   can automatically connect? Tour phone is sending out. What's   called a probe request And that’s where your phone   is basically shouting out “i’m looking for  naomi brockwell’s home wifi network”.   It shouts out something similar for every network  you’ve ever remembered in the past, and it does   this at all times as long as your wifi is on. What the wifi pineapple does is listens for all   these names of networks and then spoofs them It would respond back and say, oh yeah,   that that's me. That's me. You should  connect with me. I'm that network.   And your phone will then automatically  connect to the wifi pineapple.   When clients' devices connect to the wifi  pineapple, and it'll provide them with internet   access, you as the operator, get to what we call  a man in the middle attack, you get to see what's   going on in between, and you can manipulate the  traffic. You can also use this to perform a lot   of wifi attacks where you can kick devices off  networks. And there's a lot of, um, modules that   allow you to kind of inspect the data and  see what's going on, uh, with kind of what   websites people are visiting. You will also glean a lot of interesting   information just by seeing the names of all the  networks someone’s phone is calling for:   If their device is looking for certain hotel  networks and C certain, uh, airline networks   and certain corporate wifi networks, and maybe  some other corporation guest wifi networks,   you can determine who they fly with,  um, you know, who they work with,   who that company might also be partnering, with or  potentially partnering with and working with based   on those guest, uh, wifi, uh, networks. Number 9 is a superpowered   version of this device This is the wifi pineapple enterprise.   This is, uh, that except, uh, with so much more  horsepower made for, uh, very large and busy wifi   environments, kind of like the very hostile  network environment we're in here at DEFCON.   Our wifi pineapple software has a lot of  features that allow you to find what are the   vulnerable devices in my environment. And finally there’s the wifi coconut,   a brand new device that is like  the pineapple but on steroids.   WIfi uses the 2.4 gigahertz and 5 gigahertz  frequencies, but there aren’t just 2 channels   to monitor, for wifi signals. There are 14 2.4 gigahertz channels.   A Normal radio can only listen  to one channel at the time,   It would listen on channel one. And then it  would hop over to channel two and listen on that.   And while it's on each channel listening,  it's ignoring 13 other channels.   So you were never able to get an entire big  picture of all of the channels of the 2.4   gigahertz simultaneously. The wifi coconut monitors all   of the 2.4 gigahertz channels. This is  constantly listening to all of them.   Channels. One through 11 are, are used in  the United States, channel 12 and 13 are   only supposed to be used in Europe. And channel 14  is, uh, only supposed to be used in Japan.   Why are only one through 11 meant  to be used in the United States   There's this thing called the ism band,  Industrial, Scientific, and Medical Band   that the FCC way back in the day, uh, be made,  but they gave it to the general public to use   that spectrum. And there were a few caveats to it  about the way that they could use the spectrum,   the, uh, modulations and the power and the  different channels. Uh, and that's a long   winded way to say that in the United States, we  use one through 11 and in the rest of the world,   they use one through 13 and in Japan,  they get to be special and use 14.   And you can see here that the wifi coconut is  seeing a lot of traffic on all of these channels   If you watch this for a while, you'll actually see  a little bit of traffic on the Japanese channel,   because I feel like there might be some  non-law abiding hackers in the area.   So now the most important part of the video,  how can we protect ourselves?   Starting with the pineapple and coconut: The takeaway is to absolutely turn wifi   off when you’re not using it, lest you accidently  connect to one of these traps instead of a real   wifi network. You should also forget all wifi  networks after you disconnect from them. and   you should not allow your phone to automatically  connect to any wifi network. It will be annoying,   because you’ll have to click a button when  you return home instead of having your device   automatically connect, but to leave it open is  a huge privacy and security vulnerability.   Next, there are tools that can actually tell us  whether a cable is malicious or not.   This is a, um, malicious cable detector.  And the way that it works is I'll take this   normal benign cable and plug it in. And the  light doesn't light up. But if I take this cable,   which I know is malicious, and it goes red and  lets us know that there's data being transferred   through here. And it really shouldn't. This works  against a lot of, uh, illegitimate cables that you   may find running around the internet. This provides data blocking. Not only is it gonna   detect that it's malicious, but it's gonna prevent  your computer from, uh, getting hacked.   Final piece of advice: you should be careful  which devices you plug into your computer.   Don't be afraid of this, but be mindful of it,  know that it's out there, know it exists.   If you’re charging a device for  example, only use your own cables.   Maybe you don't, uh, pick up a  cable that you find on the floor,   or if you find a, a USB drive in the parking  lot that has something enticing written on it,   like salaries or something, maybe think twice  before plugging it into your computer.   Accepting electronics from strangers, even  things that look as benign as a cable,   is kind of like taking candy from strangers.  You probably shouldn’t do it.   Tools like this may seem scary, but they show  us where the vulnerabilities are in our systems   so that we can fix them. It's a good thing to have these   things that, uh, break stuff./ So go forth, and be a little more   mindful of seemingly innocent hardware around  you. one day it might just save your device.
Info
Channel: NBTV (Naomi Brockwell TV)
Views: 91,364
Rating: undefined out of 5
Keywords: naomi, brockwell, bitcoin, cryptocurrency, Fiat, Bitcoingirl.org, btc, monetary, policy, currency, Bitcoin, Girl, crypto, blockchain, privacy, surveillance, naomi brockwell, nbtv, tech, nbtv.media, naomi privacy tips, hak5, darren kitchen, hacker, opsec, usb rubber ducky, wifi pineapple, wifi coconut
Id: 6F7EHO4niCw
Channel Id: undefined
Length: 11min 53sec (713 seconds)
Published: Fri Aug 19 2022
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.