How Hackers Could Wirelessly Bug Your Office

  Переглядів 931,752

Motherboard

Motherboard

7 років тому

You think about securing your laptop, but what about your desk phone, monitor, or printer?
In the second episode of Can I Hack It?, made possible by Mr Robot on Amazon Prime, white hat hacker Ang Cui demonstrates hacks on “embedded devices”-objects that contain computing systems but that you wouldn’t necessarily think of as computers.
At his office in New York, Cui shows us how he can turn an office phone or printer into a bugging device using a piece of malware he calls “funtenna.” This exploit makes the equipment transmit data over radio frequencies so it can be picked up by an antenna-without the hacker ever having to go near the device.
It’s a pretty high-level hack, but as Cui says, if he’s thought of it, you can imagine someone else has.
Click here to watch Mr. Robot on Amazon Prime: amzn.to/29zli1w
Subscribe to MOTHERBOARD: bit.ly/Subscribe-To-MOTHERBOARD
Follow MOTHERBOARD
Facebook: / motherboardtv
Twitter: / motherboard
Tumblr: / motherboardtv
Instagram: / motherboardtv
More videos from the VICE network: www. vicevideo

КОМЕНТАРІ: 912
@maxhale2382
@maxhale2382 7 років тому
I think the most important part of hacking is having as many windows open as possible. Preferably with scrolling multicolored text.
@suicidaljell
@suicidaljell 6 років тому
Max Hale that’s how you can tell they are deep in it.
@seanld444
@seanld444 6 років тому
Not true. You forgot the flashy fingers gliding across the keyboard like it's a race against time.
@iKingRPG
@iKingRPG 5 років тому
Max Hale when in command prompt do "color a" there. You are a hacker now. Congrats.
@rabbitdrink
@rabbitdrink 5 років тому
@@iKingRPG just do base64 -w 0 < /dev/urandom
@zxxczczczcz
@zxxczczczcz 5 років тому
@@rabbitdrink what does that do?
@qwertywtflol
@qwertywtflol 7 років тому
Sponsored by Amazon, the biggest collector of customer/consumer data on the planet.
@Falcrist
@Falcrist 7 років тому
Second biggest after Google IIRC. Also, don't forget about Microsoft and Apple.
@ElXtronic
@ElXtronic 7 років тому
& they still aint worth a damn thing.
@Jesus.the.Christ
@Jesus.the.Christ 7 років тому
Don't forget about the NSA.
@Falcrist
@Falcrist 7 років тому
Jesus Christ They're not a collector of customer/consumer data. They're a collector of *_EVERYONE'S_* data.
@Jesus.the.Christ
@Jesus.the.Christ 7 років тому
Falcrist What's the difference? Don't forget that government is a business. It's an overly large and cumbersome organization structured so that parts of it can make some people a lot of money.
@sapphiro
@sapphiro 7 років тому
You can bug me all you want, I have put a sticker tape on my phone's camera. All you can get is me moaning.
@WilliamSchlott
@WilliamSchlott 7 років тому
I'd rather get my girlfriend moaning thank you.
@nawman2033
@nawman2033 7 років тому
Fuckin hell William you sausage
@potato511
@potato511 7 років тому
and keylogs, and passwords and usernames, and facebook profiles which have pictures ;D
@mario6279
@mario6279 7 років тому
Benjamin Lafever yup that good old spyware
@AshisKumarSahoo1
@AshisKumarSahoo1 7 років тому
moan your mother's Maiden name and that should be it.
@bdeflorence
@bdeflorence 4 роки тому
It's called RF imposition. The Russians used this technique to bug the US Moscow embassy in the 70's. At the time, it required a very large antenna to collect the signals. Basically, the vibrations of the molecule of air (i.e. sound) will make any object in the room also vibrate, and that includes electronic circuit boards. As per Maxwell equations, as mentioned by the chap, a vibrating electronic circuit board, even if switched off, will generate an electronic signal. It then becomes just a matter of collecting that signal.
@Aaron-dt3xz
@Aaron-dt3xz 4 роки тому
I like how the thumbnail just says motherboard with a guy pointing to a motherboard
@daxutuc
@daxutuc 3 роки тому
I was searching this comment
@prakharmishra3000
@prakharmishra3000 3 роки тому
@@daxutuc me too lol
@jaqb17
@jaqb17 7 років тому
0:45 holy shit that setup!
@xteam29
@xteam29 7 років тому
Those 2 Dell monitors are just crazy!
@edg6779
@edg6779 7 років тому
2 dell monitors and a shit apple keyboard
@edg6779
@edg6779 7 років тому
***** i have a mechanical keyboard, 10k dpi mouse, h440 case with i5 4590 and a 760 but my monitor is a boring 1920x1080 60Hz dell :(
@joaobernardocosta
@joaobernardocosta 7 років тому
The funniest thing is that the chair is as expensive as one of those monitors.
@markrigsby2107
@markrigsby2107 7 років тому
jaqb17 Gotta love it
@jason-ge5nr
@jason-ge5nr 7 років тому
If this guy figured it out what has the NSA been able to do for the last 15 years
@CellularInterceptor
@CellularInterceptor 7 років тому
The government agencies have way better systems than demonstrated here. I can neither confirm nor deny its existence.
@Kyle.Moda.Deluca
@Kyle.Moda.Deluca 7 років тому
The POC being explained here is nothing new by no means! In the early 90's, Cult Of The Dead Cow (Hacker Group) went before Congress to speak about such things. They had fears that, if they can do it... so could other people. They spoke about a method known as tempest ( en.wikipedia.org/wiki/Tempest_(codename) ). They've known about this ability for quite some time now. It's just become super easy, since the advent of Wifi based devices!
@doublebubleguy12
@doublebubleguy12 7 років тому
I know it sounds impossible but I know a retired officer who use to work in a prison system back in the 90s. They used a database of files on all of their prisoners on an off grid intranet that could only be accessed via the prison system. Well it just so happened the FBI showed up asking for two prisoners that needed to be taken in for classified reasons not even telling the sheriff the reason for it. They pulled out a piece of paper with a screenshot of the two prisoners files which was obviously screenshotted from a computer within the off grid database. They had never been to the prison system before and it would have been impossible to gain access to the information over the internet since every computer was offline. The Sheriff asked the two agents how did they get that information as only that single prison system had it, the agent told the sheriff that it was classified information on how they obtained the screenshot from within the prison. The agents left with the two prisoners and told the sheriff that they were never there. Either two things I can think of that happened. "A" Their was an undercover agent disguised as a cop working their downloading information to a drive and sending it to the FBI which sounds kind of stupid considering they could have just asked the sheriff for the files on the prisoners or "B" They gained access through the power lines somehow.
@jason-ge5nr
@jason-ge5nr 7 років тому
the data storage facility in utah, the big one, has internet but they used the term 'airgapped' to describe all the connections to the outside world.
@vlad-pm2zr
@vlad-pm2zr 7 років тому
Question should be "what can they *not* do"
@clashwithmoi8926
@clashwithmoi8926 5 років тому
what they are doing is super underappreciated. wired devices with embedded systems really need to start insulating components so that no information leaves the device wirelessly
@diggydice9041
@diggydice9041 4 роки тому
Yep & my laptop is a Republic of Gamer's unit & even though I didn't know about blue-tooth for my pc, my neighbor did know & was busy trying to gain access when I caught him red handed...... When I buy again It'll be decked out in the best defensive stuff I can get/set-up. It really sucks how they violate people. peace
@genkiferal7178
@genkiferal7178 2 роки тому
my understanding is that those devices are being used to jump from one device to another to transmit data that customers want to have transmitted - or have signed off on. Maybe a frig manufacturer wants customer usage info for marketing or product design reasons, for example.
@adrianmego1
@adrianmego1 4 роки тому
The critical piece of information he gave is that there has to be an entry point into your network, and for him it was a CV containing malware. 80% of attacks are initiated this way, so - secure your endpoints or get decent mail service guys and gals...
@8224shivaram
@8224shivaram 5 років тому
This is one of the key reasons why following PCB design guidelines For Reduced EMI is so critical :P
@mrinalthakur3459
@mrinalthakur3459 4 роки тому
Just shield the entire thing after finishing the population process
@RDHDShorts
@RDHDShorts 4 роки тому
@@mrinalthakur3459 thats perfect and cheap also
@carterpeel625
@carterpeel625 3 роки тому
@@RDHDShorts not cheap.
@Reth_Hard
@Reth_Hard 3 роки тому
All my devices are wearing tin foil hats, including me.
@ibimon
@ibimon 7 років тому
By the way this is second time I see red balloon mentioned in security tech, looks like they're about to become pretty big. Good luck guys.
@maxp9292
@maxp9292 6 років тому
Good to now that we have willy billys support
@Plur307
@Plur307 7 років тому
Properly shielding electronics would make them not vulnerable to this hack. But the hack is still quite clever. All it takes is a thin sheet metal cover over the circuit boards to absorb almost all the emitted radio waves.
@nickigna
@nickigna 7 років тому
Feels like Motherboard is cranking up the paranoia on "everything hackers".
@JohnDoe-sp3dc
@JohnDoe-sp3dc 4 роки тому
@@shenshenani5913 motherboard is NOT for analysts and other security professionals it's for uninformed tech illiterate people.
@egg-iu3fe
@egg-iu3fe 2 роки тому
the real hackers to be afraid of are the ones in government. They are spying on you right now.
@RustyB5000
@RustyB5000 7 років тому
2 hours after this video was posted that guy disappeared from outside his apartment.
@jeffbrownstain
@jeffbrownstain Рік тому
Six years later and this exploit has yet to be seen in the wild
@victorastacio25Bravo
@victorastacio25Bravo 7 років тому
"through the network" is the key phrase. It's easy if you have direct access to the devices that you want to exploit if they're 2 feet away from you, like shown in the video, but if you're outside the network, you'll still need to bypass layers of security to get your software through. Still, pretty cool though.
@mrepic789
@mrepic789 7 років тому
But how powerful (in watts) is the transmission
@furatkafir3819
@furatkafir3819 3 роки тому
he receives only few meters away, i think it is not powerful
@dkipu266
@dkipu266 3 роки тому
You could build all this, or pay Google or Amazon for the feeds they continuously collect from devices you use everyday. Even using a VPN Service is of marginal benefit if you’re going to authenticate to any of your online accounts, as those accounts and your devices registering to networks are going identify you when you authenticate. That said, what this team is doing is really important work, as these devices are very vulnerable, and for all of the dollars we spend securing PC’s and Tablets, a good pen test will show you how vulnerable your voice and printing devices are as well...this team takes it to a level.
@Flankymanga
@Flankymanga 4 роки тому
You could say that every electronic device has it.... because what they are doing is turning an PCB copper path into transmitting antenna by quickly changing voltages and generating EM field. But there is a catch... you would not normally have connected a printer and a VoIP phone on the same corporate network. Meaning it has to go through either managed switch or a router - in which case there is a high chance that there would be a firewall rule to drop the packet.
@keybraker
@keybraker 5 років тому
The problem with these old hacks, is that they are super easy to defend. People who have sensitive data use better printers, and not stupid ones obviously.
@stevenpersoon
@stevenpersoon 5 років тому
For most, if not all embedded devices it's not possible to flash a microcontroller by JTAG or bootloader without extra external hardware. Also, devices without a dedicated antenna wouldn't be abled to transfer any reliable signal... And what about RF shields...
@furatkafir3819
@furatkafir3819 3 роки тому
yes, i thought about this limitations too. even with new devices with possibility to upgrade firmware via internet there will be phisical limitations on transmitting power and receiving range, even if you use low bitrate protocol like LORA.
@Em.P14
@Em.P14 5 років тому
THEY HAD A VIPER MK II IN THAT SHELVE !!!AWESOME GUYS!
@hajiosama9352
@hajiosama9352 3 роки тому
Where? Kindly mention time.
@Em.P14
@Em.P14 3 роки тому
@@hajiosama9352 im sorry but this was 2 years ago, no chance that i would be able to remember that. Id have to rewatch the entire thing again
@TheTarrMan
@TheTarrMan 7 років тому
So is this hack going to be involved one of the next episodes of Mr Robot? Pretty cool!
@savagescientist3835
@savagescientist3835 3 роки тому
please add part 1 in description so i can see full series thank you
@potato511
@potato511 7 років тому
3:15.....oh god that look....they've already bugged us all burn everything!
@gwengold1342
@gwengold1342 4 роки тому
I would work for this guy for free just to gain knowledge
@NetIncarnate
@NetIncarnate 7 років тому
Trust these guys to reference Neuromancer! Excellent work.
@AeoIian
@AeoIian 7 років тому
Nice! May work well in open areas but not through bunkers of concrete.
@gatekeeper9161
@gatekeeper9161 4 роки тому
LOL WOW THIS KID FIGURED OUT WHAT SOME OF US HAVE BEEN BRUTALIZING FOR 20 YEARS AND MORE
@rijaja
@rijaja 3 роки тому
1:02 My phone is very insecure. Most of the time, it can't gather the courage to show me notifications when I get a text message. Unfortunately, phones still aren't accepted in therapy.
@siriperera6974
@siriperera6974 6 років тому
Actually, all this is already in play in every household. It is very easy to confirm yourself what this video says. Take that part at 2:25 minutes about switching on the microphone on the phone (i think he mentioned switching the input/output ports). What he meant was just switching on the handsfree on the phone on without you knowing and without having the led light come on. When this happens, the microphone now on just completes the induction loop system that is your home. Now all your conversations are reflected in the magnetic modulations in the wiring in your home. All converted to FR signals etc and software radio will pick this up. But more so is that all the buzzes and pings and white noise sounds in your living space will modulate to your thinking, with that microphone in your phone switched on. Hence your thinking can be known by anybody who is listening or anybody who knows how to read tonal modulations. It is like learning a new language and with time you should be able to listen to your thinking in all the appliances around your home. But that is what they are doing at the moment. If there is such a thing as the funtenna software then they will get them downloaded via either your phone line or your internet line. In some cases they are both the same line. If you want to hear this signal coming into your home to switch on the handsfree for a listen in, you can do this by attaching an induction loop receiver to the access point for your phone line. You only need to tape it to the access point gadget - it will pick up the magnetic fluctuations from the phone access point.
@INeedAttentionEXE
@INeedAttentionEXE 6 років тому
Anything that has RF in it thats embedded, uses the ARM archetechture :D. Lifes good
@nokoru1
@nokoru1 5 років тому
6:42 "...and what makes it particularly impressive is how it can transmit data using radio frequencies..." wow!...wait...
@skinnybob_
@skinnybob_ 4 роки тому
groundbreaking technology here
@MrGoatmeat
@MrGoatmeat 7 років тому
the London look X D
@burnzy3210
@burnzy3210 7 років тому
what?
@TBlasku
@TBlasku 7 років тому
He was referring to the gap between her teeth :)
@coolxify
@coolxify 4 роки тому
Its supposed to mean the leather jacket black leather boots etc
@peterodriguez9191
@peterodriguez9191 4 роки тому
London has fallen. Like the movie
@XxprobertsonxX
@XxprobertsonxX 7 років тому
Motherboard video with a motherboard in the thumbnail. About time.
@_msnnanbakbshhsn
@_msnnanbakbshhsn 5 років тому
Is there a video talking about security vulnerabilities in hardware like processors and such.
@christophervenkus1276
@christophervenkus1276 7 років тому
We had all better behave.
@maynardjohnson3313
@maynardjohnson3313 4 роки тому
I don't think that any of Maxwell's equation has anything to say about the feasibility of hacking embedded devices. It sounds scholarly though.
@ibimon
@ibimon 7 років тому
I suspected that HR ATS can be hacked trough applications, but didn't think it was as easy as he explained.
@mahmoudaboelsaoud253
@mahmoudaboelsaoud253 5 років тому
wow!, i wish to work and learn from and with these guys they look well talented
@Granite
@Granite 7 років тому
Typically the door is wide open. This seems to be a bit excessive.
@codydixon9635
@codydixon9635 7 років тому
Some of those guys have setups to die for D:
@coolxify
@coolxify 4 роки тому
Ijr
@coolxify
@coolxify 4 роки тому
Lul ikr
@JaySmith-rv4ro
@JaySmith-rv4ro 5 років тому
It kills me how people talk about how they’re so surveilled by the gov but are spied on and robbed (through tech) by their fellow man.
@WhopperFPV
@WhopperFPV 6 років тому
0:59 I didnt know you could bug a racing drone. What are you going to do turn the motors on and off?
@jethro9341
@jethro9341 4 роки тому
Those dudes had no idea what to do with themselves with a cute girl that close to them!
@elck3
@elck3 3 роки тому
What would you do?
@jethro9341
@jethro9341 3 роки тому
@@elck3 business as usual my dude
@dave.h4075
@dave.h4075 4 роки тому
In a world that demands certification to prove our qualifications. How does a hacker prove that he is 'white hat', especially in his alone time.
@Clay7744
@Clay7744 4 роки тому
Pay them enough to not want to be black hat
@dave.h4075
@dave.h4075 4 роки тому
@@Clay7744 because 'enough' will always be sufficient? :))
@Clay7744
@Clay7744 4 роки тому
@@dave.h4075 Then we make them kings (im a pen tester)
@dave.h4075
@dave.h4075 4 роки тому
@@Clay7744 I guess the point I was trying to make is that one doesn't simply come out of the hive looking for the job unless someone spills the beans all be it few in some cases.
@blackpage716
@blackpage716 5 років тому
look into the Nsa ANT catalogue mind blowing
@TongTangTorq
@TongTangTorq 7 років тому
Would the hacker have to have access to the network that the phone/printer is on, in order to send it the software to produce RF signals of the audio?
@evanwetmore423
@evanwetmore423 7 років тому
Finds out massive exploit in phones... Uses a apple keyboard
@jelpy
@jelpy 7 років тому
Sgt UltraKill the fuck does this even mean
@cokbagus23
@cokbagus23 7 років тому
means a lot
@Linkz64
@Linkz64 6 років тому
Evan Knight an*
@Linkz64
@Linkz64 6 років тому
Evan Knight Apple*
@Linkz64
@Linkz64 6 років тому
Evan Knight Also have you ever heard of NSA? Google DangerDouse.
@L3uX
@L3uX 7 років тому
Nsa has already been doing this years ahead.
@MrLogannator
@MrLogannator 7 років тому
Just look at DangerMouse
@MrLogannator
@MrLogannator 7 років тому
***** its the code name for the Nsa program that listens in on your phone call and monitors them
@beating2
@beating2 7 років тому
Snowden leaked documents on how NSA spying on their own people some 3 years ago.... You live in a cave or something......
@ultort
@ultort 7 років тому
Yes, it's well known, you can have a look to the "NSA Ant Catalog". But hacking to RF without modifications on a non emitting device is almost impossible because the signal will most likely be very small, maybe under the noise level. If you have wifi on a printer, you may be able to hack the wifi to transmit data via RF.
@arzoo_singh
@arzoo_singh 6 років тому
And way more then we know ....
@imtatarin
@imtatarin 7 років тому
Soooo, what programming languages (and overall knowledge) is required in order to do something like this?
@jumasayeh4574
@jumasayeh4574 5 років тому
Stanis Baratheon well you'll have to know how to reflash hardware using the network, creat an ai that will find the best wire to use as antenna for your signal .. knowledge about radio signals and modulation, you'll have to know how to write a hex firmware for a phone , printer or whatever you're hacking .
@thatoneguy1205
@thatoneguy1205 3 роки тому
it's not always just software, sometimes it's hardware, like eprom, and processing, like how I never would have figured out how signals are processed if I never learned the basics of electronic hardware, and a bit of software. also signals are generated by a electromagnetic inductor, using a analog signal, it reaches the other thing, and from there the analog ports on the processor turn the analog signal into digital signals, which are interpreted into binary. analog= wavy signal digital= sharp signal
@jasonsalz7185
@jasonsalz7185 7 років тому
With such kind of wireless bugging. Is there any device/method to detect such bugging?
@F1delF1estasMC
@F1delF1estasMC 7 років тому
uploaded by "motherboard", tumbnailof a guy pointing on a motherboard....
@MariaMartinez-qj7wc
@MariaMartinez-qj7wc 7 років тому
walala wow its so intresting how we are vulnerable no matter where...
@Matherofacts
@Matherofacts 7 років тому
+Samuel Mason It's an expression that comes from the French voilà which literally means see there.
@mrmagoo9901
@mrmagoo9901 7 років тому
Whats really interesting is that George Orwell had this figured out a long time ago and now we sit watching it happen to us in bewildered fascination...
@Matherofacts
@Matherofacts 7 років тому
When you say it in french it's pronounced vwallah. French is my second language. 
@HiAdrian
@HiAdrian 7 років тому
*+00 Gaudie* But your mouth has to actually make an *O* along the way, which is why plain "va" misses the mark.
@Matherofacts
@Matherofacts 7 років тому
Samuel Mason​ Yeah exactly, but after the V add a W sound like vwah. That's how they pronounce where I live.
@TheYamakasiize
@TheYamakasiize 4 роки тому
Thats why I don’t use any technology and none in my possession. I am now commenting through a wooden stick and a rock tie to an owl.
@Serj772
@Serj772 4 роки тому
0:55, is that guy in his undewear? hahah
@kman4thewin865
@kman4thewin865 4 роки тому
IT LOOKS LIKE IT LMAO good eye
@scodiofficer0012
@scodiofficer0012 4 роки тому
*You can't hack our office,we all use Incognito Mode*
@joemammon6149
@joemammon6149 7 років тому
this is great for industrial espionage. learn all about their competitors' secrets within comforts of your office.
@prestonwest2828
@prestonwest2828 7 років тому
lol
@myongpark
@myongpark 6 років тому
Hey, he used the word "theory" in the correct context! That's more impressive than the skills, or maybe an indicator of why he has them.
@AnymMusic
@AnymMusic 5 років тому
I am so happy to have a hacker as a friend.
@TheMarcomm97
@TheMarcomm97 7 років тому
For some reason I have the feeling the US goverment has already been using it.
@LordAugastus
@LordAugastus 7 років тому
why is motherboard now focusing on fear mongering to the non tech literate? Most hardware hacking relies on being with the machine this means....digital hacking is still a long and time intensive process.
@prestonwest2828
@prestonwest2828 7 років тому
I didnt see it as fear mongering. Seemed to me like those guys were eager to show just the capabilities are possible and educate the masses.
@LordAugastus
@LordAugastus 7 років тому
what capabilities? Hacking some phones apart and figuring out how to create a miniscule RF signal? a signal so weak that you would have to be in the room. right next to the printer to even detect. and did you see the processing speed? like a word a minute man, they spy will stand there like an idiot going hea man i just have to print something for 14 days straight. Just saying, nothing to fear people, as long as you have a mobile device, what ever country holds the company will probably have way to spy on you. So once again, wtf are you talking about, "educating", any reasonably educated man will see this video and laugh.
@spydergs07
@spydergs07 7 років тому
You do realize they could easily amplify their AM antenna receiver and be able to receive signals a few blocks away.
@existenz55
@existenz55 7 років тому
You can`t. RF signals are pretty weak (even if you build a monstrosity antenna, the signal that is sending will be week and you will not get it unless you are in the same room). I have a problem connecting to me WIFI on the second floor (using a 400$ WIFI ROUTER and external 100$ WIFI antena), imagine how big the antenna on the phones and printer are..
@CodeAsm
@CodeAsm 6 років тому
Directional antenna, and your only "recieving" the signal... your extracting data. thats not the same as weak wifi, thats also on a very very busy frequency (probably why its so "weak" for you aswell) all the neighbours uses Wifi, bluetooth is on wifi, alott of IoT devices, and some of those wireless led controled lamps might not be on wifi or bt, they are often on 2.4Ghz (or 433Mhz, wich also can be full of noise). get an directional antenna, send data out multiple times with a small checksum and wait a few hours for the password to be send over... im sure at night it even gets better. at day you collect and at night you recieve it. github.com/fulldecent/system-bus-radio
@leweed3049
@leweed3049 Рік тому
So cool, btw is this openSource?
@sultanmehmoodghaznavi6312
@sultanmehmoodghaznavi6312 3 роки тому
"Cheap radio is called Tom Cruise..." LoL I'm switching to analog phone after watching this.
@archygrey9093
@archygrey9093 3 роки тому
Analogue is not very secure at all
@SportsIncorporated
@SportsIncorporated 4 роки тому
Your best defense - is to not have anything worth stealing.
@gonzalo4658
@gonzalo4658 4 роки тому
hold on there cowboy
@buzifalus
@buzifalus 4 роки тому
Western society is already superfluous
@Dex99SS
@Dex99SS 6 років тому
Funny how all of the "common office equipment" was "hacked by software only, never touching it"... Yet every one of them had their cases removed, wires hanging out, ribbon cables jumbled out the sides, alligator clips roughly plugged in supplying power, lol... None of this was done elegantly over a network via software. But instead, all of it is hypothetical via hardware mods, physically turning electronics into radios by adding RF transmitters to them... which is the large PCB hanging off of the ribbon and alligator clips. And if we are really pretending that we are sending RF out of circuitry which has no radio, no antenna, no tuner what so ever... and just glossing over the hardware issues there, pretending you can turn any resister, capacitor, and IC into a transmitter... Well, as a radio engineer who develops tower technologies / installs said tech, I can tell you that they would (if they could) transmit all of about a half an inch in distance... at best. Without dedicated amplifiers, tuned antennas, and a frequency capable of both distance and some level of penetration, it would be hopeless. And seeing as how most inexpensive two way radios, which are built for this task, can't even do all that well in a commercial building environment... i highly doubt your magic phone radio made out of software that looks like PCB's hanging off of ribbon cables out of the back of a busted open but never touched office phone is going to do much better. This entire piece is basically fluff...
@BigDaddy-yp4mi
@BigDaddy-yp4mi 5 років тому
You COMPLETELY missed what the fellow was talking about. It CAN and HAS been done for years...by NSA. Danger Douse was their program from over 10 years ago. He piggybacks on that. No microphone, no speaker, fuck with the currents going through them, they then emit radio energy in predefined contexts which can be picked up with SDR equipment and then decoded. The disassembled parts were for testing purposes. The stuff attached was to show there REALLY is stuff going on but to prove it, it has to be disassembled. Jesus, and to think people like you probably vote....
@jonesbbq307
@jonesbbq307 5 років тому
Then tell me how can a printer without any antenna emit any radio frequencies?
@jedi.knight7260
@jedi.knight7260 5 років тому
Colson Xu install malware on device which can be done remotely (that’s why a resume was sent to force someone to open and send the malware to printer) afterwards the wires and components of the device can be turned into radio transmitters. That’s why it’s called hacking, to change its original purpose into something that it wasn’t intended to do. The device is then FORCED to emit radio signals to a radio receiver using software instead of hardware and an AM antenna. A transmitter is a different kind of antenna that does the opposite job to a receiver since it turns electrical signals into radio waves that can travel thousands of kilometers around the earth. Hacking might not be your thing if your unable to search for knowledge since that’s what hackers do, they critically think and search for answers, rather then demand them.
@travismailsa1
@travismailsa1 5 років тому
Please use google when you ask such stupid questions. Do you know any current passing over a conductor produces EMF? Start there and use google
@travismailsa1
@travismailsa1 5 років тому
Its demonstration in this video, secondly the devices were taken apart to discover and then test these exploits, whereby they can then access them remotely and exploit what was DEMONSTRATED in this video.
@thedarkside13
@thedarkside13 4 роки тому
0:55 My boy eating Noodles and Sriracha!...
@xorxpert
@xorxpert 6 років тому
I wonder why signals aren’t encrypted? I guess it could cause latency but signals in which you can easily just read its binary and convert is crazy, and that it’s just a string and not wrapped inside of packets
@chopstickftw0121
@chopstickftw0121 5 років тому
FEELS LIKE WATCH DOG 2!!!!!!
@Eremon1
@Eremon1 5 років тому
Don't piss that guy off!!
@mukhtarsalim
@mukhtarsalim 7 років тому
This is amazing and a great work
@AshleyVanSteenacker
@AshleyVanSteenacker 7 років тому
Well, moast of these things run some sort of linux and most devices just pass UI commands trough as root. Although this might not work on all devices. since some of them have a full on metal enclosure to reduce EMI. But then again. There is already a Botnet of IOT so I'm not surprised of anything anymore.
@sudheer7595
@sudheer7595 4 роки тому
Who came here at 2k19
@razzya2710
@razzya2710 3 роки тому
2019 wasn’t that bad
@Stottage
@Stottage 7 років тому
This is amazing. Shame she has no idea what's going on
@ambassadorofpain1
@ambassadorofpain1 7 років тому
I'd say she actually did very well, it's difficult to explain technical concepts to people that aren't aware. She caught on quite quickly and understood the application value.
@mrmagoo9901
@mrmagoo9901 7 років тому
I don't think it's important that she understands the details...What's more important is that you understand
@tesseract342
@tesseract342 5 років тому
whats the point of having her if she does not contribute
@apnearocker
@apnearocker 4 роки тому
How did it start with the resume?
@MrMongo321
@MrMongo321 7 років тому
Brilliant!
@ferna2294
@ferna2294 5 років тому
That´s why I don´t let incels inside my office.
@slovokia
@slovokia 7 років тому
It's so easy to snow non technical people with wizbang demonstrations. But how well does the tech actually work in the real world under realistic conditions?
@monsterpda
@monsterpda 7 років тому
Well, they used normal, real phones and printers in what seems to be a reasonable network to do the job. I don't think they'd invest that much money on something entirely hypothetical. I'm by no means an IT expert, but at least the physics of it are simple and sound.
@DriftJunkie
@DriftJunkie 7 років тому
It's easy to tinker with data that is transfered through devices. Just put a magnet to it. But rewriting software with radio waves is something that even I wouldn't think of seeing even in Action movies. From my electronic education, such things are not possible.
@monsterpda
@monsterpda 7 років тому
***** Nobody said anything about "rewriting software with radio waves". Aside from the fact that you transmit pretty much anything with radio waves, albeit relatively slowly, they said they used a PDF-Document to corrupt then printer and then use the network of this fictional office to change the firmware of the phones. Sounds legit to me, but then again, I'm not a pro. The radio waves were just used to transmit the gathered data to an outside receiver.
@neandercatz8877
@neandercatz8877 7 років тому
Peter Spalthoff Right and that the pdf changed the firmware but I don't think that these things are in anyway feasible
@spydergs07
@spydergs07 7 років тому
The PDF sent to a computer on a network, the same network that the printers are on is what changed the firmware in the printer. Since the PC and printer are on the same network, that is not only 100% achievable but not that hard. You can easily embed whatever code you want into a jpg/png, pdf, word, excel, etc. The printer then communicates with the phones on the network and gets the magnets to pick up sound vibrations and can transfer those. This is actually achievable even in real world applications. Not easy but achievable.
@coachmichaeldeer
@coachmichaeldeer 4 роки тому
Do you have service in NY? Sounds cool!
@maxwellkuagbenu4647
@maxwellkuagbenu4647 4 роки тому
I'm love what you do. Please when do you started this.
@NegyoTV
@NegyoTV 7 років тому
Mr Robot is real?
@SlashZooka
@SlashZooka 7 років тому
ofcourse.
@avoqado89
@avoqado89 7 років тому
As is watch dogs!
@avoqado89
@avoqado89 7 років тому
***** I think I need to make a sacrifice to please the Blackhat gods to not spite me
@Ownage4lif31
@Ownage4lif31 7 років тому
+avoqado89 fuck blackhat. Grey or white hat is where it's at. Stealing is wrong
@rootsec8266
@rootsec8266 7 років тому
It's more fun than you think. ;)
@alkeryn1700
@alkeryn1700 5 років тому
0:55 ls ls ls ls oh yeah i'm working l33t h4x0r
@HashimAziz1
@HashimAziz1 3 роки тому
Hahahaha
@screwthenet
@screwthenet 5 років тому
All this has been foretold. And this is the type of crap that makes low tech or no tech so much more desirable.
@ramsesrameez5430
@ramsesrameez5430 3 роки тому
Now that's is what i am talking about. Hacking with a tiny mother board.
@austin7530
@austin7530 6 років тому
Cool shirt bro
@Crazy--Clown
@Crazy--Clown 6 років тому
Ya'll Finished Or Ya'll Done? *The shirt is gay*
@svp3rn0v47
@svp3rn0v47 3 роки тому
The scary thing is that one hacker can "knock-out" a whole country.
@sultanmehmoodghaznavi6312
@sultanmehmoodghaznavi6312 3 роки тому
I had this idea all the time but didn't knew it was possible.
@davidmyg7825
@davidmyg7825 5 років тому
i'm suspecting my neighbor is running some kind of illegal business famously known as "macau scamming" or "money game". everyday i saw more new recruit coming to his house every morning and never leave the door. they rarely come out and always hiding in house and everyday call for delivery. do you have any tech advice or solution?
@RobinToTheBatCave
@RobinToTheBatCave 7 років тому
the cia invest in this kind of stuff :| and you know who's buddies with the cia? the ceo of niantic (pokemon go). kinda creepy that pokemon go could be used as a trojan horse to plant software on everyone's iphones and android devices. pretty scary if you think about it, and might be a move to bypass apple's encryption (remember the whole fbi lawsuit?). if you have nothing to hide, then you should have nothing to worry about (that will be their argument if this is the case), but is completely losing all of your privacy really worth national security? murders and shootings are a product of society, and if the government doesn't recognise that and take action it is their fault, but people shouldn't have to give up their privacy because a government is lazy.
@KCFindsDesign
@KCFindsDesign 5 років тому
RobinToTheBatCave agreed
@kyleskwarek3893
@kyleskwarek3893 5 років тому
Well said
@mmm053
@mmm053 4 роки тому
If Michael Jackson was a Chinese woman, he'd look like this guy.
@adrianoldchannel2494
@adrianoldchannel2494 5 років тому
Beautiful.
@zachsylvester309
@zachsylvester309 4 роки тому
Speakers can be microphones. *Takes out buzzer from the motherboard.
@STRAIGHTBOXMUSIC
@STRAIGHTBOXMUSIC 6 років тому
These guys are just doing hobbyist shit. Real world scenarios don't allow for you to experiment with cisco phones and open up printers in an office and encode bits to send through the air. Just place a bug in a wall socket or use a glass audio tap and transmit back to yourself. Stop making things 1980 by reinventing the wheel with old tech.
@DoesNotGiveAF
@DoesNotGiveAF 5 років тому
@mike benjamin Lol spoken exactly like someone who doesn't know shit and worse lacks respect for what he doesn't understand or for the people clearly smarter than him but feels the need to spread their some how justified and totally irrelevant ignorance with (such clever) "answers" that of course have NOTHING TO DO WITH THE MENTIONED APPROACH hence NO PHYSICAL ACCESS! Did you even listen to what he said they do? Because that IS EXACTLY how vulnerabilities are found and exploits developed in hardware and software alike, usually in combination of the two with IOT products.. In order to manipulate something to do what you want, you first have to understand how it works. How do you propose said "real world scenarios" work? They just think about proprietary hardware/software and with a wave of their 1337 wand magically h4x0rZ happens? Lmfao! Reverse engineering is literally a field of it's own and is usually a large part of hacking in many including the given context. Worst of all your comment of "hobbyist shit" is complete stupidity and nonsense.. THATS WHERE HACKERS AND HACKING CAME AND COME FROM DIP SHIT. Learn something before you go around talking shit because you look like a fuckin' twat to anyone with any knowledge of penetration testing and/or hacking, what it is, and what its about. Have a nice day!
@jimsinnovations2737
@jimsinnovations2737 4 роки тому
wow id love to meet these guys an collaborate on projects
@felixxdenolo6793
@felixxdenolo6793 4 роки тому
Next how hackers can steal your lunch from the break room cuz it definitely was not Ron
@FustFPV
@FustFPV 5 років тому
Thank god they were using a racing drone and not a dji drone. Im likely wrong but was that a vortex 180 racing rone they were working on with a matek power distribution board?
@loisnana5720
@loisnana5720 5 років тому
for softwares,unlocking,hacking,website hacking dm @WhatsApp +1(323)6214182
@perkinskurt6147
@perkinskurt6147 5 років тому
I promised to shout Out this authentic hacker for the great job he did for me and his prices are affordalbe. contact @ alvinspy on Instagram for hacks and recovery, He is affordable and reliable. he helped me expose my cheating boyfriend. He’s also on whatsapp +18068280062
@bollymolly6011
@bollymolly6011 4 роки тому
Some how He's looks so happy about it
@-_IT_-
@-_IT_- 5 років тому
brilliant!
@thomaslindell5448
@thomaslindell5448 5 років тому
Yah that bit rate is awesome
@socrates_the_great6209
@socrates_the_great6209 4 роки тому
So its not the wifi antenna inside the printer sending the signal? It must be?
All The Ways To Hack Your Phone: Phreaked Out (Episode 3)
19:06
Motherboard
Переглядів 1,6 млн
6 Must-Have Security Gadgets That Fit in Your Pocket
9:03
All Things Secured
Переглядів 1,6 млн
ОДИН ДОМА #shorts
00:34
Паша Осадчий
Переглядів 4,9 млн
Signs Your PC Has Been Hacked
14:49
Britec09
Переглядів 66 тис.
I got hacked by an iPhone Cable.
10:07
Mrwhosetheboss
Переглядів 9 млн
I Designed My Own 16-bit CPU
15:46
AstroSam
Переглядів 1,8 млн
How to Hack a Car: Phreaked Out (Episode 2)
12:16
Motherboard
Переглядів 2,9 млн
Meet a 12-year-old hacker and cyber security expert
5:01
CBS Mornings
Переглядів 7 млн
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Переглядів 1 млн
Hacker's Guide to UART Root Shells
17:40
Flashback Team
Переглядів 450 тис.
How easy is it to capture data on public free Wi-Fi? - Gary explains
13:43
Android Authority
Переглядів 3,1 млн
Вы поможете украсть ваш iPhone
0:56
Romancev768
Переглядів 189 тис.
Creepy Samsung Alarm cannot be turned off 😱🤣 #shorts
0:14
Adani Family
Переглядів 1,2 млн
Хомяк может разблокировать АЙФОН
0:14
Собиратель новостей
Переглядів 853 тис.
APPLE УБИЛА ЕГО - iMac 27 5K
19:34
ЗЕ МАККЕРС
Переглядів 52 тис.