Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ก.ย. 2024
  • It's just crazy scary what these cables can do. They look like normal USB cables, but are not! In this video we login to Apple MacOS and Linux computers :)
    ======
    Scripts:
    ======
    Apple macOS Rickroll: davidbombal.wi...
    Linux Rickroll: davidbombal.wi...
    =======================
    Buy Hak5 coolness here:
    =======================
    Buy Hak5: davidbombal.wi...
    ================================
    Hacking Android and iOS devices:
    ================================
    OMG with Android and Apple iPad: • So you think your phon...
    =============
    Setup Videos:
    =============
    OMG Cable setup: • O.MG: From zero to hero Hak5
    Rubber Ducky setup: • How I did it (hak5 rub...
    ================
    Connect with me:
    ================
    Discord: / discord / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombalyoutube: / davidbombal
    keylogger
    keylogging
    key logger
    hak5 keylogger
    macos keylogger
    hak5
    omg cables
    omg cable
    apple
    apple macos
    linux
    ubuntu
    ubuntu hack
    linux hack
    rubber ducky
    hak5 rubber ducky
    hak5 omg cable
    omg cable android
    omg cable ios
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    #omgcable #hak5 #rubberducky
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 407

  • @davidbombal
    @davidbombal  3 ปีที่แล้ว +56

    It's just crazy scary what these cables can do. They look like normal USB cables, but are not! In this video we login to Apple MacOS and Linux computers :)
    ======
    Scripts:
    ======
    Apple macOS Rickroll: davidbombal.wiki/applerickroll
    Linux Rickroll: davidbombal.wiki/linuxrickroll
    =======================
    Buy Hak5 coolness here:
    =======================
    Buy Hak5: davidbombal.wiki/gethak5
    ================================
    Hacking Android and iOS devices:
    ================================
    OMG with Android and Apple iPad: th-cam.com/video/7YpJQT55_Y8/w-d-xo.html
    =============
    Setup Videos:
    =============
    OMG Cable setup: th-cam.com/video/V5mBJHotZv0H/w-d-xo.htmlak5
    Rubber Ducky setup: th-cam.com/video/A2JNBpUotZM/w-d-xo.html
    ================
    Connect with me:
    ================
    Discord: discord.com/invite/usKSyzbTwitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombalTH-cam: th-cam.com/users/davidbombal
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @swarnajeevan1345
      @swarnajeevan1345 3 ปีที่แล้ว

      i sorted that out

    • @Gglsucksbigballz
      @Gglsucksbigballz 3 ปีที่แล้ว +1

      Almost as “crazy scary” that the content creator thinks people will heed his advise.

    • @daymelrensoli8096
      @daymelrensoli8096 2 ปีที่แล้ว

      Please what laptop are using?????

    • @fukushima4670
      @fukushima4670 2 ปีที่แล้ว +1

      Where there are hosts... there will always be tapeworms and other assorted parasites. Some humans are just really evolved parasites.

    • @rogersepeda
      @rogersepeda 2 ปีที่แล้ว +1

      You couldn’t use that on a government computer, they’ll find out right away . You can’t plug in anything. Maybe a cac reader but even at that I’m not sure if that’s even allowed.

  • @lodewykblignaut7844
    @lodewykblignaut7844 3 ปีที่แล้ว +38

    It's scary how clueless I am about things like this. Thanks Mr Bombal for educating people about the danger of technology. This can help keep me and my family safe from dangers like this. 🙏😁

  • @JohnTurner313
    @JohnTurner313 2 ปีที่แล้ว +15

    3:30 This is not a problem with any OS, and using it against a Linux or Mac computer says nothing whatsoever about the OS capabilities. The cable is a hardware device that requires physical access to install. If a bad actor has physical access to your computer to install that cable, there are any number of ways to get past all operating systems. Physical access generally means game over.

    • @Fostravel
      @Fostravel 2 ปีที่แล้ว

      Exactly. Good potential review, flawed by misleading logic/clickbait?

    • @hardik.satasiya
      @hardik.satasiya 2 ปีที่แล้ว

      yes you are 100% right, if you have physical access anything is possible ... it's not OS-dependent, I can stand there and watch someone enter a password 😁

    • @freedustin
      @freedustin 2 ปีที่แล้ว

      @@hardik.satasiya yeah but you can't reverse shell thru your eyeballs now can you?

    • @hardik.satasiya
      @hardik.satasiya 2 ปีที่แล้ว

      @@freedustin neither anyone will plug suspicious wire and tell ok dude I plugged in now just fire reverse shell and browse my pc ... and how it's related to OS? 🤔 and may be I don't even need reverse shell, I can just type password and open regular shell if I need

    • @freedustin
      @freedustin 2 ปีที่แล้ว +1

      @@hardik.satasiya Well that's a lie. I see people jacking charge cables all the time and using them.
      It's not OS related, I didn't even mention OS at all, this even works on phones.
      Regular shell? So what? Can you exfiltrate data protected by an IDS with that? Nope.

  • @dorab.theitexplorer6462
    @dorab.theitexplorer6462 3 ปีที่แล้ว +14

    Oh you made me remember an incident! My friend in some governmental sector told me that they brought several new computers..they run some tests and they discovered that some PC cables have antennas in them to send data to the building cross the street. I think this is the same concept

    • @davidbombal
      @davidbombal  3 ปีที่แล้ว +4

      Similar kind of idea. Just scary that this looks just like a normal cable.

    • @michaelfabulous5574
      @michaelfabulous5574 ปีที่แล้ว

      Lol I know what your talking about! Lol too old right? Like James bond. Lol

  • @JSp3ct0r
    @JSp3ct0r 3 ปีที่แล้ว +18

    Yes please!! A video on how to get a reverse shell would be awesome!
    Also, this is extremely scary. Never leave your laptop/phone unattended in a public place.
    Amazing content as always!!

    • @davidbombal
      @davidbombal  3 ปีที่แล้ว +7

      Thank you! Will create that video 😀

    • @snipeminecrafter3001
      @snipeminecrafter3001 3 ปีที่แล้ว

      NetworkChuck made a video on that! Go check it out man! it's awesome!

  • @jaysongalicia8142
    @jaysongalicia8142 3 ปีที่แล้ว +6

    This is the most frustrating thing to happen, getting hack and Rick rolled at the same time. Thanks David for this kind of video, so people realize the danger of a random USB cable that they pick up somewhere.

  • @alexbik
    @alexbik 2 ปีที่แล้ว +42

    It's a neat cable, but let's get one thing straight: You are not 'attacking' MacOS, nor are you attacking Linux, you are attacking the hardware. Obviously, an operating system can never be more secure than the hardware it runs on.

    • @windmael47
      @windmael47 2 ปีที่แล้ว +1

      MFA is almost an industry standard within enterprise. Password never guarantees safety, apart from this USB something as simple as dictionary attack can break the login. So Apple could at least provide optional MFA for login to protect us from such threats. Great video anyway, thanks!

    • @z00h
      @z00h 2 ปีที่แล้ว +1

      @@windmael47 MFA is an industry standard to log on into laptops in enterprise applications? Which industry is it?

    • @edgay
      @edgay 2 ปีที่แล้ว +2

      @@z00h Utopia 😸

    • @z00h
      @z00h 2 ปีที่แล้ว

      @@edgay it clearly must be haha. @Jonni stop smoking dat krak boyyyy.

  • @klote82
    @klote82 3 ปีที่แล้ว +1

    This is the only technology based channel that I watch. How the hell do you stay on top of all this hacking stuff? Lol, I love it! Kali is really the best OS for hacking, cracking, sniffing!

  • @educastellini
    @educastellini 3 ปีที่แล้ว +2

    -Great content Professor David Bombal...!!!
    -So, these keylogger and reverse shell tools are getting easier to use every day.
    -About 10 years ago I programmed in devices such as cellular microcontrollers and nini laptops exactly this type of system (keyloggers and reverse shell) for my government operators, nowadays they sell these same tools on the internet that 15 year old boys can buy with his father's credit card on the Internet to take credentials of his colleagues of High school.
    -Times are really changing...!!!
    -Thanks for the knowledge Professor David...!!!

  • @eternialogic
    @eternialogic 2 ปีที่แล้ว +6

    A very good reason for a CEO to have his own bug sniffer crew that checks new hardware and old ones often.

    • @HighSpeedNoDrag
      @HighSpeedNoDrag 2 ปีที่แล้ว

      Nothing New for CEOs and other Corporate Entities to have "Stand By" Counter Crews on contract, on notice.

  • @fernandosantos3576
    @fernandosantos3576 3 ปีที่แล้ว +18

    Word of advice: do not "shove" an "innocent" pen drive or an "innocent" cable that you just found into any of your devices.
    Be also aware that an "innocent" charging point may be not as innocent as it seems...

    • @elham7459
      @elham7459 3 ปีที่แล้ว +2

      Don't let that innocent-looking pen drive or cable take your device's innocence.

    • @lhffan
      @lhffan 2 ปีที่แล้ว +1

      Same with all cables you find in computer store

    • @erlicthemad
      @erlicthemad 2 ปีที่แล้ว

      Why you use a usb condom if you need a charge from an untrusted port.

  • @mrse7en196
    @mrse7en196 3 ปีที่แล้ว +17

    David to Everyone who wants to learn Networking:
    Never gonna give you up!!
    Never gonna let you down!!!

  • @szabi0112
    @szabi0112 3 ปีที่แล้ว +1

    OMG!
    I am really scared!
    Awesome video David as always.
    Please carry on!
    Thank you so much for the demonstration.

  • @zadkieladdae8145
    @zadkieladdae8145 3 ปีที่แล้ว +3

    David, do a tour video on your home office setup.
    Thanks your for your endless effort.

  • @PicyPoe
    @PicyPoe 2 ปีที่แล้ว

    0:01 I am pretty sure we all just got trolled by David! It is not about the cable, but the MONITOR!!!! Looks at that MONSTER!

  • @farazhassan6417
    @farazhassan6417 2 ปีที่แล้ว

    This is because you plugged the OMG cable, Hacking or Keylogging for many is only a danger when it is done remotely, by having access phisically and putting a device which records and replay would be last thing for me . . . because nobody has so much access to my device. Sure great work and information. Cheers!

  • @Bob-of-Zoid
    @Bob-of-Zoid 2 ปีที่แล้ว +2

    Well, a hacker would have to have physical access to the device, or get you to use their cable: Being a Linux user, I never heard anyone saying that Linux can prevent all attacks from anyone with physical access to the device, but I have seen plenty of times people reporting on vulnerabilities in Linux as a "Big Problem" and leaving out the part that it can only happen with physical access! Linux can also be penetrated otherwise, but for the most part only if the user does not use good security practices. With Windows even that's not enough: It's not like you can keep Microsoft out!

    • @ChrisHillASMR
      @ChrisHillASMR 2 ปีที่แล้ว

      linux is only as good as ur ssh password/key. if u can man in the middle ur toast.

  • @Will-kt5jk
    @Will-kt5jk 3 ปีที่แล้ว

    For some reason, the explaining the same technique, finishing with the tagline "as you can see, I've been able to Rickroll you" reminded me of Patrick Stewart on Extras, explaining various plots to Ricky Gervais' character, ending with the tagline:
    "then all of their clothes fall off" followed by "but it's too late... ...I've seen everything"

  • @LouisSerieusement
    @LouisSerieusement 3 ปีที่แล้ว +10

    a friend of mine use to build fake usb key like that few years ago but having it so small that it fits into clables is frightening !
    I would love to see the circuitboard of this ! (Edit: I found pictures of the inside !)
    Thanks a lot :)

  • @PS_Tube
    @PS_Tube ปีที่แล้ว

    That's scary stuff !
    Imagine setting up these multiple cables at free charging points...
    Hundreds or thousands of devices can get accessed by malicious parties.

  • @MangolikRoy
    @MangolikRoy 3 ปีที่แล้ว +3

    Now I have to pay really serious attention bcz on of my friend buy some stuffs from hak5 and this cable too while watching your video
    Help me GOD!! 😅

  • @edwinaag
    @edwinaag 3 ปีที่แล้ว +3

    Shud be a way to detect which cable is an OMG cable or a regular one. Just in case you put 2 cables together.

  • @grosgogogogt
    @grosgogogogt 2 ปีที่แล้ว +1

    the miniaturization to be able to put it in a cable is incredible

  • @erlicthemad
    @erlicthemad 2 ปีที่แล้ว

    Interesting, I heard of this vulnerability. First time seen a demo of it in action. A good reason to know your cables, and always run with minimal access.

  • @MrMeek79
    @MrMeek79 2 ปีที่แล้ว

    a very unique and new way to rick roll people. This is crazy that you can have keyloggers in a cable

  • @RTechTips
    @RTechTips 3 ปีที่แล้ว

    These are just some examples, I am totally agreed with you. Even anything connected or download can hack your system. That's so easy only way to avoid it do not connect with untrusted or let it be happen . I am using reverse shell but for monitoring purposes but that is also a very easy task. Avoid anything which is not your or just ignore it. Everything is secured when you have it otherwise forget security

  • @Jimbo898
    @Jimbo898 3 ปีที่แล้ว +1

    Can you imagine passing these things out at tech conferences as part of a swag bag? I would think they would be able to install a tunnel feature that could run a payload after the first login, to compromise password integrity, open ports and services create a VPN to tunnel out to a, drop server to collect all the goodies.

    • @davidbombal
      @davidbombal  3 ปีที่แล้ว +1

      Hak5 did just that and spoke about it in this video: th-cam.com/video/CpmCoX6kn38/w-d-xo.html

  • @SapphireKR
    @SapphireKR 3 ปีที่แล้ว +1

    Hey David loved the video! Can you please make a video on how to counter & protect outself from this type of stuff?

  • @hussaini24
    @hussaini24 3 ปีที่แล้ว +1

    Will love to see the reverse shell video sir. Thanks for the videos, we really are learning from them.

  • @natureiscrazy
    @natureiscrazy 3 ปีที่แล้ว +7

    Only attack my own devices for learning purposes ♥️ going to try get one for my Birthday 🎉

    • @davidbombal
      @davidbombal  3 ปีที่แล้ว +1

      It's a great product!

    • @MultiAlbon
      @MultiAlbon 2 ปีที่แล้ว

      ​@@davidbombal lol, at first normally attack own devices, to learn and be faster when like to attack someone else. :D
      That login for linux, password was taken and put inside the script before.
      Even that cable can open everything,
      for combination (numbers,letters&caracters) need more time!
      If someone go to the prison because of this way, you are that person who teach "victims" to make another victims!
      Who like to go in prison..? It is very simple!
      1 go near to station of police..
      2 take a stone..
      3 shoot one glass door or window in that buildin.
      4 Done! Just wait little, someone will come and tell you the place :D
      Keyloger, exist from very very long time, i know from 2002.
      There was a program (free download) + pay for full.
      It works hidden and send to the email info; small screen position of mouse click, keyboard, links you visitet and much more...
      In my idea, a professional keyloger needed for...
      Relationship or parents who give devices to kids under 18!
      That makes better life to understand more your kids and partner.
      You already have started to teach or show unique thinks, but try to teach for better ideas and pushing them to a dangerous game.
      Some childrens understand fast and is like a game for them to do this things...
      Thanks and sorry for JUDGING YOU.

    • @z08840
      @z08840 2 ปีที่แล้ว

      @@MultiAlbon "That makes better life to understand more your kids and partner." - ahahahah, oh my gosh, this is hilarious :D

    • @MultiAlbon
      @MultiAlbon 2 ปีที่แล้ว

      @@z08840 lol, that is funy for you? Good to know youre kid!

    • @z08840
      @z08840 2 ปีที่แล้ว

      @@MultiAlbon lol, you know I'm a kid? Good to know you are an imВeсilе!
      :D

  • @lawabidingcitizen5032
    @lawabidingcitizen5032 3 ปีที่แล้ว +2

    Does it capture password if it's an auto fill from password manager?

  • @LordLarryWho
    @LordLarryWho 2 ปีที่แล้ว +1

    Reverse shells are just as possible on Mac OS, you just have to escape the colons in the script

  • @0day__
    @0day__ 3 ปีที่แล้ว +4

    You are the best David

  • @tulasideviful
    @tulasideviful 3 ปีที่แล้ว +2

    This was fascinating, thanks, David. I'm in love with that curved long screen. Where can I buy one? 😊💻

    • @coomservative
      @coomservative 2 ปีที่แล้ว

      they are not practical, look up 4k curved screen regret

  • @tigreonice2339
    @tigreonice2339 ปีที่แล้ว +1

    Rewatching this video 1 year later I think if you buy a mechanical keyboard it could have a keylogger hardware software inside. Maybe its too much crazy ....but are weird times 😮

  • @Esscarra
    @Esscarra 3 ปีที่แล้ว

    Yes! More omg content! A video on reverse shell would be very welcomed!

  • @Aaron48219
    @Aaron48219 ปีที่แล้ว

    Being an IT admin, I'm going to buy 20 of these and replace all the employees USB cables at their desks just to Rick roll everybody at once.

  • @mukut5ul
    @mukut5ul 2 ปีที่แล้ว

    Amazing, now I know why u need to be careful while downloading any file or copying from usb

  • @abdulbasit-jj8qf
    @abdulbasit-jj8qf 3 ปีที่แล้ว

    CRAZY!!!! Love all your contents DAVID.... please make a video on how to get a persistent reverse shell...

  • @angulion
    @angulion 2 ปีที่แล้ว +1

    This really has nothing to do with security of the OS. Remove physical access and we see then.
    Edit, the logger/typer being embedded into the cable is interesting though.

  • @idhantsood1105
    @idhantsood1105 3 ปีที่แล้ว +7

    People usually think that Mac and Linux are virus-free but they can also be hacked as excellently demonstrated in the video! Keep up the great job.

    • @tonyman1106
      @tonyman1106 3 ปีที่แล้ว

      If it connected to a network it can be hacked

    • @chiroyce
      @chiroyce 3 ปีที่แล้ว

      Anything is hackable - it's just that Windows is the easiest to hack.

    • @themedleb
      @themedleb 2 ปีที่แล้ว +1

      Well, anything is hackable, but this is not a virus.

    • @mrniceguy6050
      @mrniceguy6050 2 ปีที่แล้ว +2

      By the looks of it this is a hardware hack which has nothing to do with the virus sensitivity of the OS.

    • @chiroyce
      @chiroyce 2 ปีที่แล้ว

      @@mrniceguy6050 Yep. Dangerous, but not the OS's fault.

  • @elmi108
    @elmi108 3 ปีที่แล้ว

    Best advice from David Bombal "Learn how to hack but do not go to jail".

  • @stevejohnson1321
    @stevejohnson1321 2 ปีที่แล้ว

    If you have access to the machine, many Ubuntu etc. can be accessed as root through the repair console. I won't describe it here, but easy enough to find out. Ubuntu is as secure as you want to make it, which may mean disabling this under grub.

  • @Netsh3ll
    @Netsh3ll 3 ปีที่แล้ว +2

    You changed my life sir

  • @seltzerr
    @seltzerr 2 ปีที่แล้ว

    imagine someone playing a rhythm game and all they just see is just random keys

  • @kakau5758
    @kakau5758 3 ปีที่แล้ว +1

    Please do a video on reverse shell attack. That's so awesome!!

  • @manaspant1929
    @manaspant1929 3 ปีที่แล้ว +1

    Even a simple cable can create disaster for you 😨😨
    mindblowing demo

  • @shreeshaaithal-
    @shreeshaaithal- 3 ปีที่แล้ว +1

    Yes David bombol again with the beast videos

  • @karanb2067
    @karanb2067 3 ปีที่แล้ว

    Amazing vid! I would love a msfconsole and msfvenom tutorial coming from you.

  • @yutubl
    @yutubl 2 ปีที่แล้ว

    Sometimes my browser on my Windows 10 HP Notebook/Laptop PC behaves as being remote controlled, just as you showed: automatic behaviour - not initiated by PCs local keyboard or mouse. This happened only connected via WiFi WLAN (Telekom speedport) shared with my neighbour, sometimes wired connected to USB keyboard and USB mouse (Trust brand).

  • @mundoin5583
    @mundoin5583 3 ปีที่แล้ว +2

    Ah Jokes on the O.MG i never connect my phone via cable to my PC work or the leisure one :D this looks like a fun gadget though.

    • @KalaniMakutu
      @KalaniMakutu 3 ปีที่แล้ว +1

      I have a keyboard connected to my Laptop’s docking station though. It’d never cross my mind if someone swapped out or even added a cable behind my monitor.

  • @SystemDemon
    @SystemDemon 3 ปีที่แล้ว +1

    Show me the reverse shell David :D.
    One problem though I don't have the financial state to buy this. But I would love to see it

  • @Gr33n37
    @Gr33n37 3 ปีที่แล้ว

    How you doing Mr.bombal, am from Uganda(Africa) am interested in the separate video on how to create a strong reverse shell to a computer even when its shutdown I can still have access. Thanks

  • @BobSmith-kd6lq
    @BobSmith-kd6lq 3 ปีที่แล้ว

    Holy begeebus! How can this be allowed? Huge props for telling us about it

  • @LadyDie-p2v
    @LadyDie-p2v ปีที่แล้ว

    tried using the usb-c to lightning omg cable on my iPhone 12, tried the key logger and payload-nothing happened. I have an older iPad that still uses lightning and tried the key logger and payload and again nothing happened either. I connected the usb-c to my windows computer, I was able to send a payload, but key logger did not work. not sure what I'm doing wrong

  • @johneandre9206
    @johneandre9206 3 ปีที่แล้ว

    Excellent video!!! I'll see the reverse shell video too..

  • @RyanHarris-sh9vf
    @RyanHarris-sh9vf 6 หลายเดือนก่อน

    Very useful information if I didn’t already know bout tha cord

  • @Megaheropap
    @Megaheropap 3 ปีที่แล้ว +1

    Thanks for finally doing a Mac video! How can we fully remove the keylogger and prevent it?

    • @patrickdee7365
      @patrickdee7365 3 ปีที่แล้ว

      Deny all usb access and permit every single time

    • @strandvaskeren
      @strandvaskeren 2 ปีที่แล้ว

      Any usb device can claim to be a keyboard and and a usb keyboard works right after power on, way before any OS is loaded, you can use a usb keyboard to get into bios at boot and so on. Only way to prevent it is by filling your computers usb slots with hot glue, making sure no one can ever fit a usb device to the computer.
      However 2-factor authentication can make the keylogging rather useless - sure the hacker keylogged your username, password and the confirmation code texted to your smartphone, but next time the hacker tries to use your username and password, he/she will have a really hard time getting hold of the new confirmation code received by your smartphone, the old confimation code doesn't work anymore.

  • @Linux1972
    @Linux1972 3 ปีที่แล้ว +1

    So, we have to have to have the user connected by the OMG cable and we can capture the keystrokes wirelessly via the app on our phone. What if the user has a wireless keyboard? Wouldn't it be a little ominous if suddenly a cable was running from it?

    • @z08840
      @z08840 2 ปีที่แล้ว

      ominous and useless - wireless devices only use cables for charging :)

  • @kishorkumarpaul5159
    @kishorkumarpaul5159 3 ปีที่แล้ว

    Hello sir,
    Thanks to you first. Your work is really great.
    Now come to the main topic. From your giveaways i had got Ethical hacking for beginners course and completed that some days ago. Now I'm continue with network+. But I thought that I need to know more about security. That's why I want a security+ course so that I can increase my knowledge about that.

  • @Pianeta0scuro
    @Pianeta0scuro 3 ปีที่แล้ว +1

    Realy scary how people belive in the "safe" technology! Great video as always.

    • @CrypticConsole
      @CrypticConsole 2 ปีที่แล้ว

      Linux is much safer, if configured securely. You cannot do file system sandboxing on windows so you always run the risk of session token stealers, unlike Linux.

    • @CrypticConsole
      @CrypticConsole 2 ปีที่แล้ว

      Linux is much safer, if configured securely. You cannot do file system sandboxing on windows so you always run the risk of session token stealers, unlike Linux.

    • @CrypticConsole
      @CrypticConsole 2 ปีที่แล้ว

      Linux is much safer, if configured securely. You cannot do file system sandboxing on windows so you always run the risk of session token stealers, unlike Linux.

    • @CrypticConsole
      @CrypticConsole 2 ปีที่แล้ว

      Linux is much safer, if configured securely. You cannot do file system sandboxing on windows so you always run the risk of session token stealers, unlike Linux.

    • @CrypticConsole
      @CrypticConsole 2 ปีที่แล้ว

      Linux is much safer, if configured securely. You cannot do file system sandboxing on windows so you always run the risk of session token stealers, unlike Linux.

  •  2 ปีที่แล้ว

    And so some people cry that Apple does not allow other cables, others displays - as you can see there is something wrong, and as you can see, there is no solution. In fact, the cable emulates the keyboard back and forth + some WiFi - LTE would be better

  • @abdulmuiz2000
    @abdulmuiz2000 3 ปีที่แล้ว

    This cable is crazy thank you sir for the eye opening info

  • @daemdae2097
    @daemdae2097 2 ปีที่แล้ว

    Hey, David Thank you so much for your videos. I got a question for the omg cable, if the target unplugged the omg cable will it be exploitable, or will it be disconnected?

  • @lauradove1240
    @lauradove1240 ปีที่แล้ว

    Complete tech troglodyte here...
    If I turn off my internet access whenever I'm not using the computer/cell, will this help keep me safe?
    Thanks for all you're sharing. Though I don't understand much, I'm learning.

  • @WillGilpin
    @WillGilpin 2 ปีที่แล้ว

    This is why some secure orgs I've worked at superglue the cables in. Cost is higher if there's a fault, but sometimes it's worth it

  • @andredavis3350
    @andredavis3350 3 ปีที่แล้ว

    you get more widescreen monitor upgrades than I've ever seen! What happened to the LG 34WK95U-W and the Apple display XDR?

  • @Jimbo898
    @Jimbo898 3 ปีที่แล้ว

    David try it with a software overlay keyboard and see if that captures it. How about biometric login? How about a reverse payload to your device?

  • @LudmilMetodiev
    @LudmilMetodiev 2 ปีที่แล้ว

    Since this is layer 1 attack I cant find reason why it should NOT work on any OS and even device. This cable is dope tho , since it does not require major interruption of the victim .

  • @user-yw4cf3yd2w
    @user-yw4cf3yd2w 2 ปีที่แล้ว

    The fact that the communication between keyboard and computer is not encrypted is hardly surprising.
    How would you perform this attack if it was encrypted?

  • @fliporflop7119
    @fliporflop7119 2 ปีที่แล้ว

    This woudn't work with Abylon Logon on windows because it uses hardware key (Chip card, RFID token, USB stick or CD DVD)..also uses 2FA.

  • @Pafkatax
    @Pafkatax ปีที่แล้ว

    2:34 :DDDDavid has some meme culture.

  • @v300
    @v300 2 ปีที่แล้ว

    In Linux, you can choose what VendorID and what DeviceID can be plugged in. On my workstation at work, I have allowed existing devices to be plugged in and everything else is denied. Once in a while when I get a new device or a thumb drive I edit this file.I also get a message in the logs that a device failed to be recognized.

  • @rhondaverma6358
    @rhondaverma6358 3 ปีที่แล้ว

    I swear, I wish I knew where to begin learning this stuff I get overwhelmed with all the information on the internet.

  • @gamingandtech5151
    @gamingandtech5151 3 ปีที่แล้ว +3

    Everyone is first until they refresh the comments 😂😂

  • @mrphraner
    @mrphraner 2 ปีที่แล้ว

    this video in itself deserves a subscription

  • @supersilverhazeroker
    @supersilverhazeroker 2 ปีที่แล้ว

    how does this work though.. surely the cable must start up some kind of script/program on the pc so should it show up in taskmanager or htop or something?
    how can you see wether a cable is a undercover keylogger?

  • @markolafploeg3265
    @markolafploeg3265 2 ปีที่แล้ว

    Wauw...shows the importants of MFA solutions...

  • @Tomtomx2
    @Tomtomx2 3 ปีที่แล้ว

    It would be awesome to see a reverse shell on Mac and Windows!

  • @ZhivkoLefterov101
    @ZhivkoLefterov101 2 ปีที่แล้ว

    Hello David, THanks for the great video!
    you should try this but when there is JumpCloud client installed on the Mac/Linux/Windows.
    will it work again?
    Is the user which you scan a local one or its a cloud account like JumpCloud account?
    thanks

  • @luisfernandomendozacanchar2777
    @luisfernandomendozacanchar2777 ปีที่แล้ว +1

    We can have meetings online.

  • @ypitchireddy2008
    @ypitchireddy2008 3 ปีที่แล้ว +1

    Sir can u tell me that how to enter into a server and inject a bug and hack the servers cloud and get data base please tell me 😭😭😭

  • @luctiber
    @luctiber 2 ปีที่แล้ว

    Hi David, amazing video… 2 question: how to identify an omg cable from regular ones (what if friends provide you a cable) and how to identify something is fishy on my laptop? Thanks

  • @dashcamdiariessa
    @dashcamdiariessa 3 ปีที่แล้ว

    Nice new monitor Mr Bombal

  • @BlackBeardOutdoors
    @BlackBeardOutdoors 3 ปีที่แล้ว

    Would love to see the reverse shell

  • @geokaisa
    @geokaisa 2 ปีที่แล้ว

    just 4 seconds in to the vid.... "does this look normal to you?" um, yeah this guy, has a curved TV as a monitor... meanwhile, i move around with a 15inch laptop. i think 22' is the one one my desk..... ahaha. otherwise, by content, this is excellent!

  • @shivangiroy1859
    @shivangiroy1859 3 ปีที่แล้ว

    please do a reverse shell tutorial video I just stumble here to watch this video but it is literally eye-opening it's just look like a normal USB cable who would have thought that a normal-looking cable do so many things

  • @fatwallet13
    @fatwallet13 2 ปีที่แล้ว

    So this relies on a person having direct physical contact with the machine they wish to hack.

  • @KapilDevMishra
    @KapilDevMishra 2 ปีที่แล้ว

    how does it communicate with phone over WiFi/Bt/CellData?

  • @paulbrady8614
    @paulbrady8614 2 ปีที่แล้ว

    what will they think of next no one is safe /be on your toes protect you life

  • @justinharmer4061
    @justinharmer4061 2 ปีที่แล้ว

    So does it only capture key strokes while it’s plugged in, or does it actually install a keylogger on a target device?

  • @gauravkavat
    @gauravkavat 3 ปีที่แล้ว +2

    This was an awesome video but now I am afraid 😅 if this can happen to me....... Sir can you please make a video on how to be safe from it.

    • @davidbombal
      @davidbombal  3 ปีที่แล้ว +2

      Be very afraid :) I'll demonstrate the protection from this in another video.

    • @keithschrack
      @keithschrack 3 ปีที่แล้ว +1

      First and foremost, mark your own cables so they can't be swapped out for one of these. The OMG is practically indistinguishable from a stock cable...so, make stock cables 'distinguishable.'

    • @KalaniMakutu
      @KalaniMakutu 3 ปีที่แล้ว +1

      @@keithschrack As long as someone didn’t take a picture of your desk beforehand… There is always an attack vector. Just realize that these sorts of attacks are generally personal, time consuming, and expensive ($180). You aren’t likely to be targeted by accident from something sent you on Amazon.

    • @keithschrack
      @keithschrack 3 ปีที่แล้ว +1

      @@KalaniMakutu I can't disagree. It's hard to stop a truly determined attacker--if you can access your data, so can someone else. The best you can hope for is to make things as difficult as you can. Get creative!

  • @MrSpalovac
    @MrSpalovac 2 ปีที่แล้ว

    So if I order a cheap cabel from the internet, it can be this keylogger? Is there any way how to tell the difference? One more thing - if then I use the cable in my car, can they hack the car?

  • @Raj.Sakaria
    @Raj.Sakaria 4 หลายเดือนก่อน

    How come other creators say it won’t work on a locked device, but you clearly show here that it can

  • @UsagiFlapmaster_Arisu
    @UsagiFlapmaster_Arisu 16 วันที่ผ่านมา

    Nice so I can't forget my passcode and what I type yesterday

  • @janhumpolicek8373
    @janhumpolicek8373 2 ปีที่แล้ว +1

    If somebody bought this just for the keylogger function, than he is nuts.

  • @SystemDemon
    @SystemDemon 3 ปีที่แล้ว

    Omg I want that cable. If I'm not in student dept I'll buy it for sure

  • @Fenrasulfr
    @Fenrasulfr 2 ปีที่แล้ว

    This might be a dumb question but would it not be possible to encrypt keystrokes?

  • @maxbunnies
    @maxbunnies 3 ปีที่แล้ว

    Reverse shell? Yes please :)

  • @mr.nuna916
    @mr.nuna916 ปีที่แล้ว

    David, if I use this on an iphone, can I capture that 4 digit password used to access the device? I only ask because it will obviously be the very 1st buttons pressed so Im not sure if that counts as "typing". I realize that everything typed AFTER the pass code has been entered will be captured, but will the code itself? (Any one who actually knows feel free to educate me) 😅