"Hack ANY Cell Phone" - Hacker Shows How Easy It Is To Hack Your Cell Phone
ฝัง
- เผยแพร่เมื่อ 12 ก.ย. 2024
- Ryan Montgomery demonstrates various hacking tools disguised as ordinary items, like chargers and HDMI adapters, that can be used for ethical penetration testing or unethical activities, such as stealing sensitive information.
----
Ⓜ️ Minnect with Ryan Montgomery: bit.ly/3yGAt9D
📺 Subscribe to Ryan Montgomery's TH-cam Channel: bit.ly/4731jFt
🎟️ Join the Minnect League Championships for your chance to meet Dwayne "The Rock" Johnson at The Vault 2024: bit.ly/4aMAar8
🇺🇸 Purchase the VT Team USA Gear! Available now at VTMerch.com: bit.ly/4cwKbJp
🏦 Purchase tickets to The Vault Conference 2024 featuring Patrick Bet-David, Dwayne "The Rock" Johnson, Nick Saban & more: bit.ly/3WQYZN7
📱Connect one-on-one with the right expert for you on Minnect: bit.ly/3T0AX15
📕 Purchase PBD's Book "Choose Your Enemies Wisely": bit.ly/3ST1rS8
👔 Get best-in-class business advice with Bet-David Consulting: bit.ly/3X8s7kq
📰 Visit VT.com for the latest news and insights from the world of politics, business and entertainment: bit.ly/4duVS4u
🎓 Visit Valuetainment University for the best courses online for entrepreneurs: bit.ly/4dpzyJE
💬 Text “PODCAST” to 310-340-1132 to get the latest updates in real-time!
SUBSCRIBE TO:
@VALUETAINMENT
@vtsoscast
@ValuetainmentComedy
@bizdocpodcast
@theunusualsuspectspodcast
📺 Join the channel to get exclusive access to perks: bit.ly/3Q9rSQL
🎙️ Download the podcasts on all your favorite platforms: bit.ly/3sFAW4N
Patrick Bet-David is the founder and CEO of Valuetainment Media. He is the author of the #1 Wall Street Journal Bestseller “Your Next Five Moves” (Simon & Schuster) and a father of 2 boys and 2 girls. He currently resides in Ft. Lauderdale, Florida.
I can't imagine how difficult it is to choose a job in the battle against these crooks. The history must not be disregarded!!Respect to the Dale Valskov crew for taking up this responsibility and combating scammers.
Y’all should stop calling everything “the bare minimum” when it’s literally not. Respect is the bare minimum, actually going out of your way to comfort and have an open ear for someone isn’t. Doing something like this is truly very nice and a great thing of him to do. I hope shit gets better for you and I salute Dale Valskov for being mature when it’s needed!
Bravo, Dale Valskov I'm so glad you're out there fighting these scumbags. We must do everything in our power to protect the elderly and the general public from these despicable scammers. You're a true hero, my brother.
Bravo, Dale Valskov -I'm so glad you're out there fighting these scumbags. We must do everything in our power to protect the elderly and the general public from these despicable scammers. You're a true hero, my brother
Jesus....Jesus......Jesus.....
Hey ppl, I'm a retired computer/IT person, Yet I still find Dale Valskov so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
Having someone like you who’s not only a great innovator but also pulls his best to get the work done so beautifully needs nothing but appreciation. Dale Valskov Thanks for the well off work you consistently bring your all and I truly appreciate that. Thank you for making corporate life so smooth. Proud to have you on our team. Great work as always.
Congratulations, Dale Valskov I am relieved that you are out there fighting these thugs, We musttake every precaution to protect the elderly and the general public from these despicable con artists. Congratulations to You!! You deserve the Nobel Peace Prize for ensuring our security.
The efficiency of this Dale Valskov is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work jack!!
We need more immeasurably wise and compassionate humans like you on this planet. Thank you for sharing Dale Valskov , Jon. I bet I'm not alone when I say this video found me at the perfect moment, and there are a lot of things here that I needed to hear right now.
CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *Pecuniary backdoors*
I gotta say, *top phase resolution* you had me giggling and learning all at once! Who knew hacking could be this chic with the right guide? Your effort is like the perfect mix of brains and beauty, making tech feel like a walk in the park.
Wow, this is a game-changer! The way *top phase resolution* explained how to access these features on any device is not only informative but also empowering. I’m definitely going to try this out. Thanks for sharing such valuable knowledge in such a clear and concise manner!!
This is some next-level tech knowledge. Thanks for sharing *pecuniary backdoors* who helped with the remote access.
Hello, I honestly don't think there's a youtuber out there that had a better understanding of cinematica than *top phase resolution* is the solution to the recovery of your acct, everything in the video was perfect, from the choice and timing of music to even the choice of background.
You're giving him a lot if credit when you deserve the credit. Thanks for serving
Congratulations Dale Valskov -I am relieved that you are out there fighting these thugs. We must take every precaution to protect the elderly and the general public from these despicable con artists. Congratulations to you!! You deserve the Nobel Peace Prize for ensuring our security.
Why is this same comment being made on multiple accounts
@@skata100some spam bullshit I was like who the fuc is that 😂
It's amazing what you do Dale Valskov We need a lot of people with your skills and set who have good intentions and spread love
real hacker because he brought his own snacks lolz.
😂😂😂 thanks for the laugh Chris
😂😂😂😂😂
Dead giveaway! Lolol
Never mess with a guy who packs snacks. That person has seen some stuff and they come prepared now.
😂😂😂😂
*THE TECH SAFE GUARDIAN* willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you.
Friend : Here's a charger...
Me : *whipping out my glock"* "WHO ARE YOU WORKING FOR?!!"
Then he removed it from your hand disarms you while removing the top slide piece of your Glock like Jackie Chan then he says like trump “Chinaaah”
😂
You're with the gad dam C-I-A. Aren't ye?!
I think that was a scene from SLC Punk maybe? Some old cult following movie...
And you own a glock because a rapper made the brand popular I'm assuming. 😂
😂
Thank you for your great job *THE TECH SAFE GUARDIAN* . We really appreciate your efforts and dedication towards the work. May God bless you to show your worth and skills in the future like this, over and over. I really appreciate your great skills and thanks alot for all what your have done and helped me out a lot. The Sky is the limit mate Shine On
The efficiency of this *Top phase resolution* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work jon!!
I gotta say, *top phase resolution* you had me giggling and learning all at once! Who knew hacking could be this chic with the right guide? Your effort is like the perfect mix of brains and beauty, making tech feel like a walk in the park.
Wow, this is a game-changer! The way *top phase resolution* explained how to access these features on any device is not only informative but also empowering. I’m definitely going to try this out. Thanks for sharing such valuable knowledge in such a clear and concise manner!!
This is some next-level tech knowledge. Thanks for sharing *pecuniary backdoors* who helped with the remote access.
Hello, I honestly don't think there's a youtuber out there that had a better understanding of cinematica than *top phase resolution* is the solution to the recovery of your acct, everything in the video was perfect, from the choice and timing of music to even the choice of background.
Are these all bot accounts or have I had a stroke?
Their move from the dark web to the clear web was a bold step that reflects their commitment to transparency and integrity. Adrian Ruthnik continues to lead the industry with their ethical practices.
dale valskov does it better
use dale valskov instead to hack phones
No ones safe holy moly! I think theyre even further with tech … go ahead Elon implant ur shit! The masses is so fckd…
Adrian's mom does it better...
I love how they use neutral pronouns. When I think of bold steps, I think of closing Tor with a couple of mouse clicks and moving to a regular browser. Oh, the audacity. That took courage, didn't it? and about 15 seconds. We salute "them." Bravo.
Adrian Ruthnik's dedication to exposing vulnerabilities saved our business from potential breaches. Their thorough assessment and strategic recommendations have fortified our defenses.
dale valskov does it better
use dale valskov instead to hack phones
This chatgtp bot 🤖 ahh comment 🤣🤣
Soon, there is going to be the rapture. It's when there will be trumpet sounds, and after the trumpet sounds, God will lift his people from here. Also, God said people should be living by the Bible. Amen, and God bless you.
❤Jesus loves you guys.
❤* John 3:16 - "For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him shall not perish but have eternal life". ❤
@@allenvayner4987 cool story bro 👍🏾 sounds like an awesome action movie
Adrian Ruthnik's move to cleanse the hacker-for-hire industry of scammers is much needed and appreciated. Their efforts to restore integrity to the field are evident in their work.
dale valskov does it better
use dale valskov instead to hack phones
This chatgtp bot 🤖 ahh comment 🤣🤣
Wow, the insights shared in this video are eye-opening! *Uncoverlinks* has a knack for explaining the intricacies of phone forensics. Understanding how to access location data and call logs is crucial in today’s world. Thank you for shedding light on such an important topic!!!
I never realized how much can be uncovered through phone forensics! This video from *Uncoverlinks* does an amazing job of outlining the methods used to access crucial information like call history and location tracking. It’s a must-watch for anyone interested in the field!!!
*THE TECH SAFE GUARDIAN* . I really appreciate your efforts and dedication towards the work. May God bless you to keep showing your worth and skills like this in the future
Adrian Ruthnik's focus on cleansing the industry of scammers is a testament to their commitment to ethical hacking. Their efforts to restore integrity to the field are much appreciated.
dale valskov does it better
use dale valskov instead to hack phones
Wow, the insights shared in this video are eye-opening! *Uncoverlinks* has a knack for explaining the intricacies of phone forensics. Understanding how to access location data and call logs is crucial in today’s world. Thank you for shedding light on such an important topic!
I never realized how much can be uncovered through phone forensics! This video from *uncoverlinks* does an amazing job of outlining the methods used to access crucial information like call history and location tracking. It’s a must-watch for anyone interested in the field!!
This is such a valuable resource for anyone in forensic investigation! *Uncoverlinks* clearly knows their stuff when it comes to accessing phone location and call records. The techniques discussed here are not only fascinating but also essential for modern investigations!
Dale valskov does it better
yup
hello i need help pls
hello , who is dale valskov and what does he do
Nice
🐤
I love the way he handles the questions about his girlfriend. Why piss your self off for no reason and if they are going to cheat they are going to cheat.
One Hell of A Hacker! All types of Tricks up his sleeve. Way more than he will show on any live feed. Genius
You can order all this stuff... And take free classes to learn how to use it.
@@VioFax Where? and Where?
Lol, this guy is not a genius at all. This is basic cybersecurity knowledge that you can learn from a cybersecurity course. It's just that most people are tech illiterate so it's seems like he has unseen information but in reality he has mediocre information.
@@VioFaxexactly bro these guys are hilarious. This guy is not some high level security researcher he is just mediocre.
@@SdotThompson check CCC
I first knew if this guy when he appeared on the Shawn Ryan Show. Doing great things combating peds online. 👏👏👏
A lot of TH-camrs and streamers are going down the Chris Hansen route for mainly the views. But this guy seems like he genuinely does care
Crzy eye opening shiet 😮on Ryan's show right
Same bro srs has the craziest guests
Same
That “so you got a girlfriend?” Line came off as such a gab lol
rich ego vs pretend hacker showing off momentos from snowden leaks. its like disabling every security feature so i can "hack" everyone with kane and able(as long as they also disabled every default security feature and update since 2010) next trick he can use aircrack and ddos us from inside
@@stevensgarage6451why the hate?
@@stevensgarage6451do you even know what his job is? lol he never said hacker. Something tells me you didn’t pay attention in class
he just wanted to segway into him spying on his girl since he has the ability to
@@stevensgarage6451this fool
This is the humble and modest version of Patrick, I like it. Keep staying humble Patrick.
He might be a lot of things, humble isn’t one of them.
@@sirenknight8007 In this video he is humble. In general however, he is not. Base on other video I have seen of him he acts like he knows it all. You can still be confident but come off humble, but he comes off as cocky in general, which is opposite of humble.
@@willcollins5660 we are agreeing. I didn’t realize you were saying “atta boy, keep it up”.
Personally, I unsubscribed after his big “restaurant rant” where he made a 20 minute video to basically give a place a bad review. I was okay with that honestly, what I didn’t appreciate was his arrogance and wealth flaunting. Ya know, good for him he’s rich enough to do that, I don’t have to watch it, like I should be impressed because he flexed. I thought it was disgusting. He’s gone off the deep end since he started minnect. Like he’s gods gift. Anyway. Thanks for responding? 😊
Probs more humble cus he knows little about this subject and he's talking to somebody who's engaging and a true professional at his profession
Great video. I will be forever grateful to you, you changed my whole life and I will continue to preach on your behalf for the whole world to hear you saved me from huge financial debt with just a small investment, thank you Victoria Taylor
Wow. I'm a bit perplexed seeing her been mentioned here also Didn’t know she has been good to so many people too this is wonderful, I'm in my fifth trade with her and it has been super.
She is my family's personal broker and also a personal broker in many families I'm United States, she's a licensed broker and a FINRA AGENT in United states.
Really you people know her? I was even thinking that I'm the only one she has helped walk through the fears and falls of trading.
I'm new at this, please how can I reach her?.....
SHE'S MOSTLY ON TELEGRAMS, USING THE USERNAME
Ryan is everywhere these days! He was just on our local news station this morning as well! Im glad he mainly uses his knowledge for good cause he for sure is capable of being a menace.
Do you think he'd openly admit he was using it for nifarious reasons? Pretty sure he watching the gf pretty close too.
I am safe I didn't see any orange tags on my cables 😎
lmao
I also have wireless display, wireless mouse and wireless keyboard so I'm good 😎
Lol
he PUT the orange tags on them so he doesnt get them mixed up LOL
Haha! Thanks bud. Comment of the day for me. 👍
Adrian Ruthnik's dedication to their clients' security needs is evident in their thorough and effective methodologies. Their proactive approach ensures we stay ahead of potential threats.
dale valskov does it better
use dale valskov instead to hack phones
This chatgtp bot 🤖 ahh comment 🤣🤣
Adrian Ruthnick died yesterday
@@Dpak1980Aw, man! So tragic. I'll dearly miss "their"proactivity and methodolgies. I'm all about the methodologies.
Ayo for the first 10 sec😂 “you want to see something funny while I’ll pull IT OUT”😂😂😂😂
OMG… when they 1st came out , I use to wonder if the charging stations that everyone uses in public was stealing info 🤦🏽♀️
Now you know 😂😂😂
EVERYONE is changing their ATM PIN and deleting their browser history.
Lol 😅
Of course, most of them don't know that the browsing history is still there after they deleted it. :P
if you're like everybody else and have porn searches, what's the point of deleting it, then you'll look abnormal
I wonder if using a powerful magnet over these cables would do anything.
@@mikerosoft1009 hot air will work to damage the ic inside or just submerge in water. magnet no
Who else thinks these are already installed straight from the factory to direct all that info straight into the NSA?
They are there
Yeah prolly from the very beginning
Years ago, it was well known that Hard drives "meant" for foreign countries produced by US companies had different firmware. Certain Government compliance. Why I hate everything is produced in China, too easy for them to inject a line of code for a zero day attack buried in firmware. Everyone jumps to conspiracy but forgets history has shown if it can be done, it usually is or was.
Too costly. It's in the phone already.
My reply got erased...hmmm guess I pointed something out...
"You wanna see something funny while i pull it out" WTF did i walk in on?😂😂
Hahah
He answered that question about the girlfriend like a real grown ass man... kudos!!!
You could detect the cable with a simple usb power meter. I use one often to see if a device is powering on, just by looking at the draw. If you plug a hot cable like this in that has active electronics, you'll see a current draw. With nothing on the end of the cable, then it is either a shorted cable, or there is something on the cable drawing the current. You could likely also see it with a FLIR as a byproduct of Power usage is heat. IE: the module inside the cable WILL generate heat.
This is why I don’t.t charge from public usb.s like airports and hotels.
🎯
But any modern Android will always ask "do you want to charge only or transfer files." If it asks this when it is not meant to, like with a wall outlet, then you know something is "fishy."
That's the least of your problems. The average person cannot do anything about it. There are back doors in most Apps, software and hardware. We're at their mercy since we must use technology.
@@millanferende6723I’d imagine that cable wouldn’t trigger that response.. only one way to see
@@millanferende6723 its wifi understand not charging cable
9:42 Pat's face at the payload joke🤣🤣🤣
I laughed hard too 😂man
just because you're paranoid, don't mean they're not after you
We can tell you’re not the sharpest tool in the shed. lol it happens so people should take precautions
Wat
Why when you buy a phone do they tell you to use the charger the phone came with?
@@user-nf2zx2ox7jit’s clear YOU are not that sharp either since he’s clearly quoting a well-known lyric from Nirvana and (so far) 57 people ‘get it’ and you don’t….
Gotta find a way, find a way…when I’m there 🤘🏽
Long time ago, my uncle told me start learning computers. It will be the future. The more you learn being able to program everything and understand how they work you will be invaluable. I should’ve listened to him
Here’s the facts:
He keeps on saying it’s “HIS FRIEND”, but “THAT’S HIM”, period.
You obviously don't follow him and what he's done for exposing what goes on out there. He has dozens and dozens of examples of spyware and hardware gadgets to which if he is making, would mean he is superhuman considering the degrees in electrical engineering dozens of others he doesn't possess but somehow he's able to make them?..ok?.. and yeah the hacking community are a collective to which he's the face of, so your dreaming if you think he's making all this stuff and not just showing you like he actually is.
Nah, this guy just buys off HAK5 lol it's also not his friend. 😂
Hak5, spacehun, awok and the makers of flipper zero. There's many many more. He's not a one man army of hacker.
Exactly. It’s pretty easy to realize that his friend MG stands for “my guy.” Aka himself !
Mark Grover
This is why I felt that getting rid of separate power cords in electronics and forcing everyone to adopt USB cables to power devices was a bad idea.
and u think that was done inocently.....
Apple was safer all along 😅
@@KobeBryantt237 No sir, same data manipulation techniques can be applied to the lightning connector as well
@@thepro08?? No that's clearly the point of his comment. Lol
Oh yeah they could never do this with a power cord. USB is the problem.
Everyone, check your charging cords! 😂
For real 😂
Tru dat!
WTF I ACTUALLY HAD ONE
Yea. How?
@@PaulG.369 Maybe check for new wifi hotspots that come up when your cable is plugged in?
I love how Pat is reacting to years old tech.
And only understanding about half
0:55 It's not a charger in your hand, it's a wire. the charger is the block you plug into the socket and what you have in your hand is a wire that connects the charger to your cell phone For God's sake, use the right words, it's embarrassing that a grown person can't use the right word for the various things. You wouldn't call an extension cord a charger either, would you?🤔🙄
“Do you have a girlfriend?” Haha the look he gave him back
Couldn't picture it before, but that's how easy it is for potential blackmail. An interview or meeting with some high value target, you ask to charge your device, then just leave the cable behind and it's wrapskis. Crazy.
Plot twist: get caught and go to prison.
We all talked about these concepts 30+ years ago. Plugging into a PC and recording the keystrokes. 30 years bro. When USB was rolled out that was one of the first things done with it... shadowing keystrokes and recording them.
I mean that's how the keyboard was connected
It was more than a concept. It was reality. I remember seeing ps2 keyloggers very often...And I think I may have stumbled upon AT keyloggers also.
But this isn't just a keylogger.. lol
My stalker ex loves to put a key logger on devices. He did it to someone then he'd wait until they went on FB. He'd wait until after the person read their messages so it wouldn't look suspicious, then after knowing who the person was talking too he'd make another account and start smear campaigns to ruin relationships. Be safe out there folks, some truly nasty people in this world.
@@someoneout-there2165 thats an awfully long winded way of saying - "my ex caught me cheating via facebook upon deploying a key logger i was unaware of" 🤪
This “Ritz” look
suspicious 😂
😂😂😂😂😂
And Patrick had his doubts.. 😂
Now you can't even trust his Ritz😂😂😂
It was $20,000 but if you call now, we'll give it to you for a low price of $199.99!
Sounds like an infomercial/scam
Years ago I was talking to a young fella who was telling me how he used a vpn and never used public WiFi etc so that he couldn't be spied on or hacked, then I saw him plug his phone charger in. All I said was ' you're too young to remember modems, when all of your data came through the phone cables aren't you' he looked at me funny and then went a bit pale 😂
Homie is dead on. I'll add though the more you try and stop someone from cheating the more likely they cheat on you or leave you for someone else
Your right and don't expect the person to act any better than you do.
He's the real life Q from 007
Feels accurate!
Tutoring for Prof. Christian Rieck
Christian, I'll explain it to you in detail, for once, and then I'll get your professor title. So, the Israeli Zionists, who have been planning a large Israeli empire in the Middle East since the 1980s, are central to this. That's why 9/11 was carried out, to establish Muslims as the enemy. The Americans were then sent to the Middle East to do Israel's dirty work. Syria, Lebanon, Afghanistan and Iraq were rendered incapable of action. Egypt was bought off. Only Iran could not really be defeated. The conflict in Ukraine was created in order to prevent Europe from pulling out. The aim was to supply Europe through the gas fields in Gaza (Marine 1 and Marine 2) and at the same time make it politically dependent on Israel. To achieve this, Putin's Russia had to be established as the enemy. When Putin himself would have liked to join NATO in 2000, clear conditions had to be created first. To achieve this, a coup was staged on the Maidan and later the democrats were forced to blow up Nordstream 2. Before that, Europe was specially equipped with migration-friendly governments in order to bring Islamists manipulated/traumatized by MK-Ultra to Europe. These involuntary agents were meant to stir up anger at Islam in order to help Israel achieve great borders through a Third World War. You are welcome to take a look: Mirjam Adelson has already been installed on Trump's side. She now gave Trump 100 million euros to recognize Israel's new borders during the genocide in Gaza! So, bottom line, the Zionists are the puppeteers, the Muslims are the pawns, Russia is involuntarily annoying, and China is just about to emerge as the beneficiary of the Zionists' idiocy, while we here in Europe have a green, Zionist proxy government... That's how it is!
No you're just ignorant about this technology and don't understand how it all works. It's not nearly anything close to the NSAs ability to hack your phone. Newsflash they don't need a cable they have the cell companies directly.
No his not real Q is black not white
it's a pretty good business model for "penetration" hackers. Develop all these scary gizmos that put fear into corporations and then sell your protection services to said corporations.
Was thinking the same thing. Solutions are always informed by problems. Dial the problem up to 9, then sell your solution.
This guy though, I’d want to give money.
It's a terroristic enterprise.
@@RobbbbM-qk3ei I guess too there'll always be people out there with illintent.
You know corporations actually get hacked right?
@@PersonPersons-kh3bg Of course and you missed the point.
Great stuff. Thanks for making this video. This exemplifies why I buy cables and chargers etc. from local, physical, shops.
If my charger cords don’t have cat teeth marks in them I know something is wrong.
Too right mate! They're not kosher until they've been chewed 😂 meooowww!
If my hacker don’t have the tag still on his shirt I don’t want him. Respect .
With the $40,000 day date on his wrist😂😂
He just saying he’s OMG
Pat, as always, thank you for great content, we love you!
see Ryan on Shawn Ryan show, what a beautiful human!! everyone needs to support this guy!
Pat is too afraid to even let his mic get too close to that dude😂😂😂
Another example of how hacking has nothing to do with a sweaty guy sitting in a basement decrypting codes like we used to think it was, and all about you being smart or aware enough to not get tricked by phishing or using faulty hardware.
If he'd show the sweaty stuff like prototype pollution or blind time based sql injections its not cool man.
Of course I only read this after I already rented my friend's mom's basement with a door that shouting "STAY OUT OF HERE MOM! DON'T COME IN TO CLEAN! IF YOU TOUCH THAT SOCK YOU'LL BE IN THERAPY THE REST OF YOUR LIFE!"
Also, while I love Hak5 and MG's products, how many amateur videos are going to keep promoting products that have been on the market for a couple years like their brand new... Without even linking to the site.
Get a piezo clicker out of a lighter. Unplug all your USB cables from devices. Click on the metal contacts of all your cables.
The static electricity (blue spark from the piezo clicker) should kill the chip inside the cable.
Can anyone confirm. Its not the case for smaller resistor equipped connections. Maybe if you flick the actual chip with the spark?
@@MercedesDenz
You just need to make sure the charge actually travels thru the cable. Hold the other end with your fingers, it will sting though, or ground it to something metal.
You cam test this on any micro circuit - instant de_th
@@PaulG.369 😝 nice
yea except apple chargers have a chip in them to detect if they are legit apple cables..your iphone will refuse to charge at fast speeds or at all if it doesnt see its chip in the cable
Plot twist: It's over-voltage protected.
Why is the NSA selling anything to anyone?!
correction: to anyone with 20 thousand dollars to spend on a usb charger / hacking tool.
I doubt NSA is selling it, else criminals and Russia, Iran and China would buy it. I guess the listed prices are what NSA buys it for or what NSA values each device that it builds in house.
Nobody seems to be concerned with the very obvious issues here.
The biggest criminal is the white men from us😂@@fred.flintstone4099
This dude is not describing the whole thing. The expensive thing is the software...aka spyware/malware/virus. The cable and onboard dumb computer is cheap.
- Can I borrow your charger?
- Ok! it’ll cost you your life
You can get hacked by anything so be careful , cable or Bluetooth or WiFi or even by visiting a site
One of my biggest fears is someone gaining access to all my credentials,because i work online mostly.They would wipe me clean.Very scary
Wouldn't be hard boss man.
use security keys and tokens breh
And you shouldn't have said anything cause now you just put a mark on your back !
Delete this comment my friend
Honey pot
Just remember that he is showing you the stuff that is out of date if you know what i mean.
Well, he just shows just what other in his pentest profession knows about, but I don't think he is keeping any secrets that he is not showing, but the NSA has their own in-house developed stuff that not even he knows about.
I had a coworker in 2008 that could intercept my calls and txts, just by knowing my phone#. And we worked construction!
@@Chris.P.Bacon. SDR Lime mini for 1k you make own phone cell. full duplex🤫
Yup, this is all outdated stuff...
Obviously the cables are outdated, that's why they sell for 200 instead of 20k.
Who borrows charging cables from strangers in 2024?. Definitely not me.
I definitely won’t be, after watching this, either.
Hacker: I don’t know why my computer hasn’t booted up yet.
Me: Probably because you’re hacked! 😂
Regarding not hacking your girlfriend... The correct answer is that you value privacy.
We need more info about this PBD, please
Pen testing and security is a rabbit hole. It would be a series way too long for PBD style podcast.
We need a 2 hour session with this hacker!!!!
Search “Shawn Ryan hacker”…think it’s over 2 hrs
Or you could do your own research and learn how this shit works. Kids at 14 know this and understand many more methods of pen testing than the random video security risk clicker
he's not a hacker, he's a script kiddie. As the other reply states, 15 year old kids are better than this dude at hacking, he probably can't even code lol
If you have bought a charging cable on Amazon within the last two years, you are fucked.
Yeah Im sure the $10 cable I have is one of these,lol. Try laying off the weed for a while, you wont be so paranoid.
Which is why you can buy from reputable vendors.
@@sole__doubtthink about it. Why not? The return on the info you gather from
Each one of these cables sold to an unsuspecting user would make up way way way more money than you would lose by only charging $10 for it.
I was just thinking of all the products I've purchased that have cables included. 😮 even some cables from Chinese products that could be all over the place
@@sole__doubtWho cares what they charge each other. It could cost a government or ANY BILLION AIR 30$ or even pennies to make . Not too mention money is NOTHING. TO look into EVERYONE in a country. THE Data is priceless.
Lmaoo “do I wanna piss myself off for no reason” exactly why you don’t go through phones 😂😂😂😂
How come a tech genius can not figure out that eating Ritz is a really bad idea?
What in the world is this?! Oh my goodness. Crazy shenanigans
The phone charging sellers just left the room 😂
11:30 Bro was spitting straight facts here. 100% correct
Ryan is one of my favourites. I seen him on Shawn Ryan show and I was impressed with his knowledge and humanity. He’s a great guy.
Where is the full interview for this? I can’t find it anywhere. Every time I even try to type it in all I find is shorts and little clips of it. I’ve had a super hard time finding full interviews of anything on here.
What if Apple sells their iPhones with these types of cables already? 🤔
You are so dumb, they already sell you the iPhone and can do whatever they want with it
they are selling you already their software. they don't need a cable to spy on you
The phone and all pcs are just backdoored at the cpu level already from factory.
False, because apple does not include anything besides the phone 😂
??They would just build it into the phone.
Title says “hack any phone”, proceeds to show hacking of a laptop instead
Thanks. Knew was waste of time
@@jahvaunsantosrobertson2590 bro was u gonna try to hack someones phones
Kind of scary to think that all of our chargers come from China and if they wanted to, they could literally have access to everybody’s information
No because someone will inevitably notice and then their whole production so far + future production will go down the drain. These devices work exactly because they're rare and people don't know about them.
China has easier ways to steal your data, through devices that are already expected to transmit data, like routers or phones or whatever... Remember the huawei situation?
lolz
You mean the same as google already doing !? Then yeah. The only thing useful for any of them may be location. I mostly buy cheep phones, and do not keep anything "top secret" in the phone. Only aps using are official ones from the store., most of them are just socials, weather. So the only important one is bank app. But protecting that is banks duty. Only official charger plugged in the outlet. If i would transfer anything important on PC i would disconnect the internet :)
Wifi dude , do you expect a chinees in your street in a car staying their on a pc or phone ?, I don't see them
Nope, they can't have access to nothing. The "hacker" connects to the minicomputer inside the cable through WiFi. I don't think wifi has a transmission range reaching China, lol. The "hacker" needs to be around.
Back door code is far more worrying for the majority of ALL users!
Me currently looking at my cables... 👀
Forget NSA, Forget Ryan! What evidence do we have if Apple is not doing the same to us all this years???
For this u need to be on same wifi your & victims device have to be on same network after that it will work
trust me you need this 130$ cable...no the regular usb-c cable won't do
Years ago I saw an episode of Forensic Files once where detectives got an old computer of a suspect...it was said that the evidence used to convict him was in the computer...the narrator stated that the computer tech mentioned that deleting files completely from a computer isn't possible and can always be accessed by anyone who know how to do so. I'm wondering if that is actually true because a cell phone is pretty much a computer...since seeing that episode I've never traded in a cell phone.
Digital Foot Print.
@@oneeritrea I figured so. I still don't trade phones in.
Thanks for the reply.
Is this true for SSD though. I know SSD has random deletion so it's impossible to retrieve files (if there is no other secrets I hope).
That's because the way deletion works is it simply marks the amount of space previously occupied by the file as "free", meaning the next file u save occupies that space, overwriting the old deleted file. Overwrite it many enough times and it's no longer restorable. That's how dedicated deletion programs work. The OS will see it as free space, any OS that can read the respective file system, but specific software will see it for what it is - space marked as free and hence actually see the file that was there prior. 20 years ago u could google such a program in 2 min and it would actually work. Nowadays it might be harder.
I wonder how much hak5 is playing this guy. Truly the best hak5 spokesman. All this technology has been out over five years. Screen crab is mainly used to be proctor for exams.
I'm super proud of the whole team starting from the CEO to the least staff who have taken their time to put all this together. This is a very good educative video for anyone to learn & comprehend.
Peace ✌
0:08 he’ll pull it out 😂
Pause
Pause
no diddy
What did the guy do after inventing the radar, he got paid and then invented the radar detector and got paid again
Modern phones disable USB data when the phone is locked, and ask for permission before allowing data access from a device that has not been connected before.
Modern phones get regular updates against "hacking". He was using a laptop with who knows what operating system. Those cables dropped in price from 20k to 200 because they are pretty useless now.
This cable is not seen as regular USB key by the phone when you plug the OMG the phone see it as a mouse or keyboard and give you full access . Try to plug a mouse on your phone you ll see right away You'll notice that no permissions are requested, and the mouse works immediately
Any HMI device is "trusted". Keyboards, mice etc. Without it, how do you even type in your password?
The rubber duck years ago did this in a usb stick.
NSA 20k for a cable that costs over a million dollars to research and develop. Some guy in his basement able to make the same thing for less then a 1000 dollars
if this guy could have hacked a phone remotely without using a malware link or using stupid cables that no one is ever going to use to plug their phone in, then, I would have been impressed.
Ritz box is probably a supercomputer in disguise.
Cops use sting ray false cell phone tower surveillance and get into all our phones illegally without sitting judges warrants with active and passive mode lmfao
They also have devices that let them look through your walls and watch you. When they use them as evidence in court they call them “confidential informants” because they know it’ll ruin their case with illegal spying
11:02 - Now that's a (alpha) Man right there!!!✊🏽