Cybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive Information

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 พ.ย. 2019
  • Cybersecurity expert Kevin Mitnick demonstrates how today’s “crackers”, “gearheads” and “cyberpunks” illegally access sensitive information from everyday people using modified gear and social engineering.
    Dr. Phil tells compelling stories about real people. The Dr. Phil Show is an American daytime talk show and TV series with host and personality Dr. Phil McGraw, who offers advice from his experience as a psychologist. The show provides the most comprehensive forum on mental health issues in the history of television. For over a decade, Dr. McGraw has used the show's platform to make psychology accessible to the general public by addressing important personal and social issues. Here on the Dr. Phil TH-cam channel, you will find the best moments, highlights, and segments from the TV show. We upload new videos every day, so make sure you subscribe and ring the bell for all notifications, so you don't miss a single one.
    Full episodes of the Dr. Phil Show premiere every weekday on CBS, with a new season premiering every fall in 2020, 2021, 2022, and 2023. Each full episode contains an interview or multiple interviews with doctors, teens, families, parents, kids, and more. The executive producers are Phil McGraw and showrunner Oprah Winfrey of OWN. Dr. Phil is the top-rated daytime talk show attracting millions of viewers every day alongside other talk shows, including The Ellen Show with Ellen DeGeneres, The Dr. Oz Show, The Kelly Clarkson Show, and The Steve Wilkos Show. Dr. Phil makes regular appearances on The Tonight Show Starring Jimmy Fallon, Jimmy Kimmel Live, and The Late Late Show with James Corden. Dr. Phil has also done crossovers with 90 Day Fiancé and Inside Edition.
    Do you want to be on the show? bit.ly/BeOnDrPhilShow
    www.drphil.com
    Facebook: / drphilshow
    Twitter: / drphil
    Instagram: / drphil
    TikTok: / drphil
    #DrPhil #PhilMcGraw #DrPhilShow
  • บันเทิง

ความคิดเห็น • 2.2K

  • @angelagrayson222
    @angelagrayson222 4 ปีที่แล้ว +7506

    Oh lord, I hope my grandma doesn't watch this episode. She already is so paranoid about computers that she truly believes & is terrified she might accidentally hack into the pentagon by clicking on the wrong button while shes playing on her puzzle game. (The singular thing she uses her computer for is her puzzle game.)

    • @Colby00
      @Colby00 4 ปีที่แล้ว +72

      Lol

    • @johncloois3301
      @johncloois3301 4 ปีที่แล้ว +12

      @Megan Ziggler 🦃? 😜

    • @Sergio-fu7mv
      @Sergio-fu7mv 4 ปีที่แล้ว +273

      LOL. 😂
      Watch the one day she loses her fear, and uses it, you get to her house and she’s controlling Air Force One from a computer running windows 98’ with the secret service, and military surrounding her house. 😂😂

    • @johncloois3301
      @johncloois3301 4 ปีที่แล้ว +8

      @Megan Ziggler Thanks for indulging my dry, hammy humor. I'm just a turkey.

    • @johncloois3301
      @johncloois3301 4 ปีที่แล้ว +1

      @Megan Ziggler Why thank ya! Now I'm blushing and Kool-Aid Man grinning. I've been called some other food slang names that aren't so nice. 😋 So where ya from? If you want to say. I'm in Tampa, FL. Hope your TG was full of good food and fun!

  • @mikeock3164
    @mikeock3164 4 ปีที่แล้ว +10018

    dr phil is my favorite boomer

  • @oddstap6976
    @oddstap6976 4 ปีที่แล้ว +3209

    For all who don't know this is Kevin mitnick a famous hacker who was so good when he was being watched by the FBI he hacked them and had all personnel files on everyone working on his case and even knew which friends were informants.

    • @Dimmizer
      @Dimmizer 4 ปีที่แล้ว +38

      🤔🤔

    • @oddstap6976
      @oddstap6976 4 ปีที่แล้ว +296

      @@Dimmizer if your sceptical, feel free to verify this online.

    • @Pumpkinss
      @Pumpkinss 4 ปีที่แล้ว +493

      Now if that ain’t the biggest flex I don’t know what is

    • @imdanielmartinez
      @imdanielmartinez 4 ปีที่แล้ว +42

      Actually you can still see all the sessions online and/or on youtube of kevin mitnick's telnet during shimomura's packet sniffing. this was done in order to have clear evidence against kevin leading to his arrest.

    • @oddstap6976
      @oddstap6976 4 ปีที่แล้ว +9

      @@imdanielmartinez that's awesome I didn't know that

  • @Jackson_Zheng
    @Jackson_Zheng 8 หลายเดือนก่อน +90

    This guy was the reason I got into hacking. RIP Kevin. You'll be remembered by all in the community.

    • @honor9lite1337
      @honor9lite1337 6 หลายเดือนก่อน +3

      😮😢

    • @sadir-uh1qn
      @sadir-uh1qn 6 หลายเดือนก่อน

      this guy was the reason you became a virgin for life

    • @maxwellsmart4422
      @maxwellsmart4422 5 หลายเดือนก่อน

      Yes. RIP

    • @p34ky._
      @p34ky._ 5 หลายเดือนก่อน +1

      What happened to him

    • @muhammedmayer3988
      @muhammedmayer3988 5 หลายเดือนก่อน

      he passed away in late 2023@@p34ky._

  • @marialyruiz749
    @marialyruiz749 4 ปีที่แล้ว +6360

    plot twist: he’s the hacker

    •  4 ปีที่แล้ว +35

      Kevin is the emperor of the Hackistan Empire.

    • @thetea237
      @thetea237 4 ปีที่แล้ว +5

      😂

    • @tellurye
      @tellurye 4 ปีที่แล้ว +276

      Actually he was - one of the best. Got MAJOR prison time, and is now a consultant. But he was one of the first.

    • @KainDracula
      @KainDracula 4 ปีที่แล้ว +11

      tellurye oh! I think they’re talking about Dr. Phil. not trying to be rude!! Just think you missed the joke, good day sir :)

    • @KainDracula
      @KainDracula 4 ปีที่แล้ว +4

      Marialy Ruiz that was for the guy I tagged...

  • @calamarbronx83
    @calamarbronx83 4 ปีที่แล้ว +3406

    This is not the way most victims lose their info. It's call centers.

    • @red_wave7634
      @red_wave7634 4 ปีที่แล้ว +46

      Ok boomer

    • @MarcusAurelius12
      @MarcusAurelius12 4 ปีที่แล้ว +274

      @@red_wave7634 your moms a boomer

    • @porschepal7932
      @porschepal7932 4 ปีที่แล้ว +185

      No it's databases that get leaked due to vulnerabilities.

    • @calamarbronx83
      @calamarbronx83 4 ปีที่แล้ว +4

      @Phuk In-Yomam a stranger. Like the other person on the phone when you call tmobile or electric bill. It's all call centers

    • @iKennectz
      @iKennectz 4 ปีที่แล้ว +27

      People type in their sensitive information to register for online accounts everyday. Social media is the biggest factor in this. I work in a call center, and the data protection rules are strict enough that giving out a single name, address, number etc to anyone without them confirming their identity is gross misconduct and gets you fired, and no recording devices are allowed in the centers. I'm studying network security and I can guarantee you that people do not lose their information, they give it away. Targeted attacks on businesses can give some and then normally you would be targeted for them to get the rest of what they need from you.

  • @onee
    @onee 4 ปีที่แล้ว +1347

    How to make parents who barely understand computers paranoid about computers, the Dr. Phil edition.

    • @ghostieeitsohg
      @ghostieeitsohg 3 ปีที่แล้ว +2

      Fr

    • @xeros4000
      @xeros4000 3 ปีที่แล้ว +10

      wish everybody was actually paranoid about computer safety. you are never gonna educate the older generations about security, but if they were actually paranoid about it would make them harder to target.

    • @vizender
      @vizender 3 ปีที่แล้ว +27

      @@xeros4000 no, because by making them paranoid, you are also making them more likely to call scam call centers when they see a « your computer has a virus installed » "advertisement"

    • @htg97
      @htg97 3 ปีที่แล้ว +1

      true. antivirus and vpn developers own them

    • @randyjuan7364
      @randyjuan7364 3 ปีที่แล้ว

      I found this video useful but I will forever appreciate *vesterfix* on ig for keeping his promise on my acc and getting my job done

  • @derpythecate6842
    @derpythecate6842 3 ปีที่แล้ว +871

    For the curious, this is relatively easy to do vs other forms of hacking. It's simply a microcontroller with human interface device (HID capabilities), hidden in the USB cable. As most hardware plugged into computers are not verified for their identity, you can masquerade as a normal keyboard.
    To sum it up, it opens the run window using Ctrl + R and then proceeds to execute one super long powershell command.
    Powershell commands can do everything on windows, such as downloading malware to steal your account hashes, stealing your wifi passwords (Windows very kindly gives you cleartext wifi passwords) and even your browser history in a matter of seconds. It also leaves little traces as it can download full exe files and execute them all in memory, leaving no clues on the disk, and the only clues are in the Windows logs or a full memory analysis.

    • @SanteriHietanen
      @SanteriHietanen 2 ปีที่แล้ว +21

      It’s also relatively easy to block. Even Defender can block it.

    • @rkvkydqf
      @rkvkydqf 2 ปีที่แล้ว +53

      @@SanteriHietanen Block what? A RubbyDuck or the downloaded malware?
      It's practically impossible to block a RubbyDuck without either using an overly complex or the way too simple solution. You can make it detect when the typing is too fast, but all an attacker needs to do is just make it slower. You can try identifying a person using keystroke dynamics and AI, but you can't do that very reliably.
      *The only defence left is pure common sense of not plugging in random phones, drives, cables, etc.*

    • @SanteriHietanen
      @SanteriHietanen 2 ปีที่แล้ว +64

      @@rkvkydqf Are you serious? It's not impossible to block. I don't know where you get that you wouldn't be able to block it. Easiest way is to literally have windows require admin password for it so that every UAC needs admin password. Second easiest way to block it is for example to limit access to powershell, the cmd prompt, and run command (as these are the most common ways a rubber ducky executes malicious code) You could block it only for USB. Whitelisting USB's works also. Even then if the script starts running antivirus will block the malware it's trying to insert.

    • @Wunderkind777
      @Wunderkind777 2 ปีที่แล้ว +23

      ​@@SanteriHietanen Yeah sure, Defender is blocking a HID device ahahahaha. weirdo

    • @SanteriHietanen
      @SanteriHietanen 2 ปีที่แล้ว +28

      @@Wunderkind777 Can you read? I explained it already. Defender doesn't block HID but it definitely blocks the malware it's trying to insert.

  • @EbrahimKa
    @EbrahimKa 4 ปีที่แล้ว +615

    0:25 shes staring into my soul. Jesus

    • @CopWatch.
      @CopWatch. 3 ปีที่แล้ว +7

      🤣🤣

    • @zacharia5791
      @zacharia5791 3 ปีที่แล้ว +20

      That genuinely scared me

    • @lantzmurray8227
      @lantzmurray8227 3 ปีที่แล้ว +20

      0:21

    • @nikrusty
      @nikrusty 3 ปีที่แล้ว +5

      I thought first it was a mannequin

    • @cossack4692
      @cossack4692 3 ปีที่แล้ว +3

      Underrated

  • @dicebagdaryl
    @dicebagdaryl 4 ปีที่แล้ว +3063

    "You're talking about a little, white..."
    Dr. Phil has an iPhone.

    • @deadpoolsunicorn3359
      @deadpoolsunicorn3359 4 ปีที่แล้ว +16

      Booker DeWitt
      Yup lol

    • @BuzzinVideography
      @BuzzinVideography 4 ปีที่แล้ว +81

      My Samsung came with a white cable...

    • @Nyxeme
      @Nyxeme 4 ปีที่แล้ว +68

      Name one celebrity who has an Android phone.
      Matter of fact, most Americans have an iPhone correct?

    • @rainiak8378
      @rainiak8378 4 ปีที่แล้ว +20

      M vSdV yes about 80% and the rest are laughed at

    • @tygervoods8358
      @tygervoods8358 4 ปีที่แล้ว +13

      @@rainiak8378 Most of the rest are sponsored by Samsung tho, Apple doesn't really even need to at this point lmao

  • @techviking5559
    @techviking5559 4 ปีที่แล้ว +1503

    Guess dr. Phil is still using Windows 98, so he should be fine.

    • @FrankieTheOne
      @FrankieTheOne 4 ปีที่แล้ว +47

      That would be worst

    • @thephantom7841
      @thephantom7841 4 ปีที่แล้ว +23

      @@FrankieTheOne worse*

    • @berfranper
      @berfranper 4 ปีที่แล้ว +38

      The older the version the easiest it is to hack it, if you have a Windows XP computer that has never been updated it is probably vulnerable to an exploit (virus) called Eternalblue that allows the hacker to take control of the computer like you see in this video but completely remote and in a few minutes.

    • @StreetSmartification
      @StreetSmartification 4 ปีที่แล้ว

      No wonder he is slow

    • @cyberyou8237
      @cyberyou8237 3 ปีที่แล้ว +1

      @@berfranper i think he's joking

  • @senseiharakiru3324
    @senseiharakiru3324 4 ปีที่แล้ว +542

    Everybody gansta until this dude shows up in Minecraft PVP

    • @petekki3362
      @petekki3362 4 ปีที่แล้ว +2

      Paska kommentti

    • @jasonshepherd4771
      @jasonshepherd4771 4 ปีที่แล้ว +7

      How about the droid attacks to the wookies?

    • @IBL15
      @IBL15 4 ปีที่แล้ว

      Spurdo Spärdönen ok kiva

    • @ohmybots8797
      @ohmybots8797 4 ปีที่แล้ว

      @@petekki3362 Uskon että olet hauska juhlissa. Tämä komedia on korkealaatuinen

    • @Chillbear47
      @Chillbear47 3 ปีที่แล้ว

      Ki-Adi Mundi loool

  • @deeabbott9270
    @deeabbott9270 4 ปีที่แล้ว +807

    Yeah that settles it. I'm going back to carrier pigeons.

    • @yt-sh
      @yt-sh 4 ปีที่แล้ว +30

      I am gonna inject a tracker in them

    • @mrplayafication
      @mrplayafication 4 ปีที่แล้ว +6

      To get around the surveillance that is technology all one has to do is use regular mail lol. Google's looking at every email but no written letters.

    • @nickknife9681
      @nickknife9681 4 ปีที่แล้ว +3

      @@mrplayafication hackers don't really need to read your emails to know what is happening, it's enough to see the frequency and point of origin and destination. All of that you have in the regular mail and regular mail is being tracked now as well.

    • @unh0lys0da16
      @unh0lys0da16 4 ปีที่แล้ว +5

      Luckily there is ip over avian carriers, you can google for the RFC

    • @redephant2907
      @redephant2907 4 ปีที่แล้ว +2

      Ok boomer

  • @GierlangBhaktiPutra
    @GierlangBhaktiPutra 3 ปีที่แล้ว +366

    Those who grown up during internet's early days might know his case. His arrest was a testament how our law enforcement was not ready with the new technology at that time. Kevin Mitnick was not a hacker in a sense that he did not bypass security through breaching the security hole in the code. He used social engineering, where users are the biggest security loophole itself. He is pretty smart tho, exploiting users to find his way into the system.

    • @zerohours.
      @zerohours. 2 ปีที่แล้ว +37

      The way he evaded capture by tapping the FBI. The way he changed how he walked by putting rocks in his shoes. This man was a master and forefather to what he know as social engineering today.

    • @PTEC
      @PTEC ปีที่แล้ว +3

      What did he do?

    • @fokyewtoob8835
      @fokyewtoob8835 ปีที่แล้ว +12

      That is in fact what a hacker is. The ultimate hacker is the hacker who can hack humans. Writing code is cool but there are already great tools and codes out there it helps to read them but what makes a good hacker imo is one who can social engineer

    • @LouSipher
      @LouSipher ปีที่แล้ว +2

      Most of hacking is social engineering lmao

  • @df8238
    @df8238 4 ปีที่แล้ว +237

    “Pixel 4”
    *Google has left the chat

    • @josephfarhat9505
      @josephfarhat9505 4 ปีที่แล้ว +2

      * correction Google has now shadowbanned this video*

    • @aduryant5265
      @aduryant5265 4 ปีที่แล้ว +4

      well he also didn't say "the Apple iPhone"

    • @tiltedclone8906
      @tiltedclone8906 4 ปีที่แล้ว

      I don't get it. Can someone explain?

    • @firstnamelastname-vt6et
      @firstnamelastname-vt6et 3 ปีที่แล้ว

      @@tiltedclone8906 it’s called Google Pixel 4. not that anybody cares

  • @sneezyofficial
    @sneezyofficial 11 หลายเดือนก่อน +98

    Rip to Kevin mitnick, a true legend and hero to the ethical hacking and cyber security world😕🙏

    • @djdudjiddj7490
      @djdudjiddj7490 10 หลายเดือนก่อน

      Damnn rip

    • @a-google-user07
      @a-google-user07 10 หลายเดือนก่อน

      R.I.P. The Greatest Hacker of all times.

    • @TheFinalIllusion
      @TheFinalIllusion 10 หลายเดือนก่อน

      What exactly did he “hack”? He was a good social engineer, but hardly a hacker. Idk if the dude even knew how to run computers other than what you see within old Leo Laporte videos.

    • @nykel3233
      @nykel3233 10 หลายเดือนก่อน

      Didn't do him any good, did it?

    • @Alexe829
      @Alexe829 9 หลายเดือนก่อน

      @@a-google-user07 What happened to him? Do u know? Tks I/a

  • @zaayd
    @zaayd 4 ปีที่แล้ว +43

    I love how Kevin Mitnick, former #1 fugitive in the 90's, is now tech support for Dr, Phil.

  • @emileenix6311
    @emileenix6311 4 ปีที่แล้ว +188

    We use Kevin’s cybersecurity training videos at work. He’s so good at explaining!

    • @theXops9
      @theXops9 2 ปีที่แล้ว +2

      Then explain to me how he needs to be 300 hundred feet from the target physical computer to inject the malware but then he says he controls it from virginia ? What a fckin joke

    • @DJMikz
      @DJMikz 2 ปีที่แล้ว +16

      @@theXops9 bro thats because the 300 feet its just for the bluetooth transmiter to "manually" start the hack and he have a virtual machine (vps) that is located in virginia so the mallware connects to the computer in virginia doesnt mean he uses the computer to hack its simply listening the payload for a session

    • @alqaadi9858
      @alqaadi9858 2 ปีที่แล้ว

      @@DJMikz by the way what’s windows defender doing

    • @vdofficialchannel9841
      @vdofficialchannel9841 2 ปีที่แล้ว

      @@alqaadi9858 ​ @alqaadi Some payloads or viruses in laymen terms are fully undectable by windows defender. Should look at base64 encoding and code obfuscation.

    • @aerion4077
      @aerion4077 2 ปีที่แล้ว

      @UClrPTgP2zgsHF7OVHv9M_nQ you're not too bright hey

  • @Gameboy...
    @Gameboy... 4 ปีที่แล้ว +240

    They always say " easily" but they don't say how hard it was to acquire all that knowledge

    • @necaton
      @necaton 3 ปีที่แล้ว +8

      not too hard tho

    • @michaelreyes8879
      @michaelreyes8879 3 ปีที่แล้ว +106

      @@necaton said every script kiddie ever

    • @azraelinium1012
      @azraelinium1012 3 ปีที่แล้ว +3

      I would like to acquire that knowledge

    • @michaelkato8999
      @michaelkato8999 3 ปีที่แล้ว

      @@azraelinium1012 you cant

    • @larrylee2637
      @larrylee2637 3 ปีที่แล้ว +12

      @@azraelinium1012 the concept is simple, trick your victim into plugging a wireless keyboard receiver into the computer, and after seeing him does that, start to type commands that enables remote access.

  • @EnglishRain
    @EnglishRain 10 หลายเดือนก่อน +8

    RIP Kevin you were a wonderful human

  • @subhabratabasu9804
    @subhabratabasu9804 3 ปีที่แล้ว +37

    From an infamous black hat Hacker to a contributor to hacking society.

  • @sweiland75
    @sweiland75 4 ปีที่แล้ว +29

    WOW! I haven't seen Kevin in over a decade since her appeared on The Screen Savers. This guy knows his stuff.

  • @laf522
    @laf522 3 ปีที่แล้ว +56

    I've read all Kevin's books. It crazy seeing him actually live.

    • @fiftycaliber2972
      @fiftycaliber2972 3 ปีที่แล้ว

      Wdym what is the book about

    • @laf522
      @laf522 3 ปีที่แล้ว +14

      @@fiftycaliber2972 his life. He started of as a social engineer. He was so good the cops told the judge that he should not be allowed access to a phone cause he could whistle into it and cause a nuclear missile to launch. Not joking. FBI chased him around America. Very interesting.

    • @joshuaoconnor8505
      @joshuaoconnor8505 3 ปีที่แล้ว +5

      @@laf522 he's lucky the CIA didn't kill him, this agency kills anyone who threatens the government or industries

  • @L4marca
    @L4marca 4 ปีที่แล้ว +112

    Shoutout to Hak5. They have all you could need.
    Also, the remote button is just a gimmick. It's not even needed.

    • @enzobonggio1250
      @enzobonggio1250 3 ปีที่แล้ว

      I believe the remote is the bluetooth device that actually run the command. How it work if not?

    • @L4marca
      @L4marca 3 ปีที่แล้ว +18

      @@enzobonggio1250 The remote was just for demonstration.
      The cable is just waiting for the button to be pushed, after which the keystrokes are injected. It's just one or two extra lines of code.

    • @enzobonggio1250
      @enzobonggio1250 3 ปีที่แล้ว +5

      @@L4marca what kind of microcontroller is small enough to be hidden in a cable? Do you have a link to such a thing?

    • @ArnoldC97
      @ArnoldC97 3 ปีที่แล้ว

      where i can educate myself on this subject. to protect myself against such attacks of course.

    • @martimking1craft
      @martimking1craft 3 ปีที่แล้ว +2

      @@L4marca not a good advice

  • @lauras4817
    @lauras4817 4 ปีที่แล้ว +54

    Waving to my hackers in my webcam after watching this clip

    • @Smithy223
      @Smithy223 4 ปีที่แล้ว +2

      Laura S who else waved after reading this comment

    • @Kekekepeeps
      @Kekekepeeps 4 ปีที่แล้ว

      FBI meeeee 😂😂

  • @landonpeckham7752
    @landonpeckham7752 3 ปีที่แล้ว +64

    This happened to a school when the pandemic started and a lot of kids had school laptops and hackers turned on the web cams. Since most kids have them in their rooms they saw the kids dressing and other private matters. Be careful with what you do online folks.

    • @benargee
      @benargee ปีที่แล้ว +2

      I didn't hear this story but I did hear of a school that installed spying software like this before handing out school owned laptops for kids to take home.

    • @Alexe829
      @Alexe829 9 หลายเดือนก่อน

      Only when parents cop on . don't allow pc in a teenage bedroom! End of .

  • @intellectualhybrid2
    @intellectualhybrid2 4 ปีที่แล้ว +11

    Dayumm they got mitnick on the show.
    Major props for a pro

  • @darkfoxa
    @darkfoxa 3 ปีที่แล้ว +8

    I like this. There's really not enough information in the mainstream media to let people see and hopefully understand how a hacker may gain access to a system.

  • @Raduldo
    @Raduldo 4 ปีที่แล้ว +227

    Wait till my friend, the Nigerian prince hears of this.. Maybe thats what happend to that 8mil that I was promised.

    • @blakestam6235
      @blakestam6235 3 ปีที่แล้ว +2

      Because you are greedy,you wanna make quick money.😋

  • @Smithy223
    @Smithy223 4 ปีที่แล้ว +154

    Who brought Lester to Dr. Phil’s show

    • @extream360
      @extream360 4 ปีที่แล้ว +2

      Nice 😂 😂

    • @guanacojdm
      @guanacojdm 4 ปีที่แล้ว +3

      You’re so right he does sound like Lester lmao

    • @ZeroSpawn
      @ZeroSpawn 4 ปีที่แล้ว

      "that bank job that was you, right? Or somebody associated with you?"

    • @homiecamper7897
      @homiecamper7897 4 ปีที่แล้ว

      Planning for another heist with dr. Phill

    • @nicolasfeick6569
      @nicolasfeick6569 3 ปีที่แล้ว

      Hahaha

  • @forestriver437
    @forestriver437 4 ปีที่แล้ว

    This episode was blown out of proportion.

  • @pineslife5647
    @pineslife5647 3 ปีที่แล้ว +2

    Thanks phil, my bathroom camera needed one of these.

  • @ivangotyokes
    @ivangotyokes 4 ปีที่แล้ว +13

    Every single person there is just like "WTF...this is too much for me to comprehend".

    • @robinwhitemore5409
      @robinwhitemore5409 4 ปีที่แล้ว +2

      Because none of what he said made any sense at all

  • @ambermommasr1370
    @ambermommasr1370 4 ปีที่แล้ว +5

    Being watched is scary but more scary to me, is them putting photos of young children on your phone and then calling police on you!!

    • @maryvalentyne2553
      @maryvalentyne2553 4 ปีที่แล้ว +2

      Amber Nicole Massey yeah that’s what’s scariest to me. But hopefully they train units to know those signs but you just never know 😏

  • @IN-tm8mw
    @IN-tm8mw 4 ปีที่แล้ว +1

    which is why virtual nets and virtual port configurations are awesome. i also notice malware attacks when the system idle resources are higher then normal.

  • @zackpack8
    @zackpack8 11 หลายเดือนก่อน +3

    RIP LEGEND, HERO and GOAT!!!

  • @LOL-hc5fv
    @LOL-hc5fv 4 ปีที่แล้ว +45

    there's nothing funnier than knowing the passwords of all your friends and bringing it up in a conversation

    • @vdofficialchannel9841
      @vdofficialchannel9841 2 ปีที่แล้ว +1

      Well there is your next project !. Use it ethically though. I suggest you make a RAT in a language like python or java so it is cross platform(MACOS, WINDOWS, Linux) and go!

    • @computeroid6162
      @computeroid6162 11 หลายเดือนก่อน

      OH MY GOSH, this just gave me so many hilarious ideas!!!

  • @loudmouthisaac9487
    @loudmouthisaac9487 4 ปีที่แล้ว +199

    he’s making it 10x harder than it actually is lmfao.

    • @kurs1val
      @kurs1val 4 ปีที่แล้ว

      @@jakebarringham7248 It is really easy. Takes 2 steps

    • @menace2societies
      @menace2societies 4 ปีที่แล้ว

      nah its already easy, what if he made it complex😂

    • @taumus1
      @taumus1 4 ปีที่แล้ว +39

      Kevin Mitnick specialized in social engineering for his hacking. I think it was Motorola where he needed some technical specs from, so he would just call the office and ask some lower level employee to send it to him, like he was in another apartment.

    • @lexluthor8072
      @lexluthor8072 4 ปีที่แล้ว +9

      lol,guys dont know who he was....he's the best hacker back in the days,the most wanted

    • @mustafakhalid9348
      @mustafakhalid9348 4 ปีที่แล้ว +1

      @xOr you don't know how it works don't you? If he was born 15 years later, hacking tools would be 15 years more up to date and he would adapt to the changes, he is talented he did great at THAT time could you imagine what he would do if he was born at this time were every script kiddy can hack anywhere?

  • @berfranper
    @berfranper 4 ปีที่แล้ว +10

    That is a bad USB (that's how they're called), they make the computer think they're a keyboard, once they're connected they start typing a command on the console. The command is programmed and loaded on the USB beforehand. You can do almost anything with it, from granting remote access to the computer to deleting files or pranking a friend.

  • @shujamukhtar4563
    @shujamukhtar4563 4 ปีที่แล้ว +73

    At 1:46, Kevin being the greatest hacker still doesn't plug-in the cable in one go. Irony...

    • @m00se64
      @m00se64 3 ปีที่แล้ว +23

      The training for that exceeds one lifetime

    • @fiendfnm2828
      @fiendfnm2828 2 ปีที่แล้ว +10

      its the usb curse... it wont go until flipped 🙃

    • @saitamabaldy2566
      @saitamabaldy2566 2 ปีที่แล้ว +2

      he's not the greatest hacker of all time
      he's the most famous hacker of all time

    • @skinnyfeels6769
      @skinnyfeels6769 2 ปีที่แล้ว +1

      Every USB cable has three sides

  • @TechySpeaking
    @TechySpeaking 2 ปีที่แล้ว +7

    This is NOT how the majority of attacks happen, especially on older citizens.
    It's much more likely they'll fall for spam calls or phishing links than "someone gave you a hacked USB cable for remote access to your computer"

    • @drabberfrog
      @drabberfrog 2 ปีที่แล้ว

      Yeah, all these videos where they demonstrate how hackers do things are really not helpful for the average person's security. Maybe if you're a government official or a CEO of a corporation you might have to worry about a hacker getting physical access to your computer or hacking your webcam but for the average person these attacks take too much effort and are not profitable. What is profitable is guessing the terrible passwords people use for every single website and "hacking" their accounts. All these videos do is distract from that elephant in the room. It makes sense why they do it, the average person is probably entertained and concerned a lot more by a crazy hacker pluging in a flash drive and instantly taking control of a computer (even though the hacker already had access to it for who knows how long with admin privileges.)

  • @Soul-zj3wi
    @Soul-zj3wi 4 ปีที่แล้ว +22

    In this case the cable not did anything it was the utility, the Bluetooth Transmitter did the work, and you can be in Virginia, but he said that the transmitter works from 300 feet, so you need 1 more person..

    • @sleptiq
      @sleptiq 4 ปีที่แล้ว

      What utility? Can you be more clueless?

    • @geogmz8277
      @geogmz8277 4 ปีที่แล้ว

      The "Virginia" reference is more to illustrate that not necessarily is someone remotely close to you.

  • @finleyspencer5426
    @finleyspencer5426 4 ปีที่แล้ว +7

    Only with Utopia you can feel yourself truly protected.

  • @spiralsage
    @spiralsage 10 หลายเดือนก่อน +5

    RIP Kevin. A legend and an inspiration. Regardless of the gatekeepers calling him a script kiddie, his story intrigued a lot of people and paved their way into security or tech.

  • @kaelin1654
    @kaelin1654 4 ปีที่แล้ว +200

    Lol I loved his title: “World’s Most Famous Hacker”

    • @Coffee5432
      @Coffee5432 4 ปีที่แล้ว +7

      he is one of the most famous hackers

    • @nanta18
      @nanta18 4 ปีที่แล้ว +39

      @@Coffee5432 maybe famous yeah but not the best. best one is someonewho nobody knows of😂

    • @strider029
      @strider029 4 ปีที่แล้ว +24

      @@nanta18 Well it depends on category if we are talking white hat then this guy ranks high but if were talking black hats then yes you're right they're definitely anonymous.

    • @ExoGamerful
      @ExoGamerful 4 ปีที่แล้ว +11

      Mitnick was the best of his era

    • @AlexMkd1984
      @AlexMkd1984 4 ปีที่แล้ว +1

      @@Coffee5432 bah he just dumb

  • @BigerBoy
    @BigerBoy 4 ปีที่แล้ว +18

    Plot twist: It is an Apple ad...

  • @datcan
    @datcan 4 ปีที่แล้ว

    Dr.phil is the grandad everyone wants

  • @DarkCode
    @DarkCode ปีที่แล้ว +2

    Kevin Mitnick, a true legend of the game..

  • @Ronnocbot
    @Ronnocbot 3 ปีที่แล้ว +8

    The way they show the entire PowerShell exploit unblurred lol

    • @alexcorbett414
      @alexcorbett414 2 ปีที่แล้ว +1

      Why would they blur in anyways? You gonna run his script on your victims and give him access instead?

    • @Ronnocbot
      @Ronnocbot 2 ปีที่แล้ว +2

      @@alexcorbett414 it’s a liability that I’m sure they didn’t realize they were involving themselves in. With experience working in IT for about five years, this is not a good thing. A kid, or really anyone can get their hands on these easily and learn. Sure, they’re probably on google, but seeing it first hand on a tv show can spark someone’s internet. Trust me, back when I was in high school, seeing things like that is how I learned so quickly.
      Scripts for remote access are easy malleable and are not exclusive to giving only him access.

    • @alexcorbett414
      @alexcorbett414 2 ปีที่แล้ว +1

      @@Ronnocbot I totally agree with what you're saying about inspiring people. I just want to say that his script was most likely for some RAT meaning the other people will probably need that exact thing, I could be wrong though, I didn't pause it and read the script myself but I'm assuming he used a RAT since he was talking about using the webcam, microphone, etc. Maybe it was a meterpreter shell or something like that. Been a while since I used metasploit so I don't remember what you can really do.

  • @jahye3816
    @jahye3816 4 ปีที่แล้ว +22

    I never expected Kevin would meet Dr.Phil. It’s just confusing af

  • @courtney_doe7431
    @courtney_doe7431 2 ปีที่แล้ว

    He called it a stick and I love it

  • @thatdamnmanhd7984
    @thatdamnmanhd7984 4 ปีที่แล้ว +99

    Oh wow 2019 people just learning about ratting.

    • @iCortex1
      @iCortex1 4 ปีที่แล้ว +1

      My thought exactly... Big ol yikes

    • @ElDiablo123
      @ElDiablo123 4 ปีที่แล้ว +1

      Didn't know they could do it this way tbh

    • @iCortex1
      @iCortex1 4 ปีที่แล้ว

      @@ElDiablo123 this way and a bunch of even scarier ones

    • @thatdamnmanhd7984
      @thatdamnmanhd7984 4 ปีที่แล้ว

      @@ElDiablo123 I do it through pastebin

    • @H3Guide
      @H3Guide 4 ปีที่แล้ว +1

      Its really not a big suprise when majority of people dont even like using computers, you expect them to know what a rat is. Lol

  • @random3699
    @random3699 4 ปีที่แล้ว +194

    All he did was rat the other computer from a power cord that executed a command to powershell for the rat download.

    • @josephrodriguez5789
      @josephrodriguez5789 4 ปีที่แล้ว +37

      I know I couldn't help but laugh the whole time

    • @teddyjohnson284
      @teddyjohnson284 4 ปีที่แล้ว +9

      Ik.. mans used quasar RAT

    • @1127TOMI
      @1127TOMI 4 ปีที่แล้ว +3

      Lol yeah you can literally download quasar rat in 1min and do the same thing.

    • @OakedRS
      @OakedRS 4 ปีที่แล้ว +40

      And imagine how much Kevin got paid for this! Hilarious.

    • @catgirlow
      @catgirlow 4 ปีที่แล้ว +2

      lol ikr

  • @strikelight
    @strikelight 4 ปีที่แล้ว +4

    Remote computer in Virginia... Bluetooth trigger 5 feet away from Target... Convincing victim to press button on Bluetooth trigger to activate the payload drop... Seems like a likely course of events. *Eyeroll*

    • @kelosad
      @kelosad 4 ปีที่แล้ว

      strikelight are you dumb?

    • @PolakPL2002
      @PolakPL2002 4 ปีที่แล้ว +1

      But you realize that the Bluetooth device is not necessary. There can just be fixed delay before sending keystroke.

  • @solotrench6372
    @solotrench6372 3 ปีที่แล้ว +2

    Mitnick is the reason I’m in cyber security

  • @hasnainmalik8982
    @hasnainmalik8982 11 หลายเดือนก่อน +2

    Nobody will replace mr Kevin mitnick.. heats of sirr❤

  • @welliton6533
    @welliton6533 2 ปีที่แล้ว +12

    to find a real hacker is quite difficult. I was tricked twice, and it took me six months to find a hacker who actually did the job. Moral of the story: I managed to do my job more before I did it, I lost it because of two bad people.

  • @elonmusk452
    @elonmusk452 4 ปีที่แล้ว +25

    Once hackers learn about the pirate bay, they won’t need to hack people’s computer to find porn.

  • @radoslavsheytanov3044
    @radoslavsheytanov3044 9 หลายเดือนก่อน +2

    RIP Kevin Mitnick. Great mind in the field of Computer Science and Cybersecurity.

  • @IffyEdem
    @IffyEdem ปีที่แล้ว

    My cyber classes start tomorrow. I’m so excited 😊

  • @prata6938
    @prata6938 3 ปีที่แล้ว +4

    the cable thing is what i was worried about when my father bought an iphone cable from some sus brand, but luckily i found out that it’s somewhat legit

  • @peaceful4you408
    @peaceful4you408 3 ปีที่แล้ว +4

    Cybersecurity is so cool. I would love to get into that profession one day.

    • @tinu949
      @tinu949 3 ปีที่แล้ว +1

      Dude u do not know tha hardwork behind that
      So think twice

    • @ZhiLiangF
      @ZhiLiangF 3 ปีที่แล้ว

      @@tinu949 yea.. I cant even scratch the basic of programming yet😂😂

    • @goldengiorno6890
      @goldengiorno6890 3 ปีที่แล้ว +1

      @@tinu949 ikr i just started to learn about basic networking for a ccna exam and god damn it this shit's overwhelming. And the crazy thing is that network attacks are just a part of cyber security you need to have a strong knowledge about computer Hardware, software, programming as well python, c++, JavaScript... working with linux, scripting with bash, cracking software and that is just from the top of my head. Crazy stuff.

    • @v380riMz
      @v380riMz 2 ปีที่แล้ว +4

      ​@@goldengiorno6890 It takes years bro. I'm a 3rd years CySec student and the information is STILL overwhelming. You literally can't know everything. But in the end it all boils down to simple defending to keep out hackers; filter ports, setup an IDS/IPS consisting out of millions of rules, prepared SQL statements, input sanitization, least privilege policy, updating regurarily, password policies and keeping updated on the newest CVE's. Now this still scratches the surface, ofcourse giant webapps could have vulnerabilities, but how many of them are actual RCE's or SQLi's? Most companies only get hacked nowadays through human error such as opening phishing mails with infected files.

  • @greatdaddy4710
    @greatdaddy4710 2 ปีที่แล้ว

    The Cóndor did it again!!! Although it would amaze me if the malware would've been in -h mode.

  • @dawsonsanderson9108
    @dawsonsanderson9108 2 ปีที่แล้ว

    Reading Kevin’s book now. Really cool stuff

  • @kevorka3281
    @kevorka3281 4 ปีที่แล้ว +21

    What this guy isn't telling Dr. Phil is that if two hackers get on a single keyboard, they can have twice the hacking power. Be careful out there people...

    • @Louzyy
      @Louzyy 4 ปีที่แล้ว +5

      What u arent telling is that if three hackers get on a single keyboard, they can have three times the hacking power. Be careful out there people....

    • @kevorka3281
      @kevorka3281 4 ปีที่แล้ว +1

      @@Louzyy Dude don't scare people like that

    • @jackfavvv0280
      @jackfavvv0280 ปีที่แล้ว +2

      What if one of them is a midget? Does that mean they'll have one and a half the hacking power now?

  • @bastijnvos1295
    @bastijnvos1295 4 ปีที่แล้ว +69

    Hacker has macOS, victim has Windows
    Classic

    • @Ordanbocker
      @Ordanbocker 4 ปีที่แล้ว +14

      Well macOS is Unix based, so it is able to run many tools that something such as Kali Linux could

    • @JuicyJayJoCercei
      @JuicyJayJoCercei 4 ปีที่แล้ว +1

      @@Ordanbocker Puppy Linux is best

    • @azazmir9340
      @azazmir9340 4 ปีที่แล้ว +3

      Well thats because 80% of the users use windows as their os. So, malwares are specifically created to target a particular os or a program. Wouldnt be surprise if something similar could happen on a macos but it might be abit difficult to say the least

    • @googleinc6033
      @googleinc6033 4 ปีที่แล้ว +21

      Macs get equally hacked, its just less common because they have such a small market share.

    • @FathinLuqmanTantowi
      @FathinLuqmanTantowi 4 ปีที่แล้ว

      @@googleinc6033 or worse, the malware is so advanced and non intrusive that it silently lives on people's macbooks

  • @Arctic_silverstreak
    @Arctic_silverstreak 3 ปีที่แล้ว +2

    _Understandable, have a nice day_

  • @zymh2433
    @zymh2433 10 หลายเดือนก่อน

    This video is the one i met Kevin Mitnick and can't believe he's gone. I got a lot of inspiration from Kevin Mitinick

  • @g_lise7103
    @g_lise7103 3 ปีที่แล้ว +2

    So basically the cable will then act as a keyboard and do input, great one :D

  • @harrybanda
    @harrybanda 4 ปีที่แล้ว +5

    When did the Dr Phil Show become about tech?

  • @4esv
    @4esv ปีที่แล้ว +1

    Good old Mitnick, truly one of the greats if not th GOAT.
    That said, for BadUSB attacks it is commonplace to do "PowerShell -WindowStyle hidden" and then injecting keystones intot the hidden window. Any payload large enough will take too long to be typed out on the run box which can be closed easily even by an inexperienced user.

  • @venoxedits9691
    @venoxedits9691 2 ปีที่แล้ว

    Thanks for the tutorial

  • @plafar7887
    @plafar7887 4 ปีที่แล้ว +167

    So, I'm guessing the girl and two guys in the back, sitting in the sofa, were there probably because one of them is her husband and the other screwed his wife, so they need professional advice, sort out their personal stuff and get rid of all the tension. Instead, they have to listen to an IT lesson.

  • @rishadpb9768
    @rishadpb9768 4 ปีที่แล้ว +18

    The code was already injected and tested on the lap

    • @geogmz8277
      @geogmz8277 4 ปีที่แล้ว +2

      Of course dude.. 😁

  • @brittanysiebenhaar3627
    @brittanysiebenhaar3627 3 ปีที่แล้ว

    I love Dr.Phil. He does amazing work 💜 Dr. Phil and his wife Robin are such beautiful, pure souls💙

  • @vtggas_2958
    @vtggas_2958 3 ปีที่แล้ว +2

    I hope someday knowledge on computers and cyber security will be like Kevin 👍

    • @vdofficialchannel9841
      @vdofficialchannel9841 2 ปีที่แล้ว +1

      Practice and repeat is the way to go.

    • @vtggas_2958
      @vtggas_2958 5 หลายเดือนก่อน +1

      ​@@vdofficialchannel9841Can't believe Kevin died💔...

  • @Snutz.D
    @Snutz.D 4 ปีที่แล้ว +6

    Was that "The Stone" sitting behind Dr. Phil? 1:47 "Can you smellll-l-l-l what The Stone is baking?"

  • @Lorisa25
    @Lorisa25 4 ปีที่แล้ว +38

    I put a small piece of scotch tape over my webcam when not using it.

    • @johncloois3301
      @johncloois3301 4 ปีที่แล้ว +1

      @@giovanniinnavoig5422 When using your can you cover it? Haha But yes, being careful is important.

    • @jimbobjunior.
      @jimbobjunior. 4 ปีที่แล้ว +6

      Damn! Is that why i couldn't see you?

    • @ensnaredbyflesh1030
      @ensnaredbyflesh1030 4 ปีที่แล้ว

      Good call

    • @krueger2892
      @krueger2892 4 ปีที่แล้ว

      my computer has a little sliding cover specifically for that lol

    • @dwreus81
      @dwreus81 4 ปีที่แล้ว +1

      Is it clear?

  • @MrNateSPF
    @MrNateSPF 3 ปีที่แล้ว +2

    That's why whenever I get a phone randomly in the mail I don't use the charging cable that came with it. It hasn't happened yet but I'm ready if it ever does.

  • @meghdoothdutta7084
    @meghdoothdutta7084 ปีที่แล้ว

    Wow.. Nice Video... Thank you

  • @willmcrae5793
    @willmcrae5793 4 ปีที่แล้ว +15

    What would be helpful would be telling us how we can tell a normal cable from a hacked one.

    • @JoseFlores-nb5cl
      @JoseFlores-nb5cl 4 ปีที่แล้ว +9

      You can't tell from a visual standpoint.

    • @christinegizza1414
      @christinegizza1414 4 ปีที่แล้ว

      @@marlinlenchanteur4260 hi Marlin i am a VICTIM OF SOCIAL ENGINEERING DO I NEED A WHITE HAT HACKER OR AN IT TECH BUT THE ITTECH THINKS THERE IS NO SUCH THING

    • @christinegizza1414
      @christinegizza1414 4 ปีที่แล้ว

      @@marlinlenchanteur4260 sorry another question could it be the plug connected to the modem come

    • @tfae
      @tfae 3 ปีที่แล้ว +1

      You can't. Only plug in things you trust.

    • @MegaKopfschmerzen
      @MegaKopfschmerzen 2 ปีที่แล้ว +1

      You can x-ray the thing and see if there is any extra circuitry going on.

  • @22222imimo
    @22222imimo 4 ปีที่แล้ว +11

    I have learned allot from Kevin back on 2005 especially the social engineering part i got my first job by proving to a manager how his system was weak one phone call in front of him to his it department pretending to be the cisco support team sending email to that guy and getting access to everything

  • @terrordoidao8931
    @terrordoidao8931 ปีที่แล้ว +1

    This guy was a legend

  • @kerrieleidig
    @kerrieleidig 3 ปีที่แล้ว +1

    You know what's crazy, I live in Philly & I used to shoot live bands' shows & one night I got to the venue & realized all my camera cards were full. So I went to an electronics store on South St. to buy one & they offered to sell me one of their used cards (which they said they personally wiped) for cheap & I bought it. I shot the band & when I got home, I popped the card into my laptop's card reader to find all these naked selfies of a young lady... verrrry graphic ones. It was disturbing because they seemed like selfies & not something she'd want strangers looking at... I wonder how many others saw & downloaded those pics before they sold me the card.

    • @chemmaz
      @chemmaz 3 ปีที่แล้ว

      And what did you do with the card?

  • @benjaminturner286
    @benjaminturner286 4 ปีที่แล้ว +9

    0:24 Dr. Phil a freak 😳

  • @user-ge4uk9ui8y
    @user-ge4uk9ui8y 4 ปีที่แล้ว +7

    so the usb cable acted as a keyboard sending keys?

  • @angelicastella5018
    @angelicastella5018 3 ปีที่แล้ว

    He is reliable and competent

  • @anonymous-0
    @anonymous-0 ปีที่แล้ว

    Good to see this sort of information reaching the potentially uninformed..

  • @edwardstevens734
    @edwardstevens734 4 ปีที่แล้ว +48

    “Your talking about a little..”
    Sixnine: Dr. Phil has a white iPhone

    • @BuzzinVideography
      @BuzzinVideography 4 ปีที่แล้ว

      Edward Stevens bruh. My Samsung came with a white cord too

  • @ryanejoe
    @ryanejoe ปีที่แล้ว +3

    For those of you wondering how this is most likely done, its probably a modified usb rubber ducky, see a computer would scan a usb device and wont let it automatically run files on the flash drive,, but it lets HID(human-interface-devices) type things without a problem.. so a flash drive, would look like a flash drive but it would have code in it which will make it so that when the device is plugged in, it starts to type in commands which then downloads and runs malware... in this case he has made the cable become a keyboard using the same usb-rubber ducky concept

    • @SomeRandomPiggo
      @SomeRandomPiggo ปีที่แล้ว +2

      A less technobabble way to put it is that the device acts like a keyboard, opens the Run dialog with Win+R and runs a command to download a payload (the spyware) and run it

    • @SomeRandomPiggo
      @SomeRandomPiggo 10 หลายเดือนก่อน

      @sabinawendy4244 ong

  • @vivekgovila4148
    @vivekgovila4148 2 ปีที่แล้ว

    Very good video. Thank you for sharing your knowledge and wisdom. I have a query. Is it possible that we can open multiple tabs for a website which allows us to open just one tab officially?

  • @note2owns
    @note2owns 4 ปีที่แล้ว

    One of Kevin's handles in his prime was Knight Lighting.

  • @BuzzinVideography
    @BuzzinVideography 4 ปีที่แล้ว +6

    Just saying QUESAR RAT is the second most simple thing to do if you want to see inside a computer.
    Pretty sure you could get a copy online if you wanted. LOL

  • @Lalitaditya100
    @Lalitaditya100 4 ปีที่แล้ว +33

    It's so cute how people are getting so riled up about this... Being a white hat hacker for a while now made me trust nothing with a cable attached to it... Not even the microwave, it's literally how the world is, and most people haven't the faintest clue!

  • @kbto
    @kbto ปีที่แล้ว

    If you want an explanation:
    USB can be used for more than data transfer, for example your keyboard and mouse are plugged in via USB which is exactly what is happening here. The little thick part on the end of the charging cable actually contains a very compact computer which pretends to be a keyboard and sends keystrokes to the computer.
    The keystrokes here are that it holds win+R to open the run window (which allows you to run executables with arguments) it calls the powershell executable with the arguments /w 1 /ep bypass, or windowstyle 1 (hidden) and execution policy bypass (let’s you execute scripts) then it starts a try{} routine (attempts to run code within, if error it exits) and uses net.webclient and invoke-expression to download a powershell script (list of commands) into memory and execute it.
    This opens a powershell script that runs in the background of the computer and most likely will take commands from a server, execute them, and send the output back to the server.
    This is what’s called a reverse shell, it is the first step for an attacker to gain access. Anything you can do on a computer and more is possible from a reverse shell, including downloading files from your pc and downloading additional malware to the PC.

  • @hack-talk9098
    @hack-talk9098 10 หลายเดือนก่อน

    I’ve been praying to get this script

  • @marko1216
    @marko1216 4 ปีที่แล้ว +10

    Too bad, i dont have a camera on my computer.

  • @mynamesjeffhardly
    @mynamesjeffhardly 4 ปีที่แล้ว +5

    Good thing I don't have any money. I just sent the last of it to a Nigerian prince from my emails lol

  • @diegolove173
    @diegolove173 3 ปีที่แล้ว +1

    When I used to go to China to potential customer my IT manager used to tell me do no take USB from them

  • @shwartz166
    @shwartz166 4 ปีที่แล้ว

    Thank you