All The Ways To Hack Your Phone: Phreaked Out (Episode 3)
ฝัง
- เผยแพร่เมื่อ 4 มิ.ย. 2014
- Subscribe to MOTHERBOARD: th-cam.com/users/Motherboa...
Over the course of our "Phreaked Out" series, we've seen how devices such as urban control systems, moving vehicles, and smartphones are not impervious to hacks when connected to a network-cellular or wi-fi. In our third and final episode,we check out a slate of real-time phone hacks to tackle the question of mobile phone security.
Unlocking L.A.'s Traffic Grid: Phreaked Out (Episode 1): bit.ly/1r03DpC
How to Hack a Car: Phreaked Out (Episode 2): bit.ly/1ps2BB7
All The Ways To Hack Your Phone: Phreaked Out (Episode 3): bit.ly/1mfBwef
Follow MOTHERBOARD
Facebook: / motherboardtv
Twitter: / motherboard - วิทยาศาสตร์และเทคโนโลยี
This video was great at showing us what the risks are by using our mobile phones. What it didn't do was show us ways that we can help protect ourselves or at least beef up our security in some way, shape or form.
I go to school with thousands of students, all connected to the same network where they have to type in the school username and password each time they arrive to get internet. So basically I could just recreate the internet, the website, and divert the data that comes through and basically I hacked thousands of students?
Uh, I'll be back in a day or two, with a degree.
+Christoffer Ronaasen "with a degree" or two... or 30...
Dang lemme know
+Christoffer Ronaasen savage
DNS spoofing with meta sploit
+Christoffer Ronaasen I go to a school, with many students aswell. Default user and pass unchanged is 123456 for everyone, and default user is lastnamefirstname. I tried the default combination for every student at one point, and got a shitload of passes that way. Then you can always clone websites and use MITM to get more secure passes, since you are all on one big network.
Out of the whole series this ep is best! I was a bit troubled seeing some of the earlier stuff as it was very sensational and relied on a series of ideal circumstances. What is outlined here is very real and has not been acted upon by many vendors who have left this open to guarantee a seamless user experience. Great vid!
i love that you can see each program they were using!
Thanks for the tutorial.
I would LOVE to see you try what they did. I'll be siting in the back ground waiting to laugh when you get arrested. Because you fucked up and didn't use a VPN.
Workshop VPN? Because a VPN is safe! Three words: Deep Packet Inspection
JordanIsMLG Yes i understand that he would still be fucked but.. i was just trying to make a point that he would be very stupid to try anything like this in a public manner especially if he doesn't know what it actually does and how it works.
VPN's are cancer, Tor used to be ok, VPN will give all your info away right after a fucking deputy sheriff calls in, you're litterally throwing everything out of the window with a VPN. Nah m8, proxy chains is way better and use a C&C if you need the speed
I'm a discreet person and so I don't usually recommend online but when you find out something really good and worth recommending that is kingslogistics.net then you should never hide it because there may be some peeps out there who are in desperate need of your discovery. To those looking for a professional hacker or private investigator for any kind of marital or relationship issues or investigations, hurry and make contact hackers on kingslogistics.net
Thing is (as they showed the Vice dude visit JPMorgan's website 3:40) the modified/fake website is clearly missing the padlock and the usual green URL text that is standard for Extended Validation SSL certificates. But it still proves a point and it's really interesting.
Most people probably would never look at that. Only people that know what to look for would know to look for stuff like that to make sure if there safe or not
Yes correct. Just be sure to check for those signs
MIDAS Do you not realize thatvthey can imitate that 100% you really think they wouldn't add a picture of a stupid padlock to make it more real?
True, and people and browsers should check for those padlocks... even more scary is that they sometimes even show a padlock as hackers can get certificates easely, and real scary hackers can make the certificates that for a browser apear to be legit, AND for the said domain. ... realy tricky and dificult, thats why we should start using the more recent secure internet and just like recent browsers started to allow newer certs and not allow older certs (as in standards, not expireing dates)
Hub. U Ibyhugb bb. Ukmoh
B
So you're giving us awareness to this problem, yet you don't provide a solution, great reporting!
Motherboard should make more videos like this I must admit this video was really good
Dcbbjj
G
Definitely a few lessons learnt. Shocking that this level of hacking was so advanced when we were all relatively ignorant back in 2015. Makes one wonder how far hacking has come
I never use my phone for anything too personal, like i never use it for anything banking or i keep certain info separate from it. If I even buy a game online I use the prepaid cards to do it.
I've been poked fun at for some of the precautions I take but I'm the one sleeping good at night knowing I'm probably ok.
Great video! thanks for sharing !
awesome series!
OMG, EXACTLY WHAT I NEEDED -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- i got spyware from TRACKWILLY.com
I love how a video made to raise awareness about illegal hacking has become an advertisement for hacker sites. LOL
Lol
After all hassle in my marriage and after several suspiction that my partner was seeing someone else which I didn't believe at first I thought asking for divorce will be a better pill to swallow but I'm the other hand, I hired the computer wizards *hackjama1* on Instagram and he get me real evidence to follow my instincts and text on whatapp +12818108791
I've seen a lot of recommendation about *hackjamal1* on Instagram +12818108791 on whatapp I was force to check him out hireing him i get the I get the satisfaction I've been looking for
WOW that's awesome glad to hear
Dude awesome vid!!!!
@motherboard great vid! its 2 years old, any chance you guys are thinking of doing an updated vid?
And 2 more years gone by, ^^^^^^^^^^^^^^ THIS!
The even scarier thing is that you can buy quadcopter control boards that have GPS tracking themselves, so you could just set a few co ordinates for the drone to fly to and hover there for a minute or 2, and come back, and you wouldn't even need to leave your house.
For those wondering, WireShark was the software being used by Mat Solnik on 13:18
good work guys!
I want more content like this, great job Motherboard
Gfass guyttw
I've been in the industry for over 35 years and have held a basic premise about technology since early in my career.
Anything that can be done with technology, can be undone with technology. Anything you can make with technology, you can break with technology.
When I first told this to the government people using tech that they thought was secure, they laughed at me. They aren't laughing now.
If its built by man it can be accessed by another human.This will only end when AI starts to design the software,not a good place to go
Stephen hawking's last speech was about ai and it taking over. Technology is getting crazy now. I remember aol and having punters and progs on my 130 pound pc. Now I have a lap with 3 linux distro kali parrot and arch. And 3 on usb
this gov is spying on us. theyre still laughing
That is scary and epic at the same time.
we need more of this
The problem about these techniques, at least initially, is that it seems impossible to protect yourself against them. I wish they'd go into more details about the procedures and tips to prevent it. If someone can get access to my cellular data passing through, I don't think anything will prevent me from that, uneless I turn off the phone, which let's be honest is very user-unfriendly. It's about time they create a new wireless tech that has amped-up securities built-in in the specs!
I hacked my own body and got to control all my body functions. It is amazing you can do things like that.
yeah, more and more it comes to be that other people can hack your body too..and the best thing about it is that you still think that the decisions that you made under the "brain hack" are your decisions - cos your brain/your awareness can't tell the difference
I am reporting u to DARPA
@@videoman7659 school shootings being lead this way to press and damage the image of our 2nd am ] this just the beginning of the rabbit's hole to dig into to they playing God were just the test subjects to them wake up People
@@videoman7659 can hear a Lol
I'm a discreet person and so I don't usually recommend online but when you find out something really good and worth recommending that is kingslogistics.net then you should never hide it because there may be some peeps out there who are in desperate need of your discovery. To those looking for a professional hacker or private investigator for any kind of marital or relationship issues or investigations, hurry and make contact hackers on kingslogistics.net
To clarify with the banking example: While you can re-direct pages by injecting packets, capturing regular internet traffic from banks in order to collect user information is quite hard considering that when you interface with the bank it is over an encrypted connection. That said if one were to inject packets making the user go to a page that looked exactly like the banks homepage and asked them to enter their credentials the hacker would get your bank login information.
I love that they are talking about IOT and now we are there.
Read Samy Kamkar's wiki. Really interesting history.
Those are some beefy moobs...
I keep telling people this when they are in the public with their laptop and tablets. One person response was that they do not know about that stuff. Your ignorance is a hackers strength, video's such as these open our eyes and that makes it harder for the hackers to hack us. Thank you.
That was very informational
If you use HTTPS connections and don't just confirm all warnings, you will realize if someone is messing with you.
interviewer: im gonna login to cnn
sammy: hopefully well see something that isnt true
Word to your motherboard!
MAGNIFICENT...!
What programs are these guys using..I'd love to mess around with this stuff just for fun
Well firstly they are running linux one was running Ubuntu and another was running Kali linux in a virtual environment. I noticed Wireshark was being used im assuming they were probably also using Ettercap when they were doing arp spoofing in terminal.
right
Jasager/PIneapple is pretty much easiest Mad-in-the-middle solution and Sammy's drone hacking software has concept code on his website IIRC should be found by Googling SkyJacking.
Maltego was used for GPS location and other info gathering.
I was furious about knowing what was going on on my partners cell-phone and ended up getting scammed twice,so i found a Russian hacker on a TH-cam post and i heard he's pretty good and yes he made me know every detailed information on the phone. So guys so many scammers out there,i want to take my time to share you the Instagram page of a real hacker i know @WINGLOCKHACK. Save your time and money.
I believe this is called "EvilTwin attack"
Thank you . It's scary out there. Stay positive. 🙃
Ty4 da awareness
and now i want to play watch dogs even more D:
Goodluck hacking my crappy Nokia :D
google "GSM cracked", you're screwed too XD
It's easy as long as you have a sim inserted.
Not so crappy if u can't hack it
Expect your SMS messages and voice calls to be eavesdropped. Slightly more difficult than an internet connected phone but even if there is no data service these other services can be tapped into.
@@enigmaticzee2620 Why only with Sim?
Very interesting and informative video. My only ?Q is what can laypersons do in real time to be less vulnerable? Avoid Wi-Fi, blackout cover our cameraphones, which are the best anti-malware apps right now? As helpful as these vids are they don't typically offer beyond the weakness frequently enough.
I wondered the same thing 👍
I wondered this as well. One thing I get is that apps will be responsible for most of the phone's connections. when you download an app, it tells you what it has access to without your permission. some apps require these resources (such as pokemon go needing your camera); but others don't (why does candy crush need to monitor my phone calls)?
The first step to protect yourself is to use apps that require as little permission as possible. this will also help your phone run faster, since less apps are trying to compete for resources.
Also, some apps will collect data for statistics. decline this if you don't trust the app.
If your phone is rooted, you can use an app called superuser, which prevents apps from using resources they shoudn't.
Scary stuff.
How much dedicated ram do you guys recommend to hack the NSA
*dedotated wam. Ftfy
idk bro, probably not enough. Might want to download some at chase.com
You actually need gpu processing power
And also ram sorry
And cpu processing power ass well
I really want to know what software was used for the drone takeover thingy XD
Snoopy
On top of that, he was using Kali Linux in a virtual machine on the desktop to view the data once collected. Kali Linux is a very powerful distro which comes with a wide range of applications that suit whitehat hacking.
i got kali myself to XD thanks for letting me know!! :D
Dunno if it'll let me post a link but search Skyjack Samy Kamkar; the guy talking in the video wrote the software and it's up on Github github.com/samyk/skyjack
Ever since the notification hack popped up on my dad's phone yesterday I'm watching a bunch of these videos.
This video: visuals of the Care Bears and the smurfs, with the soundbed/music of Terminator.
How does one even begin to learn this type of stuff?
Learn a programming language, C, C++, Simula-67, JAVA etc., using the command prompt etc. then after that join the deep dark web, Google "dark Web", use Tor, download the software, get some books, done deal.
Install kali linux
SuperAwesomeCaptain McFluffyPants I did a little research and I believe I should learn C and download kali linux. Any good TuTs for understanding bash command line or whatever it is.
TheWeaponzzz
Go ahead, best of luck mate, I am also thinking of learning hardware stuff, I already know JAVA, C, C++ etc. Wish me luck!
You mean software right? :D SuperAwesomeCaptain McFluffyPants
I just want the lightbox in the background... : )
Awesome bros
This is inspirational
4:00 he looks like “this guy is gonna find my naked photos”
SAMY IS MY HERO
Ted talks??
Eslam Alalamy
His MySpace worm
Easy and only working app I found so far is *Xnore Spy App* google it
th-cam.com/users/s4myk
mySauce
God damn this is awesome
LOL at the beginning of the video guy has a "hackertyper" opened on the screen. MUCH PROFESSIONAL
It's actually the source code for the software running on the drone.
Or we could just use a jammer that covers all the frequency spectrum
Basically, Snoopy is just a flying WiFi pineapple?
IT'S A DRONE!!!
THE COOLEST THING EVER!!
Eslam Alalamy not the coolost thing but up in the list
not even
The creation of Snoopy was inspired by the Pineapple, but mostly from frustrations with using it. Snoopy is modular, distributed, syncs data between instances, has data visualisation and extraction capabilities.
Basically I couldn't use the Pineapple in anger, so I built Snoopy to go beyond PoC. Using Snoopy on the Drone was combining two passions (drones and hacking), and offered extra capability (range, stealth, following).
Pinapple
The British guy smiling from his invention make me so happy !
i like how you had the dog snoopy on the drone
You can't just alter/snoop on HTTPS traffic as easily as shown, you need to install an over-riding global certificate on the phone first else you will get warnings someone is a MITM. However yes, currently SSL protection is a joke.
HTTP 2.0 is looking to solve most of what was shown as exploitable in this series thankfully.
I've seen a lot of recommendation about *hackjamal1* on Instagram +12818108791 on whatapp I was force to check him out hireing him i get the I get the satisfaction I've been looking for ...
You could theoretically perform a SSL stripping attack first.
Yah I think what they're showing in the video is actually just access point spoofing, that way credentials can be easily retrieved
I remember back when I was a kid you could get anyone's IP on AOL instant messenger with just a packet sniffer. I used to trick them into downloading BackOrifice and then open and close their CD tray. I thought I was a master hacker...
That was the birth of hacking. You could've been hacker as. Career.
when I was a kid someone hacked my computer an did that..was it you?
I remember when windows by default did not turn on security. I looked for shared computers and was able to log into my neighbors that used the same cable internet.
I and a friend disabled panda parent control by deleting it on ms-dos to see porn on IT classes back in 7th or 8th grade. We were gods lol
Nathaniel Graham that last line almost made me spit out my coffee. That was a big laugh. Thanks
Sammy is the shit . He's got a lot of awsome stuff out there.
Remote sniper rifles!! ROFL hahaha, awesome stuff
Her password was "upyours" at 13:27
Up yours what? 😂😂😂
no matter what security they come up worth it will always be hackable. cat and mouse. forever.
Urm I'm only seeing this now! Thanks for highlighting this, I turn my wifi off if out of the house and that gps thing that watches you also.
Good one
Wow, this was actually pretty interesting because I know exactly how to do all this and very easily, but had no idea using the same name would make them connect to me. I can already shut down most peoples internet connections with my phone and even redirect or force pictures and video(although the last part doesn"t always work), but I never do it. It's interesting to know now how it could be useful.
+Miister Josh Good for you
Shut the fuck up
What course did u do to learn all these
Computer Science... Also, a lot of hackers have never set foot in college. Its literally in their DNA to figure shit out for themselves. Its what makes a TRUE fucking hacker.
The Ace TroubleShooter 😂😂🙌🙌❤
So Watch Dogs isn't as sci-fi as it claims to be...practically all the hacks they do in the game can already be done! This is kind of worrying....
yes it is like that But is not that easy like they show
Good looking out thank you this is a good video nobody put it out there like that maybe we get mine something about cell phones kind of clue do it operating systems are supposed to look like for devices such a boot loaders for each device so people can see what it's supposed to look like Looking forward finding out some of it myself
The kids we were too cool to even say hello to, are taking over
Honestly, just owning it and not trying to hide and not trying to hide it is partially while I watch you, it is honorable thing to do and it will make the rest of the job more believe when you are called out of the spots like that, so thank you ⬆🆙⬆
It's funny, there are so many hackers like samy who just use pre-existing tools to launch attacks, and he's only famous for his MySpace worm
Apathy
Go to his TH-cam channel and tell me then he's a script kiddie.
he's highly skilled
Apathy there's really no good reason to reinvent the wheel, if there's a good tool out there and satisfies your needs just use, and btw this guy is a genius
Ethan P I've seen his youtube channel, and I know he's skilled. I didn't say he was a script kiddie.
Apathy
My bad, Sorry.
I misinterpreted your comment.
Ethan P Don't worry about it lol
Hi, thanks for uploading this video. However, I noticed the German subtitles are the ones from Phreaked Out Episode 2. Can you please change this so my friends can watch this amazing video too?
Knowledge is power keep it humble and dont take shit for granted.
Watch Doge m9 it all makes sense
why the hell did he remove the bezel on his macbook? 4:14
SkyJacking looks so cool imagine all the free drones you could get :D
And this is before 7 years!!
@5:00 "I'm gonna log into CNN..... We're gonna see something that is hopefully not true"!!!!🤣
I'd say there is about 💯% chance of that WITHOUT a hack!
cvxvxv Lmao exactly
Having tried all hack tools on TH-cam,I must say @andrewhack4 on Instagram is the only working one.
The audio mixing on this video makes the "s" sound too crisp and distinct
+goatstaog jus like how you speak?
+goatstaog hahahahahaha
Im not surprised thats all you took away from this video.
This series of videos has gotten better and better. This episode was excellent. The first one was rather boring. Nice work.
Thanks for the info. Who woulda Knew?
Sorry but 4 months ago I exposed how to use a Pi & Arduino w/Adhoc capabilities to 1). Telnet to the WiFi (aka Drone).
- This actually KILLS the device on unsecured drones & will literally DROP it.
Now, unless you changed the firmware, that drone the moment you remotely connected to it while in use, should have dropped it aka reset as you can't re-pair devices in the air, UNLESS again the exact session is magically hijacked but so far, that would be on custom firmware to in-air release a paired connection to another device...
2). Using WiFi broadcastings', you can determine the drone closet to you by the Level of signal strength. So, in that regard that is 100% accurate & simple to do.
3). Most *NIX machines won't connect to a WiFi network if the MAC doesn't match as its saved in the WiFi config, sadly Windows doesn't care.
4). MITM attacks are awful & scary. However, exactly why you should use a VPN on your phone, therefore the connection to your internet (or whomevers- assuming they're giving an exit-node to the net) won't matter as you're tunneling securely via encrypted connection to another machine in which will obtain data that's in your packets being sent properly & unless your VPN is hacked, should be ok as the to/return packets are encrypted & can't be read.
I really love these videos lately. They're finally showing others what some of us have been saying forever and ignored.
If any one wants to start doing like these. from where and how he can sart
@@shreyanshsingh1576 probably learn alot of computer stuff and networking and use arduino amd raspberry pi
I'm a discreet person and so I don't usually recommend online but when you find out something really good and worth recommending that is kingslogistics.net then you should never hide it because there may be some peeps out there who are in desperate need of your discovery. To those looking for a professional hacker or private investigator for any kind of marital or relationship issues or investigations, hurry and make contact hackers on kingslogistics.net
7:55 so the solution is to just disable the wifi?
Not what I found out... Smart tv are being used to spy on us.
That’s all cool but how did you make that cool rectangle light behind them?
Does anyone know what software was being used with the snoopy program? the one with the blue dots
I think you've shared too much screen info in HD quality. But all they are are little tips.
Specially for those that are in the IT industry the dangers of using smartphones is something that we all know...still...We all use it! You could also have covered other vulnerabilities regarding smartphones. Not just related with communications. Still 4 out of 5 for these video because 5's are simply not given!
I cover my camera lenses and my family laugh at me for it. I don't care though, as I know anyone could be watching or listening to me. All the apps people download, you have to click on agree, which allows access to basically everything on your phone. I wish I could turn off the microphone somehow. Everyone needs to realise what they are actually agreeing to when clicking on the, allow access, but nobody seems to care though.
I cover my camera too, and literally everybody thinks I’m weird.
we used to be able to trust companys, its a habit we need to break..
I cover my cameras too.
People ACT like they are texting ,when they are ACTUALLY videoing EVERYTHING to review later.
If the app was FREE, YOU ARE THE PRODUCT!
download ANY app from Google play, and you have just given away And EVERYTHING ON YOUR DEVICE!
Please,where I can listen this soundtruck?
This blows me away...we are not safe anywhere or anytime...I'm leaveing my phone at home never will i leave with it again
Good thing I'm amish.
I'm a barn hacker
I 'll hack your candles to flicker from time to time.
Martin Drkoš I hacked the sky, why you think clouds are moving around and shit? sudo apt-get wind
Why are you on youtube if your amish?
Actually that's a big misconception; the Amish have and use IPhones. They use it while away from the home and when they get home they turn it off and put it away. I'm being 110% serious! If you don't believe me Leo some reasearch.
These people are the soldiers of the future.
I'm a discreet person and so I don't usually recommend online but when you find out something really good and worth recommending that is kingslogistics.net then you should never hide it because there may be some peeps out there who are in desperate need of your discovery. To those looking for a professional hacker or private investigator for any kind of marital or relationship issues or investigations, hurry and make contact hackers on kingslogistics.net
@the sickest noodle Lol its true. All branches of the military have hacking units.
@the sickest noodle Wait, who were you calling a boomer? lol
an arms race that will never end, a arms race thats coming to light on discord servers "account cracking"
I felt a strong urge to scan all my devices with anti virus after this video haha.
I'd say my hat may have a touch of grey.
I'm a black fedora hacker. I will hack your M'operating system
+johnniedehuff too funny. When I was a kid I use to do bad stuff on computers but that was back in the 80's and the days of BBS's. Man I loved the bus system. I use to run war-dialers on all the local area codes. Found some interesting headers out there, lots of fax machines, some private networks, and stuff you don't want to call a second time for fear of disappearing forever. Good times.
How can I learn this knowledge to get a job with the government?
+Nomadic Rocker Follow Tai Lopez's 3 easy steps to KNAW-LIJJ. It only costs 200 fuel units per day. Best choice I ever made.
Become a criminal first
How do you make the snoopy devices
will there be an ep 4