How Hackers Could Wirelessly Bug Your Office

Поделиться
HTML-код
  • Опубликовано: 20 сен 2024
  • You think about securing your laptop, but what about your desk phone, monitor, or printer?
    In the second episode of Can I Hack It?, made possible by Mr Robot on Amazon Prime, white hat hacker Ang Cui demonstrates hacks on “embedded devices”-objects that contain computing systems but that you wouldn’t necessarily think of as computers.
    At his office in New York, Cui shows us how he can turn an office phone or printer into a bugging device using a piece of malware he calls “funtenna.” This exploit makes the equipment transmit data over radio frequencies so it can be picked up by an antenna-without the hacker ever having to go near the device.
    It’s a pretty high-level hack, but as Cui says, if he’s thought of it, you can imagine someone else has.
    Click here to watch Mr. Robot on Amazon Prime: amzn.to/29zli1w
    Subscribe to MOTHERBOARD: bit.ly/Subscrib...
    Follow MOTHERBOARD
    Facebook: / motherboardtv
    Twitter: / motherboard
    Tumblr: / motherboardtv
    Instagram: / motherboardtv
    More videos from the VICE network: www. vic...

Комментарии • 893

  • @maxhale2382
    @maxhale2382 7 лет назад +1166

    I think the most important part of hacking is having as many windows open as possible. Preferably with scrolling multicolored text.

    • @suicidaljell
      @suicidaljell 6 лет назад +57

      Max Hale that’s how you can tell they are deep in it.

    • @seanld444
      @seanld444 6 лет назад +86

      Not true. You forgot the flashy fingers gliding across the keyboard like it's a race against time.

    • @iKingRPG
      @iKingRPG 5 лет назад +21

      Max Hale when in command prompt do "color a" there. You are a hacker now. Congrats.

    • @rabbitdrink
      @rabbitdrink 5 лет назад +14

      @@iKingRPG just do base64 -w 0 < /dev/urandom

    • @zxxczczczcz
      @zxxczczczcz 5 лет назад +1

      @@rabbitdrink what does that do?

  • @qwertywtflol
    @qwertywtflol 8 лет назад +873

    Sponsored by Amazon, the biggest collector of customer/consumer data on the planet.

    • @Falcrist
      @Falcrist 8 лет назад +68

      Second biggest after Google IIRC. Also, don't forget about Microsoft and Apple.

    • @ElXtronic
      @ElXtronic 8 лет назад +3

      & they still aint worth a damn thing.

    • @Jesus.the.Christ
      @Jesus.the.Christ 8 лет назад +13

      Don't forget about the NSA.

    • @Falcrist
      @Falcrist 8 лет назад +21

      Jesus Christ They're not a collector of customer/consumer data. They're a collector of *_EVERYONE'S_* data.

    • @Jesus.the.Christ
      @Jesus.the.Christ 8 лет назад +5

      Falcrist What's the difference? Don't forget that government is a business. It's an overly large and cumbersome organization structured so that parts of it can make some people a lot of money.

  • @bdeflorence
    @bdeflorence 4 года назад +16

    It's called RF imposition. The Russians used this technique to bug the US Moscow embassy in the 70's. At the time, it required a very large antenna to collect the signals. Basically, the vibrations of the molecule of air (i.e. sound) will make any object in the room also vibrate, and that includes electronic circuit boards. As per Maxwell equations, as mentioned by the chap, a vibrating electronic circuit board, even if switched off, will generate an electronic signal. It then becomes just a matter of collecting that signal.

  • @sapphiro
    @sapphiro 8 лет назад +109

    You can bug me all you want, I have put a sticker tape on my phone's camera. All you can get is me moaning.

    • @WilliamSchlott
      @WilliamSchlott 8 лет назад +3

      I'd rather get my girlfriend moaning thank you.

    • @nawman2033
      @nawman2033 8 лет назад +9

      Fuckin hell William you sausage

    • @potato511
      @potato511 8 лет назад +4

      and keylogs, and passwords and usernames, and facebook profiles which have pictures ;D

    • @mario6279
      @mario6279 7 лет назад +1

      Benjamin Lafever yup that good old spyware

    • @AshisKumarSahoo1
      @AshisKumarSahoo1 7 лет назад

      moan your mother's Maiden name and that should be it.

  • @adrianmego1
    @adrianmego1 4 года назад +23

    The critical piece of information he gave is that there has to be an entry point into your network, and for him it was a CV containing malware. 80% of attacks are initiated this way, so - secure your endpoints or get decent mail service guys and gals...

  • @jaqb17
    @jaqb17 8 лет назад +285

    0:45 holy shit that setup!

    • @xteam29
      @xteam29 8 лет назад +19

      Those 2 Dell monitors are just crazy!

    • @edg6779
      @edg6779 8 лет назад +26

      2 dell monitors and a shit apple keyboard

    • @edg6779
      @edg6779 8 лет назад +5

      ***** i have a mechanical keyboard, 10k dpi mouse, h440 case with i5 4590 and a 760 but my monitor is a boring 1920x1080 60Hz dell :(

    • @joaobernardocosta
      @joaobernardocosta 7 лет назад +10

      The funniest thing is that the chair is as expensive as one of those monitors.

    • @markrigsby2107
      @markrigsby2107 7 лет назад +3

      jaqb17 Gotta love it

  • @clashwithmoi8926
    @clashwithmoi8926 5 лет назад +56

    what they are doing is super underappreciated. wired devices with embedded systems really need to start insulating components so that no information leaves the device wirelessly

    • @diggydice9041
      @diggydice9041 5 лет назад

      Yep & my laptop is a Republic of Gamer's unit & even though I didn't know about
      blue-tooth for my pc, my neighbor did know & was busy trying to gain access
      when I caught him red handed...... When I buy again It'll be decked out in the
      best defensive stuff I can get/set-up. It really sucks how they violate people.
      peace

    • @genkiferal7178
      @genkiferal7178 2 года назад

      my understanding is that those devices are being used to jump from one device to another to transmit data that customers want to have transmitted - or have signed off on. Maybe a frig manufacturer wants customer usage info for marketing or product design reasons, for example.

  • @8224shivaram
    @8224shivaram 5 лет назад +93

    This is one of the key reasons why following PCB design guidelines For Reduced EMI is so critical :P

    • @mrinalthakur3459
      @mrinalthakur3459 4 года назад +7

      Just shield the entire thing after finishing the population process

    • @RDHDShorts
      @RDHDShorts 4 года назад +1

      @@mrinalthakur3459 thats perfect and cheap also

    • @carterpeel625
      @carterpeel625 3 года назад

      @@RDHDShorts not cheap.

    • @Reth_Hard
      @Reth_Hard 3 года назад +2

      All my devices are wearing tin foil hats, including me.

  • @Aaron-dt3xz
    @Aaron-dt3xz 4 года назад +48

    I like how the thumbnail just says motherboard with a guy pointing to a motherboard

  • @jason-ge5nr
    @jason-ge5nr 8 лет назад +759

    If this guy figured it out what has the NSA been able to do for the last 15 years

    • @CellularInterceptor
      @CellularInterceptor 8 лет назад +112

      The government agencies have way better systems than demonstrated here. I can neither confirm nor deny its existence.

    • @Kyle.Moda.Deluca
      @Kyle.Moda.Deluca 8 лет назад +38

      The POC being explained here is nothing new by no means! In the early 90's, Cult Of The Dead Cow (Hacker Group) went before Congress to speak about such things. They had fears that, if they can do it... so could other people. They spoke about a method known as tempest ( en.wikipedia.org/wiki/Tempest_(codename) ). They've known about this ability for quite some time now. It's just become super easy, since the advent of Wifi based devices!

    • @doublebubleguy12
      @doublebubleguy12 8 лет назад +29

      I know it sounds impossible but I know a retired officer who use to work in a prison system back in the 90s. They used a database of files on all of their prisoners on an off grid intranet that could only be accessed via the prison system. Well it just so happened the FBI showed up asking for two prisoners that needed to be taken in for classified reasons not even telling the sheriff the reason for it. They pulled out a piece of paper with a screenshot of the two prisoners files which was obviously screenshotted from a computer within the off grid database. They had never been to the prison system before and it would have been impossible to gain access to the information over the internet since every computer was offline. The Sheriff asked the two agents how did they get that information as only that single prison system had it, the agent told the sheriff that it was classified information on how they obtained the screenshot from within the prison. The agents left with the two prisoners and told the sheriff that they were never there. Either two things I can think of that happened. "A" Their was an undercover agent disguised as a cop working their downloading information to a drive and sending it to the FBI which sounds kind of stupid considering they could have just asked the sheriff for the files on the prisoners or "B" They gained access through the power lines somehow.

    • @jason-ge5nr
      @jason-ge5nr 8 лет назад +6

      the data storage facility in utah, the big one, has internet but they used the term 'airgapped' to describe all the connections to the outside world.

    • @vlad-pm2zr
      @vlad-pm2zr 7 лет назад +14

      Question should be "what can they *not* do"

  • @ibimon
    @ibimon 8 лет назад +166

    By the way this is second time I see red balloon mentioned in security tech, looks like they're about to become pretty big. Good luck guys.

    • @maxp9292
      @maxp9292 6 лет назад +4

      Good to now that we have willy billys support

  • @jeffbrownstain
    @jeffbrownstain Год назад +2

    Six years later and this exploit has yet to be seen in the wild

  • @keybraker
    @keybraker 6 лет назад +2

    The problem with these old hacks, is that they are super easy to defend. People who have sensitive data use better printers, and not stupid ones obviously.

  • @RustyB5000
    @RustyB5000 8 лет назад +3

    2 hours after this video was posted that guy disappeared from outside his apartment.

  • @Plur307
    @Plur307 8 лет назад +3

    Properly shielding electronics would make them not vulnerable to this hack. But the hack is still quite clever. All it takes is a thin sheet metal cover over the circuit boards to absorb almost all the emitted radio waves.

  • @nickigna
    @nickigna 8 лет назад +52

    Feels like Motherboard is cranking up the paranoia on "everything hackers".

    • @JohnDoe-sp3dc
      @JohnDoe-sp3dc 4 года назад +6

      @@shenshenani5913 motherboard is NOT for analysts and other security professionals it's for uninformed tech illiterate people.

    • @egg-iu3fe
      @egg-iu3fe 2 года назад

      the real hackers to be afraid of are the ones in government. They are spying on you right now.

  • @Flankymanga
    @Flankymanga 4 года назад +2

    You could say that every electronic device has it.... because what they are doing is turning an PCB copper path into transmitting antenna by quickly changing voltages and generating EM field. But there is a catch... you would not normally have connected a printer and a VoIP phone on the same corporate network. Meaning it has to go through either managed switch or a router - in which case there is a high chance that there would be a firewall rule to drop the packet.

  • @screwthenet
    @screwthenet 6 лет назад +2

    All this has been foretold. And this is the type of crap that makes low tech or no tech so much more desirable.

  • @dkipu266
    @dkipu266 3 года назад +3

    You could build all this, or pay Google or Amazon for the feeds they continuously collect from devices you use everyday. Even using a VPN Service is of marginal benefit if you’re going to authenticate to any of your online accounts, as those accounts and your devices registering to networks are going identify you when you authenticate. That said, what this team is doing is really important work, as these devices are very vulnerable, and for all of the dollars we spend securing PC’s and Tablets, a good pen test will show you how vulnerable your voice and printing devices are as well...this team takes it to a level.

  • @ggvic7
    @ggvic7 8 лет назад +2

    "through the network" is the key phrase. It's easy if you have direct access to the devices that you want to exploit if they're 2 feet away from you, like shown in the video, but if you're outside the network, you'll still need to bypass layers of security to get your software through.
    Still, pretty cool though.

  • @JaySmith-rv4ro
    @JaySmith-rv4ro 6 лет назад +2

    It kills me how people talk about how they’re so surveilled by the gov but are spied on and robbed (through tech) by their fellow man.

  • @gatekeeper9161
    @gatekeeper9161 4 года назад +5

    LOL WOW THIS KID FIGURED OUT WHAT SOME OF US HAVE BEEN BRUTALIZING FOR 20 YEARS AND MORE

  • @siriperera6974
    @siriperera6974 6 лет назад +1

    Actually, all this is already in play in every household. It is very easy to confirm yourself what this video says. Take that part
    at 2:25 minutes about switching on the microphone on the phone (i think he mentioned switching the input/output ports). What he meant was just switching on the handsfree on the phone on without you knowing and without having the led light come on. When this happens, the microphone now on just completes the induction loop system that is your home. Now all your conversations are reflected in the magnetic modulations in the wiring in your home. All converted to FR signals etc and software radio will pick this up. But more so is that all the buzzes and pings and white noise sounds in your living space will modulate to your thinking, with that microphone in your phone switched on. Hence your thinking can be known by anybody who is listening or anybody who knows how to read tonal modulations. It is like learning a new language and with time you should be able to listen to your thinking in all the appliances around your home. But that is what they are doing at the moment.
    If there is such a thing as the funtenna software then they will get them downloaded via either your phone line or your internet line. In some cases they are both the same line. If you want to hear this signal coming into your home to switch on the handsfree for a listen in, you can do this by attaching an induction loop receiver to the access point for your phone line. You only need to tape it to the access point gadget - it will pick up the magnetic fluctuations from the phone access point.

  • @gwengold1342
    @gwengold1342 5 лет назад +12

    I would work for this guy for free just to gain knowledge

  • @stevenpersoon
    @stevenpersoon 5 лет назад +4

    For most, if not all embedded devices it's not possible to flash a microcontroller by JTAG or bootloader without extra external hardware. Also, devices without a dedicated antenna wouldn't be abled to transfer any reliable signal... And what about RF shields...

    • @furatkafir3819
      @furatkafir3819 3 года назад

      yes, i thought about this limitations too. even with new devices with possibility to upgrade firmware via internet there will be phisical limitations on transmitting power and receiving range, even if you use low bitrate protocol like LORA.

  • @mrepic789
    @mrepic789 8 лет назад +15

    But how powerful (in watts) is the transmission

    • @furatkafir3819
      @furatkafir3819 3 года назад

      he receives only few meters away, i think it is not powerful

  • @davidmyg7825
    @davidmyg7825 5 лет назад +1

    i'm suspecting my neighbor is running some kind of illegal business famously known as "macau scamming" or "money game". everyday i saw more new recruit coming to his house every morning and never leave the door. they rarely come out and always hiding in house and everyday call for delivery. do you have any tech advice or solution?

  • @savagescientist3835
    @savagescientist3835 4 года назад +1

    please add part 1 in description so i can see full series
    thank you

  • @socrates_the_great6209
    @socrates_the_great6209 5 лет назад +1

    So its not the wifi antenna inside the printer sending the signal? It must be?

  • @briancrane7634
    @briancrane7634 5 лет назад +1

    HE'S SAYING that ANY WIRE that can be made to vibrate mechanically IS an antenna that transmits an EM field...NO NEED for an embedded microphone or RF module...ANYTHING THAT HAS WIRES can be forced to be a transmitter...SCARY! [BTW NO printer manufacturer worries about security...they say: "That's the CUSTOMER'S PROBLEM! We make PRINTERS!]

  • @jethro9341
    @jethro9341 4 года назад +8

    Those dudes had no idea what to do with themselves with a cute girl that close to them!

    • @elck3
      @elck3 4 года назад

      What would you do?

    • @jethro9341
      @jethro9341 4 года назад

      @@elck3 business as usual my dude

  • @maynardjohnson3313
    @maynardjohnson3313 4 года назад +3

    I don't think that any of Maxwell's equation has anything to say about the feasibility of hacking embedded devices.
    It sounds scholarly though.

  • @potato511
    @potato511 8 лет назад +4

    3:15.....oh god that look....they've already bugged us all burn everything!

  • @ramsesrameez5430
    @ramsesrameez5430 3 года назад +1

    Now that's is what i am talking about. Hacking with a tiny mother board.

  • @INeedAttentionEXE
    @INeedAttentionEXE 6 лет назад +2

    Anything that has RF in it thats embedded, uses the ARM archetechture :D. Lifes good

  • @nokoru1
    @nokoru1 5 лет назад +5

    6:42 "...and what makes it particularly impressive is how it can transmit data using radio frequencies..."
    wow!...wait...

    • @skinnybob_
      @skinnybob_ 4 года назад

      groundbreaking technology here

  • @ibimon
    @ibimon 8 лет назад +1

    I suspected that HR ATS can be hacked trough applications, but didn't think it was as easy as he explained.

  • @myongpark
    @myongpark 7 лет назад +1

    Hey, he used the word "theory" in the correct context! That's more impressive than the skills, or maybe an indicator of why he has them.

  • @zachsylvester309
    @zachsylvester309 5 лет назад +2

    Speakers can be microphones. *Takes out buzzer from the motherboard.

  • @XxprobertsonxX
    @XxprobertsonxX 8 лет назад

    Motherboard video with a motherboard in the thumbnail. About time.

  • @TheYamakasiize
    @TheYamakasiize 4 года назад +1

    Thats why I don’t use any technology and none in my possession.
    I am now commenting through a wooden stick and a rock tie to an owl.

  • @sultanmehmoodghaznavi6312
    @sultanmehmoodghaznavi6312 3 года назад

    "Cheap radio is called Tom Cruise..." LoL
    I'm switching to analog phone after watching this.

    • @archygrey9093
      @archygrey9093 3 года назад

      Analogue is not very secure at all

  • @NetIncarnate
    @NetIncarnate 8 лет назад +1

    Trust these guys to reference Neuromancer! Excellent work.

  • @Juniormintz584
    @Juniormintz584 Месяц назад

    Can this also be done using fm 📻 instead of am ? Why use such a low band frequency is that to avoid getting caught on car radio ? What’s up with that ?

  • @Dex99SS
    @Dex99SS 6 лет назад +56

    Funny how all of the "common office equipment" was "hacked by software only, never touching it"... Yet every one of them had their cases removed, wires hanging out, ribbon cables jumbled out the sides, alligator clips roughly plugged in supplying power, lol... None of this was done elegantly over a network via software. But instead, all of it is hypothetical via hardware mods, physically turning electronics into radios by adding RF transmitters to them... which is the large PCB hanging off of the ribbon and alligator clips. And if we are really pretending that we are sending RF out of circuitry which has no radio, no antenna, no tuner what so ever... and just glossing over the hardware issues there, pretending you can turn any resister, capacitor, and IC into a transmitter... Well, as a radio engineer who develops tower technologies / installs said tech, I can tell you that they would (if they could) transmit all of about a half an inch in distance... at best. Without dedicated amplifiers, tuned antennas, and a frequency capable of both distance and some level of penetration, it would be hopeless. And seeing as how most inexpensive two way radios, which are built for this task, can't even do all that well in a commercial building environment... i highly doubt your magic phone radio made out of software that looks like PCB's hanging off of ribbon cables out of the back of a busted open but never touched office phone is going to do much better. This entire piece is basically fluff...

    • @BigDaddy-yp4mi
      @BigDaddy-yp4mi 6 лет назад +17

      You COMPLETELY missed what the fellow was talking about. It CAN and HAS been done for years...by NSA. Danger Douse was their program from over 10 years ago. He piggybacks on that. No microphone, no speaker, fuck with the currents going through them, they then emit radio energy in predefined contexts which can be picked up with SDR equipment and then decoded. The disassembled parts were for testing purposes. The stuff attached was to show there REALLY is stuff going on but to prove it, it has to be disassembled. Jesus, and to think people like you probably vote....

    • @jonesbbq307
      @jonesbbq307 6 лет назад +1

      Then tell me how can a printer without any antenna emit any radio frequencies?

    • @jedi.knight7260
      @jedi.knight7260 6 лет назад +7

      Colson Xu install malware on device which can be done remotely (that’s why a resume was sent to force someone to open and send the malware to printer) afterwards the wires and components of the device can be turned into radio transmitters. That’s why it’s called hacking, to change its original purpose into something that it wasn’t intended to do. The device is then FORCED to emit radio signals to a radio receiver using software instead of hardware and an AM antenna. A transmitter is a different kind of antenna that does the opposite job to a receiver since it turns electrical signals into radio waves that can travel thousands of kilometers around the earth. Hacking might not be your thing if your unable to search for knowledge since that’s what hackers do, they critically think and search for answers, rather then demand them.

    • @travismailsa1
      @travismailsa1 6 лет назад +2

      Please use google when you ask such stupid questions. Do you know any current passing over a conductor produces EMF? Start there and use google

    • @travismailsa1
      @travismailsa1 6 лет назад +4

      Its demonstration in this video, secondly the devices were taken apart to discover and then test these exploits, whereby they can then access them remotely and exploit what was DEMONSTRATED in this video.

  • @MrGoatmeat
    @MrGoatmeat 8 лет назад +51

    the London look X D

    • @burnzy3210
      @burnzy3210 8 лет назад +1

      what?

    • @TBlasku
      @TBlasku 8 лет назад +14

      He was referring to the gap between her teeth :)

    • @coolxify
      @coolxify 5 лет назад

      Its supposed to mean the leather jacket black leather boots etc

    • @peterodriguez9191
      @peterodriguez9191 4 года назад

      London has fallen. Like the movie

  • @Em.P14
    @Em.P14 5 лет назад +3

    THEY HAD A VIPER MK II IN THAT SHELVE !!!AWESOME GUYS!

    • @hajiosama9352
      @hajiosama9352 3 года назад

      Where? Kindly mention time.

    • @Em.P14
      @Em.P14 3 года назад

      @@hajiosama9352 im sorry but this was 2 years ago, no chance that i would be able to remember that. Id have to rewatch the entire thing again

  • @thedarkside13
    @thedarkside13 5 лет назад +1

    0:55 My boy eating Noodles and Sriracha!...

  • @felixxdenolo6793
    @felixxdenolo6793 4 года назад

    Next how hackers can steal your lunch from the break room cuz it definitely was not Ron

  • @rijaja
    @rijaja 4 года назад +3

    1:02 My phone is very insecure. Most of the time, it can't gather the courage to show me notifications when I get a text message. Unfortunately, phones still aren't accepted in therapy.

  • @imtatarin
    @imtatarin 8 лет назад +2

    Soooo, what programming languages (and overall knowledge) is required in order to do something like this?

    • @jumasayeh4574
      @jumasayeh4574 5 лет назад +3

      Stanis Baratheon well you'll have to know how to reflash hardware using the network, creat an ai that will find the best wire to use as antenna for your signal .. knowledge about radio signals and modulation, you'll have to know how to write a hex firmware for a phone , printer or whatever you're hacking .

    • @thatoneguy1205
      @thatoneguy1205 4 года назад +1

      it's not always just software, sometimes it's hardware, like eprom, and processing, like how I never would have figured out how signals are processed if I never learned the basics of electronic hardware, and a bit of software.
      also signals are generated by a electromagnetic inductor, using a analog signal, it reaches the other thing, and from there the analog ports on the processor turn the analog signal into digital signals, which are interpreted into binary.
      analog= wavy signal
      digital= sharp signal

  • @novovires5625
    @novovires5625 8 лет назад +1

    Hacking and Machine learning Engineering are the most researched skills sets on the Market right now.......

  • @Serj772
    @Serj772 5 лет назад +1

    0:55, is that guy in his undewear? hahah

  • @roaldjensen3120
    @roaldjensen3120 4 года назад +1

    Why not point a laser beam at the window you want to evesdrop into, then am / fm modulate instead of all that ?

  • @dave.h4075
    @dave.h4075 4 года назад +4

    In a world that demands certification to prove our qualifications. How does a hacker prove that he is 'white hat', especially in his alone time.

    • @Clay7744
      @Clay7744 4 года назад +1

      Pay them enough to not want to be black hat

    • @dave.h4075
      @dave.h4075 4 года назад

      @@Clay7744 because 'enough' will always be sufficient? :))

    • @Clay7744
      @Clay7744 4 года назад

      @@dave.h4075 Then we make them kings (im a pen tester)

    • @dave.h4075
      @dave.h4075 4 года назад +1

      @@Clay7744 I guess the point I was trying to make is that one doesn't simply come out of the hive looking for the job unless someone spills the beans all be it few in some cases.

  • @fancynet
    @fancynet 8 лет назад +1

    OK, I know this is not really the point of this video, but the used phone here was officially considered "End of Life" since January 2015. I wonder if his malicious software could still be loaded to currently used models/firmware (considering there are still other 79XX Models which are officially supported by Cisco)

  • @Maniacguy2777
    @Maniacguy2777 5 лет назад +1

    Fantana technique is used by military people sending code messages through sound.

  • @durrani1983
    @durrani1983 4 года назад

    Wow white hat hacker is generous teaching others free of cost, hence succeeded in fooling every one that he is not helping his hacker dudes. Nice game man

  • @AshleyVanSteenacker
    @AshleyVanSteenacker 7 лет назад +1

    Well, moast of these things run some sort of linux and most devices just pass UI commands trough as root. Although this might not work on all devices. since some of them have a full on metal enclosure to reduce EMI. But then again. There is already a Botnet of IOT so I'm not surprised of anything anymore.

  • @AeoIian
    @AeoIian 7 лет назад

    Nice! May work well in open areas but not through bunkers of concrete.

  • @AnymMusic
    @AnymMusic 6 лет назад

    I am so happy to have a hacker as a friend.

  • @WayneJohnsonZastil
    @WayneJohnsonZastil 8 лет назад +1

    Lol that was right next to the printer! he should demonstrate if bit further away!

    • @monsterpda
      @monsterpda 8 лет назад +2

      I wonder too what the range of the antennas of regular non-wireless printers and phones are... The receiving and is less of an issue, you'd just need a bigger antenna and better amps.

    • @mrmagoo9901
      @mrmagoo9901 8 лет назад

      Any wifi capable device can be hacked from anywhere

    • @monsterpda
      @monsterpda 8 лет назад +1

      mr magoo
      Well, theoretically yes. But the method they suggest is a little less brute force and seems much more sneaky. The phones needn't be wifi capable either.

  • @christophervenkus1276
    @christophervenkus1276 8 лет назад +16

    We had all better behave.

  • @jasonsalz7185
    @jasonsalz7185 7 лет назад

    With such kind of wireless bugging. Is there any device/method to detect such bugging?

  • @MathiasLM89
    @MathiasLM89 8 лет назад +1

    I'm wondering why there hasn't been a Die Hard 4 scenario yet.. maybe someone is gearing up to make it extra spectacular?..

  • @RicondaRacing
    @RicondaRacing 4 года назад +1

    This guy has a dream job

  • @Granite
    @Granite 8 лет назад +4

    Typically the door is wide open. This seems to be a bit excessive.

  • @evanwetmore423
    @evanwetmore423 8 лет назад +106

    Finds out massive exploit in phones... Uses a apple keyboard

    • @jelpy
      @jelpy 7 лет назад +39

      Sgt UltraKill the fuck does this even mean

    • @cokbagus23
      @cokbagus23 7 лет назад +18

      means a lot

    • @Linkz64
      @Linkz64 6 лет назад +3

      Evan Knight an*

    • @Linkz64
      @Linkz64 6 лет назад +3

      Evan Knight Apple*

    • @Linkz64
      @Linkz64 6 лет назад +2

      Evan Knight Also have you ever heard of NSA? Google DangerDouse.

  • @BUrbbable
    @BUrbbable 8 лет назад +1

    Time to put metal shielding in between isolation material when building my house :)

    • @cookman45
      @cookman45 4 года назад

      The house across the street was built with chicken wire throughout in the late 1800s and they can't get an internet signal and most places cannot send packages there because they say their address cannot be found!

  • @Caleta280
    @Caleta280 8 лет назад +1

    What if an office only used talking cups? How do you tap that?

  • @TheTarrMan
    @TheTarrMan 7 лет назад

    So is this hack going to be involved one of the next episodes of Mr Robot? Pretty cool!

  • @mahmoudaboelsaoud253
    @mahmoudaboelsaoud253 5 лет назад +1

    wow!, i wish to work and learn from and with these guys they look well talented

  • @codydixon9635
    @codydixon9635 8 лет назад +7

    Some of those guys have setups to die for D:

  • @protoolsfanatic7276
    @protoolsfanatic7276 4 года назад +1

    well this is a bit ( no pun intended)scary. this is from 2016 can you imagine what is going on in 2020?

  • @L3uX
    @L3uX 8 лет назад +99

    Nsa has already been doing this years ahead.

    • @MrLogannator
      @MrLogannator 8 лет назад +1

      Just look at DangerMouse

    • @MrLogannator
      @MrLogannator 8 лет назад

      ***** its the code name for the Nsa program that listens in on your phone call and monitors them

    • @beating2
      @beating2 8 лет назад +1

      Snowden leaked documents on how NSA spying on their own people some 3 years ago.... You live in a cave or something......

    • @ultort
      @ultort 8 лет назад +2

      Yes, it's well known, you can have a look to the "NSA Ant Catalog". But hacking to RF without modifications on a non emitting device is almost impossible because the signal will most likely be very small, maybe under the noise level. If you have wifi on a printer, you may be able to hack the wifi to transmit data via RF.

    • @arzoo_singh
      @arzoo_singh 6 лет назад

      And way more then we know ....

  • @scodiofficer0012
    @scodiofficer0012 5 лет назад +5

    *You can't hack our office,we all use Incognito Mode*

  • @native2704
    @native2704 6 лет назад

    this is the type of magic i would do if i was a magician lol. best hacker

  • @F1delF1estasMC
    @F1delF1estasMC 8 лет назад +6

    uploaded by "motherboard", tumbnailof a guy pointing on a motherboard....

  • @KickYouInTheThroat
    @KickYouInTheThroat 2 года назад

    fkin KNEW it. i couldnt prove it but i had a strong feeling this was possible

  • @dahudie
    @dahudie 4 года назад

    This isn't new technology. It is like 30 years old. They have just found new ways to use it.

  • @kekistanimememan170
    @kekistanimememan170 Год назад

    TEMPEST is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).

  • @Arek_R.
    @Arek_R. 4 года назад +1

    Yeah it works in "lab" enviroment.
    But if they would be to do it in real life scenario then theres 1000 things that could cause it to not work, in other words it's not that simple.

  • @leweed3049
    @leweed3049 Год назад

    So cool, btw is this openSource?

  • @khankhattak.
    @khankhattak. 3 года назад +1

    dont you need a printer which has wireless connectivity (wifi, bluetooth etc ) to hack it and send RF data to hackers pc?

  • @xorxpert
    @xorxpert 6 лет назад

    I wonder why signals aren’t encrypted? I guess it could cause latency but signals in which you can easily just read its binary and convert is crazy, and that it’s just a string and not wrapped inside of packets

  • @sultanmehmoodghaznavi6312
    @sultanmehmoodghaznavi6312 3 года назад

    I had this idea all the time but didn't knew it was possible.

  • @cringe8166
    @cringe8166 5 лет назад +1

    So these are the kids who fuck with my internet

  • @_msnnanbakbshhsn
    @_msnnanbakbshhsn 5 лет назад

    Is there a video talking about security vulnerabilities in hardware like processors and such.

  • @TongTangTorq
    @TongTangTorq 8 лет назад

    Would the hacker have to have access to the network that the phone/printer is on, in order to send it the software to produce RF signals of the audio?

  • @Dylann8245
    @Dylann8245 5 лет назад +1

    Does this guy send resumes as an .exe?

  • @leobav2425
    @leobav2425 5 лет назад +1

    So in essence, if the manufacturer used a dpdt switch that opened up the mic on the handset, you wouldn't be able to listen.

  • @TROwens
    @TROwens 5 лет назад +1

    adequately constructed faraday cage enclosing your office.

  • @dikatlon
    @dikatlon 8 лет назад +1

    Why are they using the term hacking in this way? It is cracking. Hacking is something good, not evil.

  • @annazapolska9748
    @annazapolska9748 4 года назад

    Incredible. Is that you hacked my phone?? And stol all my data ?

  • @squid13579
    @squid13579 Год назад +2

    This man looks like whiterose(dark army) ! 🔥🙌

  • @tomsbunk3790
    @tomsbunk3790 5 лет назад

    The men in black jacket only smile while enjoying their coffee break..

  • @pasoundman
    @pasoundman 5 лет назад +2

    Normally phones aren't connected to printers though !

  • @thomaslindell5448
    @thomaslindell5448 5 лет назад +1

    Yah that bit rate is awesome

  • @sergiogranadamoreno
    @sergiogranadamoreno 8 лет назад

    nice to see victoria back in these vids

  • @apnearocker
    @apnearocker 5 лет назад +1

    How did it start with the resume?