To try everything Brilliant has to offer -free- for a full 30 days, visit 👉 brilliant.org/DanielBoctor/. You'll also get 20% off an annual premium subscription! PART ONE 👉 ruclips.net/video/9KfY1hlibZ0/видео.html THANKS FOR WATCHING ❤ JOIN THE DISCORD! 👉 discord.gg/WYqqp7DXbm 👇 Let me know what type of content you would like to see next! 👇 Thank you for all of the support, I love all of you
I didn't think it was possible to explain an exploitation so clear and concise in a video format. Props! Demystifying technology is the first step in education imho.
I am highly impressed. I work in IT but more from a troubleshooting helpdesk standpoint, not as a programmer or cyber expert. I could only follow along conceptually, however I was pleasantly surprised I was able to follow this to the degree someone who lacks the education in the baseline elements involved could follow. That is not only highly appreciated, but a testament to your ability to craft a story of the information, and to perfectly time recap moments of a previous points to reiterate their importance to that step and help the information sink in. Even more beautiful was that you don't overwhelm the viewer with graphics which would actually go against the absorbing of the information, and the simpler animations effectively portray the concepts while letting us focus on the information it's portraying. I looked to subscribe at the end, and hadn't even realized I had already subscribed mid-video.
You can tell someone has such a good understanding of something when they can explain it so well to someone with limited knowledge, and they walk away feeling like they completely understand how it works. I've got basic knowledge of the C language and understand computers use memory and execute code, I used SMB to watch a movie file from my computer on my TV once, that's about it. I've never written a Windows application. Yet I now undertake how wannacry worked. Thank you
@@zestiny_ that's not what happened (he addressed it in the first video). You seem to have problems understanding spoken English. Probably not your first language.
Isn't it interesting how the feds indicted those who used it, but no one sued the creators (enn ess ay) for losses due to them creating the code for the exploit then allowing themselves to get hacked (irony) and the exploit leaked...
Also just to add onto this there’s a clause in the US Constitution that makes it impossible to sue to US Government and get monetary damages. So if I’m seeing this right the real reason Kaspersky got banned was because they found out about this disgusting worm…
I think they should be held accountable for their own security failure, but not for creating the exploit. Otherwise, every security researcher would also be a criminal. But security researchers are not criminals, and the work done to discover modes of exploitation along with proofs of concept are needed to harden security in the first place. Unless you can prove it was being used by them, they hadn't done anything wrong yet (although I personally 100% believe they either did, or intended to)
@@cinderwolf32 I disagree, you are right that the point of finding exploits is to harden the system. But the NSA didn't inform about the exploit until after it leaked, which means they were helding it (and maybe using it) as a weapon.
If history tells you something: "It was the USA." is a phrase that comes up waaaaay too often for most Americans liking probably. But if you are betting man and the USA is in the game of possible culprits, odds are the best way to multiply your investment is to bet on the good ol' USA.
@@HansJuergen-ps8bt tbqh it was literally the usa this time. The NSA found critical vulnerabilities in windows and neglected to inform Microsoft until someone else stole it. We don't know when the nsa discovered these vulnerabilities, but Microsoft could have had years of additional time to fix these exploits if the nsa didn't get too attached to their new toys.
Small tip, have the NT5x source at hand while watching this video. It will give a picture how the functions are written, including warnings that the os2fealist conversion function doesn't check stuff much itself, it's duty of the caller to do that
This video is as beautifully crafted as EternalBlue 😁 Really, fantastically done! I find that this two part series was the perfect balance between technical knowledge but not overly difficult to understand. Would love more exploits breakdowns like these!
You are not dumb, you just haven't learnt all you need to know yet. Keep hurting your brain until you understand what you want to understand and don't put yourself down for not understanding without effort because this is exactly what you have to do to improve.
If this interests you there are multiple websites and resources to learn, its starts out simple so most anyone can learn something, and if you so happen to have the right kind of mind you should be able to learn all of this you just gotta put in the time
Daniel: "We now have all the ingredients needed to understand how everything comes together" Me, a Network Engineer: "Ah yes. so hackers have to byte the bug who bit into memory and created a word hole in my page"
Amazing video that somehow manages to simplify such a complex exploit so that even a beginner (like myself) could understand it! I did, however, get a little bit lost in the end and have a question regarding the final parts of the exploit. How does it send the payload and then control where it ends up? Does it get sent via the (overflown) ntfealist?
@@DanielBoctor Why did you exclude that kaspersky stole the program from the nsa worker and somehow "hackers" go ahold of the program. You omitted that important information in part 2. I can only assume you purposefully did that considering how much research you did for this video
@@zestiny_you should more upset that the governments around the world are exploiting hardware, and software, and not notifying the corporations of it, keeping us less secure with our information. Who gives a fuck how we found out.
Video name" Who was really behind the largest computer worm" Proceeds to provide detailed technical explaination how it works only a bunch of niche experts can grasp
So what does Kaspersky have to do with this? And I heard something about "if you are using an os before windows 8" in the video. Who even still uses that?
several endpoints, servers, ATMs, you name it. There are tons and tons of equipments that hasn´t been updated over the years and they are vulnerable to this. I would dare to bet that more than 50% of the companies out there still have legacy OS in their inventory
So, is there a third part coming where you mention how Kaspersky is relevant? Or did you just completely forget the title of the first video? By the way, maybe make the title of the videos xyz - part 1/2 etc so it is clear that they belong together.....
I didnt understand anything, can someone tell me why Kaspersky got banned ? Did kaspersky found out that USA and Microsoft having backdoors to everyone ?
Not surprised over several years now all YT channels that "test" security software really hate Kaspersky Avast and AVG. When in 23 years of personal experience these were and still are the best consumer grade security software companies on the planet! Low system resource impact (NO BUILT IN ROOTKITS) and actual people on the customer service end! Plus Windows Defender is a pile of donkey shit!
I was thinking about this for the entirety of this video. How the hell do you know of this very specific exploit? They must have had the source code one way or another because this depends on deep analysis of the source code that even regular SASTs won't identify.
Hire former MS devs. Bribe them / threaten them. Or / and do the same to MS. The romanticism fades when you realize it's just thugs leveraging their monopoly on violence and someone else' tax money.
So because I had no need for older versions of SMB and remove them from my system after getting rid of Windows for workgroups 3.1 , and using novel protocols to communicate between os2 and NT instead of SMB is why I wasn't attacked?
Gotta hate Advanced Persistent Threats. I liked it more when hacker groups where small, isolated, and didn't have millions of dollars and an intelligence apparatus.
There is a video size limit on YT for newer/smaller subscriber count videos. However checking after I've made this post this exceeds the subscriber count for that to be an issue.
@@RowanHawkins This limit (15min initially) could be removed by adding a phone number and this worked like that about 15 years ago. Assuming he's partaking in the ad revenue (AdSense) he has had limits disabled a very long time ago.
Compatibility. The crux of the exploit is that it's in the oldest version of SMB. And that code had compatibility code to be able to communicate with OS/2 machines. This is also probably why the inventors of this exploit found it. They looked specifically for old code and protocols written at a time with a lot less knowledge about these types of attacks.
coincidentally? i rumor they already got an AI model able to decrypt cryptography.... gossips though but this gossips really aligned with the leaks, leak it to test this specialized AI capabilities in real life!
Do you think your boy scout patches teach this understanding correctly do you think they provided y'all with the full rotation to get this understood in case someone else comes out as a problem what do you think they just learned how to money everybody through it
Spoiler alert... there's worst one (let's say one) for bluetooth! Just take a look at you services, than your devices (hidden ones too) and do the thinking yourself ;)
So one of my next questions is through some of this understanding of this worm what does concept of cancer or whatever it is going around and our big organizations trying to prevent the next big terrorist attack. Do you suspect we've already been hit with this attack
I'll be cracking up to I mean we had defense attorney Lloyd have to go in and get his head looked out we had Russian President Vladimir Putin have to go get his looked at then we had bad and son get himself in a little bit of trouble when traveling over on a laptop and y'all think y'all are going to force the change of the Constitution of America
Must remember RUclips does pay this people unless they reach amount of viewers, so use what you have don't judge because already know it don't understand why you bother pointing it out hear 🙉
Normally I would hate on someone for padding time to get more ad revenue, but this is extremely advanced computer science stuff. I'm a self taught programmer and I'm glad he explained it slowly.
To try everything Brilliant has to offer -free- for a full 30 days, visit 👉 brilliant.org/DanielBoctor/. You'll also get 20% off an annual premium subscription!
PART ONE 👉 ruclips.net/video/9KfY1hlibZ0/видео.html
THANKS FOR WATCHING ❤
JOIN THE DISCORD! 👉 discord.gg/WYqqp7DXbm
👇 Let me know what type of content you would like to see next! 👇
Thank you for all of the support, I love all of you
I didn't think it was possible to explain an exploitation so clear and concise in a video format. Props! Demystifying technology is the first step in education imho.
thanks for the support! means a lot ❤️
I'm still confused on why we are against them for finding and telling of an issues, malwarebytes and others do it?
Stop saying "we" to stop the confusion @@everythingpony
@@everythingponybecause the US state department needs some way to defend genocide
by the time it's revealed that SrvNet contains a pointer to a function, it's all over man...... it's always the freaking callback handler
It is crazy how much dramatic suspense can be bundled into some squares representing memory on a computer heh
I am highly impressed. I work in IT but more from a troubleshooting helpdesk standpoint, not as a programmer or cyber expert. I could only follow along conceptually, however I was pleasantly surprised I was able to follow this to the degree someone who lacks the education in the baseline elements involved could follow. That is not only highly appreciated, but a testament to your ability to craft a story of the information, and to perfectly time recap moments of a previous points to reiterate their importance to that step and help the information sink in. Even more beautiful was that you don't overwhelm the viewer with graphics which would actually go against the absorbing of the information, and the simpler animations effectively portray the concepts while letting us focus on the information it's portraying. I looked to subscribe at the end, and hadn't even realized I had already subscribed mid-video.
Good for you 😊
@@alphabeta3528truly a reply to their comment
This is an absolutely unbelievable breakdown.
No way, I just watched the first part and here’s the second part, posted 20 minutes before 😮 Thanks for the video!
haha, perfect timing. thanks for watching 😊
I was hacked by ytb algorithms the same way to watch them both :)
Literally the same eheh😅
So at what point do we talk about Kaspersky?
That's the neat part! We don't.
You can tell someone has such a good understanding of something when they can explain it so well to someone with limited knowledge, and they walk away feeling like they completely understand how it works.
I've got basic knowledge of the C language and understand computers use memory and execute code, I used SMB to watch a movie file from my computer on my TV once, that's about it. I've never written a Windows application. Yet I now undertake how wannacry worked.
Thank you
crazy how Kaspersky got banned recently
crazy how they stole the program and somehow the "hackers" got them not sure why he left that part out
@@zestiny_ that's not what happened (he addressed it in the first video). You seem to have problems understanding spoken English. Probably not your first language.
@@zemm9003Or maybe it is their first language but the person just lacks basic comprehension. There's a lot more people like that than you think. 😂
That's pretty much why it was banned I feel.
@@zemm9003 nope. he omitted that part kid
this is really a clever attack... i'm impressed with it, that's for sure. thanks for producing this!
Isn't it interesting how the feds indicted those who used it, but no one sued the creators (enn ess ay) for losses due to them creating the code for the exploit then allowing themselves to get hacked (irony) and the exploit leaked...
if anyone sued them, then your laptop will miraculously have Capture Point(read the initials) all over it.
Also just to add onto this there’s a clause in the US Constitution that makes it impossible to sue to US Government and get monetary damages. So if I’m seeing this right the real reason Kaspersky got banned was because they found out about this disgusting worm…
Quod licet lovi, non licet bovi. 😮
I think they should be held accountable for their own security failure, but not for creating the exploit. Otherwise, every security researcher would also be a criminal. But security researchers are not criminals, and the work done to discover modes of exploitation along with proofs of concept are needed to harden security in the first place. Unless you can prove it was being used by them, they hadn't done anything wrong yet (although I personally 100% believe they either did, or intended to)
@@cinderwolf32 I disagree, you are right that the point of finding exploits is to harden the system. But the NSA didn't inform about the exploit until after it leaked, which means they were helding it (and maybe using it) as a weapon.
Classic.
USA: "It was North Korea".
USA: "It was Russia".
Russia hacks the NSA: "It was the USA".
*China has left the chat*
If history tells you something: "It was the USA." is a phrase that comes up waaaaay too often for most Americans liking probably. But if you are betting man and the USA is in the game of possible culprits, odds are the best way to multiply your investment is to bet on the good ol' USA.
@@HansJuergen-ps8bt tbqh it was literally the usa this time. The NSA found critical vulnerabilities in windows and neglected to inform Microsoft until someone else stole it. We don't know when the nsa discovered these vulnerabilities, but Microsoft could have had years of additional time to fix these exploits if the nsa didn't get too attached to their new toys.
How do people in charge, with all the worlds resources, get absolutely embarrassed like this?
Our tax money allows them to hire the smartest, but they are still just people.
Seduction
@@audacityhour3104 🤣
The people in charge are inept. "the powers that be" get way too much credit for everything, it's an affect of the constant info ops.
@@Ungood-jl5ep They might not be inept, but they have much different goals than what they say or what we wish they had.
If I had RCE on every Windows box I would launch Space Cadet pinball so people can have fun
Small tip, have the NT5x source at hand while watching this video. It will give a picture how the functions are written, including warnings that the os2fealist conversion function doesn't check stuff much itself, it's duty of the caller to do that
Seems safe 👍
This video is as beautifully crafted as EternalBlue 😁
Really, fantastically done! I find that this two part series was the perfect balance between technical knowledge but not overly difficult to understand. Would love more exploits breakdowns like these!
Thanks for the second part. Really informative and interesting to get the inner workings of the 3rd bug and how the payload gets executed :)
glad you thought so 😊
Damn. My brain hurt.
I am too dumb for these stuff not gonna lie.
Well, you just keep telling yourself that story and see where it goes... lol
You are not dumb, you just haven't learnt all you need to know yet. Keep hurting your brain until you understand what you want to understand and don't put yourself down for not understanding without effort because this is exactly what you have to do to improve.
I said the same thing. I said that I'm too dumb for OS dev. Well now it's my job
If this interests you there are multiple websites and resources to learn, its starts out simple so most anyone can learn something, and if you so happen to have the right kind of mind you should be able to learn all of this you just gotta put in the time
@@nothingnothing1799 where
This is such a cool video, thank you for the in-depth breakdown. I am completely blown away by the complexity of this backdoor
Daniel: "We now have all the ingredients needed to understand how everything comes together"
Me, a Network Engineer: "Ah yes. so hackers have to byte the bug who bit into memory and created a word hole in my page"
the way these exploits are crafted is genuinely impressive. like how many lines of code do you need to comb through to find a faulty IF statement?
I love your videos man, always makes me sit down, get a snack and lock in.
haha, do I really make that type of content now? I'm honoured. love to hear it 😊
Just came across this channel and I love the content! Incredibly fascinating and very well explained.
Amazing video that somehow manages to simplify such a complex exploit so that even a beginner (like myself) could understand it!
I did, however, get a little bit lost in the end and have a question regarding the final parts of the exploit. How does it send the payload and then control where it ends up? Does it get sent via the (overflown) ntfealist?
Im so happy that I found you! You make such interesting and good videos! Keep them coming
Great video! been looking for an explanation of the exploit for a long time now and youtube's algorithm suggested the perfect video
love to hear it!
@@DanielBoctor Why did you exclude that kaspersky stole the program from the nsa worker and somehow "hackers" go ahold of the program. You omitted that important information in part 2. I can only assume you purposefully did that considering how much research you did for this video
@@zestiny_you should more upset that the governments around the world are exploiting hardware, and software, and not notifying the corporations of it, keeping us less secure with our information.
Who gives a fuck how we found out.
f isnotreal
I like how you break this down
Pleeease keep putting out more such bangers!
Thank you, that is very nicely explained! I have been curious how that attack had worked.
Few cases where YT algo is really helpful. New sub here! 🥰
Video name" Who was really behind the largest computer worm"
Proceeds to provide detailed technical explaination how it works only a bunch of niche experts can grasp
Any beginner Windows developer can understand this.
Great presentation!
When adjusting the MDLs in the SRVNET struct, how do they know/predict where the HAL's heap is going to be?
Keep it up, man! Love your channel :)
Thanks, will do!
So what does Kaspersky have to do with this? And I heard something about "if you are using an os before windows 8" in the video. Who even still uses that?
several endpoints, servers, ATMs, you name it. There are tons and tons of equipments that hasn´t been updated over the years and they are vulnerable to this. I would dare to bet that more than 50% of the companies out there still have legacy OS in their inventory
So, is there a third part coming where you mention how Kaspersky is relevant? Or did you just completely forget the title of the first video? By the way, maybe make the title of the videos xyz - part 1/2 etc so it is clear that they belong together.....
Excellent deep dive 👏
I didnt understand anything, can someone tell me why Kaspersky got banned ?
Did kaspersky found out that USA and Microsoft having backdoors to everyone ?
I really enjoyed this, thanks for the video!
of course
Not surprised over several years now all YT channels that "test" security software really hate Kaspersky Avast and AVG. When in 23 years of personal experience these were and still are the best consumer grade security software companies on the planet! Low system resource impact (NO BUILT IN ROOTKITS) and actual people on the customer service end! Plus Windows Defender is a pile of donkey shit!
This WAS SO CLEAR!!!
Wait for copilot
recall will undoubtedly be responsible for a major security/data breech
Nobody wants their back door to leak
we don't eat there anymore.
Hey NSA, thanks a lot! Adds insult to injury, doesn't it?
CIA, NSA, and Israel.
Israel = FBI,CIA,KGB,FSB etc,etc,etc ...
Fantastic work. Thanks.
Why on earth did it still contain ancient OS2 compatibility?
great video as always :)
Not a hacker, security expert, or even a decent programmer. But are we assuming the NSA found all these vulnerabilities without the source code?
they 100% had the source code for Windows. now how they got it, I don't know. probably decompiled it themselves.
I was thinking about this for the entirety of this video. How the hell do you know of this very specific exploit? They must have had the source code one way or another because this depends on deep analysis of the source code that even regular SASTs won't identify.
Hire former MS devs. Bribe them / threaten them. Or / and do the same to MS. The romanticism fades when you realize it's just thugs leveraging their monopoly on violence and someone else' tax money.
So because I had no need for older versions of SMB and remove them from my system after getting rid of Windows for workgroups 3.1 , and using novel protocols to communicate between os2 and NT instead of SMB is why I wasn't attacked?
good explanation
Commenting to help with the algorithm cuz yeeeah! the video is so clear to explain everything, from the edition, animations, and script
Highly detailed ❤ thanks 😘😘😘
Gotta hate Advanced Persistent Threats. I liked it more when hacker groups where small, isolated, and didn't have millions of dollars and an intelligence apparatus.
….. I just custom-deployed a windows server with SMB enabled, thank god it’s sandboxed
amazing video!
can you do the Solarwinds hack
Then we have this closed-door session was not even my state or me to be allowed in this session of the reliant
My man got scared and changed the thumbnail
Can you prevent this by DISABLING Paging File (Pagfile Sys)?
No. This exploit used memory from the non-paged pool, i.e. kernel memory that is never swapped out to disk.
wow.
Haven't I just watch this video recently? It's 98% of the previous video...
I added the first two minutes as Recap to _Sponsorblock_ to skip.
Yeah it should have been one video.. Still great content tho!
There is a video size limit on YT for newer/smaller subscriber count videos. However checking after I've made this post this exceeds the subscriber count for that to be an issue.
@@RowanHawkins This limit (15min initially) could be removed by adding a phone number and this worked like that about 15 years ago.
Assuming he's partaking in the ad revenue (AdSense) he has had limits disabled a very long time ago.
@@VADemon But you aren't Daniel?
great video
Is this a reupload? I swear I've seen this video already...
A lot of things made some plays some big areas after that Xbox got switched out started all this controlled removal around my area
The repeated references to OS/2, an OS that hasn't been used in decades, lost me. What am I missing?
Compatibility.
The crux of the exploit is that it's in the oldest version of SMB. And that code had compatibility code to be able to communicate with OS/2 machines.
This is also probably why the inventors of this exploit found it. They looked specifically for old code and protocols written at a time with a lot less knowledge about these types of attacks.
@@elecblush thanks for the explanation
I just finished Andy Greenberg's "Sandworm" last week - well timed, for sure, but man, what a video! Thanks for making this, this is kickas$!
Did you just change title?
4:40 skill issue, shouldve used rust
coincidentally? i rumor they already got an AI model able to decrypt cryptography.... gossips though but this gossips really aligned with the leaks, leak it to test this specialized AI capabilities in real life!
Do you think your boy scout patches teach this understanding correctly do you think they provided y'all with the full rotation to get this understood in case someone else comes out as a problem what do you think they just learned how to money everybody through it
Gets*
Spoiler alert... there's worst one (let's say one) for bluetooth! Just take a look at you services, than your devices (hidden ones too) and do the thinking yourself ;)
So here's another problem I y'all are asking for hackers and you all know the consequence
Moral of the story kids: just use pencil and paper next time
How's the worm in your head Mr Kennedy
Is HTML programming a good place to start to become a cyber security expert?
who knew grooming could be so fun! :D
r/cursedcomments
Haha
So one of my next questions is through some of this understanding of this worm what does concept of cancer or whatever it is going around and our big organizations trying to prevent the next big terrorist attack. Do you suspect we've already been hit with this attack
I always questioned back door conversations without the evidence being presented
Me my b
I'll be cracking up to I mean we had defense attorney Lloyd have to go in and get his head looked out we had Russian President Vladimir Putin have to go get his looked at then we had bad and son get himself in a little bit of trouble when traveling over on a laptop and y'all think y'all are going to force the change of the Constitution of America
... are you high or sth ?
This is propaganda made to cover some criminals trax!
what.
EternalBlue... guess which American political party is blue? Hmmmmmm (lmao)
bro you talk so SLOW
you know youtube supports adjusting playback speed?
Must remember RUclips does pay this people unless they reach amount of viewers, so use what you have don't judge because already know it don't understand why you bother pointing it out hear 🙉
ok goldfish
Normally I would hate on someone for padding time to get more ad revenue, but this is extremely advanced computer science stuff. I'm a self taught programmer and I'm glad he explained it slowly.