Your PC is All Mine *scary*

Поделиться
HTML-код
  • Опубликовано: 23 май 2020
  • This is a fun vlog where I decide to make you guys aware about the latest attack in terms of cyber security. This will change your persepective towards technology. How a simple USB drive can be used to compromise your cybersecurity. I am sure, after watching this you would get the feeling like are we watching a hacking short film ? Are we watching some hacking web series ? But my frinds all this is happening in real life. This is the harsh reality.
    Stay safe always.
    Social Media Links :
    Instagram : / cryptoknight01
    Twitter : / cryptoknight01
    Facebook : / theheranevlogs
    Business related Email : theheranevlogs23@gmail.com
    #cybersecurity #technology #vlogs

Комментарии • 1 тыс.

  • @cryptoknight01
    @cryptoknight01  3 года назад +28

    Recently Launched my Latest course on ethical hacking beginner to advanced : cryptoknight101.com/
    details about the course : ruclips.net/video/axS1cYf5luI/видео.html

    • @alixjain1048
      @alixjain1048 3 года назад

      can you make a course . how to make that pendrive or other cool things which gave access

    • @devilrockstar7987
      @devilrockstar7987 3 года назад +1

      Chip name plzzzx

    • @hemanth9471
      @hemanth9471 3 года назад

      @@alixjain1048 thats not a pendrive its called rubber ducky or you could use arduino

    • @hemanth9471
      @hemanth9471 3 года назад

      i need some support to get in ethical hacking , i am 18 and started ethical hacking form youtube and some websites.. i need some support and i know kali linux commands and some hacking techniques. @Cryptoknight could you guide me to cyber security industry. i am an fast learner and i have the capability to do it . but i dont have proper guidence. i have lots of passion towards hacking and i want to crack various cetifications and even OSEE .. @CryptoKnight could you please help. and i'm commenting this video through kali linux...

    • @hemanth9471
      @hemanth9471 3 года назад

      METASPOILT.. USING MSFOCNSOLE AND SIGNING THE APPLICATION we could perform this hack

  • @cryptoknight01
    @cryptoknight01  4 года назад +106

    This vlog is something which will make you wonder what you have been doing wrong?
    Lets aim for 500 likes on this vlog !!
    P.S - Subscribe karlo if you havent we are really close to 3k subs ❤️

    • @viralinstavideofrom
      @viralinstavideofrom 4 года назад +1

      plse give us specificatio of chip

    • @pranavrai3669
      @pranavrai3669 4 года назад +1

      Hearing about these attacks and actually getting to know the real scenario behind all this are two different feelings. Very Informative content. keep It up Buddy!

    • @AbhishekYadav-jw9qe
      @AbhishekYadav-jw9qe 4 года назад +6

      Whats the technical aspect behind it ?? U just showed its working. How it works ? Why it is undetected ?
      Please elaborate

    • @cryptoknight01
      @cryptoknight01  4 года назад +3

      @@AbhishekYadav-jw9qe it js undetected because computer "thinks" that someone is typing from keyboard.. so it cant be a malware.

    • @devvratbhardwaj99
      @devvratbhardwaj99 4 года назад

      Very nice brother but if some one use any cloud based data will it be accessable through this trick??

  • @sahildhawan9730
    @sahildhawan9730 4 года назад +114

    This guy and his sis gave me the inspiration to go for OSCP :) !! Appreciate his efforts

    • @Mastimania69
      @Mastimania69 3 года назад +1

      Same

    • @nexusneyo7777
      @nexusneyo7777 3 года назад +1

      Did you cracked oscp

    • @Mastimania69
      @Mastimania69 3 года назад +2

      @@nexusneyo7777 absolutely not...

    • @sahildhawan9730
      @sahildhawan9730 3 года назад +1

      @@nexusneyo7777 got short in first attempt and looking for second

    • @SRKian
      @SRKian 3 года назад

      Sahil bhai... Meko v OSCP hi karna hai... can you tell me your Insta? so i can connect with you 🙌🏻

  • @akshatjain7904
    @akshatjain7904 4 года назад +28

    0:53 - Oho Private Jet wale bhi masala ka packet pura khali krte hai 😂😂

  • @Footprints99
    @Footprints99 4 года назад +86

    This looks like some movie scene man, bhohot mast video👌🏻

    • @cryptoknight01
      @cryptoknight01  4 года назад +7

      Hahaha yes bhai ❤️

    • @sujalmahato9034
      @sujalmahato9034 3 года назад

      @@cryptoknight01 Bhai fb v hack ho sakta hai kya

    • @kuldeepsoni5310
      @kuldeepsoni5310 3 года назад

      It's be called something like rubber ducky with auto execution of virus.exe/msi.

  • @eswar9255
    @eswar9255 4 года назад +17

    You got a new subscriber Congratulations that's me 🎊🎉🎊

  • @abhisheksingh3722
    @abhisheksingh3722 4 года назад +3

    Bhai dost paal rakkhe hai ya saanp😂😂
    Btw, great content..... Since I'm also a bit into hacking, I can relate to it.... Keep it up!

  • @heatondude447
    @heatondude447 4 года назад +125

    Title : Scary!!
    1 min later : chalo maggie banate hai😐

    • @subhamdas2491
      @subhamdas2491 4 года назад +6

      Lekin Maggie to 2 minute lagte hai banne mai

    • @ytg6663
      @ytg6663 3 года назад +3

      @@subhamdas2491 2 minute ? 😭😭😭

  • @thegamickguy
    @thegamickguy 4 года назад +12

    Waah Herane Bhai, 3k subs to 15k subs in around 1 month congratulations Herane bhai, I am sure if you upload more cybersecurity videos you'll definitely reach 100k subs or 1M subs before 2020 ends

  • @PavanKumar-fg4jx
    @PavanKumar-fg4jx 4 года назад +9

    Ok if protection from this attack also shared.
    It will be more useful and helpful.
    Please make if possible .

  • @susmarani4898
    @susmarani4898 4 года назад +1

    Thanks Bro and please upload more video related to cyber security

  • @adityakadam2369
    @adityakadam2369 3 года назад +3

    I think u r a good story teller which is very important for a vloger to have👍👍👍👍Superb job.....

  • @lavishjaat
    @lavishjaat 4 года назад +14

    Me who live boots Manjaro to test all USBs: **happiness noises**

  • @goutamkamble9503
    @goutamkamble9503 4 года назад +3

    Tqsm bro for this wonderful information....
    Plz make more videos on such topics with reality so that a normal (zero knowledge of cyber security) person can stay safe from such frauds...
    Once again tq...

  • @AIVisionaryLab
    @AIVisionaryLab 4 года назад +2

    thanks bro, keep it up.
    Best explanation.
    Thumps Up

  • @mohammedumernawaz9033
    @mohammedumernawaz9033 4 года назад +2

    You are awesome bhai this is my second time watching your vlog it's very informative everytime and interesting to watch keep doing the good work you are the best lots of love bhai ❤

  • @himanshushah9471
    @himanshushah9471 4 года назад +5

    Sir please make more demo videos on this awareness love ❤❣your videos you are indias first cybersecurity vlogger...

  • @joaquimmenezes7396
    @joaquimmenezes7396 4 года назад +11

    Very Informative video!
    Herane,keep it up❤️😍😍

  • @arunimsinghal8588
    @arunimsinghal8588 3 года назад

    You got a new subscriber!!!
    Nice video👍

  • @rajgurudas4510
    @rajgurudas4510 4 года назад +1

    Very nice video
    Good job👍🏻👍🏻👍🏻
    This is like rubber ducky

  • @hrithiktripathi9237
    @hrithiktripathi9237 4 года назад +3

    thnq so mch for letting us knw,,love uh broo

  • @vishwaasbhatia5182
    @vishwaasbhatia5182 4 года назад +3

    Amazing! Thanks for knowledge!

  • @sarthaksharma875
    @sarthaksharma875 4 года назад +2

    Thank you for making this video!
    Amazing content!

  • @chanchalnishad3
    @chanchalnishad3 3 года назад +2

    Thankyou so much bhaiya .. for this awareness.. I truly love your channel♥️keep growing

  • @nirbhaysingh4360
    @nirbhaysingh4360 4 года назад +3

    Wow its really awesome to see someone professional to share these small things, hooked with your channel today already subscribed ,keep making more😊😊👍

  • @sekharghosh7935
    @sekharghosh7935 4 года назад +10

    08:20 this attack can be done directly from your Android using nethunter without any external usbs

    • @laggybot1327
      @laggybot1327 4 года назад +2

      Yah right..

    • @laggybot1327
      @laggybot1327 4 года назад +3

      U can use also your real phone like malduino .... But you need to root your phone....😁👌 Thank me later 😂 for info

    • @rrk2392
      @rrk2392 3 года назад +2

      No need root no need nethunter

  • @Nisanthapa1999
    @Nisanthapa1999 4 года назад +1

    Bro that was cool ,I'm your new subscribe.

  • @randomshots
    @randomshots 4 года назад +1

    Wow, really nice and useful video. You have got a new subscriber. Love your channel....Thanks

  • @vivekagarwal1303
    @vivekagarwal1303 4 года назад +12

    Me with a 10 year old pc with 2 gb ram and core 2 duo processor: I am four parallel universes ahead of you

  • @sumit_samanta
    @sumit_samanta 4 года назад +42

    If anyone is wondering about the PCB or the board..yeah that one connected with the cable.. its arduino micro capable of sending keystrokes to the host computer..u may use an arduino leonardo which is a rather big board.. and Bro you could have mentioned with most of the pendrives from sandisk or hp or any name brand one it is impossible to program as it doesn't have a microcontroller ...although it is possible to replace the chip but one need heavy modifications to do it which is very difficult..so use any general pendrive without worrying but yes please dont click on any unwanted files...and yes dont use the cable or pendrive given by herane bro XD

    • @agx111
      @agx111 4 года назад +3

      thanks for the knowlegde bro
      i was also thinking about this

    • @hamzarazasiddiqui
      @hamzarazasiddiqui 3 года назад

      Exactly 😎

    • @AyushSingh-lp8wi
      @AyushSingh-lp8wi 3 года назад

      No it is not correct. We can also programme a normal pendrive for this type of attack which can steal your whole data.

    • @kunalkalra7797
      @kunalkalra7797 3 года назад

      @@AyushSingh-lp8wi that is only possible if the autorun is on

    • @sarthakgokhale7367
      @sarthakgokhale7367 3 года назад

      Can we use arduino nano????

  • @niteshkharwar5822
    @niteshkharwar5822 4 года назад +1

    Thank you very much herane bhai keep uploading such interesting videos full of knowledge which people who don't know will be able to know about how harmful it can be 👍👍

  • @mohanadvocate27
    @mohanadvocate27 3 года назад +1

    Nice demonstration,thank you
    Cyber Lawyer & Cyber Security Analyst

  • @disha5259
    @disha5259 3 года назад +5

    Is nobody gonna talk about how well he actually used the CHOPSTICKS 😱😱😱😳😳😳

  • @keshavthakur1196
    @keshavthakur1196 4 года назад +3

    Maan Gaya Bhai👍

  • @kali7736
    @kali7736 3 года назад

    Great video bhaiya.
    Thanks , hoping to see this kind of videos more.
    Please make a video on most dangerous young hackers!!

  • @sumantkumar9180
    @sumantkumar9180 3 года назад +1

    Broooo....it was really awesome yrr...
    I really like the way u work and make us aware like a big brother....keep it up....and stay safe stay healthy u and ur family as well.....thank you so much buddy😇😇😇

  • @Point_ofv
    @Point_ofv 4 года назад +4

    Everyone thinks herane loves to make new friends but deep down inside herane just practicing his social engineering skills.

  • @Zavier_.
    @Zavier_. 4 года назад +5

    Free maggie tutorial 🤣🤣

  • @prathampaleriya1363
    @prathampaleriya1363 4 года назад

    Bhai bohot sahi kaam kiya... Shuriya humsab kon samjhane ke liye ...
    Million dollar video.. dude!!

  • @MniTech
    @MniTech 3 года назад +1

    Love you bhai btane ke liye ❤❤

  • @TheWittyDev
    @TheWittyDev 4 года назад +6

    Can you make a tutorial on how to make this thing? I know it's very dangerous, but I just want to learn it for educational purposes. Please?
    BTW Big fan of yours! :) Keep Creating, Keep Enriching Others. Love from Nashik 🤟😊

    • @sundeepamrutia
      @sundeepamrutia 4 года назад +1

      You will need Kali Linux and windows machine both in virtual environment.

    • @adityapatel3554
      @adityapatel3554 3 года назад +1

      Research about Arduino malware with auto keyboard

  • @saimoninglish3941
    @saimoninglish3941 4 года назад +4

    Bro u're very inspiring 🥺🥺🥺🥺

  • @deepakkumarmaurya8648
    @deepakkumarmaurya8648 4 года назад +1

    Really one of the best video in my life that someone share a good content

  • @dheerajgowda6776
    @dheerajgowda6776 4 года назад

    Again bro love you , keep on doing more informative videos , love you Bhai

  • @aritrachatterjee211
    @aritrachatterjee211 4 года назад +14

    I had had the same experience once.
    I gave my frnd one of my pen drives for movies.
    I copied the movies onto my computer after receiving my pendrive and I lost my software the next day.
    My frnd is no more now..
    I killed him after this incident.

  • @AtharvKasar
    @AtharvKasar 4 года назад +9

    This is really so damn good sir! ❤️
    You're a true inspiration for many of us! You inspire us to do more ❤️
    Thank you so much sir

  • @dr.ajavali9418
    @dr.ajavali9418 4 года назад

    This is new information I ll give u likes and support u bhai@@@

  • @akashsai2555
    @akashsai2555 4 года назад

    Herane bhai bahut sahi
    Thank for awareness 😊😊😊

  • @sachinkalkumbe1569
    @sachinkalkumbe1569 4 года назад +10

    Rubber ducky attack

    • @meraja31
      @meraja31 4 года назад

      HiD rubber ducky and method is mimikatz.

  • @cabrex5864
    @cabrex5864 4 года назад +13

    USB Rubber Ducky!!
    Edited:
    sir could you pass on the code, or actually tell us the brains behind it?

    • @luckyfaiz21
      @luckyfaiz21 4 года назад

      Siddharth Singh hye can i have your contact details

    • @jyotishkabhaduri7551
      @jyotishkabhaduri7551 3 года назад

      Yes,You can Execute Any code Using Rubber Ducky

  • @AshishSharma-xo6ig
    @AshishSharma-xo6ig 4 года назад

    I knew about the rubber ducky, but the way you social engineered your friend seems more scary especially the last one.

  • @nilotpalbasu5495
    @nilotpalbasu5495 3 года назад +2

    Thnx for this useful piece of knowledge❤️❤️

  • @mohammedumairkhan3106
    @mohammedumairkhan3106 4 года назад +9

    what if the laptop is on offline mode?
    the malware get installed in laptop or when you plug-in the pendrive that time it will execute.

    • @ayushranjanrout9758
      @ayushranjanrout9758 4 года назад +3

      Bro Thats not a malware . when you plug-in computer feel like that is a keybord and a human type some commands.this is attack is key strocking injection.if you laptop is offline the hacker cannot install any malware & hacker could not have your system acess But , the hacker can delete your os

  • @akashkb6905
    @akashkb6905 4 года назад +4

    Really I like your work, will it work in Macbooks?

  • @averaasq14
    @averaasq14 3 года назад

    I really appreciate u ,aware karo!
    Like a good boy

  • @rajoriadass211
    @rajoriadass211 3 года назад

    Thnx a lot,,,, appreciate your efforts.......

  • @laggybot1327
    @laggybot1327 4 года назад +6

    Lol malduino 😂👌 I used this for a 2 years.

  • @bhaveshacharya1422
    @bhaveshacharya1422 4 года назад +7

    6:42 pehla hacker mila jo literally "ENTER " daba k hack kr deta hai sb kuchh...
    .
    haan haan.. mai bhi bollywood movies dekhta hoon :p :p

  • @a13gitanjalidate57
    @a13gitanjalidate57 4 года назад

    It's very good and very helpful information for us thank you for giving us this important information.

  • @girishtripathy275
    @girishtripathy275 4 года назад +2

    Saw your few vlogs, vlogs should be like this only totally natural and simple one. Loved it bro 💙💙🔥

  • @bhaveshpatil5533
    @bhaveshpatil5533 4 года назад +3

    How to build this type of usb
    How to stay safe by using this

  • @buntyyadav8946
    @buntyyadav8946 4 года назад +14

    USB Rubber Ducky.... 👍

    • @laggybot1327
      @laggybot1327 4 года назад

      This is not rubber ducky .... It's malduino

    • @RakshithPrakash
      @RakshithPrakash 4 года назад +1

      @@laggybot1327 its the same thing innit. Both act as a HID device

    • @laggybot1327
      @laggybot1327 4 года назад

      @@RakshithPrakash i know...!! but its not rubber ducky , its a audrino mini

    • @laggybot1327
      @laggybot1327 4 года назад

      @@RakshithPrakash Yah it's same thing, both of them works as butter, but big difference is Arduino is cheap but rubber-ducky is too much expensive. Why i point it bro

  • @paruchurusrikanth9250
    @paruchurusrikanth9250 4 года назад +2

    Awesome bro ❤️❤️❤️

  • @harshitvarshney3375
    @harshitvarshney3375 4 года назад +2

    Hey Herane, thanks for the awesome video but once in while people needs to put in some pendrive for sure, can't just say I am not gonna plug in. So any software or security enhancement that could help preventing it will be great. Also can you tell what malware/attack/board is that?

  • @itz_harrry_dxb_22
    @itz_harrry_dxb_22 4 года назад +7

    But Brother How can fix this. Any time I entered that pendrive in my pc So how can I fix that Any Ideas

    • @AadyashaNews
      @AadyashaNews 4 года назад +2

      Bro to fix it , first disconnect your system to internet .If you disconnected your system to internet attacker can't access your PC but the attacker can delete your os so always create backups of you os

    • @AadyashaNews
      @AadyashaNews 4 года назад +4

      If you happy and my answer is helpful for you please like it and reply me

    • @AMIYAKUMARSAHU-zj5jt
      @AMIYAKUMARSAHU-zj5jt 3 года назад

      @@AadyashaNews how can attacker delete os without internet I think he can't access and I wanted to ask another question that I have norton antivirus which has a secured folder option means even I can not change the content of that folder without password can this thing make change inside that folder also?

    • @adityapatel3554
      @adityapatel3554 3 года назад

      Use a vpn. Your internet traffic will not lead to him will create disturbances in the connection. You can use windscribe which has built in firewall that will block the attackers reverse tcp payload. But if attacker is smart he can also do persistence and wait for you to disconnect vpn and gain access again. But thats rare cuz persistence usually triggers AV detection so don’t worry. Just use VPN.

  • @MonirulIslam-fc5lv
    @MonirulIslam-fc5lv 4 года назад +8

    What is this attack called?
    How to prevent this?

    • @kapilyadav4910
      @kapilyadav4910 4 года назад +2

      This is Rubber duckky which work as com interface thus none antivirus can work here as they understand this is a hardware like keyboard

    • @DefaultGuy84
      @DefaultGuy84 3 года назад +2

      every modern security suite like Bitdefender/Kaspersky easily prevents this attack. This has been discussed already in well known cyber security forums.
      forums.hak5.org/topic/50204-bitdefender-av-stop-most-of-bash-bunny-attacks/

  • @hareeshroyal5116
    @hareeshroyal5116 4 года назад +2

    It will helped me alot bro Thank you so much bro.

  • @Fullstackdev18
    @Fullstackdev18 4 года назад

    good info. thanks :)

  • @sundeepamrutia
    @sundeepamrutia 4 года назад +3

    But he needs to have active connection through internet?

  • @bhupeshgupta9457
    @bhupeshgupta9457 4 года назад +10

    You look like Magnus Carlson 😂

  • @vaishnavi6192
    @vaishnavi6192 4 года назад +1

    Thanks bro for spreding awareness😊😊

  • @vikrantjeenwal30
    @vikrantjeenwal30 3 года назад

    Awesome 😊

  • @dhruv4983
    @dhruv4983 4 года назад +3

    This is kind of backdoor one of my friend created a backdoor which was programmed to delete every file from window and eventually corrupt it. And mere sath esa mzak kra usne😂sale ko bht mara.

  • @divinedeclaration
    @divinedeclaration 4 года назад +18

    This doesn't expalin many things .. you could have just remotely logged in remotely using ssh. Hacking in real world is a lot hard then what is depicted.

    • @dipeshlama5924
      @dipeshlama5924 4 года назад

      Its harder to hack others not the ones who trust u social engineering is best hack

    • @sundeepamrutia
      @sundeepamrutia 4 года назад

      @@dipeshlama5924 social engineering is the way but you still need to have active connection to the machine. Internet connection and the same time you need be online. Hack is only possible if you have trick him/her to download the file and you are online. It will give reverse connection but still victims needs to be online.

    • @dipeshlama5924
      @dipeshlama5924 4 года назад

      @@sundeepamrutia lol for newbie's keylogger is enough bro aint talking abt any session establishment or anything as i said its harder to hack other not the person who trust u .... he just made a small demonstration for newbie so people ll understand how everything works why so much hate ....

    • @suvidsinghal1365
      @suvidsinghal1365 4 года назад +1

      Very true, it was looking like SSH only!

  • @aryanchowdhury1594
    @aryanchowdhury1594 4 года назад +1

    thnks bro.............................it is intresting one

  • @SPARKS08
    @SPARKS08 4 года назад

    Thanks Sir for creating this awareness I just found you while scrolling on my home screen and from now I am the member of this 28k family!!

  • @bstrong..5418
    @bstrong..5418 4 года назад

    Good useful video....

  • @manassehabraham5589
    @manassehabraham5589 4 года назад +1

    Do more videos like this bro
    Thank you so much

  • @nikhilshrivastava203
    @nikhilshrivastava203 3 года назад

    Apki vlog mujhe bhot acha lgta hain. Bhaiya

  • @BharatKumar-vj5zq
    @BharatKumar-vj5zq 4 года назад

    Today's I joined your Chanel 👍👍

  • @shinigaming3229
    @shinigaming3229 4 года назад +1

    Herane bhai love your vlogs❤️❤️ i wanted to request can you start teaching hacking on this channel or make another channel for that ... Would love to learn from you❤️

  • @adharrege3238
    @adharrege3238 3 года назад

    Good Job ! Keep It Up

  • @kothurukoushik2530
    @kothurukoushik2530 3 года назад

    Thanks brother for sharing valuable information

  • @sourabhvishwakarma2428
    @sourabhvishwakarma2428 3 года назад

    Bhaut kadak

  • @growwithaman7967
    @growwithaman7967 4 года назад +1

    Thanks bro.👍👍👍👍

  • @devsdiary5941
    @devsdiary5941 4 года назад

    The reality every one should be aware of Thanks herane bhaia

  • @LONEWOLF-nf8fn
    @LONEWOLF-nf8fn 4 года назад

    keep it up bro 3k subs

  • @lu9320
    @lu9320 4 года назад

    Cool thoughting bro

  • @just_dev
    @just_dev 4 года назад

    Pyar se subscribe kia hu bhaii 😍😍

  • @sandeepkumarsaxena5124
    @sandeepkumarsaxena5124 3 года назад

    Yes. You are right

  • @vishal_ravanank
    @vishal_ravanank 4 года назад

    It's call as HID attacks if I'm not wrong. Nice demonstration mahn. Even you can perform this attack using nethunter ROM in phone. So you don't need to connect that microcontroller behind your phone. you can directly run the HID attacks through your phone. Hope will see some more good stuff on your channel. 🤗

  • @thegj06rider46
    @thegj06rider46 4 года назад

    Bhai video dekhkar lag rha hai apke doston ne apka bada wala kaata hai...by the way congrats apka target 10x pura ho gaya❤️

  • @ruheenaqureshi5339
    @ruheenaqureshi5339 3 года назад

    👍Great

  • @yashpatel9720
    @yashpatel9720 4 года назад +1

    Thank you for aware ,
    Good video 👌

  • @lakshitbansal8228
    @lakshitbansal8228 4 года назад +1

    Bro really good video maza agya

  • @dilippayasi1631
    @dilippayasi1631 4 года назад

    Super video for hacking awareness

  • @rohitbhardwaj3331
    @rohitbhardwaj3331 4 года назад +1

    Great knowledge brother ...keep it up 🙂

  • @satyamthakur8633
    @satyamthakur8633 4 года назад

    Thnks brother for awareness

  • @iamvs8024
    @iamvs8024 4 года назад

    Awesome video sir! Can't wait to meet you sir, ur a true inspiration for many.

  • @pratikbadgujar4851
    @pratikbadgujar4851 4 года назад

    It's very good and informative