Your PC is All Mine *scary*
HTML-код
- Опубликовано: 23 май 2020
- This is a fun vlog where I decide to make you guys aware about the latest attack in terms of cyber security. This will change your persepective towards technology. How a simple USB drive can be used to compromise your cybersecurity. I am sure, after watching this you would get the feeling like are we watching a hacking short film ? Are we watching some hacking web series ? But my frinds all this is happening in real life. This is the harsh reality.
Stay safe always.
Social Media Links :
Instagram : / cryptoknight01
Twitter : / cryptoknight01
Facebook : / theheranevlogs
Business related Email : theheranevlogs23@gmail.com
#cybersecurity #technology #vlogs
Recently Launched my Latest course on ethical hacking beginner to advanced : cryptoknight101.com/
details about the course : ruclips.net/video/axS1cYf5luI/видео.html
can you make a course . how to make that pendrive or other cool things which gave access
Chip name plzzzx
@@alixjain1048 thats not a pendrive its called rubber ducky or you could use arduino
i need some support to get in ethical hacking , i am 18 and started ethical hacking form youtube and some websites.. i need some support and i know kali linux commands and some hacking techniques. @Cryptoknight could you guide me to cyber security industry. i am an fast learner and i have the capability to do it . but i dont have proper guidence. i have lots of passion towards hacking and i want to crack various cetifications and even OSEE .. @CryptoKnight could you please help. and i'm commenting this video through kali linux...
METASPOILT.. USING MSFOCNSOLE AND SIGNING THE APPLICATION we could perform this hack
This vlog is something which will make you wonder what you have been doing wrong?
Lets aim for 500 likes on this vlog !!
P.S - Subscribe karlo if you havent we are really close to 3k subs ❤️
plse give us specificatio of chip
Hearing about these attacks and actually getting to know the real scenario behind all this are two different feelings. Very Informative content. keep It up Buddy!
Whats the technical aspect behind it ?? U just showed its working. How it works ? Why it is undetected ?
Please elaborate
@@AbhishekYadav-jw9qe it js undetected because computer "thinks" that someone is typing from keyboard.. so it cant be a malware.
Very nice brother but if some one use any cloud based data will it be accessable through this trick??
This guy and his sis gave me the inspiration to go for OSCP :) !! Appreciate his efforts
Same
Did you cracked oscp
@@nexusneyo7777 absolutely not...
@@nexusneyo7777 got short in first attempt and looking for second
Sahil bhai... Meko v OSCP hi karna hai... can you tell me your Insta? so i can connect with you 🙌🏻
0:53 - Oho Private Jet wale bhi masala ka packet pura khali krte hai 😂😂
This looks like some movie scene man, bhohot mast video👌🏻
Hahaha yes bhai ❤️
@@cryptoknight01 Bhai fb v hack ho sakta hai kya
It's be called something like rubber ducky with auto execution of virus.exe/msi.
You got a new subscriber Congratulations that's me 🎊🎉🎊
Bhai dost paal rakkhe hai ya saanp😂😂
Btw, great content..... Since I'm also a bit into hacking, I can relate to it.... Keep it up!
Title : Scary!!
1 min later : chalo maggie banate hai😐
Lekin Maggie to 2 minute lagte hai banne mai
@@subhamdas2491 2 minute ? 😭😭😭
Waah Herane Bhai, 3k subs to 15k subs in around 1 month congratulations Herane bhai, I am sure if you upload more cybersecurity videos you'll definitely reach 100k subs or 1M subs before 2020 ends
Ok if protection from this attack also shared.
It will be more useful and helpful.
Please make if possible .
Thanks Bro and please upload more video related to cyber security
I think u r a good story teller which is very important for a vloger to have👍👍👍👍Superb job.....
Me who live boots Manjaro to test all USBs: **happiness noises**
Tqsm bro for this wonderful information....
Plz make more videos on such topics with reality so that a normal (zero knowledge of cyber security) person can stay safe from such frauds...
Once again tq...
thanks bro, keep it up.
Best explanation.
Thumps Up
You are awesome bhai this is my second time watching your vlog it's very informative everytime and interesting to watch keep doing the good work you are the best lots of love bhai ❤
Sir please make more demo videos on this awareness love ❤❣your videos you are indias first cybersecurity vlogger...
Very Informative video!
Herane,keep it up❤️😍😍
Thanks mate ❤️
You got a new subscriber!!!
Nice video👍
Very nice video
Good job👍🏻👍🏻👍🏻
This is like rubber ducky
thnq so mch for letting us knw,,love uh broo
Amazing! Thanks for knowledge!
🤟🏻🙂
Thank you for making this video!
Amazing content!
Thankyou so much bhaiya .. for this awareness.. I truly love your channel♥️keep growing
Wow its really awesome to see someone professional to share these small things, hooked with your channel today already subscribed ,keep making more😊😊👍
Sure buddy 🙂
08:20 this attack can be done directly from your Android using nethunter without any external usbs
Yah right..
U can use also your real phone like malduino .... But you need to root your phone....😁👌 Thank me later 😂 for info
No need root no need nethunter
Bro that was cool ,I'm your new subscribe.
Wow, really nice and useful video. You have got a new subscriber. Love your channel....Thanks
Me with a 10 year old pc with 2 gb ram and core 2 duo processor: I am four parallel universes ahead of you
Same specs bruh!😔
@Sanyam ofc it can...and he can hack using those specs as well...
If anyone is wondering about the PCB or the board..yeah that one connected with the cable.. its arduino micro capable of sending keystrokes to the host computer..u may use an arduino leonardo which is a rather big board.. and Bro you could have mentioned with most of the pendrives from sandisk or hp or any name brand one it is impossible to program as it doesn't have a microcontroller ...although it is possible to replace the chip but one need heavy modifications to do it which is very difficult..so use any general pendrive without worrying but yes please dont click on any unwanted files...and yes dont use the cable or pendrive given by herane bro XD
thanks for the knowlegde bro
i was also thinking about this
Exactly 😎
No it is not correct. We can also programme a normal pendrive for this type of attack which can steal your whole data.
@@AyushSingh-lp8wi that is only possible if the autorun is on
Can we use arduino nano????
Thank you very much herane bhai keep uploading such interesting videos full of knowledge which people who don't know will be able to know about how harmful it can be 👍👍
Nice demonstration,thank you
Cyber Lawyer & Cyber Security Analyst
Is nobody gonna talk about how well he actually used the CHOPSTICKS 😱😱😱😳😳😳
Maan Gaya Bhai👍
Great video bhaiya.
Thanks , hoping to see this kind of videos more.
Please make a video on most dangerous young hackers!!
Broooo....it was really awesome yrr...
I really like the way u work and make us aware like a big brother....keep it up....and stay safe stay healthy u and ur family as well.....thank you so much buddy😇😇😇
Everyone thinks herane loves to make new friends but deep down inside herane just practicing his social engineering skills.
Free maggie tutorial 🤣🤣
Bhai bohot sahi kaam kiya... Shuriya humsab kon samjhane ke liye ...
Million dollar video.. dude!!
Love you bhai btane ke liye ❤❤
Can you make a tutorial on how to make this thing? I know it's very dangerous, but I just want to learn it for educational purposes. Please?
BTW Big fan of yours! :) Keep Creating, Keep Enriching Others. Love from Nashik 🤟😊
You will need Kali Linux and windows machine both in virtual environment.
Research about Arduino malware with auto keyboard
Bro u're very inspiring 🥺🥺🥺🥺
Really one of the best video in my life that someone share a good content
Again bro love you , keep on doing more informative videos , love you Bhai
I had had the same experience once.
I gave my frnd one of my pen drives for movies.
I copied the movies onto my computer after receiving my pendrive and I lost my software the next day.
My frnd is no more now..
I killed him after this incident.
100
What 100 ?
Nice
500
@@fury1319 what do u mean by 100 ?
This is really so damn good sir! ❤️
You're a true inspiration for many of us! You inspire us to do more ❤️
Thank you so much sir
Thanks buddy 🤟🏻
This is new information I ll give u likes and support u bhai@@@
Herane bhai bahut sahi
Thank for awareness 😊😊😊
Rubber ducky attack
HiD rubber ducky and method is mimikatz.
USB Rubber Ducky!!
Edited:
sir could you pass on the code, or actually tell us the brains behind it?
Siddharth Singh hye can i have your contact details
Yes,You can Execute Any code Using Rubber Ducky
I knew about the rubber ducky, but the way you social engineered your friend seems more scary especially the last one.
Thnx for this useful piece of knowledge❤️❤️
what if the laptop is on offline mode?
the malware get installed in laptop or when you plug-in the pendrive that time it will execute.
Bro Thats not a malware . when you plug-in computer feel like that is a keybord and a human type some commands.this is attack is key strocking injection.if you laptop is offline the hacker cannot install any malware & hacker could not have your system acess But , the hacker can delete your os
Really I like your work, will it work in Macbooks?
Yes
I really appreciate u ,aware karo!
Like a good boy
Thnx a lot,,,, appreciate your efforts.......
Lol malduino 😂👌 I used this for a 2 years.
6:42 pehla hacker mila jo literally "ENTER " daba k hack kr deta hai sb kuchh...
.
haan haan.. mai bhi bollywood movies dekhta hoon :p :p
It's very good and very helpful information for us thank you for giving us this important information.
Saw your few vlogs, vlogs should be like this only totally natural and simple one. Loved it bro 💙💙🔥
Thank you bro 😊
How to build this type of usb
How to stay safe by using this
USB Rubber Ducky.... 👍
This is not rubber ducky .... It's malduino
@@laggybot1327 its the same thing innit. Both act as a HID device
@@RakshithPrakash i know...!! but its not rubber ducky , its a audrino mini
@@RakshithPrakash Yah it's same thing, both of them works as butter, but big difference is Arduino is cheap but rubber-ducky is too much expensive. Why i point it bro
Awesome bro ❤️❤️❤️
Hey Herane, thanks for the awesome video but once in while people needs to put in some pendrive for sure, can't just say I am not gonna plug in. So any software or security enhancement that could help preventing it will be great. Also can you tell what malware/attack/board is that?
But Brother How can fix this. Any time I entered that pendrive in my pc So how can I fix that Any Ideas
Bro to fix it , first disconnect your system to internet .If you disconnected your system to internet attacker can't access your PC but the attacker can delete your os so always create backups of you os
If you happy and my answer is helpful for you please like it and reply me
@@AadyashaNews how can attacker delete os without internet I think he can't access and I wanted to ask another question that I have norton antivirus which has a secured folder option means even I can not change the content of that folder without password can this thing make change inside that folder also?
Use a vpn. Your internet traffic will not lead to him will create disturbances in the connection. You can use windscribe which has built in firewall that will block the attackers reverse tcp payload. But if attacker is smart he can also do persistence and wait for you to disconnect vpn and gain access again. But thats rare cuz persistence usually triggers AV detection so don’t worry. Just use VPN.
What is this attack called?
How to prevent this?
This is Rubber duckky which work as com interface thus none antivirus can work here as they understand this is a hardware like keyboard
every modern security suite like Bitdefender/Kaspersky easily prevents this attack. This has been discussed already in well known cyber security forums.
forums.hak5.org/topic/50204-bitdefender-av-stop-most-of-bash-bunny-attacks/
It will helped me alot bro Thank you so much bro.
good info. thanks :)
But he needs to have active connection through internet?
Point
Hmm that he missed
What's the name of this technique?
@@musicstation5664 remote access through backdoor
You look like Magnus Carlson 😂
😂lol sasta magnus Carlson
I agree lol
Sic mundus Creatus est
Thanks bro for spreding awareness😊😊
Awesome 😊
This is kind of backdoor one of my friend created a backdoor which was programmed to delete every file from window and eventually corrupt it. And mere sath esa mzak kra usne😂sale ko bht mara.
This doesn't expalin many things .. you could have just remotely logged in remotely using ssh. Hacking in real world is a lot hard then what is depicted.
Its harder to hack others not the ones who trust u social engineering is best hack
@@dipeshlama5924 social engineering is the way but you still need to have active connection to the machine. Internet connection and the same time you need be online. Hack is only possible if you have trick him/her to download the file and you are online. It will give reverse connection but still victims needs to be online.
@@sundeepamrutia lol for newbie's keylogger is enough bro aint talking abt any session establishment or anything as i said its harder to hack other not the person who trust u .... he just made a small demonstration for newbie so people ll understand how everything works why so much hate ....
Very true, it was looking like SSH only!
thnks bro.............................it is intresting one
Thanks Sir for creating this awareness I just found you while scrolling on my home screen and from now I am the member of this 28k family!!
Yo bro 🤟🏻
Good useful video....
Do more videos like this bro
Thank you so much
Apki vlog mujhe bhot acha lgta hain. Bhaiya
Today's I joined your Chanel 👍👍
Herane bhai love your vlogs❤️❤️ i wanted to request can you start teaching hacking on this channel or make another channel for that ... Would love to learn from you❤️
Good Job ! Keep It Up
Thanks brother for sharing valuable information
Bhaut kadak
Thanks bro.👍👍👍👍
The reality every one should be aware of Thanks herane bhaia
keep it up bro 3k subs
Cool thoughting bro
Pyar se subscribe kia hu bhaii 😍😍
Yes. You are right
It's call as HID attacks if I'm not wrong. Nice demonstration mahn. Even you can perform this attack using nethunter ROM in phone. So you don't need to connect that microcontroller behind your phone. you can directly run the HID attacks through your phone. Hope will see some more good stuff on your channel. 🤗
Bhai video dekhkar lag rha hai apke doston ne apka bada wala kaata hai...by the way congrats apka target 10x pura ho gaya❤️
👍Great
Thank you for aware ,
Good video 👌
Yo bro 🤟🏻
Bro really good video maza agya
Super video for hacking awareness
Great knowledge brother ...keep it up 🙂
Yo bro😉✌🏻
Thnks brother for awareness
Awesome video sir! Can't wait to meet you sir, ur a true inspiration for many.
😊
It's very good and informative