YTread Logo
YTread Logo

Capabilities of Hackers, Tools Hackers use, and 5 Things You Can Do To Protect Yourself

Apr 17, 2024
I'm not going to hack your Wi-Fi, but I'll give you a small example of what it could do, so all of these networks here probably look legitimate, right? It's very illegal to do it, of course, but if I wanted to come out right now, I could even show you later, you know, I took out this antenna, this is just a small antenna and we could receive planes, see where they are, there's nothing illegal about receiving them, transmitting is where it gets a little weird. man, you are a dangerous man, let's go over all the

things

that you personally could have if you wanted to, I mean there are countless, but could I give you some important daily

things

, uh, absolutely, let's talk about some of the devices, those devices that you have, right?
capabilities of hackers tools hackers use and 5 things you can do to protect yourself
TRUE? Here let's talk about all the things you can hack and then we'll see how we can prevent it a little bit, so I guess we'll start with a daily routine, you know, you wake up in the morning. you, uh, make your coffee or maybe take your phone off the charger and you, um, check your phone in the morning, you might check your email, you might need to make sure you get all the emails that you have while this. half asleep it comes from a real person it's not a phishing email someone posing as a company that's not stealing your credentials then you go out to your garage, you get in your car and you have to make sure no one is out there by listening you know the frequency of your car key while you lock your car so they can steal it later or access your car later and then when you press the garage door button someone doesn't pick up that frequency at 4 33 megahertz and uh And you know, those rolling codes have already been cracked for most models, so you get in your car and drive to your office or your kids' school doing whatever you want and you know you could.
capabilities of hackers tools hackers use and 5 things you can do to protect yourself

More Interesting Facts About,

capabilities of hackers tools hackers use and 5 things you can do to protect yourself...

Sal, you let your kid go to school and now someone when you walk into school just flipped through your back pocket and stole your credit card information, so I mean all that, plus you know anything remotely infrared, like a TV remote control that works for projectors, uh. audio devices, ceiling fans, I mean very simple things, along with access control badges, anything below gigahertz, like key fobs or remote controls for anything, parking gates, everything, everything, I mean everything, anything with a battery and a connection, a remote connection of any kind. the way it gets to the outside of that device is it hackable or has been hacked what are these devices here?
capabilities of hackers tools hackers use and 5 things you can do to protect yourself
This is a water bottle. So this here is a Flipper Zero with some custom modifications and it does a lot of things. just a proof of concept device, but when you start adding your own little edits to it like this, let me, let me enable, for example, Wi-Fi. I'm not going to hack your Wi-Fi, but I'll give you some. example of what I could do, I'll just do something stupid, but okay, and then we'll do it. I'm not going to shut down your network, okay, now I can show it to you on my phone or you can look at your phone. but you'll see that instead of mirroring your network, I just created a bunch of fake networks, so all of these networks here probably look legitimate, yeah, but they're not.
capabilities of hackers tools hackers use and 5 things you can do to protect yourself
They are all fake networks and they all work. I, as soon as you connect to any of them, I have your password, I have something in between, so that's just Wi-Fi and you, oh man, so this is it, this is how people are stealing information. one of them anyway at an airport at an airport oh yeah I mean Starbucks airport um when you uh it's called man in the middle attack so if I'm on the same network as you I can essentially control the traffic uh you know If I were the modem or the router, instead of typing google.com, instead of your computer telling the router that you want google.com, you're telling my computer that you want google.com and I give you what wanna.
I'm telling you that google.com is like this, it would be called a DNS DNS attack, so is this what people use at airports when there are? I'm not the specific device, this is something I invented together, but you can buy the flipper. What's at the top here is, uh, custom. I guess what I'm asking is this the method they release, so could you do it? So how would you like a flight with Wi-Fi or uh Gogo Gogo inflate? Yes, actually they are, I mean you. Obviously, you can hack anything except GoGo inflate. They have a pretty good segment on their network, so you're pretty safe with GoGo.
There is a chance of getting hacked, but it's not the same as Starbucks or here as you already know. your network has to be segmented into chunks, okay, and uh, see, it segments pretty well, okay. I guess what I'm saying is because you create a fake Wi-Fi network with that thing that says, go on Flight One, yeah, that must be it. I can do that here, I mean I can make anyone called bssids ssids the name of a network, you can do it with any name, but instead what you do is you just scan the local area and then I know I know all the names of the networks around here and then I'll address them all at the same time so that way anyone in this complex or where we are, you know, anyone who connects to a network, will know.
I think it's their network and they're going to connect with me. Holy shit, that's just one of many Wi-Fi attacks, so there are many ways, yeah, what else can this thing do? Oh, this thing is like the size of the palm of your hand, yeah, well. this with this little custom extension, you know, especially when I have my big antenna, these are not the big antennas, but I have big antennas because you know I want to get long range, but you know that's Wi-Fi, this side of the things is too. Wi-Fi, but it's also an NRF uh 24, so it works with wireless mice and keyboards, so if you use a wireless mouse and keyboard, not all of them are vulnerable, but many of them are.
I highly recommend you go. Going back to wired, even though it sounds old school, that's what you should do because I can control your mouse and keyboard with this device and send keystrokes much faster than you can type them and, uh, take the control of your computer without even having to see you. I could do that through the wall, this is scaring me, and then, you know, I have subgigahertz things with bigger antennas, of course, I can go further, so with car keys, garages, doors , anything that is on radio frequency. You could use this, um, RFID, which is access control badges for gates and pool keys.
You know, anything that has like a little beep where the door rings, yeah, and NFC is credit cards and access control, and it does a few other things as well. I would also like to be able to tap your phone and give you my Instagram or tap your phone and give you my business card so NFC is a little more versatile than RFID, but they're both essentially, I think they're called passive devices, they work. By the way, the receiver doesn't have a battery, so let's go over a list of all the things you can hack with that little device.
I mean, I don't want to turn it into an ad about Flipper. because it's not flipper itself like I'm going to tell you, but I'm just saying flipper itself if you're going to go online and buy one of these and you expect to be able to do everything I'm talking about, you need to have custom firmware or software whatever you want to call it, that'll give you It allows you to do that and you need to know how to modify it, so don't spend 180 on this device thinking you're going to hack someone's car or steal their credit. card because that's not going to happen, um, but if you want to go down the list, I mean, there's a bunch of stuff, like you know all the radio stuff that I just told you about, um, the RFID stuff, the NFC stuff, which is the credit cards and and more infrared, which is televisions, projectors and many other devices, gpio, which is anything that connects to the outside of this device so that it can make the devices work and this is the controller, uh, button, which is a form of authentication that uses these things these little metal spikes like a key uh bad USB that emulates a keyboard guys like you know a couple thousand words per second wow or sorry a minute sorry a thousand words a couple thousand of words per minute uh and then It also has some non-hacking use cases, like two-factor authentication.
This is an offline device you know where you can generate your two factors without needing a device that's connected to the internet so it does that too and then there's a bunch of other sub apps that are in here like hundreds of them that do such small little things just with this device, you know, it only does radio, but it does so much more than this, really, yeah, what does that one do? one that you can hack planes with, I mean, I mean, it's extreme, but that's something you can actually achieve with this using adsb um, you can choose to receive or transmit um, so you can choose to receive or transmit adsb with this device and that's how often to tell an airplane that you know the position of the call sign and more and um, it's very illegal to do that, of course, but if I wanted to leave right now, I could even prove it later, you think you know, I took out this antenna.
This is just a small antenna and we could receive planes, see where they are, there's nothing illegal about receiving them, transmitting is where it gets a little weird you know, but yeah, adsb, this one does a lot, kind of a joke. for example, Touch Tunes, they're in a bar, their little jukebox, Duke cash machines that you pay for, yeah, this device, uh, Brute Force, means it goes from zero zero zero to 999 looking for a PIN code and once he gets it, I can completely control him. That jukebox is like he owns it, so you know, just for fun or a few years old Subaru car.
I have this pre-programmed that can unlock and unlock, unlock and lock a Subaru, no problem, um, it could. do it with this too, but this thing is much stronger, longer range, more support, more programs available, this device is much more dangerous in my opinion than that device, really yeah man, you are a I think if this is the fifth time I do it. I've said it, I think you're a dangerous man, but hey, I'm safe, you know, ethical, you could be if you wanted to. I'm trying to go into detail about this stuff just for nerds like me. who are listening, I'm not going to go into exhaustive detail about these devices because most people aren't going to care so I'm just giving a general overview, oh I think they will care when they realize how vulnerable they are.
They are, no. I don't want to say that they don't care about what they can do, but they do care about the technical details, yes, we receive a lot of our products, almost everything we have is from China, okay, you know all our electronics, everything we have . You say 90% probably comes from China? Do you think we should worry about what they are putting in our electronic products? Yes Yes. I mean, I'll give you an example. I bought this amazing vacuum cleaner and mop that are in one, it is an The all in one vacuum cleaner is called a tinico and it connects completely to a Chinese server to transmit and receive information like I did.
I made a joke. In fact, I have a video where you can turn on the audio for it's like when you plug it in, it says charging started, charging stopped, like when you turn it on and off. I can control that with my computer through a Chinese cloud server, there's no reason for that vacuum cleaner and MOB to connect to a Chinese cloud, er, cloud infrastructure. in any case, but it does and at any time they could change the way that functionality works and take control of my home network with this vacuum. Are you serious about a vacuum cleaner?
Yeah, how many devices do you think these things have? a Wi-Fi connection that you know will never not everything will be China coming and going, but anything with Wi-Fi, you know anything with Wi-Fi capability will open up, you know, an attack vector, washing machines, refrigerators, just, Oh. What is a vacuum mop? I don't know Wi-Fi capacity. I would love to tell you what it is. Have. I have the video. I could show you. I might find it at some point, but I have that and then I have the app. I could show you that I can adjust the volume.
I can check when was the last time I used it. No need to clean it. Know? It tells you all that, but it's using a Chinese server that I can now control from my computer. I have captured the traffic between the mop and the server, how many devices do you think we have that are connected to a Chinese server and what would they get from it? I mean, nowadays everything is about data, so I think Data is the most important thing to them because it's worth money and advertising dollars or it would be better spent on specific demographics, so I think they're using that information to target to you in the things you need.
You know if you or someone you love is searching for something, obviously Google will figure out how to target you on that thing and then sell that data to other people and they'll call it retargeting, whereas if they have access to your direct network and they can see that you know things that You didn't even like searching or you're typing in an appdifferent, like a chat app, where you're not even searching, you're just talking about it, that data is very valuable because they know something before Google or someone some other big data broker interesting what are five simple things people can do what to do to

protect

yourself

from

hackers

use a password manager um install an antivirus or consult with an IT company that has experience in cybersecurity or a cybersecurity company uh one of those many options, but talk to someone unless you are a expert uh use an RFID blocking wallet uh and potentially if you want to be more secure use a key fob that has an RFID shield that way your key fob doesn't work outside of that shield it can't be cloned some cars require you to know above to start, to As far as you know, use something like that, be careful what websites you're visiting, if the browser tells you that the site looks unsafe then it's probably not safe and if you know, if they tell you otherwise, make sure who it is.
Telling you otherwise is legitimate and you know to be careful. I mean, use your common sense. If something seems too good to be true, it's probably okay. What about us? We live in a time where you receive unwanted calls every day. five minutes you receive unwanted text messages every five minutes and new marketing emails arrive every two minutes. I mean, it's ridiculous. Do we need to worry about those things? If I open a text message, could they hack me just by opening the text technically yes, I mean like I said before, zero click attacks are willing to pay a ton of money because there are government agencies that already have them, you know what? there was one circulating for quite a while, there was one circulating for quite a while called Pegasus and then there was another one called Pegasus 2.0 and it didn't require any user interaction from anyone, you would just send it to a phone number and you would have full remote access to your phone. even without opening the text without opening anything sacred, how do you defend against something like that?
If you can not. There is no way to defend. That's why they're so valuable because there's nothing you can do. How do most

hackers

get in? I have to click on a link, yeah, yeah, I mean, sometimes it's a link, sometimes it's a file, sometimes it's a photo, sometimes it's an exploit chain of multiple things that become it. It could be a Word document. It could be anything. When it comes to zero. days and zero-click exploits, requires no user interaction and they won't know your phone is infected. Hello everyone, I'm Sean Ryan. Click here to subscribe to the Sean Ryan Show YouTube channel for the most interesting and compelling interviews.
You won't see them anywhere else. I also made a playlist of all the previous SRS episodes so they're easy to find. You can find them right here.

If you have any copyright issue, please Contact