Capabilities of Hackers, Tools Hackers use, and 5 Things You Can Do To Protect Yourself

5.07M views3284 WordsCopy TextShare
Shawn Ryan Clips
These are just a few of the tools that Ryan can effectively operate to penetrate various aspects of ...
Video Transcript:
I'm not going to hack your Wi-Fi but I'll give you a little example of what I could do so all of these networks here they probably appear to be legitimate right it's very illegal to do that of course but uh if I wanted to go outside right now I could even demonstrate later for you they you know I pull this antenna out this is just a small antenna and we can receive airplanes see where they're at there's nothing illegal about receiving them transmitting is where it gets a little bit funky man you are a dangerous man let's go through all the things that you personally could hack if you wanted to um I mean there's it's countless but I could give you some major daily things uh absolutely let's talk about some of the devices those devices you have right here let's talk about all the stuff you can hack into and then and then we'll get into maybe how we can prevent that a little bit so I guess we'll just start with a daily routine you know you wake up in the morning you uh you make your coffee or maybe you take your phone off the charger and you um you check your phone in the morning you might you might check your email you might have you got to make sure every email that you have while you're half asleep is coming from a real person it's not a fishing email someone pretending to be a company that they're not stealing your credentials then you go outside to your garage you get in your car and you have to make sure that there's nobody out there listening for your you know your car key frequency while jamming your car so that they could steal your car later or access your car later and then when you go hit your garage garage door button that somebody doesn't capture that frequency on 433 MHz and uh and you know and those rolling codes have already been broken for most of the models um so then you get in your car and you're driving to uh to to your office or to to your kid school do doing whatever you want and um you know you could get out you let your your kid out to school and now somebody uh as you walk into school just skimmed your back pocket and stole your credit card information so I mean that all that plus you know any anything remote infrared like a TV remote that goes for projectors uh audio devices ceiling fans I mean very simple stuff uh along with Access Control badges anything sub Giger like like key fobs or remote controls for anything um parking Gates so much everything everything I mean everything anything with a battery and a connection a remote connection in any type of way where that reaches the outside of that device is hackable or has been hacked what are these devices here this is a water bottle um so this right here is a uh this is a flipper zero with some uh custom modifications and uh it does a lot this so this is just a proof of concept device but when you start to add your own little additions onto it like this um let me uh let me enable for example Wi-Fi I'm not going to hack your Wi-Fi but I'll give you a little example of what I could do I'll just do something stupid but okay and then we'll do I'm not going to shut your network down Okay so now if you if I can show you on my phone or you could look at your phone but you'll see that instead of me mirroring your network I just created a bunch of fake networks so all of these networks here they probably appear to be legitimate right yeah but they're not these are all fake networks they're all powered by me so as soon as you connect to any of those I have your password I have anything in between so that's that's one thing that's just Wi-Fi and you just oh man so this is so this is is this how people are stealing information this is one of many ways in in an airport in an airport oh yeah I mean airport Starbucks um when you uh it's called a man in the- Middle attack so if I'm on the same network as you I can essentially control the traffic uh you know as if I was the modem or router so instead of when you type google. com instead of your computer telling the router you want google. com you're telling my computer you want google.
com and I'm giving you what I I'm telling you google. com is so it would be called a DNS DNS attack so is this what people are using in the airports when there's I not specific device this is just something that I concocted together but the The Flipper you can buy this thing on the top here is is uh custom I guess what I'm asking is this the method they th so could you can so let's what is um what like Wi-Fi flight or uh go go go go and flight yes go they're actually I mean you can obviously you can hack anything but GoGo inflight they they have a pretty good segment on their Network so you're pretty safe with go go uh you there's a chance of getting hacked but not the same as like a Starbucks or a or here like you know your network has to be segmented into chunks okay and uh go go segments it pretty well okay I guess what I'm saying is could you create a fake Wi-Fi network with that thing that says go go in Flight one people are like oh that must be it I can do that here I mean it's I can make any any they're called s b ssids ssids the name of a network you could do that with with any name but instead of that what you do is you just scan the local area and then now I know all the Network's names around here and then I'll Target all of them at the same time so that that way anyone in this complex or where we're at um you know anyone that connects to a network is going to you know think it's their Network and they're going to connect to me instead holy that's just one of many Wi-Fi attacks so there's many ways Wii what else can this thing do um there things like the size of the Palm or your hand yeah well with this with this little you know custom extension especially when I have my big these aren't the big antennas but I got big antennas because you know I want to get long range but uh you know that's Wi-Fi this this side of things is also Wi-Fi but uh also it it's an NRF 24 so it does Wireless mice and keyboards so if you use a wireless mouse and keyboard not every single one of them is vulnerable a lot but a lot of them are I'd highly recommend you go back to wired even though it sounds old school that's what you should do because I could control your mouse and keyboard with this device and send keystrokes way faster than you can type them and uh take over your computer without even having to see you or it so I could do that through the wall um this is scaring the out of me um and then I you know I the sub gigahertz stuff with bigger antennas of course I can go further away so with car car keys garages Gates anything that that's on radio frequency I could do with this um RFID uh that's Access Control badges for doors and and pool Keys you know anything that has like a little beeper where you beep into the the door yeah and NFC is credit cards and access control and it does ALS some more things too you could also like I could tap your phone and give you my Instagram or tap your phone and give you my business card so NFC is a little more uh versatile than RFID but they both essentially or uh I believe it's called passive uh devices they're powered by the uh the receiver they don't have a battery in them so what let's just run through just a list of all the things you can hack with that one little device I mean I don't want to make it into an ad about flipper because it's not flipper itself like I'll tell you but I'm just saying that flipper itself if you're going to go online and buy one of these and expect to be able to do everything that I'm talking about you need to have C some firmware or software whatever you want to call it um that allows you to do that and you need to know how to modify it so don't go out spending $180 on this device thinking you're going to hack somebody's car or steal their credit card because that's not going to happen um but if I if you want to go down the list I mean there's a ton of things there's like you know all the all the radio things I just told you about um the RFID stuff the NFC which is the credit cards and and more infrared which is TVs projector and many other devices gpio which is just anything that connects to the outside of this device so I can make devices work and this be the controller for it uh I button which is a form of authentication that uses um these things these little metal prongs as a key uh bad USB which emulates a keyboard types like you know a couple thousand words a second wow or I'm sorry a minute I'm sorry a thousand words a couple thousand words a minute uh and then it also has some use cases that aren't hacking like uh two Factor authentication this is a you know offline device where you can generate your two Factor without needing a device that's connected to the internet so it does that too and then there's a ton of other sub applications that are on here like hundreds of them that do little little things so a lot just with this one device this thing you know it it does just radio but it does a lot more than this thing really yeah what does that one do this one you can hack airplanes with I mean that I mean that's the an extreme but that's something that you can actually accomplish with this using adsb um you can choose to either receive or transmit um so you can choose to either receive or transmit adsb with this device uh and that's the frequency to tell a plane you know it's call sign position and and more and um it's very illegal to do that of course but uh if I wanted to go outside right now I could even even demonstrate later for you they you know I pull this antenna out this is just a small antenna um and we could receive airplanes see where they're at there's nothing illegal about receiving them um transmitting is where it gets a little bit funky you know uh but yeah adsb this one does a lot like something like a joke for example Touch Tunes they at a bar they're little jukebox machine Duke boox machines that you pay for yeah this device uh Brute Forces them meaning goes through 0000 to 9999 looking for a PIN code and once it gets it I can fully control that jukebox like like I have like I'm the owner of it so you know just just for fun or Subaru cars some some years of Subaru I have this pre-program that can unlock and unlock unlock and lock a Subaru no problem um I could do that with this as well but this thing way stronger bigger range way more support way more programs out there this device is a lot more dangerous in my eyes than that device really yep man you are a I think if this is the fifth time I've said it I think you are a dangerous man but well I'm I'm safe safe you know ethical you could be if you wanted to be I'm trying to go into detail about these things just for the just for the Nerds out there like me that are listening I'm not going into exhaustive detail about these devices because most people are not going to care so I'm just giving the general overview oh I think I think they're going to care when they realize how vulnerable they are no I don't mean they don't care about what what they can do but they care about the technical specifics yeah what we get a lot of our we pretty much everything that we have is from China okay you know all of our Electronics everything it all what what do you say 90% of it probably comes from China do you think we need to worry about what they're putting in our Electronics uh uh yeah yeah I mean I'll give you one example I bought this awesome vacuum and mop that's in one is a Allin one vacuum mop called Teno and uh it completely connects to a Chinese server to uh to transmit and receive information like I made it I made a joke out I actually have a video of it where you could turn the audio on for it like when you plug in it says charging started charging sto like when you put it on and off I can control that with my computer through a Chinese Cloud Server there's no reason that that vacuum and MOB should connect to a Chinese cloud cloud infrastructure whatsoever but uh it does and at any point they could change the way that functionality works and take over my home network with this vacuum mop are you Ser with a vacuum mop yep how many devices do you think has have these things in them anything with a Wi-Fi connection it's you know not not not everything's going to be China beaconing back and forth but anything with a Wi-Fi you know anything with Wi-Fi capability is going to open up you know an attack Vector washing machines refrigerators just why does a vacuum op I don't know Wi-Fi capability I'd love to tell you it's uh I have I have the video I could show you I could find it sometime but it's uh I have that and then I have the app I can show you I can adjust the volume I can check when the last time I use it does it need to be cleaned does it you know it tells you all that stuff but it's using a Chinese server that I can control from my computer now that I've captured the traffic between the mop and the server how many devices do you think we have that are connected to a Chinese server and what would they be getting out of it I mean it's all about data nowadays so I mean I think that data is the most important thing to them because it's worth money and uh advertising dollars or or would be spent better for you know with with targeted demographics so I think that they're using that information to Target you on the stuff that they that you need you know if you or someone that you love is looking up something obviously Google's going to figure out uh how to Target you on that on that thing and then sell that data to other people and they they call it retargeting whereas if they have access to your direct Network and they could see you know things that you didn't even fully like search out or you're typing on a different application like a chat application where you're not even searching about it you're just talking about it that data is very valuable because they know about something before Google does or somebody some other large data broker interesting what are what are five simple things that people can do to protect themselves from from hackers use a password manager um install an antivirus or consult with an an IT company that has cyber security expertise or a cyber security company uh one of one of those many options but talk to somebody unless you're an expert yourself uh use an RFID blocking wallet uh and potentially if you want to be extra safe use a key fob that has an RFID shield on it uh that way your key fob doesn't work outside of that Shield can't be cloned some cars require you know tap to start so you know use something like that uh be careful with the websites that you're visiting if the browser is telling you the site looks unsafe then it's probably unsafe and if uh you know if you're told otherwise make sure who you who's telling you otherwise is legitimate and you know just be careful I mean just use your common sense if something looks too good to be true it probably is okay what about we're we live in a day and age where you're getting spam calls every 5 minutes you're getting spam texts every 5 minutes and a new marketing emails coming in every 2 minutes it's I mean it's ridiculous mhm do we need do we need to worry about that stuff if I open a text could I be hacked just from opening the text technically yes I mean like I said earlier the zero click attacks that they're willing to pay a ton of money for there's government agencies that already have them you know there was one going around for uh quite a long time uh there was one around for quite a long time called Pegasus uh and then there was another one called Pegasus 2.
Related Videos
Ryan Montgomery - #1 Ethical Hacker Who Hunts Child Predators Catches One Live On Podcast | SRS #56
2:48:36
Ryan Montgomery - #1 Ethical Hacker Who Hu...
Shawn Ryan Show
8,773,423 views
Master The Flipper Zero: The Ultimate 2024 Starter Guide With All The Latest Tips And Tricks!
23:44
Master The Flipper Zero: The Ultimate 2024...
Talking Sasquach
353,861 views
This Makes Hacking TOO Easy - Flipper Zero
12:12
This Makes Hacking TOO Easy - Flipper Zero
Linus Tech Tips
6,263,855 views
Hacker Shows Navy SEAL How Easy It Is To Obtain People's Information
13:10
Hacker Shows Navy SEAL How Easy It Is To O...
Shawn Ryan Clips
1,853,218 views
Hacker breaks down how they hack into banks - with Jason Haddix
3:48
Hacker breaks down how they hack into bank...
The Security Repo
43,498 views
3 Levels of WiFi Hacking
22:12
3 Levels of WiFi Hacking
NetworkChuck
2,726,636 views
Hacker Finds HORRIFIC Website with THOUSANDS of Child Predators | Horror Stories with Hackman
18:45
Hacker Finds HORRIFIC Website with THOUSAN...
Shawn Ryan Clips
4,818,769 views
"Hack ANY Cell Phone" - Hacker Shows How Easy It Is To Hack Your Cell Phone
15:56
"Hack ANY Cell Phone" - Hacker Shows How E...
Valuetainment
3,619,472 views
Flipper Zero vs "Proper" Hacking Tools
40:02
Flipper Zero vs "Proper" Hacking Tools
David Bombal
373,352 views
Ethical Hacker Warns: Check Your Charger ASAP & What Happens After Clicking Adult Sites
12:38
Ethical Hacker Warns: Check Your Charger A...
Video Advice
3,857,679 views
Hacker Finds Child Predator in 10 Seconds During Podcast Show with Navy SEAL
10:38
Hacker Finds Child Predator in 10 Seconds ...
Shawn Ryan Clips
2,211,642 views
How To Access the DARK WEB in 2024 (3 Levels)
15:20
How To Access the DARK WEB in 2024 (3 Levels)
NetworkChuck
6,371,238 views
Destroying SCAMMER Computers Live On CCTV!
21:31
Destroying SCAMMER Computers Live On CCTV!
Scambaiter
6,943,910 views
SEAL Team 6 Member Spares A Man's Life
14:22
SEAL Team 6 Member Spares A Man's Life
Shawn Ryan Clips
3,621,213 views
How the Greatest Hacker Manipulated Everyone
25:25
How the Greatest Hacker Manipulated Everyone
Newsthink
3,519,759 views
Are VPNs even safe now? Hacker Explains
30:20
Are VPNs even safe now? Hacker Explains
David Bombal
458,543 views
"Your Microphone is Working 24/7"
25:29
"Your Microphone is Working 24/7"
Be Inspired
1,085,014 views
Ethical Hacker: "100% your phone is hacked!"
15:10
Ethical Hacker: "100% your phone is hacked!"
Be Inspired
3,014,835 views
What Does The #1 Ethical Hacker in The World Carry Everyday?
25:27
What Does The #1 Ethical Hacker in The Wor...
Shawn Ryan Show
1,274,609 views
How Hackers Stole $1,000,000,000 From Banks
14:11
How Hackers Stole $1,000,000,000 From Banks
fern
4,278,763 views
Copyright © 2025. Made with ♥ in London by YTScribe.com