"Hack ANY Cell Phone" - Hacker Shows How Easy It Is To Hack Your Cell Phone

Valuetainment
23 Aug 202415:56

Summary

TLDRIn this podcast, cybersecurity expert Ryan Montgomery, known as zero day, showcases various hacking tools, including a Wi-Fi-enabled charging cable that can emulate a keyboard and type at 860 characters per second, potentially for malicious use. He also introduces a 'data blocker' device to prevent such attacks, emphasizing the need for vigilance against cyber threats. Montgomery discusses the balance between ethical hacking for security testing and unethical hacking for criminal activities, highlighting the importance of protecting personal data.

Takeaways

  • ๐Ÿ” The speaker discusses various hacking tools and their potential uses, both ethical and malicious.
  • ๐Ÿ“ฑ A 'charger' device is revealed to have a hidden Wi-Fi chip and keyboard emulation capabilities, allowing for rapid keystroke injection.
  • ๐Ÿ’ธ The NSA is mentioned to have sold similar devices for $20,000, but they are now available at a fraction of the cost.
  • ๐Ÿ›ก๏ธ Data blockers are introduced as a protective measure against malicious charging devices, limiting them to charging only.
  • ๐Ÿ–ฅ๏ธ A device that can capture and transmit screen activity wirelessly is demonstrated, highlighting the risk of unauthorized surveillance.
  • ๐Ÿ’พ The use of SD cards in surveillance devices for storing data is mentioned, showing how data can be retrieved later.
  • ๐Ÿ”‘ The importance of physical security checks, such as inspecting behind computer monitors for hidden devices, is emphasized.
  • ๐Ÿค The speaker shares a personal philosophy on privacy and trust in relationships, suggesting trust is more important than surveillance.
  • ๐Ÿ’ฐ The range of prices for different security and hacking tools is discussed, from affordable to high-end enterprise solutions.
  • ๐Ÿ‘ฎโ€โ™‚๏ธ The script concludes with a call to action for viewers to seek help with cyber security and child safety, offering assistance.

Q & A

  • What is the purpose of the orange tag on the charger mentioned in the script?

    -The orange tag is used to distinguish the charger from a regular one, as it actually contains a Wi-Fi chip and a mini computer that can emulate a keyboard, making it look like a regular charger but with hidden functionalities.

  • What is the speed at which the hidden device in the charger can type?

    -The device can type at 860 characters per second.

  • What is the original price of the NSA's version of the cable mentioned in the script?

    -The NSA's version of the cable is priced at $20,000.

  • What is the function of the device that can be plugged into a phone or computer?

    -The device can monitor keystrokes, inject keystrokes, and potentially install malware or viruses, providing remote control over the connected device.

  • How can one protect themselves from malicious USB devices like the one described?

    -One can use a data blocker, which only allows the device to charge and not perform any other functions, thus preventing any potential malicious activities.

  • What is the name of the device that creates a Wi-Fi network and can be used for penetration testing?

    -The device is referred to as 'OMG cable' in the script, and it is used for ethical hacking purposes such as penetration testing.

  • What is the price range for the most expensive tool mentioned in the script?

    -The most expensive tool mentioned is the cellebrite, with a price range from $20,000 to $50,000.

  • What is the purpose of the 'Unblocker' device mentioned in the script?

    -The 'Unblocker' is a data blocker that not only prevents malicious attacks but also has the capability to perform the same actions as the malicious devices it protects against, for demonstration or testing purposes.

  • What is the role of the 'Malicious Cable Detector' in the context of the script?

    -The 'Malicious Cable Detector' is a device that can be plugged into a system to identify if a connected cable is malicious or not, providing an extra layer of security.

  • What is the function of the device that can be hidden behind a computer monitor?

    -The device hidden behind a computer monitor can wirelessly transmit or store what's displayed on the screen, potentially capturing sensitive information without the user's knowledge.

  • What advice does Ryan Montgomery give regarding relationships and privacy in the script?

    -Ryan Montgomery advises against invading privacy in relationships, stating that trust is important and that if someone is going to cheat, they will do so regardless of any monitoring.

Outlines

00:00

๐Ÿ”Œ The Dangers of Malicious Charging Cables

The speaker introduces a seemingly ordinary charging cable that is revealed to have a hidden Wi-Fi chip and mini-computer capable of emulating a keyboard. This device can type at 860 characters per second and is demonstrated to be capable of monitoring keystrokes and potentially installing malware. The cable is shown to create its own Wi-Fi network, allowing the speaker to control it remotely. The conversation also touches on the cable's original high price when sold by the NSA and the much lower cost available through a friend, highlighting the accessibility of such technology to both ethical and unethical users.

05:01

๐Ÿ›ก๏ธ Protecting Against Malicious USB Devices

The discussion shifts to the importance of using data blockers to prevent malicious USB devices from compromising systems. The speaker shows a data blocker that allows only charging functionality, thus blocking any data transmission. He also introduces a product called the 'Unblocker,' which is a data blocker with a twistโ€”it can also perform the same malicious actions it's designed to protect against, serving as both a tool for protection and a demonstration of potential threats. Additionally, a 'malicious cable detector' is mentioned, which can identify if a cable is malicious, providing an extra layer of security.

10:02

๐Ÿ‘€ Privacy Concerns with Screen-Capturing Devices

The speaker presents a device capable of capturing and transmitting screen activity from any monitor or computer it's connected to. This device can store data locally on an SD card or transmit it wirelessly, raising significant privacy concerns. The speaker advises checking behind screens and computers for such devices and emphasizes the importance of being vigilant about personal privacy and security. The conversation also touches on the potential misuse of such technology and the need for awareness and protection.

15:02

๐Ÿ“ฑ Advanced Tools for Data Extraction

In the final paragraph, the speaker mentions a high-end tool used for data extraction, specifically the Cellebrite UFED, which is used by law enforcement and other entities to extract data from mobile devices. The speaker, Ryan Montgomery, also known as zero day, offers to help with questions regarding child safety, cybersecurity, and the gadgets showcased. The segment concludes with a call to action for viewers to engage with more content on the topic.

Mindmap

Keywords

๐Ÿ’กNSA

The National Security Agency (NSA) is a U.S. government agency responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes. In the video, the NSA is mentioned in relation to a 'cable' that they sell for $20,000, which has been replicated and is now available at a much lower cost. This highlights the theme of surveillance and cybersecurity, where such tools can be used for both ethical and unethical purposes.

๐Ÿ’กPenetration Testing

Penetration testing, often shortened to pen testing, is the practice of testing a computer system, network, or web application to find vulnerabilities that a malicious hacker could exploit. In the script, the presenter discusses how the tools he has can be used by ethical hackers to perform penetration tests on companies, which is crucial for identifying and fixing security weaknesses before they can be exploited by malicious actors.

๐Ÿ’กWi-Fi Chip

A Wi-Fi chip is a component that enables wireless communication in electronic devices. In the context of the video, the presenter reveals that a seemingly ordinary charger contains a Wi-Fi chip that can emulate a keyboard and perform actions such as typing or installing malware, demonstrating how everyday objects can be repurposed for surveillance or hacking.

๐Ÿ’กKeystroke Injection

Keystroke injection is a type of attack where a malicious program or device records or transmits the keys struck on a keyboard, often without the user's knowledge. The video script describes a device that can inject keystrokes at a high speed, which could be used to input malicious commands or gain unauthorized access to a system.

๐Ÿ’กData Blocker

A data blocker is a security device that prevents data transmission through a USB connection, allowing only charging capabilities. The script mentions a data blocker as a protective measure against malicious USB devices that could be used for data theft or as a vector for malware. This illustrates the importance of physical security measures in addition to digital ones.

๐Ÿ’กMalicious Cable

A malicious cable is a device that appears to be a regular charging cable but contains additional hardware that can be used for unauthorized data access or surveillance. The video discusses how such cables can be used to spy on users and how to protect against them, emphasizing the need for vigilance in recognizing and mitigating such threats.

๐Ÿ’กCybersecurity

Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks. The video's theme revolves around cybersecurity, showcasing various tools and techniques that can be used both offensively and defensively. The presenter uses the term in the context of ethical hacking and the importance of securing one's digital environment.

๐Ÿ’กEthical Hacker

An ethical hacker is a security professional who uses their hacking skills to help organizations identify and fix vulnerabilities in their systems. The script describes the role of ethical hackers in penetration testing and how they use tools like the ones demonstrated to improve security, contrasting their intentions with those of malicious hackers.

๐Ÿ’กMalicious Hacker

A malicious hacker is an individual who uses their technical skills to gain unauthorized access to computer systems with the intent to cause harm, steal data, or disrupt services. The video contrasts ethical hackers with malicious hackers, highlighting the potential misuse of the same tools for criminal purposes.

๐Ÿ’กScreen Capture Device

A screen capture device is a hardware or software tool used to record or take snapshots of a computer screen. In the script, the presenter shows a device that can capture and transmit screen activity without the user's knowledge, which can be used for surveillance or espionage, emphasizing the potential risks of such technology.

๐Ÿ’กSD Card

An SD card is a portable memory storage device used in various electronic devices. In the context of the video, the presenter mentions the use of an SD card in a screen capture device to store recorded footage, illustrating how such a common component can be part of a sophisticated surveillance setup.

Highlights

Introduction of a 'cool' tool that the speaker has, sparking curiosity.

Mention of a website for generating humorous content, suggesting a light-hearted tone.

Discussion about checking for personal data breaches, highlighting the importance of digital privacy.

Revelation of a charger that doubles as a surveillance device, emphasizing the intersection of technology and security.

Comparison of the price of a similar NSA tool, indicating a significant cost difference.

Demonstration of the charger's capabilities, showing its potential for both ethical and malicious use.

Explanation of how the device can emulate a keyboard and type at high speeds, detailing its technical specifications.

Concerns raised about the potential for misuse by unethical hackers, addressing the ethical implications of such technology.

Recommendation of using a data blocker for protection against malicious cables, offering a practical solution.

Introduction of a 'data blocker' that is actually a disguised surveillance device, adding a twist to the discussion.

Discussion about the importance of trust in relationships and the speaker's personal philosophy, providing a human perspective.

Introduction of a device that can capture and transmit screen activity, expanding on the theme of surveillance.

Advice on checking for hidden devices in personal spaces, underlining the importance of vigilance.

Mention of a high-end tool used for data extraction, indicating the range of available surveillance technology.

Closing remarks by Ryan Montgomery, offering assistance and promoting safety, summarizing the key message.

Transcripts

play00:00

what other tools do you have there that

play00:01

you want to share with us I got some I

play00:02

got something cool that you appreciate

play00:03

let me see it I want to see it hold

play00:07

on if you want to see something funny

play00:09

while I pull it out um check a email on

play00:11

there like one of your old Gils or

play00:13

something and you can type in Patrick at

play00:15

the storybuilder

play00:16

dcom Patrick atthe thee

play00:20

storybuilder

play00:22

docomo to be a little the site will be a

play00:25

little slower than it normally is cuz we

play00:26

got like 30 to until it comes it we'll

play00:28

wait until it comes show me what you got

play00:30

in and we'll get to it have you checked

play00:32

the uh NPD breach too for your social is

play00:34

probably I would almost guarantee that

play00:36

it's in there so you should probably

play00:38

handle that before you post my interview

play00:41

okay yeah sounds

play00:44

good okay so this is what is this just

play00:48

out of

play00:49

curiosity this looks like something I

play00:51

would use to charge my phone with a

play00:54

charger yeah and you know that's so I

play00:57

have every every single charger you can

play00:58

imagine in here all of them right so

play01:00

actually what this is the reason why I

play01:02

have this little orange thing here is

play01:04

because there is no way I'd ever know

play01:05

that this was a charger I'm sorry that

play01:08

this was not a charger without this

play01:10

orange tag because it is that that uh

play01:14

that perfect so the NSA selling these

play01:16

for

play01:17

$20,000 and I have a friend mg he goes

play01:20

by who is selling them for you know a

play01:22

couple hundred a piece and I have a

play01:24

bunch of them I can show you but this

play01:26

one I pre-loaded with something cool

play01:27

the'll appreciate um so this this is a

play01:30

charger that will work I could hand this

play01:32

to you and say hey here's my charger man

play01:34

or replace yours right whatever you got

play01:36

plugged in I'm sure I have a replacement

play01:38

for that okay um uh you bring this home

play01:41

it could act like a charger forever or

play01:43

but as soon as this plugs in inside of

play01:45

this tiny little plastic right here this

play01:47

inside of this is a Wi-Fi chip a mini

play01:50

computer and this thing emulates a

play01:52

keyboard and can type at 860 characters

play01:55

per second so what I'll do is cuz I'm

play01:58

sure you don't want me to plug this into

play02:00

your computer I don't so let me get my

play02:02

computer set up real

play02:05

quick did you say $20,000 for that well

play02:08

the yeah so the NSA has has a look up uh

play02:11

if if you get it oh it's still stuck on

play02:13

the scan but uh check yeah definitely

play02:15

check back at that but look up NSA um

play02:18

OMG

play02:21

cable and then yeah you should see

play02:25

that's the actual cable itself but if

play02:26

you scroll down to the bottom you'll

play02:28

probably see where the NSA is selling

play02:30

their own version of it before my friend

play02:33

there it is I just found the

play02:36

$20,000 yep I just I'm going to text it

play02:38

to

play02:39

you wow yeah so mg was able to pull it

play02:42

off for a couple hundred doar which is

play02:50

unbelievable and it is it is so

play02:53

dangerous man it's just I have so many

play02:55

gadgets with me and we probably don't

play02:56

have enough time to go through I mean I

play02:57

have literally 50 plus gadgets with with

play02:59

me so I'll show you a couple of them but

play03:02

like don't want to don't want to go too

play03:07

crazy yeah that's a European site that

play03:09

you can buy it

play03:12

from yeah right there say complete

play03:14

wireless pentesting payload platform

play03:18

invisibly embed inside a cable

play03:20

originally a clandestine NSA tool

play03:22

costing over

play03:23

$20,000 now available to everyone 200

play03:26

bucks yeah there's a there's a name for

play03:28

it to I think it was I can't remember

play03:30

the exact name the NSA was calling it

play03:31

but you could see the actual government

play03:33

document with the cost for the for the

play03:36

exactly the same thing so now what does

play03:38

this do um so I'm going to show you what

play03:41

it does but it can it can monitor your

play03:43

keystrokes so you can put this in line

play03:45

in between your key are you kidding me y

play03:47

you can put this in line in between your

play03:49

keyboard and your computer I could put

play03:51

this in straight into your phone I could

play03:53

put this I can type Keys like I said at

play03:55

860 words per second um I can leave it

play03:59

there and come back later this thing has

play04:01

its own Wi-Fi network that I connect to

play04:03

inside of this and then if you were to

play04:05

like you can match this up to yours and

play04:06

see it's absolutely

play04:11

identical 100% same thing yeah so if you

play04:14

didn't have that little orange thing on

play04:16

there you'd easily lose that

play04:19

wow is the one you have is this is that

play04:21

the new design or is that the I couldn't

play04:23

even tell you this is just a well I just

play04:26

meant like is it the woven one or is

play04:27

that this is the one that's the apple

play04:29

one this this is actual Apple okay so

play04:31

let me show you the apple one while my

play04:32

computer is booting I don't know why

play04:34

it's not booted up

play04:38

yet I have so many of them he he gave me

play04:41

a ton yeah here look at this

play04:44

one that is not an Apple

play04:46

charger this is the same thing as the

play04:48

other one yeah yeah yeah and so so let's

play04:51

just say you give this to somebody

play04:52

you're spying on okay they put it to

play04:55

charge you're now seeing who I'm texting

play04:58

what I'm doing I'm playing everything

play05:00

I'm doing you're' seen all of it uh not

play05:02

texting cuz I can't but on on the

play05:05

computer yes yeah on the phone I'm able

play05:07

to inject keystrokes into the phone um

play05:10

like let's say I want to install a virus

play05:12

on your Android or something I could do

play05:14

that with that device but I can't tell

play05:15

what you're typing on your on your

play05:16

computer I can tell what you're

play05:19

typing so these things these things are

play05:24

wild 200

play05:26

bucks yeah per cable you know who buys

play05:28

them who who uses them so they're

play05:32

intended for penetration testers like

play05:33

myself to do the right thing um but you

play05:36

know thread actors can buy them as

play05:40

well all right so let's get this

play05:45

thing they're intended for penetration

play05:48

tests that you do for companies

play05:50

yes okay so make sure everything's

play05:54

plugged in we're not on

play05:56

any yeah there's no internet here

play06:01

all right so what I'm going to do is and

play06:03

you can see here that without this like

play06:08

this orange thing I have on here just so

play06:09

I don't lose it with my actual charger

play06:12

um but I don't have to have that on here

play06:13

I just don't want to don't want to lose

play06:14

it so I'm going to plug this into

play06:17

USBC which you know you can pick

play06:20

whatever one you want so that's plugged

play06:22

into USBC this side I'm not going to

play06:23

connect to anything I could charge my

play06:25

phone with it I could do whatever I want

play06:26

with it but what I'm going to do is on

play06:29

my phone

play06:32

I'm going to go to

play06:34

Wi-Fi I'm going to click OMG now just

play06:37

created a network from this cable that's

play06:40

plugged in that's not that's not we

play06:42

don't have an OMG Network here no no no

play06:44

okay no and this is not plugged into

play06:46

anything okay so this is creating a

play06:48

Wi-Fi network yep I'm going to go to it

play06:51

in my

play06:53

browser and then I have now I have a a

play06:57

an interface here that I can connect

play06:59

with so I'm going to go in the file menu

play07:00

I'm going to load payload

play07:03

one there we go all right so ready now

play07:05

I'm going to hit build and run which I

play07:08

could be very far away from the computer

play07:10

this is just showing an example of

play07:13

it see how fast that's

play07:18

typing what's it doing it's typing pbd

play07:21

podcast and zero day was here get out of

play07:24

here so that could have been anything

play07:26

that could have been a malicious command

play07:27

that could have been a virus that it

play07:29

downloaded that could have been anything

play07:30

that I wanted it to be and I have now

play07:32

remote control over this cable that if I

play07:34

plug right into my phone watch plug it

play07:37

into my phone charges

play07:41

charging you would have no idea that

play07:43

there this implant is in your house just

play07:45

because there's a Wi-Fi in here and and

play07:48

more there's more in there I'm just

play07:49

simplifying it so this is like a smaller

play07:51

computer yeah yeah and it and it weighs

play07:54

the same looks the same feels the same

play07:56

you would never know that that thing is

play07:58

extremely dangerous

play08:00

and you so this is used for an ethical

play08:03

person to do a penetration test on a

play08:05

company what does an unethical hacker do

play08:08

with that tool right there an unethical

play08:10

hacker can use this tool to steal

play08:11

people's credentials to Monitor and you

play08:13

know to to spy on people to look through

play08:16

your webcam to uh to try to get access

play08:19

to your network to to your phone to what

play08:21

you know they they're going to do it for

play08:22

you know they got the criminals do bad

play08:24

things an ethical hacker is going to try

play08:27

to access your computer to access other

play08:29

computer compers to try to take over

play08:30

your company so that you can show where

play08:32

the weaknesses are so you can make it

play08:34

better um so it's it's essentially the

play08:36

same Concepts though uh but one has a

play08:39

good goal in mind the other one has uh

play08:42

you know screwing someone over in mind

play08:45

$2,000 and say used to use it now 200

play08:47

bucks yeah and that's just for one cable

play08:50

I have I mean I could show you all of

play08:51

them if you want to see them all but

play08:52

same exact type of a cable yeah they

play08:54

just look like a real cable and I got a

play08:56

real funny one actually that's uh so the

play08:58

way that I would recommend protecting

play08:59

yourself from this would be with what's

play09:01

called a data blocker right so a data

play09:04

blocker is something like this I'll show

play09:10

you okay so here's here is there's two

play09:13

things here I want to show you so you

play09:15

can buy a data blocker for about $5 on

play09:17

Amazon you can plug any USB device into

play09:20

it and it's only going to limit it to

play09:21

charging so that even if it is a

play09:23

malicious cable it can't be abused this

play09:27

this is this is funny so this was kind

play09:28

of a joke my friend he made this but

play09:30

it's a product he sells it's a data

play09:32

blocker called the Unblocker that blocks

play09:35

blocks these attacks but also has

play09:37

payloads in it to do the same thing so

play09:40

it's a it's a USB data blocker and looks

play09:42

just like one but also does what you

play09:44

just saw it allows you to inject

play09:46

wireless key strokes and monitor Keys

play09:48

Etc so that is for what that is for

play09:50

somebody to protect themselves against

play09:52

what somebody could in yeah and that's

play09:54

how much five bucks no this this one's

play09:56

like 150 bucks that's 150 bucks yeah

play09:58

this is who needs that I mean I don't

play10:01

think you need it I think it's just it's

play10:03

safer to use a real data blocker pay $5

play10:05

$10 on Amazon for one um this is this

play10:08

one's more of just a joke like here's a

play10:10

data blocker that I'll swap yours out

play10:11

with and then I can then I can inject

play10:14

payloads through your data blocker is

play10:16

that is that like an RFID or no that's

play10:18

different no that's different I'll show

play10:20

you that in a second actually and this

play10:22

is the malicious cable detector which is

play10:25

his other thing and I'm I feel like I'm

play10:26

promoting the crap out of him right now

play10:28

and I'm I'm trying appreciating I'm sure

play10:30

he's he's getting a lot of business

play10:31

right now well I uh I I hope so but uh

play10:34

he's such a nice guy he was a help desk

play10:35

guy that ended up doing extremely cool

play10:37

things in the hacking world but uh this

play10:39

is a malicious cable detector that he

play10:41

also sells that if you want to be extra

play10:43

overboard you can buy plug it into this

play10:45

and it'll tell you if it's a malicious

play10:47

cable or not got it got it so yeah let

play10:51

me put these back but I want to show you

play10:52

one more one I'm sorry one one more

play10:54

thing that you you know to worry about

play10:56

something you can check at home um that

play10:58

is uh

play11:00

kind of an interesting concept so you

play11:02

got a

play11:03

girlfriend uh yeah so with your girl I

play11:06

mean you probably know everything she's

play11:08

doing um so you'd be surprised um I a

play11:13

lot of people think that a lot of people

play11:14

think that haven't having a girlfriend

play11:16

uh and having the ability to go through

play11:18

her stuff basically whenever I wanted to

play11:20

I'm going to take that you really could

play11:21

I mean you can find out everything she's

play11:23

doing I could but I I don't and I

play11:26

haven't done that you know almost I've

play11:28

done it maybe when I was younger a few

play11:30

times but as an adult I realized that no

play11:32

matter who you are you're going to find

play11:34

something you don't like no matter what

play11:35

whether it be a smile I'm not a jealous

play11:37

guy by any means but you're going to

play11:38

find a smiley face here or there you're

play11:39

going to find a hard Emoji here or there

play11:41

it's like do I want to piss myself off

play11:43

for no reason so I just don't I don't

play11:45

look if they're going to cheat they're

play11:46

going to cheat on you regardless of what

play11:48

you tell them they're going to do or

play11:49

tell them what they what you want them

play11:51

to do who they can and who they can talk

play11:52

to like don't even try they're going to

play11:54

cheat on you or they're not going to

play11:55

cheat on you so that's just my mentality

play11:57

on it good for you and so what is that

play12:00

do you get those Ritz cheese Krispies

play12:02

because that's like

play12:04

your this yeah we're going to promote

play12:06

Ritz on the like at this point just I'm

play12:09

sitting on with the greatest salesman of

play12:10

all time we got rich cheesec crackers

play12:13

here at the dbd podcast um but yeah I I

play12:17

don't know I just was hungry I brought

play12:18

these I got I thought you were going to

play12:19

do something with that I'm like so he

play12:20

brought he brought Ritz no I was just

play12:22

hungry my kids would be running here

play12:23

right now if that was here they would be

play12:25

you'd become their best friend I love

play12:26

Ritz Bits but I my mouth is so dry those

play12:29

things will probably kill me right now

play12:31

but screen crab this thing this one's an

play12:33

interesting one

play12:36

so uh the cameras aren't set up in a way

play12:38

for me to demonstrate it but check this

play12:41

out so you can

play12:44

probably oh gosh it's in there okay so

play12:48

this device if you see on one side it

play12:51

has USBC yep which you could do USBC to

play12:54

usba which is just this little square

play12:56

USB and then HDMI HDM I and then it also

play13:00

has a little antenna okay right you

play13:02

don't need the antenna it also has one

play13:04

other thing here for uh an SD card which

play13:07

you can fit right here with you know you

play13:08

can put two terabytes in this thing or a

play13:10

terabyte a lot a lot of storage um put

play13:13

your HDMI in put your power in every TV

play13:16

every monitor for the most part is going

play13:18

to have a USB port so get a small USB

play13:21

port a small HDMI put this in the back

play13:24

of a a computer screen or the back of a

play13:26

computer desktop and you could even put

play13:28

a little po posted notes saying like

play13:30

HDMI enhancer or uh do not remove or it

play13:34

it only like something that you know

play13:36

would scare somebody from from

play13:38

unplugging it and this thing can

play13:40

wirelessly from quite quite some

play13:42

distance transmit with almost no delay

play13:45

with in in high quality what's going on

play13:47

on the screen um and if you if you're

play13:50

not within proximity let's say you go

play13:51

out of the proximity of this this

play13:53

antenna it stores all of that footage uh

play13:57

on the SD card which could be it from

play13:59

what I was actually told by a friend

play14:01

years depending on the interval of uh of

play14:03

how often it's taking snapshots so check

play14:07

behind your screens check behind your

play14:08

computers look for a device like this

play14:10

which is like a a man-in-the-middle type

play14:12

of device that is capturing your screen

play14:15

and you know it there's so much more out

play14:18

there to be scared of but this is

play14:19

something that you could easily check if

play14:21

it's there unplug it and uh and throw it

play14:23

in the trash call the police do whatever

play14:25

you got to do so that's going to that's

play14:27

going to record everything you're doing

play14:28

on your screen yes and high quality too

play14:31

and how much is that I don't know I

play14:33

don't know what's the most expensive

play14:34

tool he's got that he's selling does he

play14:37

have something these are all different

play14:38

people yeah these are all what's the

play14:39

most expensive tool out of all these

play14:41

tools that you know that you know most

play14:44

expensive one I have with me right now

play14:47

um is this one because it's just

play14:49

enterprise Enterprise 800 bucks but what

play14:51

else what's something that's

play14:53

astronomical but it's what it does is

play14:55

ridiculous I would say I can't give you

play14:58

all the specifics on how it works but

play14:59

the cell sellbrite which is how they you

play15:02

know some phones are dumped they're very

play15:04

expensive like dumped for all the data

play15:07

that's on them and they're used usually

play15:08

for criminals and traffickers and

play15:10

pedophiles celebrite uh is a very

play15:14

celebrite or cite celebrite that one

play15:16

right there yeah celebrate and how how

play15:18

much would that be they range I think

play15:21

from 20 to 50 I don't know I don't want

play15:24

to give you a false number so something

play15:26

some wild number got it hey guys my name

play15:28

is Ryan Montgomery also known as zero

play15:30

day I'm proud to be part of the app man

play15:32

if you have any questions regarding

play15:34

child safety cyber security or even any

play15:36

of the gadgets that you see me use all

play15:38

over the Internet feel free to reach out

play15:40

I'd be happy to help you with any any

play15:42

questions or concerns you may have stay

play15:43

safe so if you like this clip and you

play15:45

want to watch another one click right

play15:47

here and if you want to watch the entire

play15:49

podcast click right here

play15:54

[Music]

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
CybersecurityHacking GadgetsData ProtectionKeystroke SpyingCharging DevicesWi-Fi HackingEthical HackingCyber ThreatsDevice SecurityCyber Safety