A Smart Card Reader With Hacked Drivers

Ғылым және технология

an IT employee for a large government contractor purchased a smart card reader. Good thing he scanned the downloadable drivers with antivirus because they came with malware.
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
Dash
Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz
Zcash
t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr
Chainlink
0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14
Bitcoin Cash
qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp
Etherum Classic
0xeA641e59913960f578ad39A6B4d02051A5556BfC
USD Coin
0x0B045f743A693b225630862a3464B52fefE79FdB
Subscribe to my KZread channel goo.gl/9U10Wz
and be sure to click that notification bell so you know when new videos are released.

Пікірлер: 693

  • @j4yd34d5
    @j4yd34d52 жыл бұрын

    Mental Outlaw is the ultimate advocate for the Amish community.

  • @radomane

    @radomane

    2 жыл бұрын

    Big doinks

  • @nedasmozuraitis5818

    @nedasmozuraitis5818

    2 жыл бұрын

    Yes sir.

  • @Dankucci

    @Dankucci

    2 жыл бұрын

    Haaaa

  • @dsa43fsdf

    @dsa43fsdf

    2 жыл бұрын

    Amish cybersecurity and opsec is next level

  • @tawe7498

    @tawe7498

    2 жыл бұрын

    Don't need operational security when you don't have an operation at all

  • @grzes848909
    @grzes8489092 жыл бұрын

    the more I I learn about electronics the more I understand why most IT experience people tend to use as least amount of technology in their personal lives

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆

  • @voidimperial1179

    @voidimperial1179

    2 жыл бұрын

    There are two types of people into technology: those who install smart appliances everywhere, and those who refuse to touch any smart appliances.

  • @djsaekrakem3608

    @djsaekrakem3608

    2 жыл бұрын

    @@voidimperial1179 Its all marketing to the general dumbed down masses. Also trendy to the normies.

  • @stevefan8283

    @stevefan8283

    2 жыл бұрын

    um, no?

  • @fakezpred

    @fakezpred

    2 жыл бұрын

    @@stevefan8283 Actually yes. Imagine if someone compromised your smart devices. Guess your thermostat is getting turned way down then.

  • @dherokbattleborn
    @dherokbattleborn2 жыл бұрын

    Important things like this should be provided directly and ideally manufactured in the country using them. It’s silly to think our government and their contractors do stuff like this to save time and money when they could just hire a few more people to audit things as well as work with a local manufacturer

  • @SieTeppischfresser

    @SieTeppischfresser

    2 жыл бұрын

    Government laptops already have CAC readers in the laptop.

  • @VengeanceRMP

    @VengeanceRMP

    2 жыл бұрын

    They actually do verify the equipment they use on a grander scale. A lot of office equipment like these are, as others have mentioned, built in & provided where you work. At home on your own system(s) can be a different story.

  • @silence___

    @silence___

    2 жыл бұрын

    @Johnny depp I'm starting to think some of these were authentic accounts at one point

  • @GHOSTTIEF

    @GHOSTTIEF

    2 жыл бұрын

    @@silence___ probably people who clicked on the phishing emails

  • @bigblackbadger1

    @bigblackbadger1

    2 жыл бұрын

    @Johnny depp finally a spam bot is here

  • @ThZuao
    @ThZuao2 жыл бұрын

    Quite common in Brazil. They swap the reader thing, usually from a gas station, with a hacked one. Then wait for the harvest. Got mine stolen once. 3 purchases at 1am. I was awake at the time, my bank sms me all purchases made over R$50, so I knew immediatelly, called my bank, cancelled the transactions and cancelled the card in like 20 minutes.

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.....

  • @windowsxseven

    @windowsxseven

    2 жыл бұрын

    @Rare one got DAMN it's finally here no way

  • @TiagoTiagoT

    @TiagoTiagoT

    2 жыл бұрын

    I don't think he's talking about the same thing...

  • @epicat0r

    @epicat0r

    2 жыл бұрын

    Dude. They're both bot accounts 🤣

  • @TiagoTiagoT

    @TiagoTiagoT

    2 жыл бұрын

    @@epicat0r I was replying to OP

  • @Frog_Scooper
    @Frog_Scooper2 жыл бұрын

    It's crazy how well social engineering and just standing around with boxes works

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @boobgoogler

    @boobgoogler

    2 жыл бұрын

    @@whats5471 bro why are you trying that scam on a cyber security channel 🗿

  • @oceanbytez847

    @oceanbytez847

    2 жыл бұрын

    @@boobgoogler They really hit this channel harder than usual. I have no idea why.

  • @engineeredtruths8935

    @engineeredtruths8935

    2 жыл бұрын

    @@boobgoogler idiot here, what is the scam? lmao

  • @joeh858

    @joeh858

    2 жыл бұрын

    @@oceanbytez847 it's kinda self explanatory

  • @randomuseryt5143
    @randomuseryt51432 жыл бұрын

    speaking of malware, youtube has been serving ads of "free games" websites, witch serves malicious fake installers, double packed MSI installer with a small c++ program (and some accompanying 7z archive with a password i couldn't find any ware) that fucks with your DNS config and bricks your internet connection, reminiscent of most of the malware you'd find on TPB back in the day

  • @burn_out

    @burn_out

    2 жыл бұрын

    KZread used to advertise drugs selling onion marketplaces in Russia lol

  • @whats5471

    @whats5471

    2 жыл бұрын

    @@burn_out 👆👆👆..

  • @randomuseryt5143

    @randomuseryt5143

    2 жыл бұрын

    they are all the same installer just downloaded under a different name

  • @Liamfr34k

    @Liamfr34k

    2 жыл бұрын

    how would you know if you have this?

  • @DigitalApex

    @DigitalApex

    2 жыл бұрын

    @@Liamfr34k Your internet wouldn't be working

  • @lawrencemanns2182
    @lawrencemanns21822 жыл бұрын

    Great timing. Pulled a fake keypad off my local ATM two days ago. Sneaky bastards

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @kevina.4036
    @kevina.40362 жыл бұрын

    Ah yes, Amazon special Chinesium smartcard reader for DoD CAC authentication. What could possibly go wrong?

  • @520_metal

    @520_metal

    2 жыл бұрын

    China bad upvotes to the left

  • @My_Old_YT_Account

    @My_Old_YT_Account

    2 жыл бұрын

    @Johnny depp shut up bot

  • @konradcedro1316

    @konradcedro1316

    2 жыл бұрын

    I’m dying 😭🤣

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆...

  • @My_Old_YT_Account

    @My_Old_YT_Account

    2 жыл бұрын

    @@whats5471 shut up bot

  • @Littlefighter1911
    @Littlefighter19112 жыл бұрын

    This reminds me of the Despicable Me meme: "First, identify smart card reader used by military. Second, get access to vendor's website where drivers are hosted. Third, infect it with well-known malware that's being detected by most antivirus software."

  • @fluffypinkpandas

    @fluffypinkpandas

    2 жыл бұрын

    Yeah talk about getting a shot at fuckin Smaug's scale gap, and announcing it to him. Thats what he just did. Its patched now. What a waste of a good vulnerability. The dude should have waited, got some dudes together, some funding to make it a very professional stealth rat, or even an evolving botnet. But with stealth. Something that is well worth it considering its a military grade backdoor. But instead they give it a script off the streets and just completely waste it. ...just classless.

  • @The_Bird_Bird_Harder

    @The_Bird_Bird_Harder

    2 жыл бұрын

    @@fluffypinkpandas I mean, is the point here not to expose the vulnerability? As opposed to like. Become a felon?

  • @fluffypinkpandas

    @fluffypinkpandas

    2 жыл бұрын

    @@The_Bird_Bird_Harder from a certain point of view, Anakin

  • @noanswer1864

    @noanswer1864

    2 жыл бұрын

    @@The_Bird_Bird_Harder Taking note that a door is left unlocked, but not going through it, is not breaking and entering. It is merely being observant. Doing nothing with this piece of information you just gained, because you might need that information later, is similarly not "Conspiracy to commit." You just know about an unlocked door, and you've got no intention to tell anyone. You can't call it negligence either, it isn't the observer's reasonable responsibility.

  • @sethadkins546

    @sethadkins546

    Жыл бұрын

    @@fluffypinkpandas The thing about that is Mental's not a criminal....

  • @doooofus
    @doooofus2 жыл бұрын

    An IT employee for a large government contractor bought a smart card reader. This is what happened to his highly sensitive data.

  • @EricGranata

    @EricGranata

    2 жыл бұрын

    ☝️Presenting to the emergency room!

  • @doooofus

    @doooofus

    2 жыл бұрын

    @@EricGranata Presenting to the emer/g/ency room!

  • @kenshinhimura9387

    @kenshinhimura9387

    2 жыл бұрын

    @@doooofus that was really cringy

  • @doooofus

    @doooofus

    2 жыл бұрын

    @@kenshinhimura9387 so was your mom

  • @typingcat
    @typingcat2 жыл бұрын

    I cannot believe an IT person who works for a big IT company did not know about file signatures. When I download things like drivers from any vendor, I check the digital signature of the EXE and DLL's before executing the installer. In fact, I check this before buying a piece of hardware that requires driver installation. I visit their websites and download the driver file before buying the hardware, and check if the EXE is signed. If it is not, then I buy from a different company. I also did not expect so-called "smartcards" are just a mere password card, that if someone else read it, it gets compromised. I thought it would send some sort of calculated result so that only the device that has a previously agreed data can verify its authentisitity, like a bank OTP device. If it is just sending the same data whoever the reader is, why is it called "smart" card? It's a dumb card.

  • @phoneticalballsack

    @phoneticalballsack

    2 жыл бұрын

    @@whats5471 number doesnt work

  • @ainzooalgown9952

    @ainzooalgown9952

    2 жыл бұрын

    it only needs to be smarter than the employees, not the malicious party

  • @monkemode8128

    @monkemode8128

    2 жыл бұрын

    Hey, I get paid more for being friends with the boss than that

  • @cwill6491

    @cwill6491

    2 жыл бұрын

    How do you know what the signature was suppose to be if the company didn't tell you?

  • @tonnentonie2767

    @tonnentonie2767

    2 жыл бұрын

    Could you tell us how you do what you describe in the first paragraph?

  • @SieTeppischfresser
    @SieTeppischfresser2 жыл бұрын

    Actually government laptops are specced out to have CAC readers in the laptop, so not external reader is required. We also have cac readers within our keyboards, so a government employee should never have to buy a reader.

  • @VengeanceRMP

    @VengeanceRMP

    2 жыл бұрын

    Not to mention that the ones sold at the exchanges are inspected & verified. Still seems like a possible security issue though.

  • @ProDCloud

    @ProDCloud

    2 жыл бұрын

    They do if they want to work from home or use multiple cards in one session.

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @marcogenovesi8570

    @marcogenovesi8570

    2 жыл бұрын

    @@ProDCloud can they just multiple keyboards with the card reader? It's not like they have any resale value anyway, nobody would steal that

  • @ryanchatham9971

    @ryanchatham9971

    2 жыл бұрын

    That’s great at work but if you want to access your pay or anything else from home you have to use a CAC reader

  • @HornyFungi
    @HornyFungi2 жыл бұрын

    RFID can be intercepted from a man in the middle attack! It’s so unsafe

  • @radomane

    @radomane

    2 жыл бұрын

    MiTM is not the same as a replay attack

  • @JustPlayerDE

    @JustPlayerDE

    2 жыл бұрын

    @@radomane what if the MiTM does the replay attack tho

  • @radomane

    @radomane

    2 жыл бұрын

    @@JustPlayerDE MiTM is a form of replay attack where the original message was intercepted and the squashed, then the attacker sends a modified request to the target. It's difficult to design systems that are resistant to MiTM attacks, look up 2 generals problem. Protecting against replay attacks is fairly simple, if you have an RFID key to your local gym the reader probably has protections against this already.

  • @JustPlayerDE

    @JustPlayerDE

    2 жыл бұрын

    @@radomane im talking about the Man in the middle, not the MiTM attack. i will write the text in another way: what if the man in the middle does the replay attack tho

  • @radomane

    @radomane

    2 жыл бұрын

    @@JustPlayerDE Have you invented some new abbreviation where MiTM does not stand for Man-in-the-Middle?

  • @tonnentonie2767
    @tonnentonie27672 жыл бұрын

    A company I worked for just gave everyone a laptop with a smartcard reader built in. Much finer control for them. We also used RSA keys and a password. I don't think you can get more security for online identification than RSA keys

  • @xXhotshot55Xx

    @xXhotshot55Xx

    2 жыл бұрын

    Anywher that uses smart cards buys computers with card readers built in

  • @andljoy
    @andljoy2 жыл бұрын

    I work for a publicly run employer in the uk that's one of the largest employers in the country (work it out). Our smart cards for accessing the country wide databases uses an active x control in IE . The config file for this still states " do not change any settings as all settings are the same for windows 95 and NT " , smart cards are not secure !

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @whynotandy

    @whynotandy

    2 жыл бұрын

    I thought Native bridge + Edge took over from this now. Wouldn't be surprised if it was still common elsewhere in the industry as IE is still used for some legacy applications

  • @andljoy

    @andljoy

    2 жыл бұрын

    @@whynotandy it does , native bridge however is also getting replaced with credential manager , but you have to do a lot of fucking about with IE and group policy for that , go with native bridge and the latest hscic. Native bridge is still supported as of May 22

  • @whynotandy

    @whynotandy

    2 жыл бұрын

    @@andljoy IE officially retires on the 16th, wonder if everything will be ready in time

  • @ryanmaris1917
    @ryanmaris19172 жыл бұрын

    Thats the CAC (common access card), something that pretty much every US military personal will use, along with everyone who works for the DOD. One thing I find weird here is the "drivers" you need are actually DoD certificates, otherwise CAC enabled sites won't load. (Though I'm pretty sure this is just so your local FBI or NSA agent can watch your activity easier) The one positive thing is the DOD has been issuing out laptops that now use VPNs, and already contain a CAC reader built with the certificates you need, and are continuing to improve their OPSEC mostly due to the fact that having people work from home during COVID instead of a secure office has forced them too.

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆

  • @tissuepaper9962

    @tissuepaper9962

    2 жыл бұрын

    I was under the impression that the CAC was already on the way out. Maybe that was bad information.

  • @capybara9802

    @capybara9802

    2 жыл бұрын

    The drivers he’s talking about is of the cac reader itself so it knows how to function. Cac readers do nothing but read the card and send it’s data to your computer. Dod certs are pretty much just for dod website identification, which you can use without downloading the certs, but you would have to accept that the website is using the cert every time because it’s not standard. Downloading it makes it standard to your computer. As far as I know you can’t directly load malware on a cert, but unchecked drivers can cause havoc.

  • @thelight3112

    @thelight3112

    2 жыл бұрын

    You can access DoD websites just fine without importing the root certs, but your browser will throw a certificate error for every page. This is because the DoD is it's own root certificate authority.

  • @zachbrenner9959

    @zachbrenner9959

    2 жыл бұрын

    You need dod root certificates to access CAC enabled sites, but the drivers for the CAC itself are different. Both of them are a pain in the ass to obtain if you don't have can access set up on a computer already

  • @DiegoValle392
    @DiegoValle3922 жыл бұрын

    Saicoo Card readers, proceed to place a Yuan symbol on the online payments sign and encourage employees from the DoD to use it. It is obviously a Chinese spy tool, lol.

  • @PixyEm

    @PixyEm

    2 жыл бұрын

    "On-Line purchases" Anyone who speaks English knows it's "online"

  • @burn_out
    @burn_out2 жыл бұрын

    You could use a regular Android phone to “copy” and “paste” the balance of a subway card in Moscow. That’s how I got unlimited rides lol.

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆

  • @DeeezNuts

    @DeeezNuts

    2 жыл бұрын

    @Winnie the Flu The balance gets stored in the card instead of an ID linked with a DB, so you buy a card reader/writer and change it. I was gonna do the same for games place(Magic planet in middle east) but noticed u can charge it from their website so it wont work

  • @CanularRadio

    @CanularRadio

    2 жыл бұрын

    Care explaining how

  • @CanularRadio

    @CanularRadio

    2 жыл бұрын

    @@DeeezNuts how to trick

  • @libertyprime2013

    @libertyprime2013

    2 жыл бұрын

    Nice

  • @jeverdell657
    @jeverdell6572 жыл бұрын

    I've been in the military for nearly four years now. I'm happy to see that I've never seen any of these kinds of cac readers for sale, especially at the physical stores and gas stations.

  • @Hypnotically_Caucasian

    @Hypnotically_Caucasian

    2 жыл бұрын

    >gas station card reader Less notorious than gas station dock pils

  • @Danominator
    @Danominator2 жыл бұрын

    Congrats on 300k. Thanks for spreading the information that actually matters!

  • @seraphinw1
    @seraphinw12 жыл бұрын

    What kind of a brain dead govt agency would actually deploy workstations that don't have internal smart card readers? Oh right, quite a lot of them

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @marcogenovesi8570

    @marcogenovesi8570

    2 жыл бұрын

    basically everyone that isn't NSA and MAYBE the FBI

  • @tissuepaper9962

    @tissuepaper9962

    2 жыл бұрын

    @@marcogenovesi8570 that's just false. Most of DoD specs smart card readers directly into laptops and keyboards.

  • @citratune7830

    @citratune7830

    2 жыл бұрын

    @@marcogenovesi8570 Source? Litterally? This is just wrong, my parents aren’t nearly that important and they get cac card readers.

  • @jakegarrett8109
    @jakegarrett81092 жыл бұрын

    "Security products company with unsecure website", yep, sounds about right.

  • @urmom-wb5my
    @urmom-wb5my2 жыл бұрын

    Properitary drivers be like:

  • @your-mom-irl

    @your-mom-irl

    2 жыл бұрын

    hey what the fuck

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @VictorRisgaard
    @VictorRisgaard2 жыл бұрын

    This would not have been a problem if the drivers where open source

  • @gaming__god

    @gaming__god

    2 жыл бұрын

    The problem would have been bigger in that case. People never check if the compiled code is the same as the open source version. I don't think there is a easy way to compare open source code and it's compiled version. Moreover a open source version of driver will be leaked to public which can be easily exploited by hackers.

  • @mskiptr

    @mskiptr

    2 жыл бұрын

    @@gaming__god Yes, that would very much be the case for open source drivers on Windows. However, open source + a proper package management would pretty much solve the problem. (Or you could compile them yourself - assuming the code you got is legit.)

  • @testacals

    @testacals

    2 жыл бұрын

    @@gaming__god You can just compile it yourself instead of getting a compiled version. "Moreover a open source version of driver will be leaked to public which can be easily exploited by hackers." There will also be security researchers that will find those exploits and even upload patches.

  • @Zimx02

    @Zimx02

    2 жыл бұрын

    @@testacals I think that the exploit comment is not about the lack of patches, but rather people still getting pre-compiled software.

  • @hldelta

    @hldelta

    2 жыл бұрын

    You have to sign the drivers with a certificate to install them on Windows iirc.

  • @ak5intow600
    @ak5intow6002 жыл бұрын

    I used to work for a DOD contractor. We where super strict on card readers and lucky we never had this issue. All of our external readers where provided by a trusted vendor.

  • @user-kk5qe9fj2l
    @user-kk5qe9fj2l2 жыл бұрын

    What is so hard about using pgp smartcards? Nonce in, signature out, access granted, no way to copy anything.

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆..

  • @yura2110

    @yura2110

    2 жыл бұрын

    I don’t understand your logic

  • @eitantal726
    @eitantal7262 жыл бұрын

    I always thought there's a private key in each of them, and therefore you cannot duplicate a smartcard by listening to the traffic. It's just common sense! RSA has been around since the 70s. Guess I was wrong

  • @RegrinderAlert

    @RegrinderAlert

    2 жыл бұрын

    @@tripplefives1402 Smart cards often do have a CPU and crypto modules on board.

  • @eitantal726

    @eitantal726

    2 жыл бұрын

    @@tripplefives1402 are you sure? MK says otherwise.

  • @codegeek98

    @codegeek98

    2 жыл бұрын

    Different EMV modes - DDA is the only one that works like a true smartcard. SDA and CDA are just complicated badges. I'm unclear why DDA isn't mandatory for chip txns…

  • @eitantal726

    @eitantal726

    2 жыл бұрын

    @@codegeek98 Thanks for the clarification!

  • @h.s3187
    @h.s3187 Жыл бұрын

    In Brazil is very common in sales fairs and at gas stations , they modify they payment machines and insert some msr90 board or something like these on the video , criminals call this type of modified machine as "chupa-cabra" . And they also use jammers for block gps signals from the cars and than steal , they typically call this type of jammer as "capetinha"

  • @FilipeCruz1337

    @FilipeCruz1337

    7 ай бұрын

    kkkkkkkkkkkkkk still chupa-cabras working nowadays?

  • @AxelStone
    @AxelStone2 жыл бұрын

    You never cease to surprise me with these interesting vids, keep it up!

  • @nickg1307
    @nickg13072 жыл бұрын

    When I was attempting to enlist in the army, all their laptops had a card reader built into them.

  • @Blood-PawWerewolf
    @Blood-PawWerewolf2 жыл бұрын

    I love how the credit card companies decided to update their older cards to a much more VULNERABLE card. It’s like they WANT everyone to get their cards compromised. Plus I betcha they do, because they are most likely directly connected to those “credit monitoring” companies and they get more money from them every time a card is compromised.

  • @satibel

    @satibel

    2 жыл бұрын

    My father in law has a bug with his card where it doesn't ask for the code.

  • @Drkbowers1

    @Drkbowers1

    2 жыл бұрын

    I think people should just be more aware of their card activity. Maybe this only applies to credit cards, but I get a notification for every purchase the instant it happens. Even if something I see doesn't make sense, I can just cancel the card and get my money back in less than 24 hours. I don't even cancel the cards I lose because I don't want the hassle of having a new number, I just get "replacement" cards which are meant to be ordered if your card breaks essentially.

  • @MrHack4never
    @MrHack4never2 жыл бұрын

    I like to think that the hackers have a handful of weird dumps where they have no clue what the card is for, what the data is about or how to use it While in reality, it's stuff like Pokémon print kiosk cards or someone's memory card that holds a script to install the network driver for an industrial computer

  • @satibel

    @satibel

    2 жыл бұрын

    Tbh it's probably fairly likely

  • @1NeoCross1

    @1NeoCross1

    2 жыл бұрын

    They're sold via dark web in large data packages. Then someone else buys a package that may have usable stuff while a ton of it is junk. Same way as how legal companies scrape all our information and then sell bundles of peoples' info to literally a n y o n e.

  • @sams5803
    @sams58032 жыл бұрын

    Man your content is just awesome! I tell everyone to check out your channel

  • @spyro1159
    @spyro11592 жыл бұрын

    Please make a video on how the internet of things will ultimately destroy the human right to privacy and make us subservient to the surveillance state. I do know you briefly touched on it in your Guide to Escaping the Botnet video, but an in depth video would be really awesome and do us a great public service.

  • @speedfastman

    @speedfastman

    2 жыл бұрын

    You could've just said "do a video on how problematic IoT devices are" and you wouldn't have sounded so conspiratorial.

  • @1d10tcannotmakeusername

    @1d10tcannotmakeusername

    Жыл бұрын

    @@speedfastman His username is "Spyro 115", he is likely tuned in to the higher consciousness. Nothing wrong with having a conspiratorial worldview in an exponentially conspiring world.

  • @maxheadspace6670

    @maxheadspace6670

    Жыл бұрын

    @@1d10tcannotmakeusername That's because 114 Spyro-mongers beat him to it. He is delirious anyways.. "Will ultimately destroy???" he must think he is in 1994 with all that "future tense." wake up and smell the google my little purple dragon. That being said, i have to go now... time for my red pill.

  • @1d10tcannotmakeusername

    @1d10tcannotmakeusername

    Жыл бұрын

    ​@@maxheadspace6670 1. Spyro is a time-traveling hyperdimensional intelligence 2. Only if you're a city slicker, if you go out innawoods and make sure there's no IoTrash in the house you should be fine

  • @s4dd4wg32
    @s4dd4wg322 жыл бұрын

    Mental outlaw is either the biggest redhat or straight works for feds lmao

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @Shigbeard
    @Shigbeard2 жыл бұрын

    When I worked as IT, we had a lot of people doing work from home stuff. We had protections against this and actually survived the Kaseya Ransomware attack because of a tool... which for the life of me I cannot remember the name of. It essentially worked as a DLL and EXE whitelist - we had a contract with the developers to ensure they updated our whitelist with the file signatures of executable files that came from reputable sources such as Microsoft, Adobe, Chrome, etc, that we'd use on a day to day basis. Everything else would be hard blocked, across all our devices. It would most certainly have protected us against smart card readers with modified drivers. Though, one time, we had a whole day of printer issues because microsoft did a silent patch to Edge, which was responsible for ensuring PDF files print correctly from edge, so we had a day of nonstop printer issues, but it was a small issue :/

  • @Shigbeard

    @Shigbeard

    2 жыл бұрын

    Ty for whoever liked this comment first, cause I remember the software. It was called Airlock

  • @d21852
    @d218522 жыл бұрын

    Excellent video 👌🏻🔥 love the demonstration clips you got, I make videos sometimes and getting footage online like that takes a lot of work😂 keep it up man 💪

  • @zachbrenner9959
    @zachbrenner99592 жыл бұрын

    Also, RFID/NFC/proxy cards are a different technology than smart cards

  • @R.K_Chalkboard
    @R.K_Chalkboard2 жыл бұрын

    Another good example would be the Hak5 usbs. Think Mrwhosetheboss did a video on those, but all someone would need to do swap out a smart card reader that looks similar enough to whatever actual smart card reader you're using, and then they have access to all your credentials.

  • @MalleusSemperVictor
    @MalleusSemperVictor2 жыл бұрын

    I don't know about the authenticity of the web site you presented that had that card reader listed as recommended. In addition, any contractor that allowed average users local admin rights to install random drivers for crap wouldn't have their ATO for long and thus wouldn't be contractors for long I can tell you that much. Furthermore, when I contracted Federal IT I know we couldn't just hand out random garbage even for peripherals. There's actually standards in place that prevent even the purchasing of computer equipment from mainland China. Even the cards themselves are single sourced from one company to meet the HSPD-12 requirements.

  • @santiagocarlini
    @santiagocarlini2 жыл бұрын

    Nice modern rogue cameo

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆

  • @Hungry_God
    @Hungry_God2 жыл бұрын

    yeah, but if I wanted to break into a building I would rather bribe a janitor to copy their pass vs having my face on camera intercepting their card.

  • @tvk270
    @tvk2702 жыл бұрын

    had no idea that people could just buy their own hardware like this for security critical tasks. should at least have a list of hardware that you need to purchase from or something.

  • @jakegarrett8109

    @jakegarrett8109

    2 жыл бұрын

    Problem is this WAS on the DOD suggested list...

  • @tvk270

    @tvk270

    2 жыл бұрын

    @@jakegarrett8109 well thats unfortunate lol

  • @__prometheus__

    @__prometheus__

    2 жыл бұрын

    Yeah we’re told to buy our own CAC readers for our personal computers at home. Half the time they tell you which one is the good one…

  • @GryphonIs
    @GryphonIs2 жыл бұрын

    The company one of my friends works at provides laptops with built in card readers, they also have cell tower service so they don't have to connect to WiFi while they are not at home

  • @jakegarrett8109

    @jakegarrett8109

    2 жыл бұрын

    Good thing ghost cell towers don't exist...

  • @microchipmatt
    @microchipmatt2 жыл бұрын

    Great video. So true. This can be a major attack point, especially in Pubic or private institutions.

  • @Zskyshark
    @Zskyshark2 жыл бұрын

    thanks for the updates as usual outlaw!

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆....

  • @nevadaxelizabeth
    @nevadaxelizabeth2 жыл бұрын

    so. this video gives me an insight of why my military laptop (Latitude Rugged Extreme 7214) has a reader for those cards, both contactless and slot to insert the card

  • @fireball9670
    @fireball96702 жыл бұрын

    Modern rogue footage, hell yeah!

  • @randomdude12370
    @randomdude123702 жыл бұрын

    I work for a security company where we make security cards. A lot of high security places are moving to cards with an encrypted chip where it stores certifications, your fingerprints, and your photo. Similar to CAC cards. It's fully encrypted and the card is tied to the facility and the readers. The card you showed is a PIV-I card. It's very secure. The government is slowly moving to this. You need a scanner, that isn't just a reader, but one where you insert the card and it reads the chip. It's all tied to the individual. As far as readers go, use an HID reader. Our company has tore apart the drivers and such, and they are secure. For common smart cards and card readers, yeah. It's easy to hack. People are always the issue in security. But there is smarter - smart cards.

  • @maxheadspace6670

    @maxheadspace6670

    Жыл бұрын

    *CAC

  • @GuardianAngle93
    @GuardianAngle932 жыл бұрын

    And this is why physical security, with human security, will never be outdated.

  • @PlanterSanSama
    @PlanterSanSama2 жыл бұрын

    Grats on the 300k

  • @zerohours.
    @zerohours.2 жыл бұрын

    The first bag you posted is the good one to protect against rfid. They have larger sleeves too on amazon.

  • @chbrules
    @chbrules2 жыл бұрын

    I choose to live in a cave at this point.

  • @user-xs1cl8ie9w
    @user-xs1cl8ie9w2 жыл бұрын

    gratz on 300k

  • @andylin6560
    @andylin65602 жыл бұрын

    I believe new most Access cards/fobs systems now have 2 steps; meaning not only does the card provide a password to the opener, but the opener also put a signal back to your FOB and if your FOB cannot correctly verify the signal coming from the opener then the gate stays locked even tho the FOB has the correct access code.

  • @sjoervanderploeg4340
    @sjoervanderploeg43402 жыл бұрын

    My trusty ACR122U is always packed with my laptop when I'm on vacation :D Most of the card readers are just connected to "psychologically" give a false sense of security, nine out of ten times they aren't even securely wired!

  • @OhYNo
    @OhYNo2 жыл бұрын

    Small detail, a large number of Amazon reviews are fake but you’re correct in assuming at least half of those are actual purchases. There’s some sites that will scan listings and tell you the percent of fake reviews

  • @himbalodzodenever
    @himbalodzodenever Жыл бұрын

    As someone who works for a company that installs card readers in high security places, we only install swipe cards and we demand that we use cables rather than wireless transmission. Our system also nullifies cards every 2-3 days, so you have to get a new one at the reception.

  • @zerohours.
    @zerohours.2 жыл бұрын

    a long while ago people used to use coiled copper rods to extend the reach to their sleeve.

  • @vincei4252
    @vincei42522 жыл бұрын

    Yeah, I totally believe that a "hacker" compromised their download page. Nudge, nudge, wink, wink. Pull there other one guvnor.

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆

  • @mukyuuhikuu
    @mukyuuhikuu2 жыл бұрын

    That employee helped their company dodge not just a bullet,but an entire fucking nuke.

  • @anotherhuman7344
    @anotherhuman7344 Жыл бұрын

    I suspect they are doing the same thing with Smart Lamps selling on Amazon that are impossible to beat on price but force you to allow access to your local home network traffic. Might be useful for a researcher to take a look at it, which I can use the time to jump deeper.

  • @vladislavkaras491
    @vladislavkaras4912 жыл бұрын

    wow... Thank you for the video!

  • @maxmyzer9172
    @maxmyzer91722 жыл бұрын

    The first part is about RFID/NFC tech The 2nd part is about Smart-Card tech

  • @Patrick_McCullough
    @Patrick_McCullough Жыл бұрын

    Military contractor here, these types of CAC readers are used but not sensitive information, at most the hackers would be getting some PII. More sensitive information is still only able to be reached at your base with a different type of CAC :-)

  • @cd-yx3nv
    @cd-yx3nv2 жыл бұрын

    I prefer the battering ram method.

  • @breni1518

    @breni1518

    2 жыл бұрын

    Who needs any fancy electronics when you have a log and pure strength.

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @TheRailroad99
    @TheRailroad992 жыл бұрын

    things like these need OSS drivers with signed binary releases. Virustotal is not magic, it is rather easy to write undetected viruses, especially if their only job is to upload the smartcard data to a server. That is not even the definition of a virus, that would just be a modified/hacked driver

  • @satibel

    @satibel

    2 жыл бұрын

    Polymorphic viruses aren't that hard to make, you basically write a set of tests that define the behavior and have a script fudge the instructions around till you don't get detected. And you can even use out of the box generators that do the job for you.

  • @crrudw3ll519
    @crrudw3ll5192 жыл бұрын

    Love Mental outlaw keep it up 🖤

  • @zocker1600
    @zocker16002 жыл бұрын

    This is exactly why we need open source drivers period.

  • @jimmyscott5144
    @jimmyscott51442 жыл бұрын

    Something I leaned is that windows will go out and get drives for some things if the driver is proper signed. My guess is that when they made that drive it was but now it is not and that's why they had to manually install it.

  • @iamesmaybe
    @iamesmaybe2 жыл бұрын

    I used to work in an IT department of a hospital and they used card readers in-house and 2fa when working from home, worked better imo.

  • @GMYuyuko
    @GMYuyuko2 жыл бұрын

    In Brazil a guy managed to switch his card reader with gas'tation's card reader and recived 3 days of payments before be catch.

  • @mercuriete
    @mercuriete2 жыл бұрын

    Smart cards are not vulnerable to replay attacks. They use the algorithm of challenge-response. They have another set of vulnerabilities but not that one.

  • @Zakanuva
    @Zakanuva2 жыл бұрын

    Congrats on getting that shout-out from Mutahar yesterday!

  • @BCDeshiG

    @BCDeshiG

    2 жыл бұрын

    Wait, what video?

  • @epicn

    @epicn

    2 жыл бұрын

    @@BCDeshiG the smartphone hacking video he made a few days ago

  • @SonnyBear5
    @SonnyBear52 жыл бұрын

    i feel like I’m watching a DedSec tutorial video

  • @mertgultekin444
    @mertgultekin4442 жыл бұрын

    As always, everything is super. Waiting for new cheats from your te

  • @GrOuNdZeRo7777
    @GrOuNdZeRo77772 жыл бұрын

    Oof, I was in the Army and never knew about sus drivers... fortunately I bought mine at AAFES and needed no additional drivers but I did need all sorts of security protocols.

  • @emmanuelcastanheiro4947
    @emmanuelcastanheiro49472 жыл бұрын

    This is unbelievable... #stoptheoutsourcing

  • @Notallowed101
    @Notallowed1012 жыл бұрын

    You'd think most companies/governments would have some sorta deal with a tech trusted tech supplier instead of simply paying staff to buy whatever they want.

  • @BiblicallyAccurateToaster
    @BiblicallyAccurateToaster2 жыл бұрын

    Now those cc reader signal blocker sleeves finally have a purpose😆

  • @maxdemian6312
    @maxdemian63122 жыл бұрын

    Thanks for this helpful identity theft guide

  • @dakotaferris4842
    @dakotaferris48422 жыл бұрын

    The worst part is so many military website are flagged as not secure by browsers so many people just click to continue to unsecure website, because that's the only way to access the website. So it wouldn't surprise me if windows defender would have caught this, it would have been ignored.

  • @P1T4Bot

    @P1T4Bot

    2 жыл бұрын

    Probably just unofficial certs

  • @dakotaferris4842

    @dakotaferris4842

    2 жыл бұрын

    @@P1T4Bot that is the issue but I think it conditions people to just click okay, even if something is flagged

  • @internethistoriansociety3679
    @internethistoriansociety36792 жыл бұрын

    "curbs on security " 😂🤣😂🤣😂🤣😂🤣😂

  • @Awtysm000
    @Awtysm0002 жыл бұрын

    The company I worked for had smart cards but they supplied laptops that had the readers already installed. I would have figured the government would have done the same.

  • @mokisan
    @mokisan2 жыл бұрын

    I didnt understand why you would need a smart cardreader in home? I got a bit lost. Would appreciate if someone could tell,

  • @GoodlyPenguin

    @GoodlyPenguin

    2 жыл бұрын

    DoD military here. You can buy one from like a Navy Exchange/Army Exchange (I think they call them a PX?) for like $10 so you can work from your home. You can use your CAC (government ID smart card) to look at your paystub/government email/what have you from your personal computer.

  • @mokisan

    @mokisan

    2 жыл бұрын

    @@GoodlyPenguin oh! Thanks for explaining. Its a bit weird that the kind of things arent controlled that well, specially when it can leak some sensetive data

  • @LuureAmet

    @LuureAmet

    2 жыл бұрын

    Smart Card readers are ordinary mandatory part of most proper laptops in estonia , and nearly entire population from old to yong have them at least last 10-15 years

  • @AnotherFreakingDude
    @AnotherFreakingDude2 жыл бұрын

    I encountered something similar getting drivers for an old fujitsu laptop, I used the (supposedly) official fujitsu support page, but after downloading one installer, even windows defender detected a trojan in the driver.

  • @0mn1P4wn4g3
    @0mn1P4wn4g32 жыл бұрын

    Badge cards typically must be used in very specific manners the closer they work with government controlled data, such as PII, PHI, or official data. Though if a company isn't having this enforced on them it's pretty typical that they will use whatever. You'd think banks in particular would take more care to protect their cards for example, but it seems that rfid chips in cards are quite compatible with thief scanners.

  • @pcislocked

    @pcislocked

    2 жыл бұрын

    its funny that your average smart ticket card you use to commute is safer than most smart cards against copying lol

  • @Kserks96
    @Kserks962 жыл бұрын

    I once saw receiver that can read card from like 3m away. They used it on entrance to private community. You can just place card under front window and it will read it no problem

  • @jakegarrett8109

    @jakegarrett8109

    2 жыл бұрын

    Yep, and set that baby to overdrive for movie night drive through popcorn!

  • @ammardayoub2349
    @ammardayoub23492 жыл бұрын

    Thanks Jayson Tatum 👍

  • @Veptis
    @Veptis Жыл бұрын

    My ThinkPad has a Smartcard reader. And there seems to be some tricks to read out the data anyway I want. Would be great to have this tool with me. I also think there is an RFID reader in that laptop... Which should be able to read some more information.

  • @seanb.6793
    @seanb.67932 жыл бұрын

    We’re doing 2 factor authentication with our phones. It’s a little annoying that work requires me to use my personal phone, but it seems reasonable secure.

  • @Techno-Universal
    @Techno-Universal2 жыл бұрын

    Or employees might have to scan both their card and fingerprint to enter a door while cameras monitoring the door will raise the alarm if the person’s face is obstructed with something like a mask or if it detects a face other to the face of the employee linked to the card signature and fingerprint provided! :)

  • @red13emerald
    @red13emerald Жыл бұрын

    I’ve never used a smartcard in the last few years that doesn’t use private key authentication. I’m sure they still exist, maybe Europe has different standards than the US, but once the card uses a private key, there habe to be multiple exchanges between the “reader” and the card for something to unlock, and the traffic is safe from a replay attack AFAIK.

  • @Leshic2
    @Leshic2 Жыл бұрын

    This is sooooo dangerous.... So many people need to know about this..

  • @RubenNicos

    @RubenNicos

    13 күн бұрын

    I've been running with STREETSWIPING1 and bake 2000. All my family has been fckn with this Teledude and baking bread ❤️

  • @BradleySmith1985
    @BradleySmith19852 жыл бұрын

    also having more than one card helps - cross signal protection

  • @venus334
    @venus3342 жыл бұрын

    Eyy mahn. Can you give me advise or sense of direction, Im trying to setup NAT Network for Windows virtual machine. Using QEMU/Virt Manager on a Debian system. Thanks in advance, I appreciate your videos bro

  • @mark8200
    @mark82002 жыл бұрын

    That malicious agent was probably the government of the nation the products are made and developed in

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @Xpll
    @Xpll2 жыл бұрын

    well, that proves to carders that they should also be careful when buying their MSRs and omnikeys online (that if they aren't working out of the box). i wouldn't be surprised if mental outlaw one day participated in a talk at defcon or blackhat. I was wondering if you can do a video about sim card hacking or corebooting modern desktop hardware (such as: ryzen 5000 based motherboards)?? thanks for your great content.

  • @jakegarrett8109

    @jakegarrett8109

    2 жыл бұрын

    +1 for the sim like cloning (like if you want a GPS tracker on your bicycle, why should you have to double your phone bill just for it to send a text once a day? I guess thieves will just become more rampant). Also would corebooting even work with modern hardware? If one of its features is to replace some of the old junk, would that do much for Ryzen since its probably mostly new UEFI anyways.

  • @i_used_adblock_to_watch_this
    @i_used_adblock_to_watch_this2 жыл бұрын

    What type of signal blocker bag do you recommend

  • @whats5471

    @whats5471

    2 жыл бұрын

    👆👆👆.

  • @pcislocked
    @pcislocked2 жыл бұрын

    aren't drivers signed on windows? is it possible to modify driver itself to inject malware without freaking windows out at all? the virus was on the installer.exe or something I guess.

Келесі