0:00
so think about do you have an iPhone or
0:01
Android I do you do so you charge it
0:04
tell so you charge the phone right with
0:07
the cable yes what if I could tell you
0:09
we could modify that cable so when it's
0:12
plugged into your computer that we could
0:14
remotely command the cable to install
0:17
malware on your computer the cable the
0:19
cable itself and I'm going to show you
0:21
you're talking about a little white yeah
0:23
right here doesn't that look like an
0:24
ordinary charging cable to you yeah how
0:27
do you get the cable to the victim well
0:29
if have on-site access you're in a
0:32
company and you could swap it out or we
0:34
could do what we call a social
0:35
engineering attack and send a device
0:37
with a cable like a new iPhone or a new
0:40
um pixel 4 and it comes prepackaged in
0:43
the box and when you open the box and
0:45
you take the shrink wrapping off it
0:46
looks exactly like it came from Factory
0:48
but what the target doesn't know is that
0:51
the cable has been modified so let me
0:53
show you actually how it works yeah if
0:55
you have do you have any questions first
0:57
yeah I want to know how this works okay
0:59
all right so we're going to plug this in
1:01
what we have here on this white screen
1:03
this is the hacker and this computer is
1:05
sitting in Virginia it's not even in
1:07
this room so this is the hacker this