This entry details how malicious USB devices, disguised as standard thumb drives, can act as HID emulators to execute commands and install malware across Windows, Mac, and Linux. The video highlights the 'lost USB' social engineering tactic, emphasizing the need for caution when encountering unknown USB drives. Instruction is provided by Shawn Ryan, known for his expertise in security and operational tactics.
This guide details the modification of a USB Rubber Ducky, a device capable of keystroke injection, to incorporate pyrotechnic elements for a prank. The process involves miniaturizing internal components to fit a firecracker and confetti within the USB shell, then programming a specific payload for execution. This advanced DIY project requires significant technical expertise in electronics and safety handling.
This entry details the capabilities of the O.MG Cable, a specialized malicious USB/Lightning cable designed for cyber attacks. It can perform keystroke injection, real-time keylogging, and wireless payload delivery, posing a significant threat to both computers and mobile devices. The information is presented by Mike Grover, a subject matter expert in hardware security and the creator of the device, on the Shawn Ryan Show.
This entry details the high-tech Everyday Carry (EDC) tools of a hardware hacker, contrasting them with traditional tactical gear. It highlights specialized devices like the O.MG Cable for keystroke injection and keylogging, alongside defensive tools such as a malicious cable detector. The SIG Sauer P226 Legion is also presented as a high-end firearm. Expert insights from cybersecurity and special operations fields are provided.
You've reached the end! 4 videos loaded.
Gun Laws by State
Read firearms regulations for all 50 states + D.C.
Find Gun Dealers
Search licensed FFL dealers near you.