This guide details the installation and operation of the Hak5 Screen Crab, a device for capturing and exfiltrating video data from monitors or TVs. It covers physical setup, storage, and social engineering tactics for concealment. The information is presented with a cautionary tone, emphasizing the device's surveillance capabilities.
This video delves into the historical manipulation of public perception, focusing on Edward Bernays' pioneering use of public relations and social engineering. It highlights how Bernays, nephew of Sigmund Freud, rebranded propaganda and influenced American culture through marketing tactics, notably in normalizing women smoking with the 'Torches of Freedom' parade and promoting products like Chiffon margarine and bacon. The content critically analyzes the long-term impact of these psychological operations on societal norms and consumer behavior.
This entry details how malicious USB devices, disguised as standard thumb drives, can act as HID emulators to execute commands and install malware across Windows, Mac, and Linux. The video highlights the 'lost USB' social engineering tactic, emphasizing the need for caution when encountering unknown USB drives. Instruction is provided by Shawn Ryan, known for his expertise in security and operational tactics.
This video discusses a sophisticated cyberattack where hackers attempted to bribe Coinbase employees and then extorted the company for $20 million. Coinbase responded by offering a $20 million bounty for information leading to the hackers' arrest, showcasing a strategic counter-measure. The content highlights the evolving tactics in cybercrime and corporate defense.
This video demonstrates the alarming speed at which online predators can target children. A hacker successfully sets up a fake profile and is immediately contacted by a predator within seconds. The segment highlights the pervasive nature of child trafficking and the critical need for online safety awareness. Shawn Ryan's background in intelligence and security lends significant authority to this urgent demonstration.
This video, presented by former CIA officer Jason Hanson, details four dangerous scams to watch out for in 2024. It covers the 'Ghost Dependent Scam' exploiting obituaries, 'SIM Swapping' for account takeover, 'Door to Door Scams' for fraud or home invasion casing, and 'Facebook Marketplace Scams' involving fake listings and deposits. Hanson emphasizes proactive personal security measures and reducing one's digital footprint to avoid becoming a target.
This entry details Jason Hanson's spy tactic of using flattery for de-escalation and recruitment, drawing from his experience as a former CIA officer. The technique emphasizes subtle, believable compliments to build rapport, avoid confrontation, and influence targets. It highlights the importance of managing one's ego and understanding the fine line to avoid appearing manipulative.
This video demonstrates how to manipulate Discord messages using browser developer tools. It highlights the ease with which text can be altered locally and then screenshotted to create convincing fake evidence. The instructor, Karl, emphasizes the importance of not trusting screenshots as definitive proof due to the vulnerability of client-side rendering.
This episode of Colion Noir's CNP features a discussion with Garand Thumb about the realities of being a 2A social media influencer. They delve into the evolution of online content creation, the bizarre interactions influencers face, the challenges of negative comments and online attacks, and the broader cultural war surrounding the Second Amendment. The conversation highlights the importance of independent thought, the impact of social engineering, and the complexities of content moderation on major platforms.
You've reached the end! 9 videos loaded.
Gun Laws by State
Read firearms regulations for all 50 states + D.C.
Find Gun Dealers
Search licensed FFL dealers near you.