#trending #hackerglenn #hacking #hacks #doomsdayprep #hackingnews #hackerff #fyp #facebook #tiktok #youtube #scamwebsites #anonymous #lifehacks #kalilinux
Category
📚
LearningTranscript
00:00Ever wonder what's it like to be a hacker? What does it actually look like when we hack?
00:04How do we make our viruses?
00:06How do we hack in general find out on life of a real-life elite hacker? What's going on?
00:11Hacker Glenn here haven't made any videos in a in about a week, you know has some stuff going on
00:18Actually, I think it's been about two weeks interesting
00:20Anyway, so we are pretty much going to be continuing the series of devices more powerful than the flipper zero
00:28So this is a flipper zero right here
00:31this was heavily popularized on tick-tock as the most powerful hacking tool in the world and
00:37I'm here to debug this as I start out in every video
00:41The flipper zero is not the most powerful hacking tool in the world. It's not I
00:48Wouldn't even say this is the most powerful tool in the country
00:51The main benefit of this tool is to shut off TV projectors and use this as a universal remote
00:58So if you already have the signal for something then you can attach it to this use it
01:03We'll send a signal back out and then it'll work. This comes with car doors
01:08This comes with bridges going up like the little guard bridge not an actual
01:13Bridge that's raising up in the ship going in the ship is going through
01:17so
01:18This gave people like a watchdog type of pie. You didn't have to understand anything with networking
01:25hardware security protocols ports
01:29technologies, you don't have to understand any of that with this thing because
01:33People were just doing it just to get the watchdog effects off of it. That was it
01:39This is nowhere near
01:41The most powerful hacking tool in the world nowhere near the most powerful hacking tool will always breed right here
01:48Your brain your imagination your dedication creativity. That's what is the most powerful a hacking tool in the world
01:56But as I digress here's a tool much more power
02:01introducing the packet squirrel mark to check it out
02:04You actually have bundles with it and you can also select an even bigger
02:09Elite version that actually comes with a booklet that can help you with that and I'm not gonna lie
02:14I do recommend that if you're gonna get something like this and you're new get the booklet
02:19mainly because
02:20The more you study the better you become hacking is a hundred percent understanding
02:26We understand what we're doing and we understand the end result. You're gonna have to get that
02:31This is Linux base, which is really sick as a packet capturer
02:35So this actually is far more powerful than the flipper zero you plug the flipper zero into the computer
02:42You can run scripts, but you cannot monitor
02:46packets going through
02:47Packets are data, right?
02:49I'll actually give you a better example later on the packets that go through your network contain certain information
02:57With this you can actually have a web interface
03:01You can upload payloads to where let's say you download something
03:06But I want you to actually download
03:09My virus, I guess that's something up like that. I
03:13Can redirect you this thing redirect pretty much means you want to go to let's say Twitter
03:18But I see you to Facebook or I see you to my
03:22Malicious site this thing has a self-destruct feature on it, which is amazing
03:26Now the self-destruct feature pretty much it can't get traced back to you
03:31And that's why this is a very powerful hacking tool
03:35very powerful
03:38Now
03:43For this demonstration, I'm gonna be using a program called wire shark wire shocker is used to see the data
03:50That's going over the network
03:52Now I can alternate this from TCP UDP
03:56I go DNS
03:59SMTP I
04:00Pretty much can use this to see how all the data is going over the network. So if something's going wrong
04:06Let's say if a website is outloading properly or let's say you're not able to send out an email properly
04:13I can go on wire shark scan the network watch your specific requests and then I
04:19Can dissect what the issue is see the packet squirrel is doing a similar process than this
04:26Now the thing is, of course, you can do this from remote and that's the best thing in the world
04:31You with the packet squirrel you can actually do this exact thing
04:36Remotely, so let's say if a hacker gets this into your network. You're boned
04:42Another function the packet squirrel can do and this right here. I'm blocking it out
04:46So I don't show the whole thing but what this is it pretty much
04:51uses IP tables my firewall to send out requests and with the
04:57Packets that you have on your computer. Keep in mind. This is a basis for a man in the middle attack
05:02This is the basis for a man in middle attack
05:05It will pretty much delete the source file that you're trying to actually download and instead it will use
05:13my file so it will
05:16So as let's say instead of you downloading a picture of Britney Spears, you'll download my virus
05:22You'll click on it and now I have a backdoor in there. It's all about escalating privileges
05:27So that's pretty much what the package squirrel can do
05:31We can scan the network access remotely you can run scripts to mess people up like this
05:37I hope after that demonstration you understand more now
05:41this tool
05:43Combined a bunch of minor functionalities that hackers can do and then made it convenient
05:50But for a specific task
05:54There's gonna be tools that will beat this out every single time
05:59Even the Wi-Fi dev board and I'll make a video about that later on the Wi-Fi dev board is nowhere near the most powerful tool
06:06Nowhere near it
06:07if you don't know what the Wi-Fi dev board is you plug it into the flipper zero hence these little holes right here and
06:14Then you get more on a firmware and then you can deauthenticate certain networks
06:20You can do that on the computer
06:22everything
06:24Everything the hackers have always done has been on a computer
06:30desktop laptop
06:33If this thing didn't exist, we'll still be able to do our thing