Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Mike Ritland

๐Ÿ‘ค Speaker
2565 total appearances

Appearances Over Time

Podcast Appearances

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

You can. There's ways of typing out. If you've got a small executable, that you want to transfer over, there's a couple ways to do that. Like, you just use the keystrokes to download it, right? You can download stuff from, like, the terminal, for instance. Or I could use Chrome and download it there and go to the downloads folder and open it up there. Through keystrokes. Yep.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

You can. There's ways of typing out. If you've got a small executable, that you want to transfer over, there's a couple ways to do that. Like, you just use the keystrokes to download it, right? You can download stuff from, like, the terminal, for instance. Or I could use Chrome and download it there and go to the downloads folder and open it up there. Through keystrokes. Yep.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

I can navigate everything with keystrokes.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

I can navigate everything with keystrokes.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

I can navigate everything with keystrokes.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Yep, that's one way. I mean, I probably wouldn't email it to them because if I was going to email it, I'd probably include an email that convinces them to just run it for me. But if I'm up against a hardened target where they're not susceptible to that, they're unlikely to do it, I'm like, okay, well, let's get a cable that'll do it for me.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Yep, that's one way. I mean, I probably wouldn't email it to them because if I was going to email it, I'd probably include an email that convinces them to just run it for me. But if I'm up against a hardened target where they're not susceptible to that, they're unlikely to do it, I'm like, okay, well, let's get a cable that'll do it for me.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Yep, that's one way. I mean, I probably wouldn't email it to them because if I was going to email it, I'd probably include an email that convinces them to just run it for me. But if I'm up against a hardened target where they're not susceptible to that, they're unlikely to do it, I'm like, okay, well, let's get a cable that'll do it for me.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

um as as an example right this can also do mouse movements too if we need um lots of control there and yeah it's that you can also yeah so the the malware right you can download that you can also type it back out um it's called base64 it's just a whole bunch of it looks like random garbage characters if you open like if you open up a an executable with a notepad roughly

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

um as as an example right this can also do mouse movements too if we need um lots of control there and yeah it's that you can also yeah so the the malware right you can download that you can also type it back out um it's called base64 it's just a whole bunch of it looks like random garbage characters if you open like if you open up a an executable with a notepad roughly

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

um as as an example right this can also do mouse movements too if we need um lots of control there and yeah it's that you can also yeah so the the malware right you can download that you can also type it back out um it's called base64 it's just a whole bunch of it looks like random garbage characters if you open like if you open up a an executable with a notepad roughly

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

stay in high level here, you're going to see a bunch of garbage text, right? But when you type that same text out in a notepad and save it, it's that executable. So I can type that back into the computer And boom, there's the executable, which is something we've done quite a bit in environments where they're checking what is being downloaded from the internet.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

stay in high level here, you're going to see a bunch of garbage text, right? But when you type that same text out in a notepad and save it, it's that executable. So I can type that back into the computer And boom, there's the executable, which is something we've done quite a bit in environments where they're checking what is being downloaded from the internet.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

stay in high level here, you're going to see a bunch of garbage text, right? But when you type that same text out in a notepad and save it, it's that executable. So I can type that back into the computer And boom, there's the executable, which is something we've done quite a bit in environments where they're checking what is being downloaded from the internet.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Okay, you're looking at the internet. Cool. I'm going to just type this little piece of malware back into the computer. Lots of cool tricks you can do like that. Wow. It's fun. And so there's other aspects of this too. So, you know, keystroke injection, mouse injection. I showed you the key logging. Oh, you were asking about the ways of triggering it. So I showed you remotely I can click go.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Okay, you're looking at the internet. Cool. I'm going to just type this little piece of malware back into the computer. Lots of cool tricks you can do like that. Wow. It's fun. And so there's other aspects of this too. So, you know, keystroke injection, mouse injection. I showed you the key logging. Oh, you were asking about the ways of triggering it. So I showed you remotely I can click go.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Okay, you're looking at the internet. Cool. I'm going to just type this little piece of malware back into the computer. Lots of cool tricks you can do like that. Wow. It's fun. And so there's other aspects of this too. So, you know, keystroke injection, mouse injection. I showed you the key logging. Oh, you were asking about the ways of triggering it. So I showed you remotely I can click go.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

We can have it boot up and go. There's also... what I refer to as geofencing. Basically, it's got wireless in there, so it can just look at the nearby networks and figure out where it is and where it isn't. And you can trigger or block things on that. And there's a self-destruct function where it'll erase everything on it. Now, it sounds super nefarious, but it's actually prompted by legal.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

We can have it boot up and go. There's also... what I refer to as geofencing. Basically, it's got wireless in there, so it can just look at the nearby networks and figure out where it is and where it isn't. And you can trigger or block things on that. And there's a self-destruct function where it'll erase everything on it. Now, it sounds super nefarious, but it's actually prompted by legal.

The Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

We can have it boot up and go. There's also... what I refer to as geofencing. Basically, it's got wireless in there, so it can just look at the nearby networks and figure out where it is and where it isn't. And you can trigger or block things on that. And there's a self-destruct function where it'll erase everything on it. Now, it sounds super nefarious, but it's actually prompted by legal.