Kali Nethunter HID Attack Demonstration: Brute Forcing Android 4-Digit PIN
This video demonstrates how HID (Human Interface Devices) attacks can be used to trick devices such as computers and smartphones by sending keystrokes to brute force a 4-digit Android lock screen PIN.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.
About this video
I made this video to show that HID Attack (Human Interface Devices Attack) can be used to trick devices like computes and smartphone. Its simply sending keystrokes to devices. This is possible by the power of bad usb also known as usb rubber ducky which is made darren kitchen the founder of Hak5.
Now, you dont even need a rubber ducky to perform this attack because Kali nethunter is now supported duckhunter HID which is the same thing that a rubber ducky does. instead of rubber ducky, Im using a rooted smartphone with kali nethunter kernel installed and a regular otg cable + charging cable, allowing your nethunter to connect on devices like smartphone and computer.
Note: Duckhunter HID doesnt required usb debugging to be enable. Nethunter simply act as a keyboard to be able to send bunch of pre-program keyboard commands that will is allowed you to brute force the lock screen. Hid attack is not only capable for brute forcing but also stealing information to a computer and even install a malware, spyware, or even send a keystroke that will delete everything to a computer.
Here is the full video: https://www.youtube.com/watch?v=MQr6l9z-XoU
Soon: I will be showing you what else a duckhunter can do to a computer
Video Information
Views
152.2K
Total views since publication
Duration
0:12
Video length
Published
Jul 28, 2022
Release date
Quality
hd
Video definition