30 thoughts on “Hacked in Translation Demo | Hacking Demonstration

  1. Nate Grubb September 30, 2017 at 7:29 pm

    I have always suspected that my spouse was cheating on me but there was no way to prove it so a friend hooked me up with a hacker through [email protected]gmail.com who could hack her phone, email and social media accounts. I was also able to get deleted messages and listen in on their conversations.

  2. TheErciyaslar September 30, 2017 at 7:29 pm

    Is this easy to recognize? If i open it in notepad will i be able to see the code?

  3. Bablu Maurya September 30, 2017 at 7:29 pm

    ok

  4. rayjohn levin September 30, 2017 at 7:29 pm

    Hacking is like martial arts it should be practiced among hackers, in the hacking octagon, doing it against civilians is evil. All hackers should solely exist to defend non-hackers from getting abused by your art. And hackers should teach non hackers basic defense techniques for free.

  5. TheErciyaslar September 30, 2017 at 7:29 pm

    What about MPC?

  6. Charuchii September 30, 2017 at 7:29 pm

    maybe a stupid question, but what about websites that have players and subtitles embedded in them? Is your computer still at risk, or only if you download a physical file?

  7. Boris Krumov September 30, 2017 at 7:29 pm

    Where is the dramatic 1337 h4x0r music in the background ?!?

  8. Ivan Savov September 30, 2017 at 7:29 pm

    So because they dont say it i will say it. They just run a silent install of tightvnc (and your antivirus won`t detect tightvnc as virus or trojan) that is preconfigured whit password and they just connect to it.

  9. Ivan Savov September 30, 2017 at 7:29 pm

    Am i the only one noticing the tightvnc ?!?!?

  10. piovisqui September 30, 2017 at 7:29 pm

    That's real hacking!

  11. bobsobol September 30, 2017 at 7:29 pm

    I'd be more impressed if the second attack was from the Windows 10 machine to the GNOME 3 machine… I'm also not sure "full control" applies, unless the user is logged in with elevated administrative privilege… Though most are likely to elevate at some point, and getting a keylogger in to steal the token they use to do that wouldn't be hugely difficult from that point.

    Maybe you do have "full control", and maybe the Windows 10 machine could control the Linux one, but I don't see it evidenced in that video. I'd like to know more detail on how this exploit works, and what it's actual extent is.

  12. Kevin Y September 30, 2017 at 7:29 pm

    What type(s) of subtitle files does this affect? SRT, SUB, IDX? And what does the malicious content would look like? I often open up SRT files for manually editing and want to know what those malicious codes would look like. No big surprise this affects plain text files, since many other text file formats like VBS, WSH, BAT, etc., can carry malware.

  13. NameIsError September 30, 2017 at 7:29 pm

    One question, when the hacker gains access to the victim's pc, is it through a VNC viewer type software (such as demonstrated here) or they can access the victim's pc remotely through the command line and control it remotely? Because on the first case it should be pretty noticeable…

  14. Alysson September 30, 2017 at 7:29 pm

    Mesmo o firewall estando ativo isso irá acontecer?

    Existe um recurso avançado presente em alguns softwares capaz de lidar facilmente com isso no entanto quero ouvir sua opinião a respeito.

  15. Filip Veselinovic September 30, 2017 at 7:29 pm

    How to get that theme on Popcorn Time???

  16. Robin Bourgeon September 30, 2017 at 7:29 pm

    Wtf is this? I play my movies in VLC using srt files downloaded from opensubtitles. So, either I download directly the srt file so there shouldn't be any problem, either the srt file is encapsulated in a zip file so I just analyze the zip file with my anti-virus before uncompressing it, no? I don't understand

  17. Eoin Ryan September 30, 2017 at 7:29 pm

    Fantastic video. Very admirable choice of film to demonstrate how a determined attacker could target people with an interest in Snowden/Manning/Assange and take control of their data.

  18. K-FAKE Channel September 30, 2017 at 7:29 pm

    who the hell use KODI ?

  19. InfinityMusic September 30, 2017 at 7:29 pm

    Not gonna download more subtitles, the only thing that I believe who hasn't got virus..

  20. sience科学 September 30, 2017 at 7:29 pm

    its code execution exploit ,i know its dangerous exploit but i don't know why you are saying full control !!

  21. John Smith September 30, 2017 at 7:29 pm

    is this a samba exploit?

  22. Siba Smith September 30, 2017 at 7:29 pm

    Why hacking into someone's computer to watch Frozen?

  23. potato potato potato potato potato potato potato September 30, 2017 at 7:29 pm

    amazing does that mean multiple remote desktops appear on the attacker screen if a lot of people click on the subtitles

  24. Mustafa N. Al-taie September 30, 2017 at 7:29 pm

    :3

  25. Jayneel Ramjee September 30, 2017 at 7:29 pm

    Could you please provide technical details as to whether the malicious code is hidden in the .SRT file itself or if it's merely an executable hidden in the .ZIP archive which Kodi/PopcornTime will attempt to parse after downloading? I'd like to know if there's a potential of it being invoked via any media player or even via a parser/editor – eg. Subtitle Workshop.

  26. fakefirstname fakelastname September 30, 2017 at 7:29 pm

    Downvoted for re-enforcing the "EVERY LOVES CATS" forced-meme by using a cat picture in the background.

  27. Ejal de K September 30, 2017 at 7:29 pm

    Using an addon like Exodus, which is very poorly vetted python script that overwrites large parts of your settings, other addons and configuration, and which previously was used to DDOS people and make the end user part of a botnet, to show how you could download a subtitle which (because the zip was not checked) overwrites files which then can NOT be directly executed from within the subtitle zip (the video is a lie….) just shows how much of a poor security research team this really is.

    I wonder if their customers believe this nonsense, I sure hope they don't.

  28. Mister TIBS September 30, 2017 at 7:29 pm

    So is this regardless of which subtitle service you are using and isn't actually a rogue service, as opposed to site/subs files alone? Just.. seems kinda more likely.

  29. Antonio Reepeecheep September 30, 2017 at 7:29 pm

    And how identify a bad subtittle?????

  30. ziggy2070 September 30, 2017 at 7:29 pm

    what is this bullshit show me the executable code in an *.srt file!!!

Leave a Reply