background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Как защитить компьютер. Автовыключение и самоуничтожение"

input logo icon
Video tags
|

Video tags

информационная безопасность
как защитить компьютер
luks nuke
cryptsetup
cryptsetup luks
как настроить luks nuke
как заблокировать usb
как заблокировать флешку
information security
usbdeath
как настроить usbdeath
защита информации
linux
kali linux
kali nuke
линукс
анонимность
анонимность в сети
анонимность в интернете
анонимность и безопасность
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:02
data stored on a computer is no less
00:00:04
relevant than the issue of network data security,
00:00:06
we have already discussed the issues of creating
00:00:08
encrypted and protected partitions, but for
00:00:10
complete security this is not
00:00:12
enough, sometimes
00:00:13
you need to protect your computer
00:00:15
from connecting third-party devices, and
00:00:17
sometimes you need to quickly destroy all the
00:00:19
information reasons doing this may be
00:00:21
a lot and I won’t philosophize on this topic,
00:00:23
so let’s move straight to the
00:00:24
practical part of the question. I’ll show you
00:00:26
several ways to protect your system
00:00:28
not from simple automatic
00:00:30
shutdown, but from bricking the hard
00:00:32
drive; they are all quite simple and easy to
00:00:34
implement, but at the same time very effective.
00:00:36
First the simplest method is the
00:00:38
usp-s utility,
00:00:39
it can protect your computer from
00:00:42
poking foreign flash drives into it, for
00:00:44
example, if you left the computer at work
00:00:46
without blocking it
00:00:47
and one of your colleagues and the shell, then
00:00:49
decently throw off a couple of files for yourself,
00:00:51
so we’ll catch up with him. and your
00:00:53
computer just reboots By the way,
00:00:56
this utility has another useful
00:00:57
function, I’ll show it in the process You
00:01:00
might have a question There are
00:01:02
quite a lot of similar utilities why I chose
00:01:03
this one I’ll explain They’re shot down It will give the most
00:01:06
simple, quickly effective question that
00:01:08
it decides to grow pinin So don’t
00:01:10
bother setting up Personally, I’m
00:01:12
just lazy, and this is also a script
00:01:14
that creates rules for the system
00:01:16
daemon of the devs that controls the operation of
00:01:18
devices in the system, and accordingly it does not
00:01:20
work with memory, which by definition is
00:01:21
good for downloading.
00:01:29
Now let’s go to this folder and
00:01:31
we need to make this script executable,
00:01:35
don’t bother too much and give it all
00:01:37
rights
00:01:38
the script is initially configured to work in
00:01:41
demo mode, that is, it simply keeps logs,
00:01:43
to fix this you need to slightly
00:01:45
tweak the corresponding parameter in the
00:01:47
script code, to do this, open the file and
00:01:50
miss bds and find the line of
00:01:54
smoke from and simply delete it, you can
00:01:58
comment it out, you can fix it with a
00:02:00
new one We save the wish at the first
00:02:05
launch, it makes sense to launch it with the
00:02:07
show parameter to see such
00:02:09
devices are connected, it will show
00:02:15
the device that is currently connected and
00:02:17
before launching you can
00:02:18
install the flash drives you need or then
00:02:20
add to the white list the device from
00:02:22
this list will be added to the rules and
00:02:24
will become trusted, that is, disabling their
00:02:26
connection will not cause any
00:02:28
unexpected actions
00:02:30
if the list suits us, we can
00:02:32
create rules, a message appears
00:02:37
that the rules have been created and activate usp-s
00:02:39
now if we are represented by
00:02:41
any built usb device,
00:02:43
the computer will simply turn off, let me show you
00:02:45
how it works,
00:02:46
I connect the flash drive to cola
00:02:49
and the whole system has gone out, look further
00:02:53
if suddenly there is a need to
00:02:56
install a USB device known to us
00:02:58
that is not in the white list, I am knocked down, you
00:03:00
can temporarily disable it, this is done with the
00:03:03
command of any if suddenly this
00:03:07
device needs to be added to the white list,
00:03:09
enter the command
00:03:10
German forest gene and it will update the list and
00:03:15
accordingly after that we run it and
00:03:18
this script also has one useful
00:03:21
function, you can add a device when
00:03:23
you turn it off and turn it on, which will
00:03:25
turn off the computer, done with the
00:03:27
command and jack, and from the list that appears you
00:03:31
need to select the desired device,
00:03:33
after all, you can add it to yourself as if it were
00:03:36
not a flash drive and let it stick out.
00:03:37
if you suddenly begin to understand that
00:03:38
now you can forgive and something
00:03:40
unpleasant pulled it out, the lump has gone out and the disk is
00:03:43
encrypted
00:03:44
and you already feel calmer and by the way,
00:03:47
the USB is logged, they are in the warlock
00:03:51
isds folder, bad and not here by the way, you can
00:03:57
see the model and serial number of
00:03:58
the flash drive that was shoved now the system engineer is
00:04:00
your absence and then find the owner of the
00:04:02
flash drive and explain to him where you need
00:04:05
to put the flash drive next time, but
00:04:08
if you suddenly got stupid, you managed to
00:04:09
break something and everything stopped
00:04:11
working as it should, you can delete all the
00:04:13
rules and start configuring everything all over again,
00:04:16
this is done with the dl command,
00:04:18
well If this utility doesn’t suit you,
00:04:21
you can use utilities like the
00:04:23
Uzbeks Elisif Garden essentially performs
00:04:25
the same function, that is, make sure that
00:04:27
nothing built is written in your
00:04:29
uzb,
00:04:30
but they have a larger set of functions, you can
00:04:32
choose which files to delete before
00:04:34
rebooting, just block
00:04:36
the connection, don’t lie down from a white sheet
00:04:38
and so on, links to all this will be the
00:04:40
corresponding article on the site, a link
00:04:42
to the site and to the article will be in the description of
00:04:45
this video, whoever needs to go and
00:04:47
use it will also have all the commands that I
00:04:49
’ll put here with descriptions, you
00:04:51
also need to copy from there now let
00:04:53
’s look at more advanced protection options
00:04:55
if in the previous example we meant
00:04:57
that we were simply protecting ourselves from flash poking and
00:05:00
randomly, now let’s imagine
00:05:02
that something really important is stored inside the computer and naturally in an
00:05:04
encrypted section
00:05:05
and let’s think about
00:05:07
how a conditional villain would think if
00:05:10
his knowledge of computers goes beyond the
00:05:11
limits skills to work on board, he must
00:05:14
guess that your disk is encrypted,
00:05:16
that is, he has two options left: to
00:05:17
catch you without the computer turned on and not allow you
00:05:20
to turn it off, or you are breathing yourself, the password is
00:05:23
basically fine with both options, you are
00:05:25
neither, let's start, represents the
00:05:27
worst option when you are not managed
00:05:29
to turn off the cant,
00:05:30
of course you can use it from bts
00:05:32
or analogues,
00:05:33
and when he pokes a flash drive or an external
00:05:35
hard drive,
00:05:36
he will definitely poke it because
00:05:38
he wants to copy everything you have so
00:05:40
that later you can view it in a calm atmosphere,
00:05:42
the computer will turn off and you will
00:05:45
all see a request for a
00:05:46
decryption password disk, which means you
00:05:49
automatically move to the next
00:05:50
level of your relationship, namely
00:05:52
inventing a password, and if you are sure that
00:05:54
your balls are stronger than a doorway, you do
00:05:56
n’t have to look any further, if suddenly it’s
00:05:58
a little softer, then sooner or later you
00:06:01
’ll tell the password if you have usp-s
00:06:03
then you’re dressed after 5 or 8 shutdowns, it all
00:06:07
depends on our intellectual abilities,
00:06:09
as if the villains will understand, but maybe
00:06:11
someone will tell you that something is wrong here and the
00:06:13
moral and physical training of your carcass
00:06:15
will continue and sooner or later you go
00:06:18
activate the USB d'este,
00:06:19
and that's all and a Mauser, so to speak, well,
00:06:22
so that where my faithful one happens, it would be
00:06:24
nice to quickly turn our hard
00:06:26
drive into a pebble, and this is how we smoothly
00:06:29
approach the more radical
00:06:31
random, well, of the radical options, the
00:06:33
easiest way is to use standard
00:06:35
kali linux tools, as you probably
00:06:37
guessed, we are talking o varnish snow thanks
00:06:39
to which you can create a second password, when
00:06:41
entered, the lax header will be deleted
00:06:43
and start the system, as well as
00:06:46
access the data if you get the hard
00:06:48
drive, it won’t work either, but if you take
00:06:50
care in advance, then the data
00:06:52
can then be restored
00:06:53
by the way if you use Nicole Winx
00:06:56
in which everything is already preinstalled and
00:06:57
some other distribution I’ll leave an article on
00:06:59
the site with a link where you can download
00:07:01
lax
00:07:02
hatch for other linux distributions there, in
00:07:05
principle, there are versions for all the most
00:07:07
common distributions now
00:07:09
let’s see how it all works as
00:07:11
you understand grandson can only be applied
00:07:12
to encrypted section, accordingly,
00:07:15
we need to check whether everything is encrypted,
00:07:17
how this command is done cribs stage
00:07:24
if you see the inscription acids 0 enable,
00:07:28
then everything is fine, you can move on to the
00:07:29
next step,
00:07:30
that is, create a password and self-destruct,
00:07:33
let's call it that
00:07:40
now you need to enter the normal
00:07:42
password first and the self-destruct password twice
00:07:49
everything is ready now, after entering the 2nd password, it will
00:07:54
no longer be possible to gain access to the system and data, but a logical
00:07:56
question arises: what should I do if I was frightened and
00:07:59
confused the passwords and want to restore
00:08:01
access to the system, for this I need to make a
00:08:03
backup of the lax header, this is done with the
00:08:06
cribs command, this is plax frames backup
00:08:08
we indicate what our backup file will be called,
00:08:17
and now we have it in Ukraine, which is
00:08:19
exactly what it is, this is not very sensible and it would be
00:08:22
nice to encrypt it; for
00:08:24
encryption, there is no need to reinvent the wheel;
00:08:26
everything can be done using standard
00:08:27
demax tools, that is, use
00:08:29
appannie sucked; enter the password and we have an
00:08:38
encrypted file has appeared,
00:08:39
this file needs to be copied somewhere
00:08:41
onto a flash drive and stored somewhere
00:08:43
separately because that’s where we can
00:08:45
achieve recovery, let’s do that,
00:08:47
throw it onto a flash drive, now I’ll show you
00:08:54
such an important point how to
00:08:55
restore access to the system if we
00:08:58
had to use the
00:08:59
self-destruct password, come on let's reboot
00:09:05
and enter the second password, as you can see, it
00:09:14
gave us an error, now even if I enter the
00:09:16
correct password, an
00:09:19
error still appears to
00:09:22
fix everything, we will need to boot into
00:09:24
live mode, for example, stop the flash drive with
00:09:26
which we installed the system,
00:09:27
turn off everything, but first I will do a
00:09:30
small manipulation on the login the folder with
00:09:33
potassium installed, by the way, calling
00:09:35
was installed right before recording
00:09:36
the video, I didn’t change anything at all, that is,
00:09:39
everything happens roughly from scratch, we need to
00:09:41
open this file and
00:09:44
add play here at the end and
00:09:50
set it to about 5 seconds, this is by the way I
00:09:54
made it so that I could see the bios a little longer when
00:09:56
loading the virtual operating
00:09:58
system because with the standard
00:10:00
settings you need to have a panther reaction
00:10:02
in order to have time cool sands
00:10:04
[music]
00:10:08
we launch the flashes in live mode,
00:10:11
connect the flash drive
00:10:18
and now we will decrypt our file, enter
00:10:22
the password, you see we have our
00:10:27
forged drags files now we will restore the
00:10:29
header and we will eat in capital letters
00:10:34
and to make sure that the block is installed
00:10:40
we use the command cribs stage lax dan and
00:10:46
we see our headers acids legs acids
00:10:50
one we can all start the system
00:10:52
we will have the correct password
00:11:02
and see that the disk is decrypted well and
00:11:04
that’s probably all for today as
00:11:07
always there was a pulse with you, subscribe to the channel and
00:11:09
see you again

Description:

https://t.me/Pulsechanel - канал Telegram, только там дополнительные и эксклюзивные материалы, а также условия задач по OSINT. https://hacker-basement.com/ - наш сайт. Можно почитать статьи, посмотреть текстовые материалы к видео. Текстовая версия здесь - https://hacker-basement.com/2019/08/28/bezopasnost-komputera-usbdeath-luksnuke/ Вопрос физической защиты данных, хранящихся на компьютере, не менее актуален, чем вопрос безопасности данных в сети. Иногда нужно обезопасить свой компьютер от подключения сторонних устройств, а иногда нужно быстро уничтожить всю информацию. В этом видео инструкция как настроить и использовать USBDeath и Luks Nuke. Поддержать канал материально можно здесь: Patreon - https://www.patreon.com/pulsepagemy Monobank - https://send.monobank.ua/jar/U32Yc8ML3 Стать спонсором на YouTube - https://www.youtube.com/channel/UCojEUrPvEvkUXEU3QWwhCwg/join BTC - 1CSD1ALNB82gmnEKhrrHW2CTfYPw8Dtwog ETH(ERC20) - 0xebbdc2dabdb0cc16fa9cd7d9fc1afd29584483a7 USDT(TRC20) - TUjPM7Q53EZhcBvR24Mw5AQesLszQtgYe4

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Как защитить компьютер. Автовыключение и самоуничтожение" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Как защитить компьютер. Автовыключение и самоуничтожение" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Как защитить компьютер. Автовыключение и самоуничтожение" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Как защитить компьютер. Автовыключение и самоуничтожение" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Как защитить компьютер. Автовыключение и самоуничтожение"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Как защитить компьютер. Автовыключение и самоуничтожение"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.