[0:04]Assalamu Alaikum Dosto, main hoon Syed Umer from Has# Intelligence aur is class mein main aap logo ko physical access ke mazeed attacks bataunga. Achcha, physical access se jo attack hote hain, woh kayi saare factors pe depend karte hain, jismein se ek bahut hi important factor hai time. Matlab kitni der ke liye kisi ko aapka system milega to woh kya cheez perform karega? Agar aapne kisi kaam ke liye apna system chhoda, kisi kaam ke liye aap apna system chhod ke gaye aur hacker ko sirf 10 se 15 second mile, matlab use pata hai ki 10 se 15 second mein aap waapsi aa jayenge. Toh woh just information gathering kar sakta hai. Achcha agar use pata hai ki aap 30 se 40 second mein aayenge toh woh koi malware bhi install kar sakta hai. Achcha ek aur attack hai jo woh aapke sirf 10 second ki absence mein bhi perform kar sakta hai, woh hai aapka email reset karna. Woh usne aapki email dali apne mobile mein, phir forget password pe click kiya aur phir aap kahin uth ke chale gaye, woh aapke system ke paas aaya aur usne browser khola, aapki email kholi aur email mein woh jo reset link aayi hogi uss pe click kar diya. Toh is tareeqe se woh aapka account compromise kar sakta hai. Matlab aapke system mein aane mein aur uss link pe click karne mein mere khayal se use 5 se 6 second lagenge. Achcha agar usko 20 se 30 second mile toh woh keylogger bhi laga sakta hai aapke CPU ke peeche. Achcha CPU ke peeche keylogger lagane se kya hoga ki aap jo bhi likhenge, woh us USB mein save hote rahega. USB kyunki woh peeche ki taraf lagaega toh aapko nazar bhi nahin aayegi. Yeh kayi saari jagahon pe ho sakta hai, jaise office mein ho sakta hai, ya phir kisi studio mein ho sakta hai, ya phir kisi organization mein ho sakta hai ki aapne USB kisi ke CPU ke peeche laga di aur woh keylogging kar rahi hai, woh jo-jo likh raha hai, woh us USB mein save hote ja raha hai. Achcha yeh jo video aap dekh rahe hain ismein CPU upar rakha hua hai, jabki aksar aisa hota hai ki CPU jo hota hai woh neeche table ke hota hai. Toh kayi saare log dekh nahin paate ki usmein CPU mein kaunsi device lagi hui hai, kya lagi hui hai. Achcha yeh jo specially design USBs hoti hain jo keylogging karti hain, yeh kayi baar CPU ke zariye detect bhi nahin hoti, matlab aap usko dekhna chahe toh aapko woh nazar bhi nahin aayengi, woh as a simple keyboard input usko connect kar leti hai aur woh phir keylogging karte rehta hai. Achcha ek aur cheez ki jab hacker ne woh USB laga li toh phir woh mauke ki talash mein hota hai ki kab aap system se hatein aur kisi aur kaam mein mashgool hon aur woh chupchap USB nikal ke le jaein. Achcha kabhi aap apni device ko chhod ke gaye aur woh shutdown hui, toh aap sochte hain ki woh safe hai, koi agar aayega, kholega toh password mangegi, use toh password pata nahin hoga. Woh kahega, abey yaar ismein toh password laga hua hai, shit yaar usne password lagaya hua hai, ab main kya karoon? Aisa hargiz nahin hoga. Hackers apne paas ek USB stick rakhte hain jismein woh ek live OS rakhte hain. Woh ek USB aapke system mein lagayenge aur live boot karenge aur aapki hard disk aasani se access kar sakenge. Achcha, kayi baar aisa bhi hota hai ki woh aapki hard disk chura ke bhi le jaate hain, matlab woh aapka CPU kholega aur aapki hard disk nikalega aur chale jaega. Taki woh aaram se baith ke usmein se aapka sara data nikal sakein, toh yeh bhi ek physical access ke sath chori hoti hai ki woh important SD drives chura ke le jaate hain, ya USB drive chura ke le jaate hain, ya phir SD card, jo chhote SD card aate hain jo mobile mein lagte hain, woh chura ke le jaate hain. Toh yeh choti-choti cheezein bhi chori kar lete hain taki woh aapki private information pe access kar sakein.
[3:41]Achcha ek aur cheez hai jise hum kehte hain shoulder surfing. Shoulder surfing, yani chhup ke peeche se khade hoke kisi ko password type karte hue dekhna. Achcha yeh bhi ek bahut skill wala kaam hai ki is tareeqe se khade hoke saamne wale bande ko shak bhi na ho ya itni khamoshi se ao ke saamne wale bande ko pata bhi na chale aur chupchap uska password dekh lo. Toh isse hum kehte hain shoulder surfing. Toh ummeed hai ki aapko pata chal gaya hoga ki hacker physical access ke zariye se aapko kya-kya nuksaan pahuncha sakta hai. Ummeed hai ki aapko is video se fayda hua hoga. Main hoon Syed Umer from Has# Intelligence, milta hoon main aapse agli class mein.



