Hacking a Samsung Galaxy for $6,000,000 in Bitcoin!?

Joe Grand2 minutes read

Joe Grant assists Lavarr in hacking a phone to access a bitcoin wallet, facing technical challenges and uncertainties along the way. Despite numerous obstacles, including connectivity issues, Grant successfully establishes a connection to the phone's memory to retrieve the password and potentially access millions of dollars in cryptocurrency.

Insights

  • Grant faces significant challenges and risks in assisting Lavarr to access his bitcoin wallet due to the high stakes involved and the inherent uncertainty of hacking systems.
  • The process of extracting the swipe pattern from Lavarr's phone to access the wallet involves intricate technical steps, including dealing with connectivity issues, exploring various hacking methods, and engaging in nerve-wracking micro soldering to establish a successful connection to the memory for potential password retrieval.

Get key ideas from YouTube videos. It’s free

Recent questions

  • What is bitcoin hacking?

    Accessing digital wallets through technical means.

Related videos

Summary

00:00

"High-stakes hacking to access lost bitcoin"

  • Joe Grant is nervous about helping people access their bitcoin wallets, as it involves high stakes and risks.
  • Grant explains that any system can be hacked with enough time and resources, emphasizing the uncertainty and risk involved in hacking.
  • Grant is assisting Lavarr, who has locked himself out of a phone potentially holding millions of dollars in cryptocurrency.
  • The goal is to extract the swipe pattern from the phone's memory to access the wallet.
  • Grant uses a device to extract memory from the phone to locate the swipe password and access the wallet.
  • Grant highlights the importance of each step going smoothly to access the wallet successfully.
  • Lavarr shares his experience of buying bitcoin in 2013 and losing access to it due to forgetting the phone's location.
  • Grant and Lavarr work together to hack the phone, with Lavarr hopeful of accessing his long-lost cryptocurrency.
  • Grant encounters technical difficulties with the phone's jtag interface, leading to unexpected challenges in the hacking process.
  • Grant faces connectivity issues with his cable but manages to find a solution to proceed with the hacking attempt.

16:29

Challenges of Memory Extraction Through Micro Soldering

  • The individual started examining small connectors on an interface, resoldered them, and ensured there were no shorts.
  • Despite efforts, the issue with the cable could not be resolved, leading to a shift towards hardware hacking.
  • Options were discussed, including using a device to plug into the JTAG interface, which did not work.
  • Various options were considered, including using JTAG with hardwired connections involving nine connections.
  • A slower method using JTAG for memory extraction and a riskier method of physically connecting to the memory were also explored.
  • Micro soldering in a hotel room was deemed the most challenging option.
  • The process of soldering fine wires onto tiny pins was nerve-wracking and required precision.
  • After multiple attempts and challenges, successful connection to the memory was achieved.
  • The data transfer process began, with the anticipation of potential password retrieval for cryptocurrency access.
  • The data transfer process was monitored closely, with the need to vacate the room adding pressure to the situation.
Channel avatarChannel avatarChannel avatarChannel avatarChannel avatar

Try it yourself — It’s free.