- Видео 231
- Просмотров 87 105
Faisal A. Garba (Cyber Security)
Нигерия
Добавлен 23 ноя 2018
Faisal A. Garba (Cyber Security)
Comprehensive Analysis of Black hole Attack on RPL in Static Mobile and Hybrid Network Environment
Comprehensive Analysis of Black hole Attack on RPL in Static Mobile and Hybrid Network Environment
Просмотров: 33
Видео
Comprehensive Analysis of Sinkhole Attack on RPL in Static Mobile and Hybrid Network Environment
Просмотров 31Месяц назад
Comprehensive Analysis of Sinkhole Attack on RPL in Static Mobile and Hybrid Network Environment
Simulating RSSI Measurement In Cooja Simulator
Просмотров 1663 месяца назад
In this video, we demonstrate how to simulate RSSI (Received Signal Strength Indicator) measurements using the Cooja Simulator within the Contiki OS environment. The simulation shows how to evaluate signal strength in wireless sensor networks (WSNs) by capturing and analyzing RSSI values in real-time. Watch as we: - Set up the Cooja simulation environment. - Run a live simulation to measure and...
Simulating Hatchetman Attack on RPL in Contiki 3.0 using Cooja Simulator
Просмотров 3335 месяцев назад
Simulating Hatchetman Attack on RPL in Contiki 3.0 using Cooja Simulator Welcome to my RUclips channel! In this video, we delve into the world of IoT security by simulating the Hatchetman Attack on the RPL protocol using the Contiki 3.0 operating system and the Cooja Simulator. 📌 What You'll Learn: Introduction to Hatchetman Attack: Understand what the Hatchetman Attack is and its implications ...
How Anyone Can Easily Generate a Poem Quickly with ChatGPT using this UNIQUE Approach.
Просмотров 103Год назад
In this video I am going to show you how to use ChatGPT to generate a poem. #chatgpt
How ANYONE can EASILY Find HUGE BREAKTHROUGH Research Gaps QUICKLY for a PhD in Computer Science
Просмотров 41Год назад
How ANYONE can EASILY Find HUGE BREAKTHROUGH Research Gaps QUICKLY for a PhD in Computer Science
Blockchain Unveiled: Everything You Need to Know in 5 Minutes
Просмотров 11Год назад
Welcome to Phoenyx Academy! I'm Faisal Ali Garba, and in this captivating video, we dive deep into the exciting world of blockchain technology. If you've ever wondered what blockchain is and how it's shaping the future, you're in the right place. In this comprehensive overview, we'll cover: - Blockchain Basics : We'll start from the ground up, explaining what blockchain is and why it's consider...
How to Break into Cyber Security: Your Ultimate Career Guide
Просмотров 113Год назад
Are you eager to dive headfirst into the dynamic world of cyber security? This video is your ultimate career guide on how to break into this exciting and rewarding field! Discover the various paths you can pursue, including security analyst, ethical hacker, incident responder, security consultant, and cryptographer. In this comprehensive video, we'll start by helping you assess your existing sk...
Privacy in the Age of Social Media
Просмотров 40Год назад
Privacy in the Age of Social Media | Phoenxy Academy Welcome to Phoenxy Academy! Join presenter Faisal A. Garba in this eye-opening video as we explore the pressing issue of privacy in the age of social media. 🔒 Understanding Online Privacy: In a world where sharing personal information has become the norm, it's vital to comprehend the implications of this digital landscape. Faisal dives deep i...
Don't Be a Victim: Essential Tips to Prevent WhatsApp Hacking
Просмотров 106Год назад
Welcome to the official RUclips channel of Faisal A. Garba, your go-to destination for cybersecurity education and expert insights. Join me on Phoenyx Academy as we delve into the realm of digital security and equip ourselves with the necessary skills to protect against WhatsApp hacking. #PhoenyxAcademy #Cybersecurity #WhatsAppSecurity #HackingAwareness #PrivacyProtection #OnlineSafety #Digital...
Ransomware: The Silent Thief of the Digital World
Просмотров 47Год назад
Welcome to Phoenyx Academy! In this eye-opening video, cybersecurity expert Faisal A. Garba sheds light on the menacing threat of ransomware and equips you with essential knowledge to protect yourself and your digital world. Ransomware has become a silent thief, preying on unsuspecting individuals and organizations worldwide. Join Faisal A. Garba as he unravels the intricate web of cybercrime, ...
Unveiling the Tactics of Nigerian Yahoo Boys
Просмотров 245Год назад
Welcome to our RUclips channel! In this eye-opening video, we delve into the dark world of Nigerian Yahoo Boys and expose the truth behind their cybercriminal activities. Internet fraud has become an epidemic, and it's time to shed light on the tactics employed by these scammers. Join us as we uncover the real story behind Nigerian Yahoo Boys, their methods of operation, and the devastating con...
Web 3.0 : The Future of the Internet Unveiled
Просмотров 92Год назад
Web 3.0: The Future of the Internet Unveiled | Phoenyx Academy Welcome to Phoenyx Academy! In this exciting video, host Faisal A. Garba takes you on a journey into the fascinating world of Web 3.0. Discover how this next generation of the internet is set to revolutionize the way we interact with information, applications, and each other online. Web 3.0, also known as the Semantic Web or the Dec...
Exploring the World of Programming Languages
Просмотров 45Год назад
Dive into the vibrant universe of programming languages with our captivating overview video! In this fast-paced and informative exploration, we provide a concise yet insightful introduction to the most popular programming languages out there. Discover the elegance and versatility of Python, renowned for its readability and vast ecosystem of libraries. Unleash the power of Java, a robust languag...
An Epic Introduction to Computer Science
Просмотров 32Год назад
An Epic Introduction to Computer Science
A Complete Introduction to the Internet of Things (IoT)
Просмотров 33Год назад
A Complete Introduction to the Internet of Things (IoT)
An Overview of Post-Quantum Cryptography
Просмотров 41Год назад
An Overview of Post-Quantum Cryptography
A Beginner's Guide to Artificial Intelligence
Просмотров 101Год назад
A Beginner's Guide to Artificial Intelligence
9 CRUCIAL Factors You MUST Know NOW Before Buying Your Next Smartphone [2025]
Просмотров 21Год назад
9 CRUCIAL Factors You MUST Know NOW Before Buying Your Next Smartphone [2025]
Don't Buy a New Computer Without Watching This First!
Просмотров 304Год назад
Don't Buy a New Computer Without Watching This First!
#12 Programming IoT Applications in Contiki: Leds and Button
Просмотров 3242 года назад
#12 Programming IoT Applications in Contiki: Leds and Button
#13 Programming IoT Applications in Contiki: Blinker
Просмотров 1942 года назад
#13 Programming IoT Applications in Contiki: Blinker
#11 Simulating Version Number Attack on IoT Nodes Running RPL Protocol
Просмотров 8352 года назад
#11 Simulating Version Number Attack on IoT Nodes Running RPL Protocol
#10 Simulating DIS Flooding Attack on IoT Nodes Running RPL Protocol
Просмотров 1,7 тыс.2 года назад
#10 Simulating DIS Flooding Attack on IoT Nodes Running RPL Protocol
#09 Simulating Sinkhole Attack on IoT Nodes Running RPL Protocol
Просмотров 2 тыс.2 года назад
#09 Simulating Sinkhole Attack on IoT Nodes Running RPL Protocol
#08 Simulating Blackhole Attack on IoT Nodes Running RPL Protocol
Просмотров 2,2 тыс.2 года назад
#08 Simulating Blackhole Attack on IoT Nodes Running RPL Protocol
#05 Socket Programming in C: Creating a UDP Client
Просмотров 1052 года назад
#05 Socket Programming in C: Creating a UDP Client
#04 Socket Programming in C: Creating a UDP Server
Просмотров 1092 года назад
#04 Socket Programming in C: Creating a UDP Server
Can you give some idea how to implement sybil attack
when i start the VM in VB it brings me to a command screen login and not the windows login. how do i fix this?
thank you mister Faysal please keep continuing
keep going men
There is no gather analytics folder in example folder Where to find
@@manjusharma6797 Buy my book.
You can get it here: selar.co/t133n9?currency=USD
Thanks Buddy 😙😙
Sir how to implement rpl in secure mode using pre-installed keys
thank you you saved my time
thank you
how to calculate average end to end delay using cooja for RPL-based IoT network?
It is all inside my book. Grab your copy. It comes with the C and Python codes.
@@faisalagarbaaa I have purchased your book, *Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers*. However, I couldn't find information on how to calculate the average end-to-end delay using Cooja for an RPL-based IoT network. Could you please provide guidance on this?
@@MrMAKhan786 When did you purchase the book? Send me a copy of the receipt via email: alifa2try@gmail.com, and will send you the updated Chapter.
@@faisalagarbaaa I have sent a copy of the receipt via email. Thank you.
What does this do
Thats one shitty tool lmfao
where is download link google ?
Thank you Faisal. You are doing great things
Excelent video, my friend. I tried several options but none of them worked. To this day.
Thank you dear😊
تثبيت metasploitable3 علي vmware
collect view of my cooja is not working so i working on 2.7 it works will it cause some problem?
hello sir , thank you for the vedio. I couldn't find the file uiop6.c that you shared. Is it possible for you to reshare it? I'm not sure what modifications to make
hiii
Ce n'est pas un fichier OVA officiel ? Je ne le trouve pas sur github.
Thank you!!
You are welcome. Please subscribe to the channel.
I am working on RPL protocol for Smart meter communication ( IOT devices) please let me know with real time devices how to check these scenarios
Nice lecture but want to sync on real time how to test
Very informative video. Could you please give guidance about how to calculate number of packets sent and number of packets received from mote output log? Thanks
How can I move files from the target machine to my own machine?
use ftp method
Hi Sir, how to simulate any energy depletion attack in RPL?
DIS Flooding attack and DODAG version number attack are energy depletion attacks. Check the channel for the attacks and to get more details buy my book from Amazon.
Can you please answer this question? how to record video while simulation on "cooja"
You use a screen capture software
@@faisalagarbaaa which free software are available? Please Mention any s/w if we simultaneously could also record ourselves also
Things sorted!
Thank you that was helpful
You are most welcome
I have tried to simulate the sinkhole attack with all steps you mentioned. Attack was not successful. I think the reason is some information in the code that has to be changed is missing... Please take out some time, it's a humble request. Assalamwalaikum
All the details are in the book: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=mp_s_a_1_2?keywords=RPL+attack&qid=1701538689&sr=8-2
sir , I can't afford his book right now@@faisalagarbaaa ,Please understand
I do no know how should i explain my situation to you, I would be extremely thankful to you if you could send me a soft copy of this book , Please sir !
Sir, please drop the file link for us 😢
Try to buy the book 📚. There is no any file. You do the manipulation yourself. Everything is in the book 📖
Your video is very very useful. Thanks to it, I can install Metasploit 3 much easier. Thank you very much
You are very most welcome.
Thxxxxxx 🫶🏻❤️🔥❤️🔥❤️🔥❤️🔥❤️🔥
Hi what is the administrator password?
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5
For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5