Faisal A. Garba (Cyber Security)
Faisal A. Garba (Cyber Security)
  • Видео 231
  • Просмотров 87 105

Видео

Comprehensive Analysis of Sinkhole Attack on RPL in Static Mobile and Hybrid Network Environment
Просмотров 31Месяц назад
Comprehensive Analysis of Sinkhole Attack on RPL in Static Mobile and Hybrid Network Environment
Simulating RSSI Measurement In Cooja Simulator
Просмотров 1663 месяца назад
In this video, we demonstrate how to simulate RSSI (Received Signal Strength Indicator) measurements using the Cooja Simulator within the Contiki OS environment. The simulation shows how to evaluate signal strength in wireless sensor networks (WSNs) by capturing and analyzing RSSI values in real-time. Watch as we: - Set up the Cooja simulation environment. - Run a live simulation to measure and...
Simulating Hatchetman Attack on RPL in Contiki 3.0 using Cooja Simulator
Просмотров 3335 месяцев назад
Simulating Hatchetman Attack on RPL in Contiki 3.0 using Cooja Simulator Welcome to my RUclips channel! In this video, we delve into the world of IoT security by simulating the Hatchetman Attack on the RPL protocol using the Contiki 3.0 operating system and the Cooja Simulator. 📌 What You'll Learn: Introduction to Hatchetman Attack: Understand what the Hatchetman Attack is and its implications ...
How Anyone Can Easily Generate a Poem Quickly with ChatGPT using this UNIQUE Approach.
Просмотров 103Год назад
In this video I am going to show you how to use ChatGPT to generate a poem. #chatgpt
Two Evil Twins: CORVID 19 & Open Wi Fi
Просмотров 26Год назад
Two Evil Twins: CORVID 19 & Open Wi Fi
How ANYONE can EASILY Find HUGE BREAKTHROUGH Research Gaps QUICKLY for a PhD in Computer Science
Просмотров 41Год назад
How ANYONE can EASILY Find HUGE BREAKTHROUGH Research Gaps QUICKLY for a PhD in Computer Science
Blockchain Unveiled: Everything You Need to Know in 5 Minutes
Просмотров 11Год назад
Welcome to Phoenyx Academy! I'm Faisal Ali Garba, and in this captivating video, we dive deep into the exciting world of blockchain technology. If you've ever wondered what blockchain is and how it's shaping the future, you're in the right place. In this comprehensive overview, we'll cover: - Blockchain Basics : We'll start from the ground up, explaining what blockchain is and why it's consider...
How to Break into Cyber Security: Your Ultimate Career Guide
Просмотров 113Год назад
Are you eager to dive headfirst into the dynamic world of cyber security? This video is your ultimate career guide on how to break into this exciting and rewarding field! Discover the various paths you can pursue, including security analyst, ethical hacker, incident responder, security consultant, and cryptographer. In this comprehensive video, we'll start by helping you assess your existing sk...
Privacy in the Age of Social Media
Просмотров 40Год назад
Privacy in the Age of Social Media | Phoenxy Academy Welcome to Phoenxy Academy! Join presenter Faisal A. Garba in this eye-opening video as we explore the pressing issue of privacy in the age of social media. 🔒 Understanding Online Privacy: In a world where sharing personal information has become the norm, it's vital to comprehend the implications of this digital landscape. Faisal dives deep i...
Don't Be a Victim: Essential Tips to Prevent WhatsApp Hacking
Просмотров 106Год назад
Welcome to the official RUclips channel of Faisal A. Garba, your go-to destination for cybersecurity education and expert insights. Join me on Phoenyx Academy as we delve into the realm of digital security and equip ourselves with the necessary skills to protect against WhatsApp hacking. #PhoenyxAcademy #Cybersecurity #WhatsAppSecurity #HackingAwareness #PrivacyProtection #OnlineSafety #Digital...
Ransomware: The Silent Thief of the Digital World
Просмотров 47Год назад
Welcome to Phoenyx Academy! In this eye-opening video, cybersecurity expert Faisal A. Garba sheds light on the menacing threat of ransomware and equips you with essential knowledge to protect yourself and your digital world. Ransomware has become a silent thief, preying on unsuspecting individuals and organizations worldwide. Join Faisal A. Garba as he unravels the intricate web of cybercrime, ...
Unveiling the Tactics of Nigerian Yahoo Boys
Просмотров 245Год назад
Welcome to our RUclips channel! In this eye-opening video, we delve into the dark world of Nigerian Yahoo Boys and expose the truth behind their cybercriminal activities. Internet fraud has become an epidemic, and it's time to shed light on the tactics employed by these scammers. Join us as we uncover the real story behind Nigerian Yahoo Boys, their methods of operation, and the devastating con...
Web 3.0 : The Future of the Internet Unveiled
Просмотров 92Год назад
Web 3.0: The Future of the Internet Unveiled | Phoenyx Academy Welcome to Phoenyx Academy! In this exciting video, host Faisal A. Garba takes you on a journey into the fascinating world of Web 3.0. Discover how this next generation of the internet is set to revolutionize the way we interact with information, applications, and each other online. Web 3.0, also known as the Semantic Web or the Dec...
Exploring the World of Programming Languages
Просмотров 45Год назад
Dive into the vibrant universe of programming languages with our captivating overview video! In this fast-paced and informative exploration, we provide a concise yet insightful introduction to the most popular programming languages out there. Discover the elegance and versatility of Python, renowned for its readability and vast ecosystem of libraries. Unleash the power of Java, a robust languag...
The Ultimate Guide to Cyber Security
Просмотров 64Год назад
The Ultimate Guide to Cyber Security
An Epic Introduction to Computer Science
Просмотров 32Год назад
An Epic Introduction to Computer Science
A Complete Introduction to the Internet of Things (IoT)
Просмотров 33Год назад
A Complete Introduction to the Internet of Things (IoT)
An Overview of Post-Quantum Cryptography
Просмотров 41Год назад
An Overview of Post-Quantum Cryptography
A Beginner's Guide to Artificial Intelligence
Просмотров 101Год назад
A Beginner's Guide to Artificial Intelligence
9 CRUCIAL Factors You MUST Know NOW Before Buying Your Next Smartphone [2025]
Просмотров 21Год назад
9 CRUCIAL Factors You MUST Know NOW Before Buying Your Next Smartphone [2025]
Don't Buy a New Computer Without Watching This First!
Просмотров 304Год назад
Don't Buy a New Computer Without Watching This First!
#12 Programming IoT Applications in Contiki: Leds and Button
Просмотров 3242 года назад
#12 Programming IoT Applications in Contiki: Leds and Button
#13 Programming IoT Applications in Contiki: Blinker
Просмотров 1942 года назад
#13 Programming IoT Applications in Contiki: Blinker
#11 Simulating Version Number Attack on IoT Nodes Running RPL Protocol
Просмотров 8352 года назад
#11 Simulating Version Number Attack on IoT Nodes Running RPL Protocol
#10 Simulating DIS Flooding Attack on IoT Nodes Running RPL Protocol
Просмотров 1,7 тыс.2 года назад
#10 Simulating DIS Flooding Attack on IoT Nodes Running RPL Protocol
#09 Simulating Sinkhole Attack on IoT Nodes Running RPL Protocol
Просмотров 2 тыс.2 года назад
#09 Simulating Sinkhole Attack on IoT Nodes Running RPL Protocol
#08 Simulating Blackhole Attack on IoT Nodes Running RPL Protocol
Просмотров 2,2 тыс.2 года назад
#08 Simulating Blackhole Attack on IoT Nodes Running RPL Protocol
#05 Socket Programming in C: Creating a UDP Client
Просмотров 1052 года назад
#05 Socket Programming in C: Creating a UDP Client
#04 Socket Programming in C: Creating a UDP Server
Просмотров 1092 года назад
#04 Socket Programming in C: Creating a UDP Server

Комментарии

  • @manjusharma6797
    @manjusharma6797 19 дней назад

    Can you give some idea how to implement sybil attack

  • @Whytho-dude
    @Whytho-dude Месяц назад

    when i start the VM in VB it brings me to a command screen login and not the windows login. how do i fix this?

  • @mohamenfis6854
    @mohamenfis6854 Месяц назад

    thank you mister Faysal please keep continuing

  • @SSTROBO
    @SSTROBO 2 месяца назад

    keep going men

  • @manjusharma6797
    @manjusharma6797 3 месяца назад

    There is no gather analytics folder in example folder Where to find

    • @faisalagarbaaa
      @faisalagarbaaa 2 месяца назад

      @@manjusharma6797 Buy my book.

    • @faisalagarbaaa
      @faisalagarbaaa Месяц назад

      You can get it here: selar.co/t133n9?currency=USD

  • @club_of_hackers009
    @club_of_hackers009 3 месяца назад

    Thanks Buddy 😙😙

  • @manjusharma6797
    @manjusharma6797 4 месяца назад

    Sir how to implement rpl in secure mode using pre-installed keys

  • @fx9855
    @fx9855 5 месяцев назад

    thank you you saved my time

  • @UNT_Vinay
    @UNT_Vinay 5 месяцев назад

    thank you

  • @MrMAKhan786
    @MrMAKhan786 5 месяцев назад

    how to calculate average end to end delay using cooja for RPL-based IoT network?

    • @faisalagarbaaa
      @faisalagarbaaa 5 месяцев назад

      It is all inside my book. Grab your copy. It comes with the C and Python codes.

    • @MrMAKhan786
      @MrMAKhan786 2 месяца назад

      @@faisalagarbaaa I have purchased your book, *Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers*. However, I couldn't find information on how to calculate the average end-to-end delay using Cooja for an RPL-based IoT network. Could you please provide guidance on this?

    • @faisalagarbaaa
      @faisalagarbaaa 2 месяца назад

      @@MrMAKhan786 When did you purchase the book? Send me a copy of the receipt via email: alifa2try@gmail.com, and will send you the updated Chapter.

    • @MrMAKhan786
      @MrMAKhan786 2 месяца назад

      @@faisalagarbaaa I have sent a copy of the receipt via email. Thank you.

  • @alphyraignecalimag6160
    @alphyraignecalimag6160 5 месяцев назад

    What does this do

  • @VivaLaRevoMW3PS3
    @VivaLaRevoMW3PS3 5 месяцев назад

    Thats one shitty tool lmfao

  • @MrPyrochimark
    @MrPyrochimark 7 месяцев назад

    where is download link google ?

  • @0xC47P1C3
    @0xC47P1C3 8 месяцев назад

    Thank you Faisal. You are doing great things

  • @josuemorales8867
    @josuemorales8867 8 месяцев назад

    Excelent video, my friend. I tried several options but none of them worked. To this day.

  • @ayushsoni1953
    @ayushsoni1953 8 месяцев назад

    Thank you dear😊

  • @yousefshaheen-qn2uu
    @yousefshaheen-qn2uu 8 месяцев назад

    تثبيت metasploitable3 علي vmware

  • @mendbayaralzakhgui9293
    @mendbayaralzakhgui9293 8 месяцев назад

    collect view of my cooja is not working so i working on 2.7 it works will it cause some problem?

  • @B-ys7yj
    @B-ys7yj 9 месяцев назад

    hello sir , thank you for the vedio. I couldn't find the file uiop6.c that you shared. Is it possible for you to reshare it? I'm not sure what modifications to make

  • @gourav_meena_18
    @gourav_meena_18 10 месяцев назад

    hiii

  • @bosjr5557
    @bosjr5557 11 месяцев назад

    Ce n'est pas un fichier OVA officiel ? Je ne le trouve pas sur github.

  • @Clark22134
    @Clark22134 11 месяцев назад

    Thank you!!

    • @faisalagarbaaa
      @faisalagarbaaa 11 месяцев назад

      You are welcome. Please subscribe to the channel.

  • @phaneedrakumaribharadwaj2392

    I am working on RPL protocol for Smart meter communication ( IOT devices) please let me know with real time devices how to check these scenarios

  • @phaneedrakumaribharadwaj2392

    Nice lecture but want to sync on real time how to test

  • @sarojachavan8424
    @sarojachavan8424 Год назад

    Very informative video. Could you please give guidance about how to calculate number of packets sent and number of packets received from mote output log? Thanks

  • @nicatshare6103
    @nicatshare6103 Год назад

    How can I move files from the target machine to my own machine?

  • @purbapal2144
    @purbapal2144 Год назад

    Hi Sir, how to simulate any energy depletion attack in RPL?

    • @faisalagarbaaa
      @faisalagarbaaa Год назад

      DIS Flooding attack and DODAG version number attack are energy depletion attacks. Check the channel for the attacks and to get more details buy my book from Amazon.

  • @thisismr900
    @thisismr900 Год назад

    Can you please answer this question? how to record video while simulation on "cooja"

    • @faisalagarbaaa
      @faisalagarbaaa Год назад

      You use a screen capture software

    • @thisismr900
      @thisismr900 Год назад

      @@faisalagarbaaa which free software are available? Please Mention any s/w if we simultaneously could also record ourselves also

    • @thisismr900
      @thisismr900 Год назад

      Things sorted!

  • @fajer11
    @fajer11 Год назад

    Thank you that was helpful

  • @thisismr900
    @thisismr900 Год назад

    I have tried to simulate the sinkhole attack with all steps you mentioned. Attack was not successful. I think the reason is some information in the code that has to be changed is missing... Please take out some time, it's a humble request. Assalamwalaikum

    • @faisalagarbaaa
      @faisalagarbaaa Год назад

      All the details are in the book: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=mp_s_a_1_2?keywords=RPL+attack&qid=1701538689&sr=8-2

    • @thisismr900
      @thisismr900 Год назад

      sir , I can't afford his book right now@@faisalagarbaaa ,Please understand

    • @thisismr900
      @thisismr900 Год назад

      I do no know how should i explain my situation to you, I would be extremely thankful to you if you could send me a soft copy of this book , Please sir !

  • @thisismr900
    @thisismr900 Год назад

    Sir, please drop the file link for us 😢

    • @faisalagarbaaa
      @faisalagarbaaa Год назад

      Try to buy the book 📚. There is no any file. You do the manipulation yourself. Everything is in the book 📖

  • @footballnews323
    @footballnews323 Год назад

    Your video is very very useful. Thanks to it, I can install Metasploit 3 much easier. Thank you very much

  • @RANA-m2i
    @RANA-m2i Год назад

    Thxxxxxx 🫶🏻❤️‍🔥❤️‍🔥❤️‍🔥❤️‍🔥❤️‍🔥

  • @shajsamy6880
    @shajsamy6880 Год назад

    Hi what is the administrator password?

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon. Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5