Should you be using IoT devices? Think carefully ... there is a new Botnet out there targeting IoT devices. IoT devices unfortunately often have very poor security.... and can be targeted. // Juniper Free Training // Big thank you to Juniper Networks for supporting the community and making this training free (and sponsoring my channel). Go to juniper.net/davidbombal to get lots of training and also learn how to get certified for $50 (Associate Level). Use this voucher code to register for your courses: DAVIDBOMBAL If you have issues with the Juniper registration, please use these links that they gave me: For Login assistance link userregistration.juniper.net/loginassistance Customer Support link- support.juniper.net/support/requesting-support/ // Occupy The Web SOCIAL // Twitter: twitter.com/three_cube // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw // Mr Robot Playlist // ruclips.net/p/PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: ruclips.net/user/davidbombal // Occupy The Web books // Linux Basics for Hackers: amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh Network Basics for hackers: amzn.to/3W1iiCQ Top Hacking Books you need to read: ruclips.net/video/trPJaCGBbKU/видео.html // Book Discussed // If it’s smart it’s vulnerable by Mikko Hypponen: amzn.to/3GdCbR0 // Other books // The Linux Command Line: amzn.to/3ihGP3j How Linux Works: amzn.to/3qeCHoY The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8 // Louis Rossmann RUclips // Louis Rossmann: www.youtube.com/@rossmanngroup // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 01:40 - Sponsored Segment 03:17 - Welcome Back, OTW! 05:11 - OTW's New Course 06:42 - Hacking IoT 07:00 - Botnets and DDOS 14:03 - OpenWrt 18:34 - How do Botnets get Access? 21:57 - Electronic or Manual Locks? 26:28 - TikTok 30:24 - You Buy but You Don't Own 32:22 - Ring Doorbell Story 33:31 - Right to Repair 36:05 - Hacking Vehicles 40:44 - Luddites 47:00 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Botnets were always targeting IoTs, but without watching - because not gonna lie, im not a fan of this particular guest - the answer is super easy. If you don't know how to harden your devices yourself and only rely on out of the box security - then don't use them. I use two IoT devices but they are kind of airgapped, on a separate network with no internet access plus i've manually checked their internals just for fun too. And these are super simple devices so there is no way to compromise them really.
7:11 First of all, I'd like to thank Occupy the Web. For doing and being well-being part of. The group of. 8 engineers/ hackers Who work together. In concert. To. DDoS. Russia's. IoT. Or as I will call it. Internet of tyranny. Via Putin. Thank you for that. Pardon the horrible grammar. You can think this wretched. IPhone Keyboard. Provided oddly by Bing. It's just out-of-the-box. Don't judge.
7:11 as well, oddly enough I'd like to share this little story. My mother works in well she did work. She's retired now in the government of Canada I cannot say building. In fact it was she was management board secretary for the government of Canada sounds boring I assure you it is not. They didn't even have signs on their building. It just looked like some random office building in a major Canadian city one of the two biggest Canadian cities. And she had no higher level, but not low level. There's a thing called mid-level security clearance. like government clearance and where they worked on Y2K she met my stepfather there in the 80s anyway she's working there from 1979 till 2008. from the very instance we first saw the very initial early adopters of these Internet things devices like even just dumb early versions of Google Alexa send lightbulbs sent, especially locks like your locks to your house. Oh, she didn't like that video cameras she said this is gonna be a massive problem. People are going to burgled there is if God for bid there's some, yeah for lack of better people think Ted Bundy version of Ted Bundy say he went to IT school instead of law school and be real problems. You don't even have to pick the lock anymore. I didn't really take it so seriously until the last couple years when I learned Linux but she's right now saying that it's only 10, Megabytes. Of Linux and inside these things, that's scary. So thank you and I'm actually going to forward this to her period. She taught me this and you should teach your audience this. Old techies will always tell you this, and they will always agree on one thing, and that's hard to find in the tech world. They always disagree, but they'll always agree on one thing Buy 7:11 the tech you need and no more.Especially if you don't understand how it works. Do not. Just buy all these things that look cool, sound cool, or enticing. There's a reason why they're making them sound cool and enticing. And if you don't even understand how they work, then you don't even understand how you could be putting yourself at risk. And you may be, You may not be, but you have. I don't know, because if you don't know how it works, how could you. And there's a reason why Old. Techies. Only seem to buy what they need. And skip all the extras.
Man half way through Linux basics for hackers and it is amazing absolutely hooked. I have his second book ready to go as well! Both of you guys are amazing and I can’t thank you guys enough for all the amazing vids you do! I’m in the middle of a career change (for unseen reasons which turned my life upside down), didn’t know what to do until I came across your channel David! So yeah keep up the good work your awesome 😊
I made the same decision when COVID happened. It can be tough to change your career, especially if you're like me and thought you were set for life at that job... I hope you're doing well, my friend. Welcome to the nerdy side!
I was studying web development, UX design, and project management with just a tiny bit of dabbing in front end coding UNTIL I got nervous that a repo of mine was hacked. I follow channels like yours now even though I don't understand most of it, because the higher level concepts help me understand what kinds of things I should be careful about. Unfortunately, the hacking scare has scared me a bit too much and I've stopped pursuing my goals for now. Hoping to restart again down the road with a more thoughtful strategy and better planning. You videos are certainly helping non-programmers like me start to understand the problems.
I gotta say I have no knowledge whatsoever in any of this stuff but goddamn I love OTWs voice, it's like butter. I could listen to this guy talk all day.
They can shut down your vehicle if the signal is received. If you block the antenna with tin foil or cut or disconnect the Onstar antenna, then they can't do anything. Just like being in the basement of a parking garage or driving through a tunnel in a mountain, your car will still function fine.😊
So creating an inner network, not connected to the Internet or can access it, could circumvent these IoTs and once again make the user smart and not the tools.
Its because theyre using left over parts to build them, while performing market research. The main issue would be the cost to implement the upgrades needed not that most of the market players cant afford it, its also their implementation of big corp sdlc. And they're backdoors left for future policing
I considered the possibility my IOT might have been hacked a few weeks back. A lamp was turning on every night. The logs eventually shed some "light" on the issue. 😆
Are you sure? ONSTAR can help you in life threatening situations such as a vehicle accident. It detects air bag activation and will attempt to contact your vehicle and send emergency help if needed. Also detects your location should you crash down a mountain side off the main roads rescuers can find your location to save your life. These emergency life threatening detection services are free and do not require a paid subscription for emergency ONSTAR services. If your vehicle is stolen ONSTAR with POLICE AUTHORIZATION can send a slow shutdown code to stop and shutdown your vehicle in a safe manner and locate your vehicle for recovery.
Not sure about in the UK, but smart electric meters with service disconnect switches are pretty widespread. The utility I work for has +500,000 residential electric meters - all of them with a switch that can be turned on/off OTA. Ours currently operate off a mesh network at 800-900MHz and have Zigby. It’s an extremely impressive mesh network with meters talking to each other and HQ. We’re probably going to change to cell network in the next couple of years.
I love to see this videos with OTW, do you think you can do an analysis on how quantum computers will impact the future of cybersecurity? Thank you and keep up the good work
Hi David, greetings from Panama . I wanted to suggest that you interview a book and author of Linux the Oracle distribution. I am from Panama , and English is my second language . Your channel is good stuff . Please keep the good work , David!!!!
@@dooms1241 اخي انا لست خبير ومستواى تحت الصفر اني اتعلم الانجليزية ومواضيع الانترنت من هذه القناة الجيدةوانا شخص مهتم بعلم الربوتات والشبكات والاجهزة الطبية لانه ليس كمبيوتر جيد حيث صاحب القناة له صوت مفهوم وجيد وكذالك المعلومات وضيوفه اذا امكن اخي هل هناك برامج دراسية عملية وقنوات لهذه التخصصات وشكرا
Excellent video once again! It would be very interesting if you made one or more videos of what the update of the Linux Basics for Hackers book would be! Keep up the good work which is greatly appreciated!
I should keep my old car, will take value in the future 😅 This will effectively become more and more important in the future; because each time that we add a connectivity feature, we also elarge the attack surface. Thanks,
Just like Audi charging $800-900 to replace the vehicle battery because it's a "special" battery that can only be replaced at a dealership with a specific tool. They lost a potential customer over that.
On my new oven, it can connect to my WiFi, but it has a built in timer where it disconnects after a time. You have to push the button on the stove display to have it connect. So, if you were going out and wanted to control it for a time you could but it doesn't just stay on indefinitely. This was probably implemented as a way to mitigate these kinds of threats.
I take the point about IOT devices, don't have Alexa or similar but do have some remote control switches to turn on my heating when I am coming home or to turn on my remote PC.
Some Companies that have work from home employees advice not discussing business while a smart device like Alexa is present. If a huge company is worried enough to advise such thing one as an individual should also be weary.
I’m not a hacker by no means at all. However, I do have my A+ and Network+ certifications (working on security+ and Linux certs.). Accomplishing that gave me an understanding of basic to lower level intermediate defensive/offensive I.T. awareness. I WOULD NEVER, EVER ALLOW ANY FORM of smart device in my home (except for a phone, the HDTV, and my laptop obviously). Absolutely no smart fridge, no smart home appliances or lamps, Alexa, etc. Even to this day, I still put tape over the webcam on my laptop! Lol.. Those devices are just too much of a security risk!!
Such a restriction I want to share this video to all my relatives and friends but I can't As they say '"the quieter you become, the more you are able to hear" I can't let them know I am in hacking field
People needs to be aware that is true, but most of them they simply do not care. If the decided to be a product it is their choice. However those who care should work together
Do the majority of these devices sit behind UPnP firewalls, or firewall/routers that just don't block inbound connections? Or is it shoddy port forwarding/dmz devices?
i would like to see videos around vulnerabilities to accessibility via voice control and switch control on our mobile devices. This is something I personally research on investigated in and personally experience the sheer turmoil it causes and the current threats around it as apple in my case is indenial of the vunerability i keep raising to them even after inexcusable evidence that yet they still not have replied back to
I have a few Sonoff devices to control only lights in my home and my router has an option to IoT network where they are isolated from my other home devices. Do you think that even this is not enough to keep my data secure?
I'm loving all this info. Isn't it possible to hack into Amazon and other products to stop their ability to access their back doors? That's the best solution for us all.
That's also tied into the "right to repair" legal battle ongoing. Companies like Apple and Amazon would love to prevent you from opening and truly tinkering with "your" (their) devices :(
@@revenevan11 As long as there are reverse engineering programs out there, I'm not concerned except for the hardware availability. There are always ways around that too but you end up with a device that can resemble a Frankenstein like build, lol.
Since you asked, I would really love to learn how to set up all my hacking tools on one USB stick. Here's the kicker, though: How do I stage it as an application that can be ran without hassling with dependencies? Much like docker, but in USB form. I'm looking to be able to plug and play, hacker style. Can that be accomplished? Also, love all the work!
Great topics , really interesting. After watching this i would love to see an in-depth tutorial around hacking webcams, The tools used and how to even identify that an ip/ssid is of a webcam? thanks again
For searching for them and identifying them, there is another video on this channel. In a word, "Shodan" is what you're looking for lol. Personally, aside from googling the default passwords and logins for various brands after identifying them based on their banner info on shodan, Idk much about actually getting in to the IOT devices.
A friend of mine just brought a Ford Explorer and it’s permanently connected to the net and it’s run by ford the car itself has its own cell modem. While it’s cool I am not particularly happy about it. I would want to know exactly the info Ford is send my and receiving. He said the contract that covers it all is about the size of War and Peace.
Im building a sat / photography/ disaster cyberdeck , with a micro form factor i5 (19v), two Pis B+, several micro controler, adlum Pluto, networked, the 2 extra tx and rx (4 total) antenna plus a gps disaplined clock, a hack rf, a rtl-sdr, and a evil crow, a full router and wifi device, with a antenna breakout that can be taken up by a ballon (several helium cartages and a dursble ballon capable of taking a nice omni directional antenna up about two or three stories high or more), antenna ports on the top leading edge and a back pack with a variety of different antenna as well as a self designed fold up like Chinese fan expanding parabola (with a powered bias t for a LNB and a spiral 2.4 and 1.8 interchangeable that looks backward into the dish, a 20W amp, ARDEN capabilities, HF, UHF VHF, LF, ELF, a hydrophone, a ultrasoundic transducer, a robot arm (controlled via steppper moters, driver boards, and gpredict via a onboard GPS (I yanked a QFH helix out of an old weather balloon snd the signal precision increased tenfold, xhopped the pcb at the base kf rhe anttena and pit it in a plastic protector). I just ordered all thr copper tubing and have the 3d print to build a omnidirectional helix for thr GOES, NOAA, and Meteor, with a Nooalec Sawbird, as well as an FM noise filter), the Cyberdeck will be able to control the parabola, a camera with a 600mm lens (astro photography), and it will have two 10' touch screens, a 4x6 or so touch color lcd, several LCD with buttons to display the status of the internals, the status of the arm (whats comming or what its tracking), a Inmarsat patch PCB, a directional wide band yagi type antenna, a set if short or long telescopeing antenna for a tripod, with bracket and adjustable balun, a custom internal battery pack (can decided your life by choosing which devices you want powdered up, but in any case an hour full bore, ans inputs for 12, 24, 36, 220, and a solar manager for roll out panels, a mini wind turbine, and as of October, a full small base station all modes, and handheld UHF, VHF (as I sit for the my Amateur Radio licence) so, at first all SDRs and no transmitting, as sometimes you may want to be "radio silent" and do pure SigInit. Others, very low power FT8 other HF, others local, other local plus repeater, but all the sniffing and data analysis (signsl analysis) a profram which detects and identifies all the open source digital modes and the baud rate, as well as the open source reversed digital modes as they cant be secret for amature radio (no encryption, unless i assume your in a real national pickel), the ability ro be a seed of a neighbourhood mesh, Arden to hook uo woth the other licenced folks and output higher strength 2.4 and receive the same qnd and Oscar q100 abilities (which include digital tv), so my cameras, i have many, will come in handy. But its an ambitious build and im going for the Hackaday Cyberdeck Challenge for Next Year not 2023, no way. I have to learn some things. But i may video doc the whole orocess as rhe first bits and bobs are arriving, while some have arrived, abd rhe microdell i jsut fished out of a electronics bin. Its tiny and running a mobie i5 with 32 gb ram, takes a M2 sshd. Wow, i have an old Hack RF which i had to reolce the top board as the buttons and the firmware/board was janky. So, i have a spare nice lcd! I would love to take your sat courses OTW as i am embedding and enabling a whole set of subsystems to do sat stuff, even to use rhe AMSAT Oscar Q1000 down on 10Ghz up on 2.4 with some atomspheric shifting from time to time hence the add on GPS disaplined clock Temp controlled, so im really into the EMS stuff. And it is suoer fruitful. I have my own multi positioned weather station with about every extra option available from the devices that surround my house other people own...... I don't need to buy one. But super I mean David you're an awesome computer security communicator, teacher, and content creator journalist the same goes out to you occupy the web from a verbal standpoint and so I'm very interested now and buying your book and checking out your Line-X as mine needs some brushing up you know I started with the computer at like 10 because I had ADHD and dyslexia and couldn't write or spell for beans so I had a commodore 64 for the spell check and word processing so that I could express myself in school. I actually had my own BBS via dial-up as my parents got fed up with trying to fight with me over the phone line. Side Daisy chained together four of those big commodore floppy drives, and I did the weather actually for one that was written in Fortran by student at the University because when I was twelve or thirteen or something around fourteen I did an internship at the National weather Service and went back again in high school for another internship with NOAA at the weather service at the airport. I want point understood their syntax for their us aircraft are gapped National mainframe full with big long tall cabinets and tape drives. So, i am coming full circle but have a law degree to being to the table. I want to combine the two disaplines. Think it's ever too late? Im late fourties? But I build my own hardware and I guess like administrator fluent in Linux,.OS, and PC (I guess that's underlying C the big schism between Gates and Apple, if i recall correctly. One wanted a Unix base the other his own - blue screen of death. Im fong to make the microPC dual boot as it has a windows licence sns ill add Kali and Dragons. You think boot or via VMs?
@@JRE-ut2tb ADHD is a bI$#:h but it's accurate. I am building something now which a staff writer at Hackaday said was 'ahesd of the curve' and a University Professor from Luxembourg who spoke at Cysat in Paris this said "like your approach" but I also do suffer from severe treatment resistant complex PTSD and you really don't want to know about it. Divorce, a heart attack, and my father's death are not included in my list if traumatic events (plural) so imagine the severity. I'm working on it. It takes time. I do have an IQ in the top 2% but PTSD hits your EQ hard and I am working on it. I am applying with the support or all my docs for MDMA as an adjunctive to therapy to speed things up. I had a long delay between the first and last and treatment. Again you wouldn't believe it. But my docs do because they were told by a third party and that's all that matters. My mind can work as fast as people "game" so I have always built PCs to keep up with me. There are so many downsides it's not as cool or exciting as anyone might assume. It's often a nightmare. So, shove it.
Add I was a target of a constant Zero day for a whole year....it must have cost a whole bunch and I was on what most people would consider the good side. The cost of it was the scary part. They at one point because I entered the US with it in a laptop, a gift from my Mom. The best one I have ever owned and I really was upset. It was a top of the line ROG with all the trimming. They used a BIOS resident virus which disabled the thermal protection controls and overclocked everything. It ran with no RAM or a drive as my son watched. It literally nuked my favorite and best laptop. I remember when they breached it. I was told to upgrade to Windows 10 and I had University level VPN and corporate level endpoint. It had me disable it to upgrade and then I started getting flags in my browser about insecure connections. They came in via WiFi. This was several years after the full year. I had three IT guys on it in my office. In retrospect I should have gone to a typewriter, fax, or FedEx. They even overclocked a Nokia Qwerty keyboard phone, a nice one my favorite for the time n91 if I remember. It would get hot and if you put it near PC speakers it would make them scream. Yeah. They would jump to neighbors Routers and back every time we had them out this was with a top end Cisco Security Appliance for the time it was top end. I would jump around anti-virus and only one put up a decent fight st the time. I installed and password protected it and it stalled them. But they had mock ups of Norton, MacFee all the major Anti-virus were totally ineffective. Like a hot knife through butter. But they clearly were not wanting this to be let lose in the US. They didn't want anyone to get a piece of the code there. It wasn't the US. It was someone else. I had an apple mini - I updated to Catalina and when I was done, it asked me if I wanted to exit Orical. I didn't think fast enough and they had put the update inside Virtuel Box. My childrene Photos, hell my papers from my Philosophy degree were in that account and I never got it back. I had had that Apple ID my whole adult life. No more. They took from me more then just data but I never gave up and as a joke I assume. They gave me a invite to Defcon but I was in Asia and didn't think it wise to be at a place and time chosen by a bad actror. It stopped for a long time as I kind of dropped off the grid and taught diving. I was in a place with dial up speed to this day I think....at one hotel I would have coffee at I did go into the route and give myself QoS priority :-) bad but that was not in a Western or better it was a "country in transition". I only used it in the morning for email and my coffee. Default password:-) ha ... I did end up fixing it for them and giving them the new password as I knew the owner. So, ever seen "assisted access" used on a apple and sounds outside of the human range converted into braille. I guess you could use morse code but I think I there was either less or no security on that feature. I turned on the screen flash option and the scrolling window for the command line and there was my hacker. The screen would flash and ..... but braille. I bought a MacBook and inside of an hour it was compromised. I took it back to the Apple shop and they gave me a new one. I went back to my hotel as I was on my way back to the US for Christmas and I had shut it down halfway through the their take over. I also tried to contact apple security live and they did see it. When I was back in the US I took the mashine into apple and said it is hacked, they scanned the serial number and said in front of my mother "we know" we isolated your computer from the apple network at the time they had seen it. They took it and I asked if they would please do a full Bios wipe, they said they don't do that normally and I asked please...they didn't. I asked my sister's husband who knows nothing about computers what to do. He said toss it and it was the most gratifying day of my life. I have never gone back to Apple but learned Linux instead.
I have seen stuff that didn't exist before and only now are people aware of it. I knew about the Screen on and long before apples had virus...I have s screenshot somewhere showing a very different story. But since all of this was so cutting edge people though of me crazy. Now we know about all of it but the apple signed vbox with Catalina was a new one to me. I think is still. It was likely a dev cert or a stolen one. The hotel I was in had 100x more access points than they needed and the IPS had a bad reputation. I looked. I asked the chain of they had customer side security or a firewall, anything- no. I opened the computer in the entry way for customers and it had not cleared as normal and the person before me had Visual Studio running.. who would be running that in a hotel sitting space in front of the desk? It was all wrong. But, I have so many war stories. It was a long year. It was a long second go several years later. The same MO of the actor. You fight someone and you can see their particular style and methods even if time changes. I found a repo on a server using IP reverse in my logs. I found screen templates for every OS and every major anti virus. They were using a VM on top. You would never have noticed the switch. Also a html code which played the Norton Update sequence....clearly it was not updating... I can't believe I found that cashe of tools just by following my logs and I think I was learning Wireshark at that time. I learned so much being a target you can't get that from a book. Also run your external storage on let's say a Linux based anti-virus and boom. Also, look at old drives ....zero day's no longer zero but since sold and used and identified. I wonder whst I'll find on a synergy NAS I took offline a year ago. Good way to check if I'm still being watched. I really should check my phone for Pegasus I suppose.
Hello David, How do I obtain a Associate in Certification In Hacking or Cyber Security ? I don't like those people that offer a Certification and they steel you money and no Certification was never received. I love all your Video's Take care, Brian
David, excellent video sir, one thing I have to know, is it just me or in every video you look younger, they say that camera adds 10 pounds, but in your case its like it removes 10 years. Never mind hacking send your secret on how you look so young.😄😄😃
Hey where is the link that you talk about in the video at the 5.05min mark? Where you say it has all the things I there that you don’t talk about on RUclips? Where is that link Kind Sir? Many blessings and thank you David! 🙏🌈🙏👍
How are we supposed to protect our phones from being hacked? If we use Wifi, it could get hacked. If we use Bluetooth, we could also get bugged. My phone has been hacked via Wifi and Bluetooth. What am I supposed to do? Use 4G only and never use Bluetooth?
Hi sir, i Love you explanation, i am starting graduation in cybersecurity, can i get job on cybersecurity, what will be ny future in cyber security field please guide me 🙏
Hi, I think the point why BMW is charging for the heating of the seats is, that a) they want to reduce their production cost (only one seat model providing all the feature is cheaper, than developing different models, produce them, logistics etc.) and b) they want to get more and more into a service oriented business model. Regards
Also, how do they take care of RDPs/VPS to last long and get as many "victims" for their RAT or botnet as possible... would be awesome if you discuss these things in the next series,, much love for u guys
Should you be using IoT devices? Think carefully ... there is a new Botnet out there targeting IoT devices. IoT devices unfortunately often have very poor security.... and can be targeted.
// Juniper Free Training //
Big thank you to Juniper Networks for supporting the community and making this training free (and sponsoring my channel). Go to juniper.net/davidbombal to get lots of training and also learn how to get certified for $50 (Associate Level). Use this voucher code to register for your courses: DAVIDBOMBAL
If you have issues with the Juniper registration, please use these links that they gave me:
For Login assistance link userregistration.juniper.net/loginassistance
Customer Support link- support.juniper.net/support/requesting-support/
// Occupy The Web SOCIAL //
Twitter: twitter.com/three_cube
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw
// Mr Robot Playlist //
ruclips.net/p/PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: ruclips.net/user/davidbombal
// Occupy The Web books //
Linux Basics for Hackers: amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
Network Basics for hackers: amzn.to/3W1iiCQ
Top Hacking Books you need to read: ruclips.net/video/trPJaCGBbKU/видео.html
// Book Discussed //
If it’s smart it’s vulnerable by Mikko Hypponen: amzn.to/3GdCbR0
// Other books //
The Linux Command Line: amzn.to/3ihGP3j
How Linux Works: amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8
// Louis Rossmann RUclips //
Louis Rossmann: www.youtube.com/@rossmanngroup
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming Up
01:40 - Sponsored Segment
03:17 - Welcome Back, OTW!
05:11 - OTW's New Course
06:42 - Hacking IoT
07:00 - Botnets and DDOS
14:03 - OpenWrt
18:34 - How do Botnets get Access?
21:57 - Electronic or Manual Locks?
26:28 - TikTok
30:24 - You Buy but You Don't Own
32:22 - Ring Doorbell Story
33:31 - Right to Repair
36:05 - Hacking Vehicles
40:44 - Luddites
47:00 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Awesome David am a big follower as information is power and I am doing all the things without certifitions
Botnets were always targeting IoTs, but without watching - because not gonna lie, im not a fan of this particular guest - the answer is super easy. If you don't know how to harden your devices yourself and only rely on out of the box security - then don't use them. I use two IoT devices but they are kind of airgapped, on a separate network with no internet access plus i've manually checked their internals just for fun too. And these are super simple devices so there is no way to compromise them really.
If you afraid to be hacked, don't buy IoT devices, don't use internet and throw away your computers and then might be you will be safe from hackers!
7:11 First of all, I'd like to thank Occupy the Web. For doing and being well-being part of. The group of. 8 engineers/ hackers Who work together. In concert. To. DDoS. Russia's. IoT. Or as I will call it. Internet of tyranny. Via Putin. Thank you for that. Pardon the horrible grammar. You can think this wretched. IPhone Keyboard. Provided oddly by Bing. It's just out-of-the-box. Don't judge.
7:11 as well, oddly enough I'd like to share this little story. My mother works in well she did work. She's retired now in the government of Canada I cannot say building. In fact it was she was management board secretary for the government of Canada sounds boring I assure you it is not. They didn't even have signs on their building. It just looked like some random office building in a major Canadian city one of the two biggest Canadian cities. And she had no higher level, but not low level. There's a thing called mid-level security clearance. like government clearance and where they worked on Y2K she met my stepfather there in the 80s anyway she's working there from 1979 till 2008. from the very instance we first saw the very initial early adopters of these Internet things devices like even just dumb early versions of Google Alexa send lightbulbs sent, especially locks like your locks to your house. Oh, she didn't like that video cameras she said this is gonna be a massive problem. People are going to burgled there is if God for bid there's some, yeah for lack of better people think Ted Bundy version of Ted Bundy say he went to IT school instead of law school and be real problems. You don't even have to pick the lock anymore. I didn't really take it so seriously until the last couple years when I learned Linux but she's right now saying that it's only 10, Megabytes. Of Linux and inside these things, that's scary. So thank you and I'm actually going to forward this to her period. She taught me this and you should teach your audience this. Old techies will always tell you this, and they will always agree on one thing, and that's hard to find in the tech world. They always disagree, but they'll always agree on one thing Buy 7:11 the tech you need and no more.Especially if you don't understand how it works. Do not. Just buy all these things that look cool, sound cool, or enticing. There's a reason why they're making them sound cool and enticing. And if you don't even understand how they work, then you don't even understand how you could be putting yourself at risk. And you may be, You may not be, but you have. I don't know, because if you don't know how it works, how could you. And there's a reason why Old. Techies. Only seem to buy what they need. And skip all the extras.
OTW is always provide tons of knowledge.
Thank you for inviting him.
Keep it up David 😊
Great videos, OTW is like a music to my ears. Thank you David for making these videos happen.
OTW does have a great voice
Man half way through Linux basics for hackers and it is amazing absolutely hooked. I have his second book ready to go as well! Both of you guys are amazing and I can’t thank you guys enough for all the amazing vids you do! I’m in the middle of a career change (for unseen reasons which turned my life upside down), didn’t know what to do until I came across your channel David! So yeah keep up the good work your awesome 😊
Thank you! You may not be able to change your past, but you can change your future! Don't give up on your dreams!
@@davidbombal Best RUclips channel! :)
I made the same decision when COVID happened. It can be tough to change your career, especially if you're like me and thought you were set for life at that job... I hope you're doing well, my friend. Welcome to the nerdy side!
I am also in the midst of a career change! This channel has really helped me.
I was studying web development, UX design, and project management with just a tiny bit of dabbing in front end coding UNTIL I got nervous that a repo of mine was hacked. I follow channels like yours now even though I don't understand most of it, because the higher level concepts help me understand what kinds of things I should be careful about. Unfortunately, the hacking scare has scared me a bit too much and I've stopped pursuing my goals for now. Hoping to restart again down the road with a more thoughtful strategy and better planning. You videos are certainly helping non-programmers like me start to understand the problems.
don't stop learning, you can do it!
Whatever challenges you face it was meant to improve you so keep up you will be great
I gotta say I have no knowledge whatsoever in any of this stuff but goddamn I love OTWs voice, it's like butter. I could listen to this guy talk all day.
David, you do a great job! We appreciate all you do!
Best cybersecuriy channel, OTW is my idol
They can shut down your vehicle if the signal is received. If you block the antenna with tin foil or cut or disconnect the Onstar antenna, then they can't do anything. Just like being in the basement of a parking garage or driving through a tunnel in a mountain, your car will still function fine.😊
So creating an inner network, not connected to the Internet or can access it, could circumvent these IoTs and once again make the user smart and not the tools.
this guy is a legende by himself he is all the movies out there whom deals with cyber security I hope he teatch all his huge knowledge
I love this channel. Very knowledgeable guy, Mr. OTW! You guys are a great team✌🏼
Bro someone is blackmailing my sister i
want to hack his acc or just want to delete
his acc nedd ur help plz help
Through the help of an hacker, I know about one who helped me access my husband's phone last month
Please how do I get in touch with this hacker?
whatsap
+1
61
I think with tools like Ansible, it as become less complicated to control a vast network of computers and iot´s. Thank you for the interview.
Its because theyre using left over parts to build them, while performing market research. The main issue would be the cost to implement the upgrades needed not that most of the market players cant afford it, its also their implementation of big corp sdlc. And they're backdoors left for future policing
Every useful tool have it’s own risk
I learned many things from David Bombal thanks
I considered the possibility my IOT might have been hacked a few weeks back. A lamp was turning on every night. The logs eventually shed some "light" on the issue. 😆
The logs showed what it was? What’d the logs say??
@@JosephQPublic If I remember correctly it was just an automation misconfigured.
Thank you David for this excellent video with OTW! Looking forward for more :)
I use physical locks.
Lock picking lawyer: click on three, nothing on four…..click, ok let’s do that again to make sure it wasn’t a fluke
Wow you posted this video at the right time i was looking forward to learn more about botnets
I guess I'm ripping OnStar out of my trucks today.
I hope you didn't throw it away
If you keep it ask online if someone wants it for debugging, or ask in your circles if someone can extract the source code and modify it to be safer
Good luck…
Are you sure? ONSTAR can help you in life threatening situations such as a vehicle accident. It detects air bag activation and will attempt to contact your vehicle and send emergency help if needed. Also detects your location should you crash down a mountain side off the main roads rescuers can find your location to save your life. These emergency life threatening detection services are free and do not require a paid subscription for emergency ONSTAR services. If your vehicle is stolen ONSTAR with POLICE AUTHORIZATION can send a slow shutdown code to stop and shutdown your vehicle in a safe manner and locate your vehicle for recovery.
Thats not possible dude lol its so intagrated into the cars that you will most deffanlity destroy something yoy really dont want to
Love from Kashmir one of the best information giver
Thank you!
Always something new to learn, Thanks David for this
Agreed! Never stop learning!
Love all your videos, so much great info and great interviews. But I really like these sessions you have with OTW, good stuff
We can't stop IoT devices to debut in our life , but we can try to make them more secure 🔐......!!!!
❤❤❤ just love the occupy the web interviews
Not sure about in the UK, but smart electric meters with service disconnect switches are pretty widespread. The utility I work for has +500,000 residential electric meters - all of them with a switch that can be turned on/off OTA. Ours currently operate off a mesh network at 800-900MHz and have Zigby. It’s an extremely impressive mesh network with meters talking to each other and HQ.
We’re probably going to change to cell network in the next couple of years.
I love to see this videos with OTW, do you think you can do an analysis on how quantum computers will impact the future of cybersecurity? Thank you and keep up the good work
Always love these videos. Thank you David and OTW!🎉 💻
Thank you! Glad you like them!
Hi David, greetings from Panama . I wanted to suggest that you interview a book and author of Linux the Oracle distribution. I am from Panama , and English is my second language . Your channel is good stuff . Please keep the good work , David!!!!
The content is BOMB with Bombal
❤شكرا على تنوع المواضيع وسهولة الشرح ❤❤❤😊
ما توقعت اجد عربي هنا
@@dooms1241 لما افهم قصدك ولكن اتوقع الجديد وواقعية والسهولة في الموضيع
@@dooms1241 اخي انا لست خبير ومستواى تحت الصفر اني اتعلم الانجليزية ومواضيع الانترنت من هذه القناة الجيدةوانا شخص مهتم بعلم الربوتات والشبكات والاجهزة الطبية لانه ليس كمبيوتر جيد حيث صاحب القناة له صوت مفهوم وجيد وكذالك المعلومات وضيوفه اذا امكن اخي هل هناك برامج دراسية عملية وقنوات لهذه التخصصات وشكرا
@@salh2665 يمكن لكن انت عربي صحيح
Excellent video once again!
It would be very interesting if you made one or more videos of what the update of the Linux Basics for Hackers book would be!
Keep up the good work which is greatly appreciated!
It’s always a good video with OTW!
I should keep my old car, will take value in the future 😅
This will effectively become more and more important in the future; because each time that we add a connectivity feature, we also elarge the attack surface.
Thanks,
thx David a real good idea to do a serie about these books
5:02 which link out of the 50 links below is the link you are referring to?? There are no links to this guys classes
min 23:00 great point there, the house should not be connected to the web. privacy is important.
Just like Audi charging $800-900 to replace the vehicle battery because it's a "special" battery that can only be replaced at a dealership with a specific tool. They lost a potential customer over that.
Great episode, thank you
On my new oven, it can connect to my WiFi, but it has a built in timer where it disconnects after a time. You have to push the button on the stove display to have it connect. So, if you were going out and wanted to control it for a time you could but it doesn't just stay on indefinitely. This was probably implemented as a way to mitigate these kinds of threats.
I take the point about IOT devices, don't have Alexa or similar but do have some remote control switches to turn on my heating when I am coming home or to turn on my remote PC.
Do you think you could use THz or high GHz "radar" to probe the processes of MCU, CPU, or even secure zones?
Interesting topic....🤔 Thank you for the information!
Thank you. You're welcome!
@@davidbombal You welcome!
Some Companies that have work from home employees advice not discussing business while a smart device like Alexa is present. If a huge company is worried enough to advise such thing one as an individual should also be weary.
Thanks David and OTW.
Thanks David... OTW is the bommmmmmm👊
For free 😱😱😱😱💚❤😍 Juniper Network!!! .... What is the trap? XD.... thanks David for this sponsor I enjoy it
I’m not a hacker by no means at all. However, I do have my A+ and Network+ certifications (working on security+ and Linux certs.). Accomplishing that gave me an understanding of basic to lower level intermediate defensive/offensive I.T. awareness. I WOULD NEVER, EVER ALLOW ANY FORM of smart device in my home (except for a phone, the HDTV, and my laptop obviously). Absolutely no smart fridge, no smart home appliances or lamps, Alexa, etc. Even to this day, I still put tape over the webcam on my laptop! Lol.. Those devices are just too much of a security risk!!
OTW is right about keeping security "old school".
Such a restriction I want to share this video to all my relatives and friends but I can't
As they say '"the quieter you become, the more you are able to hear"
I can't let them know I am in hacking field
People needs to be aware that is true, but most of them they simply do not care. If the decided to be a product it is their choice. However those who care should work together
I love you two guys , brilliant !
Do the majority of these devices sit behind UPnP firewalls, or firewall/routers that just don't block inbound connections? Or is it shoddy port forwarding/dmz devices?
i would like to see videos around vulnerabilities to accessibility via voice control and switch control on our mobile devices. This is something I personally research on investigated in and personally experience the sheer turmoil it causes and the current threats around it as apple in my case is indenial of the vunerability i keep raising to them even after inexcusable evidence that yet they still not have replied back to
You guys need to do an episode on "The 5 eyes". Please?
I have a few Sonoff devices to control only lights in my home and my router has an option to IoT network where they are isolated from my other home devices. Do you think that even this is not enough to keep my data secure?
Ahhh, the ol *Tyre shop putting screws + nails on the roads within a 2 mile radius from their shop* trick!"
The man, the myth, the legend.
This is really helpful 👏
I'm loving all this info. Isn't it possible to hack into Amazon and other products to stop their ability to access their back doors? That's the best solution for us all.
That's also tied into the "right to repair" legal battle ongoing. Companies like Apple and Amazon would love to prevent you from opening and truly tinkering with "your" (their) devices :(
@@revenevan11 As long as there are reverse engineering programs out there, I'm not concerned except for the hardware availability. There are always ways around that too but you end up with a device that can resemble a Frankenstein like build, lol.
Since you asked, I would really love to learn how to set up all my hacking tools on one USB stick. Here's the kicker, though: How do I stage it as an application that can be ran without hassling with dependencies? Much like docker, but in USB form. I'm looking to be able to plug and play, hacker style. Can that be accomplished? Also, love all the work!
So close to what PK Dick saw. Which story is it where the doors ask you for payment to open? But we are not far away from it.
Great topics , really interesting. After watching this i would love to see an in-depth tutorial around hacking webcams, The tools used and how to even identify that an ip/ssid is of a webcam? thanks again
For searching for them and identifying them, there is another video on this channel. In a word, "Shodan" is what you're looking for lol.
Personally, aside from googling the default passwords and logins for various brands after identifying them based on their banner info on shodan, Idk much about actually getting in to the IOT devices.
A friend of mine just brought a Ford Explorer and it’s permanently connected to the net and it’s run by ford the car itself has its own cell modem.
While it’s cool I am not particularly happy about it. I would want to know exactly the info Ford is send my and receiving.
He said the contract that covers it all is about the size of War and Peace.
I got my copy of that book yesterday.
Amazing channel
Impressive. Getting better and better every day...
One thing is not clear to me. Why did you bother to work on the "Russia" project?
another usefull video❤
This was a very eye opening video. I still want an IOT device lol
Im building a sat / photography/ disaster cyberdeck , with a micro form factor i5 (19v), two Pis B+, several micro controler, adlum Pluto, networked, the 2 extra tx and rx (4 total) antenna plus a gps disaplined clock, a hack rf, a rtl-sdr, and a evil crow, a full router and wifi device, with a antenna breakout that can be taken up by a ballon (several helium cartages and a dursble ballon capable of taking a nice omni directional antenna up about two or three stories high or more), antenna ports on the top leading edge and a back pack with a variety of different antenna as well as a self designed fold up like Chinese fan expanding parabola (with a powered bias t for a LNB and a spiral 2.4 and 1.8 interchangeable that looks backward into the dish, a 20W amp, ARDEN capabilities, HF, UHF VHF, LF, ELF, a hydrophone, a ultrasoundic transducer, a robot arm (controlled via steppper moters, driver boards, and gpredict via a onboard GPS (I yanked a QFH helix out of an old weather balloon snd the signal precision increased tenfold, xhopped the pcb at the base kf rhe anttena and pit it in a plastic protector). I just ordered all thr copper tubing and have the 3d print to build a omnidirectional helix for thr GOES, NOAA, and Meteor, with a Nooalec Sawbird, as well as an FM noise filter), the Cyberdeck will be able to control the parabola, a camera with a 600mm lens (astro photography), and it will have two 10' touch screens, a 4x6 or so touch color lcd, several LCD with buttons to display the status of the internals, the status of the arm (whats comming or what its tracking), a Inmarsat patch PCB, a directional wide band yagi type antenna, a set if short or long telescopeing antenna for a tripod, with bracket and adjustable balun, a custom internal battery pack (can decided your life by choosing which devices you want powdered up, but in any case an hour full bore, ans inputs for 12, 24, 36, 220, and a solar manager for roll out panels, a mini wind turbine, and as of October, a full small base station all modes, and handheld UHF, VHF (as I sit for the my Amateur Radio licence) so, at first all SDRs and no transmitting, as sometimes you may want to be "radio silent" and do pure SigInit. Others, very low power FT8 other HF, others local, other local plus repeater, but all the sniffing and data analysis (signsl analysis) a profram which detects and identifies all the open source digital modes and the baud rate, as well as the open source reversed digital modes as they cant be secret for amature radio (no encryption, unless i assume your in a real national pickel), the ability ro be a seed of a neighbourhood mesh, Arden to hook uo woth the other licenced folks and output higher strength 2.4 and receive the same qnd and Oscar q100 abilities (which include digital tv), so my cameras, i have many, will come in handy. But its an ambitious build and im going for the Hackaday Cyberdeck Challenge for Next Year not 2023, no way. I have to learn some things. But i may video doc the whole orocess as rhe first bits and bobs are arriving, while some have arrived, abd rhe microdell i jsut fished out of a electronics bin. Its tiny and running a mobie i5 with 32 gb ram, takes a M2 sshd. Wow, i have an old Hack RF which i had to reolce the top board as the buttons and the firmware/board was janky. So, i have a spare nice lcd! I would love to take your sat courses OTW as i am embedding and enabling a whole set of subsystems to do sat stuff, even to use rhe AMSAT Oscar Q1000 down on 10Ghz up on 2.4 with some atomspheric shifting from time to time hence the add on GPS disaplined clock Temp controlled, so im really into the EMS stuff. And it is suoer fruitful. I have my own multi positioned weather station with about every extra option available from the devices that surround my house other people own...... I don't need to buy one. But super I mean David you're an awesome computer security communicator, teacher, and content creator journalist the same goes out to you occupy the web from a verbal standpoint and so I'm very interested now and buying your book and checking out your Line-X as mine needs some brushing up you know I started with the computer at like 10 because I had ADHD and dyslexia and couldn't write or spell for beans so I had a commodore 64 for the spell check and word processing so that I could express myself in school. I actually had my own BBS via dial-up as my parents got fed up with trying to fight with me over the phone line. Side Daisy chained together four of those big commodore floppy drives, and I did the weather actually for one that was written in Fortran by student at the University because when I was twelve or thirteen or something around fourteen I did an internship at the National weather Service and went back again in high school for another internship with NOAA at the weather service at the airport. I want point understood their syntax for their us aircraft are gapped National mainframe full with big long tall cabinets and tape drives. So, i am coming full circle but have a law degree to being to the table. I want to combine the two disaplines. Think it's ever too late? Im late fourties? But I build my own hardware and I guess like administrator fluent in Linux,.OS, and PC (I guess that's underlying C the big schism between Gates and Apple, if i recall correctly. One wanted a Unix base the other his own - blue screen of death. Im fong to make the microPC dual boot as it has a windows licence sns ill add Kali and Dragons. You think boot or via VMs?
r u ok? or were u on something when u wrote this monologue?
@@JRE-ut2tb ADHD is a bI$#:h but it's accurate. I am building something now which a staff writer at Hackaday said was 'ahesd of the curve' and a University Professor from Luxembourg who spoke at Cysat in Paris this said "like your approach" but I also do suffer from severe treatment resistant complex PTSD and you really don't want to know about it. Divorce, a heart attack, and my father's death are not included in my list if traumatic events (plural) so imagine the severity. I'm working on it. It takes time. I do have an IQ in the top 2% but PTSD hits your EQ hard and I am working on it. I am applying with the support or all my docs for MDMA as an adjunctive to therapy to speed things up. I had a long delay between the first and last and treatment. Again you wouldn't believe it. But my docs do because they were told by a third party and that's all that matters. My mind can work as fast as people "game" so I have always built PCs to keep up with me. There are so many downsides it's not as cool or exciting as anyone might assume. It's often a nightmare. So, shove it.
Add I was a target of a constant Zero day for a whole year....it must have cost a whole bunch and I was on what most people would consider the good side. The cost of it was the scary part. They at one point because I entered the US with it in a laptop, a gift from my Mom. The best one I have ever owned and I really was upset. It was a top of the line ROG with all the trimming. They used a BIOS resident virus which disabled the thermal protection controls and overclocked everything. It ran with no RAM or a drive as my son watched. It literally nuked my favorite and best laptop. I remember when they breached it. I was told to upgrade to Windows 10 and I had University level VPN and corporate level endpoint. It had me disable it to upgrade and then I started getting flags in my browser about insecure connections. They came in via WiFi.
This was several years after the full year. I had three IT guys on it in my office. In retrospect I should have gone to a typewriter, fax, or FedEx.
They even overclocked a Nokia Qwerty keyboard phone, a nice one my favorite for the time n91 if I remember. It would get hot and if you put it near PC speakers it would make them scream. Yeah. They would jump to neighbors Routers and back every time we had them out this was with a top end Cisco Security Appliance for the time it was top end. I would jump around anti-virus and only one put up a decent fight st the time. I installed and password protected it and it stalled them. But they had mock ups of Norton, MacFee all the major Anti-virus were totally ineffective. Like a hot knife through butter. But they clearly were not wanting this to be let lose in the US. They didn't want anyone to get a piece of the code there. It wasn't the US. It was someone else. I had an apple mini - I updated to Catalina and when I was done, it asked me if I wanted to exit Orical. I didn't think fast enough and they had put the update inside Virtuel Box. My childrene Photos, hell my papers from my Philosophy degree were in that account and I never got it back. I had had that Apple ID my whole adult life. No more. They took from me more then just data but I never gave up and as a joke I assume. They gave me a invite to Defcon but I was in Asia and didn't think it wise to be at a place and time chosen by a bad actror. It stopped for a long time as I kind of dropped off the grid and taught diving. I was in a place with dial up speed to this day I think....at one hotel I would have coffee at I did go into the route and give myself QoS priority :-) bad but that was not in a Western or better it was a "country in transition". I only used it in the morning for email and my coffee. Default password:-) ha ...
I did end up fixing it for them and giving them the new password as I knew the owner.
So, ever seen "assisted access" used on a apple and sounds outside of the human range converted into braille. I guess you could use morse code but I think I there was either less or no security on that feature. I turned on the screen flash option and the scrolling window for the command line and there was my hacker. The screen would flash and ..... but braille.
I bought a MacBook and inside of an hour it was compromised. I took it back to the Apple shop and they gave me a new one. I went back to my hotel as I was on my way back to the US for Christmas and I had shut it down halfway through the their take over. I also tried to contact apple security live and they did see it. When I was back in the US I took the mashine into apple and said it is hacked, they scanned the serial number and said in front of my mother "we know" we isolated your computer from the apple network at the time they had seen it. They took it and I asked if they would please do a full Bios wipe, they said they don't do that normally and I asked please...they didn't. I asked my sister's husband who knows nothing about computers what to do. He said toss it and it was the most gratifying day of my life. I have never gone back to Apple but learned Linux instead.
I have seen stuff that didn't exist before and only now are people aware of it. I knew about the Screen on and long before apples had virus...I have s screenshot somewhere showing a very different story. But since all of this was so cutting edge people though of me crazy. Now we know about all of it but the apple signed vbox with Catalina was a new one to me. I think is still. It was likely a dev cert or a stolen one. The hotel I was in had 100x more access points than they needed and the IPS had a bad reputation. I looked. I asked the chain of they had customer side security or a firewall, anything- no. I opened the computer in the entry way for customers and it had not cleared as normal and the person before me had Visual Studio running.. who would be running that in a hotel sitting space in front of the desk? It was all wrong. But, I have so many war stories. It was a long year. It was a long second go several years later. The same MO of the actor. You fight someone and you can see their particular style and methods even if time changes. I found a repo on a server using IP reverse in my logs. I found screen templates for every OS and every major anti virus. They were using a VM on top. You would never have noticed the switch. Also a html code which played the Norton Update sequence....clearly it was not updating... I can't believe I found that cashe of tools just by following my logs and I think I was learning Wireshark at that time. I learned so much being a target you can't get that from a book. Also run your external storage on let's say a Linux based anti-virus and boom. Also, look at old drives ....zero day's no longer zero but since sold and used and identified. I wonder whst I'll find on a synergy NAS I took offline a year ago. Good way to check if I'm still being watched. I really should check my phone for Pegasus I suppose.
WOW, my mind is blown
The last time I had a car with an OnStar, I pulled the fuse for it out of the fuse box.
from small local firms to nation states. security was always that way
when you buy a new car , it is online by law! E call, and what else the car manufacture can get out of you-
Hello David,
How do I obtain a Associate in Certification In Hacking or Cyber Security ? I don't like those people that offer a Certification and they steel you money and no Certification was never received.
I love all your Video's Take care, Brian
❤ as iconic as it always.
Thank you! I hope you enjoy the video and learn something new!
David, excellent video sir, one thing I have to know, is it just me or in every video you look younger, they say that camera adds 10 pounds, but in your case its like it removes 10 years. Never mind hacking send your secret on how you look so young.😄😄😃
Hey where is the link that you talk about in the video at the 5.05min mark? Where you say it has all the things I there that you don’t talk about on RUclips? Where is that link Kind Sir? Many blessings and thank you David! 🙏🌈🙏👍
@19:43 my fridge and TV are disturbingly chatty Cathys
Great video, as usual! But what is linkinbio?
Let’s not just talk about the corporations spying. What about the government?
ty David
Well explained ❤❤❤
OTW is amazing :)
Nice sir ❤
hello david my computer supports monitor mode so how i can enable it in kali linux
Do you need previous IT experience or knowledge to learn on juniper ?
Im not a fan of otw but an interesting video regardless, thanks David
Why are you not a fan of OTW?
IoT with David and OTW I mean what better a Sunday could we have! Love this one as firmware is my gig!
Thank you! I always enjoy my talks with OTW - he has so much knowledge and experience to share with all of us :)
@@davidbombal have an amazing weekend David! I am just packing for DEFCON Id love to see you there!
Kindly Occupy the web should drop us one free course
How are we supposed to protect our phones from being hacked? If we use Wifi, it could get hacked. If we use Bluetooth, we could also get bugged. My phone has been hacked via Wifi and Bluetooth. What am I supposed to do? Use 4G only and never use Bluetooth?
wow, seasoned professionals
Even not being famous or Very rich I already afraid to talk in front of my mobile phone !!!! 🤓🤓🤓
Hi sir, i Love you explanation, i am starting graduation in cybersecurity, can i get job on cybersecurity, what will be ny future in cyber security field please guide me 🙏
Wow real hacker 😮
Hi,
I think the point why BMW is charging for the heating of the seats is, that
a) they want to reduce their production cost (only one seat model providing all the feature is cheaper, than developing different models, produce them, logistics etc.) and
b) they want to get more and more into a service oriented business model.
Regards
I think you need that voice to become a Hacker
Sounds like the Kahn Academy dude.
Im not a expert but why we dont limit and restrict from where the devices receive packets???
What cloud providers do the hackers mostly use? ...are they offshore or well-known ones?
Also, how do they take care of RDPs/VPS to last long and get as many "victims" for their RAT or botnet as possible... would be awesome if you discuss these things in the next series,, much love for u guys
Pretty sure we have countless 5G devices automatically connecting to Comcast.