2:45 The re*ard says "these webcams are open" but when clicks on any of them, no webcam loads up for viewing. Intentionally hides the browser's tabs to show us a fake tab which was not opened from shodan.
Sorry, but snooping around computers that do not belong to you is legal almost nowhere. That a computer is poorly defended or not defended at all is not an invitation for people to use it. It is the same as hopping on to your neighbor's web connection without permission or walking into his house through an unlocked door. These computers you find through Shodan mostly are not intended to be on the open internet. Rather, they are simply connected, for some poorly conceived reason or for some purpose that lapsed, or they are accessible because of a software or firmware vulnerability for which the computer owner has missed an update (or many updates). Yes, this is the fault of the owner. No, it is not legal, in most places, for you to help yourself to that person's computer or network. Collecting data about vulnerable systems, about what OS they run, what ports are open, what actual vulnerabilities are instantiated, and all that stuff, that is fair game and may be useful, which is why Shodan exists. Jumping on to these systems is not, however, fine. You need permission to do that legally, and it is important to be aware of this if you are going to mess around with vulnerability research.
@@sarahlamb2333 gov has used various mechanisms such as FISA courts and broadening of the scope of national security laws from the ability to conduct surveillance on an individual with sufficient proof to now conducted general surveillance. Constitution intended to protect against this but we have failed to stop overreach of government. So in my book, no it is not legal for government to do this.
@@sarahlamb2333the government isn't your god, stop worshipping it. reality is they collect shedloads of information on everyone through back doors we don't even know about. If unauthorised access to computer systems is scary to you then the government having control of that should be even scarier
Honeypots are basically Traps for hackers. They are in an isolated environment with open ports to attract hackers and bots in order to learn their tricks.
@@TheBluetelligence But why would a honeypot calls itself a honeypot? Unless: 1. It is not a honeypot and just says it to scare humans/bots. 2. The search engine is the one calling them "honeypot" which is unlikely.
FYI, though hacking into others' computers or networks may be perfectly legal in India, it is a criminal offense in the U.S., akin to trespassing, theft, joyriding, or worse, and there are plenty of prosecutors that'll be all too happy to score points by sending you to prison for a very long time.
It’s not legal in India as well but this is not hacking computers as we speak this is OSINT Or open source information gathering which is legal everywhere Or this tool won’t be that readily available..
I'm sure if corporations can do this exact thing in the U.S. it's legal. Just like some levels of piracy for educational reasons only. This is a legal gray area in the U.S. Encrypted systems being penetrated are still the only crime. This is why going onto a personal website or blog are legal. Even inspecting the website is legal too.
It's really not. These are forgotten and unpassworded devices. Most of them are for public networks anyway. Just password your stuff and you don't end up on the search engine
Use a password. These are open devices. If you have a username and password there's nothing to worry about. Watch the video again. He says they are all open unpassworded systems.
not hacking really if all your doing is trying to connect to open ports.. thankfully an utterly pointless video and will save the vist from the youtube whitehat hacker making a video about you
it's kinda crazy how nobody is talking about the book whispers of manifestation on borlest
2:45 The re*ard says "these webcams are open" but when clicks on any of them, no webcam loads up for viewing. Intentionally hides the browser's tabs to show us a fake tab which was not opened from shodan.
@@kurt1853says the western guy
@@kurt1853 a youtuber makes mistake
Lets hate entire country
@@kurt1853 you fail
Kindly make cyber crime digital forensic course from beginner to advanced as well.
great information. You're too underrated bro. Subscribed
Thank you so much
Much appreciated
Even I subscribed today
Who is " bro"?
Just found your channel!
Too good content!
(AND YES WE WANT THE BUG BOUNTY VIDEO!!)
Thank you so much
It means a lot
Hi Ayush
are you college a student
Bug Bounty Video for Shodan coming up next week :)
I still go to school
😅@@letshack025
Very interesting...how can I check my IP to see what may be open?
Wow man, thank you for this, it's insane!
:)
What's the difference between this and insecam?
Is there any way to connect with you bud ? I'm literally impressed with your teaching skills, your content is digestible.
What he is doing is enabling people to potentially break the law. I would stay away if I were you bud.
@@thefamily512 if you got red handed doing some high end shit then it's illigal otherwise feds are busy catching other black hat hackers
@@thefamily512what he's doing is teaching greyhat cyber security
He's liable for how you used the info
Why you american so scared
scammer
Thanks nice one. Qq how u put ur video in that circle shape ? Which app u r using for editing ?
Thanks
I am using premiere pro
Use the circle edit tool
Hey bro, I love your educational videos. I'm from Nigeria and really happy to reach out
Sorry, but snooping around computers that do not belong to you is legal almost nowhere. That a computer is poorly defended or not defended at all is not an invitation for people to use it. It is the same as hopping on to your neighbor's web connection without permission or walking into his house through an unlocked door. These computers you find through Shodan mostly are not intended to be on the open internet. Rather, they are simply connected, for some poorly conceived reason or for some purpose that lapsed, or they are accessible because of a software or firmware vulnerability for which the computer owner has missed an update (or many updates). Yes, this is the fault of the owner. No, it is not legal, in most places, for you to help yourself to that person's computer or network.
Collecting data about vulnerable systems, about what OS they run, what ports are open, what actual vulnerabilities are instantiated, and all that stuff, that is fair game and may be useful, which is why Shodan exists. Jumping on to these systems is not, however, fine. You need permission to do that legally, and it is important to be aware of this if you are going to mess around with vulnerability research.
Tell that to most governments
stfu...the same people you'd report too do the same to you without giving an f ..stop playing lil bro
@@ZenityStudios government are legally allowed.. public aren't..
@@sarahlamb2333 gov has used various mechanisms such as FISA courts and broadening of the scope of national security laws from the ability to conduct surveillance on an individual with sufficient proof to now conducted general surveillance. Constitution intended to protect against this but we have failed to stop overreach of government. So in my book, no it is not legal for government to do this.
@@sarahlamb2333the government isn't your god, stop worshipping it. reality is they collect shedloads of information on everyone through back doors we don't even know about. If unauthorised access to computer systems is scary to you then the government having control of that should be even scarier
All the best Aadi Chawla. 👍🏽 Keep up your hard work. Wish you success. May Allah bless your hard work with success.
Thank you so much for your kind words 😊
PLEASE SIR DO NOT REDEEEEEEEM
😂😂😂😂😂 You are brutal
Russian?
Hahaahahahahahahahahahahahahaha
Slava Ukraine !
😂
Great Presentation. Thanks. Sounds easy. Sincerely from Germany.
Thank you so much, :)
Why it shows honeypot under some webcam links in shodan 😗
Honeypots are basically Traps for hackers. They are in an isolated environment with open ports to attract hackers and bots in order to learn their tricks.
@@TheBluetelligence But why would a honeypot calls itself a honeypot? Unless:
1. It is not a honeypot and just says it to scare humans/bots.
2. The search engine is the one calling them "honeypot" which is unlikely.
Fantastic. How and where do I start
Cool vid and channel 👍 Very well explained.
Thank you..☺️
what’s the point of using the internet anymore?
to hack
Memes
Not exactly showing what your straight up saying...its more like demo tool to practice... don't get confused with its hacked or something
Not for Android..or
Great video!
Thank you so much
Ahh, so that's why my webcam light kept coming on.
You’re not hacking unless you’re wearing incognito mode sunglasses
What skills required for this?
There are no prerequisites as such
Just a very basic knowledge about computers..
Good info. Thank you, brother.
In the USA, unauthorized access or unauthorized attempt to access a system, device, or network, is a felony offense.
You should be aware of this.
Really? I think you are kidding.
Same for the EU 🇪🇺
please make a video for using a shodan for bugbounty .thank you
Excellent work and thank you BNE!!
Thank you for the kind words
Voting machines… nice
Thanks
@@letshack025 by the way… the day voting went electronic..l it was simple to hack, and the people that wanted them knew it.
Damn democrats stole the election and I can prove it smh
FYI, though hacking into others' computers or networks may be perfectly legal in India, it is a criminal offense in the U.S., akin to trespassing, theft, joyriding, or worse, and there are plenty of prosecutors that'll be all too happy to score points by sending you to prison for a very long time.
It’s not legal in India as well but this is not hacking computers as we speak this is OSINT
Or open source information gathering which is legal everywhere
Or this tool won’t be that readily available..
This is not even hacking 🤣🤣🤣🤣 its open sourced intelligence. Anyone have access to this.
I'm sure if corporations can do this exact thing in the U.S. it's legal. Just like some levels of piracy for educational reasons only. This is a legal gray area in the U.S. Encrypted systems being penetrated are still the only crime. This is why going onto a personal website or blog are legal. Even inspecting the website is legal too.
@@coreym162 Like saying if Politicians, police and lawyers can use prostitution it's legal
Ur right and expand
Do a video on how to use shodan on bug bounty please
Bug Bounty Video for Shodan coming up next week :)
can we look for someone
Yes easily
Yes
Wow fascinating
Make the video longer and more in-depth
Tri-optimun want to thank you BTW....
Its शोधन (shodhan)
Make the bug bounty video
Bug Bounty Video for Shodan coming up next week :)
Your going to try Voting machines!? In todays atmosphere!? Boi u trippppp-innnng! Stop playing Lol.
Great traching style
Thank you so much..
ah, so shodan is used for low level non critical relatively useless non priority targets... i just use linux...
as hackers….. so he admits to being a hacker and says no one is going to kind!
thank you, LH!
Scary!!!!!
It's really not. These are forgotten and unpassworded devices. Most of them are for public networks anyway. Just password your stuff and you don't end up on the search engine
Of course, it is indeed called the internet, that is why all the devices are visible. Just use hardcore passwords.
Can you show how to protect ourselves from this
Use a password. These are open devices. If you have a username and password there's nothing to worry about. Watch the video again. He says they are all open unpassworded systems.
@@coreym162 thankyou
So!..sign in with my google account or email Facebook then download what?...lol
...lol yeah right.
$70 a month... Damn!
Your English is not clear enough for people to completely understand
Will definitely improve the quality in the next one
Thanks for the input
You don't listen properly. Get your ears checked, moron. Fyi: majority of the world are not English speakers.
Subtitles
Think its just time to give up the online life and go off grid.
nooo, it should be Bob, not Tom!!!
???? Is this real; I Mean ; !!!REMEMBER THE CITADEL????!!
hello Microsoft support
nice
cool
Thanks :):)
Shodan
That's scary!
দাদাগিরি দেখা বানা ইন্ডিয়া।
Kasd
d
asd
not hacking really if all your doing is trying to connect to open ports.. thankfully an utterly pointless video and will save the vist from the youtube whitehat hacker making a video about you
❤❤ Pakistan
subscribed,
Much Appreciated ! :)
Most stuff on Shodan are garbage
Thanks
asd
asd
asd