7 Reasons To Ditch Your ISP Router | Use A Router Direct From A Manufacturer | Better Privacy
I am currently on the hunt for a new router and replace the one supplied by my ISP. I've been putting this off for a while but realise that using a router direct from a manufacturer is better for privacy and security. This video will go through 7 reasons why you should get rid of your ISP router and buy one directly from a manufacturer.
My available books/ebooks on Amazon 'Covert Techniques' a guide about privacy and how to avoid surveillance. 'Operation Aurelius' a fictional novel. 'The Bear Roars' my research on Russian state-sponsored APT groups. Author Brian Bladen ... https://www.youtube.com/watch?v=KUfK8014NfM
I conduct another people search using Intelius on the same target used in the Nuwber search, Brian P Bladen. The report does not show much more and so a further people search will be performed in the next video. This people search was used in a Windows host machine but a virtual machine is always best for OSINT professional investigation.
For those of you concerned with the audio quality, I have deliberately
dropped the pitch of my voice to mask it. I will not do any work in
front of the camera to protect my identity. The reason for this is
because the content is sensitive and I cannot control who watches my
YouTube and training videos. This is a small channel and production
quality is not crucial for us, but the information is.
Avoiding Big Brother eBook available on Amazon.
Tor Browsing eBook available on Amazon.
Author Brian Bladen
Intro Music: www.bensound.com
Thank you for watching this video on a people search with Intelius using Windows as a host machine for OSINT.
...
https://www.youtube.com/watch?v=bwEo_ZrSJR0
I have already uploaded a video covering social engineering but wanted to delve a little deeper and show a few statistics. This video will explain social engineering further and cover a little about what an organisation can do. Social engineering is becoming a big problem for both small and large organisations. I am going to follow up with another video on how organisations can defend against social engineering attacks.
For those of you concerned with the audio quality, I have deliberately
dropped the pitch of my voice to mask it. I will not do any work in
front of the camera to protect my identity. The reason for this is
because the content is sensitive and I cannot control who watches my
YouTube and training videos. This is a small channel and production
quality is not crucial for us, but the information is.
Avoiding Big Brother eBook available on Amazon.
Tor Browsing eBook available on Amazon.
Author Brian Bladen
Intro Music: www.bensound.com
Thank you for watching this video on social media explained.
...
https://www.youtube.com/watch?v=28WKXb96OpA
Many hackers set up web services on local host ports to transfer applications and tools onto attack or target machines. This video shows a few options for setting up a web service. As well as Python and Apache, you could also use PHP.
This is the last of the lessons for the course 'Learn Linux'. All videos will be embedded into the learning platform. I have some written parts to add to the tutorials. You can register for the free course, here: https://avoidbigbro.com/courses/learn-linux-for-hacking/
To watch my videos on an alternative platform you can visit the Odysee
channel: https://odysee.com/@AvoidingBigBrother:8
This channel will include videos too risky for YouTube because of
content moderation.
I have dropped the pitch of my voice for the videos and use the
alias of Brian Bladen for privacy reasons. I am also paranoid
of being hacked!
FREE TRAINING on our website at https://avoidbigbro.com/lp-courses/
and for blog posts https://avoidbigbro.com/news/
Join the Discord: https://avoidbigbro.com/the-discord-server/
My recommended products (so far) that I use as a lone wolf operator:
Malwarebytes Premium - Antimalware software suitable for personal use
and not an option for business users. Affiliate link included - feel free
to go to Malwarebytes in your browser if you don't want to include my link
https://prf.hn/l/5NL4PJj
CyberGhost - I had no problems with this VPN and highly recommend. They
are based in Romania where the laws on privacy are not so strict.
Not truly anonymous but good for privacy.
https://www.cyberghostvpn.com/en_US/
KeePass - Excellent offline password manager that I recommend rather
than using a cloud service. https://keepass.info/
You can check out my ebooks at
https://avoidbigbro.com/resources/
Available titles
'Covert Techniques' a guide about privacy and how to avoid surveillance.
'The Bear Roars' my research on Russian state-sponsored APT groups.
Author Brian Bladen
...
https://www.youtube.com/watch?v=elerARCZfGM
This is a little practice scenario for OSINT. I recommend people who are interested in OSINT to do practical scenarios and examples to develop OSINT skills. This is a corporate intelligence scenario where I conduct research on a business.
Sites used:
www.linkedin.com
https://www.gov.uk/government/organisations/companies-house
https://opencorporates.com/
CherryTree for research notes:
https://www.giuspen.com/cherrytree/
Video on setting up covert accounts on social media:
https://www.youtube.com/watch?v=QZ0vPpli_aA for setting up an account with fake name generator
https://www.youtube.com/watch?v=zoL42IUn1_M for creating a profile image for your covert social media account
You can support me on Ko-Fi by giving me a tip:
https://ko-fi.com/avoidbigbro
For those of you concerned with the audio quality, I have deliberately
dropped the pitch of my voice to mask it. I will not do any work in
front of the camera to protect my identity. The reason for this is
because the content is sensitive and I cannot control who watches my
YouTube and training videos. This is a small channel and production
quality is not crucial for us, but the information is.
Please visit our website at www.avoidbigbro.com
We post the odd news article and links to training and tools.
Avoiding Big Brother eBook available on Amazon.
Tor Browsing eBook available on Amazon.
Author Brian Bladen
...
https://www.youtube.com/watch?v=zfrOFQGBhkY
I have shown in a few videos how Shodan can be used to assist with the security of computer networks. It is a search engine developed for security analysts and penetration testers. But Shodan is becoming a problem for organisations as the bad guys are also using it for reconnaissance. Shodan has the potential to help a hacker create a cyber-attack on the critical infrastructure of a nation. It is no wonder some are saying that Shodan is the scariest search engine on the web. This video explains how hackers can use Shodan to carry out attacks.
You can support me through Patreon for as little as £1 a month where
I post extra content:
https://www.patreon.com/avoidbigbro
Alternatively, you can support me on Ko-Fi by giving me a tip:
https://ko-fi.com/avoidbigbro
For those of you concerned with the audio quality, I have deliberately
dropped the pitch of my voice to mask it. I will not do any work in
front of the camera to protect my identity. The reason for this is
because the content is sensitive and I cannot control who watches my
YouTube and training videos. This is a small channel and production
quality is not crucial for us, but the information is.
Please visit our website at www.avoidbigbro.com
We post the odd news article and links to training and tools.
Avoiding Big Brother eBook available on Amazon.
Tor Browsing eBook available on Amazon.
Author Brian Bladen
...
https://www.youtube.com/watch?v=AqFVaDKQ4mI
This video covers the principles of strong password management. There is also a demonstration of how to use the KeePassXC offline password manager for online identities and associated accounts.
...
https://www.youtube.com/watch?v=tAPQLghaZVg
In this video, I explain what weaponisation is in the world of hacking. It is the second part of a cyberattack (after recon/info gathering) where the hacker will decide on where to place malicious code. A common technique is to combine the code with a payload such as a PDF or Microsoft document commonly used in phishing attacks. A macro attack is a form of weaponisation, and I will go over a few more points that I probably missed in my other video on that topic. This video follows on from the one I did about obfuscation which is a technique that is used with weaponisation to hide the threat.
You can support me on Ko-Fi by giving me a tip:
https://ko-fi.com/avoidbigbro
For those of you concerned with the audio quality, I have deliberately
dropped the pitch of my voice to mask it. I will not do any work in
front of the camera to protect my identity. The reason for this is
because the content is sensitive and I cannot control who watches my
YouTube and training videos. This is a small channel and production
quality is not crucial for us, but the information is.
Please visit our website at www.avoidbigbro.com
We post the odd news article and links to training and tools.
My available books/ebooks on Amazon
'Avoiding Big Brother' a digital privacy and security eBook.
'Operation Aurelius' a fictional novel.
'The Bear Roars' my research on Russian state-sponsored APT groups.
Author Brian Bladen
...
https://www.youtube.com/watch?v=qJnwhNk7h0A
I continue my people search with Radaris on the same target Brian P Bladen and this time I get more information. Radaris is a universal public directory and holds a lot of records about people including social media profiles. I had to blur the information I found for legal reasons and privacy.
For those of you concerned with the audio quality, I have deliberately
dropped the pitch of my voice to mask it. I will not do any work in
front of the camera to protect my identity. The reason for this is
because the content is sensitive and I cannot control who watches my
YouTube and training videos. This is a small channel and production
quality is not crucial for us, but the information is.
Avoiding Big Brother eBook available on Amazon.
Tor Browsing eBook available on Amazon.
Author Brian Bladen
Intro Music: www.bensound.com
Thank you for watching this video on a people search with Radaris on a Windows hosted machine for OSINT.
...
https://www.youtube.com/watch?v=gL4tcdhLHX4
This is extra footage and commentary captured of my visit to Clop's leaks site, and is part of my dark web analysis content. The ransomware gang use this site to post communications and offer stolen data to other criminals. This site can only be accessed via the dark web using an onion address. As the footage contains the names of organisations breached by Clop (any sensitive information is blurred), I thought it would be better to post here only on Odysee rather than on YouTube.
This video is intended for educational purposes and raise awareness of the activities taking place on the dark web. This channel does not promote crime nor does it influence anyone to use stolen data.
To watch my videos on an alternative platform you can visit the Odysee
channel: https://odysee.com/@AvoidingBigBrother:8
This channel will include videos too risky for YouTube because of
content moderation.
I have dropped the pitch of my voice for the videos and use the
alias of Brian Bladen for privacy reasons. I am also paranoid
of being hacked!
FREE TRAINING on our website at https://avoidbigbro.com/lp-courses/
and for blog posts https://avoidbigbro.com/news/
My available books/ebooks on Amazon
'Covert Techniques' a guide about privacy and how to avoid surveillance.
'The Bear Roars' my research on Russian state-sponsored APT groups.
Author Brian Bladen