Packet Tracer file (PT Version 7.1): https://goo.gl/HzpBDW
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
For lots more content, visit http://www.davidbombal.com - learn about GNS3, CCNA, Packet Tracer, Python, Ansible and much, much more.
#CCNA #PacketTracer #CCENT
DHCP snooping is a security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. The DHCP snooping feature performs the following activities:
•Validates DHCP messages received from untrusted sources and filters out invalid messages.
•Rate-limits DHCP traffic from trusted and untrusted sources.
•Builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses.
•Utilizes the DHCP snooping binding database to validate subsequent requests from untrusted hosts.
Other security features, such as dynamic ARP inspection (DAI), also use information stored in the DHCP snooping binding database.
DHCP snooping is enabled on a per-VLAN basis. By default, the feature is inactive on all VLANs. You can enable the feature on a single VLAN or a range of VLANs.
The DHCP snooping feature is implemented in software on the route processor (RP). Therefore, all DHCP messages for enabled VLANs are intercepted in the PFC and directed to the RP for processing.
Trusted and Untrusted Sources
The DHCP snooping feature determines whether traffic sources are trusted or untrusted. An untrusted source may initiate traffic attacks or other hostile actions. To prevent such attacks, the DHCP snooping feature filters messages and rate-limits traffic from untrusted sources.
In an enterprise network, devices under your administrative control are trusted sources. These devices include the switches, routers, and servers in your network. Any device beyond the firewall or outside your network is an untrusted source. Host ports and unknown DHCP servers are generally treated as untrusted sources.
A DHCP server that is on your network without your knowledge on an untrusted port is called a spurious DHCP server. A spurious DHCP server is any piece of equipment that is loaded with DHCP server enabled. Some examples are desktop systems and laptop systems that are loaded with DHCP server enabled, or wireless access points honoring DHCP requests on the wired side of your network. If spurious DHCP servers remain undetected, you will have difficulties troubleshooting a network outage. You can detect spurious DHCP servers by sending dummy DHCPDISCOVER packets out to all of the DHCP servers so that a response is sent back to the switch.
In a service provider en
...
https://www.youtube.com/watch?v=u3EmleryJ9A
Learn how to automate networks using Python version 3.
Udemy: Get the course for $10 here: https://goo.gl/QYC988
GNS3 Academy: Get the course for $10 here: https://goo.gl/vnZJhg
DavidBombal.com: Course is included in your subscription: http://www.davidbombal.com
Don't get left behind. You learning network automation and network programmability using Python are critical for your future as a network engineer.
Course coming in April 2018
...
https://www.youtube.com/watch?v=dKS6WcIs_7w
VTP Troubleshooting Scenario 1: Why are VLAN databases not synchronized? Get $200 worth of network software for free here: https://goo.gl/613TUF
My full course is here: http://www.ccnax.com
#CCNA #CCENT #CCNP
Subscribe to learn how to pass the CCNA 200-125 exam. Also includes content for the ICND1 100-105 and ICND2 200-105 exams.
VTP Password troubleshooting. VTP Domain troubleshooting.
What do you want to learn? Let me know via the comments.
...
https://www.youtube.com/watch?v=HkSmhwyXnuE
Is AI going to end the world? No more jobs in Cybersecurity? Are we going to survive the attacks?
Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: https://brilliant.org/DavidBombal
// Mr Robot Playlist //
https://www.youtube.com/playlist?list=PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web social //
Twitter: https://twitter.com/three_cube
// OTW classes //
Hacker's Arise Pro Subscription:
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d
Get 3 year's access to all live courses:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d
// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
Top Hacking Books you need to read: https://youtu.be/trPJaCGBbKU
// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
Want to learn more from Occupy the Web? You can join his classes using these links:
Hacker's Arise Pro Subscription"
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d
Get 3 year's access to all live courses:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 Coming Up
00:32 Thanks Brilliant! (Sponsor)
02:05 Why this video?
03:35 Cyber Security Future
04:51 AI
06:03 Don't Fall Behind
07:29 ChatGPT
08:47 AI Helps Both Sides
10:14 AI Spear Phishing
14:26 Asking AI Who Is OTW?
16:12 AI Changes And Updates
18:26 Spear Phishing Definition
20:01 Almost Got Scammed By AI
21:31 Data Leaks
21:31 Email Phishing Story
24:33 Snort
25:59 Splunk
27:39 AI Code Problems
28:36 The Truth About AI Jobs
30:25 Tricking The AI
33:54 Generate Generic Code With AI
36:31 The History
40:00 AI VS Human Thinking
41:53 OTW Course
42:10 Pegasus
43:10 Outro
ai
chatgpt
chat gpt
gpt4
google bard
artificial intelligence
hacking ai
ai hacking
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#ai #chatgpt #hacking
...
https://www.youtube.com/watch?v=OJxRruHrSow
Is your CCTV secured? Are your IP cameras safe? Too easy to hack?
This is my third interview with the professional hacker Occupy The Web. In this video we discuss hacking CCTV, IP cameras and SCADA (supervisory control and data acquisition).
// MENU //
00:00 ▶️ It Didn't Stop Us!
00:43 ▶️ YouTube Is Not Realistic
02:58 ▶️ Hacking Is Boring?
04:12 ▶️ In An Alternative Universe
04:35 ▶️ High vs Low Value Targets
07:09 ▶️ Hacking Ukraine CCTV Cameras
08:04 ▶️ Why Aren't Cameras Well Protected?
10:48 ▶️ Why Hack Ukraine CCTV Cameras?
12:45 ▶️ Finding Online Systems Anywhere In The World
14:47 ▶️ Don't Cameras Have Passwords?
17:36 ▶️ Hack My Spouse//The Most Common Request
19:30 ▶️ Convert Tools To Cyrillic?
20:20 ▶️ Remote Camera Hacking
20:56 ▶️ Camera Hacking Summary
21:13 ▶️ Dictionary Attack or Brute Force for Remote Hacking?
22:32 ▶️ Remote Hacking Takes Teamwork
22:52 ▶️ Cameras Blocking Login Attempts
23:23 ▶️ Bad Practices//How To Secure CCTV Cameras
24:42 ▶️ Don't Be An Easy Target!
25:43 ▶️ Basic Security To Have On Your Systems
28:42 ▶️ Users Aren't The Flaw!
30:07 ▶️ Russia SCADA Attacks
30:38 ▶️ SCADA Swiss Army Knife
31:21 ▶️ Stealing Schneider Password Hashes
33:40 ▶️ DDoSing SCADA Systems Is Deadly
36:53 ▶️ Russian Hackers//Overrated?
40:22 ▶️ SCADA Malware Used On Ukraine Systems
42:54 ▶️ Warning//Russia Coming After Hackers
44:16 ▶️ Phishing Attempts on OTW
45:07 ▶️ How To Protect Yourself
46:00 ▶️ Social Engineering//Most Major Hacks
47:46 ▶️ Social Engineering//Pentesting
49:11 ▶️ SCADA Malware//Stuxnet
50:56 ▶️ SCADA Malware//Triton
51:25 ▶️ Bhopal Disaster//What Could Happen
52:39 ▶️ Future Videos//Leave A Comment!
// Previous videos //
OTW video 1: https://youtu.be/GudY7XYouRk
OTW video 2: https://youtu.be/uXbGQiXsRes
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web social //
Twitter: https://twitter.com/three_cube
// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/
Shodan: https://www.hackers-arise.com/shodan
Webcams: https://www.hackers-arise.com/how-to-hack-web-cams
Ukraine Cameras: https://www.hackers-arise.com/post/we-have-successfully-accessed-many-ip-cameras-in-ukrainian-territor
...
https://www.youtube.com/watch?v=ZGCScbV7vSA
Can you use the Flipper Zero to unlock cars? What about bicycle locks? Door bells? Well... let's find out!
// Menu //
00:00 - Intro
00:25 - Disclaimer
00:33 - In this video
01:08 - Unlocking Cars
02:13 - Rolling Codes and Vehicle types
02:28 - Discussion with Occupy The Web
04:12 - Reading and Sending Key Fobs
06:22 - Doorbell Example
06:54 - Other Vehicle Brands
07:44 - Unlocking Bike Locks
11:44 - Unlocking Doorbells
13:23 - Hacking Alarm Systems
14:30 - Conclusion
16:06 - Outro
// Previous videos //
Flipper Zero Episode 1: https://youtu.be/VF3xlAm_tdo
Mr Robot Car Hacking: https://youtu.be/5LvqU3-iINk
// Great resources //
Awesome Flipper: https://github.com/djsime1/awesome-flipperzero
Bad USB: https://github.com/nocomp/Flipper_Zero_Badusb_hack5_payloads
// CVE-2022-27254 //
NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-27254
Mitre: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27254
The Register: https://www.theregister.com/2022/03/25/honda_civic_hack/
// David's SOCIAL //
Discord: https://discord.gg/davidbombal
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube Main Channel: https://www.youtube.com/davidbombal
YouTube Tech Channel: https://youtube.com/channel/UCZTIRrENWr_rjVoA7BcUE_A
YouTube Clips Channel: https://www.youtube.com/channel/UCbY5wGxQgIiAeMdNkW5wM6Q
YouTube Shorts Channel: https://www.youtube.com/channel/UCEyCubIF0e8MYi1jkgVepKg
Apple Podcast: https://davidbombal.wiki/applepodcast
Spotify Podcast: https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
flipper zero
flipper
flipperzero
hack
hacking
car hacking
sub 1 ghz
door bell
car
cars
honda
cve
alarm system
rfid
nfc
bluetooth
infrared
radio
gpio
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#flipperzero #hack #hacking
...
https://www.youtube.com/watch?v=yKTzek8EZ4E
Packet Tracer file (PT Version 7.1): https://goo.gl/twE2R2
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
For lots more content, visit http://www.davidbombal.com - learn about GNS3, CCNA, Packet Tracer, Python, Ansible and much, much more.
#CCNA #PacketTracer #CCENT
QoS is the measure of transmission quality and service availability of a network (or internetworks).
Service availability is a crucial foundation element of QoS. The network infrastructure must be designed to be highly available before you can successfully implement QoS. The target for High Availability is 99.999 % uptime, with only five minutes of downtime permitted per year. The transmission quality of the network is determined by the following factors:
•Loss—A relative measure of the number of packets that were not received compared to the total number of packets transmitted. Loss is typically a function of availability. If the network is Highly Available, then loss during periods of non-congestion would be essentially zero. During periods of congestion, however, QoS mechanisms can determine which packets are more suitable to be selectively dropped to alleviate the congestion.
•Delay—The finite amount of time it takes a packet to reach the receiving endpoint after being transmitted from the sending endpoint. In the case of voice, this is the amount of time it takes for a sound to travel from the speaker’s mouth to a listener’s ear.
•Delay variation (Jitter)—The difference in the end-to-end delay between packets. For example, if one packet requires 100 ms to traverse the network from the source endpoint to the destination endpoint and the following packet requires 125 ms to make the same trip, then the delay variation is 25 ms.
Each end station in a Voice over IP (VoIP) or Video over IP conversation uses a jitter buffer to smooth out changes in the arrival times of voice data packets. Although jitter buffers are dynamic and adaptive, they may not be able to compensate for instantaneous changes in arrival times of packets. This can lead to jitter buffer over-runs and under-runs, both of which result in an audible degradation of call quality.
Translation:
In packet tracer, I’m going to start simulation mode and then on PC 1, I’m going to open up a web browser and go to Cisco.com.
Now the first thing that PC needs to do is determine the IP address of Cisco.com.
So it’s going to send out a DNS request message for Cisco.com. So scrolling down here notice we’ve got a DNS query for Cisco.com. Capture forward; that gets sent to the router. When it gets sent across the serial link, notice the D
...
https://www.youtube.com/watch?v=JFf-lYYhQi8