So you think your iPhone is better than Android? #shorts #android #iphone
In a previous video where I ran a script against an Android phone, a lot of people commented that iPhones would not fall for this... well... think again...
Learn real world pentesting plus which tools are the best to use with Ex-NSA Hacker Neal Bridges. Neal tells us what he carries in his backpack when doing real world pentests.
My apologies for the issues with this video. I had to remove the previously uploaded video because I had movie clips like Mr Robot and The Spy Game in the video and YouTube didn't like them... so I had to remove the video :(
Menu:
Introduction: 0:00
Neal sees pentesting differently: 1:17
Neal's advice from experience: 2:00
Neal's 5,000 pentests: 3:18
Take NSA and experience: 4:30
Preparation is key: 5:10
OSINT: 5:50
Actual Pentest report: 6:30
Pretexting: 7:50
Another real world example: 8:45
Planning is very important: 9:30
Leave stuff in your car? 10:15
Right tools for the job: 11:55
Top tools: 12:05
Extra cables: 12:30
Hak5 Ethernet cable: 12:58
Is Hak5 a necessity: 13:10
Rubber Ducky: 13:57
Hak5 are great: 14:30
Real world example of equipment: 15:00
You can create your own stuff: 15:30
Your time is money: 16:10
Proxmark: 16:30
Crazy RFID reader: 17:30
Poor planning RFID example: 18:50
Your time is worth something! 20:20
Hone your tradecraft: 21:00
Proxmark explanation: 21:20
A reader doesn't give you access. You need a pretext: 21:50
Social engineering: 23:50
You need a story: 25:50
Social Engineering vs tech: 26:04
Physical access is king: 29:00
What to do once past the door: 30:00
Military facility pentest: 31:19
Look for a network port: 33:27
You want to get out of there: 34:49
Hak5 Lan turtle: 35:04
Back of computer vs switch: 36:35
Pop it into the back of the computer: 37:32
What about WiFi: 38:11
TP-Link WiFi Card: 38:50
Ubertooth: 39:50
HackRF One: 40:50
Hak5 Pineapple: 41:56
SDR: 42:09
Real world example: 43:00
Alfa Network Adapter: 44:13
Wifi Hacking: 44:50
Alfa not practical so much: 44:49
You cannot charge for a WiFi pentest: 46:20
You are making it real: 47:17
WiFi can be social engineering: 47:45
Captive portal: 48:47
Rogue Access point: 49:40
Real world wifi pentest example: 50:40
Port Security: 51:30
Hak5 Pineapple access corporate network: 51:57
Always social engineering: 52:34
Pyramid of pain: 53:00
Stuxnet: 53:14
Telsa attack: 54:45
NSA examples: 55:07
Human Intelligence Hacking Example: 56:32
Another hacking example: 58:40
WiFi hacking example: 1:00:18
Neal's photo while hacking: 1:01:32
Once inside, you are trusted: 1:03:22
Summary of devices: 1:03:40
Hak5 switch: 1:03:55
Extra cables: 1:04:08
Hak5 Rubber Ducky: 1:04:15
Hak5 Pineapple: 1:04:30
Hak5 Bash Bunny: 1:04:54
Hak5 Packet Squirrel: 1:04:58
Ubertooth: 1:06:26
Proxmark: 1:06:31
Value of networking knowledge: 1:07:00
Neal got his CCNA: 1:07:32
Very few companies use port security properly: 1:08:50
Cain and Abel: 1:10:08
Are zero days worth it: 1:11:00
Shiny objects vs Neal's wisdom: 1:12:05
Real
...
https://www.youtube.com/watch?v=G8lrwmsx8KA
Watch this video for details on how to change your Windows MAC address: https://youtu.be/V3Pcc8b_m0U or by using Python: https://youtu.be/ZIqvGmrw7Tw
#wifi #windows #mac
...
https://www.youtube.com/watch?v=LNeAP32MFu8
The machines are already tracking and watching you. And they're influencing you. The future looks bleak. Do you really want to live in a Skynet world?
I interview Rob Braxman - the Internet Privacy Guy. He's a public interest hacker and technologist. He uses his extensive knowledge of cybersecurity and tech to serve the public good. He cares about privacy. He warns you of digital manipulation, disinformation, mass surveillance.
// MENU //
00:00 - You are being influenced
01:09 - Intro
01:18 - Disclaimer
01:24 - Rob Braxman introduction & background
05:35 - Losing online privacy
06:40 - "DeGoogling" a phone
10:55 - Android or iPhone?
11:34 - AI scanning on your phone
13:51 - International Mobile Equipment Identity
17:49 - Google Jigsaw
22:14 - Why you need to care about online privacy
25:33 - The Singularity
28:49 - Collecting data
32:32 - Bluetooth Low Energy
36:21 - Ring doorbells and Alexas are listening
39:37 - How to "DeGoogle"
47:35 - BraxOS and the PinePhone
50:07 - Web browsers
55:47 - Computer OS & Virtual Machines
57:28 - Search engines
58:33 - VPNs
01:00:15 - AI
01:00:53 - Society and technology
01:01:52 - Online privacy in the future
01:03:17 - Conclusion
// Books mentioned //
1984: https://amzn.to/3wzjbXD
The Singularity Is Near: When Humans Transcend Biology: https://amzn.to/3PRUZ9D
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Rob's SOCIAL //
YouTube: https://www.youtube.com/c/BraxMe
Twitter: https://twitter.com/robbraxmantech
Website: https://whatthezuck.net
// In the news //
UK government wants to change the Internet:
https://www.gov.uk/government/consultations/online-harms-white-paper/online-harms-white-paper
Google Jigsaw: https://jigsaw.google.com/
Australia Border Control can check your phone:
https://www.abc.net.au/news/2022-01-24/can-border-force-search-your-phone-when-you-travel-to-australia/100774644
https://www.itnews.com.au/news/border-force-searched-more-than-40000-devices-without-a-warrant-580839
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
apple
google
degoogle phone
degoogling a phone
ios
skynet
robocop
pine phone
privacy
online privacy
online privacy guide
internet security
tracking
online privacy for kids
online privacy and security
online privacy it doesnt exist
online privacy tips
online privacy ted talk
online privacy guide
online privacy for students
internet security tutorial
edward snowden
naomi brockwell
privacy
five eyes
5 eyes
brave browser
tor
protonvpn
protonmail
duckduckgo
google
online tracking
ios
android
graphite phone
privacy browser
privacy browser ios
privacy broke
privacy browser for pc
anonymous
hide online
hidden identity
hide identity online
data
hack
identity
internet
privacy
social change
technology
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#privacy #anonymous #hack
...
https://www.youtube.com/watch?v=To5Nbs6DmIA
The Mr Robot series with OTW (Occupy the Web) continues. OTW explains how hacks shown in the Mr Robot TV Series actually work (and if they are actually realistic). He compares real world car hacking vs what is shown in the TV series.
Want to learn more from Occupy the Web? You can join his classes using these links:
Hacker's Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d
Get 3 year's access to all live courses for $750:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d
// MENU //
00:00 - On This Episode of Hack Like Mr Robot!
00:30 - Welcome Back//OTW
00:45 - The Mr Robot Hack We're Doing
02:05 - Cars Becoming Like Computers
02:43 - Software Defined Radio Is Everywhere!
04:11 - Hardware Used//RTL-SDR
04:31 - Software Used//HDSDR
06:17 - Mr Robot//Car Hacking Strategies
08:21 - SDR//Ukraine Conflict
10:00 - Next Step//Signal Jamming
11:14 - Different SDR Software
12:01 - Osmocom//Generate Jamming Signal
14:26 - Sending Out Jamming Signal
15:03 - Signal Jamming Used to Protect Politicians
17:22 - Which Interface to Use?
18:17 - The HackRF//Pros & Cons
19:54 - Signal Generator Waveform Flags
20:37 - Next Step//Capturing the Signal
22:13 - Next Step//Sending the Signal//Replay Attack
25:45 - Next Step//Connecting to ODB2 Port
27:09 - ODB2 Protocols
28:00 - Car Hacking Research//can-utils
29:10 - Car Simulator//ICSim
30:53 - Starting Simulator
32:10 - Capturing Commands to Start the Car//cansniffer
33:56 - Logging//candump
35:06 - Searching log file for commands
35:42 - Sending command//cansend
37:05 - Mr Robot Hack//Realistic?
39:08 - Metasploit Car Hacking Modules
41:08 - Comment!//Which Hack Next?
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web social //
Twitter: https://twitter.com/three_cube
// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
mr robot
sdr
car jacking
car hacking movies
car hacking device
car hacking village
car hacking app
car hacking tutorial
car hacking defcon
car hacking tools
car hacking village defcon
software defined radio explained
software defined radio hacking
software defined radio transceiver
software defined radio with hackrf
software defined radio linux
software defined radio tutorial
software defined radio (sdr)
software defined radio
rtl sdr
sdr radio
car hack
replay attack
great scott gadgets
software defined radio projects
software defined radio mac
software defined radio academy
information security
darren kitchen
software defined radio raspberry pi
software defined radio (sdr) on android device
rtl sdr hacking
rtl sdr v3
rtl sdr dongle
rtl sdr linux
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#sdr #hacking #kalilinux
...
https://www.youtube.com/watch?v=5LvqU3-iINk
I wasn't paid for this video. but big thanks to Rabbit Labs for sending me some toys: https://www.tindie.com/stores/tehrabbitt/
Previous video: https://youtube.com/shorts/F0UuMv1byJw
Disclaimer: This video is for educational purposes only.
#shorts #flipperzero #flipper
...
https://www.youtube.com/watch?v=mmGp79jRcso
This is a complete Wireshark and Ethical hacking course.
Get the full Wireshark course for $9: https://bit.ly/wireshark9
???support the mission, join thisisIT: https://bit.ly/thisisitwireshark
DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna
Previous video in this series: https://youtu.be/QXfaGOMT7MY
In this video I'll show you how to capture HTTP traffic, read the website data, recreate png images and learn about the OSI and TCP/IP models practically.
In this course I'm going to show you how to capture packets from a network, how to capture passwords, replay voice conversations, view routing protocol updates and many more options.
Do you know network protocols? Do you know how to hack? Want to learn wireshark and have some fun with Ethical hacking? This is the course for you:
Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:
- Capture Telnet, FTP, TFTP, HTTP passwords.
- Replay VoIP conversations.
- Capture routing protocol (OSPF) authentication passwords.
- Troubleshoot network issues.
- Free software.
- Free downloadable pcapng files.
- Answer quiz questions.
The course is very practical. You can practice while you learn!
Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.
Protocols we capture and discuss in this course include:
- Telnet
- FTP
- TFTP
- HTTP
- VoIP
- OSPF
- EIGRP
- DNS
- ICMP
Menu:
Overview and pcap files: 0:00
Lab Topology: 0:23
Capture Packets using Wireshark: 1:50
Filter for http: 2:50
What are frames, packets, segments: 4:00
Reading the captured HTML pages: 12:22
Recreate png file: 13:52
Summary: 15:46
Thank you to my supporters: 16:29
pcap file used in the video: https://bit.ly/sharkpcap1
Wireshark playlist: https://bit.ly/wiresharkhacking
======================
Special Offers:
======================
Cisco Press: Up to 50% discount
Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
Link: bit.ly/ciscopress50
Boson software: 15% discount
Link: https://bit.ly/boson15
Code: DBAF15P
GNS3 Academy:
CCNA ($10): https://bit.ly/gns3ccna10
Wireshark ($10): https://bit.ly/gns3wireshark
DavidBombal.com
CCNA ($10): http://bit.ly/yt999ccna
Wireshark ($9): https://bit.ly/wireshark9
Who this course is for:
Network Engineers
Network Architects
Ethical hackers
Networking Students
Wireshark
wireshark download
wireshark tutorial 2020
wireshark tutorial for beginners
wireshark 2020
packet sniffing
ethical hacking
hac
...
https://www.youtube.com/watch?v=9CY42I04MFw
Big thank you to Brilliant for sponsoring this video! Try Brilliant for free (for 30 days) and to get a 20% discount, visit: https://Brilliant.org/DavidBombal
// YouTube Video REFERENCE //
Binary? How does it work?: https://youtu.be/Toa5-1i4wRE
// Occupy The Web Books //
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Occupy The Web SOCIAL //
X: https://twitter.com/three_cube
Website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: https://www.youtube.com/watch?v=YJUVNlmIO6E&list=PLhfrWIlLOoKOs-fjCPHdzD2icF2vORfwK&pp=iAQB
Mr Robot: https://www.youtube.com/watch?v=3yiT_WMlosg&list=PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q&pp=iAQB
Hackers Arise / Occupy the Web Hacks: https://www.youtube.com/watch?v=GxkKszPVD1M&list=PLhfrWIlLOoKOf1Ru_TFAnubVuWc87i-7z&pp=iAQB
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming up
00:49 - Brilliant sponsored segment
03:01 - Controlling directory permissions // Linux Basics for Hackers Chapter 5
06:16 - Explaining permissions // Kali demo
10:59 - Explaining permissions continued
14:47 - How to change permissions // Two ways to change permissions
22:10 - Special permissions // Sticky Bit
26:09 - Privilege escalation explained & demo
27:51 - The importance of social engineering
32:58 - Group explained
34:48 - Chapter 5 summary
35:40 - OTW books
36:44 - Visit OTW's website // hackers-arise.net
38:38 - Special discount
38:44 - Conclusion
linux
kali linux
parrot os
linux permissions
linux users
linux groups
root
linux 777
linux chmod
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#linux #kalilinux #hacker
...
https://www.youtube.com/watch?v=nbznYEAdZfk
Want to win free CCNA, Python, CCNA Cyber Ops, Wireshark, CISSP, CEH Exam coupons, books, software and courses? Watch my Christmas Giveaway videos and you could win. In today's video you could win CCNA Cyber Ops Exam Prep Software, CCNA Exam Prep Software, CCNA Simulators and more. This is your opportunity to win prizes from Cisco, Boson and me for ccna, ccnp, cissp, cisco devnet, ceh, comptia network+ and much more. Huge giveaway this year thanks to the sponsorship of Boson Software and Cisco! This is only the third day of multiple days where I give away lots of prizes!
======================
Giveaways:
======================
Free Python course: http://bit.ly/FREEPYTHON
Amazon $100 giveaway: http://bit.ly/2Zdp1Mj
Boson CCNA Cyber Ops ExSim: http://bit.ly/2PHLhuB
Boson CCNA ExSim: http://bit.ly/35GsWUh
Boson CCNA NetSim: http://bit.ly/38WbVYl
==============================
Discounted products and other links:
==============================
Wireshark for Network Engineers Course for $9: http://bit.ly/sharkfor9
Python for Network Engineers Course for $9: http://bit.ly/pythonfor9
CCNA Packet Tracer Labs Course for $9: http://bit.ly/PT9dollars
Atomic Habits Book: https://amzn.to/35KjUpA
Atomic Habits Audio Book: https://amzn.to/2Z7NSBj
Boson CCNA: http://bit.ly/bosonccna
Boson ExSim: http://bit.ly/BosonExSim
Boson NetSim: http://bit.ly/BosonNetSim
Boson Cisco Software: http://bit.ly/bosoncisco
Boson 25% Discount Code: MERRY19
===================
Free Network Software:
===================
Solar-PuTTY: http://bit.ly/SolarPutty
SolarWinds TFTP Server: http://bit.ly/2mbtD6j
WAN Killer: http://bit.ly/wankiller
Engineers Toolset: http://bit.ly/gns3toolset
IP Address Scanner: http://bit.ly/swipscan
Network Device Scanner: http://bit.ly/swnetscan
Wifi Heat Map: http://bit.ly/wifiheat
Wifi Analyzer: http://bit.ly/swwifianalyzer
SolarWinds NPM: http://bit.ly/getnpm
kali linux
Ethical hacking
Pentesting
kali linux wifi
EVE-NG
GNS3
VIRL
Packet Tracer
10x Engineer
CCNA
Cisco Devnet Associate
CCNP Enterprise
CCNP Security
CCNP Data Center
CCNP Service Provider
CCNP Collaboration
Cisco Certified Devnet Professional
Cisco Certified Network Professional
LPIC 1
LPIC 2
Linux Professional Institute
LX0-103
LX0-104
XK0-004
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
========================
#ccna #ccnacyberops #python
...
https://www.youtube.com/watch?v=LqfS29tab9s