top of page

VIDEOS

Are you interested in learning more about cyber security? Do you want to learn about the most common cyber-attacks and how to keep your home or business network safe from them? If you want to learn and be more educated about cybersecurity fundamentals, then please subscribe to my channel, and I promise you'll have a great time!  Subscribe >

.ZIP domains are Cybersecurity RISK
16:34

.ZIP domains are Cybersecurity RISK

New top level domain .zip provides attackers with new avenues to distribute phishing emails and deliver malware. Cybercriminals can now craft convincing emails that appear to contain multimedia files (. mov) or compressed archives (. zip) while concealing malicious payloads. Chapters: 0:00 - 2:00 Opening 2:01 - 2:34 Overview 2:35 - 3:02 The problem 3:03 - 4:58 Danger I - Obscurity and Confusion 4:59 - 5:29 Danger II - The deceptive nature of .ZIP 5:30 - 11:48 Danger III - Heaven for spoofing and phishing attack (inc URL explanation) 11:49 - 12:32 Danger IV - Branding and User experience challenges 12:33 - 13:07 Danger V - Disrupting internet standardization 13:08 - 15:07 Google's Response 15:08 - 16:33 Conclusion Watch more cyber security fundamental videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 3. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 4. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 5. Stuxnet - https://youtu.be/fLwLRvp1YFA 6. API Hacking - https://youtu.be/1t5wXWFI0yU 7. DNS Hacking - https://youtu.be/Hsj_67RhNMc 8. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 9. NotPetya - https://youtu.be/6gqKkTf9fWY 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #google #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
Iran's cybersecurity growing threat
21:41

Iran's cybersecurity growing threat

Iran's cyber capabilities have been growing rapidly over the past decade. The Iranian government has made significant investments in cyber technology and infrastructure, and they have been able to develop sophisticated cyber capabilities, including the ability to conduct cyber espionage, cyber sabotage, and cyber warfare. In this video I will cover these subject in more details, from inception points, capabilities, associated groups and future to come. Chapters: 0:00 - 0:57 Opening 0:58 - 1:37 Iran growing capabilities 1:38 - 5:00 History and cyber inception point 5:01 - 5:31 Objectives and Strategy 5:32 - 6:43 Tactics & Techniques 6:44 - 10:08 Major attacks associated with Iran 10:09 - 13:48 Cyber structure and state sponsored groups 13:49 - 15:57 Cyber Espionage 15:58 - 19:32 Cyber Warfare 19:33 - 21:40 Looking forward Watch more cyber security fundamental videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 3. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 4. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 5. Stuxnet - https://youtu.be/fLwLRvp1YFA 6. API Hacking - https://youtu.be/1t5wXWFI0yU 7. DNS Hacking - https://youtu.be/Hsj_67RhNMc 8. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 9. NotPetya - https://youtu.be/6gqKkTf9fWY 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #iran #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
Hacking IP Cameras with master hacker OccupyTheWeb
50:12

Hacking IP Cameras with master hacker OccupyTheWeb

Another video with Master Hacker OccupyTheWeb! This time on Hacking IP Cameras in a video that will demonstrate how to gather info publicly on assets, tools and SW used by hackers, vulnerabilities of major brands, passwords lists at the open and more... Disclaimer - This video is for educational purpose only. Hacking is illegal and shouldn't be done without permission. the techniques used in this video are passive info gathering that are public and at the open. Chapters: 0:00 - 0:22 Opening 0:23 - 1:38 OccupyTheWeb 1:39 - 5:04 Finding IP cameras using google dork (lists) 5:05 - 10:10 Shodan - Banners on IP & PORT 10:11 - 17:28 IP Camera protocols (RTSP/PSIA/ONVIP) 17:29 - 20:39 Passwords Vulnerabilities 20:40 - 47:40 Camera Radware - Kali Linux 47:41 - 49:38 Hackers-Arise Community and courses 49:39 - 50:12 Summary & Thank you! OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise: https://www.hackers-arise.com Watch more cyber security fundamental videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 3. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 4. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 5. Stuxnet - https://youtu.be/fLwLRvp1YFA 6. API Hacking - https://youtu.be/1t5wXWFI0yU 7. DNS Hacking - https://youtu.be/Hsj_67RhNMc 8. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 9. NotPetya - https://youtu.be/6gqKkTf9fWY 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
Coming Soon - Hacking IP Cameras with OccupyTheWeb
00:43

Coming Soon - Hacking IP Cameras with OccupyTheWeb

Coming Soon - Hacking IP Cameras with Master Hacker OccupyTheWeb! We will go after a passive gathering intelligence that is open to the general public and learn how to identify the assets, tools and sw, vulnerabilities and more OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise: https://www.hackers-arise.com Watch more cyber security fundamental videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 3. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 4. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 5. Stuxnet - https://youtu.be/fLwLRvp1YFA 6. API Hacking - https://youtu.be/1t5wXWFI0yU 7. DNS Hacking - https://youtu.be/Hsj_67RhNMc 8. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 9. NotPetya - https://youtu.be/6gqKkTf9fWY 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
iot privacy and security challenges and solutions
36:22

iot privacy and security challenges and solutions

If it's SMART is VULNERABLE - The Hypponen LAW! I am very excited to share my insightful discussion with one of the world's top cybersecurity experts - Mikko Hypponen. Our discussion covers the future of the smart world, key anecdotes and of cyber cases/investigations, privacy and regulation, the relationship between AI and Human intelligence, advice for new joiners or existing professionals into the world of cyber security and many fun and informal stories by Mikko. I was personally inspired and sure you will too. CHAPTERS 0:00 - 0:34 Opening 0:35 - 0:42 Channel introduction video 0:43 - 4:00 Mikko Hypponen 4:01 - 5:46 Our role and responsibility as cybersecurity professionals 5:47 - 9:42 The future of the smart world - Cybersecurity 9:43 - 12:52 IoT - current state, risks, challenges.... 12:53 - 14:40 Privacy in an interconnected world 14:41 - 20:48 Promising technologies to protect IoT 20:49 - 24:43 Insightful cases during Mikko's career 24:44 - 27:06 Cyber Arm War 27:07 - 32:57 AI and Human intelligence 32:58 - 36:22 Mikko's advice and final remarks Mikko Book - IF IT'S SMART, IT'S VULNERABLE - https://amzn.to/3NazTFX Mikko TED talks: 1. Fighting viruses defending the net - https://youtu.be/cf3zxHuSM2Y 2. How the NSA betrayed the world's trust - https://youtu.be/9CqVYUOjHLw 3. Three types of online attacks - https://youtu.be/VM7HQ_zbdIw Master Hacker OccupyTheWeb Books: 1. Getting started becoming a master hacker - https://amzn.to/447mJj5 2. Linux Basic for Hackers - https://amzn.to/3L5Jefv 3. Network basics for Hackers - https://amzn.to/43YQaDX Watch more cyber security fundamental videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 3. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 4. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 5. Stuxnet - https://youtu.be/fLwLRvp1YFA 6. API Hacking - https://youtu.be/1t5wXWFI0yU 7. DNS Hacking - https://youtu.be/Hsj_67RhNMc 8. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 9. NotPetya - https://youtu.be/6gqKkTf9fWY 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #iot #mikkohypponen #malware #ai #yanivhoffman #applicationsecurity #informationtechnology #cybersecuritytools #webapplicationsecurity #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
Discussions with threat intelligence senior researcher | Cybersecurity
39:05

Discussions with threat intelligence senior researcher | Cybersecurity

In this video I am speaking with Thomas Roccia, a senior security researcher at Microsoft. Thomas shares very interesting insights into some of his own projects such as Unprotect.it on evasion techniques , MSTICPy - open source Microsoft Python library dedicated to threat intelligence, some of his python work with jupyter.securitybreak.io. We also discussed about his career path, ways to stay updated on the threat landscape and cybersecurity topics, New developments in threat intelligence field and its new book coming in May. CHAPTERS 0:00 - 0:35 Opening 0:36 - 0:44 Channel Introduction video 0:45 - 3:08 Thomas Roccia 3:09 - 7:37 Unprotect.it 7:38 - 8:49 MSTICpy 8:50 - 12:48 what inspired you to pursue this career 12:49 - 15:18 Skills important to gain in cybersecurity 15:19 - 20:02 Notable cares you have worked on 20:03 - 22:38 What are the current challenges in cybersecurity ? 22:39 - 27:00 How to keep updated about cyber security 27:01 - 30:01 What is the process of Malware investigation ? 30:02 - 32:40 New developments in threat intelligence 32:41 - 35:50 insights and lessons learned 35:51 - 39:04 New Book coming Main resources discussed 1. Unprotect - https://unprotect.it 2.Jupyter collection - https://jupyter.securitybreak.io 3.MSTICPy- https://github.com/microsoft/msticpy 4. Malware Bazar DB - https://bazaar.abuse.ch 5. SecurityBreak - https://securitybreak.io Thomas Roccia Linkedin - https://www.linkedin.com/in/thomas-roccia/ Twitter - https://twitter.com/fr0gger_ Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #malware #phyton #microsoft #yanivhoffman #thomasroccia #informationtechnology #cybersecuritytools #msticpy #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
TOR vs Russia | cybersecurity
18:53

TOR vs Russia | cybersecurity

For years, the anonymity service Tor has been the best way to stay private online and dodge web censorship. Since Dec 2021, Russia has been trying to block the anonymous browser with mixed results. So how TOR successfully stays online? What Russia is doing to fight back? what tools and solutions used in this fight? and more in this video :-) Disclaimer - I don't take any side of the story or even a side in the Russia/Ukraine conflict. I do report what is seen and published in media. Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #tor #russia #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
supply chain attack explained
25:56

supply chain attack explained

Hi Everyone, following the recent attack on 3CX SW company, its similarity to the SolarWinds attack in 2020 and suspicion of N.Korea hackers involvement, I have created this video to explain what is a supply chain attack in cybersecurity? what exactly happened in 3CX? Answer some common questions related to 3CX and Supply chain attacks in general and also speak briefly on N.Korea cyber force. Chapters: 0:00 - 2:19 Opening 2:20 - 2:29 Introduction Video 2:30 - 5:55 What is a supply chain attack? 5:56 - 7:07 3CX company overview 7:08 - 9:18 What exactly happened with 3CX? 9:19 - 13:15 Chain of Events 13:16 - 15:55 What do we know today (Time of recording April 6th,2023) 15:56 - 21:36 Common question and answers 21:37 - 25:31 North Korea Cyber Force 25:32 - 25:56 Thank You! Useful Sources: 1. John Hammond YT channel - https://www.youtube.com/@UCVeW9qkBjo3zosnqUbG7CFw 2. Daniel Lowrie YT channel - https://www.youtube.com/@UC7hgvxOCLAFZRhDRbUSjAsw 3. CSO online report - https://www.csoonline.com/article/3677228/supply-chain-attacks-increased-over-600-this-year-and-companies-are-falling-behind.html 4. 3CX blog - https://www.3cx.com/blog/news/desktopapp-security-alert/ 5. Check my operator site - https://checkmyoperator.com/ 6. Thomas Roccia Twitter - https://twitter.com/fr0gger_?s=20 Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #supplychain #hacking #3cx #yanivhoffman #solarwinds #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
pegasus the spyware technology
31:31

pegasus the spyware technology

Pegasus is spyware developed by the Israeli cyber-arms company NSO Group that can be covertly installed on mobile phones (and other devices) running most versions of iOS and Android.Pegasus is able to exploit iOS versions up to 14.7, through a zero-click exploit. As of 2022, Pegasus was capable of reading text messages, tracking calls, collecting passwords, location tracking, accessing the target device's microphone and camera, and harvesting information from apps. The spyware is named after Pegasus, the winged horse of Greek mythology. It is a Trojan horse computer virus that can be sent "flying through the air" to infect cell phones. Chapters: 0:00 - 0:22 Opening 0:23 - 0:32 Introduction video 0:33 - 2:45 Pegasus Spyware 2:46 - 4:33 Zero Days vulnerabilities that started it all 4:34 - 7:10 How does it work? 7:11 - 9:04 Origins of Pegasus 9:05 - 9:29 Book About Pegasus 9:30 - 11:47 Who are the main customers of Pegasus? 11:48 - 12:53 Exemple I - Jama Khashoogi 12:54 - 18:00 Example II - Ahmed Manor (UE) + Baharain Targets 18:01 - 27:41 Zero Click Exploits 27:42 - 31:09 Future of Spyware tools 31:10 - 31:31 Thank you Affiliate Link: Pegasus Book - https://amzn.to/3lQwm4t Links: 1. Citizen Lab Report (Hide & Seek) - https://citizenlab.ca/2018/09/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-countries/ 2. Lookout Technical Analysis - https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf 3. CloudDesk - https://cloudsek.com/blog/everything-you-need-to-know-about-the-pegasus-spyware Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #pegasus #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
radio hacking with a master hacker
42:20

radio hacking with a master hacker

SW defined Radio is the new uprising vector of attack due to accessibility to the general public. So many applications in our modern life use radio frequency elements that is hard to list them all (Automobile, mouse & keyboards, cellphone signals, remote control, satellite transmission, police and encrypted military communication, drone control and etc...) these signals can be captured, converted to digital and then manipulated and transmitted back as attacks. Don't miss my discussion with master hacker #OccupyTheWeb to learn more about SW defined Radio Disclaimer: The opinions expressed by Occupy The Web in this interview are his own. This channel is not promoting illegal activity and, all contents provided by this channel is meant for educational purpose only! CHAPTERS 0:00 - 0:37 Coming up...... 0:38 - 0:50 Channel Introduction video 0:51 - 5:16 Idea behind SW defined Radio (SDR) 5:17 - 14:10 Radio Hacking overview 14:11 - 27:24 Demo of Tools and websites for SDR 27:25 - 39:21 Skills required to operate SDR and required tech to use 39:22 - 41:24 Zero flipper for hackers 41:25 - 42:20 Thank you OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise Classes: https://www.hackers-arise.com/three-levels-of-training 1. RTL-SDR (Receiver) - https://amzn.to/3yVAfYE 2. Hacker RF One (Receiver + Transmitter) - https://amzn.to/3Jy5A8G 3. Ethos B200 (Receiver + Transmitter) - https://amzn.to/3nbp0bI 4. Lime SDR (Receiver + Transmitter) - https://amzn.to/3LKeKBP Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
software defined radio hacking | Trailer
00:36

software defined radio hacking | Trailer

Hi Everyone, This is a trailer of my discussion with Master Hacker OccupyTheWeb on Radio hacking. coming out on Wednesday, March 22nd. OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise Classes: https://www.hackers-arise.com/three-levels-of-training Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
hacking access control systems
21:04

hacking access control systems

Hi Everyone, in this video I will speak and show how hackers accelerate their privileges and exploit access control systems. If you would like to learn more about access control systems, understand the models/types, common vulnerabilities and ways to protect your org systems, this video is for you. Disclaimer - this is educational purpose video only. its done in a closed lab environment to demo and guide how to better protect your systems. Remember - hacking is illegal without permission !!! CHAPTERS 0:00 - 0:21 Opening 0:22 - 0:34 Introduction Video 0:35 - 2:22 A bit about myself and Agenda for Video 2:23 - 4:04 Major incidents related to broken access controls 4:05 - 9:19 What is access Control (Types, Models...) 9:20 - 12:19 Access control vulnerabilities 12:20 - 15:48 Hands-on Demo 15:49 - 18:00 Actions that organisations can take 18:01 - 21:04 The future Watch more cyber security hacking videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Stuxnet - https://youtu.be/fLwLRvp1YFA 3. Flame - https://youtu.be/GllYYwosJX8 4. Duqu - https://youtu.be/bSp926XdHK4 5. API Hacking - https://youtu.be/1t5wXWFI0yU 6. DNS Hacking - https://youtu.be/Hsj_67RhNMc 7. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 8. NotPetya - https://youtu.be/6gqKkTf9fWY 9. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #accesscontrolsystem #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
hacking industrial control systems scada
42:38

hacking industrial control systems scada

Hi Everyone, This is my second interview with Master Hacker Occupy The Web. In this video we discuss the danger/impact of hacking industrial control systems (ICS) using SCADA (supervisory control and data acquisition), what's the diff between IT network and SCADA network, Vulnerabilities , Vectors of attacks and some Defense tips. Chapters: 0:00.- 1:02 Opening by OccupyTheWeb (OTW) 1:03 - 1:15 Channel Intro Video 1:16 - 7:25 OTW Books, Citizen of the world, agenda...... 7:26 - 36:55 What is SCADA/ICS? Diff between IT net and SCADA, Attack vectors, Method... 36:56 - 42:01 Hackers-raise 42:02 - 42:38 Summary OccupyTheWeb Books - Affiliate links in Amazon: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise classes: https://www.hackers-arise.com Watch more cyber security fundamental videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Stuxnet - https://youtu.be/fLwLRvp1YFA 3. Flame - https://youtu.be/GllYYwosJX8 4. Duqu - https://youtu.be/bSp926XdHK4 5. API Hacking - https://youtu.be/1t5wXWFI0yU 6. DNS Hacking - https://youtu.be/Hsj_67RhNMc 7. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 8. NotPetya - https://youtu.be/6gqKkTf9fWY 9. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
how to become a master hacker
32:52

how to become a master hacker

Hi Everyone, in this episode you will get a unique view to one of the world's most famous hackers - #OccupyTheWeb (OTW). OTW is the nom de guerre of an information security researcher and forensic investigator with more than 20 years in the industry. He is a former university professor and used to train hackers at every branch of the US military and intelligence agencies. OTW and I will discuss his New book (Network basics for hackers), teaching classes at "hackers-arise", his main focus and activity these days, the threat landscape along with new and innovative methods and will finish with useful tips for people that seek to get into cybersecurity and hacking. CHAPTERS: 0:00 - 0:45 Opening 0:46 - 5:00 Who are you OccupyTheWeb (OTW)? 5:01 - 13:52 NEW BOOK - "Network Basics for Hackers" 13:53 - 18:52 Hackers Basics - OS, Networking, Programming 18:53 - 22:07 What is hackers-arise? 22:08 - 23:52 How to keep up to date in cybersecurity 23:53 - 29:00 Hacking Trends today 29:01 - 32:52 OTW summary OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise: https://www.hackers-arise.com Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
5g security and evolving architectures
01:00:58

5g security and evolving architectures

Hi Everyone, in this insightful episode, I will be talking with Pramod Nair, one of the world's experts in 5G security and author of the book "Securing 5G and Evolving architectures". We will touch many topics such as evolution of mobile networks, introduction to 5G, security challenges, uses cases and deployment models, but also technology in general. So if you would like to learn more about 5G in general and cybersecurity specifically this video is for you!!! Enjoy CHAPTERS 0:00 - 0:45 Opening 0:46 - 0:55 Channel Intro 0:56 - 7:16 Pramod Nair introduction, evolution of mobile networks 7:17 - 13:58 What inspired you to write the book ? 13:59 - 31:47 What's new in 5G and what are the main security challenges 31:48 - 47:46 Use cases and Security threats (Infrastructure, AppSec, API....) 47:47 - 55:09 Future of 5G 55:10 - 1:00:58 Takeaways from the book and summary Link to buy the book: https://www.amazon.com/Securing-Evolving-Architectures-Pramod-Nair/dp/0137457936/ref=sr_1_1?crid=29LE58NALK3EK&keywords=securing+5g+and+evolving+networks&qid=1676449886&sprefix=securing+5g+and+evolving+networks%2Caps%2C233&sr=8-1&ufe=app_do%3Aamzn1.fos.006c50ae-5d4c-4777-9bc0-4513d670b6bc Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #5g #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
bottom of page