- 52
- 66 929
Paula
เข้าร่วมเมื่อ 16 มี.ค. 2013
On this channel you will find fun day in the life, travel, and mostly tech videos regarding cybersecurity.
You can also find VoD twitch streams on @pamoutafstream (my second channel)
You can also find VoD twitch streams on @pamoutafstream (my second channel)
Hacking iPhones - Siguza - Part 2
Hello everyone, and welcome back to part 2 of the Siguza interview.
In this episode, we talk about tools, toxicity in the VR world, video games, work life balance and Siguza fun facts!
⭐️SOCIALS⭐️
Instagram: @pamoutaf
Twitch: @pamoutaf
Website: p0pcycle.com
email: pamoutafpro@gmail.com
00:00 What software does Sig use to reverse engineer?
04:16 Work-life balance
06:16 How do you do team collaboration
08:51 How does Sig know what to work on
10:21 Is it harder to find exploits today?
15:06 What would Sig do if he couldn’t work in VR anymore
20:23 Rambling
21:24 Blackhoodie workshop at Hexacon
21:58 How Sig learned RE
23:23 Screening for VR in this industry
27:15 Toxicity in the world of VR / gate-keeping
32:55 Sig exploiting SQL vulnerabilities in his younger years
35:01 Dealing with the feeling of repetition in our work
35:57 What is Sig going to work on next
42:15 Siguza’s older devices
44:21 What does Siguza watch on Twitch?
45:05 Which video games does Siguza play?
51:15 Fan questions
54:17 Why Siguza uses Nano instead of Vim (funny)
56:06 Siguza fun fact
57:46 How does Siguza explain to other people what he does for a living
59:16 How do you explain VR to an 80-year-old?
01:00:56 What is Siguza’s home setup
01:02:16 What is Siguza’s exercise routine
01:04:20 Bon appétit!
In this episode, we talk about tools, toxicity in the VR world, video games, work life balance and Siguza fun facts!
⭐️SOCIALS⭐️
Instagram: @pamoutaf
Twitch: @pamoutaf
Website: p0pcycle.com
email: pamoutafpro@gmail.com
00:00 What software does Sig use to reverse engineer?
04:16 Work-life balance
06:16 How do you do team collaboration
08:51 How does Sig know what to work on
10:21 Is it harder to find exploits today?
15:06 What would Sig do if he couldn’t work in VR anymore
20:23 Rambling
21:24 Blackhoodie workshop at Hexacon
21:58 How Sig learned RE
23:23 Screening for VR in this industry
27:15 Toxicity in the world of VR / gate-keeping
32:55 Sig exploiting SQL vulnerabilities in his younger years
35:01 Dealing with the feeling of repetition in our work
35:57 What is Sig going to work on next
42:15 Siguza’s older devices
44:21 What does Siguza watch on Twitch?
45:05 Which video games does Siguza play?
51:15 Fan questions
54:17 Why Siguza uses Nano instead of Vim (funny)
56:06 Siguza fun fact
57:46 How does Siguza explain to other people what he does for a living
59:16 How do you explain VR to an 80-year-old?
01:00:56 What is Siguza’s home setup
01:02:16 What is Siguza’s exercise routine
01:04:20 Bon appétit!
มุมมอง: 233
วีดีโอ
Hacking iPhones - Siguza - Part 1
มุมมอง 75621 วันที่ผ่านมา
Ever wondered how iOS jailbreaks work or what it’s like to dive deep into the world of security research? In this video, we sit down with Siguza, a well-known iOS hacker and jailbreak developer, to chat about everything from his early days in tech to his beginnings in iOS jailbreaking. We cover all kinds of topics: 💡 What jailbreaking is and why people do it 📱 How Siguza got into iOS hacking 🛠 ...
The future president of the United States - using AI
มุมมอง 1.4K3 หลายเดือนก่อน
In this video, I just was demonstrating how you can use AI to analyze data. This little example was just for giggles, don't take this too seriously please. Let me know in the comments below your predictions, and also if you have ever used AI to analyze data. ⭐️SOCIALS⭐️ Instagram: @pamoutaf Twitch: @pamoutaf Website: p0pcycle.com email: pamoutafpro@gmail.com
MY STORY - How I got a tech job with no degree
มุมมอง 1.8K3 หลายเดือนก่อน
Hello all, I have been getting so many questions these past few weeks, and I hope this video answer most of them. Please leave a comment with what you'd like to see next (keep it reasonable pls) :) ⭐️SOCIALS⭐️ Instagram: @pamoutaf Twitch: @pamoutaf Website: p0pcycle.com email: pamoutafpro@gmail.com
INFLUENCER Marketer becomes a Cybersecurity Strategist
มุมมอง 6714 หลายเดือนก่อน
There are so many different fields in cybersecurity, and strategy is one of them. From aligning with frameworks like ISO and NIS2 to understanding what an ISMS entails and why companies prioritize these audits, there's a lot to uncover. In this episode, Mathilda dives deep into the essentials of cyber strategy, explaining its importance in the broader cybersecurity landscape. She will also tell...
I LEFT IT ALL BEHIND (for 2 days)
มุมมอง 4604 หลายเดือนก่อน
Normandy is all about peace, relaxation, and indulging in great food; a perfect escape to unwind and savor life's simple pleasures. ⭐️SOCIALS⭐️ Instagram: @pamoutaf Twitch: @pamoutaf Website: p0pcycle.com email: pamoutafpro@gmail.com
HACKER becomes ‘the good guy’ - chITchat episode 1
มุมมอง 1.1K4 หลายเดือนก่อน
HACKER becomes ‘the good guy’ - chITchat episode 1
My journey to becoming a hacker - STORY TIME
มุมมอง 3.5K6 หลายเดือนก่อน
My journey to becoming a hacker - STORY TIME
How I hacked a LUXURY sport studio - FREE MEMBERSHIPS
มุมมอง 1.2K7 หลายเดือนก่อน
How I hacked a LUXURY sport studio - FREE MEMBERSHIPS
What I do as a HACKER - Day in the life
มุมมอง 28K8 หลายเดือนก่อน
What I do as a HACKER - Day in the life
Nice
Nice
hi, can you share the coding school's name and location ?
It’s called 42, and there are many different locations 😊
@@pamoutaf Thank you for you reply ! I checked it out and it does seems very interesting. As a cybersecurity student in Belgium I'm facing difficulties in my studies, mainly because I have no motivation to study. And I was looking for some more practical alternatives. School 42 seems to be ideal, but unfortunatly the nearest school here in Belgium is in Brussels, and that is too far away for me. Could you make a more detailed video about the school, about the programs and talk in more in depth about your own experience ?
Nice
Wow awesome
Windows is a spaghetti code mess that has turned into a monster dumpster fire but the world and its contributors can’t function, let alone survive without it because of how integrated it is in our society. But the beauty of Linux is that it is growing stronger by the day and places like Amazon with AWS live off Linux to control their servers. So in that market Linux is king but for the home user we’re just not there yet. We’re almost there though thanks to companies like Valve / steam for making it mainstream.
Lol who's dog is snoring?
Haha. Mine. I was dog sitting and my audio recording setup was fked up, so it picked it up. It’s only for a tiny bit in the beginning normally
i bet you could also make a nice christmas turkey too big girl 😉😍😘
Python 3 is a really cool language to work with and it can seamlessly integrate low and high level functioning. I'd love to see more videos about your projects in the future! I think the LLM simply cannot process the irrational aspect of elections, I know I don't... xD
Hey Paula. Where are you now?Are you busy? 😅 i hope you can making content again 😊
Hey!!! I am still here, I have just been insanely occupied lately. I am still editing the next podcast, it’s just taking me a long time 😢
@pamoutaf no problem, Paula. i’ll wait 👌🏻
This Method is very very old and outdated.. you will not even hack my Grandmas Router with this Attack.. the most Routers nowadays have WPA2/WPA3 with Protected Managment Frames (PMF), that block Deauth/Disas/Reassoc Frames, thats one Thing.. the Next Problem is, if you got some Handshake, then you can be sure, that the most People today keep the default Passphrase in their Access Point. These can be 16-26 Characters long and are mixxed with Numbers, Characters and Special Characters. seen on Fritz!Box, Telekom Router, Vodafone Routers etc.. If your password not in List, then you can wait maybe 1 Week or maybe 2 Years. Dont waste time and use "wifiphisher" instead or make your own Access Point with captive Portal. You need to set up a simple Login Page where asks the victim again for Wifi Password and then you can sniff the plaintext Password on wireshark or bettercap or other HTTP sniffer. You should keep in mind that the era of WiFi hacking is coming to an end and the manufacturers have slowly learned from all the mistakes. Attacks like these will either no longer work at all or will only work on ancient devices that were perhaps last updated in 2018.
Do you have CPTS or OSCP?
No, I have ewptx :)
Wow really encouraging
Wow really encouraging
Yeah it’s true this video is really useful information, and the method of explanation and the sequence of information is very beautiful. Keep going 👌
Loool it was wrong
@ what’s wrong?
Let me guess, you are single.
❤, 😘
I’ll come back to see if it’s correct
Me too 😂
😘❤
Hello
Hello
❤
I really like how you demonstrated the use of the Alfa and aircrack ng to hack wifi
Hey Paula!! How are you!? you are going great!! Just one question ,can you guide some aspiring pen testers who just did masters in cybersecurity❣️
Hi!! I am good, and you? Yes, on my blog there is a tab called resources. I give some ideas on where to learn pentesting. There is also a highlight on my instagram giving advice on cybersecurity in general :) enjoy!
By the case? Yes. You ARE one of THOSE! 😜🏴☠️
are you also working as a Trainer?
the sea salt blue is so beautiful
1:12 sudo apt update 😂😂😂 I'm hacker 🤣
sudo apt upgrade -y😂 I'm now hacker.
Hey , Paula i just see your channel i liked your tech videos , wish you best in the future. will you marry me? ( I'am joking😁)
please make a video about what u need to learn to hack yk
Hoping to share my story this way one day 😊 Because I'm an upcoming penetration tester
If you're really ethical, you should hack those big corporations that enslave humanity, not work for them.
hey hi, there how can i help you as a graphic designer generally in thumnail design. Thank you
hey uhm can u tell me how to learn ethical hacking asap?
How is the cybersecurity job market in Belgium, I am also working as a consultant and wanted to make a switch, so some help would be really appreciated
Hi, may I please have your LinkedIn ID?
please ,can you make a series on bug bounty?
Thing is most people dont lose anything in their life and it is sad they dont know about loss. But they should , they would be more humane and understaning . I lost too but people dont give an f about me so no support even thought i am a most handsome man 30 yr old and better overall. U can be different than that thought. About friendship it is complex so no comment . I also dislike night life much and travelling in general cuz i really dislike tossing money like that. Sooo am i insane like that guy ? Certainly i became insane but i am also logical like i used to be in some way. There are still fragments of that, it is just that , they are not pure anymore. I guess that makes me a better strategist nowadays than before) But i know there is absolutely nothing else to it cuz i am not stypid. Not anymore.
I'm falling in love ❤
What we learned is that Ais don’t really think logically and have cold hard facts so they can be wrong ) they need much improvement and they are In the baby step process . They cannot calculate human emotion or heart .
AW UR SUCH A SWEETHEART. i wish all women would be like u and soft heart like hacker <3. I wish to find a hacker girl it is the coolest thing ever and it is high inteeligent to me but it is sooo rare for a woman to be hacker. So it is unique for sure. Also i think the drink u have on fridge has caffeine in high levels ? xd
WTF did i just watch?
Honestly idk but thanks for the view man!
Good joke ..😢😢😢woman and cyber security 😢😢😢
Cool thanks for sharing ❤
wait you are a student at 19 ? no way lmao, I am starting this Monday in 19
@@aminekar8447 oh nice ! Good luck
Eat & sleep that's all ✔️
Hi, can you recommend few books to get started in web pentesting ? I have been trying to learn for years on and off, but without any previous experiences nobody would hire (most companies want 4 CVE with medium\high severity to even consider CVs), and without real hands-on I can't learn or remember much.
Working as an Incident responder for couple of years, it really helps to know the attackers side as well.
I didn’t really read any books on pentesting, it was mostly practice (for example on Portswigger) and yeah you can write blog posts without specially having any CVE, it’s still noticeable when you apply to companies. I do believe practice and documentation or trainings are really good as well, and portswigger has so much resources to learn! It also keeps up to date with latest technologies (e.g. AI)
@@pamoutaf Thank you very much !! documenting learnings in blog post seems a great idea, I did not really think of that. And thanks for sharing about Portswigger academy, it's really vast.
The crazy I made similar videos and my other TH-cam got completely banned I’m on my 3rd channel.
Really ?? I neeed to check the terms and conditions
advice for bug bounty hunters?
I don’t do much bug bounty really so I can’t say much sorry :)
все что я выяснил из этого видео это то что у них тоже есть магнит и они тоже использую lenovo что не плохо для хакинга поскольку их радиомодули тоже умеют входить в режим мониторинга. в целом я не увидел ничего чтобы действительно говорило о том что это день хакера.
yes