DDoS attack explained by a Master Hacker

แชร์
ฝัง
  • เผยแพร่เมื่อ 12 ก.ค. 2024
  • Join me with Master Hacker OTW for an insightful dive into DDoS attacks. We explore the current threat landscape, discuss key risks, and showcase a hands-on demo using HPING3. #cybersecurity #ddosattack #hacking
    Disclaimer: This video is for educational purposes only. We do not promote hacking or any illegal activities. Remember, hacking without explicit permission is illegal. Stay safe and ethical in your cybersecurity explorations
    OccupyTheWeb Books - Affiliate links:
    1. Become a master Hacker - amzn.to/3Eq6vX4
    2. NEW BOOK - Network basics for hackers - amzn.to/3YNd1iz
    3. Linux Basics for Hackers - amzn.to/3Sdoh5i
    OccupyTheWeb Community - Hackers-Arise: - 20% coupon for everything in store ("YANIV")
    Chapters
    0:00 - 1:02 Opening
    1:03 - 3:30 OccupyTheWeb
    3:31 - 18:52 DDoS discussion on threat landscape, risks and more
    18:53 - 36:10 Brief demo of HPING 3
    Watch more cyber security Video's
    1. Does SQL injection still work ? Lessons by Master Hacker - • SQL for Hackers by Mas...
    2. Behind Darknet Diaries with Jack Rhysider - • Jack Rhysider Darknet ...
    3. Shield Your Wi-Fi from Hackers with these Essential Security Measures • Hacking home WIFI with...
    4. Meet the man who exposed the world's first cyber weapon - • Unraveling the Impact ...
    5. How to become a master hacker (With OTW) - • how to become a master...
    6. Hacking SCADA systems - • hacking industrial con...
    7. SW define radio hacking - • radio hacking with a m...
    8. Pegasus spyware - • pegasus the spyware te...
    9. Stuxnet - • Explaining cybersecuri...
    10. API Hacking - • How Hacking APIs Works...
    11. DNS Hacking - • DNS hijacking | Cybers...
    12. How to Build a hacking Box - • how to build your hack...
    13. NotPetya - • notpetya attack
    14. OSINT - Open Intelligence tools - • OSINT framework Explai...
    Thank you for being here! Stay Safe and Healthy,
    Yaniv Hoffman
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 98

  • @yanivhoffman
    @yanivhoffman  6 หลายเดือนก่อน +12

    Thank you all for watching. I had an issue with camera so my side of video not in HD . Poor mistake but tried to sharpen and found the problem so will not happen again ❤

  • @mytechnotalent
    @mytechnotalent 6 หลายเดือนก่อน +7

    Always great to see Master OTW! The DDoS efforts were quite effective!

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      Thank yop for watching

  • @user-vi1ms2nf3q
    @user-vi1ms2nf3q 6 หลายเดือนก่อน +4

    We are students OTW ❤

  • @probablythebestbutnotyet220
    @probablythebestbutnotyet220 6 หลายเดือนก่อน +2

    awesome yaniv...this will keep busy during christmass

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Thank you 🙏

  • @Joe-gl8sr
    @Joe-gl8sr 6 หลายเดือนก่อน +4

    Great stuff!!!

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Thank you 🙏

  • @y.tzvilangermann7894
    @y.tzvilangermann7894 6 หลายเดือนก่อน +5

    extremely informative...I hope no bad guys were taking notes

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Thx and hope too

    • @davidkamaunu7887
      @davidkamaunu7887 6 หลายเดือนก่อน +1

      They already know these TTP and generate income streams from their use.

  • @isxckk.
    @isxckk. 6 หลายเดือนก่อน +4

    Good stuff!

  • @carol-lo
    @carol-lo 6 หลายเดือนก่อน +4

    Great explanation :)

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Thank you 🙏

  • @funkymonk2254
    @funkymonk2254 6 หลายเดือนก่อน +2

    ThankYou Yaniv and Master OTW.

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      Thank you for watching

  • @taiquangong9912
    @taiquangong9912 6 หลายเดือนก่อน +2

    Your videos are amazing thanks

  • @DreaminARealityTV
    @DreaminARealityTV 6 หลายเดือนก่อน +3

    Can't wait for OTW book on Ukraine and Russia tactics next year. I'll be first in line

  • @fanyfany596
    @fanyfany596 6 หลายเดือนก่อน +2

    thankss untuk MASTER otw and yaniv hoffman

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Thx for watching and for the feedback

  • @raymondtunmbi9168
    @raymondtunmbi9168 6 หลายเดือนก่อน +4

    Yaniv it's 4:55 am You're waking ⏰ me up with the best content ❤

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Wow ! You made my day ❤️❤️❤️❤️ thx for the kind words

  • @elmehdiezziar
    @elmehdiezziar 6 หลายเดือนก่อน +2

    Love it's, Great video

  • @Crazy--Clown
    @Crazy--Clown 6 หลายเดือนก่อน +2

    Thnx Jeff

  • @DevOps691
    @DevOps691 6 หลายเดือนก่อน +2

    I have a question for Mr. Occupy, how does he assess the level of cyber security in the USA and what does he think about the latest news that the well protected Rockstar Games was hacked by a schoolboy, or the fact that there are many government companies who still use Windows 98. Before doing nobody needs things Is it better to work to increase security in your country?

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      Let me ask him and get back to you

  • @VAS.T
    @VAS.T 6 หลายเดือนก่อน +2

    buy a botnet on hacker boards.
    get ip
    start attack.
    its THAT simple.

  • @user-mi4fs2fk4t
    @user-mi4fs2fk4t 6 หลายเดือนก่อน +2

    Love you bro

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Thx a lot ❤️

  • @Kalem-Bae
    @Kalem-Bae 6 หลายเดือนก่อน +2

    Bisakah DDoS attack menggunakan TOR .. ? saya rasa tidak, ... mungkin ?

  • @emmanuellazar8786
    @emmanuellazar8786 6 หลายเดือนก่อน +2

    עם הנצח לא מפחד, גם לא בעולם הזה גם לא בסייבר

  • @pngbtw
    @pngbtw 6 หลายเดือนก่อน +2

    אחלה סרטון שמח שמצאתי ישראלי שעושה את זה קיבלתה סאב

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Thx a lot ❤️

  • @i_am_dumb1070
    @i_am_dumb1070 6 หลายเดือนก่อน +2

    Noob here , I want to ask a silly doubt ... you guys talked about IOT devices being used as part of botnet to commit DDOS attacks , but how to these get infected like do they have a seperate category of malware or how? also like in a pc lets say a person downloads some malware then does that malware install hpin3 like tool in infected system or its like without installing any additional tools when C2 sever gives command all botnets start sending requests ? Can you explain this to me I am really confused how from C2 to Botnet to DDos things are working

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      First thx for your question. IoT devices are often infected by malware targeting their specific vulnerabilities, like outdated firmware or default passwords. Unlike PCs, where malware is usually downloaded by users, IoT devices are directly attacked. Once infected, they become part of a botnet controlled by a hacker's command-and-control (C2) server. In a DDoS attack, this botnet is activated to send overwhelming traffic to a target server, causing disruption or shutdown. The process underscores the need for robust security in IoT devices and cautious online practices for PC users. let me know if it answer your question. if not i will try to focus it more

    • @davidkamaunu7887
      @davidkamaunu7887 6 หลายเดือนก่อน

      Desktop PCs are often initially infected and then later payloads are dropped on the system that allow it to be a participant in a Distributed Denial of Service attack. The aim of a Denial of Service attack is Network Resource Exhaustion. Imagine thousands of phone calls going to a call center.

    • @i_am_dumb1070
      @i_am_dumb1070 6 หลายเดือนก่อน

      @@yanivhoffman thankyou , so someone can use shodan and using available poc control such iot devices .... what sort of vulnerbility in iot allows a attacker to make them a part of his botnet ?

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      @@i_am_dumb1070 IoT ads over looked by vendors when it comes to security and have default passwords that no one changes and with quick search can be found. It makes them easy to exploit

    • @i_am_dumb1070
      @i_am_dumb1070 6 หลายเดือนก่อน

      @@yanivhoffman ok 👍

  • @00Jimmy00
    @00Jimmy00 6 หลายเดือนก่อน +2

    hping works only on switched networks

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      thx for the comment

  • @gabrielfono844
    @gabrielfono844 6 หลายเดือนก่อน +2

    Sir please
    I am currently working as software engineer and my dream was always to start ethical hacking.
    I have connection at USA government, department of defense and department of state to get the jobs if I have a right skills.
    Could please give us a roadmap.
    I want to start all 2024 doing ethical hacking.
    Thanks

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      I always say that the golden triangle is networking, operating systems and cybersecurity to become a master hacker. So if you don’t have networking knowledge start with that… like Comoros network+, than proceed to security+ and finish with CEH practical path. From there you can choose you expertise

    • @gabrielfono844
      @gabrielfono844 6 หลายเดือนก่อน +1

      @@yanivhoffman thanks a lot
      I appreciate

  • @London-ft4hj
    @London-ft4hj 6 หลายเดือนก่อน +2

    What are some hacking apps do you recommend?

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      im only supporting ethical hacking and there are many tools and apps ofc. to make it in a nutshell look at tools teached in CEH / OSCP which will give you better idea

    • @London-ft4hj
      @London-ft4hj 6 หลายเดือนก่อน +1

      I’m not hacking to do anything bad

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      @@London-ft4hj yes understood. Thx

  • @LorenFleisher
    @LorenFleisher 6 หลายเดือนก่อน +1

    OTW is actually David Blaine

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Why do you say that ?

  • @ChillHopHavenMusic
    @ChillHopHavenMusic 6 หลายเดือนก่อน +1

    Hey, at the company where I work, we suffered a DDoS attack for a month. If possible, at some point, I would like to understand how we can defend ourselves against these UDP attacks. We resolved it here with a mitigation cloud, but I would like to know more efficient ways to avoid this issue.

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      Approach me via mail and I can help you

    • @ChillHopHavenMusic
      @ChillHopHavenMusic 6 หลายเดือนก่อน

      Done, eagerly awaiting your interaction, and once again, I thank you.

    • @throwawayaccount838
      @throwawayaccount838 6 หลายเดือนก่อน +2

      You can't do anything on your side. You gotta talk to your ISP or hosting provider to offer you a ddos protection plan.
      Once the packet hits you you're already finished. They're taking up your bandwidth so ur normal traffic can't get through.

  • @mohammadshoheltanvir-hk9pt
    @mohammadshoheltanvir-hk9pt 6 หลายเดือนก่อน +1

    Sir?
    How to I connect with you

  • @sajalkaurav5557
    @sajalkaurav5557 6 หลายเดือนก่อน +1

    Hey Yanif ,
    I trust this message finds you well. I’ve had the privilege of exploring your youtube content, and I must say, the passion and creativity you bring to your projects are truly commendable.
    As a dedicated video editor with a keen eye for detail and a flair for visual storytelling, I believe I can contribute to enhancing the impact of your content.
    I had been working with multiple youtubers and content creators around the world and have a experience of 3 years in video editing
    And if we fail to deliver the results then we work for free !
    I’d love the opportunity to collaborate with you and bring a fresh perspective to your content.
    Worth conversation?

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Approach me via mail

  • @q3samer
    @q3samer 6 หลายเดือนก่อน

    How to join 1800

  • @someone2324
    @someone2324 6 หลายเดือนก่อน +2

    Angry people...lol!!!

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      It’s true. One of the motivation behind some attackers is revenge from people that got fired or treated improperly so they would like as a punishment to disrupt the service of that provider

    • @someone2324
      @someone2324 6 หลายเดือนก่อน +1

      @@yanivhoffman aka insider threat

  • @UtraVioletDreams
    @UtraVioletDreams 6 หลายเดือนก่อน +1

    Distributed Denial of Service aka DDOS is for looser. I can be a ping with a large package size with a couple of people or a large group of people requesting the services over and over again. It requires NO skill at all......

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      The new ddos level is on the application layer and very sophisticated both ssl and randomize payload which looks like legitimate user and follow real business logic . This what took Microsoft Azure down in June and lately used by many proxy groups. Ofc there are some basic stuff you can do with HPING but new threats are not easy to generate or to detect

    • @UtraVioletDreams
      @UtraVioletDreams 6 หลายเดือนก่อน +1

      @@yanivhoffman Yes layer one of the OSI model can not be/hard to be denied! Still DDOS is for loosers. It requires no skill at all

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      @@UtraVioletDreams true. The traditional DDoS is L3-4 but now transition into Level 7 with RPS attacks that are randomized and encrypted and that’s diff level

    • @UtraVioletDreams
      @UtraVioletDreams 6 หลายเดือนก่อน +1

      @@yanivhoffman Yeah I know... you and I both know our stuff. White hat 😇. I'm not going to share more knowledge on you tube xD

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน +1

      @@UtraVioletDreams ❤️ nice to meet you ! Keep in touch , maybe we do video together

  • @mysterytriangle6062
    @mysterytriangle6062 6 หลายเดือนก่อน +2

    hacking Russia with hping3 LOL

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Ofc not 😂

  • @user-rf7ss5ts9q
    @user-rf7ss5ts9q 5 หลายเดือนก่อน +1

    can you help me

    • @yanivhoffman
      @yanivhoffman  5 หลายเดือนก่อน

      What’s the problem ?

  • @EAG_EDITORS
    @EAG_EDITORS 6 หลายเดือนก่อน

    Hello I’m professional video editor I have worked with many clients who provide this type of content, and I have many good reviews on freelance sites. I hope you will respond to provide you with the rest of the details. Thank you.

  • @yungcaco1443
    @yungcaco1443 หลายเดือนก่อน

    Imagine being so pathetic and bitter you spend your time DDOSing servers .

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 6 หลายเดือนก่อน +6

    "master hacker" ..respectfully disagree..he thinks iOS is safer than Android, doesn't seem to know how proxy chains work and to me...seems a bit like a fed..just saying..

    • @sneaksunlimited8268
      @sneaksunlimited8268 6 หลายเดือนก่อน +2

      Former nsa

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 6 หลายเดือนก่อน

      @@sneaksunlimited8268 I dunno man .. giving advice that could get ppl locked up does seem to give up the "former" to me a bit

    • @QuanshengQwin
      @QuanshengQwin 6 หลายเดือนก่อน

      FORMER?

    • @bilbro88
      @bilbro88 6 หลายเดือนก่อน

      I though iOS has end to end encryption, and Android runs off the Linux kernel?

    • @user-ly7ll2kk8w
      @user-ly7ll2kk8w 5 หลายเดือนก่อน

      OTW is actually convicted conartist Keith Debus. He uses OTW to sale his shitty basic linux and networking classes

  • @swoodc
    @swoodc 6 หลายเดือนก่อน

    This guys annoying and I hate hearing him on david brombals channel

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      Thx for the feedback but to learn forward and improve. Why annoying?

  • @johnnywilliams2641
    @johnnywilliams2641 6 หลายเดือนก่อน +1

    The only thing about his Networking book, unless a networking word is 32 bits, I do believe there is a mistake on page 22 where it shows a word is 4 bytes. Although I very well could be misuderstanding the diagram or maybe a word in networking is 32 bytes and on a cpu or programming it is 2 bytes. Im not expert.

    • @yanivhoffman
      @yanivhoffman  6 หลายเดือนก่อน

      thx for the feedback. i will look into it and return to you

    • @forthehomies7043
      @forthehomies7043 6 หลายเดือนก่อน +1

      a word can be 8, 16, or 32 bits depending on the programming language

  • @Passionaction1206
    @Passionaction1206 5 หลายเดือนก่อน

    I KNOW MY STUFF IS BREECHED.. HAS BEEN FOR OVER 2 YEARS. BUT I CANT GET IT OFF... AND DONT KNOW EXACTLY HOW. I DONT KNOW WHO TO CONTACT TO LET EVERYONE KNOW THAT IT NEEDS TO BE SEEN ASAP..

  • @michaelnieves8087
    @michaelnieves8087 หลายเดือนก่อน

    Felon Keith Henry Debus aka "master hacker" occupytheweb