Is your CCTV secured? Are your IP cameras safe? Too easy to hack? // MENU // 00:00 ▶ It Didn't Stop Us! 00:43 ▶ TH-cam Is Not Realistic 02:58 ▶ Hacking Is Boring? 04:12 ▶ In An Alternative Universe 04:35 ▶ High vs Low Value Targets 07:09 ▶ Hacking Ukraine CCTV Cameras 08:04 ▶ Why Aren't Cameras Well Protected? 10:48 ▶ Why Hack Ukraine CCTV Cameras? 12:45 ▶ Finding Online Systems Anywhere In The World 14:47 ▶ Don't Cameras Have Passwords? 17:36 ▶ Hack My Spouse//The Most Common Request 19:30 ▶ Convert Tools To Cyrillic? 20:20 ▶ Remote Camera Hacking 20:56 ▶ Camera Hacking Summary 21:13 ▶ Dictionary Attack or Brute Force for Remote Hacking? 22:32 ▶ Remote Hacking Takes Teamwork 22:52 ▶ Cameras Blocking Login Attempts 23:23 ▶ Bad Practices//How To Secure CCTV Cameras 24:42 ▶ Don't Be An Easy Target! 25:43 ▶ Basic Security To Have On Your Systems 28:42 ▶ Users Aren't The Flaw! 30:07 ▶ Russia SCADA Attacks 30:38 ▶ SCADA Swiss Army Knife 31:21 ▶ Stealing Schneider Password Hashes 33:40 ▶ DDoSing SCADA Systems Is Deadly 36:53 ▶ Russian Hackers//Overrated? 40:22 ▶ SCADA Malware Used On Ukraine Systems 42:54 ▶ Warning//Russia Coming After Hackers 44:16 ▶ Phishing Attempts on OTW 45:07 ▶ How To Protect Yourself 46:00 ▶ Social Engineering//Most Major Hacks 47:46 ▶ Social Engineering//Pentesting 49:11 ▶ SCADA Malware//Stuxnet 50:56 ▶ SCADA Malware//Triton 51:25 ▶ Bhopal Disaster//What Could Happen 52:39 ▶ Future Videos//Leave A Comment! This is my third interview with the professional hacker Occupy The Web. In this video we discuss hacking CCTV, IP cameras and SCADA (supervisory control and data acquisition). // Previous videos // OTW video 1: th-cam.com/video/GudY7XYouRk/w-d-xo.html OTW video 2: th-cam.com/video/uXbGQiXsRes/w-d-xo.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: th-cam.com/users/davidbombal // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw // Occupy The Web social // Twitter: twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh // In the News // Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems: www.wired.com/story/pipedream-ics-malware/ Ukrainian power grid 'lucky' to withstand Russian cyber-attack: www.bbc.co.uk/news/technology-61085480 An Unprecedented Look at Stuxnet, the World's First Digital Weapon www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ // Other books // The Linux Command Line: amzn.to/3ihGP3j How Linux Works: amzn.to/3qeCHoY // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
there is not a system or network out there that can preform a full brute force! with 120 characters in the set and "wifi" 63 possible character length is 120to the 63rd power possible combinations....create the wordlist do you have 8000 PETABYTES of storage?? use crunch and pass it through aircrack....do you have 100+ years it takes that long to read the list....this aspect of encryption is still secure but as always people are the weak link in the chain 8 a's isnt a password that will survive a dictionary attack. depending on your paranoia level password length of 12 is around 5 years run 14 is over 20 years .
Mr. David .. Can we open the wallet.dat file through a hacker? Or forced to a cracking method.. And if it is a cracking method: What is the fastest program that reads a file full of code to decode wallet.dat file.
I’m new to this whole community and coding. But this has become my favorite channel and OTW just has such a positive energy, he really makes me comfortable with starting in this field. Very welcoming and encouraging. Thank you for this. I can’t believe that these things are available. I doubt this will be always accessible online with all of the censorship closing in. Gotta invest in some books while I can!
@@radjalomas8854 I was going to say your old clunker of a car car never gives your info to the government, until it has its CPU scanned by the mechanic while diagnosing the strange new sputter in your engine. Then I remembered how fun it is to think about how new cars now give your into to advertisers while your passing a billboard so that, that billboard will display advertising personalized just for little ole you.
I am a 13 year old child from india i had interest in hacking but my parents thought it waste of time so i started watching david sir videos and now i am very thankful to such a great man who provides us with such extraordinary content for free. Imagine getting heart from david sir 🥰🥰
I like to hear Master OTW and David Bombal speaking. Both are giving a lot of information for free and they helped me a lot. edit: (late comment, i have watched this video back ago)
It blows my mind how people do not understand that everything wireless is a compromised device. It's a great example of desire, consumerism, and the expression 2+2=5 .
I always get new information to help the society with what i learn and i implement them to the last detail. Much thanks David Bombal. I need to learn more on CCTV and IP camera hacking... ethically.
Thanks David.. and Thanks to Occupy The Web... I Download all your video 742 and 14 interview's with OTW all Downloaded I'm sleeping 4am every I know 1day they I will smile with this skill. Watching OTW again and again and again
"Who's using all these ports?" *"I don't know."* Yeah, I feel that. Sometimes, it's a choice between laboriously checking every service your company runs, then checking what parts of that service you actually use, then systematically closing the ports that don't come up on that list, only to then find out there's a bunch of unlisted ports or even ports that were actually port ranges that you just closed, then going back and reopening 90% of what you just closed... OR... Leaving them open and praying your off-prem backup solution is as good as they say it is.
*THURSDAY, SEPTEMBER 1, 2022* *MESSAGE TO Hacker ANONYMOUS* Hackers under Criminal control are involved in an EXTORTION against me. *If there are any Hackers who are NOT UNDER CRIMINAL CONTROL, PLEASE HELP ME. May GOD Bless you ALL!!!*
Please help me. I'm convinced that my ex has found a way to hack my tv and turn it into a recording device when I use it to cast videos. My screen turns a bit snowy and it's followed by a bright blue dot. Is it possible to make part of someone's led smart tv a camera?
Any flat surface can have a thin plastic ‘screen protector’ looking film -- placed on or between layers… this film has rainbow looking prisms when you see light reflect off of it. They do not need any additional power source. Something similar to an old holographic trading card…. One of their favorite implementations they put between people’s optical lenses on their prescription glasses. No secrets for you…. Unless you start doing most sensitive private things; blind…. So imagine what can be done with an electronic equivalent: speaker is to microphone Tv is to camera…. Inverted image sensor chip…. You can totally plug a speaker into the mic input on your laptop and crudely listen to anything in that room…. Apply that same inverse relation to images…. And the nice big cheap flat always plugged in device in front of our faces in every room in our lives!!!! Your ex didn’t do anything; your tv was designed to spy on you… he just tuned into ur broadcast….
So just because he didn’t do anything ; doesn’t mean you are wrong….. so don’t let people dismiss your concerns bc they are very valid and by no means do you back down when the ‘gang stalkers start telling you to grab ur foil hat….. however you’re prob only feeding his tiny ego by posting online begging for help dealing with his insignificntbvaluable as yesterdays newspaper making it out to sound like he is some whimsical hacker; when in reality he prob has friend who helped explain to him ‘it was possible and someone could blah blah blah , something they government has used to spy on us since the Regan babies….
Your every video is such amazing information and also i like your hacker friend i love to join his classes if possible but I know it's not possible but he is going to be my road map toward my goal.
my job is to set up IP cameras mainly and i do a lot of programing and security jobs too and can say this with confidence that almost 95% off the places i go they still have the default pass on and only the big company's or very important places like government related or some few personals do care about securing the system 😶😮💨😔😔
Hi, this is so true, they can hack anything, they can see everything I do on my iPad, from putting a note under NOte, seeing all pictures that I took. Please help stop this, or advices, explain how it happening and how to stop and prevent it, thank you very much
I'm Alex from Nigeria I have passion for computer hacking but i don't have you will sponsor me to get a PC coz ma parents can't afford it. I really love Mr David videos, he's very intelligent and best when teaching Love you sir 🤗
Remember this guy is protecting the people of the Ukraine. Those soldiers of Russia will be looking over their shoulders for all those cameras. You are a warrior sir
My routers password can only use 32 characters , what is most secure ? Random Text Numbers n Symbols? Or A long random sentence? I've had password apps say the Sentence I used was Very Strong BUT another said it was weak! So which is the most secure kind of password for Routers n CCTV Cams ??
Doesn't matter. 32 characters long would take millions of years to guess. Just have a little entropy in it, you'll be fine. Of course, that doesn't stop a backdoor or password reset.
Hi David...I don't know if you can assist most of Companies are collapsing in SA with flashing they guy's came and ask for Quotation myb for R400,000 and they paid for it but they fund's just reflect and you released your Goods after few Hours the money reversed and nw they attacking car's they a tool called Flash SQR400 and flash V9.5 can you and OTW show us how does it work and how to prevent this before it was a Cheque Book nw flashing fake fund's.
I woke up to my camera night mode on clicking on. If Im not on my camera it shouldn't be on. It's not set to turn on for anyone but me. No motion. Nothing but me. Would my neighbor who works from home hack my camera? Yes. He lives in range of my wifi Update: My Livingroom and front door clicked on after I got up 20 minutes later. After changing password.
Loved this video. Listening here at work and was hoping to see a little bit of technical examples but we can't be too greedy. Nevertheless, I loved to hear some of the stories OTW had to share. It's great insight into what the real world is seeing. I wish the video was longer haha. I hope you get to have more collaborations with OTW, I'll be looking our for them. Thanks David!!!
-Great to see the teachers together again...!!! -So common network security cameras are basically mini-servers that can be accessed by SSH like anyone, and that have a REST API structure where you can read their video stream, and in more advanced systems these videos are concentrated on recording servers, but which are networked to be viewed can be accessed and hacked. -In fact, in general, they are IoTs with security that are very simple and easy to access. -I remember hacking the cheap Chinese cameras I bought and instead of using them with proprietary software I figured out how to capture the formats and decode this stream on a server that brought them all together on a machine at my ranch that was pretty easy. -Thanks for the knowledge...!!!
Yeah wide open Chinese potato cameras are horrible. I'm surprised there aren't really companies cashing in on high definition quality cameras yet. Even dash cameras still can't read a friggin license plate. It's mind boggling.
I heard him say that the Russians never give up. They are always trying to hack him and different stuff. My question is how does he know? It is actually Russians and not a hacker pretending to be a Russian.
your offer thar everybody is a "haker" who send you some info/link... many people doesnt know that, so why you dont offer safe opening info/data/link what you got on email, facebook or other places... no you saying go offline dont trust anybody.... that doesnt work in our world... please explain
For me? only wired cameras, closed system, no internet access. I don't see why to make my cameras available to the world IMHO. Many years ago, I was driving with friends around my city at night, intercepting unprotected or badly protected wireless signals, we have seen strange things 😁, for the camera inside the house, we printed a screenshot and left it in the letterbox, with written to "secure your cameras". We were a bit of wireless robin hoods, we had a lot of fun.
Occupy and his books are incredible! So is my man David. David + whatever mind he has on the show = greatness. Thank you both gentlemen! Can’t ever get enough!
In my opinion, serveilence cameras should only be installed in a public space or places that do not need high privacy. And if it's in the public realm, nobody should claim their privacy on that. If you don't want people know where you're going, then just fuckn stay at home!
I have a request, can y'all discuss what would happen if Joe Biden was to perform brain surgery on someone. Then discuss if Trump was a patient or not . Very curious
Hi, I've completed many courses in cyber security including many in SCADA security and I have good hands-on in SCADA security. Now I'm looking for an entry-level job in SCADA security. If anyone can refer me, I'll be very grateful.
51:49 AND THE PLOT TWIST IS THAT IT WAS AN AMERICAN COMPANY KILLED THOUSAND, LEFT MANY HALFDEADS, AND WHEN ASKED TO PAY FOR THEIR CRIME, AMERICA BLESSED THEM
@@absolutium I'm Ukrainian, my father voluntarily went to the war when mass invasion has started, in city Mariupol died more then 100 000 civilians, all the the territory of Ukraine was bombarded more then 3500 times by high distance rockets with weight over 2 tones, do you need more to ask? The reason of this war is because Putin is 70 years old and has a lot of complexes and wants to restore USSR
@@absolutium you just a little child who supports Nazi and genocide of peaceful citizens of Ukraine, you think it's funny and getting satisfaction from human death🤬 I wish you to satisfy your peaceful life!
I won to ask you about something do the destrubution you are using make deference?. I mean i'm arch user and we have black arch repo we can install all the tools we need .
OTW is godly. I was genuinely surprised to hear him complain about YT vids though. There is an overlord behind it that can't be subverted if you actually want to get a message out. It was a touch naive as no TH-camr can simply forego legality and compliance in such a public forum. It's ironic coming from a man who won't reveal his real name on a channel of someone who does. Certainly, the idea of these skills is for covert, potentially nefarious (relatively speaking) activities; but this is for educational purposes!! Awesome work, David.
Can somebody in this community tell me, why it is a threat, to send mobilephone (private Android) pictures via bluetooth to a work-windows client/labtop. Please.
Is your CCTV secured? Are your IP cameras safe? Too easy to hack?
// MENU //
00:00 ▶ It Didn't Stop Us!
00:43 ▶ TH-cam Is Not Realistic
02:58 ▶ Hacking Is Boring?
04:12 ▶ In An Alternative Universe
04:35 ▶ High vs Low Value Targets
07:09 ▶ Hacking Ukraine CCTV Cameras
08:04 ▶ Why Aren't Cameras Well Protected?
10:48 ▶ Why Hack Ukraine CCTV Cameras?
12:45 ▶ Finding Online Systems Anywhere In The World
14:47 ▶ Don't Cameras Have Passwords?
17:36 ▶ Hack My Spouse//The Most Common Request
19:30 ▶ Convert Tools To Cyrillic?
20:20 ▶ Remote Camera Hacking
20:56 ▶ Camera Hacking Summary
21:13 ▶ Dictionary Attack or Brute Force for Remote Hacking?
22:32 ▶ Remote Hacking Takes Teamwork
22:52 ▶ Cameras Blocking Login Attempts
23:23 ▶ Bad Practices//How To Secure CCTV Cameras
24:42 ▶ Don't Be An Easy Target!
25:43 ▶ Basic Security To Have On Your Systems
28:42 ▶ Users Aren't The Flaw!
30:07 ▶ Russia SCADA Attacks
30:38 ▶ SCADA Swiss Army Knife
31:21 ▶ Stealing Schneider Password Hashes
33:40 ▶ DDoSing SCADA Systems Is Deadly
36:53 ▶ Russian Hackers//Overrated?
40:22 ▶ SCADA Malware Used On Ukraine Systems
42:54 ▶ Warning//Russia Coming After Hackers
44:16 ▶ Phishing Attempts on OTW
45:07 ▶ How To Protect Yourself
46:00 ▶ Social Engineering//Most Major Hacks
47:46 ▶ Social Engineering//Pentesting
49:11 ▶ SCADA Malware//Stuxnet
50:56 ▶ SCADA Malware//Triton
51:25 ▶ Bhopal Disaster//What Could Happen
52:39 ▶ Future Videos//Leave A Comment!
This is my third interview with the professional hacker Occupy The Web. In this video we discuss hacking CCTV, IP cameras and SCADA (supervisory control and data acquisition).
// Previous videos //
OTW video 1: th-cam.com/video/GudY7XYouRk/w-d-xo.html
OTW video 2: th-cam.com/video/uXbGQiXsRes/w-d-xo.html
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: th-cam.com/users/davidbombal
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw
// Occupy The Web social //
Twitter: twitter.com/three_cube
// Occupy The Web books //
Linux Basics for Hackers: amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
// In the News //
Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems: www.wired.com/story/pipedream-ics-malware/
Ukrainian power grid 'lucky' to withstand Russian cyber-attack:
www.bbc.co.uk/news/technology-61085480
An Unprecedented Look at Stuxnet, the World's First Digital Weapon
www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
// Other books //
The Linux Command Line: amzn.to/3ihGP3j
How Linux Works: amzn.to/3qeCHoY
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
lulz, imagine. ddosing his website with mirai botnet. His website is gone...
Tech demos is my vote. Kinda like what u did with Wireshark. Great content.
@@moh2trippy brother i need help from you/kindly response
there is not a system or network out there that can preform a full brute force! with 120 characters in the set and "wifi" 63 possible character length is 120to the 63rd power possible combinations....create the wordlist do you have 8000 PETABYTES of storage?? use crunch and pass it through aircrack....do you have 100+ years it takes that long to read the list....this aspect of encryption is still secure but as always people are the weak link in the chain 8 a's isnt a password that will survive a dictionary attack. depending on your paranoia level password length of 12 is around 5 years run 14 is over 20 years .
Mr. David .. Can we open the wallet.dat file through a hacker? Or forced to a cracking method.. And if it is a cracking method: What is the fastest program that reads a file full of code to decode wallet.dat file.
I'm not a hacker or working in IT, but damn I loved this video, watched whole hour, keep em coming David, much appreciated 👏
Are we going to have a Sven-off here?!?
I do work in IT, and a big fan of the channel and really enjoy listening to OTW.
Keep the good stuff coming!
I’m new to this whole community and coding. But this has become my favorite channel and OTW just has such a positive energy, he really makes me comfortable with starting in this field. Very welcoming and encouraging. Thank you for this. I can’t believe that these things are available. I doubt this will be always accessible online with all of the censorship closing in. Gotta invest in some books while I can!
I like the fact that the owners of the system have to be aware of all its fails to protect themselves, but the hacker only needs one to get in
Aa a defender, it makes life hard.
"Today, we were unlucky. But remember we have only to be lucky once. You will have to be lucky always" - Provisional IRA statement
It stops being a closed-circuit tv the minute you connect it to a internet capable monitor.
best comment
@@radjalomas8854 I was going to say your old clunker of a car car never gives your info to the government, until it has its CPU scanned by the mechanic while diagnosing the strange new sputter in your engine. Then I remembered how fun it is to think about how new cars now give your into to advertisers while your passing a billboard so that, that billboard will display advertising personalized just for little ole you.
I am a 13 year old child from india i had interest in hacking but my parents thought it waste of time so i started watching david sir videos and now i am very thankful to such a great man who provides us with such extraordinary content for free. Imagine getting heart from david sir 🥰🥰
Don't give up on your dreams.
@@davidbombalthank you sir for the heart and i will try my best
same here bruhhh
Sir same here I am 16
Hi David sir,how are you,I need ur help,plz send me s/w of pegasus
I like to hear Master OTW and David Bombal speaking. Both are giving a lot of information for free and they helped me a lot. edit: (late comment, i have watched this video back ago)
It blows my mind how people do not understand that everything wireless is a compromised device. It's a great example of desire, consumerism, and the expression 2+2=5 .
Can POE CCTV be hacked if its not connected to the internet ... . Or if someone had access to the system prior to installing a sim card
I always get new information to help the society with what i learn and i implement them to the last detail. Much thanks David Bombal. I need to learn more on CCTV and IP camera hacking... ethically.
Great point, and I am glad OTW is the person pointing this fact out. Utube sells theater.
You are a legend people, Proud of taking your courses.
How??
Thanks David.. and Thanks to Occupy The Web... I Download all your video 742 and 14 interview's with OTW all Downloaded I'm sleeping 4am every I know 1day they I will smile with this skill. Watching OTW again and again and again
I just loved the way he was talking, very nice and soothing.
"Who's using all these ports?"
*"I don't know."*
Yeah, I feel that.
Sometimes, it's a choice between laboriously checking every service your company runs, then checking what parts of that service you actually use, then systematically closing the ports that don't come up on that list, only to then find out there's a bunch of unlisted ports or even ports that were actually port ranges that you just closed, then going back and reopening 90% of what you just closed...
OR...
Leaving them open and praying your off-prem backup solution is as good as they say it is.
This content is addictive ❤️
I'm happy to hear that 😀
True
*THURSDAY, SEPTEMBER 1, 2022*
*MESSAGE TO Hacker ANONYMOUS*
Hackers under Criminal control are involved in an EXTORTION against me. *If there are any Hackers who are NOT UNDER CRIMINAL CONTROL, PLEASE HELP ME. May GOD Bless you ALL!!!*
For me, this is meditation.. so relaxing somehow to just listen to them talking.
So true, much better then Netflix
I have watched a lot of your videos and have learned a lot and enjoyed them all.
Please help me. I'm convinced that my ex has found a way to hack my tv and turn it into a recording device when I use it to cast videos. My screen turns a bit snowy and it's followed by a bright blue dot. Is it possible to make part of someone's led smart tv a camera?
Any flat surface can have a thin plastic ‘screen protector’ looking film -- placed on or between layers… this film has rainbow looking prisms when you see light reflect off of it. They do not need any additional power source. Something similar to an old holographic trading card…. One of their favorite implementations they put between people’s optical lenses on their prescription glasses. No secrets for you…. Unless you start doing most sensitive private things; blind…. So imagine what can be done with an electronic equivalent:
speaker is to microphone
Tv is to camera….
Inverted image sensor chip….
You can totally plug a speaker into the mic input on your laptop and crudely listen to anything in that room…. Apply that same inverse relation to images…. And the nice big cheap flat always plugged in device in front of our faces in every room in our lives!!!!
Your ex didn’t do anything; your tv was designed to spy on you… he just tuned into ur broadcast….
So just because he didn’t do anything ; doesn’t mean you are wrong….. so don’t let people dismiss your concerns bc they are very valid and by no means do you back down when the ‘gang stalkers start telling you to grab ur foil hat…..
however you’re prob only feeding his tiny ego by posting online begging for help dealing with his insignificntbvaluable as yesterdays newspaper making it out to sound like he is some whimsical hacker;
when in reality he prob has friend who helped explain to him ‘it was possible and someone could blah blah blah ,
something they government has used to spy on us since the Regan babies….
Your every video is such amazing information and also i like your hacker friend i love to join his classes if possible but I know it's not possible but he is going to be my road map toward my goal.
Will pointing a green or red laser pointer into the lenses of a doorbell/ip camera cause permanent damage or malfunction?
I really like OTW ❤
He has such a good sense of humour 😅
How does link attack work 45:09 if u click ur done? Single click what if antivirus stops it?
my job is to set up IP cameras mainly and i do a lot of programing and security jobs too and can say this with confidence that almost 95% off the places i go they still have the default pass on and only the big company's or very important places like government related or some few personals do care about securing the system 😶😮💨😔😔
Getting started becoming a master hacker
Did they ever drop the video demonstrating exploiting or methodology of it
Hi, this is so true, they can hack anything, they can see everything I do on my iPad, from putting a note under NOte, seeing all pictures that I took. Please help stop this, or advices, explain how it happening and how to stop and prevent it, thank you very much
Change your iCloud password right now, and make sure no one is around you when you do it.
I'm Alex from Nigeria
I have passion for computer hacking but i don't have you will sponsor me to get a PC coz ma parents can't afford it.
I really love Mr David videos, he's very intelligent and best when teaching
Love you sir 🤗
Remember this guy is protecting the people of the Ukraine. Those soldiers of Russia will be looking over their shoulders for all those cameras. You are a warrior sir
you are now in top TH-cam best hackers group
My routers password can only use 32 characters , what is most secure ? Random Text Numbers n Symbols? Or A long random sentence? I've had password apps say the Sentence I used was Very Strong BUT another said it was weak! So which is the most secure kind of password for Routers n CCTV Cams ??
Doesn't matter. 32 characters long would take millions of years to guess. Just have a little entropy in it, you'll be fine.
Of course, that doesn't stop a backdoor or password reset.
Hello, David. Do you know any CCTV or Camera hidden detector that really works ?
mr. robot was my favourite game on the c64!!
Where can we learn hacking in real world ??
Online ... lmao
Hi David...I don't know if you can assist most of Companies are collapsing in SA with flashing they guy's came and ask for Quotation myb for R400,000 and they paid for it but they fund's just reflect and you released your Goods after few Hours the money reversed and nw they attacking car's they a tool called Flash SQR400 and flash V9.5 can you and OTW show us how does it work and how to prevent this before it was a Cheque Book nw flashing fake fund's.
If someone denigrates over cyber security, they're probably also denigrating in other areas.
I'd like to watch traffic cams near me. I have no skill in these matters. How do I do that?
Bro... i was like.. i know the voice of that guy from somewhere.. is it Steven Sharif from Ashes of Creation?
AGREE... writing code that works takes WEEKS
The sketch-o-meter on this one is off the charts, and I'm basking in it with zero apologies! 😎👏
Like the music at start , can anyone share me the full music ?
Thank you Hikvision for making accessing CCTV cameras easy to get into
Been trying their systems recently 🙄
to practice pleas show me the way to hack Wi-Fi and IP camera.
I woke up to my camera night mode on clicking on. If Im not on my camera it shouldn't be on. It's not set to turn on for anyone but me. No motion. Nothing but me. Would my neighbor who works from home hack my camera? Yes. He lives in range of my wifi
Update: My Livingroom and front door clicked on after I got up 20 minutes later. After changing password.
WHAT ARE THE STEPS TO PROTECT OUR SELF PLEASE
Knowledge and wisdom
Loved this video. Listening here at work and was hoping to see a little bit of technical examples but we can't be too greedy. Nevertheless, I loved to hear some of the stories OTW had to share. It's great insight into what the real world is seeing. I wish the video was longer haha. I hope you get to have more collaborations with OTW, I'll be looking our for them. Thanks David!!!
As an American, it's the Ukraine, U.S. and NATO forces I would be watching.
The classic proxy 🙃
Can those cameras capture war atrocities regardless of who’s doing it? That’s wild!
OtW sounds like donald sutherland!...lol Love the vid, thanks
i would like to help me know the tools someone can use to hack cameras systems ?
I just love how you interview real hacker and it's just amazing 😍
Thank you. It's important to interview people like OTW who are willing to share their knowledge and experience with us.
@@davidbombal Can I be a hacker over 40?
he's also the real hacker
This is why none of my cameras have internet access.
I have been targeted for 6 years now. I am finally being made to learn. A covert Narcissist is the name of these people
You are so amazing bring more people who can show us in a real work hacking technique to learn for future please and thank you
Hey, what is his classes
My motivation in Cyber Security, is to secure Cochlear Implant Security.... Thank you, so much.
anyone know why the FAA shut down the cams...and also same time..live cams on Northern Calif. disappeared off youtube. last week I think.
Sir how can I buy his course
-Great to see the teachers together again...!!!
-So common network security cameras are basically mini-servers that can be accessed by SSH like anyone, and that have a REST API structure where you can read their video stream, and in more advanced systems these videos are concentrated on recording servers, but which are networked to be viewed can be accessed and hacked.
-In fact, in general, they are IoTs with security that are very simple and easy to access.
-I remember hacking the cheap Chinese cameras I bought and instead of using them with proprietary software I figured out how to capture the formats and decode this stream on a server that brought them all together on a machine at my ranch that was pretty easy.
-Thanks for the knowledge...!!!
Good luck 👍🏻
Basically dont connect your dvr wired cameras to the internet.
Yeah wide open Chinese potato cameras are horrible. I'm surprised there aren't really companies cashing in on high definition quality cameras yet. Even dash cameras still can't read a friggin license plate. It's mind boggling.
I heard him say that the Russians never give up. They are always trying to hack him and different stuff. My question is how does he know? It is actually Russians and not a hacker pretending to be a Russian.
your offer thar everybody is a "haker" who send you some info/link... many people doesnt know that, so why you dont offer safe opening info/data/link what you got on email, facebook or other places... no you saying go offline dont trust anybody.... that doesnt work in our world... please explain
Can you guys track down a stolen MacBook… apparently apple says it’s impossible..!!
Yes indeed
For me? only wired cameras, closed system, no internet access.
I don't see why to make my cameras available to the world IMHO.
Many years ago, I was driving with friends around my city at night, intercepting unprotected or badly protected wireless signals, we have seen strange things 😁, for the camera inside the house, we printed a screenshot and left it in the letterbox, with written to "secure your cameras".
We were a bit of wireless robin hoods, we had a lot of fun.
Occupy and his books are incredible! So is my man David. David + whatever mind he has on the show = greatness. Thank you both gentlemen! Can’t ever get enough!
One thing that I don't like is he speaks about his hacking and all those things he did, but with no proves, it's always just speech.
I want to start hacking but I don't How too
But I understand your video I like I don't know if you can help😢
How to get a seat for December class?
The sticky strip from a Post-it note makes perfect webcam security! 🤣
In my opinion, serveilence cameras should only be installed in a public space or places that do not need high privacy. And if it's in the public realm, nobody should claim their privacy on that.
If you don't want people know where you're going, then just fuckn stay at home!
How to contact him or watch his youtube channel name plz?
I feel like I'm listening to Davida Bombal and Nahamsec right now! Just saying
I have a request, can y'all discuss what would happen if Joe Biden was to perform brain surgery on someone. Then discuss if Trump was a patient or not . Very curious
What model is that Stinkpad used by the professional hacker Occupy The Web?
That is a stockphoto. I do not know what he uses.
David how can i join his hacking class?
Master of the hackers game
Hi,
I've completed many courses in cyber security including many in SCADA security and I have good hands-on in SCADA security. Now I'm looking for an entry-level job in SCADA security. If anyone can refer me, I'll be very grateful.
How many digits password to strong password to protect on hacker
80
Where i can contact you i need soem help please
@crowgramm3r
06-17-22
No electricity,no every thing.
wow im so early
Thank you for your support!
51:49 AND THE PLOT TWIST IS THAT IT WAS AN AMERICAN COMPANY KILLED THOUSAND, LEFT MANY HALFDEADS, AND WHEN ASKED TO PAY FOR THEIR CRIME, AMERICA BLESSED THEM
Thank you for helping Ukraine in such a hard time!!! You're saving human lifes!!!
If you think Ukrn are the "good guys.. you are really naive.
@@absolutium I'm Ukrainian, my father voluntarily went to the war when mass invasion has started, in city Mariupol died more then 100 000 civilians, all the the territory of Ukraine was bombarded more then 3500 times by high distance rockets with weight over 2 tones, do you need more to ask? The reason of this war is because Putin is 70 years old and has a lot of complexes and wants to restore USSR
@@FREEONION Yeah no..
As I said naive.. are you familiar with the concept of Dialectics?
@@absolutium you just a little child who supports Nazi and genocide of peaceful citizens of Ukraine, you think it's funny and getting satisfaction from human death🤬 I wish you to satisfy your peaceful life!
do you have some hacking class website to refer???
Yes
He’s tried to hide his identity but it’s clearly Mr. Mackey! Mm’kay
very interesting as usual 😊
Glad you think so!
I won to ask you about something do the destrubution you are using make deference?. I mean i'm arch user and we have black arch repo we can install all the tools we need .
David, Have you done anything on Shodan ? would love to see some content on this. Thanks
Thanks got I am a dumm person.
🤣🤣🤣🤣
How to do it in 2 minutes? Easy, try default username/passwords.
OTW is godly. I was genuinely surprised to hear him complain about YT vids though. There is an overlord behind it that can't be subverted if you actually want to get a message out. It was a touch naive as no TH-camr can simply forego legality and compliance in such a public forum. It's ironic coming from a man who won't reveal his real name on a channel of someone who does. Certainly, the idea of these skills is for covert, potentially nefarious (relatively speaking) activities; but this is for educational purposes!! Awesome work, David.
Amazing as always ❤️
Every time I get surprised by your content and topics and how good they are ❤️
Thank you! I'm always trying to make fresh and interesting content! Glad you are enjoying it 😀
I want to learn ethical hacking & wanna become ethical hacker but i can't maintain my consistency 😓 in middle & i forgot from where i can start 😖
You're welcome! Hope you enjoyed the video :)
@@davidbombal same problem please give some motivation david sir.
Is this one thing to make things more secure? Change the ports which needed programs must have opened?
Can somebody in this community tell me, why it is a threat, to send mobilephone (private Android) pictures via bluetooth to a work-windows client/labtop. Please.
Two True Call
As a user of SDR and DragonOS i would love to see more on that topic. Have a great day David and thanks for the video's!
How do I prevent being hacked?
I love your vedios it's very good content love From India 🇮🇳