Тёмный
LufSec Cyber Security
LufSec Cyber Security
LufSec Cyber Security
Подписаться
Cyber Security Training and Consulting
Free E-Book Cyber Security Career Guide
3:19
2 месяца назад
LufSec
0:09
2 месяца назад
Dark Web & Deep Web
1:20
2 месяца назад
AWS Shared Responsibility
7:52
4 месяца назад
The Two Faces of GenAI in Security
2:32
4 месяца назад
How IoT is Transforming Our World in 2024
4:06
6 месяцев назад
How IoT is Transforming Our World in 2024
4:06
6 месяцев назад
Introduction to IoT Hacking 00 01
1:06
11 месяцев назад
Introduction to IoT Hacking 00 02
0:17
11 месяцев назад
LufSec Cyber Security Weekly News  #1
11:32
11 месяцев назад
02 01 Practical Web App Pentest
5:12
Год назад
01 05 Practical Web App Pentest
4:38
Год назад
Комментарии
@murrij
@murrij Месяц назад
This is great. Thank you
@Rinostar
@Rinostar Месяц назад
Canon ≠ cannon
@Lufsec
@Lufsec Месяц назад
That's correct. Canon is different than Cannon. I don't see anywhere in the text that I suggest that Canon was breached.
@Notactuallynerd_the_Avgeek_5
@Notactuallynerd_the_Avgeek_5 Месяц назад
I actually used that one antivirus called..... I forgot whats the name but I'm safe from the incident
@davidlee50
@davidlee50 Месяц назад
what about jammer issues, like how long a jammer can stay on to be area effective? And don't get me started on EMP generators.
@Lufsec
@Lufsec Месяц назад
great question! Jammers can be tricky-how long they can stay on to be effective really depends on their power output and the area you’re trying to cover. Generally, a jammer needs to be pretty close to the target and continuously on to block signals effectively. However, keep in mind that the use of jammers can be illegal in many places due to their potential to disrupt communications beyond just car fobs. As for EMP generators, they’re a whole different level, capable of wiping out electronics, but they’re also highly regulated and not something you’d typically see in everyday scenarios. Always good to think about these things from both a technical and legal standpoint!
@blacktion-blackplusactione2141
@blacktion-blackplusactione2141 Месяц назад
Bruuuuuuuuh!!!😂😂😂😂
@shogunstance3750
@shogunstance3750 Месяц назад
What the fuck
@cjcirignano
@cjcirignano 2 месяца назад
Sounds like something Bugs Bunny would say.
@abiyyupanggalih854
@abiyyupanggalih854 2 месяца назад
Wow
@DrBrightSCP
@DrBrightSCP 2 месяца назад
One of the reasons i use legit porn sites everything is vetted on the site so i never warrior about what im looking at is illegal.
@BoDiddlydodah
@BoDiddlydodah 2 месяца назад
So if cyber security professionals agree that using a VPN doesn't actually protect one's privacy, what's the logic in using one while surfing the dark web?
@Lufsec
@Lufsec 2 месяца назад
First of all, it depends on the VPN. That are some we all know they share your data and they should not be trusted. But there are some that do better for your privacy. Also, in security it's all about layers of protection. VPN in this case is another layer of protection. Using a multi-layered security approach increases your chances for privacy. However, it's essential to use a VPN as part of a broader security strategy. No single tool can ensure complete privacy, but a combination of VPN, Tor, good browsing practices, other security measures, and awareness of potential risks can significantly enhance your security and privacy while exploring the dark web.
@nicknation1865
@nicknation1865 2 месяца назад
Idk how you did it. but this ad is worse then a car commercial if not worse
@williamcroteau427
@williamcroteau427 3 месяца назад
There is no possible way that this contraption shatter that mug
@shumumawella
@shumumawella 3 месяца назад
that was a terrible analogy
@Lufsec
@Lufsec 3 месяца назад
I found it fun... :-)
@vbyte.
@vbyte. 3 месяца назад
got them all
@illumin42
@illumin42 3 месяца назад
I guessed all the way through and got everything right 😂
@Lufsec
@Lufsec 3 месяца назад
🤣
@LiteralSwan
@LiteralSwan 3 месяца назад
lil bro what does this have to do with chocolate covered strawberries
@WUBtile
@WUBtile 4 месяца назад
Wtf. Mans got a duck tail spoiler on the back of his head.
@botirlasorin
@botirlasorin 8 месяцев назад
but recording a jammed signal wouldn't also contain jammed signal? 😂
@Lufsec
@Lufsec 3 месяца назад
You did not get the point. When I jammed the signal, I knew exactly what noise I generated. After that, you only need to filter the noise, you know. It's effortless to achieve. lol
@868_4_Life
@868_4_Life 10 месяцев назад
GREAT video. Thanks for sharing but you are MURDERING that keyboard. More importantly, thanks for sharing your knowledge.
@slik560
@slik560 10 месяцев назад
Thanks for educating a new generation of car thieves.
@fullpower8382
@fullpower8382 10 месяцев назад
Top
@markking1609
@markking1609 10 месяцев назад
So if i wantsd to get i. And start my car what do i need
@damonp6366
@damonp6366 11 месяцев назад
🎉 'promosm'
@pnkswet2811
@pnkswet2811 2 года назад
hey how did you sniff the ble traffic
@hustlersinnovation2085
@hustlersinnovation2085 2 года назад
I love this video
@damkayaker
@damkayaker 2 года назад
So you all are a bunch of car thieves?
@Lufsec
@Lufsec 2 года назад
I'm really disappointed with your point of view. We are raising awareness so that the industry can build more secure products.
@damkayaker
@damkayaker 2 года назад
@@Lufsec - While at the same time showing thieves how to hack fobs.
@defalt7651
@defalt7651 8 месяцев назад
@@damkayakerthats how cybersecurity works retard
@andrewduffy2906
@andrewduffy2906 3 месяца назад
​@@damkayakerI would think the ones that do it to steal cars already know about this. But for me would be good to set up a business is someone has lost keys and I could charge to get them into there car.
@user-ok6of2oz4w
@user-ok6of2oz4w 2 года назад
would like to know were and how often you hold conferences ???
@NottsOnline
@NottsOnline 2 года назад
Great Video thank you
@hernancuenca7581
@hernancuenca7581 2 года назад
Hola tengo un hackerf portapack alguien me puede ayudar para poder acerlo funcionar? Les agradeseria
@skitzszn1342
@skitzszn1342 2 года назад
just stole a audi s3 thanks boy
@bigred8022
@bigred8022 3 года назад
What’s the thing on your shelf behind you with all the led’s I like it
@lferraricyber
@lferraricyber 3 года назад
Thats a Defcon Badge - Car Hacking Village badge rom 2018
@iceycoldyy7187
@iceycoldyy7187 3 года назад
arent you using virtual machine?
@aloualou56
@aloualou56 3 года назад
Really good vid. Now i understand better the network settings in kali linux, and i can finally give my kalli machine a static ip. Can anyone tell me why after running python server, it made me root with sudo permitions, bt it didn't opened the settings??? it is making me do ANYTHING only with terminal!
@Tony_Ryders
@Tony_Ryders 3 года назад
Video is underrated but you did a good job explaining it. If I may ask, I am completely new to Linux -- what are groups for? With Windows, I know security & permission groups. With Linux, you have chmod to set the permissions but what's the point of that if all groups have equal permissions? I must be overseeing something because it doesn't make sense at all.
@Dowent
@Dowent 2 года назад
Each file has file mode bits attached to it, that is what chmod changes. A file has an user (owner) {u} associated with it, a group {g} and user not in that group {o}. When invoking chmod, you assign privileges (read, write, execute) for these 3 categories. So when put users in a group and then associate this group with a file with a group, you can set a privileges when interacting with the file.
@bashabkr4077
@bashabkr4077 3 года назад
No one does it better than the good admin SCOFFYCYBERTECH ŌÑ instagram this professional recoverd my stolen CAR
@asishkorada438
@asishkorada438 3 года назад
Can u send me presentation link
@cytheonltd7106
@cytheonltd7106 4 года назад
Join the "IoT Penetration Testing (BLE)" online course for 5.99 £ only (original price: 49 £) . Get Certificate of Completion ! Offer Expires 4-Oct-2020! Join Now! www.digitaldefense.academy/course/hacking-iot-ble
@adomsalbright8629
@adomsalbright8629 4 года назад
I never knew I could recover my car until I was referred *ANTONIO_EDDIE_SOFT* via iG and *WHATSAPP* + 1 337-243-5595👈 real account. He's reliable and trustworthy 💯
@adomsalbright8629
@adomsalbright8629 4 года назад
I never knew I could recover my car until I was referred *ANTONIO_EDDIE_SOFT* via iG and *WHATSAPP* + 1 337-243-5595👈 real account. He's reliable and trustworthy 💯
@aamirali9968
@aamirali9968 4 года назад
Nice video
@haluklacin4190
@haluklacin4190 4 года назад
i got this error: Error: connect error: Function not implemented (38)
@josephwisniewski3673
@josephwisniewski3673 4 года назад
OK, first: if you're going to call yourself a "Cyber Security" operation, it would probably be a good thing if you learned a little about the technology you talk about. Bluetooth Low Energy is not, and has never been, a "lightweight subset of classic Bluetooth". It was introduced as "Wibree", for an entirely different purpose than Bluetooth and every single thing was incompatible: spread spectrum, modulation, data rates, message formats, everything. Like Bluetooth or Zigbee, Wibree filled up the 2.4GHz radio chipsets of the day, so if you wanted more than one service in a box, you bought more than one chipset, and you wrote stacks that would interoperate and keep the multiple radios out of each other's way. Well, Wibree turned our to be a complete market failure, so they rebranded it "Bluetooth Smart". This also failed (as all products with the initials "BS" do) because you still needed separate transceivers for real Bluetooth and this "smart" thing. But chipsets got bigger and better, so it was common to have 2 SDRs on a chipset, with 2 stacks, so you could have a single chip BT/WiFi or BT/Zigbee, or... Bluetooth/smart. At that point, you had Bluetooth 4.0, which simply swept under the rug the fact that the LE part of 4.0 was an entirely different system. Next: seriously? How many times did you say "exploit" in this little video? A dozen? You sound like one of those13-year-old kids who calls himself a L337 HAXR online, not a cybersecurity expert. You're using a device for the purpose for which it was intended, using protocols that are actually available from the manufacturer. You're one step removed from claiming you've "hacked" a phone by turning it on and sending a friend a text.
@salamdrik
@salamdrik 4 года назад
Hi is there a way to record USB Jostic or Usb mouse signals that comming into a pc on the fly and then replay again same signals to pc that way having sort of a macro. Problem is i can find much on usb recording devices as there are RECORDING audio devices which not ones i need. I would like to record inputs from my steering wheel and pedals that go over usb port to pc to be able replay them whit out me doing input Thank you for your time.
@evanconnect8384
@evanconnect8384 4 года назад
I sell these devices
@igorDX1000
@igorDX1000 4 года назад
Want to buy one a.nehr1988@gmail.com
@JA-yy6bd
@JA-yy6bd 4 года назад
I want one ?
@anthonyreid1435
@anthonyreid1435 3 года назад
Do you still sell these devices? Email me at Anthony.reid31b@gmail.com
@markking1609
@markking1609 10 месяцев назад
How much
@clientesym
@clientesym 4 года назад
the big question is where to find pre made dictionaries.
@Sbensbeve
@Sbensbeve 4 года назад
FBI OPEN UP
@kdogcurry
@kdogcurry 4 года назад
Omg in the first person to comment? I found your video trying to trouble shot my internet connection. I'm very new to kali. Im learning a lot though considering. Would you be willing to help me? I didnt want to write a bunch until you replied. Thanks and I'll tell you what you need to know if your willing. I think it might have something to do with DHCP confusion on routers part but Idk for sure.
@lafayetteplace3031
@lafayetteplace3031 4 года назад
Surprised this has not been removed by Google. Thank you for the video
@Pxlarizar
@Pxlarizar 4 года назад
Because it’s about hacking
@imbalos
@imbalos 4 года назад
@@Pxlarizar its not illegal
@Pxlarizar
@Pxlarizar 4 года назад
@@imbalos hacking illegal
@931seeker
@931seeker 4 года назад
Oldwick NJ
@hackerdepth8600
@hackerdepth8600 4 года назад
How to get full course?