Is your CCTV secured? Are your IP cameras safe? Too easy to hack? // MENU // 00:00 ▶ It Didn't Stop Us! 00:43 ▶ RU-vid Is Not Realistic 02:58 ▶ Hacking Is Boring? 04:12 ▶ In An Alternative Universe 04:35 ▶ High vs Low Value Targets 07:09 ▶ Hacking Ukraine CCTV Cameras 08:04 ▶ Why Aren't Cameras Well Protected? 10:48 ▶ Why Hack Ukraine CCTV Cameras? 12:45 ▶ Finding Online Systems Anywhere In The World 14:47 ▶ Don't Cameras Have Passwords? 17:36 ▶ Hack My Spouse//The Most Common Request 19:30 ▶ Convert Tools To Cyrillic? 20:20 ▶ Remote Camera Hacking 20:56 ▶ Camera Hacking Summary 21:13 ▶ Dictionary Attack or Brute Force for Remote Hacking? 22:32 ▶ Remote Hacking Takes Teamwork 22:52 ▶ Cameras Blocking Login Attempts 23:23 ▶ Bad Practices//How To Secure CCTV Cameras 24:42 ▶ Don't Be An Easy Target! 25:43 ▶ Basic Security To Have On Your Systems 28:42 ▶ Users Aren't The Flaw! 30:07 ▶ Russia SCADA Attacks 30:38 ▶ SCADA Swiss Army Knife 31:21 ▶ Stealing Schneider Password Hashes 33:40 ▶ DDoSing SCADA Systems Is Deadly 36:53 ▶ Russian Hackers//Overrated? 40:22 ▶ SCADA Malware Used On Ukraine Systems 42:54 ▶ Warning//Russia Coming After Hackers 44:16 ▶ Phishing Attempts on OTW 45:07 ▶ How To Protect Yourself 46:00 ▶ Social Engineering//Most Major Hacks 47:46 ▶ Social Engineering//Pentesting 49:11 ▶ SCADA Malware//Stuxnet 50:56 ▶ SCADA Malware//Triton 51:25 ▶ Bhopal Disaster//What Could Happen 52:39 ▶ Future Videos//Leave A Comment! This is my third interview with the professional hacker Occupy The Web. In this video we discuss hacking CCTV, IP cameras and SCADA (supervisory control and data acquisition). // Previous videos // OTW video 1: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-GudY7XYouRk.html OTW video 2: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-uXbGQiXsRes.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RU-vid: ru-vid.com // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw // Occupy The Web social // Twitter: twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh // In the News // Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems: www.wired.com/story/pipedream-ics-malware/ Ukrainian power grid 'lucky' to withstand Russian cyber-attack: www.bbc.co.uk/news/technology-61085480 An Unprecedented Look at Stuxnet, the World's First Digital Weapon www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ // Other books // The Linux Command Line: amzn.to/3ihGP3j How Linux Works: amzn.to/3qeCHoY // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
there is not a system or network out there that can preform a full brute force! with 120 characters in the set and "wifi" 63 possible character length is 120to the 63rd power possible combinations....create the wordlist do you have 8000 PETABYTES of storage?? use crunch and pass it through aircrack....do you have 100+ years it takes that long to read the list....this aspect of encryption is still secure but as always people are the weak link in the chain 8 a's isnt a password that will survive a dictionary attack. depending on your paranoia level password length of 12 is around 5 years run 14 is over 20 years .
Mr. David .. Can we open the wallet.dat file through a hacker? Or forced to a cracking method.. And if it is a cracking method: What is the fastest program that reads a file full of code to decode wallet.dat file.
I’m new to this whole community and coding. But this has become my favorite channel and OTW just has such a positive energy, he really makes me comfortable with starting in this field. Very welcoming and encouraging. Thank you for this. I can’t believe that these things are available. I doubt this will be always accessible online with all of the censorship closing in. Gotta invest in some books while I can!
@@radjalomas8854 I was going to say your old clunker of a car car never gives your info to the government, until it has its CPU scanned by the mechanic while diagnosing the strange new sputter in your engine. Then I remembered how fun it is to think about how new cars now give your into to advertisers while your passing a billboard so that, that billboard will display advertising personalized just for little ole you.
It blows my mind how people do not understand that everything wireless is a compromised device. It's a great example of desire, consumerism, and the expression 2+2=5 .
I am a 13 year old child from india i had interest in hacking but my parents thought it waste of time so i started watching david sir videos and now i am very thankful to such a great man who provides us with such extraordinary content for free. Imagine getting heart from david sir 🥰🥰
"Who's using all these ports?" *"I don't know."* Yeah, I feel that. Sometimes, it's a choice between laboriously checking every service your company runs, then checking what parts of that service you actually use, then systematically closing the ports that don't come up on that list, only to then find out there's a bunch of unlisted ports or even ports that were actually port ranges that you just closed, then going back and reopening 90% of what you just closed... OR... Leaving them open and praying your off-prem backup solution is as good as they say it is.
I always get new information to help the society with what i learn and i implement them to the last detail. Much thanks David Bombal. I need to learn more on CCTV and IP camera hacking... ethically.
I like to hear Master OTW and David Bombal speaking. Both are giving a lot of information for free and they helped me a lot. edit: (late comment, i have watched this video back ago)
Thanks David.. and Thanks to Occupy The Web... I Download all your video 742 and 14 interview's with OTW all Downloaded I'm sleeping 4am every I know 1day they I will smile with this skill. Watching OTW again and again and again
I am safe but I know who is not, hacking should not be used for evil. a power user can do a lot with it, a responsible person can do good things, but it is a risk for the bad ones ( respect ) !...
my job is to set up IP cameras mainly and i do a lot of programing and security jobs too and can say this with confidence that almost 95% off the places i go they still have the default pass on and only the big company's or very important places like government related or some few personals do care about securing the system 😶😮💨😔😔
Your every video is such amazing information and also i like your hacker friend i love to join his classes if possible but I know it's not possible but he is going to be my road map toward my goal.
Remember this guy is protecting the people of the Ukraine. Those soldiers of Russia will be looking over their shoulders for all those cameras. You are a warrior sir
I'm Alex from Nigeria I have passion for computer hacking but i don't have you will sponsor me to get a PC coz ma parents can't afford it. I really love Mr David videos, he's very intelligent and best when teaching Love you sir 🤗
*THURSDAY, SEPTEMBER 1, 2022* *MESSAGE TO Hacker ANONYMOUS* Hackers under Criminal control are involved in an EXTORTION against me. *If there are any Hackers who are NOT UNDER CRIMINAL CONTROL, PLEASE HELP ME. May GOD Bless you ALL!!!*
Please help me. I'm convinced that my ex has found a way to hack my tv and turn it into a recording device when I use it to cast videos. My screen turns a bit snowy and it's followed by a bright blue dot. Is it possible to make part of someone's led smart tv a camera?
For me? only wired cameras, closed system, no internet access. I don't see why to make my cameras available to the world IMHO. Many years ago, I was driving with friends around my city at night, intercepting unprotected or badly protected wireless signals, we have seen strange things 😁, for the camera inside the house, we printed a screenshot and left it in the letterbox, with written to "secure your cameras". We were a bit of wireless robin hoods, we had a lot of fun.
Hi, this is so true, they can hack anything, they can see everything I do on my iPad, from putting a note under NOte, seeing all pictures that I took. Please help stop this, or advices, explain how it happening and how to stop and prevent it, thank you very much
My routers password can only use 32 characters , what is most secure ? Random Text Numbers n Symbols? Or A long random sentence? I've had password apps say the Sentence I used was Very Strong BUT another said it was weak! So which is the most secure kind of password for Routers n CCTV Cams ??
Doesn't matter. 32 characters long would take millions of years to guess. Just have a little entropy in it, you'll be fine. Of course, that doesn't stop a backdoor or password reset.
Hi David...I don't know if you can assist most of Companies are collapsing in SA with flashing they guy's came and ask for Quotation myb for R400,000 and they paid for it but they fund's just reflect and you released your Goods after few Hours the money reversed and nw they attacking car's they a tool called Flash SQR400 and flash V9.5 can you and OTW show us how does it work and how to prevent this before it was a Cheque Book nw flashing fake fund's.
I woke up to my camera night mode on clicking on. If Im not on my camera it shouldn't be on. It's not set to turn on for anyone but me. No motion. Nothing but me. Would my neighbor who works from home hack my camera? Yes. He lives in range of my wifi Update: My Livingroom and front door clicked on after I got up 20 minutes later. After changing password.
Loved this video. Listening here at work and was hoping to see a little bit of technical examples but we can't be too greedy. Nevertheless, I loved to hear some of the stories OTW had to share. It's great insight into what the real world is seeing. I wish the video was longer haha. I hope you get to have more collaborations with OTW, I'll be looking our for them. Thanks David!!!
-Great to see the teachers together again...!!! -So common network security cameras are basically mini-servers that can be accessed by SSH like anyone, and that have a REST API structure where you can read their video stream, and in more advanced systems these videos are concentrated on recording servers, but which are networked to be viewed can be accessed and hacked. -In fact, in general, they are IoTs with security that are very simple and easy to access. -I remember hacking the cheap Chinese cameras I bought and instead of using them with proprietary software I figured out how to capture the formats and decode this stream on a server that brought them all together on a machine at my ranch that was pretty easy. -Thanks for the knowledge...!!!
There are still good people among the bad ones. here I can say I appreciate this man with the page name beside mine who helped me figure out the bad people texting me with fake number everyday this web : *upworkdatabase* help me out with who was texting thanks once again.
Wouldn't cameras have systems put in place to detect a brute-force attack? On a router for instance the moment you've put a wrong password you have to wait a few seconds, next wrong password , a few more and so on till it's unfeasible.
In my opinion, serveilence cameras should only be installed in a public space or places that do not need high privacy. And if it's in the public realm, nobody should claim their privacy on that. If you don't want people know where you're going, then just fuckn stay at home!
Hi, I've completed many courses in cyber security including many in SCADA security and I have good hands-on in SCADA security. Now I'm looking for an entry-level job in SCADA security. If anyone can refer me, I'll be very grateful.
I won to ask you about something do the destrubution you are using make deference?. I mean i'm arch user and we have black arch repo we can install all the tools we need .
show me how to access my neighbors Wi-Fi password and there security camera as you put on the title that's why am watching your video for 53 minute but still nothing
Only one way I could think of getting into a place without electricity or internet would be to use batteries, micro computers and pies to create a lan style network similar to CoD: Ghosts and then continually connect those until you reach an area with electricity and internet capability. cost a lot of batteries and generators to this extremely laborious task, but you could turn most computers into a router.
Yeah wide open Chinese potato cameras are horrible. I'm surprised there aren't really companies cashing in on high definition quality cameras yet. Even dash cameras still can't read a friggin license plate. It's mind boggling.
In the company I work they are treating me as if I am a security risk. That means I cannot access a lot of websites I need for my work. Bravo. We are 14,000 km from headquarters all our switches are remotely controlled. But no port security - means we can plug in any hub or switch we want and all devices connected to those get IP addresses no problem....the main IT department has NO security policy. Means they define no different areas from the security stand point with different security requirements. Everything is advertised as CIA security level. But I can get access to multifunction printers in headquarters where the standard access credentials are unchanged. Some of those printers can be made easily to send pdf copies to email addresses from all scanned , faxed and printed documents. What I want to say: often the problem is NOT the user, but the IT department. Most suspicious are those which flat decline EVERY change asked for with "security reasons ",...
Can somebody in this community tell me, why it is a threat, to send mobilephone (private Android) pictures via bluetooth to a work-windows client/labtop. Please.
I am like to wach a detailed video no limit how much time is spend 1 day 2 day any duration but i want real world hacking. I want to learn something. That is the main thing. If its 3 day of video if i learn something from that video and i can get value from that time I will watch that whole video.
not sure, if someone, or you have addressed this...but, it would be educational to have your guest lay out, how to stay anonymous online, while conducting their..."research"