Amazing video, he did fine everyone’s nit picking how “nervous” he was it’s whatever. But this was a genuinely interesting topic and I loved learning about it and how to become a modern day pirate!
this is weird. I was going around wondering in my head "what was the name of that site with all the vulnerable cctv's".. And bam this video mentions Shodan so I instantly recognized it!
In the future i would interview presentations before there presentations maybe let him practice some he struggled presenting the detail certin things he didnt go into detail about but over all concept was clear "Shodan"
So what information would I have to uncover to find out that a certain cargo ship is shipping false cargo? How do I get that cargo ship investigated immediately without incriminating myself? How would I know that certain cargo info has been falsified?
so are Google and showdan scanning every port on every machine to harvest this stuff? i got my Internet shut off for a while for the same thing once. once.
... and this is the reason the iOT "uppgrayyed" the world is getting is something I don't trust." (Intentional misspelling... some get it, some don't.)
I was hoping to find a vid from this channel which is literally my equivalent of going to uni I mean if it's here why, why of any kind of reason would I actually bother literally going back anyway I don't particularly care above other people including their stuff on the net, id appreciate a vid on being a network admin looking out for bad stuff like shodun or the hurtful subset of film cow
Brave kid it would be tough to speak about a subject that either frightens people or causes them to roll their eyes because they think anything too edgy must be fiction thanks Hollywood
@@NullByteWHT yes indeed...if you are the fellow, he who started the talk and who heckled (gently) and gave some of the more informative nullbyte demos (things to add to kali, et al}, you mentioned a discord channel. Any word??
Everything is vulnerable.And I'm fairly certain that ships manifests , their cargo and destination have always been a matter for the public record for insurance reasons primarily....You can thank Lloyd's of London for that. Yes everything connected to the internet uses default passwords , routers , toasters and lazy sysadmins...lol 10 billion devices now on the IOT.22 billion by 2025.All with the username and password admin/admin.
You can laugh but what if someone havks your toaster and circumvents the resistor or something and your toaster overheats and burns down your kitchen/house. Not so funny anymore
@@kantnklaar actually, if that toaster is UDP broadcasting, or capable of wireless connectivity, which (hint) since we found it using shodan we know that ifburning toast. I would use it to monitor traffic (wlan8(1)) to fool the IDS/SIEMs/et al by having threat vectoring though emulation of normal traffic, phish the MFA2 Auth tokens using Evilgenix2 or non script kiddie methods)
To the speaker: Relax, take a breath, practice you speech, relax some more. You know what you're talking about so don't worry. Just stick to the script and avoid words like "uh", "hum". Good information, but I would give a disclaimer about the legality.
@Kh- Corp I know. But RU-vid changed their terms the other day and included instructional hacking into content that isn't allowed. Who knows what they mean by that.
@Kh- Corp Take a look at their ToS. They don't stipulate between ethical and black hat hacking. They mean ALL instructional hacking videos. Whether it's ethical or not is irrelevant. That's how they worded it, and that's how it's purely at Google's discretion as to what they allow and don't because they haven't made it clear.