SMS spoofing and Raspberry Pi Scada hacking

  Рет қаралды 340,424

David Bombal

David Bombal

Күн бұрын

Пікірлер: 323
@davidbombal
@davidbombal 2 жыл бұрын
// MENU // 00:00 - We're doing this in the real world! 00:24 - Back with OccupyTheWeb 01:38 - Overview //The Hacker's Dilemma 03:16 - The Plan//Destroying Evil Corp's Backups 06:10 - High Temperature Destroy Tape Backups? 07:10 - Social Engineering//SMS Spoofing 11:48 - Why This Could Work 13:04 - Comment!//Spoofing Services That Work? 143:53 - Setup//Raspberry Pi with Kali 15:25 - Virtual Machine Setup 16:01 - Netcat//Setting Up Hacking Pi 17:50 - Netcat//Connecting to Hacking Pi 18:43 - Options//Reverse Shell//Rogue WiFi AP 20:01 - Recon with Nmap 22:26 - OTW Real World Hack//Schneider 23:59 - Gaining Access to /etc/passwd 26:01 - After Publishing the Hack Online 28:48 - Scanning for PLCs 30:19 - Modbus CLI//Memory Probing Tool 31:34 - How This Could Be Used in Mr. Robot 32:29 - Cyberwar//SCADA Hacking Overlooked 32:55 - Summary & Notes 34:04 - SCADA Network Cabling 35:41 - SCADA Hacking//Research! 36:11 - The Challenge in Mr Robot 36:39 - Mr. Robot Hacks//Realistic? 37:11 - SCADA Hacking Sim? 38:16 - Resources to Learn SCADA 38:48 - More Mr Robot? Leave a Comment! Disclaimer: This video is for educational purposes only. May it be a warning to all of us. Secure your systems and do not connect unprotected systems to the Internet. In this video we discuss the hacks in Mr Robot Season 1 Episode 5. Which other episodes or technologies do you want us to cover in future videos? Please comment. // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw // Videos mentioned // Kali Linux install on Raspberry Pi: kzbin.info/www/bejne/hqK1h6Joo850lZo OTW Interview and Scada demo with Sombra_around_tech: kzbin.info/www/bejne/bHKoqHWKfKuEnMU // Previous video // Hack like Mr Robot Ep 1: kzbin.info/www/bejne/aarMhZKNgtGiqck // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: kzbin.info // Occupy The Web social // Twitter: twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh // Other books // The Linux Command Line: amzn.to/3ihGP3j How Linux Works: amzn.to/3qeCHoY // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
@Justin1337Sane
@Justin1337Sane 2 жыл бұрын
Lets say AI someday goes rouge.. is there any hope left for humans or could it be hacked and stopped ?
@mrwhosmynameagain
@mrwhosmynameagain 2 жыл бұрын
@@Justin1337Sane Water
@mrwhosmynameagain
@mrwhosmynameagain 2 жыл бұрын
@@Justin1337Sane A backdoor could be left in it, but it could become sentient and erase it. We could just douse them with water though. I'm sure they would get smart and upload their code to a lot of very expensive server farms, thus making killing it cost us a fortune. But we could ultimately kill them with water if we really had to
@Justin1337Sane
@Justin1337Sane 2 жыл бұрын
@@mrwhosmynameagain Thanks that makes sense to me ..
@ej5364
@ej5364 Жыл бұрын
M. . . .l
@leesmith7547
@leesmith7547 2 жыл бұрын
David you do so much for us! You motivate and educate at the same time. Thank you so much from all of us.
@davidbombal
@davidbombal 2 жыл бұрын
Thank you Lee! You're welcome!
@cy_wareye7395
@cy_wareye7395 2 жыл бұрын
Indeed. That video make my day.
@testimony7233
@testimony7233 2 жыл бұрын
Thank you once again....
@saadhamid5609
@saadhamid5609 2 жыл бұрын
Very nice teacher and I want to buying your course
@infotruther
@infotruther Жыл бұрын
Amen
@weidup
@weidup 2 жыл бұрын
YES! Finally, I’ve been waiting for this. Thanks so much guys, very interesting series, these are probably my favorite of your videos.
@elementalkeed2339
@elementalkeed2339 2 жыл бұрын
David thank you so much, I've learned a lot from your channel. From NAMIBIA🇳🇦🇳🇦
@hamed9380
@hamed9380 2 жыл бұрын
I joined many Hacking channel but your channel is the best and different , your accent is very nice , you aren't filming or playing some role or having scenarios.👍 I hope you success and more money and good memories.
@HopliteSecurity
@HopliteSecurity 2 жыл бұрын
This was next level. Thank you David for the amazing content and sharing this knowledge with the community. It truly makes a difference.
@eval_is_evil
@eval_is_evil 10 ай бұрын
Dont think this hack would work in real life scenario.
@TheOriginalJohnDoe
@TheOriginalJohnDoe 2 жыл бұрын
I absolutely LOVE these series. Keep them going! I’m a big fan of occupytheweb as well. Very soothing voice, great explanations and the last video of David with occupytheweb made me even buy occupytheweb his book, which was a really good read! Keep the content coming fellows! Now, let me go grab some chips, a coke and lean back and enjoy this amazing video.
@davidbombal
@davidbombal 2 жыл бұрын
Happy to hear that John Doe!
@adirzunic9725
@adirzunic9725 2 жыл бұрын
@Fsociety Play around with the tool. Try it on your own wi-fi, it's very easy to use, but it's a great idea you mentioned, the tool is very effective
@SgtStarSlayer
@SgtStarSlayer Жыл бұрын
As an industrial electrician , SCADA is also being used on windmills, hydro damns, and solar panel grids.
@Kdaddyis
@Kdaddyis Жыл бұрын
Motivation + education+ entertainment is all about this video
@DJLena
@DJLena 10 ай бұрын
Wow, great episodes, 1 & 2. I didn’t know about this Mr Robot series, having cut the cord a long time ago. What a cool way to learn of its existence, through this show. Thanks Occupy the Web. Thanks David. Watching it now on Amazon.
@squatplugenthusiast3667
@squatplugenthusiast3667 2 жыл бұрын
I recently took a course called SCADS Systems Security funded by the NSA through 6 different universities. This is a very good basic summary of the offensive capability against PLCs.
@patthetech
@patthetech 2 жыл бұрын
Nice episode. Getting OT to have any security considerations is like herding cats then pulling their teeth. Most of them think vlans/airgaps are enough sadly. To the timeline comment about Mr Robot, I'm pretty sure there were a time or two the naration said about how this might take a while and then the shell popped and he said about how lucky that was. I know the technical director on a bts/commentary track acknowledged it was sped up exactly because no one wants to watch "real" hacking real time.
@darkguardian1314
@darkguardian1314 Жыл бұрын
Much more informative than 2600 "Off the Hook" adio/podcasts out of New York... 2600 is like some college kids let loose in a radio station monkeying around and asking for donations.
@aaronwhite1786
@aaronwhite1786 2 жыл бұрын
Another great one! I found and tried reaching out to that company that showed up last time with their exposed network to inform them. I didn't hear back, so hopefully they know about it!
@amermoftah673
@amermoftah673 2 жыл бұрын
Thank you sir, you are creative in every content you post, thank you again and your guest ❤️
@Dr.DomAPI
@Dr.DomAPI 2 жыл бұрын
So much wait for this video 😅 thanks David
@davidbombal
@davidbombal 2 жыл бұрын
Thank you. I hope you enjoy the video!
@viderien7544
@viderien7544 2 жыл бұрын
Super interesting video ! I would like to suggest the hack in the very fist episode, fist scene: Elliot says that the onion routing protocol is not really anonymous. Could you explain how he could have done it ?
@SameLif3
@SameLif3 Жыл бұрын
KZbin asked feedback on your comment 🤩
@gamereditor59ner22
@gamereditor59ner22 2 жыл бұрын
Oh snap!! I have that book, Linux Basic for hackers, and currently reading!!!! Love it everytime I read it!!! Recommend it!!!
@mos8541
@mos8541 2 жыл бұрын
PLC, modbus etc. is familiar to many Industrial Electricians going way back before we were snubbed by the data only side of our trade... gfy
@zaq1252
@zaq1252 2 жыл бұрын
Amazing Video like always. I love this format! As an idea for the next video maybe explain the sms hack in season 4. If its too awesome for KZbin maybe you can explain it on your website OTW.
@brenno3735
@brenno3735 2 жыл бұрын
Can you please do a technical talk on how to open (suspected) malicious links safely and what you can learn from opening them.
@tubetrollin
@tubetrollin 2 жыл бұрын
that edit at 29:20 was way too good haha
@dragonsage6909
@dragonsage6909 2 жыл бұрын
Great episode, I love OTW's stuff, great info! Ty
@photokarim
@photokarim Жыл бұрын
Thank you David. Great content. Maybe you can show up the Mac OS hack (episode before last in season 4) if not mistaken. Where Elliot hack the other Elliot Mac OS machine.
@firosiam7786
@firosiam7786 2 жыл бұрын
Long last guess youtube really verified the he'll out of this vedios to finally let this be able to post I watched the whole series of Mr robot waiting for this vedio 😂
@davidbombal
@davidbombal 2 жыл бұрын
Lots and lots of trouble getting this video sorted out 🙁
@firosiam7786
@firosiam7786 2 жыл бұрын
@@davidbombal u knw If u really have to edit major parts of this vedios out then why don't u put an edited version here and mayb an uncut version of the interviews on ur website after a few days like a theater release of a film and then a n uncut version coming out on an ott platform after a certain period if that is possible at all to do .
@huyvuquang2041
@huyvuquang2041 2 жыл бұрын
Very love the series of hacking with this guy explaining mr robot and demonstrate it in real life. Hope you guys keep up this good work
@yuhiahtyun5665
@yuhiahtyun5665 2 жыл бұрын
I'm a big fan of OTW, thanks for this David !
@DrTumis
@DrTumis 2 жыл бұрын
I love this, you are realy motivate me to learn it, I appreciate it. Hacking is very interesting topic. Thank you so much!!
@bobnoob1467
@bobnoob1467 2 жыл бұрын
David, it means the world to me that you do this. Please keep it up.
@logansmith6215
@logansmith6215 2 жыл бұрын
I was super excited for this video, then bummed when got pushed back but it was worth the wait!! love and appreicate everything you guys do!!!
@jeffalves3566
@jeffalves3566 2 жыл бұрын
Loved it! I'd like to see that one that he checks himself out from the hospital. Cheers!
@Ray-mq7rb
@Ray-mq7rb Жыл бұрын
I've been spoofing calls from the Nokia days, I'm glad it's still chugging along!
@ebukaanthony7418
@ebukaanthony7418 3 ай бұрын
Teach me
@paulw7738
@paulw7738 2 жыл бұрын
Interesting to hear from a SCADA/ICS professional's perspective!
@sajjandharel4207
@sajjandharel4207 2 жыл бұрын
I read both of the books. Awesome enjoyed reading. Fell in love with the way it's been written. Nothing bored.
@cartoonchannel5584
@cartoonchannel5584 Жыл бұрын
Dude, this is the only video that works. Thanks for posting!
@ereal2
@ereal2 2 жыл бұрын
I do believe you can spoof numbers but you have to run your own server for that. PBX phone system.
@sukisoh9121
@sukisoh9121 Жыл бұрын
Care to elaborate? It would be much appreciated
@kwiatriot6190
@kwiatriot6190 2 жыл бұрын
Great series, love any video with OTW! Question, I am assuming your access RPI and attack RPI were on the same network for the demo. How would the netcat connection be handled with the attack RPI being behind NAT in the building in the real world?
@lorenzofranzosa1780
@lorenzofranzosa1780 2 жыл бұрын
That’s the point unless they let intentionally open the wan port, that is actually unrealistic in a critical system like that, you can’t connect at all with the other RPI. But the episode is a hell of a podcast and OTW is a real master in the sport, even the best can miss. Big Up David 👍
@eval_is_evil
@eval_is_evil 10 ай бұрын
​@@lorenzofranzosa1780hmm... I dont doubt he knows his stuff however his books tackle extremely basic stuff with sporadic errors. I wouldnt reccomend them unless you need a quick over all picture how systems may (underlined) get compromised.
@Bjon10
@Bjon10 2 жыл бұрын
David this is awesome!! How about you have OTW explain every singe hack in the series, and make the videos a little big longer please just like they were in the beginning other than that keep rocking it kings ♥
@ConnectionTimeout
@ConnectionTimeout Жыл бұрын
I’ve done HVAC controls for 15 years. Modbus almost is never used for HVAC. Modbus is a protocol widely used in electrical/power monitoring systems. BACnet ( Building Automation Control net ) is the most widely used protocol in the HVAC industry.
@cyberjynx
@cyberjynx 2 жыл бұрын
Enjoying the video, you might want to blur his phone number in the ams spoofing section if thats not a fake 🙈
@rhondaverma6358
@rhondaverma6358 2 жыл бұрын
I wish I were smart enough to do this stuff. It amazes me.
@richardclifford9641
@richardclifford9641 2 жыл бұрын
I know an sms spoofer that works
@prestonbaum5451
@prestonbaum5451 Жыл бұрын
Would be quite interesting to hear how to better protect ourselves from cvv penetration. If you guys could go into as much depth as possible. Alot of us would love to hear from your expertise.
@becomeanaccelerator9354
@becomeanaccelerator9354 Жыл бұрын
Hey David I would like mr.Robot to take me through the courses of ethical hacking from scratch because I love it more than everything.
@GameWithSNAKE
@GameWithSNAKE 2 жыл бұрын
Love Your content and also love you thank you for giving so so much knowledge ❤️❤️❤️
@Synclon
@Synclon 2 жыл бұрын
Thanks For The Video David 🙌🏼
@davidbombal
@davidbombal 2 жыл бұрын
you're welcome!
@zakb.7108
@zakb.7108 6 ай бұрын
Thank you for this video! This is priceless! I am just wondering if the pi is inside Steel mountain network and you want to netcat into it it sill needs to be connected to the internet?
@ebooooo1213
@ebooooo1213 2 жыл бұрын
Thanks a lot David for the amazing content that you always post. Can you make a video for the scene in Ron’s coffee of Mr. Robot? Thanks again
@chanceleram
@chanceleram 2 жыл бұрын
Wow, I was expecting this episode so much !
@nigel3270
@nigel3270 2 жыл бұрын
David, a link to buy raspberry pi would be great. There isn't one in your amazon store. Thank you!
@MrCoSrenegade
@MrCoSrenegade 2 жыл бұрын
The "hello friend" moment at the beginning was awesome .... you both did your "homework". ^^ Entertaining and educational, thanks to the both of you!
@MrCoSrenegade
@MrCoSrenegade 2 жыл бұрын
oh and your editors .... they did their homework too!
@abdoulieybojang3675
@abdoulieybojang3675 2 жыл бұрын
Waw been such a while.... Love to the content...
@davidbombal
@davidbombal 2 жыл бұрын
Thank you Adboulie!
@ahmedahmedx9600
@ahmedahmedx9600 2 жыл бұрын
OTW is amazing!!!, Thank you david, this channel is gold !!
@shriyanshgupta9951
@shriyanshgupta9951 2 жыл бұрын
Thx a lot this is something i wanted to learn from long time !!! WE WANT MORE OTW VIDEOS !!
@dj_kimarley
@dj_kimarley 2 жыл бұрын
very informative occupy the web💯 waiting to join the simulation lab
@gatty.
@gatty. 2 жыл бұрын
Wow, some rich information in this one! Thanks OTW and David!
@dergadergaful
@dergadergaful 9 ай бұрын
So funny I'm a union HVAC worker and have seen a definite rise in SCADA raspberry pi. Most are definitely network connected too for remote control over the system which could b detrimental to something like a hospital
@chanceleram
@chanceleram 2 жыл бұрын
It's exciting to see OTW working, how he do the his magic...how he thinks..., helped us understand how the real life of a penetration tester is. Amazing!
@Frankie_Freedom
@Frankie_Freedom Жыл бұрын
This is awesome stuff love watching these videos. Currently a sys admin wish I had the energy to dive deeper in CyberSec, just don't have the energy. So will continue watching the videos for now.
@seif9923
@seif9923 2 жыл бұрын
I was wondering about sms spoofing and how its done, literally two days ago and you posted this lol ( out of curiosity btw lol )
@duckdruid440
@duckdruid440 2 жыл бұрын
We want more Hack like Mr.robot videos and also david you are awesome
@MisterK-YT
@MisterK-YT 2 жыл бұрын
For anyone looking to send SMS... the textbelt method is needlessly complicated GIVEN that you cannot spoof the sender. Since you can’t spoof the sender, you might as well just use something like Google Voice or TextNow (I think is what it’s called). Granted, you may lose some anonymity - but even using textbelt you have to give them your payment info so it’s not that anonymous either. If Textbelt could spoof a number, it’d be a different story. But if you’re just looking for a phone number that your target doesn’t recognize, there are countless simple apps you can use. Burner is another one.
@mrwhosmynameagain
@mrwhosmynameagain 2 жыл бұрын
Bruh your comment has this random scroll bar underneath it for some reason, never seen that before. But if you use a backtrack version of Kali, the Social Engineering Toolkit should still have SMS Spoofing
@MisterK-YT
@MisterK-YT 2 жыл бұрын
@@mrwhosmynameagain I have the old versions of SET, but I don’t believe sms spoofing works in it..? Doesn’t it just fail because the service it relied on is gone? It’d be dope if I’m wrong and you’re right. Can u confirm?
@CallousCoder
@CallousCoder Жыл бұрын
For tapes to melt you need at least 110C no central heating does that unless your in a crematorium 😂And tape storage is indeed done at a certain humidity. Too dry and it crumbles over time, too humid and fungi make their way in and causes “bit rot”, just like good cigars. But only long term take storage is done climate controlled. At IBM we had offside tape vaults and only the back part was a humidor and customers were charged for that. The non humidor controlled area was far bigger because tapes in roulation aren’t at risk from fungi as much because they are in motion too often for spores to settle.
@EdVelez
@EdVelez 2 жыл бұрын
I am installing a new system that uses modbus and a 485 to ethernet adapter so I can get data from the end device over my IP network...this now has me thinking how an outsider could get in to start my generators or even worse...Good firewall protection on my network but more so good physical security at my remote locations that are not manned.
@samerkia
@samerkia 2 жыл бұрын
Everytime I try doing something like HTBA or THM I just get so bored and uninterested. I really wanna learn hacking but Idk why everytime I try those sites I get kind of bored. I don't know if it's because I get stuck and don't know what to do or if it's because it's not the "real stuff"
@underdogproductions7750
@underdogproductions7750 2 жыл бұрын
It’s not the real stuff, but it’s pretty damn close, and some of the best practice you can find. And if you think CTFs are boring then you’re gonna find real hacking unbearable. It’s a lot slower and a lot more enumeration is involved. Try doing your own stuff too. Set up two machines and tinker around. They’re also different paths in the cyber security field you could take. You have to have that will to want to constantly learn something new.. ALL THE TIME!
@samerkia
@samerkia 2 жыл бұрын
@@underdogproductions7750 thanks for the reply! It's not that I find capture the flags boring, the few I've actually been able to do have been enjoyable, it's more Hack The Box Academy I haven't found as enjoyable when kt comes to learning, but I enjoying doing my own thing except thays very very limited
@underdogproductions7750
@underdogproductions7750 2 жыл бұрын
Also once you go through the exam and have a basic understanding of the tools and pentesting process, I would suggest you do more CTFs. And not like a few, but like 100s of them. Until you get to the point where you can start doing most of them on your own. Hacking is 90% enumeration. Get that down and you can solve most easy to intermediate boxes. Then after that I would suggest going for the eCPPT certification or the OSCP if you think you’re ready.
@samerkia
@samerkia 2 жыл бұрын
@@underdogproductions7750 sweet thanks for the information and paths I seriously appreciate it! Thank you so much again!
@underdogproductions7750
@underdogproductions7750 2 жыл бұрын
@@samerkia No problem! And remember, cyber security is already an intermediate learning level within IT. So don’t be intimidated by those “easy” boxes, because for someone new to the field they are definitely intermediate to hard. I would also suggest understanding the basics of how networks work. I came form a networking background and that helped me out a lot. But best of luck on your journeys my friend. Don’t give up. It takes hours and weeks and years. You have to put in the time. It’s like jumping into a pool when you don’t know how to swim. The only way to learn is to practice.
@manisharrora9525
@manisharrora9525 2 жыл бұрын
David i want to learn from OTW about the hacking but getting scared to fill the personal details inside the site.
@priiv18
@priiv18 2 жыл бұрын
David Did You Prefer Kali Or Parrot OS ?
@movieshub5253
@movieshub5253 Жыл бұрын
Can you create a course for us related to hacking basic to advance
@vonbaron2
@vonbaron2 2 жыл бұрын
I believe 160 degrees Fahrenheit would be needed to damage tape backups......
@Kingsaturnrs
@Kingsaturnrs Жыл бұрын
should make a vid on spoofing with your own smsc server
@organicmechanic5150
@organicmechanic5150 Жыл бұрын
Anyone can learn how to use Kali and the commands. Building your own hardware and writing payloads onto Raspberry and Arduino boards is far more satisfying than using tools built by someone else. Although some programs for password cracks, vulnerability tests and recon are useful.
@sebastianbabiel6155
@sebastianbabiel6155 2 жыл бұрын
Develpment in security technology is moving fast. Nowadays, SCADA systems or Smart IoT devices, which can be anything from a temperature sensor, a smart fridge, electricity meter or a switch for a light bulb or any other electric device, are being directly connected wirelessly, mostly over either WiFi or LPWAN technologies like for example LoRaWAN or NB-IoT or sigfox. Which means the wired modbus speaking device is extended to a wireless network, which enlarges the attack surface enormously. You don't even have to physically insert a raspberry pi into the wired network anymore. Wifi is pretty secure nowadays. A lot of LPWAN technologies are not. There is work being done in this domain to encrypt these wireless systems but it still is not enforced by law in most countries to encrypt these connections. There is also technology which can detect physical tampering of such devices or systems via a kind of radar system, which creates a rf fingerprint, which is unique to the device and thus can directly be used to create a unique key for encryption. The physical device itself becomes the key! Tampering it destroys the key. Also security education is growing. There is universities offering IT-security as a major now.
@HardcoreFixation
@HardcoreFixation 2 жыл бұрын
Hey David, I recently discovered your videos and I'm absolutely hooked - they're brilliant! Thank you so much for these fascinating videos, you've inspired me to change my career!
@JoeElliotSA
@JoeElliotSA Жыл бұрын
Excellent and interesting series of videos. 👍😁
@TornTech1
@TornTech1 Жыл бұрын
Im starting to think that OTW is the hacking consultant for Mr Robot! lol
@writtenbybc
@writtenbybc Жыл бұрын
I want to hear this guy say "Obviously, you're not a golfer" because he sounds just like Jeff Bridges
@georgeyreynolds
@georgeyreynolds Жыл бұрын
Surely once you're in the network, you can use whatever software or controls the actual staff would use... so you'd just need to get a copy of the controlmonitoring software right ?
@SamTechYT
@SamTechYT 2 жыл бұрын
Let's go To bad it's only 40min I guess the episode in Mr robot is around 40min so that's good enough but still haha amazing content
@Happy-go-luckyTV
@Happy-go-luckyTV Жыл бұрын
You explain that companies provided spoofing id services. The real question is.... how do those companies spoof ids?
@Haze1434
@Haze1434 2 жыл бұрын
Regards connecting to the Pi from externally; one could still use the option of creating a WiFi access point on the planted RPi, then have a second, battery-powered RPi sitting in range, say in a hedge or something, with a satellite router attached. Two hops instead of one, and the battery would last long enough for them to pull off the hack.
@Glanmire3
@Glanmire3 Жыл бұрын
You just needs only one "Coded PHY" BT device and the range be enough.
@Haze1434
@Haze1434 Жыл бұрын
@@Glanmire3 Nice idea, do you have experience? Any recommended instructions?
@assstatus6927
@assstatus6927 2 жыл бұрын
Please , please please we want more episodes 😭😭😭
@s4ms3piol30
@s4ms3piol30 2 жыл бұрын
this is soo high quality!
@geofreymusic4222
@geofreymusic4222 2 жыл бұрын
Hi David thanks for the awesome channel, do you perhaps have the link to his courses?
@freedtmg16
@freedtmg16 2 жыл бұрын
I've been waiting for this one!
@SohaibKhan-hp1oe
@SohaibKhan-hp1oe 10 ай бұрын
Hey David where's the EP 3?
@scholar7879
@scholar7879 2 жыл бұрын
YES! 😂 It's finally here
@davidbombal
@davidbombal 2 жыл бұрын
Better late than never I suppose 😀 What a lot of hassle it has been 🙁
@scholar7879
@scholar7879 2 жыл бұрын
@@davidbombal I would always come and check the Playlist to see if I had missed the notification loll.. Great great contents man.. We love it!
@miscellaneouszone
@miscellaneouszone 2 жыл бұрын
Great video and very informative. Thanks David for great content.
@valtersITeu
@valtersITeu Жыл бұрын
You still can spoof senders with EU services ;) Use specific name or even phone number, but if someone will call that number then it will be as none existing.
@joel_w5.08
@joel_w5.08 Жыл бұрын
Could you provide examples?
@stevecruztube
@stevecruztube 2 жыл бұрын
Great series. I've been sharing them with my kids to get them involve. Regarding "uptime | cat /etc/passwd" , if i remember correctly, /etc/passwd is world readable.
@aniketsharma7333
@aniketsharma7333 2 жыл бұрын
It's finally here 😀
@davidbombal
@davidbombal 2 жыл бұрын
Better late than never I suppose 😀
@Zaulao
@Zaulao 2 жыл бұрын
Hey! Who stores their data on tape anymore?
@mvip4927
@mvip4927 Жыл бұрын
It worked! Tank you sir.
@redgatormaintenance
@redgatormaintenance Жыл бұрын
Why not just use a texting app then? It's the same thing and way less complicated right?
@refaiabdeen5943
@refaiabdeen5943 Жыл бұрын
Cheers Mate.
@believeit5450
@believeit5450 2 жыл бұрын
Thanks David , So what is the recommend the book recommended by OTW for learning about scada ?
@galibcoc8215
@galibcoc8215 2 жыл бұрын
Dude which laptop you used to programming?
@mrwhosmynameagain
@mrwhosmynameagain 2 жыл бұрын
If you use a backtrack version of Kali the Social Engineering Toolkit still has SMS Spoofing
@saipatel8645
@saipatel8645 2 жыл бұрын
Hey david, At 7:57 stranger said use textbelt for manually usage by api but here in india and almost half of the asia has banned taxtbelt and i think there is no alternative for it, it is but almost are paids. Then how it will possible.
@UberGeek
@UberGeek 2 жыл бұрын
Great reviews! One of the overlooked points of accessing the Raspberry Pi remotely, that would require an open port on the firewall, correct? It's been a while since watching that episode. I don't remember how they accessed the Pi.
@LHX_
@LHX_ 2 жыл бұрын
no the reverse shell does not need port forwarding
@serolattm
@serolattm 2 жыл бұрын
Idk if it even were remote accessed, i remember it being programmed to run a script
@SavageScientist
@SavageScientist 2 жыл бұрын
Man that show was addictive i hated for it to end.
@appher
@appher Жыл бұрын
yes it works brother ! many thanks
Hacking cell phones like Mr Robot
31:31
David Bombal
Рет қаралды 869 М.
Warning! This is how cars are hacked. Just like in Mr Robot.
43:41
David Bombal
Рет қаралды 639 М.
Как подписать? 😂 #shorts
00:10
Денис Кукояка
Рет қаралды 7 МЛН
🍉😋 #shorts
00:24
Денис Кукояка
Рет қаралды 3,4 МЛН
Hacking Windows TrustedInstaller (GOD MODE)
31:07
John Hammond
Рет қаралды 647 М.
WiFi hacking like Mr Robot (with OTW)
36:35
David Bombal
Рет қаралды 257 М.
Hack like Mr Robot // WiFi, Bluetooth and Scada hacking
45:23
David Bombal
Рет қаралды 2,1 МЛН
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 827 М.
Myths or Reality? Mr Robot Hacks Data Centers to blow up buildings.
27:59
Real World Hacking Demo with OTW
40:51
David Bombal
Рет қаралды 228 М.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 2 МЛН
Demo of the Microsoft Window's Hack developed by the NSA (with OTW)
54:37
How to be Invisible Online (and the hard truth about it)...
53:16
David Bombal
Рет қаралды 2 МЛН