top of page

VIDEOS

Are you interested in learning more about cyber security? Do you want to learn about the most common cyber-attacks and how to keep your home or business network safe from them? If you want to learn and be more educated about cybersecurity fundamentals, then please subscribe to my channel, and I promise you'll have a great time!  Subscribe >

The New DDoS Attack: HTTP/2 Rapid by Master Hacker OTW
36:49

The New DDoS Attack: HTTP/2 Rapid by Master Hacker OTW

The HTTP/2 Rapid Reset attack - This attack is called Rapid Reset because it relies on the ability for an endpoint to send a RST_STREAM frame immediately after sending a request frame, which makes the other endpoint start working and then rapidly resets the request Join me with Master Hacker OTW for an insightful dive into the protocol vulnerability, learn how hackers exploiting it and more important learn how to defend against it and protect your org from such attacks Disclaimer: This video is for educational purposes only. We do not promote hacking or any illegal activities. Remember, hacking without explicit permission is illegal. Stay safe and ethical in your cybersecurity explorations OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i OccupyTheWeb Community - Hackers-Arise: - 20% coupon for everything in store ("YANIV") Chapters 00:00-00:41 Opening 00:41-01:41 OTW!! 01:41-02:30 Educational HTTP2 02:30-03:15 Importance of DD0s Attacks 03:15-04:09 DD0s Examples Educational 04:09-05:07 New Attacks... 05:07-07:28 HTTP/1.1 VS HTTP/2 07:28-08:59 Unlimited Number of request!! 08:59-09:38 33% Of Servers In The Worlds use HTTP/2!! 09:38-13:15 Wireshark 13:15-16:42 Typical HTTP/2 Server... 16:42-17:14 SecengJef 17:14-18:04 Hackers Arise 18:04-22:06 Básics of The.... 22:06-23:05 GitfHub 23:05-25:01 Múltiple Forms of Mitigation 25:01-25:26 if You don't Have that... 25:26-28:51 DD0s Protection 28:51-30:45 OTW DD0s Experience 30:45-32:50 Cyber Eras 32:50-36:49 Beginning of a New Era Watch more cyber security Video's 1. Does SQL injection still work ? Lessons by Master Hacker - https://youtu.be/temUKsfd0kA 2. Behind Darknet Diaries with Jack Rhysider - https://youtu.be/sVAbKO-25QU 3. Shield Your Wi-Fi from Hackers with these Essential Security Measures https://youtu.be/BDaLL_kqRNM 5. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 6. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 7. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 8. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 9. Stuxnet - https://youtu.be/fLwLRvp1YFA 10. API Hacking - https://youtu.be/1t5wXWFI0yU 11. DNS Hacking - https://youtu.be/Hsj_67RhNMc 12. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 13. NotPetya - https://youtu.be/6gqKkTf9fWY 14. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #occupytheweb #hacker
You are NOT SAFE!! How to Protect Your Files with a Master Hacker OTW
32:05

You are NOT SAFE!! How to Protect Your Files with a Master Hacker OTW

Hello Community!!! Welcome to Yaniv Hoffman’s Channel. You are currently watching How To Protect Your Data With Hacker Master OTW occupytheweb OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i OccupyTheWeb Community - Hackers-Arise:https://www.hackers-arise.com - 20% coupon for everything in store ("YANIV") Chapters: 0:00-00:37 Intro 0:37-02:07 Introducing OTW! 02:07-03:47 Protecting Your Data! 03:47-04:09 How to protect your data 04:09-05:20 BitLocker Drive Encryption 05:20-08:34 VeraCrypt 08:34-09:43 Why that version of Linux? 09:43-11:54 VeraCrypt Setup 11:54-15:23 Creating Volume 15:23-18:58 Advanced Encription Standar 18:58-22:09 Hash Algorithm 22:09-23:27 Volume Password 23:27-28:34 Volume Format 28:34-31:00 Volume ready to use! 31:00-32:04 This is Important! Watch more cyber security Video's 1. Does SQL injection still work ? Lessons by Master Hacker - https://youtu.be/temUKsfd0kA 2. Behind Darknet Diaries with Jack Rhysider - https://youtu.be/sVAbKO-25QU 3. Shield Your Wi-Fi from Hackers with these Essential Security Measures https://youtu.be/BDaLL_kqRNM 4. Meet the man who exposed the world's first cyber weapon - https://youtu.be/5UJ046Zaj14 5. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 6. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 7. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 8. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 9. Stuxnet - https://youtu.be/fLwLRvp1YFA 10. API Hacking - https://youtu.be/1t5wXWFI0yU 11. DNS Hacking - https://youtu.be/Hsj_67RhNMc 12. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 13. NotPetya - https://youtu.be/6gqKkTf9fWY 14. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc Yaniv Hoffman #cybersecurity #occupytheweb #informationtechnology
The World Smallest Hacking Lab ZimaBoard (and Cheapest Under $300)
19:31

The World Smallest Hacking Lab ZimaBoard (and Cheapest Under $300)

🚀 Just dropped a new video on setting up the world's smallest hacking lab! 🚀 In this video, I dive into the power of ZimaBoard, configuring a compact yet potent lab environment that carries Proxmox VE, Kali Linux, and Websploit as a vulnerable app. With over 400 exercises curated by Omar Santos, this setup is a goldmine for cybersecurity enthusiasts and professionals alike. ✨ What's in the video? A step-by-step guide from unboxing the ZimaBoard to getting your hacking lab up and running. Whether you're a seasoned pro or just starting, this setup has something for you. Stay tuned for the next part where I’ll showcase demonstrations of these exercises. It's going to be epic! #CyberSecurity #HackingLab #ZimaBoard #ProxmoxVE #KaliLinux #Websploit #OmarSantos #TechInnovation ProxMox - https://www.proxmox.com/en/ WebSploit Labs - https://websploit.org/ ZimaBoard - https://www.zimaboard.com Chapters: 0:00-00:33 Intro 0:33-01:00 The ZimaBoard 01:00-01:34 Why? 01:34-03:00 The Gear 03:00-03:56 Proxmox VE 03:56-04:37 Scalability and Flexibility 04:37-04:55 Integrated Web-Based Management 04:55-06:54 WebSploit 06:54-08:06 Step 1 Getting Started With Zima Board 08:06-08:56 Install ProxMox 08:56-09:48 Etcher-Rufus 09:48-11:16 Step 2 Install 11:16-11:53 Filipi Pires Websploit Labs Recomendation 11:53-12:25 How Websploit Can Help us in Ethical Hacking 12:25-14:30 Kali Linux-Create our Virtual Machine 14:30-15:26 Be Aweare of This 15:26-17:04 Juice Shop Interaction 17:04-17:49 Exercises to start practicing 17:49-18:14 DOM Based XSS 18:14-19:30 What would you like to see? Watch more cyber security VIDEDO'S 1. Hacking IP camera's - https://youtu.be/zCmC5IffIZg 2. How hackers bypass 2FA - https://youtu.be/V-lSqR_rj78 3. Stuxnet - https://youtu.be/fLwLRvp1YFA 4. Meet the man who exposed the world's first cyber weapon (Student) - https://youtu.be/5UJ046Zaj14 5. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 6. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 Enjoy !!! Yaniv Hoffman
How Easy Is It For Hackers To Hacking the Cloud! Cybersecurity course with Filipi Pires
42:41

How Easy Is It For Hackers To Hacking the Cloud! Cybersecurity course with Filipi Pires

In this compelling video 🎥, cybersecurity researcher and advocate Filipi Pires joins forces to unveil the silent threat posed by cloud misconfigurations to data security 🔒. Delving deep into the vulnerabilities within AWS IAM and providing tangible attack examples, the discussion illuminates 💡 the complex landscape of cloud security threats and underscores the importance of robust configurations to safeguard against potential data breaches 🛡️. This insightful session is a must-watch for anyone looking to fortify their cloud environments against sophisticated cyber attacks. Filipi Pires Links: https://www.linkedin.com/in/filipipires/?locale=pt_BR Courses: https://pentestmag.com/course/powershell-and-windows-for-red-teamers-w45/ Magazine : https://pentestmag.com/product/malware-attack-types-with-kill-chain-methodology-w44/?fbclid=IwAR1JDuDkIEhhzY_qjoG_IviSKagm7Db6_OadMLr8SNv1165Kqyzl467lDFM Build With us Seasegura: https://senhasegura.com/build-with-us VIDEO CHAPTERS HERE: 0:00-0:14 You are not Safe! 0:14-01:00 Introducing Filipi Pires 01:00-02:05 Missconfiguration in The Cloud 02:05-04:16 Brief info About Filipi 04:16-05:48 What is a Threat? 05:48-08:10 High Value Target 08:10-12:17 Attack Vector 12:17-18:30 Missconfiguration AWS IAM 18:30-34:54 AWS ATTACKS 34:54-39:09 AWS Attacks Examples 39:09-42:40 Brief Resume and Thanks Watch more cyber security VIDEDO'S 1. Hacking IP camera's - https://youtu.be/zCmC5IffIZg 2. How hackers bypass 2FA - https://youtu.be/V-lSqR_rj78 3. Stuxnet - https://youtu.be/fLwLRvp1YFA 4. Meet the man who exposed the world's first cyber weapon (Student) - https://youtu.be/5UJ046Zaj14 5. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 6. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #ethicalhacking #informationtechnology
Hacking Using Metasploit with OTW (Linux Tutorial)
48:57

Hacking Using Metasploit with OTW (Linux Tutorial)

Excited to share a new video where I collaborate with master hacker OccupyTheWeb (OTW) to dive into the essentials of Metasploit. It's a straightforward guide aimed at enhancing your cybersecurity toolkit. Check it out for insights that bridge theory with practical application. #Cybersecurity #Metasploit #occupytheweb OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i OccupyTheWeb Community - Hackers-Arise:https://www.hackers-arise.com - 20% coupon for everything in store ("YANIV") Chapters: 0:00 - 1:40 Opening OCTW 1:40 - 5:48 Metasploit Meaming 5:48 - 7:20 Metasploit Exploits 7:20 - 12:02 Metasploit Servers+ 12:01 - 13:00 Target System 13:00 - 23:48 Payloads 23:48 - 48:56 Indicators and More Tutorial Watch more cyber security Video's 1. Does SQL injection still work ? Lessons by Master Hacker - https://youtu.be/temUKsfd0kA 2. Behind Darknet Diaries with Jack Rhysider - https://youtu.be/sVAbKO-25QU 3. Shield Your Wi-Fi from Hackers with these Essential Security Measures https://youtu.be/BDaLL_kqRNM 4. Meet the man who exposed the world's first cyber weapon - https://youtu.be/5UJ046Zaj14 5. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 6. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 7. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 8. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 9. Stuxnet - https://youtu.be/fLwLRvp1YFA 10. API Hacking - https://youtu.be/1t5wXWFI0yU 11. DNS Hacking - https://youtu.be/Hsj_67RhNMc 12. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 13. NotPetya - https://youtu.be/6gqKkTf9fWY 14. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #occupytheweb #informationtechnology
Hacking WiFi networks in seconds With AI | Real Experiment Pwnagotchi
12:42

Hacking WiFi networks in seconds With AI | Real Experiment Pwnagotchi

Hello Community!!! Welcome to Yaniv Hoffman’s Channel. This video will teach how to pentest / " hack " wifi networks that can be found anywhere. This video is for educational purposes only and is meant to help you understand how networks are commonly hacked to be able to protect yourself, family and friends against it. Resources 1. Pwnagotchi Project - https://pwnagotchi.ai/ 2. Pwnagotchi Github - https://github.com/topics/pwnagotchi 3. Pwnagotchi world wide map - https://pwnagotchi.ai/map/ Chapters: 0:00 - 1:22 Opening 1:23 - 3:22 Assembly & Installation 3:23 - 4:56 WIFI Handshake 101 4:57 - 6:00 PWNAGOTCHI strategies 6:01 - 8:55 Hashcat 8:56 - 9:45 AI Function 9:46 - 12:41 PWNAGOTCHI Interface Watch more cyber security VIDEDO'S 1. Hacking IP camera's - https://youtu.be/zCmC5IffIZg 2. How hackers bypass 2FA - https://youtu.be/V-lSqR_rj78 3. Stuxnet - https://youtu.be/fLwLRvp1YFA 4. Meet the man who exposed the world's first cyber weapon (Student) - https://youtu.be/5UJ046Zaj14 5. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 6. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #ethicalhacking #informationtechnology
What Makes Israel So Good At Hacking? (The Secret Behind)
30:48

What Makes Israel So Good At Hacking? (The Secret Behind)

Uncover the Enigma: Why is Israel a Powerhouse in Hacking? Discover the Untold Secrets Behind Israel's Cybersecurity Dominance! Dive into the clandestine world of hacking expertise as we unveil the unique factors fueling Israel's unparalleled success. Join us on this insightful exploration, dissecting the innovative techniques and specialized knowledge that set Israel apart in the realm of cybersecurity. Stay ahead of the curve, enhance your cybersecurity understanding, and decode the mysteries behind Israel's exceptional hacking capabilities. Elevate your knowledge with this in-depth analysis and stay informed about the forces shaping the cybersecurity landscape. Hello Community!!! Welcome to Yaniv Hoffman’s Channel. You are currently watching What Makes Israel So Good At Hacking? and the Big Secret Behind this Gabi Siboni - https://en.wikipedia.org/wiki/Gabi_Siboni Israel and The Cyber Threat Book - https://www.amazon.com/Israel-Cyber-Threat-Startup-Nation/dp/0197677711/ref=sr_1_1?crid=501O4T1EFCTV&keywords=israel+and+the+cyber+threat&qid=1706454015&sprefix=israel+and+the+cyber+threat%2Caps%2C324&sr=8-1 CHAPTERS 0:00 - 2:18 Opening 2:19 - 5:28 The Story Begins here 5:29 - 6:38 Common Characteristics of TOP Cyber Powers 6:39 - 7:26 Prof. Gabi Siboni 7:27 - 10:39 Key factors contributed to Israel cyber power 10:40 - 16:14 Cyber Threat on Israel (Nations and non nation states) 16:15 - 22:29 IRAN 22:30 - 29:50 How Israel adapt to the cyber threats 29:51 - 32:44 Looking ahead and summary Watch more cyber security video's 1. Hacking IP camera's - https://youtu.be/zCmC5IffIZg 2. How hackers bypass 2FA - https://youtu.be/V-lSqR_rj78 3. Stuxnet - https://youtu.be/fLwLRvp1YFA 4. Meet the man who exposed the world's first cyber weapon (Student) - https://youtu.be/5UJ046Zaj14 5. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 6. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #israel #informationtechnology
Uncover Hidden Identities Search by Face for Shocking Discoveries!
01:00

Uncover Hidden Identities Search by Face for Shocking Discoveries!

🔍 Unveil the potential of ESPY's latest face recognition technology with OSINT. This innovative tool seamlessly integrates facial identification with name and social media searches 🤳💻. Dive into the simplicity and efficiency of comprehensive online investigations, tailored for everyone from beginners to seasoned professionals. ESPYSYS (IRBIS TOOL) - https://espysys.com/ Coupon for additional discount - YH82277ED First video with Lina (Espy) - No Where To Hide - https://youtu.be/5MZUKdjCObk CHAPTERS 0:00 - 0:24 Opening 0:25 - 1:07 Line from Espy 1:08 - 5:35 Facial recognition search 5:36 - 12:35 Name Search 12:36 - 14:09 Espy platform - Free trail and additional discount coupon Watch more cyber security Video's 1. DDoS explained by a Master Hacker - https://youtu.be/16PM9piQ_EE?si=O-ZB0Okg9Rg_Wsje 2. Does SQL injection still work ? Lessons by Master Hacker - https://youtu.be/temUKsfd0kA 3. Behind Darknet Diaries with Jack Rhysider - https://youtu.be/sVAbKO-25QU 4. Shield Your Wi-Fi from Hackers with these Essential Security Measures https://youtu.be/BDaLL_kqRNM 5. Meet the man who exposed the world's first cyber weapon - https://youtu.be/5UJ046Zaj14 6. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 7. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 8. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 9. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 10. Stuxnet - https://youtu.be/fLwLRvp1YFA 11. API Hacking - https://youtu.be/1t5wXWFI0yU 12. DNS Hacking - https://youtu.be/Hsj_67RhNMc 13. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 14. NotPetya - https://youtu.be/6gqKkTf9fWY 15. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #informationtechnology #smartphone #hacking #espy #espys #facerecognition #osint
Facial recognition is everywhere, are we ready for it?
14:10

Facial recognition is everywhere, are we ready for it?

🔍 Unveil the potential of ESPY's latest face recognition technology with OSINT. This innovative tool seamlessly integrates facial identification with name and social media searches 🤳💻. Dive into the simplicity and efficiency of comprehensive online investigations, tailored for everyone from beginners to seasoned professionals. ESPYSYS (IRBIS TOOL) - https://espysys.com/ Coupon for additional discount - YH82277ED First video with Lina (Espy) - No Where To Hide - https://youtu.be/5MZUKdjCObk CHAPTERS 0:00 - 0:24 Opening 0:25 - 1:07 Line from Espy 1:08 - 5:35 Facial recognition search 5:36 - 12:35 Name Search 12:36 - 14:09 Espy platform - Free trail and additional discount coupon Watch more cyber security Video's 1. DDoS explained by a Master Hacker - https://youtu.be/16PM9piQ_EE?si=O-ZB0Okg9Rg_Wsje 2. Does SQL injection still work ? Lessons by Master Hacker - https://youtu.be/temUKsfd0kA 3. Behind Darknet Diaries with Jack Rhysider - https://youtu.be/sVAbKO-25QU 4. Shield Your Wi-Fi from Hackers with these Essential Security Measures https://youtu.be/BDaLL_kqRNM 5. Meet the man who exposed the world's first cyber weapon - https://youtu.be/5UJ046Zaj14 6. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 7. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 8. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 9. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 10. Stuxnet - https://youtu.be/fLwLRvp1YFA 11. API Hacking - https://youtu.be/1t5wXWFI0yU 12. DNS Hacking - https://youtu.be/Hsj_67RhNMc 13. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 14. NotPetya - https://youtu.be/6gqKkTf9fWY 15. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #informationtechnology #smartphone #hacking #espy #espys #facerecognition #osint
FEDs are watching your push notifications  #informationtechnology #smartphone #cyberhack
00:55

FEDs are watching your push notifications #informationtechnology #smartphone #cyberhack

🔍🚨 Feds Watching Your Notifications: What You Need to Know 🚨🔍 #cybersecurity #pushnotifications #apple #google Discover the truth about how the FEDs monitor push notifications on our smart devices. 📱💻 👁️ We will have some inside look at federal surveillance techniques - Impact on privacy and digital freedom. Full video link: https://youtu.be/KGIEIf9e3W0 Watch more cyber security Video's 1. DDoS explained by a Master Hacker - https://youtu.be/16PM9piQ_EE?si=O-ZB0Okg9Rg_Wsje 2. Does SQL injection still work ? Lessons by Master Hacker - https://youtu.be/temUKsfd0kA 3. Behind Darknet Diaries with Jack Rhysider - https://youtu.be/sVAbKO-25QU 4. Shield Your Wi-Fi from Hackers with these Essential Security Measures https://youtu.be/BDaLL_kqRNM 5. Meet the man who exposed the world's first cyber weapon - https://youtu.be/5UJ046Zaj14 6. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 7. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 8. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 9. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 10. Stuxnet - https://youtu.be/fLwLRvp1YFA 11. API Hacking - https://youtu.be/1t5wXWFI0yU 12. DNS Hacking - https://youtu.be/Hsj_67RhNMc 13. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 14. NotPetya - https://youtu.be/6gqKkTf9fWY 15. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #informationtechnology #smartphone #hacking #google #apple #nationstate
Exposed: The Federal agencies are watching your push notifications!
10:16

Exposed: The Federal agencies are watching your push notifications!

🔍🚨 Feds Watching Your Notifications: What You Need to Know 🚨🔍 #cybersecurity #pushnotifications #apple #google Discover the truth about how the FEDs monitor push notifications on our smart devices. 📱💻 👁️ We will have some inside look at federal surveillance techniques - Impact on privacy and digital freedom. CHAPTERS 0:00 - 0:48 FEDs are watching your push notifications 0:49 - 1:42 How push notification work? 1:43 - 4:00 The vulnerability exploited in this process 4:01 - 4:47 What's in it for the FEDs agencies 4:48 - 6:47 Use Case describing the issue 6:48 - 7:39 Apple / Google Response 7:40 - 9:19 Expert opinion and Tips 9:20 - 10:16 Conclusion Watch more cyber security Video's 1. DDoS explained by a Master Hacker - https://youtu.be/16PM9piQ_EE?si=O-ZB0Okg9Rg_Wsje 2. Does SQL injection still work ? Lessons by Master Hacker - https://youtu.be/temUKsfd0kA 3. Behind Darknet Diaries with Jack Rhysider - https://youtu.be/sVAbKO-25QU 4. Shield Your Wi-Fi from Hackers with these Essential Security Measures https://youtu.be/BDaLL_kqRNM 5. Meet the man who exposed the world's first cyber weapon - https://youtu.be/5UJ046Zaj14 6. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 7. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 8. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 9. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 10. Stuxnet - https://youtu.be/fLwLRvp1YFA 11. API Hacking - https://youtu.be/1t5wXWFI0yU 12. DNS Hacking - https://youtu.be/Hsj_67RhNMc 13. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 14. NotPetya - https://youtu.be/6gqKkTf9fWY 15. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #informationtechnology #smartphone #hacking #google #apple
DDoS attack explained by a Master Hacker #ddos #hacker
36:11

DDoS attack explained by a Master Hacker #ddos #hacker

Join me with Master Hacker OTW for an insightful dive into DDoS attacks. We explore the current threat landscape, discuss key risks, and showcase a hands-on demo using HPING3. #cybersecurity #ddosattack #hacking Disclaimer: This video is for educational purposes only. We do not promote hacking or any illegal activities. Remember, hacking without explicit permission is illegal. Stay safe and ethical in your cybersecurity explorations OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i OccupyTheWeb Community - Hackers-Arise:https://www.hackers-arise.com - 20% coupon for everything in store ("YANIV") Chapters 0:00 - 1:02 Opening 1:03 - 3:30 OccupyTheWeb 3:31 - 18:52 DDoS discussion on threat landscape, risks and more 18:53 - 36:10 Brief demo of HPING 3 Watch more cyber security Video's 1. Does SQL injection still work ? Lessons by Master Hacker - https://youtu.be/temUKsfd0kA 2. Behind Darknet Diaries with Jack Rhysider - https://youtu.be/sVAbKO-25QU 3. Shield Your Wi-Fi from Hackers with these Essential Security Measures https://youtu.be/BDaLL_kqRNM 4. Meet the man who exposed the world's first cyber weapon - https://youtu.be/5UJ046Zaj14 5. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 6. Hacking SCADA systems - https://youtu.be/xnrEK9VawHo 7. SW define radio hacking - https://youtu.be/7z5SNEEyCfo 8. Pegasus spyware - https://youtu.be/Dm5cq1TC2r0 9. Stuxnet - https://youtu.be/fLwLRvp1YFA 10. API Hacking - https://youtu.be/1t5wXWFI0yU 11. DNS Hacking - https://youtu.be/Hsj_67RhNMc 12. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 13. NotPetya - https://youtu.be/6gqKkTf9fWY 14. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman
bottom of page