top of page

VIDEOS

Are you interested in learning more about cyber security? Do you want to learn about the most common cyber-attacks and how to keep your home or business network safe from them? If you want to learn and be more educated about cybersecurity fundamentals, then please subscribe to my channel, and I promise you'll have a great time!  Subscribe >

Bluetooth Hacking Explained: Why Your Devices Are at Risk (ft. OTW)
50:56

Bluetooth Hacking Explained: Why Your Devices Are at Risk (ft. OTW)

🔒 Your Bluetooth Device Is NOT Safe — Here's Why (ft. OTW) 🔓 📡💥 You won’t believe how easy it is to hack Bluetooth… and the risks might be closer than you think. In this video, I team up with OTW — one of the most knowledgeable creators in wireless hacking — to reveal just how exposed your everyday devices really are. 📲 From headphones and smartwatches to speakers and even cars — if it uses Bluetooth, it could be a target. 🧠 What You’ll Learn: ✅ How Bluetooth hacking actually works ✅ Real-world examples of Bluetooth vulnerabilities ✅ Why these attacks are easier than you'd imagine ✅ How hackers exploit Bluetooth signals ✅ 🔐 Simple tips to protect your devices today 🎯 Whether you're into ethical hacking, cybersecurity, or just want to understand how your devices could be at risk, this video is a must-watch. 🛡️ Protect yourself. Stay informed. Subscribe for more. 💬 Got questions or ideas for future videos? Drop a comment below! #Bluetooth #CyberSecurity #WirelessHacking #OTW ⚠️ This content is intended for educational purposes only. The techniques demonstrated are designed to raise cybersecurity awareness and help protect against real-world threats. Unauthorized access to systems without permission is illegal. Always practice ethical hacking and responsible cybersecurity behavior. 💙 Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman 💼 LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com (Personal) 📚 OccupyTheWeb Books - Affiliate Links: 1️⃣ Become a Master Hacker: https://amzn.to/3Eq6vX4 2️⃣ NEW BOOK: Network Basics for Hackers: https://amzn.to/3YNd1iz 3️⃣ Linux Basics for Hackers: https://amzn.to/3Sdoh5i 📖 Pre-order: Python Basics for Hackers (Autographed & 50% off): https://www.hackers-arise.com/online-store/Python-Basics-for-Hackers-Pre-Order-50-off-and-autographed-p706286286 🛒 Hackers-Arise - Online Store: https://www.hackers-arise.com/online-store 🌐 OccupyTheWeb Community - Hackers-Arise: 🎟️ 20% Coupon Code: "YANIV" (Use for everything in the store!) Chapters: 00:00-00:41 What we'll cover today. 00:41-00:44 Disclaimer 00:44-00:58 Bluetooth is everywhere 00:58-01:30 Everything we’ll cover and much more..... 01:30-01:40 OTW! 01:40-02:29 IoT devices and their impact 02:29-03:04 Where Bluetooth devices are. 03:04-04:26 Bluetooh Clasic vs Low Energy 04:26-05:19 How prevalent is this protocol? 05:19-10:27 Impact of Bluetooh on Security 10:27-11:43 Understanding Bluetooth Classic vs. Bluetooth Low Energy 11:43-15:07 Bluetooth Classic 15:07-17:01 Bluetooh BLE 17:01-22:48 Example: Bluetooth scanning 22:48-28:39 HTI Tool 28:39-33:32 Mirage Tool 33:32-34:00 The nRF52840 34:00-35:00 Nordic Semiconductor 35:00-43:50 nRF52840 Demo Example 43:50-43:50 Blue Ducky 44:15-46:50 nRF52840 Programmable as an HID 46:50-50:55 Summary and Conclusion 🎥 Watch More Cybersecurity Fundamental Videos: 1️⃣ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2️⃣ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3️⃣ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4️⃣ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5️⃣ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6️⃣ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7️⃣ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8️⃣ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9️⃣ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo 🔟 Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo 🐎 Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 🛠️ Stuxnet: https://youtu.be/fLwLRvp1YFA 🔐 API Hacking: https://youtu.be/1t5wXWFI0yU 🌐 DNS Hacking: https://youtu.be/Hsj_67RhNMc 💻 How to Build a Hacking Box: https://youtu.be/vnYmb6spw30
Hijacked in Seconds: How Hackers Steal Your Online Sessions
05:21

Hijacked in Seconds: How Hackers Steal Your Online Sessions

Your online session could be hijacked in seconds—and you might never know it happened. Session hijacking is one of the most dangerous and underrated hacking techniques, allowing attackers to gain full access to your accounts without ever needing your password. But how does it actually work? And how can you protect yourself? 💻🔐 #sessionhijacking #EthicalHacking #CyberSecurity In this in-depth breakdown, we explore how ethical hackers simulate real-world session hijacks to expose system vulnerabilities. Learn how attackers steal session tokens, bypass authentication, and impersonate users—all while staying completely invisible. 🔥 Key Topics Covered: ✅ What session hijacking is and how it works ✅ How attackers exploit cookies and tokens ✅ Real examples of hijacking in action ✅ Why most users are unaware of this threat ✅ Simple steps to protect yourself online 💡 Don’t miss this essential breakdown of one of the most dangerous cyber threats in the wild — and learn how hackers think, attack, and stay ahead of the curve. ⚠️ This content is intended for educational purposes only. The techniques demonstrated are designed to raise cybersecurity awareness and help protect against real-world threats. Unauthorized access to systems without permission is illegal. Always practice ethical hacking and responsible cybersecurity behavior. 💙 Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman 💼 LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com (Personal) 📚 OccupyTheWeb Books - Affiliate Links: 1️⃣ Become a Master Hacker: https://amzn.to/3Eq6vX4 2️⃣ NEW BOOK: Network Basics for Hackers: https://amzn.to/3YNd1iz 3️⃣ Linux Basics for Hackers: https://amzn.to/3Sdoh5i 📖 Pre-order: Python Basics for Hackers (Autographed & 50% off): https://www.hackers-arise.com/online-store/Python-Basics-for-Hackers-Pre-Order-50-off-and-autographed-p706286286 🛒 Hackers-Arise - Online Store: https://www.hackers-arise.com/online-store 🌐 OccupyTheWeb Community - Hackers-Arise: 🎟️ 20% Coupon Code: "YANIV" (Use for everything in the store!) Chapters: 00:00–00:02 Disclaimer 00:02–00:42 Preview + What We'll Cover Today 00:42–00:58 What is Session Hijacking? 00:58–02:21 How It Works 02:21–02:30 Disclaimer 02:30–04:41 Simple Demo With Cookie Editor 04:41–05:20 Summary and Conclusion 🎥 Watch More Cybersecurity Fundamental Videos: 1️⃣ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2️⃣ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3️⃣ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4️⃣ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5️⃣ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6️⃣ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7️⃣ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8️⃣ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9️⃣ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo 🔟 Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo 🐎 Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 🛠️ Stuxnet: https://youtu.be/fLwLRvp1YFA 🔐 API Hacking: https://youtu.be/1t5wXWFI0yU 🌐 DNS Hacking: https://youtu.be/Hsj_67RhNMc 💻 How to Build a Hacking Box: https://youtu.be/vnYmb6spw30
Medusa The Ransomware Paralyzing Companies | With OTW
32:34

Medusa The Ransomware Paralyzing Companies | With OTW

Medusa Ransomware is one of the most advanced and dangerous malware strains in the world — capable of locking entire corporations out of their systems and demanding millions in ransom. But how does it work? And why has it become a nightmare for cybersecurity teams worldwide? 🔍🧠 In this deep dive, I sit down with legendary hacker OccupyTheWeb (OTW) to uncover the inner workings of Medusa Ransomware — from its infection vectors to its advanced encryption techniques. Learn how attackers deploy Medusa, how victims are trapped, and why this ransomware is changing the game for digital extortion. 🔥 Key Topics Covered: ✅ How Medusa Ransomware infiltrates systems ✅ The tactics hackers use to maximize damage ✅ Why traditional defenses often fail against Medusa ✅ Real-world impact on companies and organizations ✅ How to protect yourself from ransomware threats 💡 Don’t miss this essential breakdown of one of the most dangerous cyber threats in the wild — and learn how hackers think, attack, and stay ahead of the curve. 📢 Don’t miss this eye-opening breakdown of how cartels leverage tech to stay untouchable. 🔔 Subscribe for more deep dives into cybercrime, hacking, and security threats! 💙 Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman 💼 LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com (Personal) 📚 OccupyTheWeb Books - Affiliate Links: 1️⃣ Become a Master Hacker: https://amzn.to/3Eq6vX4 2️⃣ NEW BOOK: Network Basics for Hackers: https://amzn.to/3YNd1iz 3️⃣ Linux Basics for Hackers: https://amzn.to/3Sdoh5i 📖 Pre-order: Python Basics for Hackers (Autographed & 50% off): https://www.hackers-arise.com/online-store/Python-Basics-for-Hackers-Pre-Order-50-off-and-autographed-p706286286 🛒 Hackers-Arise - Online Store: https://www.hackers-arise.com/online-store 🌐 OccupyTheWeb Community - Hackers-Arise: 🎟️ 20% Coupon Code: "YANIV" (Use for everything in the store!) Chapters: 00:00-00:33 What we'll cover today. 00:33-00:42 OTW! 00:42-01:38 Everything we’ll cover and much more..... 01:38-05:28 Ramsomware in General 05:28-07:55 The Second Step of Ransomware 07:55-10:31 Ramsomware as a Service 10:32-12:45 Cybersecurity insurance 12:45-14:20 Sophisticated Evasion techniques 14:20-16:50 Remote Desktop Protocol 16:50-18:59 Articles about medusa Ramsomware 18:59-20:49 Mimikatz 20:49-21:56 News and Companies Hack 21:56-27:32 Double Extorsion Medusa Ramsomware 27:32-29:36 Example in Hospital System 29:36-32:33 Summary and Conclusion 🎥 Watch More Cybersecurity Fundamental Videos: 1️⃣ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2️⃣ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3️⃣ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4️⃣ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5️⃣ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6️⃣ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7️⃣ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8️⃣ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9️⃣ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo 🔟 Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo 🐎 Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 🛠️ Stuxnet: https://youtu.be/fLwLRvp1YFA 🔐 API Hacking: https://youtu.be/1t5wXWFI0yU 🌐 DNS Hacking: https://youtu.be/Hsj_67RhNMc 💻 How to Build a Hacking Box: https://youtu.be/vnYmb6spw30
HackyPi: The Tiny Hacking Tool You NEED to See! 🔥 #cybersecuritycompany #pentesting #hacker
00:46

HackyPi: The Tiny Hacking Tool You NEED to See! 🔥 #cybersecuritycompany #pentesting #hacker

Discover HackyPi — a compact, powerful hacking tool that fits in your pocket! Perfect for ethical hackers and pentesters on the go. In this short, I show what it can do and why it's a must-have in your toolkit. Disclaimer - Only for Ethical Hacking !!!! 💙 Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman 💼 LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com 🎥 Watch More Cybersecurity Fundamental Videos: 1️⃣ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2️⃣ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3️⃣ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4️⃣ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5️⃣ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6️⃣ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7️⃣ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8️⃣ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9️⃣ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo 🔟 Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo 🐎 Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 🛠️ Stuxnet: https://youtu.be/fLwLRvp1YFA 🔐 API Hacking: https://youtu.be/1t5wXWFI0yU 🌐 DNS Hacking: https://youtu.be/Hsj_67RhNMc 💻 How to Build a Hacking Box: https://youtu.be/vnYmb6spw30
How Mexican Cartels Built a Secret Phone Network
35:31

How Mexican Cartels Built a Secret Phone Network

🚨 Mexican cartels have taken technology to the next level by creating their own private cellular networks—completely off the grid and beyond law enforcement’s reach. But how did they do it? And why is this a game-changer for criminal operations, security, and surveillance? 🔍📞#MexicanCartels #SecretPhoneNetwork #CyberCrime In this deep dive, we uncover the technology behind cartel communications, exploring how they build and maintain secure, untraceable networks to stay ahead of authorities. From hacked infrastructure to encrypted mobile systems, you’ll learn how these organizations use cutting-edge tech to maintain control. 🔥 Key Topics Covered: ✅ How cartels secretly build and operate private phone networks ✅ The technology they use to avoid detection ✅ Why law enforcement struggles to shut them down ✅ The impact of these networks on security and global crime 📢 Don’t miss this eye-opening breakdown of how cartels leverage tech to stay untouchable. 🔔 Subscribe for more deep dives into cybercrime, hacking, and security threats! 💙 Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman 💼 LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com (Personal) 📚 OccupyTheWeb Books - Affiliate Links: 1️⃣ Become a Master Hacker: https://amzn.to/3Eq6vX4 2️⃣ NEW BOOK: Network Basics for Hackers: https://amzn.to/3YNd1iz 3️⃣ Linux Basics for Hackers: https://amzn.to/3Sdoh5i 📖 Pre-order: Python Basics for Hackers (Autographed & 50% off): https://www.hackers-arise.com/online-store/Python-Basics-for-Hackers-Pre-Order-50-off-and-autographed-p706286286 🛒 Hackers-Arise - Online Store: https://www.hackers-arise.com/online-store 🌐 OccupyTheWeb Community - Hackers-Arise: 🎟️ 20% Coupon Code: "YANIV" (Use for everything in the store!) Chapters: 00:00-00:32 What we'll cover today. 00:32-01:20 Everything we’ll cover and much more..... 01:20-01:44 OTW! 01:44-03:21 The cartels and Operations 03:21-08:55 They Build Their Own Celular Network 08:55-11:03 The advantage of using low Frecuency 11:03-11:46 OPEN BTS 11:46-14:26 DragonOS and Signals Inteligence 14:26-17:55 The importance of not intercepting signals. 17:55-20:52 Private Celullar Netwroks 20:52-26:01 Next level of security in Comunications 26:01-30:05 Do i Have Privacy Solutions Today 30:05-32:28 People Think is Science Fiction 32:28-35:30 Key takeways and conclusion 🎥 Watch More Cybersecurity Fundamental Videos: 1️⃣ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2️⃣ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3️⃣ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4️⃣ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5️⃣ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6️⃣ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7️⃣ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8️⃣ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9️⃣ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo 🔟 Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo 🐎 Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 🛠️ Stuxnet: https://youtu.be/fLwLRvp1YFA 🔐 API Hacking: https://youtu.be/1t5wXWFI0yU 🌐 DNS Hacking: https://youtu.be/Hsj_67RhNMc 💻 How to Build a Hacking Box: https://youtu.be/vnYmb6spw30
LLM Security EXPOSED! How Hackers Attack AI Models  #chatgpt #ethicalhacking101 #cybersecurity
00:40

LLM Security EXPOSED! How Hackers Attack AI Models #chatgpt #ethicalhacking101 #cybersecurity

🚀 Ready to dive into the world of large language models (LLMs)? Whether you're a cybersecurity enthusiast, a data scientist, or simply curious about how LLMs can be hacked and protected, this video will give you the insights you need to stay ahead of the game. 🌐🔍 Full Video Link: https://youtu.be/6bYGhY9HB8k Disclaimer: This video is for educational purposes only. We do not encourage or support any illegal activity. The techniques discussed are meant to highlight security vulnerabilities and help individuals enhance their own cybersecurity awareness. Always obtain proper authorization before engaging in any form of testing or assessments. 📚 What You'll Learn: From understanding how hackers exploit language models to building defenses, this video will guide you through the critical concepts of LLM security. Learn how adversarial attacks work and how to safeguard your models from being manipulated. 💻🔐 ⚠️ Key Topics Covered: 🔄 Understanding Language Model Vulnerabilities: Explore how attackers exploit weaknesses in LLMs to manipulate outputs or extract sensitive data. 🛠️ Common Hacking Techniques: Learn about techniques like prompt injection, backdoor attacks, and how they impact model security. ⚡ Adversarial Attacks & Mitigation: Discover how adversarial examples are used to fool models, and the cutting-edge defenses to protect against them. 🛡️ Protecting Your Models: Practical tips on how to secure your LLMs from data leaks, model inversion, and other threats. 🌐 Securing Large-Scale Models: Best practices for deploying and maintaining large models in a secure environment, including model testing and monitoring. 🌟 This video is ideal for AI researchers, cybersecurity professionals, and anyone interested in the intersection of artificial intelligence and security. Empower yourself with the knowledge to build robust, secure models and stay one step ahead of potential threats. 🔍🛡️ 🔒 Don’t forget to like, comment, and subscribe for more expert insights, tutorials, and updates on AI and cybersecurity! 💙 Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman 💼 LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com (Personal)
How to Attack and Defend LLMs: AI Security Explained
01:04:39

How to Attack and Defend LLMs: AI Security Explained

🚀 Ready to dive into the world of large language models (LLMs)? Whether you're a cybersecurity enthusiast, a data scientist, or simply curious about how LLMs can be hacked and protected, this video will give you the insights you need to stay ahead of the game. 🌐🔍 Disclaimer: This video is for educational purposes only. We do not encourage or support any illegal activity. The techniques discussed are meant to highlight security vulnerabilities and help individuals enhance their own cybersecurity awareness. Always obtain proper authorization before engaging in any form of testing or assessments. 📚 What You'll Learn: From understanding how hackers exploit language models to building defenses, this video will guide you through the critical concepts of LLM security. Learn how adversarial attacks work and how to safeguard your models from being manipulated. 💻🔐 ⚠️ Key Topics Covered: 🔄 Understanding Language Model Vulnerabilities: Explore how attackers exploit weaknesses in LLMs to manipulate outputs or extract sensitive data. 🛠️ Common Hacking Techniques: Learn about techniques like prompt injection, backdoor attacks, and how they impact model security. ⚡ Adversarial Attacks & Mitigation: Discover how adversarial examples are used to fool models, and the cutting-edge defenses to protect against them. 🛡️ Protecting Your Models: Practical tips on how to secure your LLMs from data leaks, model inversion, and other threats. 🌐 Securing Large-Scale Models: Best practices for deploying and maintaining large models in a secure environment, including model testing and monitoring. 🌟 This video is ideal for AI researchers, cybersecurity professionals, and anyone interested in the intersection of artificial intelligence and security. Empower yourself with the knowledge to build robust, secure models and stay one step ahead of potential threats. 🔍🛡️ 🔒 Don’t forget to like, comment, and subscribe for more expert insights, tutorials, and updates on AI and cybersecurity! 💙 Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman 💼 LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com (Personal) 📚 OccupyTheWeb Books - Affiliate Links: 1️⃣ Become a Master Hacker: https://amzn.to/3Eq6vX4 2️⃣ NEW BOOK: Network Basics for Hackers: https://amzn.to/3YNd1iz 3️⃣ Linux Basics for Hackers: https://amzn.to/3Sdoh5i 📖 Pre-order: Python Basics for Hackers (Autographed & 50% off): https://www.hackers-arise.com/online-store/Python-Basics-for-Hackers-Pre-Order-50-off-and-autographed-p706286286 🛒 Hackers-Arise - Online Store: https://www.hackers-arise.com/online-store 🌐 OccupyTheWeb Community - Hackers-Arise: 🎟️ 20% Coupon Code: "YANIV" (Use for everything in the store!) Chapters: 00:00-00:02 Disclaimer 00:02-00:43 What we'll cover today. 00:43-01:33 Everything we’ll cover and much more..... 01:33-03:12 Holly Wright 03:12-03:48 Start with basics 03:48-05:45 Disclaimer 05:45-07:18 What is Large lengauge Model 07:18-08:56 What does it means to Hack a LLM 08:56-13:01 How Does this Differ to Classic AI 13:01-14:24 Why matter if someone can Hack LLM 14:24-16:21 How do organisations usually deploy a LLM 16:21-19:34 Context ignoring attack 19:34-22:24 Prompt Leaking 22:24-25:13 Role Play AttackI 25:13-28:03 Prefix Injection & Refusal Suppression 28:03-30:09 Training DATA Reconstruction 30:09-32:46 Malicious Action Generation 32:46-35:58 Token Wasting and Denial of Service Attacks 35:58-38:56 Few Shot Attack 38:56-42:00 Speial Case Attacks 42:00-53:07 Syntactic Transformation Attack 53:07-58:47 How do we Protect LLMs 58:47-1:00:51 Hackathon Protect the runtime usage of LLMs 1:00:51-1:04:13 Look in practice 1:04:13-1:04:38 Summary and Conclusion 🎥 Watch More Cybersecurity Fundamental Videos: 1️⃣ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2️⃣ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3️⃣ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4️⃣ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5️⃣ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6️⃣ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7️⃣ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8️⃣ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9️⃣ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo 🔟 Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo 🐎 Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 🛠️ Stuxnet: https://youtu.be/fLwLRvp1YFA 🔐 API Hacking: https://youtu.be/1t5wXWFI0yU 🌐 DNS Hacking: https://youtu.be/Hsj_67RhNMc 💻 How to Build a Hacking Box: https://youtu.be/vnYmb6spw30
Password Cracking in Cybersecurity: How It Works
18:25

Password Cracking in Cybersecurity: How It Works

🚀 Whether you're a cybersecurity enthusiast, a tech professional, or just curious about how hackers break into systems, this video will equip you with the knowledge to stay protected. 🌐🔍 Disclaimer: This video is for educational purposes only. We do not encourage or support any form of illegal activity. The techniques discussed are intended to help individuals understand security vulnerabilities and improve their own cybersecurity awareness. Always obtain proper authorization before testing or engaging in any form of password cracking or security assessments. 📚 What You'll Learn: From the basics of password hashing to advanced cracking techniques using tools like Hashcat, we’ll walk you through step-by-step how passwords are compromised—and how you can build unbreakable defenses. Learn how to simulate real-world attacks to identify vulnerabilities and fortify your security systems. 💻🔐 ⚠️ Key Topics Covered: 🔄 Understanding Hashing & Salting: Learn how passwords are transformed into hashes and why salting is critical for security. 🛠️ Cracking Tools Explained: Dive into powerful tools like Hashcat, John the Ripper, and Hydra—and how they're used in ethical hacking. ⚡ GPU-Powered Attacks: Discover how GPUs supercharge cracking speed and why that matters for both attackers and defenders. 🛡️ Defensive Strategies: Learn practical steps to protect your passwords from common attacks like rainbow tables and brute force. 💾 Installing & Using Hashcat: A step-by-step guide to setting up Hashcat on Linux, Windows, and macOS. 🌟 This video is perfect for ethical hackers, IT professionals, and anyone looking to strengthen their digital defenses. Knowledge is power—use it wisely to stay ahead of potential threats. 🔍🛡️ 🔒 Don’t forget to like, comment, and subscribe for more expert cybersecurity tips, resources, and updates!* 💙 Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman 💼 LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com (Personal) 📚 OccupyTheWeb Books - Affiliate Links: 1️⃣ Become a Master Hacker: https://amzn.to/3Eq6vX4 2️⃣ NEW BOOK: Network Basics for Hackers: https://amzn.to/3YNd1iz 3️⃣ Linux Basics for Hackers: https://amzn.to/3Sdoh5i 📖 Pre-order: Python Basics for Hackers (Autographed & 50% off): https://www.hackers-arise.com/online-store/Python-Basics-for-Hackers-Pre-Order-50-off-and-autographed-p706286286 🛒 Hackers-Arise - Online Store: https://www.hackers-arise.com/online-store 🌐 OccupyTheWeb Community - Hackers-Arise: 🎟️ 20% Coupon Code: "YANIV" (Use for everything in the store!) Chapters: Chapters: 00:00-00:40 What we'll cover today. 00:40-01:07 What does hashing mean? 01:07-01:42 Example 01:42-03:00 Salting 03:00-04:30 How it works in practice 04:30-05:17 How to Install and Use Hashcat 05:17-08:32 Wordlist 08:32-10:18 Multiple Attacks Modes 10:18-12:16 Encryption 12:16-13:52 How Easy is a Password is to crack? 13:52-16:13 Time to Hash or Encrypt 16:13-17:10 Multi Factor Authenthication 17:10-18:24 Key takeways and conclusion 🎥 Watch More Cybersecurity Fundamental Videos: 1️⃣ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2️⃣ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3️⃣ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4️⃣ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5️⃣ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6️⃣ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7️⃣ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8️⃣ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9️⃣ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo 🔟 Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo 🐎 Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 🛠️ Stuxnet: https://youtu.be/fLwLRvp1YFA 🔐 API Hacking: https://youtu.be/1t5wXWFI0yU 🌐 DNS Hacking: https://youtu.be/Hsj_67RhNMc 💻 How to Build a Hacking Box: https://youtu.be/vnYmb6spw30
Jetson Nano A Compact Powerhouse for Cybersecurit
02:30

Jetson Nano A Compact Powerhouse for Cybersecurit

🚀 Unleashing the Power of the NVIDIA Jetson Nano 🚀 Imagine a world where a device smaller than your palm becomes a game-changer for AI and cybersecurity projects. Well, that’s exactly what I’ve started exploring with the Jetson Nano Developer Kit—a compact powerhouse packed with: ✅ NVIDIA Maxwell GPU ✅ Quad-core ARM Cortex A57 processor ✅ 4GB memory ✅ Ports galore: 4 USB 3.0, Gigabit Ethernet, 4K HDMI, DisplayPort, and more! This tiny device isn’t just about impressive hardware—it’s about the possibilities it unlocks! 💡 🔐 What am I building? I’m taking this powerful little machine and diving into cybersecurity innovation. Here’s what I’m planning: 1️⃣ Using AI to detect network anomalies and stop threats in their tracks. 2️⃣ Building a portable penetration testing lab, making ethical hacking more accessible. 3️⃣ Leveraging AI to analyze and protect against phishing attacks, one of the biggest threats we face today. 💻 I’ll be sharing a video series soon on my YouTube channel, breaking down each project step by step. Whether you’re into AI, ethical hacking, or just love seeing technology at its best, there’s something for you! 🔔 What’s Next? The first video is on the way, starting with an overview of the Jetson Nano and why it’s a must-have for cybersecurity pros. I’ll show you how I set it up, what makes it so versatile, and what you can do with it. If you’re excited about AI-powered cybersecurity, stay tuned! What would you build with the Jetson Nano? Let me know in the comments! 👇 #JetsonNano #AI #Cybersecurity #Innovation #EthicalHacking #TechProjects #nvidia
bottom of page