This is my second interview with the professional hacker Occupy The Web. In this video we discuss OSINT and hacking industrial control systems (ics) using scada (supervisory control and data acquisition). Jump to 33:40 for Scada discussions. Disclaimer: The opinions expressed by Occupy The Web in this interview are his own. // MENU // 00:00 ▶️ Introduction 00:41 ▶️ Disclaimer 00:46 ▶️ Intro With OccupyTheWeb 01:30 ▶️ Ukraine Web Cam Hacking 03:55 ▶️ Finding Russian Superyachts With OSINT 05:47 ▶️ Why Track Russian Superyachts? 09:10 ▶️ Russian Oligarchs 10:54 ▶️ The YouTube Comments/OccupyTheWeb is Not CIA/NSA 12:37 ▶️ It’s Not About the US 13:09 ▶️ Getting Started with OSINT and OSINT Tools 14:51 ▶️ OSINT As a Career 15:22 ▶️ Other Uses For OSINT 16:38 ▶️ OSINT Can Find Anything About Anybody 18:21 ▶️ Phones/How To Avoid Being Tracked 19:22 ▶️ Turning Off Your GPS Doesn’t Stop Tracking 20:35 ▶️ Use a Burner Phone 23:30 ▶️ Tips To Stay Anonymous Online 26:36 ▶️ Different Physical Machine vs Virtual Machine for Privacy 28:08 ▶️ Cellphone Networks – IP Addresses 29:36 ▶️ Before We Talk About SCADA 33:49 ▶️ SCADA Hacking As The Nuclear Option 38:25 ▶️ Why Would It Be The Nuclear Option? 40:11 ▶️ SCADA Hacking Example/The Colonial Pipeline 42:13 ▶️ The Difference Between a Traditional IT System and a SCADA System 44:07 ▶️ SCADA Protocols 46:03 ▶️ SCADA Hacking Example/Stuxnet 49:06 ▶️ Why Are These Systems Connected To The Internet In The First Place? 51:52 ▶️ Almost All SCADA Systems Are Online 52:24 ▶️ How To Find SCADA Systems Online 56:51 ▶️ Why SCADA Attacks Aren’t Simple 57:57 ▶️ But There Is Still A Huge Risk For SCADA Attacks 01:01:39 ▶️ How Companies Can Secure Their SCADA Systems 01:03:07 ▶️ People Don’t Do What They’re Supposed To Do 01:05:00 ▶️ Final Thoughts/Teaser For The Next Video With OccupyTheWeb 01:05:30 ▶️ Closing/Leave a Comment! // David’s SOCIAL // Discord: Twitter: Instagram: LinkedIn: Facebook: TikTok: YouTube: // Occupy The Web social // Twitter: // Occupy The Web books // Linux Basics for Hackers: Getting Started Becoming a Master Hacker: // Occupy The Web Website / Hackers Arise Website // Website: Using OSINT to find Yachts: Can the CIA or other Intelligence Agencies Track My Every Move: SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems SCADA Hacking: Finding SCADA Systems using Shodan Shodan: Using Shodan to Find Vulnerable Russian SCADA/ICS Sites SCADA Hacking: The Most Important SCADA/ICS Attacks in History SCADA Hacking: SCADA/ICS Protocols (Profinet/Profibus) Lots of Scada content: // In the News // Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems: Ukrainian power grid ‘lucky’ to withstand Russian cyber-attack: An Unprecedented Look at Stuxnet, the World’s First Digital Weapon // Other books // The Linux Command Line: How Linux Works: // MY STUFF // // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] ukraine russa scada modbus ics industrial control systems occupytheweb occupy the web hackers arise hackersarise ddos ukraine war cybersecurity ukraine cyber attack russia ukraine news russia vs ukraine cyberwar russian invasion russia ukraine crisis ukraine crisis cyber security cyberwarfare putin cyber attack cyber war russia cyberwar russia cyber attack cyberwar against russia cyber security news ukraine war ukraine cyber attack today russians cybernews ukraine 2022 ukraine news russia ukraine conflict anonymous hack hacker hacking cyberattacks russia vs ukraine ukraine russia news russia ukraine war russian cyber attack russian ukraine news russia ukraine cyber Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #ukraine #russia #scada

For more hacking info and tutorials visit:

Hello and welcome to the temple of cybersecurity. Now you are watching Interview: Hacking Power Plants and Industrial Control Systems (Scada) // Ukraine Russia Cyberwar published at April 17, 2022 at 09:00AM. If you are looking for tutorials and all the news about the world of hacking and computer security, you have come to the right place. We invite you to subscribe to our newsletter in the box at the top and to follow us on our social networks:

NFT store:

We also invite you to visit the other blogs in our network, where you can find something for every taste.

Ignore tags: