This is my second interview with professional hacker Occupy The Web. In this video we discuss OSINT and hacking of industrial control systems (ICS) using SCADA (supervisory control and data acquisition). Go to 33:40 for discussions to expire. Disclaimer: Occupy The Web’s views expressed in this interview are his own. // MENU // 00:00 ▶ ️ Introduction 00:41 ▶ ️ Disclaimer 00:46 ▶ ️ Introduction with OccupyTheWeb 01:30 ▶ ️ Webcam hacking in Ukraine 03:55 ▶ ️ Find Russian superyachts with OSINT 05:47 ▶ ️ Why monitor Russian superyachts? 09:10 ▶ ️ Russian oligarchs 10:54 ▶ ️ YouTube / OccupyTheWeb comments are not CIA / NSA 12:37 ▶ ️ This is not the US 13:09 ▶ ️ Introduction to OSINT and OSINT tools 14:51 ▶ ️ OSINT as a career 15: 22 ▶ ️ Other uses of OSINT 16:38 ▶ ️ OSINT can find anything about anyone 18:21 ▶ ️ Phones / How to avoid being tracked 19:22 ▶ ️ Turning off GPS does not stop tracking 20:35 ▶ ️ Using a phone with a burner 23 : 30 ▶ ️ Tips for staying anonymous online 26:36 ▶ ️ Physical machine different from virtual machine for privacy 28:08 ▶ ️ Cellular networks – IP addresses 29:36 ▶ ️ Before talking about SCADA 33:49 ▶ ️ Hacking SCADA as a nuclear option 38 : 25 ▶ ️ Why should it be the nuclear option? 40:11 ▶ ️ Example of SCADA hacking / The Colonial Pipeline 42:13 ▶ ️ The difference between a traditional IT system and a SCADA system 44:07 ▶ ️ SCADA protocols 46:03 ▶ ️ Example of SCADA / Stuxnet hacking 49:06 ▶ ️ Why these systems are they connected to the internet in the first place? 51:52 ▶ ️ Almost all SCADA systems are online 52:24 ▶ ️ How to find SCADA systems online 56:51 ▶ ️ Why SCADA attacks are not simple 57:57 ▶ ️ But there is still a huge risk for SCADA attacks 01:01 : 39 ▶ ️ How Businesses Can Protect Their SCADA Systems 01:03:07 ▶ ️ People Don’t Do What They Should Be 01:05:00 ▶ ️ Final Thoughts / Teaser for Next Video with OccupyTheWeb 01:05:30 ▶ ️ Closing / Leave a comment! // Previous video // OTW 1 video: // SOCIAL by David // Discord: Twitter: Instagram: LinkedIn: Facebook: TikTok: YouTube: // Social by Occupy The Web // Twitter: // Books by Occupy The Web / / Linux for Hackers Fundamentals: Getting Started Becoming an Expert Hacker: // Occupy The Web Website / Hackers Born From Website // Website: Using OSINT to Find Yachts: The CIA or other intelligence agencies can monitor every My move: Hacking SCADA: the main differences between the security of SCADA and traditional IT systems Hacking SCADA: finding SCADA systems using Shodan Shodan: using Shodan to find vulnerable Russian SCADA / ICS sites Hacking SCADA: the most important SCADA / ICS attacks in the story Hacking SCADA: SCADA / ICS protocols (Profinet / Profibus) Lots of Scada content: // In the news // Feds discover “Swiss Army knife” for hacking industrial control systems: Ukrainian power grid is “lucky “to resist the the Russian cyberattack: an unprecedented look at Stuxnet, the world’s first digital weapon // More books // Linux Command line: how Linux works: // MY STUFF // // SPONSOR // Interested in sponsoring my video? Contact my team here: [email protected] ukraine russian scada modbus ics industrial control systems occupy the web occupy the web hackers arise hackersarise ddos ​​ukraine cybersecurity war ukraine cyber attack russia ukraine news russia vs ukraine cyber warfare russian invasion russia ukraine ukraine crisis cyber security crisis cyber warfare cyber attack cyber war russia cyber war russia cyber attack cyber warfare against russia cyber security news ukraine ukraine war cyber attack today cybernews ukraine 2022 ukraine news ukraine russia ukraine anonymous conflict hack hackers hacking cyber attacks russia vs ukraine russia ukrainian war cyber attack russian ukraine russian news russia ukraine cyber Please note that the listed links may be affiliate links and provide me a small percentage / cash on delivery in case you use them to buy re one of the items listed or recommended. Thanks for supporting me and this channel! #ukraine #russia #scada


0
0
votes

Article Rating