#hacking
Occupy The Web (OTW) explains how hacks shown in the Mr Robot TV Series actually work (and if they are actually realistic). He compares real world WiFi, Bluetooth and Scada hacking vs what is shown in the TV series.
In this video we discuss the hacks in Mr Robot Season 1 Episode 6. Which other episodes or technologies do you want us to cover in future videos? Please comment.
Want to learn more from Occupy the Web? You can join his classes using these links:
Hacker's Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/onli....ne-store/Member-PRO-
Get 3 year's access to all live courses for $750:
https://hackers-arise.com/onli....ne-store/Become-a-Ha
// MENU //
00:00 ▶️ Just By Googling
00:21 ▶️ Welcome Back//OTW
01:13 ▶️ New Series//Hacking with OTW!
01:50 ▶️ Why Mr Robot?
04:47 ▶️ The Hack We're Doing//Mr Robot S1E6
06:27 ▶️ Context//Why Elliot Is Doing This Hack
07:58 ▶️ What is a Rubber Ducky?
09:36 ▶️ Attempt_01//What they try in Mr Robot
11:13 ▶️ Real World//Realistic or Not?
12:44 ▶️ Mr Robot Breakdown//Scanning for Devices
13:25 ▶️ WPA2 Cracked in 30 seconds?
13:41 ▶️ How WPA2 is Cracked
14:13 ▶️ Elliot Discovers a Way In
14:53 ▶️ How to Scan Networks With Your Phone
15:27 ▶️ How to Crack a Network Password
16:10 ▶️ Continued//Elliot Discovers a Way In
16:55 ▶️ Start//Doing the Same Hack
17:17 ▶️ hciconfig
17:52 ▶️ What Bluetooth Adapter Do You Need?
18:26 ▶️ Using Bluetooth Adapter in a VM
19:03 ▶️ Continued//hciconfig
19:43 ▶️ hciconfig in Mr Robot
19:56 ▶️ Next Step//hcitool
21:00 ▶️ Comment!//Should We Do All the Hacks in Mr Robot?
21:53 ▶️ Next Step//hcitool inq
22:03 ▶️ Bluetooth Device Classes
23:18 ▶️ MultiBlue in Mr Robot//What It Does
24:25 ▶️ Next Step//Spooftooph
26:41 ▶️ VMs & Newer Bluetooth Versions//Potential Problems
28:13 ▶️ Summary//Spoofing in Mr Robot
29:20 ▶️ IRL//How This Would Actually Be Done
29:29 ▶️ PLC Block Diagram
29:36 ▶️ Siemens PLC Used for Prison Systems
30:00 ▶️ Typical Prison Design
30:36 ▶️ Prison Door System Schematic
31:16 ▶️ Explained//Ladder Logic
32:46 ▶️ Mr Robot//What is Unrealistic
34:10 ▶️ Finding SCADA Systems//Too Awesome for YouTube
36:34 ▶️ How Vulnerable Are SCADA Systems?
38:54 ▶️ Where to Learn How to Hack SCADA Systems
40:40 ▶️ Learn for Free at Hackers-Arise or Sign Up For Courses
41:23 ▶️ Comment!//What Videos Would You Like to See?
42:50 ▶️ Future Videos with OTW on Mr Robot!
44:32 ▶️ Software Defined Radio for Hackers?
45:00 ▶️ Thank You, OTW!
// Devices used in video //
Hak5 Rubber Ducky: https://davidbombal.wiki/gethak5
Panda Bluetooth 4.0 USB Nano Adapter : https://amzn.to/3NlSlbQ
MultiBlue Dongle USB Bluetooth V3.0 HiD: Not available unfortunately.
// Previous videos //
OTW Hacking Russia: https://youtu.be/GudY7XYouRk
OTW Hacking Scada: https://youtu.be/uXbGQiXsRes
OTW Hacking CCTV: https://youtu.be/ZGCScbV7vSA
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web social //
Twitter: https://twitter.com/three_cube
// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
How Elliot hacked the prison: https://www.hackers-arise.com/....post/2016/08/14/Mr-R
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
https://davidbombal.wiki/scada1
Lots of Scada content:
https://www.hackers-arise.com/scada-hacking
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
hacking
hack
mr robot
mr robot bluetooth
mr robot scada
scada
scada hacking
bluetooth
bluetooth hacking
bluetooth hack
mr robot bluetooth
mr robot season 1 episode 6
mr robot season 1
google dorks
shodan
scada hacks
scada hacking
scada google dorks
wifi
wifi hacking
wpa hacking
wpa2 hacking
wifi hack
wpa2 hack
mr robot wpa
mr robot wpa2
hack scada
bluetooth keyboard hacks
bluetooth panda
panda bluetooth
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#wifi #bluetooth #hacking
#linode #apacheguacamole #linux
installation guide 👉 : https://cynone.com
How to unlock PIN protected Android device With cilocks
#hack #android #hacking #newbies #linuxliwary
linux installation
git clone https://github.com/tegal1337/CiLocks
cd CiLocks
chmod +x cilocks
sudo bash cilocks
or sudo ./cilocks
-~-~~-~~~-~~-~-
Please watch: "Python for Beginners - Python Full Course for Beginners | Zero to Hero with Python"
https://www.youtube.com/watch?v=ClwTUCV7hXE
-~-~~-~~~-~~-~-
#hacking #skills #2023
i want to apologize for how long it took to get this video out :' ) Well, it's finally here! I hope you guys enjoyed this, as always leave a like to support the channel and comment something! I intend to make this a part-series like the "Explaining Common Lingo" video - so please leave your suggestions in the comments below.
If you're reading this, comment "ISSA MOD!"
🔖 My Socials:
avatar/mascot made with picrew: https://picrew.me/en/image_maker/1108773
- full credits to the artist: https://twitter.com/mimisentakosen
- visit her shop: https://coconala.com/services/....1871766?ref=profile_
official discord server: https://dsc.gg/crow-academy
https://crows-nest.gitbook.io/
https://github.com/cr-0w
https://twitter.com/cr0ww_
💖 Support My Work:
https://www.patreon.com/cr0w
https://ko-fi.com/cr0ww
https://www.buymeacoffee.com/cr0w
❤️ Websites/Channels/Videos Mentioned:
Google Dorks Database: https://www.exploit-db.com/google-hacking-database
@LiveOverflow's "asking questions videos":
https://youtu.be/53zkBvL4ZB4
https://youtu.be/3IEAfyQqUKc
@TCMSecurityAcademy's "bug bounty video":
https://youtu.be/qme4rAD2mlM
🎵 All music used belongs to Wizet, Nexon © Copyright Wizet, Nexon
The images and music used in this video are used under the principle of fair use for the purpose of criticism, comment, news reporting, teaching, scholarship, and research. I do not claim ownership of any of the images/music and they are used solely for the purpose of enhancing the content of the video. I respect the rights of the creators and owners of these images and will remove any image upon request by the rightful owner.
Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.
🕰️ Timestamps:
00:00 - 00:09 Official Discord Server!
00:10 - 01:06 Intro
01:07 - 03:17 Discipline
03:18 - 04:15 Failure
04:16 - 05:52 Reporting
05:53 - 07:19 Attention To Detail
07:20 - 08:20 Linux/Windows
08:21 - 10:30 Programming
10:31 - 11:40 Automation
11:41 - 13:14 Networking
13:15 - 16:12 Web Applications
16:13 - 18:34 Researching/Google
18:35 - 19:06 Outro
#hackers #becomehacker #hacking
Welcome To the HackerJoe Channel. Joe is here, I'm all about helping you to know the best and most amazing things about hacking.
Join our growing community
Buy hacker hoodies:- https://ab0f45-2.myshopify.com/
Where else you can find me:
Twitter:- http://twitter.com/hackerjoee
👾 Follow this link to know more protect yourself from fraudsters: https://sumsub.com/liveness/
In this experimental video, we’ll explore the possibility of hacking any password using bruteforce. You're gonna see a step-by-step breakdown of the process. We showcase the tools and techniques commonly used by hackers in order to show the vulnerabilities in password security.
You will find out about practical tips on creating strong, unique passwords and explore additional measures like two-factor authentication.
Don't miss out! Watch now and elevate your knowledge of password security.
#bruteforce #bruteforcing #hacking #sumsub #wifi
00:00 Time to hack a password
02:45 What is offline bruteforcing?
03:52 How can you be hacked?
04:42 What is a Hash?
06:24 Bruteforcing process
13:17 Verification Tool
14:02 Tips from Bruteforcing
16:32 The End
Sumsub — empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.
More about us:
https://sumsub.com
https://twitter.com/Sumsubcom
https://www.instagram.com/sumsubcom/
https://www.linkedin.com/company/18232778/admin/