Something I really love about David’s videos, especially when he has people on his channel, is that he asks the questions that WE as the viewers would ask if we were sitting where he is.
27:04 You need to add the device to the VM (for VirtualBox, USB section in the VM settings ) to make the device stay in the VM (VM will grab the device automatically).
Support team didn’t work, this video couldn’t help either but I’m happy Zspynerd ⬆️ was able to unban my account permanently from tinder database! Y’all check him out.
Mr. Robot would have been so much more exciting to watch after learning the commands Elliot was using. He made it so simple to understand. Thanks so much!
This is a great work dude, as an ex military personal it brought back fond memories of my working days with my team mates. I have to say I'm really impressed with how you embraced the true spirit of the helping people uncover truth and cheating spirit. Well done *Metaspyclub* from the USA.
// MENU // 00:00 ▶ Just By Googling 00:21 ▶ Welcome Back//OTW 01:13 ▶ New Series//Hacking with OTW! 01:50 ▶ Why Mr Robot? 04:47 ▶ The Hack We're Doing//Mr Robot S1E6 06:27 ▶ Context//Why Elliot Is Doing This Hack 07:58 ▶ What is a Rubber Ducky? 09:36 ▶ Attempt_01//What they try in Mr Robot 11:13 ▶ Real World//Realistic or Not? 12:44 ▶ Mr Robot Breakdown//Scanning for Devices 13:25 ▶ WPA2 Cracked in 30 seconds? 13:41 ▶ How WPA2 is Cracked 14:13 ▶ Elliot Discovers a Way In 14:53 ▶ How to Scan Networks With Your Phone 15:27 ▶ How to Crack a Network Password 16:10 ▶ Continued//Elliot Discovers a Way In 16:55 ▶ Start//Doing the Same Hack 17:17 ▶ hciconfig 17:52 ▶ What Bluetooth Adapter Do You Need? 18:26 ▶ Using Bluetooth Adapter in a VM 19:03 ▶ Continued//hciconfig 19:43 ▶ hciconfig in Mr Robot 19:56 ▶ Next Step//hcitool 21:00 ▶ Comment!//Should We Do All the Hacks in Mr Robot? 21:53 ▶ Next Step//hcitool inq 22:03 ▶ Bluetooth Device Classes 23:18 ▶ MultiBlue in Mr Robot//What It Does 24:25 ▶ Next Step//Spooftooph 26:41 ▶ VMs & Newer Bluetooth Versions//Potential Problems 28:13 ▶ Summary//Spoofing in Mr Robot 29:20 ▶ IRL//How This Would Actually Be Done 29:29 ▶ PLC Block Diagram 29:36 ▶ Siemens PLC Used for Prison Systems 30:00 ▶ Typical Prison Design 30:36 ▶ Prison Door System Schematic 31:16 ▶ Explained//Ladder Logic 32:46 ▶ Mr Robot//What is Unrealistic 34:10 ▶ Finding SCADA Systems//Too Awesome for UA-cam 36:34 ▶ How Vulnerable Are SCADA Systems? 38:54 ▶ Where to Learn How to Hack SCADA Systems 40:40 ▶ Learn for Free at Hackers Arise or Sign Up For Courses 41:23 ▶ Comment!//What Videos Would You Like to See? 42:50 ▶ Future Videos with OTW on Mr Robot! 44:32 ▶ Software Defined Radio for Hackers? 45:00 ▶ Thank You, OTW! // Devices used in video // Hak5 Rubber Ducky: davidbombal.wiki/gethak5 Panda Bluetooth 4.0 USB Nano Adapter : amzn.to/3NlSlbQ MultiBlue Dongle USB Bluetooth V3.0 HiD: Not available unfortunately. // Previous videos // OTW Hacking Russia: ua-cam.com/video/GudY7XYouRk/v-deo.html OTW Hacking Scada: ua-cam.com/video/uXbGQiXsRes/v-deo.html OTW Hacking CCTV: ua-cam.com/video/ZGCScbV7vSA/v-deo.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal // Occupy The Web social // Twitter: twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh // Other books // The Linux Command Line: amzn.to/3ihGP3j How Linux Works: amzn.to/3qeCHoY // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
I made a new attack technique that is awesome I can get ip without flagging as virus The code in my github page there is a video I will upload later maybe after week
I work as a Devops Engineer for 5 years now, before Mr.Robot was released I was a nobody, I worked shitty jobs and did nothing worth mentioning. The show reminded me a lot of my passion for computers, I'm pretty sure there's a whole generation of people who got inspired just like me
There really is a fine line between ethical hacking and illegal hacking. I am just here just learning how things work. I currently am learning programming but i would like to have a deeper understanding of things so i can apply it for whatever i choose to develop. I do however have the urge to fight the bad hackers that exist like for example return stolen money back to people, that type of thing. I think that would be really cool to be able to do for society.
@@cool8150 remember that you're "illegal" hacker only if you get caught. In people's eyes you can be a good ethical hacker and keep the dark secrets for yourself
Former roommate of mine was a CEH. I remember he was fixing something on my laptop for me while I was at work and messages me "Hey, what's your password?" Literally 2 minutes later "nevermind lol nothing is safe around me" Apparently he just plugged a flash drive in and bypassed it. When he left behind some random computer odds and ends for us to pick through when we left there was flash drive in it; we were too scared of plugging it into anything to see if it would be useful lol
Stumbled on this channel by accident. Found it very informative and interesting. This guy is incredible showing real world hacking. Subscribed and liked
4th video I'm watching.. good content, self reflective, not too cocky, good advice, breaking stuff down in a good way, talking to the experts.. I'm actually loving it.. subbed :)
Support team didn’t work, this video couldn’t help either but I’m happy Zspynerd ⬆️ was able to unban my account permanently from tinder database! Y’all check him out.
I have to say. For long time i couldn't find a video on youtube that would hold me interested in place for it entire duration. I am just starting with more complex linux, got my raspberry pi and was looking for a good videos. Glad that i found the channel for it.
David. I gotta say you are keeping my interest in the world Cyber Security. I am practitioner and I was loosing interest but you are saving me and most of the people I know. Love your work.
Well, now I am hooked on hacking. I am taking a computer science course and could follow along a bit. This was much better than just reading from a textbook. With the textbook, I was bored, but now that I can see what this means, it looks like a ton of fun.
*Metaspyclub* is such a gifted cyber private investigator. He's been a great talent even before the target knows what his up to. But thank God now the world knows that the bro is really good at his work. I wish him the best in his future endeavors.
@@davidbombal You are the one who we have to thank for everything you do for us and for spreading awareness and ideas that precede everyone, all respect to you sir ❤️
You've done what is beyond my imagination as a human and I won't stop appreciating you for your support in hard times. Thank you so much MetaspyClub , I really appreciate your help..
For the bluetooth hacking part, sadly scanning for devices only works if they are in sharing mode. At least for the technique he used in the video. When a connection is already established, the mac address is never broadcasted. Bluetooth Low Energy may be different though. This is what I understood from my own experience, feel free to correct me
*Metaspyclub* brought so much energy to this forensic system and call tapping that's the same energy he brought to me. This is my favorite cyber expert by far! Y'all killing it 🔥🔥🔥
Ladder logic was the notation for creating controls with relays, that is why it is so widely used- There are other and better languages for programming PLCs, although they are usually combined.
Harmonisism; Harmonisist; Harmonics That's the connection between all the things in "chaos theory". Absolution; Abstraction; Effervescence; Exponential and Finite
The first video I watched on UA-cam a year ago had fewer subscribers. Now it's increasing keep it up, David. always learn new and unique things from this channel you are awesome
Thank you for this video with which I agree 99% ... 29:19 I deal with Siemens PLC on a daily basis. Here you would need an electrical diagram or ... a backup of the program entered into the controller. The backup contains the names of the inputs and outputs. These tags facilitate programming and operation of the controller. 31:06 And here I will not agree, from the level of TIA Portal you can both read the state of binary inputs and set the binary state of the controller logic outputs manually. And writing a program to turn on all outputs is one line of a ladder program. 32:16 Monitoring of the controller inputs and outputs from the program level is undetectable. And the subsequent opening and closing of prison cells would appear as logical reports. 34:35 Both series are quite different from each other. Having access to the controller through the TIA portal, it is possible to program full control of the controller outputs from the level of the www-Tag table. In newer versions of Siemens software you need a password for the PLC controller itself, theoretically unbreakable ;)
MetaspyClub we all promise not to disregard or criticise you anymore cause you have proven all of us wrong and I will make sure I get you the recognition you deserve for your special skills at handling accounts.
I'm a process control engineer and I've been working on getting pentesting skills and learning all I can about hacking scada systems for this very reason. Russia has given us something to worry about. He made no mention of Allen Bradley systems. I don't know if that should make me feel any better that he didn't, but he didn't.
I don't have words David ... David, you are awesome !!! that lines is true youtube restricts get frustrated sometimes. and i really thank ful to Occupy The Web & David♥
If you pulled the memory from the system couldn’t you see a list of commands such as open and closing the door circuits? If that’s the case you can easily identify which circuits are doors for cells based on the fact that they have specific times every day when they open all cell doors and specific times when they close all cell doors. That would make it easier to identify all doors in the system just looking at scheduled times every day when different circuits are activated which for what his intentions were he could list all suspected circuits believed to be doors and command all to open. Doesn’t matter if some are not as long as all the actual doors open. Then the surge cuts the power rebooting the system which he could have previously changed the boot to indicate that all systems are operating correctly and all doors are closed and locked, and to pause any verification process that I assume would be looping to check if doors are opened or closed for however many minutes he needed and once the time passed the system would check and see the issues and sound the alarm. You would think it would be more difficult to throw commands at a system blind and have them perform desired functions and with pretty much any other type of system you’d be correct. With these industrial control systems though so long as you could pull the memory you would have a very good idea of what specific tasks were as these systems are designed to do things on schedules. Therefore if you know the system’s purpose you can probably figure out what a lot of the circuits relate to.
fun video. I still remember back in my schooldays building my first plc for my traffic lights 🚦 project 😅 … good times learning bootalone algebraic equations.
I absolutely love this! Have always been a huge fan of Mr Robot and when watching it I went to research on each hack and tried to do a deep dive into each key concept and I love that you guys are doing that but with a professional in the field! Looking forward to the other episodes
The Raspberry Pi one would definitely be interesting. I always love the idea of the drop-box that you just roll in and toss into a network and then leave. Especially if you need to get around some existing security measures.
38:46 meanwhile in the United States job market "minimum 5 years experience with PLC controllers, why can't we find anyone to work on these things and make them more secure"
Older siemens PLC's dont use ladder logic, orginally they where text based. AB is the company that has kinda made ladder logic a staple of these systems. and yeah.... the ones with a web server put all that info on the main page that doesnt require a login.
Loving the Scada stuff. I had used that Google dork myself and have been staring at the controls of Wind Turbines in Italy and a Lock in Hamburg. Would love to see the next step in accessing them beyond just default credentials. I'll be attending his course in September for sure.
David very good your video with Occupy. Fascinating! My suggestion next videos is something with hacking vehicles with researchers Mr. Miller and Valasek.
How am I just finding this now??? I'm so excited I'm gonna binge all these videos. OMG (I'm kinda worried how excited I am not gonna lie. It's like my kittens getting excited over sneaking sweets)
I cant stop watching this series with OTW. Really great stuff. I also like a little bit of politics and history from OTW which give us better overview at least from OTW point of view.
Cloud seeding in the upper atmosphere to provide pooled resources for the conservation of motion. Mineral rich water and ice. Enough to fix the hole in the ozone. Ideally drop in mineral appropriate mixture of water and ice from outside the atmosphere also, while seeding clouds.
I absolutely loved mr. Robot. I would love to see all the hacks from the show. I’m real interested in flashing the firmware on a usb. I’m hopefully going to be getting my masters degree in cybersecurity. This is all really great stuff
I didn't watch the TV show (getting it ATM ;)) and I don't know how good it is, but that man OccupyTheWeb is the MAN! I will watch every single episode with him!
I would love to see how to hack an exe file, I am new to this amazing world of hacking. I just found your channel and I love it. I am also a huge fan of Mr. Robot. :()
Something I really love about David’s videos, especially when he has people on his channel, is that he asks the questions that WE as the viewers would ask if we were sitting where he is.
27:04 You need to add the device to the VM (for VirtualBox, USB section in the VM settings ) to make the device stay in the VM (VM will grab the device automatically).
This is so great because it has context and reality. Would love to see more. David, you are awesome !!!
Thank you! Lots of videos coming soon :)
Yes
Waiting for more videos like this 😍
Fed lol
Support team didn’t work, this video couldn’t help either but I’m happy Zspynerd ⬆️ was able to unban my account permanently from tinder database! Y’all check him out.
Mr. Robot would have been so much more exciting to watch after learning the commands Elliot was using. He made it so simple to understand. Thanks so much!
This is a great work dude, as an ex military personal it brought back fond memories of my working days with my team mates. I have to say I'm really impressed with how you embraced the true spirit of the helping people uncover truth and cheating spirit. Well done *Metaspyclub* from the USA.
// MENU //
00:00 ▶ Just By Googling
00:21 ▶ Welcome Back//OTW
01:13 ▶ New Series//Hacking with OTW!
01:50 ▶ Why Mr Robot?
04:47 ▶ The Hack We're Doing//Mr Robot S1E6
06:27 ▶ Context//Why Elliot Is Doing This Hack
07:58 ▶ What is a Rubber Ducky?
09:36 ▶ Attempt_01//What they try in Mr Robot
11:13 ▶ Real World//Realistic or Not?
12:44 ▶ Mr Robot Breakdown//Scanning for Devices
13:25 ▶ WPA2 Cracked in 30 seconds?
13:41 ▶ How WPA2 is Cracked
14:13 ▶ Elliot Discovers a Way In
14:53 ▶ How to Scan Networks With Your Phone
15:27 ▶ How to Crack a Network Password
16:10 ▶ Continued//Elliot Discovers a Way In
16:55 ▶ Start//Doing the Same Hack
17:17 ▶ hciconfig
17:52 ▶ What Bluetooth Adapter Do You Need?
18:26 ▶ Using Bluetooth Adapter in a VM
19:03 ▶ Continued//hciconfig
19:43 ▶ hciconfig in Mr Robot
19:56 ▶ Next Step//hcitool
21:00 ▶ Comment!//Should We Do All the Hacks in Mr Robot?
21:53 ▶ Next Step//hcitool inq
22:03 ▶ Bluetooth Device Classes
23:18 ▶ MultiBlue in Mr Robot//What It Does
24:25 ▶ Next Step//Spooftooph
26:41 ▶ VMs & Newer Bluetooth Versions//Potential Problems
28:13 ▶ Summary//Spoofing in Mr Robot
29:20 ▶ IRL//How This Would Actually Be Done
29:29 ▶ PLC Block Diagram
29:36 ▶ Siemens PLC Used for Prison Systems
30:00 ▶ Typical Prison Design
30:36 ▶ Prison Door System Schematic
31:16 ▶ Explained//Ladder Logic
32:46 ▶ Mr Robot//What is Unrealistic
34:10 ▶ Finding SCADA Systems//Too Awesome for UA-cam
36:34 ▶ How Vulnerable Are SCADA Systems?
38:54 ▶ Where to Learn How to Hack SCADA Systems
40:40 ▶ Learn for Free at Hackers Arise or Sign Up For Courses
41:23 ▶ Comment!//What Videos Would You Like to See?
42:50 ▶ Future Videos with OTW on Mr Robot!
44:32 ▶ Software Defined Radio for Hackers?
45:00 ▶ Thank You, OTW!
// Devices used in video //
Hak5 Rubber Ducky: davidbombal.wiki/gethak5
Panda Bluetooth 4.0 USB Nano Adapter : amzn.to/3NlSlbQ
MultiBlue Dongle USB Bluetooth V3.0 HiD: Not available unfortunately.
// Previous videos //
OTW Hacking Russia: ua-cam.com/video/GudY7XYouRk/v-deo.html
OTW Hacking Scada: ua-cam.com/video/uXbGQiXsRes/v-deo.html
OTW Hacking CCTV: ua-cam.com/video/ZGCScbV7vSA/v-deo.html
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
// Occupy The Web social //
Twitter: twitter.com/three_cube
// Occupy The Web books //
Linux Basics for Hackers: amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
// Other books //
The Linux Command Line: amzn.to/3ihGP3j
How Linux Works: amzn.to/3qeCHoY
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
I made a new attack technique that is awesome I can get ip without flagging as virus
The code in my github page
there is a video I will upload later maybe after week
Who can give us real hands on training. Pleas refer me.
@@Amuofficial24 I can
@@cirklare Only If David refers
LET US SEE HOW HE HACKED THE BANK THAT IS WHAT I CALL A PROOF OF WORK MR ROBOT 😛👍
I work as a Devops Engineer for 5 years now, before Mr.Robot was released I was a nobody, I worked shitty jobs and did nothing worth mentioning.
The show reminded me a lot of my passion for computers, I'm pretty sure there's a whole generation of people who got inspired just like me
There really is a fine line between ethical hacking and illegal hacking. I am just here just learning how things work. I currently am learning programming but i would like to have a deeper understanding of things so i can apply it for whatever i choose to develop. I do however have the urge to fight the bad hackers that exist like for example return stolen money back to people, that type of thing. I think that would be really cool to be able to do for society.
you can be both an ethical and illegal hacker regardless of what some may think ;)
@@cool8150 remember that you're "illegal" hacker only if you get caught. In people's eyes you can be a good ethical hacker and keep the dark secrets for yourself
True@@BloodSpawn33
Former roommate of mine was a CEH. I remember he was fixing something on my laptop for me while I was at work and messages me "Hey, what's your password?" Literally 2 minutes later "nevermind lol nothing is safe around me" Apparently he just plugged a flash drive in and bypassed it.
When he left behind some random computer odds and ends for us to pick through when we left there was flash drive in it; we were too scared of plugging it into anything to see if it would be useful lol
Stumbled on this channel by accident. Found it very informative and interesting. This guy is incredible showing real world hacking. Subscribed and liked
The video was just a minute long, it was so much fun that time flew by so fast and so useful
Glad you enjoyed the video Amer!
4th video I'm watching.. good content, self reflective, not too cocky, good advice, breaking stuff down in a good way, talking to the experts.. I'm actually loving it.. subbed :)
Support team didn’t work, this video couldn’t help either but I’m happy Zspynerd ⬆️ was able to unban my account permanently from tinder database! Y’all check him out.
Yes as a grey hat you walk the swords edge
I wish the show never ends. Thank you David for this and please keep it coming.
Hey when I watched the show was the sound of the voices kinda weird
u*
@@goblinskithe1st468 no
I have to say. For long time i couldn't find a video on youtube that would hold me interested in place for it entire duration.
I am just starting with more complex linux, got my raspberry pi and was looking for a good videos. Glad that i found the channel for it.
You are killing it with these interviews, Unfortunately, I have had a hard time keeping up.
David. I gotta say you are keeping my interest in the world Cyber Security. I am practitioner and I was loosing interest but you are saving me and most of the people I know. Love your work.
This might be the coolest thing. I've seen in a while. Please do more like this David
These videos with the two of you are soooo awesome. I’d love to see more!
Well, now I am hooked on hacking. I am taking a computer science course and could follow along a bit. This was much better than just reading from a textbook. With the textbook, I was bored, but now that I can see what this means, it looks like a ton of fun.
I love MR ROBOT. I'm glad this topic was brought up and how he connected the two worlds into a learning lesson.
Glad you enjoyed the video!
worried about UA-cam just don't admit your doing something illegal
*Metaspyclub* is such a gifted cyber private investigator. He's been a great talent even before the target knows what his up to. But thank God now the world knows that the bro is really good at his work. I wish him the best in his future endeavors.
You made it like a documentary. So much more fun than watching a TV show. Bravo!
You are one of the angels of technology, thank you ❤️ Excellent work
Thank you very much Amer!
@@davidbombal You are the one who we have to thank for everything you do for us and for spreading awareness and ideas that precede everyone, all respect to you sir ❤️
Great video. Interesting guy. Please have him back for more. I just binge watched all 4 series of Mr Robot.
The “TOO AWESOME FOR UA-cam” 💀😭 Fkng loved this initiative, aaaaaaaaaaaaa❤️🔥
Loved Mr Robot too, was such an interesting show. One of my fav shows of all time.
I really enjoyed every video you made with OWT.
Thank you, David!
Glad you like them! He's amazing!
OTW, not OWT
@@ricseeds4835 my bad. 😅
You've done what is beyond my imagination as a human and I won't stop appreciating you for your support in hard times. Thank you so much MetaspyClub , I really appreciate your help..
"what is beyond my imagination as a human" what the hell are these comments
I don't know anything about hacking but I will be taking a cyber security course really soon and I'm loving this content
You will not succeed. Mark my words.
Hopefully he didn't mark your words then.@maalikserebryakov
Such a cool guest. He’s eager to share his knowledge. I love it!
And thank you for supporting Ukraine ❤
I was also very excited to hear his support for Ukraine.
Power and water plants use Siemens as well. VERY VERY SCARY!
Great video. It's cool to have a real word experience overview of Mr. Robot. Plus detailed explanations are great, thanks David and OTW. 😁
Glad you liked it Jonas!
Please please do all of them! This is excellent content you cannot find in other channels!
As a PLC programmer and SCADA integrator this was a good watch 👍🏻
For the bluetooth hacking part, sadly scanning for devices only works if they are in sharing mode. At least for the technique he used in the video. When a connection is already established, the mac address is never broadcasted. Bluetooth Low Energy may be different though.
This is what I understood from my own experience, feel free to correct me
*Metaspyclub* brought so much energy to this forensic system and call tapping that's the same energy he brought to me. This is my favorite cyber expert by far! Y'all killing it 🔥🔥🔥
David, thank you! Amazing content on an amazing UA-cam channel
Thank you! I appreciate that!
Ladder logic was the notation for creating controls with relays, that is why it is so widely used- There are other and better languages for programming PLCs, although they are usually combined.
You are looking at a living legend. I mean *Metaspyclub* is a living legend in cyber spy.
Hell yes! All of them please! Fantastic episode David!
Harmonisism; Harmonisist; Harmonics
That's the connection between all the things in "chaos theory".
Absolution; Abstraction; Effervescence; Exponential and Finite
Who is a fan of Mr robot
I'm a fan and intrigued about this work
Like the first season, specially the ending. Living in a bullshit world. But second season got too weird.
i also think same , but i liked the show alot
Me I'm A Huge Fan Of Mr Robot
My dad
The first video I watched on UA-cam a year ago had fewer subscribers. Now it's increasing keep it up, David.
always learn new and unique things from this channel
you are awesome
I just love this content. David always on the money. 👏👏
Thank you Jessie!
Damn I grew up reading OTW's work on nullbyte; Great to hear from him again after all these years. Keep it up both of you ;)
What more can I ask for from a broken screen mobile to watch!! Brilliant content as always David and OTW series has been amazing so far. Much love!
Man this video went by sooo fast!!! Any hacking or cybersecurity video anything with IT is cool with me! I love it all
Thank you for this video with which I agree 99% ...
29:19 I deal with Siemens PLC on a daily basis. Here you would need an electrical diagram or ... a backup of the program entered into the controller. The backup contains the names of the inputs and outputs. These tags facilitate programming and operation of the controller.
31:06 And here I will not agree, from the level of TIA Portal you can both read the state of binary inputs and set the binary state of the controller logic outputs manually. And writing a program to turn on all outputs is one line of a ladder program.
32:16 Monitoring of the controller inputs and outputs from the program level is undetectable. And the subsequent opening and closing of prison cells would appear as logical reports.
34:35 Both series are quite different from each other. Having access to the controller through the TIA portal, it is possible to program full control of the controller outputs from the level of the www-Tag table.
In newer versions of Siemens software you need a password for the PLC controller itself, theoretically unbreakable ;)
that is basicly my words, even ladder as a language tzzztzzztzzz.
MetaspyClub we all promise not to disregard or criticise you anymore cause you have proven all of us wrong and I will make sure I get you the recognition you deserve for your special skills at handling accounts.
I've read OTW's posts in null-byte way back in 2015/16.
It's good to come across him again, and to hear his voice for the first time! Wow.
what makes you think that's his real voice?
This is so great because it has context and reality. Would love to see more. David, you are awesome !!!
:)
yes , we want explanation to all the hacks in mr robot
We need an EP2 for this .. loved this one
I'm a process control engineer and I've been working on getting pentesting skills and learning all I can about hacking scada systems for this very reason. Russia has given us something to worry about. He made no mention of Allen Bradley systems. I don't know if that should make me feel any better that he didn't, but he didn't.
Absolutely love this video. Id love to see more of this.
I don't have words David ... David, you are awesome !!! that lines is true youtube restricts get frustrated sometimes. and i really thank ful to Occupy The Web & David♥
Would love to see how Elliot got into the lighting system of the server room at Virtual Realty
More DB/OTW videos! you both make the best videos together, many thanks!
If you pulled the memory from the system couldn’t you see a list of commands such as open and closing the door circuits? If that’s the case you can easily identify which circuits are doors for cells based on the fact that they have specific times every day when they open all cell doors and specific times when they close all cell doors. That would make it easier to identify all doors in the system just looking at scheduled times every day when different circuits are activated which for what his intentions were he could list all suspected circuits believed to be doors and command all to open. Doesn’t matter if some are not as long as all the actual doors open. Then the surge cuts the power rebooting the system which he could have previously changed the boot to indicate that all systems are operating correctly and all doors are closed and locked, and to pause any verification process that I assume would be looping to check if doors are opened or closed for however many minutes he needed and once the time passed the system would check and see the issues and sound the alarm. You would think it would be more difficult to throw commands at a system blind and have them perform desired functions and with pretty much any other type of system you’d be correct. With these industrial control systems though so long as you could pull the memory you would have a very good idea of what specific tasks were as these systems are designed to do things on schedules. Therefore if you know the system’s purpose you can probably figure out what a lot of the circuits relate to.
fun video. I still remember back in my schooldays building my first plc for my traffic lights 🚦 project 😅 … good times learning bootalone algebraic equations.
I just watched the sdr vid with otw. Tysm guys. Been watching u David for a cpl weeks
I absolutely love this! Have always been a huge fan of Mr Robot and when watching it I went to research on each hack and tried to do a deep dive into each key concept and I love that you guys are doing that but with a professional in the field!
Looking forward to the other episodes
Thank you saved me a lot of time trying to browse videos for an actual working one
I ji uuuuii aiiiiuuuii8iui
The Raspberry Pi one would definitely be interesting. I always love the idea of the drop-box that you just roll in and toss into a network and then leave. Especially if you need to get around some existing security measures.
haha raspberry pi .. they sell things that look like a wireless mouse usb thing and do all of that plus more :P
38:46 meanwhile in the United States job market "minimum 5 years experience with PLC controllers, why can't we find anyone to work on these things and make them more secure"
That is another excellent video David. I'd like to see more videos about WordPress CMS security, and the security surrounding SQL databases.
Older siemens PLC's dont use ladder logic, orginally they where text based. AB is the company that has kinda made ladder logic a staple of these systems. and yeah.... the ones with a web server put all that info on the main page that doesnt require a login.
Loving the Scada stuff. I had used that Google dork myself and have been staring at the controls of Wind Turbines in Italy and a Lock in Hamburg. Would love to see the next step in accessing them beyond just default credentials. I'll be attending his course in September for sure.
I hope it becomes a series How to hack like Mr. Robot
nicest hacker you'll find
@Ahmed wael i think his name is otw (occupy the web) he is an Author he writes a lot of books just google him
I like it when Occupy The Web is on the channel.
This was epic
Glad you think so!
@@davidbombal I sell hacking tutorial videos
Mr. Robot wouldn't do anything without Darlene crafting all that Malware left and right haha :P
Great video as usual David ,keep 'em coming ^^
the caption got me i love mr robot but finally stayed cause of the data, here's where its at
7:00 its awesome
UA-cam recommondation algorithm got it right 🔥🔥🔥
David very good your video with Occupy. Fascinating! My suggestion next videos is something with hacking vehicles with researchers Mr. Miller and Valasek.
I though great he spoke about ladder logic and Programmable Logic controllers. We used Siemens as well.
I love the show.. Please don't stop. We want more from you. Take love from Bangladesh
Great content, i like the "mindset" poster on the wall behind you :)
OTW has one of those voices, he just seems like a good guy lol.
Yes ! PLS more of these!
Btw both of the books are great !
Glad you like them! Lots more videos coming soon 😀
How am I just finding this now??? I'm so excited I'm gonna binge all these videos. OMG (I'm kinda worried how excited I am not gonna lie. It's like my kittens getting excited over sneaking sweets)
I cant stop watching this series with OTW. Really great stuff. I also like a little bit of politics and history from OTW which give us better overview at least from OTW point of view.
I love him trying not give spoilers about darlene by calling her elliots sidekick lol
That was awesome. Great have things explained from the episodes of Mr Robot. Very interesting. Thank you
Man! Occupy-the-Web is a living legend in hacking. 😮😅😊
Cloud seeding in the upper atmosphere to provide pooled resources for the conservation of motion. Mineral rich water and ice. Enough to fix the hole in the ozone. Ideally drop in mineral appropriate mixture of water and ice from outside the atmosphere also, while seeding clouds.
David and OTW, would love to hear more information on the device and process that Fsociety used to hear the phone calls of the Dark Army.
I would love to see more Mr.Robot hacks.
This content is amazing.
in my opinion this is exaclty what we want to see in reality and convert it in what we can do with our brains
I absolutely loved mr. Robot. I would love to see all the hacks from the show. I’m real interested in flashing the firmware on a usb. I’m hopefully going to be getting my masters degree in cybersecurity. This is all really great stuff
Episode on tracing the dark army would be more fun⭐
Why haven't I found this channel sooner?! Great stuff
Definitely going to watch this later when I have more time. Thanks for the content, David!
I didn't watch the TV show (getting it ATM ;)) and I don't know how good it is, but that man OccupyTheWeb is the MAN! I will watch every single episode with him!
As usual interesting topic from David. Thanks for all your efforts 👌. You are the best
Malik also played the young Pharo prince in "Night at the Museum"
I would love to see how to hack an exe file, I am new to this amazing world of hacking. I just found your channel and I love it. I am also a huge fan of Mr. Robot. :()