Hey ppl, I'm a retired computer/IT person, Yet I still find *Deep web experts on the WEB* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
Another amazing video, Yaniv! I especially enjoyed how OTW talked about how a web login can be hardened against brute force, but RTSP has less security, making it a useful attack target. Great stuff 👍💯
It is always by the numbers with you bro respect to maximum effect so you can't download and open file in openpdf now? Excellent vid is iit cool to share with my friends?
He's definitely not BSing. Even in IT, I will find that I can access a system, that isn't documented, 10%-30% of the time, using the Default Password for that Model (which you can just Google, by the way). I would imagine that whoever set them up, likely assumed that the Firewall will keep the intruders out, which isn't always the case, of course.
This reminds me of that Will Smith and Gene Hackman movie Enemy of the State. Amazing video! I'm looking forward to more! I'd love to hear more about the cyber war against Russia and how round 2 is going!
I have got to say.. I've seen OccupyTheWeb on a few channels now and I don't know why but he gives me huge Jeff Bridges vibes with his voice with a mixture of the Dude and Kevin Flynn
Hello Yaniv, when i type "sudo apt install docker" i have an error about Docker "Package docker is not available, but is referred to by another package and the following packages replace is: wmdocker" ... Whats wrong ? Cheers and thanks
3:15 Q: Google search. So ip cameras can rank on Google? I mean I know they do but you know how when you have a website and you have to activate to let the Google bot crawl your website to index it so that its included in Google searches... so who would activate the Google bot to crawl through the camera IP to index it? I want to know how it gets in Google database...
Hey, I'm unsure of this "activating process" you are mentioning. But these web crawlers crawl all known ips / domain names to scrape the data for search results. The only way to prevent this is to use a robots.txt file which you can define what you don't want crawled (But this is only listened to by ethically sourced crawlers and can be ignored)
Question - remote ip streaming rtsp 554 ,me using vlc to view the stream, stop, change my ip via vpn and get a different camera, same remote ip. I don't see any mention of this anywhere on the web. What's happening?
Is your "remote IP " your VPN box that you are springboarding from, as long as your logging into the same VPN server the remote ip won't change. If I understand you correctly.
Used to find so many servers and home networks that were unsecured like this back in the days, same as all the very early nanny cams and online trail cams. Some people had no idea at all.
I don't wanna hack the camera , that's lame , I want to hack the output, I want to change what it's showing on the servers lol for example, if they log in the camera , they see some other video
Isn't using password lists to hack into someone's camera illegal? I'm not trying to be the cops, but I'm wondering for my own self, if I try this stuff out (to later understand if my stuff is secure), and I'm finding some camera IP on the internet and then basically guessing someone's default password and getting in, isn't that illegal? Sure the password was easy, but just like if you pick someone's front door lock with a paperclip, even if they have a very cheap front door lock, isn't that still illegal? What makes it legal/illegal?
all of these are public available info. Trying to break into a system/ account that is not yours is considered illegal whether or not the password was weak. That's why in the video he showed us a local IP example
a surprise. Since I started podcasting. I love the life hack podcast. learn more. We also understand the difficulty a person may experience and the warning messages that may occur. Keep going my friend. Someday it will become your channel. The best channels to learn cyber security . ❤❤❤🎉
MOST security integrators (the actual installers) are uneducated, unguided and or mislead in network security on top of the fact that they generally don't care. They're paid to slap cameras in , and they do that with the least resistance possible i.e. default creds among many other things. I would say all, but this is likely wrong as I have not touched every brand of camera on the planet (But I have touched the vast majority of the big brands) cannot have their default admin user removed or changed, Axis for example, prevents you from doing this so you will always find root in the user list. You can also find out a LOT of information about the camera by looking at the model number, they bake a lot of info about the device into it. Like the one he showed DH-SD(speed dome)5(5inch)9 (IR speed dome) 230( 2MP 30x optical zoom) U (unsure here,) HNI ( High speed ,network, intelligent).
Jiminy Crickets, that's a lot of information in a serial number. And not being able to change root user/pass, that sucks. At least allow it with a reset button on the physical device in case of user error.
Very interesting! What I don't understand; how secure is this for the hacker? I mean, doing this over plain internet is easy to backtrace to the hacker. Is Kali enough to be secure or do you need other securymeasures as well?
@@yanivhoffman Hi Yaniv I don't know u can assist lot of companies are collapsing in SA with flashing they guy's they came and do Quotation and they that Amount can be R400.000 and the money reflect on the Account but not cleared after few Hours the funds reversed nw the atteking car they use Tool called Flash SQR 400 and flash V9.5 can you and OTW show us how does this work and how to prevent that patches
Shodan is a search engine for internet-connected devices, including IP cameras. If an IP camera doesn't appear on Shodan, it generally means that the camera is not publicly accessible from the internet, or it's not using standard ports that Shodan scans, or it's protected by certain firewall rules or other security measures that prevent Shodan from indexing it.
Could you please adjust the focus on your video recording? The blurring does not do justice to the quality of the instruction being passed on and makes it difficult to follow along.
Thx a lot for your feedback. I believe we improved the overall as this one was a year ago. Let me know after watching latest videos and again thx so much for your comment
I don't support illegal hacking so please keep ethical approach all time. but in general as i showed in video you can scan networks with advanced IP scanners and look ports commonly associated with IP camera's (port 554 RTSP, or Port 80/8080 and then sw like shodan search engine based on location .
Yes, it is possible, through various means and cybersecurity tools, to trace and identify individuals who are attempting to or have successfully hacked into a camera or any other device
Creating ground level project to show skills for each LLM Agents. Be a judge? 1. CodeCraft Duel: Super Agent Showdown 2. Pixel Pioneers: Super Agent AI Clash 3. Digital Duel: LLM Super Agents Battle 4. Byte Battle Royale: Dueling LLM Agents 5. AI Code Clash: Super Agent Showdown 6. CodeCraft Combat: Super Agent Edition 7. Digital Duel: Super Agent AI Battle 8. Pixel Pioneers: LLM Super Agent Showdown 9. Byte Battle Royale: Super Agent AI Combat 10. AI Code Clash: Dueling Super Agents Edition
hello yaniv, i have a particular problem with my online works. i found out that my phone is hacked and there is an online tracking app attached to every work i do online. this have retarded most of my works. because they use theses apps to manipulate what i do. my online courses,webiners, businesses and others. i thereby installed some anti hacking apps on my phone, it identify some unknown malicious apps like the 'dark'. my questions or request from you is that how much probability can these people be tracked?
Well that's kindergarten lesson cuz that's just ip cameras we're talking about, i mean why don't you say the ral powerful tool you know what, which scans the internet, it's way more useful, you can even send specific packets to expect specific response and there are thousand more ways, why you're telling still about kali linux? It's just an operating system with python scripts, not that's not useful but i expect more from a language such as golang of course creating your own tools with AI not the AI you're all saying, but your own AI which you can get very useful ideas from and actually get an idea of an exploit which can be made and done very very fast especially with a language such as golang which is extremely fast. I'm not going to mention more hacks because i feel i gotta have a problem, not because i'm using hacks or exploits and yea i'm not a hacker not even close to a programmer i'm just a user still a user. But i can't minimize the importance of this, give something more extraordinary to the people, even if they don't understand it the results gonna talk and they are gonna get more excited, saying "let's gonna hack an ip camera" who can't do that? Who doesn't know that every single device even computers with specific cpus have vulnerabilities, who doesn't know that? That's why there are patches and updates and all of that. Otherwise we would be doomed. And if you're telling me that you're giving us knowledge to be cyber security right? Why don't you do something good and learn the people the Snort 3, which is VERY VERY VERY VERY easy syntactically right now, very easy guide them through compiling it getting some community rules and even create your own ones, create an alert system which then you're going to connect that alert system with a tcp connection (locally) with a language which you can do stuff like detecting exploits and detecting packets and other stuff maybe include to this wireshark and tcpdump and using the pcap driver to capture packets and identify them programmatically, why you just show off shodan? You know it very well there is a tool specific tool which you can scan all the world yourself so not only banners but you can do a hell of a lot more thinks... I mean give to the people knowledge! that's all i'm asking.
"Master hacker" and the homie uses Google dorking techniques from 2001 lmao. Careful dude, bout to be phased out. Keep up with the times, you're wardialing in 2010 over here, master hacker Edit: Yaniv, your videos are great though, keep em going! If you want some connections for a plumber that actually know their way around a sink, let me know
@@AmirAliButtfromSailkot ofc and there are upcoming videos about it but we need to start somewhere. Also you will get surprised how basic stuff is still effective
Hey ppl, I'm a retired computer/IT person, Yet I still find *Deep web experts on the WEB* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
Thank you !
Another amazing video, Yaniv! I especially enjoyed how OTW talked about how a web login can be hardened against brute force, but RTSP has less security, making it a useful attack target. Great stuff 👍💯
Thx a lot as always
@@yanivhoffman You should do a video with Daniel . It might be an interesting topic ❤❤❤
@@blackshell4286 I would love to. We did one already so we can do again.
It is always by the numbers with you bro respect to maximum effect so you can't download and open file in openpdf now? Excellent vid is iit cool to share with my friends?
He's definitely not BSing. Even in IT, I will find that I can access a system, that isn't documented, 10%-30% of the time, using the Default Password for that Model (which you can just Google, by the way). I would imagine that whoever set them up, likely assumed that the Firewall will keep the intruders out, which isn't always the case, of course.
Hello Matti 😊
Great one as always OTW! Love your books as well have learned so much from you!
This reminds me of that Will Smith and Gene Hackman movie Enemy of the State. Amazing video! I'm looking forward to more! I'd love to hear more about the cyber war against Russia and how round 2 is going!
Thank you 🙏 more to come soon….
I have got to say.. I've seen OccupyTheWeb on a few channels now and I don't know why but he gives me huge Jeff Bridges vibes with his voice with a mixture of the Dude and Kevin Flynn
Can u hack in to cam to find old videos that disappear or never disappear
Hello Yaniv, when i type "sudo apt install docker" i have an error about Docker "Package docker is not available, but is referred to by another package and the following packages replace is: wmdocker" ... Whats wrong ? Cheers and thanks
I have a question . How does shodan takes screenshots of cameras that have 554 port open? Does it hack into them ?
Great video Yaniv I love your content. Be safe mate. From Aussie.
Thx mate 🙏❤️
28:18 most amazing part of the video... This hacker is not revealing his true typing speed...
3:15 Q: Google search. So ip cameras can rank on Google? I mean I know they do but you know how when you have a website and you have to activate to let the Google bot crawl your website to index it so that its included in Google searches... so who would activate the Google bot to crawl through the camera IP to index it? I want to know how it gets in Google database...
Hey, I'm unsure of this "activating process" you are mentioning. But these web crawlers crawl all known ips / domain names to scrape the data for search results. The only way to prevent this is to use a robots.txt file which you can define what you don't want crawled (But this is only listened to by ethically sourced crawlers and can be ignored)
Question - remote ip streaming rtsp 554 ,me using vlc to view the stream, stop, change my ip via vpn and get a different camera, same remote ip. I don't see any mention of this anywhere on the web. What's happening?
Is your "remote IP " your VPN box that you are springboarding from, as long as your logging into the same VPN server the remote ip won't change. If I understand you correctly.
Wonderful Thanks Yaniv and OccupyTheWeb !
Thank you 🙏
hi i am from New Zealand
Parabéns pelo excelente conteúdo e didática... Uma verdadeira aula de OSINT...
Thx for watching
Used to find so many servers and home networks that were unsecured like this back in the days, same as all the very early nanny cams and online trail cams. Some people had no idea at all.
sir where i to buy that books?where to order.?
Look at the links in the description
Very cool topic! I'm sure it will be great content indeed!
Thx a lot 🙏
I want to learn how to see the video stream cause, with my own cameras i cannot see my camera outside the icsee app
is it possible to use a list of ip addresses to attack multiple cameras with one command?
Yea
can i take my ip camera knowing the IP and MAC address and take it off the cloud storage
I don't wanna hack the camera , that's lame , I want to hack the output, I want to change what it's showing on the servers lol for example, if they log in the camera , they see some other video
Hack the device and update the firmware so it connect to xvideos for streaming video?
Like a meme on repeat lol
you do not know anything and watching a lot of movies bro
@@singingfor3683that's such a cool idea.
@@Stenshiiibros gonna pull the old video switcheroo and steal the Mona Lisa 😂
Isn't using password lists to hack into someone's camera illegal? I'm not trying to be the cops, but I'm wondering for my own self, if I try this stuff out (to later understand if my stuff is secure), and I'm finding some camera IP on the internet and then basically guessing someone's default password and getting in, isn't that illegal? Sure the password was easy, but just like if you pick someone's front door lock with a paperclip, even if they have a very cheap front door lock, isn't that still illegal? What makes it legal/illegal?
all of these are public available info. Trying to break into a system/ account that is not yours is considered illegal whether or not the password was weak. That's why in the video he showed us a local IP example
How do you do this on cctv in England, uk ?
Really intriguing stuff from OTW as usual. Also not totally clear where the line between illegal and legal is, as usual.
You gained another subscriber and I'm interested in your books !!🇧🇷✨
Thx 🙏
אלוף שיחקת אותה שמח שיש אחד ישראלי תמשיך עם הכתוביות 😅 עדיין לא מאסטרים באנגלית
חחחחח…. תודה רבה ממשיך
a surprise. Since I started podcasting. I love the life hack podcast. learn more. We also understand the difficulty a person may experience and the warning messages that may occur.
Keep going my friend. Someday it will become your channel. The best channels to learn cyber security . ❤❤❤🎉
MOST security integrators (the actual installers) are uneducated, unguided and or mislead in network security on top of the fact that they generally don't care. They're paid to slap cameras in , and they do that with the least resistance possible i.e. default creds among many other things.
I would say all, but this is likely wrong as I have not touched every brand of camera on the planet (But I have touched the vast majority of the big brands) cannot have their default admin user removed or changed, Axis for example, prevents you from doing this so you will always find root in the user list.
You can also find out a LOT of information about the camera by looking at the model number, they bake a lot of info about the device into it. Like the one he showed DH-SD(speed dome)5(5inch)9 (IR speed dome) 230( 2MP 30x optical zoom) U (unsure here,) HNI ( High speed ,network, intelligent).
Thanks for the detailed comment
Jiminy Crickets, that's a lot of information in a serial number. And not being able to change root user/pass, that sucks. At least allow it with a reset button on the physical device in case of user error.
You just copied and pasted what he said? 🤔 😑
Fantastic video, well done. OTWftw.
@@SiliconSouthShow ❤️
What do I do to hack a specific camera ???
press alt+f4 on your windows computer
Am watching u guys...
Thnkz so much both of u guys ☕👋✌
Thank you for the kind words 🙏
Very interesting! What I don't understand; how secure is this for the hacker? I mean, doing this over plain internet is easy to backtrace to the hacker. Is Kali enough to be secure or do you need other securymeasures as well?
hey so someone got my ip adress and he said give me 300 bucks or he will leak all my adress my password and my bank information what should i do
Thanks a lot Occupy The Web.... following you from David,Yaniv they u enjoy watching Mr. Rabot it's like me watching your video and get Skills
Glad to hear that
@@yanivhoffman Hi Yaniv I don't know u can assist lot of companies are collapsing in SA with flashing they guy's they came and do Quotation and they that Amount can be R400.000 and the money reflect on the Account but not cleared after few Hours the funds reversed nw the atteking car they use Tool called Flash SQR 400 and flash V9.5 can you and OTW show us how does this work and how to prevent that patches
Great video!!! But if my cameras don't appear on Shodan, what does it mean?? They use others protocols??
Shodan is a search engine for internet-connected devices, including IP cameras. If an IP camera doesn't appear on Shodan, it generally means that the camera is not publicly accessible from the internet, or it's not using standard ports that Shodan scans, or it's protected by certain firewall rules or other security measures that prevent Shodan from indexing it.
Sending love from Sierra Leone ❤❤
Nice 👍 welcome 🙏
Can you do a payload creation obfuscation vedio with otw mayb focusing on av evasion like that
Can I buy his books as pdf
I don’t think so but let me check with OTW. I will update later today
Greetings to you from Saudi Arabia ❤OTW
Thank you 🙏
your israeli accent is actually easier to understand than american accent :)
Could you please adjust the focus on your video recording? The blurring does not do justice to the quality of the instruction being passed on and makes it difficult to follow along.
Thx a lot for your feedback. I believe we improved the overall as this one was a year ago. Let me know after watching latest videos and again thx so much for your comment
hi there how will i hack cctv near back yard
Did I just stumble on the Israeli David Bombal? סבבה
מחמאה ❤️
Didji
היי יניב, איך אני יכול לבצע חיפוש של כתובות אייפי של מצלמות סביבי ולנסות לחפש חולשות לפריצה?
I don't support illegal hacking so please keep ethical approach all time. but in general as i showed in video you can scan networks with advanced IP scanners and look ports commonly associated with IP camera's (port 554 RTSP, or Port 80/8080 and then sw like shodan search engine based on location .
great video sir i learned a lot thank you so much
thank you so much
Thank You for this information!
Please Make Video On Kali Linux to Synology NAS Hack
Vulnerabilities, Password Bypass etc.
Thx for the feedback . I will look into it
@@yanivhoffman Please Make it video on this it is very usefull for all Penetration Testing on synology nas with Kali linux
This voice is so similiar which I listen in David channel
It’s same person .
we would love a subscription sale offer for H-A , just saying
Nice Sir. New Subscriber 24,5k :D
Thx a lot
Can this person do private investigation war from a lost friend from high school
"Hundreds if not thousands of cameras" That is odd, only found 19 cameras
Pls Make more video on ip camera hacking
Don’t stop! More OTW
More is planned - in June
Is it possibly to see who’s hacking the cameras?
Yes, it is possible, through various means and cybersecurity tools, to trace and identify individuals who are attempting to or have successfully hacked into a camera or any other device
@@yanivhoffmanif that person has tunneled through the tor network can you trace that individual ?
I want to access camera in India
i cant install docker
I don't understand your close captions I'm not from that country
Can you clarify exactly what you don’t understand ? Sorry not sure I follow
Is hacking super difficult??
Some forms of hacking can be relatively simple, while others are very complex and require extensive knowledge and skill.
ואוו הבאת את OTW מרשים!
He is the best
Creating ground level project to show skills for each LLM Agents. Be a judge?
1. CodeCraft Duel: Super Agent Showdown
2. Pixel Pioneers: Super Agent AI Clash
3. Digital Duel: LLM Super Agents Battle
4. Byte Battle Royale: Dueling LLM Agents
5. AI Code Clash: Super Agent Showdown
6. CodeCraft Combat: Super Agent Edition
7. Digital Duel: Super Agent AI Battle
8. Pixel Pioneers: LLM Super Agent Showdown
9. Byte Battle Royale: Super Agent AI Combat
10. AI Code Clash: Dueling Super Agents Edition
Niceeee ❤❤❤ 💯
Thank you 🙏
Can resend that link
Master OTW!!
Great video thanks
Thx a lot
Hi i want some help from you for hacking
hello yaniv, i have a particular problem with my online works. i found out that my phone is hacked and there is an online tracking app attached to every work i do online. this have retarded most of my works. because they use theses apps to manipulate what i do. my online courses,webiners, businesses and others.
i thereby installed some anti hacking apps on my phone, it identify some unknown malicious apps like the 'dark'.
my questions or request from you is that how much probability can these people be tracked?
Isnt that illegal
Yes i have all of them books ❤
What if I don't have a laptop 😊
great video!
Thank you 🙏
I need help please
Always good to listen to three_cube talking about hacking!
Indeed , he is the best 🔥
Thankyou so much for this
im happy you like it
Guys I need help,how to hack ip camera?
We don't support illegal hacking, only ethical
Thumbnail and OTW Attract to see this Video😄
Well that's kindergarten lesson cuz that's just ip cameras we're talking about, i mean why don't you say the ral powerful tool you know what, which scans the internet, it's way more useful, you can even send specific packets to expect specific response and there are thousand more ways, why you're telling still about kali linux? It's just an operating system with python scripts, not that's not useful but i expect more from a language such as golang of course creating your own tools with AI not the AI you're all saying, but your own AI which you can get very useful ideas from and actually get an idea of an exploit which can be made and done very very fast especially with a language such as golang which is extremely fast. I'm not going to mention more hacks because i feel i gotta have a problem, not because i'm using hacks or exploits and yea i'm not a hacker not even close to a programmer i'm just a user still a user. But i can't minimize the importance of this, give something more extraordinary to the people, even if they don't understand it the results gonna talk and they are gonna get more excited, saying "let's gonna hack an ip camera" who can't do that? Who doesn't know that every single device even computers with specific cpus have vulnerabilities, who doesn't know that? That's why there are patches and updates and all of that. Otherwise we would be doomed. And if you're telling me that you're giving us knowledge to be cyber security right? Why don't you do something good and learn the people the Snort 3, which is VERY VERY VERY VERY easy syntactically right now, very easy guide them through compiling it getting some community rules and even create your own ones, create an alert system which then you're going to connect that alert system with a tcp connection (locally) with a language which you can do stuff like detecting exploits and detecting packets and other stuff maybe include to this wireshark and tcpdump and using the pcap driver to capture packets and identify them programmatically, why you just show off shodan? You know it very well there is a tool specific tool which you can scan all the world yourself so not only banners but you can do a hell of a lot more thinks... I mean give to the people knowledge! that's all i'm asking.
thx. for the feedback. it was initial video for more beginners and plan is to conintue this path more thoroughly
Ring cameras are the easiest to hack..why anyone would put them in their children room I will never know
are you from israel? (I guessed from the accent)
Yes :)
Shalom alechem!
Thanks Yavi
Came here looking for a way to get back at my hacker
OTW, is very good
Indeed 🔥
"Master hacker" and the homie uses Google dorking techniques from 2001 lmao. Careful dude, bout to be phased out. Keep up with the times, you're wardialing in 2010 over here, master hacker
Edit: Yaniv, your videos are great though, keep em going! If you want some connections for a plumber that actually know their way around a sink, let me know
Thnx Jeff wink wink
Please 🥺 help me about
אין על הישראלים ימלך
😂 thx a lot
Get to the Chopper!!!!!
Nice one
its old technique Yaniv. being student 👩🎓 I know technology is way much advance
@@AmirAliButtfromSailkot ofc and there are upcoming videos about it but we need to start somewhere. Also you will get surprised how basic stuff is still effective
@@yanivhoffman I know everything works its all about approach. meanwhile I don't know about cybersecurity as I am IT Support
thats ryan montgomery
Generic pfp template u downloaded off Google images
מלך
Thank you 🙏
אתה ישראלי? אני מלמדת את עצמי
המבטא אכן מסגיר אותי
thanks!
Thx for watching
I see a lot of cameras with Putin messages - now i know who and why🙊
Го так-же но на русском
Did you just find out , too kid ... ? ?