Hacking CCTV and IP cameras: Are you safe?

Is your CCTV secured? Are your IP cameras safe? Too easy to hack? This is my third interview with the professional hacker Occupy The Web. In this video we discuss hacking CCTV, IP cameras and SCADA (supervisory control and data acquisition). // MENU // 00:00 ▶️ It Didn’t Stop Us! 00:43 ▶️ YouTube Is Not Realistic 02:58 ▶️ Hacking Is Boring? 04:12 ▶️ In An Alternative Universe 04:35 ▶️ High vs Low Value Targets 07:09 ▶️ Hacking Ukraine CCTV Cameras 08:04 ▶️ Why Aren’t Cameras Well Protected? 10:48 ▶️ Why Hack Ukraine CCTV Cameras? 12:45 ▶️ Finding Online Systems Anywhere In The World 14:47 ▶️ Don’t Cameras Have Passwords? 17:36 ▶️ Hack My Spouse//The Most Common Request 19:30 ▶️ Convert Tools To Cyrillic? 20:20 ▶️ Remote Camera Hacking 20:56 ▶️ Camera Hacking Summary 21:13 ▶️ Dictionary Attack or Brute Force for Remote Hacking? 22:32 ▶️ Remote Hacking Takes Teamwork 22:52 ▶️ Cameras Blocking Login Attempts 23:23 ▶️ Bad Practices//How To Secure CCTV Cameras 24:42 ▶️ Don’t Be An Easy Target! 25:43 ▶️ Basic Security To Have On Your Systems 28:42 ▶️ Users Aren’t The Flaw! 30:07 ▶️ Russia SCADA Attacks 30:38 ▶️ SCADA Swiss Army Knife 31:21 ▶️ Stealing Schneider Password Hashes 33:40 ▶️ DDoSing SCADA Systems Is Deadly 36:53 ▶️ Russian Hackers//Overrated? 40:22 ▶️ SCADA Malware Used On Ukraine Systems 42:54 ▶️ Warning//Russia Coming After Hackers 44:16 ▶️ Phishing Attempts on OTW 45:07 ▶️ How To Protect Yourself 46:00 ▶️ Social Engineering//Most Major Hacks 47:46 ▶️ Social Engineering//Pentesting 49:11 ▶️ SCADA Malware//Stuxnet 50:56 ▶️ SCADA Malware//Triton 51:25 ▶️ Bhopal Disaster//What Could Happen 52:39 ▶️ Future Videos//Leave A Comment! // Previous videos // OTW video 1: OTW video 2: // David’s SOCIAL // Discord: Twitter: Instagram: LinkedIn: Facebook: TikTok: @davidbombal YouTube: // Occupy The Web social // Twitter: // Occupy The Web books // Linux Basics for Hackers: Getting Started Becoming a Master Hacker: // Occupy The Web Website / Hackers Arise Website // Website: Shodan: Webcams: Ukraine Cameras: SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems SCADA Hacking: Finding SCADA Systems using Shodan Shodan: Using Shodan to Find Vulnerable Russian SCADA/ICS Sites SCADA Hacking: The Most Important SCADA/ICS Attacks in History SCADA Hacking: SCADA/ICS Protocols (Profinet/Profibus) Lots of Scada content: // In the News // Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems: Ukrainian power grid ’lucky’ to withstand Russian cyber-attack: An Unprecedented Look at Stuxnet, the World’s First Digital Weapon // Other books // The Linux Command Line: How Linux Works: // MY STUFF // // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@ cctv ip cameras hacking cctv hacking ip cameras ukraine russa scada modbus ics industrial control systems occupytheweb occupy the web hackers arise hackersarise ddos ukraine war cybersecurity ukraine cyber attack russia ukraine news russia vs ukraine cyberwar russian invasion russia ukraine crisis ukraine crisis cyber security cyberwarfare cyber attack cyber war russia cyberwar russia cyber attack cyberwar against russia cyber security news ukraine war ukraine cyber attack today cybernews ukraine 2022 ukraine news russia ukraine conflict anonymous hack hacker hacking cyberattacks russia vs ukraine russia ukraine war russian cyber attack russian ukraine news russia ukraine cyber Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #cctv #hacking #ukraine
Back to Top