DDoS attack explained by a Master Hacker

  Рет қаралды 20,800

Yaniv Hoffman

Yaniv Hoffman

Күн бұрын

Join me with Master Hacker OTW for an insightful dive into DDoS attacks. We explore the current threat landscape, discuss key risks, and showcase a hands-on demo using HPING3. #cybersecurity #ddosattack #hacking
Disclaimer: This video is for educational purposes only. We do not promote hacking or any illegal activities. Remember, hacking without explicit permission is illegal. Stay safe and ethical in your cybersecurity explorations
OccupyTheWeb Books - Affiliate links:
1. Become a master Hacker - amzn.to/3Eq6vX4
2. NEW BOOK - Network basics for hackers - amzn.to/3YNd1iz
3. Linux Basics for Hackers - amzn.to/3Sdoh5i
OccupyTheWeb Community - Hackers-Arise: - 20% coupon for everything in store ("YANIV")
Chapters
0:00 - 1:02 Opening
1:03 - 3:30 OccupyTheWeb
3:31 - 18:52 DDoS discussion on threat landscape, risks and more
18:53 - 36:10 Brief demo of HPING 3
Watch more cyber security Video's
1. Does SQL injection still work ? Lessons by Master Hacker - • SQL for Hackers by Mas...
2. Behind Darknet Diaries with Jack Rhysider - • Jack Rhysider Darknet ...
3. Shield Your Wi-Fi from Hackers with these Essential Security Measures • Hacking home WIFI with...
4. Meet the man who exposed the world's first cyber weapon - • Unraveling the Impact ...
5. How to become a master hacker (With OTW) - • how to become a master...
6. Hacking SCADA systems - • hacking industrial con...
7. SW define radio hacking - • radio hacking with a m...
8. Pegasus spyware - • pegasus the spyware te...
9. Stuxnet - • Explaining cybersecuri...
10. API Hacking - • How Hacking APIs Works...
11. DNS Hacking - • DNS hijacking | Cybers...
12. How to Build a hacking Box - • how to build your hack...
13. NotPetya - • notpetya attack
14. OSINT - Open Intelligence tools - • OSINT framework Explai...
Thank you for being here! Stay Safe and Healthy,
Yaniv Hoffman

Пікірлер: 99
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thank you all for watching. I had an issue with camera so my side of video not in HD . Poor mistake but tried to sharpen and found the problem so will not happen again ❤
@mytechnotalent
@mytechnotalent 5 ай бұрын
Always great to see Master OTW! The DDoS efforts were quite effective!
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thank yop for watching
@user-vi1ms2nf3q
@user-vi1ms2nf3q 5 ай бұрын
We are students OTW ❤
@y.tzvilangermann7894
@y.tzvilangermann7894 5 ай бұрын
extremely informative...I hope no bad guys were taking notes
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thx and hope too
@davidkamaunu7887
@davidkamaunu7887 4 ай бұрын
They already know these TTP and generate income streams from their use.
@probablythebestbutnotyet220
@probablythebestbutnotyet220 5 ай бұрын
awesome yaniv...this will keep busy during christmass
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thank you 🙏
@DreaminARealityTV
@DreaminARealityTV 5 ай бұрын
Can't wait for OTW book on Ukraine and Russia tactics next year. I'll be first in line
@yanivhoffman
@yanivhoffman 5 ай бұрын
Cool
@DevOps691
@DevOps691 5 ай бұрын
I have a question for Mr. Occupy, how does he assess the level of cyber security in the USA and what does he think about the latest news that the well protected Rockstar Games was hacked by a schoolboy, or the fact that there are many government companies who still use Windows 98. Before doing nobody needs things Is it better to work to increase security in your country?
@yanivhoffman
@yanivhoffman 5 ай бұрын
Let me ask him and get back to you
@fanyfany596
@fanyfany596 5 ай бұрын
thankss untuk MASTER otw and yaniv hoffman
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thx for watching and for the feedback
@Joe-gl8sr
@Joe-gl8sr 5 ай бұрын
Great stuff!!!
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thank you 🙏
@raymondtunmbi9168
@raymondtunmbi9168 5 ай бұрын
Yaniv it's 4:55 am You're waking ⏰ me up with the best content ❤
@yanivhoffman
@yanivhoffman 5 ай бұрын
Wow ! You made my day ❤️❤️❤️❤️ thx for the kind words
@funkymonk2254
@funkymonk2254 5 ай бұрын
ThankYou Yaniv and Master OTW.
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thank you for watching
@Crazy--Clown
@Crazy--Clown 5 ай бұрын
Thnx Jeff
@taiquangong9912
@taiquangong9912 5 ай бұрын
Your videos are amazing thanks
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thx so much
@carol-lo
@carol-lo 5 ай бұрын
Great explanation :)
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thank you 🙏
@isxckk.
@isxckk. 5 ай бұрын
Good stuff!
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thx 🙏
@Kalem-Bae
@Kalem-Bae 5 ай бұрын
Bisakah DDoS attack menggunakan TOR .. ? saya rasa tidak, ... mungkin ?
@elmehdiezziar
@elmehdiezziar 5 ай бұрын
Love it's, Great video
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thx a lot
@VAS.T
@VAS.T 5 ай бұрын
buy a botnet on hacker boards. get ip start attack. its THAT simple.
@yanivhoffman
@yanivhoffman 5 ай бұрын
😂 true
@ChillHopHavenMusic
@ChillHopHavenMusic 5 ай бұрын
Hey, at the company where I work, we suffered a DDoS attack for a month. If possible, at some point, I would like to understand how we can defend ourselves against these UDP attacks. We resolved it here with a mitigation cloud, but I would like to know more efficient ways to avoid this issue.
@yanivhoffman
@yanivhoffman 5 ай бұрын
Approach me via mail and I can help you
@ChillHopHavenMusic
@ChillHopHavenMusic 5 ай бұрын
Done, eagerly awaiting your interaction, and once again, I thank you.
@throwawayaccount838
@throwawayaccount838 5 ай бұрын
You can't do anything on your side. You gotta talk to your ISP or hosting provider to offer you a ddos protection plan. Once the packet hits you you're already finished. They're taking up your bandwidth so ur normal traffic can't get through.
@gabrielfono844
@gabrielfono844 5 ай бұрын
Sir please I am currently working as software engineer and my dream was always to start ethical hacking. I have connection at USA government, department of defense and department of state to get the jobs if I have a right skills. Could please give us a roadmap. I want to start all 2024 doing ethical hacking. Thanks
@yanivhoffman
@yanivhoffman 5 ай бұрын
I always say that the golden triangle is networking, operating systems and cybersecurity to become a master hacker. So if you don’t have networking knowledge start with that… like Comoros network+, than proceed to security+ and finish with CEH practical path. From there you can choose you expertise
@gabrielfono844
@gabrielfono844 5 ай бұрын
@@yanivhoffman thanks a lot I appreciate
@i_am_dumb1070
@i_am_dumb1070 5 ай бұрын
Noob here , I want to ask a silly doubt ... you guys talked about IOT devices being used as part of botnet to commit DDOS attacks , but how to these get infected like do they have a seperate category of malware or how? also like in a pc lets say a person downloads some malware then does that malware install hpin3 like tool in infected system or its like without installing any additional tools when C2 sever gives command all botnets start sending requests ? Can you explain this to me I am really confused how from C2 to Botnet to DDos things are working
@yanivhoffman
@yanivhoffman 5 ай бұрын
First thx for your question. IoT devices are often infected by malware targeting their specific vulnerabilities, like outdated firmware or default passwords. Unlike PCs, where malware is usually downloaded by users, IoT devices are directly attacked. Once infected, they become part of a botnet controlled by a hacker's command-and-control (C2) server. In a DDoS attack, this botnet is activated to send overwhelming traffic to a target server, causing disruption or shutdown. The process underscores the need for robust security in IoT devices and cautious online practices for PC users. let me know if it answer your question. if not i will try to focus it more
@davidkamaunu7887
@davidkamaunu7887 4 ай бұрын
Desktop PCs are often initially infected and then later payloads are dropped on the system that allow it to be a participant in a Distributed Denial of Service attack. The aim of a Denial of Service attack is Network Resource Exhaustion. Imagine thousands of phone calls going to a call center.
@i_am_dumb1070
@i_am_dumb1070 4 ай бұрын
@@yanivhoffman thankyou , so someone can use shodan and using available poc control such iot devices .... what sort of vulnerbility in iot allows a attacker to make them a part of his botnet ?
@yanivhoffman
@yanivhoffman 4 ай бұрын
@@i_am_dumb1070 IoT ads over looked by vendors when it comes to security and have default passwords that no one changes and with quick search can be found. It makes them easy to exploit
@i_am_dumb1070
@i_am_dumb1070 4 ай бұрын
@@yanivhoffman ok 👍
@00Jimmy00
@00Jimmy00 5 ай бұрын
hping works only on switched networks
@yanivhoffman
@yanivhoffman 5 ай бұрын
thx for the comment
@LorenFleisher
@LorenFleisher 5 ай бұрын
OTW is actually David Blaine
@yanivhoffman
@yanivhoffman 5 ай бұрын
Why do you say that ?
@user-mi4fs2fk4t
@user-mi4fs2fk4t 5 ай бұрын
Love you bro
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thx a lot ❤️
@London-ft4hj
@London-ft4hj 5 ай бұрын
What are some hacking apps do you recommend?
@yanivhoffman
@yanivhoffman 5 ай бұрын
im only supporting ethical hacking and there are many tools and apps ofc. to make it in a nutshell look at tools teached in CEH / OSCP which will give you better idea
@London-ft4hj
@London-ft4hj 5 ай бұрын
I’m not hacking to do anything bad
@yanivhoffman
@yanivhoffman 5 ай бұрын
@@London-ft4hj yes understood. Thx
@emmanuellazar8786
@emmanuellazar8786 5 ай бұрын
עם הנצח לא מפחד, גם לא בעולם הזה גם לא בסייבר
@q3samer
@q3samer 5 ай бұрын
How to join 1800
@mohammadshoheltanvir-hk9pt
@mohammadshoheltanvir-hk9pt 5 ай бұрын
Sir? How to I connect with you
@yanivhoffman
@yanivhoffman 5 ай бұрын
via my email
@mohammadshoheltanvir-hk9pt
@mohammadshoheltanvir-hk9pt 5 ай бұрын
Please send me your email address.🙏🙏
@pngbtw
@pngbtw 5 ай бұрын
אחלה סרטון שמח שמצאתי ישראלי שעושה את זה קיבלתה סאב
@yanivhoffman
@yanivhoffman 5 ай бұрын
Thx a lot ❤️
@sajalkaurav5557
@sajalkaurav5557 5 ай бұрын
Hey Yanif , I trust this message finds you well. I’ve had the privilege of exploring your youtube content, and I must say, the passion and creativity you bring to your projects are truly commendable. As a dedicated video editor with a keen eye for detail and a flair for visual storytelling, I believe I can contribute to enhancing the impact of your content. I had been working with multiple youtubers and content creators around the world and have a experience of 3 years in video editing And if we fail to deliver the results then we work for free ! I’d love the opportunity to collaborate with you and bring a fresh perspective to your content. Worth conversation?
@yanivhoffman
@yanivhoffman 5 ай бұрын
Approach me via mail
@UtraVioletDreams
@UtraVioletDreams 5 ай бұрын
Distributed Denial of Service aka DDOS is for looser. I can be a ping with a large package size with a couple of people or a large group of people requesting the services over and over again. It requires NO skill at all......
@yanivhoffman
@yanivhoffman 5 ай бұрын
The new ddos level is on the application layer and very sophisticated both ssl and randomize payload which looks like legitimate user and follow real business logic . This what took Microsoft Azure down in June and lately used by many proxy groups. Ofc there are some basic stuff you can do with HPING but new threats are not easy to generate or to detect
@UtraVioletDreams
@UtraVioletDreams 5 ай бұрын
@@yanivhoffman Yes layer one of the OSI model can not be/hard to be denied! Still DDOS is for loosers. It requires no skill at all
@yanivhoffman
@yanivhoffman 5 ай бұрын
@@UtraVioletDreams true. The traditional DDoS is L3-4 but now transition into Level 7 with RPS attacks that are randomized and encrypted and that’s diff level
@UtraVioletDreams
@UtraVioletDreams 5 ай бұрын
@@yanivhoffman Yeah I know... you and I both know our stuff. White hat 😇. I'm not going to share more knowledge on you tube xD
@yanivhoffman
@yanivhoffman 5 ай бұрын
@@UtraVioletDreams ❤️ nice to meet you ! Keep in touch , maybe we do video together
@KeeperOfTheSplendor
@KeeperOfTheSplendor 5 ай бұрын
@OTW has anyone besides government agencies correctly guessed your true identity? I would think other than that only God & Granny could do such things🧐
@user-ly7ll2kk8w
@user-ly7ll2kk8w 4 ай бұрын
His true identity is Keith Debus
@KeeperOfTheSplendor
@KeeperOfTheSplendor 4 ай бұрын
Ask me if I care? Just ruined the mystery of it all 🫏
@someone2324
@someone2324 5 ай бұрын
Angry people...lol!!!
@yanivhoffman
@yanivhoffman 5 ай бұрын
It’s true. One of the motivation behind some attackers is revenge from people that got fired or treated improperly so they would like as a punishment to disrupt the service of that provider
@someone2324
@someone2324 5 ай бұрын
@@yanivhoffman aka insider threat
@user-rf7ss5ts9q
@user-rf7ss5ts9q 3 ай бұрын
can you help me
@yanivhoffman
@yanivhoffman 3 ай бұрын
What’s the problem ?
@mysterytriangle6062
@mysterytriangle6062 5 ай бұрын
hacking Russia with hping3 LOL
@yanivhoffman
@yanivhoffman 5 ай бұрын
Ofc not 😂
@EAG_EDITORS
@EAG_EDITORS 5 ай бұрын
Hello I’m professional video editor I have worked with many clients who provide this type of content, and I have many good reviews on freelance sites. I hope you will respond to provide you with the rest of the details. Thank you.
@yungcaco1443
@yungcaco1443 3 күн бұрын
Imagine being so pathetic and bitter you spend your time DDOSing servers .
@camelotenglishtuition6394
@camelotenglishtuition6394 5 ай бұрын
"master hacker" ..respectfully disagree..he thinks iOS is safer than Android, doesn't seem to know how proxy chains work and to me...seems a bit like a fed..just saying..
@sneaksunlimited8268
@sneaksunlimited8268 4 ай бұрын
Former nsa
@camelotenglishtuition6394
@camelotenglishtuition6394 4 ай бұрын
@@sneaksunlimited8268 I dunno man .. giving advice that could get ppl locked up does seem to give up the "former" to me a bit
@QuanshengQwin
@QuanshengQwin 4 ай бұрын
FORMER?
@billbronk1745
@billbronk1745 4 ай бұрын
I though iOS has end to end encryption, and Android runs off the Linux kernel?
@user-ly7ll2kk8w
@user-ly7ll2kk8w 4 ай бұрын
OTW is actually convicted conartist Keith Debus. He uses OTW to sale his shitty basic linux and networking classes
@swoodc
@swoodc 4 ай бұрын
This guys annoying and I hate hearing him on david brombals channel
@yanivhoffman
@yanivhoffman 4 ай бұрын
Thx for the feedback but to learn forward and improve. Why annoying?
@johnnywilliams2641
@johnnywilliams2641 5 ай бұрын
The only thing about his Networking book, unless a networking word is 32 bits, I do believe there is a mistake on page 22 where it shows a word is 4 bytes. Although I very well could be misuderstanding the diagram or maybe a word in networking is 32 bytes and on a cpu or programming it is 2 bytes. Im not expert.
@yanivhoffman
@yanivhoffman 5 ай бұрын
thx for the feedback. i will look into it and return to you
@forthehomies7043
@forthehomies7043 5 ай бұрын
a word can be 8, 16, or 32 bits depending on the programming language
@Passionaction1206
@Passionaction1206 3 ай бұрын
I KNOW MY STUFF IS BREECHED.. HAS BEEN FOR OVER 2 YEARS. BUT I CANT GET IT OFF... AND DONT KNOW EXACTLY HOW. I DONT KNOW WHO TO CONTACT TO LET EVERYONE KNOW THAT IT NEEDS TO BE SEEN ASAP..
Hacking IP Cameras with master hacker OccupyTheWeb
50:12
Yaniv Hoffman
Рет қаралды 224 М.
Hack like Mr Robot // WiFi, Bluetooth and Scada hacking
45:23
David Bombal
Рет қаралды 2,1 МЛН
Why? 😭 #shorts by Leisi Crazy
00:16
Leisi Crazy
Рет қаралды 44 МЛН
1 класс vs 11 класс (неаккуратность)
01:00
БЕРТ
Рет қаралды 2,1 МЛН
CAN YOU HELP ME? (ROAD TO 100 MLN!) #shorts
00:26
PANDA BOI
Рет қаралды 35 МЛН
Unboxing HAMGEEK DSTIKE V3 V4 Watch Deauther & Bad USB Review Aliexpress
1:55
Dark Web vs Deep Web: Unveiling the Hidden Layers of the Internet
2:20
15 crazy new JS framework features you don’t know yet
6:11
Biggest Cybersecurity Threats you need to know about!
54:15
David Bombal Tech
Рет қаралды 17 М.
Why Hacking is the Future of War
31:45
Johnny Harris
Рет қаралды 2,2 МЛН
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 251 М.
👎Главный МИНУС планшета Apple🍏
0:29
Demin's Lounge
Рет қаралды 375 М.
Выложил СВОЙ АЙФОН НА АВИТО #shorts
0:42
Дмитрий Левандовский
Рет қаралды 601 М.
📱 SAMSUNG, ЧТО С ЛИЦОМ? 🤡
0:46
Яблочный Маньяк
Рет қаралды 1,6 МЛН
Эффект Карбонаро и бумажный телефон
1:01
История одного вокалиста
Рет қаралды 2,5 МЛН