Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
David Bombal - #363: Interview: Hackers Arise to hack Russia // Ukraine Cyberwar

#363: Interview: Hackers Arise to hack Russia // Ukraine Cyberwar

03/28/22 • 75 min

David Bombal
I interview a hacker about the hackers hacking Russia in the current Ukraine cyberwar. He shares his manifesto and why he thinks it's important for you to learn hacking in 2022. Disclaimer: The opinions expressed by Occupy The Web in this interview are his own. Next interview: If you are a hacker based in Russia and want to be interviewed, please contact me and let's try to set up an interview. Is this how the world ends? Another book to look at: "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" by Nicole Perlroth: https://amzn.to/3JqK1Wp // MENU // 00:00 ▶️ Introduction 00:36 ▶️ Occupy The Web Introduction + background 03:05 ▶️ Hacking Russia 04:09 ▶️ Cyber-war 06:45 ▶️ Hacking accomplishments 09:12 ▶️ DDos Russian websites 10:18 ▶️ Russian "Iron Curtain" 11:27 ▶️ Hackers Arise DDos tutorial 13:45 ▶️ What is a white hat hacker? 16:40 ▶️ Urgency of stopping Putin 17:16 ▶️ Responsibility of hackers 18:00 ▶️ Hackers Arise manuals 19:36 ▶️ Using SDR to jam communications 20:10 ▶️ Ukrainian government asking hackers for help 21:43 ▶️ What Russians think 23:12 ▶️ Risk of being visited by a government agency 25:58 ▶️ Russian back doors 28:23 ▶️ Vulnerable systems in Russia 29:51 ▶️ Russian hackers escalation 33:52 ▶️ Linux basics for hackers book 37:53 ▶️ Opinion about CEH 39:00 ▶️ Advice for young hackers 41:59 ▶️ Opinion on OSCP 42:38 ▶️ Other certs CompTIA Security+ or eJPT 44:40 ▶️ Has the West been asleep 47:26 ▶️ Germany on the frontlines 49:18 ▶️ Russian/Ukraine war escalating cyber-security 53:05 ▶️ How to stay anonymous online 59:17 ▶️ Occupy The Web history 01:01:20 ▶️ Install Linux on hardware? What version of Linux? Kali? 01:05:09 ▶️ "Am I too old for hacking?" 01:09:13 ▶️ Hacker Arise courses 01:12:53 ▶️ Occupy The Web twitter and others 01:14:27 ▶️ Closing thoughts and manifesto // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Occupy The Web / Hackers Arise Website // Website: https://www.hackers-arise.com/ What is a White Hat Hacker: hhttps://davidbombal.wiki/whitehatarise Putin's Windows XP Computer: https://davidbombal.wiki/putinxp SDR Signals: https://davidbombal.wiki/SDRSignals Using OSINT to find Yachts: https://davidbombal.wiki/osintyachts // Recommended Twitter Accounts // Lesley Carhart: https://twitter.com/hacks4pancakes Dave Kennedy: https://twitter.com/HackingDave Evacide: https://twitter.com/evacide // In the News // BBC: https://www.bbc.co.uk/news/technology... The Guardian: https://www.theguardian.com/world/202... Reuters: https://www.reuters.com/world/exclusi... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #ukraine #russia #cyberwar
plus icon
bookmark
I interview a hacker about the hackers hacking Russia in the current Ukraine cyberwar. He shares his manifesto and why he thinks it's important for you to learn hacking in 2022. Disclaimer: The opinions expressed by Occupy The Web in this interview are his own. Next interview: If you are a hacker based in Russia and want to be interviewed, please contact me and let's try to set up an interview. Is this how the world ends? Another book to look at: "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" by Nicole Perlroth: https://amzn.to/3JqK1Wp // MENU // 00:00 ▶️ Introduction 00:36 ▶️ Occupy The Web Introduction + background 03:05 ▶️ Hacking Russia 04:09 ▶️ Cyber-war 06:45 ▶️ Hacking accomplishments 09:12 ▶️ DDos Russian websites 10:18 ▶️ Russian "Iron Curtain" 11:27 ▶️ Hackers Arise DDos tutorial 13:45 ▶️ What is a white hat hacker? 16:40 ▶️ Urgency of stopping Putin 17:16 ▶️ Responsibility of hackers 18:00 ▶️ Hackers Arise manuals 19:36 ▶️ Using SDR to jam communications 20:10 ▶️ Ukrainian government asking hackers for help 21:43 ▶️ What Russians think 23:12 ▶️ Risk of being visited by a government agency 25:58 ▶️ Russian back doors 28:23 ▶️ Vulnerable systems in Russia 29:51 ▶️ Russian hackers escalation 33:52 ▶️ Linux basics for hackers book 37:53 ▶️ Opinion about CEH 39:00 ▶️ Advice for young hackers 41:59 ▶️ Opinion on OSCP 42:38 ▶️ Other certs CompTIA Security+ or eJPT 44:40 ▶️ Has the West been asleep 47:26 ▶️ Germany on the frontlines 49:18 ▶️ Russian/Ukraine war escalating cyber-security 53:05 ▶️ How to stay anonymous online 59:17 ▶️ Occupy The Web history 01:01:20 ▶️ Install Linux on hardware? What version of Linux? Kali? 01:05:09 ▶️ "Am I too old for hacking?" 01:09:13 ▶️ Hacker Arise courses 01:12:53 ▶️ Occupy The Web twitter and others 01:14:27 ▶️ Closing thoughts and manifesto // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Occupy The Web / Hackers Arise Website // Website: https://www.hackers-arise.com/ What is a White Hat Hacker: hhttps://davidbombal.wiki/whitehatarise Putin's Windows XP Computer: https://davidbombal.wiki/putinxp SDR Signals: https://davidbombal.wiki/SDRSignals Using OSINT to find Yachts: https://davidbombal.wiki/osintyachts // Recommended Twitter Accounts // Lesley Carhart: https://twitter.com/hacks4pancakes Dave Kennedy: https://twitter.com/HackingDave Evacide: https://twitter.com/evacide // In the News // BBC: https://www.bbc.co.uk/news/technology... The Guardian: https://www.theguardian.com/world/202... Reuters: https://www.reuters.com/world/exclusi... // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #ukraine #russia #cyberwar

Previous Episode

undefined - #362: How Nmap really works // And how to catch it // Stealth scan vs TCP scan // Wireshark analysis

#362: How Nmap really works // And how to catch it // Stealth scan vs TCP scan // Wireshark analysis

Chris and I go deep into what Nmap is actually sending onto the network and how you can find those dodgy packets! We then get into a real world Wireshark discussion on how to find stuff in a sea of packets. // MENU // 0:00 ▶️ Welcome 2:15 ▶️ What is Nmap? 3:54 ▶️ TCP SYN and TCP connect scans 6:55 ▶️ Wireshark IP Filter 7:42 ▶️ Wireshark TCP Port Filter 7:57 ▶️ Stealth Scan 09:37 ▶️ Why it's called a stealth scan 11:02 ▶️ Connect() scan 11:50 ▶️ How to identify potential Nmap scans in Wireshark 15:05 ▶️ Wireshark filters to find potential stealth scans 19:08 ▶️ Nmap Port Flag 20:16 ▶️ What makes a TCP connect scan different 22:47 ▶️ What is TCP Conversation Completeness 26:16 ▶️ Wireshark filter to identify potential TCP connect scans 29:06 ▶️ Are devices good enough today to capture huge amounts of data? 31:09 ▶️ Network Traffic Monitoring Device 32:55 ▶️ How to find specific data in huge files 42:27 ▶️ Final tips for beginners in cybersecurity 43:27 ▶️ Topics for future videos // Wireshark pcap file // https://davidbombal.wiki/nmapstealth // Wireshark documentation // https://www.wireshark.org/docs/wsug_h... // MY STUFF // https://www.amazon.com/shop/davidbombal // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal //CHRIS GREER // LinkedIn: https://www.linkedin.com/in/cgreer/ YouTube: https://www.youtube.com/c/ChrisGreer Twitter: https://twitter.com/packetpioneer Pluralsight: TCP Analysis Course: https://davidbombal.wiki/tcpwireshark // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] nmap nmap stealth scan nmap scan nmap hacking nmap scan types wireshark wireshark tcp packet analysis ccna cisco ccna wireshark nmap wireshark real world real world wireshark Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #nmap #wireshark #hacking

Next Episode

undefined - #364: TLS Handshake Deep Dive and decryption with Wireshark // SSL Key Exchange Explained

#364: TLS Handshake Deep Dive and decryption with Wireshark // SSL Key Exchange Explained

Hacking the TLS Handshake and decryption with Wireshark // SSL Deep Dive 50,157 views Mar 25, 2022 Warning! We go deep in this video to explain how the TLS handshake is completed. Warning! This is a technical deep dive and covers a lot of detail including SSL decryption and discusses RSA, Public and Private Keys, symmetric key exchange and lots more. // Wireshark pcap // https://davidbombal.wiki/tlsedpcap // Ed's TLS course // https://davidbombal.wiki/edtls49 Use coupon code: "BombalTLS" to get for $49 // MENU // 00:00 ▶️ Introduction 02:11 ▶️ How SSL/TLS is shown in a browser 02:40 ▶️ Pre-Requisites 05:15 ▶️ Data Integrity/Hashing 06:27 ▶️ Potential Problems with Hashing/man in-the-middle attack 07:32 ▶️ Message Authentication Code 10:09 ▶️ Prerequisites continued 11:51 ▶️ Symmetric Encryption 12:45 ▶️ Asymmetric Encryption 17:00 ▶️ Private and Public Keys 20:05 ▶️ Signatures 21:55 ▶️ Protocols 22:50 ▶️ SSL/TLS Handshake, Client Hello and Server Hello 28:35 ▶️ Client Hello and Server Hello in Wireshark 34:09 ▶️ Certificate 35:12 ▶️ Server Done 35:35 ▶️ Server Hello, Certificate, Server Hello Done in Wireshark 36:51 ▶️ Client Key Exchange 50:26 ▶️ Client Key Exchange in Wireshark 51:39 ▶️ Client Change Cipher Spec and Finished/Encrypted Verification 54:08 ▶️ Server Change Cipher Spec and Finished/Encrypted 56:10 ▶️ SSL/TLS Handshake in Wireshark 57:44 ▶️ Decrypting a PreMaster Key with a Private Key in Wireshark 1:03:15 ▶️ Where to get in contact with Ed to learn more // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Ed's SOCIAL // Twitter: https://twitter.com/ed_pracnet YouTube: https://www.youtube.com/channel/UCKmU... // Ed's TLS course // https://davidbombal.wiki/edtls49 Use coupon code: "BombalTLS" to get for $49 // More detail on Ed's YouTube channel and website // Asymmetric Encryption explained from a Practical Perspective: https://www.practicalnetworking.net/p... RSA Algorithm: https://www.youtube.com/watch?v=Pq8gN... DH Algorithm: https://www.youtube.com/watch?v=KXq06... Practical TLS - Crypto & SSL/TLS foundation: https://www.youtube.com/playlist?list... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] tls tls decryption ssl crypto cryptography ssl decryption tls wireshark tls decryption wireshark tls tunnel tls handshake tlsp tls explained tls tunnel vpn tls protocol tls handshake explained tls 1.3 TLS Transport Layer Security Handshake TLS Handshake Crypto Cryptography security wireshark wireshark tutorial wireshark packet analysis tls decryption tls decryption wireshark tls 1.3 decryption tls decryption wireshark tls tunnel vpn free internet tls decryption palo alto Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #tls #ssl #wireshark

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/david-bombal-313159/363-interview-hackers-arise-to-hack-russia-ukraine-cyberwar-45207369"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to #363: interview: hackers arise to hack russia // ukraine cyberwar on goodpods" style="width: 225px" /> </a>

Copy