You are currently viewing Hacking Power Plants and Industrial Control Systems (Scada) // Ukraine Russia Cyberwar

Hacking Power Plants and Industrial Control Systems (Scada) // Ukraine Russia Cyberwar

This is my second interview with the professional hacker Occupy The Web. In this video we discuss OSINT and hacking industrial control systems (ICS) using SCADA (supervisory control and data acquisition).
Jump to 33:40 for scada discussions.

Disclaimer: The opinions expressed by Occupy The Web in this interview are his own.

// MENU //
00:00 ▶️ Introduction
00:41 ▶️ Disclaimer
00:46 ▶️ Intro With OccupyTheWeb
01:30 ▶️ Ukraine Web Cam Hacking
03:55 ▶️ Finding Russian Superyachts With OSINT
05:47 ▶️ Why Track Russian Superyachts?
09:10 ▶️ Russian Oligarchs
10:54 ▶️ The YouTube Comments/OccupyTheWeb is Not CIA/NSA
12:37 ▶️ It’s Not About the US
13:09 ▶️ Getting Started with OSINT and OSINT Tools
14:51 ▶️ OSINT As a Career
15:22 ▶️ Other Uses For OSINT
16:38 ▶️ OSINT Can Find Anything About Anybody
18:21 ▶️ Phones/How To Avoid Being Tracked
19:22 ▶️ Turning Off Your GPS Doesn’t Stop Tracking
20:35 ▶️ Use a Burner Phone
23:30 ▶️ Tips To Stay Anonymous Online
26:36 ▶️ Different Physical Machine vs Virtual Machine for Privacy
28:08 ▶️ Cellphone Networks – IP Addresses
29:36 ▶️ Before We Talk About SCADA
33:49 ▶️ SCADA Hacking As The Nuclear Option
38:25 ▶️ Why Would It Be The Nuclear Option?
40:11 ▶️ SCADA Hacking Example/The Colonial Pipeline
42:13 ▶️ The Difference Between a Traditional IT System and a SCADA System
44:07 ▶️ SCADA Protocols
46:03 ▶️ SCADA Hacking Example/Stuxnet
49:06 ▶️ Why Are These Systems Connected To The Internet In The First Place?
51:52 ▶️ Almost All SCADA Systems Are Online
52:24 ▶️ How To Find SCADA Systems Online
56:51 ▶️ Why SCADA Attacks Aren’t Simple
57:57 ▶️ But There Is Still A Huge Risk For SCADA Attacks
01:01:39 ▶️ How Companies Can Secure Their SCADA Systems
01:03:07 ▶️ People Don’t Do What They’re Supposed To Do
01:05:00 ▶️ Final Thoughts/Teaser For The Next Video With OccupyTheWeb
01:05:30 ▶️ Closing/Leave a Comment!

// Previous video //
OTW video 1:

// David’s SOCIAL //

// Occupy The Web social //

// Occupy The Web books //
Linux Basics for Hackers:
Getting Started Becoming a Master Hacker:

// Occupy The Web Website / Hackers Arise Website //

Using OSINT to find Yachts:

Can the CIA or other Intelligence Agencies Track My Every Move:

SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems

SCADA Hacking: Finding SCADA Systems using Shodan

Shodan: Using Shodan to Find Vulnerable Russian SCADA/ICS Sites

SCADA Hacking: The Most Important SCADA/ICS Attacks in History

SCADA Hacking: SCADA/ICS Protocols (Profinet/Profibus)

Lots of Scada content:

// In the News //
Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems:

Ukrainian power grid ‘lucky’ to withstand Russian cyber-attack:

An Unprecedented Look at Stuxnet, the World’s First Digital Weapon

// Other books //
The Linux Command Line:
How Linux Works:

// MY STUFF //

Interested in sponsoring my videos? Reach out to my team here: [email protected]

industrial control systems
occupy the web
hackers arise
ukraine war
ukraine cyber attack
russia ukraine news
russia vs ukraine
russian invasion
russia ukraine crisis
ukraine crisis
cyber security
cyber attack
cyber war
russia cyberwar
russia cyber attack
cyberwar against russia
cyber security news
ukraine war
ukraine cyber attack today
ukraine 2022
ukraine news
russia ukraine conflict
russia vs ukraine
russia ukraine war
russian cyber attack
russian ukraine news
russia ukraine cyber

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#ukraine #russia #scada

... read more by following the link below

This post was originally published on this site