Satellite Hacking Explained: Tools, Techniques, and Risks in Cybersecurity

Yaniv Hoffman β€’ September 6, 2024
Video Thumbnail
Yaniv Hoffman Logo

Yaniv Hoffman

View Channel

About

πŸ”₯ Cybersecurity Made Simple. Powerful. For Everyone. I’m Yaniv Hoffman β€” a cybersecurity professional with 25+ years in the industry, and a lifelong obsession with tech since coding my first program at 13. Today, I help IT pros, career switchers, and curious minds break into cybersecurity with clear, practical, and engaging content. From real hacking stories to hands-on tools, red vs blue team tactics, and expert interviews β€” this channel is your front-row seat to the cyber battlefield. πŸ“š No fluff. Just the knowledge, mindset, and tools you need to level up. 🎯 Let’s make cybersecurity accessible β€” and fun. πŸ‘Ύ Explore more at www.Yaniv Hoffman.com and subscribe to join 53K+ defenders, hackers, and learners worldwide.

Video Description

Dive into the fascinating world of satellite hacking and uncover the secrets of one of the most advanced frontiers in cybersecurity! In this video, we explore how satellites function, the tools used to interact with them, and the potential risks posed by cyber attacks targeting these critical assets. Learn about real-world techniques used by cybersecurity professionals to analyze satellite systems, decode transmissions, and protect sensitive data from unauthorized access. Whether you're an IT professional, a technology enthusiast, or someone looking to start a career in ethical hacking, this video is packed with insights to level up your cybersecurity knowledge. We’ll also showcase Dragon OS, an open-source platform designed for radio signal decoding, and dive deep into Iridium satellite hacking, hardware requirements, and how to capture and reassemble data. Discover the skills and tools needed to navigate the exciting field of satellite cybersecurity, from decoding signals to analyzing potential vulnerabilities. If you're passionate about exploring cutting-edge cyber defense strategies or gaining hands-on experience in hacking techniques, this video is a must-watch. Stay ahead in the evolving world of cybersecurity and subscribe for more educational content! #SatelliteHacking #Cybersecurity #EthicalHacking #DragonOS #RadioSignals #HackingSatellites ----------------------------------------------------------------------------------------------------------------- Disclaimer: This video is for educational purposes only. We do not promote or endorse illegal hacking activities. The content is meant to help cybersecurity professionals understand the tactics used by malicious actors, so they can build better defenses. Always use hacking skills ethically and responsibly to protect systems and users. ----------------------------------------------------------------------------------------------------------------- πŸ’™ Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman 🌌 BlueSky: @yanivhoffman.bsky.social 🐦 X (Twitter): @yanivhoffman πŸ’Ό LinkedIn: https://www.linkedin.com/in/yanivhoffman 🌐 My Website: yanivhoffman.com (Personal) πŸ“š OccupyTheWeb Books - Affiliate Links: 1️⃣ Become a Master Hacker: https://amzn.to/3Eq6vX4 2️⃣ NEW BOOK: Network Basics for Hackers: https://amzn.to/3YNd1iz 3️⃣ Linux Basics for Hackers: https://amzn.to/3Sdoh5i πŸ“– Pre-order: Python Basics for Hackers (Autographed & 50% off): https://www.hackers-arise.com/online-store/Python-Basics-for-Hackers-Pre-Order-50-off-and-autographed-p706286286 πŸ›’ Hackers-Arise - Online Store: https://www.hackers-arise.com/online-store 🌐 OccupyTheWeb Community - Hackers-Arise: 🎟️ 20% Coupon Code: "YANIV" (Use for everything in the store!) ⏱️ Chapters: 00:00-00:32 - πŸ—’οΈ What We'll Cover Today 00:32-00:36 - ⚠️ Disclaimer 00:36-01:08 - πŸ” Everything We'll Cover and Much More... 01:08-02:10 - πŸ›°οΈ Satellite Hacking 02:10-02:34 - πŸŽ“ Satellite Hacking Class 02:34-07:09 - 🌌 Iridium Satellites Overview 07:09-08:56 - πŸ› οΈ Hardware Essentials 08:56-13:47 - πŸš€ Getting Started with Dragon OS 13:47-17:15 - πŸ“– For Those Who Are New 17:15-18:40 - ⚠️ Important Disclaimer 18:40-21:00 - 🧩 How It Works 21:00-27:32 - πŸ”“ Decoding the Data 27:32-28:47 - βœ‰οΈ Potential Messages Preview 28:47-28:52 - ⚠️ Important Disclaimer (Again) 28:52-32:14 - πŸ“‘ How to Capture Data 32:14-37:20 - πŸ”„ Reassemble Data 37:20-40:23 - πŸ“Œ Summary and Conclusion πŸŽ₯ Watch More Cybersecurity Fundamental Videos: 1️⃣ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2️⃣ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3️⃣ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4️⃣ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5️⃣ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6️⃣ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7️⃣ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8️⃣ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9️⃣ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo πŸ”Ÿ Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo 🐎 Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 πŸ› οΈ Stuxnet: https://youtu.be/fLwLRvp1YFA πŸ” API Hacking: https://youtu.be/1t5wXWFI0yU 🌐 DNS Hacking: https://youtu.be/Hsj_67RhNMc πŸ’» How to Build a Hacking Box: https://youtu.be/vnYmb6spw30

You May Also Like