Satellite Hacking Explained: Tools, Techniques, and Risks in Cybersecurity
Yaniv Hoffman
View ChannelAbout
π₯ Cybersecurity Made Simple. Powerful. For Everyone. Iβm Yaniv Hoffman β a cybersecurity professional with 25+ years in the industry, and a lifelong obsession with tech since coding my first program at 13. Today, I help IT pros, career switchers, and curious minds break into cybersecurity with clear, practical, and engaging content. From real hacking stories to hands-on tools, red vs blue team tactics, and expert interviews β this channel is your front-row seat to the cyber battlefield. π No fluff. Just the knowledge, mindset, and tools you need to level up. π― Letβs make cybersecurity accessible β and fun. πΎ Explore more at www.Yaniv Hoffman.com and subscribe to join 53K+ defenders, hackers, and learners worldwide.
Latest Posts
Video Description
Dive into the fascinating world of satellite hacking and uncover the secrets of one of the most advanced frontiers in cybersecurity! In this video, we explore how satellites function, the tools used to interact with them, and the potential risks posed by cyber attacks targeting these critical assets. Learn about real-world techniques used by cybersecurity professionals to analyze satellite systems, decode transmissions, and protect sensitive data from unauthorized access. Whether you're an IT professional, a technology enthusiast, or someone looking to start a career in ethical hacking, this video is packed with insights to level up your cybersecurity knowledge. Weβll also showcase Dragon OS, an open-source platform designed for radio signal decoding, and dive deep into Iridium satellite hacking, hardware requirements, and how to capture and reassemble data. Discover the skills and tools needed to navigate the exciting field of satellite cybersecurity, from decoding signals to analyzing potential vulnerabilities. If you're passionate about exploring cutting-edge cyber defense strategies or gaining hands-on experience in hacking techniques, this video is a must-watch. Stay ahead in the evolving world of cybersecurity and subscribe for more educational content! #SatelliteHacking #Cybersecurity #EthicalHacking #DragonOS #RadioSignals #HackingSatellites ----------------------------------------------------------------------------------------------------------------- Disclaimer: This video is for educational purposes only. We do not promote or endorse illegal hacking activities. The content is meant to help cybersecurity professionals understand the tactics used by malicious actors, so they can build better defenses. Always use hacking skills ethically and responsibly to protect systems and users. ----------------------------------------------------------------------------------------------------------------- π Buy Me A Coffee: https://buymeacoffee.com/yanivhoffman π BlueSky: @yanivhoffman.bsky.social π¦ X (Twitter): @yanivhoffman πΌ LinkedIn: https://www.linkedin.com/in/yanivhoffman π My Website: yanivhoffman.com (Personal) π OccupyTheWeb Books - Affiliate Links: 1οΈβ£ Become a Master Hacker: https://amzn.to/3Eq6vX4 2οΈβ£ NEW BOOK: Network Basics for Hackers: https://amzn.to/3YNd1iz 3οΈβ£ Linux Basics for Hackers: https://amzn.to/3Sdoh5i π Pre-order: Python Basics for Hackers (Autographed & 50% off): https://www.hackers-arise.com/online-store/Python-Basics-for-Hackers-Pre-Order-50-off-and-autographed-p706286286 π Hackers-Arise - Online Store: https://www.hackers-arise.com/online-store π OccupyTheWeb Community - Hackers-Arise: ποΈ 20% Coupon Code: "YANIV" (Use for everything in the store!) β±οΈ Chapters: 00:00-00:32 - ποΈ What We'll Cover Today 00:32-00:36 - β οΈ Disclaimer 00:36-01:08 - π Everything We'll Cover and Much More... 01:08-02:10 - π°οΈ Satellite Hacking 02:10-02:34 - π Satellite Hacking Class 02:34-07:09 - π Iridium Satellites Overview 07:09-08:56 - π οΈ Hardware Essentials 08:56-13:47 - π Getting Started with Dragon OS 13:47-17:15 - π For Those Who Are New 17:15-18:40 - β οΈ Important Disclaimer 18:40-21:00 - π§© How It Works 21:00-27:32 - π Decoding the Data 27:32-28:47 - βοΈ Potential Messages Preview 28:47-28:52 - β οΈ Important Disclaimer (Again) 28:52-32:14 - π‘ How to Capture Data 32:14-37:20 - π Reassemble Data 37:20-40:23 - π Summary and Conclusion π₯ Watch More Cybersecurity Fundamental Videos: 1οΈβ£ Radio Signal Jamming: https://youtu.be/bm01h6NC_Ho 2οΈβ£ The World's Most Powerful Cyber Armies: https://youtu.be/JgHfo_4-Hr8 3οΈβ£ Hacking IoT Devices: https://youtu.be/267HHx8DuJY 4οΈβ£ HTTP/2 Rapid Reset Attack Explained: https://youtu.be/1ez0xzwl6Ds 5οΈβ£ The World's Smallest Hacking Lab: https://youtu.be/oKZRiFaPljo 6οΈβ£ Hacking Wi-Fi Networks: https://youtu.be/TDvX5DE7D-Q 7οΈβ£ Hacking IP Cameras: https://youtu.be/zCmC5IffIZg 8οΈβ£ How to Become a Master Hacker (With OTW): https://youtu.be/NE2_Id0I6UM 9οΈβ£ Hacking SCADA Systems: https://youtu.be/xnrEK9VawHo π Software-Defined Radio Hacking: https://youtu.be/7z5SNEEyCfo π Pegasus Spyware: https://youtu.be/Dm5cq1TC2r0 π οΈ Stuxnet: https://youtu.be/fLwLRvp1YFA π API Hacking: https://youtu.be/1t5wXWFI0yU π DNS Hacking: https://youtu.be/Hsj_67RhNMc π» How to Build a Hacking Box: https://youtu.be/vnYmb6spw30
Equip Your Cybersecurity Toolkit Now
AI-recommended products based on this video

BOSGAME Linux Mini PC, Intel 12th N100 16GB DDR4 RAM 512GB SSD Linux Server Computers Preinstalled Ubuntu 22.04,Support 4K Triple Display/USB3.2/WiFi 5/2.5GbE

10.1 Inch Touch Portable Monitor IPS Screen 1366x768P 60Hz 400 Brightness 99% sRGB HDMI USB-C Monitors Switch for Xbox PS3/4/5 Laptop Compatible with Raspberry Pi, Mini Touch Screen

ELECROW 8 Inch Portable Monitor, 1280x800 Mini HD Display with Built-in Speakers, USB Powered, Non-Touch LCD Screen for Raspberry Pi, PC, Laptop, Jetson Nano, Game Consoles

7 Inch Portable Monitor Touchscreen HD 1024x600 LED Display Dual HDMI Port Small Monitor for PC Raspberry Pi Laptop Computer Xbox PS4/5 Switch Built-in Speakers




