Every Hacking Technique Explained in 18 minutes
14 views
Apr 25, 2025
Every Hacking Technique Explained in 18 minutes, Get ready to dive into the thrilling world of cybersecurity with our latest video: Every Hacking Technique Explained in 10 Minutes! In just a quarter of an hour, we break down essential hacking methods such as SQL injection, phishing, and credential stuffing, revealing how they work and how to protect yourself. Whether you're a cybersecurity enthusiast or just curious about the ins and outs of hacking, this explainer is for you! Don’t miss out on this must-watch for anyone wanting to enhance their knowledge. Subscribe for more insights and hit that notification bell! #Hacking #CyberSecurity #TechExplained
View Video Transcript
0:00
it's another video about the ultimate
0:01
speedrun of networking protocol in this
0:03
video I'm going to break down every
0:05
protocol an ethical hacker needs to know
0:07
as quickly and simply as possible we'll
0:09
explore everything from basic web
0:11
protocols to advanced industrial ones
0:13
all while throwing in examples metaphors
0:15
and a bit of humor to make it stick for
0:16
you if you want to sell your service to
0:18
companies and help them protect their
0:20
software and websites make sure to check
0:21
out rolodell.com if you haven't already
0:23
after watching this video link is in the
0:25
comments are you ready let's dive in
0:27
we'll begin with the basics http and
0:31
HTTPS picture HTTP as a delivery service
0:34
for a website but one that's sending
0:36
your information on postcards everyone
0:38
can read what's on them but then HTTPS
0:40
shows up putting those postcards in an
0:42
envelope blocking it with encryption so
0:44
no one else can peek inside this makes
0:45
HTTPS essential for any site that
0:48
handles sensitive information like
0:49
banking or shopping then there's TCP and
0:51
IP the foundation of everything we do
0:53
online think of TCP as a careful
0:55
delivery driver ensuring every data
0:57
packet arrives safely while IP is the
0:59
GPS that tells TCP exactly where to go
1:02
without these two working together the
1:03
internet would be in absolute chaos next
1:05
up is UDP if TCP is a careful delivery
1:08
truck UDP is like a bicycle messenger
1:10
zooming through traffic it's faster
1:12
because it doesn't wait around to check
1:13
if every packet made it that's why it's
1:15
used for live streams and online gaming
1:17
where speed is more important than
1:18
perfection moving on to DNS every domain
1:21
owner knows this this is the domain name
1:23
system it's like the internet's phone
1:25
book when you type in a web address dns
1:27
look up the IP address and directs you
1:29
to the right place but if a hacker
1:30
messes with it they can redirect you to
1:32
a fake site instead which is known as
1:34
DNS spoofing now let's talk about FTP
1:37
and SFTP the protocols for transferring
1:40
files think of FTP as sending your
1:42
documents in a plane envelope completely
1:44
unsecured but SFTP is like sending them
1:47
in an armored truck the difference
1:48
encryption hackers love to target FTP
1:51
because it's wide open for snooping ssh
1:54
is next the protocol for secure remote
1:56
login imagine it as a secret tunnel
1:58
connecting you to a remote server no one
2:00
else can see what's happening inside
2:02
unless they manage to crack your
2:03
password it's a favorite among CIS
2:05
admins and hackers alike then there are
2:07
the email protocols SMTP POP3 and IMAP
2:12
smtp sends your emails out while POP3
2:15
and IMAP bring your emails in they're
2:17
like the behind-the-scenes postal
2:19
workers of the digital world but if
2:20
they're not configured properly hackers
2:22
can use them to hijack email accounts or
2:24
launch fishing attacks next we have SNP
2:27
the protocol that's always whispering
2:29
about what's going on in your network
2:30
it's like a nosy neighbor telling you
2:32
who's home who's not and which
2:34
appliances are acting up but leave it
2:35
unsecured and anyone can listen in or
2:37
worse start making changes to your
2:39
network icmp is up next if you've ever
2:41
used the ping command you've used ICMP
2:43
it's like sending a quick are you there
2:45
to another computer super handy for
2:46
diagnostics but hackers can also use it
2:48
to map out networks and then we have ARP
2:51
arp is like a translator that converts
2:53
IP addresses into physical MAC addresses
2:56
imagine you're in a big office and you
2:57
need to find Bob's desk arp tells you
2:59
where he's sitting but ARP spoofing can
3:01
trick you into thinking Bob's desk is
3:03
somewhere it's not leading your data to
3:05
a hacker instead dhcp is up next this
3:08
one hands out IP addresses to devices on
3:10
your network like a party host assigning
3:12
seats at a dinner table but if a hacker
3:13
slips in and becomes the host they can
3:15
give you a seat that sends your data
3:17
straight into their trap we can't forget
3:18
about SSLTS the protocols that secure
3:21
your web traffic they're like the locks
3:23
on your internet communications imagine
3:25
whispering secrets in a crowded room if
3:27
someone doesn't have the right key they
3:28
can't ease drop but an attack called SSL
3:30
stripping can downgrade that lock making
3:32
it easier to crack next we have LDAP
3:35
which is like your network's address
3:36
book it stores all the details about
3:38
users systems and permissions if someone
3:40
unauthorized flips through this book
3:42
they can see exactly where your weak
3:43
spots are and then there's Tnet tnet is
3:46
the insecure granddaddy of remote login
3:48
protocols imagine shouting your login
3:50
credentials in a crowded room yeah not a
3:52
good idea that's why most people use SSH
3:55
instead rdp is next the protocol for
3:57
controlling another computer remotely
3:59
it's like having the puppet strings to a
4:01
system across the country it's great for
4:03
IT support but if a hacker gets hold of
4:04
it they can run your system like a
4:06
puppet master now let's talk about
4:09
SMBCS this protocol is like the shared
4:12
office supply closet used for sharing
4:14
files and printers on a network but if
4:15
it's left unlocked anyone can wander in
4:17
and help themselves to sensitive data
4:19
making it a target for attackers ntp or
4:22
network time protocol is a digital
4:23
timekeeper making sure all the clocks in
4:25
your network are synchronized but if a
4:27
hacker manipulates it they can throw off
4:29
your entire network's timing causing
4:30
chaos in logs and communications sip is
4:33
up next the protocol behind your VIP
4:35
calls it's like a switchboard operator
4:37
setting up your calls if it's not
4:38
secured an attacker could listen in or
4:40
even impersonate you on a call for OOTH
4:42
and open ID imagine them as bouncers
4:44
outside a club checking IDs to see if
4:46
you're allowed in they don't ask for
4:48
your whole life story just a quick check
4:50
but if someone manages to forge that ID
4:52
they can walk right in keraros is a
4:54
three-headed guard dog for network
4:56
authentication it uses tickets to prove
4:58
you are who you say you are it's a
5:00
strong defender unless someone forges a
5:02
ticket and sneaks past let's move on to
5:04
MQTT the protocol that's like a group
5:06
chat for IoT devices it's lightweight
5:08
and quick but not always secure if a
5:10
hacker joins the chat they can start
5:12
sending commands to your devices modbus
5:14
is the protocol that runs industrial
5:16
devices think factory machines and power
5:18
plants but it's old and lacks modern
5:20
security making it like a factory with
5:22
no locks on the doors now on to BGP it's
5:26
the internet's map maker managing how
5:28
data packets are routed between large
5:30
networks if someone messes with BGP they
5:33
can cause massive outages or redirect
5:35
traffic for spying sctp is next a
5:37
protocol designed for telecom networks
5:39
it's like having multiple lanes on a
5:41
highway allowing for multiple messages
5:43
to be sent over the same channel without
5:45
traffic jams and finally we have gray an
5:48
encapsulation protocol that wraps
5:50
packets inside a tunnel it's like
5:52
sending a letter within a letter making
5:53
it useful for secure VPN connections
5:56
let's dive into IPS the bodyguard of IP
5:59
packets think of IPSec as a security
6:01
guard that not only checks IDs but also
6:03
escorts your data packets safely across
6:05
the network it's like sending your
6:07
valuables in a locked briefcase with a
6:09
security detail ensuring confidentiality
6:11
integrity and authentication hackers
6:13
trying to intercept these packets would
6:15
have a tough time cracking that
6:16
briefcase next on the list is PPTP and
6:20
L2TPV3 the early pioneers of VPN
6:22
protocols are like an old tunnel through
6:24
a mountain fast but riddled with
6:26
security holes
6:28
l2tpv3 often paired with IPSC is the
6:32
upgraded tunnel with reinforced walls
6:34
providing a safer passage for your data
6:36
but remember even the best tunnels need
6:37
maintenance to stay secure then we have
6:39
OPF the protocol that helps routers find
6:42
the best path like a seasoned navigator
6:44
plotting the quickest route on a map
6:45
it's essential for large networks to
6:47
prevent data from taking the scenic
6:49
route and slowing things down if
6:50
misconfigured however data might end up
6:52
on a detour through hacker land moving
6:54
on to RIP not the rest in peace kind but
6:56
the routing information protocol it's
6:58
like the veteran mailman who always
7:00
takes the same route even if it's not
7:01
the most efficient rip is simple and
7:03
easy to set up but doesn't scale well
7:05
for larger networks making it less
7:07
popular these days is Cisco's
7:09
proprietary routing protocol acting like
7:10
a secret handshake among Cisco devices
7:13
it's smarter than RIP and learns the
7:14
best paths over time but if you're not
7:16
using Cisco Gear you might feel left out
7:18
of the club mls is up next which stands
7:20
for multi-protocol label switching think
7:22
of it as the express lane on a highway
7:24
for your data packets it labels and
7:26
directs traffic efficiently reducing
7:28
congestion hackers might try to sneak
7:30
into this express lane to intercept high
7:32
priority data then there's PPTP the
7:34
point-to-point protocol it's like a
7:36
private conversation between two friends
7:38
on a tin can telephone line it's used
7:40
for direct connections over serial links
7:42
but doesn't offer much in terms of
7:43
security on its own po combines PPTP
7:45
with Ethernet allowing that tin can
7:47
conversation to happen over a larger
7:49
network commonly used by ISPs for
7:51
customer internet connections but if not
7:53
secured it can be tapped into by
7:54
eavesdroppers isis or intermediate
7:56
system to intermediate system is another
7:58
routing protocol like OPF cousin it's
8:00
the quiet efficient type often used by
8:03
large service providers to keep data
8:04
flowing smoothly misconfigurations here
8:06
can lead to data getting lost in transit
8:09
hsrp or hot standby router protocol is
8:11
like having a backup singer ready to
8:13
take over if the lead singer loses their
8:15
voice it provides network redundancy by
8:17
having a standby router ready to step in
8:19
minimizing downtime but if a hacker
8:21
spoofs HSRP messages they can redirect
8:23
traffic their way vrp is similar to HSRP
8:26
but is an open standard it's the
8:27
universal understudy in our network
8:29
theater ready to fill in when needed
8:30
again security is key to prevent
8:32
unauthorized stand-ins from taking over
8:34
the show lldp or link layer discovery
8:36
protocol is like name tags at a
8:38
networking event allowing devices to
8:40
announce themselves and learn about
8:41
their neighbors while useful for network
8:43
mapping if left unsecured it provides
8:45
hackers with a directory of potential
8:47
targets cdp or CISCO discovery protocol
8:51
is LDP's Cisco specific counterpart it's
8:54
like a VIP guest list at an exclusive
8:56
party while great for network management
8:58
it can spill too many beans if a hacker
9:00
gets access next we have Net Bios an
9:02
older protocol used for network
9:04
communication on local networks think of
9:06
it as the town crier shouting out
9:08
messages to find other devices it's
9:10
noisy and can reveal too much
9:11
information if not properly managed dns
9:13
or multiccast DNS is like neighborhood
9:16
gossip sharing information about who's
9:18
who without needing a central directory
9:20
it's used by devices like printers and
9:22
smart home gadgets to find each other
9:24
but an attacker can exploit it to
9:25
intercept or spoof services tftp or
9:28
trivial file transfer protocol is FTP's
9:31
lightweight sibling it's like leaving a
9:33
box of documents on your porch for
9:34
someone to pick up no security no
9:36
authentication convenient but risky if
9:38
sensitive information is involved tsp or
9:41
real-time streaming protocol is the
9:43
director behind live video streams
9:45
telling the cameras when to start and
9:46
stop it's essential for things like
9:48
security cameras and live broadcasts but
9:50
if hijacked an attacker could tap into
9:51
your video feeds rtp the real-time
9:54
transport protocol carries the actual
9:56
video and audio data like the actors on
9:58
stage srtp adds security to the mix
10:00
putting bodyguards around those actors
10:02
to prevent unauthorized access to your
10:04
streams gopher is a blast from the past
10:06
a protocol that predates HTTP for
10:09
distributing documents it's like an old
10:11
library card catalog system while mostly
10:13
obsolete some niche corners of the
10:15
internet still use it and understanding
10:17
it can help in certain retro computing
10:18
contexts http2 is the modern upgrade to
10:22
HTTP like swapping out your old bicycle
10:24
for a sleek new motorcycle it's faster
10:26
and more efficient but with new features
10:28
come new security considerations that
10:30
need to be addressed nfs or network file
10:32
system is like a shared drive where
10:34
everyone can access files as if they
10:36
were on their own computer great for
10:37
collaboration but can be a treasure
10:39
trove for hackers if permissions aren't
10:41
tight afp or Apple filing protocol is
10:43
NFS cousin in the Apple world it's the
10:45
protocol that lets Mac users share files
10:48
seamlessly however if not secured it
10:50
opens up the same risks as any file
10:51
sharing protocol iscsi allows you to
10:54
treat remote storage as if it's local
10:56
like having a magic bag that connects
10:57
directly to a warehouse miles away it's
11:00
fantastic for storage area networks but
11:02
intercepting this connection could give
11:03
attackers access to your data warehouse
11:06
fiber channel is like the bullet train
11:07
of storage networks fast and efficient
11:10
it's used in data centers for high-speed
11:12
data transfer but physical access to the
11:14
network can spell disaster if not
11:16
properly secured
11:19
feel over Ethernet combines the speed of
11:22
fiber channel with the flexibility of
11:23
Ethernet it's like adding wings to your
11:25
car it can fly over traffic but requires
11:27
careful handling to avoid crashes ntp
11:30
the network news transfer protocol is
11:32
used for Usenet articles think of it as
11:34
the old school internet forum system
11:36
while not as prevalent today it's still
11:38
around and can be a source of
11:39
information leakage if not managed
11:41
z-wave and Ziggby are protocols used in
11:44
home automation think smart lights and
11:45
thermostats they're like the secret
11:47
language your smart devices use to talk
11:49
to each other if a hacker learns that
11:51
language they can start controlling your
11:53
smart home bluetooth is the ubiquitous
11:55
protocol for short-range wireless
11:57
communication it's like a handshake
11:59
between devices to share data quickly
12:01
but leaving Bluetooth on and
12:02
discoverable is like wearing a sign that
12:04
says hackme NFC or near field
12:07
communication is what powers contactless
12:09
payments it's like a quick fist bump to
12:11
transfer small amounts of data secure
12:13
when used properly but attackers with
12:14
specialized equipment can attempt to
12:16
intercept or mimic signals the MQP or
12:19
advanced message queuing protocol is
12:21
used in enterprise messaging systems
12:22
it's like a postal service for business
12:24
applications ensuring messages are
12:26
delivered reliably compromise here can
12:28
disrupt business processes or expose
12:30
sensitive data the constrained
12:32
application protocol is designed for
12:34
simple electronic devices it's like a
12:36
minimalistic language for IoT gadgets to
12:38
communicate security is often minimal
12:40
making it a ripe target for hackers to
12:42
exploit spdi was a precursor to HTTP2
12:45
developed by Google to speed up web
12:47
traffic it's like putting your data on a
12:48
high-speed train though mostly replaced
12:50
now understanding it helps in grasping
12:52
how modern web protocols evolve quick
12:55
standing for quick UDP internet
12:56
connections is another Google innovation
12:58
aiming to make internet connections
13:00
faster and more secure it's like
13:01
combining the speed of UDP with the
13:03
reliability of TCP giving you the best
13:05
of both worlds sme and PPTP are
13:08
protocols for encrypting emails think of
13:10
them as sealing your letters with a wax
13:12
stamp that only the intended recipient
13:14
can break without them your emails are
13:15
like postcards anyone can read dnp3 is
13:18
used in industrial control systems
13:20
particularly in utilities like water and
13:22
electricity it's like the conductor of
13:24
an orchestra ensuring all components
13:26
work in harmony a breach here could lead
13:28
to critical infrastructure failures iec
13:31
60,75104 is another industrial protocol
13:34
mainly used in electrical engineering
13:36
it's like the blueprint that ensures
13:37
engineers speak the same technical
13:39
language security weaknesses can be
13:41
catastrophic affecting power grids
13:42
backnet is used in building automation
13:44
controlling HVAC lighting and security
13:46
systems it's like the building's central
13:48
nervous system hacking into Backnet
13:50
could give someone control over physical
13:52
aspects of a building wi-fi protocols
13:54
like
13:54
802.11 AC and
13:57
802.11X govern how your wireless devices
13:59
communicate they're the invisible
14:01
airwaves connecting your devices to the
14:03
internet weak Wi-Fi security is like
14:05
leaving your front door open with a
14:06
welcome mat for hackers ethernet
14:08
protocols under the 802.3 standards
14:12
define how wired networks function
14:14
they're like the roads your data cars
14:15
drive on proper segmentation and
14:17
security measures are essential to
14:19
prevent data collisions and unauthorized
14:21
access sdp or spanning tree protocol
14:23
prevents loops in network topologies
14:25
imagine a road system without traffic
14:27
lights stp is what keeps data from
14:30
circling endlessly causing traffic jams
14:32
if manipulated it can bring network
14:33
traffic to a standstill rstp and MSTP
14:37
are improvements over STP offering
14:39
faster convergence and multiple spanning
14:41
trees they're like upgrading your
14:42
traffic system with smart lights and
14:44
roundabouts to keep things flowing
14:45
smoothly vpp or VL trunking protocol
14:49
manages VL configurations across
14:52
switches it's like a city planner
14:54
coordinating different neighborhoods but
14:55
if someone gains access they can
14:57
reconfigure your network's layout to
14:59
their advantage lacp or link aggregation
15:01
control protocol bundles multiple
15:03
network connections into a single
15:05
logical link for increased bandwidth
15:07
it's like combining multiple lanes into
15:08
a superighway misconfigurations can lead
15:11
to traffic being misouted or dropped
15:13
igmp or internet group management
15:15
protocol manages multiccast group
15:17
memberships it's like sending out party
15:19
invites to multiple guests an attacker
15:21
can exploit IGMP to flood the network
15:23
with unwanted traffic pim or protocol
15:25
independent multiccast works with IGMP
15:28
to route multiccast traffic efficiently
15:30
it's like planning the best routes for
15:31
delivering those party invites if
15:33
compromised it can disrupt multiccast
15:35
communications bfd or birectional
15:38
forwarding detection quickly detects
15:40
link failures it's like having sensors
15:41
on a bridge that alert you the moment
15:43
there's a structural issue hackers can
15:45
exploit BFD to create false alarms or
15:47
hide real issues lisp or locator ID
15:50
separation protocol separates the
15:52
identity of a network device from its
15:53
location it's like using a stage name
15:55
instead of your real name this adds
15:57
flexibility but can complicate security
15:59
if not properly managed vexlan NVG and
16:01
Geneive are protocols used for network
16:03
virtualization creating virtual networks
16:05
over physical ones it's like building a
16:07
virtual city on top of a real one while
16:09
powerful they add layers of complexity
16:11
that can be exploited if not secured
16:13
openflow is a protocol that enables
16:15
softwaredefined networking it's like
16:17
giving network administrators a remote
16:19
control to manage network devices
16:21
centrally but if someone else gets that
16:22
remote they can change your network
16:24
configuration at will pcp or path
16:26
computation element communication
16:28
protocol helps compute efficient network
16:30
paths it's like using a GPS to find the
16:32
best route an attacker could manipulate
16:34
PCP to reroute traffic through malicious
16:37
nodes rsvp or resource reservation
16:40
protocol reserves resources across a
16:42
network it's like booking seats in
16:43
advance for a show unauthorized
16:45
reservations can lead to denial of
16:47
service for legitimate users sshfs
16:50
allows you to mount remote file systems
16:52
over SSH it's like extending your local
16:54
hard drive across the internet securely
16:56
if SSH is compromised though so is your
16:59
remote file system ncp or NE TW A core
17:04
protocol was used in older novel
17:06
networks it's like the ancient script of
17:08
networking languages mostly obsolete but
17:10
occasionally encountered in legacy
17:12
systems lastly let's touch on SDP or
17:14
session description protocol which
17:16
describes multimedia communication
17:18
sessions for the purposes of session
17:20
announcement and invitation think of it
17:21
as the party planner sending out
17:23
detailed invites for a multimedia
17:25
conference if intercepted or altered
17:27
attendees might end up at the wrong
17:28
party or none at all and there you have
17:30
it the whirlwind tour of 100 networking
17:32
protocols every ethical hacker should
17:34
know from the foundational protocols
17:36
that make the internet possible to the
17:38
specialized ones that control industrial
17:40
systems each plays a crucial role in the
17:43
digital landscape remember understanding
17:45
these protocols isn't just about
17:46
memorizing acronyms it's about grasping
17:49
how data moves where vulnerabilities lie
17:51
and how to protect against potential
17:53
threats as ethical hackers it's our job
17:55
to stay one step ahead turning knowledge
17:58
into defense thanks for joining me on
18:00
this rapid journey through the
18:01
networking world if you found this
18:02
helpful don't forget to like share and
18:05
subscribe to Policy Points for more deep
18:07
dives into the tech that powers our
18:08
lives until next time keep exploring
18:11
stay curious and happy hacking for
#Computer Security
#Data Formats & Protocols
#Electronic Spam
#Hacking & Cracking
#Network Security
#Networking
#VPN & Remote Access