David Bombal

David Bombal

Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content. David’s details: Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com YouTube: https://www.youtube.com/davidbombal All the best! David

  1. #517: Have you been hacked? Advanced detection method

    6 ОКТ.

    #517: Have you been hacked? Advanced detection method

    Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. Think you’ve been hacked? In this video, David Bombal and OTW (OccupyTheWeb) walk you through OSQuery - a free, open-source tool that lets you query your operating system like a database. You’ll learn the exact SQL-style commands to find: • Listening processes & remote connections (spot command-and-control) • Suspicious services and misspelled look-alikes • Persistence via registry startup items and scheduled tasks • Fileless malware (on_disk = 0) running only in RAM OTW draws from real digital forensics cases (200+ inquiries/month), including harassment, divorce disputes, and business rivalries. We also explain why antivirus often fails once malware is resident—and what you can do next (kill the process, remove the file, and harden startup entries). // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // YouTube video REFERENCE // Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:35 - Introduction 01:08 - The New Python Book 01:41 - Sponsored Section 02:49 - OTW Shares a Cool Tool 05:11 - Why This Tool is Powerful 06:45 - Latest Hacking Trends 09:59 - Who Should Use This Tool (and When) 10:54 - What Happens When You’re Hacked 11:20 - Why Hackers Need Access First 12:02 - After Installing the Software 12:39 - How to Query a Database 14:43 - Exploring OS Query’s Page 16:14 - Finding Unwanted Services on Your Computer 18:06 - Narrowing Down the Data 22:06 - Tracing the Hacker’s Footsteps 23:11 - The Case of the Husband Who Hacked His Wife 24:31 - Are You Being Hacked by the CIA? 25:31 - The Attacker’s Go-To Move 26:25 - Understanding the Windows Registry 29:55 - Investigating Scheduled Tasks 30:48 - Common Hacker Techniques 32:11 - Checking the Processes Running on Your System 33:48 - Is Chrome Malicious? 35:05 - Why Most Home Users Get Hacked 36:16 - Should You Rely on Anti-Virus? 37:48 - Windows vs Mac: Which Gets Hacked More? 38:30 - Getting Hacked Through a Friend’s Link 39:10 - Tutorials for Finding Malware on Your System 39:34 - Outro & Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacked #osquery #cybersecurity

    40 мин.
  2. #516: He Saved The DOOM Creator

    6 ОКТ.

    #516: He Saved The DOOM Creator

    Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal In this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operator and Tool Builder). They give an unfiltered look at the real world of hacking, forensics, and career-building in cybersecurity. What we'll cover: • How the SolarWinds hack was discovered with never-before-heard forensics insight • Real-world red teaming using HVAC exploits, USB pivots, and AWS chaos • The Oculus vs. Carmack lawsuit story from the expert who worked the case • How to start your career in cybersecurity, even without a degree • What the CCDC program is and why it leads to 3 job offers instantly • How AI is changing the game for hackers and defenders alike // David Cowen’s SOCIALS // SANS Profile: https://www.sans.org/profiles/david-c... LinkedIn: / dcowen X: / dcowen // Evan Anderson SOCIALS // Offensive Context: https://blog.offensivecontext.com/aut... LinkedIn: / syndrowm GitHub: https://github.com/syndrowm // Website REFERENCE // https://www.nationalccdc.org/ https://www.sans.org/emea https://ctftime.org/ https://www.uscyberpatriot.org/ // YouTube Channel REFERENCE // 13Cubed: / @13cubed // David Cowen’s Books REFERENCE // Computer Forensics: US: https://amzn.to/47yeH70 UK: https://amzn.to/460ErGs Hacking Exposed Computer Forensics: Secrets and Solutions US: https://amzn.to/4mYevCW UK: https://amzn.to/46q07NH Hacking Exposed Computer Forensics: Secrets and Solutions: US: https://amzn.to/4mT3T8k UK: https://amzn.to/4m8zaCS // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:49 - Intro 01:13 - Sponsored Section 01:29 - (AWS) Amazon Web Services 03:04 - David Cowen’s Background 03:46 - Evan Anderson’s Background 05:18 - Advice for young people To Get A Job In this Space 05:56 - The Solar Winds Hack? 10:43 - Finding a needle in a Haystack 11:08 - The Oculus Story 13:00 - Evan in Red Teaming 15:55 - Advice To Younger self 16:51 - Recommended Courses 19:42 - Importance of Networking 20:19 - Recommended Certifications 24:13 - Is AI Taking All The Jobs ? 24:57 - Connect With David & Evan online 25:12 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

    25 мин.
  3. #515: Phishing the AI: Zero-Click NIGHTMARE

    24 СЕНТ.

    #515: Phishing the AI: Zero-Click NIGHTMARE

    Big thanks to ‪@radware‬ for sponsoring this video. // Pascal Geenens’ SOCIAL // LinkedIn: / Website: https://www.radware.com/ // Report REFERENCE // Internet of Agents: The Next Threat Surface: https://www.radware.com/pleaseregiste... ShadowLeak: https://www.radware.com/blog/threat-i... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:45 - Intro 01:15 - Pascals Take on AI and Cybersecurity 05:15 - Security First AI Implementation 06:49 - How Hackers use AI 11:10 - What is an Internet of Agents? 15:43 - The Security Threat of Internet Agents 20:08 - Prompt Injection 26:26 - Indirect Prompt Injection 31:51 - How Hackers can Find your Information 39:46 - What is Vibe Hacking? 43:22 - How to Fight Against Vibe Hacking? 44:46 - Can Young People get into Cyber? 46:50 - Malicious GPTs (Xanthorox) 51:20 - How to Protect yourself (Xbow) 57:31 - Radware's Solution 01:00:12 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #agenticai #radware #llm

    1 ч.
  4. #514: Why People Buy the WRONG Laptops for Hacking

    22 СЕНТ.

    #514: Why People Buy the WRONG Laptops for Hacking

    Big thanks to Proton VPN for sponsoring this video. To get 64% discount to your Proton VPN Plus subscription, please use the following link: https://protonvpn.com/davidbombal Want a “hacker” laptop without wasting cash? In this candid breakdown with OTW, we cut through the hype and show you what actually matters for learning pentesting in 2025: prioritising RAM over flashy GPUs, picking VMware (free for personal use) for reliable labs, using refurbs/minis/Raspberry Pi, and planning for where wireless hacking is going (Bluetooth/BLE/Zigbee) — not just Wi-Fi. We also cover AMD vs Intel vs Apple M-chips/ARM for Linux VMs, when cloud cracking makes sense, and why daily practice beats buying gadgets. Highlights: • Best beginner specs (RAM first, SSD nice, storage ≠ speed) • VMware vs VirtualBox for home labs • AMD/Intel vs Apple M-chips/ARM for Kali/Parrot VMs • Alpha adapters & aircrack-ng compatibility; Nordic nRF52 for BLE • Budget path: used/refurb, mini-PCs, Pi, phone/cloud labs (HTB/THM) • The 80/20 rule of hacking: skills are greater than gear If you’re delaying until you can afford a $2 – 3k laptop, don’t. Start now, learn daily, and upgrade later. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:21 - Proton VPN sponsored segment 03:16 - Get started and start learning 08:39 - Computer specs: CPU, GPU, RAM & Hard drives 16:46 - Time vs Money 17:58 - Virtual machines 19:15 - Computer specs overview 22:17 - Wi-Fi adaptors for Wi-Fi hacking 24:17 - Bluetooth dongles for Bluetooth hacking 26:57 - "80% Person & 20% Machine" 29:17 - Do you need hacking gadgets? 31:57 - Apple vs Intel vs AMD 35:53 - Learn hacking with a smartphone 37:01 - Learn hacking with a Raspberry Pi 39:32 - Kali Linux vs ParrotOS (Which OS to use?) 40:58 - The problem with Chromebooks 42:02 - Using Hack The Box/TryHackMe // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacking #laptop #vm

    43 мин.
  5. #513: Is your WiFi or Internet slow? This can fix it.

    20 СЕНТ.

    #513: Is your WiFi or Internet slow? This can fix it.

    Big thanks to Juniper for sponsoring this video. To try Juniper Mist please click on the following link: http://juniper.net/trymistyourself Choppy Zoom calls? Random outages? In this demo with David Bombal and Juniper Networks, you’ll see AI that actually helps: a tunnel-free setup for faster failover and a natural-language chatbot that pinpoints the real issue, client, Wi-Fi, switch, WAN, or cloud—and auto-captures the packets you need. We also show simple security defaults (deny-by-default) and why double-encrypting traffic can slow you down. What you’ll learn: Why “old-school VPN tunnels” add overhead—and how tunnel-free can speed things up How a chatbot (Marvis) finds root causes and triggers packet captures at the moment of failure Easy checks for Zoom/Teams quality (latency, jitter, loss) and what to do when it’s not “the Wi-Fi” Off-hours synthetic tests that catch issues before your day starts Practical security: sensible defaults and where SASE fits if you want it // Justin Melloni’s SOCIALS // LinkedIn: / justin-melloni-54b24a1b // Andre du Iuri SOCIALS // LinkedIn: / andre-de-iuri-578391210 // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:52 - Introductions 03:28 - What is Mist and SDWAN? 06:23 - Advantages of not using IPsec 12:00 - Mist demo // Dashboard walkthrough 12:49 - Story time 13:58 - Dashboard walkthrough continued 14:49 - Agentic AI in Mist 18:46 - Marvis AI demo & explained 27:42 - Troubleshooting network issues 30:35 - Troubleshooting issues with Marvis demo 36:23 - Troubleshooting something in the cloud 40:22 - Monitoring applications 41:37 - Addressing security concerns 46:42 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #juniper #marvis #networking

    48 мин.
  6. #512: All Encryption Hacked in 3 Years?

    15 СЕНТ.

    #512: All Encryption Hacked in 3 Years?

    Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. Quantum computing isn’t a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that’s enough to break today’s asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor’s algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed. In this frank discussion, OTW joins David Bombal to explain: • Why asymmetric key exchange is the weak link for TLS/VPNs • How hybrid quantum + CUDA-Q accelerates timelines • Nation-states’ “collect now, decrypt later” strategy • The painful window before post-quantum cryptography (PQC) rolls out • Risks of client-side scanning and on-device AI • NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // YouTube video REFERENCE // • USA stops UK creating Apple backdoor. Why ... • Will this Tiny Chip Change EVERYTHING in Q... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:00 - Intro 01:49 - OTW's Books 02:46 - Brilliant Advert 04:01 - Encryption and Apple Backdoors 05:12 - Nation-states Racing for Quantum Computing 08:35 - Jensen Huang's Hybrid Quantum Computer 10:57 - The Threat of National Agencies 12:10 - China Collecting Encrypted Data 13:56 - Post-Quantum Cryptography 17:58 - The NSA Collecting Data 19:21 - The NSA and Encryption 24:40 - Concerns Against Cryptography 28:09 - Client-Side Scanning 30:46 - Should you Run AI on your Devices? 34:56 - NVIDIA's Role on Cryptography 37:37 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

    38 мин.
  7. #511: Becoming a Ghost Online: 3 Privacy Levels

    13 СЕНТ.

    #511: Becoming a Ghost Online: 3 Privacy Levels

    Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount At Black Hat, David Bombal sits down with OSINT pro Mishaal Khan to unpack anti-OSINT, practical steps to regain privacy without pricey services. Mishaal demos his free OperationPrivacy dashboard (400+ actions, 3 tiers: Conscious → Serious → Ghost) and shows how to: • Freeze credit & use free monitoring • Opt out of 100+ data brokers (Spokeo, Intelius, LexisNexis, more) • Blur your home on Google/Bing/Apple Maps + real-world deterrents • Claim critical accounts (IRS/DMV/USPS/UPS) and your domain • Nudge page-one results with harmless decoys • File copyright takedowns (Instagram/Google, etc.) US-centric but widely applicable. DIY, trackable, and truthful about the time it takes. // Mishaal Kahn’s SOCIALS // LinkedIn: / mish-aal Website: https://www.mishaalkhan.com/ Tool created: https://www.operationprivacy.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 – Coming Up 01:31 – Sponsored by ProtonPass 03:00 – Introduction 05:44 – Operation Privacy Demo 07:49 – How to Freeze Your Credit 08:41 – Credit Monitoring Explained 09:19 – Managing Subscriptions 10:13 – Data Removal (Outbound Requests) 12:40 – Should You Use Automatic Removal? 14:03 – Protecting Your Privacy 15:41 – Why Privacy Takes Time 17:46 – Planting Your Privacy Flag 19:56 – Ghost Mode & SOE Manipulation 22:47 – Getting Content Removal Forms 23:40 – Taking a Holistic Approach to Privacy 25:08 – Final Thoughts / Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

    26 мин.
  8. #510: 20–30% Of Attacks Use AI: John Hammond details today’s hybrid attacks

    11 СЕНТ.

    #510: 20–30% Of Attacks Use AI: John Hammond details today’s hybrid attacks

    To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you’ll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond’s SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond’s Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

    32 мин.

Оценки и отзывы

5
из 5
Оценок: 23

Об этом подкасте

Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content. David’s details: Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com YouTube: https://www.youtube.com/davidbombal All the best! David

Вам может также понравиться