387 episodes

Want to learn about IT? Want to get ahead in your career? Well, this is the right place!

On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.

This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.

David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal

All the best!
David

David Bombal David Bombal

    • Technology
    • 5.0 • 2 Ratings

Want to learn about IT? Want to get ahead in your career? Well, this is the right place!

On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.

This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.

David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal

All the best!
David

    #390: She hacked me!

    #390: She hacked me!

    Cori shows us how easy it is to set up a phishing campaign and hack companies. Be warned!

    Cori was kind enough to give my domain back to me: https://discord.gg/davidbombal - Thanks Cori :)

    / MENU //
    00:00 - Coming up
    00:35 - Introduction
    01:28 - Cori's Twitter and website
    02:14 - Cori's background
    02:58 - Phishing David Bombal
    04:10 - Phishing definition and demonstration
    11:36 - Setting up a Gophish server
    13:51 - How it started
    14:38 - Setting up a Gophish server (continued)
    18:00 - Gophish server
    20:33 - Phishing demonstration
    31:15 - How to prevent phishing
    34:27 - Cori's war story
    37:16 - Best pretexts for social engineering
    39:44 - How to learn social engineering
    42:00 - Phishing demonstration recap
    42:44 - Final words and advice
    43:22 - Connect with Cori
    43:34 - Conclusion

    // Software used //
    Gophish: https://github.com/gophish/gophish
    LinkedInt: https://github.com/vysecurity/LinkedInt
    Singlefile: https://chrome.google.com/webstore/de...

    // Books discussed //
    The hacker playbook by Peter Kim: https://amzn.to/3tZHwoe

    // Cori SOCIAL //
    Twitter: https://twitter.com/corg_e
    Website: https://www.corgima.com/

    // People mentioned //
    Rachel Tobac: https://twitter.com/RachelTobac
    Snow: https://twitter.com/_sn0ww

    // David's SOCIAL //
    Discord: https://discord.gg/davidbombal
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube Main Channel: https://www.youtube.com/davidbombal
    YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN...
    YouTube Clips Channel: https://www.youtube.com/channel/UCbY5...
    YouTube Shorts Channel: https://www.youtube.com/channel/UCEyC...
    Apple Podcast: https://davidbombal.wiki/applepodcast
    Spotify Podcast: https://open.spotify.com/show/3f6k6gE...

    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    hack
    hacking
    phish
    phishing
    phishing email
    phishing scams
    phishing link
    phishing website
    phishing attack
    phishing link creator
    phishing tutorial for beginners
    phishing email analysis
    phishing training
    scary text message
    dont download this app
    phishing campaign
    phishing call
    phishing campaign training
    phishing campaign tool
    phishing campaign software
    phishing campaign simulation
    vishing baby crying
    vishing example
    vishing attacks
    vishing

    Disclaimer: This video is for educational purposes only.

    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!


    #phishing #vishing #hack

    • 44 min
    #389: Get the Best Python Books for Free

    #389: Get the Best Python Books for Free

    I interview Al Sweigart, the author of Automate the Boring Stuff with Python and other fantastic Python books. You can get all of his books for free using the links below. Or you can buy the physical books.

    Learn about Python, Minecraft, Ciphers, Recursion, Python Gaming and a lot more with Al's fantastic books. And you can read them online for free :)

    // FREE Books //
    Free Python books: https://inventwithpython.com/
    Automate the boring stuff free book: https://automatetheboringstuff.com/

    // Physical Books //
    Buy books from Amazon:
    Automate the boring stuff with Python: https://amzn.to/3N2QuYu
    The big book of small Python projects: https://amzn.to/3xFJevS
    Coding with Minecraft: https://amzn.to/3Hx6bGh
    Cracking codes with Python: https://amzn.to/3zNhWXl
    The recursive book of recursion: https://amzn.to/3n0bJiV
    Invent your own computer games with Python: https://amzn.to/3bbGZZQ
    Beyond the basic stuff with Python: https://amzn.to/3badlUy

    Buy physical books from No Starch Press: https://nostarch.com/automatestuff2

    // Al's SOCIAL //
    Twitter: https://twitter.com/AlSweigart
    YouTube: https://www.youtube.com/user/Albert10110
    Udemy: https://www.udemy.com/course/automate/

    // David's SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube Main Channel: https://www.youtube.com/davidbombal
    YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN...
    YouTube Clips Channel: https://www.youtube.com/channel/UCbY5...
    YouTube Shorts Channel: https://www.youtube.com/channel/UCEyC...
    Apple Podcast: https://davidbombal.wiki/applepodcast
    Spotify Podcast: https://open.spotify.com/show/3f6k6gE...

    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com


    python
    minecraft
    python books
    best python books
    automate the boring stuff with python
    automate the boring stuff with python playlist
    the recursive book of recursion
    the big book of small python projects
    beyond the basic stuff with python
    coding with minecraft
    cracking cods with python
    invent your own computer games with python
    scratch 3 programming playground
    making games with python and pygame
    python for beginners
    python full course
    python tutorial
    python programming
    python projects
    python tutorial for beginners
    python interview questions
    python course
    python basics
    python for data science
    artificial intelligence
    machine learning python
    machine learning tutorial
    deep learning
    machine learning
    automate the boring stuff
    no starch press
    no starch press python

    Disclaimer: This video is for educational purposes only.

    Please note that the links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    #python #minecraft #hacking

    • 1 hr 10 min
    #388: If you Hack, You go to Jail?

    #388: If you Hack, You go to Jail?

    A cautionary tale: An Ethical hacker jailed for reporting a serious vulnerability. It is very unfortunate how being ethical can still result in jail time. This is one of those stories. Be very cautious and careful with your skills.

    Darknet Dairies: https://darknetdiaries.com/episode/25/

    // MENU //
    00:00 - Hacking is Not a Crime
    00:43 - Introduction//Alberto Hill
    01:04 - 12 Years Old & Hacking Games
    03:18 - University & Computer Forensics
    05:05 - Bug Bounty Before Bug Bounties Were a Thing
    06:31 - Uruguay//No Bug Bounty
    07:50 - 2014//Where It All Began
    12:22 - 2015//No Systems Hardening
    15:07 - Was It Ethical?
    18:41 - 2017//Raided & Arrested
    21:07 - Bitcoin Ransom
    22:41 - Why Did They Arrest Alberto?
    25:12 - Did They Prosecute the Other Person?
    26:40 - Confiscated//Hacking Equipment
    27:44 - Why So Many Credit Cards?
    29:58 - How Much Crypto Did Alberto Lose?
    31:00 - Why Did They Release Alberto?
    34:34 - Are the Charges Ongoing?
    35:08 - The Real Cost
    37:19 - Universities Don't Teach You How to Handle This
    41:47 - Follow Your Dreams//Why Alberto Shares His Story
    44:13 - Hacking is Part of Alberto
    46:16 - Community Work As an Alternative
    48:03 - Thank You & Final Thoughts

    Card video mentioned: https://youtu.be/eyd24FlJCFg

    // Alberto BOOKS //
    Login to Hell: https://amzn.to/3Qm4y2d
    Operatin Bitcoins: https://amzn.to/39EwBcq

    // Alberto SOCIAL //
    Twitter: https://twitter.com/adanielhill
    LinkedIn: https://www.linkedin.com/in/nofear75/
    Linktree: https://linktr.ee/adanielhill
    Hacking is not a crime: https://twitter.com/hacknotcrime

    // David's SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube Main Channel: https://www.youtube.com/davidbombal
    YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN...
    YouTube Clips Channel: https://www.youtube.com/channel/UCbY5...
    YouTube Shorts Channel: https://www.youtube.com/channel/UCEyC...
    Apple Podcast: https://davidbombal.wiki/applepodcast
    Spotify Podcast: https://open.spotify.com/show/3f6k6gE...


    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // BUY HAK5 Goodness //
    Hak5: https://davidbombal.wiki/gethak5

    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

    hack
    hacks
    hacker
    darknet diaries
    cyber
    infosec
    hacker movie
    hacker vs scammer
    hacker video
    bug bounty
    hacking
    hak5
    hak5 rubber ducky
    hak5 wifi pineapple
    cyber crime
    bitcoin
    cryptocurrency
    crypto
    ethereum
    pentest
    pentesting
    darknet
    ethical hacker
    how to hack
    ethical hacking
    ethical hacking course
    cyber security
    ethical hacking career
    kali linux
    white hat hacker
    ethical hacker course
    ethical hacking for beginners
    hacker stories
    hacker story
    alberto hill uruguay
    uruguay

    Disclaimer: This video is for educational purposes only.

    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!


    #hack #hak5 #kalilinux

    • 50 min
    #387: Learn to hack in 60 seconds?

    #387: Learn to hack in 60 seconds?

    Big thank you to Cisco for sponsoring this video. Learn about Cisco Small Business Solutions here: https://davidbombal.wiki/ciscosmb

    Learn to hack in 60 second TikToks! Is that even possible? Well, Serena shows us how she teaches hacking concepts in short TikTok / YouTube shorts. It's amazing how much information she can share in such a short video :)

    // MENU //
    00:00 - TIKTOK - WIFI Pineapple hacking
    00:28 - David's wife wants to go off-grid
    00:46 - Serena's introduction
    01:23 - TIKTOK - HAK5 Rubber Ducky
    01:44 - Intro Stinger
    01:49 - Sponsor Segment
    02:41 - Serena's approach to creating TikTok Content
    04:32 - TIKTOK - VLAN Hopping
    05:38 - TIKTOK - Switch Spoofing
    06:48 - The audiences for TikTok cyber networking content
    07:39 - TIKTOK - Network Attacks: DHCP
    08:37 - Feedback on Serena's TikTok content
    09:17 - TIKTOK - Facebook is not on the internet
    10:15 - Ethical Hacking videos being taken down
    12:07 - TIKTOK - Password Cracking with Hydra
    13:21 - How to shorten a long hack into 60s
    15:05 - TIKTOK - Password Spraying
    15:52 - Long form content vs. Short form content
    18:52 - Behind the scenes: recording gear and editing process
    20:23 - TIKTOK - ROCKYOU.TXT
    20:10 - Generational differences in content creation and consumption
    23:30 - TIKTOK - DHCP
    23:41 - When am I ready to start creating content?
    25:39 - TIKTOK - When my boss asks how certification studying is going
    25:51 - The best way to learn is to teach
    26:27 - TIKTOK - What did I major in?
    26:42 - Serena's career path
    28:04 - TIKTOK - What they don't tell you about being a network engineer
    28:27 - Steep learning curves in network engineering
    31:04 - TIKTOK - On-Call Shift
    31:46 - Journey into Cyber Security
    32:03 - TIKTOK - Companies vs. Teens
    33:07 - TIKTOK - Smart Keylogger
    33:45 - Creating Content: The new resume!
    36:22 - TIKTOK - Me arguing with myself
    36:33 - The importance of authenticity
    37:59 - When am I ready to start creating content?
    38:46 - From Networking to Cyber Security
    39:31 - TIKTOK - BGP Routing Protocol Flaw
    40:28 - Let's talk OSI
    42:10 - What would you tell your younger self?
    43:45 - Final advice and Conclusion

    // David's SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube Main Channel: https://www.youtube.com/davidbombal
    YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN...
    YouTube Clips Channel: https://www.youtube.com/channel/UCbY5...
    YouTube Shorts Channel: https://www.youtube.com/channel/UCEyC...
    Apple Podcast: https://davidbombal.wiki/applepodcast
    Spotify Podcast: https://open.spotify.com/show/3f6k6gE...

    // Serena's SOCIAL //
    YouTube: https://www.youtube.com/c/shenetworks
    TikTok: https://www.tiktok.com/@shenetworks
    Twitter: https://twitter.com/notshenetworks
    Website: https://beacons.page/shenetworks
    Instagram: https://www.instagram.com/shenetworks_/

    Interview with John Hammond: https://youtu.be/DZD0Pi-zXgc

    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // BUY HAK5 Goodness //
    Hak5: https://davidbombal.wiki/gethak5

    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

    tiktok
    hack
    hacking
    cyber
    cybersecurity
    hacker
    tiktok mashup
    tiktok songs
    tiktok 2022
    facebook
    bgp
    vlan
    ccna
    cisco
    60 seconds
    hak5
    hak5 pineapple
    hak5 rubber ducky
    hak5 shark jack
    hak5 wifi pineapple
    hak5 bash bunny
    hak5 tools
    hak5 pineapple tutorial
    hak5 omg
    hak5 lan turtle
    wireshark
    how to hack
    tiktok hacking
    infosec
    shenetworks
    dhcp
    vlan hopping


    #tiktok #hacking #hack

    • 46 min
    #386: Do you realize that they are watching you? Protect your online privacy

    #386: Do you realize that they are watching you? Protect your online privacy

    They know so much about you if you don't protect yourself. Learn why is online privacy important. Learn how to maintain it. Which privacy tools should you be using in 2022? Naomi Brockwell gives us the answers.

    // MENU //
    00:00 ▶️ Google is the worst
    00:25 ▶️ Intro
    00:37 ▶️ Naomi introduction
    00:58 ▶️ Why care about online privacy in 2022
    04:16 ▶️ TOR usage in the Ukraine
    05:58 ▶️ Learn to protect your online presence
    07:16 ▶️ The Third-Party Doctrine
    09:58 ▶️ Recommended browsers for online privacy
    16:27 ▶️ Chromium
    18:11 ▶️ When to use TOR
    19:34 ▶️ Using the TOR browser
    20:42 ▶️ Comfort vs Privacy
    23:00 ▶️ Recommended search engines for online privacy
    27:34 ▶️ DuckDuckGo controversy
    29:02 ▶️ Google's resources compared to other search engines
    30:34 ▶️ Recommended e-mail services for online privacy
    33:39 ▶️ ProtonMail and recommended VPNs
    39:35 ▶️ Reasons to use VPNs
    42:28 ▶️ Privacy laws in the UK
    43:26 ▶️ When to use VPNs
    44:31 ▶️ Recommended messaging apps for online privacy
    50:56 ▶️ Recommended mobile OS for online privacy
    55:06 ▶️ Recommended cloud services for online privacy
    57:51 ▶️ Connect with Naomi Brockwell
    59:44 ▶️ Conclusion

    // David's SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube: https://www.youtube.com/davidbombal

    // Naomi's SOCIAL //
    YouTube: https://www.youtube.com/c/NaomiBrockw...
    Odysee: https://odysee.com/@NaomiBrockwell:4
    Twitter: https://twitter.com/naomibrockwell
    TikTok: https://www.tiktok.com/@naomibrockwell
    Website: https://www.nbtv.media/

    // Books discussed //
    Extreme Privacy: https://amzn.to/3xgU1g1

    // Websites and links discussed //
    XKeyscore: https://en.wikipedia.org/wiki/XKeyscore
    Third Party doctrine: https://en.wikipedia.org/wiki/
    Startpage search engine: https://www.startpage.com/
    VPN recommendations: https://freedom.press/training/choosi...
    Skiff: https://skiff.com/
    FBI secure messaging apps: https://uk.pcmag.com/security/137344/...
    UK privacy issues:
    Wired: https://www.wired.co.uk/article/inter...
    Guardian: https://www.theguardian.com/world/202...

    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

    online privacy
    online privacy guide
    internet security
    tracking
    online privacy for kids
    online privacy and security
    online privacy it doesnt exist
    online privacy tips
    online privacy ted talk
    online privacy guide
    online privacy for students
    internet security tutorial
    edward snowden
    naomi brockwell
    privacy
    five eyes
    5 eyes
    brave browser
    tor
    protonvpn
    protonmail
    duckduckgo
    google
    online tracking
    ios
    android
    graphite phone
    privacy browser
    privacy browser ios
    privacy broke
    privacy browser for pc
    anonymous
    hide online
    hidden identity
    hide identity online
    data
    hack
    identity
    internet
    privacy
    social change
    technology

    Disclaimer: This video is for educational purposes only.

    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    #privacy #anonymous #hack

    • 1 hr 1 min
    #385: Hack Like Mr Robot WiFi, Bluetooth And Scada Hacking

    #385: Hack Like Mr Robot WiFi, Bluetooth And Scada Hacking

    Occupy The Web (OTW) explains how hacks shown in the Mr Robot TV Series actually work (and if they are actually realistic). He compares real world WiFi, Bluetooth and Scada hacking vs what is shown in the TV series.

    In this video we discuss the hacks in Mr Robot Season 1 Episode 6. Which other episodes or technologies do you want us to cover in future videos? Please comment.

    // Devices used in video //
    Hak5 Rubber Ducky: https://davidbombal.wiki/gethak5
    Panda Bluetooth 4.0 USB Nano Adapter : https://amzn.to/3NlSlbQ
    MultiBlue Dongle USB Bluetooth V3.0 HiD: Not available unfortunately.

    // Previous videos //
    OTW Hacking Russia: https://youtu.be/GudY7XYouRk
    OTW Hacking Scada: https://youtu.be/uXbGQiXsRes
    OTW Hacking CCTV: https://youtu.be/ZGCScbV7vSA

    // David's SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube: https://www.youtube.com/davidbombal

    // Occupy The Web social //
    Twitter: https://twitter.com/three_cube

    // Occupy The Web books //
    Linux Basics for Hackers: https://amzn.to/3JlAQXe
    Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh

    // Other books //
    The Linux Command Line: https://amzn.to/3ihGP3j
    How Linux Works: https://amzn.to/3qeCHoY

    // Occupy The Web Website / Hackers Arise Website //
    Website: https://www.hackers-arise.com/
    How Elliot hacked the prison: https://www.hackers-arise.com/post/20...
    OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
    SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
    https://davidbombal.wiki/scada1

    SCADA Hacking: Finding SCADA Systems using Shodan
    https://davidbombal.wiki/scada2

    SCADA Hacking: SCADA/ICS Protocols (Profinet/Profibus)
    https://www.hackers-arise.com/post/20...

    Lots of Scada content:
    https://www.hackers-arise.com/scada-h...

    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

    hacking
    hack
    mr robot
    mr robot bluetooth
    mr robot scada
    scada
    scada hacking
    bluetooth
    bluetooth hacking
    bluetooth hack
    mr robot bluetooth
    mr robot season 1 episode 6
    mr robot season 1
    google dorks
    shodan
    scada hacks
    scada hacking
    scada google dorks
    wifi
    wifi hacking
    wpa hacking
    wpa2 hacking
    wifi hack
    wpa2 hack
    mr robot wpa
    mr robot wpa2
    hack scada
    bluetooth keyboard hacks
    bluetooth panda
    panda bluetooth


    Disclaimer: This video is for educational purposes only.

    Please note that the links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    #wifi #bluetooth #hacking

    • 45 min

Customer Reviews

5.0 out of 5
2 Ratings

2 Ratings

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
NPR
Jack Rhysider
PJ Vogt
Gimlet

You Might Also Like

Graham Cluley, Carole Theriault
CyberWire, Inc.
Cybereason
CyberWire Inc.
Jack Rhysider
Michael Bazzell