

David Bombal
David Bombal
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
Episodes
Mentioned books

Sep 1, 2025 • 19min
#508: NOT Production-Ready: 2025 AI Coding Reality Check
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
AI can turn weeks of coding into seconds, but at what cost? Katie Paxton-Fear demonstrates how to use Gemini to generate a sprint plan and Cursor to build a Python port scanner from natural language. It works… and that’s the problem. We unpack how “vibe coding” blinds even pros to security, why these tools aren’t production-ready, and the guardrails you need for ethical hacking and internal tooling.
What you’ll learn
• How to turn ideas → sprint plan → working code (Gemini + Cursor)
• Why silent vulnerabilities make AI-built apps risky
• Ethical hacker use cases (agents, scanners) without shipping insecure code
• Policy tips: disclosure, internal use, avoiding shadow IT
Tools mentioned: Gemini, Cursor (AI IDE), Claude (briefly), v0
// Katie Paxton-Fear SOCIALS //
Website: https://insiderphd.dev/
LinkedIn: https://www.linkedin.com/in/katiepf/?...
YouTube: / insiderphd
X: https://x.com/InsiderPhD
// YouTube video REFERENCE //
• Vibe Coding in Cursor for Cyber Security
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming Up: AI Vibe Coding Explained
01:08 - Intro with Katie Paxton-Fear (Cybersecurity Expert)
02:53 - ThreatLocker Security Overview
03:06 - What is Vibe Coding in AI Development?
04:51 - Live Demo Example of Vibe Coding
05:20 - Google Gemini and Gems for Coding
08:22 - Cursor AI and Writing Code Faster
09:59 - Coffee Break (Quick Pause)
10:02 - Risks of Vibe Coding in Cybersecurity
11:24 - Port Scanner Explained
11:34 - Vibe Coding Pros and Cons (Full Breakdown)
14:02 - Port Scan Results Analysis
14:22 - Why AI Code Isn’t Production Ready Yet
15:53 - Katie’s Final Advice & Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Key topics: vibe coding, AI coding, port scanning, secure-by-design
If you’re experimenting with AI coding, watch this before you deploy anything.
#blackhat #vibecoding #security

Sep 1, 2025 • 22min
#507: He Quit Cybersecurity After 34 Years — Here’s Why
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount.
Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI.
They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don’t drift.
Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot.
// Mikko Hypponen’s SOCIALS //
X: https://x.com/mikko
Website: https://mikko.com/
LinkedIn: https://www.linkedin.com/in/hypponen/...
// Books REFERENCE //
If it’s smart it’s vulnerable:
US: https://amzn.to/41lkSaG
UK: https://amzn.to/4oTpOgN
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:56 - Mikko Hyppönen keynote talks
01:51 - Proton Pass sponsored segment
04:09 - Pivoting from cybersecurity to anti-drone
09:28 - Humanoid robots are near
09:54 - How cybersecurity has improved
12:11 - Defenders have the advantage with AI
15:26 - Pros and Cons of the AI revolution
16:57 - Privacy is dying
21:36 - Advice for your future // Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.

Sep 1, 2025 • 28min
#506: ZERO Coding: How She Broke Into Cyber
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Recorded at Black Hat with David Bombal, this conversation with Caitlin Sarian (@CybersecurityGirl) traces her path from aerospace engineering and LA Galaxy cheerleading to cybersecurity leader and viral creator. She explains how posting 3×daily on TikTok led to ~500K followers and a role at TikTok (global cybersecurity advocacy & culture), why she left after a year, and how she’s now helping others via Cyber Career Club.
// Caitlin Sarian’s SOCIALS //
Website: https://www.cybersecuritygirl.com/
Instagram: / cybersecuritygirl
YouTube: / cybersecuritygirl
LinkedIn: / caitlin-sarian
TikTok: / cybersecuritygirl
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:29 - Intro
01:01 - Brilliant Ad
02:22 - Caitlin's History with TikTok
06:25 - Caitlin's Story
10:19 - Caitlin's Professional Journey
18:09 - How to be an Influencer
19:42 - Why you Need a Team
21:22 - Why you Need to Network
23:58 - All the Areas of Cyber
24:49 - Caitlin's Advice to her Younger Self
27:22 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cybersecurity #blackhat #cybersecuritygirl

Aug 18, 2025 • 36min
#505: GPT-5 Just Dropped… And It’s NOT What You Think
In this engaging discussion, Gary Marcus, a Professor Emeritus of Psychology and Neural Science at NYU and an AI expert, dives into the reality of GPT-5’s release. He argues that it’s far from a breakthrough, unraveling the truth about AI hallucinations and the cybersecurity risks posed by coding agents. The conversation also highlights the significant limitations of AI in achieving real intelligence, emphasizing that we may be years away from true AGI. Marcus shares his insights on the hype surrounding AI and the urgent need for transparency in its development.

Aug 18, 2025 • 20min
#504: How to Track the People Tracking YOU
Matt Edmondson, creator of the surveillance detection tool "Chasing Your Tail," shares his insights from 22 years as a federal agent. He breaks down how this innovative tool uses Raspberry Pi to detect Wi-Fi and Bluetooth signals, helping you identify if you're being followed. Matt discusses the technical details behind Kismet and the importance of open-source tech in cybersecurity. He shares real-world applications, including successful search and rescue operations, showcasing how you can create your own tracking system for under $100.

Jul 16, 2025 • 45min
#503: He CREATED Wireshark - And It Changed Cybersecurity FOREVER
Gerald Combs, the original creator of Wireshark, and Chris Greer, a renowned trainer, dive into the revolutionary journey of this beloved network protocol analyzer. They discuss its humble beginnings, the vital name change from Ethereal, and how it achieved mainstream success thanks to Windows compatibility. The pair highlights SharkFest's unique community-driven approach and the introduction of StratoShark, a powerful companion tool. They also introduce the Wireshark Certified Analyst certification, emphasizing the importance of skills in cybersecurity and networking.

Jul 16, 2025 • 36min
#502: Hacker Explains VPN Hacking: ADMIN access without password (real world demo)
Big thank you to DeleteMe for sponsoring this video. Go to http://joindeleteme.com/Bombal to receive a 20% discount.
Discover how attackers exploit enterprise VPNs like Fortinet to gain admin access and compromise networks. In this video, OTW exposes a real authentication bypass exploit, explains the risks of outdated VPN devices, and shares expert tips on Linux, TCPDump, and staying secure. Perfect for cybersecurity pros, penetration testers, and anyone serious about digital defense.
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// YouTube video REFERENCE //
Hacking IP Cameras: • Hacking IP Cameras (CCTV) with Demos and R...
Are VPNs even safe now?: • Are VPNs even safe now? Hacker Explains
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.

Jul 2, 2025 • 12min
#501: Brute Force SSH & Build a Honeypot Now (Hydra and Cowrie Demo)
Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego.
This video features David Bombal and Kyle Winters demonstrating practical
cybersecurity techniques. Kyle walks through how to use Hydra to brute force SSH passwords, explaining the process of leveraging wordlists and optimizing the attack. Following the offensive demonstration, Kyle transitions into defensive measures, showing viewers how to quickly and easily set up an SSH honeypot using Cowrie. The honeypot serves as a decoy to attract and monitor malicious actors attempting to access a network. The demonstration includes setting up the honeypot on an Ubuntu host, configuring IP tables for port redirection, and monitoring logs for incoming connection attempts. The video highlights the importance of understanding both attack methods and defensive strategies in cybersecurity. Kyle also mentions free ethical hacking training resources available through Cisco Networking Academy (netacad.com) and future tutorials on Cisco U (u.cisco.com).
// COMMANDS //
Devices:
client 192.168.1.10
server 192.168.1.11
ubuntu-honeypot 192.168.1.21
Nmap scan:
nmap -sn 192.168.1.0/24
Verify Hydra installed:
hydra -h
Show wordlists:
ls -al /usr/share/wordlists/
Crack with known username:
hydra -l admin -P /usr/share/wordlists/top-passwords-shortlist.txt -t 4 -f ssh://192.168.1.11
Crack with unknown username:
hydra -L /usr/share/wordlists/top-usernames-shortlist.txt -P /usr/share/wordlists/top-passwords-shortlist.txt -t 4 -f ssh://192.168.1.11
Create dir for Cowrie:
mkdir cowrie
cd cowrie/
Clone cowrie:
git clone https://github.com/cowrie/cowrie .
Launch the python virtual environment:
python3 -m venv cowrie-env
source cowrie-env/bin/activate
Install python requirements:
pip install --upgrade pip
pip install -r requirements.txt
Copy and edit the config:
cp etc/cowrie.cfg.dist etc/cowrie.cfg
vi etc/cowrie.cfg
Setup port forwarding for SSH to Cowrie:
sudo iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-port 2222
sudo iptables-save
Start Cowrie:
bin/cowrie start
Check Cowrie status:
bin/cowrie status
View logs:
tail -f var/log/cowrie/cowrie.log
// Kyle Winter’s SOCIALS //
Socials: / kyle-m-winters
Cisco Blogs: https://blogs.cisco.com/author/kylewi...
// Website REFERENCE //
https://www.netacad.com/courses/ethic...
https://u.cisco.com/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.

Jul 2, 2025 • 23min
#500: MCP Demo using Python, AI and a self healing network (Model Context Protocol)
Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego.
See how Cisco engineer Kareem Iskander teams up with David Bombal at Cisco Live San Diego 2025 to build a self-healing network in real time. Using the new Model Context Protocol (MCP), Splunk logs, Meraki APIs, and Anthropic Claude, Kareem’s Python code lets an LLM detect configuration drift and automatically revert changes, no manual troubleshooting required.
You will learn:
• What MCP is and how it exposes trusted tools to an LLM
• How Claude reads Splunk, correlates Meraki changes, and repairs configs
• Why two lines of code can spin up an entire MCP server from OpenAPI specs
• Where to find Kareem’s full code on GitHub and his upcoming Cisco U tutorial
// Code //
Get the code here: https://github.com/kiskander/mcp-splu...
//Kareem Iskander SOCIALS //
LinkedIn: / kiskander
X: https://x.com/kareem_isk
Cisco Blogs: https://blogs.cisco.com/author/kareem...
// Website REFERENCE //
https://github.com/kiskander/mcp-splu...
https://u.cisco.com/tutorials/enhance...
https://u.cisco.com/tutorials/network...
https://u.cisco.com/tutorials/network...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.

Jun 26, 2025 • 44min
#499: Your firewall won't save you from this 😱
Big thanks to Radware for sponsoring this video and sharing technical insights with us!
David Bombal talks with Michael Geller (Radware) and Tim Sherman (Cisco) about how smart devices like fridges, cars, and cameras are being hijacked for DDoS attacks. They explain Web DDoS, encrypted Layer 7 threats, and how attackers bypass traditional firewalls. The discussion covers IoT botnets, API abuse, 5G core vulnerabilities, and how Cisco and Radware are defending cloud and edge infrastructure.
// Radware’s SOCIALS //
X: https://x.com/radware
LinkedIn: / posts
Website: https://www.radware.com/
// Web page REFERENCE //
http://livethreatmap.radware.com
https://www.radware.com/security/ddos...
https://www.radware.com/solutions/web...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: https://open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: https://podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Your Firewall Won’t Save You From This
Stop Is Your Car Launching Cyberattacks
Your Home Appliances Weaponized by Cybercriminals
DDoS Just Got Smarter Layer 7 Is Nightmare
How Default Bots Cripple Hospitals and Systems
Electric Cars Under Siege from Smart Devices
Cybersecurity Blind Spot Your Car Is Compromised
The Hidden Threat Everyday Devices Hacked Now
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.