David Bombal

David Bombal
undefined
Nov 10, 2022 • 28min

#403: Are you safe from this?

Are the hacks shown in Mr Robot fact or fiction? How real are they actually? OTW discusses new vulnerabilities and issues with devices found in millions of companies around the world. OTW loves the Mr Robot TV Series as a lot of them are actually realistic - unlike a lot of other shows. Want to learn more from Occupy the Web? You can join his classes using these links: Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // MENU // 00:00 - Coming up // Hacking Uninterruptible Power Supplies (UPS) 00:28 - Intro & Disclaimers 00:40 - Mr Robot episode recap // Hacking UPSs 02:57 - UPS breakdown 04:23 - UPS GUI examples 05:38 - Accessing the UPSs through a Femtocell 06:57 - UPS vulnerabilities // Embedding malware in firmware updates 14:30 - Intelligence agencies // Collecting data 17:45 - UPS vulnerability // Lead-acid battery corrosion 20:12 - "Hacking can kill" 21:57 - The Mr Robot series // Reality or fiction? 26:17 - Importance of Social Engineering 27:38 - Conclusion // Mr Robot Playlist // https://www.youtube.com/playlist?list... // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot kali linux linux parrot os kali hacker hacking hack cybersecurity ups apc nsa nsa hacker nsa hacking ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker oscp certification ctf for beginners Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #mrrobot #hacking #kalilinux
undefined
8 snips
Oct 13, 2022 • 34min

#402: Best Hacking Laptop 2022

Get Proton VPN for free: https://go.getproton.me/SHWN or get Proton Mail here: https://go.getproton.me/SHWO OTW and I get asked this question all the time: "What's the best laptop to buy for hacking?" In this video we answer that question and more. // Menu // 00:00 - Coming up 00:32 - Intro 00:38 - Sponsored Segment 01:41 - "The perfect laptop for hacking" 04:50 - Getting the right CPU 06:52 - The importance of RAM 07:49 - WiFi adapters for WiFi hacking 09:45 - "Gear doesn't matter" 12:57 - Virtual Machines for beginners 15:40 - What OS do I need? 16:23 - VM issues with M1 & M2 chips 19:27 - Kali bare-metal and Kali VM 22:10 - Which Linux is better? 23:30 - Dragon OS // New OS for SDR 24:19 - Know your Linux! 25:26 - Don't waste money on the greatest and latest tech 26:34 - Desktop vs Laptop 27:51 - Learn hacking on a phone 29:48 - The Raspberry Pi // Effective learning environment 32:23 - Linux can work on old computers 33:01 - Conclusion // Videos mentioned // Best hacking laptop (2021 edition) with Neal Bridges: https://youtu.be/jsMp65-piIc SDR hacking: https://youtu.be/5LvqU3-iINk Kali Linux install on Raspberry Pi: https://youtu.be/PqRVo2niA_8 Kali Linux install on Android (rootless): https://youtu.be/KxOGyuGq0Ts Kali Linux USB boot: https://youtu.be/n2olKupv9fY Kali Linux WSL install: https://youtu.be/UXyS-xofGNM Kali Linux WSL2 GUI Apps: https://youtu.be/mp5DdgZP7ns Kali Linux Windows install: https://youtu.be/W6_nBr8SbPE Kali Linux macOS: https://youtu.be/fcrSmbUIHuo // Mr Robot Playlist // https://www.youtube.com/playlist?list... // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web social // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh // Recommended WiFi adapters // Alfa AWUS036NHA: https://amzn.to/3wnyVen Alfa AWUS036ACM: https://amzn.to/3fCL4WT Alfa AWUS036ACH: https://amzn.to/3rLAjny or https://amzn.to/2PxkkMV Others: Alfa AWUS1900: https://amzn.to/31E0AtH Alfa Long-Range Dual-Band AC1200: https://amzn.to/34UUCEL Alfa AWUS036NEH: https://amzn.to/3sK2iW8 Panda PAU05: https://amzn.to/3ue23Da Panda PAU06: https://amzn.to/3wwqRZ8 Panda PAU09: https://amzn.to/3wosx6X WiFi Nation 802.11ac AC600: https://amzn.to/3cLQddm WiFi Nation Atheros AR9271: https://amzn.to/3u8JUqm // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot kali linux parrot os kali hacker hacking hack best hacking laptop best laptop for hacking best hacker laptop hacker laptop hacker laptop setup best hacking laptop 2022 best hacking laptop and os best hacking operating system best hacking os vmware virtualbox bare metal hacker cybersecurity nsa nsa hacker nsa hacking ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker oscp certification ctf for beginners Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hacking #kalilinux #parrotos
undefined
Oct 13, 2022 • 42min

#401: Bug Bounty bootcamp // Get paid to hack websites like Uber, PayPal, TikTok and more

How to get experience with no experience? Have a look at bug bounty programs. Vickie Li demos Insecure Direct Object References (IDOR) and tells us how to get into bug bounty. We also discuss why her book Bug Bounty Bootcamp is a fantastic book to buy if you want to get into bug bounty. Get real world experience today. // MENU // 00:00 - In plain text! 00:24 - Introducing//Vickie Li 00:58 - Part 1//The Interview 01:01 - Origin//Bug Bounty Bootcamp 03:37 - What are Bug Bounty Programmes? 05:26 - Part Time Bug Hunting? 05:44 - Easy Way to Get Experience 07:45 - Which Bug Bounty Programmes for Beginners? 10:51 - Beginners//Don't Compete with Pros 13:15 - Duplicates as Valid Experience 14:23 - What You Need to Start 14:59 - Linux//Do You Need It? 15:55 - Automate!//Which Programming Language? 18:03 - Beginner Friendly Vulnerabilities 21:17 - Part 2//Exploiting IDOR Vulnerability Demo 21:24 - What is IDOR? 22:51 - PortSwigger IDOR Lab 24:05 - Live Chat IDOR 24:48 - View transcript 25:12 - Burp Suite Intercept 26:05 - What to Look For//IDs Aren't Always Obvious 26:56 - Burp Suite//Looking Through Headers 27:56 - Burp Suite//Repeater 28:30 - Testing View Transcript Again 29:18 - GET Request//Identifying Exploitable Endpoint 30:26 - Modifying GET Request 31:35 - Finding the right headers to modify 33:47 - Why the first attempt didn't work 34:09 - IRL//What You Would Do 34:23 - Password in Live Chat Transcript 35:40 - How to Prevent IDORs 36:01 - IDORs//Worth Pursuing? 39:57 - Bug Bounties//How to Start 41:21 - Learn More!//Vickie's Blog 41:38 - Follow Vickie's Twitter! 41:52 - Thank You & Closing // Books // Bug Bounty Bootcamp: https://amzn.to/3K2YDeJ The Web Application Hacker's Handbook: https://amzn.to/3IZ2RTr Hacking API’s by Corey J Ball: https://amzn.to/3JOJG0E Alice and Bob learn application security by Tanya Janca: https://amzn.to/3oMyMij Automate the boring stuff with Python: https://amzn.to/3N2QuYu // Videos mentioned // Nahamsec: https://youtu.be/9vaEwycet90 Corey Ball: https://youtu.be/CkVvB5woQRM Tanya Janca: https://youtu.be/nyhytT2tRN0 Al Sweigart: https://youtu.be/7iBqoc-DzTQ // Vickie's social media // Twitter: https://twitter.com/vickieli7 Website: https://vickieli.dev/ YouTube: https://www.youtube.com/channel/UCjQH... Medium: https://vickieli.medium.com/ // Connect with David // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Platforms mentioned // HackerOne: https://www.hackerone.com/ bugcrowd: https://www.bugcrowd.com/ Intigriti: https://www.intigriti.com/ Huntr: https://huntr.dev/ // Connect with Nahamsec // Twitter: https://twitter.com/nahamsec YouTube: https://www.youtube.com/c/nahamsec Github: https://github.com/nahamsec/Resources... Discord: https://discord.com/invite/ysndAm8 Instagram: https://www.instagram.com/nahamsec/ LinkedIn: https://www.linkedin.com/in/nahamsec/ Twitch: https://www.twitch.tv/nahamsec Website: https://nahamsec.com/ // MY STUFF // Monitor: https://amzn.to/3yyF74Y More stuff: https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #python #hack #xss
undefined
Aug 22, 2022 • 1h 3min

#400: Free AppSec courses! #1 reason for hacks :(

#1 reason for data breaches is insecure software. Software badly needs to be made more secure - lots of opportunities here to either hack applications or help application developers secure them. Learn application security (appsec) for free with shehackspurple. // MENU // 00:00 - Let's start with a bang! 00:28 - Introduction//Tanya Janca 03:48 - What is CIA? 07:05 - Why Purple & What Big News? 11:17 - Free Secure Code Courses? 13:00 - Where to contact Tanya 13:37 - Number One Reason for Data Breaches 18:42 - How Tanya Started Out 25:19 - What is DevOps? 34:26 - The Systems Development Life Cycle 39:47 - Why Shock and Awe Doesn't Work 45:24 - Secure Code As a Job? 48:41 - Jobs and Free Training? 50:38 - Get Involved with the Hacking Community! 53:37 - log4j//What Happened? 01:01:17 - Thank You & Final Thoughts // FREE COURSES // Website: https://community.wehackpurple.com/ All Free courses: https://community.wehackpurple.com/al... Secure Coding: https://community.wehackpurple.com/co... API Security Mini Course: https://community.wehackpurple.com/co... Infrastructure as Code Mini-Course: https://community.wehackpurple.com/co... Azure Cloud Security: https://community.wehackpurple.com/co... Application Security Foundations Level 1: https://community.wehackpurple.com/co... Application Security Foundations Level 2: https://community.wehackpurple.com/co... Application Security Foundations Level 3: https://community.wehackpurple.com/co... Running DAST in a CI/CD, Successfully: https://community.wehackpurple.com/co... Scale Your Team Mini-Course: https://community.wehackpurple.com/co... // BOOKS // The Web Application Hacker’s Handbook - Ed by Dufydd Stuttard and Marcus Pinto: https://amzn.to/3vBzfHX Alice and Bob learn application security by Tanya Janca: https://amzn.to/3oMyMij // Tanya SOCIAL // YouTube: https://www.youtube.com/c/SheHacksPurple Twitter: https://twitter.com/shehackspurple LinkedIn: https://www.linkedin.com/in/tanya-janca/ Blog: https://shehackspurple.ca/ // David SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com app appsec owasp application security python javascript java c c++ swift php golang go rust kotlin typescript dart software hack software application hacking secure apps Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hack #app #appsec
undefined
8 snips
Aug 15, 2022 • 42min

#399: Free API Hacking course!

I interview Corey Ball who wrote the book "Hacking APIs" and he tells us about his book and the free training he is making available. This is a cool announcement :) // MENU // 00:00 - Why talk about pentesting at all? 00:21 - Welcome//Corey 00:48 - What is an API and Why Care? 01:52 - Free API Hacking Course! 02:11 - Overview//Course 02:28 - Do I Need the Book to do the Course? 02:39 - Pre-reqs for Course 03:07 - Cert//When? 03:22 - Hacking APIs//Origin Story 05:34 - The Start//USPS Data Leak 07:31 - OWASP Top 10 Explained 07:49 - API1//Broken Object Level Authorization 08:46 - Testing for BOLA 09:59 - API2//Broken User Authentication 10:35 - Leaked API Keys on GitHub? 10:59 - API3//Excessive Data Exposure 12:05 - API9//Improper Asset Management 13:53 - The World is Running on APIs 14:53 - Who is this Book For? 16:19 - Set Up Hacking Lab 17:47 - You Just Need a Laptop to Start Hacking! 17:52 - Free API Hacking Tools 20:14 - What is Kiterunner 20:47 - Gobuster vs Kiterunner 21:51 - Free Wordlists! 22:05 - What is fuzzing and free fuzzing tool 23:17 - More Tools? 23:47 - How To Find APIs 25:02 - Using nmap to find APIs? 26:09 - Hacking APIs as your start in hacking 28:09 - Difference//REST//GraphQL 29:07 - Learn REST or GraphQL? 31:07 - Take a University Course? 31:44 - Hacking Certifications//Worth It? 33:42 - Being Hacked//How Corey Started 36:31 - Corey's OSCP Experience 38:09 - Hacking APIs As An Alternative Path 38:41 - Resources to Start With 39:26 - Ten Years of Experience? 39:52 - Huge Demand for Hacking APIs 40:25 - The Course is Completely Free 40:47- Breaking Barriers! 41:37 - Thank You & Final Words // Free API hacking course // APIsec Certified Expert Course: https://university.apisec.ai/ // Defcon Workshop notes // https://sway.office.com/HVrL2AXUlWGNDHqy // Books // Hacking API’s by Corey J Ball: https://amzn.to/3JOJG0E Bug Bounty Bootcamp Vickie Li: https://amzn.to/3SPCtBF // YouTube channels mentioned // InsiderPHD: https://www.youtube.com/c/InsiderPhD IppSec: https://www.youtube.com/c/ippsec/videos // Corey SOCIAL // LinkedIn: https://www.linkedin.com/in/coreyjball/ Twitter: https://twitter.com/hAPI_hacker // David SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com hacking api api api hacking api hacking tutorial api hacking bug bounty api hacking 101 api hacking full course api hacking tools api hacking alissa knight api hacking with postman api hacking for beginners api hacker api hacking demo api hacking kali linux api hacking course api hacking insiderphd hacking an api hack api owasp api top 10 bug bounty hacking apis no starch press hacking api no starch hacking apis pdf hacking api book hacking apis corey ball corey ball hacking apis reverse engineering private api apis for beginners rest api hacking api with postman reverse engineering for beginners hacking api key what is an api rest apis with postman for absolute beginners rest api explained #api #hack #hacking
undefined
11 snips
Aug 1, 2022 • 56min

#398: Learn AI for Free! Computerphile explains hype vs reality and how to get started.

AI just become Sentient? And will it take your job? Or is AI just a fantastic opportunity for you to get a better job? In this interview with Dr Michael Pound we discuss hype vs reality and get a quick start guide on how to learn AI. // MENU // 00:00 - Coming Up 00:45 - Intro 01:10 - Michael Pound introduction 02:49 - Will AI take our jobs? 04:55 - What is LaMDA? 08:38 - Can Python functions get lonely? 11:26 - The definition of "sentience" 11:59 - AI vs Machine Learning 18:48 - Neural Networks 19:49 - Malware example 21:59 - Stochastic Gradient Descent 22:30 - Supervised learning 23:45 - Unsupervised learning 26:03 - Reinforcement learning 27:35 - Are the robots taking over? 30:14 - What is AI really good at? 33:28 - Definition of Deep Learning 35:37 - Neural Networks 36:53 - What to learn 40:50 - Using PyTorch 43:52 - Google colab 44:48 - Study recommendations 46:16 - The demand for AI skills 48:15 - Teaching cyber security 50:06 - Final Advice 55:09 - Conclusion // Video mentions // ComputerPhile (lambda is not sentient): https://youtu.be/iBouACLc-hw Data Analysis Playlist: https://www.youtube.com/watch?v=NxYEz... Neural Networks Playlist: https://www.youtube.com/watch?v=py5by... Computer Vision Playlist: https://www.youtube.com/watch?v=C_zFh... // BOOK // Deep learning by Ian Goodfellow, Yoshua Bengio and Aaron Courville: https://amzn.to/3vmu4LP // COURSE // AI For Everyone by Andrew Ng: https://www.coursera.org/learn/ai-for... // PyTorch // Github: https://github.com/pytorch Website: https://pytorch.org/ Documentation: https://ai.facebook.com/tools/pytorch/ // Mike SOCIAL // Twitter: https://twitter.com/_mikepound YouTube: https://www.youtube.com/user/Computer... Website: https://www.nottingham.ac.uk/research... // David SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com lamda python neural network ai machine learning deep learning sentient google ai mike pound michael pound dr michael pound computerphile artificial intelligence google ai sentient google ai lamda google ai sentient conversation google ai alive ai jobs Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #ai #computerphile #lamda
undefined
24 snips
Aug 1, 2022 • 55min

#397: Hack Wifi from $1.80

Tech enthusiast and hacker Kody Kinzie discusses the best WiFi adapters for hacking, including the Tube U, AWUS036NHA, and WEMOS D1 Mini. He shares insights on flashing hacking tools, the differences between USB and WiFi nuggets, and the challenges of hardware development. Kinzie also talks about favorite OS, CircuitPython, rising above online hate, and the importance of continuous learning in cybersecurity.
undefined
Jul 27, 2022 • 52min

#396: The Internet just changed.

You better be aware of what just changed on the Internet. TCP is being replaced with QUIC. UDP is being used more and more instead of TCP. This affects your firewalls. It affects a lot of your network troubleshooting. HTTP/3 has been standardized. Everything is encrypted with QUIC - welcome to the new world of network troubleshooting and security. // MENU // 00:00 - The Problem with TCP 00:12 - Introducing//Robin Marx 02:12 - Clean Ship, Clean House//RFCs 03:25 - HTTP Semantics//QUIC//HTTP/3 04:17 - Why the Hell Do We Need HTTP/3? 05:05 - Why QUIC? 08:35 - QUIC & TLS Integration 10:02 - Why Use UDP? 13:50 - Replacing TCP with QUIC 14:28 - Summary So Far 15:22 - Stream Multiplexing 15:40 - Head-of-line blocking 18:40 - Why This Slows Things Down 19:29 - How QUIC Does It Differently 20:58 - TCP vs QUIC//Packet Handling 23:11 - HTTP/3 Prioritization 25:25 - Stats//QUIC Isn't Going Anywhere 26:30 - Firewalls are almost useless 27:20 - Firewalls Blocking QUIC? 28:04 - QUIC & Other Protocols? 29:20 - IPv4 & IPv6//Different for QUIC? 29:54 - Challenges for QUIC's Growth 30:43 - Connection Migration 33:33 - What About Hackers? 36:32 - How Do I Get To Use QUIC? 38:28 - Large Companies Adopting QUIC 39:09 - The Internet is Too Centralized? 40:02 - Header Compression 41:55 - Server Push 43:47 - Practical Examples with Wireshark 50:34 - Thank You & How to Contact Robin // Robin SOCIAL // Twitter: https://twitter.com/programmingart LinkedIn: https://www.linkedin.com/in/rmarx/ YouTube: https://www.youtube.com/channel/UCyqP... // Robin's Blog articles // HTTP3 core concepts Part 1: https://www.smashingmagazine.com/2021... HTTP3 core concepts Part 2: https://www.smashingmagazine.com/2021... HTTP3 core concepts Part 3: https://www.smashingmagazine.com/2021... // Chris Greer Videos // HTTPS Decryption with Wireshark: https://youtu.be/GMNOT1aZmD8 Decrypting TLS, HTTP/2 and QUIC with Wireshark: https://youtu.be/yodDbgoCnLM // David SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com http https quic tcp udp http/1 http/2 http/3 wireshark firewall firewall quic quic firewall http/3 firewall #http3 #quic #tcp
undefined
Jul 27, 2022 • 46min

#395: What you need to learn in 2022? Top 3 hot trends.

You want to ride waves. You want to learn the hot new topics to get ahead - especially if you are starting out. Don't focus on the stuff of yesterday. Focus on the new opportunities. Ben Sadeghipour (NahamSec) shares his suggestions about what to learn and then tells us about one that is gaining a lot of momentum in 2022. // MENU // 00:00 - Coming Up 00:29 - Intro 00:34 - The next big thing 02:09 - Opportunities in Web3 03:59 - Ride the wave 06:07 - Attack Vector & Attack Surface Management 11:39 - Going digital and digital assets 14:14 - NahamSec "Under 10 Minutes" series 15:51 - Patches that are still vulnerable 18:20 - APIs are the future 21:16 - Shodan demo 30:24 - The security issue 31:38 - Shodan vs ASM 32:38 - Out of scope assets 35:12 - NahamSec and Hadrian 38:12 - Will automation take over? 39:13 - ASM vs Inventory Management 40:49 - Getting more information about ASM 44:21 - Covering APIs on NahamSec YouTube 45:31 - Conclusion Previous video: https://youtu.be/9vaEwycet90 // Connect with David // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Connect with NahamSec // Twitter: https://twitter.com/nahamsec YouTube: https://www.youtube.com/c/nahamsec Github: https://github.com/nahamsec/Resources... Discord: https://discord.com/invite/ysndAm8 Instagram: https://www.instagram.com/nahamsec/ LinkedIn: https://www.linkedin.com/in/nahamsec/ Twitch: https://www.twitch.tv/nahamsec Website: https://nahamsec.com/ // Nahamsec's Udemy Course// Udemy: https://www.udemy.com/course/intro-to... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com hack hacker shodan cyber hacking cybersecurity asm rsa attack surface management attack vector attack surface monitoring attack surface reduction bitcoin api apis postman hacking hacking api cyber security information security sans institute cybersecurity training cyber security training information security training privacy nsa oscp ceh bug bounty bugbounty hackerone hacking Ben Sadeghipour NahamSec nahamsec cyber security bug bounties ethical hacking bug bounty hunting burp suite ethical hacker Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #cyber #hacking #jobs
undefined
Jul 18, 2022 • 1h 21min

#394: Best Hacking Python Book?

The difference between script kiddies and professionals is the difference between merely using other people's tools and writing your own. Charle Miller, from the foreword (1st edition). This is a great book if you want to learn Python for hacking and penetration testing. Sometimes the tools you want to use are not available on target systems and the only option is to use Python - so learn the tools and techniques you can use with Python in a pentest or ethical hacking situations. // MENU // 00:00 - Coming up 00:26 - Intro 00:32 - Black Hat Python has been updated! 02:52 - How Black Hat Python started 07:00 - Why Python? 08:26 - Justin Seitz's background 10:33 - "Make it work." 11:56 - Tim Arnold's background 15:21 - Simple to read for everyone 19:55 - Editor vs Integrated Development Environment (IDE) 21:06 - Learn to debug! 22:29 - Modules updated to Python 3 24:28 - The Networking chapter 27:09 - Favourite chapters 28:17 - Inspirations for the chapters 31:40 - You always learn 33:13 - Choosing Developer or Hacker 36:12 - Endless accessibility to learning material 37:08 - Is it necessary to know programming? 41:23 - Ruby knowledge for Metasploit 42:27 - Will Golang replace Python? 45:27 - Recommended coding languages 46:40 - The story of Hunchly 54:15 - From Pentester to OSINT 56:44 - Justin Seitz's stories 59:18 - How Hunchly works 01:00:52 - Will A.I. replace humans? 01:02:16 - Dark Web Mailing List 01:05:38 - Tim Arnold's story 01:09:02 - Advice for beginners 01:17:53 - Conclusion // Buy the books // Black Hat Python: https://amzn.to/3yQIdTD Grey Hat Python: https://amzn.to/3NQcA0H // Justin's SOCIAL // Twitter: https://twitter.com/jms_dot_py E-mail: justin.seitz (at) hunch.ly Website: https://www.hunch.ly/ // Tim's SOCIAL // E-mail: jtim.arnold(at)gmail.com // David's SOCIAL // Discord: https://discord.gg/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube Main Channel: https://www.youtube.com/davidbombal YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN... YouTube Clips Channel: https://www.youtube.com/channel/UCbY5... Apple Podcast: https://davidbombal.wiki/applepodcast // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com python black hat python no starch no starch press osint hack hacking pentesting ethical hacking penetration testing black hat python white hat python grey hat python gray hat python cyber security kali linux ethical hacking python programming penetration testing ethical hacker python for hacking python full course black hat book review how to hack cyber security course hacking books computer hacking learn black hat python python tutorial cyber security career cyber security analyst python hacker python hacking course python hacking tools scapy hack python code hack python book python hack wifi Disclaimer: This video is for educational purposes only. Please note that the links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #python #hacking #kalilinux

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app