

David Bombal
David Bombal
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
Episodes
Mentioned books

9 snips
Nov 15, 2022 • 27min
#405: Top Hacking Books you need to read
What are the top hacking books to get started? Practical and good hacking books? OTW discusses his favourite Hacking and cybersecurity books with me. Do you agree with him? Did we miss any great books?
// MENU //
00:00 - Coming Up
00:20 - Intro
00:25 - Welcome Back OccupyTheWeb
00:55 - Network Basics for Hackers
02:04 - Other Books Releasing
02:51 - OccupyTheWeb Book Recommendations
03:22 - Linux Basics for Hackers
05:02 - Gray Hat Hacking
05:52 - This is How They Tell Me the World Ends
07:49 - Hands On Hacking
09:33 - Penetration Testing
10:56 - Getting Started Becoming a Master Hacker
12:11 - The Science of Human Hacking
14:01 - Black Hat Python
15:25 - TikTok
16:15 - Hacking Connected Cars
17:47 - Hacking: The Art of Exploitation
18:29 - Pentesting Blueprint
19:21 - Hacking APIs
19:54 - Bug Bounty Bootcamp
21:02 - Books Conclusion
21:46 - Networking
22:58 - Conclusion
23:55 - Web Hacker's Handbook
24:29 - Go
25:39 - Hacker's Playbook
26:45 - Outro
// BOOKS //
- Linux basics for hackers by Occupy the Web: https://amzn.to/3A2oJM1
- Gray Hat Hacking Sixth Edition, The Ethical Hacker’s Handbook by Various Authors: https://amzn.to/3TkI0Pr
- This is how they tell me the world ends by Nicole Perlroth: https://amzn.to/3NWj3st
- Hands on Hacking by Matthew Hickey and Jennifer Arcuri: https://amzn.to/3WImAia
- Penetration Testing by Georgia Weidman: https://amzn.to/3UL1i1D
- The Science of Human Hacking by Christopher Hadnagy (social engineering): https://amzn.to/3UssbaM
- Getting started becoming a master hacker by Occupy the Web: https://amzn.to/3EmguNa
- Black Hat Python by Justin Seitz and Tim Arnold: https://amzn.to/3yQIdTD
- Hacking Connected Cars by Alissa Knight: https://amzn.to/3G5cRN5
- Hacking: The Art of Exploitation by Jon Erickson: https://amzn.to/3ElVhTI
- The Pentester Blueprint by Phillip L. Wylie and Kim Crawley: https://amzn.to/3WIoGP4
- Hacking API’s by Corey J.Ball: https://amzn.to/3EfXDT5
- Bug Bounty Bootcamp by Vickie Li: https://amzn.to/3GlG8U3
- Network basics for hackers by Occupy the Web (coming in 2023)
// Videos mentioned //
- Hacking Cars like Mr Robot: https://www.youtube.com/watch?v=5LvqU...
- Hacking Cell phones like Mr Robot: https://youtu.be/bK1lsI-ehL8
- Nicole Perlroth: Cybersecurity and the weapons of Cyberwar: https://youtu.be/hy2G3PhGm-g
- Best Hacking Python Book: https://www.youtube.com/watch?v=2B76C...
- Hacking API’s and Cars: You need to learn this in 2022 https://www.youtube.com/watch?v=4VaHN...
- Free API Hacking Course https://www.youtube.com/watch?v=CkVvB...
- Bug Bounty Bootcamp https://www.youtube.com/watch?v=QqrK2...
- Top 5 hacking books with Neal Bridges: https://youtu.be/VrayWzHKVw4
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web's SOCIAL //
Twitter: https://twitter.com/three_cube
// OTW classes //
Hacker's Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-stor...
Get 3 year's access to all live courses for $750:
https://hackers-arise.com/online-stor...
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
hacking books
hack
hacker
hacking
python
python hacking
black hat python
gray hat hacking
linux
linux for hackers
bug bounty
nsa
nsa hacker
nsa hacking
ethical hacking
ceh
oscp
ine
try hack me
hack the box
hacking
ethical hacker
oscp certification
ctf for beginners
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#hacking #hack #cybersecurity

Nov 10, 2022 • 54min
#404: How To Be Invisible Online And Hack Like A Ghost
Don't make the mistake of exposing your IP address and personal data. Make sure that you hack like a ghost. Doesn't matter if you just want privacy online or you want to be invisible.
// MENU //
00:00 - Coming up
00:29 - Disclaimer
00:33 - Sparc Flow and How to Hack Like... books overview
04:24 - The "unrealistic" in the real world
05:56 - "How to Hack Like a Ghost" behind the scenes
08:30 - Love/hate relationship with the security industry // Advice for beginners
11:51 - Not knowing everything is fine
13:10 - Stakes as a Pentester vs Hacker
15:36 - How to cover your tracks // Wardriving, Proton VPN, Brave
23:52 - Linux Tails // Red teaming, bouncing servers
25:51 - Don't leave trails // Hacking big companies
28:25 - Chromebooks vs hackers
28:58 - Bouncing servers, Frontline servers, Command & Control servers, Redirectors
35:20 - The problem with CTFs
37:09 - Sparc Flow's journey to cyber-security
40:13 - Advice for beginners // How to get started
45:40 - Important skills to have
51:16 - SparcFlow's new book
53:31 - Conclusion
// Books //
Hack like a Ghost: https://amzn.to/3E2KAFm
Hack like a Legend: https://amzn.to/3hh28F7
Hack like a Pornstar: https://amzn.to/3fw4L5r
How to Hack Like a GOD: https://amzn.to/3TnkrG1
Ultimate Guide for being Anonymous: https://amzn.to/3Uv
Counter Hack Reloaded: https://amzn.to/3zNjaB3
The Art of Intrusion: https://amzn.to/3sYPEEw
// Software mentioned //
Note: There are NOT affiliate links. Just listed here to hopefully help you:
Proton VPN: https://protonvpn.com/
Brave: https://brave.com/
Privacy Badger: https://privacybadger.org/
uBlock Origin: https://github.com/gorhill/uBlock
// CTFs //
IppSec: https://www.youtube.com/ippsec
LiveOverflow: https://www.youtube.com/LiveOverflow
// SparcFlow's SOCIAL //
Twitter: https://twitter.com/sparcFlow
Blog: https://sparcflow.substack.com/
// David's SOCIAL //
Discord: https://discord.gg/davidbombal
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube Main Channel: https://www.youtube.com/davidbombal
YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN...
YouTube Clips Channel: https://www.youtube.com/channel/UCbY5...
YouTube Shorts Channel: https://www.youtube.com/channel/UCEyC...
Apple Podcast: https://davidbombal.wiki/applepodcast
Spotify Podcast: https://open.spotify.com/show/3f6k6gE...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
hack
hacker
hacking
ghost
tails
tails linux
linux
hack like a ghost
hack like a legend
invisible online
hide identity
privacy
cyber security
kali linux
ethical hacking
penetration testing
ethical hacker
black hat
book review
how to hack
cyber security course
hacking books
computer hacking
cyber security career
cyber security analyst
online privacy
internet security
online privacy for kids
online privacy and security
online privacy tips
online privacy guide
internet security tutorial
edward snowden
brave browser
tor
protonvpn
protonmail
duckduckgo
google
graphite phone
privacy browser
privacy browser ios
privacy broke
hide online
hidden identity
anonymous
bullying
#hacking #privacy #hack

Nov 10, 2022 • 28min
#403: Are you safe from this?
Are the hacks shown in Mr Robot fact or fiction? How real are they actually?
OTW discusses new vulnerabilities and issues with devices found in millions of companies around the world.
OTW loves the Mr Robot TV Series as a lot of them are actually realistic - unlike a lot of other shows.
Want to learn more from Occupy the Web? You can join his classes using these links:
Hacker's Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-stor...
Get 3 year's access to all live courses for $750:
https://hackers-arise.com/online-stor...
// MENU //
00:00 - Coming up // Hacking Uninterruptible Power Supplies (UPS)
00:28 - Intro & Disclaimers
00:40 - Mr Robot episode recap // Hacking UPSs
02:57 - UPS breakdown
04:23 - UPS GUI examples
05:38 - Accessing the UPSs through a Femtocell
06:57 - UPS vulnerabilities // Embedding malware in firmware updates
14:30 - Intelligence agencies // Collecting data
17:45 - UPS vulnerability // Lead-acid battery corrosion
20:12 - "Hacking can kill"
21:57 - The Mr Robot series // Reality or fiction?
26:17 - Importance of Social Engineering
27:38 - Conclusion
// Mr Robot Playlist //
https://www.youtube.com/playlist?list...
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web social //
Twitter: https://twitter.com/three_cube
// OTW classes //
Hacker's Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-stor...
Get 3 year's access to all live courses for $750:
https://hackers-arise.com/online-stor...
// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
kali linux
linux
parrot os
kali
hacker
hacking
hack
cybersecurity
ups
apc
nsa
nsa hacker
nsa hacking
ethical hacking
ceh
oscp
ine
try hack me
hack the box
hacking
ethical hacker
oscp certification
ctf for beginners
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#mrrobot #hacking #kalilinux

8 snips
Oct 13, 2022 • 34min
#402: Best Hacking Laptop 2022
Get Proton VPN for free: https://go.getproton.me/SHWN or get Proton Mail here: https://go.getproton.me/SHWO
OTW and I get asked this question all the time: "What's the best laptop to buy for hacking?" In this video we answer that question and more.
// Menu //
00:00 - Coming up
00:32 - Intro
00:38 - Sponsored Segment
01:41 - "The perfect laptop for hacking"
04:50 - Getting the right CPU
06:52 - The importance of RAM
07:49 - WiFi adapters for WiFi hacking
09:45 - "Gear doesn't matter"
12:57 - Virtual Machines for beginners
15:40 - What OS do I need?
16:23 - VM issues with M1 & M2 chips
19:27 - Kali bare-metal and Kali VM
22:10 - Which Linux is better?
23:30 - Dragon OS // New OS for SDR
24:19 - Know your Linux!
25:26 - Don't waste money on the greatest and latest tech
26:34 - Desktop vs Laptop
27:51 - Learn hacking on a phone
29:48 - The Raspberry Pi // Effective learning environment
32:23 - Linux can work on old computers
33:01 - Conclusion
// Videos mentioned //
Best hacking laptop (2021 edition) with Neal Bridges: https://youtu.be/jsMp65-piIc
SDR hacking: https://youtu.be/5LvqU3-iINk
Kali Linux install on Raspberry Pi: https://youtu.be/PqRVo2niA_8
Kali Linux install on Android (rootless): https://youtu.be/KxOGyuGq0Ts
Kali Linux USB boot: https://youtu.be/n2olKupv9fY
Kali Linux WSL install: https://youtu.be/UXyS-xofGNM
Kali Linux WSL2 GUI Apps: https://youtu.be/mp5DdgZP7ns
Kali Linux Windows install: https://youtu.be/W6_nBr8SbPE
Kali Linux macOS: https://youtu.be/fcrSmbUIHuo
// Mr Robot Playlist //
https://www.youtube.com/playlist?list...
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web social //
Twitter: https://twitter.com/three_cube
// OTW classes //
Hacker's Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-stor...
Get 3 year's access to all live courses for $750:
https://hackers-arise.com/online-stor...
// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
// Recommended WiFi adapters //
Alfa AWUS036NHA: https://amzn.to/3wnyVen
Alfa AWUS036ACM: https://amzn.to/3fCL4WT
Alfa AWUS036ACH: https://amzn.to/3rLAjny or https://amzn.to/2PxkkMV
Others:
Alfa AWUS1900: https://amzn.to/31E0AtH
Alfa Long-Range Dual-Band AC1200: https://amzn.to/34UUCEL
Alfa AWUS036NEH: https://amzn.to/3sK2iW8
Panda PAU05: https://amzn.to/3ue23Da
Panda PAU06: https://amzn.to/3wwqRZ8
Panda PAU09: https://amzn.to/3wosx6X
WiFi Nation 802.11ac AC600: https://amzn.to/3cLQddm
WiFi Nation Atheros AR9271: https://amzn.to/3u8JUqm
// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
kali linux
parrot os
kali
hacker
hacking
hack
best hacking laptop
best laptop for hacking
best hacker laptop
hacker laptop
hacker laptop setup
best hacking laptop 2022
best hacking laptop and os
best hacking operating system
best hacking os
vmware
virtualbox
bare metal
hacker
cybersecurity
nsa
nsa hacker
nsa hacking
ethical hacking
ceh
oscp
ine
try hack me
hack the box
hacking
ethical hacker
oscp certification
ctf for beginners
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#hacking #kalilinux #parrotos

Oct 13, 2022 • 42min
#401: Bug Bounty bootcamp // Get paid to hack websites like Uber, PayPal, TikTok and more
How to get experience with no experience? Have a look at bug bounty programs. Vickie Li demos Insecure Direct Object References (IDOR) and tells us how to get into bug bounty. We also discuss why her book Bug Bounty Bootcamp is a fantastic book to buy if you want to get into bug bounty. Get real world experience today.
// MENU //
00:00 - In plain text!
00:24 - Introducing//Vickie Li
00:58 - Part 1//The Interview
01:01 - Origin//Bug Bounty Bootcamp
03:37 - What are Bug Bounty Programmes?
05:26 - Part Time Bug Hunting?
05:44 - Easy Way to Get Experience
07:45 - Which Bug Bounty Programmes for Beginners?
10:51 - Beginners//Don't Compete with Pros
13:15 - Duplicates as Valid Experience
14:23 - What You Need to Start
14:59 - Linux//Do You Need It?
15:55 - Automate!//Which Programming Language?
18:03 - Beginner Friendly Vulnerabilities
21:17 - Part 2//Exploiting IDOR Vulnerability Demo
21:24 - What is IDOR?
22:51 - PortSwigger IDOR Lab
24:05 - Live Chat IDOR
24:48 - View transcript
25:12 - Burp Suite Intercept
26:05 - What to Look For//IDs Aren't Always Obvious
26:56 - Burp Suite//Looking Through Headers
27:56 - Burp Suite//Repeater
28:30 - Testing View Transcript Again
29:18 - GET Request//Identifying Exploitable Endpoint
30:26 - Modifying GET Request
31:35 - Finding the right headers to modify
33:47 - Why the first attempt didn't work
34:09 - IRL//What You Would Do
34:23 - Password in Live Chat Transcript
35:40 - How to Prevent IDORs
36:01 - IDORs//Worth Pursuing?
39:57 - Bug Bounties//How to Start
41:21 - Learn More!//Vickie's Blog
41:38 - Follow Vickie's Twitter!
41:52 - Thank You & Closing
// Books //
Bug Bounty Bootcamp: https://amzn.to/3K2YDeJ
The Web Application Hacker's Handbook: https://amzn.to/3IZ2RTr
Hacking API’s by Corey J Ball: https://amzn.to/3JOJG0E
Alice and Bob learn application security by Tanya Janca: https://amzn.to/3oMyMij
Automate the boring stuff with Python: https://amzn.to/3N2QuYu
// Videos mentioned //
Nahamsec: https://youtu.be/9vaEwycet90
Corey Ball: https://youtu.be/CkVvB5woQRM
Tanya Janca: https://youtu.be/nyhytT2tRN0
Al Sweigart: https://youtu.be/7iBqoc-DzTQ
// Vickie's social media //
Twitter: https://twitter.com/vickieli7
Website: https://vickieli.dev/
YouTube: https://www.youtube.com/channel/UCjQH...
Medium: https://vickieli.medium.com/
// Connect with David //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Platforms mentioned //
HackerOne: https://www.hackerone.com/
bugcrowd: https://www.bugcrowd.com/
Intigriti: https://www.intigriti.com/
Huntr: https://huntr.dev/
// Connect with Nahamsec //
Twitter: https://twitter.com/nahamsec
YouTube: https://www.youtube.com/c/nahamsec
Github: https://github.com/nahamsec/Resources...
Discord: https://discord.com/invite/ysndAm8
Instagram: https://www.instagram.com/nahamsec/
LinkedIn: https://www.linkedin.com/in/nahamsec/
Twitch: https://www.twitch.tv/nahamsec
Website: https://nahamsec.com/
// MY STUFF //
Monitor: https://amzn.to/3yyF74Y
More stuff: https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#python #hack #xss

Aug 22, 2022 • 1h 3min
#400: Free AppSec courses! #1 reason for hacks :(
#1 reason for data breaches is insecure software. Software badly needs to be made more secure - lots of opportunities here to either hack applications or help application developers secure them. Learn application security (appsec) for free with shehackspurple.
// MENU //
00:00 - Let's start with a bang!
00:28 - Introduction//Tanya Janca
03:48 - What is CIA?
07:05 - Why Purple & What Big News?
11:17 - Free Secure Code Courses?
13:00 - Where to contact Tanya
13:37 - Number One Reason for Data Breaches
18:42 - How Tanya Started Out
25:19 - What is DevOps?
34:26 - The Systems Development Life Cycle
39:47 - Why Shock and Awe Doesn't Work
45:24 - Secure Code As a Job?
48:41 - Jobs and Free Training?
50:38 - Get Involved with the Hacking Community!
53:37 - log4j//What Happened?
01:01:17 - Thank You & Final Thoughts
// FREE COURSES //
Website: https://community.wehackpurple.com/
All Free courses: https://community.wehackpurple.com/al...
Secure Coding: https://community.wehackpurple.com/co...
API Security Mini Course: https://community.wehackpurple.com/co...
Infrastructure as Code Mini-Course: https://community.wehackpurple.com/co...
Azure Cloud Security: https://community.wehackpurple.com/co...
Application Security Foundations Level 1: https://community.wehackpurple.com/co...
Application Security Foundations Level 2: https://community.wehackpurple.com/co...
Application Security Foundations Level 3: https://community.wehackpurple.com/co...
Running DAST in a CI/CD, Successfully: https://community.wehackpurple.com/co...
Scale Your Team Mini-Course: https://community.wehackpurple.com/co...
// BOOKS //
The Web Application Hacker’s Handbook - Ed by Dufydd Stuttard and Marcus Pinto: https://amzn.to/3vBzfHX
Alice and Bob learn application security by Tanya Janca: https://amzn.to/3oMyMij
// Tanya SOCIAL //
YouTube: https://www.youtube.com/c/SheHacksPurple
Twitter: https://twitter.com/shehackspurple
LinkedIn: https://www.linkedin.com/in/tanya-janca/
Blog: https://shehackspurple.ca/
// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
app
appsec
owasp
application security
python
javascript
java
c
c++
swift
php
golang
go
rust
kotlin
typescript
dart
software
hack software
application hacking
secure apps
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#hack #app #appsec

8 snips
Aug 15, 2022 • 42min
#399: Free API Hacking course!
I interview Corey Ball who wrote the book "Hacking APIs" and he tells us about his book and the free training he is making available. This is a cool announcement :)
// MENU //
00:00 - Why talk about pentesting at all?
00:21 - Welcome//Corey
00:48 - What is an API and Why Care?
01:52 - Free API Hacking Course!
02:11 - Overview//Course
02:28 - Do I Need the Book to do the Course?
02:39 - Pre-reqs for Course
03:07 - Cert//When?
03:22 - Hacking APIs//Origin Story
05:34 - The Start//USPS Data Leak
07:31 - OWASP Top 10 Explained
07:49 - API1//Broken Object Level Authorization
08:46 - Testing for BOLA
09:59 - API2//Broken User Authentication
10:35 - Leaked API Keys on GitHub?
10:59 - API3//Excessive Data Exposure
12:05 - API9//Improper Asset Management
13:53 - The World is Running on APIs
14:53 - Who is this Book For?
16:19 - Set Up Hacking Lab
17:47 - You Just Need a Laptop to Start Hacking!
17:52 - Free API Hacking Tools
20:14 - What is Kiterunner
20:47 - Gobuster vs Kiterunner
21:51 - Free Wordlists!
22:05 - What is fuzzing and free fuzzing tool
23:17 - More Tools?
23:47 - How To Find APIs
25:02 - Using nmap to find APIs?
26:09 - Hacking APIs as your start in hacking
28:09 - Difference//REST//GraphQL
29:07 - Learn REST or GraphQL?
31:07 - Take a University Course?
31:44 - Hacking Certifications//Worth It?
33:42 - Being Hacked//How Corey Started
36:31 - Corey's OSCP Experience
38:09 - Hacking APIs As An Alternative Path
38:41 - Resources to Start With
39:26 - Ten Years of Experience?
39:52 - Huge Demand for Hacking APIs
40:25 - The Course is Completely Free
40:47- Breaking Barriers!
41:37 - Thank You & Final Words
// Free API hacking course //
APIsec Certified Expert Course: https://university.apisec.ai/
// Defcon Workshop notes //
https://sway.office.com/HVrL2AXUlWGNDHqy
// Books //
Hacking API’s by Corey J Ball: https://amzn.to/3JOJG0E
Bug Bounty Bootcamp Vickie Li: https://amzn.to/3SPCtBF
// YouTube channels mentioned //
InsiderPHD: https://www.youtube.com/c/InsiderPhD
IppSec: https://www.youtube.com/c/ippsec/videos
// Corey SOCIAL //
LinkedIn: https://www.linkedin.com/in/coreyjball/
Twitter: https://twitter.com/hAPI_hacker
// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
hacking api
api
api hacking
api hacking tutorial
api hacking bug bounty
api hacking 101
api hacking full course
api hacking tools
api hacking alissa knight
api hacking with postman
api hacking for beginners
api hacker
api hacking demo
api hacking kali linux
api hacking course
api hacking insiderphd
hacking an api
hack api
owasp api top 10
bug bounty
hacking apis no starch press
hacking api no starch
hacking apis pdf
hacking api book
hacking apis corey ball
corey ball hacking apis
reverse engineering
private api
apis for beginners
rest api
hacking api with postman
reverse engineering for beginners
hacking api key
what is an api
rest apis with postman for absolute beginners
rest api explained
#api #hack #hacking

11 snips
Aug 1, 2022 • 56min
#398: Learn AI for Free! Computerphile explains hype vs reality and how to get started.
AI just become Sentient? And will it take your job? Or is AI just a fantastic opportunity for you to get a better job? In this interview with Dr Michael Pound we discuss hype vs reality and get a quick start guide on how to learn AI.
// MENU //
00:00 - Coming Up
00:45 - Intro
01:10 - Michael Pound introduction
02:49 - Will AI take our jobs?
04:55 - What is LaMDA?
08:38 - Can Python functions get lonely?
11:26 - The definition of "sentience"
11:59 - AI vs Machine Learning
18:48 - Neural Networks
19:49 - Malware example
21:59 - Stochastic Gradient Descent
22:30 - Supervised learning
23:45 - Unsupervised learning
26:03 - Reinforcement learning
27:35 - Are the robots taking over?
30:14 - What is AI really good at?
33:28 - Definition of Deep Learning
35:37 - Neural Networks
36:53 - What to learn
40:50 - Using PyTorch
43:52 - Google colab
44:48 - Study recommendations
46:16 - The demand for AI skills
48:15 - Teaching cyber security
50:06 - Final Advice
55:09 - Conclusion
// Video mentions //
ComputerPhile (lambda is not sentient): https://youtu.be/iBouACLc-hw
Data Analysis Playlist: https://www.youtube.com/watch?v=NxYEz...
Neural Networks Playlist: https://www.youtube.com/watch?v=py5by...
Computer Vision Playlist: https://www.youtube.com/watch?v=C_zFh...
// BOOK //
Deep learning by Ian Goodfellow, Yoshua Bengio and Aaron Courville: https://amzn.to/3vmu4LP
// COURSE //
AI For Everyone by Andrew Ng: https://www.coursera.org/learn/ai-for...
// PyTorch //
Github: https://github.com/pytorch
Website: https://pytorch.org/
Documentation: https://ai.facebook.com/tools/pytorch/
// Mike SOCIAL //
Twitter: https://twitter.com/_mikepound
YouTube: https://www.youtube.com/user/Computer...
Website: https://www.nottingham.ac.uk/research...
// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
lamda
python
neural network
ai
machine learning
deep learning
sentient
google ai
mike pound
michael pound
dr michael pound
computerphile
artificial intelligence
google ai sentient
google ai lamda
google ai sentient conversation
google ai alive
ai jobs
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#ai #computerphile #lamda

24 snips
Aug 1, 2022 • 55min
#397: Hack Wifi from $1.80
Tech enthusiast and hacker Kody Kinzie discusses the best WiFi adapters for hacking, including the Tube U, AWUS036NHA, and WEMOS D1 Mini. He shares insights on flashing hacking tools, the differences between USB and WiFi nuggets, and the challenges of hardware development. Kinzie also talks about favorite OS, CircuitPython, rising above online hate, and the importance of continuous learning in cybersecurity.

Jul 27, 2022 • 52min
#396: The Internet just changed.
You better be aware of what just changed on the Internet. TCP is being replaced with QUIC. UDP is being used more and more instead of TCP. This affects your firewalls. It affects a lot of your network troubleshooting. HTTP/3 has been standardized. Everything is encrypted with QUIC - welcome to the new world of network troubleshooting and security.
// MENU //
00:00 - The Problem with TCP
00:12 - Introducing//Robin Marx
02:12 - Clean Ship, Clean House//RFCs
03:25 - HTTP Semantics//QUIC//HTTP/3
04:17 - Why the Hell Do We Need HTTP/3?
05:05 - Why QUIC?
08:35 - QUIC & TLS Integration
10:02 - Why Use UDP?
13:50 - Replacing TCP with QUIC
14:28 - Summary So Far
15:22 - Stream Multiplexing
15:40 - Head-of-line blocking
18:40 - Why This Slows Things Down
19:29 - How QUIC Does It Differently
20:58 - TCP vs QUIC//Packet Handling
23:11 - HTTP/3 Prioritization
25:25 - Stats//QUIC Isn't Going Anywhere
26:30 - Firewalls are almost useless
27:20 - Firewalls Blocking QUIC?
28:04 - QUIC & Other Protocols?
29:20 - IPv4 & IPv6//Different for QUIC?
29:54 - Challenges for QUIC's Growth
30:43 - Connection Migration
33:33 - What About Hackers?
36:32 - How Do I Get To Use QUIC?
38:28 - Large Companies Adopting QUIC
39:09 - The Internet is Too Centralized?
40:02 - Header Compression
41:55 - Server Push
43:47 - Practical Examples with Wireshark
50:34 - Thank You & How to Contact Robin
// Robin SOCIAL //
Twitter: https://twitter.com/programmingart
LinkedIn: https://www.linkedin.com/in/rmarx/
YouTube: https://www.youtube.com/channel/UCyqP...
// Robin's Blog articles //
HTTP3 core concepts Part 1: https://www.smashingmagazine.com/2021...
HTTP3 core concepts Part 2: https://www.smashingmagazine.com/2021...
HTTP3 core concepts Part 3: https://www.smashingmagazine.com/2021...
// Chris Greer Videos //
HTTPS Decryption with Wireshark: https://youtu.be/GMNOT1aZmD8
Decrypting TLS, HTTP/2 and QUIC with Wireshark: https://youtu.be/yodDbgoCnLM
// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
http
https
quic
tcp
udp
http/1
http/2
http/3
wireshark
firewall
firewall quic
quic firewall
http/3 firewall
#http3 #quic #tcp