So you think locking your laptop will keep you safe? Well, think again. Need help? Join my Discord here: https://discord.com/invite/usKSyzb Menu: Demo of auto login: 0:00 Password: 0:36 Grab credentials: 0:59 What are we doing? 2:08 What did we manage to capture: 2:32 Quickcreds: 3:18 Rubber Ducky vs Bash Bunny: 4:16 Switch positions: 4:40 Firmware… Continue reading Security Myths: Your locked laptop keeps you safe
Passwords: Am i a joke to you? Big thanks to ITPro.TV for sponsoring this video. In future videos, Daniel will show us additional tools. Menu: It’s not my fault! 0:00 David – you’re dumb and other YouTube comments: 0:49 John quick demo: 1:16 Daniel’s favourite hacking tools: 2:50 Script kiddie demo: 4:03 Shadow file: 4:38… Continue reading Passwords: Am i a joke to you?
John Hammond demonstrates a CTF walkthrough and also explains the tools and techniques he uses to be more efficient. Menu: 0:00 ⏩ This stuff helps in your real world job 1:16 ⏩ Introduction 1:48 ⏩ picoCTF site 2:36 ⏩ Labs can be accessed at any time 3:12 ⏩ picoCTF labs 3:33 ⏩ First CTF walkthrough… Continue reading CTF Walkthrough with John Hammond
Do you agree with John? Please comment below. Are CTFs worth it? Do they help you get a job? Which are the best? Menu: 0:00 ⏩ Best option for a job interview 0:17 ⏩ John Hammond intro 0:48 ⏩ John’s CTFs walkthroughs 1:35 ⏩ What are CTFs? 3:00 ⏩ Why are CTFs good? 4:00 ⏩… Continue reading Are Hacking CTFs even real? Featuring John Hammond.
Do you agree with Neal? Please comment below. Which Cybersecurity training is best? Which vendors at the best? Neal presents his Cybersecurity training magic quadrant. Menu: 0:00 ⏩ You have to get hands on experience 1:11 ⏩ Neal DM $2k challenge 2:55 ⏩ Cybersecurity training magic quandrant 3:35 ⏩ Gartner 5:40 ⏩ Training quadrant 8:29… Continue reading Cybersecurity hacking path
Do you need to build your own Cybersecurity home lab? Or is it better to just use labs as a service offerings? Menu: 0:00 ⏩ Do you need your own Cybersecurity lab? 0:33 ⏩ Would you recommend a home lab? 2:00 ⏩ Roasting CCNAs and CCIEs 2:00 ⏩ Roasting CCNAs and CCIEs 3:20 ⏩ Failing… Continue reading Do you need a Cybersecurity home lab?
Will cybersecurity jobs be replaced by AI (artificial intelligence) or ML (machine learning)? Menu: 0:00 ⏩ Will AI replace cybersecurity jobs? 0:24 ⏩ Answer 0:40 ⏩ But why do you say that? Two mentalities 2:50 ⏩ You’re got to keep on learning 7:55 ⏩ This conversation has been going on for a long time 8:49… Continue reading Cybersecurity jobs replaced by AI?
Want to win courses, Capture the flags and merch? Now’s your chance. ======== Giveaway: ======== ITPro.TV 12 months access (2 winners): https://davidbombal.wiki/itprotv144 ITPro.TV T-shirts (10 winners): https://davidbombal.wiki/merch144 Tryhackme (5 winners): Link in the video HackTheBox (5 winners): Link in the video Wireshark course: https://davidbombal.wiki/wireshark414 CCNA course (limited to 1,000): https://davidbombal.wiki/ccna144 ================ Connect with me: ================… Continue reading Giveaway: Training, CTFs and Merch
The best CTFs (Capture the Flags)? How do you get practical experience? Big thanks to ITProTV for sponsoring this video. Menu: 0:00 ⏩ I get bored with theory! 0:40 ⏩ Why can this not be fun? 0:59 ⏩ What are capture the flags (vlunhub)? 1:55 ⏩ How is vlunhub different to hackthebox? 3:03 ⏩ Hacking… Continue reading Best CTF?
It’s now easy to install Kali Linux on Apple M1 silicon using Parallels. This is your first step to hacking with Apple silicon. You can resize your screen, connect to WiFi networks to hack and install Parallels software for easy copying. Parallels preview: https://bit.ly/parallelsm1 Kali Linux download: https://kali.org/downloads/ Need help? Join my Discord: https://discord.com/invite/usKSyzb WiFi… Continue reading Hacking WiFi with Apple M1?
Fix the TP-Link TL-WN722N WiFi Adapter in Kali Linux so you can hack WiFi networks using it. You can get the adapter to inject packets and set monitor mode once you update the drivers as I demonstrate in this video. Menu: TP-Link TL-WN722N Adapter differences: 0:00 Why do we care? 0:26 What I’m going to… Continue reading Kali Linux TP-Link TP-WN722N hacking
Fix Kali Linux drivers for Alfa AWUS036NHA, Alfa AWUS036ACM and Alfa AWUS036ACH adapters (and others). Recommended Adapters: Alfa AWUS036NHA: https://amzn.to/3wnyVen Alfa AWUS036ACM: https://amzn.to/3fCL4WT Alfa AWUS036ACH: https://amzn.to/3rLAjny or https://amzn.to/2PxkkMV Others: Alfa AWUS1900: https://amzn.to/31E0AtH Alfa Long-Range Dual-Band AC1200: https://amzn.to/34UUCEL Alfa AWUS036NEH: https://amzn.to/3sK2iW8 Panda PAU05: https://amzn.to/3ue23Da Panda PAU06: https://amzn.to/3wwqRZ8 Panda PAU09: https://amzn.to/3wosx6X WiFi Nation 802.11ac AC600:… Continue reading Kali Linux WiFi Alfa Adapter Fix
Learn how to check if a WiFi adapter supports monitor mode and packet injection. Use some basic commands in Kali Linux to check if you can hack WiFi networks using a WiFi adapter or network interface card. As always, only test against networks that you personally own or have permission to test. Be ethical. Learn… Continue reading Can I hack WiFi with this adapter?
What are the best WiFi Adapters for hacking in 2021? Do they work with Kali Linux or Parrot OS? Do you even need one? I answer all these questions in this video. Recommended Adapters: Alfa AWUS036NHA: https://amzn.to/3wnyVen Alfa AWUS036ACM: https://amzn.to/3fCL4WT Alfa AWUS036ACH: https://amzn.to/3rLAjny or https://amzn.to/2PxkkMV Others: Alfa AWUS1900: https://amzn.to/31E0AtH Alfa Long-Range Dual-Band AC1200: https://amzn.to/34UUCEL… Continue reading Best WiFi Hacking Adapters in 2021 (Kali Linux / Parrot OS)
What do I need to know before I become a hacker? Do I need to take certs before I become a hacker? What is a script kiddie? Previous video: https://youtu.be/7BaYLX1MYBQ Menu: ===== What do I need to know to become a hacker? 0:00 How do I know if I’m ready? 0:59 Give me the way:… Continue reading Born to hack?
Python WiFi DoS (Denial of Service) attack script. It’s very easy to destroy a wifi network using this simple Python script. Learn Python today. It will change your life. This script uses Wi-Fi deauthentication messages to stop all users from accessing a wifi network. In the background, we are using airmon-ng and airodump-ng to launch… Continue reading Python WiFi DoS (Denial of Service) attack
Are they making it too easy to hack? Need help? Go here: https://discord.com/invite/usKSyzb Menu: Are they making hacking too easy? 0:00 Story 1: Companies doing dumb things: 0:40 Are Blackberry phones the best? 2:18 Example of why people steal data: 3:42 Story 2: CEO doesn’t want any tools: 4:40 It’s a joke really: 6:35 Rockyou… Continue reading Hacking: Too easy?
Massive 500K Giveaway – lots of prizes to be won! Thank you for your support! =========== Giveaway: =========== Free INE courses: https://bit.ly/freeinetraining INE Premium Annual Membership (3 winners): https://bit.ly/ine12months INE $50 apparel store gift cards (5 winners): https://bit.ly/inemerch $500 Amazon eGift (2 winners): https://bit.ly/500k500 Free Wireshark course: http://bit.ly/wireshark500 Free CCNA course: See link in video… Continue reading Massive 500K Giveaway
Learn how to create both a Python sockets and a Python nmap port scanner. These are the beginning of a journey into Python Ethical hacking. ================ Scripts using regex: ================ Socket method: https://github.com/davidbombal/red-python-scripts/blob/main/port_scanner_regex.py nmap method: https://github.com/davidbombal/red-python-scripts/blob/main/nmap_port_scanner.py ==================== Scripts using IP address: ==================== Socket method: https://github.com/davidbombal/red-python-scripts/blob/main/port_scanner_ip_obj.py nmap method: https://github.com/davidbombal/red-python-scripts/blob/main/nmap_port_scanner_ip_obj.py Menu: Python port scanner nmap and sockets:… Continue reading Python nmap port scanner
Another day. Another hack. Will they ever learn? Menu: Another day, another hack: 0:00 Treatment plant BLUF: 0:29 Airforce hack: 2:47 Neal’s water-treatment past example: 4:12 Cyberwar can shut down an entire military base: 5:50 Is security implemented properly? 6:53 Neal’s challenge to you: 8:07 Dog house: 8:40 How to get the message across:… Continue reading Will they never learn?