You must fight!

If you don’t fight, who will? You have to fight! John Hammond shares a real world example of hacking and how you need to learn to hack to protect companies. Red teams and offense security in companies are required. Menu: You must learn to hack! 0:00 Best defence is offense: 1:13 Zero day? 1:49 John… Continue reading You must fight!

You must learn to hack! Be quick!! (Giveaway included)

You must learn how to hack! Be quick! Places are limited! Practical Ethical Hacking for Beginners (Pay or Free): Support us for $12.99: https://davidbombal.wiki/4hacknow Get it for $9:99: https://davidbombal.wiki/4999 Pay it forward // FREE (Limited): https://davidbombal.wiki/4julyfree CompTIA Network+ Get it for 9:99: https://davidbombal.wiki/july4999 ================ Connect with me: ================ Discord: http://discord.davidbombal.com ​ Twitter: https://www.twitter.com/davidbombal​ Instagram: https://www.instagram.com/davidbombal​… Continue reading You must learn to hack! Be quick!! (Giveaway included)

Burp suite

Learn the basics of burpsuite. Start using Burp with web applications. Menu: What is Burp Suite is designed to do: 0:00 Introduction: 0:35 Versions of Burp Suite: 1:12 How does Burp Suite fit into Kali Tools: 2:04 Lab Demo: 4:39 What are we doing? 5:20 Start BurpSuite: 5:45 GUI: Lots of stuff! 8:28 Where to… Continue reading Burp suite

Security Myths: Your locked laptop keeps you safe

So you think locking your laptop will keep you safe? Well, think again. Need help? Join my Discord here: https://discord.com/invite/usKSyzb Menu: Demo of auto login: 0:00 Password: 0:36 Grab credentials: 0:59 What are we doing? 2:08 What did we manage to capture: 2:32 Quickcreds: 3:18 Rubber Ducky vs Bash Bunny: 4:16 Switch positions: 4:40 Firmware… Continue reading Security Myths: Your locked laptop keeps you safe

Passwords: Am i a joke to you?

Passwords: Am i a joke to you? Big thanks to ITPro.TV for sponsoring this video. In future videos, Daniel will show us additional tools. Menu: It’s not my fault! 0:00 David – you’re dumb and other YouTube comments: 0:49 John quick demo: 1:16 Daniel’s favourite hacking tools: 2:50 Script kiddie demo: 4:03 Shadow file: 4:38… Continue reading Passwords: Am i a joke to you?

Metasploit

Daniel demonstrates how to gain access to a Windows and Linux server using metasploit. This is one of his favourite tools. Big thanks to ITPro.TV for sponsoring this video. In future videos, he will show us additional tools. ====== Menu: ====== Menu: We like win: 0:00 ​ I am administrator: 0:25 ​ Linux access: 0:40​… Continue reading Metasploit

CTF Walkthrough with John Hammond

John Hammond demonstrates a CTF walkthrough and also explains the tools and techniques he uses to be more efficient. Menu: 0:00​ ⏩ This stuff helps in your real world job 1:16​ ⏩ Introduction 1:48​ ⏩ picoCTF site 2:36​ ⏩ Labs can be accessed at any time 3:12​ ⏩ picoCTF labs 3:33​ ⏩ First CTF walkthrough… Continue reading CTF Walkthrough with John Hammond

SQL Injection

Daniel demonstrates SQL Injection using sqlmap. This is one of his favourite tools. Big thanks to ITPro.TV for sponsoring this video. In future videos, he will show us additional tools. ====== Menu: ====== SQL Injection Demo: 0:00 ​ Daniel’s top 5 hacking tools: 1:40 ​ SQL Injection: sqlmap and DVWA: 2:31​ Don’t get shiny bracelets:… Continue reading SQL Injection

Are Hacking CTFs even real? Featuring John Hammond.

Do you agree with John? Please comment below. Are CTFs worth it? Do they help you get a job? Which are the best? Menu: 0:00​ ⏩ Best option for a job interview 0:17​ ⏩ John Hammond intro 0:48​ ⏩ John’s CTFs walkthroughs 1:35​ ⏩ What are CTFs? 3:00​ ⏩ Why are CTFs good? 4:00​ ⏩… Continue reading Are Hacking CTFs even real? Featuring John Hammond.

Cybersecurity hacking path

Do you agree with Neal? Please comment below. Which Cybersecurity training is best? Which vendors at the best? Neal presents his Cybersecurity training magic quadrant. Menu: 0:00​ ⏩ You have to get hands on experience 1:11​ ⏩ Neal DM $2k challenge 2:55​ ⏩ Cybersecurity training magic quandrant 3:35​ ⏩ Gartner 5:40​ ⏩ Training quadrant 8:29​… Continue reading Cybersecurity hacking path

Do you need a Cybersecurity home lab?

Do you need to build your own Cybersecurity home lab? Or is it better to just use labs as a service offerings? Menu: 0:00​ ⏩ Do you need your own Cybersecurity lab? 0:33​ ⏩ Would you recommend a home lab? 2:00​ ⏩ Roasting CCNAs and CCIEs 2:00​ ⏩ Roasting CCNAs and CCIEs 3:20​ ⏩ Failing… Continue reading Do you need a Cybersecurity home lab?

Cybersecurity jobs replaced by AI?

Will cybersecurity jobs be replaced by AI (artificial intelligence) or ML (machine learning)? Menu: 0:00​ ⏩ Will AI replace cybersecurity jobs? 0:24​ ⏩ Answer 0:40​ ⏩ But why do you say that? Two mentalities 2:50​ ⏩ You’re got to keep on learning 7:55​ ⏩ This conversation has been going on for a long time 8:49​… Continue reading Cybersecurity jobs replaced by AI?

Kali Linux TP-Link TP-WN722N hacking

Fix the TP-Link TL-WN722N WiFi Adapter in Kali Linux so you can hack WiFi networks using it. You can get the adapter to inject packets and set monitor mode once you update the drivers as I demonstrate in this video. Menu: TP-Link TL-WN722N Adapter differences: 0:00​ Why do we care? 0:26​ What I’m going to… Continue reading Kali Linux TP-Link TP-WN722N hacking

Can I hack WiFi with this adapter?

Learn how to check if a WiFi adapter supports monitor mode and packet injection. Use some basic commands in Kali Linux to check if you can hack WiFi networks using a WiFi adapter or network interface card. As always, only test against networks that you personally own or have permission to test. Be ethical. Learn… Continue reading Can I hack WiFi with this adapter?

Born to hack?

What do I need to know before I become a hacker? Do I need to take certs before I become a hacker? What is a script kiddie? Previous video: https://youtu.be/7BaYLX1MYBQ​ Menu: ===== What do I need to know to become a hacker? 0:00​ How do I know if I’m ready? 0:59​ Give me the way:… Continue reading Born to hack?

Hacking: Too easy?

Are they making it too easy to hack? Need help? Go here: https://discord.com/invite/usKSyzb​ Menu: Are they making hacking too easy? 0:00​ Story 1: Companies doing dumb things: 0:40​ Are Blackberry phones the best? 2:18​ Example of why people steal data: 3:42​ Story 2: CEO doesn’t want any tools: 4:40​ It’s a joke really: 6:35​ Rockyou… Continue reading Hacking: Too easy?

Will they never learn?

Another day. Another hack. Will they ever learn? Menu: Another day, another hack: 0:00​ Treatment plant BLUF: 0:29​ Airforce hack: 2:47​ Neal’s water-treatment past example: 4:12​ Cyberwar can shut down an entire military base: 5:50 ​ Is security implemented properly? 6:53​ Neal’s challenge to you: 8:07​ Dog house: 8:40​ How to get the message across:… Continue reading Will they never learn?

Top 5 Blue Team Hacking Books

What at the top 5 blue team hacking books? Neal tells us his favourite books. Did we miss any great books? Want red team books? Watch this video: https://youtu.be/VrayWzHKVw4​ Menu: Top blue team hacking books for 2021: 0:00​ Book 1: The Threat Intelligence Handbook: 0:47​ Book 2: The Risk Business: 2:05​ Why is this important:… Continue reading Top 5 Blue Team Hacking Books

The best hacking cert?

What’s the best hacking cert? Where do you start? Big thanks to ITPro.TV for sponsoring this video. I really pushed Daniel in this video – he did a great job answering all my difficult questions. ===== Menu: ===== Intro: what is the best hacking certificate: 0:00​ Who is Daniel? 0:46​ Hard question: Which is the… Continue reading The best hacking cert?

How to get your first Cybersecurity job

This how to get your first Cybersecurity job! Start today. Need help? Go here: https://discord.com/invite/usKSyzb​ You can break into the hacking and cybersecurity field. If you want to be on the red team or the blue team, you can do this. Use this tips so you can start your hacking career today. Menu: How to… Continue reading How to get your first Cybersecurity job


Fatal error: Uncaught Error: Call to undefined function davidbombal_get_icon_svg() in /homepages/37/d249233752/htdocs/davidbombal/wp-content/themes/davidbombal/inc/template-tags.php:232 Stack trace: #0 /homepages/37/d249233752/htdocs/davidbombal/wp-content/themes/davidbombal/archive.php(31): davidbombal_the_posts_navigation() #1 /homepages/37/d249233752/htdocs/davidbombal/wp-includes/template-loader.php(106): include('/homepages/37/d...') #2 /homepages/37/d249233752/htdocs/davidbombal/wp-blog-header.php(19): require_once('/homepages/37/d...') #3 /homepages/37/d249233752/htdocs/davidbombal/index.php(17): require('/homepages/37/d...') #4 {main} thrown in /homepages/37/d249233752/htdocs/davidbombal/wp-content/themes/davidbombal/inc/template-tags.php on line 232