Don’t make the mistake of exposing your IP address and personal data. Make sure that you hack like a ghost. Doesn’t matter if you just want privacy online or you want to be invisible. // MENU // 00:00 – Coming up 00:29 – Disclaimer 00:33 – Sparc Flow and How to Hack Like… books overview… Continue reading How to be Invisible online and Hack like a Ghost
Free Course: https://www.youtube.com/c/RanaKhalil101 50% OFF Web Security Academy Course Code: DavidBombal500FF Academy: https://academy.ranakhalil.com/ 8 hour SQL Injection playlist: https://www.youtube.com/watch?v=1nJgupaUPEQ&list=PLuyTk2_mYISLaZC4fVqDuW_hOk0dd5rlf&index=2 In this video Rana explains and demonstrates Broken Access Control which is number 1 on the OWASP top 10: https://owasp.org/www-project-top-ten/ // MENU // 00:00 – Intro 00:25 – Ads 01:38 – Opening 02:36 – Broken Access… Continue reading Free Web Hacking Course
Big thanks to Lab401 for sending me some cool toys: https://lab401.com/ The Flipper Zero must be one of the most in demand hacking tools of 2022. A fantastic RFID / NFC / Infrared and more tool 🙂 Flipper Zero: https://lab401.com/products/flipper-zero?variant=42927883452646 Pentester packs: Standard: https://lab401.com/products/lab401-pentester-pack?variant=43102049698022 Advanced: https://lab401.com/products/lab401-pentester-pack?variant=43102049730790 // MENU // 00:00 – This is the Flipper… Continue reading Flipper Zero: Hottest Hacking Device of 2022?
How to get experience with no experience? Have a look at bug bounty programs. Vickie Lee demos Insecure Direct Object References (IDOR) and tells us how to get into bug bounty. We also discuss why her book Bug Bounty Bootcamp is a fantastic book to buy if you want to get into bug bounty. Get… Continue reading Hack websites demo and how to get paid for real hacks
Don’t use poor passwords and common WiFi passwords. If you do, it’s possible to hack a WiFi network using just a phone. May this be a warning to you and your family. Use strong WiFi passwords in your networks. Note: I’ll cover Android Nethunter WiFi hacking in another video. // MENU // 00:00 – Coming… Continue reading Is it possible to hack WiFi with a phone?
I wish this was just clickbait! Unfortunately my YouTube channel got hacked recently. In this video I explain more and share some lessons I’ve learned. I’m hoping that this helps educate both you and your family. I answer questions like: – Do I fire the person responsible? – Did we not use 2FA? – What… Continue reading My YouTube channel got hacked! (not clickbait)
The machines are already tracking and watching you. And they’re influencing you. The future looks bleak. Do you really want to live in a Skynet world? I interview Rob Braxman – the Internet Privacy Guy. He’s a public interest hacker and technologist. He uses his extensive knowledge of cybersecurity and tech to serve the public… Continue reading Is Skynet watching you already?
Social engineering, phishing, vishing, people hacking – these result in 70 – 90% of cyber attacks. See FREE Resources Below. Social engineering (SE) is defined as any act that uses persuasion strategies to influence individuals to take an action that may or may not be in their best interests. Cyberadversaries are increasingly using SE in… Continue reading 80% of hacks are done this way! People are the weakest link.
#1 reason for data breaches is insecure software. Software badly needs to be made more secure – lots of opportunities here to either hack applications or help application developers secure them. Learn application security (appsec) for free with shehackspurple. // MENU // 00:00 – Let’s start with a bang! 00:28 – Introduction//Tanya Janca 03:48 –… Continue reading Free AppSec courses! Hacking apps is just too easy – help developers secure their code
Create your own virtual machine on Linode with a 60-day $100 credit: https://davidbombal.wiki/linode If that link doesn’t work for you, try this link: https://www.linode.com/lp/youtube-viewers/?ifso=davidbombal Please note: Credits expire in 60 days. Big thanks to Linode for sponsoring this video! Kali Linux can be installed on many types of devices. Here I show you how to… Continue reading Kali Linux on all the things! (6 minute install)
I interview Corey Ball who wrote the book “Hacking APIs” and he tells us about his book and the free training he is making available. This is a cool announcement 🙂 // MENU // 00:00 – Why talk about pentesting at all? 00:21 – Welcome//Corey 00:48 – What is an API and Why Care? 01:52… Continue reading Free API Hacking course!
Cori shows us how easy it is to set up a phishing campaign and hack companies. Be warned! Cori was kind enough to give my domain back to me: https://discord.gg/davidbombal – Thanks Cori 🙂 // MENU // 00:00 – Coming up 00:35 – Introduction 01:28 – Cori’s Twitter and website 02:14 – Cori’s background 02:58… Continue reading She hacked me!
A cautionary tale: An Ethical hacker jailed for reporting a serious vulnerability. It is very unfortunate how being ethical can still result in jail time. This is one of those stories. Be very cautious and careful with your skills. Darknet Dairies: https://darknetdiaries.com/episode/25/ // MENU // 00:00 – Hacking is Not a Crime 00:43 – Introduction//Alberto… Continue reading Is it safe to hack?
Big thank you to Cisco for sponsoring this video. Learn about Cisco Small Business Solutions here: https://davidbombal.wiki/ciscosmb Learn to hack in 60 second TikToks! Is that even possible? Well, Serena shows us how she teaches hacking concepts in short TikTok / YouTube shorts. It’s amazing how much information she can share in such a short… Continue reading Learn to hack in 60 seconds?
Is there a future for you in Bug Bounty? Can you make money out of buy bounty? Is this a full time or part time job? STÖK answers these questions and many more 🙂 Real answers to real world questions. Are you too young? Are you too young? Can you make lots of money in… Continue reading Bug Bounty 2022 Guide: Where to focus // Money // Get started