Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content. David’s details: Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com YouTube: https://www.youtube.com/davidbombal All the best! David

Big thank you to Infoblox for sponsoring this video. For more information on Infoblox have a look at their website: https://www.infoblox.com/ // Get Wireshark Certified // Check out the official training course

In this video, we dive into a real-world Red Team vs. Blue Team scenario. We simulate a cyberattack on a Finance Application that has integrated a new LLM Chatbot. You'll see firsthand how attackers use Prompt Injection to bypass standard rules, how they move laterally through Kubernetes clusters, and how they attempt to execute Zero Day exploits. More importantly, we show you how to defend against it. Using Cisco's Hybrid Mesh Firewall, AI Defense, and Secure Workload, we demonstrate how to: 1. Detect & Block Prompt Injections: safeguarding your LLMs from manipulation. 2. Secure Kubernetes: using micro-segmentation to isolate threats in the cloud. 3. Inspect Encrypted Traffic: utilizing the Encrypted Visibility Engine (EVE) to spot malware in TLS flows without decryption. Whether you are a Network Engineer, Security Analyst, or just interested in how AI is changing the cybersecurity landscape, this demo is packed with practical insights Big thank you to Cisco for sponsoring my trip to Cisco Live Amsterdam. // Ant Ducker SOCIALS // LinkedIn: / ant-ducker-0052801 YouTube channel dCloud: / @ciscodcloud // Website REFERENCE // Cisco Security Cloud control: https://sign-on.security.cisco.com/ Cisco.com: https://www.cisco.com/site/us/en/solu... // YouTube Video REFERENCE // Rick Miles' video will be linked at a later stage once published. / David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:29 - Intro 02:20 - Demo Overview 03:57 - Demo Begins 09:35 - Adding Guardrails 11:45 - Secure Workloads 14:30 - Segmentation Workflow 18:33 - Overviewing Finance App 21:02 - Encrypted Visibility Engine 24:34 - Firewall Obversability and Control 25:44 - Ant's Advice For The Youth 26:40 - How to Learn Hybrid Mesh Firewall 28:16 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

The bottleneck in AI isn't compute anymore, it's the network. In this video, I sit down with Martin, the architect behind Cisco's Silicon One, to discuss the massive leap to 100 Terabits per second. We go deep into the silicon level to understand how "intelligent agents" embedded in the hardware are solving the packet loss problem for massive AI training clusters. We cover the new 1.6T Linear Pluggable Optics (LPO), why Cisco is becoming the "Apple of Networking" by building their own full stack, and why they believe Ethernet has officially won the data center war. Topics Covered: • Cisco Silicon One: The architecture behind the 100Tbps & 51.2Tbps chips. • AI Scale: How to interconnect 128,000 GPUs without stalling. • Hardware Agents: Real-time traffic rerouting at the silicon level. • 1.6Tbps Optics: Moving DSPs out of the module to save power (LPO). • Ethernet vs. InfiniBand: Why standard Ethernet is winning in AI. Big thank you to @Cisco for sponsoring my trip to Cisco Live Amsterdam! // Martin Lund SOCIALS // LinkedIn: / martinlundca // Website REFERENCE // https://blogs.cisco.com/sp/cisco-sili... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:09 - Intro 01:42 - Cisco's New Announcement (G200 Chip) 02:32 - How Many Companies Are Doing This? 05:02 - Is Cisco The 'Apple' Of Networking? 07:30 - Intelligent Collective Networking 08:09 - Who Designed The Chip? 08:56 - Cisco's New Optical Module 09:59 - Why Do We Need These Speeds? 15:46 - Data Center Scale 16:50 - Cisco Switches 19:16 - Who Is The Target Audience? 20:23 - Linear Pluggable Optics (LPO) 22:04 – Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

Big thanks to @Cisco for sponsoring this video and sponsoring my trip to Cisco Live Amsterdam. Will AI replace network engineers in 2026? In this video, I sit down with Joe Vaccaro (VP/GM of Cisco ThousandEyes) to reveal the truth about "Agentic Ops" and how it differs from traditional AIOps. We dive deep into the new "Digital Teammate" concept within ThousandEyes and demo exactly how AI agents can autonomously troubleshoot complex network outages (like DHCP and DNS failures) in seconds. Instead of taking your job, Joe explains how these agents act as a force multiplier for your career—handling the tedious "mean time to innocence" tasks so you can focus on architecture. If you are worried about the future of the CLI or manual troubleshooting, you need to see this demo. Key Topics Covered: • Cisco Agentic Ops Explained: Joe Vaccaro breaks down the shift to autonomous reasoning. • ThousandEyes Demo: Watch an AI agent diagnose a DHCP failure and suggest the exact fix (subnet expansion). • Views Explainability: How to troubleshoot "unknown paths" and ISP outages (like AWS/Azure) automatically. • Career Survival Guide: Why Cisco believes AI will train the next generation of CCIE-level engineers, not replace them. //Joe Vaccaro's SOCIAL // Cisco Blogs: https://blogs.cisco.com/author/vaccaroj LinkedIn: / joevaccaro X: https://x.com/joevaccaro X: https://x.com/thousandeyes Website: https://www.thousandeyes.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:42 - Troubleshooting 02:00 - ThousandEyes Updates 03:52 - Demo 1 06:50 - Agentic Steps on a network 07:26 - Demo 2 10:50 - ThousandEyes Outages Page 11:34 - Agents in ThousandEyes 13:49 - New Demands by AI 14:14 - Will AI Replace Network Engineers ? 15:15 - Will The Agents Need a Human in the loop? 16:10 - Will This become More Autonomous ? 16:48 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partners' Summit 2025 // Anurag Dhingra SOCIALS // Cisco Blogs: https://blogs.cisco.com/author/anurag... X: https://blogs.cisco.com/author/anurag... LinkedIn: / anurag-dhingra // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:34 - Intro 01:55 - How is AI Affecting Networking 03:55 - Agentic AI 07:05 - Cisco Agents 09:15 - Cisco Evolving Devices 12:16 - Local AI in Manufacturing Companies 13:17 - Edge AI (Cisco Unified Edge) 16:00 - Practical Use of AI Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #agenticai #cisco #ciscops25

Deutsche Telekom reveals how they blocked a massive car hack that dropped 100,000 connections instantly. We discuss the truth about 6G, the future of 5G satellites, and securing 240 million devices. A big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025. // Niklas Horstmann SOCIAL // LinkedIn: / niklas-horstmann // Website REFERENCE // https://www.t-mobile.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:44 - Intro 01:35 - Networking & Security 04:22 - Germany's Internet Problems 05:38 - Emerging Technologies 08:30 - Will Cellphones Use Satellite? 09:58 - Intelligent Networks 16:08 - Niklas' Cool Story 18:06 - Niklas' Advice for the Youth 19:11 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #6g #5g #deutschetelekom

Cisco is offering 200+ free training courses to help you master AI and networking. In this interview, we discuss why 78% of tech roles now require AI skills and how to future - proof your career in 2025. // Sponsored SEGMENT // A big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 // Fran Katsoudas' SOCIAL // LinkedIn: / fkatsoudas // Website REFERENCE // https://www.netacad.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:42 - AI changing career roles 04:03 - The Workforce Consortium // Free training 06:36 - The Networking Academy (NetAcad) 10:12 - Cisco Edge Center // Impact on lives 13:25 - Network is "sexy" 15:07 - Advice for the youth in tech 17:18 - How to stay motivated 18:56 - How NetAcad changes lives 21:56 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscops25 #freetraining

In this interview Vijoy Pandey from Cisco Outshift discusses the "Internet of Agents," the donation of the AGNTCY framework to the Linux Foundation, and the new open-source SRE tool "Cape." Plus, how Swisscom is using agentic workflows to validate networks. Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partners' Summit 2025 // Vijoy Pandey SOCIALS // LinkedIn: / vijoy X: https://x.com/vijoy // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 00:37 - Introduction 01:00 - What is Internet of Agents? 02:11 - The 4 Steps of Internet of Agents 03:25 - Project AGNTCY 04:40 - A DNS of the Agentic Internet 06:07 - To What End is the Agency Stack 07:21 - Use-cases for the Agency Stack 11:28 - The Future of the Agency Stack 12:55 - Guardrails for Agents 13:38 - Timeline for the Integration of Agents 14:51 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #agenticai #agntcy #cisco @Cisco

Data centers are wasting 70% of their power. Discover how Immersion Cooling and Fault-Managed Power (Class 4) are solving the AI energy crisis in 2025. In this video, we explore why we are drowning servers in oil and the new skills network engineers need to learn. Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 // Denise Lee's SOCIALS // Cisco Blogs: https://blogs.cisco.com/author/deniselee LinkedIn: / deniseleeyeh X: https://x.com/deniseleeyeh // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:47 - Addressing water and power usage in data centers 03:17 - Fault managed power explained 05:45 - Saving energy in data centers // Immersion cooling 10:22 - Addressing noise issues from data centers 11:56 - The cons of a data center 13:36 - Optimizing data centers 14:37 - Advice for the young generation 17:23 - More data centers and more jobs 18:50 - Sustainability for data centers 20:57 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #sponsored #ciscops2 @Cisco

Is AI replacing network engineers? Liz Centoni (Cisco EVP) reveals how Agentic AI is transforming Cisco TAC and network automation. Discover why 77% of support cases are now handled by AI and what this means for your career in 2025. A big thank you to Cisco for sponsoring this video and for sponsoring my trip to Cisco Partner Summit San Diego 2025 // Liz Centoni SOCIAL// LinkedIn: / lizcentoni // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:08 - Intro 01:28 - Customer Experience 02:01 - Cisco TAC 02:42 - AI & Agentic AI 05:13 - Usage of Agents 07:15 - Will AI Take Jobs Away? 09:18 - Intelligent Call Routing 13:20 - Challenges with Agents 16:57 - Quantum Computing 18:03 - Liz's Advice for the Youth 19:32 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #ai #agenticai #quantumcomputing

Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 Imagine trying to run a high-tech hospital inside a giant steel box while floating off the coast of Africa. In this video, we explore the insane engineering challenges behind Mercy Ships from battling Faraday cages to fixing cut fiber cables mid-surgery. // Grady Nichols' SOCIAL // LinkedIn: / gradynichols // Robert Kim's SOCIAL // LinkedIn: / robertgkim // Mercy Ships SOCIAL // LinkedIn: / mercy-ships X: https://x.com/mercyships // Website REFERENCE // https://mercyships.co.za/ https://www.presidio.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:47 - Who is Mercy Ships? // Changing lives 04:00 - Facing challenges 08:48 - Setting up Wi-Fi on the ship 09:28 - Data centers on the ship 11:39 - Attracting donators for Mercy Ships 13:35 - Adding protection in designing in the ship 14:25 - Using AI for efficiency 17:08 - New ship 19:45 - When things go wrong 23:10 - How to support Mercy Ships 24:40 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #wifi #networking

A big thank you to Cisco for sponsoring this video. Kamal Hathi (GM at Splunk) reveals "Machine GPT" and explains why standard LLMs fail at processing machine data. Learn how Splunk's new open weights model helps you predict outages and secure networks before they happen. // Kamal Hathi's SOCIAL // LinkedIn: / kamal-hathi // Website REFERENCE // https://www.splunk.com/en_us/blog/lea... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 00:48 - Intro 01:53 - How AI is Trained 03:10 - AI and Machine Data 04:02 - What is Machine GPT? 07:00 - How MachineGPT will help People 08:53 - What MachineGPT Could Tell Us 11:46 - MachineGPT Interface and Splunk 16:50 - About the Splunk Platform and Products 17:46 - The Future of AI and Machine Data 18:43 - AI as an Independent Creator 20:16 - AI and Security 21:51 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #machinelearning #sponsored

In this video David speaks to Peter Bailey (SVP and GM of Cisco's Security business). AI agents are moving fast inside enterprises, and CISOs are hitting the brakes for one reason: the attack surface is expanding at machine speed. In this interview, we break down how agentic AI changes security, why MCP servers and agent tool access create new risks, and what a zero trust approach looks like when the “user” is a non-deterministic agent. We cover real-world problems like shadow MCP servers, agents touching sensitive systems and PII, and why traditional perimeter controls and firewalls are not enough when traffic is encrypted and actions happen too quickly downstream. You'll also hear what Cisco is doing across the AI lifecycle: AI Defense for model scanning, provenance and guardrails, plus new protections focused on agent identity, dynamic authorization, behavior monitoring, and revocation. On the networking side, we discuss how SD-WAN and secure access (SASE) can add visibility and policy control for AI usage, including prioritizing latency-sensitive AI traffic while still enforcing security. If you're a security engineer, network engineer, or CISO trying to move from AI hype to safe deployment, this video gives you a practical mental model and the controls to start building now. Big thank you to @Cisco for sponsoring this video and for sponsoring my trip to Cisco Live Amesterdam. // Peter Baily' SOCIALS // LinkedIn: / peterhbailey Guest Bio: https://newsroom.cisco.com/c/r/newsro... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:30 - Introduction 01:15 - CISOs Problems with AI 02:35 - Real Issues with AI Agents 04:29 - Growth of the Attack Surface 05:34 - Concern of Poisoned AI and MCP 08:09 - What is the Kill-chain 10:16 - AI with Built-in Security 11:56 - Best Practises for AI Security 14:08 - Cisco Innovations for AI 16:48 - Cisco's Red Team for own AI 18:27 - Secure AI in Public Places 20:09 - Should You get into Cyber Security 21:26 - Advice To Your Younger Self 22:29 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscoemea #ciscolive

Cisco just announced massive changes for 2026, including free AI training, a new Ethical Hacking certificate, and the return of the Wireless track. In this video, I sit down with Ryan and Lacey from Cisco to break down the biggest updates to the certification portfolio since 2020. Whether you are looking to break into Red Teaming with the new Ethical Hacker track, recertify your CCNA/CCNP using free CE credits, or master the new AI infrastructure, this guide covers everything you need to know to level up your career for free. What's Inside: • Free AI Training: How to get 16+ CE credits through the new RevUp program. • Ethical Hacking: Details on the new "Red Team" certificate and where to find the free course. • Wireless is Back: The return of the CCNP and CCIE Wireless tracks. • Cybersecurity Overhaul: CyberOps is evolving into CCNA/CCNP Cybersecurity. • Recertification Hack: How to use these free courses to renew your existing certifications without paying for exams. Big thank you to Cisco for sponsoring my trip to Cisco Live Amsterdam // FREE courses // Cisco AI Technical Practitioner | AITECH: https://u.cisco.com/paths/cisco-ai-te... Cisco AI Business Practitioner | AIBIZ: https://u.cisco.com/paths/cisco-ai-bu... Free Ethical Hacking Course: https://www.cisco.com/site/us/en/lear... Understanding Cisco Network Automation Essentials (DEVNAE): https://learningnetwork.cisco.com/s/f... Blog entry about Rev Up: https://learningnetwork.cisco.com/s/q... // Other courses - NOT free // Cisco Silicon One for AI Networking | DCSOAI: https://u.cisco.com/paths/cisco-silic... Enhancing Cisco Security Solutions with Splunk | ECSS: https://u.cisco.com/paths/cisco-splun... Cisco Silicon One for AI Networking | DCSOAI: https://u.cisco.com/paths/enhancing-c... CCNA Automation: https://www.cisco.com/site/us/en/lear... Programming for Network Engineers | PRNE: https://u.cisco.com/paths/programming... // Ryan Rose's SOCIAL // LinkedIn: / ryanrose3 Cisco Blogs: https://blogs.cisco.com/author/ryanrose X: https://x.com/RyanRose // Lacey Senko SOCIAL // LinkedIn: / laceycsenko // Websites and YouTube Channel links // Career Map / Path: https://www.cisco.com/c/dam/en_us/tra... Learn Cisco: / @ciscoutube Cisco U: https://u.cisco.com/ Cisco Networking Academy: https://www.cisco.com/site/us/en/lear... Cisco Learning Network: https://learningnetwork.cisco.com/s/ Netacad: https://www.netacad.com Cisco Learning Community: https://learningnetwork.cisco.com/s/ Free Ethical Hacking Course: https://www.cisco.com/site/us/en/lear... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Introduction 0:48 - Rev Up Updates 02:36 - What are CE Credits? 03:27 - Cisco Learning Network Community 06:14 - How Cisco CCNA Changes Lives 07:06 - Cisco Live Announcements Training 12:04 - Navigating Cisco Learning Network Site 14:25 - CiscoU Free Account 14:49 - Cyber & AI Security Learning Track 17:16 - Ethical Hacker Certificate 19:16 - Everything under the Learn with Cisco Brand 21:20 - Passing of Knowledge through Cisco 23:13 - Where Does a Person Start? 24:35 - Parting Words Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

Are you ready to see the 7 digital investigation tools that completely changed how I look at the internet? In this video, I'm REVEALING a powerful stack of OSINT (Open Source Intelligence) and research tools that most people have zero clue exist. These are absolute game-changers. Subscribe for more cutting-edge tech and security tools: The internet is vast, but finding the right information, or knowing what information about you is out there, requires the right toolkit. I was genuinely shocked by the advanced capabilities of some of these applications. Whether you are a cybersecurity researcher, a journalist, a private investigator, or just someone who wants to master digital reconnaissance and protect their privacy, this list of 7 secret tools will upgrade your skillset immediately. We are breaking down tools for deep email searching, uncovering hidden data in PDFs, mapping global networks, and analyzing trends that standard search engines completely miss. // MJ Banias' SOCIALS // LinkedIn: / mjbanias Cloak and Dagger Podcast (Spotify): https://open.spotify.com/show/6mT8zDM... The Debrief: https://thedebrief.org/podcasts/ Instagram: / mjbanias X: https://x.com/mjbanias Website: https://www.bullshithunting.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Introduction 01:17 - Who is MJ Banias? 03:55 - MJ Banias' Favourite OSINT Tools 04:28 - Bullsh*t Hunting 06:10 - Tool 1 - WhatsMyName Web 09:47 - Tool 2 - DorkGPT and Dork Search Pro 14:30 - Tool 3 - OD Crawler 16:59 - Tool 4 - Kagi Browser 21:55 - Tool 5 - Ubikron 26:35 - Tool 6 - newspapers.com and Judy Records 34:56 - Tool 7 - OSINT Industries 40:15 - Maltego 42:54 - Darkside and Breach Data 49:03 - Privacy Laws in America and beyond 50:57 - Plugs From MJ Banias 51:35 - MJ Banias Socials 52:25 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #osint #osinttools #privacy

Is this the most powerful network switch ever built? In this interview from Cisco Live, we look at the new generation of Cisco 8000 and Nexus switches capable of routing 100 Terabits per second. We break down why AI data centers are forced to move from air cooling to liquid cooling, and how a single switch chassis can now handle the equivalent mobile traffic of 100 million people. AI models are growing faster than the infrastructure can keep up. To solve this, the network switch had to evolve. In this video, I talk to Will from Cisco about the engineering challenges of building the "G300" generation of switches, hardware so dense that air cooling is no longer enough. We discuss the massive architectural shift occurring in data centers, where Liquid Cooled Switches are becoming the new standard to support 1.6T Ethernet ports and massive GPU clusters. Key Hardware Topics: • The 100 Terabit Chassis: How Cisco architecture handles massive throughput. • Liquid Cooling: Why switches are adopting "direct-to-chip" cooling just like gaming rigs. • Scale-Out Networking: How these switches manage congestion for AI training jobs (Job Completion Time). • Career Insights: Will manages 5,000 engineers and explains why understanding the physical layer and hardware constraints is a superpower for modern developers. Big thanks to Cisco for sponsoring my trip to Cisco Live EMEA and for changing my life and the lives of many other people. // Will Eatherton SOCIAL // LinkedIn: / willeatherton Newsroom: https://newsroom.cisco.com/c/r/newsro... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:49 - Will Eatherton introduction and projects // Hyperscale, neocloud & enterprises 08:03 - New Cisco hardware // Silicon One G300 13:18 - Data centers + AI + GPUs 16:27 - G300 use case & Cisco Nexus 21:56 - Liquid-cooled switches 24:12 - Networking as a career path 28:41 - Development and opportunities in networking 30:14 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video. In this interview, David Bombal sits down with Dr. Mike Pound (Computerphile) to clear up one of the biggest crypto misconceptions on the Internet: hashing is not encryption, and hash functions are not reversible. In this video you'll learn what a hash function actually does (a deterministic, fixed-length, “random-looking” summary of data) and why the whole point is that you cannot take a hash and reconstruct the original file. Dr Mike explains the key properties of secure hashing, including the avalanche effect (tiny input change, massive output change), and why older algorithms like MD5 and SHA-1 became unsafe due to collisions. We also cover what “collisions” really mean, why they must exist in theory (the pigeonhole principle) and why they can appear sooner than expected (the birthday paradox). Then we tackle the YouTube-comments classic: rainbow tables. If hashes are one-way, how do attackers “crack” passwords? The answer: they don't reverse hashes. They guess passwords, hash them forward, and match the results. Mike breaks down how rainbow tables speed this up with precomputed hashes, and why salting makes those precomputations far less effective by forcing attackers to redo work per user. Finally, we zoom out into modern cryptography: why SHA-2 is widely used today, why SHA-3 exists as a structurally different backup option, what length extension attacks are, and what quantum computing changes (and doesn't change) for hashing and encryption. We also touch on how hashes power digital signatures, file integrity checks (like verifying an ISO download), and why AES dominates symmetric encryption. // Mike's SOCIAL // X: / _mikepound // YouTube Video REFERENCE // SHA: Secure Hashing Algorithm: • SHA: Secure Hashing Algorithm - Computerphile Birthday Paradox: • Hash Collisions & The Birthday Paradox - C... The Next Big SHA? SHA3 Sponge Function Explained: • The Next Big SHA? SHA3 Sponge Function Exp... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:09 - DeleteMe sponsored segment 02:54 - Hashing is not Encryption // Encryption and Hashing explained 09:47 - Hash functions are irreversible 15:22 - How hashing works 17:23 - Why MD5 is bad 20:09 - Recommended hashing function 21:47 - Birthday paradox explained 23:39 - Rainbow table explained 29:44 - Salting explained 33:35 - Pigeon Hole principle explained 36:35 - SHA-2 is the answer 37:17 - SHA-3 vs SHA-2 40:42 - The effect of quantum computing 42:47 - Quick summary 43:52 - Sign-In with private key 45:21 - Avalanche effect explained 49:10 - Where to learn more about hash functions 50:27 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cryptography #hashing #encryption

Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal to start your 30 day free trial or scan the QR code onscreen – You'll also get 20% off an annual premium subscription Stephen Sims joins David Bombal to discuss Operational Security (OpSec) through the lens of the "Darknet Marketplace Bible" (DNM Bible). While this document is originally designed to help criminals evade law enforcement while buying illegal goods, Stephen argues it is an excellent resource for cybersecurity professionals, journalists, and privacy advocates to learn high-level anonymity and encryption techniques. Disclaimer: Both David and Stephen repeatedly emphasize that this content is for educational, privacy, and cybersecurity research purposes only. They do not advocate illegal activity. // Stephen's Social // Twitter: / steph3nsims YouTube: / @offbyonesecurity // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:08 - Brilliant sponsored segment 03:04 - Disclaimer 03:07 - The Dark Web 07:44 - What is the Dark Web? 09:14 - The Dark Net Marketplace Bible 11:42 - DOs and DON'Ts 22:49 - Dark Net Directory 26:09 - Dread walkthrough 31:04 - Recommended Operating systems 42:07 - VPNs, Tor & PGP 53:23 - PGP // Creating key pairs 01:03:53 - How to access Dark Net Marketplaces // Black Ops marketplace 01:12 :39 - Recommended cryptocurrency for the Dark Web 01:18:43 - Shipping 01:21:12 - Communication methods 01:27:28 - JavaScript warnings 01:28:13 - Never trust external links 01:29:29 - DNM Bible summary 01:31:01 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #darkweb #opsec #tor

In this video, I sit down with OTW (author of Linux Basics for Hackers) to reveal the definitive list of top hacking and cybersecurity tools for 2026. We cover everything from the essential foundations like Linux and Python to the "state of the art" in wireless hacking with DragonOS and SDRs. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:00 - Top hacking tools for 2026 04:07 - Hacking tool #1: The hacking OS 07:10 - Hacking tool #2: Discovering systems on the network 08:31 - Hacking tool #3: Monitoring network traffic 10:25 - Hacking tool #4: Web app hacking 11:24 - Hacking tool #5: Vulnerability scanner 16:35 - Hacking tool #6: Basic hacking 18:11 - Hacking tool #7: The cybersecurity scripting language 19:38 - Hacking tool #8: Hacking wireless signals 25:27 - Hacking tool #9: Virtual machines 27:38 - Hacking tool #10: IDS (Intrusion Detection System) 32:08 - Hacking tool #11: Learning firewalls 37:07 - Hacking tool #12: Using AI 42:45 - Hacking tools summary 43:25 - The era of AI 45:34 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

In this interview David and Dr Mike Pound discuss Agentic AI and how powerful it is powerful, but prompt injection and untrusted PDFs can leak data or alter records. Learn least privilege, input and output filtering, and model trust risks. // Sponsored SEGMENT // Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount // Mike SOCIAL // X: / _mikepound // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Proton Pass sponsored segment 02:15 - AI & cybersecurity // Vulnerabilities of AI 12:56 - Direct & Indirect Prompt Injection explained 17:52 - Input & Output Filtering explained 20:20 - AI having access to private data 25:24 - Reactions to AI & cybersecurity 27:06 - Risks of downloading open-source AI models 36:02 - The good and bad of AI models 40:23 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #ai #promptinjection

Security researchers Dor Attias and Ofek Itach demonstrate a critical CVSS 10.0 n8n vulnerability (CVE-2026-21858). Watch the full RCE exploit demo using type confusion to bypass authentication and read sensitive local files. // Dor Attias SOCIAL // LinkedIn: / dor-attias-740758155 // Ofek Itach SOCIAL // LinkedIn: / ofek-it // N8N Hack Blog https://www.cyera.com/research-labs/n... // Cyera Blog // https://www.cyera.com/blog // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - n8n vulnerability explained 02:33 - n8n hacking demo // How the vulnerability works 09:13 - How bad is it? 11:51 - Vulnerability summary 13:28 - More explained on Cyera blog // Webhooks 16:59 - Webhooks explained 18:09 - Formidable 19:18 - Formidable explained 20:01 - Handling uploaded files in n8n 22:32 - The form webhook node 24:28 - How to exploit 25:54 - Exploit summary 26:46 - How to mitigate 27:37 - How to become a security researcher 32:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Dr. Mike Pound returns to discuss the reality check AI needs in 2026. We dive into why the scaling laws are plateauing, the truth about "Agentic AI," and why "Vibe Coding" might be slower than you think. // Mike SOCIAL // X: / _mikepound // Courses Reference // https://www.coursera.org/specializati... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:57 - Hype vs. Real Life // The AI bubble 04:08 - Levels of AI 07:58 - Agentic AI explained 11:28 - MCP servers explained 12:46 - The future of AI 16:10 - Which career path to take 21:04 - The risks of vibe coding 24:17 - How efficient is AI? 25:41 - How to get into AI // What to learn 32:20 - Is it too late to get into AI? 37:10 - Is AI scaling over? 41:49 - AI and privacy 48:52 - Where to start 53:15 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #ai #llm #aibubble

This is your path to becoming successful in Cybersecurity in 2026. From zero to getting the skills you need to be successful. Master Hacker OTW tells us what we need to do (and there are some surprises here). // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://davidbombal.wiki/otw // Occupy The Web SOCIAL // X: / three_cube Certification website: https://www.white-hat-hacker.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // Playlists to check out // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Hack Like Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise/Occupy the Web Hacks: • WiFi hacking like Mr Robot (with OTW) // MENU // 0:00 - Coming Up 0:55 - Introductions 01:52 - OTW New Book 02:28 - Starting the Path to Cybersecurity in 2026 05:14 - Understand Your Tools 11:15 - Learn Linux 13:53 - Understand Networking 16:35 - Learn to Write Scripts 21:18 - Understand Virtualisation Systems 24:14 - Understand AI 30:32 - Defence vs Offence 34:52 - How to Gain Experience 46:11 - Get Involved and Get Connected 50:53 - Be a Team Player 53:49 - Which Industries to Start in 57:37 - Outro // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com cybersecurity cybersecurity jobs hacking comptia kali linux 2026 roadmap cybersecurity roadmao kali linux Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel #kalilinux #hacking #cybersecurity

Get these skills in 2026! Or at least get started. Do you agree? Casey Neistat video: • DO IT ANYWAY // MENU // 0:00 - Intro 0:18 - What are you doing to do? 0:38 - Excuses 0:56 - Be like Logan 2:47 - Jump 4:00 - Do the work 4:50 - Atomic Habits 5:10 - Goals 6:11 - Voices in your head 8:06 - You need to study 8:48 - 5 Paths (AI and Robotics) 11:46 - Quantum Computing 12:34 - Cybersecurity 13:45 - Software Development 15:43 - Cloud 16:51 - Networking 18:10 - IoT 19:34 - 5 Core Skills (AI) 19:56 - Linux 20:31 - Programming 21:22 - Networking 21:53 - Cloud 22:02 - Virtualization 22:30 - Final Thoughts // BOOKS // Deep Work by Cal Newport https://amzn.to/3Veeiwp The 4-hour work week by Timothy Ferriss https://amzn.to/3FyT5ro Atomic Habits by James Clear https://amzn.to/3YzEOmX The 1% Rule by Tommy Baker https://amzn.to/3G2RxY0 // Videos mentioned // Casey Neistat: • DO IT ANYWAY Dr Chuck: • AI just replaced us with Devin... seriousl... // SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // Monitor: https://amzn.to/3yyF74Y More stuff: https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #linux #python #ai

A big thank you to Proton VPN for sponsoring this video. Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com/davidbombal More reading about Badbox: Google: https://blog.google/technology/safety... EFF: https://www.eff.org/deeplinks/2025/06... Bitdefender: https://www.bitdefender.com/en-gb/blo... // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:05 - Sponsored Section 03:15 - Intro 04:28 - Are IOT Devices Safe to Have ? 07:56 - How They Hack your Home 09:19 - What They Do With Access To Your Data 10:30 - Bad Box 2 - They Ship Products With Malware 14:06 - The Intentions of Modern Day Hackers 15:01 - CloudFlare Blocking The Biggest DDOS Attack in The World 19:00 - How Vulnerable are IOT Devices 21:09 - TP- Link are the easiest to hack 24:20 - How Do They Get Into Your Devices ? 27:34 - Smart Bed Malfunctions 30:27 - Should Companies Be Held Responsible For Hacks 32:41 - How Bad is the Internet today? The amount of Hate in the World 35:19 - How People Allow Hackers into their Homes, Through Their Phones 38:00 - How Can Non-Technical People Protect Themselves 40:30 - The Internet is like A Jungle 43:03 - Mikko Hyppönen's Prediction 47:53 - The Privacy Threat We are all facing 49:39 - What Companies are doing Now with Their devices 51:37 - People Using Hacking to Hurt People 52:48 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #hack #hacker

Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 Chatbots are out; AI Agents are in. But are your networks ready for the massive traffic spikes, and is your data secure? In this interview from Cisco Partner Summit, we discuss the critical security flaws in the Model Context Protocol (MCP), why 99% of these servers are exposed, and how Cisco's new MCP Scanner and Silicon One P200 chip aim to fix the infrastructure gap. // DJ Sampath's SOCIAL // LinkedIn: / djsampath X: https://x.com/djsampath // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:35 - The 3 trends of AI: infrastructure constraints explained 03:29 - Data gap explained 04:14 - Trust deficit explained // AI safety 05:22 - Solutions for the trends // Open source projects 08:56 - Addressing the problem with AI agents 10:22 - Reassuring the AI skeptics 12:22 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

A big thank you to Proton Pass for sponsoring this video. Proton Pass' Black Friday Special is $1.99 per month on a 12 month plan https://proton.me/davidbombal Save 60%. Rob Braxman reveals the dangers of Windows Recall, Apple Intelligence, and client-side scanning. Discover why AI surveillance and TPM chips mark the end of privacy in 2025. // Rob Braxman's SOCIAL// YouTube: / @robbraxmantech Website: https://brax.me/home/rob GitHub: https://github.com/robbraxman X: https://x.com/robbraxmantech // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:20 - Proton Pass sponsored segment 02:54 - Digital IDs and security chips on devices 05:24 - Client-side scanning 12:40 - Client-side scanning with AI 22:05 - Embedded AI for client-side scanning 27:32 - Microsoft + Windows Recall 35:51 - Microsoft vs Apple // Cloud storage 39:31 - Moving to Linux & dual boot 44:27 - TPM & EKI explained 49:28 - Restrictions with digital IDs 54:15 - Linux phones 56:00 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 Cisco Unified Edge & The Future of Physical AI (w/ Kevin Wolenweber) Kevin Wolenweber reveals Cisco's new Unified Edge device and details the massive Nvidia partnership transforming data centers. We discuss the shift to "Physical AI," the terrifying security challenges of autonomous Agentic AI, and why "Gigawatt" scale clusters are changing the landscape for network engineers in 2025. // Kevin Wollenweber's SOCIALS // Cisco Blogs: https://blogs.cisco.com/author/kevinw... LinkedIn: / kevin-wollenweber-ba9428 // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:00 - New Cisco Unified Edge // What is it? 03:28 - Use cases for the Cisco Unified Edge // Using AI models 08:00 - More traffic and more bandwidth 09:32 - Addressing security issues and solutions 10:44 - What's new on the Cisco Unified Edge 11:41 - Cisco and Nvidia partnership 15:03 - Growing data centers 18:24 - AI in the future 20:03 - Security regarding AI agents 23:08 - Networking and AI 25:35 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit San Diego 2025. This video is a deep dive with Jeetu Patel on why the real AI revolution is happening in infrastructure and networking, not just in GPUs or chatbots. Jeetu explains that we are massively underestimating how much AI infrastructure the world will need. Power becomes the core constraint, GPUs are the core asset, and networking is the force multiplier that lets thousands of GPUs act as one system. He walks through how we went from models on a single GPU → 4–8 GPUs in a server → racks with hundreds of GPUs (like NVL-72 with 500+ GPUs) → clusters of racks, and now “scale across” between data centers when power and real estate are scattered across different regions. The conversation then shifts to edge AI and Cisco Unified Edge: instead of doing all token generation in big data centers, some inference and token generation must move to the edge (branches, factories, hospitals, stadiums, stores) where data is created. Jeetu explains why edge devices need to be plug-and-play, remotely managed, and integrate compute, networking, security and observability in a single platform. He also introduces the idea that AI is now constrained by three big bottlenecks: • Infrastructure • A trust deficit (people don't trust AI yet) • A data gap (models are mostly trained on human internet data, not on rich machine data) Jeetu explains how security becomes a prerequisite for productivity, not a trade-off, and describes Cisco's work with Splunk, open-sourced time-series models, and machine data (logs, metrics, traces) to close the data gap by correlating machine data with human-generated data for better insights. Globally, he talks about the “token generation race” – how every country now cares about having enough AI token generation capacity because it directly links to GDP and national security. He cites huge infrastructure build-outs with partners like G42 in the Middle East, at gigawatt and trillions-of-dollars scale. Finally, Jeetu tackles the “AI will take my job” fear. He outlines three stages of thinking: 1. “AI will take my job.” 2. “Someone who uses AI better will take my job.” 3. “Without AI, I won't be able to do my job.” His message to younger viewers: be excited, adopt AI as a companion, own your learning, and learn fast because AI compresses the time it takes to build skills. // Jeetu Patel's SOCIALS // LinkedIn: / jeetupatel Website: https://www.cisco.com/ X: https://x.com/jpatel41 // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:33 - "Networking is sexy" 02:24 - Scale up, scale out and scale across explained 04:47 - Cisco and Nvidia partnership 05:55 - Cisco and G42 partnership // Addressing the AI bubble 08:11 - New Cisco Unified Edge 11:08 - Agentic AI in the future 13:05 - Huge demand for networking 13:57 - The three constraints 16:38 - AI in the real world 19:26 - How AI will take jobs away 21:38 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025. Is your encryption safe? Cisco's Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN. This paradigm shift is 100x bigger than the ChatGPT/AI moment, requiring the entire theory of computer science to be rewritten. Join us as we dive into the imminent future of cybersecurity, qubits, and entanglement technology from Cisco. // Vijoy Pandey SOCIALS // LinkedIn: / vijoy X: https://x.com/vijoy // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Intro 0:48 - Update on Quantum Computing 03:47 - Effects of Practical Quantum Computing 05:08 - Post Quantum Cryptography 06:12 - Why Bother with Quantum Computing 07:57 - How Do We get to Practical Quantum Computing 09:31 - Quantum Protocols and Applications 10:55 - Quantum Computing and Classical-Use Cases 13:28 - Practical Use Case for Quantum Alert 15:03 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #sponsored #ciscops25

GrapheneOS expert MetropleX joins David Bombal to bust myths. We cover banking apps, notifications, Play Services, and why GrapheneOS is more secure than iOS's lockdown mode. // Sponsored Segment A big thank you to Proton VPN for sponsoring this video. This Black Friday, Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com/davidbombal // Metroplex's & GrapheneOS SOCIALS // X: https://x.com/metroplexgos X: https://x.com/grapheneos Website: https://grapheneos.org/ Discord: / discord GrapheneOS Mastodon: https://grapheneos.social/@GrapheneOS... Reddit: / hot // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:15 - "First time, huh?" 02:04 - Proton VPN sponsored segment 03:32 - Metroplex introduction 04:14 - Myths and misconceptions about GrapheneOS 05:55 - GrapheneOS + Google Pixel 13:17 - Defining "tracking" // How phones track you 17:28 - GrapheneOS privacy & security features 26:15 - GrapheneOS proxies 27:32 - How to download apps on GrapheneOS phones 32:56 - Addressing the issue with banking apps on GrapheneOS phones 34:52 - Installing Google apps on GrapheneOS phones 38:42 - Creating multiple user profiles with GrapheneOS 41:30 - Addressing notification myths 43:40 - GrapheneOS coming to Pixel 10 // GrapheneOS dedicated devices 53:29 - GrapheneOS updates 55:31 - Will GrapheneOS affect Pixel cameras? 57:16 - Apple's Memory Integrity Enforcement vs GrapheneOS 01:01:14 - GrapheneOS: balance of privacy and security 01:02:58 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You'll also get 20% off and annual premium subscription Apple says iPhone is extremely hard to hack. OTW says he keeps finding real malware on normal people's iPhones. We talk Pegasus spyware, the Meta vs NSO lawsuit over WhatsApp, Apple's new memory integrity protections, and why a $5M bug bounty still won't stop well-funded spyware. We also get into how one infected phone can take over your entire WiFi and smart home, why your router and VPN box are the weakest link, and what “everything is hackable” really means for you. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:49 - Intro 01:53 - Brilliant Ad 03:00 - What are Pegasus and the NSO? 08:14 - Isn't Facebook the Same as the NSO? 11:39 - Can Governments Use Pegasus? 14:43 - When is the NSA Allowed to Spy on You? 16:39 - Will the Court Ruling Change Anything? 18:23 - NSO's USA Acquisition 20:06 - Are iPhones Impossible to Hack? 24:21 - IOS vs Android vs Graphene 28:03 - Is it Easy to Hack an iPhone? 29:40 - Apple's Bug Bounty Program 31:57 - IOS vs Android vs Graphene (Cont.) 35:55 - Are Flip Phones Secure? 41:25 - How to Protect yourself? 45:30 - VPN Hacking 46:44 - OTW's Hope for the Future 48:00 - Hackers Arise New Courses (with Discount Code) 50:08 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You'll also get 20% off and annual premium subscription Two veteran OSINT investigators show how they pull hidden data from TikTok, Telegram, X, Cash App and WordPress using simple browser bookmarklets. No malware, no exploits, just JavaScript in your browser. They also show how to build these tools with AI in minutes, even if you can't code, and how to stay safe with sock puppets, VMs and VPNs. Timestamps below. // Affiliate LINKS // Get 10% off our All OSINT Course Bundle and our OSINT Immersion Bundle by using the Coupon Code: bombal-mot-10 Bundle links and descriptions are https://www.myosint.training/pages/bu... // MOT SOCIAL // LinkedIn: / my-osint-training Blueskyhttps://bsky.app/profile/myosint.trai... X: https://x.com/myosinttrainer // Micah SOCIAL // LinkedIn - / micahhoffman Bluesky - https://bsky.app/profile/webbreacher.com X - https://x.com/webbreacher // Griffin SOCIAL // LinkedIn - / griffin-g BlueSky - https://bsky.app/profile/hatless1der.com X - https://x.com/hatless1der // David's YouTube PLAYLIST // OSINT: • OSINT: You can't hide // Your privacy is d... // My OSINT Training SOCIAL // OSINT Training: https://myosint.training OSINT Newsletter: https://myosint.link/newsletter Twitter: / myosinttrainer LinkedIn: / my-osint-training YouTube: / @myosinttraining // Resources SHARED // My OSINT Training (MOT) free courses: Introduction to OSINT - https://www.myosint.training/courses/... Careers Using OSINT Skills https://www.myosint.training/courses/... or on YouTube • Careers in OSINT Griffin's Start.me page: https://myosint.link/hatless or https://start.me/p/DPYPMz/the-ultimat... Newsletter – My OSINT News (through My OSINT Training): https://myosint.link/newsletter (https://link.myosint.training/my-osin...) // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:41 - Updates with Griffin and Micah 02:44 - Brilliant sponsored segment 03:42 - Bookmarklet explained 08:16 - Real-world use cases of bookmarklets 11:11 - How do bookmarklets work 13:17 - Free tools // Tools walkthrough 16:55 - Using AI for safe bookmarklets // Protecting your system 21:24 - Using AI for safe bookmarklets demo 23:56 - More bookmarklet demos 31:20 - Efficiency with bookmarklets 33:09 - More bookmarklet demos 39:31 - Making a bookmarklet with AI 43:38 - Easter egg bookmarklet 44:56 - OSINT online training academy 48:32 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir... Cisco's Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters. What you'll learn • Why GPUs are useless without massive, reliable interconnects • 51.2 Tbps with 64×800G ports and what that enables for AI training • Deep buffers vs shallow buffers and when each wins • Line-rate encryption today and post-quantum readiness tomorrow • SONiC on Cisco Silicon One, P4, and automation at hyperscale If you found this useful, hit subscribe and share with your favorite network nerd. It's always the network. // Martin Lund's SOCIALS // LinkedIn: / martinlundca // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:54 - Intro 0:59 - Martin's Background 02:15 - Martin's Advice 02:48 - Cisco's Announcement 06:12 - Data Center Scaling 07:02 - Data Centres Scaling Across 11:08 - New Router Speeds 13:24 - Securing the Data Center (Quantum Computing) 17:57 - Are Deep Buffers Efficient? 19:25 - New Protocols 22:50 - Data Center Infrastructure 24:07 - 8804 Router Innovations 25:33 - The Future of Data Centers 27:50 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #networking #ai

Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Think you've been hacked? In this video, David Bombal and OTW (OccupyTheWeb) walk you through OSQuery - a free, open-source tool that lets you query your operating system like a database. You'll learn the exact SQL-style commands to find: • Listening processes & remote connections (spot command-and-control) • Suspicious services and misspelled look-alikes • Persistence via registry startup items and scheduled tasks • Fileless malware (on_disk = 0) running only in RAM OTW draws from real digital forensics cases (200+ inquiries/month), including harassment, divorce disputes, and business rivalries. We also explain why antivirus often fails once malware is resident—and what you can do next (kill the process, remove the file, and harden startup entries). // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // YouTube video REFERENCE // Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:35 - Introduction 01:08 - The New Python Book 01:41 - Sponsored Section 02:49 - OTW Shares a Cool Tool 05:11 - Why This Tool is Powerful 06:45 - Latest Hacking Trends 09:59 - Who Should Use This Tool (and When) 10:54 - What Happens When You're Hacked 11:20 - Why Hackers Need Access First 12:02 - After Installing the Software 12:39 - How to Query a Database 14:43 - Exploring OS Query's Page 16:14 - Finding Unwanted Services on Your Computer 18:06 - Narrowing Down the Data 22:06 - Tracing the Hacker's Footsteps 23:11 - The Case of the Husband Who Hacked His Wife 24:31 - Are You Being Hacked by the CIA? 25:31 - The Attacker's Go-To Move 26:25 - Understanding the Windows Registry 29:55 - Investigating Scheduled Tasks 30:48 - Common Hacker Techniques 32:11 - Checking the Processes Running on Your System 33:48 - Is Chrome Malicious? 35:05 - Why Most Home Users Get Hacked 36:16 - Should You Rely on Anti-Virus? 37:48 - Windows vs Mac: Which Gets Hacked More? 38:30 - Getting Hacked Through a Friend's Link 39:10 - Tutorials for Finding Malware on Your System 39:34 - Outro & Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacked #osquery #cybersecurity

Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal In this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operator and Tool Builder). They give an unfiltered look at the real world of hacking, forensics, and career-building in cybersecurity. What we'll cover: • How the SolarWinds hack was discovered with never-before-heard forensics insight • Real-world red teaming using HVAC exploits, USB pivots, and AWS chaos • The Oculus vs. Carmack lawsuit story from the expert who worked the case • How to start your career in cybersecurity, even without a degree • What the CCDC program is and why it leads to 3 job offers instantly • How AI is changing the game for hackers and defenders alike // David Cowen's SOCIALS // SANS Profile: https://www.sans.org/profiles/david-c... LinkedIn: / dcowen X: / dcowen // Evan Anderson SOCIALS // Offensive Context: https://blog.offensivecontext.com/aut... LinkedIn: / syndrowm GitHub: https://github.com/syndrowm // Website REFERENCE // https://www.nationalccdc.org/ https://www.sans.org/emea https://ctftime.org/ https://www.uscyberpatriot.org/ // YouTube Channel REFERENCE // 13Cubed: / @13cubed // David Cowen's Books REFERENCE // Computer Forensics: US: https://amzn.to/47yeH70 UK: https://amzn.to/460ErGs Hacking Exposed Computer Forensics: Secrets and Solutions US: https://amzn.to/4mYevCW UK: https://amzn.to/46q07NH Hacking Exposed Computer Forensics: Secrets and Solutions: US: https://amzn.to/4mT3T8k UK: https://amzn.to/4m8zaCS // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:49 - Intro 01:13 - Sponsored Section 01:29 - (AWS) Amazon Web Services 03:04 - David Cowen's Background 03:46 - Evan Anderson's Background 05:18 - Advice for young people To Get A Job In this Space 05:56 - The Solar Winds Hack? 10:43 - Finding a needle in a Haystack 11:08 - The Oculus Story 13:00 - Evan in Red Teaming 15:55 - Advice To Younger self 16:51 - Recommended Courses 19:42 - Importance of Networking 20:19 - Recommended Certifications 24:13 - Is AI Taking All The Jobs ? 24:57 - Connect With David & Evan online 25:12 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thanks to @radware for sponsoring this video. // Pascal Geenens' SOCIAL // LinkedIn: / Website: https://www.radware.com/ // Report REFERENCE // Internet of Agents: The Next Threat Surface: https://www.radware.com/pleaseregiste... ShadowLeak: https://www.radware.com/blog/threat-i... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:45 - Intro 01:15 - Pascals Take on AI and Cybersecurity 05:15 - Security First AI Implementation 06:49 - How Hackers use AI 11:10 - What is an Internet of Agents? 15:43 - The Security Threat of Internet Agents 20:08 - Prompt Injection 26:26 - Indirect Prompt Injection 31:51 - How Hackers can Find your Information 39:46 - What is Vibe Hacking? 43:22 - How to Fight Against Vibe Hacking? 44:46 - Can Young People get into Cyber? 46:50 - Malicious GPTs (Xanthorox) 51:20 - How to Protect yourself (Xbow) 57:31 - Radware's Solution 01:00:12 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #agenticai #radware #llm

Big thanks to Proton VPN for sponsoring this video. To get 64% discount to your Proton VPN Plus subscription, please use the following link: https://protonvpn.com/davidbombal Want a “hacker” laptop without wasting cash? In this candid breakdown with OTW, we cut through the hype and show you what actually matters for learning pentesting in 2025: prioritising RAM over flashy GPUs, picking VMware (free for personal use) for reliable labs, using refurbs/minis/Raspberry Pi, and planning for where wireless hacking is going (Bluetooth/BLE/Zigbee) — not just Wi-Fi. We also cover AMD vs Intel vs Apple M-chips/ARM for Linux VMs, when cloud cracking makes sense, and why daily practice beats buying gadgets. Highlights: • Best beginner specs (RAM first, SSD nice, storage ≠ speed) • VMware vs VirtualBox for home labs • AMD/Intel vs Apple M-chips/ARM for Kali/Parrot VMs • Alpha adapters & aircrack-ng compatibility; Nordic nRF52 for BLE • Budget path: used/refurb, mini-PCs, Pi, phone/cloud labs (HTB/THM) • The 80/20 rule of hacking: skills are greater than gear If you're delaying until you can afford a $2 – 3k laptop, don't. Start now, learn daily, and upgrade later. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:21 - Proton VPN sponsored segment 03:16 - Get started and start learning 08:39 - Computer specs: CPU, GPU, RAM & Hard drives 16:46 - Time vs Money 17:58 - Virtual machines 19:15 - Computer specs overview 22:17 - Wi-Fi adaptors for Wi-Fi hacking 24:17 - Bluetooth dongles for Bluetooth hacking 26:57 - "80% Person & 20% Machine" 29:17 - Do you need hacking gadgets? 31:57 - Apple vs Intel vs AMD 35:53 - Learn hacking with a smartphone 37:01 - Learn hacking with a Raspberry Pi 39:32 - Kali Linux vs ParrotOS (Which OS to use?) 40:58 - The problem with Chromebooks 42:02 - Using Hack The Box/TryHackMe // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacking #laptop #vm

Big thanks to Juniper for sponsoring this video. To try Juniper Mist please click on the following link: http://juniper.net/trymistyourself Choppy Zoom calls? Random outages? In this demo with David Bombal and Juniper Networks, you'll see AI that actually helps: a tunnel-free setup for faster failover and a natural-language chatbot that pinpoints the real issue, client, Wi-Fi, switch, WAN, or cloud—and auto-captures the packets you need. We also show simple security defaults (deny-by-default) and why double-encrypting traffic can slow you down. What you'll learn: Why “old-school VPN tunnels” add overhead—and how tunnel-free can speed things up How a chatbot (Marvis) finds root causes and triggers packet captures at the moment of failure Easy checks for Zoom/Teams quality (latency, jitter, loss) and what to do when it's not “the Wi-Fi” Off-hours synthetic tests that catch issues before your day starts Practical security: sensible defaults and where SASE fits if you want it // Justin Melloni's SOCIALS // LinkedIn: / justin-melloni-54b24a1b // Andre du Iuri SOCIALS // LinkedIn: / andre-de-iuri-578391210 // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:52 - Introductions 03:28 - What is Mist and SDWAN? 06:23 - Advantages of not using IPsec 12:00 - Mist demo // Dashboard walkthrough 12:49 - Story time 13:58 - Dashboard walkthrough continued 14:49 - Agentic AI in Mist 18:46 - Marvis AI demo & explained 27:42 - Troubleshooting network issues 30:35 - Troubleshooting issues with Marvis demo 36:23 - Troubleshooting something in the cloud 40:22 - Monitoring applications 41:37 - Addressing security concerns 46:42 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #juniper #marvis #networking

Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Quantum computing isn't a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that's enough to break today's asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor's algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed. In this frank discussion, OTW joins David Bombal to explain: • Why asymmetric key exchange is the weak link for TLS/VPNs • How hybrid quantum + CUDA-Q accelerates timelines • Nation-states' “collect now, decrypt later” strategy • The painful window before post-quantum cryptography (PQC) rolls out • Risks of client-side scanning and on-device AI • NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // YouTube video REFERENCE // • USA stops UK creating Apple backdoor. Why ... • Will this Tiny Chip Change EVERYTHING in Q... // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:00 - Intro 01:49 - OTW's Books 02:46 - Brilliant Advert 04:01 - Encryption and Apple Backdoors 05:12 - Nation-states Racing for Quantum Computing 08:35 - Jensen Huang's Hybrid Quantum Computer 10:57 - The Threat of National Agencies 12:10 - China Collecting Encrypted Data 13:56 - Post-Quantum Cryptography 17:58 - The NSA Collecting Data 19:21 - The NSA and Encryption 24:40 - Concerns Against Cryptography 28:09 - Client-Side Scanning 30:46 - Should you Run AI on your Devices? 34:56 - NVIDIA's Role on Cryptography 37:37 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount At Black Hat, David Bombal sits down with OSINT pro Mishaal Khan to unpack anti-OSINT, practical steps to regain privacy without pricey services. Mishaal demos his free OperationPrivacy dashboard (400+ actions, 3 tiers: Conscious → Serious → Ghost) and shows how to: • Freeze credit & use free monitoring • Opt out of 100+ data brokers (Spokeo, Intelius, LexisNexis, more) • Blur your home on Google/Bing/Apple Maps + real-world deterrents • Claim critical accounts (IRS/DMV/USPS/UPS) and your domain • Nudge page-one results with harmless decoys • File copyright takedowns (Instagram/Google, etc.) US-centric but widely applicable. DIY, trackable, and truthful about the time it takes. // Mishaal Kahn's SOCIALS // LinkedIn: / mish-aal Website: https://www.mishaalkhan.com/ Tool created: https://www.operationprivacy.com/ // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: https://open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: https://podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 – Coming Up 01:31 – Sponsored by ProtonPass 03:00 – Introduction 05:44 – Operation Privacy Demo 07:49 – How to Freeze Your Credit 08:41 – Credit Monitoring Explained 09:19 – Managing Subscriptions 10:13 – Data Removal (Outbound Requests) 12:40 – Should You Use Automatic Removal? 14:03 – Protecting Your Privacy 15:41 – Why Privacy Takes Time 17:46 – Planting Your Privacy Flag 19:56 – Ghost Mode & SOE Manipulation 22:47 – Getting Content Removal Forms 23:40 – Taking a Holistic Approach to Privacy 25:08 – Final Thoughts / Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you'll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond's SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond's Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

In this ethical lab demo, David Bombal and Kyle Winters connect Claude (LLM) to Metasploit through an MCP (Model Context Protocol) server to automate real attacks. Watch AI perform recon, generate a risk report, and execute VSFTPD backdoor, EternalBlue (SMBv1), and UnrealIRCD—dropping benign files on Linux and Windows with simple prompts. Educational use only on intentionally vulnerable VMs. Do not attack systems you don't own or lack permission to test. What you'll see • How MCP bridges an AI to real tools (Metasploit RPC) • AI-driven scanning + auto security report (services, versions, risks) • Prompted exploits: VSFTPD, EternalBlue, UnrealIRCD • Why this lowers barriers for red teams—and what blue teams should do // Sponsored SEGMENT // Big thanks to Cisco for sponsoring this video. // Kyle Winters SOCIAL // LinkedIn: / kyle-m-winters Cisco Blogs: https://blogs.cisco.com/author/kylewi... // Websites REFERENCE // MetasploitMCP by GH05TCREW: https://github.com/GH05TCREW/Metasplo... Kareem Iskander's MCP blogs: https://blogs.cisco.com/author/kareem... Cisco U.: https://u.cisco.com?ccid=cisco-u&dtid... // Video REFERENCE // MCP Demo using Pythong: • MCP Demo using Python, AI and a self heali... Brute Force SSH: • Brute Force SSH & Build a Honeypot Now (Hy... Hacking LLMs: • Hacking LLMs Demo and Tutorial (Explore AI... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:58 - Disclaimer 01:00 - Introducing Metasploit MCP Server (by GH05TCREW) 03:01 - Metasploit MCP Demo 1 05:12 - Metasploit MCP Demo 2 10:59 - Metasploit MCP Demo 3 16:18 - Metasploit MCP Demo 4 19:15 - Metasploit MCP Demo 5 21:45 - How AI is changing cybersecurity 23:07 - Metasploit MCP Demo 5 continued 26:51 - Metasploit MCP server summary 28:00 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal AI can turn weeks of coding into seconds, but at what cost? Katie Paxton-Fear demonstrates how to use Gemini to generate a sprint plan and Cursor to build a Python port scanner from natural language. It works… and that's the problem. We unpack how “vibe coding” blinds even pros to security, why these tools aren't production-ready, and the guardrails you need for ethical hacking and internal tooling. What you'll learn • How to turn ideas → sprint plan → working code (Gemini + Cursor) • Why silent vulnerabilities make AI-built apps risky • Ethical hacker use cases (agents, scanners) without shipping insecure code • Policy tips: disclosure, internal use, avoiding shadow IT Tools mentioned: Gemini, Cursor (AI IDE), Claude (briefly), v0 // Katie Paxton-Fear SOCIALS // Website: https://insiderphd.dev/ LinkedIn: https://www.linkedin.com/in/katiepf/?... YouTube: / insiderphd X: https://x.com/InsiderPhD // YouTube video REFERENCE // • Vibe Coding in Cursor for Cyber Security // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming Up: AI Vibe Coding Explained 01:08 - Intro with Katie Paxton-Fear (Cybersecurity Expert) 02:53 - ThreatLocker Security Overview 03:06 - What is Vibe Coding in AI Development? 04:51 - Live Demo Example of Vibe Coding 05:20 - Google Gemini and Gems for Coding 08:22 - Cursor AI and Writing Code Faster 09:59 - Coffee Break (Quick Pause) 10:02 - Risks of Vibe Coding in Cybersecurity 11:24 - Port Scanner Explained 11:34 - Vibe Coding Pros and Cons (Full Breakdown) 14:02 - Port Scan Results Analysis 14:22 - Why AI Code Isn't Production Ready Yet 15:53 - Katie's Final Advice & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. Key topics: vibe coding, AI coding, port scanning, secure-by-design If you're experimenting with AI coding, watch this before you deploy anything. #blackhat #vibecoding #security

Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI. They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don't drift. Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot. // Mikko Hypponen's SOCIALS // X: https://x.com/mikko Website: https://mikko.com/ LinkedIn: https://www.linkedin.com/in/hypponen/... // Books REFERENCE // If it's smart it's vulnerable: US: https://amzn.to/41lkSaG UK: https://amzn.to/4oTpOgN // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Mikko Hyppönen keynote talks 01:51 - Proton Pass sponsored segment 04:09 - Pivoting from cybersecurity to anti-drone 09:28 - Humanoid robots are near 09:54 - How cybersecurity has improved 12:11 - Defenders have the advantage with AI 15:26 - Pros and Cons of the AI revolution 16:57 - Privacy is dying 21:36 - Advice for your future // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Recorded at Black Hat with David Bombal, this conversation with Caitlin Sarian (@CybersecurityGirl) traces her path from aerospace engineering and LA Galaxy cheerleading to cybersecurity leader and viral creator. She explains how posting 3×daily on TikTok led to ~500K followers and a role at TikTok (global cybersecurity advocacy & culture), why she left after a year, and how she's now helping others via Cyber Career Club. // Caitlin Sarian's SOCIALS // Website: https://www.cybersecuritygirl.com/ Instagram: / cybersecuritygirl YouTube: / cybersecuritygirl LinkedIn: / caitlin-sarian TikTok: / cybersecuritygirl // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:29 - Intro 01:01 - Brilliant Ad 02:22 - Caitlin's History with TikTok 06:25 - Caitlin's Story 10:19 - Caitlin's Professional Journey 18:09 - How to be an Influencer 19:42 - Why you Need a Team 21:22 - Why you Need to Network 23:58 - All the Areas of Cyber 24:49 - Caitlin's Advice to her Younger Self 27:22 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #blackhat #cybersecuritygirl

To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription AI hype meets harsh reality. In this Black Hat interview, David Bombal talks with Gary Marcus (Professor Emeritus of Psychology and Neural Science at New York University, and AI Expert) just minutes after GPT-5's announcement. Marcus explains why GPT-5 is only a small step forward, the truth about hallucinations, why AI coding agents pose massive cybersecurity risks, and why we may be years away from true AGI. If you want the unfiltered truth about AI progress, safety, and the future of large language models, watch this. // Gary Marcus' SOCIALS // X: https://x.com/garymarcus Website: https://garymarcus.substack.com/ // Books REFERENCE // Mikko Hypponen: If it's smart it's vulnerable US: https://amzn.to/45Rc9PV UK: https://amzn.to/3V1tJdP Gary Marcus' books: The Algebraic Mind US: https://amzn.to/4lxsca5 UK: https://amzn.to/45ASH8C Kluge: The Haphazard evolution of the human mind US: https://amzn.to/3V0gZnE UK: https://amzn.to/4mlzrn0 Rebooting AI: Building Artificial Intelligence We Can Trust US: https://amzn.to/45RhZRh UK: https://amzn.to/4lt7WGC Taming Silicon Valley: How we can ensure AI works for us US: https://amzn.to/4mH0Jnk UK: https://amzn.to/4oHO5GM Guitar Zero: The science of becoming musical at any age US: https://amzn.to/47uF2Ta UK: https://amzn.to/4oygoYd The birth of the mind: How a tiny number of genes create the complexities of human thought US: https://amzn.to/4oBnafB UK: https://amzn.to/3JimD1Y // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:00 - Intro 03:30 - Brilliant Ad 05:16 - Understanding the AI Hype 07:51 - Are Agents Writing Secure Code? 10:34 - Vibe Coding 11:56 - Should Agents Run Everything? 14:56 - Why do LLMs Hallucinate? 18:30 - Are AIs Intelligent? 20:21 - Will LLMs Stop Hallucinating? 24:50 - AI Security 29:24 - Will AGI Ever Happen? 31:48 - The Future of AI 35:08 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal Discover “Chasing Your Tail,” an open-source surveillance detection tool you can build with a Raspberry Pi. In this exclusive Black Hat interview, creator Matt explains how it tracks Wi-Fi, Bluetooth, and even tire sensors to spot if you're being followed, then flips the script to map where your followers spend time. Learn the origins of this tool, from avoiding surprise visits to protecting informants and aiding search & rescue. We cover the tech stack (Kismet, Python, GPS integration), real-world success stories, and how you can set it up yourself for under $100. Perfect for security pros, privacy advocates, and tech enthusiasts. // Matt Edmondson SOCIALS // SANS: https://www.sans.org/profiles/matt-ed... LinkedIn: / matt-edmondson-759aab2b X: https://x.com/matt0177 Matt's Block: https://www.digitalforensicstips.com/ // GitHub Code REFERENCE // https://github.com/ArgeliusLabs/Chasi... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:35 - Chasing your tail update // How it started 03:27 - Threatlocker sponsored segment 03:45 - What's in the box and how it works 07:37 - "It's basically free to build it" // Components used 09:20 - What coding language it runs on 11:25 - Unique network IDs in real life 12:47 - Tracking MAC addresses 14:51 - How to know who is tailing you 15:36 - How the device have helped people 16:49 - Tracking Bluetooth 18:23 - Reach out to Matthew Edmondson 19:04 - Black Hat Arsenal explained 19:52 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

David Bombal is joined by Gerald Combs, the creator of Wireshark, and Chris Greer, a well-known Wireshark trainer, for a comprehensive discussion about the past, present, and future of the world's most popular network protocol analyzer. They explore how Wireshark was originally created as an open-source alternative to expensive packet sniffers, the evolution from its first release in 1998 (as Ethereal), and the community-driven development that led to over 2,300 contributors worldwide. The video also dives into the transition to the Wireshark Foundation, a nonprofit organization dedicated to supporting the tool and educating users globally. Topics covered include: The early days of Wireshark and why it was built The story behind the name change from Ethereal to Wireshark How Windows compatibility helped Wireshark go mainstream The launch of SharkFest and what makes it unique as a community-driven conference What attendees can expect from SharkFest in the US and Europe, including beginner-friendly tracks, expert sessions, and interactive challenges like Packet Doctors How the Wireshark Foundation supports the community and ensures long-term sustainability The introduction of the Wireshark Certified Analyst (WCA) certification and what it means for networking and cybersecurity professionals Real-world use cases for Wireshark in ethical hacking, packet forensics, and cybersecurity training The announcement of StratoShark, a new open-source companion tool for analyzing system call data and cloud logs with a familiar Wireshark-like interface Whether you're a network engineer, a cybersecurity professional, a developer, or just curious about how network analysis tools are built and used, this video provides deep technical insights, inspiring backstory, and practical guidance on how to level up your skills. // Website links REFERENCE // https://wireshark.org/certifications https://packetschool.teachable.com/?a... http://packetpioneer.com/courses https://stratoshark.org/ https://sharkfest.wireshark.org/ // Chris' SOCIAL // X: https://x.com/packetpioneer YouTube: / @chrisgreer LinkedIn: / cgreer // Gerald Combs SOCIAL // LinkedIn: / geraldcombs // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thank you to DeleteMe for sponsoring this video. Go to http://joindeleteme.com/Bombal to receive a 20% discount. Discover how attackers exploit enterprise VPNs like Fortinet to gain admin access and compromise networks. In this video, OTW exposes a real authentication bypass exploit, explains the risks of outdated VPN devices, and shares expert tips on Linux, TCPDump, and staying secure. Perfect for cybersecurity pros, penetration testers, and anyone serious about digital defense. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // YouTube video REFERENCE // Hacking IP Cameras: • Hacking IP Cameras (CCTV) with Demos and R... Are VPNs even safe now?: • Are VPNs even safe now? Hacker Explains // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego. This video features David Bombal and Kyle Winters demonstrating practical cybersecurity techniques. Kyle walks through how to use Hydra to brute force SSH passwords, explaining the process of leveraging wordlists and optimizing the attack. Following the offensive demonstration, Kyle transitions into defensive measures, showing viewers how to quickly and easily set up an SSH honeypot using Cowrie. The honeypot serves as a decoy to attract and monitor malicious actors attempting to access a network. The demonstration includes setting up the honeypot on an Ubuntu host, configuring IP tables for port redirection, and monitoring logs for incoming connection attempts. The video highlights the importance of understanding both attack methods and defensive strategies in cybersecurity. Kyle also mentions free ethical hacking training resources available through Cisco Networking Academy (netacad.com) and future tutorials on Cisco U (u.cisco.com). // COMMANDS // Devices: client 192.168.1.10 server 192.168.1.11 ubuntu-honeypot 192.168.1.21 Nmap scan: nmap -sn 192.168.1.0/24 Verify Hydra installed: hydra -h Show wordlists: ls -al /usr/share/wordlists/ Crack with known username: hydra -l admin -P /usr/share/wordlists/top-passwords-shortlist.txt -t 4 -f ssh://192.168.1.11 Crack with unknown username: hydra -L /usr/share/wordlists/top-usernames-shortlist.txt -P /usr/share/wordlists/top-passwords-shortlist.txt -t 4 -f ssh://192.168.1.11 Create dir for Cowrie: mkdir cowrie cd cowrie/ Clone cowrie: git clone https://github.com/cowrie/cowrie . Launch the python virtual environment: python3 -m venv cowrie-env source cowrie-env/bin/activate Install python requirements: pip install --upgrade pip pip install -r requirements.txt Copy and edit the config: cp etc/cowrie.cfg.dist etc/cowrie.cfg vi etc/cowrie.cfg Setup port forwarding for SSH to Cowrie: sudo iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-port 2222 sudo iptables-save Start Cowrie: bin/cowrie start Check Cowrie status: bin/cowrie status View logs: tail -f var/log/cowrie/cowrie.log // Kyle Winter's SOCIALS // Socials: / kyle-m-winters Cisco Blogs: https://blogs.cisco.com/author/kylewi... // Website REFERENCE // https://www.netacad.com/courses/ethic... https://u.cisco.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.