I've started to work as a network security engineer and this video is 100% legit guide to follow. Wireshark is overlooked tool. Learn how to analyse each packet to its core. Infact this is my go to tool in my work. We mainly work on this. You should know everything to analyse a compromised situation and then take appropriate counter measures for it. Without knowing what's happening it's like going in blind.
How often do you guys like at intranet traffic if you don’t mind me asking? I’ve heard most of the times that Net Security folk really mostly look at what is leaving / coming into their network rather than what’s happening locally.
Hey David! I really want Mr. Occupy the web to do a full explained video on Burpsuite! Explaining each and every tab with the real world uses. Hit like please so that David sees this!
Just started hacking (at 40y/o) using the the OTW books. Tried it earlier, but the problem with at least 90% of the info available is that us newbies don't understand the basics. And that the experts don't understand what the newbies don't understand. Even with a PhD I found most of the stuff having a completely wrong learning curve. These books by OTW are the exception.
The quality and informative value of this channel can not be overstated. There is only a few on YT that compare and ALL of them have had appearances on this channel. Coincidence? I think not. Thank you for being such a consistently great free source of information and motivation for so many people.
I’m from Somalia as I watch your videos you inspired me to be cyber warrior and now I started CCNA from Jeremy it lab and I’m on the video day 17 which is configuring vlans. And also started changing the operating system of my laptop to Kali Linux and do some basic attacks like the deauthenthication learnt from you. All of all you become my role model.
I want to Thank You for the way you and OTW teach and communicate. Im in school for cyber securitry but i honestly learn most of my stuff watching your videos. I recently purchased 2 of OTW's books, (1.Linux Basics for Hackers, and 2.Getting Started becoming a master Hacker). By far 2 of the best books i ever read.
David, I must say, Mr. Occupy the web is a great teacher. its very hard to find skilled professionals with so much knowledge and teach so well. thanks to Both of you.
I’m only 20 minutes in an loving the video so far. That intro was so invaluable. I want to go into SOC but I’m now realising how important it is to become adaptable and knowledgeable inside Kali Linux and practice using these top 10 tools if I really want to become a cybersecurity professional. Cant wait to watch the rest of this!
A cyber security pro needs to have the same concept of "It takes a thief to catch a thief." But instead "It takes a hacker to catch a hacker." Thanks again for another great video Dave!
I am so grateful for these videos. I’m currently trying to transition from police work and physical security to cyber security and these videos are so easy to follow and make a great supplement to my classes.
In my view is to learn what you need not everything for example for test website you will need burp suite + shodan + other depend on what you wan to do for network: nmap > You are not machine to learn everything. Learn what makes close to your goal.
Really happy that I could find this vid. Previously, linux, Nnamp or sth just show on the course. Finally, I could see someone demo it. Really appreciate your effort and contribution. 💕💕💕
Thanks for the great video David! There’s always great info in your videos and because of that, I have to watch several times to get everything. Also love learning from OTW too!
When you join a public WiFi these days, your traffic is generally encrypted anyway depending on the application so SSL Strip and other MiTM attacks are mostly out of the question (DNS Poisoning etc. can still be possible). One issue with public WiFi could regard network segregation but otherwise can you please talk about what specific problem you are trying to solve by joining a VPN?
I love the fact he went into detail in this video although other videos are good im really into the how and whys of the actions of IOT. loved the video keep it up David and Hackers Arise
Hi Mr. Bombal! Would there be any OSINT roadmap video? Especially for a "pro-level" tier: - image processing, geolocation, visual analysis, - timelapse reconstruction, 3D-reconstruction, - AI-enlarged close-up of the item/image, digital reconstruction (of the image), dimensional analysis, etc. Stuff used in law enforcement - tracking criminals and rescuing lost/kidnapped people. Thanks for your consideration!
i JUST HAVE TO SAY THAT OTW EXPLAINS STUFF REALLY WELL. IVE BEEN STUDYING THESE TOPICS OVER THE LAST YEAR OR SO AND I HAVE HEARD CONCEPTS AND TOOLS THAT OTHERS HAVE NOT EVEN MENTIONED
David, in one of your other vids you emphatically claimed to having no clue as to the identity of occupytheweb, you had no idea who he really is, yet at 1:09:38 in this vid you can be clearly heard calling him 'John'. That aside, you guys put out some really excellent content. As a child I used to be afraid of the boogyman hiding under my bed. Now I'm all grown up and you've shown me he lurks out there in the world wide web and my system was an open door (probably still is), After watching a bunch of your clips you guys not only pointed out where my system might be vulnerable but also, in nice simple terms, offered ways I can try and fix that. And for that I thank you.
Indepth topics discussed in the video: Three way handshake Using Display filter expression RFCs TCP/IP HPING3 NMAP Open ports on a network, Tcp scan, ST scan
"Endless thanks to you for consistently delivering incredible content that brightens my days as well as it gives me the motive to move forward!!" I'm currently learning web-development and learning new concepts of it just like you say to learn something new everyday ! it's tough but even if it's a little I can see the result !!
Just preordered OccupyTheWeb’s “Linux Basics for Hackers” book releasing November 5th. I’m probably going to buy the current release to hold me over til then, November is a long ass way away.
First book i read getting into security its helped me learn the fundamentals to build upon. If i had the extra money i would love to take otws sdr classes
I want to say thanks to both of you for producing useful content, as someone who is working in cybersec space and training to become ethical hacker, I find your books and courses very valuable. Keep doing what you do guys, world appreciates your efforts.
@@ChrisFellOnYou're probably referring to Npcap which is the Nmap Project's packet capture (and sending) library for Microsoft Windows. If you don’t have Npcap installed, you won’t be able to capture live network traffic, but you will still be able to open saved capture files.
Happy New year David. I'd like to express my gratitude to you and OTW. You can't imagine the impact of your work on my life. I have started a training for Pentest and Security. You gave me confidence that i am not too old to make a change. Many thanks to you and OTW🙏🏾🙏🏾🙏🏾.
We are never to old to learn, completly agree with David, so you are right to thanks him for reminding that to everybody. Good continuation in your career.
Even if a bit late, I want to wish you, and eveyone reading this, all the best for the new year. As always great content and inspiring, thanks for all that you do.
@@izacizac0074 - if you are talking about Linux's ability to ping the Windows computer ... there is a builtin firewall rule that disables the ICMP traffic on the Windows system. In the Windows Defender Firewall, find the Inbound Rule called: File and Printer Sharing (Echo Request - ICMPv4-In) ... and enable it. You should now be able to ping the the Windows computer from the Linux box.
Happy new year David, it's not easy to install " snort " in a Kali OS so I and sure your audience too would appreciate it, if you find the time to do a video how to do this and how to use it! I like to follow your contend videos with all your guest, content, gadgets and of course OTW is the most inspiring and amazing guest on your Chanel, for me until now! I hope you continue with your passion to offer this content for free, to keep us updated!
OmGOSH, I finished my intrusion detection course this fall and we were using snort. Different students were using different distros, and I had grown to like Kali throughout my courses, so I just stuck with it. Installing it on Kali was not hard, but it was not easy either. You have to install some repositories in your home directory so you create your directories and install them there. Then after all said and done, you can install snort. Issues still popped up as soon as we started writing our own custom rules. Logging alerts was something we had constant issues with. Our professor was using CentOS and experienced 0 issues, unlike us who were using Kali. Might have been the fact we were using a VM and not running bare metal, but we didn't get it resolved.
I moved into a place that already had a wireless ISP equipment on the house waiting for me to call and activate/subscribe. I plugged into the ethernet port in the house. No internet. For some reason I thought of pinging google real quick to see if it was actually hooked up. Ping went through. They were only blocking TCP/UDP so I set up a VPS in the cloud as a ICMP proxy server, So it routed all of my internet traffic into ICMP before sending off to my own proxy server. So I ended up rerouting all the TCP traffic over ICMP and had free internet for longer than I remember. ICMP is rate limited, I was only getting 10% of normal speed, but knocking my 50Meg download down to about 5meg download but it was still very usable, especially for free.
hey, what to do after you want to finish monitoring the network? after checking the network with wireshark, many sites refuse to give me access to browse, which didn't happen before
Hello sir thank you for the video you push out,it motivates me to do better with my life,I am currently learning Linux, I want to better myself and get a job by year end or next year.
I have your quote as my wallpaper on my phone to keep me motivated daily. The one that says everyday you wait is another day you will never get back again.
Hello David sir...First of all thanks for inspiring and motivating us and giving away so many courses and useful video for free. You are helping so many people like me. I will meet you one day. Thanks for everything you are doing. Just one request...Please giveaway your "The complete networking fundamentals course".
This is actually my 2nd or maybe 3rd favorite in terms of cyber security content. I am looking for concise tutorial about vanilla applications of many the most popular tools that are featured in Kali Linux. So an example would be using hydra but for web development - so maybe like a custom login page and hydra demonstration or just some kind control environment like this. Use case would be instead of password guessing using hydra to enumerate a prompt iteratively from a word list and making a post request or something like this. I particularly enjoy how David is always getting book recommendation from his guest. Some times when I just want a new book, ill watch this channel for this feature specifically. Cheers!
Hey, so ive recently became interested in the world of hacking do to some life situations and have been studying my butt off for the past 5 months. Its been very fun but challenging to learn. Something ive had the most issues with is learning to read or analyze messages and files that have been encrypted or written in an encoded language like UTF 8 or base 64 or like McContIsh and so one. How do you decode these languages so that i can actrual read the indo and understand it...
I want to relate it to the Quantum Computing with information on the table we have rn. Will the material related to studying Linux and networking still be relevant in how many years do you think? Do u think, Will the basics of computer language be irreplaceable? with the new comers tech of AI and Quantum Computing?
Quantum computing is as commercial and consumer use are still 20+ years out. The "stable" systems in use are cooled well below zero degrees by liquid nitrogen and vacuum systems to maintain usable molecular states. So not practical for any type of consumer use. That being said the manufacturing programming languages and a variety of other conversion issues into standard computing also isn't there for any wide spread distribution. AI on the other hand yes it already is displacing IT workers. Not every company is onboard yet but ask yourself in two years would you rather pay a person 70k a year plus benefits and time off. Or would you rather pay $250 a month for 24/7 cloud based network security management that has immediate access to any known attack database. There's a reason why Microsoft is dumping so much money into open AI... I'll tell you it's to integrate it into Azure.
I commented this on an older video but I was just wondering would it be worth waiting/preordering the 2nd edition of the Linux basics for hackers and just use the online recourses in the mean while or just get the 1st edition?
This channel has one if the best tutorial so far, the content creator didn't exaggerate, keep it simple and real. Thank you so much. We need to download these vids before it's taken down, lol.
I had a passing conversation with a guy in a coffee shop a few weeks ago. The guy was super wealthy so I started asking him what he did for a living. He owns a multitude of ATMs within 200 kms of me. Being at the beginning of a Cyber Security Bootcamp I decided to probe a bit. Turns out ALL of his ATMs still run on windows XP. He does this because it's an OS he's familiar with. Obviously I told him that he's open to an enormous amount of vulnerabilities. "I haven't had an issue yet!" So yes, people still use Windows XP in some surprisingly vulnerable systems.
Undoubtedly the ATM has a tunnel backbone or similar, so you would probably never be able to access the OS to begin with, otherwise ATMa would he hacked all day, every day. When is the last time you've heard of an ATM being hacked? Many ATMs or other business machines like gas pumps use simple OS's because they don't have a ton of computing power. But the network backbone is what allows you to get into the machine, not the OS.
Hello try to install snort after add the lines to sources.list could find the package snort? Any solutions? The guides on the web are pretty strange and don't work. Thx for help😊
Hi David thank you for this video but how long does it take to learn ethical hacking I know it varies from person to person, but I want an answer in an estimated manner
Hey, super cool video, and greetings from Germany. I kindly request more detailed videos with him. Do you both not have old PCs that you can hack as a challenge and turn it into a live stream? In today's time, where we are dealing with an enormous cyber war, it is incredibly important to come together and learn from each other. I am still relatively new to hardware hacking; my strength lies more in psychological hacking. However, I would be delighted if you could make more videos together. I also think that the guest can explain very well, even though English is not my native language. A huge praise for this great video and the fantastic introduction. Learned a lot, thank you very much.
I think that 99% of cases that have suffered some type of attack depend most of the time on the victim accepting something they shouldn't and opening doors to the intruder. keyloggers/malware etc... now hacking a system without the victim having an account or without sending something I think is unlikely
Summary of the tools discussed:
Wireshark: Network Packet Analysis
hPing3: Packet Creation
Nmap: Network Discovery
Shodan: IoT Search Engine
BurpSuite: Web Application Testing
Metasploit (Eternal Blue): Exploitation Framework
Snort: Intrusion Detection
Nessus: Vulnerability Scanner
AirCrack NG: Wireless Hacking
Hashcat: Password Cracking
Ghidra: Reverse Engineering
HackRF: Radio Hacking
20120
🎉s 🎉😢🎉😮🎉🎉
🎉e 😮😢🎉 43:28 I 😂😢😮😮d to do 🎉 43:52 to 😮🎉🎉😅 44:04 44:04 I 😢 44:11 a new year w🎉
😮😂🎉😢🎉t shirts e😢s and m m and s🎉e🎉e😂se or something 45:16 😮else 😢😢
What software is he using to swap between VMs?
I've started to work as a network security engineer and this video is 100% legit guide to follow. Wireshark is overlooked tool. Learn how to analyse each packet to its core. Infact this is my go to tool in my work. We mainly work on this. You should know everything to analyse a compromised situation and then take appropriate counter measures for it. Without knowing what's happening it's like going in blind.
Exactly 💯🏴😎
How often do you guys like at intranet traffic if you don’t mind me asking? I’ve heard most of the times that Net Security folk really mostly look at what is leaving / coming into their network rather than what’s happening locally.
Hey David! I really want Mr. Occupy the web to do a full explained video on Burpsuite! Explaining each and every tab with the real world uses.
Hit like please so that David sees this!
Make sure you install foxy proxy 😊
Just started hacking (at 40y/o) using the the OTW books. Tried it earlier, but the problem with at least 90% of the info available is that us newbies don't understand the basics. And that the experts don't understand what the newbies don't understand. Even with a PhD I found most of the stuff having a completely wrong learning curve. These books by OTW are the exception.
First you should learn basics (Network, Linux, Security concepts) coz hacking is like ocean before we dive we should learn how to swim first right
45 here 😂
this stuff makes me feel better about being 19 n thinking it’s too late
50yo and always learning this lol
@@hitorsh1t 55, incessant learner!
The quality and informative value of this channel can not be overstated. There is only a few on YT that compare and ALL of them have had appearances on this channel. Coincidence? I think not. Thank you for being such a consistently great free source of information and motivation for so many people.
I’m from Somalia as I watch your videos you inspired me to be cyber warrior and now I started CCNA from Jeremy it lab and I’m on the video day 17 which is configuring vlans.
And also started changing the operating system of my laptop to Kali Linux and do some basic attacks like the deauthenthication learnt from you.
All of all you become my role model.
Stick to the cisco and dont become a criminal...
Do whatever you want don't listen to this guy ^^^^^
@@kennyg5538You had to edit this?! lmao.
Thats what fake positivity for clout will get ya.
@@goat-eyesyou also edited 😂😂
I want to Thank You for the way you and OTW teach and communicate. Im in school for cyber securitry but i honestly learn most of my stuff watching your videos. I recently purchased 2 of OTW's books, (1.Linux Basics for Hackers, and 2.Getting Started becoming a master Hacker). By far 2 of the best books i ever read.
David, I must say, Mr. Occupy the web is a great teacher. its very hard to find skilled professionals with so much knowledge and teach so well. thanks to Both of you.
I’m only 20 minutes in an loving the video so far. That intro was so invaluable. I want to go into SOC but I’m now realising how important it is to become adaptable and knowledgeable inside Kali Linux and practice using these top 10 tools if I really want to become a cybersecurity professional. Cant wait to watch the rest of this!
Your guest is absolutely fascinating to listen and watch at work. Great content.
He's trains the CIA and MI6 NSA all on hack RF and hacking
A cyber security pro needs to have the same concept of "It takes a thief to catch a thief." But instead "It takes a hacker to catch a hacker."
Thanks again for another great video Dave!
Yes. Fire with fire
I am so grateful for these videos. I’m currently trying to transition from police work and physical security to cyber security and these videos are so easy to follow and make a great supplement to my classes.
I could and have listen to both of you for hours. I bet there would be a huge demand for a course on the flipper one.
In my view is to learn what you need not everything
for example for test website you will need burp suite + shodan + other depend on what you wan to do
for network: nmap
> You are not machine to learn everything. Learn what makes close to your goal.
Really happy that I could find this vid. Previously, linux, Nnamp or sth just show on the course. Finally, I could see someone demo it. Really appreciate your effort and contribution. 💕💕💕
I'm new to Cybersecurity and you are a great mentor.
Your channel is my favorite, and the sessions with Occupy the Web are what I always look forward to every time I get a notification from your channel
Thanks for the great video David! There’s always great info in your videos and because of that, I have to watch several times to get everything. Also love learning from OTW too!
Thank you! Glad to hear it!
one thing wireshark is useful for is when crafting ht packets using the command line, or any kind of packets.
When you join a public WiFi these days, your traffic is generally encrypted anyway depending on the application so SSL Strip and other MiTM attacks are mostly out of the question (DNS Poisoning etc. can still be possible). One issue with public WiFi could regard network segregation but otherwise can you please talk about what specific problem you are trying to solve by joining a VPN?
I love the fact he went into detail in this video although other videos are good im really into the how and whys of the actions of IOT. loved the video keep it up David and Hackers Arise
Awesome video. Laid out very nicely on how to install a VM before install pf Kali Linux. Luv it!! Great job.🎉🎉
Hi Mr. Bombal!
Would there be any OSINT roadmap video? Especially for a "pro-level" tier:
- image processing, geolocation, visual analysis,
- timelapse reconstruction, 3D-reconstruction,
- AI-enlarged close-up of the item/image, digital reconstruction (of the image), dimensional analysis, etc.
Stuff used in law enforcement - tracking criminals and rescuing lost/kidnapped people.
Thanks for your consideration!
i JUST HAVE TO SAY THAT OTW EXPLAINS STUFF REALLY WELL. IVE BEEN STUDYING THESE TOPICS OVER THE LAST YEAR OR SO AND I HAVE HEARD CONCEPTS AND TOOLS THAT OTHERS HAVE NOT EVEN MENTIONED
Thanks for great content Dave!. I enjoy the videos on your channel .Happy new year 2024. I wish you all the best.🙂
David, in one of your other vids you emphatically claimed to having no clue as to the identity of occupytheweb, you had no idea who he really is, yet at 1:09:38 in this vid you can be clearly heard calling him 'John'. That aside, you guys put out some really excellent content. As a child I used to be afraid of the boogyman hiding under my bed. Now I'm all grown up and you've shown me he lurks out there in the world wide web and my system was an open door (probably still is), After watching a bunch of your clips you guys not only pointed out where my system might be vulnerable but also, in nice simple terms, offered ways I can try and fix that. And for that I thank you.
Be cool to see something on hacking ship Navigation equipment as most simrad, lowrance, Garmin all have Wi-Fi, and vonnect to other systems onboard.
Indepth topics discussed in the video:
Three way handshake
Using Display filter expression
RFCs
TCP/IP
HPING3
NMAP
Open ports on a network, Tcp scan, ST scan
Thanks
Thank you very much!
"Endless thanks to you for consistently delivering incredible content that brightens my days as well as it gives me the motive to move forward!!"
I'm currently learning web-development and learning new concepts of it just like you say to learn something new everyday !
it's tough but even if it's a little I can see the result !!
You're welcome!
actually understand the basics of metasploit now ty otw and David!
Just preordered OccupyTheWeb’s “Linux Basics for Hackers” book releasing November 5th. I’m probably going to buy the current release to hold me over til then, November is a long ass way away.
Always thankful to you David and also OTW.
i like listening to you and OTW!!!
Happy New Year David and OTW Great Job
First book i read getting into security its helped me learn the fundamentals to build upon. If i had the extra money i would love to take otws sdr classes
I want to say thanks to both of you for producing useful content, as someone who is working in cybersec space and training to become ethical hacker, I find your books and courses very valuable. Keep doing what you do guys, world appreciates your efforts.
NMap is installed when you install Wireshark, does that mean it automatically runs while running Wireshark?
Oh okay so Wireshark couldn’t run without NMap
@@ChrisFellOnYou're probably referring to Npcap which is the Nmap Project's packet capture (and sending) library for Microsoft Windows.
If you don’t have Npcap installed, you won’t be able to capture live network traffic, but you will still be able to open saved capture files.
On Kali linux, if you want to demonstrate how phones are leaking their past networks they have connected to, what is the tool I should look for?
Question about protonVpn. Are their servers based on US soil or other “eyes” cooperative nations ? Do they maintain copies of logs ? Thks
Great video David. I'd like to see more videos about Open Source IDS, and defense systems, less costs.
I am new to your channel but your vedeos are very informative. Thank you for helping us ❤❤
this channel is still one of my favourite to learn from 🙂🙂
Happy to hear that!
Really great orienteering Jack. "🖐 Mr. Bombal"
Happy New year David.
I'd like to express my gratitude to you and OTW. You can't imagine the impact of your work on my life. I have started a training for Pentest and Security. You gave me confidence that i am not too old to make a change.
Many thanks to you and OTW🙏🏾🙏🏾🙏🏾.
We are never to old to learn, completly agree with David, so you are right to thanks him for reminding that to everybody.
Good continuation in your career.
Even if a bit late, I want to wish you, and eveyone reading this, all the best for the new year. As always great content and inspiring, thanks for all that you do.
would not surprise me at all if you actually both people in the video... XTTS ftw :>
discovered your channel recently. lekker man! easy sub!
Step one: Setup a Linux and a Windows VM that are capable of interfacing with each other.
This is often the biggest barrier to beginners.
i am beginner. how to stting? can you let me know? plzz
@izacizac0074 There are many good videos on it. Whether or not you have what it takes to stick with it and keep trying until it works is up to you.
@@izacizac0074 - if you are talking about Linux's ability to ping the Windows computer ... there is a builtin firewall rule that disables the ICMP traffic on the Windows system. In the Windows Defender Firewall, find the Inbound Rule called: File and Printer Sharing (Echo Request - ICMPv4-In) ... and enable it. You should now be able to ping the the Windows computer from the Linux box.
hping3 was originally created by Salvatore Sanfilippo from University of Catania, department of Mathematics and Computer Science
Italia!
Happy new year David,
it's not easy to install " snort " in a Kali OS so I and sure your audience too would appreciate it, if you find the time to do a video how to do this and how to use it!
I like to follow your contend videos with all your guest, content, gadgets and of course OTW is the most inspiring and amazing guest on your Chanel, for me until now! I hope you continue with your passion to offer this content for free, to keep us updated!
OmGOSH, I finished my intrusion detection course this fall and we were using snort. Different students were using different distros, and I had grown to like Kali throughout my courses, so I just stuck with it. Installing it on Kali was not hard, but it was not easy either. You have to install some repositories in your home directory so you create your directories and install them there. Then after all said and done, you can install snort. Issues still popped up as soon as we started writing our own custom rules. Logging alerts was something we had constant issues with. Our professor was using CentOS and experienced 0 issues, unlike us who were using Kali. Might have been the fact we were using a VM and not running bare metal, but we didn't get it resolved.
Thank you so much for your videos! I have learned a lot and followed you for quite some time! Happy New Year!
Says "mkay" like the teacher from south park :D Great video, really love these!
Another great informative content video.
You guys are amazing.
Thanks for sharing the knowledge! Greetings from Papua New Guinea!
I moved into a place that already had a wireless ISP equipment on the house waiting for me to call and activate/subscribe. I plugged into the ethernet port in the house. No internet. For some reason I thought of pinging google real quick to see if it was actually hooked up. Ping went through. They were only blocking TCP/UDP so I set up a VPS in the cloud as a ICMP proxy server, So it routed all of my internet traffic into ICMP before sending off to my own proxy server. So I ended up rerouting all the TCP traffic over ICMP and had free internet for longer than I remember. ICMP is rate limited, I was only getting 10% of normal speed, but knocking my 50Meg download down to about 5meg download but it was still very usable, especially for free.
Please complete the networking series...
I am 13 and i am learning hacking from you thank you alot!❤
hey, what to do after you want to finish monitoring the network? after checking the network with wireshark, many sites refuse to give me access to browse, which didn't happen before
probably cause your net adapter is in monitor mode or something
Hello sir thank you for the video you push out,it motivates me to do better with my life,I am currently learning Linux, I want to better myself and get a job by year end or next year.
You can do it! Just try to improve 1% every day!
I have your quote as my wallpaper on my phone to keep me motivated daily. The one that says everyday you wait is another day you will never get back again.
Ваши связки всегда выручают. Огромное спасибо!
You’re doing a fantastic job with OTW
Like always OTW is such a great teacher! Thanks for sharing the knowledge
Woo! Always love the videos when OTW is on!
Hello David sir...First of all thanks for inspiring and motivating us and giving away so many courses and useful video for free. You are helping so many people like me.
I will meet you one day. Thanks for everything you are doing.
Just one request...Please giveaway your "The complete networking fundamentals course".
Thank you! Great suggestion! I look forward to meeting you one day - I'm going to try to attend more conferences so I can meet people :)
Excellent, David and OTW!!! Very fine content for hardening learning in security. Congratulations, Peace and health.
This is actually my 2nd or maybe 3rd favorite in terms of cyber security content. I am looking for concise tutorial about vanilla applications of many the most popular tools that are featured in Kali Linux. So an example would be using hydra but for web development - so maybe like a custom login page and hydra demonstration or just some kind control environment like this. Use case would be instead of password guessing using hydra to enumerate a prompt iteratively from a word list and making a post request or something like this.
I particularly enjoy how David is always getting book recommendation from his guest. Some times when I just want a new book, ill watch this channel for this feature specifically.
Cheers!
Hi! What card is best for 5Ghz for use with Kali or ParrotOS in 2024 in a Vmware with Windows? Thanks!
Hey, so ive recently became interested in the world of hacking do to some life situations and have been studying my butt off for the past 5 months. Its been very fun but challenging to learn. Something ive had the most issues with is learning to read or analyze messages and files that have been encrypted or written in an encoded language like UTF 8 or base 64 or like McContIsh and so one. How do you decode these languages so that i can actrual read the indo and understand it...
I want to relate it to the Quantum Computing with information on the table we have rn.
Will the material related to studying Linux and networking still be relevant in how many years do you think?
Do u think, Will the basics of computer language be irreplaceable? with the new comers tech of AI and Quantum Computing?
Quantum computing is as commercial and consumer use are still 20+ years out. The "stable" systems in use are cooled well below zero degrees by liquid nitrogen and vacuum systems to maintain usable molecular states. So not practical for any type of consumer use. That being said the manufacturing programming languages and a variety of other conversion issues into standard computing also isn't there for any wide spread distribution. AI on the other hand yes it already is displacing IT workers. Not every company is onboard yet but ask yourself in two years would you rather pay a person 70k a year plus benefits and time off. Or would you rather pay $250 a month for 24/7 cloud based network security management that has immediate access to any known attack database. There's a reason why Microsoft is dumping so much money into open AI... I'll tell you it's to integrate it into Azure.
Army signit here. Hacking radio waves is old news but for those who are new to it, it’s an interesting ride…
Thank you, these books really helps alot
I commented this on an older video but I was just wondering would it be worth waiting/preordering the 2nd edition of the Linux basics for hackers and just use the online recourses in the mean while or just get the 1st edition?
If it were me, I'd get the first edition and start studying asap.
@@davidbombal Thanks I'll order now.👍
This channel has one if the best tutorial so far, the content creator didn't exaggerate, keep it simple and real. Thank you so much. We need to download these vids before it's taken down, lol.
Glad it helped!
ini yang saya tunggu david and occupy the web ❤
salam : indonesia
I had a passing conversation with a guy in a coffee shop a few weeks ago. The guy was super wealthy so I started asking him what he did for a living. He owns a multitude of ATMs within 200 kms of me.
Being at the beginning of a Cyber Security Bootcamp I decided to probe a bit. Turns out ALL of his ATMs still run on windows XP. He does this because it's an OS he's familiar with. Obviously I told him that he's open to an enormous amount of vulnerabilities. "I haven't had an issue yet!"
So yes, people still use Windows XP in some surprisingly vulnerable systems.
Can the attacker make it the OS remotely? What IDS, IPS, VLAN, etc are in place?
Undoubtedly the ATM has a tunnel backbone or similar, so you would probably never be able to access the OS to begin with, otherwise ATMa would he hacked all day, every day. When is the last time you've heard of an ATM being hacked?
Many ATMs or other business machines like gas pumps use simple OS's because they don't have a ton of computing power. But the network backbone is what allows you to get into the machine, not the OS.
@@omegadroidzerogood question and I answered it below somewhat.
Can you help me and tell me what is the best adapter in 2024 that supports the injection system and monitor mode at a reasonable price?
Hello try to install snort after add the lines to sources.list could find the package snort? Any solutions? The guides on the web are pretty strange and don't work. Thx for help😊
THX David you're one of my favorite RUclipsr.
Hi David thank you for this video but how long does it take to learn ethical hacking
I know it varies from person to person, but I want an answer in an estimated manner
Lol 😂
@@edwarddonatus5888 because why bro you are laughing ?
watching this video was the best thing i've done so far this year. thanks David and OTW. if only i could afford his subscriber/subscriber pro course.
Manage to use the OTW Discount. Thank you David.
Sir OTW is amazing 🔥🔥
Sir try to bring the legend The cyber mentor please.
Quick question
What is the best operating system for programming and hacking
Kali Linux, get the full one, includes all the tools
AWESOME VIDEO - VERY INFORMATIVE - MUST WATCH - THANK YOU 🙂
I ALREADY DOWNLOADED NESSUS - WAITING FOR THE NESSUS 101 VIDEO 🙂
Congratulations and I have appreciated the intellectual honest to declare the many attached systems was unppatcged.
Thanks David Bombal 😅 Unbelievable content 😮
Looking forward to those tutorials on dragonOS,Nessus and Metasploit!!🙏
Just wondering if something similar is possible le with android phones, I want to make sure I am not downloading any unsafe apps
love listening to you and OTW!!!
great video by you 2, congrats 👍👍👍👍👍
One of the best video i had ever seen❤❤❤❤
Can you please make a video on TL-WN822N adapter how to enable monitor mode and Packet injection
Hey, super cool video, and greetings from Germany. I kindly request more detailed videos with him. Do you both not have old PCs that you can hack as a challenge and turn it into a live stream? In today's time, where we are dealing with an enormous cyber war, it is incredibly important to come together and learn from each other. I am still relatively new to hardware hacking; my strength lies more in psychological hacking. However, I would be delighted if you could make more videos together. I also think that the guest can explain very well, even though English is not my native language. A huge praise for this great video and the fantastic introduction. Learned a lot, thank you very much.
Быстро нашли новую связку, молодцы, ну а я с вами всегда в профите!
Damn I might invest myself in OTW's teachings.
Best Regards. Recently passed CompTIA Sec+ . Those exams are ugly
Congratulations...Any advice?
Very helpful for new CyberWarriors getting into the space!
Thanks alot david.iam learning alot from your interesting channel.thanks for occuppy the web also
Only VPN sponsorship I trust 💯
I think that 99% of cases that have suffered some type of attack depend most of the time on the victim accepting something they shouldn't and opening doors to the intruder. keyloggers/malware etc... now hacking a system without the victim having an account or without sending something I think is unlikely
Great to listen to, reminds me of a teacher I had they can explain things easily because they know there shit