Mind Blowing 🤯 Reverse Shell Demo with DNS data bouncing exfiltration!

Поделиться
HTML-код
  • Опубликовано: 28 июн 2024
  • Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: Brilliant.org/DavidBombal
    The First 200 people that sign up will get a special discount.
    Disclaimer: This video is for educational purposes only.
    // Jakoby’s SOCIAL//
    RUclips: / iamjakoby
    LinkedIn: / i-am-jakoby
    X: x.com/i_am_jakoby
    Instagram: / i_am_jakoby
    GitHub: github.com/I-Am-Jakoby
    TikTok: / i_am_jakoby
    // RUclips Video REFERENCE //
    Next Gen Hacker?: • Next Gen Hacker?
    The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success: • The best Hacking Cours...
    // David's SOCIAL //
    Discord: / discord
    X: / davidbombal
    Instagram: / davidbombal
    LinkedIn: / davidbombal
    Facebook: / davidbombal.co
    TikTok: / davidbombal
    RUclips: / @davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    00:00 - Coming Up
    00:57 - Sponsored Section
    03:01 - Intro
    03:19 - Power Shell Gallery
    05:05 - Modules
    06:28 - Microsoft Patch
    08:04 - Consulting with the Cybersecurity Community
    08:58 - Microsoft Honeypot
    10:09 - Models by Jakoby
    11:33 - Running Models
    12:01 - How Models Function
    13:43 - The Vulnerability of The Site
    15:30 - Ransomware
    18:20 - Owning Models
    19:13 - Bug Bounty Program
    22:23 - Reverse Shell Generator
    29:25 - Methods For Execution
    31:49 - How To Solve
    33:47 - Engage with the Ethical Hackers
    34:20 - Exfiltration Data Bouncing
    39:12 - Demo
    39:56 - Capture DNS Traffic
    41:01 - Running Vanish
    50:05 - Running A lot of Testing, No Man’s Land
    52:29 - Get ahold of IamJakoby
    54:08 - Hak5 Payload
    55:57 - Imposter Syndrome
    57:41 - Background Story into Hacking
    01:07:27 - Stationed in Hawaii
    01:10:00 - Conclusion
    Disclaimer: This video is for educational purposes only.
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    #hak5 #cybersecurity #microsoft
  • НаукаНаука

Комментарии • 209

  • @davidbombal
    @davidbombal  2 месяца назад +18

    Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: Brilliant.org/DavidBombal
    The First 200 people that sign up will get a special discount.
    Disclaimer: This video is for educational purposes only.
    // Jakoby’s SOCIAL//
    RUclips: ruclips.net/user/IamJakoby
    LinkedIn: www.linkedin.com/in/i-am-jakoby
    X: x.com/i_am_jakoby
    Instagram: instagram.com/i_am_jakoby/
    GitHub: github.com/I-Am-Jakoby
    TikTok: www.tiktok.com/@i_am_jakoby
    // RUclips Video REFERENCE //
    Next Gen Hacker?: ruclips.net/video/6jqJ7Ga5CoE/видео.html
    The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success: ruclips.net/video/10P4aoXdXTI/видео.html
    // David's SOCIAL //
    Discord: discord.com/invite/usKSyzb
    X: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: www.youtube.com/@davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    00:00 - Coming Up
    00:57 - Sponsored Section
    03:01 - Intro
    03:19 - Power Shell Gallery
    05:05 - Modules
    06:28 - Microsoft Patch
    08:04 - Consulting with the Cybersecurity Community
    08:58 - Microsoft Honeypot
    10:09 - Models by Jakoby
    11:33 - Running Models
    12:01 - How Models Function
    13:43 - The Vulnerability of The Site
    15:30 - Ransomware
    18:20 - Owning Models
    19:13 - Bug Bounty Program
    22:23 - Reverse Shell Generator
    29:25 - Methods For Execution
    31:49 - How To Solve
    33:47 - Engage with the Ethical Hackers
    34:20 - Exfiltration Data Bouncing
    39:12 - Demo
    39:56 - Capture DNS Traffic
    41:01 - Running Vanish
    50:05 - Running A lot of Testing, No Man’s Land
    52:29 - Get ahold of IamJakoby
    54:08 - Hak5 Payload
    55:57 - Imposter Syndrome
    57:41 - Background Story into Hacking
    01:07:27 - Stationed in Hawaii
    01:10:00 - Conclusion
    Disclaimer: This video is for educational purposes only.
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    #hak5 #cybersecurity #microsoft

    • @neo_the_chosen_one777
      @neo_the_chosen_one777 2 месяца назад

      thanks for the premium trial....

    • @jaden8573
      @jaden8573 2 месяца назад

      you leaked the ip in the obfuscated code he generates, just deobfuscate and its in plain text. maybe blur 25:38

    • @unlucky1307
      @unlucky1307 2 месяца назад

      I have some concerns about the coverage here, it seems looking at the github for the project InfosecREDD was deliberately removed from all credits by Jakoby despite working on this project.

    • @digitalcivilulydighed
      @digitalcivilulydighed 2 месяца назад

      This was brilliant!

  • @FutureWarCultist
    @FutureWarCultist 2 месяца назад +70

    The fact bro here is still doing the right thing after taking the shaft on huge bags speaks volumes to his character. The bazaar will gladly offer fair value for your work ❤

    • @davidbombal
      @davidbombal  2 месяца назад +22

      Exactly. We need Ethical Hackers in this world to help better protect us. And companies need to look after the good people like Jakoby.

    • @neiltropolis
      @neiltropolis 2 месяца назад +5

      He was a marine sniper, served his country and disrespected big time. The man is a prince.

    • @swoodc
      @swoodc 2 месяца назад +2

      what huge bag

    • @gyp.
      @gyp. 2 месяца назад

      ​@@swoodcwhat he spoke of towards the start of this video was a pretty huge exploit, that he made Microsoft aware of, they *tried* to patch it. He worked around it in 10 mins, he finally spoke to someone directly and disclosed it again, with some of his own suggestions. He never even heard a word back from Microsoft but when they "patched" it again he said at best Microsoft looked directly at some of his code in his GitHub, and used it on their patch. Again he heard nothing back from Microsoft and they kinda bit some of his own code in the patch.
      Anyway an exploit of this level at Microsoft, especially with how many machines this can affect and the permission they would get. This is a $100k bounty that Microsoft didn't pay him out. He is still trying to get the actual credit for the disclosure so he can earn his bounty.
      He could have sold this on the black market, he could have just dumped it on the Internet but he understood how much damage that could do. He is trying to do the right thing by helping Microsoft by doing responsible disclosures, and because this work takes time and because companies know that other people would pay money for these exploits. Many companies offer "bug bounties" for responsible disclosures of bugs that their software/web sites have. That is the money others are talking about.

    • @mattrogers6646
      @mattrogers6646 2 месяца назад

      ​@@swoodcDidn't get his rightfully earned bug bounties.

  • @deathspirate2170
    @deathspirate2170 2 месяца назад +6

    Great video thanks David! Jakoby did an excellent job of explaining Data Bouncing. We have submitted a CFP to Defcon for the rest of the research we have been doing in this space so fingers crossed that gets accepted. It's awesome to see Data Bouncing being absorbed and built on by the community.

  • @DarthDweeb
    @DarthDweeb 2 месяца назад +21

    Jakoby, you are born to tell stories. Thank you for sharing yours.

    • @IamJakoby
      @IamJakoby 2 месяца назад

      This comment warmed my heart to read, I appreciate you 😊

  • @traviskline2836
    @traviskline2836 2 месяца назад +3

    I understood about 1% of this but I cannot quit watching your videos.

    • @Sammenluola
      @Sammenluola Месяц назад

      This tbh! I have no idea what's being discussed, and I'm captivated like a fly under an anvil.

    • @dalefernandez19
      @dalefernandez19 20 дней назад

      Oh MAN , I'm addicted to his channel to

  • @HAMETE
    @HAMETE 2 месяца назад +12

    The dns exfiltration is crazy! Thanks for sharing and shame to Microsoft

  • @ShaySoFresh777
    @ShaySoFresh777 2 месяца назад +9

    Jakoby is legit a one-man army!! If Michelangelo were alive today, he'd be Jakoby. This is a guy I wanna learn from!

  • @scottv2468
    @scottv2468 2 месяца назад +4

    Amazing video David as always! I'm curious to know about how it would hold up against ThreatLocker and the heuristic-based detection.

  • @freem4nn129
    @freem4nn129 2 месяца назад +2

    Thx for sharing Jakoby, you got your heart and passion in the right place !

  • @user-hg7xs5hv6j
    @user-hg7xs5hv6j 2 месяца назад +3

    im amazed that jakoby has the right set of morals and doesnt allow the fact that he was screwed by the bounty, and is still fighting the good fight. godspeed jakoby.

    • @IamJakoby
      @IamJakoby 2 месяца назад +2

      The only thing it takes for evil to succeed is for good men to do nothing. This world is full of people I care about and want them to have the best lives possible

    • @vrts
      @vrts 2 месяца назад +1

      @@IamJakoby just wanted to let you know that your attitude and perseverance is inspiring. Keep it up.

  • @c0ri
    @c0ri 2 месяца назад +6

    Great show.. love these really simple callouts. It was eye opening seeing those modules which could be made by anyone. MS is going to have a headache grabbing control back of all those modules.. but now that they are out, they will need to change Powershell and UAC as well to fix this. Man.. Anyway, great guest and show today!

    • @davidbombal
      @davidbombal  2 месяца назад +1

      Glad you enjoyed the video! Jakoby is doing amazing work!

  • @inbrandtive
    @inbrandtive 2 месяца назад +2

    This guy deserves more appreciation.

  • @TalkingSasquach
    @TalkingSasquach 2 месяца назад +16

    Heyyy nice to see you guys together!! I'm psyched to watch!

  • @chathurangaonnet
    @chathurangaonnet 2 месяца назад +1

    Great video. Thanks David and Jakoby !!!

  • @ProgrammingWithDaniel
    @ProgrammingWithDaniel 2 месяца назад +2

    How about making a map of the all sites like adobe that support that, and send the chunks of a file to the all sites, an then just listen the response from all of them and combine the chunks in the order of the mapped sites? Man, this is insane, this video is in the list of the best ever in my opinion. Congrats Jakoby brilliant mind, thanks David!

    • @IamJakoby
      @IamJakoby 2 месяца назад +1

      Yuuuup so that ls what the team I was working with did actually. Its pretty much all sites that use akamai
      And then yup you can just blast it across as many domains as you would like and rebuild from there

  • @brycenamorozo8630
    @brycenamorozo8630 2 месяца назад +1

    That’s crazy I’m a junior majoring in cybersecurity and I live in Waipahu! Crazy small world thank you for sharing your stories your demonstrations on reverse shell was mind blowing and I’m excited to get into the cybersecurity field

    • @IamJakoby
      @IamJakoby 2 месяца назад

      I miss Hawaii sooooo very much 😢

  • @christianlohmann8577
    @christianlohmann8577 2 месяца назад +2

    Thanks for the heads up. Scary 😮 and bad from MS to not compensate for the support they receive from people like IamJakoby. And thanks David to give them the time sharing the risks.

  • @robtihanyi1155
    @robtihanyi1155 2 месяца назад

    Powerful stuff David...good job man

  • @user-tb7nj8di7i
    @user-tb7nj8di7i 2 месяца назад +8

    This guy is my mentor even though I am far older than you.
    I will be in the state for cyber security course and I will be looking for you.
    Greetings from Ghana

    • @davidbombal
      @davidbombal  2 месяца назад +2

      Jakoby is amazing! We can all learn from him :)

  • @danielpacak6577
    @danielpacak6577 2 месяца назад

    Epic! I've learned a ton! Thanks for sharing your expertise! 👑

  • @faanross
    @faanross 2 месяца назад

    we LOVE jakoby! thanks for having him on david!

  • @Striker9
    @Striker9 2 месяца назад +1

    I first saw iamjakoby here a few weeks ago when i built a pico rubber ducky. Amazing to see the guy himself, never thought to look up his name on anything except the ducky script repository.

    • @IamJakoby
      @IamJakoby 2 месяца назад +1

      Congrats on your build and I'm happy I could help in some way 😊

  • @cef-ym3gb
    @cef-ym3gb 2 месяца назад +3

    Thank you for your service. ❤

  • @C8zzzD
    @C8zzzD 2 месяца назад

    Ooh wee, I'm learning so much... ❤ instantly hooked

  • @guillaumelavoie1544
    @guillaumelavoie1544 2 месяца назад

    Thank you for the interview. I am speechless.

  • @la_sn3ak3r19
    @la_sn3ak3r19 2 месяца назад +9

    DNA data bouncing is the worm hole for the clear web.

    • @csexecutiveservices
      @csexecutiveservices 2 месяца назад +2

      @DavidBombay & Jakoby, Curious about possibly making this even stealthier using something other than TXT records, hint: dig | grep ad

    • @IamJakoby
      @IamJakoby 2 месяца назад

      Yuuuuuuup potential is pretty insane

    • @IamJakoby
      @IamJakoby 2 месяца назад

      ​@@csexecutiveservicesEXACTLY. You are headed in the right direction

  • @gamereditor59ner22
    @gamereditor59ner22 2 месяца назад +1

    Wow! This cool educational information! Thank you!

  • @outseeker
    @outseeker 2 месяца назад

    :O WOW. So many amazing factors! Bounty very deserved.. Kinda scary providing the public even this much information in a video like this lol

  • @Metalswede
    @Metalswede 2 месяца назад

    Such an interesting video for a student who’s studying IT security, even though I probably only understood about 50% of the things mentioned in this video haha. Thank you for sharing this and letting us find out about Jakoby!

  • @stathemjonathan7855
    @stathemjonathan7855 2 месяца назад

    Thank you , David

  • @licantrophe_cl
    @licantrophe_cl 2 месяца назад +1

    I like old-fashioned hackers, with phrases, and colors on their terminals, what good times.

    • @IamJakoby
      @IamJakoby 2 месяца назад

      I am a terminal diva ha

  • @MohamedSayed-zv3sq
    @MohamedSayed-zv3sq 2 месяца назад +3

    Thank you David💯👍🏽

  • @kfluhx
    @kfluhx 2 месяца назад

    I'm sure, especially in this community, it's incredibly hard to share the personal experiences that inspired people down this path. Very much appreciated and inspiring in return. Thanks for bringing both the technical (which I barely understand enough to follow along), and some much needed humanity. Theoretically, it's the only thing that separates us from AI at this point, right? 😅

  • @dustinhxc
    @dustinhxc 2 месяца назад +1

    Heyyy happy to see him here!! 🎉

  • @bradley6727
    @bradley6727 2 месяца назад +1

    There you go Michael. Way to get on David Bombals' channel. Great collaboration

  • @tracydeuyour4186
    @tracydeuyour4186 2 месяца назад +1

    This is amazing content thanks so much for sharing

  • @krissymikulski
    @krissymikulski 2 месяца назад +1

    Thank you Very motivating. Imposter syndrom is hard to get over at times. I especially was happy to hear that there is good people out there, That something I need to hear more of due to all the evil people in the world. Thank you both again

  • @PopaLapin-ot7rf
    @PopaLapin-ot7rf Месяц назад

    Very creative !!! Jakob is giga brain!!!

  • @GiC7
    @GiC7 2 месяца назад

    THANKS

  • @scottstewart5425
    @scottstewart5425 2 месяца назад +1

    Polymorphic reverse shell...thats amazing

    • @IamJakoby
      @IamJakoby 2 месяца назад

      Thank you kind sirrr 😊

  • @Lou-sassole3
    @Lou-sassole3 2 месяца назад

    man this helped me so much thank you ..

  • @Manavetri
    @Manavetri Месяц назад

    Este sujeto es increíble. La realidad es que me quede por detrás, si bien entiendo superficialmente lo que dice, también siento que no entendí nada haha
    Agradezco que esta clase de persona quieran defender al resto de personas honestas.
    Realmente lo aprecio muchísimo y me encantaría seguir viendo videos de Jakoby

  • @lathinktank2291
    @lathinktank2291 2 месяца назад

    Great video David Jack is a great guest

  • @godadawgashaw4965
    @godadawgashaw4965 2 месяца назад

    Thanks

  • @MoJoRSA
    @MoJoRSA 2 месяца назад +1

    Messaged some guys at Microsoft that I grew up with. Well played on the ethical hacking. I pray I messaged the right people for you.

  • @Mr._Atlas
    @Mr._Atlas 2 месяца назад

    Happy Easter!

  • @Vant0mme
    @Vant0mme 2 месяца назад +1

    Jakoby is the man!

  • @brettlaw4346
    @brettlaw4346 2 месяца назад

    Do you have a tool that can be used to scan for vulnerabilities on the reflection sites so those sites can be added to a blacklist?

  • @novawong9319
    @novawong9319 2 месяца назад +1

    Woohoo!!!! Jakoby love your name brother love your work keep it up!!!

  • @kantnklaar
    @kantnklaar 2 месяца назад

    What an amazing story. I would also say he's definitely on the right path!

  • @lalitpant8401
    @lalitpant8401 2 месяца назад +3

    Interesting thanks 💯

    • @davidbombal
      @davidbombal  2 месяца назад +1

      I hope you enjoyed the video!

  • @neo_the_chosen_one777
    @neo_the_chosen_one777 2 месяца назад +1

    i can say this guy is brilliant /genius....

  • @traviskline2836
    @traviskline2836 2 месяца назад

    That intro was awesome.

  • @Palmasyguitarras8761
    @Palmasyguitarras8761 2 месяца назад

    Genius. Great and inspiring video. Thank you.

  • @SnedzTheBricklayer
    @SnedzTheBricklayer 2 месяца назад

    When youre a bricklayer but started your comp sci degree last years and understand every term mentioned in the sponsor segement 😃🥳

  • @StaticSkyTV
    @StaticSkyTV 2 месяца назад

    Its like looking at the stern of a boat. Green is starboard, red is port.

  • @ns2304
    @ns2304 2 месяца назад

    Hi david would love to see stuff on defensive tools and solutions e.g YARA rules, EDR systems. Thanks again for the OSCP course on Udemy!

  • @sssapss
    @sssapss 2 месяца назад +1

    This dude is something else

  • @aronmeren8558
    @aronmeren8558 2 месяца назад

    what an inspiration

  • @phizicks
    @phizicks 2 месяца назад +1

    AWS paid a bounty I saw when I was there, that to me wasn't really warranted but they paid it anyway. I respect that. Micro$oft you are going to produce black hats onto you than whitehats

  • @TRAVESIAA
    @TRAVESIAA 2 месяца назад

    Dude is AMAZING!

  • @Saint2483
    @Saint2483 2 месяца назад

    He is on another level!

  • @B00Gi3-MANs_NiGHtMaR3
    @B00Gi3-MANs_NiGHtMaR3 2 месяца назад

    How would I explain something that's happening just like this to people or customer service who don't believe it's possible?

  • @ryanziller220
    @ryanziller220 2 месяца назад

    1:11:35 I have to be that guy about the semantic expressions being used wherefore the focus of developers in the cybersecurity space is 'how COULD this be broken' to sanitize or use some other weak security measure to set up the best digital reaction to a cyber threat. Ethical hacking or generally all hacking is about the 'how WILL I destroy this system'.

  • @countvonthizzle9623
    @countvonthizzle9623 2 месяца назад

    @David Bombal & @Jakoby - Is it worth the time to block "Powershell Gallery" in the Windows "hosts" file? Or will this do nothing?

    • @50PullUps
      @50PullUps 2 месяца назад +2

      The PSGallery is no more a vector for malware than the entire Internet is a vector for malware.
      On your personal systems, use the PSGallery as much as you want.
      In a corporate environment, Allow for specific whitelisted PCs and then Deny All for all other PCs.

    • @IamJakoby
      @IamJakoby 2 месяца назад

      Yea that guy pretty much nailed it. There will always be vectors to look out for its just learning about mitigating the risk.

  • @JoakimBB
    @JoakimBB 2 месяца назад

    Would be nice to see a metamorphic shell.

  • @ariasm8911
    @ariasm8911 2 месяца назад +11

    David these are fantastic topics but can we get a 1 or 2 minutes at the start of the video explaining core concepts quickly so we can be same page or have general idea what video is about? many people may not even know what powershell is

    • @davidbombal
      @davidbombal  2 месяца назад +9

      Great suggestion - difficult with some of these more advanced videos. This is one of those advanced topics.

    • @furkankaraslan9040
      @furkankaraslan9040 2 месяца назад

      bro took words out of my mouth well said

    • @remedygrime
      @remedygrime 2 месяца назад +1

      I like where this comment was going but how does someone even watch this channel without knowing what power shell is 😂

  • @PuffnPlayProductions
    @PuffnPlayProductions 2 месяца назад

    jakoby is the man.

  • @snehadeepgolui3757
    @snehadeepgolui3757 2 месяца назад

    Jacobys shellsync git repo iss empty how can I use that

  • @sharky9493
    @sharky9493 2 месяца назад

    OMG, what a fantastic guy!

  • @kumarprince4313
    @kumarprince4313 2 месяца назад +4

    Very useful ❤

  • @LiamVonOahu604
    @LiamVonOahu604 2 месяца назад

    Genius

  • @scottspa74
    @scottspa74 2 месяца назад +1

    This was absolutely AMAZING! Jakobi 1000% needs a bounty award for this, and Microsoft should be kissing his ass and hiring him for whatever salary he desires lol. Also, everyone should be made aware how sh1tty MS is being by making everyone so vulnerable.

    • @definitelyno
      @definitelyno 2 месяца назад +1

      If he reported a vulnerability that meets the criteria set up by Microsoft's bug bounty program yes he should get a reward, otherwise not. From what I understand Microsoft did not think whatever he reported was worthy a bounty and from the video I don't see why they would be wrong.

    • @scottspa74
      @scottspa74 2 месяца назад

      I guess, if you support the letter of the law, rather than the spirit of the law (obviously we're not talking about "laws",but in principle). If someone made MS aware how vulnerable their SW is, they should be kneeling down to him. I did an internship with someone who was pretty instrumental with creating UAC for MS, and he always stated how bad MS code is in terms of just accepting bad code and moving on without addressing the underlying bad code, due to how many things would break as a result of trying to fix it. ​@@definitelyno

    • @scottspa74
      @scottspa74 2 месяца назад

      ​@@definitelynoalso, MS is the primary SW of nearly all users of computers; they should be VERY concerned and want to address the issue, and reward the whistleblower.

    • @definitelyno
      @definitelyno 2 месяца назад +1

      @@scottspa74Still, what is the issue.

  • @user-dx4es8qt5x
    @user-dx4es8qt5x 2 месяца назад +1

    Thanks god he is in our side 😂

  • @VaishnoChaitanya
    @VaishnoChaitanya 2 месяца назад

    insane

  • @iuse9646
    @iuse9646 2 месяца назад

    This is nice

  • @adamchalabi3654
    @adamchalabi3654 2 месяца назад +3

    as always the best it channel

  • @techguru5230
    @techguru5230 2 месяца назад

    I love jakoby.❤

  • @savagepro9060
    @savagepro9060 2 месяца назад +5

    Wow, even his facial jewelry looks Reverse Engineered!

  • @MrPenguin098
    @MrPenguin098 2 месяца назад +2

    David, Microsoft is evil in what they did to Jakoby. Great video. Thanks.

    • @davidbombal
      @davidbombal  2 месяца назад +2

      Glad you enjoyed the video! I hope that Microsoft rewards Jakoby for his hard work!

    • @MrPenguin098
      @MrPenguin098 2 месяца назад

      @@davidbombal Me Too! He is Brilliant. I learned a lot.

  • @marcohiltebrand6471
    @marcohiltebrand6471 2 месяца назад

    What a great video about such an interesting topic 😊 i can literally imagine how it was to think hours in sleepless nights about such a challenge. After the cryptophones topic became public, I was fascinated of the idea to construct a secure data exchange method which is using a bunch of alternating channels like social media platforms and others. Even if I am not a hacker, the idea of chunking up the data and either include meta data or being able to link it felt like a lottery win 😊

  • @papa-pete
    @papa-pete 2 месяца назад

    what is the terminal emulator being used?

    • @IamJakoby
      @IamJakoby 2 месяца назад

      It's called Termius
      It's the SSH client I use

  • @ricseeds4835
    @ricseeds4835 2 месяца назад +1

    Hol' up. Did homie just imply that you can plant potentially incriminating files on remote systems?

    • @IamJakoby
      @IamJakoby 2 месяца назад

      Yes that is correct, it's just you have to do some extra recon on your target to see what else could interest with these packets

  • @RonaldBartels
    @RonaldBartels 2 месяца назад

    DNS filtering that can parse these queries would act as a notifier? Yes/No?

    • @IamJakoby
      @IamJakoby 2 месяца назад

      Potentially yes, they are just really hard to detect unless you have a very clearly defined white list

  • @PuffnPlayProductions
    @PuffnPlayProductions 2 месяца назад

    davidbomball looks so worried lol.

  • @livestreamvi7991
    @livestreamvi7991 2 месяца назад

    Thank you sir i am working in dns reverse shell by using powershell so this video is so important to me thank you.your are great teacher thank you.god bles you❤❤❤❤❤❤❤i am suppoting you

  • @VanshPandhare-sn6dn
    @VanshPandhare-sn6dn 2 месяца назад

    hydra: error while loading shared libraries: libx264.so.164: cannot enable executable stack as shared object requires: Permission denied
    While starting hydra this error is shown in non rooted nethunter also tried sudo but still not working

  • @Darkknight15715
    @Darkknight15715 2 месяца назад

    Anyone please tell me which AI course is best to learn with ethical hacking

  • @carsonjamesiv2512
    @carsonjamesiv2512 2 месяца назад

    GOOD VIDEO🎉

  • @mpwilso
    @mpwilso 2 месяца назад

    Geez do Fidelity, Schwab or Robinhood use Akamai. What about spoofing NTP?

  • @yucelfabiano866
    @yucelfabiano866 2 месяца назад

    Sir, discuss .xz please !!

  • @SagaraUrz
    @SagaraUrz 2 месяца назад

    Oh Microsoft, you are so funny...

  • @sendiaps2017
    @sendiaps2017 2 месяца назад

    Hi David sir

  • @user-dd3ti8iu6d
    @user-dd3ti8iu6d 2 месяца назад +1

    I know people always say this and now I finally will. I have been in the industry for 30 years. This guy is great. So tired of fakers on the web. It's refreshing to see real talent. Keep pushing bro! Saving the world one shell at a time.🔥🏴‍☠

    • @IamJakoby
      @IamJakoby 2 месяца назад +1

      It's really refreshing to read a comment like this. Social media has been getting oversaturated with fake or really watered down cybersecurity content. I appreciate your appreciation

  • @Lou-sassole3
    @Lou-sassole3 2 месяца назад

    47:51 🤣

  • @sabinadelkic3311
    @sabinadelkic3311 2 месяца назад

    ⭐️⭐️

  • @fyrestorme
    @fyrestorme 2 месяца назад +1

    should alias whoami to "echo 'Ghost in the Shell'" instead - or better yet: if your goal is to piss off hackers who get into your machine and run that command just alias it to `exit` lmao

    • @IamJakoby
      @IamJakoby 2 месяца назад

      Lol exactly
      Now you are in the spirit

  • @BlockchainShango
    @BlockchainShango 2 месяца назад

    Sounds like a supervillain origin story. They screwed you over.
    I’m not saying “Go Get ‘Em…” but if you diiiiiiiiiid…many of us would understand 👍🏾

  • @furkankaraslan9040
    @furkankaraslan9040 2 месяца назад +1

    bro it took me 3 sites to visit and total 6 minutes to understand the title 😮‍💨

    • @davidbombal
      @davidbombal  2 месяца назад

      This is a more advanced topic. But a lot of it is explained in the video. People complain that I only show basic stuff in videos.... well... here is something more advanced :)

    • @IamJakoby
      @IamJakoby 2 месяца назад

      OK I laughed at this comment a lot.
      I can relate

  • @Duhleted1
    @Duhleted1 2 месяца назад

    Microsoft needs to add this man to the payroll all he is trying to do is help….