Discover
David Bombal
David Bombal
Author: David Bombal
Subscribed: 159Played: 2,338Subscribe
Share
© All rights reserved
Description
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
532 Episodes
Reverse
Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video.
In this interview, David Bombal sits down with Dr. Mike Pound (Computerphile) to clear up one of the biggest crypto misconceptions on the Internet: hashing is not encryption, and hash functions are not reversible.
In this video you’ll learn what a hash function actually does (a deterministic, fixed-length, “random-looking” summary of data) and why the whole point is that you cannot take a hash and reconstruct the original file. Dr Mike explains the key properties of secure hashing, including the avalanche effect (tiny input change, massive output change), and why older algorithms like MD5 and SHA-1 became unsafe due to collisions. We also cover what “collisions” really mean, why they must exist in theory (the pigeonhole principle) and why they can appear sooner than expected (the birthday paradox).
Then we tackle the YouTube-comments classic: rainbow tables. If hashes are one-way, how do attackers “crack” passwords? The answer: they don’t reverse hashes. They guess passwords, hash them forward, and match the results. Mike breaks down how rainbow tables speed this up with precomputed hashes, and why salting makes those precomputations far less effective by forcing attackers to redo work per user.
Finally, we zoom out into modern cryptography: why SHA-2 is widely used today, why SHA-3 exists as a structurally different backup option, what length extension attacks are, and what quantum computing changes (and doesn’t change) for hashing and encryption. We also touch on how hashes power digital signatures, file integrity checks (like verifying an ISO download), and why AES dominates symmetric encryption.
// Mike's SOCIAL //
X: / _mikepound
// YouTube Video REFERENCE //
SHA: Secure Hashing Algorithm: • SHA: Secure Hashing Algorithm - Computerphile
Birthday Paradox: • Hash Collisions & The Birthday Paradox - C...
The Next Big SHA? SHA3 Sponge Function Explained: • The Next Big SHA? SHA3 Sponge Function Exp...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:09 - DeleteMe sponsored segment
02:54 - Hashing is not Encryption // Encryption and Hashing explained
09:47 - Hash functions are irreversible
15:22 - How hashing works
17:23 - Why MD5 is bad
20:09 - Recommended hashing function
21:47 - Birthday paradox explained
23:39 - Rainbow table explained
29:44 - Salting explained
33:35 - Pigeon Hole principle explained
36:35 - SHA-2 is the answer
37:17 - SHA-3 vs SHA-2
40:42 - The effect of quantum computing
42:47 - Quick summary
43:52 - Sign-In with private key
45:21 - Avalanche effect explained
49:10 - Where to learn more about hash functions
50:27 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cryptography #hashing #encryption
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal to start your 30 day free trial or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription
Stephen Sims joins David Bombal to discuss Operational Security (OpSec) through the lens of the "Darknet Marketplace Bible" (DNM Bible). While this document is originally designed to help criminals evade law enforcement while buying illegal goods, Stephen argues it is an excellent resource for cybersecurity professionals, journalists, and privacy advocates to learn high-level anonymity and encryption techniques.
Disclaimer: Both David and Stephen repeatedly emphasize that this content is for educational, privacy, and cybersecurity research purposes only. They do not advocate illegal activity.
// Stephen's Social //
Twitter: / steph3nsims
YouTube: / @offbyonesecurity
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:08 - Brilliant sponsored segment
03:04 - Disclaimer
03:07 - The Dark Web
07:44 - What is the Dark Web?
09:14 - The Dark Net Marketplace Bible
11:42 - DOs and DON'Ts
22:49 - Dark Net Directory
26:09 - Dread walkthrough
31:04 - Recommended Operating systems
42:07 - VPNs, Tor & PGP
53:23 - PGP // Creating key pairs
01:03:53 - How to access Dark Net Marketplaces // Black Ops marketplace
01:12 :39 - Recommended cryptocurrency for the Dark Web
01:18:43 - Shipping
01:21:12 - Communication methods
01:27:28 - JavaScript warnings
01:28:13 - Never trust external links
01:29:29 - DNM Bible summary
01:31:01 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#darkweb #opsec #tor
In this video, I sit down with OTW (author of Linux Basics for Hackers) to reveal the
definitive list of top hacking and cybersecurity tools for 2026. We cover everything from the
essential foundations like Linux and Python to the "state of the art" in wireless hacking with
DragonOS and SDRs.
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:00 - Top hacking tools for 2026
04:07 - Hacking tool #1: The hacking OS
07:10 - Hacking tool #2: Discovering systems on the network
08:31 - Hacking tool #3: Monitoring network traffic
10:25 - Hacking tool #4: Web app hacking
11:24 - Hacking tool #5: Vulnerability scanner
16:35 - Hacking tool #6: Basic hacking
18:11 - Hacking tool #7: The cybersecurity scripting language
19:38 - Hacking tool #8: Hacking wireless signals
25:27 - Hacking tool #9: Virtual machines
27:38 - Hacking tool #10: IDS (Intrusion Detection System)
32:08 - Hacking tool #11: Learning firewalls
37:07 - Hacking tool #12: Using AI
42:45 - Hacking tools summary
43:25 - The era of AI
45:34 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
In this interview David and Dr Mike Pound discuss Agentic AI and how powerful it is powerful, but prompt injection and untrusted PDFs can leak data or alter records. Learn least privilege, input and output filtering, and model trust risks.
// Sponsored SEGMENT //
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount
// Mike SOCIAL //
X: / _mikepound
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:56 - Proton Pass sponsored segment
02:15 - AI & cybersecurity // Vulnerabilities of AI
12:56 - Direct & Indirect Prompt Injection explained
17:52 - Input & Output Filtering explained
20:20 - AI having access to private data
25:24 - Reactions to AI & cybersecurity
27:06 - Risks of downloading open-source AI models
36:02 - The good and bad of AI models
40:23 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cybersecurity #ai #promptinjection
Security researchers Dor Attias and Ofek Itach demonstrate a critical CVSS 10.0 n8n vulnerability (CVE-2026-21858). Watch the full RCE exploit demo using type confusion to bypass authentication and read sensitive local files.
// Dor Attias SOCIAL //
LinkedIn: / dor-attias-740758155
// Ofek Itach SOCIAL //
LinkedIn: / ofek-it
// N8N Hack Blog
https://www.cyera.com/research-labs/n...
// Cyera Blog //
https://www.cyera.com/blog
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:56 - n8n vulnerability explained
02:33 - n8n hacking demo // How the vulnerability works
09:13 - How bad is it?
11:51 - Vulnerability summary
13:28 - More explained on Cyera blog // Webhooks
16:59 - Webhooks explained
18:09 - Formidable
19:18 - Formidable explained
20:01 - Handling uploaded files in n8n
22:32 - The form webhook node
24:28 - How to exploit
25:54 - Exploit summary
26:46 - How to mitigate
27:37 - How to become a security researcher
32:36 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Dr. Mike Pound returns to discuss the reality check AI needs in 2026. We dive into why the scaling laws are plateauing, the truth about "Agentic AI," and why "Vibe Coding" might be slower than you think.
// Mike SOCIAL //
X: / _mikepound
// Courses Reference //
https://www.coursera.org/specializati...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:57 - Hype vs. Real Life // The AI bubble
04:08 - Levels of AI
07:58 - Agentic AI explained
11:28 - MCP servers explained
12:46 - The future of AI
16:10 - Which career path to take
21:04 - The risks of vibe coding
24:17 - How efficient is AI?
25:41 - How to get into AI // What to learn
32:20 - Is it too late to get into AI?
37:10 - Is AI scaling over?
41:49 - AI and privacy
48:52 - Where to start
53:15 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#ai #llm #aibubble
This is your path to becoming successful in Cybersecurity in 2026. From zero to getting the skills you need to be successful. Master Hacker OTW tells us what we need to do (and there are some surprises here).
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://davidbombal.wiki/otw
// Occupy The Web SOCIAL //
X: / three_cube
Certification website: https://www.white-hat-hacker.com/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// Playlists to check out //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Hack Like Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise/Occupy the Web Hacks: • WiFi hacking like Mr Robot (with OTW)
// MENU //
0:00 - Coming Up
0:55 - Introductions
01:52 - OTW New Book
02:28 - Starting the Path to Cybersecurity in 2026
05:14 - Understand Your Tools
11:15 - Learn Linux
13:53 - Understand Networking
16:35 - Learn to Write Scripts
21:18 - Understand Virtualisation Systems
24:14 - Understand AI
30:32 - Defence vs Offence
34:52 - How to Gain Experience
46:11 - Get Involved and Get Connected
50:53 - Be a Team Player
53:49 - Which Industries to Start in
57:37 - Outro
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
cybersecurity
cybersecurity jobs
hacking
comptia
kali
linux
2026
roadmap
cybersecurity roadmao
kali linux
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel
#kalilinux #hacking #cybersecurity
Get these skills in 2026! Or at least get started.
Do you agree?
Casey Neistat video: • DO IT ANYWAY
// MENU //
0:00 - Intro
0:18 - What are you doing to do?
0:38 - Excuses
0:56 - Be like Logan
2:47 - Jump
4:00 - Do the work
4:50 - Atomic Habits
5:10 - Goals
6:11 - Voices in your head
8:06 - You need to study
8:48 - 5 Paths (AI and Robotics)
11:46 - Quantum Computing
12:34 - Cybersecurity
13:45 - Software Development
15:43 - Cloud
16:51 - Networking
18:10 - IoT
19:34 - 5 Core Skills (AI)
19:56 - Linux
20:31 - Programming
21:22 - Networking
21:53 - Cloud
22:02 - Virtualization
22:30 - Final Thoughts
// BOOKS //
Deep Work by Cal Newport https://amzn.to/3Veeiwp
The 4-hour work week by Timothy Ferriss https://amzn.to/3FyT5ro
Atomic Habits by James Clear https://amzn.to/3YzEOmX
The 1% Rule by Tommy Baker https://amzn.to/3G2RxY0
// Videos mentioned //
Casey Neistat: • DO IT ANYWAY
Dr Chuck: • AI just replaced us with Devin... seriousl...
// SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
Monitor: https://amzn.to/3yyF74Y
More stuff: https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#linux #python #ai
A big thank you to Proton VPN for sponsoring this video. Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com/davidbombal
More reading about Badbox:
Google: https://blog.google/technology/safety...
EFF: https://www.eff.org/deeplinks/2025/06...
Bitdefender: https://www.bitdefender.com/en-gb/blo...
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:05 - Sponsored Section
03:15 - Intro
04:28 - Are IOT Devices Safe to Have ?
07:56 - How They Hack your Home
09:19 - What They Do With Access To Your Data
10:30 - Bad Box 2 - They Ship Products With Malware
14:06 - The Intentions of Modern Day Hackers
15:01 - CloudFlare Blocking The Biggest DDOS Attack in The World
19:00 - How Vulnerable are IOT Devices
21:09 - TP- Link are the easiest to hack
24:20 - How Do They Get Into Your Devices ?
27:34 - Smart Bed Malfunctions
30:27 - Should Companies Be Held Responsible For Hacks
32:41 - How Bad is the Internet today? The amount of Hate in the World
35:19 - How People Allow Hackers into their Homes, Through Their Phones
38:00 - How Can Non-Technical People Protect Themselves
40:30 - The Internet is like A Jungle
43:03 - Mikko Hyppönen’s Prediction
47:53 - The Privacy Threat We are all facing
49:39 - What Companies are doing Now with Their devices
51:37 - People Using Hacking to Hurt People
52:48 - Conclusion & Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cybersecurity #hack #hacker
Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025
Chatbots are out; AI Agents are in. But are your networks ready for the massive traffic spikes, and is your data secure? In this interview from Cisco Partner Summit, we discuss the critical security flaws in the Model Context Protocol (MCP), why 99% of these servers are exposed, and how Cisco’s new MCP Scanner and Silicon One P200 chip aim to fix the infrastructure gap.
// DJ Sampath’s SOCIAL //
LinkedIn: / djsampath
X: https://x.com/djsampath
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:35 - The 3 trends of AI: infrastructure constraints explained
03:29 - Data gap explained
04:14 - Trust deficit explained // AI safety
05:22 - Solutions for the trends // Open source projects
08:56 - Addressing the problem with AI agents
10:22 - Reassuring the AI skeptics
12:22 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
A big thank you to Proton Pass for sponsoring this video. Proton Pass’ Black Friday Special is $1.99 per month on a 12 month plan https://proton.me/davidbombal Save 60%.
Rob Braxman reveals the dangers of Windows Recall, Apple Intelligence, and client-side scanning. Discover why AI surveillance and TPM chips mark the end of privacy in 2025.
// Rob Braxman’s SOCIAL//
YouTube: / @robbraxmantech
Website: https://brax.me/home/rob
GitHub: https://github.com/robbraxman
X: https://x.com/robbraxmantech
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:20 - Proton Pass sponsored segment
02:54 - Digital IDs and security chips on devices
05:24 - Client-side scanning
12:40 - Client-side scanning with AI
22:05 - Embedded AI for client-side scanning
27:32 - Microsoft + Windows Recall
35:51 - Microsoft vs Apple // Cloud storage
39:31 - Moving to Linux & dual boot
44:27 - TPM & EKI explained
49:28 - Restrictions with digital IDs
54:15 - Linux phones
56:00 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025
Cisco Unified Edge & The Future of Physical AI (w/ Kevin Wolenweber) Kevin Wolenweber reveals Cisco's new Unified Edge device and details the massive Nvidia partnership transforming data centers. We discuss the shift to "Physical AI," the terrifying security challenges of autonomous Agentic AI, and why "Gigawatt" scale clusters are changing the landscape for network engineers in 2025.
// Kevin Wollenweber’s SOCIALS //
Cisco Blogs: https://blogs.cisco.com/author/kevinw...
LinkedIn: / kevin-wollenweber-ba9428
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:00 - New Cisco Unified Edge // What is it?
03:28 - Use cases for the Cisco Unified Edge // Using AI models
08:00 - More traffic and more bandwidth
09:32 - Addressing security issues and solutions
10:44 - What's new on the Cisco Unified Edge
11:41 - Cisco and Nvidia partnership
15:03 - Growing data centers
18:24 - AI in the future
20:03 - Security regarding AI agents
23:08 - Networking and AI
25:35 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit San Diego 2025.
This video is a deep dive with Jeetu Patel on why the real AI revolution is happening in infrastructure and networking, not just in GPUs or chatbots.
Jeetu explains that we are massively underestimating how much AI infrastructure the world will need. Power becomes the core constraint, GPUs are the core asset, and networking is the force multiplier that lets thousands of GPUs act as one system. He walks through how we went from models on a single GPU → 4–8 GPUs in a server → racks with hundreds of GPUs (like NVL-72 with 500+ GPUs) → clusters of racks, and now “scale across” between data centers when power and real estate are scattered across different regions.
The conversation then shifts to edge AI and Cisco Unified Edge: instead of doing all token generation in big data centers, some inference and token generation must move to the edge (branches, factories, hospitals, stadiums, stores) where data is created. Jeetu explains why edge devices need to be plug-and-play, remotely managed, and integrate compute, networking, security and observability in a single platform.
He also introduces the idea that AI is now constrained by three big bottlenecks:
• Infrastructure
• A trust deficit (people don’t trust AI yet)
• A data gap (models are mostly trained on human internet data, not on rich
machine data)
Jeetu explains how security becomes a prerequisite for productivity, not a trade-off, and describes Cisco’s work with Splunk, open-sourced time-series models, and machine data (logs, metrics, traces) to close the data gap by correlating machine data with human-generated data for better insights.
Globally, he talks about the “token generation race” – how every country now cares about having enough AI token generation capacity because it directly links to GDP and national security. He cites huge infrastructure build-outs with partners like G42 in the Middle East, at gigawatt and trillions-of-dollars scale.
Finally, Jeetu tackles the “AI will take my job” fear. He outlines three stages of
thinking:
1. “AI will take my job.”
2. “Someone who uses AI better will take my job.”
3. “Without AI, I won’t be able to do my job.”
His message to younger viewers: be excited, adopt AI as a companion, own your learning, and learn fast because AI compresses the time it takes to build skills.
// Jeetu Patel’s SOCIALS //
LinkedIn: / jeetupatel
Website: https://www.cisco.com/
X: https://x.com/jpatel41
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming up
0:33 - "Networking is sexy"
02:24 - Scale up, scale out and scale across explained
04:47 - Cisco and Nvidia partnership
05:55 - Cisco and G42 partnership // Addressing the AI bubble
08:11 - New Cisco Unified Edge
11:08 - Agentic AI in the future
13:05 - Huge demand for networking
13:57 - The three constraints
16:38 - AI in the real world
19:26 - How AI will take jobs away
21:38 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025.
Is your encryption safe? Cisco’s Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN. This paradigm shift is 100x bigger than the ChatGPT/AI moment, requiring the entire theory of computer science to be rewritten.
Join us as we dive into the imminent future of cybersecurity, qubits, and
entanglement technology from Cisco.
// Vijoy Pandey SOCIALS //
LinkedIn: / vijoy
X: https://x.com/vijoy
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:36 - Intro
0:48 - Update on Quantum Computing
03:47 - Effects of Practical Quantum Computing
05:08 - Post Quantum Cryptography
06:12 - Why Bother with Quantum Computing
07:57 - How Do We get to Practical Quantum Computing
09:31 - Quantum Protocols and Applications
10:55 - Quantum Computing and Classical-Use Cases
13:28 - Practical Use Case for Quantum Alert
15:03 - Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cisco #sponsored #ciscops25
GrapheneOS expert MetropleX joins David Bombal to bust myths. We cover banking apps, notifications, Play Services, and why GrapheneOS is more secure than iOS's lockdown mode.
// Sponsored Segment
A big thank you to Proton VPN for sponsoring this video. This Black Friday, Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com/davidbombal
// Metroplex’s & GrapheneOS SOCIALS //
X: https://x.com/metroplexgos
X: https://x.com/grapheneos
Website: https://grapheneos.org/
Discord: / discord
GrapheneOS Mastodon: https://grapheneos.social/@GrapheneOS...
Reddit: / hot
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:15 - "First time, huh?"
02:04 - Proton VPN sponsored segment
03:32 - Metroplex introduction
04:14 - Myths and misconceptions about GrapheneOS
05:55 - GrapheneOS + Google Pixel
13:17 - Defining "tracking" // How phones track you
17:28 - GrapheneOS privacy & security features
26:15 - GrapheneOS proxies
27:32 - How to download apps on GrapheneOS phones
32:56 - Addressing the issue with banking apps on GrapheneOS phones
34:52 - Installing Google apps on GrapheneOS phones
38:42 - Creating multiple user profiles with GrapheneOS
41:30 - Addressing notification myths
43:40 - GrapheneOS coming to Pixel 10 // GrapheneOS dedicated devices
53:29 - GrapheneOS updates
55:31 - Will GrapheneOS affect Pixel cameras?
57:16 - Apple's Memory Integrity Enforcement vs GrapheneOS
01:01:14 - GrapheneOS: balance of privacy and security
01:02:58 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You’ll also get 20% off and annual premium subscription
Apple says iPhone is extremely hard to hack. OTW says he keeps finding real malware on normal people's iPhones. We talk Pegasus spyware, the Meta vs NSO lawsuit over WhatsApp, Apple's new memory integrity protections, and why a $5M bug bounty still won't stop well-funded spyware. We also get into how one infected phone can take over your entire WiFi and smart home, why your router and VPN box are the weakest link, and what “everything is hackable” really means for you.
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:49 - Intro
01:53 - Brilliant Ad
03:00 - What are Pegasus and the NSO?
08:14 - Isn't Facebook the Same as the NSO?
11:39 - Can Governments Use Pegasus?
14:43 - When is the NSA Allowed to Spy on You?
16:39 - Will the Court Ruling Change Anything?
18:23 - NSO's USA Acquisition
20:06 - Are iPhones Impossible to Hack?
24:21 - IOS vs Android vs Graphene
28:03 - Is it Easy to Hack an iPhone?
29:40 - Apple's Bug Bounty Program
31:57 - IOS vs Android vs Graphene (Cont.)
35:55 - Are Flip Phones Secure?
41:25 - How to Protect yourself?
45:30 - VPN Hacking
46:44 - OTW's Hope for the Future
48:00 - Hackers Arise New Courses (with Discount Code)
50:08 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You’ll also get 20% off and annual premium subscription
Two veteran OSINT investigators show how they pull hidden data from TikTok, Telegram, X, Cash App and WordPress using simple browser bookmarklets. No malware, no exploits, just JavaScript in your browser. They also show how to build these tools with AI in minutes, even if you can't code, and how to stay safe with sock puppets, VMs and VPNs. Timestamps below.
// Affiliate LINKS //
Get 10% off our All OSINT Course Bundle and our OSINT Immersion Bundle by using the Coupon Code: bombal-mot-10
Bundle links and descriptions are https://www.myosint.training/pages/bu...
// MOT SOCIAL //
LinkedIn: / my-osint-training
Blueskyhttps://bsky.app/profile/myosint.trai...
X: https://x.com/myosinttrainer
// Micah SOCIAL //
LinkedIn - / micahhoffman
Bluesky - https://bsky.app/profile/webbreacher.com
X - https://x.com/webbreacher
// Griffin SOCIAL //
LinkedIn - / griffin-g
BlueSky - https://bsky.app/profile/hatless1der.com
X - https://x.com/hatless1der
// David’s YouTube PLAYLIST //
OSINT: • OSINT: You can't hide // Your privacy is d...
// My OSINT Training SOCIAL //
OSINT Training: https://myosint.training
OSINT Newsletter: https://myosint.link/newsletter
Twitter: / myosinttrainer
LinkedIn: / my-osint-training
YouTube: / @myosinttraining
// Resources SHARED //
My OSINT Training (MOT) free courses:
Introduction to OSINT - https://www.myosint.training/courses/...
Careers Using OSINT Skills https://www.myosint.training/courses/...
or on YouTube • Careers in OSINT
Griffin's Start.me page: https://myosint.link/hatless or https://start.me/p/DPYPMz/the-ultimat...
Newsletter – My OSINT News (through My OSINT Training): https://myosint.link/newsletter (https://link.myosint.training/my-osin...)
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:41 - Updates with Griffin and Micah
02:44 - Brilliant sponsored segment
03:42 - Bookmarklet explained
08:16 - Real-world use cases of bookmarklets
11:11 - How do bookmarklets work
13:17 - Free tools // Tools walkthrough
16:55 - Using AI for safe bookmarklets // Protecting your system
21:24 - Using AI for safe bookmarklets demo
23:56 - More bookmarklet demos
31:20 - Efficiency with bookmarklets
33:09 - More bookmarklet demos
39:31 - Making a bookmarklet with AI
43:38 - Easter egg bookmarklet
44:56 - OSINT online training academy
48:32 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir...
Cisco’s Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters.
What you’ll learn
• Why GPUs are useless without massive, reliable interconnects
• 51.2 Tbps with 64×800G ports and what that enables for AI training
• Deep buffers vs shallow buffers and when each wins
• Line-rate encryption today and post-quantum readiness tomorrow
• SONiC on Cisco Silicon One, P4, and automation at hyperscale
If you found this useful, hit subscribe and share with your favorite network nerd. It’s always the network.
// Martin Lund’s SOCIALS //
LinkedIn: / martinlundca
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:54 - Intro
0:59 - Martin's Background
02:15 - Martin's Advice
02:48 - Cisco's Announcement
06:12 - Data Center Scaling
07:02 - Data Centres Scaling Across
11:08 - New Router Speeds
13:24 - Securing the Data Center (Quantum Computing)
17:57 - Are Deep Buffers Efficient?
19:25 - New Protocols
22:50 - Data Center Infrastructure
24:07 - 8804 Router Innovations
25:33 - The Future of Data Centers
27:50 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cisco #networking #ai
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Think you’ve been hacked? In this video, David Bombal and OTW (OccupyTheWeb)
walk you through OSQuery - a free, open-source tool that lets you query your
operating system like a database. You’ll learn the exact SQL-style commands to find:
• Listening processes & remote connections (spot command-and-control)
• Suspicious services and misspelled look-alikes
• Persistence via registry startup items and scheduled tasks
• Fileless malware (on_disk = 0) running only in RAM
OTW draws from real digital forensics cases (200+ inquiries/month),
including harassment, divorce disputes, and business rivalries. We also
explain why antivirus often fails once malware is resident—and what you can
do next (kill the process, remove the file, and harden startup entries).
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// YouTube video REFERENCE //
Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:35 - Introduction
01:08 - The New Python Book
01:41 - Sponsored Section
02:49 - OTW Shares a Cool Tool
05:11 - Why This Tool is Powerful
06:45 - Latest Hacking Trends
09:59 - Who Should Use This Tool (and When)
10:54 - What Happens When You’re Hacked
11:20 - Why Hackers Need Access First
12:02 - After Installing the Software
12:39 - How to Query a Database
14:43 - Exploring OS Query’s Page
16:14 - Finding Unwanted Services on Your Computer
18:06 - Narrowing Down the Data
22:06 - Tracing the Hacker’s Footsteps
23:11 - The Case of the Husband Who Hacked His Wife
24:31 - Are You Being Hacked by the CIA?
25:31 - The Attacker’s Go-To Move
26:25 - Understanding the Windows Registry
29:55 - Investigating Scheduled Tasks
30:48 - Common Hacker Techniques
32:11 - Checking the Processes Running on Your System
33:48 - Is Chrome Malicious?
35:05 - Why Most Home Users Get Hacked
36:16 - Should You Rely on Anti-Virus?
37:48 - Windows vs Mac: Which Gets Hacked More?
38:30 - Getting Hacked Through a Friend’s Link
39:10 - Tutorials for Finding Malware on Your System
39:34 - Outro & Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hacked #osquery #cybersecurity
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
In this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operator and Tool Builder). They give an unfiltered look at the real world of hacking, forensics, and career-building in cybersecurity.
What we'll cover:
• How the SolarWinds hack was discovered with never-before-heard forensics insight
• Real-world red teaming using HVAC exploits, USB pivots, and AWS chaos
• The Oculus vs. Carmack lawsuit story from the expert who worked the case
• How to start your career in cybersecurity, even without a degree
• What the CCDC program is and why it leads to 3 job offers instantly
• How AI is changing the game for hackers and defenders alike
// David Cowen’s SOCIALS //
SANS Profile: https://www.sans.org/profiles/david-c...
LinkedIn: / dcowen
X: / dcowen
// Evan Anderson SOCIALS //
Offensive Context: https://blog.offensivecontext.com/aut...
LinkedIn: / syndrowm
GitHub: https://github.com/syndrowm
// Website REFERENCE //
https://www.nationalccdc.org/
https://www.sans.org/emea
https://ctftime.org/
https://www.uscyberpatriot.org/
// YouTube Channel REFERENCE //
13Cubed: / @13cubed
// David Cowen’s Books REFERENCE //
Computer Forensics:
US: https://amzn.to/47yeH70
UK: https://amzn.to/460ErGs
Hacking Exposed Computer Forensics: Secrets and Solutions
US: https://amzn.to/4mYevCW
UK: https://amzn.to/46q07NH
Hacking Exposed Computer Forensics: Secrets and Solutions:
US: https://amzn.to/4mT3T8k
UK: https://amzn.to/4m8zaCS
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming up
0:49 - Intro
01:13 - Sponsored Section
01:29 - (AWS) Amazon Web Services
03:04 - David Cowen’s Background
03:46 - Evan Anderson’s Background
05:18 - Advice for young people To Get A Job In this Space
05:56 - The Solar Winds Hack?
10:43 - Finding a needle in a Haystack
11:08 - The Oculus Story
13:00 - Evan in Red Teaming
15:55 - Advice To Younger self
16:51 - Recommended Courses
19:42 - Importance of Networking
20:19 - Recommended Certifications
24:13 - Is AI Taking All The Jobs ?
24:57 - Connect With David & Evan online
25:12 - Conclusion & Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
























It's really important to be cautious when buying a used car. One of the most crucial steps you can take is to check the vehicle’s history using its VIN, or Vehicle Identification Number. I recently came across a website called VIN check https://www.vindecoderz.com , and it’s a fantastic resource for anyone in your situation. By simply entering the VIN, you can access a comprehensive report that includes details about the car's past ownership, any accidents it may have been involved in, and its overall maintenance history.
💚WATCH>>ᗪOᗯᑎᒪOᗩᗪ>>👉https://co.fastmovies.org