Pegasus Spyware: so dangerous that it should be banned? OTW explains...

แชร์
ฝัง
  • เผยแพร่เมื่อ 9 มิ.ย. 2024
  • Pegasus is used around the world to hack people's phones. It's extremely dangerous and can be used to control a phone remotely without the user knowing that is running.
    Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: brilliant.org/DavidBombal
    // Mr Robot Playlist //
    • Mr Robot
    // David's SOCIAL //
    Discord: / discord
    Twitter: / davidbombal
    Instagram: / davidbombal
    LinkedIn: / davidbombal
    Facebook: / davidbombal.co
    TikTok: / davidbombal
    TH-cam: / davidbombal
    // Occupy The Web social //
    Twitter: / three_cube
    // OTW Discount //
    Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw
    // Occupy The Web books //
    Linux Basics for Hackers: amzn.to/3JlAQXe
    Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
    Top Hacking Books you need to read: • Top Hacking Books for ...
    // Other books //
    The Linux Command Line: amzn.to/3ihGP3j
    How Linux Works: amzn.to/3qeCHoY
    The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM
    Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    00:00 - Intro
    00:22 - Brilliant Ad
    01:59 - OTW Books
    03:54 - Pegasus overview
    06:54 - Pegasus info
    07:40 - Pegasus in use
    08:56 - Human rights
    09:25 - 0 Day malware
    13:33 - Original Pegasus 1 click exploit
    14:30 - How it works
    16:52 - Remote access
    17:48 - Malware links
    19:30 - Femtocell
    21:01 - Stingray
    22:10 - How they work
    23:50 - Pegasus 0 click exploit
    24:55 - Pegasus malware
    25:29 - Human rights
    26:51 - ISO/Android vs malware
    27:40 - Governments
    29:19 - What can we do?
    30:35 - Be responsible
    32:01 - Governments and malware
    32:51 - NSO
    35:14 - Privacy
    36:03 - Command and control
    37:36 - Processes
    38:38 - NSO developers
    38:53 - Expectations
    40:30 - Social engineering
    43:04 Eternal blue
    44:25 Chrysaor
    45:23 Outro thoughts
    pegasus
    spyware
    hacking
    hacker
    malware
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.
    #pegasus #iphone #andorid

ความคิดเห็น • 683

  • @davidbombal
    @davidbombal  11 หลายเดือนก่อน +93

    Pegasus is used around the world to hack people's phones. It's extremely dangerous and can be used to control a phone remotely without the user knowing that is running.
    Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: brilliant.org/DavidBombal
    // Mr Robot Playlist //
    th-cam.com/play/PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q.html
    // David's SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    TH-cam: th-cam.com/users/davidbombal
    // Occupy The Web social //
    Twitter: twitter.com/three_cube
    // OTW Discount //
    Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw
    // Occupy The Web books //
    Linux Basics for Hackers: amzn.to/3JlAQXe
    Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
    Top Hacking Books you need to read: th-cam.com/video/trPJaCGBbKU/w-d-xo.html
    // Other books //
    The Linux Command Line: amzn.to/3ihGP3j
    How Linux Works: amzn.to/3qeCHoY
    The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM
    Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    00:00 - Intro
    00:22 - Brilliant Add
    01:59 - OTW Books
    03:54 - Pegasus overview
    06:54 - Pegasus info
    07:40 - Pegasus in use
    08:56 - Human rights
    09:25 - 0 Day malware
    13:33 - Original Pegasus 1 click exploit
    14:30 - How it works
    16:52 - Remote access
    17:48 - Malware links
    19:30 - Femtocell
    21:01 - Stingray
    22:10 - How they work
    23:50 - Pegasus 0 click exploit
    24:55 - Pegasus malware
    25:29 - Human rights
    26:51 - ISO/Android vs malware
    27:40 - Governments
    29:19 - What can we do?
    30:35 - Be responsible
    32:01 - Governments and malware
    32:51 - NSO
    35:14 - Privacy
    36:03 - Command and control
    37:36 - Processes
    38:38 - NSO developers
    38:53 - Expectations
    40:30 - Social engineering
    43:04 Eternal blue
    44:25 Chrysaor
    45:23 Outro thoughts
    pegasus
    spyware
    hacking
    hacker
    malware
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.

    • @mydogsbutler
      @mydogsbutler 11 หลายเดือนก่อน

      It's extremely dangerous but the pegasus issue is largely a media red herring to avoid discussion of 5 eyes (14 eyes) epic global spying. Why western media don't like Pegasus is someone is cutting into their spying grass. Either end spying globally, including downscaling organizations like NSA, GHCQ, and Chinese, Russian and other large counterparts or a natural consequence is other countries will spy on the countries that lament about spying then hypocritically spy.
      Perhaps Pegasus democratization of spying will be a wake up call for the governments of 14 eyes nations. If foreign governments are tapping their own phones, like they have been doing ot others for decades, then maybe they will see why mass computer surveillance they'be been doing of foreign states is morally wrong. Mind you that's wishful thinking. What's more likely to happen is virtue signalling hypocrisy.

    • @ishka3405
      @ishka3405 11 หลายเดือนก่อน +4

      How do you even find out if your phone is infected by pegasus?

    • @Bloodywasher
      @Bloodywasher 11 หลายเดือนก่อน +2

      yep good old pegasus among I think there was one other big one. good ol' Mossad :)

    • @jessen00001
      @jessen00001 11 หลายเดือนก่อน +1

      Funny.. see how easy it is to deactivate all google apps and try to go deep in your android with developer settings enabled.
      Try to disable google.android.gms.persistence
      So who is spying on you?
      Who does most governments work closely with?...
      But why be scared about someone spying on you if you not harming anyone?

    • @jessen00001
      @jessen00001 11 หลายเดือนก่อน +1

      What about Palantir? The number one spy tool that the Government's are using today.
      This feels like a honeypot 😂

  • @EchoMirage72
    @EchoMirage72 8 หลายเดือนก่อน +28

    When a government commissions anything for use, their justification is always "it will be used against our enemies" but invariably it will always be turned inwards against it's own people.

    • @6YoungAngel9
      @6YoungAngel9 12 วันที่ผ่านมา

      It's not used against its people it's used for ahhh damn I jus drew a blank .

  • @someone2324
    @someone2324 11 หลายเดือนก่อน +205

    Privacy is one of the most fundamental human rights

    • @cyberdevil657
      @cyberdevil657 11 หลายเดือนก่อน +2

      ❤Yes!

    • @drTERRRORRR
      @drTERRRORRR 11 หลายเดือนก่อน +9

      (US "Patriot Act" rolling on it like a tank)

    • @sefzxm6486
      @sefzxm6486 11 หลายเดือนก่อน +13

      privacy is a facade

    • @KJ-xt3yu
      @KJ-xt3yu 11 หลายเดือนก่อน +2

      And yet blanket geo location warrents are done almost every day with out legal ramifications, from the gov.... its by the gov....on the USA...by the USA orders..... 🍿🍿🍿🍿🍿🍿🍿🍿

    • @alfonzo7822
      @alfonzo7822 11 หลายเดือนก่อน

      ​@@sefzxm6486definitely seems that way

  • @greyether777
    @greyether777 11 หลายเดือนก่อน +75

    When these two get together, it ALWAYS seems to end too soon....just can't get enough. Thanks guys!

  • @feliciaware7609
    @feliciaware7609 10 หลายเดือนก่อน +65

    As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against cheater on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators and cheaters. Keep up the good work Team *Topphase Resolution* ..

  • @JayzDog
    @JayzDog 11 หลายเดือนก่อน +280

    The problem is not Pegasus, it is phone makers that don’t let you install a proper firewall and a proper app locker.

    • @corail53
      @corail53 11 หลายเดือนก่อน +21

      it can also be a problem with pegasus. Anyone can use it if you have the money (a lot of money as its license is around 600k for the base version).

    • @Dzboss31
      @Dzboss31 11 หลายเดือนก่อน +6

      Yes
      But you can control your phone with a rooted device and learn about android system

    • @Stopinvadingmyhardware
      @Stopinvadingmyhardware 11 หลายเดือนก่อน +4

      Pegasus attacks the hardware

    • @IfindPortchPirates
      @IfindPortchPirates 10 หลายเดือนก่อน +16

      I believe someone once said "you control the endpoint, you control the network?"

    • @calebshotsauce
      @calebshotsauce 10 หลายเดือนก่อน +6

      @@IfindPortchPirates yeah like elliot from mr robot or something, maybe Otw

  • @Blackwaterswamp
    @Blackwaterswamp 11 หลายเดือนก่อน +15

    Thinking that the government or corporations care, and are not one and the same, is foolish. There is no privacy period. Thanks for both of your work.

  • @alsadekalkhayer7007
    @alsadekalkhayer7007 11 หลายเดือนก่อน +110

    Thank you, both of you for addressing this issue and educating us

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +16

      You're welcome! OTW has an amazing wealth of knowledge and it's great to have him share it with all of us! 😀

    • @alsadekalkhayer7007
      @alsadekalkhayer7007 11 หลายเดือนก่อน +3

      ​@@davidbombalalways looking forward for your videos 🙏🏻

  • @gnagyusa
    @gnagyusa 8 หลายเดือนก่อน +11

    We need to stop treating phones as secure devices. The mindset has to change. I don't keep any sensitive data on my phone, my cameras have tapes on them etc.

    • @mrsmiley631
      @mrsmiley631 5 หลายเดือนก่อน +1

      What is a "secure device"? I was taught security is merely a state of mind.

  • @daddyattitude
    @daddyattitude 6 หลายเดือนก่อน +6

    John McAfee once said, "Computer Security is an Oxymoron."

  • @Just_A_Tech.._
    @Just_A_Tech.._ 11 หลายเดือนก่อน +6

    Many thanks to you two David & OTW, your collaboration is always top-notch.👌 Keep up the good work. 🙏🙏

  • @random-user-handle
    @random-user-handle 11 หลายเดือนก่อน +53

    Dear David and OTW, you guys together are amazing! Hope this collaboration will continue for a long time, because I’m looking forward to any new video you guys work on! Great job!

    • @zaccampa4055
      @zaccampa4055 9 หลายเดือนก่อน

      It’s always a good time with David and OccupyTheWeb!

  • @KristopherNoronha
    @KristopherNoronha 7 หลายเดือนก่อน +2

    Thanks for the upload! I know most of the stuff discussed, but it was interesting to be able to confirm my understanding was correct. I hope such videos get more attention and people stop clicking on links outside a sandbox, at the very least!

  • @athan_s_maliakkal
    @athan_s_maliakkal 11 หลายเดือนก่อน +6

    You and Occupy the web are a great combo for sure. Well done

  • @esmannr
    @esmannr 11 หลายเดือนก่อน +8

    Getting a search warrant to surveil a subject should not include the use of a Stingray! All the phones in the area will connect to it. LEOs don't have a search warrant for everyone in the transceiver area!

    • @esmannr
      @esmannr 9 หลายเดือนก่อน

      @@Andrew-zy7jz Local LEOs can’t get one.

    • @johnnylego807
      @johnnylego807 7 หลายเดือนก่อน

      They have stuff way better than stingrays now. They also have CelleBrite. If they get your phone for even a second, they plug it in, and that’s all she wrote.

  • @Laughingman9432
    @Laughingman9432 8 หลายเดือนก่อน +7

    I think bringing awareness to things like this is the first step to implementing policies to help protect privacy rights for people

  • @anargaziev
    @anargaziev 11 หลายเดือนก่อน +26

    Dear Mr. Bomball and Mr. OccupyTheWeb,
    Thank you for educating us on these issues. I would like to kindly please you to teach us how we can technically detect such spywares on our phones? What lessons or tutorials should we learn in order to find out whether our phones are being spied? Please help us learning that great area of cyber security.

    • @BU5TER288
      @BU5TER288 8 หลายเดือนก่อน +2

      thats a great question i would also like the answer to

    • @NathanielAgiftfromgod
      @NathanielAgiftfromgod 5 หลายเดือนก่อน

      Yes!!!

  • @Casp1anX
    @Casp1anX 11 หลายเดือนก่อน +2

    Both your content and OTW content are addictive-especially helpful to gain value when you’re hooked, though 🙌🏽

  • @lucianjohr5569
    @lucianjohr5569 11 หลายเดือนก่อน +1

    Top content David....Love the videos you collaborate with OTW.

  • @abdukantibye1777
    @abdukantibye1777 11 หลายเดือนก่อน +3

    That was an awesome interview Dave.
    My best wishes to Neal, stay positive, fast 2 days at least a week exercise a lot , green diet , less sugar and red meat, a lot of water .
    Win your life back don’t give up and you will a champion in Golf as you are In Cybersecurity.
    All the best.

  • @uhohspaghettios9966
    @uhohspaghettios9966 11 หลายเดือนก่อน +3

    I am so happy to have found your channel. #1 favorite content! Thanks so much!

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน

      Thank you so much! 😀

  • @ebooooo1213
    @ebooooo1213 11 หลายเดือนก่อน +5

    Thanks a lot David, awesome content as usual. I would love to see you interviewing Ryan Montgomery!

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +2

      Hopefully soon 😀

  • @GoogelDeepMind2024
    @GoogelDeepMind2024 12 ชั่วโมงที่ผ่านมา +1

    The Term (ZERODAY) hence the name (ODAY) meaning that you have "ZERO TIME" to respond to the attack.

  • @rayb5204
    @rayb5204 11 หลายเดือนก่อน +6

    Thank you, David, for another brilliant video! I always feel just a little bit smarter, much more hungry and inspired to learn more. OTW's classes are top notch! You are the best! Cheers!!

  • @chkbroo
    @chkbroo 11 หลายเดือนก่อน +4

    thank you for bringing back OTW

  • @Xploitastic
    @Xploitastic 11 หลายเดือนก่อน +19

    It's alarming to think about the misuse of tools like Pegasus spyware, especially when it comes to infringing on individual privacy and human rights. I'd say "unbelievable", but sadly... Its not.

  • @dctudu007
    @dctudu007 7 หลายเดือนก่อน

    Thank you !!😊 It helped me learn about the danger lurking around me.

  • @slumb3rx
    @slumb3rx 11 หลายเดือนก่อน +1

    Hey David
    first im learning from you and your videos for years and I'm fascinating by social engineer
    you have any recommendation on specific place that i can learn more about this skill and upgrade my self bit more?

  • @AddySecuritySandbox
    @AddySecuritySandbox 11 หลายเดือนก่อน

    That would be great a technical demostration of Eternal blue ! we will wait for the session David,

  • @cyberdevil657
    @cyberdevil657 11 หลายเดือนก่อน

    Always love to listen to otw and David!!

  • @tigermoney8576
    @tigermoney8576 11 หลายเดือนก่อน +1

    Mann your community, the majority of IT community, David B, OTW, and etc all dropping diamond and gems!! Letting us know how to win!! We need more people like y’all mann!! God bless y’all!! We appreciate you David and OTW!!!

  • @doc_mars
    @doc_mars 10 หลายเดือนก่อน

    Hi.Thanks for very in-depth video. If I have installed a distro such as arch linux on your phone, then access still be gained to your phone?

  • @altx.gnz4283
    @altx.gnz4283 9 หลายเดือนก่อน +1

    This is real content!!! Thanks David and OTW sharing all your knowledge.

  • @rdwnabdi5778
    @rdwnabdi5778 11 หลายเดือนก่อน +1

    Welcome back Master OTW
    Thnkz both of u ...

  • @jasonpitts8395
    @jasonpitts8395 11 หลายเดือนก่อน +1

    Another great video David. OTW is correct you do have the best YT channel for cyber

  • @Vi-XiphiqiX
    @Vi-XiphiqiX 11 หลายเดือนก่อน +1

    Fantastically informative, thank you for the awesome content.

  • @Maxspert
    @Maxspert 8 หลายเดือนก่อน +3

    How effective is Pegasus malware on linux phones,I know they are not many linux phones but will have the same effect like on apple and android phones?

  • @cyberlizardcouk
    @cyberlizardcouk 11 หลายเดือนก่อน +5

    there should be a rule that all email client applications are required to run in a sandbox regardless of how thoroughly annoying this is.

  • @chrisbowring4298
    @chrisbowring4298 10 หลายเดือนก่อน

    What an enthralling captivating discussion! Thank you David! I look forward to hearing more! 👍👏

  • @dalrob9969
    @dalrob9969 11 หลายเดือนก่อน +4

    Back in the DOS days, PC Tools, did a program byte count of the code in a software product. If the scanner found a different number of code bytes, say less or more, than the original known ( size ) of the code including key, count, it would send up the red flag. Think about thar for a second. One way to detect key loggers is get your hard drive used information motion, type 100 words on notepad, the delete it, re read hard drive bytes used,if it's the same count after you erased it, that's good, but if now you drive says it's more than the count you first logged, say about the amount you typed in, I would suspect a keylogger installed. Keep a watchful eye on disk storage usage. It's a pain, but.

  • @sfurtado3
    @sfurtado3 11 หลายเดือนก่อน +6

    As always thank you both so much for the content!! Amazing as always! Happy Father's day yall and all other fathers out there!

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +2

      Same to you! Thank you!

  • @AbdullahKhan-ys3ik
    @AbdullahKhan-ys3ik 11 หลายเดือนก่อน +1

    we all love our great teacher, doing a great job and educating about digital era and talking about privacy that is core thing for human society .

  • @jasonmoosha7897
    @jasonmoosha7897 11 หลายเดือนก่อน +1

    Legendary thanks David. From south Australia at work chatting about u Chanel interesting hey many people watching u Chanel

  • @douglasconnell6395
    @douglasconnell6395 11 หลายเดือนก่อน +4

    Always assume your devices are already compromised.

  • @julsstefano7729
    @julsstefano7729 11 หลายเดือนก่อน

    thx David for such a good material and thank for the OccupyTheWeb sharing such a good info

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 11 หลายเดือนก่อน +10

    What's crazy is there are probably 10 or more that we don't know about. Great video David.

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +1

      That is a worry 😢

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 11 หลายเดือนก่อน +1

      @@davidbombal Agreed, one of the reasons I don't use anything made by Apple. Their code is dog s**t. 100% believe it's harder to pwn an android these days.

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน

      @@camelotenglishtuition6394 OTW disagrees with you. And I think many other people do too and say that Android is more vulnerable.

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 11 หลายเดือนก่อน

      @David Bombal I understand, but I disagree with OTW over several things. I would ask specifically what you think makes ios stronger when it has so many issues. Specifically with webkit, unused features in code, poor code review, and also very slow patch times.

    • @noahaxr3679
      @noahaxr3679 11 หลายเดือนก่อน +1

      Technical details aside, it's easier to make mistakes on an android because your phone allows you to. A lot of iOS security is designed around blocking you from compromising your device. Android doesn't tend to care beyond asking "Are you sure?"

  • @annasirne197
    @annasirne197 6 หลายเดือนก่อน

    Thank you for the guest. Amazing video.

  • @predatorsecurityanddefense5753
    @predatorsecurityanddefense5753 3 หลายเดือนก่อน

    Thanks for the video. I have known about this technology for a while and even had a tech demonstrate it on one of our instructors phone.
    Question...if you ditch that smartphone and get a different handset is Pegasus transfered to the new one. Or would that agency have to target the new handset and infect it?
    Thankyou!!

  • @MidAirUpdates
    @MidAirUpdates 11 หลายเดือนก่อน

    Looking forward to Occupy the web talking On the AIGC era we are living in & how it impacts different Cybersecurity Fields

  • @michaeldawson6309
    @michaeldawson6309 8 หลายเดือนก่อน +2

    Regards Pegasus if its sending messages back to servers would this traffic not end up detected by BOT activity security? I wounder if Zscaler et al could detect this malicious communication from the device to identify it as compromised?

  • @grinecosta322
    @grinecosta322 11 หลายเดือนก่อน +6

    Thank you so much for the great content and this was one of the best

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +2

      Thank you! Glad you enjoyed it!

  • @juanitalerssen7335
    @juanitalerssen7335 9 หลายเดือนก่อน +1

    would it be possible to investigate malware and resend it to the originator by working on the device in a faraday cage and send it when you remove the device from the cage?

  • @Abdullah-wh6ge
    @Abdullah-wh6ge 11 หลายเดือนก่อน +1

    Great video many many thanks @David

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +1

      You're very welcome!

  • @h_ian550
    @h_ian550 11 หลายเดือนก่อน +1

    Wow , really interesting topic!!! Thank you

    • @h_ian550
      @h_ian550 11 หลายเดือนก่อน

      And malware too😂😂😂

  • @PISSEDOFF-MADABOUTIT60
    @PISSEDOFF-MADABOUTIT60 11 หลายเดือนก่อน +1

    Guys great show, more info then I can wrap my head around. Will be listening more.

  • @JamieTransNyc
    @JamieTransNyc 10 หลายเดือนก่อน +7

    What we need are some huge Class-Action lawsuits against Apple and Google to give them an incentive to make more secure phones.... They will not respond to public pressure, they will only respond to financial pressure.

    • @mikaellindqvist5599
      @mikaellindqvist5599 8 หลายเดือนก่อน

      Google makes some of the most secure phones available given the right care. Its all about hardware.

    • @RockG.o.d
      @RockG.o.d 7 หลายเดือนก่อน +1

      so what you want them to do? they patch as soon as it is found. They can't test every vulnerability in house.

    • @waterillyowo9
      @waterillyowo9 หลายเดือนก่อน

      And Samsung

  • @zanyaboutit
    @zanyaboutit 11 หลายเดือนก่อน +3

    Thanks David Bombal, just one quick request. Next time you interview OTW, can you ask about the release date of 'cyberwarrior handbook'?, because I already have read all his other books.

  • @NathanielAgiftfromgod
    @NathanielAgiftfromgod 5 หลายเดือนก่อน +1

    Thanks for the info

  • @mason35715
    @mason35715 11 หลายเดือนก่อน +3

    Always a treat. Thank you so much

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +2

      Thank you Derrick!

  • @dronefish9629
    @dronefish9629 9 หลายเดือนก่อน

    One of the best OTW videos. Thanks.

  • @dragonsage6909
    @dragonsage6909 11 หลายเดือนก่อน +2

    Great episode!
    Thx

  • @360Production.Services
    @360Production.Services 9 หลายเดือนก่อน +1

    Why isn't it stopped by firewalls or detected by router software?

  • @_v0id309
    @_v0id309 11 หลายเดือนก่อน +1

    You guys together are best ❤❤❤, amazing video ❤❤❤

  • @nozeonfroze1
    @nozeonfroze1 11 หลายเดือนก่อน

    my mind is never invurniable to the knowledge you guys have...

  • @dustinhxc
    @dustinhxc 8 หลายเดือนก่อน +1

    Loving these occupy the web videos David!!!!!

  • @suyashpriyadarshi4297
    @suyashpriyadarshi4297 11 หลายเดือนก่อน +1

    Another great episode by OTW 🎉

  • @peterkanja-uo4jw
    @peterkanja-uo4jw 11 หลายเดือนก่อน +1

    Thanks David your teach us new things for everytime

  • @NameName-rk6ov
    @NameName-rk6ov 11 หลายเดือนก่อน +3

    My iphone has been having these issues. I deleted the email associated with that account and it locked my iphone. This should completely disable messaging but it turns on by itself when I turn I off. Also my voicemail box was set up Andi purposely didn't activate it. I need help but I don't know what to do as the police want proof... But proof they understand apparently.
    Any advice would be so grateful

  • @manigandansrinivasan5194
    @manigandansrinivasan5194 11 หลายเดือนก่อน +1

    Eye opener content .keep rocking ....

  • @therealb888
    @therealb888 11 หลายเดือนก่อน +2

    This couldnt have been timed before! Pegasus was my blindspot.

  • @ozzman530
    @ozzman530 11 หลายเดือนก่อน +11

    Everytime you release one of these videos w/ OTW, I get the urge to change my career into cyber security. Thank you for continuing these conversations.

  • @kentallard1881
    @kentallard1881 11 หลายเดือนก่อน +1

    Lol,Love how he's right,He said there's really no way to scan for any of these because when hackers catch wind that you're on to them they jump ship.

  • @s1ked_416
    @s1ked_416 11 หลายเดือนก่อน +5

    I agree with OTW, David Bombal is probably the best TH-cam channel I have come across when it comes to updated information about security, when it comes to other stuff, in my opinion, I prefer John Hammond as my 2nd source for education, and Null Byte as my 3rd

  • @MP-cb7zk
    @MP-cb7zk 7 หลายเดือนก่อน +2

    Great segment! Just curious, is there a tool/app that I can install on either my laptop (connected to my mobile device via USB) or on my mobile that will reveal spyware that has been installed on my mobile device? I take it that something like Pegasus isn't detectable through consumer based anti-virus software. Thank you to you both.

  • @Cyb3r-Kun
    @Cyb3r-Kun 11 หลายเดือนก่อน +1

    hay could you do a practical example of how to set up a subnet. I looked up a few tutorials but they all only explain the theory and how tlit works with IP but no practical examples of how to set it up on routers

  • @JackofTradeApps
    @JackofTradeApps 11 หลายเดือนก่อน +2

    Cant get enough of your content gents. More please! You're the perfect combination... IMHO

  • @woodenstick3517
    @woodenstick3517 11 หลายเดือนก่อน +1

    Keep it going David !👍

  • @godwinseshie6351
    @godwinseshie6351 6 หลายเดือนก่อน

    Thank you for the video. I am new in hacking and interested in learning. How can i become a student of the facilitator/join his class?? Thanks

  • @untoldstory176
    @untoldstory176 9 หลายเดือนก่อน

    This is more exciting and interesting than Netflix! ,

  • @graymanconcepts6404
    @graymanconcepts6404 11 หลายเดือนก่อน +1

    For those not familiar with EquationGroup, that is (in large) the NSA.

  • @JamesJohnAgar
    @JamesJohnAgar 11 หลายเดือนก่อน +2

    So if they are using a stingray and someone is outside using their mobile, does that mean they can fake their location/falsify their location to make it look like you are somewhere else, like if someone mysteriously vanishes?

    • @FinP-nf3vp
      @FinP-nf3vp 11 หลายเดือนก่อน +1

      That's an interesting question

  • @impostorsyndrome1350
    @impostorsyndrome1350 11 หลายเดือนก่อน +1

    How do I join the classes or become his student? The link in the desc doesn't work

  • @heioca9556
    @heioca9556 11 หลายเดือนก่อน

    Fascinating! Can't wait for y'all to cover eternalblue

  • @Hartley94
    @Hartley94 11 หลายเดือนก่อน +2

    Thanks David.

  • @smileybrick9792
    @smileybrick9792 6 หลายเดือนก่อน

    Could we make a software that scans the number of code running in the phone and then if any other code wants to run on the device the software would stop it. like a gate keeper. for pegasus.

  • @therealcsing
    @therealcsing 11 หลายเดือนก่อน

    These types of laundry rooms are standard if you rent your flat. If you own your flat you usually have the washy things inside your flat.

  • @Roman.Joshua
    @Roman.Joshua 8 หลายเดือนก่อน +1

    When I got a device that monitors my data usage (up and down) in the upper right hand corner, bc it is integrated in my custom Rom and I'm not doing anything, then "sb listening to my mic or taking pictures/a video of me" (I got stickers), will result in data usage, which I will notice eventually.

  • @AbasionoJohn-sv6wh
    @AbasionoJohn-sv6wh หลายเดือนก่อน

    How do i enroll in your courses remotelly or purchase these books as a beginner

  • @redeyes1432
    @redeyes1432 11 หลายเดือนก่อน +2

    I'd love to see a video on hacking and AI and how crazy things might or could get in the future while we still have the training wheels on for AI? The last part of the video really made me think hmmmm AI hacking big problem?!

  • @Leroy0070
    @Leroy0070 11 หลายเดือนก่อน

    In passing I'd really like you to touch up on LOIC(Low Orbit Iron Cannon) and the evolution of DOS/DDOSes.

  • @charlestort
    @charlestort 11 หลายเดือนก่อน +1

    Thanks David, love this content

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +1

      Thank you Charles. Very happy to hear that.

  • @rashidrajabu8868
    @rashidrajabu8868 11 หลายเดือนก่อน +1

    I like that guy just waiting that class in October by what channel

  • @Spitfire_Cowboy
    @Spitfire_Cowboy 11 หลายเดือนก่อน +2

    22:07 or you turn off mobile data while at home to prevent your device from connecting to the strongest signal.

  • @cajunphilippine
    @cajunphilippine 11 หลายเดือนก่อน +9

    I am educated every time I open your channel. Thank you, David and OTW. Excellent presentation as always when you and OTW are grouping up fantastic knowledge.

    • @davidbombal
      @davidbombal  11 หลายเดือนก่อน +3

      Great to hear that Leroy! OTW is amazing 😀

    • @michaellevi8905
      @michaellevi8905 6 หลายเดือนก่อน

      הפרשן שכח להזכיר שבגרסה האחרונה של פגסוס..היה פשוט ניתן להשתלט על הסמרטפון ללא לחיצה על כלום!

  • @KOLSI_KOLSI
    @KOLSI_KOLSI 11 หลายเดือนก่อน +1

    Said this on Twitter it needs a repeat,Thank you for the birthday courses.

  • @ycmgxekwa
    @ycmgxekwa 7 หลายเดือนก่อน

    Does doing factory reset on the phone able to delete the malware?

  • @RyanLee.1776
    @RyanLee.1776 9 หลายเดือนก่อน +1

    I had a iphone 12 around the time this video came out and i got on my phone and it was in the files and the only file that was there was Pegasus, i tried to factory reset but my phones screen flashed and i was at the startup screen that said my phone was locked due to the passcode being changed...

  • @oicfas4523
    @oicfas4523 11 หลายเดือนก่อน +4

    I was staying at a hotel one time and overnight the first night, I got an alert that my phone had used 50GB of mobile data. If I recall correctly, I had tried to join a wireless network at the airport that was not successful. Always wondered what the heck it was that happened. I figure either my phone was hacked and they got all my pics including nudes lol. Or the only other possibility is that I fell asleep as I was browsing a web page that had some videos and things playing, and maybe that stupid website was downloading crap ads and videos all night.

  • @LeeMaiden
    @LeeMaiden 10 หลายเดือนก่อน +1

    I remember many many years ago, I had to learn how to hack/crack so that I could properly protect clients, I did PEN testing for companies often.

  • @wendys390
    @wendys390 หลายเดือนก่อน +1

    If these "zero day" developers were not criminals, they would immediately notify the owner of the site, to protect them. But nooooooo