Mind blowing 🤯 $20 million USD bounties! (Zero to Hero Money Hacking Roadmap)

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ก.พ. 2025

ความคิดเห็น • 303

  • @davidbombal
    @davidbombal  ปีที่แล้ว +47

    Stephen Sims shares his years of experience with us and shows us how we can make money hacking. But be careful - some of the options are not recommended.
    // Stephen's Social //
    TH-cam: www.youtube.com/@OffByOneSecurity/streams
    Twitter: twitter.com/Steph3nSims
    // Stephen Recommends //
    Programming Tools:
    Online Compiler, Visual Debugger, and AI Tutor for Python, Java, C, C++, and JavaScript:
    pythontutor.com/
    PyCharm - Python IDE with Great IDA Pro Support:www.jetbrains.com/pycharm/
    VS Code:code.visualstudio.com/
    Patch Diffing:
    Windows Binary Index for Patch Diffing:winbindex.m417z.com/
    BinDiff Tool for IDA Pro, Ghidra, or Binary Ninjawww.zynamics.com/bindiff.html
    Diaphora Diffing Tool for IDA Prodiaphora.re/
    PatchExtract for Extracting MS Patches from MSU Formatgist.github.com/wumb0/306f97dc8376c6f53b9f9865f60b4fb5
    Vulnerable Things to Hack
    HackSys Extreme Vulnerable Driver:github.com/hacksysteam/HackSysExtremeVulnerableDriver
    WebGoat - Deliberately Insecure Application:owasp.org/www-project-webgoat/
    Damn Vulnerable Web App:github.com/digininja/DVWA
    Buggy Web App:itsecgames.com/
    Gruyere Cheesy Web App:google-gruyere.appspot.com/
    Metasploitable:sourceforge.net/projects/metasploitable/files/Metasploitable2/
    Damn Vulnerable iOS App:resources.infosecinstitute.com/topics/application-security/getting-started-damn-vulnerable-ios-application/
    OWASP Multillidae:github.com/webpwnized/mutillidae
    Online CTF’s and Games:
    SANS Holiday Hack 2023 and Prior:www.sans.org/mlp/holiday-hack-challenge-2023/ www.holidayhackchallenge.com/past-challenges/
    CTF Time - A great list of upcoming and previous CTF’s!:ctftime.org/
    TH-cam Channels:
    www.youtube.com/@davidbombal
    www.youtube.com/@NahamSec
    www.youtube.com/@OffByOneSecurity
    www.youtube.com/@_JohnHammond
    www.youtube.com/@ippsec
    www.youtube.com/@LiveOverflow/videos
    Free Learning Resources:
    SANS Free Resources - Webcasts, Whitepapers, Posters & Cheat Sheets, Tools, Internet Storm Center:www.sans.org/security-resources/
    Shellphish - Heap Exploitation:github.com/shellphish/how2heap
    Exploit Database - Downloadable Vulnerable Apps and Corresponding Exploits:www.exploit-db.com/
    Google Hacking Database (GHDB):www.exploit-db.com/google-hacking-database
    Google Cybersecurity Certificate:grow.google/certificates/cybersecurity/#?modal_active=none
    Phrack Magazine:www.phrack.org/
    Kali Linux:www.kali.org/get-kali/#kali-platforms
    Slingshot Linux:www.sans.org/tools/slingshot/
    Books & Articles:
    Gray Hat Hacking Series: amzn.to/3B1FeIK
    Hacking: The Art of Exploitation: amzn.to/3Us9Uts
    A Guide to Kernel Exploitation: amzn.to/3vfY8vu
    Smashing the Stack for Fun and Profit - Old, but a classic:inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf
    Understanding Windows Shellcode - Old, but still good:www.hick.org/code/skape/papers/win32-shellcode.pdf
    Great list of exploitation paper links from Shellphish!:github.com/shellphish/how2heap#other-resources
    // Stephen’s previous videos with David //
    Free Exploit development training (beginner and advanced) th-cam.com/video/LWmy3t84AIo/w-d-xo.html
    Buffer Overflow Hacking Tutorial (Bypass Passwords): th-cam.com/video/c2BvS2VqDWg/w-d-xo.html
    // David's SOCIAL //
    Discord: discord.com/invite/usKSyzb
    X / Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos: sponsors@davidbombal.com
    // MENU //
    00:00 - Coming Up
    00:00 - Intro
    01:11 - Stephen's Experience
    03:10 - How to Change Careers
    05:39 - How do I Become an Expert?
    08:01 - Cyber Crime
    12:47 - Ransomware
    16:42 - Ransomware with A.I
    23:15 - Bug Bounties & Disclosures
    28:22 - Web Bug Bounties
    33:45 - Binary Exploitation
    41:18 - Patching and n-Day Exploits
    48:56 - What is the Patch Level in the Target Org?
    51:47 - Diffing Example
    55:40 - Professional Services
    01:03:34 - Exploit Sales Considerations
    01:13:07 - The Golden Era of Hacking
    01:15:00 - Zero to Hero
    01:27:01 - OffByOneSecurity
    01:37:42 - Conclusions
    01:39:43 - Outro
    apple
    ios
    android
    samsung
    exploit
    exploit development
    zero day
    0day
    1day
    Disclaimer: This video is for educational purposes only.
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @totalconfusion8611
      @totalconfusion8611 ปีที่แล้ว

      i wouldnt care which government is out there to screw my government over, know youre enemy.

    • @SmartTecSolutions
      @SmartTecSolutions ปีที่แล้ว

      Do I need a computer science degree to get into bug bunty

    • @justcallmeex6039
      @justcallmeex6039 ปีที่แล้ว

      ​@@SmartTecSolutionsNo, you don't need a degree to become a bug bounty hunter. You don't need any certification or qualification, and you don't need to have a specific academic background. However, having some familiarity with web development or programming languages can give you an advantage. You will likely need to learn at least the basics for some things like networking, security, programming, etc.
      Here are some tips for getting started with bug bounty hunting:
      • Read thoroughly about the architecture of the application and the security issues in applications
      • Learn the cyber security foundations using free online courses
      • Learn basic HTTP authentication, website login forms, and more
      • Learn SQL injection fundamentals
      • Learn the exact process you need to follow as a bug bounty hunter
      Skills suggested for Bug Bounty Hunting
      • Programming skills: Bug bounty hunters must be knowledgeable in programming languages like JavaScript, PHP, and Python, which are frequently used in web applications. They should also have a good understanding of web application security concepts.
      • Networking skills: Bug bounty hunters need to be able to scan networks for vulnerabilities. They should also be familiar with common network attacks and countermeasures.
      • Security tools: Bug bounty hunters should be knowledgeable about security technologies, including vulnerability scanners, penetration testing frameworks, debuggers, and reverse engineering tools.
      • Research skills: Bug bounty hunters need to be able to research vulnerabilities and find new targets. They should also be able to stay up-to-date on the latest security threats.
      • Communication skills: Bug bounty hunters need to be able to communicate effectively with security teams. They should be able to explain their findings in a clear and concise way.
      In addition to these technical skills, bug bounty hunters also need to have a strong work ethic and be able to work independently. They should also be able to learn new things quickly and adapt to new challenges.
      Resources for getting started:
      If you are interested in becoming a bug bounty hunter, there are a number of resources available to help you get started. There are also a number of bug bounty programs that you can participate in.
      Here are some of the resources that you can use to get started with bug bounty:
      • Bugcrowd: This is a popular bug bounty platform that offers a variety of programs for different levels of experience.
      • HackerOne: This is another popular bug bounty platform that offers a variety of programs for different levels of experience.
      • OWASP: This organization provides a number of resources on web application security, including a list of common vulnerabilities.
      • PortSwigger Academy: This online training platform offers a number of courses on web application security, including bug bounty hunting.

    • @projectsspecial9224
      @projectsspecial9224 ปีที่แล้ว +1

      ​@@SmartTecSolutions No, just critical thinking skills for coding and logic through years of sheer determination .. no shortcuts

    • @Torterra_ghahhyhiHd
      @Torterra_ghahhyhiHd ปีที่แล้ว

      the next 3pstein blackmail ring. in cyberpunk 2077. they just need ai justice system. dammit. wich may work way better than the current one. the elite in geo of the elite are grey that just goes 4 power.

  • @datalemon
    @datalemon 7 หลายเดือนก่อน +8

    The people saying your content is “too simple” already have the knowledge to determine what they need to know. Thanks for making content that’s easy to understand. And for having conversations with interesting well spoken professionals in the field.

  • @kostasanalytis2925
    @kostasanalytis2925 ปีที่แล้ว +55

    This guy's craaaazy! You can see his passion in his facial expressions, his tone of voice (and that he probably didn't blink for 90') and his blunt honesty!
    Congrats to both! Awesome stuff! Keep it coming!❤

    • @piusgabula
      @piusgabula ปีที่แล้ว +1

      Been following this guys channel but damn he got a small audience. Yet with gold content

    • @paranoidzkitszo
      @paranoidzkitszo ปีที่แล้ว +2

      Those Adderall eyes.😃👀👁👁

    • @n.lightnin8298
      @n.lightnin8298 ปีที่แล้ว +1

      The hair 😂 idk if I’m buying all of it though who is a hacker that can’t think of DREAD? and vpn on tor?? Tf?

    • @paranoidzkitszo
      @paranoidzkitszo ปีที่แล้ว

      @@piusgabula sure, but, anyone could pull that off...you said it yourself... all the info is online.

    • @paranoidzkitszo
      @paranoidzkitszo ปีที่แล้ว

      I do like his 'cadence' throughout the interview - he's done these things a few times before. Also, the interviewer is always on point and well researched- the combo makes for a fantastically juicy educational many minutes I've not minded giving up. , You know, like, sometimes you walk away to use the urinal (you all do get outta your chairs to use the washroom - in the washroom right?)..pivot ...kicking the chair outta the way, basking in your strength and skills - except for the actual getting up part where a big grunt and groan assisted plenty to complete the task- anyway, as you pinch that bladder so to not dribble prior to engaging your target 🎯 at least the rim of the toilet recollecting upon your past moments of life. There's a very high percentage, historically where you'd scolded yourself for wasting those precious seconds, minutes, hours....this time... Different...their chemistry purculates nicely, letting off a sweet aroma...can you smell it? Like a fresh ground/ pressed cup of your favorite coffee beans. Their oils bursting into the air, the molecules catching a ride on the atoms of the many other chemicals- oxygen,hydrogen, some carbon...some dioxides...free loaders hitchhiking their ways into your flared nostrils 👃 awaiting invitingly the plethora of pleasantries..you let out a breath so to make room for another hit of that intoxicating marvelous bold sweet woody aroma. A brief moment your eyes shut- lasting yet not long enough. You are in eternal bliss for that second or two. Time well spent/not wasted.

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 ปีที่แล้ว +37

    Excellent video as always, great job David.

    • @davidbombal
      @davidbombal  ปีที่แล้ว +10

      Appreciate that! Thanks again!

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 ปีที่แล้ว +5

      @davidbombal no worries. Also, for the bug bounties, intigriti have excellent staff.. not too sure about hackerone

  • @HellsingGhrey-ht2wg
    @HellsingGhrey-ht2wg 8 หลายเดือนก่อน +4

    WHOA!!!!! I'm just using a tiny piece of what he talked about and I'm seeing some crazy skill and ability expansion! Loving it!!!

  • @DysphasiaPV
    @DysphasiaPV ปีที่แล้ว +11

    This video is so interesting. I'm currently studying ISC2 CC and hoping to take the exam in the next few weeks. Looking forward to starting my career path, even though I am entering the cybersecurity career late (I'm 49, 50 in February).

    • @lonster6865
      @lonster6865 ปีที่แล้ว +2

      Nice man. I'm 50 and thinking about doing it. Just not sure if I'm too old to be hired?

    • @DysphasiaPV
      @DysphasiaPV ปีที่แล้ว

      @@lonster6865 I'm just going to do it and then find out. Doesn't hurt to try it. I just want to be working in a job where I'm warm, not working where I have to deal with customers.

    • @projectsspecial9224
      @projectsspecial9224 ปีที่แล้ว +1

      ​@@lonster6865NEVER too old to do what you LOVE! 😅

    • @NewDimension777
      @NewDimension777 ปีที่แล้ว +1

      ​@@lonster6865Nobody is too old and nobody is too young to start something

    • @NewDimension777
      @NewDimension777 ปีที่แล้ว +1

      How many months did it take you to study ISC2 ??

  • @SBPk3
    @SBPk3 10 หลายเดือนก่อน +5

    I wish I knew this guy. I'm learning stuff slowly but I've been learning solo, and going at it blind. Not only new to networking. But learning the capabilities of hacking and coding, and Linux in general. And man, I know I've got something important, I just don't know what it actually means. It's a total brain scrambling situation.

    • @fatlip8315
      @fatlip8315 8 หลายเดือนก่อน +2

      Your not alone. He's likely reachable. Reach out, introduce yourself. That's what I do. I've met a lot of folks. They're all really great people. Even if they may bite your head off. Their exceptional people. I laugh with all of them. You can say it's a small world, where everyone really does know everyone. .

  • @dav1d_andrew
    @dav1d_andrew 2 หลายเดือนก่อน

    Such a humble guest. You both are such great mentors to the community.

  • @ryanziller220
    @ryanziller220 ปีที่แล้ว +5

    Simon Sims did great work. The hardest part about overcoming plateaus is related to repurposing the energies which are required for the development of new strategies and not overworking the same patterns of behavior. It is probably best to find a way to take less from the same resource while considering other skills which can improve the likelihood of breaking from poorer behaviors.

  • @LetsTalkAW
    @LetsTalkAW ปีที่แล้ว +8

    Been loving these videos with Stephen! Extremely inspiring what you can learn and do

  • @jfjohns2020
    @jfjohns2020 ปีที่แล้ว +2

    Wow, I have been doing IT for 25 years and this was like am I noob lol! I think I will have to crawl first before I try running. Thanks for the new prospective.

  • @Abrar_Ahmad.
    @Abrar_Ahmad. ปีที่แล้ว +8

    Very enjoying. Thank you so much David bombal sir for giving us such valuable content. May you live long David sir❤❤❤

    • @davidbombal
      @davidbombal  ปีที่แล้ว +1

      Thank you very much!

  • @LifelongLearner961
    @LifelongLearner961 7 หลายเดือนก่อน +1

    Excellent guest within the first 23 minutes, he made the best point of all. Just keep at it and if your heart in it with hard work, my dad says work, as opposed to hard, if you really want it, you will be successful. Not 100% guaranteed but damn close! Read the book 10,000 hours.

  • @stylis666
    @stylis666 ปีที่แล้ว +3

    1:15:05 "I stuck with the dog theme, [...] and over on the right, that dog is beefed up, and how do you get there?"
    WIth photoshop, hopefully, because HOLY MOLY, what a dog! 🤣
    But great presentation and very informative. I've always wondered about these things and about how safe you are as a hacker, and yeah, you have to be sensible and careful. I loved the moment Stephen was talking about a guy who could hack insulin pumps and pacemaker, and said out loud what it would do and immediately followed it up by saying he wouldn't know anything about that 🤣Whether that is true or not, that is a great follow up 🤣

  • @tupui
    @tupui ปีที่แล้ว +1

    That was a really nice interview! Thank you both for sharing 😀

  • @LifelongLearner961
    @LifelongLearner961 7 หลายเดือนก่อน +1

    Excellent guest within the first 23 minutes, he made the best point of all. Just keep at it and if your heart in it with hard work, my dad says work, as opposed to hard, if you really want it, you will be successful. Not 100% guaranteed but damn close! Read the book 10,000 hours.
    As I love to say nothing worth having comes easy or overnight.

  • @SarntRoos
    @SarntRoos ปีที่แล้ว +10

    I’d like to see a video about reading and understand the rules to bug bounties. There’s a lot of in scope and out of scope instructions that as a new bug bounty hunter might find hard to understand and knowing what is legal and illegal.

    • @goat-eyes
      @goat-eyes ปีที่แล้ว

      Precisely.

  • @renn3014
    @renn3014 9 หลายเดือนก่อน +1

    Wooow this guy is so knowledgeable . Yet another great video thank you 😁😁😁

  • @anamnesis726
    @anamnesis726 ปีที่แล้ว +3

    As always your videos and your guests are awesome! Thank you so much for sharing!

  • @TO3F4U
    @TO3F4U 4 หลายเดือนก่อน +2

    Amazing amazing content David, you are building a world class Cyber Platform

  • @freshsaladx
    @freshsaladx ปีที่แล้ว +2

    Great video as always, really just had to watch the full video before going to sleep even if it was 1 am. Good job David and Stephen.❤

  • @codexverma8389
    @codexverma8389 ปีที่แล้ว +111

    Please one video with Zaid Sabih (Zsecurity) 🙏🙏🙏🙏

    • @WUGH
      @WUGH ปีที่แล้ว

      Agree

    • @impostorsyndrome1350
      @impostorsyndrome1350 ปีที่แล้ว +21

      You mean that faker one who teaches you early 2000s stuff that would barely work on modern systems? 😂

    • @leonloncaric7715
      @leonloncaric7715 ปีที่แล้ว

      Pleaseeee

    • @impostorsyndrome1350
      @impostorsyndrome1350 ปีที่แล้ว +3

      @@agastronics no he's a fraud

    • @agastronics
      @agastronics ปีที่แล้ว

      @@impostorsyndrome1350 You mean I

  • @MiningMastermindLabs
    @MiningMastermindLabs 2 หลายเดือนก่อน

    Brilliant video, you nailed every detail. I’ve been trying to follow this format for my own channel.

  • @BlackB4rt
    @BlackB4rt ปีที่แล้ว +3

    This was top notch informative and great insights into last vulnerabilities. Thank you, Gentlemen

  • @ZuulVamp
    @ZuulVamp ปีที่แล้ว

    Stephen is my favorite guest, hands down.

  • @fdgmedd
    @fdgmedd ปีที่แล้ว +3

    watched it all, Bro is really smart, looks like a Dark Version of EMINEM but for Hacking.. really cool! thanks for everything you shared here!👌👌

    • @OffByOneSecurity
      @OffByOneSecurity ปีที่แล้ว +1

      First time reading through some of these comments, and yours made me laugh. I gotta listen to some Slim Shady now!

  • @Ynerson9003
    @Ynerson9003 ปีที่แล้ว +5

    Thanks for this David, I am 30 years old and really enjoy videos like this. I am trying to get into bug bounties, and break into the ethical hacking field. I have no experience in tech, but am willing to go all in and learn this stuff, as it’s very interesting and I’m in need of a career switch, any advice or words from you would be much appreciated! Your content has truly inspired me to believe this is possible for me!

    • @RorschachRev
      @RorschachRev ปีที่แล้ว +4

      with zero experience you should get some sysadnin certificate for Linux. It will teach you more about file systems, networking, services, etc than you would ever learn other ways. Writing certifications and training materials, I had to become more well rounded. I used to say in my classes, "Miyamoto Musashi was probably the greatest swordsman to ever live. He was asked about the secret to becoming a great swordsman and he replied it is not 1 thing, but 1000 things. Being a great sysadmin is knowing not 1 thing but 1000 things. Being great at security is knowing 1000 things about 1000 things." Decompiling like this video suggests requires programming skills that are super advanced, it is knowing 1000 things about 100 things.

    • @georgejones5019
      @georgejones5019 ปีที่แล้ว +2

      I'm 31, and I just started in IT about 4 years ago. It's a lot, and you have to keep learning.

    • @k_usuan
      @k_usuan ปีที่แล้ว +1

      How do you get into the sys adm . Can a comptia a + or sec get me in ?

    • @RorschachRev
      @RorschachRev ปีที่แล้ว

      @@k_usuan comptia sort of works if you want into sysadmin. you should make a full network and practice sharing files between Linux and windows. do it the windows way, windows host and the Linux way, with cifs and possibly nfs. set up a WAMP and a LAMP machine, (or use nginx) then attack the systems. Apply as a Jr network admin, work towards a bigger cert while you apply. You could volunteer at places 10 hours a month so you apply "with experience." I made six figure income as a network admin.

    • @Ynerson9003
      @Ynerson9003 ปีที่แล้ว

      @@RorschachRevthanks for the advice will take this to heart!

  • @l4teb0y
    @l4teb0y 5 หลายเดือนก่อน

    Great Video , Really keep going David I'm big fan for your channel and videos , Please need more podcasts ! :)

  • @sachinthokala252
    @sachinthokala252 ปีที่แล้ว

    Stephen Sims is the only guy I have seen until now who has not allowed David Bombal to utter a word. Such a remarkable guy../😆😅

  • @dembasoumare4448
    @dembasoumare4448 3 หลายเดือนก่อน

    David thank you for this insightful interview. This lad is amazing!

  • @peterenis5634
    @peterenis5634 3 หลายเดือนก่อน

    „The big opportunity, depending on where you are located“ is like telling people without a somewhat solid education, to go out and try to find mistakes from people with such education. I dont say it never happens but the odds seem pretty against one site of that equation.

  • @thedogfather1204
    @thedogfather1204 ปีที่แล้ว +1

    Thank you for your awesome content and guests!

    • @davidbombal
      @davidbombal  ปีที่แล้ว

      You're welcome! Thank you for watching!

  • @SecTechie
    @SecTechie 10 หลายเดือนก่อน

    These two are beyond top-notch. Thanks guys! Could you ever touch on Kali Linux and the best books to teach for certifications and which to go for first etc. Thanks.

  • @sandytaggart6947
    @sandytaggart6947 6 หลายเดือนก่อน +1

    This video is so ADHD ❤ Respect.

  • @Thedude897
    @Thedude897 ปีที่แล้ว

    It took me all day to watch but I watched it from start to finish. Very cool and informative video.

  • @baba01hacker
    @baba01hacker ปีที่แล้ว +4

    Love your video, sir and
    Please make a full series on termux

    • @davidbombal
      @davidbombal  ปีที่แล้ว +1

      Thank you! What do you want to see in termux videos.

    • @baba01hacker
      @baba01hacker ปีที่แล้ว

      @davidbombal first explain all the commands and teach a programme launge like python and golang and make their own tools fir hacking and hacking some ctf and giving partcical examples of other attacks that you could do with a mobile phone make this mostly a non root series but if you need root to do something make video about it if it's important

  • @roniramirez6934
    @roniramirez6934 7 หลายเดือนก่อน +2

    I am not sure if anyone can answer this, and I am somewhat embarrassed to say, but I am 70 years old and just starting a website. Am I too old to get started, or is there still a chance for me to succeed in this venture? I would appreciate any advice or encouragement you can provide.

    • @marlinshanklin-ww7em
      @marlinshanklin-ww7em 7 หลายเดือนก่อน

      I'm 59 studying cybersecurity you can do it sir.

    • @dembasoumare4448
      @dembasoumare4448 3 หลายเดือนก่อน

      You can do it. Let not the aysayers tell you otherwise.

  • @delresearch5416
    @delresearch5416 8 หลายเดือนก่อน +1

    Yea a python memory scanner for a 16 digit number that use the luhns algorithm and to save 80 bytes on each side and search for date code. Was easy with AI to Easy.

  • @Abduselam.m
    @Abduselam.m ปีที่แล้ว +1

    Thanks so much David
    From Ethiopia

    • @davidbombal
      @davidbombal  ปีที่แล้ว

      You're welcome! And welcome Ethiopia!

  • @00Jimmy00
    @00Jimmy00 ปีที่แล้ว +2

    54:48 what diff tools are you using ?

  • @staurneskristiansen8376
    @staurneskristiansen8376 11 หลายเดือนก่อน +2

    Great stuff as always on this amazing channel! However, some of the AI fear mongering just got me. What kind of ran-som-wa-re, related to your discussion, would an AI be able to code that a skilled ransomware coder (at the age of 16 or 55 years old.. :/ ) would not be able to? And, whatever the technology available; is it not (as always) the willingness, funds and determination to do "bad" (bad in "" as also this is a matter of definition and circumstance..) that is the driving factor? You see, world is full of capable programmers, AI and human.. the problem is that most of us simply find creating a program like that flipping disgusting - even if we easily can..

  • @billyblanco6700
    @billyblanco6700 11 หลายเดือนก่อน +11

    I don’t have any friends or social life… where do I start?

    • @TimeSpy415
      @TimeSpy415 6 หลายเดือนก่อน +3

      The park, gym, and local events are good places to start.

    • @blackflagqwerty
      @blackflagqwerty 4 หลายเดือนก่อน +1

      LOL, Me too.😂😂

    • @geraldwheaton6272
      @geraldwheaton6272 3 หลายเดือนก่อน

      Usb stuff is easy a start with that then find what way u want to go

  • @mohdhakimi53
    @mohdhakimi53 ปีที่แล้ว +1

    I have a question about what security priority is appropriate for Linux vs Windows vs Mac OS

  • @SefSufi
    @SefSufi ปีที่แล้ว

    Dr. S.S, you have an amazing vibe about you, , and your aura snever seeems to dim or flicker it tays on bright

  • @scooterp4113
    @scooterp4113 10 หลายเดือนก่อน +1

    Is it bad that im transitioning in to cybersecurity being that im in my late 30s. In 13 months out from getting my cybersecurity degree. Yes i fully realize im still a noob and by no means have much experience in the field. Im definitely a hands-on learner!! Any recommendations? I will also start studying and taking practice exams for my network plus cert...this summer semester 2 of my courses are security fundamentals and principles for information assurance.

  • @SwitchingITup-ng1dh
    @SwitchingITup-ng1dh ปีที่แล้ว

    This was really great, Stephen is a really cool guy!

  • @777Nardo
    @777Nardo ปีที่แล้ว

    Great video, lots of great insight and truths. It gives me something to think about but I do agree continuing to study is a must.

  • @ScamCast
    @ScamCast 7 หลายเดือนก่อน

    Very interesting listening to him. Thanks

  • @ksenofilius
    @ksenofilius ปีที่แล้ว +2

    Fantastic work, David! I couldn't help but notice a minor detail - there seems to be a slight echo from your microphone picking up Stephen's audio. Thank you so much for your dedication and the great content you provide!

  • @pentiumvsamd
    @pentiumvsamd 11 หลายเดือนก่อน +1

    50:50 is there something more than a single pixel? R2$?
    1:13:10 under that armor it's still a dog that wags its tail when it gets a treat...

  • @gamereditor59ner22
    @gamereditor59ner22 ปีที่แล้ว +3

    Great video and brilliant!! Is it possible to learn most of the basic in one year?

    • @davidbombal
      @davidbombal  ปีที่แล้ว +3

      You're welcome. It really depends on you, your existing knowledge, how quickly you learn, time you allocate etc. My advice is just get started and learn as much as you can. You'll be amazed how much you can learn in one year if you learn something new every day.

    • @gamereditor59ner22
      @gamereditor59ner22 ปีที่แล้ว +1

      @@davidbombal That's true! Thank you!

    • @maramingalamchannel
      @maramingalamchannel ปีที่แล้ว

      ​@@davidbombalhow to learn? Just watching in your videos. Im new in you channel

    • @davidbombal
      @davidbombal  ปีที่แล้ว +1

      @maramingalamchannel - this video gives you a roadmap for Hacking: th-cam.com/video/_wOqpowCaW8/w-d-xo.html - the other videos I posted this year give you roadmaps for other areas in tech.

  • @russkovactivator
    @russkovactivator ปีที่แล้ว

    Thanks🎉 David I’m from Algeria

  • @mvd_01
    @mvd_01 ปีที่แล้ว +3

    How do I get in the ethical hacker field?
    I’m currently studying CompTIA A+ and it is so boring.

    • @Notme-le3qt
      @Notme-le3qt ปีที่แล้ว +1

      Gotta crawl before walking. After u get the cert, go for security +
      & towards the end of your A+ curriculum they touch on very basic hacking.

    • @mvd_01
      @mvd_01 ปีที่แล้ว +1

      @@Notme-le3qt that’s true! 80% of the stuff being covered in the course it’s so basic. That’s why it’s boring to me.

  • @courtneyherron165
    @courtneyherron165 ปีที่แล้ว

    Good video! I love Tear you Apart -She Wants Revenge

  • @TureIMasterEquality
    @TureIMasterEquality ปีที่แล้ว +2

    I don't know why I love the "Baby Boy" movie reference, mayber cause I just watched it..😅 nah but thanks for the content, it really opened my mind to the dark web and the clear web in a matter of whats possible from a hacker point of view.."Gunz N Butter" 😅

    • @alexdnaz
      @alexdnaz ปีที่แล้ว

      What’s “Baby Boy” about ?

    • @TureIMasterEquality
      @TureIMasterEquality ปีที่แล้ว

      @@alexdnaz a movie with Tyrese Gibson

  • @bachirbenmouloud2023
    @bachirbenmouloud2023 ปีที่แล้ว

    Thanks David ❤
    I wish you would make a video about Pwnagotchi 😊

  • @Dacky1989
    @Dacky1989 ปีที่แล้ว +1

    Guns & Butter. I love Baby Boy 😁😂

  • @SethOpana
    @SethOpana ปีที่แล้ว

    Thanks David!
    Was waiting for it

  • @arindamdasgoogledeveloper
    @arindamdasgoogledeveloper 11 หลายเดือนก่อน +1

    Hey David . H r u? I have a question. Can I learn cyber security without have a good pc. I have celeron laptop. Can I learn on the cloud? It would be helpful if you can Please guide.

    • @dembasoumare4448
      @dembasoumare4448 3 หลายเดือนก่อน

      I asked chatgpt and that's what I got 1:19:29 : When choosing a laptop for cybersecurity, it's essential to look for features that support performance, portability, and flexibility, as you’ll likely be running virtual machines (VMs), performing network analysis, and perhaps doing some light coding or compiling. Here are some of the best options for cybersecurity students:
      1. Dell XPS 15 or XPS 13
      Specs: Intel Core i7 or i9, 16-32GB RAM, 512GB-1TB SSD
      Pros: Excellent display, great battery life, lightweight, strong performance.
      Why it's good: It’s powerful enough for virtual machines, and the build quality is excellent for a daily driver.
      2. Apple MacBook Pro (14" or 16")
      Specs: Apple M1/M2 Pro or Max, 16GB+ RAM, 512GB+ SSD
      Pros: Exceptional battery life, high-quality display, good ecosystem for UNIX-based tools (with macOS being UNIX-like).
      Why it's good: Many cybersecurity tools work well on macOS, and it can run multiple VMs smoothly.
      3. Lenovo ThinkPad X1 Carbon or T14
      Specs: Intel Core i5/i7 or AMD Ryzen, 16-32GB RAM, 512GB-1TB SSD
      Pros: Excellent keyboard, durable build, Linux-friendly, great for heavy multitasking.
      Why it’s good: ThinkPads are reliable, and Lenovo models have great compatibility with Linux if you choose to dual-boot or run Linux natively.
      4. ASUS ROG Zephyrus G14 or G15 (Gaming Laptop)
      Specs: AMD Ryzen 9, NVIDIA GeForce GTX/RTX, 16GB+ RAM, 1TB SSD
      Pros: High-performance CPU and GPU, good cooling system, decent portability for a gaming laptop.
      Why it’s good: Great for running multiple VMs and GPU-intensive tasks, plus it’s generally well-built and fast.
      5. Framework Laptop (12th Gen Intel)
      Specs: Intel Core i7/i5, 16-32GB RAM, customizable SSD
      Pros: Highly modular and upgradeable, Linux-compatible, excellent for hands-on hardware tinkering.
      Why it’s good: Perfect if you want a highly customizable and repairable laptop that can grow with you.
      6. HP Spectre x360 or Elite Dragonfly
      Specs: Intel Core i7, 16GB+ RAM, 512GB SSD
      Pros: Stylish design, convertible, good battery life, solid performance.
      Why it’s good: Offers good power and portability, and the HP Elite series is often used in business environments, which might help with familiarity.
      Key Features to Consider
      RAM: At least 16GB; 32GB is ideal if you plan on running multiple virtual machines simultaneously.
      Storage: SSD with at least 512GB, but 1TB is better if your budget allows.
      Processor: Intel i7 or higher, or AMD Ryzen 7 or higher, for handling multitasking and VMs.
      Portability: Since you might take this laptop to classes or labs, weight and battery life are factors to consider.
      Linux Compatibility: Many cybersecurity tools are built for Linux, so compatibility can be useful.
      If you're on a budget, you might also look into refurbished models, especially high-end business laptops like older ThinkPads or Dell Latitudes, as they often offer good performance at a reduced price. Let me know if you want more on any specific laptop!

  • @flopya
    @flopya ปีที่แล้ว

    Wow, great video
    Still on it thou 💯💯💯 thanks 😊

    • @davidbombal
      @davidbombal  ปีที่แล้ว +1

      You’re welcome 😊

  • @VisionNine9
    @VisionNine9 11 หลายเดือนก่อน

    This is a great informative session

  • @AliRagabali
    @AliRagabali ปีที่แล้ว +1

    thanks so much , we need more videos of Stephen , less of OTW

    • @fonzkonaboey4864
      @fonzkonaboey4864 9 หลายเดือนก่อน

      Whats wrong with OTW?

    • @fonzkonaboey4864
      @fonzkonaboey4864 9 หลายเดือนก่อน

      Whats wrong with OTW?

    • @AliRagabali
      @AliRagabali 9 หลายเดือนก่อน

      @@fonzkonaboey4864 this guy is a joke not a hacker as he claims

  • @savagepro9060
    @savagepro9060 ปีที่แล้ว +2

    0:01 Zerodium? I thought that was the Periodic Table . . . for Hackers!

  • @bine35
    @bine35 ปีที่แล้ว

    Just what I needed thanks Mr Bombal

  • @jester8802
    @jester8802 ปีที่แล้ว +3

    Hi Mr. Bombal!
    Could Mr. Sims talk about "higher level" OSINT stuff like:
    - image processing, geolocation, visual analysis,
    - timelapse reconstruction, 3D-reconstruction,
    - AI-enlarged close-up of the item/image, digital reconstruction (of the image), dimensional analysis, etc.
    Stuff used in law enforcement - tracking criminals and rescuing lost/kidnapped people.
    Thanks for your consideration!

    • @watchmo2310
      @watchmo2310 9 หลายเดือนก่อน

      found anything

  • @JasonZeman-c1c
    @JasonZeman-c1c ปีที่แล้ว

    absolutely fantastic presentation

  • @Prince3.2
    @Prince3.2 ปีที่แล้ว +2

    Sir please tell me how can I unlock bootloader of my vivo y83 smartphone?? Please
    Please
    please
    Please
    Please
    Please

  • @gabord701
    @gabord701 ปีที่แล้ว

    The insert at 21:30 is Budapest and not Bucharest.

  • @tigreonice2339
    @tigreonice2339 ปีที่แล้ว

    Wow you're making a lot of content. Thank you

  • @UpStateTrucker
    @UpStateTrucker 3 หลายเดือนก่อน

    Thank you. For good 👍

  • @gooniesfan7911
    @gooniesfan7911 7 หลายเดือนก่อน

    very good guest

  • @ilyosbeknajmiddinov6754
    @ilyosbeknajmiddinov6754 10 หลายเดือนก่อน

    hello David, could you make content about undergraduate or postgraduate computing related courses like computer science, cybersecurity, could computing etc.. Are they really useful pros and cons. Differences between undergraduate courses and degree apprenticeships. Because, nowadays, students are paying crazy amount of money to universities especially foreign students and is it worth it ?. Personally I'm currently studying in London, at UEL.

  • @wingwing2683
    @wingwing2683 10 หลายเดือนก่อน

    Thank you very much!

  • @HellsingGhrey-ht2wg
    @HellsingGhrey-ht2wg 8 หลายเดือนก่อน +1

    I would NOT say your content is to simple.

  • @Sristi-Misti
    @Sristi-Misti ปีที่แล้ว +1

    Please one video with Networkchuck 🙏

  • @L1ghtMus1c7
    @L1ghtMus1c7 10 หลายเดือนก่อน

    how much is for anonymous reward

  • @confidenceebuka8034
    @confidenceebuka8034 ปีที่แล้ว

    Mr.stephen I think you should make a complete video on this topic..

  • @mlsandreas
    @mlsandreas ปีที่แล้ว

    A M A Z I N G !!! Thank you!!

  • @dominic4230
    @dominic4230 ปีที่แล้ว

    Yes Dread is still onn.

  • @check_c1357
    @check_c1357 ปีที่แล้ว

    Zerodium reminds me of when Kevin Mitnik was there and how he refused to tell an interviewer about some zero-day exploits😂..

  • @Sandeep-c3c4j
    @Sandeep-c3c4j ปีที่แล้ว

    Some malware, spy app and virus is difficult to remove even after factory reset phone they came automatically don't know how I am in problem please help me . Not possible to change phone hard-disk

  • @ercntreras
    @ercntreras ปีที่แล้ว

    Thank you so much!!

  • @STJFreddie
    @STJFreddie ปีที่แล้ว

    This was one of the best

  • @tipzee101
    @tipzee101 ปีที่แล้ว

    Stephen reminds me of “Tommy” from the TV show “Power”

  • @stamshem12
    @stamshem12 ปีที่แล้ว +1

    I love Stephen!!!
    admirer

    • @davidbombal
      @davidbombal  ปีที่แล้ว +1

      Agreed. He's amazing.

    • @stamshem12
      @stamshem12 ปีที่แล้ว

      you too!!
      @@davidbombal

  • @PawanKumar-ou1bw
    @PawanKumar-ou1bw ปีที่แล้ว

    Please suggest some books for web hacking

  • @user-zl8cp7sb6d
    @user-zl8cp7sb6d ปีที่แล้ว

    Excellent video! and yep gaming is a HUGE time sink, wasted so much time on just one specific game and calculated the total hours, it was like i sat in the chair for 27 days straight , never doing that again. Thank you for this video, it has shifted my focus.

  • @RyanSamosas
    @RyanSamosas 8 หลายเดือนก่อน

    steven is anonymouse is that the guys name who hides under the dark hooded clock? that's him i can tell his voice and mannerisms scream it ...very cool

  • @Heavy146
    @Heavy146 ปีที่แล้ว

    Thanks for sharing.

  • @toddmonka275
    @toddmonka275 ปีที่แล้ว

    At 14 minutes into your video-that's the plot in the beekeeper movie

  • @myname-mz3lo
    @myname-mz3lo ปีที่แล้ว +1

    never give sensitive code or data to cloud based ai tools . only do it with locally ran ones. it can lead to leaks . and it has already happened to some coders . stay safe

    • @Bitcoin1y
      @Bitcoin1y 3 หลายเดือนก่อน

      Yes, there are several open-source AI models similar to ChatGPT that you can download and run locally. Here are some notable ones:
      1. GPT-NeoX (EleutherAI)
      Description: GPT-NeoX is an open-source project by EleutherAI, which provides a powerful GPT-based language model you can run locally. It is designed for research and is one of the closest alternatives to OpenAI’s GPT models.
      Installation: Requires a strong hardware setup, as these models are large and resource-intensive. You can use GPUs for inference or train your own model.
      Link: GPT-NeoX
      2. GPT-J (EleutherAI)
      Description: Another model from EleutherAI, GPT-J is a smaller, more lightweight version of GPT-NeoX and can be used for various text generation tasks.
      Installation: Easier to run locally than GPT-NeoX due to its smaller size. However, it still requires a good amount of computing power.
      Link: GPT-J
      3. LLaMA (Meta)
      Description: LLaMA (Large Language Model Meta AI) is an open-source project by Meta. It’s lighter and efficient in comparison to many other models but can deliver competitive performance.
      Installation: LLaMA is optimized to run even on consumer-level hardware like a high-end PC, though having a GPU helps.
      Link: Not officially available for direct download, but models can be found on the web with appropriate research.
      4. Alpaca (Stanford)
      Description: Built using Meta’s LLaMA as a base, Alpaca is fine-tuned for instruction-following tasks and designed to be a cheaper alternative to training models like ChatGPT.
      Installation: Works well on consumer hardware, especially with lower-end versions of the model.
      Link: Alpaca GitHub
      5. BLOOM (BigScience)
      Description: BLOOM is an open-source, multilingual model developed by the BigScience initiative. It is designed for text generation in a variety of languages.
      Installation: Like other large language models, it requires significant computing resources, but there are smaller versions that can be run on local machines.
      Link: BLOOM
      6. Dolly (Databricks)
      Description: Dolly is an open-source chatbot model similar to ChatGPT, and it was developed with cost-effective fine-tuning in mind.
      Installation: This model can be trained and used on relatively small hardware setups.
      Link: Dolly GitHub
      Requirements for Running Locally
      To run these models locally, you'll need:
      Hardware: A powerful CPU or a GPU (NVIDIA CUDA support is common).
      RAM: 16GB+ RAM is recommended for smaller models, with 32GB or more for larger ones.
      Python environment: Most of these models require Python, along with specific libraries such as PyTorch or TensorFlow.
      Setup: Most installations are done through GitHub repos, and you may need to install dependencies (like pip or conda).

  • @crystalmorell1629
    @crystalmorell1629 9 หลายเดือนก่อน

    I just signed up for 3 free Sans courses I want to intern there so bad!!

  • @Banglafunnyvlogs-kf4ez
    @Banglafunnyvlogs-kf4ez ปีที่แล้ว

    How many times to learn ethical hacking from a beginner.

  • @Xiy114
    @Xiy114 ปีที่แล้ว

    I think this was a good video with good content. The problem is who has $8,000 to $10,000 dollars to be able to take a Sans course?

  • @NeverGiveUpYo
    @NeverGiveUpYo ปีที่แล้ว

    Gotta love Sims.

  • @ZeroDayDiaries
    @ZeroDayDiaries 9 หลายเดือนก่อน

    What stopping you from selling both to the government and them ?

  • @Helpexplorer
    @Helpexplorer ปีที่แล้ว

    Am happy with a Thank you for a bounty 😂

  • @Azure.jbz1
    @Azure.jbz1 11 หลายเดือนก่อน

    thumbs up that dude......

  • @benvestments
    @benvestments ปีที่แล้ว +1

    30 seconds in and we are already talking about pissing off interpol.

  • @Norfdwarf
    @Norfdwarf ปีที่แล้ว +1

    Bring on Mr. Hacker Loi!....I don't know who he is tho js

    • @projectsspecial9224
      @projectsspecial9224 ปีที่แล้ว +2

      He might be a nation state "operative"?! I know I'd been accused before just having two opened laptops in a coffee shop 😅

    • @Norfdwarf
      @Norfdwarf ปีที่แล้ว

      @projectsspecial9224 been there