Hacking is basically attacking vulnerable systems, and most modern computers won't have many weaknesses. That's why you should attack the weaker system: The human (not physically of course)
OTW embodies the essence of a true educator - he's passionate,has willpower to share knowledge and most interesting delivers it in a simplified manner, irrespective of complexity. Similarly D.Bambol is an inquisitive, diligent student who consistently poses insightful questions. We have the most impressive duo folks!!!✌️✌️
00:03 Social engineering is crucial in hacking 02:09 WPA 2 is a password guessing exercise. 06:34 Even the best hackers use social engineering 08:58 Shayla's email was hacked using a fishing scam. 13:42 Using a Wi-Fi adapter in a virtual machine for Wi-Fi hacking 16:19 Creating a fake access point for WiFi hacking 20:35 Wi-Fi hacking can provide a lot of information if done right. 22:53 Creating an evil twin to capture credentials 26:57 Exploiting national rules to increase access point power 28:39 Devices automatically connect to the strongest WiFi signal. 32:54 WiFi hacking can cover a broad frequency range, enabling hacking of systems like cell and satellite. 34:56 OTW emphasizes realistic hacking in movies.
When I first joined the military 23 years ago now, the concept of Social Engineering was a huge deal and ingrained training even though it wasn't called social engineering with us. Simple stuff from "here is what you find in a guy's pocket", but it got more involved after that. Now, I'm seeing stuff about social engineering and realizing I've seen a lot of this before. Really cool.
I love how OTW is socially engineering David in the beginning of all their videos!!😂 I honestly love these videos. It was your guys first videos together that inspired me more to start cyber security. I will admit that I fell victim to the thought that cyber security was above my way of thinking. But listening to you guys not only gives motivation but it also opens one mind into how anyone with the appropriate education and right "mindset" (shoutout to David's Poster).. and the right teachers can give anyone hope into learning a new critical skill. Thank you both for you guys. The content you have produced have opened my mind to so much more.
BTW, what do you gentlemen think about Heads for Pure boot of a Debian-based Linux like maybe Parrot OS or another for further physical security. I'm still looking further into it, but it's very technical for me.
In this lesson, we learned the technology of the electromagnetic flow of information. We thought that access to radio frequencies was limited, but today I discovered how information flows and is intercepted. Thank you for this channel, and thank you, the guest. My favorite channel is OT W. I am on the roof of the house now collecting some pieces of copper😎
Love these episodes with OTW. Keep them coming...lol I got into cybersecurity several years ago when I randomly stumbled upon SDRs. Now i play with just about any SDR program or "setup" i can get my hands on and make my own antennas at home. Doing an episode on Dragon OS would be great for beginners, as to showcase so many things that can be done with SDRs, and if you didnt like the OS as a whole , what programs to check out by themselves.
Love OTW!❤ hope he stays a regular as the content he conveys is relevant and interesting and the energy between he and David makes it easy to absorb the information!
dont know how i missed this....but i did lol. Looking forward to this convo. the intro alone was so real. I am that guy that always ignored social engineering in the past due to how i never thought people could be so oblivious. Only to realize, it is the Number One most efficient and Effect way to infiltrate. Hands Down. Based on intro alone, Evil Twin is always a tactic i knew Most would have no idea was happening, just accept that their computer was running slow and move on.......never had much of a need to do either social or evil but......nonetheless its interesting from a psychological perspective. Definitely looking forward to this conversation. Much appreciation David.
I have always love Occupy for his info and how much he knows. He's voice makes it easy for me to understand and listen now like other users. The show leave the world behind is awesome but freaky as well. Love it and keep up the great work David.
I am glad shows like Mr. Robot and this video just to prove how serious these security issues are on broken systems. Also, an insight as well as entertainment on how these hacks can be done.
I love these OTW videos and am really looking forward to a Dragon OS video. Not only do I want to see how OTW uses it but also what he is using for the radio. I am assuming HackRF but I would still like to see it in action. Keep these coming.
I do this in VirtualBox, wifiphisher is awesome script, ppl just don't know how to use correctly works for me about 80-90% of the time practice makes perfect, thanks for this guys love you David .
The firmware upgrade screen does not say "router" or "wifi" anywhere on it. "Pre-shared key" is not descriptive enough, may stump targets willing to input passwords, if they only knew what you were asking for
Awesome 👏, I was away from hacking and networking, because I just got a baby and have been very busy with other personal matters but now I’m putting my self together and learn more. 😊
Would love to take some of his classes but wont be able to afford them any time in the near future lol So appreciate the videos sharing some of his knowledge, even if it is introductory stuff.
Question David, devices connect to known previously connected to networks right? Does this work with password protected networks? Say you connected to a network with a password then a fake network pops up without a password and same SSID. Does your device automatically connect to it once deauthed given the signal is stronger or does the user need to manually connect to it? Just a caveat I thought might mention here.
Social engineering is massively important, but I don’t think that’s what Eliot Anderson was good at in Robot. Operation Takedown had some of the best actual Social Engineering that you can still use today.
21:14 what if you know the channel “shyla” is on. You flood the surrounding channels, including Shyla’s channel minus one channel that is as far from the shyla channel as possible, with so much trash, it drives shyla to “your” channel?
How to deal with an AP running both 2.4/5ghz in parallel? Once clients get deauthed on 2.4ghz they switch automatically to 5ghz and vice versa. Leading to no client connecting to the evil twin. Do I only need to run two instances of wifiphisher targeting each separately, or what’s the solution to this problem? Thanks for all the great content David and OTW ❤
This is unrelated but would you mind making a video about dual booting Windows and Arch, I saw a few videos on youtube but they are outdated or don't explain properly.
@@davidbombalIt's really good! OTW videos are always awesome! On a sidenote would you please consider doing a video on the Packet Squirrel by Hak5? You're a networking guy and I really think you could help to unlock this device's potential for a lot of people. Thanks!
David can u make a vid for beginners on what to do after nmap enumeration?I mean how do we connect afterwards and what do we do when we find open ports?Thank you for your content
Love your channel, just found you couple of weeks ago go , but I am totally beginner to improve my computer skills, so can’t understand most of it . Any advice where I should to start please? Thanks
Sir one detailed video on digital forensic how it is work and uses of steghide and other software to how to find the information that is hidden from everyone.
QUestion Mr. bombal. How would you make a better flipper zero with a better sdr and software? Would a pi4/5 do a better job. That would be a great video tutorial.
would that mean you need two wireless adapters to do any sort of wifi hacking on a virtual machine or was he just re iterating the fact that you needed a wireless adapter to capture any sort of outside networks from Linux?
In all seriousness can you please to a hardware breakdown on WiFi antennas and how to build. Or buy a better antenna for those hard to reach free wifis?
I am one of the victim to be hacked. People can believe my experiences, because you teach us hacking!! I have three books introduced in this movie. Thank David and OTW for great lecture!!!
@davidbombal hey there, i have a suggestion, what if you pick a plalist of your videos that doesn't require visuals and put them as a podcast maybe on TH-cam or Spotify
Hacking is basically attacking vulnerable systems, and most modern computers won't have many weaknesses. That's why you should attack the weaker system: The human (not physically of course)
The human is weakest link
But maybe physically? For funsies 😂..,
@@chrisengle5074 i mean since we are talking PURELY ethically and with full consent from all parties involved, yea
@@mikaay4269 ruin all my fun 🙄😂
so this wouldnt work? like on someones wifi
OTW embodies the essence of a true educator - he's passionate,has willpower to share knowledge and most interesting delivers it in a simplified manner, irrespective of complexity. Similarly D.Bambol is an inquisitive, diligent student who consistently poses insightful questions. We have the most impressive duo folks!!!✌️✌️
00:03 Social engineering is crucial in hacking
02:09 WPA 2 is a password guessing exercise.
06:34 Even the best hackers use social engineering
08:58 Shayla's email was hacked using a fishing scam.
13:42 Using a Wi-Fi adapter in a virtual machine for Wi-Fi hacking
16:19 Creating a fake access point for WiFi hacking
20:35 Wi-Fi hacking can provide a lot of information if done right.
22:53 Creating an evil twin to capture credentials
26:57 Exploiting national rules to increase access point power
28:39 Devices automatically connect to the strongest WiFi signal.
32:54 WiFi hacking can cover a broad frequency range, enabling hacking of systems like cell and satellite.
34:56 OTW emphasizes realistic hacking in movies.
When I first joined the military 23 years ago now, the concept of Social Engineering was a huge deal and ingrained training even though it wasn't called social engineering with us. Simple stuff from "here is what you find in a guy's pocket", but it got more involved after that. Now, I'm seeing stuff about social engineering and realizing I've seen a lot of this before. Really cool.
OPSEC!
I love how OTW is socially engineering David in the beginning of all their videos!!😂
I honestly love these videos. It was your guys first videos together that inspired me more to start cyber security. I will admit that I fell victim to the thought that cyber security was above my way of thinking. But listening to you guys not only gives motivation but it also opens one mind into how anyone with the appropriate education and right "mindset" (shoutout to David's Poster).. and the right teachers can give anyone hope into learning a new critical skill.
Thank you both for you guys. The content you have produced have opened my mind to so much more.
BTW, what do you gentlemen think about Heads for Pure boot of a Debian-based Linux like maybe Parrot OS or another for further physical security. I'm still looking further into it, but it's very technical for me.
@@mitchellduell3922 as a gentlemen im thinkng miku miku oo ee oo
In this lesson, we learned the technology of the electromagnetic flow of information. We thought that access to radio frequencies was limited, but today I discovered how information flows and is intercepted. Thank you for this channel, and thank you, the guest. My favorite channel is OT W. I am on the roof of the house now collecting some pieces of copper😎
can't wait for Linux Basics Episode V with OTW on your Channel. Keep going the great work
Love these episodes with OTW. Keep them coming...lol I got into cybersecurity several years ago when I randomly stumbled upon SDRs. Now i play with just about any SDR program or "setup" i can get my hands on and make my own antennas at home. Doing an episode on Dragon OS would be great for beginners, as to showcase so many things that can be done with SDRs, and if you didnt like the OS as a whole , what programs to check out by themselves.
I really like the new style of your videos with an intro and small explanations for uncommon words 👍
David, your CCNA courses are a heaven-sent. I'm learning something new everyday thanks to you. Keep up with the grind man, much love ❤
Same Johnny. I got his Udemy course on sale... totally worth it.
Can u pls share da link
Lmfao... wait till you start paying to keep retaking the test...😂😂😂
Anyone bought the courses through the website? There are like 4 different ccna courses, not sure which is the most recent/most complete course
Thank you for all this wonderful content!! Love the Mr. Robot videos with OTW, so so informative, yet still so digestible!
YESSS!!! Another Mr. Robot Episode with OTW!!!!! THANK YOU MR. DAVID BOMBAL!!!! THANK YOUUUUUU!
OTW is amazing. His articles are very much beginner friendly and interesting.
So glad that he is willing to share his knowledge and experience with us!
He also wrote the best Linux book!
David and OTW for the win! Great networking background and tutorial for networking.
Master OTW & David make a great team; I love these videos with these two
Otw is incredible at teaching and keeping attention. Awesome vid
Tbh im glad you have OTW on the channel this often.
Glad to hear that 😀
I still watch Mr Robot if I have nothing else to watch. I don't know how many times I watched it. Nice stuff!
Love OTW!❤ hope he stays a regular as the content he conveys is relevant and interesting and the energy between he and David makes it easy to absorb the information!
dont know how i missed this....but i did lol. Looking forward to this convo. the intro alone was so real. I am that guy that always ignored social engineering in the past due to how i never thought people could be so oblivious. Only to realize, it is the Number One most efficient and Effect way to infiltrate. Hands Down.
Based on intro alone, Evil Twin is always a tactic i knew Most would have no idea was happening, just accept that their computer was running slow and move on.......never had much of a need to do either social or evil but......nonetheless its interesting from a psychological perspective.
Definitely looking forward to this conversation.
Much appreciation David.
I have always love Occupy for his info and how much he knows. He's voice makes it easy for me to understand and listen now like other users. The show leave the world behind is awesome but freaky as well. Love it and keep up the great work David.
I am glad shows like Mr. Robot and this video just to prove how serious these security issues are on broken systems. Also, an insight as well as entertainment on how these hacks can be done.
This morning, I just watch Mr Robot season 1 and David Bombal release about Mr Robot, how incredibly timing 😆
Hope you enjoy the video!
SAME HERE BROTHER I JUST WATCH S1 AND NOW WATCHING S2
Yes, can't wait for the SDR stuff. SDR is so interesting. Love this channel and OTW, great work as always.
Great video content! You and OTW never disappoint! Can't wait to see what's next!
I love these OTW videos and am really looking forward to a Dragon OS video. Not only do I want to see how OTW uses it but also what he is using for the radio. I am assuming HackRF but I would still like to see it in action. Keep these coming.
Bombal and OTW the dynamic duo!!! Love it.
Keep the Linux basic lessons coming !! Learning a lot
I do this in VirtualBox, wifiphisher is awesome script, ppl just don't know how to use correctly works for me about 80-90% of the time practice makes perfect, thanks for this guys love you David .
I just got my book 2 days ago Linux Basics for Hackers
I love these interviews with OTW
A whole series on SDR for hackers will be amazing.
Your follower from Iraq 🥰
Thank you! Welcome Iraq!
shout out to you Sir and for OTW. It's been an amazing time that I used to see these videos. And totally it was worth it as it was.🤩
Another video with OTW, charismas came early, TY David
You're welcome!
The firmware upgrade screen does not say "router" or "wifi" anywhere on it.
"Pre-shared key" is not descriptive enough, may stump targets willing to input passwords, if they only knew what you were asking for
Awesome 👏, I was away from hacking and networking, because I just got a baby and have been very busy with other personal matters but now I’m putting my self together and learn more. 😊
Definitely make video with OTW about radio hacking, sounds really interesting.
david when next video is coming with otw?i am very excited
Would love to take some of his classes but wont be able to afford them any time in the near future lol So appreciate the videos sharing some of his knowledge, even if it is introductory stuff.
Great episode. Been using my alpha for 1 month struggled like hell.
Have a great Xmas, David. Thanks for all the invaluable information.
I love your videos. David. Especially when OTW is on
I have to hack WiFi in order to download these videos to watch later 😂
Thank you for this wonderful one more episode with OTW.
Amazing video; please continue the great work!
When will be the next episode/chapter of Linux Basics for Hackers?
Thank you for the video! Very informative. I love radio and satellite hacking, especially the one made with scrounged material and backyard stuff.
thank you David and OTW always the two bosses again thank you so mush we want a lot of videos with you both.
"leave the world behind" was amazing, and terrifying lol
Merry Christmas! 🎄🎄🎄🎁🎁🎁
Question David, devices connect to known previously connected to networks right? Does this work with password protected networks? Say you connected to a network with a password then a fake network pops up without a password and same SSID. Does your device automatically connect to it once deauthed given the signal is stronger or does the user need to manually connect to it? Just a caveat I thought might mention here.
OTW and David is the OG. legend..... Thanks so much.....
I'm a 17 yr old guy who is HEAVILY inspired by you and OTW! You guys are very fun although I don't really understand what's going on :D
Just try to learn something new every day and you'll be amazed how much you can learn in 1 year :)
Social engineering is massively important, but I don’t think that’s what Eliot Anderson was good at in Robot. Operation Takedown had some of the best actual Social Engineering that you can still use today.
Love this channel and love OTW.
OTW is a master without a doubt, it's very hard to find experts like him... thank you, very valuable information
Just woke up, and what a good way to start the Day.
Fantastic! OTW is a great way to start your day 😀
Just finished watching Mr Robot and this is the first video that comes up on my home page
lol.. that's great news! Now you can learn some of the technical details about the hacks 😀
@@davidbombal I've been learning alot from your shorts and you're becoming my favorite TH-camr to watch on shorts. Keep it up.
I love your Videos especially with Occupy the Web and i Love Hos Book. Cudos Both of you.
Good work there. Greetings from DR
So pumped for the dragon os video.
21:14 what if you know the channel “shyla” is on. You flood the surrounding channels, including Shyla’s channel minus one channel that is as far from the shyla channel as possible, with so much trash, it drives shyla to “your” channel?
Greatest Podcast of All the time
How do I register for his course? Thank you David learning a lot from your channel.
How to deal with an AP running both 2.4/5ghz in parallel? Once clients get deauthed on 2.4ghz they switch automatically to 5ghz and vice versa. Leading to no client connecting to the evil twin. Do I only need to run two instances of wifiphisher targeting each separately, or what’s the solution to this problem? Thanks for all the great content David and OTW ❤
Big fan of master OTW 🙏🙏🙏🙏♥️
I appreciate him sharing his knowledge with us!
Master OTW and Kevin mitnik these two Hackers are my inspiration, my Guru 🙏🙏. From 🇮🇳
This is unrelated but would you mind making a video about dual booting Windows and Arch, I saw a few videos on youtube but they are outdated or don't explain properly.
OTW is awesome he dosen't gatekeep the hacker tools. he really wants everyone to be hackers. he really do what he preaches
What an awesome surprise! Thanks guys!!!
You're welcome! I hope you enjoy the video!
@@davidbombalIt's really good! OTW videos are always awesome!
On a sidenote would you please consider doing a video on the Packet Squirrel by Hak5? You're a networking guy and I really think you could help to unlock this device's potential for a lot of people.
Thanks!
David can u make a vid for beginners on what to do after nmap enumeration?I mean how do we connect afterwards and what do we do when we find open ports?Thank you for your content
Sir you're Videos are damn good ❤ keep posting Infosec
12:52 Hey David sir! I'm confused how many wifi adapters OTW are using and How many adapters are required?
Great teacher ❤
Agreed. OTW is great!
Love your channel, just found you couple of weeks ago go , but I am totally beginner to improve my computer skills, so can’t understand most of it . Any advice where I should to start please?
Thanks
Thank you David. Love OTW
I love this series
All love from Kenya 🇰🇪
Waiting for the 2nd edition of Linux basics for hackers
Hello David, where can I find Bombal Flipir Zero?
Sir one detailed video on digital forensic how it is work and uses of steghide and other software to how to find the information that is hidden from everyone.
Can you please make a video on kali linux live boot on m2 macbook air ?
Thank you for this amazing series
Glad you like them!
QUestion Mr. bombal. How would you make a better flipper zero with a better sdr and software? Would a pi4/5 do a better job. That would be a great video tutorial.
david please ask OTW if we make can make our own toys in our home with simple materials
OTW is Great Teacher
I like this keep going 🎉❤
Sir, Linux basic for hacker book is worthy in 2023 please reply
Self replicating multi-headed worm would be a nice topic to touch on.
For anyone struggling to get the tool work because it gets stuck at timezone detected setting channel range to 1-13 use -nE and for deauth use -dE
would that mean you need two wireless adapters to do any sort of wifi hacking on a virtual machine or was he just re iterating the fact that you needed a wireless adapter to capture any sort of outside networks from Linux?
radio hacking is such a cool and vast world to get into . verry underrated part of hacking
Is there a way to costumize the page where the victim is introducing it's credentials
In all seriousness can you please to a hardware breakdown on WiFi antennas and how to build. Or buy a better antenna for those hard to reach free wifis?
I am one of the victim to be hacked. People can believe my experiences, because you teach us hacking!! I have three books introduced in this movie. Thank David and OTW for great lecture!!!
Do you have a link for his class in January on industrial control systems?
What happens when victims enter a fake pre-shared key ? He will be redirected and that fake password captured ? Or what
See github answer: github.com/wifiphisher/wifiphisher/issues/1178
@davidbombal hey there, i have a suggestion, what if you pick a plalist of your videos that doesn't require visuals and put them as a podcast maybe on TH-cam or Spotify
Great content !
OTW ❤
David Bombal ❤
Great video thanks 💙