Warning: Use at your own risk! 🙀 John Hammond shows dodgy websites on the Dark Web, and shows how your personal data could be sold or given aways on the dark web. Be warned. Disclaimer: All information shared in this video is for educational purposes only. We do not recommend that you use the dark web for anything else except for education or prevention. // John Hammond’s SOCIAL // Website: www.justhacking.com/ TH-cam: www.youtube.com/@_JohnHammond X: x.com/_johnhammond Newsletter: johnhammond.beehiiv.com/subscribe/ LinkedIn: www.linkedin.com/in/johnhammond010/ Discord: discord.com/invite/mQQ5NsTbfF GitHub: github.com/JohnHammond TikTok: www.tiktok.com/@johnhammond010 Instagram: instagram.com/_johnhammond/ // Courses REFERENCE // Dark Web and Cybercrime Investigations: www.justhacking.com/course/dark-web-cybercrime-investigations/ // TH-cam video REFERENCE // How to be invisible online in 6 minutes: th-cam.com/video/YVxWJaxlJRI/w-d-xo.html Never access the Dark Web without doing this: th-cam.com/video/7wLLcFMmbpg/w-d-xo.html The Art of Cyberware: th-cam.com/video/pdU7e-S2_3I/w-d-xo.html // Books REFERENCE // The Art of Cyber Warfare John DiMaggio: US: amzn.to/4jyG7gn UK: amzn.to/4hs5sa4 Extreme Privacy by Michael Bazzell US: amzn.to/4gBEuw5 UK: amzn.to/3ZUQoM6 // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:39 - Intro 02:15 - Overview 03:31 - Seized Domains 07:49 - Genesis Market 09:28 - Ransomware 12:06 - Akira Ransomware 14:33 - Dark Net Mail Exchange 18:12 - Dark Web Solutions 19:49 - RAMP4u.io 24:07 - Onniforums 27:24 - Info Stealer Malware 29:40 - Extracting Logs 37:50 - Why a Windows VM? 40:36 - What's the Best Software? 42:37 - Tor VS VPN 42:38 - John's Website and Courses 46:22 - John's Course Pricing 47:52 - John's TH-cam Channel 49:13 - Conclusion dark web deep web dark net darknet tor tails whonix onion vpn opsec ross ulbricht silk road onion websites malware malware analysis cybersecurity cybersecurity jobs hacking ethical hacking how to access the dark web deep web tor browser how to access the deep web safely how to access dark web how to access the deep web access dark web dark web tutorial dark web browsing how to access the dark web with tor the onion router dark web browser access the dark web deep web browsing how to get on the dark web silk road what is the onion router what is tor dark web movie anonymous cube how to browse the internet anonymously how to browse the web anonymously how to be anonymous on the internet invisible online hide identity privacy how to be anonymous browse the internet anonymously browse the web anonymously online privacy online privacy tips hide online hidden identity Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #darkweb #hacking #tor
Can we delete Dark web if we create application deletion with apple android and different devices acces script program license etc and with manny resources but the app can delete the real global apps site webs organisation let.s say it can delete everything in tesl time and can delete erease man dan the government it.s quite dangerous plan if it teally commes out it.s no joke 😊😢
I'm a 41 year old Mexican lawyer, I live in Mexico, I'm currently doing an engineering degree in software and networking, this topics are very interesting, thanks a lot.
Don't cut corners in cybersecurity and don't bend the rules of ethics or law. The dark web thrives on ignorance and recklessness-stay informed, vigilant, and cautious. Great video, very informative and eye-opening!
@@davidbombal I do not think so that what suggestion i could give to you but please provide more best contents like this for us. I have not only said that John is great. You are great then him and i love you like my big brother.🥰
I am planning to learn N+ and Cybersecurity. But due to limited time because of my current job stopping me from learning it. Take a screenshot to study later. Your information is always interesting❤❤❤❤❤❤❤❤❤❤❤
Great guy and thanks for all the info I learned a lot . One small note, i suggest for him especially if run training to speak in more calm way . I know this is made up voice to be loud and clear but u can still be clear without being loud lol. Listening was almost an abuse to my ears lol. I am sorry I really means well not to be negative.
Hi Mr. Bombal Could you do a video about Kali Purple, there is not a lot that is not covered about it. Love Your content have great day! Please consider making a bit of Kali Purple content or even Blackarch !! Thanks!
Hey David, concerned citizen here, it seems like cyber security is changing at the speed of light. Almost to the point it seems useless to get into the career. But from a defensive stand point for personal device management what skill stack would you learn?
just saw the thumbnail - didn't care what the topic is. If John Hammond is here - anything will be interesting. I think on his channel, he had a short series on Dark Web. Curious to hear what's new underground!
Is the interview with Jon Di Maggio on Patrion or hidden. Apologies just having a difficult time tracking it down. Thanks for your content very much appreciated. Keep up the great work :D
well with the VPN and Tor thing, it is actually only a really bad idea if the VPN is at the end of your chain. In case your Network is entirely running through a VPN (because you configured that on your router). your first node will be always the VPN and then from there you will connect to the TOR Network. which then doesn't defeat the purpose of it anymore and just adds one or more (proton for example has secure core with 2) nodes infront of the entire chain. depending your the scenario it actually can make sense doing that. but i do get it why you would say that you shouldn't do that, because 99% of VPN users are doing so via an app on their device, where it is more than likely that you actually end up with your VPN as your exit node which defeats the purpose of using TOR.
Hello David , could you give a name of a WiFi adapter for WiFi hacking, that supports also WIFI 7 ? I am relating the wpa2 cracking video you made, Thank you
Hi guys¡ Love you both. I have a question for John Re: VPN with Tor . Can't we be seen at the enter and exit nodes that's why you'd use a VPN or no… Thanks❤
Your ISP can see that you're connecting to the guard relay. The guard relay knows you are connecting to it, but not what you access. The middle relay knows nothing. The exit relay knows a Tor user is connecting to X website, but does not know who they are. And for onion services, this is even less. No relay knows what you are connecting to anymore, they cannot tell the onion address or who is the onion service host, at least without performing additional attacks on the network.
43:49 U can use a vpn in some cases like when u dont want ur isp to know that u visiting the tor network And also to protect against malicious entery nodes The other downside of using vpn is the provider can still see what u trying to hide So best method is to create ur own vpn With simple setup and Using aws machine
@Bigjonstud187 yeah good idea Use someone else's wifi so that they can also monitor u and if it get worse they can report u what a genius where did u get ur degree? a dumpster? Unless it's ur grandma wifi that still a bad idea
7:42 I subscribed to John awhile back,when I thought I might get into the cyber security field. I was trying to learn a little bit more about networking when I found your channel David, and with TH-cam algorithms, his videos kept popping up with yours. I don't think I've ever spoken before on your channel before so I just want to thank you and that I appreciate the content that both of you provide. Although just a layman at a plant, Still inspired and fascinated by everything you guys put out there. I often put yalls videos on in the background to hear all the latest tech stuff.
Sar I start watching your video I like your video so much you are not only a you tuber you are teacher of million student now i subscribe your channel because your video is full on information
@mrcvry You might type a character or a string, but who is sending me the graphic image? I don't have these emoji graphics on my computer, they are sent to me. Do they contain malware?
@@iExistOne Nobody. They are in your fonts. Compare different devices. They look different on iOS or Android. Emojis are an international standard, but the design is made by each company.
Good day sir, I'm from Sierra leone 🇸🇱 Africa and I watched most of your videos. Can you please make a video for some of us that is way back here in Africa were such knowledge is limited for us in to cyber security. I wanted to be one but lack of resources and educative stuffs.
The idea that anonymity still exists is what baffles me. Snowden debunked that a looooong time ago. As long as NSA or GCHQ have an ounce of interest on your coms, you have no change. Be yourself the Russian president or even the CCP chairman
I agree with that to an extent, because I feel you’d have everyone on the FBI list be tracked down? Maybe it’s based on an effort:price ratio If the person they really want to waste that many resources on really isn’t that worth it, maybe they just let it go. But the larger the threat the more they’ll send the nation state after? That makes sense, but still; let enough small problems build up and a larger exploit could be at play
I haven't made it through the whole video yet but I hope and qould like to hear people talk about something lots don't which is how some people just use tor for anonymity it doesn't have to he terrible stuff you can go to facebook,insta and just about anywhere it's super slow but it's way more anonymous and lots that wouldn't want the government spying on them would use.
Warning: Use at your own risk! 🙀 John Hammond shows dodgy websites on the Dark Web, and shows how your personal data could be sold or given aways on the dark web. Be warned.
Disclaimer: All information shared in this video is for educational purposes only. We do not recommend that you use the dark web for anything else except for education or prevention.
// John Hammond’s SOCIAL //
Website: www.justhacking.com/
TH-cam: www.youtube.com/@_JohnHammond
X: x.com/_johnhammond
Newsletter: johnhammond.beehiiv.com/subscribe/
LinkedIn: www.linkedin.com/in/johnhammond010/
Discord: discord.com/invite/mQQ5NsTbfF
GitHub: github.com/JohnHammond
TikTok: www.tiktok.com/@johnhammond010
Instagram: instagram.com/_johnhammond/
// Courses REFERENCE //
Dark Web and Cybercrime Investigations: www.justhacking.com/course/dark-web-cybercrime-investigations/
// TH-cam video REFERENCE //
How to be invisible online in 6 minutes: th-cam.com/video/YVxWJaxlJRI/w-d-xo.html
Never access the Dark Web without doing this: th-cam.com/video/7wLLcFMmbpg/w-d-xo.html
The Art of Cyberware: th-cam.com/video/pdU7e-S2_3I/w-d-xo.html
// Books REFERENCE //
The Art of Cyber Warfare John DiMaggio:
US: amzn.to/4jyG7gn
UK: amzn.to/4hs5sa4
Extreme Privacy by Michael Bazzell
US: amzn.to/4gBEuw5
UK: amzn.to/3ZUQoM6
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:39 - Intro
02:15 - Overview
03:31 - Seized Domains
07:49 - Genesis Market
09:28 - Ransomware
12:06 - Akira Ransomware
14:33 - Dark Net Mail Exchange
18:12 - Dark Web Solutions
19:49 - RAMP4u.io
24:07 - Onniforums
27:24 - Info Stealer Malware
29:40 - Extracting Logs
37:50 - Why a Windows VM?
40:36 - What's the Best Software?
42:37 - Tor VS VPN
42:38 - John's Website and Courses
46:22 - John's Course Pricing
47:52 - John's TH-cam Channel
49:13 - Conclusion
dark web
deep web
dark net
darknet
tor
tails
whonix
onion
vpn
opsec
ross ulbricht
silk road
onion websites
malware
malware analysis
cybersecurity
cybersecurity jobs
hacking
ethical hacking
how to access the dark web
deep web
tor browser
how to access the deep web safely
how to access dark web
how to access the deep web
access dark web
dark web tutorial
dark web browsing
how to access the dark web with tor
the onion router
dark web browser
access the dark web
deep web browsing
how to get on the dark web
silk road
what is the onion router
what is tor
dark web movie
anonymous
cube
how to browse the internet anonymously
how to browse the web anonymously
how to be anonymous on the internet
invisible online
hide identity
privacy
how to be anonymous
browse the internet anonymously
browse the web anonymously
online privacy
online privacy tips
hide online
hidden identity
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#darkweb #hacking #tor
Can we delete Dark web if we create application deletion with apple android and different devices acces script program license etc and with manny resources but the app can delete the real global apps site webs organisation let.s say it can delete everything in tesl time and can delete erease man dan the government it.s quite dangerous plan if it teally commes out it.s no joke 😊😢
Awesome 1:13
Love u david may God show u the right path and bless u btw am just 14 yr old boy
Thank you so much for having me on, David! I hope we can get together again soon!! 😄
yes chef
😇
Great having you back on the channel John! Definitely need you to get you back soon!
John Hammond and David Bombal on a Sunday morning? YES!!!
Thank you! I hope you enjoy the video!
I'm a 41 year old Mexican lawyer, I live in Mexico, I'm currently doing an engineering degree in software and networking, this topics are very interesting, thanks a lot.
Me gusta el hambre que tienes de aprender 👌👌 eso es todo paisano, saludos del estado de México
Don't cut corners in cybersecurity and don't bend the rules of ethics or law. The dark web thrives on ignorance and recklessness-stay informed, vigilant, and cautious. Great video, very informative and eye-opening!
Merci!
Danke!
Save to watch later. Thanks David 🎉
I hope you enjoy the video!
Thanks David
How can you not like these 2 Master Warriors for sharing knowledge with us simple mortals ?
Valuable content David and John!
Best channel on TH-cam. Really liking it ❤️❤️❤️
Thank you! I really appreciate that!
@@davidbombal Same this is one of the best channels along with John Hammond and NetworkChuck!
Interesting and impressive information!
Thanks for having John with you please provide more best teachers for us. We will be thankful to you and also you are best
John is great 😀 Any suggestions?
@@davidbombal Suggestions -> make a vedio on john's methodology for solving CTFS!!
NetworkChuck, Mental Outlaw, Rob Braxman Tech, Low Level, got to check my sub list for more 😂 anyone you can flow with is good
@@davidbombal I do not think so that what suggestion i could give to you but please provide more best contents like this for us.
I have not only said that John is great. You are great then him and i love you like my big brother.🥰
@@davidbombalnot really a teacher but Troy Baker would be good to have sometime for a chat
Two of my favourite Cyber experts, bring in Troy Baker sometimes too :)
Very interesting and informative video
Yayyy
TH-cam 👑 king is back again.... 😊
John is amazing 😀
No way 🤔🫣
Nice video! Made opening my work worth while 😉
I am planning to learn N+ and Cybersecurity. But due to limited time because of my current job stopping me from learning it. Take a screenshot to study later. Your information is always interesting❤❤❤❤❤❤❤❤❤❤❤
Great guy and thanks for all the info I learned a lot . One small note, i suggest for him especially if run training to speak in more calm way . I know this is made up voice to be loud and clear but u can still be clear without being loud lol. Listening was almost an abuse to my ears lol. I am sorry I really means well not to be negative.
Great video! Increase my knowledge
Thank you for this video David
John's site looks great and his TH-cam channel is awesome.
Hi Mr. Bombal Could you do a video about Kali Purple, there is not a lot that is not covered about it. Love Your content have great day! Please consider making a bit of Kali Purple content or even Blackarch !! Thanks!
Hey David, concerned citizen here, it seems like cyber security is changing at the speed of light. Almost to the point it seems useless to get into the career. But from a defensive stand point for personal device management what skill stack would you learn?
just saw the thumbnail - didn't care what the topic is. If John Hammond is here - anything will be interesting. I think on his channel, he had a short series on Dark Web. Curious to hear what's new underground!
Thankyou for providing free ethical knowledge to your students like us!
Is the interview with Jon Di Maggio on Patrion or hidden. Apologies just having a difficult time tracking it down. Thanks for your content very much appreciated. Keep up the great work :D
It's over 2 years old. Look for "You are in a Cyber War. Don't be a dumb*** and try to ignore it".
Thank you David!
John is Seth Rogan if he was into cyber security.
😀
Dark web Express. He needs to do a movie with James Franco
Could you make a video on the flipper zero unleashed software
🙏🏼 Thank you so much sir
You're welcome!
Google 1:38
Have been really bored since 2 days now this is what exictes me Learning about Dark web
I hope you enjoy the video 😀
well with the VPN and Tor thing, it is actually only a really bad idea if the VPN is at the end of your chain. In case your Network is entirely running through a VPN (because you configured that on your router). your first node will be always the VPN and then from there you will connect to the TOR Network. which then doesn't defeat the purpose of it anymore and just adds one or more (proton for example has secure core with 2) nodes infront of the entire chain. depending your the scenario it actually can make sense doing that.
but i do get it why you would say that you shouldn't do that, because 99% of VPN users are doing so via an app on their device, where it is more than likely that you actually end up with your VPN as your exit node which defeats the purpose of using TOR.
Always fun and interesting to see seized domains and search up the whole story behind it.
Interesting times especially with the news about Ross Ulbricht
Two legends breaking the internet on a Sunday 😅
Can that email provider be trusted ?
I mean: is there somebody on the other side that read emails send/received by that provider ?
Would you if you were a darkweb mail provider?
Isn't using tor over VPN just a matter of who you trust more, your ISP or VPN provider?
is it legal to look at scary gore link on the dark web just to be curious?
Yes, very illegal
Hello David , could you give a name of a WiFi adapter for WiFi hacking, that supports also WIFI 7 ? I am relating the wpa2 cracking video you made, Thank you
From a privacy standpoint, doesn't Whonix keep logs, as it's installed on your main drive?
Where can i get to read the latest book release in dark web .I know about z library.what are the other websites.
I just realized why John looks so familiar to me over the last year... I didn't know Justin Roiland switched to cybersec.
Which Virtual Machine is he using to test the potentially hazardous links? QubesOS?
How about posting videos on Rumble?
Hi guys¡ Love you both. I have a question for John Re: VPN with Tor . Can't we be seen at the enter and exit nodes that's why you'd use a VPN or no… Thanks❤
Your ISP can see that you're connecting to the guard relay. The guard relay knows you are connecting to it, but not what you access. The middle relay knows nothing. The exit relay knows a Tor user is connecting to X website, but does not know who they are.
And for onion services, this is even less. No relay knows what you are connecting to anymore, they cannot tell the onion address or who is the onion service host, at least without performing additional attacks on the network.
@ Hey Thanks for the reply . Good to know .Enjoy your day
43:49
U can use a vpn in some cases like when u dont want ur isp to know that u visiting the tor network
And also to protect against malicious entery nodes
The other downside of using vpn is the provider can still see what u trying to hide
So best method is to create ur own vpn
With simple setup and Using aws machine
jus use tails on someone else wifi
@Bigjonstud187 yeah good idea
Use someone else's wifi so that they can also monitor u and if it get worse they can report u
what a genius where did u get ur degree? a dumpster?
Unless it's ur grandma wifi that still a bad idea
Would you ever interview the dread pirate Roberts now that he's free
7:42
I subscribed to John awhile back,when I thought I might get into the cyber security field.
I was trying to learn a little bit more about networking when I found your channel David, and with TH-cam algorithms, his videos kept popping up with yours.
I don't think I've ever spoken before on your channel before so
I just want to thank you and that I appreciate the content that both of you provide.
Although just a layman at a plant,
Still inspired and fascinated by everything you guys put out there.
I often put yalls videos on in the background to hear all the latest tech stuff.
First comment , first 2 b first so happy cux i ma big fan awesome video 😮😊😅
Thank you!
@@davidbombal pleasures all mine made my day 😮😊❤
sir, please suggest free complete inventory monitor soft wear for LAN
I had no idea Seth Rogan was a hacker! 🤯
Scope.
Maybe David is there.
Probably he isn't...
Sar I start watching your video I like your video so much you are not only a you tuber you are teacher of million student now i subscribe your channel because your video is full on information
Hello bro hower you ❤
Hello! I'm good thanks. I hope you are well?
Great video. After the CISCO courses, will try out some of John's courses. Its going to be a busy 2025. Thanks David.
You should make video about DeepSeek, chinese new AI chat gpt looks like its real powerful
Lovely collab :D
Please activate the TH-cam translation that is already available in your videos.
It's unfortunately not available on my channel yet ☹️
I think bro is Seth Rogen’s brother. Sound like him and look like him
Keep everything side.
But john's smile... 😁
Editors blur the link 28:39 at the bottom left of the page 🤫
Am I the only one that thinks John sounds a little bit like Seth Rogen?
Can Emoji's contain malware?
Just like in any character. You need malware that is written in less than one character.
@mrcvry You might type a character or a string, but who is sending me the graphic image?
I don't have these emoji graphics on my computer, they are sent to me.
Do they contain malware?
@@iExistOne Nobody. They are in your fonts.
Compare different devices. They look different on iOS or Android. Emojis are an international standard, but the design is made by each company.
Love from India, I'm continuously watching you from long time ❤
The dark web is very dark it is a jungle you may get lost in this huge jungle
Why in the video pre frame photo does it look like Johns trying really hard not to breathe on your neck 😂😂
Seth rogan???😂😂
Good day sir, I'm from Sierra leone 🇸🇱 Africa and I watched most of your videos. Can you please make a video for some of us that is way back here in Africa were such knowledge is limited for us in to cyber security. I wanted to be one but lack of resources and educative stuffs.
Dragnet, imo. Obama era.
The idea that anonymity still exists is what baffles me. Snowden debunked that a looooong time ago. As long as NSA or GCHQ have an ounce of interest on your coms, you have no change. Be yourself the Russian president or even the CCP chairman
I agree with that to an extent, because I feel you’d have everyone on the FBI list be tracked down?
Maybe it’s based on an effort:price ratio
If the person they really want to waste that many resources on really isn’t that worth it, maybe they just let it go. But the larger the threat the more they’ll send the nation state after? That makes sense, but still; let enough small problems build up and a larger exploit could be at play
Can you help me
Yes.
Help
how many other losers joined in to finish the old "it's a matter of when" saying haha
I DID IT!!!!🎉🎉🎉🎉🎉
Arch Linux 👍
Windows become infostealers automacally downloading malware dlls 😊😊😊😊😊😊😊😊😊
can you give us all the dark web links for this video David?
❤❤
does red hair make one a good hacker?
How to hack website please tell bro
Ask Gemini or Deepseek.😅
TWO 👁👄👁 LEGENDARY 👁👄👁 HACKER💲 IN 👇💢📳 ONE SHE'LL 1:00
Siuuuuuu😲
First 10 min ❤
Very happy to hear that!
Your life’s greatest achievement. Celebrate!
I haven't made it through the whole video yet but I hope and qould like to hear people talk about something lots don't which is how some people just use tor for anonymity it doesn't have to he terrible stuff you can go to facebook,insta and just about anywhere it's super slow but it's way more anonymous and lots that wouldn't want the government spying on them would use.
As the old adage goes, what happens on the dark web stays on an alphabet list.
Hello D..B.. could you Friend me with OTW? If you would mind! I love with his lesson.❤
.su extension Soviet Union.