Mind blowing 🤯 $20 million USD bounties! (Zero to Hero Money Hacking Roadmap)

2024 ж. 11 Мам.
202 070 Рет қаралды

Stephen Sims shares his years of experience with us and shows us how we can make money hacking. But be careful - some of the options are not recommended.
// Stephen's Social //
KZhead: www.youtube.com/@OffByOneSecu...
Twitter: / steph3nsims
// Stephen Recommends //
Programming Tools:
Online Compiler, Visual Debugger, and AI Tutor for Python, Java, C, C++, and JavaScript:
pythontutor.com/
PyCharm - Python IDE with Great IDA Pro Support:www.jetbrains.com/pycharm/
VS Code:code.visualstudio.com/
Patch Diffing:
Windows Binary Index for Patch Diffing:winbindex.m417z.com/
BinDiff Tool for IDA Pro, Ghidra, or Binary Ninjawww.zynamics.com/bindiff.html
Diaphora Diffing Tool for IDA Prodiaphora.re/
PatchExtract for Extracting MS Patches from MSU Formatgist.github.com/wumb0/306f97d...
Vulnerable Things to Hack
HackSys Extreme Vulnerable Driver:github.com/hacksysteam/HackSy...
WebGoat - Deliberately Insecure Application:owasp.org/www-project-webgoat/
Damn Vulnerable Web App:github.com/digininja/DVWA
Buggy Web App:itsecgames.com/
Gruyere Cheesy Web App:google-gruyere.appspot.com/
Metasploitable:sourceforge.net/projects/meta...
Damn Vulnerable iOS App:resources.infosecinstitute.co...
OWASP Multillidae:github.com/webpwnized/mutillidae
Online CTF’s and Games:
SANS Holiday Hack 2023 and Prior:www.sans.org/mlp/holiday-hack... www.holidayhackchallenge.com/...
CTF Time - A great list of upcoming and previous CTF’s!:ctftime.org/
KZhead Channels:
/ @davidbombal
/ @nahamsec
/ @offbyonesecurity
/ @_johnhammond
/ @ippsec
www.youtube.com/@LiveOverflow...
Free Learning Resources:
SANS Free Resources - Webcasts, Whitepapers, Posters & Cheat Sheets, Tools, Internet Storm Center:www.sans.org/security-resources/
Shellphish - Heap Exploitation:github.com/shellphish/how2heap
Exploit Database - Downloadable Vulnerable Apps and Corresponding Exploits:www.exploit-db.com/
Google Hacking Database (GHDB):www.exploit-db.com/google-hac...
Google Cybersecurity Certificate:grow.google/certificates/cybe...
Phrack Magazine:www.phrack.org/
Kali Linux:www.kali.org/get-kali/#kali-p...
Slingshot Linux:www.sans.org/tools/slingshot/
Books & Articles:
Gray Hat Hacking Series: amzn.to/3B1FeIK
Hacking: The Art of Exploitation: amzn.to/3Us9Uts
A Guide to Kernel Exploitation: amzn.to/3vfY8vu
Smashing the Stack for Fun and Profit - Old, but a classic:inst.eecs.berkeley.edu/~cs161...
Understanding Windows Shellcode - Old, but still good:www.hick.org/code/skape/paper...
Great list of exploitation paper links from Shellphish!:github.com/shellphish/how2hea...
// Stephen’s previous videos with David //
Free Exploit development training (beginner and advanced) • How to make Millions $...
Buffer Overflow Hacking Tutorial (Bypass Passwords): • Buffer Overflow Hackin...
// David's SOCIAL //
Discord: / discord
X / Twitter: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos: sponsors@davidbombal.com
// MENU //
00:00 - Coming Up
00:00 - Intro
01:11 - Stephen's Experience
03:10 - How to Change Careers
05:39 - How do I Become an Expert?
08:01 - Cyber Crime
12:47 - Ransomware
16:42 - Ransomware with A.I
23:15 - Bug Bounties & Disclosures
28:22 - Web Bug Bounties
33:45 - Binary Exploitation
41:18 - Patching and n-Day Exploits
48:56 - What is the Patch Level in the Target Org?
51:47 - Diffing Example
55:40 - Professional Services
01:03:34 - Exploit Sales Considerations
01:13:07 - The Golden Era of Hacking
01:15:00 - Zero to Hero
01:27:01 - OffByOneSecurity
01:37:42 - Conclusions
01:39:43 - Outro
apple
ios
android
samsung
exploit
exploit development
zero day
0day
1day
dark web
microsoft
macos
apple
linux
kali linux
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#android #ios #hacker

Пікірлер
  • Stephen Sims shares his years of experience with us and shows us how we can make money hacking. But be careful - some of the options are not recommended. // Stephen's Social // KZhead: www.youtube.com/@OffByOneSecurity/streams Twitter: twitter.com/Steph3nSims // Stephen Recommends // Programming Tools: Online Compiler, Visual Debugger, and AI Tutor for Python, Java, C, C++, and JavaScript: pythontutor.com/ PyCharm - Python IDE with Great IDA Pro Support:www.jetbrains.com/pycharm/ VS Code:code.visualstudio.com/ Patch Diffing: Windows Binary Index for Patch Diffing:winbindex.m417z.com/ BinDiff Tool for IDA Pro, Ghidra, or Binary Ninjawww.zynamics.com/bindiff.html Diaphora Diffing Tool for IDA Prodiaphora.re/ PatchExtract for Extracting MS Patches from MSU Formatgist.github.com/wumb0/306f97dc8376c6f53b9f9865f60b4fb5 Vulnerable Things to Hack HackSys Extreme Vulnerable Driver:github.com/hacksysteam/HackSysExtremeVulnerableDriver WebGoat - Deliberately Insecure Application:owasp.org/www-project-webgoat/ Damn Vulnerable Web App:github.com/digininja/DVWA Buggy Web App:itsecgames.com/ Gruyere Cheesy Web App:google-gruyere.appspot.com/ Metasploitable:sourceforge.net/projects/metasploitable/files/Metasploitable2/ Damn Vulnerable iOS App:resources.infosecinstitute.com/topics/application-security/getting-started-damn-vulnerable-ios-application/ OWASP Multillidae:github.com/webpwnized/mutillidae Online CTF’s and Games: SANS Holiday Hack 2023 and Prior:www.sans.org/mlp/holiday-hack-challenge-2023/ www.holidayhackchallenge.com/past-challenges/ CTF Time - A great list of upcoming and previous CTF’s!:ctftime.org/ KZhead Channels: www.youtube.com/@davidbombal www.youtube.com/@NahamSec www.youtube.com/@OffByOneSecurity www.youtube.com/@_JohnHammond www.youtube.com/@ippsec www.youtube.com/@LiveOverflow/videos Free Learning Resources: SANS Free Resources - Webcasts, Whitepapers, Posters & Cheat Sheets, Tools, Internet Storm Center:www.sans.org/security-resources/ Shellphish - Heap Exploitation:github.com/shellphish/how2heap Exploit Database - Downloadable Vulnerable Apps and Corresponding Exploits:www.exploit-db.com/ Google Hacking Database (GHDB):www.exploit-db.com/google-hacking-database Google Cybersecurity Certificate:grow.google/certificates/cybersecurity/#?modal_active=none Phrack Magazine:www.phrack.org/ Kali Linux:www.kali.org/get-kali/#kali-platforms Slingshot Linux:www.sans.org/tools/slingshot/ Books & Articles: Gray Hat Hacking Series: amzn.to/3B1FeIK Hacking: The Art of Exploitation: amzn.to/3Us9Uts A Guide to Kernel Exploitation: amzn.to/3vfY8vu Smashing the Stack for Fun and Profit - Old, but a classic:inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf Understanding Windows Shellcode - Old, but still good:www.hick.org/code/skape/papers/win32-shellcode.pdf Great list of exploitation paper links from Shellphish!:github.com/shellphish/how2heap#other-resources // Stephen’s previous videos with David // Free Exploit development training (beginner and advanced) kzhead.info/sun/f7umqZesb2Z3fKc/bejne.html Buffer Overflow Hacking Tutorial (Bypass Passwords): kzhead.info/sun/lpZ7prdqjaN6ip8/bejne.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb X / Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 00:00 - Intro 01:11 - Stephen's Experience 03:10 - How to Change Careers 05:39 - How do I Become an Expert? 08:01 - Cyber Crime 12:47 - Ransomware 16:42 - Ransomware with A.I 23:15 - Bug Bounties & Disclosures 28:22 - Web Bug Bounties 33:45 - Binary Exploitation 41:18 - Patching and n-Day Exploits 48:56 - What is the Patch Level in the Target Org? 51:47 - Diffing Example 55:40 - Professional Services 01:03:34 - Exploit Sales Considerations 01:13:07 - The Golden Era of Hacking 01:15:00 - Zero to Hero 01:27:01 - OffByOneSecurity 01:37:42 - Conclusions 01:39:43 - Outro apple ios android samsung exploit exploit development zero day 0day 1day Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    @davidbombal@davidbombal3 ай бұрын
    • i wouldnt care which government is out there to screw my government over, know youre enemy.

      @totalconfusion8611@totalconfusion86113 ай бұрын
    • Do I need a computer science degree to get into bug bunty

      @SmartTecSolutions@SmartTecSolutions3 ай бұрын
    • ​@@SmartTecSolutionsNo, you don't need a degree to become a bug bounty hunter. You don't need any certification or qualification, and you don't need to have a specific academic background. However, having some familiarity with web development or programming languages can give you an advantage. You will likely need to learn at least the basics for some things like networking, security, programming, etc. Here are some tips for getting started with bug bounty hunting: • Read thoroughly about the architecture of the application and the security issues in applications • Learn the cyber security foundations using free online courses • Learn basic HTTP authentication, website login forms, and more • Learn SQL injection fundamentals • Learn the exact process you need to follow as a bug bounty hunter Skills suggested for Bug Bounty Hunting • Programming skills: Bug bounty hunters must be knowledgeable in programming languages like JavaScript, PHP, and Python, which are frequently used in web applications. They should also have a good understanding of web application security concepts. • Networking skills: Bug bounty hunters need to be able to scan networks for vulnerabilities. They should also be familiar with common network attacks and countermeasures. • Security tools: Bug bounty hunters should be knowledgeable about security technologies, including vulnerability scanners, penetration testing frameworks, debuggers, and reverse engineering tools. • Research skills: Bug bounty hunters need to be able to research vulnerabilities and find new targets. They should also be able to stay up-to-date on the latest security threats. • Communication skills: Bug bounty hunters need to be able to communicate effectively with security teams. They should be able to explain their findings in a clear and concise way. In addition to these technical skills, bug bounty hunters also need to have a strong work ethic and be able to work independently. They should also be able to learn new things quickly and adapt to new challenges. Resources for getting started: If you are interested in becoming a bug bounty hunter, there are a number of resources available to help you get started. There are also a number of bug bounty programs that you can participate in. Here are some of the resources that you can use to get started with bug bounty: • Bugcrowd: This is a popular bug bounty platform that offers a variety of programs for different levels of experience. • HackerOne: This is another popular bug bounty platform that offers a variety of programs for different levels of experience. • OWASP: This organization provides a number of resources on web application security, including a list of common vulnerabilities. • PortSwigger Academy: This online training platform offers a number of courses on web application security, including bug bounty hunting.

      @justcallmeex6039@justcallmeex60393 ай бұрын
    • ​@@SmartTecSolutions No, just critical thinking skills for coding and logic through years of sheer determination .. no shortcuts

      @projectsspecial9224@projectsspecial92243 ай бұрын
    • the next 3pstein blackmail ring. in cyberpunk 2077. they just need ai justice system. dammit. wich may work way better than the current one. the elite in geo of the elite are grey that just goes 4 power.

      @Torterra_ghahhyhiHd@Torterra_ghahhyhiHd3 ай бұрын
  • This guy's craaaazy! You can see his passion in his facial expressions, his tone of voice (and that he probably didn't blink for 90') and his blunt honesty! Congrats to both! Awesome stuff! Keep it coming!❤

    @kostasanalytis2925@kostasanalytis29253 ай бұрын
    • Been following this guys channel but damn he got a small audience. Yet with gold content

      @piusgabula@piusgabula3 ай бұрын
    • Those Adderall eyes.😃👀👁👁

      @paranoidzkitszo@paranoidzkitszo3 ай бұрын
    • The hair 😂 idk if I’m buying all of it though who is a hacker that can’t think of DREAD? and vpn on tor?? Tf?

      @n.lightnin8298@n.lightnin82983 ай бұрын
    • @@piusgabula sure, but, anyone could pull that off...you said it yourself... all the info is online.

      @paranoidzkitszo@paranoidzkitszo3 ай бұрын
    • I do like his 'cadence' throughout the interview - he's done these things a few times before. Also, the interviewer is always on point and well researched- the combo makes for a fantastically juicy educational many minutes I've not minded giving up. , You know, like, sometimes you walk away to use the urinal (you all do get outta your chairs to use the washroom - in the washroom right?)..pivot ...kicking the chair outta the way, basking in your strength and skills - except for the actual getting up part where a big grunt and groan assisted plenty to complete the task- anyway, as you pinch that bladder so to not dribble prior to engaging your target 🎯 at least the rim of the toilet recollecting upon your past moments of life. There's a very high percentage, historically where you'd scolded yourself for wasting those precious seconds, minutes, hours....this time... Different...their chemistry purculates nicely, letting off a sweet aroma...can you smell it? Like a fresh ground/ pressed cup of your favorite coffee beans. Their oils bursting into the air, the molecules catching a ride on the atoms of the many other chemicals- oxygen,hydrogen, some carbon...some dioxides...free loaders hitchhiking their ways into your flared nostrils 👃 awaiting invitingly the plethora of pleasantries..you let out a breath so to make room for another hit of that intoxicating marvelous bold sweet woody aroma. A brief moment your eyes shut- lasting yet not long enough. You are in eternal bliss for that second or two. Time well spent/not wasted.

      @paranoidzkitszo@paranoidzkitszo3 ай бұрын
  • Fantastic work, David! I couldn't help but notice a minor detail - there seems to be a slight echo from your microphone picking up Stephen's audio. Thank you so much for your dedication and the great content you provide!

    @ksenofilius@ksenofilius3 ай бұрын
  • That was a really nice interview! Thank you both for sharing 😀

    @tupui@tupui3 ай бұрын
  • Excellent video as always, great job David.

    @camelotenglishtuition6394@camelotenglishtuition63943 ай бұрын
    • Appreciate that! Thanks again!

      @davidbombal@davidbombal3 ай бұрын
    • @davidbombal no worries. Also, for the bug bounties, intigriti have excellent staff.. not too sure about hackerone

      @camelotenglishtuition6394@camelotenglishtuition63943 ай бұрын
  • Simon Sims did great work. The hardest part about overcoming plateaus is related to repurposing the energies which are required for the development of new strategies and not overworking the same patterns of behavior. It is probably best to find a way to take less from the same resource while considering other skills which can improve the likelihood of breaking from poorer behaviors.

    @ryanziller220@ryanziller2203 ай бұрын
  • Please one video with Zaid Sabih (Zsecurity) 🙏🙏🙏🙏

    @codexverma8389@codexverma83893 ай бұрын
    • Agree

      @WUGH@WUGH3 ай бұрын
    • You mean that faker one who teaches you early 2000s stuff that would barely work on modern systems? 😂

      @impostorsyndrome1350@impostorsyndrome13503 ай бұрын
    • Pleaseeee

      @leonloncaric7715@leonloncaric77153 ай бұрын
    • @@AGASTRONICS no he's a fraud

      @impostorsyndrome1350@impostorsyndrome13503 ай бұрын
    • @@impostorsyndrome1350 You mean I

      @AGASTRONICS@AGASTRONICS3 ай бұрын
  • This was top notch informative and great insights into last vulnerabilities. Thank you, Gentlemen

    @randino2030@randino20303 ай бұрын
  • As always your videos and your guests are awesome! Thank you so much for sharing!

    @anamnesis726@anamnesis7263 ай бұрын
  • Great video as always, really just had to watch the full video before going to sleep even if it was 1 am. Good job David and Stephen.❤

    @freshsaladx@freshsaladx3 ай бұрын
  • Stephen is my favorite guest, hands down.

    @Zuulwitch@Zuulwitch3 ай бұрын
  • Been loving these videos with Stephen! Extremely inspiring what you can learn and do

    @LetsTalkAW@LetsTalkAW3 ай бұрын
    • Glad you like them!

      @davidbombal@davidbombal3 ай бұрын
  • Very enjoying. Thank you so much David bombal sir for giving us such valuable content. May you live long David sir❤❤❤

    @Abrar_Ahmad.@Abrar_Ahmad.3 ай бұрын
    • Thank you very much!

      @davidbombal@davidbombal3 ай бұрын
  • I wish I knew this guy. I'm learning stuff slowly but I've been learning solo, and going at it blind. Not only new to networking. But learning the capabilities of hacking and coding, and Linux in general. And man, I know I've got something important, I just don't know what it actually means. It's a total brain scrambling situation.

    @kenny-ze8eg@kenny-ze8egАй бұрын
  • Wow, I have been doing IT for 25 years and this was like am I noob lol! I think I will have to crawl first before I try running. Thanks for the new prospective.

    @jfjohns2020@jfjohns20203 ай бұрын
  • This was really great, Stephen is a really cool guy!

    @SwitchingITup-ng1dh@SwitchingITup-ng1dh3 ай бұрын
  • I don’t have any friends or social life… where do I start?

    @billyblanco6700@billyblanco67002 ай бұрын
  • This video is so interesting. I'm currently studying ISC2 CC and hoping to take the exam in the next few weeks. Looking forward to starting my career path, even though I am entering the cybersecurity career late (I'm 49, 50 in February).

    @DysphasiaPV@DysphasiaPV3 ай бұрын
    • Nice man. I'm 50 and thinking about doing it. Just not sure if I'm too old to be hired?

      @lonster6865@lonster68653 ай бұрын
    • @@lonster6865 I'm just going to do it and then find out. Doesn't hurt to try it. I just want to be working in a job where I'm warm, not working where I have to deal with customers.

      @DysphasiaPV@DysphasiaPV3 ай бұрын
    • ​@@lonster6865NEVER too old to do what you LOVE! 😅

      @projectsspecial9224@projectsspecial92243 ай бұрын
    • ​@@lonster6865Nobody is too old and nobody is too young to start something

      @NewDimension777@NewDimension7773 ай бұрын
    • How many months did it take you to study ISC2 ??

      @NewDimension777@NewDimension7773 ай бұрын
  • It took me all day to watch but I watched it from start to finish. Very cool and informative video.

    @Thedude897@Thedude8973 ай бұрын
  • I’d like to see a video about reading and understand the rules to bug bounties. There’s a lot of in scope and out of scope instructions that as a new bug bounty hunter might find hard to understand and knowing what is legal and illegal.

    @SarntRoos@SarntRoos3 ай бұрын
    • Precisely.

      @goat-eyes@goat-eyes3 ай бұрын
  • Thank you for your awesome content and guests!

    @thedogfather1204@thedogfather12043 ай бұрын
    • You're welcome! Thank you for watching!

      @davidbombal@davidbombal3 ай бұрын
  • Thanks David! Was waiting for it

    @SethOpana@SethOpana3 ай бұрын
  • These two are beyond top-notch. Thanks guys! Could you ever touch on Kali Linux and the best books to teach for certifications and which to go for first etc. Thanks.

    @SecTechie@SecTechieАй бұрын
  • Wooow this guy is so knowledgeable . Yet another great video thank you 😁😁😁

    @renn3014@renn30148 күн бұрын
  • 1:15:05 "I stuck with the dog theme, [...] and over on the right, that dog is beefed up, and how do you get there?" WIth photoshop, hopefully, because HOLY MOLY, what a dog! 🤣 But great presentation and very informative. I've always wondered about these things and about how safe you are as a hacker, and yeah, you have to be sensible and careful. I loved the moment Stephen was talking about a guy who could hack insulin pumps and pacemaker, and said out loud what it would do and immediately followed it up by saying he wouldn't know anything about that 🤣Whether that is true or not, that is a great follow up 🤣

    @stylis666@stylis6663 ай бұрын
  • Great video, lots of great insight and truths. It gives me something to think about but I do agree continuing to study is a must.

    @777Nardo@777Nardo3 ай бұрын
  • Wow you're making a lot of content. Thank you

    @tigreonice2339@tigreonice23393 ай бұрын
  • Stephen Sims is the only guy I have seen until now who has not allowed David Bombal to utter a word. Such a remarkable guy../😆😅

    @sachinthokala252@sachinthokala2523 ай бұрын
  • Thanks for this David, I am 30 years old and really enjoy videos like this. I am trying to get into bug bounties, and break into the ethical hacking field. I have no experience in tech, but am willing to go all in and learn this stuff, as it’s very interesting and I’m in need of a career switch, any advice or words from you would be much appreciated! Your content has truly inspired me to believe this is possible for me!

    @Ynerson9003@Ynerson90033 ай бұрын
    • with zero experience you should get some sysadnin certificate for Linux. It will teach you more about file systems, networking, services, etc than you would ever learn other ways. Writing certifications and training materials, I had to become more well rounded. I used to say in my classes, "Miyamoto Musashi was probably the greatest swordsman to ever live. He was asked about the secret to becoming a great swordsman and he replied it is not 1 thing, but 1000 things. Being a great sysadmin is knowing not 1 thing but 1000 things. Being great at security is knowing 1000 things about 1000 things." Decompiling like this video suggests requires programming skills that are super advanced, it is knowing 1000 things about 100 things.

      @RorschachRev@RorschachRev3 ай бұрын
    • I'm 31, and I just started in IT about 4 years ago. It's a lot, and you have to keep learning.

      @georgejones5019@georgejones50193 ай бұрын
    • How do you get into the sys adm . Can a comptia a + or sec get me in ?

      @k_usuan@k_usuan3 ай бұрын
    • @@k_usuan comptia sort of works if you want into sysadmin. you should make a full network and practice sharing files between Linux and windows. do it the windows way, windows host and the Linux way, with cifs and possibly nfs. set up a WAMP and a LAMP machine, (or use nginx) then attack the systems. Apply as a Jr network admin, work towards a bigger cert while you apply. You could volunteer at places 10 hours a month so you apply "with experience." I made six figure income as a network admin.

      @RorschachRev@RorschachRev3 ай бұрын
    • @@RorschachRevthanks for the advice will take this to heart!

      @Ynerson9003@Ynerson90033 ай бұрын
  • Love your video, sir and Please make a full series on termux

    @baba01hacker@baba01hacker3 ай бұрын
    • Thank you! What do you want to see in termux videos.

      @davidbombal@davidbombal3 ай бұрын
    • @davidbombal first explain all the commands and teach a programme launge like python and golang and make their own tools fir hacking and hacking some ctf and giving partcical examples of other attacks that you could do with a mobile phone make this mostly a non root series but if you need root to do something make video about it if it's important

      @baba01hacker@baba01hacker3 ай бұрын
  • Dr. S.S, you have an amazing vibe about you, , and your aura snever seeems to dim or flicker it tays on bright

    @SefSufi@SefSufi3 ай бұрын
  • I have a question about what security priority is appropriate for Linux vs Windows vs Mac OS

    @mohdhakimi53@mohdhakimi533 ай бұрын
  • Good video! I love Tear you Apart -She Wants Revenge

    @courtneyherron165@courtneyherron1653 ай бұрын
  • Thank you guys always a pleasure your awesome

    @nucknuck123@nucknuck1233 ай бұрын
  • Thanks David ❤ I wish you would make a video about Pwnagotchi 😊

    @bachirbenmouloud2023@bachirbenmouloud20233 ай бұрын
  • Great video and brilliant!! Is it possible to learn most of the basic in one year?

    @gamereditor59ner22@gamereditor59ner223 ай бұрын
    • You're welcome. It really depends on you, your existing knowledge, how quickly you learn, time you allocate etc. My advice is just get started and learn as much as you can. You'll be amazed how much you can learn in one year if you learn something new every day.

      @davidbombal@davidbombal3 ай бұрын
    • @@davidbombal That's true! Thank you!

      @gamereditor59ner22@gamereditor59ner223 ай бұрын
    • ​@@davidbombalhow to learn? Just watching in your videos. Im new in you channel

      @maramingalamchannel@maramingalamchannel3 ай бұрын
    • @maramingalamchannel - this video gives you a roadmap for Hacking: kzhead.info/sun/ktuIodSnrnWXinA/bejne.html - the other videos I posted this year give you roadmaps for other areas in tech.

      @davidbombal@davidbombal3 ай бұрын
  • absolutely fantastic presentation

    @user-hg7xs5hv6j@user-hg7xs5hv6j3 ай бұрын
  • Just what I needed thanks Mr Bombal

    @bine35@bine353 ай бұрын
  • Is it bad that im transitioning in to cybersecurity being that im in my late 30s. In 13 months out from getting my cybersecurity degree. Yes i fully realize im still a noob and by no means have much experience in the field. Im definitely a hands-on learner!! Any recommendations? I will also start studying and taking practice exams for my network plus cert...this summer semester 2 of my courses are security fundamentals and principles for information assurance.

    @scooterp4113@scooterp4113Ай бұрын
  • 0:01 Zerodium? I thought that was the Periodic Table . . . for Hackers!

    @savagepro9060@savagepro90603 ай бұрын
  • Hi Mr. Bombal! Could Mr. Sims talk about "higher level" OSINT stuff like: - image processing, geolocation, visual analysis, - timelapse reconstruction, 3D-reconstruction, - AI-enlarged close-up of the item/image, digital reconstruction (of the image), dimensional analysis, etc. Stuff used in law enforcement - tracking criminals and rescuing lost/kidnapped people. Thanks for your consideration!

    @jester8802@jester88023 ай бұрын
    • found anything

      @watchmo2310@watchmo231024 күн бұрын
  • Mr.stephen I think you should make a complete video on this topic..

    @confidenceebuka8034@confidenceebuka80343 ай бұрын
  • 54:48 what diff tools are you using ?

    @00Jimmy00@00Jimmy003 ай бұрын
  • This is a great informative session

    @abduldione7150@abduldione71502 ай бұрын
  • I don't know why I love the "Baby Boy" movie reference, mayber cause I just watched it..😅 nah but thanks for the content, it really opened my mind to the dark web and the clear web in a matter of whats possible from a hacker point of view.."Gunz N Butter" 😅

    @TureIMasterEquality@TureIMasterEquality3 ай бұрын
    • What’s “Baby Boy” about ?

      @alexdnaz@alexdnaz3 ай бұрын
    • @@alexdnaz a movie with Tyrese Gibson

      @TureIMasterEquality@TureIMasterEquality3 ай бұрын
  • Zerodium reminds me of when Kevin Mitnik was there and how he refused to tell an interviewer about some zero-day exploits😂..

    @check_c1357@check_c13573 ай бұрын
  • Great stuff as always on this amazing channel! However, some of the AI fear mongering just got me. What kind of ran-som-wa-re, related to your discussion, would an AI be able to code that a skilled ransomware coder (at the age of 16 or 55 years old.. :/ ) would not be able to? And, whatever the technology available; is it not (as always) the willingness, funds and determination to do "bad" (bad in "" as also this is a matter of definition and circumstance..) that is the driving factor? You see, world is full of capable programmers, AI and human.. the problem is that most of us simply find creating a program like that flipping disgusting - even if we easily can..

    @staurneskristiansen8376@staurneskristiansen83762 ай бұрын
  • This was one of the best

    @STJFreddie@STJFreddie3 ай бұрын
  • Sir please tell me how can I unlock bootloader of my vivo y83 smartphone?? Please Please please Please Please Please

    @Prince3.2@Prince3.23 ай бұрын
  • Hey David . H r u? I have a question. Can I learn cyber security without have a good pc. I have celeron laptop. Can I learn on the cloud? It would be helpful if you can Please guide.

    @arindamdasgoogledeveloper@arindamdasgoogledeveloper2 ай бұрын
  • Do not underestimate the power of getting in early. If you are not in Xeventy now, you are lagging behind.

    @MochaMarie-lr1nl@MochaMarie-lr1nl3 ай бұрын
  • watched it all, Bro is really smart, looks like a Dark Version of EMINEM but for Hacking.. really cool! thanks for everything you shared here!👌👌

    @fdgmedd@fdgmedd3 ай бұрын
    • First time reading through some of these comments, and yours made me laugh. I gotta listen to some Slim Shady now!

      @OffByOneSecurity@OffByOneSecurity3 ай бұрын
  • thanks man !

    @Lou-sassole3@Lou-sassole33 ай бұрын
  • hello David, could you make content about undergraduate or postgraduate computing related courses like computer science, cybersecurity, could computing etc.. Are they really useful pros and cons. Differences between undergraduate courses and degree apprenticeships. Because, nowadays, students are paying crazy amount of money to universities especially foreign students and is it worth it ?. Personally I'm currently studying in London, at UEL.

    @ilyosbeknajmiddinov6754@ilyosbeknajmiddinov6754Ай бұрын
  • Keep going!

    @ElevenOO1@ElevenOO13 ай бұрын
  • Can't believe i didn't know Stephen, checking his content rn and all the things he mentioned. Another legend to my aspirations

    @0x3v4d3r@0x3v4d3r3 ай бұрын
    • Stephen introduces you to a lot of people but isn't in depth on anything

      @RorschachRev@RorschachRev3 ай бұрын
    • @@RorschachRev he just did session reversing exploit mitigation in windbag and idapro. other ones he exploit browsers from start to finish.

      @The_Mysterious_derpa@The_Mysterious_derpa3 ай бұрын
  • Thank you so much!!

    @ercntreras@ercntreras3 ай бұрын
  • A M A Z I N G !!! Thank you!!

    @mlsandreas@mlsandreas3 ай бұрын
  • 30 seconds in and we are already talking about pissing off interpol.

    @benvestments@benvestments3 ай бұрын
  • Wow, great video Still on it thou 💯💯💯 thanks 😊

    @flopya@flopya3 ай бұрын
    • You’re welcome 😊

      @davidbombal@davidbombal3 ай бұрын
  • Stephen reminds me of “Tommy” from the TV show “Power”

    @tipzee101@tipzee1013 ай бұрын
  • Am happy with a Thank you for a bounty 😂

    @Helpexplorer@Helpexplorer3 ай бұрын
  • Thanks🎉 David I’m from Algeria

    @russkovactivator@russkovactivator3 ай бұрын
  • thanks so much , we need more videos of Stephen , less of OTW

    @AliRagabali@AliRagabali3 ай бұрын
    • Whats wrong with OTW?

      @fonzkonaboey4864@fonzkonaboey486413 күн бұрын
    • Whats wrong with OTW?

      @fonzkonaboey4864@fonzkonaboey486413 күн бұрын
    • @@fonzkonaboey4864 this guy is a joke not a hacker as he claims

      @AliRagabali@AliRagabali8 күн бұрын
  • Thanks for sharing.

    @Heavy146@Heavy1463 ай бұрын
  • The insert at 21:30 is Budapest and not Bucharest.

    @gabord701@gabord7013 ай бұрын
  • How do I get in the ethical hacker field? I’m currently studying CompTIA A+ and it is so boring.

    @mvd_01@mvd_013 ай бұрын
    • Gotta crawl before walking. After u get the cert, go for security + & towards the end of your A+ curriculum they touch on very basic hacking.

      @Notme-le3qt@Notme-le3qt3 ай бұрын
    • @@Notme-le3qt that’s true! 80% of the stuff being covered in the course it’s so basic. That’s why it’s boring to me.

      @mvd_01@mvd_013 ай бұрын
  • I think this was a good video with good content. The problem is who has $8,000 to $10,000 dollars to be able to take a Sans course?

    @Xiy114@Xiy1143 ай бұрын
  • Man if he has to live in a small apartment and have his computer in his living room along with everything else, and he spent that amount of time learning I think this is the wrong business to get into😅

    @Stevestevestevestevestevesteve@StevestevestevestevestevesteveАй бұрын
  • Thanks so much David From Ethiopia

    @Abduselam.m@Abduselam.m3 ай бұрын
    • You're welcome! And welcome Ethiopia!

      @davidbombal@davidbombal3 ай бұрын
  • Excellent video! and yep gaming is a HUGE time sink, wasted so much time on just one specific game and calculated the total hours, it was like i sat in the chair for 27 days straight , never doing that again. Thank you for this video, it has shifted my focus.

    @user-zl8cp7sb6d@user-zl8cp7sb6d3 ай бұрын
  • Please one video with Networkchuck 🙏

    @_SanjayBiswas@_SanjayBiswas3 ай бұрын
  • Great information, but what is not being said is that it takes a team to of cyber engineers to reverse engineer, write the exploits and chain them for those high paid bounties. Each team member has a speciality of b reversing Mobile, OS, Network, etc.. and building a custom fuzzer and writing the exploits. Those bounties are not usually paid out to a single invidual doing all of the work, but to teams and companies that have multiple engineer that specialize in those areas.

    @chocolate91@chocolate913 ай бұрын
  • How many times to learn ethical hacking from a beginner.

    @Banglafunnyvlogs-kf4ez@Banglafunnyvlogs-kf4ez3 ай бұрын
  • 50:50 is there something more than a single pixel? R2$? 1:13:10 under that armor it's still a dog that wags its tail when it gets a treat...

    @pentiumvsamd@pentiumvsamd2 ай бұрын
  • Thank you very much!

    @wingwing2683@wingwing2683Ай бұрын
  • Guns & Butter. I love Baby Boy 😁😂

    @Dacky1989@Dacky19893 ай бұрын
  • Related sad news, recently KZhead's Institute for Human Anatomy, a well-loved channel was hacked! Lord have mercy!

    @savagepro9060@savagepro90603 ай бұрын
    • Sorry to hear... Unfortunately, NOTHING is really secure!

      @projectsspecial9224@projectsspecial92243 ай бұрын
  • Some malware, spy app and virus is difficult to remove even after factory reset phone they came automatically don't know how I am in problem please help me . Not possible to change phone hard-disk

    @user-xd2gm5xu8e@user-xd2gm5xu8e3 ай бұрын
  • Fascinating!

    @user-MichaeljFaber@user-MichaeljFaber2 ай бұрын
  • Gotta love Sims.

    @NeverGiveUpYo@NeverGiveUpYo3 ай бұрын
  • if that's easy then other more experienced hackers have done it already....if the bounties are still there maybe their too hard for the average mr robot

    @wewillrise3663@wewillrise36633 ай бұрын
  • At 14 minutes into your video-that's the plot in the beekeeper movie

    @toddmonka275@toddmonka2753 ай бұрын
  • I love Stephen!!! admirer

    @stamshem12@stamshem123 ай бұрын
    • Agreed. He's amazing.

      @davidbombal@davidbombal3 ай бұрын
    • you too!! @@davidbombal

      @stamshem12@stamshem123 ай бұрын
  • What stopping you from selling both to the government and them ?

    @aliashkir8450@aliashkir845021 күн бұрын
  • Please suggest some books for web hacking

    @PawanKumar-ou1bw@PawanKumar-ou1bw3 ай бұрын
  • how much is for anonymous reward

    @L1ghtMus1c7@L1ghtMus1c7Ай бұрын
  • Yes Dread is still onn.

    @dominic4230@dominic42303 ай бұрын
  • never give sensitive code or data to cloud based ai tools . only do it with locally ran ones. it can lead to leaks . and it has already happened to some coders . stay safe

    @myname-mz3lo@myname-mz3lo3 ай бұрын
  • This guy reminds me of myself. I like this guy even though I am not in the industry. I can relate to him on so many levels. That is why he made it.

    @dinorossi6611@dinorossi66113 ай бұрын
  • I just signed up for 3 free Sans courses I want to intern there so bad!!

    @crystalmorell1629@crystalmorell16299 күн бұрын
  • 19:24 Social Engineering an ChatGPT AI...😅

    @darkguardian1314@darkguardian13143 ай бұрын
  • Silk Road guy I think…he was at the library

    @monkeyseemonkeydo432@monkeyseemonkeydo4323 ай бұрын
  • Next please interview Jim Browning

    @raihanrafi3665@raihanrafi36653 ай бұрын
  • thumbs up that dude......

    @Azure.jbz1@Azure.jbz12 ай бұрын
  • "I learned 10000 ways not to make a light bulb" 😉

    @nucknuck123@nucknuck1233 ай бұрын
  • Have the metasploite commands changed 7 years ago??? Please answer

    @The_mousse@The_mousse3 ай бұрын
  • Dude I tried your book

    @SupreemeSteevee@SupreemeSteeveeАй бұрын
  • Insane😮

    @adeshmishra1671@adeshmishra16713 ай бұрын
    • I was going to make the title "insane" but thought mind blowing may be better.

      @davidbombal@davidbombal3 ай бұрын
    • @@davidbombal Good to hear😄

      @adeshmishra1671@adeshmishra16713 ай бұрын
  • Please give me pdf this book please

    @carryminatiTT@carryminatiTT3 ай бұрын
KZhead