now you left me with many questions mark in my head :D thanks for video
@larrysampson83173 күн бұрын
Appreciate it for sharing! I need advice: My wallet on OKX holds some TRX 20 USDT, and I possess the seed phrase: -clean- -party- -soccer- -advance- -audit- -clean- -evil- -finish -tonight- -involve- -whip- -action-. What’s the best way can I go about sending them to my Binance account?
@valariayn3 күн бұрын
Keep it up sis Ma Sha Allah
@AugustDenkins12 күн бұрын
Appreciate it for sharing! Hoping for some help: My Crypto Wallet contains some USDT TRX20, and I know the SEED: -clean- -party- -soccer- -advance- -audit- -clean- -evil- -finish -tonight- -involve- -whip- -action-. Could you suggest how should I handle transferring them to OKX Exchange?
@PhilthAdelphiA16 күн бұрын
I don’t even know what my niche is. How can I figure that out?
@rj886818 күн бұрын
This womans voice gets high at every ending word and its unbearable
@Ephesians-61220 күн бұрын
i think organizedCrime have people and vehicles move around with these
@RodgerMcfolley21 күн бұрын
Great content, I liked it! Could someone help me with this issue? USDT TRX20 is stored in OKX with the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ] How do I transfer it to Binance or OKX?
@djEmgie8926 күн бұрын
Wow David, ChatGPT offered your video. Haha
@gainer55229 күн бұрын
I'll do what these two failed to do. Simple answer to a simple question. A modern Lenovo Thinkpad T Series laptop. Those machines are the most compatible with every Linux distro, which is the OS any serious hacker/csec analyst will use, and they are the most durable, they can be put through hell and survive. There's a reason why comp sci students and Linux users love 'em. You need to DO BETTER David Bombal. - Signed a SOC. 😎
@MachineLearning-wj3lqАй бұрын
USE UTM FOR MACS
@nathanserre4802Ай бұрын
“It’s an exponential curve” shows a linear relationship. Smh
@kams1962 ай бұрын
She is lovely but I have sensitive ears and her voice really hurt my ears
@krishnaSagar692 ай бұрын
I’ve been working with Wireshark. It’s so big, people actually don’t know. In order to actually use it. You need to know networking, Really really good
@krishnaSagar692 ай бұрын
Trust me, these tools take months to master. Months and months of consistent hardwork
@ChumbaWumba2 ай бұрын
WE MISS YOU NULL
@javierarzon48532 ай бұрын
Very true 👍.......in simple words , you have to be very focused and more importantly, you have to put in the Work if you really want to be the best at penetration testing/Hacking
@Nikhilplays_232 ай бұрын
Please review mac mini M4 for cyber security
@LL_9002 ай бұрын
BRO IM NOT LIE ING null Has Got on. My WiFi one time Im Scared
@BFF-zb1qn2 ай бұрын
thanks I'm looking forward for part on this
@evilmortyofficial2 ай бұрын
We need an updated video about exploit development please.
@Cooley932 ай бұрын
I have a few classmates who have Mac’s and they work just fine using UTM
@youngyadie3 ай бұрын
thank you
@9ucka3 ай бұрын
fun fact I have good laptop without internet connection
@jewishgenes3 ай бұрын
“I’m not a hacker” what a fucking genius
@bennguyen13133 ай бұрын
I have a 2007 Yaris Key Fob, and have been unable to program a second Fob ( TEXAS 4D 67 "Dot" chip).. Could the Flipper Zero, either Xtreme firmware or official zero 1.0 firmware, record/analyze/display the 2 fobs output to see why my second fob doesn't work? Or would another SDR hardware (LimeSDR or HackRF) and software (Universal Radio Hacker) be needed, like shown in the 0x44 cc article ("Reverse engineering a car key fob signal") What about TPMS (tire-pressure monitoring system).. my tires are properly inflated yet, apparently it keeps sending the low pressure warning to the dash!
@zadekeys21943 ай бұрын
Shodan + DnsDumpster + nMap + Hosted Scan.... Great tools for basic OSINT. Ive used these to find vulnerable systems and contact the companies in question. Found a newspaper publisher who seemed to have a trojan listening on a certain port, which their I.T team wasnt aware of.
@Faisalali-hg5rs3 ай бұрын
Sir deauther attack SSID hidden
@Shekelgrubb2283 ай бұрын
Can you please show some SS7 protocol attacks ?
@gqpierrepierregershompierr8443 ай бұрын
Best 2:31 of my time thanks
@singhgagandeep9554 ай бұрын
Before PNPT go for ejpt very good certification for beginners
@SRK-vc1tt4 ай бұрын
kali back track ? is it same as kali linux? any difference
@mindfulengineerАй бұрын
BackTrack was the original name for Kali. In simple terms, Kali is the rebrand and Parrot is a fork of BackTrack. David and OTW mentioned this in their Learn Linux course. I am also open for correction if I misrepresented BackTrack and Kali, as I was half asleep during that video 😅
@TechHacks__TechVPNGURU4 ай бұрын
Hey David, with version of Kali Linux is currently most stable
@mindfulengineerАй бұрын
Short answer: Don't sweat it, just pick a version that works or is stable enough for you. Long answer: OTW mentioned this in their Learn Linux course. Just use the version that just works and don't rush to upgrade. If you need the latest, go for it, but keep a copy of the current version you used. OTW has multiple versions of Kali running, all the way back to the original BackTrack.
@DaveJayMedia4 ай бұрын
Be better if you got up & went out to show how it works.
@aronsilburn47204 ай бұрын
this is very inspiring as this is sorta what I feel as I am a qualified electrician and looking to go into the networking field, and a have pretty good knowledge of IT and feel I could do more just unsure on the pathway to take 😂
@ShaistaParveen-gj6cj5 ай бұрын
How to 5ghz Wi-Fi network jamer
@GilligansTravels5 ай бұрын
great video
@coderjo69445 ай бұрын
You both are great story tellers!!.... can't wait to get a copy.... had a used original version on a wishlist on amazon for some time. Back in the early 1990s there were text based dungeon and dragon games that were hosted at certain collages what were awsome fun to play and drive down your GPA LOL..... they were all coded in C . You get to where you can read incredibly fast playing them and you can code areas straight out of a comic book or movie /tv shows... and not really worry about copyrights. Cause every thing was just text and with your imagination you conjure up the spectacular battles scenes in your head.
@rezah3365 ай бұрын
so stupid, why hack a car? you have to have access to the car, in that case if you want to do some damage you just place a bomb or something, this is totally useless knowledge
@AggelosStavrou-km9nd5 ай бұрын
Full video ?
@cameronrich25365 ай бұрын
The browser doesnt work ever help pls
@LashyYT3 ай бұрын
Click foward on burp suite next to intercept
@MANASWali5 ай бұрын
can u teach us how to hack wifi using kali linux without a external wifi adptor plzzzzzz my rewuest from india only u are our hope now
@DWmudskipper5 ай бұрын
You can use your internal wifi card, in all videos he does just set the video to your wifi interface
@jamesdavis12395 ай бұрын
My headcanon is that the editor was just as worried about asking for a copy so they could use it to reprint the book. Probably saved them so much work 🤣
@Steve168xyz5 ай бұрын
no course on this Sir ?
@Gigi-zy1kx5 ай бұрын
Dr. C
@CyberDevilSec5 ай бұрын
Hi David!!!💙
@guilherme50945 ай бұрын
👍👍!
@HookedGoneSunk5 ай бұрын
how about for a phone number?
@wilsontavarez5 ай бұрын
Hi, ¿Does the Alfa Tube-U model support monitor mode?
@Adivasi77775 ай бұрын
Professor Severance is one of the most *committed* teachers of this craft. He is The Man, The Myth, The Legend.