A big shoutout to TCM Security for sponsoring this video. Register now to receive a 10% discount on all TCM Security Certifications, potentially making your most significant step toward a career in ethical hacking. Go here: davidbombal.wiki/3vQsqWm // Stephen's Sims’ Social // X: x.com/Steph3nSims KZbin: www.youtube.com/@OffByOneSecurity // Stephen's Book (Co-Author) // Gray Hat Hacking Series by various authors: US amzn.to/3B1FeIK UK amzn.to/3A920AL // Heath Adams’ KZbin Channel // kzbin.info // KZbin video REFERENCE // Free Exploit development training (beginner and advanced) kzbin.info/www/bejne/gojQqmaqbZl0f9E Buffer Overflow Hacking Tutorial (Bypass Passwords): kzbin.info/www/bejne/mWOlp4Zoi9Z3jck Reverse Engineering 101 tutorial with the amazing Stephen Sims!: kzbin.info/www/bejne/a3e7o3Z-gaZ9kK8 Hacking Roadmap to Success: kzbin.info/www/bejne/rZOaY6aAd6ZolcU Real World Windows Pentest Tutorial: kzbin.info/www/bejne/eKS2aIl_ic6IjtE // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.x.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Intro 00:58 - Disclaimer 02:23 - TCM Security sponsored segment 04:40 - The Dark Web 05:44 - How to stay safe on the Dark Web // Using TOR 10:45 - Whonix vs Tails 11:10 - Working with law enforcement 13:47 - Having experience with the Dark Web 15:34 - The "Incognito Market" story 20:52 - What to do before going into the Dark Web 22:14 - Setting up a VPN 25:38 - Whonix and Tails 30:03 - Whonix virtual box 31:29 - How to find things on the Dark Web // The Dark Net Market Buyer's Bible 38:48 - Understanding cryptography 41:08 - The Dark Net Market Buyer's Bible continued 42:33 - The Dark Net Reddit 48:34 - Dark Net link directory 50:59 - Getting through Captcha in the Dark Web 54:40 - Monero wallet explained 57:40 - Things for sale on the Dark Web markets 01:07:13 - Breached data for sale on Telegram and Twitter 01:12:14 - Seeing unwanted things on the Dark Web 01:13:14 - Real-time Bitcoin transactions 01:14:51 - Cryptocurrency is not anonymous 01:15:54 - Trustworthy sources on the Dark Web 01:19:01 - Conclusion dark web deep web dark net darknet tor tails whonix onion vpn opsec onion websites malware malware analysis cybersecurity cybersecurity jobs hacking ethical hacking how to access the dark web deep web tor browser how to access the deep web safely how to access dark web how to access the deep web access dark web dark web tutorial dark web browsing how to access the dark web with tor the onion router dark web browser access the dark web deep web browsing how to get on the dark web silk road what is the onion router what is tor dark web movie anonymous cube how to browse the internet anonymously how to browse the web anonymously how to be anonymous on the internet invisible online hide identity privacy how to be anonymous browse the internet anonymously browse the web anonymously online privacy online privacy tips hide online hidden identity Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #darkweb #hacking #tor
@MrRboot14Ай бұрын
Hi Mr David Bombal Can You Tell me How to Minning Cpu in Pc Please 📶
@WilliamRaezerАй бұрын
It is just wild that this stuff actually exists.
@natking1u1z99Ай бұрын
Definitely not! Your exit node exposes you and the NSA monitors thousands of nodes, just like they do with the clear net.
@edwinrerimoi7823Ай бұрын
I need that cryptography video😅
@Funkx2gАй бұрын
Big up man
@cryptoking0722Ай бұрын
David, I watch and read a lot regarding all items related to cybersec, but it is always refreshing knowing there’s always more to learn. You provide that within your videos, which says a great deal about your shorts and videos. Keep up the amazing content my dear friend! 🙏🏼
@davidbombalАй бұрын
Thank you very much!
@Joe-PrzybranowskiАй бұрын
If you are law enforcement, and you want to create criminals that otherwise may not exist, building a honeypot is definitely easier than looking for people already committing crimes.
@RADIUMGLASS7 күн бұрын
Yup, just like tcap.
@mansart26Ай бұрын
You became one of my favorite IT channels on here, always exciting content for a newbie like me ❤
@joerockhead7246Ай бұрын
“The Onion routing protocol is not as anonymous as you think it is. Whoever controls the exit nodes is the one who controls the traffic, which makes me… the one in control." mr robot
@PeteSakes-CampCookАй бұрын
Mr. Robot
@MODZGAMINGYTАй бұрын
That's why you ALWAYS use a VPN (and from what I've gathered from this video) preferably your own because companies cannot be trusted they will sell out to the highest bidder 100% of the time. I love Express BPN but they are not my trusted friends. Using a Firewall system is also advisable and an all around smart move even being on the general web, much less the Deep and Dark web which are obviously more dangerous. It's mostly about being diligent, using common sense, (maybe not so common these days) and most importantly if you don't have malevolent intentions on the dark web then most likely you'll never have to worry about being hacked or traced much less arrested. People who are malevolent by nature deserve the same coming back their way ×3
@official.sirhaxalotАй бұрын
This is one of the few mistakes (I think) in the show. As you cannot select which exit nodes you want to control when targeting someone. Nodes are selected based on uptime and stability. If you could I'd imagine this would be a major security oversight.
@LennyMiller739Ай бұрын
@@official.sirhaxalotIt's not targeting exit nodes to track the victim who's using the node, it's running a whole bunch of exit nodes, and entrance nodes. I'm not sure of the specifics but they access the target over tor and can tell when the request goes through both of the controlled nodes. So when that happens they know the destination the exit node is supplied with is the target IP. It's like a "100 servers + 12 months and a whole heap of luck" sort of situation. You're right that it doesn't make sense though, he found it because he was curious about the bandwidth- he was already IN the network, no tor nodes were accessed during the process unless he was trying to track the user's too
@desordenpublicoАй бұрын
@@official.sirhaxalotinteresting take , do you think they wrote that on the script just to make mr robot more interesting and like “he knows his shit”
@Sam-zz3jw2 күн бұрын
This is actually a good explainer for what the dark web even is for a layman. Would love to see a deep dive into some of the local area kinda suburb spanning networks that exist sometimes, via various protocols, custom hardware or not (lowra etc). I remember seeing one that was partially on a UHF channel once a very long time ago.
@sifutenzsako2701Ай бұрын
Thank you for continuing to bring interesting guests on your channel. These type of specialists or experts in their fields are very engaging to learn from. Ive also learned quite a bit from you. Appreciate your good work in the space. Please keep it going.
@scottmcnulty70Ай бұрын
A lot of this can give a writer a realism to the work they do. Obviously peppering or writing stories around this. We don't have a term for "gritty" that really applies to the Dark Web/Darknet. It's a blurry road between too much tech and too little and through there is a sharp line that you need to walk, as a writer of fiction.
@iDannyismАй бұрын
Best recommendation, or lack of, for a VPN ever. Loved it. Instant respect.
@LoujnfdujnbkiАй бұрын
David :- Secrets of Dark Web Dark web:- We will Come to you 😅
@davidbombalАй бұрын
😂
@stephencolley523121 күн бұрын
movie clip from The Limey comes to mind 'Tell Him, Tell him I'm coming, you tell him I'm fooking coming'
@desordenpublicoАй бұрын
Thank you David …this right here is a gem in the broad space of cybersecurity
@gamereditor59ner22Ай бұрын
Ah, sweet! Edit: For educational purposes, this is awesome!
@davidbombalАй бұрын
Glad you think so!
@Hacsukh11 күн бұрын
David, you're very consistent in your videos. 🎉
@davegalaga110120 күн бұрын
This was an amazing episode
@pjj7466Ай бұрын
Give a like who has watched till end ❤ Thanks David sir & Steven sir for great info.
@Shaeeranah10010Ай бұрын
I have newly started my cyber security journey and love such helpful videos, thanks sir! subscribed!
@kamruz360Ай бұрын
You are the best David
@davidbombalАй бұрын
Thank you!
@sequalllАй бұрын
Wow this is great info to find out so much is out there from the DarkWeb. Its really scary how the internet has come to since I started exploring the Internet from 1995 to now has changed dramatically. So much to learn.
@burgek1Ай бұрын
I'm half way through but gosh the dark web is awful and somewhere I don't want to be! Fascinating video though.
@ProducerBillionaireАй бұрын
I’m very appreciative you for that video David )
@davidbombalАй бұрын
You're welcome!
@fadeelsalaman640917 күн бұрын
Thank you once again for an educational video .😊
@rw2783Ай бұрын
Love your videos. TCM are great too !
@MODZGAMINGYTАй бұрын
Good stuff David I do learn alot from your videos. Didnt know about the VPN that hops from location to location so thats a plus. Keep it up 👍🏻
@kurtisjackson5759Ай бұрын
Most linux systems come with the option to encrypt hard drive.
@bornFor1ThingАй бұрын
'bout to get buck wild up in the dark web!
@karagiannisborisАй бұрын
supporting law enforcement at a moment the law still plays the game of the "war" on the supposed "drug's" that were ones in drugstores is the problem of our day's
@Carlx9333Ай бұрын
Una excelente explicación con referencia al Dark Web y los protocolos a seguir y los riesgos que con llevan... Muy agradecido por toda la información brindada a Ustedes.
@Victor_ivic101Ай бұрын
An ordinary estuary of his knowledge
@dsgg5714Ай бұрын
DNM Bible doesnt recommend VPN while using Tor
@krlst.5977Ай бұрын
Awesome video, please call Stephen again for a new video about cryptography, i am sure it will be awesome and helpful too.
@Tech-Subsequent27 күн бұрын
Nice video. Thank you for sharing, sir.
@marcapsanchezАй бұрын
Please do another with this guy! Asymmetrical cryptography.
@prestonschoenrock2328Ай бұрын
Thank you! I'm taking a digital forensics class and this was very helpful.
@WsdgytfkitvrdcАй бұрын
Great video interesting guy! Would like to see more collav
@FaithMediaChannelАй бұрын
Just a heads up a lot of agencies are now monitoring a lot of torque traffic and browsing as well as other countries around the world. I was strongly recommend supposed to do their best and due diligence and providing the upmost security providing that is not even on their own equipment will probably be your best bet I do know that The traffic is being monitored by different agencies, law-enforcement agencies that are working on joint task force so if you’re planning to use this information on this site
@joeschmoe8965Ай бұрын
THey run the TOR exit nodes.
@FeinkinFreky25 күн бұрын
Its pretty sad how privacy (a basic human right) is frowned upon… Look at all the hoops people have to jump through just to not be spied on everywhere you go online. Why isn't privacy the standard and if people wanted to allow Google and the government to be able to watch what they do they can?
@user-sk1eh3pg6j19 күн бұрын
Bad people are the reason why privacy is now folk lore
@alpeter378716 күн бұрын
In the neuralink future of "neurological slavery" (quote from ai robot "Sophia") knowing how to "jail-break" devices will be necessary just to simply exist in your own head without rf hegemony. Mark my words.
@majiddehbi9186Ай бұрын
very instructive thx David
@domsbsanchezАй бұрын
helpful stuff, thank you.
@fire_breathing_hamsterАй бұрын
What a great video.
@MulticademyАй бұрын
Lots of bots in the comments
@Haruka_StoriesАй бұрын
Yeah😂
@LoujnfdujnbkiАй бұрын
Yeah many people have forgotten that they have become the bot initially then they have came up😅
@AndreeaCeАй бұрын
Thanks, I guess.
@johnpardalis7685Ай бұрын
One more excellent video!! A perfect idea for the next one indeed it would be the public encryption. One suggestion that I have comes from the book "Nine algorithms that changed the future" which proposes an example with colours for understanding how someone can exchange a secret in public.
@kurtisjackson5759Ай бұрын
So, then why does the Tor Project recommend not using a vpn in most circumstances?
@BMOThebotАй бұрын
Few reasons, you have to configure it correctly (TOR over VPN), and you are only as good as your weakest link. A bad VPN provider may log traffic and give law enforcement such data at request. You need to have an absolutely trusted VPN provider with no logs and annual audits. Tor over VPN means you connect to the VPN FIRST, then to Tor. You also must have KILL SWITCHES. Because if connection drops while using Tor over VPN, you could potentially leak your IP. Kill switches block network connection until a VPN tunnel is connected. Keep in mind the more hops you add, you will increase connection latency. But if configured correctly, it would indeed improve overall privacy and hide the very fact you use Tor from your ISP
@mighty1496Ай бұрын
Sir please make a video for a beginner of ethical hacking ,how to begin ,tools ,what need to be studied first please briefly explain from step 1 the beginning ,also on phone not lap or pc please
@bhattijani565Ай бұрын
Love from Pakistan and big respect for you sir.
@CodewithsultansalahuddinАй бұрын
how is it going
@thegamingapple3718Ай бұрын
Is it best practice to use a VPN with Tor? Or should Tor do all the work?
@AnonymousQwertyАй бұрын
Never use a VPN with TOR. That’s like TOR 101.
@AnonymousQwertyАй бұрын
TOR itself says that using a VPN compromises security
@daddybruce8084Ай бұрын
@@AnonymousQwertyyeah tor is like 3 anonymous decentralized vpns anws. If an additional VPN tied to your credit card was used, user will get de-anonymized😱 can’t believe this guy is supposed to be an expert
@SigmarigmaАй бұрын
@@daddybruce8084 he maybe talking about mullvad vpn which u can use monero
@zyyrАй бұрын
@@AnonymousQwertyyall just trolling the bots huh
@skycreed3223 күн бұрын
What i don't understand @@zyyr
@PeacefulRSАй бұрын
🤖🤖🤖🤖Thanks! I've watched this video 5 times now and I love it! 🤖🤖🤖🤖
@PeacefulRSАй бұрын
Jk thanks for the content Dave
@christiank.4794Ай бұрын
Bad Joke. Video is 2 hours live and you watched it 5 times (7h)? Mathing never mathed. 2/10
@i6137-e2fАй бұрын
@davidbombal thank you for putting these amazing training videos. I’ve got the vpn installed and running but my tor browser times out whenever the vpn is connected and when I disconnect it, I can search and do anything with tor. So how did he connect to the vpn and still access tor?
@andyhawaii281912 күн бұрын
Hi David AI is changing every day. How does that affect our ability to use and defend from the dark net?
@i6137-e2fАй бұрын
I’ve got a quick question, where do u install the vpn, is it on ur main host or on a workstation on ur virtuabox?
@theren0WayАй бұрын
Main
@DanLoFatАй бұрын
Of course we now know that Telegram will give your stuff to LEO upon subpoena.
@joshuahill5523Ай бұрын
Veracrypt is not considered safe anymore, why? Did he mean true crypt?
@ranjitkumargouda8970Ай бұрын
No True is deprecated, the updated version is veracrypt. It's considerably safe
@Tonka-r6eАй бұрын
True crypts algorithm was released by the three letter agencies. They changed to vera crypt
@0xftz7w99oАй бұрын
what is the voice at 46:50 ??
@marcapsanchezАй бұрын
you had me on this one David... subscribing now..
@p3ngi3Ай бұрын
I’m confused as to how to keep yourself safe on the internet. Some are saying just to use tor. Some are saying VPN and TOR
@PorkChopAChunky16 күн бұрын
No VPN. Anything decent isn't free and thus tied to your financials
@bradley6727Ай бұрын
Thanks for another great video. This is a mandatory requirement for anyone doing anything .onion related. Think it's a game!!
@mohammedelbahlouli7242Ай бұрын
What is more safer: multyproxy with tor or miltyhoping with a vpn ?
@fasttgamerАй бұрын
Love from Pakistan, sir , huge respect for u and your hardwork for making such videos ❤
@davidbombalАй бұрын
Thank you! And you're welcome!
@preygraphy4854Ай бұрын
Bro really expose the dark web on youtube ... Love from India ❤❤
@Anonymous-wx8kkАй бұрын
Video quality is not good. Text is not visible. I am not talking about password stuff but other text other than confidential things.
@johndechampsАй бұрын
Really nice educational content, but way to much pub interruption
@JoinTheNoob28 күн бұрын
That was entertaining
@marios427525 күн бұрын
Game Over.
@deejayx256Ай бұрын
love you videos from uganda
@davidbombalАй бұрын
Thank you!
@ZagnikasalamАй бұрын
David can you please make video on pager what is it and how it is works?
@l33thax0r2Ай бұрын
Curious about what would be a good substitute for veracrypt...?
@Wilky97127 күн бұрын
Lots of comments in the bots 👀
@abdullahniazi6320Ай бұрын
thank you @david I love to see more from Steph
@RupanSantra-o9uАй бұрын
david how do i post hacking videos my every video got removed removed and i got 2 strikes
@skyhАй бұрын
Don't use KZbin.
@iNarrow110 күн бұрын
Best way to access dark web using tail os in virtual machine
@IhtishamUlhaq-i3tАй бұрын
Dear Mr. David, I hope this message finds you well. I am a recent graduate with a degree in Computer Science and am eager to start learning the fundamentals of networking. However, I am unsure of the best starting point. Would you recommend that your networking course on Udemy be a suitable place to begin? Here is the link to the course for reference: Complete Networking Fundamentals Course. Kind regards, Ihtisham Ul Haq , Pakistan
@Cee066610 күн бұрын
🤔 What's the purpose of a NFT? If I'm not mistaken, you can implant files inside these things perhaps an eye needs to be upon these based on certain profiles? But idk, I'm just thinking here.
@Cee066610 күн бұрын
Is there a trusted virtual box for Android and iPhones you would recommend?
@sagniksarkar7934Ай бұрын
Hello sir. I have a laptop which has win11...but i want to dual boot it. And i have no space... But i was thinking of using my 64gb sd card as my computer harddrive and dual boot linux on it... But there is a problem I don't know how to do it.. so can you please make a video about it. It will help me a lot. Thank you. Please reply
@sagniksarkar7934Ай бұрын
Ooh I have the SAMSUNG EVO Plus 128GB Micro SDXC w/SD Adaptor, Up-to 160MB/s, Expanded Storage for Gaming Devices, Android Tablets and Smart Phones, Memory Card, MB-MC128SA/IN
@kikar92Ай бұрын
if he did record this screen will be clean image too bad
@tejassharma1849Ай бұрын
Where are the bots?
@Charlie-phlezkАй бұрын
You're here.
@davidm8966Ай бұрын
So I download whonix to be relatively good to go and preconfigured, and the FIRST thing I have to do is disabling javascript in the tor browser? lol? I always heard whonix is the way to go..but such a basic feauture not enabled by default?
@goober1515Ай бұрын
29:30 What about veracrypt is not safe? What information is there?
@neilcage19 күн бұрын
Proxychain
@nicolas_gamaАй бұрын
why there are no docker containers for Tails or Whonix ?
@PAVEL-JAKL22 күн бұрын
Can I use darkweb on cellphone ?
@user-sk1eh3pg6j19 күн бұрын
Why? 😂
@Pallavi-y4bАй бұрын
Wow sir ❤❤. Impressive thumbnail.
@davidbombalАй бұрын
Thank you so much 😀
@AndreeaCeАй бұрын
An anti ddos tool? So wicked ...
@Techfyi-x5eАй бұрын
Please make a video on how to send file from Android phone to Kali linux OS laptop like we send in windows through datacable please
@muffism344Ай бұрын
Why so many bots
@davidbombalАй бұрын
Bots are always a problem these days unfortunately ☹️
@erichanson5628Ай бұрын
What about Parrot OS immutable USB drive boot?
@lukesalzman777Ай бұрын
What do you think about parrotOS in comparison to tails and whonix?
@elvaru917110 күн бұрын
damn it, the cupon has expired yesterday :,(
@ZagnikasalamАй бұрын
I think this video shoot on 11sep but release on 22sep
@NohateHassan21 күн бұрын
How can I recovery my email please
@AndreeaCeАй бұрын
Why not access it via a burner laptop...
@sukablyad6111Ай бұрын
What is a burner laptop?
@ikust007Ай бұрын
More info on RSA
@ZachariahEvans-c5bАй бұрын
I feel stupid but if I may ask is this guy not Sam Altman if not so why do they look a like?
@hack_123-anonymousАй бұрын
Love from Pakistan i appreciate u bloom:)
@uvrajartsselfimproveАй бұрын
please if anybody is reading and has a knowledge, i have only one system windows 10 on it, how can i encrypt my drive safely so that it is secure, any advice?
@HazexDimondАй бұрын
VeraCrypt
@IslamicAudiobooksCentral12 күн бұрын
Replace Windows with a Linux-based OS. Most of the mainstream ones, like Fedora, offer easy-to-setup LUKS encryption on install.
@benisapp155Ай бұрын
So what your saying is....stay away from the dark net. Too risky and stupid people should not try. Insightful, thank you.
@gadam2405Ай бұрын
Did I miss it? Where can I read this bible?
@JamesJohnAgarАй бұрын
If you have all these Dark Net market places, why has Ross William Ulbricht(creator of Silk Road) been jailed for life while some of these creators are still free to continue selling these bad goods/products. Surely all these Dark Net market places can be traced since the Tor Network is not as safe as people think!
@BenjTavenerАй бұрын
Did you not listen to him? It's not that simple to just track the servers to the marketplaces and shut them down. Usually they are taken down due to bad opsec. And they do throw the book at the admins if they catch them
@Alainchabat-t5dАй бұрын
cause they are in russia noob
@FOREXTIPS78620 күн бұрын
@@BenjTavenergood
@metalunitsАй бұрын
15:54 okay guy, no need for the LE virtue signaling