So you're got Kali Linux or Parrot OS installed. Now what? These are the top Hacking Tools that you need to learn. // UA-cam Video REFERENCE // Hacking Tools with Demos that you need to learn in 2024: ua-cam.com/video/GxkKszPVD1M/v-deo.html Demo of Microsoft Window’s Hack developed by NSA: ua-cam.com/video/zExZsLCHp1I/v-deo.html Real World Hacking Demo with OTW: ua-cam.com/video/R1amgARgFDs/v-deo.html // UA-cam Playlist REFERENCE // Linux Basics for Hackers: ua-cam.com/video/YJUVNlmIO6E/v-deo.html // Occupy The Web Books // Linux Basics for Hackers: US: amzn.to/3wqukgC UK: amzn.to/43PHFev Getting Started Becoming a Master Hacker US: amzn.to/4bmGqX2 UK: amzn.to/43JG2iA Network Basics for hackers: US: amzn.to/3yeYVyb UK: amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/ // Occupy The Web SOCIAL // X: twitter.com/three_cube Website: hackers-arise.net/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. // MENU // 0:00 - Intro 0:29 - Python Basics for Hackers 01:24 - Exploring Hacking Tools in 2025 02:02 - Getting Started with Linux for Hacking 06:28 - Deep Dive into Python for Cybersecurity 08:09 - Setting Up VMware for Hacking Environments 12:53 - Mastering Nmap for Network Scanning 14:34 - DragonOS: A Hacker’s Operating System 23:20 - Burp Suite for Web Application Pen Testing 30:32 - Using Shodan for Internet Reconnaissance 37:07 - Introduction to Nuclei for Automated Scanning 41:33 - Metasploit: The Pen Testing Framework 45:19 - Exploiting EternalBlue for Windows Vulnerabilities 46:54 - Cracking Passwords with Hashcat 51:00 - Cracking Passwords with John the Ripper 53:24 - Using Aircrack-ng for Wi-Fi Hacking 54:46 - Wifite: Automating Wi-Fi Cracking 55:11 - Searchsploit for Exploit Research 55:21 - Exploit-DB: A Comprehensive Exploit Database 57:00 - Leveraging MalwareBazaar for Malware Analysis 59:35 - SQL Injection with Sqlmap 01:01:01 - Software Defined Radio (SDR) for Hackers 01:06:31 - Reverse Engineering with Ghidra 01:11:02 - Claude: AI-Powered Hacking Tool 01:15:30 - CrowdSec: Community-Powered Security 01:17:55 - Learn by Hacking: Practical Cybersecurity Tips 01:20:28 - Outro kali linux parrot os wireshark nmap hashcat nessus aircrack cybersecurity cybersecurity jobs hacking comptia kali python vmware virtualbox linux nmap dragonos shodan burp suite metasploit eternalblue hashcat john the ripper aircrack-ng wifi wifite searchsploit exploit dn malware bazaar sqlmap sql injection sdr software defined radio ghidra sdr claude ai crowdsec #kalilinux #nmap #python
I'm doing my best to break into cybersecurity, specifically offensive security, but I'm struggling to stay focused. I find myself jumping back and forth between different materials, making it hard to concentrate on one thing. As a result, I learn a little about many aspects instead of gaining in-depth knowledge in a particular area.
Thank you, Mr. David. I really enjoyed today's lesson. I must also admit that the speaker is one of the most remarkable experts I’ve ever seen in the way he explains things and makes it easy for those who want to learn.
First of all, thank you Mr. David and your distinguished guest. You are the reason I am motivated to enter this field. Secondly, I hope you will present a special episode as a review of what your guests said and put a ladder and how to start from scratch step by step and put the courses to reach the top of the ladder and how to get the certificate in the end and completely free of charge because honestly I am a beginner. I may know how to start but I do not know how to continue and how to finish. Thirdly, I hope you will slow down your speed of speech so that we can keep up with you. Finally, thank you again and sorry for the length and lack of understanding. I hope I was able to get my idea across.
Thank you David and my favorite guest OCW for this great video. I have the old Linux basics for hackers and cant wait for the new one to be released on amazon. Python basics for hackers is also on my list. Thank you.
You have always show us the right way to learn, with world best trend. Thank you for your good work, your channel is already changing life of the interest here in Nigeria. watching from Abuja Nigeria.
Excelente video, y antes que nada gracias por compartir sus conocimientos con la comunidad, existe la versión de los libros mencionados traducida al español o solo existe en idioma ingles?
Cool! Thank you, David, and OTW! Edit : I go myself prepared for the basics of Linux terminal and Windows CLI. Quick question: Is there a way to install Kali purple in raspberry pi 4?
@davidbombal Oh, must have missed the video. By the way it be cool to hear your opinion on hacking handheld computers like beepberry, uconsole and the upcoming raspberry pi pilet 5.
Hi David, I’m a 3rd-year student pursuing a bachelor's degree in Computer Science and Cybersecurity. I’ve been following your content for a while, and it’s been incredibly insightful and helpful for my learning journey. I have a question . Now a days we are using linux for hacking or any other cybersecurity things majourly we use linux, so our work goes simple and easy. my question is how does hacking done before linux was there, how things work and done
Anyone know when you uee the ble bluetooth scanner millions of 12 digit numbers come up ??? Ive searched the mac license look up and these numbers have no license any help appreciated thanks
What do you think about WSL2? Is it good to use it for this purpose of hacker testing, or is a virtual machine (vmware, virtualbox) better? I have this question.
Im curious why Olly debug didnt get a mention alongside Ghidra and Ida. ? Olly is what we experimented with at university in my cybersecurity course, and it seemed plenty powerful and approachable. (Oh, crap, just remembered, it may be 32 bit only. If so, that would explain that).
Thought I’d update everyone on the complete ineptitude or plan apathy shown by TPLink when I brought( in my opinion)a serious security bug to their attention. I say update , because I posted in DB’s comments a while back when it first happened. I received one follow up email, stating that they require “bug” reports to be in a certain format so as to include all the information to identify the hardware and firmware. Since I’m not a complete moron, when I originally submitted the issue to tplink, I provided all the information they required and more. The bureaucracy is so strong there I thought they were going to ask me to come in on Saturday to work on my TPS reports.
I want AI AGENT to create an AI agent specifically for physical testing and load it into my KALI. This AI agent can load different local models and APIs to complete the penetration work together. I use natural language to give the purpose or select the AI agent to automatically help me complete the physical work. If I want to achieve such a function, what tools or models do I need to prepare? At the same time, I learned that there is a mature AI agent tool, autogen studio, which can be used to complete my connection with various AI modules. I hope you can make a video of AI agent or autogen studio building a penetration test AI module.
Bring on the Python for Hackers ASAP PLEEEEEASE lol. Waiting out for the 2nd edition in May. of the Linux version. I almost bought the 1st, but thought I'd be better off being patient.
The books you recommend only one of them are available in india on Amazon and i purchased it but to be honest the price of book is quite high for me😅 and the book name is linux basic for hacker
What could be an alternative to GrapheneOS? Since my phone is not a Google Pixel but an Oppo, I cannot use GrapheneOS. However, I still need to ditch the phone for privacy.
Its fun and all explaining how tools and etc work. But you and most UA-camrs dont show whats going under the hood. For example everyone is showing how a hashcat works. But not what the tool does in background. How does it exactly break the password using wordlists. It would be much smarter explaining how they work. Pls teach more deeply and technically. Cos most people are not script kiddies 😅 We want to learn more.
OTW. I think he talks a good game but when he talks about the meat of a topic he seems a little off. Is it because he's over simplified his talking points for the video and neglects some glaring problems, or is he not the grand master he protrays himself to be. 🤷
So you're got Kali Linux or Parrot OS installed. Now what? These are the top Hacking Tools that you need to learn.
// UA-cam Video REFERENCE //
Hacking Tools with Demos that you need to learn in 2024: ua-cam.com/video/GxkKszPVD1M/v-deo.html
Demo of Microsoft Window’s Hack developed by NSA: ua-cam.com/video/zExZsLCHp1I/v-deo.html
Real World Hacking Demo with OTW: ua-cam.com/video/R1amgARgFDs/v-deo.html
// UA-cam Playlist REFERENCE //
Linux Basics for Hackers: ua-cam.com/video/YJUVNlmIO6E/v-deo.html
// Occupy The Web Books //
Linux Basics for Hackers:
US: amzn.to/3wqukgC
UK: amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: amzn.to/4bmGqX2
UK: amzn.to/43JG2iA
Network Basics for hackers:
US: amzn.to/3yeYVyb
UK: amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/
// Occupy The Web SOCIAL //
X: twitter.com/three_cube
Website: hackers-arise.net/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
// MENU //
0:00 - Intro
0:29 - Python Basics for Hackers
01:24 - Exploring Hacking Tools in 2025
02:02 - Getting Started with Linux for Hacking
06:28 - Deep Dive into Python for Cybersecurity
08:09 - Setting Up VMware for Hacking Environments
12:53 - Mastering Nmap for Network Scanning
14:34 - DragonOS: A Hacker’s Operating System
23:20 - Burp Suite for Web Application Pen Testing
30:32 - Using Shodan for Internet Reconnaissance
37:07 - Introduction to Nuclei for Automated Scanning
41:33 - Metasploit: The Pen Testing Framework
45:19 - Exploiting EternalBlue for Windows Vulnerabilities
46:54 - Cracking Passwords with Hashcat
51:00 - Cracking Passwords with John the Ripper
53:24 - Using Aircrack-ng for Wi-Fi Hacking
54:46 - Wifite: Automating Wi-Fi Cracking
55:11 - Searchsploit for Exploit Research
55:21 - Exploit-DB: A Comprehensive Exploit Database
57:00 - Leveraging MalwareBazaar for Malware Analysis
59:35 - SQL Injection with Sqlmap
01:01:01 - Software Defined Radio (SDR) for Hackers
01:06:31 - Reverse Engineering with Ghidra
01:11:02 - Claude: AI-Powered Hacking Tool
01:15:30 - CrowdSec: Community-Powered Security
01:17:55 - Learn by Hacking: Practical Cybersecurity Tips
01:20:28 - Outro
kali linux
parrot os
wireshark
nmap
hashcat
nessus
aircrack
cybersecurity
cybersecurity jobs
hacking
comptia
kali
python
vmware
virtualbox
linux
nmap
dragonos
shodan
burp suite
metasploit
eternalblue
hashcat
john the ripper
aircrack-ng
wifi
wifite
searchsploit
exploit dn
malware bazaar
sqlmap
sql injection
sdr
software defined radio
ghidra
sdr
claude
ai
crowdsec
#kalilinux #nmap #python
Hey sir how are you❤❤
@@Viz_editing I'm good! I hope you are well?
@@davidbombal sir my mobile rooted but kernal not supported for kali linux how I'm this problems solving? 🥺
@davidbombal should we connect on LinkedIn?
David when are you releasing what to study in 2025
I love it when David drops a new video and even better when it features OTW!
Following closely from Kenya.. I'm grateful to you David and your guest OTW.
Welcome Kenya! Thank you for watching!
im in kenya too bro, great to see we are here!
@@timonesh7949 its my pleasure to meet you on this platform Tim.
pumbavu zenyu😆
I am random guy who is starting in the mid 90s! 😂😮😅
His books are highly worth it. Got me on the right path, I eagerly await python basics for hackers. Awesome podcast as always.
100% agree
OTW is my favorite guest, by far. I just preordered his Python book a few weeks back. Thanks!
Awesome! Looking forward to OTW’s new book! Thanks David!
You're welcome!
Love from Bangladesh, David and OTW.
Great job❤❤❤
I'm doing my best to break into cybersecurity, specifically offensive security, but I'm struggling to stay focused. I find myself jumping back and forth between different materials, making it hard to concentrate on one thing. As a result, I learn a little about many aspects instead of gaining in-depth knowledge in a particular area.
Focus is important. Focus on getting your first cert for example.
@@davidbombal Interesting!!!
This is the problem I am also having.
@@nbk-gus Just the tip of the iceberg
Meditation can help
Thank you, Mr. David. I really enjoyed today's lesson. I must also admit that the speaker is one of the most remarkable experts I’ve ever seen in the way he explains things and makes it easy for those who want to learn.
Awesome David and your Guest. 2025 here we come with new Tools. Thanks David
Something about OTW's voice entrances me. He could be talking about anything and I will listen intently.
First of all, thank you Mr. David and your distinguished guest. You are the reason I am motivated to enter this field. Secondly, I hope you will present a special episode as a review of what your guests said and put a ladder and how to start from scratch step by step and put the courses to reach the top of the ladder and how to get the certificate in the end and completely free of charge because honestly I am a beginner. I may know how to start but I do not know how to continue and how to finish. Thirdly, I hope you will slow down your speed of speech so that we can keep up with you. Finally, thank you again and sorry for the length and lack of understanding. I hope I was able to get my idea across.
Thank you David and my favorite guest OCW for this great video. I have the old Linux basics for hackers and cant wait for the new one to be released on amazon. Python basics for hackers is also on my list. Thank you.
Great video. Ordered your python book last night!
Hi, David thx for bringin back Mr OTW I love your chats it's always very informative and also academic thx both of and happy new year for evry one
just finished watching the whole video very interesting thank you to you 2 for this awesome content!
You have always show us the right way to learn, with world best trend. Thank you for your good work, your channel is already changing life of the interest here in Nigeria. watching from Abuja Nigeria.
Excelente video, y antes que nada gracias por compartir sus conocimientos con la comunidad, existe la versión de los libros mencionados traducida al español o solo existe en idioma ingles?
I'm currently working through the materials for the CPTS. I've learned so much from this course
Great video.... Thank you David & OTW
Just want to say thank you, Sir!! Been a fan for a few years now!
Thanks for these awesome videos
You're welcome!
Great! New year new great video. I enjoyed this video more than the best movie that I've ever watched. Congratulation to both.
Love Your Videos, And Learn A Lot !
Awesome, thank you!
👍Awesome as always!!
I have already pre-order OTW's python new book! Looking forward to it!
Cool! Thank you, David, and OTW!
Edit : I go myself prepared for the basics of Linux terminal and Windows CLI. Quick question: Is there a way to install Kali purple in raspberry pi 4?
Thanks for sharing this video sir ❤😊
Something about OTW inspires me to write code more than the regular developers inspire to write code
Finally, Dragon OS is getting some exposure. Probably my favorite OS.
OTW has discussed it a number of times on the channel 😀
@davidbombal Oh, must have missed the video. By the way it be cool to hear your opinion on hacking handheld computers like beepberry, uconsole and the upcoming raspberry pi pilet 5.
Thank you OTW and David Bombal!!
I am planning to change from accounts to IT. I am ready for hard work and challenges
Hi David,
Do you have any python course in mind for cybersecurity?
Hi David, I’m a 3rd-year student pursuing a bachelor's degree in Computer Science and Cybersecurity. I’ve been following your content for a while, and it’s been incredibly insightful and helpful for my learning journey. I have a question . Now a days we are using linux for hacking or any other cybersecurity things majourly we use linux, so our work goes simple and easy. my question is how does hacking done before linux was there, how things work and done
Excelente canal amigo muy buena información para hacking etico saludos desde Honduras
I'd like to see a video about creating a private home security camera system...not IOT
Anyone know when you uee the ble bluetooth scanner millions of 12 digit numbers come up ???
Ive searched the mac license look up and these numbers have no license any help appreciated thanks
Any news on Cyberwarrior Handbook ?
What do you think about WSL2? Is it good to use it for this purpose of hacker testing, or is a virtual machine (vmware, virtualbox) better? I have this question.
Thank you 😊
Please upload Evilginx2 video series by OTW
Need that Python for Hackers book today. I dont think I could wait till Sep
Im curious why Olly debug didnt get a mention alongside Ghidra and Ida. ? Olly is what we experimented with at university in my cybersecurity course, and it seemed plenty powerful and approachable. (Oh, crap, just remembered, it may be 32 bit only. If so, that would explain that).
Dream Team is back! 🎉❤️🔥
Thought I’d update everyone on the complete ineptitude or plan apathy shown by TPLink when I brought( in my opinion)a serious security bug to their attention. I say update , because I posted in DB’s comments a while back when it first happened.
I received one follow up email, stating that they require “bug” reports to be in a certain format so as to include all the information to identify the hardware and firmware. Since I’m not a complete moron, when I originally submitted the issue to tplink, I provided all the information they required and more.
The bureaucracy is so strong there I thought they were going to ask me to come in on Saturday to work on my TPS reports.
I want AI AGENT to create an AI agent specifically for physical testing and load it into my KALI. This AI agent can load different local models and APIs to complete the penetration work together. I use natural language to give the purpose or select the AI agent to automatically help me complete the physical work. If I want to achieve such a function, what tools or models do I need to prepare? At the same time, I learned that there is a mature AI agent tool, autogen studio, which can be used to complete my connection with various AI modules. I hope you can make a video of AI agent or autogen studio building a penetration test AI module.
What version windows use master otw ?
U can improve ur skills every day equal on which level u are
OTW welcome back we happy to see you again and again and more one again we hope you are fine
One video please how to build Nethunter kernel
Thanks David bombal
You're welcome!
Bring on the Python for Hackers ASAP PLEEEEEASE lol.
Waiting out for the 2nd edition in May. of the Linux version.
I almost bought the 1st, but thought I'd be better off being patient.
I am using Rust, Python and C# for most of the code action in my daily work.
Also make a video about phishing or deep linking
The books you recommend only one of them are available in india on Amazon and i purchased it but to be honest the price of book is quite high for me😅 and the book name is linux basic for hacker
What could be an alternative to GrapheneOS? Since my phone is not a Google Pixel but an Oppo, I cannot use GrapheneOS. However, I still need to ditch the phone for privacy.
I love master otw the best hacker in world ❤❤❤❤
great video but i find that the latest version on vmware workstation i can tbut any of my wiif adators into monitor work in virtual box but not vmware
Using John too had to compile CUDA into it years ago
So THAT’S what OTW looks like!
wifite made my wifi disconnect, an blocked me from re connecting. . . . So that went well 🤔
Awesome thats great😊😅
Glad you like it
And thanks guys!
Help me mobile hacking tools
"Demos" was Cardinal Pell.
thanks sir
You're welcome!
How are VPNs not safe?
To be honest I don't understand everything he said but I interested about everything even though I don't understand.😅
never was so early
Thank you for watching so quickly!
OTW's books are good...
Another day am requesting podcast with zaid sabih
Too hot for youtube 😂
my fav beast
I'll wait for the movie, or move to China.
🎃
Please upload some shorts 😢
Coming soon 😀
Please don't
Its fun and all explaining how tools and etc work.
But you and most UA-camrs dont show whats going under the hood.
For example everyone is showing how a hashcat works.
But not what the tool does in background. How does it exactly break the password using wordlists.
It would be much smarter explaining how they work.
Pls teach more deeply and technically.
Cos most people are not script kiddies 😅
We want to learn more.
OTW. I think he talks a good game but when he talks about the meat of a topic he seems a little off.
Is it because he's over simplified his talking points for the video and neglects some glaring problems, or is he not the grand master he protrays himself to be. 🤷
why do you cover subjects that are years old
poop!
So really nothing new..
He blocked me from X, because i just give a review on book. Don't know why he not like reviews. Also why he remain so hidden.
Please i want to learn it seriously so it someone who can let as chat on private and show me everything in it i will be happy
You want to get your hands on the stuff he mentioned?
thanx David and OTW from Namibia
Thanks David bombal
You're welcome!