Big thank you to Brilliant for sponsoring this video! Try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/DavidBombal // UA-cam Video REFERENCE // Binary? How does it work?: ua-cam.com/video/Toa5-1i4wRE/v-deo.html // Occupy The Web Books // Linux Basics for Hackers: US: amzn.to/3wqukgC UK: amzn.to/43PHFev Getting Started Becoming a Master Hacker US: amzn.to/4bmGqX2 UK: amzn.to/43JG2iA Network Basics for hackers: US: amzn.to/3yeYVyb UK: amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/ // Occupy The Web SOCIAL // X: twitter.com/three_cube Website: hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: ua-cam.com/video/YJUVNlmIO6E/v-deo.html&pp=iAQB Mr Robot: ua-cam.com/video/3yiT_WMlosg/v-deo.html&pp=iAQB Hackers Arise / Occupy the Web Hacks: ua-cam.com/video/GxkKszPVD1M/v-deo.html&pp=iAQB // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:49 - Brilliant sponsored segment 03:01 - Controlling directory permissions // Linux Basics for Hackers Chapter 5 06:16 - Explaining permissions // Kali demo 10:59 - Explaining permissions continued 14:47 - How to change permissions // Two ways to change permissions 22:10 - Special permissions // Sticky Bit 26:09 - Privilege escalation explained & demo 27:51 - The importance of social engineering 32:58 - Group explained 34:48 - Chapter 5 summary 35:40 - OTW books 36:44 - Visit OTW's website // hackers-arise.net 38:38 - Special discount 38:44 - Conclusion linux kali linux parrot os linux permissions linux users linux groups root linux 777 linux chmod Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #linux #kalilinux #hacker
Hi! Can you do a video on software updates and calls being diverted? Motorola 13 downloads a QR Code Scan that can't be removed. It's always on and won't turn off. Also Rob Braxman is good (just watched a video of your featuring him) but when it comes to your calls being diverted he is naive. He insists only governments can do this but I've had to change my phone number 5 times in 4 years because my phone is ALWAYS being diverted. I have gone to the police and have traveled internationally, I'm not a wanted woman... Just being stalked by a psycho. Please do an update to that video! Thank you
So as a cyber security expert we use a little trick of rolling ("DICE") to pick any numbers used in a password. The best passwords are very long and different from anything anyone would imagine.
He has Udemy classes on Udemy as well. I’m taking his class on networking as a refresher. His classes are very fun compared to some of the other classes I have take. I like more upbeat instructors because it makes it more fun to learn. But this is just my opinion.
hello david it's so great that you host Mr OTW again as I m preparing my exam of CCNP exam great I wil take advantage of this episode for security part thx and God bless u
I study this few days ago but I jump in chapter 6 because it's hard sometimes when no one explains to you but now you upload this video. I hope you discuss with Mr.Anon the whole book. THANK YOU MR.DAVID❤
Pls make a video with OTW that include topics like "Quantum Hacking.... Q - Day... AI Hackers.... Future of Cyber Security by 2030.... Scary reality of Cyber - War".... It's my humble request to David sir 🙏🙏🙏🙏🙏🙏🙏🙏
The explanation is good. Octal permission 4000 is called setuid though. The sticky bit is octal 1000 because this makes files sticky (staying where they are if you're not the owner and only have 'inferior' rights).
Thank you both. I love these Linux videos with OTW. David could you please interview Angelina Tsuboi. She is an amazing young woman- only about 20 years old- but works for NASA in cybersecurity. She has created many cybersecurity gadgets and specializes in aerospace cybersecurity such as aeroplanes, drones, satelites etc
Thanks for another awesome video :D Here i's an idea, maybe you (David) and Keith can prepare a challenge related to this Linux knowledge applied to an real life case of study on cloud/network security and OTW can act as the threat actor. Idk, just sharing some thoughts.
David, I think that in time 20:22 there is a mistake. O is for others not for the owner. U is for user. OTW also mentioned it in wrong way compared to the linux permissions picture mentioned in 11:18. Or am I missing something? Thank you
He made a mistake by callng o - owner. 1. **u** - User (the file's owner) 2. **g** - Group (the file's group owner) 3. **o** - Others (all other users) 4. **a** - All (user, group...)
David, have you got any videos showing potential career/learning pathways to take depending on experience and after getting some of the well know basic certs out of the way A+, CCNA obviously good start but after this, there is so many ways to approach a new career in IT after this however.
Misinformation: I was confused because 20:22 says U for all other users but right after that OTW types o+x to give execute permission to others. I searched and found out O is for others and U is for user (owner).
And I think it's not David's false (maybe not double checking, if any) because OTW himself said 20:22 part. And right after that he types o+x to give execute permission to others, so OTW was temporarily confused I guess.
I have created memory dump of the Kali Linux version 6.8.11 -amd 64 using avml command but the volatility 3 is not showing results it shows (Unsatisfied requirement plugins. Bash. kernel ,A translation layer requirement was not fulfilled,A symbol table requirement was not fulfilled) I tried to find symbols for the linux but they also didn't work Please Help.
Can you please tell, how do hackers like you learned hacking , from where didi you learned this skill? , we are learning from your video from where you learned?
I'm planning to buy a MacBook Air M1 for ethical hacking. I've heard that some hacking tools don't work on it and that there might be compatibility issues. Should I still buy this laptop? If anyone has experience using a MacBook Air M1 for ethical hacking, I'd appreciate your insights.
Linux's permission system sucks. The lack of NFSv4 ACL's makes using it as a conventional fileserver in a business setting a total pain and often just simply not viable. It also makes Samba integration far harder than it needs to be.
in ubuntu, I tried 'sudo find / -user root -perm 4000' but found none. It looks like ubuntu indicates the executable bit as 's' not 'x' if it has a setuid. ie rwsr-xr-x 1 root root 64152 Feb 6 07:53 /usr/bin/passwd
Big thank you to Brilliant for sponsoring this video! Try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/DavidBombal
// UA-cam Video REFERENCE //
Binary? How does it work?: ua-cam.com/video/Toa5-1i4wRE/v-deo.html
// Occupy The Web Books //
Linux Basics for Hackers:
US: amzn.to/3wqukgC
UK: amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: amzn.to/4bmGqX2
UK: amzn.to/43JG2iA
Network Basics for hackers:
US: amzn.to/3yeYVyb
UK: amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/
// Occupy The Web SOCIAL //
X: twitter.com/three_cube
Website: hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: ua-cam.com/video/YJUVNlmIO6E/v-deo.html&pp=iAQB
Mr Robot: ua-cam.com/video/3yiT_WMlosg/v-deo.html&pp=iAQB
Hackers Arise / Occupy the Web Hacks: ua-cam.com/video/GxkKszPVD1M/v-deo.html&pp=iAQB
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming up
00:49 - Brilliant sponsored segment
03:01 - Controlling directory permissions // Linux Basics for Hackers Chapter 5
06:16 - Explaining permissions // Kali demo
10:59 - Explaining permissions continued
14:47 - How to change permissions // Two ways to change permissions
22:10 - Special permissions // Sticky Bit
26:09 - Privilege escalation explained & demo
27:51 - The importance of social engineering
32:58 - Group explained
34:48 - Chapter 5 summary
35:40 - OTW books
36:44 - Visit OTW's website // hackers-arise.net
38:38 - Special discount
38:44 - Conclusion
linux
kali linux
parrot os
linux permissions
linux users
linux groups
root
linux 777
linux chmod
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#linux #kalilinux #hacker
Sir I don't fix my linux
Whenever I want to install linux in virtual box so many times black screen comes and stuck.
Hi David!
I used the affiliate link to support you!
God i am stupid i accidently removed my comment!!
Hi! Can you do a video on software updates and calls being diverted? Motorola 13 downloads a QR Code Scan that can't be removed. It's always on and won't turn off.
Also Rob Braxman is good (just watched a video of your featuring him) but when it comes to your calls being diverted he is naive. He insists only governments can do this but I've had to change my phone number 5 times in 4 years because my phone is ALWAYS being diverted. I have gone to the police and have traveled internationally, I'm not a wanted woman... Just being stalked by a psycho.
Please do an update to that video! Thank you
Glad you covered suid and sticky bit, its probably the most important section here.
So as a cyber security expert we use a little trick of rolling ("DICE") to pick any numbers used in a password. The best passwords are very long and different from anything anyone would imagine.
Is this a joke?
@@ServusChristi777 "Roll the dice & find out cyborg dude."
what you mean sir can you explain it plz
Rolling dice isn't as good as some devices can generate 24 word passwords.
@@tacticalcenter8658 Thanks for knowledge
We really enjoy the voice of OTW. Thanks David for the videos
You're welcome!
We really enjoy the voice of OTW,Vibrate,clean and clear.Thank you sir David for the videos
We really enjoy the voice of this guy(OTW). DAVID THANKS AND WE WISH YOU TO MAKE MORE INTERVIEWS WITH OTW
David really deserves millions of subs,cause he don't leave any garp in hacking and cyber security,❤❤❤❤❤❤
Thank you :)
He has Udemy classes on Udemy as well. I’m taking his class on networking as a refresher. His classes are very fun compared to some of the other classes I have take. I like more upbeat instructors because it makes it more fun to learn. But this is just my opinion.
hello david it's so great that you host Mr OTW again as I m preparing my exam of CCNP exam great I wil take advantage of this episode for security part thx and God bless u
20:22 GOU is described but o is not owner its others as later explained. Great video btw got to learn alot!
I study this few days ago but I jump in chapter 6 because it's hard sometimes when no one explains to you but now you upload this video. I hope you discuss with Mr.Anon the whole book. THANK YOU MR.DAVID❤
thanks for keeping us updated and I'm very new in the I.T industry still studying A+ N+ and fundamental for cyber the EPs really are helpful.
Big thanks to both of you. I appreciate what you do for us. And we are waiting for more and more from you.
Hopefully lots more content coming soon :)
Thanks! For all your ideas ,support , and general understanding of my social ineptitude . Knowledge is the key to any success.
Awesome, we are back. Am reading the physical book. Listening to the videos to fill in
He says that on every channel he visits. "The best blah blah channel"
I love OTW! The way he's explaining and talking is relaxing and understandable.
Pls make a video with OTW that include topics like "Quantum Hacking.... Q - Day... AI Hackers.... Future of Cyber Security by 2030.... Scary reality of Cyber - War".... It's my humble request to David sir 🙏🙏🙏🙏🙏🙏🙏🙏
Thanks so much David
You are very welcome
David, your educational videos are awesome! Could you make a video about port forwarding and tunneling?
Thx David. You always have the most relevant and useful videos related to cyber security.
@davidbombal This series with OTW is great. Will you be adding further chapter coverage? The book is perfect for beginners.
I just finished reading ch. 5 of OTW's Linux Basics Book. I LIKE OTW's book!😃😎👍👍
where can you get ?
Amazing and informative content, thank you David and OTW.
Excellent, as always!
I like this guy
When ever i see david, i am suprised that some thing new happen ❤
Good morning david bombal when is Eps 7 coming out?
The explanation is good. Octal permission 4000 is called setuid though. The sticky bit is octal 1000 because this makes files sticky (staying where they are if you're not the owner and only have 'inferior' rights).
Thank you both. I love these Linux videos with OTW. David could you please interview Angelina Tsuboi. She is an amazing young woman- only about 20 years old- but works for NASA in cybersecurity. She has created many cybersecurity gadgets and specializes in aerospace cybersecurity such as aeroplanes, drones, satelites etc
always thankful for the knowledge....👏
Yayyyyy chapter 5 thank you so much!
Thanks for another awesome video :D
Here i's an idea, maybe you (David) and Keith can prepare a challenge related to this Linux knowledge applied to an real life case of study on cloud/network security and OTW can act as the threat actor. Idk, just sharing some thoughts.
I was looking forward to this.
I hope you enjoy the video!
@@davidbombal Definitely did.
Keep up the good work!
Any chance we get a video about kali purple and defensive security?
I'll look at this again as a few people have asked for it.
@@davidbombal TY
There is a mistake in the slide 22:19 that u and o representations! Good video!
At second 00:50 i have the same Book in your background!!! Its really nice! Jon Erickson!
David, I think that in time 20:22 there is a mistake. O is for others not for the owner. U is for user. OTW also mentioned it in wrong way compared to the linux permissions picture mentioned in 11:18. Or am I missing something? Thank you
My man always giving us knowledge
That's the goal! We need to share the knowledge :)
Luv you from Nepal ❤️
Do you have any videos explaining the ethics you practise with hacking or any steps you take to make sure you’re not teaching bad actors bad things?
OCCUPYTHEWEB!! Let’s gooooo! ❤
He made a mistake by callng o - owner.
1. **u** - User (the file's owner)
2. **g** - Group (the file's group owner)
3. **o** - Others (all other users)
4. **a** - All (user, group...)
Waiting for new version of OTW’s Linus for hackers. Amazon says it’s coming on 1 April 2025. Can’t wait that long. Will it be available earlier?
David, have you got any videos showing potential career/learning pathways to take depending on experience and after getting some of the well know basic certs out of the way A+, CCNA obviously good start but after this, there is so many ways to approach a new career in IT after this however.
I am trying to finish book but i can't but sir if you put video regularly i finish it under a month and thanks for your time david and otw sir
Thanks mr david i have a question for master otw wich operting system use hackers prefer windows or macOs ????❤
I have that book on preorder.
Its u- user g-group o-others not like otw said in introduction
Really great video, I always wondered why it was 777
Great content. Bravo!
Where is the first place your computer would look to find the ip adress of a domain ?
If you need to learn: David Bombal
If you need to learn RIGHT NOW: Network Chuck
Misinformation: I was confused because 20:22 says U for all other users but right after that OTW types o+x to give execute permission to others. I searched and found out O is for others and U is for user (owner).
And I think it's not David's false (maybe not double checking, if any) because OTW himself said 20:22 part. And right after that he types o+x to give execute permission to others, so OTW was temporarily confused I guess.
I have created memory dump of the Kali Linux version 6.8.11 -amd 64 using avml command but the volatility 3 is not showing results it shows (Unsatisfied requirement plugins. Bash. kernel ,A translation layer requirement was not fulfilled,A symbol table requirement was not fulfilled) I tried to find symbols for the linux but they also didn't work Please Help.
Good job guys! We need more help from civilized world in this war!
You can do this with the Flipper Zero.
They are back 💯💪
I hope you enjoy the video :)
Sir best book 📚 for full cyber security 🤔👀 please 🙏 help me 🙏
Can you please tell, how do hackers like you learned hacking , from where didi you learned this skill? , we are learning from your video from where you learned?
Hi, I have an issue in my kali linux that is when i boot kali linux the terminal open automatically, i hope you can help me to solve this issue
Master OTW 😍😍😍
ep5 didnt think we ever moved on from ep2..
David l would love to see a tutorial about LVM please l really need this.
I love you so much otw,
Especially you David,please tell otw that am aspiring to be like him❤
We can all learn so much from OTW :)
Thanks for the video sir
You're welcome!
isn't him marcus hutchins or keith debus?
The Problem is that the login with Password is an insecure method. There a better option comming soon.
Hi David & OTW !
Hope you enjoy the video!
@@davidbombal Always!
20:19 editin required
david sir Put at least 1 video in a week with otw sir
btw his name is Keith Debus.
Occupytheweb forever !!!!
Whenever I want to install linux in virtual box so many times black screen comes and stuck.
Please ask for help in my discord: discord.com/invite/usKSyzb
When is the second edition comming out
I don't have an exact date. Hopefully this year.
make video on bitcoin tracing with otw please🙏🙏🙏🙏🙏🙏
Best permissions chmod 600 / -R
did not mention chmod and gtfobins
since there's only one thumbs up here's more 👍👍👍👍👍👍👍👍👍👍
👍!
More like: Linux for sysadmins
I'm planning to buy a MacBook Air M1 for ethical hacking. I've heard that some hacking tools don't work on it and that there might be compatibility issues. Should I still buy this laptop? If anyone has experience using a MacBook Air M1 for ethical hacking, I'd appreciate your insights.
every one does it
stop otw now!
No you have it wrong - STOP PUTIN NOW! Have a blessed day!!
Best PC setup for hacking
Watch this video: ua-cam.com/video/3KYZ5yEqvY4/v-deo.html
@@davidbombal thanks 🙏 sir 😁
By far the best pc setup for hacking is your victim’s pc 👍🏻
😎
👍👍
😃👍
Hello 👋 sir
Hello!
@@davidbombal yes sir ji 🙏
Linux's permission system sucks. The lack of NFSv4 ACL's makes using it as a conventional fileserver in a business setting a total pain and often just simply not viable. It also makes Samba integration far harder than it needs to be.
Second
Thank you for your support!
I will not be clicking on any links.
Oh, is that not funny?
Finally, permission granted to see episode 5! 🦾😎
in ubuntu, I tried 'sudo find / -user root -perm 4000' but found none. It looks like ubuntu indicates the executable bit as 's' not 'x' if it has a setuid. ie rwsr-xr-x 1 root root 64152 Feb 6 07:53 /usr/bin/passwd