#510: 20–30% Of Attacks Use AI: John Hammond details today’s hybrid attacks
David Bombal11 Syys

#510: 20–30% Of Attacks Use AI: John Hammond details today’s hybrid attacks

To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you’ll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond’s SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond’s Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Jaksot(500)

#343: Minecraft Hacking With PYTHON And Log4j    Netcat Reverse Shell Exploiting CVE

#343: Minecraft Hacking With PYTHON And Log4j Netcat Reverse Shell Exploiting CVE

Minecraft hacking with PYTHON and Log4j // Netcat reverse shell exploiting CVE Create your own virtual machine on Linode with $100 credit: https://davidbombal.wiki/linode * Thanks to Linode for sponsoring this video! It's really important that you update your servers to no longer use vulnerable versions of log4j. // MENU // 0:00 ▶️ Introduction 1:45 ▶️ Topology and overview of problem 3:10 ▶️ Demo of rickroll attack 5:48 ▶️ Netcat reverse shell attack demo 9:17 ▶️ Entire process on a new cloud server // SCRIPTS // Get the code here: https://github.com/davidbombal/log4jm... // MINECRAFT SETUP // https://davidbombal.wiki/minecraftw11... // JOHN's VIDEO // John Hammond: https://youtu.be/7qoPDq41xhQ // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // MY STUFF // Monitor: https://amzn.to/3yyF74Y More stuff: https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com minecraft python log4j cve-2021-44228 java java log4j Log4jRCE.java RCE Log4Shell minecraft log4j minecraft windows 11 minecraft windows minecraft server reverse shell windows windows 11 windows 10 real time protection windows anti virus windows real time protection python windows windows python Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #log4j #minecraft #python

22 Joulu 202116min

#342: Python Keylogger Bypasses Windows 11 Defender |Convert WIFI Py To EXE

#342: Python Keylogger Bypasses Windows 11 Defender |Convert WIFI Py To EXE

Python keylogger bypasses Windows 11 Defender // Convert WIFI py to EXE Learn how to convert your Python code to run as an EXE on Windows 11. The code will run on Windows without Python installed. So, you think you need Python installed to run Python code on Windows 11? Well, think again. You also think that Windows 11 real time protection will protect you against malicious code? Well think again! Warning: Don't download software that you don't trust. Only download software from reputable software developers and those you trust. // MENU // 0:00 ▶️ Introduction: Warning 2:03 ▶️ Windows 11 setup: Python not installed, Windows version, anti-virus 3:12 ▶️ Demo of python code running on Windows 11: 5:42 ▶️ Demo of WiFi code 6:47 ▶️ Nuitka installation steps 10:27 ▶️ Compile Python code 13:52 ▶️ Run compiled code on Windows 11 14:25 ▶️ Be aware of Python requirements that you need to install // SCRIPTS // Python key: https://davidbombal.wiki/pythonkeys Python WiFi: https://davidbombal.wiki/pythonwifi // PDF Instructions// Download here: https://davidbombal.wiki/pythoncompile // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com python py to exe py exe python py to exe python exe compile python python compile python exe python convert to exe python convert py to exe python py exe python code windows windows 11 windows 10 anti virus real time protection windows anti virus windows real time protection windows 11 protection windows 11 python python compile compile python code compile python python windows windows python nuitka nuitka python nuitka windows 11 windows 11 exe nuitka compile Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #python #keylogger #wifi

22 Joulu 202117min

#341: Extract IPhone And Android EXIF Metadata From Online Photos Using PYTHON OSINT With Kali Linux

#341: Extract IPhone And Android EXIF Metadata From Online Photos Using PYTHON OSINT With Kali Linux

Extract iPhone and Android EXIF metadata from online photos using PYTHON // OSINT with Kali Linux Can you find out the locations of my photos? Put it in the comments below. You need to learn to code! Learn Python. You are going to be very powerful and very scary if you combine knowledge of IT with Python scripting! But, do good. // MENU // 0:00 ▶️ Introduction - why this is important 1:19 ▶️ Why you want to use this Python Script 1:52 ▶️ Online Example 2:35 ▶️ Python exe file version for Windows 2:59 ▶️ Demo of extracting exif data 6:08 ▶️ Script versus other applications 7:09 ▶️ Python exif csv script 7:45 ▶️ Remove exif data Python script 9:07 ▶️ Python is not installed on the Windows computer 9:39 ▶️ Python demo on Kali Linux - installing required software 12:20 ▶️ Create Python script on Kali Linux 13:40 ▶️ exif script demo on Kali Linux 14:36 ▶️ Remove exif script demo on Kali Linux // PHOTOS // Check my photos here: https://www.flickr.com/photos/1944199... // SCRIPTS // Python Exif script: https://davidbombal.wiki/pythonexif Python Exif CSV script: https://davidbombal.wiki/pythonexifcsv Python Remove Exif script: https://davidbombal.wiki/pythonexifre... // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com python exif osint iphone android exiftool exif data exiftool windows 11 exiftool kali linux kali linux exif data iphone exiftool mac exif data android exif viewer gps gps data iphone gps tracker iphone gps android gps apple gps exof osint tools osint python python hacking hacking ethical hacking hacker,data from images metadata meta data geotags gps coordinates gps coordinates app gps coordinates iphone photo location find photo location exif data online Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #exif #osint #kalilinux

9 Joulu 202117min

#340: Decrypting TLS, HTTP 2 And QUIC With Wireshark

#340: Decrypting TLS, HTTP 2 And QUIC With Wireshark

Decrypting TLS, HTTP/2 and QUIC with Wireshark Learn how to decrypt HTTPS, TLS and the new QUIC protocol. // MENU // Introduction: 0:00 What is HTTPS vs HTTP2 vs QUIC: 1:25 What is QUIC: 6:30 How long have we been using QUIC: 9:42 Technical tour of QUIC: 10:12 Why use QUIC instead of TCP: 14:18 QUIC negotiation and support: 17:48 Steps to decrypt TLS: 19:04 Is Wireshark useless without the decryption keys: 20:04 MITM: 22:16 Advice on how do I learn Wireshark: 23:47 TCP/IP Illustrated book: 25:40 Rather focus on learning protocols instead of Wireshark: 25:54 Next video ideas: 26:35 // LINKS // PCAP file: https://davidbombal.wiki/ssldecryptio... Previous video: https://youtu.be/GMNOT1aZmD8 How to Decrypt SSL with Wireshark – HTTPS Decryption Guide: https://davidbombal.wiki/sslwireshark Man in the middle Python script: https://youtu.be/O1jpck31Ask Chris shows TLS decryption: https://youtu.be/5qecyZHL-GU Chris Intro to Wireshark: https://youtu.be/OU-A2EmVrKQ // MY STUFF // https://www.amazon.com/shop/davidbombal // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal //CHRIS GREER // LinkedIn: https://www.linkedin.com/in/cgreer/ YouTube: https://www.youtube.com/c/ChrisGreer Twitter: https://twitter.com/packetpioneer Pluralsight: TCP Analysis Course: https://davidbombal.wiki/tcpwireshark // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com wireshark quic http2 http https tls ssl https decryption quic decryption tls decryption wireshark tls wireshark ssl https wireshark tls wireshark ssl wireshark ccna cisco ccna Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #quic#tls #wireshark

30 Marras 202127min

#339: Black Friday Giveaway  HTB, HAK5, CCNA Live Training And More

#339: Black Friday Giveaway HTB, HAK5, CCNA Live Training And More

Black Friday Giveaway: HTB, HAK5, CCNA Live Training and more NOTE: You can still win. Winners will only be selected next week. // GIVEAWAYS // Hack The Box: https://davidbombal.wiki/htbbf Hak5: https://davidbombal.wiki/hak5bf Alfa Network: https://davidbombal.wiki/alfabf Boson Bombal 8 weeks to CCNA: https://davidbombal.wiki/bosonbfccna Boson NetSim: https://davidbombal.wiki/bosonbfnetsim Boson ExSim: https://davidbombal.wiki/bosonbfexsim Blue Team Level 1: https://davidbombal.wiki/blueteambf // Buy Hak5 coolness // Buy Hak5: https://davidbombal.wiki/gethak5 // Buy Courses for $9.99 // CCNA: https://davidbombal.wiki/ccna999 Wirehark: https://davidbombal.wiki/wireshark999 CompTIA Network+: https://davidbombal.wiki/network999 Ethical Hacking: https://davidbombal.wiki/hack999 CCNP ENCOR: https://davidbombal.wiki/ccnpencor999 CCNP ENARSI: https://davidbombal.wiki/ccnpenarsi999 // Buy Hack The Box products // HTB Academy: https://davidbombal.wiki/htbacademy HTB: https://davidbombal.wiki/htb // Buy Boson products // Bombal CCNA Course: https://davidbombal.wiki/bosonbombal ExSim: https://davidbombal.wiki/bosonexsim NetSim: https://davidbombal.wiki/bosonnetsimdb // Buy Alfa products // https://www.amazon.com/shop/davidbomb... // MY STUFF // https://www.amazon.com/shop/davidbombal // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com hak5 alfa alfa networks ceh aws azure ccsp boson boson exsim boson netsim ccna cisco ccna blue team level 1 security blue team AWUS036ACH AWUS036ACHM AWUS036ACM AWUS036EACS Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hackthebox #hak5 #kalilinux

29 Marras 20219min

#338: Thanksgiving Giveaway! You Can Still Win Some Of The Giveaway

#338: Thanksgiving Giveaway! You Can Still Win Some Of The Giveaway

Thanksgiving Giveaway! You can still win some of the giveaways 😀 IMPORTANT: Watch the full video so you can find the links to enter the competitions. Winners still need to be selected for Hak5, Boson, AWS, Blue Team, David Bombal membership etc. You can still win those. 😀 // Buy Kevin's Master Class here // CCNP ENCOR MasterClass: https://www.kwtrain.com/encor-live // Buy Hak5 coolness // Buy Hak5: https://davidbombal.wiki/gethak5 // Buy Courses for $9.99 // CCNA: https://davidbombal.wiki/ccna999 Wirehark: https://davidbombal.wiki/wireshark999 CompTIA Network+: https://davidbombal.wiki/network999 Ethical Hacking: https://davidbombal.wiki/hack999 CCNP ENCOR: https://davidbombal.wiki/ccnpencor999 CCNP ENARSI: https://davidbombal.wiki/ccnpenarsi999 // MY STUFF // https://www.amazon.com/shop/davidbombal // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com hak5 apple ceh aws azure ccsp comptia comptia network+ boson boson exsim boson netsim ccna cisco ccna kevin wallace Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hak5 #aws #ccna

25 Marras 20217min

#337: HTTPS Decryption With Wireshark | Website TLS Decryption

#337: HTTPS Decryption With Wireshark | Website TLS Decryption

HTTPS Decryption with Wireshark // Website TLS Decryption NOTE: Jump to 24:17 if you are only interested in the Wireshark capture and SSL decryption technical explanation. You can also follow along by downloading the Wireshark pcap using the link below. Learn how to decrypt TLS / HTTPS traffic using Wireshark. // MENU // Is it important to learn Wireshark: 0:00 Will you get a better job? 2:19 Welcome Chris: 3:16 Defcon presentation: 3:40 Why TLS decryption: 5:44 Wireshark capture: 7:20 What is SSL and TLS: 8:26 How do you get the capture (Man in the middle): 9:44 Key exports for Wireshark: 11:03 Which keys are stored in the keylog: 13:56 Client and server key generation: 15:55 Process - keys and wireshark: 18:10 Wireshark capture explained: 21:00 TLS negotiation and Wireshark details: 24:17 How to import the keys into Wireshark: 29:04 // LINKS // PCAP file: https://davidbombal.wiki/ssldecryptio... How to Decrypt SSL with Wireshark – HTTPS Decryption Guide: https://davidbombal.wiki/sslwireshark Man in the middle Python script: https://youtu.be/O1jpck31Ask Chris TLS decryption: https://youtu.be/5qecyZHL-GU Intro to Wireshark: https://youtu.be/OU-A2EmVrKQ // MY STUFF // https://www.amazon.com/shop/davidbombal // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal //CHRIS GREER // LinkedIn: https://www.linkedin.com/in/cgreer/ YouTube: https://www.youtube.com/c/ChrisGreer Twitter: https://twitter.com/packetpioneer Pluralsight: TCP Analysis Course: https://davidbombal.wiki/tcpwireshark // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com wireshark tls ssl http https https decryption tls decryption wireshark tls wireshark ssl https wireshark tls wireshark ssl wireshark ccna cisco ccna Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #wireshark #tls #https

25 Marras 202131min

#336: Is Cisco any better than Ubiquiti WiFi?

#336: Is Cisco any better than Ubiquiti WiFi?

How easy is it to configure the Cisco Small Business Access Points? Better than Ubiquiti? Does Cisco even care about small businesses? Do they have products that help small, medium business with their network requirements. How good are their wifi products? // Menu // Introduction 0:00 Comparison to Unfi: 1:10 Unbox Cisco 140AC Access Point: 2:26 Cisco Phone Apps: 4:50 New Site Wizard: 5:51 WiFi settings: 7:19 Management network: 9:44 Add 140AC Access Point to the site: 10:17 Unbox Cisco 142ACM Mesh Extender: 11:58 Cisco 140AC setup completed: 13:42 Test WiFi network: 15:00 Add Cisco CBS250 switch via phone app: 15:50 Add Mesh Extender to the network: 16:56 Upgrade firmware of switches and access points: 18:20 What do you think? 19:19 // Links // Cisco Business website: http://davidbombal.wiki/ciscobusiness Cisco Store on Amazon: http://davidbombal.wiki/ciscoamazon Which one should I buy? Cisco product selector: http://davidbombal.wiki/productselect... // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com wifi cisco wifi wifi small business cisco wifi smb smb wifi cisco wireless cisco business cisco business switches cisco 250 switch cisco small business cisco 350 switch cisco 1000 switch ubiquiti unifi ccna cisco ccna ccna 200-301 cisco business 140ac cisco business model cisco business 140ac review cisco 142ac cisco 142acm cisco 140ac cisco 140 access point cisco 250 smart switches cisco 350 smart managed switches cisco 220 smart switchs cisco 110 switches unmanaged switch Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #wifi #cisco #ubiquiti

22 Marras 202120min