#510: 20–30% Of Attacks Use AI: John Hammond details today’s hybrid attacks

#510: 20–30% Of Attacks Use AI: John Hammond details today’s hybrid attacks

To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you’ll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond’s SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond’s Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Avsnitt(500)

#78: GNS3 API: Jeremy explains how the API works

#78: GNS3 API: Jeremy explains how the API works

Jeremy Grossmann (creator of GNS3) discusses the GNS3 API with David Bombal. How it works, what you can do with it and where to learn more information. All communication in GNS3 uses HTTP using the JSON format. GNS3 API documentation: http://api.gns3.net/en/latest/ David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #GNS3 #RESTAPI #GNS3API

2 Sep 20199min

#77: Jeremy explains the GNS3 2.2 Architecture

#77: Jeremy explains the GNS3 2.2 Architecture

How does the GNS3 work? Jeremy (creator of GNS3) explains the GNS3 architecture. Note: The Server component is also called the Compute Server or Compute. GNS3 consists of four parts: - the user interface or GUI (gns3-gui or gns3-web projects) - the controller (gns3-server project) - the compute server (part of the gns3-server project) - the emulators (Qemu, Dynamips, VirtualBox…) The controller pilots everything, it manages the state of each project. Only one controller should run. The GUI displays a topology representing a project on a canvas and allow to perform actions on given project, sending API requests to the controller. The compute controls emulators to run nodes. A compute that is on the same server as the controller is the same process. The compute usually starts an emulator instance for each node. GNS3 Architecture: https://gns3-server.readthedocs.io/en/latest/general.html David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com

2 Sep 201913min

#76:  GNS3: Docker containers vs Virtual Machines

#76: GNS3: Docker containers vs Virtual Machines

Why would you use Docker containers rather than Virtual Machines (VMs) in GNS3? Which is best? And which hypervisor should you use? VMware or VirtualBox? What about QEMU? Jeremy (creator of GNS3) shares his advice on what you should be using. Docker Persistent containers: https://youtu.be/K-iAD8B5noM David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #gns3 #docker #vmware

2 Sep 20198min

#75: GNS3: What is QEMU? And IOU? And ASA 8.x?

#75: GNS3: What is QEMU? And IOU? And ASA 8.x?

What are QEMU and IOU devices in GNS3? What does Jeremy (GNS3 Creator) recommend we use? Does QEMU only support VIRL? Or are other vendors supported? What about ASA 8.x? Is that supported? #gns3 #virl #iou

30 Aug 20197min

#74:  Will Dynamips and VPCS be removed from GNS3?

#74: Will Dynamips and VPCS be removed from GNS3?

David Bombal talks to Jeremy Grossmann (creator of GNS3) about the future of GNS3. Here we discuss Dynamips and VPCS and their future in GNS3. Will they be removed from GNS3? Are they recommended? What do they actually do? What should be used instead of them? Does Dynamips support switching? In future videos we will discuss additional options in gns3 such as Cisco VIRL and IOU. Menu: 0:12 - Devices in GNS3. It can be confusing. What is Dynamips 0:57 - Does GNS3 support switching? 1:17 - Are they real IOS images? 1:47 - Issue 1: Where do I get Cisco images? Cisco restrictions. 2:07 - Issues 2: Only older versions of Cisco IOS are supported on a lot of platforms 2:11 - Is it stable? Issue 3: More memory and processor intensive 2:25 - What is Idle PC Value 4:23 - Advantage 1: Supports serial interfaces 4:50 - Dynamips is a dying product 5:00 - You can run Dynamips locally 5:40 - What does Jeremy recommend we use? 5:50 - Switching in Dynamips? 7:18 - Will Dynamips be removed from GNS3? 7:48 - What is VPCS? 8:28 - What is the advantage of VPCS? 8:55 - Should we be using VPCS? 9:58 - Will VPCS be removed from GNS3? David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #gns3 #dynamips #virl

26 Aug 201911min

#73:  Wireshark Tutorial - Profiles and Password captures

#73: Wireshark Tutorial - Profiles and Password captures

In this Wireshark Tutorial, I demonstrate show you how to leverage Wireshark Profiles to sniff traffic and capture passwords and better utilize the Wireshark interface. Save time! Get my full Wireshark Course for $10 here on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb 🔬Download the Wireshark pcagng file here and follow along: http://bit.ly/WiresharkProfiles 🔥🔥Wireshark Course 🔥🔥 Full Wireshark Course for $10 on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb David’s details: YouTube: https://www.youtube.com/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com #wireshark #wiresharktutorial #wiresharksniffing

22 Aug 20199min

#72: Wireshark Tutorial - Installation and Password sniffing

#72: Wireshark Tutorial - Installation and Password sniffing

In this Wireshark Tutorial, I demonstrate how to install Wireshark and then capturing packets with Wireshark. Get my full Wireshark Course for $10 here on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb I analyze Telnet and HTTP in this video. In other videos and in my course I'll show you how to capture passwords from FTP and other protocols. You can find Wireshark at: http://wireshark.org My Wireshark Ethical Hacking course: http://bit.ly/2IXZnn8 #wireshark #ethicalhacking #wiresharktutorial

19 Aug 201911min

#71:  Visio Alternative? GNS3 interactive topology diagrams

#71: Visio Alternative? GNS3 interactive topology diagrams

Is this a replacement for Visio? GNS3 now allows you to create interactive topology diagrams. You can create topologies consisting of both physical and virtual devices and get them to communicate with each other. Will gns3 replace visio? How will you make the most use of this new feature in gns3? #gns3 #visio #ccna

15 Aug 201912min

Populärt inom Teknik

uppgang-och-fall
elbilsveckan
rss-racevecka
market-makers
skogsforum-podcast
rss-elektrikerpodden
bilar-med-sladd
bosse-bildoktorn-och-hasse-p
natets-morka-sida
rss-laddstationen-med-elbilen-i-sverige
bli-saker-podden
rss-uppgang-och-fall
rss-veckans-ai
har-vi-akt-till-mars-an
rss-technokratin
solcellskollens-podcast
developers-mer-an-bara-kod
mediepodden
teknikveckan
rss-fabriken-2