Watch full video on YouTube

About the author

David Bombal

    • 1 month ago

    10:30 editors deserve a raise

    • 1 month ago

    Amazing

    • 1 month ago

    Jupyter for notes

    • 1 month ago

    I have a question, does Kasm hide my browsing history from my ISP?

    • 1 month ago

    I luv it, David's guest holds up at Tim Hortons coffee cup @53:00 minutes into the interview 😂😂😂❤❤😅

    • 1 month ago

    Hey David, you're an incredible human being, however I want to ask you… Why do you use Google in a video where the content is privacy? I know people in cybersecurity prefer other search engines to avoid being fingerprinted, and most of us in this space don't want our data to be sold to 3rd parties.

    Note: I don't want to sound hostile, just a curious person.

    • 1 month ago

    Great segment 🙌😎

    • 1 month ago

    How does this compare to Qubes OS?

    • 1 month ago

    THAT IS ALL BS ASK AN E ABOUT IT…

    • 1 month ago

    Thanks David, this is amazing. Time to retire proxychains stuffs. OSINT is always an amazing subject to dive in.

    • 1 month ago

    the reason i say this is that tinder profile said 23 years old and the source code said 2000

    • 1 month ago

    also im a huge fan but i cant help but feel like this video is from a year ago

    • 1 month ago

    hey so I've got a question during the tinder part she showed that the birthdate is open to see . however when trying to recreate the scenario with multiple different accounts the year was correct however the month and date were the same. anyone know why that is?

    • 1 month ago

    You. Are. Not. Invisible. Online.

    • 1 month ago

    I use windows 10 built in sandbox

    • 1 month ago

    This channel keeps getting better. The value is just incredible.

    • 1 month ago

    michael this is dod and u.s fed client there is absolutely no way you can use this source to do anything secure.
    cmon man why are you pushing a u.s govt contractor

    • 1 month ago

    1:06 BROO
    THAT'S MY IP ADDRESS 💀💀

    • 1 month ago

    Great info. Kasm is a good resource. Do you have the same disposable container space when using and shutting down OS's in something like Virtualbox or Parallels Desktop?

    • 1 month ago

    The best way to be invisible is to be offline.

    • 1 month ago

    BRO DO A VIDEO ABOUT CYBERSECURITY FREELANCE

    • 1 month ago

    So without watching the whole video I assume we are simply talking about isolated browsing and Virtual Machines, glorified as a SASS?
    Using a VPN = hidden from the majority of web users from knowing your true IP.
    Browsers = Use private tabs / browsing ad blocking etc, unlikely to get infected via cross scripting.
    AV/VM = use of antivirus and / or virtual machine will protect you from most infections from attacking your machine (zero day, more complex and even VM's (cloud or not) are not exactly safe because if the pc is infected and you are talking to that machine you have an open channel that could have a service which may be compromised.

    In short, security is never going to be easy it's cat and mouse, period.

    These new threats are still better than our "new AV / IDS" they are still leaning on patterns heavily to sample and detect new threats which often creates many false positives and still is allowing the better of the infections to get in, including and most worryingly social engendering attacks. Although I must admit Microsoft's latest 365 email security is rather impressive.

    • 1 month ago

    bro is that 5gb wtf

    • 1 month ago

    david, what data does kasm keep/monitor and what is their obligations to hand it over to the said authorities protecting our society.

    • 1 month ago

    Dit bestaat al meer dan 10 jaar wat een nieuwe uitvinding ?

    • 1 month ago

    But what do you do if you don't want your traffic to appear in Germany or India? Can you select a specific region?

    • 1 month ago

    Ummm, what about your ISP???

    • 1 month ago

    Dave Bombal is a fed 😂 and his fanboy are wanabe hackers 😂 hillarious people

    • 1 month ago

    Definitely would like to hear more on the subject

    • 1 month ago

    where you get 4.2 gbps?:DDD

    • 1 month ago

    Correction to your info: Actually there are emails and text messages that can infect your phone without clicking on links or opening them. And it isn't sufficient to merely avoid clicking links in email. There are emails you shouldn't even open. Your info is very behind the times.

    • 1 month ago

    ⭐️

    • 1 month ago

    Very interesting topic. I like hunting online so this has peaked my curiosity.

    • 1 month ago

    So basically kasm is a tails os container.

    Free made paid.

    • 1 month ago

    Lol. Just dont join tinder lmao 😂😂

    • 1 month ago

    Can anyone help me
    I have capture the handshake file wifi wpa2
    And I am trying to crack it using rockyou.txt
    But the password doesn't exist in rockyou.txt and other wordlist wifite and etc
    Can anyone have solution how i crack my nabour wifi password please 🥺

    • 1 month ago

    Big shoutout to KASM for sponsoring this video. KASM workspaces supports the OSINT Community Efforts by providing the following products:
    Kasm Community Edition: https://kasmweb.com/community-edition
    Kasm Cloud OSINT: https://kasmweb.com/cloud-personal
    Kasm Workspaces OSINT Platform for Professionals/: https://kasmweb.com/osint
    Kasm Infrastructure/Apps for OSINT Collection: https://registry.kasmweb.com/1.0/

    // MJ Banias’ SOCIALS //
    LinkedIn: https://www.linkedin.com/in/mjbanias
    Cloak and Dagger Podcast (Spotify): https://open.spotify.com/show/6mT8zDMBq5gOfAVZi47pT3
    The Debrief: https://thedebrief.org/podcasts/
    Instagram: https://www.instagram.com/mjbanias/
    X: https://x.com/mjbanias
    Website: https://www.bullshithunting.com/

    // Ritu Gill’ SOCIALS //
    LinkedIn: https://www.linkedin.com/in/ritugill-osinttechniques/
    OSINT Techniques website: https://www.osinttechniques.com/
    Instagram: https://www.osinttechniques.com/
    X: https://x.com/osinttechniques
    YouTube: https://www.youtube.com/@ForensicOSINT
    Forensic OSINT website: https://www.forensicosint.com/
    TikTok: https://www.tiktok.com/@osint.techniques

    // Rae Baker’s SOCIALS //
    Website: https://www.raebaker.net/
    LinkedIn: linkedin.com/in/raebakerosint
    X: https://x.com/wondersmith_rae

    // Eliot Higgins’ SOCIALS //
    Bellingcat website: https://www.bellingcat.com/author/eliothiggins/
    X: https://x.com/eliothiggins

    // Books //
    The UFO People: A Curious Culture by MJ Banias:
    USA: https://amzn.to/3xP5Jme
    UK: https://amzn.to/4cOrzoK

    Deep Dive: Exploring the Real-world Value of Open Source Intelligence by Rae Baker and Micah Hoffman:
    USA: https://amzn.to/3xFN9gv
    UK: https://amzn.to/3zJSy6z

    We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News by Eliot Higgins:
    USA: https://amzn.to/3RXNa64
    UK: https://amzn.to/4cvYP4B

    // YouTube video REFERENCE //
    Top 10 FREE OSINT tools (with demos): https://youtu.be/PRqOj5qM1ic
    Deep Dive OSINT: https://youtu.be/dxiNByvkvU8
    Best Hacking Python Book: https://youtu.be/2B76CTbi72w
    She Hacked Me: https://youtu.be/U6pDqFhN82I

    // David's SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    X: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube: https://www.youtube.com/@davidbombal

    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

    // MENU //
    00:00 – Coming up
    00:4100:41 – Sponsored Section: KASM Workspaces demo
    06:26 – Intro
    06:46 – MJ’s Journey in OSINT
    11:14 – Starting an OSINT Company
    11:55 – Teaching Background
    12:34 – Years in OSINT
    13:19 – Advice for People Starting Out
    15:44 – What It Means to Do OSINT
    16:54 – Recommended Tools for OSINT
    19:03 – Meet Ritu Gil
    19:09 – Characteristics of a Good OSINT Investigator
    20:03 – Knowing When to Give Up
    20:43 – Soft Skills vs Technical Skills
    22:17 – Ritu’s Advice on How to Get Started
    23:24 – Are There Jobs in OSINT?
    24:39 – Forensic OSINT Demo
    26:41 – Tinder Vulnerabilities
    30:51 – Next Guest Intro
    32:04 – Rae Baker
    32:33 – Tools Rae Uses
    34:11 – From Graphic Design to OSINT
    37:56 – Volunteering to Learn
    39:10 – Next Guest Intro
    40:10 – Eliot Higgins
    40:19 – Eliot’s Background into OSINT
    41:44 – Bellingcat
    44:27 – No Degree Needed to Start
    45:37 – Useful Tools to Use
    47:19 – Advice for People Starting Out
    48:36 – Communities to Join
    51:50 – Recommended Books
    53:03 – How MJ Got the Job
    55:53 – MJ Shares an OSINT Story
    01:02:44 – Importance of a Team
    01:08:15 – Conclusion
    01:10:34 – Outro

    osint
    open-source intelligence
    open source intelligence tools
    osint curious
    geolocation
    geolocation game
    facebook
    instagram
    google
    bing
    yandex
    geolocation google
    geolocation bing
    you cannot hide
    social media
    warning about social media
    google dorks
    dorks
    google
    osintgram
    osint framework
    osint tools
    osint tv
    osint ukraine
    osint tutorial
    osint course
    osint instagram
    osint framework tutorial
    cyber security
    information security
    open-source intelligence
    open source intelligence
    sans institute
    cybersecurity training
    cyber security training
    information security training
    what is osint
    open source artificial intelligence
    cyber
    hack
    privacy
    nsa
    oscp
    ceh

    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    Disclaimer: This video is for educational purposes only.

    #osint #cyber #privacy

    • 1 month ago

    David pls make video on how to access kali through wan using ssh

    • 1 month ago

    I'm 15 years into linux and python now and its a journey

    • 1 month ago

    BRAVE WAS ACTUALLY COMPROMISED BY RANSOMWARE GROUPS? ? AND, THAT IS THE TRUTH…

    • 1 month ago

    Hi David university accepted me for both Cyber Security and AI engineering. What would you recommend me to do? I’m interested in both now i have to decide😩

    • 1 month ago

    This is good. That Forensic Tool is like OSIRT. Perfect for OSINT Forensics Investigations and LE Investigations. Good thing with OSIRT is that it can create for you a unique hash as well, but I’m not familiar with Forensic OSINT though. Thanks very much for this. Very helpful and informative.

    • 1 month ago

    David you are also no less high profile. You should also share how you maintain your privacy online.

    • 1 month ago

    Ritu Gil?? Who's her Dad, Obi Wan Kenobi? …I think I love her. 🥰🥰🥰

    • 1 month ago

    You can't be in a tech mono culture the US is.

    • 1 month ago

    Hello David, I very like OTW. Can you and him do video with Metasploit because it's really difficult tool. Thanks )

    • 1 month ago

    If you can’t erase yourself, put out as much false information as you can. Those ad survey sites are a good place to start. When I get looked up all the real information is gone, and my age etc are all wrong including my address

Leave feedback about this

  • Quality
  • Price
  • Service
Choose Image