OPERATING SYSTEMSOS Linux

Next Gen Hacker?

Get Proton VPN for free: https://davidbombal.wiki/protonvpn4

Big thanks to Proton for Sponsoring the video!

Time waits for no one … don’t wait… start your journey today. Gavin shows us that being young is no barrier to entry. No matter how old or young you are, start learning today and change all your tomorrows.

// Gavin’s SOCIAL //
Twitter / X: https://twitter.com/atomiczsec
Discord: https://discord.com/invite/VNYsP6zVjg
GitHub: https://github.com/atomiczsec
YouTube: https://www.youtube.com/channel/UCO3HJD9va6b2gJSZyxLxExg

// David SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// MENU //
00:00 – Coming Up
00:40 – Sponsored Section
01:35 – Intro
01:41 – Gavin’s Backstory
03:56 – Bug Bounty
08:16 – How Gavin Learned Hacking
11:47 – Insecure Direct Object Reference (IDOR)
14:21 – HackerOne
14:58 – IDOR Example
18:11 – Informantion Disclosure
19:01 – Business Logic Errors
21:50 – The Race Condition
22:34 – Gavin’s Advise for the Youth
24:47 – Gavin’s Learning Process
26:54 – Favourite Payloads
29:14 – Gavin’s Journey
34:42 – What Can the Next Genereation Offer?
36:44 – Can A.I Help Write Reports?
39:19 – Last Advice
42:02 – Conclusion
42:38 – Outro

// Detailed Timestamps //
00:01 – The discussion opens with thoughts on how the world has evolved, offering new career paths like gaming and hacking, especially for the younger generation.
01:09 – Proton VPN sponsored segment.
02:07 – Gavin recounts his early hacking endeavours and the support he received from his school’s computer lab teacher.
03:01 – Gavin talks about his first major security discovery and the financial reward he received for it.
03:49 – Gavin’s journey into bug bounties is highlighted, marked by self-learning through YouTube and hands-on practice, bypassing formal courses.
04:39 – Talk about the financial benefits of bug bounties for young hackers and how Gavin profited from this avenue.
05:02 – Gavin recalls discovering a security flaw in high school and the $1000 bounty he earned from it.
08:05 – Gavin talks about his interests in cybersecurity beyond hacking, including collaboration with Jakoby on bad USB payloads.
09:49 – Gavin provides examples of vulnerabilities he explored, like IDORs and business logic errors, and shares hunting strategies.
11:58 – Gavin demonstrates a vulnerability in a calculator site, revealing personal information access.
12:08 – Discussion on business logic errors in cybersecurity, with Gavin sharing his experiences and tips for identifying and exploiting these issues.
13:17 – Gavin explains how he found a bug in a trading platform simulation, leading to an infinite virtual money gain.
14:27 – Gavin describes exploiting a race condition in a team management platform to bypass member limits.
16:14 – The discussion shifts to networking in cybersecurity, and Gavin highlights the role of platforms like Discord and Twitter.
17:45 – Gavin credits Cosmodium and Jakoby for aiding his cybersecurity journey and stresses networking’s importance.
19:08 – Gavin discusses using AI tools like ChatGPT to improve bug reporting and communication skills.
21:37 – Conversation about career evolution, the significance of following one’s passion and skills.
22:06 – Gavin talks about his learning and networking approach, along with active participation in the cybersecurity community.
26:41 – Gavin discusses the advantages his generation has with technology familiarity and the challenges of being young in cybersecurity.
27:27 – He reflects on his experiences and the importance of effective communication in gaining respect.
28:08 – Gavin expresses gratitude towards his parents and advises the younger generation to follow their passions.
28:50 – He talks about the significance of networking and building connections in the industry.
29:32 – Discussion about Gavin’s strategy for connecting with established figures in cybersecurity.
30:10 – Gavin reflects on overcoming age-related barriers in the industry through skill demonstration and dedication.
31:33 – Gavin speaks about the benefits of being raised in a tech-rich era and the need to blend traditional and modern learning methods.
32:16 – He acknowledges his parents’ role in his journey and the importance of supportive family environments.
33:44 – Gavin advises young cybersecurity enthusiasts to persist, learn continuously, and embrace practical experiences.
35:10 – The interview concludes with Gavin expressing optimism about the future of cybersecurity and encouraging exploration in the field.

#cybersecurity #hacker #2024

source

by David Bombal

linux foundation

31 thoughts on “Next Gen Hacker?

  • Get Proton VPN for free: https://davidbombal.wiki/protonvpn4

    Big thanks to Proton for Sponsoring the video!

    Time waits for no one … don't wait… start your journey today. Gavin shows us that being young is no barrier to entry. No matter how old or young you are, start learning today and change all your tomorrows.

    // Gavin's SOCIAL //
    Twitter / X: https://twitter.com/atomiczsec
    Discord: https://discord.com/invite/VNYsP6zVjg
    GitHub: https://github.com/atomiczsec
    YouTube: https://www.youtube.com/channel/UCO3HJD9va6b2gJSZyxLxExg

    // David SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube: https://www.youtube.com/@davidbombal

    // MY STUFF //
    https://www.amazon.com/shop/davidbombal

    // MENU //
    00:00 – Coming Up
    00:40 – Sponsored Section
    01:35 – Intro
    01:41 – Gavin's Backstory
    03:56 – Bug Bounty
    08:16 – How Gavin Learned Hacking
    11:47 – Insecure Direct Object Reference (IDOR)
    14:21 – HackerOne
    14:58 – IDOR Example
    18:11 – Informantion Disclosure
    19:01 – Business Logic Errors
    21:50 – The Race Condition
    22:34 – Gavin's Advise for the Youth
    24:47 – Gavin's Learning Process
    26:54 – Favourite Payloads
    29:14 – Gavin's Journey
    34:42 – What Can the Next Genereation Offer?
    36:44 – Can A.I Help Write Reports?
    39:19 – Last Advice
    42:02 – Conclusion
    42:38 – Outro

    // Detailed Timestamps //
    00:00 – The discussion opens with thoughts on how the world has evolved, offering new career paths like gaming and hacking, especially for the younger generation.
    01:09 – Proton VPN sponsored segment.
    02:07 – Gavin recounts his early hacking endeavours and the support he received from his school's computer lab teacher.
    03:01 – Gavin talks about his first major security discovery and the financial reward he received for it.
    03:49 – Gavin's journey into bug bounties is highlighted, marked by self-learning through YouTube and hands-on practice, bypassing formal courses.
    04:39 – Talk about the financial benefits of bug bounties for young hackers and how Gavin profited from this avenue.
    05:02 – Gavin recalls discovering a security flaw in high school and the $1000 bounty he earned from it.
    08:05 – Gavin talks about his interests in cybersecurity beyond hacking, including collaboration with Jakoby on bad USB payloads.
    09:49 – Gavin provides examples of vulnerabilities he explored, like IDORs and business logic errors, and shares hunting strategies.
    11:58 – Gavin demonstrates a vulnerability in a calculator site, revealing personal information access.
    12:08 – Discussion on business logic errors in cybersecurity, with Gavin sharing his experiences and tips for identifying and exploiting these issues.
    13:17 – Gavin explains how he found a bug in a trading platform simulation, leading to an infinite virtual money gain.
    14:27 – Gavin describes exploiting a race condition in a team management platform to bypass member limits.
    16:14 – The discussion shifts to networking in cybersecurity, and Gavin highlights the role of platforms like Discord and Twitter.
    17:45 – Gavin credits Cosmodium and Jakoby for aiding his cybersecurity journey and stresses networking's importance.
    19:08 – Gavin discusses using AI tools like ChatGPT to improve bug reporting and communication skills.
    21:37 – Conversation about career evolution, the significance of following one's passion and skills.
    22:06 – Gavin talks about his learning and networking approach, along with active participation in the cybersecurity community.
    26:41 – Gavin discusses the advantages his generation has with technology familiarity and the challenges of being young in cybersecurity.
    27:27 – He reflects on his experiences and the importance of effective communication in gaining respect.
    28:08 – Gavin expresses gratitude towards his parents and advises the younger generation to follow their passions.
    28:50 – He talks about the significance of networking and building connections in the industry.
    29:32 – Discussion about Gavin's strategy for connecting with established figures in cybersecurity.
    30:10 – Gavin reflects on overcoming age-related barriers in the industry through skill demonstration and dedication.
    31:33 – Gavin speaks about the benefits of being raised in a tech-rich era and the need to blend traditional and modern learning methods.
    32:16 – He acknowledges his parents' role in his journey and the importance of supportive family environments.
    33:44 – Gavin advises young cybersecurity enthusiasts to persist, learn continuously, and embrace practical experiences.
    35:10 – The interview concludes with Gavin expressing optimism about the future of cybersecurity and encouraging exploration in the field.

  • IM from Indonesian Darknet support new era generation hacker

  • Oh what a fuggin GENIUS. Being young and a hacker xD sooooooo innovative David.

  • It is impossible to hack physical keys. It's like the entire world wants to be hacked. It's mind blowing.

  • This guy is great! Happy to hear he will be going places!

  • i been in this game a long time and this kid is a stud….BRAVO young man.

  • I am 12.i know some hacking
    I think I can do bug bounty kinda things

  • hello sir, i want to make a career in clod computing and specifically in solutions architect role do i need to have a networking knowledge to become solutions architect associate if yes the which networking certification should i go for and on which topics i should focus more??

  • Boss, could you please create a comprehensive video series covering advanced topics such as advanced time based blind SQL injection injection, XSS, LFI, RFI, and RCE, including the process of uploading web shells on Apache and IIS web servers in live website scenarios? Traditional platforms like test.vulner, DVWA, bWapp, PortSwigger, etc., fail to address real-world challenges like identifying origin IPs, DNS brute force attacks, reverse IP lookups, WAF/IDS/IPS circumvention, AWS/CDN/Tor, reverse proxies, and CMS security 🤙. Your unique content would be invaluable in educating the bug bounty hunting community about genuine issues and solutions. Thanks in advance for your contributions to the community.

  • I am in highschool but no one told me my computer lab techer don't know anything 😢

  • as a teenager entering into hacking, this is great advice! Just keep going!

  • Some people told me hacking is bad ,,, but today i know is ultimately very useful thanks sir ☺️ i will become a king of hacking…. I Will Never Give Up

  • Really liked this interview, I too am of the boomer mind set and listening to Gavin articulate his generation continues to help me understand. My son is 18 and loves everything about computers, from architecture to gaming to programming. I am going to have him watch this interview. I also loved how he said he isn’t “Hollywood”. Just awesome. Thanks David and Gavin.

  • Always hearing to network, but I tried discord and was bombarded by phishing attacks and hacks attempted on my account, same thing happened with LinkedIn…so many fake accounts and your information is out there in the open for anyone to see. Idk how cyber pros can trust these socials knowing how bad privacy and data is out there now…

  • I've been homeschooling my two kids, aged 9 and 10, for the past year. During this time, I introduced them to basic Linux commands using Kali Linux VM. As we enter our second year, I'm pleased to see that they've developed a solid understanding of navigating and using terminal commands comfortably. Currently, I'm guiding them through the process of creating a virtual lab, complete with a pfSense firewall and Metasploitable VM machine, using VirtualBox. This endeavor is aimed at delving a bit more into the realm of cybersecurity. Looking ahead, my hope is that by the time they reach 15, they will have acquired several CompTIA certifications, setting them on a path ready for the future.

  • "When you get that Ferrari."

    If that's a brand of electronics he can hack stuff with :p Just sayin', we know what he spends his money on :p

  • more than anything else how mature and well thought he speak impress me

  • Going on my 4th year in a cyber security degree, and still have yet to learn anything about hacking and the tools out there to do so….instead I’ve learned only the basics that pretty much help prevent an attack, I’ve had to look elsewhere for resources such as David, Udemy, and many others….its sad how college is this way and no wonder many graduate and still know nothing.

  • age doesnt matter, its liabilities that matter. As long as someone invests and does not accumulate debt or kids they can do what they want at any age and dont have to pander TOO hard to the market.

    4 times a year udemy has smoking deals, like $120 course for $15 which is pretty much free.

  • you can get a learners at 15 9 months old and get license at 16
    you know when your 16
    he cant remember and hes still a kid
    this makes zero sense to me

  • All your experts, your professionals that provided you with Proton VPN, don't have a clue ::P

    NEW GENERATION COMING UP

Comments are closed.