How Hackers Compromise BIG Networks (with NetExec)

  Рет қаралды 104,322

John Hammond

John Hammond

Ай бұрын

jh.live/n8n || Build automated workflows between applications, and integrate JavaScript or Python code whenever you need to -- with n8n! jh.live/n8n
Follow along with Name Your Price Training: jh.live/nypt
Free Cybersecurity Education and Ethical Hacking with John Hammond
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥KZfaq ALGORITHM ➡ Like, Comment, & Subscribe!

Пікірлер: 104
@MarshallHallenbeck
@MarshallHallenbeck Ай бұрын
Whoa, this is a great surprise! Thanks for covering our tool, we put a lot of work into it and love to see people enjoy it!
@MarshallHallenbeck
@MarshallHallenbeck Ай бұрын
We also JUST updated the --users functionality last night, so it will display the # of bad password attempts (how it worked way back in CME), and last password set date. I also fixed the functionality to allow you to just list specific users if you want, instead of the entire list.
@mongmanmarkyt2897
@mongmanmarkyt2897 Ай бұрын
Glad to see the project evolving
@nordgaren2358
@nordgaren2358 Ай бұрын
Very cool! Please let us know if you get to walk through the course and if there is any feedback on the course the team made for your tool!
@Philanthropist.
@Philanthropist. Ай бұрын
Amazing! Keep up the good work 🙌👍
@harmonyinchaos6381
@harmonyinchaos6381 Ай бұрын
lol the video says includes paid promotion so somebody paid him to do that video about this tool, who else would have paid for it then you guys ??
@OneOfThePetes
@OneOfThePetes Ай бұрын
John, I don't know whether it was you or another member of the team... but.... I want to thank you and your team for reducing the massive POPping from the mic. I massively appreciate you, and what you are doing here on your channel, and your dedication to saving vintage speakers all over the world! Much love xx Me.
@nordgaren2358
@nordgaren2358 Ай бұрын
I try to remove any kind of sound artifacts that I can, in every video. Recently I have been working with John to get some recording environment issues resolved, so that we just have less artifacts to deal with in general. We aren't quite there, yet, so it's good to hear that people have taken notice in what we have done, so far. Thanks!
@jasantia
@jasantia Ай бұрын
Just started my journey in all this so that was cool to watch. Thank you, learned a lot
@capability-snob
@capability-snob Ай бұрын
Love that Future John got into spacetime exploitation so he could pivot back to the video.
@neffisback9729
@neffisback9729 Ай бұрын
Super cool showcase, awesome video! The loggedon-user to impersonation path is a really great way to get DA, loved seeing that! If I may add a few notes: - Instead of manually setting the account owned in Bloodhound you can just enable the Bloodhound connector in the nxc config, and it will automatically own users/computers :D - There is already a PR in the works that fixes the ldap problem, so it just works out of the box - The bloodhound zip bug was fixed two days ago (so you will actually have to unzip it 😅)
@rembautimes8808
@rembautimes8808 Ай бұрын
Good for n8n to sponsor this video. Looks really interesting and I think if I watch another couple of sponsored videos I’d probably go and try it out
@robertofolikwei23
@robertofolikwei23 Ай бұрын
Thank you John, for making the Lab less expensive, for everyone to participate.
@rogereales
@rogereales Ай бұрын
Thank you so much for your public contribution to the Cyber scene... A lot of hard work goes into the work you doing and sharing so big thumbs up to you! First time ever but I've signed up for a subscription to support you.. Keep the good content coming John!
@MoDs_3
@MoDs_3 Ай бұрын
Thank you sir for all your explanations! Very informative and helpful. ❤
@elrilesy
@elrilesy Ай бұрын
Hey John, love your work. I did my undergrad in Economics so naturally I'm super curious as to what price people pay for the pay-what-you-like course when they are given the option of potentially $0. Would you be comfortable releasing any basic stats on this?
@jaywandery9269
@jaywandery9269 Ай бұрын
Good one John.. You should do a one on one CTF someday with Jeffmut, he's a strong low key hacker.
@Ctrl-s.digital
@Ctrl-s.digital Ай бұрын
Awesome tool thanks for showcasing it will add to my tool belt
@user-xl5sx9hq7k
@user-xl5sx9hq7k Ай бұрын
Really cool video. Great information John Hammond. 👍
@chrisclark5135
@chrisclark5135 Ай бұрын
Fantastic! Thanks for the hard work, John!
@ManujaBadrajith
@ManujaBadrajith Ай бұрын
If Mr. Hammond ever gets a villian arc, we're screwed mates 😒🤔 BTW thank u for this amazing explaination sir ❤
@_hackwell
@_hackwell Ай бұрын
Nice! installed and ready to test 👍
@JoeJohnson-DroBuddy
@JoeJohnson-DroBuddy 8 күн бұрын
Awesome videos, bro. I'm an instant fan!
@dodedodedo22
@dodedodedo22 Ай бұрын
lol yes the cme conversation is a "can of worms" lol
@rogerioabreu3081
@rogerioabreu3081 Ай бұрын
Awesome video , John! Thanks
@abyss7724
@abyss7724 Ай бұрын
Hi John. I know this might sound stupid. But could you do a video on how you set up your kali VMs as well as showing how to properly configure them. Since I am running a 5950x with 64gb of RAM, I have enough resources to run VMs, but for some reason my VMs are just super slow and sluggish. Great Video ❤
@nordgaren2358
@nordgaren2358 Ай бұрын
For this demo, it's all setup for you already in a web based VM. But, for your own VM setups: We usually just install the VM that Kali provides for the platform we are running the VM on. John and I both use VMWare. I tend to give my VMs about 4 processors and 2 cores each, as well as 16 GB of RAM. There was also a Kali linux version that didn't run well on VMWare, but since 2024.1, it has ran smoothly. If you don't have VMWare, and you are using VirtualBox, you will likely have to turn off Hyper-V in Windows. VirtualBox does not play well with Hyper-V. I would google "VirtualBox disable Hyper-V" and find a guide on the VirtualBox forums for doing so, so that it runs well. Other than that, I suggest following any install directions on the Kali website under "Virtual Machines"
@BigNad
@BigNad Ай бұрын
@@nordgaren2358On the Money. Tbh I find VMware a lot more consistent.
@psknhegem0n593
@psknhegem0n593 Ай бұрын
Hey mate, first of all thanks for your awesome work! Also, I'd like to underline that we - somehow your community - are willing to help, to participate to create content, labs or stuffs. Maybe not all, but a part at least. So don't hesitate to drop requests, and I bet many will answer! Cheers!
@nordgaren2358
@nordgaren2358 Ай бұрын
Send stuff to us, then. You can reach me at nordgaren@johnhammond.llc
@cptbaker
@cptbaker Ай бұрын
I don't know what we did to deserve people like you on KZfaq, but I couldn't be more thankful.
@lvlinty
@lvlinty Ай бұрын
Feels really strange that a local admin on a system can run a scheduled task as a domain admin...
@Gr33n37
@Gr33n37 Ай бұрын
whoa, grate tool , i have to install this
@storm4246
@storm4246 Ай бұрын
Great video. Thanks for great content.
@saimanish4374
@saimanish4374 Ай бұрын
Brilliant work 🎉🎉🎉
@johnmusyoki3786
@johnmusyoki3786 Ай бұрын
this is Fantastic, thank you
@Abduselam.m
@Abduselam.m Ай бұрын
Thank so much John Hammond
@motbus3
@motbus3 Ай бұрын
Is netexec the hostile fork crackmapexrc mentions?
@ohmsohmsohms
@ohmsohmsohms Ай бұрын
netexec is updated fork of crackmapexec. use it.
@ricseeds4835
@ricseeds4835 Ай бұрын
30:21 "I believe there's a hyphen there..." We'll have to take your word for it. There is nothing on the screen.
@nordgaren2358
@nordgaren2358 Ай бұрын
You must be having an environment issue, as I can clearly see `--loggedon-users`
@wandererx86
@wandererx86 Ай бұрын
You clearly can't comprehend that he was questioning himself on whether or not that was the proper syntax.
@0oNoiseo0
@0oNoiseo0 Ай бұрын
Loved this!
@Carambolero
@Carambolero Ай бұрын
Sweet mother of J. That was nice. What skills. NICE.
@ketu-ht6wv
@ketu-ht6wv Ай бұрын
Great tutorial!
@mghostdog
@mghostdog Ай бұрын
Is this going to be banned from use on the OSCP?
@GunZFoX
@GunZFoX Ай бұрын
Is Crackmapexec banned? The answer should be the same
@s4mpl0ris38
@s4mpl0ris38 Ай бұрын
friend i try install pipx git is say no finder why resolve this error friend can help me
@MattiaCampagnano
@MattiaCampagnano 26 күн бұрын
I bought the lab but, when trying to launch the lab, I get "You are out of runtime". Do I need to buy credits to start the lab? Not quite clear, sorry.
@professional.hacker.
@professional.hacker. Ай бұрын
Have your heard of OTW?
@highlights973
@highlights973 Ай бұрын
Hey Bro out of curiosity am not watching the whole video what made you ask that question because i am a big fun of OTW
@professional.hacker.
@professional.hacker. Ай бұрын
@@highlights973 Yeah me too! is your level/skill in hacking? Just wondering
@highlights973
@highlights973 Ай бұрын
@professional.hacker. i can consider my skills intermediate i just did cybersecurity starter bundle and scada hacking V5 with OTW
@NaveedAhmed-og8ui
@NaveedAhmed-og8ui Ай бұрын
How to learn about windows operating system like windows 10-11 and windows server from the prespective of cybersecurity. Windows server has courses like MCSA- MCSE but want to learn these courses from the prespective of cybersecurity. Cant find any related videos for this specific topic
@dariusvlogs3634
@dariusvlogs3634 Ай бұрын
Is the mcsa mcse still a thing?
@NaveedAhmed-og8ui
@NaveedAhmed-og8ui Ай бұрын
No but one will get idea how the servers work
@dariusvlogs3634
@dariusvlogs3634 Ай бұрын
@@NaveedAhmed-og8ui any certificate alike currently available?
@zstewart93
@zstewart93 Ай бұрын
Let's see John Hammond's home grown threat feed... lol
@samha1513
@samha1513 Ай бұрын
This was great
@LlewdLloyd
@LlewdLloyd Ай бұрын
Love your videos, information, and overall knowledge, but this video seems to be filled with non-authentic energy for sponsors or as if you're trying to be a replica of Network Chuck (who is amazing at what he does), but I feel like the "enthusiasm" was too distracting for me to get engaged with the content. Although your overall production quality has sky-rocketed and is really great to see. I just want you to be more you :). Love you, dude.
@rorsie
@rorsie Ай бұрын
You are a legend. Thank you for sharing this. Going to try the lab out myself first!
@shades_dior
@shades_dior Ай бұрын
RDP does not work 💀
@BlackwinghacksBlogspot
@BlackwinghacksBlogspot Ай бұрын
No more neo4j ? 🥰😍😍😍😍
@fclay6358
@fclay6358 Ай бұрын
Brilliant
@treyanmarioh
@treyanmarioh Ай бұрын
totally will deploy netexec
@anonymous-65732
@anonymous-65732 Ай бұрын
amazing
@user-oe2bf4rz3s
@user-oe2bf4rz3s Ай бұрын
👁
@donnabuckalew-wagner6431
@donnabuckalew-wagner6431 Ай бұрын
❤❤❤❤❤❤❤❤❤
@carsonjamesiv2512
@carsonjamesiv2512 Ай бұрын
😎👍
@nordgaren2358
@nordgaren2358 Ай бұрын
last
@abdurezakhamid3283
@abdurezakhamid3283 Ай бұрын
First 😌🥇
@lukaszstaniec
@lukaszstaniec Ай бұрын
Can we have your take on the discovered vulnerability in M/series appl3 chips published by ar s technlca yesterday ? Is impact as worrisome as it sounds for the general user? Many thanks!
@lvlinty
@lvlinty Ай бұрын
Short answer: no Long answer: don't lose physical access/control of a Device with confidential information on it.
@janekmachnicki2593
@janekmachnicki2593 Ай бұрын
So AMAZING JOHN
@sotecluxan4221
@sotecluxan4221 Ай бұрын
@ungung7151
@ungung7151 Ай бұрын
can use thid in OSCP? or offsec exam?
@samha1513
@samha1513 Ай бұрын
No! it’s automated
@wolfk.l.5582
@wolfk.l.5582 Ай бұрын
I would advise you to learn the hard and long way of doing things. Will benefit you in the long run...
@ignacio2763
@ignacio2763 Ай бұрын
@@samha1513definitely can. crackmapexec is 100% allowed and this is not automated. Metasploit usage for getsystem and all that is not allowed but anything with netexec is allowed
@WyldeZk
@WyldeZk Ай бұрын
Used crackmapexec in my oscp exam back in ‘22. I don’t see why you cannot use netexec
@GajendraMahat
@GajendraMahat Ай бұрын
03:13 This John from the future stuff is copied from @ippsec guy😊
@nordgaren2358
@nordgaren2358 Ай бұрын
What? It's literally him from the future. He recorded this part after the video was recorded, initially...
@doommaker4000
@doommaker4000 Ай бұрын
There's tons of people that call the editing selves "future self"
@nordgaren2358
@nordgaren2358 Ай бұрын
@@doommaker4000Well, I'm not John, so he can't call me "future self" :P
@GajendraMahat
@GajendraMahat Ай бұрын
@@nordgaren2358 i know, but this technique of correcting videos, when they miss something initially and correcting later by calling "hey it's me from future" is popular by ippsec
@GajendraMahat
@GajendraMahat Ай бұрын
@@nordgaren2358 I know it's John from the future, but the style of making corrections, which was initially forgotten and then recorded later, is popularized by Ippsec.
Free Coding Tool Distributes Malware
42:12
John Hammond
Рет қаралды 126 М.
Remotely Control Any Phone and PC with this Free tool!
17:15
Loi Liang Yang
Рет қаралды 642 М.
McDonald’s MCNUGGET PURSE?! #shorts
00:11
Lauren Godwin
Рет қаралды 27 МЛН
蜘蛛侠这操作也太坏了吧#蜘蛛侠#超人#超凡蜘蛛
00:47
超凡蜘蛛
Рет қаралды 37 МЛН
How To Pivot Through a Network with Chisel
33:45
John Hammond
Рет қаралды 117 М.
this Cybersecurity Platform is FREE
39:46
John Hammond
Рет қаралды 504 М.
ZeroDay Insights - A Hacker's Perspective
16:08
Exertis
Рет қаралды 3,5 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 246 М.
Being a Call Center Employee in the Philippines Be Like.. | TRABAHO
23:10
I Hacked The Cloud: Azure Managed Identities
29:29
John Hammond
Рет қаралды 59 М.
Notepad.exe Will Snitch On You (full coding project)
53:30
John Hammond
Рет қаралды 181 М.
McDonald’s MCNUGGET PURSE?! #shorts
00:11
Lauren Godwin
Рет қаралды 27 МЛН