i BACKDOORED a Desktop Shortcut (to run malware)

  Рет қаралды 75,087

John Hammond

John Hammond

3 ай бұрын

jh.live/pwyc || Jump into Pay What You Can training at whatever cost makes sense for you! jh.live/pwyc
Free Cybersecurity Education and Ethical Hacking
🔥KZfaq ALGORITHM ➡ Like, Comment, & Subscribe!
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 113
@AnthraxGg-by8zz
@AnthraxGg-by8zz 3 ай бұрын
I made an implant where target device connects back to c2, I was thinking of an idea to somehow make it more user-friendly for windows users, and here you provided ma lead, thanks brother!
@TwoBitSorcerer
@TwoBitSorcerer 3 ай бұрын
This video is genuinely brilliant! It's one of the things I really admire about this field: using standard stuff differently and creatively! Thanks John!
@apekatt2007
@apekatt2007 3 ай бұрын
Research LOLBAS if you liked this :)
@htxFINESSA
@htxFINESSA 2 ай бұрын
Best way to get control
@ima_igo
@ima_igo 2 ай бұрын
How to use? ​@@apekatt2007
@BillAnt
@BillAnt Ай бұрын
Really great info even for general users who would like to spot these tricks. I always had a funny feeling about LNK files, and examined every one which I downloaded before executing.
@marcoimbellicai4419
@marcoimbellicai4419 3 ай бұрын
Very nice video! As a cybersecurity master student, i really enjoy this content. Also, i envy your hair
@wooopus
@wooopus 3 ай бұрын
Ive been waiting for this master piece of a video!
@darkdagger032
@darkdagger032 3 ай бұрын
Quite informative video, John. Thanks for your hard work!!!
@hakeeminfosec
@hakeeminfosec 3 ай бұрын
I had this doubt (can we alter this application) since I accidentally opened a software's shortcut with VS Code and got to see this whole messy binary thing, and thankfully I understand now. So thankyou for this video :)
@btarg1
@btarg1 3 ай бұрын
I've been messing around with this recently so its cool to see my favourite cybersec channel cover it! Would love to see more about bypassing Defender!
@leapbtw
@leapbtw 3 ай бұрын
many of your videos are mindblowing to me, but you weaponized shortcuts here !!!
@vivaanvivaan3920
@vivaanvivaan3920 3 ай бұрын
sir awesome stuff... please upload more videos about this kind of topic.... seriously awesome....we love you sir❤
@philto9999
@philto9999 27 күн бұрын
I remember doing this lnk thing to be able to play diablo 2 in windowed mode by adding a -w at the end :p
@r3tr0n17
@r3tr0n17 3 ай бұрын
That watch is SOOOOOOOPERRRRR.... DOPE!!
@zionstemple
@zionstemple 3 ай бұрын
John really appreciate how you take informative information and present it simply and effectively. Love your channel.
@ChrisRebik
@ChrisRebik 3 ай бұрын
Love your Red Team shirt where can I buy one? I want to get that shirt! Thanks
@mrmonday2000
@mrmonday2000 3 ай бұрын
Windows has a MAX_PATH variable in C that is 256 bytes, therefore, anything taking in a path (even if you /c cmd) will be limited to 256 bytes
@MStrong95
@MStrong95 3 ай бұрын
Are there any other interesting polyglot file format hybrids that exist? Seems like an interesting video series idea
@amateurprogrammer25
@amateurprogrammer25 3 ай бұрын
PKZIP (.zip files) will polyglot with almost anything since they put all their header information at the end of the file rather than at the beginning. in fact pretty much all self extracting zip files that exist are extremely-easy-to-create .exe/.zip polyglots. you take a generic exe zip extractor that tries to open itself as a zip file and just concatenate whatever zip file you want.
@Dannytello
@Dannytello 3 ай бұрын
Brilliant creativity bro😁😁
@tinotheplayer
@tinotheplayer 3 ай бұрын
really creative solution!
@UBNA671
@UBNA671 3 ай бұрын
guys i need to know is ai the go to for subnet solving now, like literally is it , and by the way john i hear you mentioning opening the flood gates by learning programming first ,i have books but its so theory based and im a hands on guy can you make a in depth video of your theory
@noobermensch865
@noobermensch865 3 ай бұрын
fun pranks to try in the school computer lab vol. 2
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 3 ай бұрын
I was thinking about someone on KZfaq comments, or in a live chat, I forgot where, who said that he/she hates people that talk with their hands. Hahahaha. Seeing you talk with your hands, like I, and many of us do, reminded me of that. I'm part Italian, and Italians are known for talking with their hands. :3 Cheers, brother! Shalom. 🤝😁
@apekatt2007
@apekatt2007 3 ай бұрын
Weird, dude
@casperes0912
@casperes0912 3 ай бұрын
It's boring to look at someone completely motionless talk
@bnk28zfp
@bnk28zfp 3 ай бұрын
thank you John!
@0oNoiseo0
@0oNoiseo0 3 ай бұрын
Love the out of the box thinking in an easy to follow process
@Dreams_On_the_way
@Dreams_On_the_way 3 ай бұрын
after connected with kali a windows machine, what are the commands i can run for showing data of victim machine, if i start anything that thing opens in victim machine, show how can I use victim's computer
@iamwitchergeraltofrivia9670
@iamwitchergeraltofrivia9670 3 ай бұрын
More malware super good
@concepcionwilson5815
@concepcionwilson5815 2 ай бұрын
Please help, If I try this with a .lnk file extension with the copy command I get an error saying that the system can not find the file, but if I try it with a .png or any other type file it sees it. PLEASE HELP 6 hours in!!!🤔🥴
@Ahmed95406
@Ahmed95406 3 ай бұрын
I Enjoyed ,you are genius I love you thank you very much 🤩😍😍
@smartnima
@smartnima 3 ай бұрын
Oh wow this is really cool!
@JohnSon56123
@JohnSon56123 3 ай бұрын
How would you deploy it tho? (Curious as a nontech [IT-ignorant] individual)
@MoofyYT
@MoofyYT 3 ай бұрын
post exploitation
@JohnSon56123
@JohnSon56123 3 ай бұрын
@@MoofyYT I realise that. What I was unsure about is whether it's just snooping or also tagging and backdoor -- again, being an nontech individual
@iWhacko
@iWhacko 3 ай бұрын
@@MoofyYT or even email it in a zip file with other innocent files, and hope the person runs it
@MoofyYT
@MoofyYT 3 ай бұрын
@@iWhacko yep this. Or even as a standalone with a shortcut to a site, and lolbin download of another payload in the bg. But normally I'd just drop one in an open share of an internal.
@axld_eas
@axld_eas 3 ай бұрын
I have been here 5 minutes since the video has been uploaded
@EKSKLU
@EKSKLU 3 ай бұрын
so if .ink extension is a doubftul file meaning can it be mwalre bro
@FuzzerHash
@FuzzerHash 3 ай бұрын
Jhon ever with nice content
@gamereditor59ner22
@gamereditor59ner22 3 ай бұрын
0:15 : Interesting....🤔
@kedirmamo7818
@kedirmamo7818 3 ай бұрын
It is my unfolded Thanksgiving for your restless and selflessly working for the benefit of needy users like me who founded in the edge of cliff resulting me loose up trust from someone who is presenting youtube videos help fix problems with Google betrayal to privacy, selling users data and irresponsible in stay safe to google account and passwards etc was pushing me to the new" IT and Hacking courses" inorder providing study,, knowledge and skill on how to get out of problems indepently by using my ip adress, google account network,wifi since months ago. This is one of usefully presented video out of what you have share users, especially me from the day of onsets of these problems.
@ollyjxrvis9501
@ollyjxrvis9501 3 ай бұрын
I dont see the need for having the .lnk data in the start of the .lnk file, if we are just going to change the target anyway, why not just write a hta file, change the file extention to .lnk and do the same. Wondering if I'm missing something here
@mervstar
@mervstar 3 ай бұрын
To keep things at stealthy as possible and still be functional. A .lnk file will fly under the radar for most users, especially if it looks like it's for an application you have installed. A random .hta file showing up anywhere would raise a few alarm bells or at least a furrowed eyebrow or two. With a .lnk file, you can set the properties of it like icon etc. to obscure its true function even further. A .hta file that's been renamed to a .lnk file will just give an error when someone tries to run it because windows will treat it like a .lnk file.
@iWhacko
@iWhacko 3 ай бұрын
if it's renamed to .lnk windows will treat it as a link and give you an error because it doesn't know how to interpret the data as a .lnk file. you specify how to run it using mshta.
@sendlocation8476
@sendlocation8476 3 ай бұрын
What a good rat program and where to get?
@ANOTHERSHITE
@ANOTHERSHITE 2 ай бұрын
THIS IS FIXED BY NOW RIGHT?? I JUST TRIED IT AND IT DOESN'T WORK SO I'M HOPING ITS FIXED AND I'M NOT JUST FUMBLING SOMETHING
@ANOTHERSHITE
@ANOTHERSHITE 2 ай бұрын
nevermind...super bowl mode fumbles
@karinaCoreRG
@karinaCoreRG 3 ай бұрын
Wtfff genius man
@theonething-0312
@theonething-0312 2 ай бұрын
You are on sponsored!
@TopG_Crypto
@TopG_Crypto 3 ай бұрын
I was hacked by this same method
@MrHasooooni
@MrHasooooni 3 ай бұрын
how to make every video fun and intersting ??? it is easy just be john hammond !
@for14556
@for14556 3 ай бұрын
Very nice
@XtecherPY
@XtecherPY 3 ай бұрын
Regular Hackers: Just open this file! John: Just open google chrome
@carsonjamesiv2512
@carsonjamesiv2512 3 ай бұрын
INTERESTING!
@eikichi9050
@eikichi9050 3 ай бұрын
excuse me Mr. Hammond, i have a question. If you have windows defender running, this lnk "malware" file can bypass it or it will be blocked when executed?
@iWhacko
@iWhacko 3 ай бұрын
it can run, but depending on the script it might be detected. the standard metasploit payload will most likely be detected.
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 3 ай бұрын
Early crew. :3
@xCheddarB0b42x
@xCheddarB0b42x 3 ай бұрын
🍔
@apekatt2007
@apekatt2007 3 ай бұрын
Can it run calc.exe? Yes, it can! ❤
@hama502
@hama502 3 ай бұрын
vbscript soon deprecated
@MADhatter_AIM
@MADhatter_AIM 3 ай бұрын
but MS just have added full blown python-support into ms-excel , gotta luv MS for adding some additional attack-vectors.
@victorwambugu1115
@victorwambugu1115 3 ай бұрын
I've followed the instructions to the latter and it doesn't seem to work on the reverse shell part
@youth-need
@youth-need 3 ай бұрын
Awesome video jhon❤❤ 🇮🇳🇮🇳🇮🇳🇮🇳❤❤
@the_yugandharr
@the_yugandharr 2 ай бұрын
Interesting!!!
@eno88
@eno88 3 ай бұрын
Polyglot is a pretty senseless way to call it.. conglomerate? heck, even alloy makes more sense.
@IverGameplays
@IverGameplays 3 ай бұрын
N O I I C E ! ! 👏👏👍🏼👍🏼
@f.andersen3824
@f.andersen3824 3 ай бұрын
Thank you, now I see those little fellars with different eyes. 😂
@anak_sains_yang_toxic
@anak_sains_yang_toxic 3 ай бұрын
Goooooooooooooooooooood 🎉
@samthelamb0718
@samthelamb0718 3 ай бұрын
why not just download a backdoor or reverse shell exe file and just change the location to that?
@iWhacko
@iWhacko 3 ай бұрын
because if an antivirus was running it would detect the virus right away when it's downloaded onto the machine. Adding non conspicuous text to a lnk might not trigger until it's executed since its just script. And if you build your script right it could deactivate the antivirus or bypass it without detection, before executing the payload.
@hydrogennetwork
@hydrogennetwork 3 ай бұрын
i made a shortcut to run a bat that would run a powershell script that would run a script embedded in a image
@Eldoradotrueshot
@Eldoradotrueshot 3 ай бұрын
i just deleted all my shortcuts.... thanks :)
@adfreeviewer9005
@adfreeviewer9005 3 ай бұрын
Too late , lol
@user-be1hi5jb7v
@user-be1hi5jb7v 3 ай бұрын
i enjoy it
@bkcommando6969
@bkcommando6969 3 ай бұрын
plss help me my microsoft account is hacked plss reply
@PSL1969
@PSL1969 3 ай бұрын
Nice! :)
@Mazurizi
@Mazurizi 3 ай бұрын
Is this pay what you can training only available in America or something? The lowest you can pay is $295 - I don’t understand why it is called pay what you can, when it isn’t pay what you can at all.
@nordgaren2358
@nordgaren2358 3 ай бұрын
Did you click on the course and actually go through until you choose a payment option?
@xCheddarB0b42x
@xCheddarB0b42x 3 ай бұрын
That price is for access to their Cyber Range. You can buy the 16 hour SOC Core course for $25, but you don't get access to their infrastructure nor their labs running on there. Honestly, $295 for access to an industry leader Cyber Range is worth it.
@apekatt2007
@apekatt2007 3 ай бұрын
@@xCheddarB0b42x His point was that the slogan is misleading, not that it is expensive
@iWhacko
@iWhacko 3 ай бұрын
im in europe, if you go through the registration process at the last option you can choose how much to pay. It used to be free, but I think they changed it to 25usd so they get less no-shows, since people who pay nothing don't lose anything by not showing up.
@nordgaren2358
@nordgaren2358 3 ай бұрын
@@apekatt2007 it's not, though
@SpektWez
@SpektWez 3 ай бұрын
Creative tutorial
@elssarace3957
@elssarace3957 2 ай бұрын
Sir can you help me to get back my money i got scam
@FROMlefttoRightasdfghjkl
@FROMlefttoRightasdfghjkl 3 ай бұрын
YOU SO PRETTY... How'd you Backdoor that Computer?
@HimonRoy-ns2xp
@HimonRoy-ns2xp 3 ай бұрын
Hi
@professional.hacker.
@professional.hacker. 3 ай бұрын
You should help Ukraine with your cyber skills! I learned some of my most advanced skills here
@hierarki
@hierarki 3 ай бұрын
wtf how
@josephseed3393
@josephseed3393 3 ай бұрын
Yooo
@anonymousking9797
@anonymousking9797 3 ай бұрын
I'm first ❤😂
@Meletion1
@Meletion1 3 ай бұрын
8 minutes I’m in.
@alientec258
@alientec258 3 ай бұрын
very cool shit ;)
@SixMaverick
@SixMaverick 3 ай бұрын
Eh
@MiuraUY
@MiuraUY 3 ай бұрын
Nice, kinda cringe seeing this here, but nice
@Blooded2023
@Blooded2023 3 ай бұрын
12th comment
@user-pl8dw1se6t
@user-pl8dw1se6t 3 ай бұрын
you lost me a little😅
@anounTT
@anounTT 3 ай бұрын
32nd
@pmcforever9686
@pmcforever9686 3 ай бұрын
third
@lokeshb9025
@lokeshb9025 3 ай бұрын
first
@cautious-agency8
@cautious-agency8 3 ай бұрын
I’ll pay u 1000$ if u can code me a program that force ops on a Minecraft server lol
@jahguideadnan3784
@jahguideadnan3784 3 ай бұрын
Talking much and actually doing less 😂
@activatewindows7415
@activatewindows7415 3 ай бұрын
ur channels dying :(
@activatewindows7415
@activatewindows7415 3 ай бұрын
@@lumikarhuhuh really? isn't John supposed to be a well respected member of the ethical hacking community? or at lest on youtube?
@cexeodus
@cexeodus 3 ай бұрын
october to end of december is always pretty busy for anyone in cs field. the man can take a break i think. 😂 "cHaNnEl DyInG" naw man thats not gonna happen
@KiroKiro-ko3kb
@KiroKiro-ko3kb 3 ай бұрын
What is the other content creator​@@lumikarhu
@komodiasupport2547
@komodiasupport2547 3 ай бұрын
U can talk about a userland rootkit named r77 rootkit in windows,it is fileless rootkit
@Shabbyy.
@Shabbyy. 3 ай бұрын
Hello guys I went to support me l. Software open , file type "pksz "
How To Pivot Through a Network with Chisel
33:45
John Hammond
Рет қаралды 118 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 248 М.
Кәріс тіріма өзі ?  | Synyptas 3 | 8 серия
24:47
kak budto
Рет қаралды 1,5 МЛН
How To Choose Ramen Date Night 🍜
00:58
Jojo Sim
Рет қаралды 47 МЛН
The ARM chip race is getting wild… Apple M4 unveiled
4:07
Fireship
Рет қаралды 731 М.
How to Install Windows 11: Step-by-step Guide for a Fresh Install
14:09
I Stole a Microsoft 365 Account. Here's How.
19:57
John Hammond
Рет қаралды 320 М.
Scraping Dark Web Sites with Python
19:29
John Hammond
Рет қаралды 117 М.
I Put A Fake Email Server On The Internet
10:41
John Hammond
Рет қаралды 152 М.
How Hackers Write Malware & Evade Antivirus (Nim)
24:04
John Hammond
Рет қаралды 378 М.
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 161 М.
Notepad.exe Will Snitch On You (full coding project)
53:30
John Hammond
Рет қаралды 184 М.
How to Listen to Phone Calls in Wireshark
7:30
Plaintext Packets
Рет қаралды 124 М.
Кәріс тіріма өзі ?  | Synyptas 3 | 8 серия
24:47
kak budto
Рет қаралды 1,5 МЛН