Instagram & Twitter OSINT - DownUnderCTF

  Рет қаралды 135,174

John Hammond

John Hammond

3 жыл бұрын

Register for BsidesBOS CTF! bsidesbos.ctf.games
Hang with our community on Discord! johnhammond.org/discord
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 172
@dccybersec
@dccybersec 3 жыл бұрын
Cheers for the shoutout! Great video mate
@cansofcoke
@cansofcoke 3 жыл бұрын
I said out loud "hey he's talking about an Aussie cyber guy!" when he mentioned you :D Fellow cyber guy from syd here.
@dccybersec
@dccybersec 3 жыл бұрын
@@cansofcoke yooo Australia represent! hahaha
@cansofcoke
@cansofcoke 3 жыл бұрын
@john and @DC you guys going to do the Australian National Missing Persons Hackathon? :)
@dccybersec
@dccybersec 3 жыл бұрын
@@cansofcoke Yes! The CTF team i'm a part of (HYPASEC) is participating this year :)
@cansofcoke
@cansofcoke 3 жыл бұрын
@@dccybersec sooo awesome :) I'll see you there, i just signed up :)
@adrianklamut8533
@adrianklamut8533 3 жыл бұрын
I think this cell phone message is something like "meet me at 9 30" last digits were held down for little longer for digits to appear
@skynet1024
@skynet1024 3 жыл бұрын
who are you so wise in the ways of science
@pennym6576
@pennym6576 3 жыл бұрын
my thoughts exactly
@Zydent
@Zydent 3 жыл бұрын
I solved this a different way actually. I just got the thought of sending her an email and she responded with another mail where she stated her full name. Love your content John!
@avgmean4187
@avgmean4187 3 жыл бұрын
Lol, I sent her a formal business inquiry, spent like an hour setting up an online persona, bloating the account with bots and writing the message... The reply was automatic...
@TalsonHacks
@TalsonHacks 3 жыл бұрын
avg bndt lol
@ultimate8673
@ultimate8673 3 жыл бұрын
@@avgmean4187 😂😂😂😂😂😂😂
@seclilc
@seclilc 3 жыл бұрын
I really enjoy listening to your methodology so thanks for going down the rabbit hole and explaining every step
@satyamvirat3489
@satyamvirat3489 3 жыл бұрын
Tbh, that was far most the best video by you. Unlike rest, you covered the rabbit hole parts and actually did tell us what to do if those holes were actually what we needed to find and work around (like audio extraction and decoding it) Thnks pal❤️
@gbravy
@gbravy 3 жыл бұрын
Great video John. I appreciate all the depth you go down. The rabbit holes are always appreciated as well.
@Raformatico
@Raformatico 3 жыл бұрын
It is great to have someone who takes your hand and guides you slowly through a challenge 👏😍 Thank you man!!!
@Ayahalom123
@Ayahalom123 3 жыл бұрын
Loved the video!! Your "thinking out loud" process allows me to learn even better than "straight to the punch" videos!
@AmCanTech
@AmCanTech 3 жыл бұрын
שלום
@djmikeholmes6214
@djmikeholmes6214 3 жыл бұрын
John you always ask if we don't mind you talking so much. We watch your channel to listen and learn, so keep talking. Another great video btw.
@reyandutta
@reyandutta 3 жыл бұрын
yaa.. his talking made me start off my infosec career, i was so inspired just by watching his videos
@minuano8716
@minuano8716 3 жыл бұрын
Phenomenal video. I don't know if you actually checked the write-ups after the CTF was finished but that t9 decoding that you did was absolutely necessary for a later challenge in the same CTF. You basically had the solution for "A turn of events /w some REALLY bad OPSEC". Great intuition there.
@sa-a7153
@sa-a7153 3 жыл бұрын
Really appriciate the descriptions about the rabbit holes. I think much of learning is to do with understanding how to evaluate all of the choices and not just thinking around that there is that single solution that will work. Those old phones had the "push long for the nbr." thing, right? Meet me at 93?
@selvinpaul7255
@selvinpaul7255 3 жыл бұрын
Wow! Mind Blown!!! That's amazing Sir! 🙏 I had to setup a meeting with her on google calendar and that's how I got her middle name 😂
@pasangamage
@pasangamage Жыл бұрын
that dialpad tones thing is important! thanks for sharing
@Loicmartins
@Loicmartins 14 күн бұрын
Thanks for the explanation about the phone!
@jovi___
@jovi___ 3 жыл бұрын
Im enjoying the longer videos and showing multiple tools
@InfosecGeekz
@InfosecGeekz 2 жыл бұрын
Great Video John👍 Simply loved the way you extracted all the Juice😍
@Sagescomputerrepair
@Sagescomputerrepair 3 жыл бұрын
Man that was a rabbit hole but I'm glad you walked is through it.
@gamingandanime9000
@gamingandanime9000 Жыл бұрын
No, This video has to be this long. This was amazing and so informative! 💯
@mehammered
@mehammered 3 жыл бұрын
Your videos are the best, thanks!!!!!!! You tricked me on sherlock busting it out at the end.
@manoharbaratam8792
@manoharbaratam8792 3 жыл бұрын
I did hit the like button before even watching the video. Iam that much confident on JohnHammod content.. Love u john from India..
@MrNomadBrad
@MrNomadBrad 3 жыл бұрын
Would love to see some more OSINT videos using all the tools you know of.
@antaresrepublic
@antaresrepublic 2 жыл бұрын
I really like your take on the rabbit hole. Very interesting.
@binaryaction5
@binaryaction5 3 жыл бұрын
Love the explanation of what you did
@cli-hope417
@cli-hope417 3 жыл бұрын
Thanks for the extra time you took to share 👌
@slaozeren8742
@slaozeren8742 2 жыл бұрын
I watched this video twice. Not because I didn't understand it but because I loved it so much.
@stanislavsmetanin1307
@stanislavsmetanin1307 2 жыл бұрын
Thanks for that DTMF thing.. I did not know about. 👍
@peterzenner2020
@peterzenner2020 2 жыл бұрын
Your idea of extracting and decoding the DTMF was exactly my thought also... so I thought it was a viable search!
@christinewinchester2031
@christinewinchester2031 2 жыл бұрын
Thanks, John!
@HeyDudee
@HeyDudee 3 жыл бұрын
Thankyou John Legend!!! 🔥
@bechararizk7245
@bechararizk7245 3 жыл бұрын
02:09 that’s the undertaker...
@3rg1s
@3rg1s 3 жыл бұрын
10:00 you can also drag the image and drop it on another tab so it opens the exact link and then you can see the photo without the login.
@tylersmith8245
@tylersmith8245 3 жыл бұрын
That Sherlock tool is super nifty!
@Sagescomputerrepair
@Sagescomputerrepair 3 жыл бұрын
Fam, that's the Undertaker. Lol. Thanks for the video. Didn't know there were OSINT CTFs.
@crispyhaole8533
@crispyhaole8533 3 жыл бұрын
Dtf was worthwhile to showcase. Good vid
@stevenhall2
@stevenhall2 Жыл бұрын
John, I like the fact that you walked us through your process. Long video or not, it shows what it took to complete a process of actually doing the required grunt work. Running into dead ends and learning to pivot on certain datasets is critical to the hunt! Thanks for unpacking all of this, the video is excellent for those who want to get good at OSINT exploitation!
@mxbmvnvmbncmbn
@mxbmvnvmbncmbn 2 жыл бұрын
2:07 apparently the undertaker from world wrestling entertainment is a spooky scary hacker man
@Hitu1197
@Hitu1197 2 жыл бұрын
Ahaha I was just thinking about Sherlock Tool when you were talking about usernames on different social medias lol
@ronakjoshi5093
@ronakjoshi5093 3 жыл бұрын
again a great video by john❤️
@killahb33
@killahb33 Жыл бұрын
Got a laugh out of your DP comment, it's Undertaker. Anyways great vid!
@marcellmagvasi1668
@marcellmagvasi1668 3 жыл бұрын
i really like how u tell the things how its works or how i should do that too, so yeah keep doing these vids, u shouldnt care how long the videos are :DD i will watch it anyway...:_D
@alexkatsanos8475
@alexkatsanos8475 2 жыл бұрын
This was cool. Thanks!
@user-uo5id1dd5s
@user-uo5id1dd5s Жыл бұрын
Thanks
@user-sq7hj6hj7h
@user-sq7hj6hj7h 2 жыл бұрын
For sherlock you can just use --timeout 1 or 3 to speed things up
@goodgameplays9571
@goodgameplays9571 2 жыл бұрын
tysm for the content
@Maniclout
@Maniclout 3 жыл бұрын
I can't help but focus on your glasses the whole time and those light reflections reminding me of anime smart guy moments.
@jorisschepers85
@jorisschepers85 3 жыл бұрын
Keep them coming John.
@somebodystealsmyname
@somebodystealsmyname 3 жыл бұрын
Hey John, not every entry in the Wayback Machine is really from the day it says. So even though you clicked on 19.09., you got the version from july.
@HenryPangsatabam
@HenryPangsatabam 3 жыл бұрын
"And I like these memes here. Nice! Nice!"
@bruh_5555
@bruh_5555 3 жыл бұрын
Osnit stuff is fun for a change from complex hacking
@AbdennacerAyeb
@AbdennacerAyeb 3 жыл бұрын
you r great.. we r learning a lot from your chanel
@champmq5385
@champmq5385 3 жыл бұрын
By the way to download the video you could also just look at the HTML code and then take the link for the video I guess this would also be simple training for understanding html codes idk. But its still nice content
@ashutoshmohanty
@ashutoshmohanty 3 жыл бұрын
Awesome
@kal_dev
@kal_dev 2 жыл бұрын
wow incredible video, dial tone detect🤗
@olidingin6398
@olidingin6398 3 жыл бұрын
[20] Sebuah senyawa non volatil Z, digunakan untuk membuat dua larutan yang berbeda. Larutan A mengandung 5 g senyawa Z yang dilarutkan dalam 100 g air. Sedangkan larutan B mengandung 2,31 g senyawa Z yang dilarutkan dalam 100 g benzen. Larutan A mempunyai tekanan uap 754,5 mmHg pada titik didih air normal dan larutan B mempunyai tekanan uap yang sama pada titik didih normal benzen. Hitunglah massa molar dari senyawa Z pada larutan A dan B!
@rajith8973
@rajith8973 3 жыл бұрын
John good luck for bsides boston ctf
@GeekBatman
@GeekBatman 3 жыл бұрын
The spookey scary hacker man pic. Is that not the wrestler Kane?
@alcxander
@alcxander 3 жыл бұрын
these are really interesting, how does one get started on doing these CTF's etc?
@wasfyelking6926
@wasfyelking6926 3 жыл бұрын
Respect johnyy ⚡️⚡️
@jaypomal5534
@jaypomal5534 3 жыл бұрын
that's really good john
@ovxvii
@ovxvii 3 жыл бұрын
this was really interesting!
@ovxvii
@ovxvii 3 жыл бұрын
the cell phone numbers blew my mind
@jacobsan
@jacobsan 3 жыл бұрын
Amazing
@tomotion
@tomotion 2 жыл бұрын
You can use -t 1 for Sherlock to set a timeout to 1 second
@techguy921
@techguy921 3 жыл бұрын
U can decode sound using DTMF decoder app in your phone through microphone , much quicker without downloading and converting
@JustSomeAussie1
@JustSomeAussie1 3 жыл бұрын
It sounds so funny when you say "mum"
@CyberWorldSec
@CyberWorldSec 3 жыл бұрын
please make more on osint where a location is given
@GauravTaxali
@GauravTaxali Жыл бұрын
I was earlier inclined towards red teaming, now that i have been introduced to OSiNT. I feel that it is something cooler and easier.
@jesusxXxlizzard
@jesusxXxlizzard 3 жыл бұрын
Very nice buddy!
@ErickTosar
@ErickTosar Жыл бұрын
Oh you clonned some dinasours, i remember you!
@sofblocks
@sofblocks 3 жыл бұрын
Please do a video on sublime text shortcuts and the find replace thing . Thank you.
@alph4byt3
@alph4byt3 3 жыл бұрын
I believe the twitter pic is the undertaker from wwe
@aswinp888
@aswinp888 3 жыл бұрын
ITS NOT SPOOKY HACKER GUY, ITS UNDERTAKER MY G!!
@potatoonastick2239
@potatoonastick2239 3 жыл бұрын
"hello i am here for the flag plz" yes john great troll😂😂
@sirw369
@sirw369 3 жыл бұрын
Lmao @ 22:56. I would’ve done the same John 😂
@M7_ii
@M7_ii 2 жыл бұрын
You shouldve done the timeout to one second for the sherlock search
@b07x
@b07x 3 жыл бұрын
2:15 That's undertaker, a wwe actor
@RuDrAkSh_is_live
@RuDrAkSh_is_live 2 жыл бұрын
omg what a challenge
@whoamisecurity9586
@whoamisecurity9586 3 жыл бұрын
Interesting 🙂
@cardzzz6585
@cardzzz6585 3 жыл бұрын
HYPA! HYPA!
@vater7841
@vater7841 3 жыл бұрын
nice
@ca7986
@ca7986 3 жыл бұрын
❤️
@51mpl3-b9
@51mpl3-b9 3 жыл бұрын
Nice method on the phone number/thing
@hegen7642
@hegen7642 2 жыл бұрын
22:05 is saying: meet me at 9:30 I'm guessing
@skynet1024
@skynet1024 3 жыл бұрын
those guys with the dislike must have their screens upside down
@0x7ddf1
@0x7ddf1 3 жыл бұрын
Hahahaha true
@Phoenix_VR
@Phoenix_VR 3 жыл бұрын
I have a very odd one, and I wasn't even playing or interested in CTF games.....a number and a location...that's it. :D
@chriskaprys
@chriskaprys 3 жыл бұрын
does anyone have the video/audio from that insta? the account is gone (nothing on TWM either) and i'd love to take a peek at those DTMF tones.
@Usrthsbcufeh
@Usrthsbcufeh 2 жыл бұрын
Old tweets are sometimes indexed
@gerryolivergerryoliverphot5182
@gerryolivergerryoliverphot5182 2 жыл бұрын
The undertaker was his picture
@toddmathews3329
@toddmathews3329 Жыл бұрын
😅😅😅 loved it.
@silverman2263
@silverman2263 3 жыл бұрын
Hi Sir your all videos super
@matthewfluke7957
@matthewfluke7957 Жыл бұрын
Even Tinder… Nice!!! 😂
@hoodietramp
@hoodietramp 6 ай бұрын
I think soups watched your this video for the beep64 idea in fetch the flag🤣
@venox314
@venox314 2 жыл бұрын
What's the name of these kind of games? This seems so cool! EDIT:Ctf right?
@kamalaKannan-gf6ku
@kamalaKannan-gf6ku 3 жыл бұрын
Any alternative for the dialabc....thanks in advance
@user-pe2mf5tg3h
@user-pe2mf5tg3h 2 жыл бұрын
I was disappointed you didn't principle skinner the DTMF tones.
@CRSolarice
@CRSolarice 3 жыл бұрын
Tell me what brand and model is your PC? CPU model and memory brand and speed or just model number. Your BIOS may not be properly configured and did you do the update for the bios? Have you built a PC before?: My best uninformed guess is going to be heat related. Ie incorrect cpu paste deployement, case arrangement and fans (orientation and position), if water could be air trapped, pump speed, paste and radiator sizing. Photos will help if you still have slowness. Is GPU blowing air out through the back or directly into the path of CPU intake?
@ritamchatterjee3307
@ritamchatterjee3307 2 жыл бұрын
Im not getting one url in the way back machine,what would be the issue any idea
@AswinHaridasOne_77
@AswinHaridasOne_77 2 жыл бұрын
That's undertaker as the profile picture. 😄😄 not hacker man
@b07x
@b07x 3 жыл бұрын
27:55 I though it was only me because my internet is very slow.
@thengakola6217
@thengakola6217 3 жыл бұрын
Zeroth comment ....grow up bois
@kartibok001
@kartibok001 3 жыл бұрын
What a great video!! (TINDER - wtf :) )
@bruh_5555
@bruh_5555 3 жыл бұрын
Error, extra closing braces, cannot compile comment
@kartibok001
@kartibok001 3 жыл бұрын
@@bruh_5555 Damn no smiling faces!!
Doing a Live OSINT Investigation on an Instagram Influencer
12:22
Cody Bernardy
Рет қаралды 58 М.
DON'T call yourself a hacker...
8:47
John Hammond
Рет қаралды 56 М.
格斗裁判暴力执法!#fighting #shorts
00:15
武林之巅
Рет қаралды 47 МЛН
О, сосисочки! (Или корейская уличная еда?)
00:32
Кушать Хочу
Рет қаралды 6 МЛН
The Noodle Stamp Secret 😱 #shorts
00:30
Mr DegrEE
Рет қаралды 61 МЛН
Google CTF - BEGINNER Reverse Engineering w/ ANGR
39:47
John Hammond
Рет қаралды 278 М.
Using OSINT to find his apartment!
13:28
Gary Ruddell
Рет қаралды 147 М.
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 189 М.
OSINT At Home #9 - Top 4 Free Satellite Imagery Sources
13:21
Bendobrown
Рет қаралды 1,5 МЛН
I bought the most MINIMALIST Tech ever.
48:11
Mrwhosetheboss
Рет қаралды 3,6 МЛН
discord's dumbest update...
10:37
No Text To Speech
Рет қаралды 226 М.
TryHackMe! Basic Penetration Testing
30:14
John Hammond
Рет қаралды 2,4 МЛН
Stopping DNS "ANY" Queries - DownUnderCTF
17:57
John Hammond
Рет қаралды 11 М.
OSINT tools to track you down. You cannot hide.
57:45
David Bombal
Рет қаралды 692 М.
Finding WEIRD Phishing Websites
18:28
John Hammond
Рет қаралды 22 М.
格斗裁判暴力执法!#fighting #shorts
00:15
武林之巅
Рет қаралды 47 МЛН