Mozi Malware - Finding Breadcrumbs...

  Рет қаралды 196,940

John Hammond

John Hammond

3 жыл бұрын

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?... (disclaimer, affiliate link)
For more content, subscribe on Twitch! / johnhammond010
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
PayPal: paypal.me/johnhammond010
E-mail: johnhammond010@gmail.com
Discord: johnhammond.org/discord
Twitter: / _johnhammond
GitHub: github.com/JohnHammond

Пікірлер: 389
@_JohnHammond
@_JohnHammond 3 жыл бұрын
Dragging the spooky.elf into GHIDRA, it opens it just fine, and I should have tried that during the video. Embarrassing mistake, sorry. (And yes, I know that is by Fall Out Boy, not Green Day. I was just trolling ;P )
@originalgaming9062
@originalgaming9062 3 жыл бұрын
No worries :)
@dannygaming1216
@dannygaming1216 3 жыл бұрын
@John Hammond this is a worm used to infect routers so they can monitor router data and etc
@timothy5480
@timothy5480 3 жыл бұрын
the default passwords may be for routers, people often forget to change them. there are sites that if you look up a router you can get a list of default passwords
@noobian3314
@noobian3314 3 жыл бұрын
@@dannygaming1216 no it's for ddos. It's mirai. All of those iptables block rules and deleting stuff is to stop other scanners running some exploits so they exclusively have the bot.
@dannygaming1216
@dannygaming1216 3 жыл бұрын
@@noobian3314 I've seen a worm that gets into the router to allow it to collect data to sell it or for blackmail and for ddos
@idoabitoftrolling2172
@idoabitoftrolling2172 3 жыл бұрын
"Please send me malware" -John Hammond
@stevejamal241
@stevejamal241 3 жыл бұрын
Famous last wards...
@Nexus4582
@Nexus4582 3 жыл бұрын
"Welcome to Jurrasic Park" - John Hammond
@kochv87
@kochv87 3 жыл бұрын
somehow my evening routine of lying on the couch and watching netflix changed to lying on the couch and watching john hammond do malware analysis... :)
@cvall1710
@cvall1710 6 ай бұрын
Welcome brother 😂
@matthewlandry1352
@matthewlandry1352 3 жыл бұрын
Cool trick “-fix-broken” That’s why I like John’s videos even when he thinks he fails. I level up ⬆️
@okuno54
@okuno54 3 жыл бұрын
Or `-f` for short!
@vexraill
@vexraill 3 жыл бұрын
Would love to see a mini series about setting up a honey pot and seeing what fun stuff comes through!
@bannedthricelol8799
@bannedthricelol8799 2 жыл бұрын
How would one do that?
@rita-the-devil
@rita-the-devil 2 жыл бұрын
@@bannedthricelol8799 step 1: install metasploitable somewhere step 2: buy an domain for metasploitable and show it somewhere so posible hackers try to hack it step 3: profit btw metasploitable may seem sus since it has a lot of vulnerabilities up to the point where it seems fake
@deepergodeeper7618
@deepergodeeper7618 Жыл бұрын
@@bannedthricelol8799 just make a honey pot its that easy
@josjuarlister1059
@josjuarlister1059 Жыл бұрын
Yes!!! A malware Harvester🤩🤩🤩
@PiotrK2022
@PiotrK2022 Жыл бұрын
It's worth it... Tpot - you can do that yourself. :)
@RobinKberg
@RobinKberg 3 жыл бұрын
04:05 $ mkdir Mozi $ ls Listing an empty freshly created directory shows you, that you are dealing with a professional. People who don’t do this are either noobs or psychopaths.
@nashonightmare
@nashonightmare 3 жыл бұрын
Agree >_
@chillytheprogrammer
@chillytheprogrammer 3 жыл бұрын
Why is this?
@user-lk5qz4wx4q
@user-lk5qz4wx4q 3 жыл бұрын
@@chillytheprogrammer Habits. Muscle memory. I belive John made a community post about this lol. edit: kzfaq.info/love/VeW9qkBjo3zosnqUbG7CFwcommunity?lb=UgxZplo8gPKIFaDSPVN4AaABCQ I was right :D
@oxtna
@oxtna 3 жыл бұрын
I do this all the time. Why? I have no idea.
@mathiasdesouza
@mathiasdesouza 3 жыл бұрын
mkdir is most tested software ever written.
@Zachucks
@Zachucks 3 жыл бұрын
RIP nano on the side over there, he served his purpose in his less than 5-minute life span, let's take a moment of silence to remember how he stored the file size in hex for 2 minutes and then died peacefully...
@rccowboys
@rccowboys Жыл бұрын
🤣
@tom-on
@tom-on Жыл бұрын
john killed him :((
@seniorchonkza997
@seniorchonkza997 Жыл бұрын
Na no
@swbrecordsuk
@swbrecordsuk Жыл бұрын
nano lives matter
@pqudah
@pqudah 2 жыл бұрын
25:40 Tip: you can simulate a slower connection to see things clearer in the devtools by clicking the "Throttling" dropdown
@noviccen388
@noviccen388 23 күн бұрын
nice info
@makeshift27015
@makeshift27015 3 жыл бұрын
I have a computer science degree and can confirm I also have no idea what MIPS is.
@cryptostuff8479
@cryptostuff8479 2 жыл бұрын
its a RISC cpu by motorola. found on older systems and maybe routers
@97Ram1500Magnum
@97Ram1500Magnum 3 жыл бұрын
I see a lot of Mozi traffic requests at work. Usually targeting IoT nix systems, routers, and low hanging fruit exploits attempting to spread around.
@honcho1775
@honcho1775 3 жыл бұрын
"Sugar we're going down swinging, by Green Day" 😭😭😭
@greniacd8396
@greniacd8396 3 жыл бұрын
Me, a Fall Out Boy fan: *my disappointment is immeasurable and my day is ruined* Also Me, a John Hammond fan: I'm soooo happy there's a new video ^^
@zgeekdiver
@zgeekdiver 3 жыл бұрын
It made me sad too!
@CapitanDirp
@CapitanDirp Жыл бұрын
People: "What do you do for a living?" John: "I look at malware-strings no matter how long they are."
@larryslobster7881
@larryslobster7881 3 жыл бұрын
For hexedit : go to start/end of the file
@colbyhartman9467
@colbyhartman9467 Жыл бұрын
Even though this is a 2 year old video I just started watching your KZfaq channel a day or two or something like that but I like your content brother keep up your hard work I don't know if you do live on here or not but if you do I would love to see one of those live!!! If not keep it up I'll keep learning 😅😅 stay safe out there
@Scarter63
@Scarter63 2 жыл бұрын
I stumbled across your channel a couple of days ago, and have been binge watching ever since. Great job, and impressive resume.
@benvoisey3942
@benvoisey3942 3 жыл бұрын
I’m loving this series! Please do one explaining the methods you use.
@JCtheMusicMan_
@JCtheMusicMan_ 3 жыл бұрын
John, I love it! This is exactly what I do too. I don’t know what I’m doing but it’s fun to just scroll through to see if you see anything and sure enough you do. You also learn so much just by poking around.
@ultimate8673
@ultimate8673 3 жыл бұрын
Idk why it made me laugh so hard when you dragged your cam out of the window 😂😂😂😂
@cooliceman0001
@cooliceman0001 3 жыл бұрын
Lol he says he aint educated yet rips through anything thrown at him 🤣 😂
@felkan
@felkan 3 жыл бұрын
I found your channel yesterday and have been bingewatching hardcore. Ur vids are great!
@oijoij113
@oijoij113 3 жыл бұрын
I just found your channel and couldn't be happier. Great energy, looking forward to digging in.
@ScOrPiOnE905
@ScOrPiOnE905 2 жыл бұрын
At 25:24 the text scanned by Google translate is: "-先进的比特币矿池" And the translation provided by it was: "-Advanced Bitcoin mining pool"
@dieSpinnt
@dieSpinnt 3 жыл бұрын
I like to "customize" my UPX. Shuffle the fields of the header struct around and (binary)shift the content. XOR the compression algo by the C64 NOP and add 69 to exactly that file size shown in the video:P Also using the wrong endianess on purpose will promote hair loss. Thanks for the great video, John!:)
@LaurentLaborde
@LaurentLaborde 3 жыл бұрын
I just want to let you know that I'm screaming at you : "it's UPX packed ! why do you keep searching for string ? unpack it already !"
@Rafalu991
@Rafalu991 3 жыл бұрын
Even if I am barely understanding what is going on I found your videos very entertaining and educational! Thumbs up!
@John-hq9kx
@John-hq9kx 3 жыл бұрын
I've discovered your channel recently and i really like it ! You are very inspiring, thank you for this amazing content !
@telnobynoyator_6183
@telnobynoyator_6183 3 жыл бұрын
These videos are getting better and better ! Can't wait for what's next !
@notmyself8800
@notmyself8800 3 жыл бұрын
Love the Malware Analysis videos! And the commentary is entertaining man! Keep uploading and I'll keep watching! Thanks for the great content.
@TheAyushbest1
@TheAyushbest1 3 жыл бұрын
Really loving the Malware analysis videos. My morning routine is now watching these videos over reading a news paper 😂
@Omena0
@Omena0 Жыл бұрын
BRO THAT OUTRO MUSIC GAVE ME SOME FLASHBACKS AND NOSTALGIA
@JimzZel
@JimzZel 3 жыл бұрын
Thank you for making these videos John!
@Cazzar09
@Cazzar09 Жыл бұрын
Just came across this video and I noticed at 27:01 there is some commands for cfgtool which also sets the TR-069 (CWMP) Access Control Server to localhost, which could do a whole lot of advanced configuration/diagnostics of the device including re-flashing the firmware of the device.
@AlecArmbruster
@AlecArmbruster 3 жыл бұрын
This’ll be a good one, see you all here
@btnetro
@btnetro 3 жыл бұрын
MIPS is usually found on routers and this is targeting routers in beginning allowing the attacker to get into the network (hence the iptables allow)
@seetheious9879
@seetheious9879 2 жыл бұрын
Is there malware that nestles in the router before ever getting to the user machine? Would downloading it be enough for it to deploy? Or could it target the router through the VM?
@witisfalse2343
@witisfalse2343 3 жыл бұрын
Ah yes, it might be late but every hour is cyber hour.
@olokelo
@olokelo 3 жыл бұрын
Thanks for your video :D They're all awesome! The strange part is that I just yesterday figured out how to cross compile code for MIPS-I for my router (it's exact the same elf type as this virus). I never heard about this architecture untill about a week ago and suddenly you upload the video with this malware intended for routers. Anyway, love the passion that you share in your videos, please keep doing it haha :D
@user-zl6jp3sx2s
@user-zl6jp3sx2s 3 жыл бұрын
The particular characters mean the exactly the same thing as the English title, but in Chinese. That site probably just translated it
@TheDutchisGaming
@TheDutchisGaming Жыл бұрын
0:00 John Hammond == John Hammond == John Hammond
@trapOrdoom
@trapOrdoom Жыл бұрын
Dawg this is the most entertaining shit to watch, man. I listen to you like a podcast, I could actually listen/watch you all day.
@FreezeLuiz
@FreezeLuiz 3 жыл бұрын
I think the 114 dns, that we saw, is just a normal Chinese based dns server; nothing malicious in nature about the dns itself. It could be there to add more "surface area" to the malware.
@ratatta541
@ratatta541 3 жыл бұрын
Yay another one! thank you for your great work.
@micahweiss5832
@micahweiss5832 3 жыл бұрын
Awesome content. Thanks for putting up the video 👍🏻
@urib101
@urib101 3 жыл бұрын
This guy is a gem. Liking and commenting for the KZfaq algorithm
@dannelson2590
@dannelson2590 3 жыл бұрын
Awesome, thanks for more malware content!
@PiotrK2022
@PiotrK2022 Жыл бұрын
@John Hammond 28:53 That highlighted command is a trick to check whether or not busybox is installed I suppose. :) Keep that in mind John that all commandss like apt etc. etc. are in fact a bin finle that is stored in /bin directory, so I think this is a instruction for DD to look inside bin folder and look for busybox folder/check for its existance. :)
@stefan3816
@stefan3816 3 жыл бұрын
Big fan John! Always loved your content!
@stevecooper3574
@stevecooper3574 3 жыл бұрын
Loving the malware analysis vids John - keep repping the blue team :)
@TiagoEsperancaTriques
@TiagoEsperancaTriques 3 жыл бұрын
37:35 John, you have to "import file" (i) not "Open filesystem" (ctrl+i)
@mikekhourey521
@mikekhourey521 3 жыл бұрын
Do you know the difference between the two? What was Ghidra trying to do with .elf with the ctrl+i option which failed? :o
@forhadhossain8913
@forhadhossain8913 3 жыл бұрын
appreciate you brother. keep teaching us please.
@SICKFREDO
@SICKFREDO 3 жыл бұрын
god damn so much like!! i like these break downs! they are awesome!
@SsaliJonathan
@SsaliJonathan 2 жыл бұрын
John Hammond is amazing. I watch him and I dont know what he does most of the time
@MarcusHolloway_h3r3
@MarcusHolloway_h3r3 Жыл бұрын
5:37 this reaction is a gold xD
@aaronwhite1786
@aaronwhite1786 3 жыл бұрын
I got a cool one at work that was a phishing attempt through a Google Drive. Instantly made me think of your deconstruction videos.
@kyra371
@kyra371 Жыл бұрын
Thank you!
@TheSeakr
@TheSeakr 3 жыл бұрын
Good stuff, love this content man
@mrikea7577
@mrikea7577 3 жыл бұрын
This is going to be great!
@xpz7662
@xpz7662 3 жыл бұрын
Hi John love the videos! You think you could make a tutorial on setting up a safe environment to explore malicious programs? I know virtual environments, are a start, but I think getting a video template would help put some paranoia at bay. Thanks in advance and if you already uploaded this tutorial my apologies.
@cre8ive65
@cre8ive65 2 жыл бұрын
You can kind of think of MIPS like a simpler version of ARM. It's assembly code is so much simpler compared to say ARM or x86 that my University uses it to teach assembly basics and concepts of how a processor works. In my experience it's very common in SOHO networking and IoT devices.
@simplepentester8476
@simplepentester8476 3 жыл бұрын
I like catching these premieres. It's fun to watch, but lot's of it is over my head at this point.
@nathen418
@nathen418 3 жыл бұрын
OOOh im excited for this one
@rusirumunasingha2234
@rusirumunasingha2234 3 жыл бұрын
Destroyed and annihilated the bell! Great content!
@root317
@root317 3 жыл бұрын
Nice video. Can't wait for the next one! :)
@goodiezgrigis
@goodiezgrigis 2 жыл бұрын
I had you in the background, and as soon you mentioned netgear i was like, oh mips and netgear, he is in router infections.
@tetetsky
@tetetsky 3 жыл бұрын
Shout out from the Philippines!
@slano8850
@slano8850 3 жыл бұрын
A very entertaining analysis
@SinanAkkoyun
@SinanAkkoyun 3 жыл бұрын
Love your energy
@Thiole
@Thiole 3 жыл бұрын
still new to your videos, I am thinking of starting my pentesting journey again, you may have motivated me fellow ginger
@patrickgray6966
@patrickgray6966 3 жыл бұрын
I Think reversing Malware Is fantastic I have learned so much from watching this Ty
@haraprasadghosh6866
@haraprasadghosh6866 3 жыл бұрын
I all-time following you sir
@orgozlan323
@orgozlan323 3 жыл бұрын
Thank you so much
@ItDoBeWazy
@ItDoBeWazy Жыл бұрын
These videos are so good!!!!!
@originalgaming9062
@originalgaming9062 3 жыл бұрын
When you’re so early that john’s hearted every comment
@thecaretaker0007
@thecaretaker0007 3 жыл бұрын
Video title: "breadcrumbs" (also a new box on hackthebox ) Me: should definitely watch this
@KrakenPipe
@KrakenPipe 3 жыл бұрын
Sees John posted another malware analysis: Likes the video. Simple as.
@user-nu4hr6sj9n
@user-nu4hr6sj9n 3 жыл бұрын
was reading up on some botnets using Twitter formatted messages yesterday and this video now the timing confirms John get out of my computer!
@kddakid6
@kddakid6 3 жыл бұрын
Awesome video! Keep it up!
@JCtheMusicMan_
@JCtheMusicMan_ 3 жыл бұрын
John, I just thought of a Tag Line for this type of video for you. “Down the Rabbit Hole with John Hammond” 😁
@matthewlandry1352
@matthewlandry1352 3 жыл бұрын
JOHN I WANT TO YELL AT YOU FOR ... Creating a great video 🤪
@jorgevilla6523
@jorgevilla6523 3 жыл бұрын
Love this videos!!!
@Harrowthe12
@Harrowthe12 2 жыл бұрын
30:40 John, that's Huawei... The IT arm of a certain party
@codewithsmoil4098
@codewithsmoil4098 3 жыл бұрын
John hammond: Please send me malware. Me: John hammond is hungry for malwares.
@72muhamad72
@72muhamad72 2 жыл бұрын
Thanks for the great video. I would like to be like you as a professional in virus analysis.
@blade1551431
@blade1551431 3 жыл бұрын
Great video
@PantsManUK
@PantsManUK 3 жыл бұрын
30 mins in, my "they're trying to bot routers" radar starts going off...
@Demoralized88
@Demoralized88 2 жыл бұрын
Happened to my entire apartment complex (close to 1k people) and is still ongoing. Mirai-type behavior. I've had to disable wifi entirely and use ethernet. My ISP, Cox, said they 'can't do anything about it. This started 2+ months ago and I have no choice but to contact the Feds. Our gateways aren't listed in the strings here; they're mostly Arris, Cisco, etc, yet they were all cracked either by some known Wifi exploits I've read or updated rainbow tables. Scary shit and it dropped RATs and miners on all LANs it broke in to. I've tried removing it on my Alienware laptop but it seems to have written to firmware and or BIOS. Maybe a new variant?
@zacay5717
@zacay5717 2 жыл бұрын
@@Demoralized88 yayiks dude ! Any updates since ?
@Demoralized88
@Demoralized88 2 жыл бұрын
@@zacay5717 Certainly not from my ISP. Win support forums (particularly bleepingcomputer), have been flooded with the same issue I've been having for 2-3 months now and I've yet to find anything that quite describes what this is and how to remove it. I'm 99% It goes: spreads via Wifi exploits, known passwords or brute forcing - or BOTs probing random Modems for vulnerabilities. Either way, once it gets access to a LAN with Wifi, it hijacks the Router and any wireless cares to scan and spoof nearby devices until, thorough another exploit, Deauth attack, It gains access to adjacent LANs and in theory could propogate very quickly. When I first noticed weird shit in Windows I scanned nearby networks for anything suspicious because I was also having frequent Wifi dropouts for about a minute. That lead me to research what could be causing the Wifi dropping and I eventually read about Deauth attacks. The day after I took my computers offline, I noticed maybe 3-4 suspicious Wifi behavior. Within a day or 2, every single Wifi device (50+) I could see within range was also auto-spoofing by raising transmit power super high to spoof other WAPS, then killing the transmit in about 30-60 second incriments. Also, I don't know much about MAC spoofing, but when a new Wifi signal pops up, very shortly afterwards a second signal would pop up with the aforementioned bahvarior with a signal MAC address digit changed. As far as it persisting through format/reinstalls with new drives, it must have written itself to firmware of at least one of the components. I've read of this being done with Drivers, but I didn't think they'd persist through a reinstall. It's a RAT and either miner or some sort of botnet, but it's very stealthy and most casual users wouldn't notice anything amiss. It's subtle things a proficient Windows user would notice aren't right. Single frame blacked-out DOS windows booting in to Windows, Windows RE, CPU usage dropping from very high to low-moderate immediately upon open task manager, a bunch of stange GUIDs in registry, some settings/directories not accessible as admin, suddenly being in a domain with GP restrictions on certain config settings. I thought maybe I was just mistaken and paranoid, until 2 months later I started gettings alerts that some of my data had been hacked. There's so many fucking variants of malware and attack vectors for Windows that it's extremely hard to narrow down. It seems to be a fullly automated attack from the IP probing to exploits, to Root exploits, to spreading over LAN/WAN. People called me a schizo when I first posted about this on /g/ 2 months ago, but I think maybe new is finally starting to break about it, I hope. Dell is currently making new emergency BIOS for like all their systems for some vulnerability that I'm not sure is related. AV didn't stop it when it happened, and it still can't detect anything even with a lot of IOCs and breadcrumbs all over the OS. It's definitely a P2P botnet as it runs services for that functionality. I'm 99% sure it sneaks by in powershell via obfuscation to do whatever the fuck it wants, as John has repeatedly demonstarted. The only concrete thing I found was a 'Spyeye' entry in I believe the registry. I have no idea how to fix my PCs at this point, Wifi is unusuable as neighbors are infected, and my family has been without PCs for just over 2 months now. After I got 'hacked', I started reading and I can not fucking believe just HOW many critical exploits there are for Windows and Intel. Things they claim to have fixed as STILL being exploited. I've been stressed and depressed for the past 2 months trying to figure out what I can even do until when/if this becomes mainstream news. I see identical reports of mine ALL over support forums yet, strangely, Windows and big AV/Tech security firms have been dead silent. From what I've seen I'm convined this was an extremely widespread attack (browsing through some code, I'm thinking Chinese origin) and Windows is trying to keep the lid on this until they come up with a 'fix'. What's worse though is that a 'fix may not even be possible. Good malware these days uses programs to check for certain exploits on individual networks/systems, and it's impossible to protect against that for 99% of users, if at all. Sorry I wrote a book, this is just all so surreal and a lot of supposdely knowledgable people say this isn't possible when I KNOW it is.
@zacay5717
@zacay5717 2 жыл бұрын
@@Demoralized88 you have piqued my interest. I am going to look into this.
@PcFreak380
@PcFreak380 3 жыл бұрын
Maybe you already know that, but there is a nice Java based MIPS emulator called MARS. It is developed by the Missouri State University under the MIT license. It has some nice features like step by step execution and register editing. So if you at one point want to/need to work with MIPS, this is a great tool to assist you
@picneec13
@picneec13 Жыл бұрын
Very interesting!
@stefanolenocin4628
@stefanolenocin4628 3 жыл бұрын
I hope you will continue with reversing malware 4ever
@cyb3rtooth199
@cyb3rtooth199 3 жыл бұрын
Hey John! love your content! Just a quick question. How do you CTF creators hide text in images? What tools do you use?
@josjuarlister1059
@josjuarlister1059 Жыл бұрын
There are loads of Steganography utilities, my favourite is Outguess!
@josjuarlister1059
@josjuarlister1059 Жыл бұрын
There's also jphide & seek and steghide, they're good ones too!
@d0h
@d0h Жыл бұрын
I personally love how UPX was created for/by the Warez scene wayyy back in the day, and it's still one of the best packers out there. Pity it's so tied into the malware scene and often viewed as malicious.
@MounterZ
@MounterZ Жыл бұрын
I wonder if antivirus software actually unpacks UPX binaries itself, we know they're capable of lifting virtual machines from proprietary packers like VMProtect, should be easy to unpack UPX and analyze the "real" malware sandboxed on runtime.
@kharbandaumang
@kharbandaumang 3 жыл бұрын
your videos are very entertaining and you get to learn a lot. What else is needed???
@0xRalu
@0xRalu 3 жыл бұрын
Always here John!
@custume
@custume 3 жыл бұрын
This one is doing a lot, really a lot of stuff, might even do rat, great video
@kishanakbari8822
@kishanakbari8822 3 жыл бұрын
Bro I am completely beginner. Thanks a lot for best strings
@okuno54
@okuno54 3 жыл бұрын
I enjoy the pronunciation of Huawai as Huwai'i :P
@skilletpan5674
@skilletpan5674 3 жыл бұрын
I'm bummed out that Ruxcon seems to be over. Would have been cool to have met you in Oz some time John.
@Minecodes
@Minecodes 3 жыл бұрын
it's nice to know how that things work ;)
@zkf013
@zkf013 2 жыл бұрын
you and muda from someordinarygamer are so similar its crazy. love your content it is very informative and revealing.
@aulisarinili7297
@aulisarinili7297 3 жыл бұрын
I really like this one
@justknot4481
@justknot4481 3 жыл бұрын
a good tool is miranda , for MIPS systems
@logiciananimal
@logiciananimal Жыл бұрын
Mozi is the name of a classical text in Chinese philosophy. "Master Mo", literally, and one that is argued to be the Chinese counterpart to Aristotle for inventing a philosophy of science and a logic. I'm no Sinologist, but in the recent English edition I find that part of the text to be incomprehensible. The rest is an interesting counterpoint to the official and conservative Confucians and the quietist Daoists.
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
1:28:19
John Hammond
Рет қаралды 271 М.
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
1:12:12
John Hammond
Рет қаралды 356 М.
РАДУЖНАЯ ГОРКА 🌈😱
00:30
ВИОЛА 🐰
Рет қаралды 3,8 МЛН
ФОКУС С ЧИПСАМИ (секрет)
00:44
Masomka
Рет қаралды 2,9 МЛН
Good People Restore Faith in Humanity: A Heartwarming Act of Kindness on a Bus #shorts
00:32
Uncovering NETWIRE Malware - Discovery & Deobfuscation
59:46
John Hammond
Рет қаралды 90 М.
He tried to hack me...
34:15
John Hammond
Рет қаралды 372 М.
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
1:42:04
John Hammond
Рет қаралды 492 М.
TARGETED Phishing - Fake Outlook Password Harvester
47:09
John Hammond
Рет қаралды 256 М.
let's hack your home network // FREE CCNA // EP 9
30:16
NetworkChuck
Рет қаралды 3,7 МЛН
I Bought a Recording Jammer. It’s Legal.
14:00
Linus Tech Tips
Рет қаралды 931 М.
I Tried a Disney Secret Project!
11:33
Marques Brownlee
Рет қаралды 3,9 МЛН
TryHackMe! Bypassing Upload Filters & DirtySock
53:38
John Hammond
Рет қаралды 67 М.
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
31:20
John Hammond
Рет қаралды 159 М.
РАДУЖНАЯ ГОРКА 🌈😱
00:30
ВИОЛА 🐰
Рет қаралды 3,8 МЛН