This File Steals Passwords

  Рет қаралды 81,148

John Hammond

John Hammond

12 күн бұрын

jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management -- find what is exposed out on the open Internet with Censys! jh.live/censys
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
Read The Hacker Mindset by Garret Gee: jh.live/hackermindset
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥KZfaq ALGORITHM ➡ Like, Comment, & Subscribe!

Пікірлер: 98
@dmsysoj2415
@dmsysoj2415 10 күн бұрын
one thing that i appreciate about your videos is that you zoom the screen big enough to make it easier to read and watch. and i think people don't point that out enough. thanks.
@codycortello
@codycortello 10 күн бұрын
Further, I also love that he vocalizes the hotkeys he's using, a la 5:10. Really thoughtful, and uncommon for a video unrelated to computer shortcuts
@BillAnt
@BillAnt 10 күн бұрын
It's great, most other videos are barely readable at 1080p/4k. Thanks John! :)
@wcoltters
@wcoltters 8 күн бұрын
Yes! Absolutely! Not everyone has 32 or 43 inch monitors. And not everyone has 20/20 vision right? Keep the big fonts.
@BillAnt
@BillAnt 8 күн бұрын
@@wcoltters - I think the problem is that creators usually have larger displays forgetting about their less than 17" screen users.
@bmc2266
@bmc2266 4 күн бұрын
You can zoom any video on phone and laptop/desktop. Either pause it or not : On phone use 2 fingers on the screen and move then the opposite direction. On laptop/desktop, use the magnifier. (Windows key+CTRL+M) Google it, there is other ways too.
@SolitaryElite
@SolitaryElite 10 күн бұрын
Very old trick, i remember using this to infect my teachers computer so i could steal the tests early
@neilpatil7786
@neilpatil7786 Күн бұрын
I used this too bro 😊 7 times
@skore9975
@skore9975 10 күн бұрын
SMB seems like it's primarily a vulnerability generating protocol that just happens to also let you share files
@ToniMorton
@ToniMorton 10 күн бұрын
really seems like Microsoft should implement some security measures for these scf files
@user-qr4jf4tv2x
@user-qr4jf4tv2x 10 күн бұрын
like showing extension always
@DeNikow
@DeNikow 10 күн бұрын
Not only that. You can do the same thing with hidden desktop.Ini files that are automatically triggered when opening a folder. It's how canary most folder canary tokens work.
@ffggvfg4323
@ffggvfg4323 10 күн бұрын
Lmao imagine
@josecintron85
@josecintron85 10 күн бұрын
@@user-qr4jf4tv2x actually remove the functionality all together, I really don't see the point of having them.
@ecu4321
@ecu4321 10 күн бұрын
i find it odd that microsoft keeps opting to HIDE extension names by default even going as far as force-hiding it even if you set it to always show, like in this case of SCF files. it's like microsoft is allowing threat actors in making windows vulnerable. it's their MacOS/Linux obsession that's influenced this compromised design decision
@0xC47P1C3
@0xC47P1C3 10 күн бұрын
You’re a machine man. Your work ethic is next level
@BillAnt
@BillAnt 10 күн бұрын
John's great, unlike NetworkChuck who chucks through everything quickly, almost impossible to follow his quick cut scenes. smh
@mastercodeon42
@mastercodeon42 10 күн бұрын
Yooo, I swear you always have the most absurd things in windows to perform malicious actions with, absolutely love it!
@h8handles
@h8handles 10 күн бұрын
Running and gunnin! Hotel YT production. Good to see you John! Great video
@pera4754
@pera4754 8 күн бұрын
The point is clear - you have just to make somehow a request from victim PC via SMB, fool it that you're going to authenticate it and it gives you it's NTLM hash. But, I couldn't replicate this attack (at least this way). I've done exactly how did you in video and simply nothing happened. Responder was listening correctly and all VMs were in the same network. Windows 10 nor Windows 7 responds to this. Guest OS: Windows 10, Kali Hypervisor: Virtualbox Networking: Bridged (both of them)
@Randomhandle1149
@Randomhandle1149 10 күн бұрын
I'm too dumb to understand everything You present, but how I have been told "I love when You speak technical to me"
@r2k247
@r2k247 10 күн бұрын
Love, John Hammond. :)
@Donder1337
@Donder1337 10 күн бұрын
It's really cool to get this working :P Love your content!
@user-hm1bh2iu4k
@user-hm1bh2iu4k 10 күн бұрын
Thanks John, you the boss!
@user-fm5sz2br2p
@user-fm5sz2br2p 10 күн бұрын
Windows is the Devil
@BillAnt
@BillAnt 10 күн бұрын
Maybe not the entire Windows, but "The devil is in the details". ;D
@MrJosholech
@MrJosholech 10 күн бұрын
Thank you for the awesome content, Scary that this works on network file shares and USB drives.
@natoreus
@natoreus 9 күн бұрын
ok that is really cool. Thank you for doing these types of videos.
@LDowning0190
@LDowning0190 11 күн бұрын
Great content as always!! TY!
@philosoaper
@philosoaper 10 күн бұрын
I am, have always been and plan on always being...a shift+delete kind of person.
@SzaboB33
@SzaboB33 10 күн бұрын
A small correction: You meant "relay" the hash not "pass" because pass the hash attacks are different than NTLM relay attacks. It's quite confusing because of the misused terminology (I did it in the previous sentence as well for traditional reasons :D). But the pass-the-hash attack uses the password hash stored on the machine to generate NetNTLMv2 hashes that will be sent through the network. Relay attacks catch a NetNTLMv2 hash (just like responder does) and sends it through to another service that accepts NTLM authentication. Key differences: NetNTLMv2 hashes cannot be used for long, they expire. SMB signing (in case of SMB servers) can defend against relay attacks (but it will have like a 30% performance cut) while pass-the-hash attacks will work even if it's enabled.
@ak2o614
@ak2o614 9 күн бұрын
Was gonna post a comment about it too, thanks for the precision ;)
@pera4754
@pera4754 8 күн бұрын
So clearly explained !
@charliebeaufils9281
@charliebeaufils9281 10 күн бұрын
So powerfull! If a read teamer put this file in a smb share for example, whould the .ico be fetched by any viewers of the share? Or the ico will be cached by the DC?
@subhankarpaul9743
@subhankarpaul9743 5 күн бұрын
Literally amazing 😲😲😲😎
@sasjadevries
@sasjadevries 10 күн бұрын
Alright, so you can set a custom icon for a richtext file or word document... 🤷‍♂ Seems cool, but noone really uses it afaik. But then allowing a network location for an icon, on a local document file is really odd🤦‍♂, I don't think anyone asked for that feature whatsoever.
@ExtremeContent-hq
@ExtremeContent-hq 10 күн бұрын
Who cares about you 😔
@HexaLabCheats
@HexaLabCheats 11 күн бұрын
Love ur vids
@josecintron85
@josecintron85 10 күн бұрын
I just did something like this not that long ago and pwnd the SOC for the folks that I was working for. I downloaded an SCF to my computer which pointed to my host on the Internet, well the SOC saw the file saved it their desktop and all of the sudden I had a connection to my host from one of the SOC users (which BTW had admin rights on an S* load of systems) after that I used his credentials, with pass the hash, to own the place.
@unstyled3509
@unstyled3509 8 күн бұрын
sounds like you're admitting to a crime (umless you had consent) which isn't a great idea since people might be able to get your email or other potential info
@josecintron85
@josecintron85 8 күн бұрын
@@unstyled3509 Not sure how I said I did anything illegal, but in any case it was authorized as part of my job and the report has already been delivered to the company that hired us.
@witwolfdebruin
@witwolfdebruin 5 күн бұрын
Hi John, Thank you for all the information you share with all of us! I need some help some Russians hacked my email account so I have changed all passwords as required. I have the ip address it was accessed from. How can I revert their action towards them back?
@jfro_
@jfro_ 7 күн бұрын
yow John, unrelated topic here, just want to ask if you know how to install linux mint or ubuntu dual boot with windows 10 if i don't have flash drive and dvd to create bootable installer. thanks
@0xgordo350
@0xgordo350 9 күн бұрын
we cannot make pass the hash with ntlmv2
@zackeryhatch436
@zackeryhatch436 10 күн бұрын
Wonder if all these vulnerabilities are recognized by Huntress?
@welter240
@welter240 10 күн бұрын
you should make a anti-viris, malware...etc
@isheamongus811
@isheamongus811 6 күн бұрын
The same with .lnk except the arrow.
@JNET_Reloaded
@JNET_Reloaded 10 күн бұрын
thats mad, and i alrway riht click recycle bin to empty it i never open it luckily but i see the point any icon can be used lol
@maxdemontbron9720
@maxdemontbron9720 10 күн бұрын
Mind blown
@ryanpritchard3755
@ryanpritchard3755 6 күн бұрын
I need that for iPhone and for any laptop in S mode windows
@craigblackie2034
@craigblackie2034 10 күн бұрын
You wouldn't be able to "pass the hash" this isn't ntlm, this is a different format known as net-NTLM, you can relay this though, so long as there is no signing in place.
@craigblackie2034
@craigblackie2034 10 күн бұрын
And yes, you can get ntlm from net-ntlmv1, but that involves a cracking process still.
@blinking_dodo
@blinking_dodo 10 күн бұрын
I have known this for *quite* a while. And there's a bug related to this that might be exploitable too. 😄 It was fun to toy around with, but since nobody was interested i just ignored it for a while. 🤷‍♂
@hamedranaee5641
@hamedranaee5641 10 күн бұрын
You are the one 💪
@soggybaguette8457
@soggybaguette8457 11 күн бұрын
Hell yeah new video
@perfidy47
@perfidy47 10 күн бұрын
Doesn't seem to work on Windows 11
@zaidasseh2464
@zaidasseh2464 10 күн бұрын
Hey John big fan here, one thing though I noticed that this only works on windows 10 and does not give me the hash when I tried it on windows 11 is there any reason for that?
@_JohnHammond
@_JohnHammond 9 күн бұрын
I've gotten this to work on Windows 11. How are you setting the icon path? I have had the most success when I wrap it in double quotes and use forward-slashes rather than backlashes, i.e. "//10.0.0.155/share/fake.ico"
@dand.2944
@dand.2944 10 күн бұрын
Neat info
@psalmskhris3925
@psalmskhris3925 10 күн бұрын
Does it still dump the hashes and info via flash disk usage Without placing it in the system storage
@DI0NY5US
@DI0NY5US 10 күн бұрын
Yes. If you open a folder with a .scf file in it Windows will try to display the icon.
@psalmskhris3925
@psalmskhris3925 10 күн бұрын
@@DI0NY5US thanks 👍🏾
@themirrazz
@themirrazz 7 күн бұрын
I will never use an SCF file again (maybe)
@sam_sheridan
@sam_sheridan 9 күн бұрын
You find the strangest things :)
@ZoofyZoof
@ZoofyZoof 2 күн бұрын
My recycle bin is named Garbage
@foxguysumthing
@foxguysumthing 10 күн бұрын
Don't give me ideas.
@zanidd
@zanidd 10 күн бұрын
Classic John Hammond, always traveling so we can't pinpoint his location with OSINT
@user-rj6ff8wu6x
@user-rj6ff8wu6x 7 күн бұрын
Ima try this exploit on a big corporation xd
@Mr.Robot-E-Corp
@Mr.Robot-E-Corp 10 күн бұрын
Interesting
@carsonjamesiv2512
@carsonjamesiv2512 10 күн бұрын
COOL!
@HexklTheHexagon
@HexklTheHexagon 11 күн бұрын
WHAT 1 MINUTE AGO?
@Ryder7223
@Ryder7223 10 күн бұрын
22 minutes ago Geometry Dash reference :O
@testingme7936
@testingme7936 9 күн бұрын
can you makea udemy cours please?thanks
@rockpie
@rockpie 10 күн бұрын
the odd thing on your desktop is that you use google chrome
@ghoost8
@ghoost8 11 күн бұрын
👍🏽
@kucingBermisai
@kucingBermisai 11 күн бұрын
HA
@ThePubg3169
@ThePubg3169 11 күн бұрын
🇦🇿🇦🇿🇦🇿🇦🇿🇦🇿🇦🇿🇦🇿
@Happyface-pz5zj
@Happyface-pz5zj 11 күн бұрын
First
@eitancollett
@eitancollett 11 күн бұрын
hate to be that guy but first
@mk-ps6xv
@mk-ps6xv 10 күн бұрын
you aren't that guy
@eitancollett
@eitancollett 10 күн бұрын
@@mk-ps6xv i would never nahhhhhh
@DerMarkus1982
@DerMarkus1982 10 күн бұрын
"... will *never show* its file extension ..." That's only true as long as the "NeverShowExt" Registry Value is present under SHCmdFile [HKCR\.scf points to HKCR\SHCmdFile].
@UNcommonSenseAUS
@UNcommonSenseAUS 10 күн бұрын
This. Windows is such a heap Of turd
@rectalespionagesailboat4819
@rectalespionagesailboat4819 10 күн бұрын
"I'm trying to drag this file to the bin but it just WILL NOT GO IN THERE" 😅🤣 Another fun option would be to change the right-click context options for this file to look like it is a recycle bin - the context menus for the bin vs. files look pretty different and someone who is apprehensive might be able to figure out something is up just by right clicking the file and seeing no recycle-related-options. But maybe not if it looks exactly like the bin menus. OR ... could you somehow link the trap file to the REAL recycle bin, and simply pass the user in a way that looks normal? (IE: logs info, then just opens the real recycling bin so fast the user would never notice)
@mrch33sehed93
@mrch33sehed93 10 күн бұрын
Probably just me but you sound like Seth Rogen if he wasn't a weed smoker 🫡👌
@Whiteboytripping
@Whiteboytripping 6 күн бұрын
Windoze is and always has been a train wreck
@tanveeraalam3271
@tanveeraalam3271 11 күн бұрын
First
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 146 М.
Finding WEIRD Typosquatting Websites
24:26
John Hammond
Рет қаралды 236 М.
ФОКУС С ЧИПСАМИ (секрет)
00:44
Masomka
Рет қаралды 4 МЛН
SMART GADGET FOR COOL PARENTS ☔️
00:30
123 GO! HOUSE
Рет қаралды 21 МЛН
请善待你的娃娃第二集 #naruto  #cosplay  #shorts
00:52
佐助与鸣人
Рет қаралды 24 МЛН
This Insane Virus Trick Would Have Fooled Me - Watch Out!
7:53
Detect Hackers & Malware on your Computer (literally for free)
16:38
Decrypt a Mifare Classic 1K
6:12
Tech Security Tools
Рет қаралды 6 М.
You’ve Never Seen WiFi Like This
20:43
Data Slayer
Рет қаралды 245 М.
Why Some Designs Are Impossible to Improve: Quintessence
33:03
Design Theory
Рет қаралды 664 М.
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 999 М.
Hackers Use Github For Malware
20:44
John Hammond
Рет қаралды 59 М.
I shouldn’t have kept the $1,000,000 computer
28:05
Linus Tech Tips
Рет қаралды 934 М.
How Communists Made Unbreakable Glass
15:02
fern
Рет қаралды 1,3 МЛН
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 247 М.
ФОКУС С ЧИПСАМИ (секрет)
00:44
Masomka
Рет қаралды 4 МЛН