Hackers Use Github For Malware
20:44
2 сағат бұрын
Bypassing SmartScreen on Web Browsers
17:31
14 сағат бұрын
Telegram Has Been Hacked
8:40
19 сағат бұрын
Scraping Dark Web Sites with Python
19:29
The Apex Legends Hacker: Destroyer2009
21:47
The Apex Legends Hack.
15:54
Ай бұрын
The Secrets of The Tor Browser
19:10
Can a PDF File be Malware?
22:26
Пікірлер
@curioplays
@curioplays 8 минут бұрын
A friend showed me how to do this in 2007
@hesmo_smm
@hesmo_smm 27 минут бұрын
I am not sure but isn’t this something like shodan?
@scott8193
@scott8193 34 минут бұрын
Starting the video with a ad 😢. Rip your watch time 😂
@charliebeaufils9281
@charliebeaufils9281 41 минут бұрын
So powerfull! If a read teamer put this file in a smb share for example, whould the .ico be fetched by any viewers of the share? Or the ico will be cached by the DC?
@masondaniels8675
@masondaniels8675 Сағат бұрын
I was surprised to see after looking into Censys that they're physically located in Ann Arbor. I lived in Ann Arbor for years :-O
@trickyd499
@trickyd499 Сағат бұрын
only dumb people have show file extensions off
@user-hm1bh2iu4k
@user-hm1bh2iu4k 2 сағат бұрын
Thanks John, you the boss!
@ValiantNomad
@ValiantNomad 2 сағат бұрын
Imagine looking at active cameras and randomly seeing someone through their webcam.. that would.. not be good.
@zaidasseh2464
@zaidasseh2464 4 сағат бұрын
Hey John big fan here, one thing though I noticed that this only works on windows 10 and does not give me the hash when I tried it on windows 11 is there any reason for that?
@Cydget
@Cydget 5 сағат бұрын
I bet the company ignores robots.txt Very scummy
@zackeryhatch436
@zackeryhatch436 6 сағат бұрын
Wonder if all these vulnerabilities are recognized by Huntress?
@User-mm3uy
@User-mm3uy 6 сағат бұрын
How can i get free ios file of windows 10 or win 11
@PikachuReactions
@PikachuReactions 6 сағат бұрын
0:14: 🔍 Uncovering a hidden file on the Windows desktop with potential security risks. 2:55: 💻 Exploring icon options in Windows 10 virtual machine and limited capabilities discovered. 5:47: 🔒 File reveals sensitive data through captured hashes. 8:27: 💻 File types can be used to steal passwords and authenticate without plain text passwords, even in web browsers. 11:06: 💻 Discussion on potential security vulnerability related to SCF files and social engineering tactics. 13:56: 💻 Implementing HTTPS on Port 8443, removing cache, and setting up a vulnerable version of Chromium. 16:49: 💻 Exploiting local variables to exfiltrate sensitive data through a DAV server on Port 80. Tammy AI: Get video info faster & better
@mycelia_ow
@mycelia_ow 5 сағат бұрын
Not all heroes werar capes, some just have weird pfps and apparently are AI.
@senshi01
@senshi01 7 сағат бұрын
I received the email. Gone to the link to download it. No download button for me I guess...
@4TheRecord
@4TheRecord 8 сағат бұрын
Once saw one of these videos of an old guy asleep on his sofa, think the camera was inside a TV. You're better off covering anything thats got a camera if you don't want others being able to see you. I have tape covering the camera on my laptop for the same reason. If you've got any webcams also unplug them when not using them. There are thousands of links online and through google that give access to all these cameras.
@SzaboB33
@SzaboB33 8 сағат бұрын
A small correction: You meant "relay" the hash not "pass" because pass the hash attacks are different than NTLM relay attacks. It's quite confusing because of the misused terminology (I did it in the previous sentence as well for traditional reasons :D). But the pass-the-hash attack uses the password hash stored on the machine to generate NetNTLMv2 hashes that will be sent through the network. Relay attacks catch a NetNTLMv2 hash (just like responder does) and sends it through to another service that accepts NTLM authentication. Key differences: NetNTLMv2 hashes cannot be used for long, they expire. SMB signing (in case of SMB servers) can defend against relay attacks (but it will have like a 30% performance cut) while pass-the-hash attacks will work even if it's enabled.
@hackmasterHQ
@hackmasterHQ 8 сағат бұрын
I thought section .data came before section .text?
@rompis.a
@rompis.a 8 сағат бұрын
Isn't this kinda like SHODAN?
@romnickdejesus604
@romnickdejesus604 8 сағат бұрын
how about facebook account? the email and number is no longer registered at two way authentication factor is off by the hacker, is it possible to recover it? thanks in advance, by the way i am from Philippines
@planktonfun1
@planktonfun1 10 сағат бұрын
I use it to check traffic, but the public cameras are pretty slow since everybody is using it
@zanidd
@zanidd 11 сағат бұрын
Classic John Hammond, always traveling so we can't pinpoint his location with OSINT
@chriskaprys
@chriskaprys 11 сағат бұрын
12:07 For those starting out in gdb, as I am: I believe what he was looking for there was x/500b (or x/500xb). It was already printing in xw (hex, word) mode, so x/500 (i.e. x/500xw) gave the *hex* of the 500 *words* at that address. b = byte h = half-byte (2 bytes) w = word (4 bytes) g = giant word (8 bytes) 👍 13:18 or, as Scooby would say, the "ROPportunities" 😜
@SolitaryElite
@SolitaryElite 12 сағат бұрын
Very old trick, i remember using this to infect my teachers computer so i could steal the tests early
@Pokelon-
@Pokelon- 12 сағат бұрын
whats the link for tor 66
@philosoaper
@philosoaper 12 сағат бұрын
I am, have always been and plan on always being...a shift+delete kind of person.
@maxdemontbron9720
@maxdemontbron9720 12 сағат бұрын
Mind blown
@anounTT
@anounTT 13 сағат бұрын
Malicious hackers write some sloppy code.
@mrch33sehed93
@mrch33sehed93 13 сағат бұрын
Probably just me but you sound like Seth Rogen if he wasn't a weed smoker 🫡👌
@h8handles
@h8handles 13 сағат бұрын
Running and gunnin! Hotel YT production. Good to see you John! Great video
@dand.2944
@dand.2944 13 сағат бұрын
Neat info
@r2k247
@r2k247 15 сағат бұрын
Love, John Hammond. :)
@dmsysoj2415
@dmsysoj2415 15 сағат бұрын
one thing that i appreciate about your videos is that you zoom the screen big enough to make it easier to read and watch. and i think people don't point that out enough. thanks.
@codycortello
@codycortello 13 сағат бұрын
Further, I also love that he vocalizes the hotkeys he's using, a la 5:10. Really thoughtful, and uncommon for a video unrelated to computer shortcuts
@BillAnt
@BillAnt 7 сағат бұрын
It's great, most other videos are barely readable at 1080p/4k. Thanks John! :)
@josecintron85
@josecintron85 15 сағат бұрын
I just did something like this not that long ago and pwnd the SOC for the folks that I was working for. I downloaded an SCF to my computer which pointed to my host on the Internet, well the SOC saw the file saved it their desktop and all of the sudden I had a connection to my host from one of the SOC users (which BTW had admin rights on an S* load of systems) after that I used his credentials, with pass the hash, to own the place.
@rectalespionagesailboat4819
@rectalespionagesailboat4819 15 сағат бұрын
It's like we are playing geoguesser but with random internet cameras.
@rectalespionagesailboat4819
@rectalespionagesailboat4819 16 сағат бұрын
"I'm trying to drag this file to the bin but it just WILL NOT GO IN THERE" 😅🤣 Another fun option would be to change the right-click context options for this file to look like it is a recycle bin - the context menus for the bin vs. files look pretty different and someone who is apprehensive might be able to figure out something is up just by right clicking the file and seeing no recycle-related-options. But maybe not if it looks exactly like the bin menus. OR ... could you somehow link the trap file to the REAL recycle bin, and simply pass the user in a way that looks normal? (IE: logs info, then just opens the real recycling bin so fast the user would never notice)
@skore9975
@skore9975 16 сағат бұрын
SMB seems like it's primarily a vulnerability generating protocol that just happens to also let you share files
@rockpie
@rockpie 16 сағат бұрын
the odd thing on your desktop is that you use google chrome
@shaungoodyear9664
@shaungoodyear9664 17 сағат бұрын
Restore normal function : Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\.scf] @="SHCmdFile"
@mastercodeon42
@mastercodeon42 17 сағат бұрын
Yooo, I swear you always have the most absurd things in windows to perform malicious actions with, absolutely love it!
@shaungoodyear9664
@shaungoodyear9664 17 сағат бұрын
dot SCF File Fix create a new dot reg file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\.scf] "Content Type"="text/plain" "PerceivedType"="text" @="txtfile" [HKEY_CLASSES_ROOT\.scf\PersistentHandler] @="{5e941d80-bf96-11cd-b579-08002b30bfeb}" [HKEY_CLASSES_ROOT\.scf\ShellNew] "ItemName"=hex(2):40,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,\ 6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,\ 00,6e,00,6f,00,74,00,65,00,70,00,61,00,64,00,2e,00,65,00,78,00,65,00,2c,00,\ 2d,00,34,00,37,00,30,00,00,00 "NullFile"="" run new dot reg file and done.
@MrJosholech
@MrJosholech 17 сағат бұрын
Thank you for the awesome content, Scary that this works on network file shares and USB drives.
@carsonjamesiv2512
@carsonjamesiv2512 17 сағат бұрын
COOL!
@craigblackie2034
@craigblackie2034 18 сағат бұрын
You wouldn't be able to "pass the hash" this isn't ntlm, this is a different format known as net-NTLM, you can relay this though, so long as there is no signing in place.
@craigblackie2034
@craigblackie2034 18 сағат бұрын
And yes, you can get ntlm from net-ntlmv1, but that involves a cracking process still.
@Randomhandle1149
@Randomhandle1149 18 сағат бұрын
I'm too dumb to understand everything You present, but how I have been told "I love when You speak technical to me"
@cyberenews
@cyberenews 18 сағат бұрын
"I use chatgpt" then you're a skid.
@yalekthelembine0391
@yalekthelembine0391 18 сағат бұрын
Why does the Linux community ignore this? Especially Linus Torvalds? Because they're also hackers. And by the way RMS, hacker is also ambiguous . Hacking is also dangerous because of its black hat definition.
@user-fm5sz2br2p
@user-fm5sz2br2p 19 сағат бұрын
Windows is the Devil
@BillAnt
@BillAnt 7 сағат бұрын
Maybe not the entire Windows, but "The devil is in the details". ;D
@perfidy47
@perfidy47 19 сағат бұрын
Doesn't seem to work on Windows 11
@hamedranaee5641
@hamedranaee5641 19 сағат бұрын
You are the one 💪
@sasjadevries
@sasjadevries 19 сағат бұрын
Alright, so you can set a custom icon for a richtext file or word document... 🤷‍♂ Seems cool, but noone really uses it afaik. But then allowing a network location for an icon, on a local document file is really odd🤦‍♂, I don't think anyone asked for that feature whatsoever.
@ExtremeContent-hq
@ExtremeContent-hq 17 сағат бұрын
Who cares about you 😔