I am not sure but isn’t this something like shodan?
@scott819334 минут бұрын
Starting the video with a ad 😢. Rip your watch time 😂
@charliebeaufils928141 минут бұрын
So powerfull! If a read teamer put this file in a smb share for example, whould the .ico be fetched by any viewers of the share? Or the ico will be cached by the DC?
@masondaniels8675Сағат бұрын
I was surprised to see after looking into Censys that they're physically located in Ann Arbor. I lived in Ann Arbor for years :-O
@trickyd499Сағат бұрын
only dumb people have show file extensions off
@user-hm1bh2iu4k2 сағат бұрын
Thanks John, you the boss!
@ValiantNomad2 сағат бұрын
Imagine looking at active cameras and randomly seeing someone through their webcam.. that would.. not be good.
@zaidasseh24644 сағат бұрын
Hey John big fan here, one thing though I noticed that this only works on windows 10 and does not give me the hash when I tried it on windows 11 is there any reason for that?
@Cydget5 сағат бұрын
I bet the company ignores robots.txt Very scummy
@zackeryhatch4366 сағат бұрын
Wonder if all these vulnerabilities are recognized by Huntress?
@User-mm3uy6 сағат бұрын
How can i get free ios file of windows 10 or win 11
@PikachuReactions6 сағат бұрын
0:14: 🔍 Uncovering a hidden file on the Windows desktop with potential security risks. 2:55: 💻 Exploring icon options in Windows 10 virtual machine and limited capabilities discovered. 5:47: 🔒 File reveals sensitive data through captured hashes. 8:27: 💻 File types can be used to steal passwords and authenticate without plain text passwords, even in web browsers. 11:06: 💻 Discussion on potential security vulnerability related to SCF files and social engineering tactics. 13:56: 💻 Implementing HTTPS on Port 8443, removing cache, and setting up a vulnerable version of Chromium. 16:49: 💻 Exploiting local variables to exfiltrate sensitive data through a DAV server on Port 80. Tammy AI: Get video info faster & better
@mycelia_ow5 сағат бұрын
Not all heroes werar capes, some just have weird pfps and apparently are AI.
@senshi017 сағат бұрын
I received the email. Gone to the link to download it. No download button for me I guess...
@4TheRecord8 сағат бұрын
Once saw one of these videos of an old guy asleep on his sofa, think the camera was inside a TV. You're better off covering anything thats got a camera if you don't want others being able to see you. I have tape covering the camera on my laptop for the same reason. If you've got any webcams also unplug them when not using them. There are thousands of links online and through google that give access to all these cameras.
@SzaboB338 сағат бұрын
A small correction: You meant "relay" the hash not "pass" because pass the hash attacks are different than NTLM relay attacks. It's quite confusing because of the misused terminology (I did it in the previous sentence as well for traditional reasons :D). But the pass-the-hash attack uses the password hash stored on the machine to generate NetNTLMv2 hashes that will be sent through the network. Relay attacks catch a NetNTLMv2 hash (just like responder does) and sends it through to another service that accepts NTLM authentication. Key differences: NetNTLMv2 hashes cannot be used for long, they expire. SMB signing (in case of SMB servers) can defend against relay attacks (but it will have like a 30% performance cut) while pass-the-hash attacks will work even if it's enabled.
@hackmasterHQ8 сағат бұрын
I thought section .data came before section .text?
@rompis.a8 сағат бұрын
Isn't this kinda like SHODAN?
@romnickdejesus6048 сағат бұрын
how about facebook account? the email and number is no longer registered at two way authentication factor is off by the hacker, is it possible to recover it? thanks in advance, by the way i am from Philippines
@planktonfun110 сағат бұрын
I use it to check traffic, but the public cameras are pretty slow since everybody is using it
@zanidd11 сағат бұрын
Classic John Hammond, always traveling so we can't pinpoint his location with OSINT
@chriskaprys11 сағат бұрын
12:07 For those starting out in gdb, as I am: I believe what he was looking for there was x/500b (or x/500xb). It was already printing in xw (hex, word) mode, so x/500 (i.e. x/500xw) gave the *hex* of the 500 *words* at that address. b = byte h = half-byte (2 bytes) w = word (4 bytes) g = giant word (8 bytes) 👍 13:18 or, as Scooby would say, the "ROPportunities" 😜
@SolitaryElite12 сағат бұрын
Very old trick, i remember using this to infect my teachers computer so i could steal the tests early
@Pokelon-12 сағат бұрын
whats the link for tor 66
@philosoaper12 сағат бұрын
I am, have always been and plan on always being...a shift+delete kind of person.
@maxdemontbron972012 сағат бұрын
Mind blown
@anounTT13 сағат бұрын
Malicious hackers write some sloppy code.
@mrch33sehed9313 сағат бұрын
Probably just me but you sound like Seth Rogen if he wasn't a weed smoker 🫡👌
@h8handles13 сағат бұрын
Running and gunnin! Hotel YT production. Good to see you John! Great video
@dand.294413 сағат бұрын
Neat info
@r2k24715 сағат бұрын
Love, John Hammond. :)
@dmsysoj241515 сағат бұрын
one thing that i appreciate about your videos is that you zoom the screen big enough to make it easier to read and watch. and i think people don't point that out enough. thanks.
@codycortello13 сағат бұрын
Further, I also love that he vocalizes the hotkeys he's using, a la 5:10. Really thoughtful, and uncommon for a video unrelated to computer shortcuts
@BillAnt7 сағат бұрын
It's great, most other videos are barely readable at 1080p/4k. Thanks John! :)
@josecintron8515 сағат бұрын
I just did something like this not that long ago and pwnd the SOC for the folks that I was working for. I downloaded an SCF to my computer which pointed to my host on the Internet, well the SOC saw the file saved it their desktop and all of the sudden I had a connection to my host from one of the SOC users (which BTW had admin rights on an S* load of systems) after that I used his credentials, with pass the hash, to own the place.
@rectalespionagesailboat481915 сағат бұрын
It's like we are playing geoguesser but with random internet cameras.
@rectalespionagesailboat481916 сағат бұрын
"I'm trying to drag this file to the bin but it just WILL NOT GO IN THERE" 😅🤣 Another fun option would be to change the right-click context options for this file to look like it is a recycle bin - the context menus for the bin vs. files look pretty different and someone who is apprehensive might be able to figure out something is up just by right clicking the file and seeing no recycle-related-options. But maybe not if it looks exactly like the bin menus. OR ... could you somehow link the trap file to the REAL recycle bin, and simply pass the user in a way that looks normal? (IE: logs info, then just opens the real recycling bin so fast the user would never notice)
@skore997516 сағат бұрын
SMB seems like it's primarily a vulnerability generating protocol that just happens to also let you share files
@rockpie16 сағат бұрын
the odd thing on your desktop is that you use google chrome
@shaungoodyear966417 сағат бұрын
Restore normal function : Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\.scf] @="SHCmdFile"
@mastercodeon4217 сағат бұрын
Yooo, I swear you always have the most absurd things in windows to perform malicious actions with, absolutely love it!
@shaungoodyear966417 сағат бұрын
dot SCF File Fix create a new dot reg file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\.scf] "Content Type"="text/plain" "PerceivedType"="text" @="txtfile" [HKEY_CLASSES_ROOT\.scf\PersistentHandler] @="{5e941d80-bf96-11cd-b579-08002b30bfeb}" [HKEY_CLASSES_ROOT\.scf\ShellNew] "ItemName"=hex(2):40,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,\ 6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,\ 00,6e,00,6f,00,74,00,65,00,70,00,61,00,64,00,2e,00,65,00,78,00,65,00,2c,00,\ 2d,00,34,00,37,00,30,00,00,00 "NullFile"="" run new dot reg file and done.
@MrJosholech17 сағат бұрын
Thank you for the awesome content, Scary that this works on network file shares and USB drives.
@carsonjamesiv251217 сағат бұрын
COOL!
@craigblackie203418 сағат бұрын
You wouldn't be able to "pass the hash" this isn't ntlm, this is a different format known as net-NTLM, you can relay this though, so long as there is no signing in place.
@craigblackie203418 сағат бұрын
And yes, you can get ntlm from net-ntlmv1, but that involves a cracking process still.
@Randomhandle114918 сағат бұрын
I'm too dumb to understand everything You present, but how I have been told "I love when You speak technical to me"
@cyberenews18 сағат бұрын
"I use chatgpt" then you're a skid.
@yalekthelembine039118 сағат бұрын
Why does the Linux community ignore this? Especially Linus Torvalds? Because they're also hackers. And by the way RMS, hacker is also ambiguous . Hacking is also dangerous because of its black hat definition.
@user-fm5sz2br2p19 сағат бұрын
Windows is the Devil
@BillAnt7 сағат бұрын
Maybe not the entire Windows, but "The devil is in the details". ;D
@perfidy4719 сағат бұрын
Doesn't seem to work on Windows 11
@hamedranaee564119 сағат бұрын
You are the one 💪
@sasjadevries19 сағат бұрын
Alright, so you can set a custom icon for a richtext file or word document... 🤷♂ Seems cool, but noone really uses it afaik. But then allowing a network location for an icon, on a local document file is really odd🤦♂, I don't think anyone asked for that feature whatsoever.