- 1 493
- 52 891 326
John Hammond
United States
Приєднався 5 лют 2011
Free Cybersecurity Education and Ethical Hacking.
Hackers Abuse Zero-Day Exploit for CrushFTP
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
Read The Hacker Mindset by Garret Gee: jh.live/hackermindset
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
Read The Hacker Mindset by Garret Gee: jh.live/hackermindset
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
Переглядів: 47 525
Відео
This File Steals Passwords
Переглядів 77 тис.День тому
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Hackers Use Github For Malware
Переглядів 54 тис.День тому
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEW...
Finding WEIRD Devices on the Public Internet
Переглядів 140 тис.День тому
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Government Unveils Malware Analysis Tool, But...
Переглядів 22 тис.14 днів тому
CISA's Malware Next-Gen: www.cisa.gov/resources-tools/services/malware-next-generation-analysis Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagr...
Bypassing SmartScreen on Web Browsers
Переглядів 56 тис.14 днів тому
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreo...
Telegram Has Been Hacked
Переглядів 192 тис.14 днів тому
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok 💥 SEND ME MALWARE ➡ jh.live/malware 🔥UA-cam ALGORITHM ➡ Like, Comment, & Sub...
I Hacked The Cloud: Azure Managed Identities
Переглядів 59 тис.21 день тому
jh.live/alteredsecurity || Altered Security has just released their new "Advanced Azure Attacks" course and "Certified Azure Red Team Expert" certification use code HAMMOND20 for 20% off ALL THREE of their Azure courses! jh.live/alteredsecurity 🗨️ "I Hacked The Cloud" compromising an Azure website, swiping the access token for the managed identity of the web app, leveraging permissions to gain ...
Scraping Dark Web Sites with Python
Переглядів 113 тис.21 день тому
jh.live/flare || You can track down cybercrime and manage threat intelligence or your own exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare 🗨️ Scraping onion sites across Tor hidden services in an automated way quick crash course on some of the command-line tools or Python libraries that can help you create your own custom monitoring tools for cyb...
How Hackers Can Hide PowerShell in Environment Variables
Переглядів 58 тис.28 днів тому
jh.live/snykctf101 || Learn cybersecurity with a FREE Capture the Flag 101 workshop from Snyk on April 18th! jh.live/snykctf101 🗨️ Mapping printable characters to positions within Windows environment variables... to slap together silly obfuscated PowerShell code! Masking the original command in a cutesy way that made help evade detection... (or at least be a fun scripting challenge) 💬 Learn Cyb...
Malware & Cybersecurity Threats on the Horizon
Переглядів 61 тис.28 днів тому
jh.live/x-force-tii || Join me as I take a deep dive into the IBM Threat Intelligence Index with Malware Reverse Engineer at IBM X-Force, Golo Mühr. In our discussion, Golo shares his perspective on the trends in this year’s report, takes a closer look at IBM X-Force’s work and provides his predictions for the year ahead in cybersecurity. You can check out the full IBM X-Force Threat Intelligen...
Hackers Hide with Clever Alternate Data Streams
Переглядів 75 тис.Місяць тому
jh.live/crowdsec || Get curated threat intelligence powered by the crowd, and contribute to better cybersecurity defense with CrowdSec: jh.live/crowdsec Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitt...
The Apex Legends Hacker: Destroyer2009
Переглядів 112 тис.Місяць тому
All of the information presented in this video is to be considered purely speculation and not to be perceived as fact. Special thanks to SkeletalDemise and foilman for their hard work and allowing me to share this investigative story. Check out their blogs: skeletaldemise.github.io || www.linkedin.com/in/foilman Learn Cybersecurity with Name Your Price Training with John Hammond: nameyourpricet...
Github Copilot Made My Code More Vulnerable
Переглядів 54 тис.Місяць тому
jh.live/snyk-ai || Try Snyk DeepCode AI to find and fix vulnerabilities, especially from AI generated code: jh.live/snyk-ai Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.li...
Malware Analysis & Threat Intel: UAC Bypasses
Переглядів 63 тис.Місяць тому
jh.live/anyrun-ti || ANYRUN has just released their latest Threat Intelligence feature set, and it is super cool to track and hunt for malware families or observed tradecraft try it out! jh.live/anyrun-ti Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ j...
Hackers Can Phish with PLAINTEXT QR Codes
Переглядів 61 тис.Місяць тому
Hackers Can Phish with PLAINTEXT QR Codes
How Hackers Compromise BIG Networks (with NetExec)
Переглядів 104 тис.Місяць тому
How Hackers Compromise BIG Networks (with NetExec)
Finding WEIRD Typosquatting Websites
Переглядів 233 тис.Місяць тому
Finding WEIRD Typosquatting Websites
Don't Use CyberChef. Use This Instead.
Переглядів 62 тис.Місяць тому
Don't Use CyberChef. Use This Instead.
Free Coding Tool Distributes Malware
Переглядів 126 тис.2 місяці тому
Free Coding Tool Distributes Malware
Sweet New Threat Intel Just Dropped
Переглядів 54 тис.2 місяці тому
Sweet New Threat Intel Just Dropped
Notepad.exe Will Snitch On You (full coding project)
Переглядів 181 тис.2 місяці тому
Notepad.exe Will Snitch On You (full coding project)
One Code Mistake Ruined This Website
Переглядів 45 тис.2 місяці тому
One Code Mistake Ruined This Website
Tracking Cybercriminals on Telegram
Переглядів 208 тис.2 місяці тому
Tracking Cybercriminals on Telegram
Don't Forget This One Hacking Trick
Переглядів 57 тис.2 місяці тому
Don't Forget This One Hacking Trick
Malware Analysis Made Easy: Cloud Investigations
Переглядів 43 тис.2 місяці тому
Malware Analysis Made Easy: Cloud Investigations
Great tutorial especially with multiple clones.
required professional hacker
Me as python developer and windows user💀
Great demo, It's always fascinating to see the real-life implications of vulnerabilities like CrushFTP CVE-2024-4040.
My etc/apt/sources.list is using Kali Linux's default repo, but I can only install strace. ltrace keeps getting an error: "Unable to locate package". Has anyone figured out a working alternative repo?
All they have to do now is to add it to Rapid7!
5:54 Please slow down! And also please remove your picture out of the way of the text.
can we talk bout that "i love tax evasion" ? :D
hi
I am getting critical hits for office 2016 and it is not installed. I am also getting hit that have no patches to correct the hits on ubuntu like apparmor
"sudo" is short for "do as superuser" - "sue due", not "sue dough" - sudo is not a martial art.
Remember, if a product is free, you're the actual product.
"I feel a little bit odd doing just the United States , I'll pivot to Canada" LMAO
THYE SHOULDVE USED CL1PBOARD INSTEAD OF DISCORD LMAO
A blockchain developer can doing Smart contrat audit ?? Thanks you
Hi, just want to know to detect app that output music on Android, because I can NOT find app that will do that, and this annoying music plays every 1:16am or 2:00pm and the 3C Tools(3C All-in-one Toolbox) do not show app that is outputing the music(I try killing apps/tasks and the music do not stop) + Android do not show the music in notification menu
@John, please stop yelling! while this stuff is indeed interesting, it's also difficult listening to..
My recycle bin is named Garbage
Very weird that a short form for p exists, thats highly unlikely. To get the digits you can just click on (show)
Really nice!
I would want to look more at the HID component. It isn't likely, but possible that it could use USB peripherals for other purposes, or attempt to locate storage to copy itself to.
John makes me beast day by day ❤
omg listen you do not have to do all that to hack me. just ask me the password, my life is so boring and i am too poor to worry , nobody wants to give me credit anyways. Maybe a hacker will hack me and save me by paying all my debt? that would be amazing! some kind of hacker robin hood
If they didn't tell us where to put the breakpoint or where to jump, how would you approach this problem?
thinking: 1) it's an audition for employment? 2) they had at least some monual process to it and only had the manpower to do the two?
Help my gmail account no acces
Through your dedication, you've demonstrated that this was meant for you. Your exceptional performance has confirmed my confidence in delegating this to you, joel_ethics Tech. Thank you
I got an email from "an old classmate". There was something written in russian, a bitcoin symbol and moeny in the background with a link. I opened the pdf in a webpage pdf viewer. I was scared because virustotal told me it had a trojan. So i looked into virustoal to get the behaviour and it would create files which i did not find. So that got me relaxed again
Bro you're supposedly teaching security, supposedly beginners and maybe some intermediate, and you advertise flare a lot but how many of these people can afford over $10,000 for a service? If you ask me if that could afford that then why are they watching your videos in the first place?
Just disable it in Edge settings.
What are your thoughts regarding League of Legends and Riot Vanguard being another Kernel-level anti cheat software? From the little research I've done so far, it seems like there's quite a bit of room for security problems. Some other games like Fortnite and Halo: MCC have kernel-level anti cheats, what makes Vanguard different? I'll continue looking into this but what's your take, and what are some resources I could help inform myself and friends. Thanks!
why do i get this error : all of the registers are not defined. Is this masm or nasm?
What the hell, John? Why exactly is this on UA-cam? I don’t believe that this info should be public. It’s a service exclusively for those who are working for the US Government and/or have appropriate authorisation. Did you hack into one of their systems to steal someone’s credentials? Maybe their system has another mechanism of authentication/ authorisation that you could not circumvent. I don’t understand IT stuff, but I think that you should not have done that. It’s a shame, you seem intelligent. I hope this is a honeytrap and they catch you.
Should we be using a VPN when using this search engine?
Thanks to *Cryptic Webster* . You're indeed a blessing!.. I live in the west coast and lost my account because of I didn’t have more details on what to do in situation like that. Thank you for your skill, dedication, and the time you invested in resolving this issue. This has me chapped! Thanks once again *Jack*
The method this video pointed to isn’t really working.. *cryptic webster* is the solution to all hacked, suspended, locked, banned social media networks. Their name is spelt as *cryptic webster*
I’m glad to get the privilege to get to know about their name which is the *cryptic webster* and looked it up online.
*All you also need to do is that you just need to look their name up to see their website*
Account recovery in general seems like a mole to *Cryptic webster* and his consistency is quite good either way. Although this video was helpful. Jack is detailed oriented, customer focused, results driven individual who's goals are to deliver only high quality services to his customers.
I sincerely appreciate your prompt response in resolving this unexpected issue about my account *cryptic webster* ..Your willingness to take risks and make quick decisions helped me in getting access to my account. I’m grateful to have met you guys..
Hey ppl, I'm a retired computer/IT person, Yet I still find *Cryptic webster* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
The method this video pointed to isn’t really working.. *cryptic webster* is the solution to all hacked, suspended, locked, banned social media networks. Their name is spelt as *cryptic webster*
I’m glad to get the privilege to get to know about their name which is the *cryptic webster* and looked it up online.
*All you also need to do is that you just need to look their name up to see their website*
Account recovery in general seems like a mole to *Cryptic webster* and his consistency is quite good either way. Although this video was helpful. Jack is detailed oriented, customer focused, results driven individual who's goals are to deliver only high quality services to his customers.
I sincerely appreciate your prompt response in resolving this unexpected issue about my account *cryptic webster* ..Your willingness to take risks and make quick decisions helped me in getting access to my account. I’m grateful to have met you guys..
In addressing the issues with my account, *Cryptic webster* your commitment has truly exceeded expectations, reaching a level of excellence that is remarkable. My sincere thanks to you! Your efficiency, organizational skills, and results-oriented approach make you stand out. Encountering someone as trustworthy has been a rarity. Keep up the fantastic work. I am determined to bring greater recognition to you and the kindness you’ve shown. Individuals like you, Mr. Jack, are indeed rare and highly esteemed.
The method this video pointed to isn’t really working.. *cryptic webster* is the solution to all hacked, suspended, locked, banned social media networks. Their name is spelt as *cryptic webster*
I’m glad to get the privilege to get to know about their name which is the *cryptic webster* and looked it up online.
*All you also need to do is that you just need to look their name up to see their website*
Account recovery in general seems like a mole to *Cryptic webster* and his consistency is quite good either way. Although this video was helpful. Jack is detailed oriented, customer focused, results driven individual who's goals are to deliver only high quality services to his customers.
I sincerely appreciate your prompt response in resolving this unexpected issue about my account *cryptic webster* ..Your willingness to take risks and make quick decisions helped me in getting access to my account. I’m grateful to have met you guys..
This may be a scam, but I am sure that there are real things like this on the dark web. Why are the law enforcement agencies not eliminating them? Oh. My bad, stupid me, I forgot about WannaCry. It is disgusting, John.
Thanks you
7:37 I am very surprised that the menu didn’t include ‘Hacking the cloud of a governmental agency cloud. Chinese- 20,000 USD. USA- for free because I am a hacktivist. Japan IoT- 100,000,000 USD Google’s AI- price varies, depending on which state employs you. Contact me to discuss. The insurance companies that insure multinational cloud providers- forget it, you don’t enough money for it’.
5:02 And it has copyright 😃 FaH- ing hell!
3:33 Secure and confidential 😂 Trusted providers, eh? I swear, this world is a bad joke.
😃😂 It is as big of a scam as VPNs. They’re huge effing honeypots, in my non- specialist opinion.
In the late 90s. Tried to go to AltaVista (defunct search engine) and ended up in atillavista (defunct p.o.r.n. search engine)
Hi! If you can please create a video on the brokewell malware thx 😊
20:15 ADA INDONESIA COY
"Weird, wild, wacky stuff!" It's just cars, buildings, and streets. This dude's easily amused, I guess. Maybe an Amy Schumer fan.
Thank you for this
can you hack a fcebook account pls
Hi John, I'd vote for a video detailing ADFS attack chain. Golden SAML and ADFS Token Signing Certificate attacks still seem to fly under the radar despite the well publicized Nobelium APT group. There are also reports from MS on techniques using both FoggyWeb and MagicWeb tooling. This could be an opportunity to bring AD FS hardening guidance, and maybe for entities that have Microsoft Defender for Identity, note that the sensor also should run on the AD FS (it's often not there, and only put on DCs). Just one I thought would make a good video, not that it would be so easy to do.
.