John Hammond
John Hammond
  • 1 493
  • 52 891 326
Hackers Abuse Zero-Day Exploit for CrushFTP
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
Read The Hacker Mindset by Garret Gee: jh.live/hackermindset
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
Переглядів: 47 525

Відео

This File Steals Passwords
Переглядів 77 тис.День тому
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Hackers Use Github For Malware
Переглядів 54 тис.День тому
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEW...
Finding WEIRD Devices on the Public Internet
Переглядів 140 тис.День тому
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Government Unveils Malware Analysis Tool, But...
Переглядів 22 тис.14 днів тому
CISA's Malware Next-Gen: www.cisa.gov/resources-tools/services/malware-next-generation-analysis Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagr...
Bypassing SmartScreen on Web Browsers
Переглядів 56 тис.14 днів тому
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreo...
Telegram Has Been Hacked
Переглядів 192 тис.14 днів тому
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok 💥 SEND ME MALWARE ➡ jh.live/malware 🔥UA-cam ALGORITHM ➡ Like, Comment, & Sub...
I Hacked The Cloud: Azure Managed Identities
Переглядів 59 тис.21 день тому
jh.live/alteredsecurity || Altered Security has just released their new "Advanced Azure Attacks" course and "Certified Azure Red Team Expert" certification use code HAMMOND20 for 20% off ALL THREE of their Azure courses! jh.live/alteredsecurity 🗨️ "I Hacked The Cloud" compromising an Azure website, swiping the access token for the managed identity of the web app, leveraging permissions to gain ...
Scraping Dark Web Sites with Python
Переглядів 113 тис.21 день тому
jh.live/flare || You can track down cybercrime and manage threat intelligence or your own exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare 🗨️ Scraping onion sites across Tor hidden services in an automated way quick crash course on some of the command-line tools or Python libraries that can help you create your own custom monitoring tools for cyb...
How Hackers Can Hide PowerShell in Environment Variables
Переглядів 58 тис.28 днів тому
jh.live/snykctf101 || Learn cybersecurity with a FREE Capture the Flag 101 workshop from Snyk on April 18th! jh.live/snykctf101 🗨️ Mapping printable characters to positions within Windows environment variables... to slap together silly obfuscated PowerShell code! Masking the original command in a cutesy way that made help evade detection... (or at least be a fun scripting challenge) 💬 Learn Cyb...
Malware & Cybersecurity Threats on the Horizon
Переглядів 61 тис.28 днів тому
jh.live/x-force-tii || Join me as I take a deep dive into the IBM Threat Intelligence Index with Malware Reverse Engineer at IBM X-Force, Golo Mühr. In our discussion, Golo shares his perspective on the trends in this year’s report, takes a closer look at IBM X-Force’s work and provides his predictions for the year ahead in cybersecurity. You can check out the full IBM X-Force Threat Intelligen...
Hackers Hide with Clever Alternate Data Streams
Переглядів 75 тис.Місяць тому
jh.live/crowdsec || Get curated threat intelligence powered by the crowd, and contribute to better cybersecurity defense with CrowdSec: jh.live/crowdsec Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitt...
The Apex Legends Hacker: Destroyer2009
Переглядів 112 тис.Місяць тому
All of the information presented in this video is to be considered purely speculation and not to be perceived as fact. Special thanks to SkeletalDemise and foilman for their hard work and allowing me to share this investigative story. Check out their blogs: skeletaldemise.github.io || www.linkedin.com/in/foilman Learn Cybersecurity with Name Your Price Training with John Hammond: nameyourpricet...
Github Copilot Made My Code More Vulnerable
Переглядів 54 тис.Місяць тому
jh.live/snyk-ai || Try Snyk DeepCode AI to find and fix vulnerabilities, especially from AI generated code: jh.live/snyk-ai Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.li...
Malware Analysis & Threat Intel: UAC Bypasses
Переглядів 63 тис.Місяць тому
jh.live/anyrun-ti || ANYRUN has just released their latest Threat Intelligence feature set, and it is super cool to track and hunt for malware families or observed tradecraft try it out! jh.live/anyrun-ti Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ j...
Hackers Can Phish with PLAINTEXT QR Codes
Переглядів 61 тис.Місяць тому
Hackers Can Phish with PLAINTEXT QR Codes
How Hackers Compromise BIG Networks (with NetExec)
Переглядів 104 тис.Місяць тому
How Hackers Compromise BIG Networks (with NetExec)
The Apex Legends Hack.
Переглядів 113 тис.Місяць тому
The Apex Legends Hack.
Finding WEIRD Typosquatting Websites
Переглядів 233 тис.Місяць тому
Finding WEIRD Typosquatting Websites
Don't Use CyberChef. Use This Instead.
Переглядів 62 тис.Місяць тому
Don't Use CyberChef. Use This Instead.
The Secrets of The Tor Browser
Переглядів 74 тис.Місяць тому
The Secrets of The Tor Browser
Can a PDF File be Malware?
Переглядів 78 тис.Місяць тому
Can a PDF File be Malware?
I Made Malware In Under 20 Minutes
Переглядів 60 тис.Місяць тому
I Made Malware In Under 20 Minutes
Free Coding Tool Distributes Malware
Переглядів 126 тис.2 місяці тому
Free Coding Tool Distributes Malware
Sweet New Threat Intel Just Dropped
Переглядів 54 тис.2 місяці тому
Sweet New Threat Intel Just Dropped
Notepad.exe Will Snitch On You (full coding project)
Переглядів 181 тис.2 місяці тому
Notepad.exe Will Snitch On You (full coding project)
One Code Mistake Ruined This Website
Переглядів 45 тис.2 місяці тому
One Code Mistake Ruined This Website
Tracking Cybercriminals on Telegram
Переглядів 208 тис.2 місяці тому
Tracking Cybercriminals on Telegram
Don't Forget This One Hacking Trick
Переглядів 57 тис.2 місяці тому
Don't Forget This One Hacking Trick
Malware Analysis Made Easy: Cloud Investigations
Переглядів 43 тис.2 місяці тому
Malware Analysis Made Easy: Cloud Investigations

КОМЕНТАРІ

  • @isaacmihaeli3261
    @isaacmihaeli3261 18 годин тому

    Great tutorial especially with multiple clones.

  • @HarisSara
    @HarisSara 19 годин тому

    required professional hacker

  • @Javv1721
    @Javv1721 20 годин тому

    Me as python developer and windows user💀

  • @rafiq0007
    @rafiq0007 21 годину тому

    Great demo, It's always fascinating to see the real-life implications of vulnerabilities like CrushFTP CVE-2024-4040.

  • @tribblewing
    @tribblewing 21 годину тому

    My etc/apt/sources.list is using Kali Linux's default repo, but I can only install strace. ltrace keeps getting an error: "Unable to locate package". Has anyone figured out a working alternative repo?

  • @leacocksteve
    @leacocksteve 23 години тому

    All they have to do now is to add it to Rapid7!

  • @TheKuptis
    @TheKuptis 23 години тому

    5:54 Please slow down! And also please remove your picture out of the way of the text.

  • @wis9902
    @wis9902 День тому

    can we talk bout that "i love tax evasion" ? :D

  • @adidadi99
    @adidadi99 День тому

    hi

  • @evelbsstudio
    @evelbsstudio День тому

    I am getting critical hits for office 2016 and it is not installed. I am also getting hit that have no patches to correct the hits on ubuntu like apparmor

  • @PegasusEpsilon
    @PegasusEpsilon День тому

    "sudo" is short for "do as superuser" - "sue due", not "sue dough" - sudo is not a martial art.

  • @AtomicBl453
    @AtomicBl453 День тому

    Remember, if a product is free, you're the actual product.

  • @ov3rtv654
    @ov3rtv654 День тому

    "I feel a little bit odd doing just the United States , I'll pivot to Canada" LMAO

  • @swoodc
    @swoodc День тому

    THYE SHOULDVE USED CL1PBOARD INSTEAD OF DISCORD LMAO

  • @amosdjone8184
    @amosdjone8184 День тому

    A blockchain developer can doing Smart contrat audit ?? Thanks you

  • @nvs-different-ideas
    @nvs-different-ideas День тому

    Hi, just want to know to detect app that output music on Android, because I can NOT find app that will do that, and this annoying music plays every 1:16am or 2:00pm and the 3C Tools(3C All-in-one Toolbox) do not show app that is outputing the music(I try killing apps/tasks and the music do not stop) + Android do not show the music in notification menu

  • @peterkleinlich
    @peterkleinlich День тому

    @John, please stop yelling! while this stuff is indeed interesting, it's also difficult listening to..

  • @ZoofyZoof
    @ZoofyZoof День тому

    My recycle bin is named Garbage

  • @MT-sb6ms
    @MT-sb6ms 2 дні тому

    Very weird that a short form for p exists, thats highly unlikely. To get the digits you can just click on (show)

  • @LucianBogdanMuntean-ou2ru
    @LucianBogdanMuntean-ou2ru 2 дні тому

    Really nice!

  • @tecknows
    @tecknows 2 дні тому

    I would want to look more at the HID component. It isn't likely, but possible that it could use USB peripherals for other purposes, or attempt to locate storage to copy itself to.

  • @Supp772
    @Supp772 2 дні тому

    John makes me beast day by day ❤

  • @Richblackhat
    @Richblackhat 2 дні тому

    omg listen you do not have to do all that to hack me. just ask me the password, my life is so boring and i am too poor to worry , nobody wants to give me credit anyways. Maybe a hacker will hack me and save me by paying all my debt? that would be amazing! some kind of hacker robin hood

  • @tribblewing
    @tribblewing 2 дні тому

    If they didn't tell us where to put the breakpoint or where to jump, how would you approach this problem?

  • @danfruzzetti7604
    @danfruzzetti7604 2 дні тому

    thinking: 1) it's an audition for employment? 2) they had at least some monual process to it and only had the manpower to do the two?

  • @markjacobpagalanan370
    @markjacobpagalanan370 2 дні тому

    Help my gmail account no acces

    • @ThankgodConfident
      @ThankgodConfident 2 дні тому

      Through your dedication, you've demonstrated that this was meant for you. Your exceptional performance has confirmed my confidence in delegating this to you, joel_ethics Tech. Thank you

  • @aphilzitrone
    @aphilzitrone 2 дні тому

    I got an email from "an old classmate". There was something written in russian, a bitcoin symbol and moeny in the background with a link. I opened the pdf in a webpage pdf viewer. I was scared because virustotal told me it had a trojan. So i looked into virustoal to get the behaviour and it would create files which i did not find. So that got me relaxed again

  • @CyberSecJourn
    @CyberSecJourn 2 дні тому

    Bro you're supposedly teaching security, supposedly beginners and maybe some intermediate, and you advertise flare a lot but how many of these people can afford over $10,000 for a service? If you ask me if that could afford that then why are they watching your videos in the first place?

  • @RyderCragie
    @RyderCragie 2 дні тому

    Just disable it in Edge settings.

  • @TheKillaChino
    @TheKillaChino 2 дні тому

    What are your thoughts regarding League of Legends and Riot Vanguard being another Kernel-level anti cheat software? From the little research I've done so far, it seems like there's quite a bit of room for security problems. Some other games like Fortnite and Halo: MCC have kernel-level anti cheats, what makes Vanguard different? I'll continue looking into this but what's your take, and what are some resources I could help inform myself and friends. Thanks!

  • @entrypointunoffically
    @entrypointunoffically 2 дні тому

    why do i get this error : all of the registers are not defined. Is this masm or nasm?

  • @claudiamanta1943
    @claudiamanta1943 2 дні тому

    What the hell, John? Why exactly is this on UA-cam? I don’t believe that this info should be public. It’s a service exclusively for those who are working for the US Government and/or have appropriate authorisation. Did you hack into one of their systems to steal someone’s credentials? Maybe their system has another mechanism of authentication/ authorisation that you could not circumvent. I don’t understand IT stuff, but I think that you should not have done that. It’s a shame, you seem intelligent. I hope this is a honeytrap and they catch you.

  • @michaeladams819
    @michaeladams819 2 дні тому

    Should we be using a VPN when using this search engine?

  • @ShannonMyers701
    @ShannonMyers701 3 дні тому

    Thanks to *Cryptic Webster* . You're indeed a blessing!.. I live in the west coast and lost my account because of I didn’t have more details on what to do in situation like that. Thank you for your skill, dedication, and the time you invested in resolving this issue. This has me chapped! Thanks once again *Jack*

    • @Joe222..
      @Joe222.. 3 дні тому

      The method this video pointed to isn’t really working.. *cryptic webster* is the solution to all hacked, suspended, locked, banned social media networks. Their name is spelt as *cryptic webster*

    • @Joe222..
      @Joe222.. 3 дні тому

      I’m glad to get the privilege to get to know about their name which is the *cryptic webster* and looked it up online.

    • @Joe222..
      @Joe222.. 3 дні тому

      *All you also need to do is that you just need to look their name up to see their website*

    • @LilyJohnson-uw5tz
      @LilyJohnson-uw5tz 3 дні тому

      Account recovery in general seems like a mole to *Cryptic webster* and his consistency is quite good either way. Although this video was helpful. Jack is detailed oriented, customer focused, results driven individual who's goals are to deliver only high quality services to his customers.

    • @TavonBrown
      @TavonBrown 2 дні тому

      I sincerely appreciate your prompt response in resolving this unexpected issue about my account *cryptic webster* ..Your willingness to take risks and make quick decisions helped me in getting access to my account. I’m grateful to have met you guys..

  • @mattcurtis8166
    @mattcurtis8166 3 дні тому

    Hey ppl, I'm a retired computer/IT person, Yet I still find *Cryptic webster* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.

    • @Joe222..
      @Joe222.. 3 дні тому

      The method this video pointed to isn’t really working.. *cryptic webster* is the solution to all hacked, suspended, locked, banned social media networks. Their name is spelt as *cryptic webster*

    • @Joe222..
      @Joe222.. 3 дні тому

      I’m glad to get the privilege to get to know about their name which is the *cryptic webster* and looked it up online.

    • @Joe222..
      @Joe222.. 3 дні тому

      *All you also need to do is that you just need to look their name up to see their website*

    • @LilyJohnson-uw5tz
      @LilyJohnson-uw5tz 3 дні тому

      Account recovery in general seems like a mole to *Cryptic webster* and his consistency is quite good either way. Although this video was helpful. Jack is detailed oriented, customer focused, results driven individual who's goals are to deliver only high quality services to his customers.

    • @TavonBrown
      @TavonBrown 3 дні тому

      I sincerely appreciate your prompt response in resolving this unexpected issue about my account *cryptic webster* ..Your willingness to take risks and make quick decisions helped me in getting access to my account. I’m grateful to have met you guys..

  • @Williamson-Jerry-George
    @Williamson-Jerry-George 3 дні тому

    In addressing the issues with my account, *Cryptic webster* your commitment has truly exceeded expectations, reaching a level of excellence that is remarkable. My sincere thanks to you! Your efficiency, organizational skills, and results-oriented approach make you stand out. Encountering someone as trustworthy has been a rarity. Keep up the fantastic work. I am determined to bring greater recognition to you and the kindness you’ve shown. Individuals like you, Mr. Jack, are indeed rare and highly esteemed.

    • @Joe222..
      @Joe222.. 3 дні тому

      The method this video pointed to isn’t really working.. *cryptic webster* is the solution to all hacked, suspended, locked, banned social media networks. Their name is spelt as *cryptic webster*

    • @Joe222..
      @Joe222.. 3 дні тому

      I’m glad to get the privilege to get to know about their name which is the *cryptic webster* and looked it up online.

    • @Joe222..
      @Joe222.. 3 дні тому

      *All you also need to do is that you just need to look their name up to see their website*

    • @LilyJohnson-uw5tz
      @LilyJohnson-uw5tz 3 дні тому

      Account recovery in general seems like a mole to *Cryptic webster* and his consistency is quite good either way. Although this video was helpful. Jack is detailed oriented, customer focused, results driven individual who's goals are to deliver only high quality services to his customers.

    • @TavonBrown
      @TavonBrown 3 дні тому

      I sincerely appreciate your prompt response in resolving this unexpected issue about my account *cryptic webster* ..Your willingness to take risks and make quick decisions helped me in getting access to my account. I’m grateful to have met you guys..

  • @claudiamanta1943
    @claudiamanta1943 3 дні тому

    This may be a scam, but I am sure that there are real things like this on the dark web. Why are the law enforcement agencies not eliminating them? Oh. My bad, stupid me, I forgot about WannaCry. It is disgusting, John.

  • @wilmamanzanillo6968
    @wilmamanzanillo6968 3 дні тому

    Thanks you

  • @claudiamanta1943
    @claudiamanta1943 3 дні тому

    7:37 I am very surprised that the menu didn’t include ‘Hacking the cloud of a governmental agency cloud. Chinese- 20,000 USD. USA- for free because I am a hacktivist. Japan IoT- 100,000,000 USD Google’s AI- price varies, depending on which state employs you. Contact me to discuss. The insurance companies that insure multinational cloud providers- forget it, you don’t enough money for it’.

  • @claudiamanta1943
    @claudiamanta1943 3 дні тому

    5:02 And it has copyright 😃 FaH- ing hell!

  • @claudiamanta1943
    @claudiamanta1943 3 дні тому

    3:33 Secure and confidential 😂 Trusted providers, eh? I swear, this world is a bad joke.

  • @claudiamanta1943
    @claudiamanta1943 3 дні тому

    😃😂 It is as big of a scam as VPNs. They’re huge effing honeypots, in my non- specialist opinion.

  • @SirStarGazer00
    @SirStarGazer00 3 дні тому

    In the late 90s. Tried to go to AltaVista (defunct search engine) and ended up in atillavista (defunct p.o.r.n. search engine)

  • @Rachaelshaw7
    @Rachaelshaw7 3 дні тому

    Hi! If you can please create a video on the brokewell malware thx 😊

  • @d9zirable
    @d9zirable 3 дні тому

    20:15 ADA INDONESIA COY

  • @valcaron
    @valcaron 3 дні тому

    "Weird, wild, wacky stuff!" It's just cars, buildings, and streets. This dude's easily amused, I guess. Maybe an Amy Schumer fan.

  • @burnmywings
    @burnmywings 3 дні тому

    Thank you for this

  • @lewisken5577
    @lewisken5577 3 дні тому

    can you hack a fcebook account pls

  • @jamiekomodo1751
    @jamiekomodo1751 3 дні тому

    Hi John, I'd vote for a video detailing ADFS attack chain. Golden SAML and ADFS Token Signing Certificate attacks still seem to fly under the radar despite the well publicized Nobelium APT group. There are also reports from MS on techniques using both FoggyWeb and MagicWeb tooling. This could be an opportunity to bring AD FS hardening guidance, and maybe for entities that have Microsoft Defender for Identity, note that the sensor also should run on the AD FS (it's often not there, and only put on DCs). Just one I thought would make a good video, not that it would be so easy to do.

  • @IlIIllIlIlIIlIlIlIlIIl
    @IlIIllIlIlIIlIlIlIlIIl 3 дні тому

    .