catch EVERY reverse shell while hacking! (VILLAIN)

  Рет қаралды 215,589

John Hammond

John Hammond

Күн бұрын

Dive in to the HackTheBox CPTS: Certified Penetration Testing Specialist training at HTB Academy! j-h.io/htb-cpts
Check out Villian: github.com/t3l3machus/villain
Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering j-h.io/zero2auto
⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training j-h.io/escalate
👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
📗Humble Bundle ➡ j-h.io/humblebundle
🐶Snyk ➡ j-h.io/snyk
🤹‍♀️SkillShare ➡ j-h.io/skillshare
🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ j-h.io/ctf
🎤 Speaking Requests ➡ j-h.io/speaking
💥 Malware Submission ➡ j-h.io/malware
❓ Everything Else ➡ j-h.io/etc
00:00 Villain
02:21 About Villain
04:17 Setup
04:50 Shellcrafting
07:42 Sending the payload
09:09 Multiplayer hacking
11:55 HQ Ownership
15:59 A few more features
16:53 Final thoughts
18:05 Closing out

Пікірлер: 243
@_JohnHammond
@_JohnHammond Жыл бұрын
DID YOU KNOW that (obviously intentionally) placing a TYPO within the first THREE seconds of your video helps increase audience engagement and boosts your videos in the algorithm?????/// Please do take a look at all of the sweet stuff that HTB Academy's Certified Penetration Testing Specialist has to offer!! j-h.io/htb-cpts
@builder481
@builder481 Жыл бұрын
Hey John are you going to do Advent of Cyber for 2022?
@gg-gg-gg-gg
@gg-gg-gg-gg Жыл бұрын
John you should consider uploading your videos to Nebula, you'd make a good addition
@gamingravan1713
@gamingravan1713 Жыл бұрын
how to remove that windows backdoor from your system
@builder481
@builder481 Жыл бұрын
@@gamingravan1713 do you have a virus?
@gamingravan1713
@gamingravan1713 Жыл бұрын
@@builder481 nope just trying to know what would be the solution for if I want it to remove from one of my windows vms
@HaxorTechTones
@HaxorTechTones Жыл бұрын
The inspiration and "try harder" attitude to create Villain came from the video you made about hoaxshell. For that reason, as well as your remarkable effort to educate people in IT/Cybersec for a decade now, I dedicate Villain to you. Thank you🙏
@janmbaez
@janmbaez Жыл бұрын
Really thank you marchus for creating this awesome tool, keep up the great work!
@brianb5723
@brianb5723 Жыл бұрын
Thank you, you're a legend!
@upcomingKang
@upcomingKang Жыл бұрын
i love you sir but one question how did you learn writing your own script can you start a series on this i have asked this to john hammond sir but he didn't respond to that at all so i want you to do it sir it will be really great for the people like me.
@__lasevix_
@__lasevix_ Жыл бұрын
@@upcomingKang Try searching for python beginner tutorials
@dedsec5271
@dedsec5271 Жыл бұрын
I know a legend when I see one 🫡
@Zerback
@Zerback Жыл бұрын
Thank you T3l3Machus and John for the amazing tool and usual 10 out of 10 quality education !
@Boolap1337
@Boolap1337 Жыл бұрын
I love his tools but I love even more your explanations and tutorials. You guys complement each other.
@tanja84dk1
@tanja84dk1 Жыл бұрын
Thank you very much for showcasing that. Tbh I have actually really been looking for a framework like that to when ever I play ctf's ( specially if I ever are going to attend where its teams agenst teams ) so its great to have it in my tools folder
@vnm2514
@vnm2514 Жыл бұрын
As always love to watch your videos and see how excited you are about new tools. Keep the great work up.
@StrokeMahEgo
@StrokeMahEgo 9 ай бұрын
Definitely love the multiplayer aspect, much like cobalt strike's team server concept. Very useful for actual red team engagements where there's multiple operators.
@konfushon
@konfushon Жыл бұрын
the small differences in this video like the sound track used and the "waves shennanigans on John's head" at the bottom right corner is kinda slick though 👌
@janekmachnicki2593
@janekmachnicki2593 8 ай бұрын
Great tutorial John H. Thanks for your effort to help less advanced hackers or IT lovers understand some of the tricks .
@Entre_Latidos
@Entre_Latidos Жыл бұрын
Regards from Dominican Republic 🇩🇴. I think your channel is pretty cool and I've learned a lot since I found this Channel, I was stuck with the Reverse Shell thing, but thanks to you I got out of that corner, brother. THANK YOU!.
@struggle375
@struggle375 Жыл бұрын
Damn John the production quality is on point!
@hongkonghacker
@hongkonghacker Жыл бұрын
Windows defender already blocked those payload after few days later.
@faran4536
@faran4536 Жыл бұрын
Loved the video quality, especially your cam circle effects when you speak!
@bawalicoder1233
@bawalicoder1233 Жыл бұрын
totally loved the video😍 btw great editing
@gamblezz101
@gamblezz101 Жыл бұрын
This is genius! Kudos to the dev.
@Bobtb
@Bobtb Жыл бұрын
Thanks for introducing this awesome tool John.
@hawk__
@hawk__ Жыл бұрын
A dude said in a previous vid of your "John doesn't need fancy thumbnails, has face does it all" and yeah it really does, man! Keep putting nice content 🙂, coool tool. That OTP thing is the coolest one. You haven't done any writeups lately though ;) + Video is nice enough, editing, music. If possible plz share pc specs the one which is running 1 host + 4 vms without any lag.
@grayshell8928
@grayshell8928 Жыл бұрын
as always, great video John. Good tool for testing
@JeffNoel
@JeffNoel Жыл бұрын
Realizing your video is sponsored by HTB Academy is pretty cool! CPTS is probably my next thing to work on if I pass OSCP on December 12th :D
@_ismail8880
@_ismail8880 Жыл бұрын
did you pass?
@JeffNoel
@JeffNoel Жыл бұрын
@@_ismail8880 I did! I missed one flag but for the bonus points so 100/110 points. The course material is on point and is perfect to prepare your for the exam content.
@_AN203
@_AN203 Жыл бұрын
Hey John.. I am back ! And that voice interactive background that you have on your thumb during the video... Does sell the HTB theme.. And hey.. Another C2 framework to the arsenal... Pretty cool..
@nixcutus
@nixcutus Жыл бұрын
Used this tool last month and it was super dope.
@johnb3170
@johnb3170 Жыл бұрын
John from another John...you are a legend. Coming from and education and training background to cyber warfare now a security researcher. You encompass everything good in our industry. Keep it up! See you around!
@gezzadaverealstuffonlyboth8915
@gezzadaverealstuffonlyboth8915 3 ай бұрын
Hey , I'm learning cyber warfare at the moment, but need some good software as I was helping a young mum getting bullied and was raped , so said I'll sort it out and protect your network till hes moves on , well he payed few different hackers , and they was good , 3 atack me from different countries, not sure if they new each other, but it took 3 days 2 hours sleep they burt out 4 laptop 3 pc towers , my 9 year old boys plug the earth burnt where it burst the plug like it was cheap plastic, I'm still with nothing but my phone, they got everything cloud haswell, so I lost everything's, and was going to give up, but seeing your comment, the only one in 7 years , so hi there and sorry for asking but my eyes lit up 🤝
@Canarddu38
@Canarddu38 Жыл бұрын
Ducksploit is a similar tool
@HerozTech
@HerozTech Жыл бұрын
I love the new editing style❣
@sam-sw8zw
@sam-sw8zw Жыл бұрын
love your content the hacking b-role had me laughing this episode lol
@karkantas
@karkantas Жыл бұрын
Your content is improving like a super sayian after each video.
@_JohnHammond
@_JohnHammond Жыл бұрын
SUPER duper thankful for our new editor and the phenomenal work they are doing -- all credit to @Nordgaren!!
@user-jg2zv1yr1z
@user-jg2zv1yr1z Жыл бұрын
I like you very much Mr.John Hammond. You are always teach us new things. Thanks
@toolbgtools
@toolbgtools Жыл бұрын
cool tool! and lot of room for improvements
@adesopekingsley9967
@adesopekingsley9967 Жыл бұрын
The most amazing thing to me is thar the whole script was written with python.... amazing 👏🙀 great to see this ... I subscribed
@MartinGaertner
@MartinGaertner Жыл бұрын
Great howto! you a very good teatcher! perfect video, make more for this i love it!
@samfisher8426
@samfisher8426 Жыл бұрын
i been using this for a week so far .. i have tested it on many OS versions ,windows 7 - 10 -11 / linux ,always bypass any fiirewall/defender never let me down ,the good thing that i can get multiple reverse shell just in one click ,without having to setup a new listener for each reverse shell payload ... thats really amazing tool
@fdert
@fdert Жыл бұрын
I like the new editing!
@waqxddgytdcvjj8678
@waqxddgytdcvjj8678 Жыл бұрын
I’m as hyped as you John!
@benary5620
@benary5620 Жыл бұрын
That looks really interesting. Question: let's say I generate a linux payload and put it on my (remote) laptop; will it automatically connect if I start my local Villain _after_ that remote machine has run its crontab? Or would it be sufficient to run it every 5 (or so) minutes on the remote machine, so once I start my local Villain, it will take 4:59 secs max to connect (in that case, will the remote machine's crontab kill any active sessions once the payload runs again??)?
@DavidCosta85
@DavidCosta85 Жыл бұрын
thanks for your videos. very much appreciated
@cyberdevil657
@cyberdevil657 Жыл бұрын
Aswome stuff Jhon I really respect you!
@hackwrld1895
@hackwrld1895 Жыл бұрын
bro going from the intro mekody to your voice in this video.. its just too dope, I saw the video many times just because of that😂🤣
@Neuer_Alias_erstellen
@Neuer_Alias_erstellen Жыл бұрын
something is slick: JohnH: that's cool
@marineplaysairsoft
@marineplaysairsoft Жыл бұрын
now THIS is verrrry niiiiiice
@torsec6048
@torsec6048 Жыл бұрын
And now john detailed video arrived :) go go john Hammond
@juliusrowe9374
@juliusrowe9374 Жыл бұрын
Super dope content John!
@trevor.viljoen
@trevor.viljoen Жыл бұрын
This has a very Metasploit look and feel to it.
@refaiabdeen5943
@refaiabdeen5943 Жыл бұрын
Cheers Mate.
@a_h_m_e_d_43112
@a_h_m_e_d_43112 Жыл бұрын
This is what i was waiting for
@yacce4463
@yacce4463 Жыл бұрын
This is cool, but relying on "curl" all the time? Would be awesome to have different revshell payloads relying on different programs. I've hit several machines where "curl" or "wget" wasn't available, mostly if running on a container environment. Awesome work t3l3machus and John!
@SatheeshJenne2658
@SatheeshJenne2658 Жыл бұрын
Thank u so much.. please do more videos..
@kashoo_1
@kashoo_1 Жыл бұрын
Thanks John ✌💥
@alldev
@alldev Жыл бұрын
I like the video but i have a simple question will it be a persist session or not
@AnacardiumOcidentale
@AnacardiumOcidentale Жыл бұрын
Very nice piece of tool. Does it runs on a Raspberry pi? Gonna try to install it on mine...
@theequalizer7297
@theequalizer7297 3 ай бұрын
Thank you very much 🙏My S14 Flip laptop. I was working and left it for a few minutes. When I came back, I was surprised to be asked for a new PIN code and that the old one was disabled and could not be accessed (explorer.exe - System Error). The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application) I felt frustrated and spent 9 hours trying to solve the problem, but the problem was not solved, and I do not know what is the reason for this problem. By the way, it is a completely new laptop that has been in service for only 4 months, an Asus S14Flip Ryzen 5600 laptop, a Radeon card, and RAM. 8 JB and its performance was very slow when browsing websites, but I noticed that sometimes its temperature increased.
@sagiadir
@sagiadir Жыл бұрын
Thank you ! its alway great to watch your videos !!!!!
@Rojawa
@Rojawa Жыл бұрын
Just saw a talk about hoaxshell on which a penetrationtester was hyping it up so much only to not work anymore after two days because everyone burned the signature haha. So interesting to see the new shell framework. Lets see for how long its working on engagements :D
@Alexis82
@Alexis82 Жыл бұрын
Powershell script blocked of internal antivirus!
@trustedsecurity6039
@trustedsecurity6039 Жыл бұрын
@@Alexis82 lmao stop using buzz word like you know what it means
@trustedsecurity6039
@trustedsecurity6039 Жыл бұрын
It was by the author... every open source tool will be burned like that
@Alexis82
@Alexis82 Жыл бұрын
@@trustedsecurity6039 I know exactly what I'm saying, don't worry about me!
@trustedsecurity6039
@trustedsecurity6039 Жыл бұрын
@@Alexis82 nope you dont...
@jeonghutamilim2259
@jeonghutamilim2259 9 ай бұрын
If this works as intended, it could be great rat for headless servers or remotely assisting friends. Gotta play around.
@michaelblenkinsop9038
@michaelblenkinsop9038 Жыл бұрын
nice intro to HTB
@fireloks6362
@fireloks6362 Жыл бұрын
got it to work. I just needed to change permissions
@AgustinLozada
@AgustinLozada Жыл бұрын
The example you shown are all on same subnet, what if its a segmented network?
@Cypherx444
@Cypherx444 Жыл бұрын
Hey John please help me there is an eror while executing this it shows modulenotfound crypto please 🙏 reply
@Pwnedby
@Pwnedby Жыл бұрын
I’m building a software exactly like this. I have a few more feature than this but I might implement some techniques which was being used. Thank you for sharing this!
@neppusstreams
@neppusstreams Жыл бұрын
Looks good! What happened to pwncat tho?
@ChristopherEGr33n33
@ChristopherEGr33n33 Жыл бұрын
0:02 the old reverse shell "hanlder" 🤣
@jawadsher1062
@jawadsher1062 Жыл бұрын
Hey John i think 🤔 this is help full in OSCP
@SumanRoy.official
@SumanRoy.official Жыл бұрын
Great tool but they need to generate unique obfuscated payloads that bypass every AV and Security endpoints like Crowdstrike and others.
@ThatNateGuy
@ThatNateGuy Жыл бұрын
Villain's output reminds me a lot of PowerShell. I dig. Thanks for showing this tool off, John! 🙂
@trustedsecurity6039
@trustedsecurity6039 Жыл бұрын
Lmao it is powershell output for Windows...
@ThatNateGuy
@ThatNateGuy Жыл бұрын
@@trustedsecurity6039 I did not know that!
@gokul5582
@gokul5582 Жыл бұрын
My question is anyone of my victim will dare to paste suspicious lines on their cmd? Is there any other way to deliver it? Practically will it work?
@zeloigl
@zeloigl 9 ай бұрын
what did u do at the cut at 4:49 im struggling to figure it out ive tried everything can anyone help it says module 'Crypto' not found so i checked the crypto file and the c is lowercase but doesnt let me change it to uppercase as it says file location was moved????
@shenetworks
@shenetworks Жыл бұрын
very cool!
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
How many maintenance the handling files open
@maxbunnies
@maxbunnies Жыл бұрын
Hi John can you tell me what Glasses you have :)
@tech_raj
@tech_raj Жыл бұрын
Nice sir Thank you
@Hackedme-ce8fe
@Hackedme-ce8fe Жыл бұрын
Just a question, can i do rce on servers using those generated payload?
@noviccen388
@noviccen388 11 ай бұрын
can yo do meterpreter payload with it?
@boh70326
@boh70326 Жыл бұрын
How many hours htb course consists of ? Not clear, just said 28modules Thanks
@brianb5723
@brianb5723 Жыл бұрын
Another A+ incredible content and instruction step-through by John. I found the audio pulses around your camera preview a little distracting, though!
@_JohnHammond
@_JohnHammond Жыл бұрын
Good to note, thank you! We're experimenting with some of those new flashy video effects and thought we would test the water with the audio visualizer around the face cam. I had a thought it might be too distracting from the content, but wanted to try it in the wild. We will think on it and see if we can scheme up some other nice quality-of-life touches!
@HAGSLAB
@HAGSLAB Жыл бұрын
I agree. Not a huge issue, but it was the first thing I noticed and not really in a good way. I've always appreciated the simplicity of your content. Simple as in few elements on screen and straightforward editing.
@Leo_Aqua
@Leo_Aqua 11 ай бұрын
Can you make a video on how to get a reverse shell from a webserver without php?
@Cypherx444
@Cypherx444 Жыл бұрын
hey john please help me it's not working while executing it's shows error of crypto module not found
@Kobayashi423
@Kobayashi423 Жыл бұрын
Can i use hack the box using windows?
@joaopaulomendesdecarvalho
@joaopaulomendesdecarvalho 4 ай бұрын
Great!
@kal_dev
@kal_dev Жыл бұрын
I like this one, fastly and easier
@bbowling619
@bbowling619 Жыл бұрын
a turtle in a turtle ? Dude is mentor !!!
@drvoip
@drvoip 8 ай бұрын
Generating connectivity between two endpoints on a private network seems to be the dominant theme on KZbin. Educational and informative, but how about showing how any of the tools work over the Internet, with firewalls and the usual network basic security practices in place?
@drentrepreneur_ng
@drentrepreneur_ng Жыл бұрын
Hello Dr. how can I access your PhD thesis?
@larva5606
@larva5606 4 ай бұрын
i took a shot every time he said "slick" 🥴
@BobbyBobBob69
@BobbyBobBob69 10 ай бұрын
Hey I don’t wanna sound stupid, but I can’t copy between my Kali vm and my Ubuntu vm? When I’ve got only one vm open the guest isolation can copy and paste but when there’s more then one I can’t?
@raghulmanikandan
@raghulmanikandan Жыл бұрын
what's wrong with Metasploit and Empire?
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
Window paword+linux paword equal password attending and different tightening in the password, same password in the continue.
@Iampopg
@Iampopg Ай бұрын
Does it bypass windows defender?
@jdogdarkness
@jdogdarkness Жыл бұрын
I couldn't get program to run said a few things then "no module naked Crypto"
@memejamas3818
@memejamas3818 Жыл бұрын
excelente tool thanks
@imurovtsev
@imurovtsev Жыл бұрын
ssh -R to your temp vps/vds not work more? What if the victim doesn't have a white IP address?
@luismarrero9293
@luismarrero9293 11 ай бұрын
hello John thanks for this amazing video as always. i tried this villain but when i tried to open it i got required argument PAYLOAD not supplied any help
@ravananasuran
@ravananasuran Жыл бұрын
then it is super helpful for battle ground in htb
@jorisschepers85
@jorisschepers85 Жыл бұрын
Great video again John, but please ditch the soundbars around the webcam feed.
@_JohnHammond
@_JohnHammond Жыл бұрын
Appreciate the feedback, thank you! We're experimenting with some of those new flashy video effects and thought we would test the water with the audio visualizer around the face cam. I had a thought it might be too distracting from the content, but wanted to try it in the wild. We will think on it and see if we can scheme up some other nice quality-of-life touches!
@jorisschepers85
@jorisschepers85 Жыл бұрын
@@_JohnHammond you don't need all those flashy things. Content is A+. Keep doing you
@nielwerking6744
@nielwerking6744 Жыл бұрын
Is this tool allowed in OSCP?
@cipher3966
@cipher3966 Жыл бұрын
Do you instantly change your outfit and film the Advent of Cyber after recording this?
@Cypherx444
@Cypherx444 Жыл бұрын
It is not working in windows
@AlexMercersRevenge
@AlexMercersRevenge Жыл бұрын
This tutorial is all well and good, but how does one get a potential target to practically click on a payload? I seriously dought some rando layperson is going to go into powershell/cmd and copy/paste that long ass command line into it on their own volition lol.
@mav7284
@mav7284 Жыл бұрын
My windows 10 blocked the script.. So I have to turn off the virus defender only can run the backdoor script..:(
@sugestiesti
@sugestiesti Жыл бұрын
Copy to clipboard failed. You need to do it manually. generate failed
@ibrahimyosif
@ibrahimyosif Жыл бұрын
i love you john but please turn off sound wave thingy surrounding your frame.
@sauron89
@sauron89 Жыл бұрын
It doesn't work with Kaspersky endpoint
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 249 М.
How Hackers Hide
20:55
John Hammond
Рет қаралды 234 М.
Follow @karina-kola please 🙏🥺
00:21
Andrey Grechka
Рет қаралды 15 МЛН
Teenagers Show Kindness by Repairing Grandmother's Old Fence #shorts
00:37
Fabiosa Best Lifehacks
Рет қаралды 37 МЛН
Glow Stick Secret 😱 #shorts
00:37
Mr DegrEE
Рет қаралды 124 МЛН
The King Of Malware is Back
19:27
John Hammond
Рет қаралды 189 М.
How Hackers Hack WiFi using OSINT
7:27
CyberSudo
Рет қаралды 4,2 М.
PHP 8.1.0-dev BACKDOOR Hack (Easy RCE)
16:45
John Hammond
Рет қаралды 135 М.
How Hackers Write Malware & Evade Antivirus (Nim)
24:04
John Hammond
Рет қаралды 378 М.
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 171 М.
From IP to Reverse Shell. What is a reverse shell?
22:00
z3nsh3ll
Рет қаралды 8 М.
Is your PC hacked? RAM Forensics with Volatility
14:29
The PC Security Channel
Рет қаралды 892 М.
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
Follow @karina-kola please 🙏🥺
00:21
Andrey Grechka
Рет қаралды 15 МЛН