Hide a Hacker's Reverse Shell in ONE Command

  Рет қаралды 83,994

John Hammond

John Hammond

Күн бұрын

j-h.io/plextrac || Save time and effort on pentest reports with PlexTrac's premiere reporting & collaborative platform in a FREE one-month trial! j-h.io/plextrac 😎
🔥 KZbin ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 59
@panchakosha
@panchakosha Жыл бұрын
Yes, that's correct \0 is a null character. \1 would be a null character but with an index of 1, so \0\1 would be two null terminated strings. Modifying the registry doesn't affect the RDP query commands directly. It just allows you to customize the output with the key and value. The query commands retrieve the information from multiple sources: WMI, RDS, TS configs, registry, system data structures like Process Management, etc.
@keylanoslokj1806
@keylanoslokj1806 Жыл бұрын
Meaning exactly?
@panchakosha
@panchakosha Жыл бұрын
@@keylanoslokj1806 I was responding to questions he was asking in the video. Null characters can be used to separate multiple strings stored as a single value in the registry. For example, /d 0\01\0LOLBin\0calc.exe. He was also wondering where the RDP query commands were pulling their info. A more concrete example would be WMI providers specific to RDP, such as the Win32_TerminalService or Win32_TerminalServiceSetting classes.
@coltonthomas3658
@coltonthomas3658 Жыл бұрын
@@panchakosha can you explain the null character indexing? Can a reg value be "string/0hello/1world/2"? Is this why they show up as newlines when you view the key in regedit?
@dineshpavar1724
@dineshpavar1724 11 ай бұрын
🎉🎉🎉😊🎉
@laurenlewis4189
@laurenlewis4189 Жыл бұрын
Grzegorz is pronounced "gSehgoS" where the capital "S"s are pronounced like the "s" in "treasure"/"pleasure"/"vision." Tworek is easier: "tforek" - just remember that most european languages pronounce "w" the way english speakers pronounce "v," and in some words that can get the "voice" (the hum) taken out of it to become an "f" I highly recommend learning the International Phonetic Alphabet. It makes sense of those weird pronunciation symbols on Wikipedia and Wiktionary, and you'll look like you're a smart cookie who speaks multiple languages when you just have figured out how to read pronunciation guides. Knowing how to pronounce words in other languages and knowing what phonemes are commonly used in certain languages also helps you fake an accent and better socially engineer people, if that's the type of hacker you're aiming to be.
@PR1V4TE
@PR1V4TE Жыл бұрын
That's a great explanation right there my friend. 😂👍🏻
@amine_jbz
@amine_jbz 8 ай бұрын
Hello man, I'm from Belgium and as a native French speaker, we don't pronounce the w like a v for an English-speaker, but It's right for some European-language like German and more. Btw, thank you for your good explanations and your advices !
@list1726
@list1726 Жыл бұрын
Thanks for posting
@guyincognito9009
@guyincognito9009 Жыл бұрын
Dude this guy is incredible. Just like you, thanks so much for All your Videos john
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
AMSI reminds me of Jamsey and Wamsey, an inside joke my friend's friend started. Haha
@andreadistasi8842
@andreadistasi8842 Жыл бұрын
Great one! I like that you kept it slim!
@CyberDevilSec
@CyberDevilSec Жыл бұрын
That is epic Jhon keep up the great work!
@keylanoslokj1806
@keylanoslokj1806 Жыл бұрын
Dear mr Hammond our favourite security expert. How can the simple, total beginner user, check if someone has hijacked any device of his network? Smartphone, laptop, smart TV etc. How do we detect a compromise or even foreign users?
@donttrusttheape
@donttrusttheape Жыл бұрын
It will be Gregor in English, actually one of few Polish chaps worth, following!
@JontheRippa
@JontheRippa Жыл бұрын
Wow i love it 👍👍👍
@Vort3X-tech
@Vort3X-tech 8 ай бұрын
How can you run that payload on the target machine without them noticing?
@FuzzerHash
@FuzzerHash Жыл бұрын
Heavy nice content, already waiting next videos.
@oildiggerlwd
@oildiggerlwd Жыл бұрын
Love the comments about webroot. Made me laugh because that’s what our MSP has installed on our endpoints.
@gooniesfan7911
@gooniesfan7911 Жыл бұрын
So you could instead of run a dropped file/bat loader, you could just make it execute a powershell command that downloads&executes the malicious code? (say reflectively load a dll) Then have a scheduled task to run the bogie query command? Would this be considered fileless?
@foeyloozer6299
@foeyloozer6299 Жыл бұрын
No. Fileless is when the entire payload is contained in the LOLbin. If you have it execute something you drop to disk thats not fileless.
@groundwalker2162
@groundwalker2162 Жыл бұрын
Love your content Inspired me to learn
@MrEndzo
@MrEndzo Жыл бұрын
Hacking Windows is cheating.
@trojankit
@trojankit Жыл бұрын
Wym?
@Exotic69420
@Exotic69420 Жыл бұрын
literally
@Exotic69420
@Exotic69420 Жыл бұрын
@@trojankit too easy
@bc100dev
@bc100dev Жыл бұрын
True. Better make Linux malware instead of Windows malware
@ggsap
@ggsap 8 ай бұрын
@@bc100dev How? That is so much easier
@ruthvikas
@ruthvikas Жыл бұрын
Still waiting for picoCTF 2023 🙃
@PR1V4TE
@PR1V4TE Жыл бұрын
John himself need a walkthrough first 😂.
@HxN0n3
@HxN0n3 Жыл бұрын
Superb! man
@kazhiroma9736
@kazhiroma9736 Жыл бұрын
I was just watching your video on hoaxshell
@bogutkghbkng12
@bogutkghbkng12 11 ай бұрын
Irshad
@franman6831
@franman6831 Жыл бұрын
Top tier content John
@stevegreen2753
@stevegreen2753 Жыл бұрын
I like it :)
@rodricbr
@rodricbr Жыл бұрын
awesome
@dariusvlogs3634
@dariusvlogs3634 Жыл бұрын
How to bypass amsi
@ScottPlude
@ScottPlude Жыл бұрын
Are you telling us how?
@ygx6
@ygx6 Жыл бұрын
​@@ScottPlude nah he's asking
@mikaeleriksson6504
@mikaeleriksson6504 Жыл бұрын
Am I missing something. You need to have admin rights to add the query command right?
@MasterOfMisc
@MasterOfMisc Жыл бұрын
Yeah your right. You still need admin access to write to the registry. Which makes this kind of moot
@lancemarchetti8673
@lancemarchetti8673 Жыл бұрын
Nery Vice!
@OfficialAfterLifeEdits
@OfficialAfterLifeEdits 3 ай бұрын
the vrisu got me
@MrClawt
@MrClawt Жыл бұрын
What if you can't write to HKLM?
@Gobillion160
@Gobillion160 Жыл бұрын
write ur report with chatgpt
@panchakosha
@panchakosha Жыл бұрын
Does CLR Hooking to bypass AMSI still work in Windows 11?
@alexandrohdez3982
@alexandrohdez3982 Жыл бұрын
👏👏👏
@anilbangera1
@anilbangera1 Жыл бұрын
@tyrojames9937
@tyrojames9937 Жыл бұрын
👍🏾
@d8rh8r35
@d8rh8r35 Жыл бұрын
noice
@biocode2856
@biocode2856 Жыл бұрын
It's a nkritid viris😂😊
@Mezzosd
@Mezzosd Жыл бұрын
Windows defender its work lol
@Repossessionn
@Repossessionn Жыл бұрын
ayyy
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
Early :3
@adonyz666
@adonyz666 Жыл бұрын
first
@averagejoe404
@averagejoe404 Жыл бұрын
Who asked?
@SolitaryElite
@SolitaryElite Жыл бұрын
@@averagejoe404 me
@wha-yuanfh
@wha-yuanfh Жыл бұрын
useless
Filter Evasion in a REVERSE SHELL (no spaces!!)
29:11
John Hammond
Рет қаралды 40 М.
Self-Extracting Executables for Hackers
41:06
John Hammond
Рет қаралды 80 М.
Good teacher wows kids with practical examples #shorts
00:32
I migliori trucchetti di Fabiosa
Рет қаралды 10 МЛН
GIANT Gummy Worm Pt.6 #shorts
00:46
Mr DegrEE
Рет қаралды 124 МЛН
iPhone or Chocolate??
00:16
Hungry FAM
Рет қаралды 54 МЛН
Life hack 😂 Watermelon magic box! #shorts by Leisi Crazy
00:17
Leisi Crazy
Рет қаралды 74 МЛН
catch EVERY reverse shell while hacking! (VILLAIN)
19:03
John Hammond
Рет қаралды 221 М.
How Legitimate Software is hiding Malware
15:21
Eric Parker
Рет қаралды 27 М.
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,3 МЛН
Обратный ssh туннель в ОС Linux reverse shell
33:16
ПРОтехнологии
Рет қаралды 3,8 М.
Hacking Windows TrustedInstaller (GOD MODE)
31:07
John Hammond
Рет қаралды 663 М.
How Hackers Hide
20:55
John Hammond
Рет қаралды 239 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 273 М.
Create a Reverse Shell Using a Fake MP4 File [Tutorial]
11:56
Null Byte
Рет қаралды 153 М.
Good teacher wows kids with practical examples #shorts
00:32
I migliori trucchetti di Fabiosa
Рет қаралды 10 МЛН