How Hackers Compromise Other Users

  Рет қаралды 104,394

John Hammond

John Hammond

Күн бұрын

Пікірлер: 49
@FuzzerHash
@FuzzerHash 10 ай бұрын
John, not just the content of your channel are great but too your way of teach
@debarghyamaitra
@debarghyamaitra 10 ай бұрын
Hey John can you make some solution videos for the Huntress CTF? really loved the competition, would love to see some of it's solutions!
@wizzyoo37
@wizzyoo37 10 ай бұрын
It must have been patched on Debian 12 because this exploit doesn't work on my system.
@Darkregen9545
@Darkregen9545 10 ай бұрын
Most things John post's are patched exploit hacks. If John finds exploits he usually reports it to the proper organization before making a video of it. Other than that he finds already patched exploits to make a video on.
@chrisclark5135
@chrisclark5135 10 ай бұрын
Great vid as always, John and congrats on a MILLY! You da man!!
@lfcbpro
@lfcbpro 10 ай бұрын
Off topic here John, but how can you explore the dark web, without 'images' that are definitely illegal getting cached on your PC? I recently saw an older video of yours showing how to use a dark web search engine, but you had to blur images on the video because of 'under 18' content being sold, or shown, and that was just on a search engine (banner ads), without going to that particular site. This, in my country would be highly illegal, and I don't want any of that content on my PC. Is there a way you could do a guide or show how you could look at the dark web, or Tor sites, without having these images etc sent to your PC, or is that just part of going on the dark web? Is there a way to use a browser that you can stop it displaying any images for instance? Or does the Tor browser have any reliable addons such as adblock? I am studying computer science and would like to broaden my knowledge, but not if there is a chance I will see that stuff, or worse still end up on a register. *as a side note, if you do any further videos on the dark web etc, you might want to inform people that just receiving these images to your screen (even in a banner ad) can in some countries be illegal and get you severe penalties.
@maalikserebryakov
@maalikserebryakov 10 ай бұрын
If u cannot figure this out as a compsci student I recommend transferring to Communications or somethinf hahaha
@lfcbpro
@lfcbpro 10 ай бұрын
@@maalikserebryakov very constructive.
@texturebyte
@texturebyte 10 ай бұрын
Is this different from business logic vulnerability ? if so, how ?
@TRAVESIAA
@TRAVESIAA 10 ай бұрын
WOW. Thank you
@bernardpower1664
@bernardpower1664 10 ай бұрын
thank you
@dtitan1993
@dtitan1993 10 ай бұрын
John, how do you mitigate these type of risks?
@74mada
@74mada 10 ай бұрын
Nice lesson, thanks John.
@brutalblade619
@brutalblade619 10 ай бұрын
Someone correct me but this looks similar to Microsoft's/Windows verison called "Sysinternals"?
@DavidAlvesWeb
@DavidAlvesWeb 10 ай бұрын
Great video John! I don't think I'll ever do hands-on technical videos anymore... I will never do them as good as you 😅 Big props to the editor! Ps: consider removing all the commas and periods on the captions!
@AhegaHOE
@AhegaHOE 10 ай бұрын
Is no one using the CC feature from KZbin? Personally I think it's very annoying if you can't turn them off (when they're embedded in the video)
@DavidAlvesWeb
@DavidAlvesWeb 10 ай бұрын
It helps with retention, specially in the beginning of a video@@AhegaHOE And I don't think everyone uses the autogenerated captions
@AhegaHOE
@AhegaHOE 10 ай бұрын
@DavidAlvesWeb yeah I understand but remember that they don't have to be autogenerated, as a creator you can easily upload your own.
@zemourizemouri2406
@zemourizemouri2406 10 ай бұрын
Always the best.
@csa5697
@csa5697 10 ай бұрын
Beautiful.
@MAX-nv6yj
@MAX-nv6yj 10 ай бұрын
thank u so much
@tametov
@tametov 10 ай бұрын
Nice nice!
@Respect_video223
@Respect_video223 10 ай бұрын
nice
@hassnatshah1112
@hassnatshah1112 10 ай бұрын
Enjoyed the video. I was trying try hack me and was in the priviledge escalation module for linux and then i was trying to make a poc about setuid when i was learning linux and was trying to see if i can make a bash script that i can run with uid 0 just like passwd command but i failed on that as i was trying to access a file made by root user which my simple can not read, write or execute but with the bash script it just shows out that output as it runs with uid zero. i failed as i was using bash commands and i think i shloud be using a c++ code to make the executable for my requirement to happen. Would really appreciate it you can maybe do some fun stuff like that.
@Nailey-h7p
@Nailey-h7p 10 ай бұрын
cool!!!
@pavi013
@pavi013 10 ай бұрын
There is so many ways to hack someone.
@popeyehacks
@popeyehacks 10 ай бұрын
Cool🎉
@fmoney
@fmoney 10 ай бұрын
Ayyy lets learn muahaha!
@JNET_Reloaded
@JNET_Reloaded 10 ай бұрын
So why don't they patch find exploits?
@zellfaze
@zellfaze 10 ай бұрын
I think because they are side effects of things that are generally useful and there are ways to lock things down so that these exploits are not possible.
@Samuel-cr9mc
@Samuel-cr9mc 10 ай бұрын
Exploits either purposeful or mistake. Most times theyre reported before patched
@BurkenProductions
@BurkenProductions 10 ай бұрын
It's not called "tac" it's dash or a minus.
@QuibbleTrouble
@QuibbleTrouble 10 ай бұрын
Tac (or tack) is military slang for a dash.
@hitmax087
@hitmax087 10 ай бұрын
To many words
@BenTen1000T
@BenTen1000T 10 ай бұрын
Brother, you are a very good person. I like you very much Enter the realm of Islam. And become Muslims. There is nothing wrong with reading books on Islam. Watching will change your life. Preach to yourself and your friends. Explain this to yourself and your friends. You will find the teachings of Islam very interesting. By accepting Islam, you will find peace of mind. You have to think about what I said while sitting alone. Your life will change.
@maalikserebryakov
@maalikserebryakov 10 ай бұрын
I left Islam when i was 12 How do you still believe this Cope 💀
@simen9485
@simen9485 10 ай бұрын
Lol😂
@Soupjamjoel
@Soupjamjoel 10 ай бұрын
Brother, you are a very good person. I like you very much Enter the realm of Arch Linux. And become Arch user. There is nothing wrong with reading Arch Wiki. Watching will change your life. Preach to yourself and your friends. Explain this to yourself and your friends. You will find the teachings of Arch very interesting. By accepting Arch, you will find pacman -Syu. You have to think about what I said while sitting alone. Your life will change.
@mechanize6383
@mechanize6383 10 ай бұрын
​@@SoupjamjoelAmen.
@Da1deonly-ip8nj
@Da1deonly-ip8nj 10 ай бұрын
@@maalikserebryakovtuff guess you wasn’t guided
@thomaswagner8650
@thomaswagner8650 10 ай бұрын
First :D
@BurkenProductions
@BurkenProductions 10 ай бұрын
it's called etc, not etcetera.... please don't learn noobs the wrong terminology!
@charnak
@charnak 10 ай бұрын
@@omgboy4939 the etc directory is actually pronounced et-see. while it does mean etcetera, the jargon would be etc. just like we don't call the cat program concatenate, even though it is actually concatenate.
@inspired9584
@inspired9584 10 ай бұрын
Document from Bell Labs, /etc is referred to as the etcetera directory,[4] as this directory historically held everything that did not belong elsewhere [4] J. DeFelicc (17 March 1972). "E.0". Preliminary Release of UNIX Implementation Document (PDF). p. 8. IMO.1-1.
How Hackers Compromise BIG Networks (with NetExec)
36:41
John Hammond
Рет қаралды 119 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 275 М.
小蚂蚁会选到什么呢!#火影忍者 #佐助 #家庭
00:47
火影忍者一家
Рет қаралды 111 МЛН
Хасанның өзі эфирге шықты! “Қылмыстық топқа қатысым жоқ” дейді. Талғарда не болды? Халық сене ме?
09:25
Демократиялы Қазақстан / Демократический Казахстан
Рет қаралды 325 М.
А что бы ты сделал? @LimbLossBoss
00:17
История одного вокалиста
Рет қаралды 9 МЛН
Capture the Flag: Hacking Yet Another Markup Language
13:14
John Hammond
Рет қаралды 35 М.
How Hackers Hide
20:55
John Hammond
Рет қаралды 239 М.
10 LOLBINS YOU SHOULD KNOW!
12:40
Hacksi
Рет қаралды 652
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 299 М.
How Hackers Exploit Vulnerable Drivers
23:58
John Hammond
Рет қаралды 47 М.
How To Hack APIs with Python
22:55
John Hammond
Рет қаралды 87 М.
How Hackers Hide From Memory Scanners
21:11
John Hammond
Рет қаралды 59 М.
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 859 М.
16yr old Hacks Webcams at Anti-Scam Call Center!
9:34
NanoBaiter
Рет қаралды 1,8 МЛН
Hack With SMS | SMS Spoofing like Mr. Robot!
11:32
zSecurity
Рет қаралды 1,1 МЛН
小蚂蚁会选到什么呢!#火影忍者 #佐助 #家庭
00:47
火影忍者一家
Рет қаралды 111 МЛН