How Hackers Hide From Memory Scanners

  Рет қаралды 57,187

John Hammond

John Hammond

7 ай бұрын

jh.live/maldevacademy || Learn to write modern 64-bit Windows malware with Maldev Academy! Save 10% even on the LIFETIME plan with code 'HAMMOND10': jh.live/maldevacademy
PS, I'll be presenting for the CloudSec 360 webinar with Wiz on the MOVEit Transfer exploitation -- tune in on November 8th! jh.live/wiz360
Free Cybersecurity Education and Ethical Hacking
🔥KZbin ALGORITHM ➡ Like, Comment, & Subscribe!
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 67
@reconmaster907
@reconmaster907 6 ай бұрын
He has upped his thumbnail game. Cool.
@F599
@F599 6 ай бұрын
I got Watch_Dogs vibes, absolutely awesome art style.
@DragonFistLeeMontage
@DragonFistLeeMontage 6 ай бұрын
I’ve been in IT for 10 years, and every time I watch one of your videos, I realize I need another 10 years of practice at least.. 😂 Keep up the good work
@user-fc1ep2xy7k
@user-fc1ep2xy7k 6 ай бұрын
Same here man... Been software engineer for 8-9 years and I just realize how many things I don't know
@maalikserebryakov
@maalikserebryakov 6 ай бұрын
TECHNIQUES OF HIDING IN MEMORY 1 - Encrypting the Payload until Action
@felixkiprop48
@felixkiprop48 6 ай бұрын
John, the best in advert, love that voice change.
@xeaudg
@xeaudg 6 ай бұрын
John Hammond: Answering the question "What would it look like if Seth Rogan were to suddenly become a CyberSecurity professional...?" LOL. Mr. Hammond: you are a security superstar! Keep up the good work!
@Jhern4nd3z516
@Jhern4nd3z516 6 ай бұрын
Bring back the malware reverse engineering videos 🥺
@Frozlie1
@Frozlie1 6 ай бұрын
really enjoy your content, thanks!
@0oNoiseo0
@0oNoiseo0 6 ай бұрын
Interesting to dive more into. Thank u!
@m3sm4r2010
@m3sm4r2010 6 ай бұрын
great video sir,well done
@shadrachwilson1211
@shadrachwilson1211 6 ай бұрын
Great content. This got me scratching my head
@stanislavsmetanin1307
@stanislavsmetanin1307 6 күн бұрын
As always - great material. Thx.
@georgehammond867
@georgehammond867 6 ай бұрын
how to learn the basics programs in C/CPP, before exploit devs courses ??
@K03KK03K
@K03KK03K 6 ай бұрын
Nice one! Thanks!
@Bair994
@Bair994 3 ай бұрын
Tried to access the sign you linked and was blocked from Maldev, probably because of a vpn? idk not turning it off to access a Cyber Sec site thats asking for trouble.
@JeffNoel
@JeffNoel 6 ай бұрын
I've been seeing many similar websites offering courses and certifications for exploit development, but I have no idea which one is really worth it... Maldev's syllabus seems impressive, but I'm curious how they stack up against better known certs like OSED. Super cool to be able to see part of a module with you in this video :)
@Yahelj6
@Yahelj6 6 ай бұрын
Its not Exploit Development, its Malware Development
@h4ckh3lp
@h4ckh3lp 6 ай бұрын
Bravo, sir.
@abdullahkhan_9876
@abdullahkhan_9876 6 ай бұрын
HI!, I'd love to see a video on how hackers bypass av/anti-virus
@marveII0us
@marveII0us 6 ай бұрын
Binders/Crypters?
@senseiSinclair
@senseiSinclair 6 ай бұрын
Maldev academy looks similar to HackThe Box academy to me. Cool video.
@senseiSinclair
@senseiSinclair 6 ай бұрын
@@lumikarhu Yeah, visually looks like a similar format.
@Darkregen9545
@Darkregen9545 6 ай бұрын
The amount of things hackers can do is crazy.
@cygmoid
@cygmoid 6 ай бұрын
Yeah , like they know multiple ways to inject shellcode even if you close down one trick. Pretty crazy
@DanniDuck
@DanniDuck 6 ай бұрын
@@cygmoid It's not too hard to prevent if you really think about it. You should first implement a memory hasher that can detect when memory gets changed after you make any hooks you have. You can hook functions such as LoadLibrary too. After that, you should scan for any RX allocations, which would indicate manual map. You can make manual mapping even harder by hooking thread creation functions eg. BaseThreadInitThunk, but a common workaround for this is to create a suspended thread with a valid address, then change it and resume it, so make sure you check that as well. The most important protection is a hard to figure out memory hashing system that checks itself and must be running.
@seansingh4421
@seansingh4421 6 ай бұрын
Actually it can become very easy to spot if you have Eventlog forwarding and parsing, coupled that with suricata network logging and its becomes very difficult for a hacker to hide.
@DanniDuck
@DanniDuck 6 ай бұрын
@@seansingh4421 What? This video isn't about network security, it's about application security.
@seansingh4421
@seansingh4421 6 ай бұрын
@@DanniDuck which go hand in hand my friend. Syslog or Eventlogs tell you everything not just network stuff
@nittani.
@nittani. 6 ай бұрын
I love this guy hes good looking too
@zach115th
@zach115th 6 ай бұрын
Does the lifetime purchase cover all the modules or just one?
@stickman2003
@stickman2003 5 ай бұрын
Evil ChatGPT update !!
@mudi2000a
@mudi2000a 6 ай бұрын
How can I learn about those topics without shelling out a lot of bucks?
@user-td4pf6rr2t
@user-td4pf6rr2t 3 ай бұрын
Videos and combining wordlist/brute-force/enumeration with nlp. Like if someone wanted to dynamically enumerate language but when grounded. 10:38 Is this how ChatGPT and other LLM are stateless but still able to leverage things like a text embedding maybe? 11:23 This is terrible
@oratilemoagi9764
@oratilemoagi9764 6 ай бұрын
Hey can i ask; If you Videos get removed or banned where else can i watch them
@stanislavsmetanin1307
@stanislavsmetanin1307 6 ай бұрын
Fantastic ))
@activelearner9924
@activelearner9924 2 ай бұрын
can i use on my personal pc to detect sir??
@bilalaniq7770
@bilalaniq7770 6 ай бұрын
plz tell me how to bypass win defender
@sanathkumar1006
@sanathkumar1006 6 ай бұрын
I doubt EDR would have pick it up when mimikatz was extracting NTLM even though it was fraction of a sec
@nordgaren2358
@nordgaren2358 6 ай бұрын
Defender won't even let you put mimikatz on your PC.
@nordgaren2358
@nordgaren2358 6 ай бұрын
You MAY be able to get it, but as soon you run it, it's gone. If you leave it, defender will find and zap it in a scan, eventually.
@sanathkumar1006
@sanathkumar1006 5 ай бұрын
@@nordgaren2358 Yeah true
@gunnerysergeant8889
@gunnerysergeant8889 6 ай бұрын
i signed up for the course. It's not for beginners. It has a very steep learning curve of "C". I do think it is great knowledge but def not for beginners. You do make it sound AWESOME though...in fact, sorry, I watched your video and just instantly enrolled. THEN i saw you had a code. I just wished the course had the videos like the ones you are actually doing. it really helps me fill in the blanks for the things i am not understanding. sadly the course has over a 100 modules between course&updates (do i follow the course or do I follow the updates)...videos would be nice...at least to get our of the beginner section.
@nordgaren2358
@nordgaren2358 6 ай бұрын
Follow the courses, first. Start from the beginning. Then do the updates.
@daljeetbhati8353
@daljeetbhati8353 6 ай бұрын
can you share the course
@hypedz1495
@hypedz1495 5 ай бұрын
Maldec academy looks super expensive.
@popeyehacks
@popeyehacks 6 ай бұрын
I want that exe
@hozehd8246
@hozehd8246 6 ай бұрын
I just hate how exp the course is, also that I had beef with one of the founders once lol
@HiroProtagonistCIC
@HiroProtagonistCIC 6 ай бұрын
👀 😅 we need details, was considering paying for lifetime but if it's run by shady people that'll definitely have me thinking twice
@HiroProtagonistCIC
@HiroProtagonistCIC 6 ай бұрын
@@lumikarhu people of questionable character or morales are not the kind of people I want to do business with. Especially when it comes to the realm of malware. But this is all speculation, reason I asked the question above.
@maalikserebryakov
@maalikserebryakov 6 ай бұрын
@@HiroProtagonistCICits not wise to accept criticism just because it exists
@HiroProtagonistCIC
@HiroProtagonistCIC 6 ай бұрын
@@maalikserebryakov it's not wise to not question everything... Wow, this was such an insightful exchange 👏 bravo
@hampus23
@hampus23 6 ай бұрын
Can be found for free on forums
@DFPercush
@DFPercush 6 ай бұрын
Very clever, tricksy hobbitses... now someone needs to make a real time scanner that will scan any new executable page being loaded. Invalidate and page out when protection flags change. Might impact the performance of JIT apps though.
@SwineTech
@SwineTech 6 ай бұрын
A real hacker wont use already developed programs.. lol 😮
@kenzyflash
@kenzyflash 6 ай бұрын
first to comment and a nice video
@haroldsmith768
@haroldsmith768 6 ай бұрын
Wy do people type so much just to be nosey
@iamwitchergeraltofrivia9670
@iamwitchergeraltofrivia9670 6 ай бұрын
Hahahh visual studio you hack easy to hack hahahhaahav
@creativeyes3292
@creativeyes3292 6 ай бұрын
That thumbnail is hella cringe
@nicolae1392
@nicolae1392 6 ай бұрын
you people have a life?
@Oregoncoast30
@Oregoncoast30 6 ай бұрын
Yes. A fun cybersecurity / infosec life. Its cool stuff and fun to delve into.
@maalikserebryakov
@maalikserebryakov 6 ай бұрын
no life below 3 PSL :(
@maalikserebryakov
@maalikserebryakov 6 ай бұрын
@@Oregoncoast30 Reddit moment
How Hackers Exploit Vulnerable Drivers
23:58
John Hammond
Рет қаралды 42 М.
How Hackers Remotely Control Any PC?!
9:47
Loi Liang Yang
Рет қаралды 380 М.
Eccentric clown jack #short #angel #clown
00:33
Super Beauty team
Рет қаралды 27 МЛН
Joven bailarín noquea a ladrón de un golpe #nmas #shorts
00:17
Sprinting with More and More Money
00:29
MrBeast
Рет қаралды 118 МЛН
Top 10 Things to Know About Claris FileMaker 2024
19:25
FileMaker Training Videos
Рет қаралды 1 М.
HackTheBox - Analysis
1:24:03
IppSec
Рет қаралды 5 М.
I Made Malware In Under 20 Minutes
19:44
John Hammond
Рет қаралды 63 М.
you need to learn Ansible RIGHT NOW!! (Linux Automation)
21:21
NetworkChuck
Рет қаралды 843 М.
How Does Malware Know It's Being Monitored?
17:17
John Hammond
Рет қаралды 71 М.
How Hackers Hide
20:55
John Hammond
Рет қаралды 235 М.
How To Pivot Through a Network with Chisel
33:45
John Hammond
Рет қаралды 119 М.
Linux Hackers Become Root with CURL & Sudo
18:44
John Hammond
Рет қаралды 17 М.
Incident Response: Azure Log Analysis
19:15
John Hammond
Рет қаралды 63 М.
Eccentric clown jack #short #angel #clown
00:33
Super Beauty team
Рет қаралды 27 МЛН