Too often sites don't require reauth to change account settings. Huge fail! If they can't change passwords, email, phone numbers, or delete accounts you at least have the ability to get your account back. Also KZbin.. don't allow video deletion without reauth!
@CZghost2 күн бұрын
That's for the user's convenience frankly. Users don't want to reauthenticate for everything. Users don't want to have to fill in the password for everything. It does lower the security when sites don't require you to reauth for more dangerous tasks, users don't care tho. I personally wouldn't mind to reauth, afterall, I understand that changing my password is something that an attacker could do when they acquire an access to the account, so I'm grateful for an added layer of security. But I am educated in cyber security. Ordinary user often is not, and reauthing may be seen as a burden, not a safety feature.
@dealloc2 күн бұрын
Circumvent it with 'I forgot password'... Chances are if they have your session for one thing, they likely also has it for your mail.
@𠀖2 күн бұрын
Epic fail *does dart tounge noise* 👎
@CZghost2 күн бұрын
@@dealloc That's true. The thing about this is that everything like this requires you to click on something. If something smells fishy, be extra careful. This is super fishy.
@zuberkariye2299Күн бұрын
Github has this feature and I liked it
@Faraonqa3 күн бұрын
you can't steal mine *aint got one*
@AlexTsaava2 күн бұрын
Neither do I! 😎😎
@dogyX32 күн бұрын
*Are you sure?*
@Levi-zy5dr17 сағат бұрын
I just made you one
@lxn74042 күн бұрын
I think it gets even scarier when you start looking at mobile platforms
@capability-snob2 күн бұрын
There are legitimate problems with session tokens, but this isn't one of them. If the attacker has code execution, stealing the session token is a matter of convenience. They could just remote control your browser session.
@Adivasi77773 күн бұрын
John Hammond's next video: How I social engineered myself. (For educational purposes only)
@davidkeeper72922 күн бұрын
i'm weak asf
@M.Hassanraza-b5z22 сағат бұрын
🤣
@PandannahAJ2 күн бұрын
Knowing this can happen from a simple file download is is actually insane. Seriously more people need to know about this. Appreciate your attention to detail and clear explanation. I would LOVE to see more videos on this topic of vulnerabilities and online privacy/security. I subscribed
@Maxjoker982 күн бұрын
Cool video, even if the scenario seems a bit contrived(just assume ACE on the victims machine, lol). But from what I can learn about Flare I don't see them doing anything useful. The idea is to scrape publicly-available information from paste sites, forums, etc. and "the dark net"(just more forums probably), and then analyze that using simple string pattern matching and "AI" to "warn" their customers. But such data is very often not uploaded immediately to such freely available public sources because the hackers want to use the data themselves or sell it(can't sell it if you've already given it away). They basically get to see the data that is so low-value to hackers they give it away for free. At that point you've already been thoroughly hacked, the hackers have made their money, and have gotten away with it. This tool might help you "mop up the floor" a bit afterwards. It does nothing to actually protect you, and detects threats only after they've been fully exploited. Investing in additional actual IT security(-worker, education, programmer time, etc.) seems more prudent.
@mitospha3 күн бұрын
I'm highly surprised that Reddit doesn't match secondary data to their sessions. In eCommerce and secure application practices, sessions must be matched to things like GeoIP data. I've been exporting cookies and keeping them on a flashdrive to use my sessions on other computers since I was a teenager. Interesting to see it hit the mainstream.
@mitospha3 күн бұрын
Things like ACM or Advanced Cookie Manager, and similar tools have been around since 2010. And there were tools for this in the 90s
@sasjadevries3 күн бұрын
Now I'm wondering about the precision and policies surrounding that GeoIP data. 🤔 Let's say a bad actor is logged in to the public wifi of a fastfood restaurant nearby, or has infiltrated your neighbours network. And I'm not even mentioning ISPs with dynamic IP adresses.
@mitospha3 күн бұрын
@@sasjadevries VPNs changing your GeoIP is an example of changing location. Many things such as USPS' website does not support VPNs for example. Some location services use multiple network data to refine your location; and can provide more precise unique network location fingerprints.
@39580xxx3 күн бұрын
Its been mainstream for a long time lol
@sasjadevries2 күн бұрын
@@mitospha Yeah I know, they usually block ip adresses of known VPNs. But if an attacker uses his botnet for proxying his traffic, then that traffic is still coming from residential buildings.
@itchylol7422 күн бұрын
Is there a way to make Windows programs more like Android where when an app wants to do something to your files that aren't related to that specific app (for example, reading web browser cookies) it has to ask for permission first?
@cleava9592 күн бұрын
Take a shot every time he says “infostealer malware”
@Muziek374142 күн бұрын
Most websites use a double check if you login from a different IP address, so you might need to proxy of vpn to that country
@holobolo16613 күн бұрын
A bit worried this violates the Reddit ToS even if only a demo. Hope they don't mind. Would be silly of them to care anyway.
@ytuseraccount3 күн бұрын
it definitely doesn't its a clickbait af video. yes this is what info stealer malware does. yes you can take over accounts with it. but obviously you can take over an account if you have the cookies this does not warrant a video and the title makes it seem like something more significant
@HackedGoat3 күн бұрын
Reddit is very respectful of hackers. I just checked their scope on HackerOne for you and he was well within their scope, so all is well. ❤
@ELogicoPo3 күн бұрын
@@ytuseraccount The entire point of the video is to show that people use malware like RedLine to steal cookies from people and that this bypasses even good, strong passwords, 2FA and browser fingerprint. What is the clickbait? You're just saying "oh yeah, that's a info stealer, I already know what this kind of malware does", but other people don't.
@holobolo16613 күн бұрын
@@ytuseraccount I haven't watched that far but was expecting something like that. I don't think this is really clickbait, if it attracts a wider audience to learn about CS that's a good thing. It does violate the Reddit terms of service, as by using the cookie info you are: "modify, prepare derivative works of, disassemble, decompile, or reverse engineer any part of the Services or Content; or" As I said, I'm still watching, but they actually could be annoyed if there's not a disclaimer that this is not specific to Reddit for those who don't have an understanding of how cookies/info stealers work. But I'm guessing he explains that in the video. I still think it would be silly of them to get annoyed about it.
@ytuseraccount3 күн бұрын
@@holobolo1661 its good that it attracts a wider audience but i was expecting maybe an ATO he'd reported to reddit and gotten disclosure for or something like that.
@АлексейЛогинов-ж1ц3 күн бұрын
I started to watch this video and was like "no way you can easily steal sessions", and I was right. If your victim is ready to click on random applications, it's not "easy", you can only steal from complete idiots
@VenulaJ3 күн бұрын
With the amount of idiots that have access to IoT devices, it is very easy 😂
@pato_do_lago2 күн бұрын
Not really. This was just a demo, a real attack would require sophisticated techniques. It won't be a random application, it will be something made for you to trust it is legit. It could be a game you download, an executable disguised as image, hidden in a code. Possibilities are endless, and they would just need the right one to catch you.
@piolix00042 күн бұрын
You seem to be a bit unexperienced in this field my man, there are plenty and I mean PLENTY of people stupid enough to do that. And also this does not only apply to people who run infostealers, using sessions like this is extremely common when conducting XSS attacks where you make the victim run JavaScript to send their entire session over to somewhere else. Educate before being so ignorant about informational videos.
@АлексейЛогинов-ж1ц2 күн бұрын
thank you for your answers! i was negative because i lack confidence, in fact, this is a very helpful video in a lot of ways.
@piolix00042 күн бұрын
@@АлексейЛогинов-ж1ц never stop learning 👍
@darkshoxx3 күн бұрын
This is, as usual 90% informative and entertaining, and 10% scary 😅
@cugansteamid62523 күн бұрын
This is scary man!
@lerenstuderenopschool3 күн бұрын
Can you pls share your script's so we can do it for our selves pls?
@lerenstuderenopschool3 күн бұрын
For testing on myself only.
@killalldotpy3 күн бұрын
hoaxshell.
@computeroid61623 күн бұрын
@@lerenstuderenopschoolriiiiiight, for sure bro
@Th3Alibi2 күн бұрын
Nice try script kiddie 😂
@lerenstuderenopschoolКүн бұрын
@@computeroid6162 I Like to try that things my selve without typing evrything over from a paused YT video. I dont no how a cookie grabber looks like (code) and i like to learn it for cyber sec.
@valorsec3 күн бұрын
You can simply paste that into another browser using a plugin n you have successfully done the same
@pato_do_lago2 күн бұрын
Yes, you can also insert it using developer tools.
@pato_do_lago2 күн бұрын
What if the person is using Incognito? Or if they clear cookies before closing the browser? Because when the browser is open, the files which contain the cookies are locked until you close it.
@MERE8Күн бұрын
Wow, thank you for sharing this information. I love this kind of stuff that show the vulneravilities
@whoami-ty1kp2 күн бұрын
Was your windows defender enabled? Would it stop the payload from downloading on the system?
@obfuscated655353 күн бұрын
The best keyboard and mouse combo ❤❤ awesome content as usual!!!
@lockpickingmenКүн бұрын
Enabling Device Bound Session Credentials in Chrome (Flags) does not help to prevent cookie theft?
@TacoFlavorKisses3 күн бұрын
Seems that we all view windows as a joke rather than an OS. lol
@anonymous49125Күн бұрын
I like how the hacker is so leet, that it says leet in the name twice.
@CorollaGTSSRX2 күн бұрын
Where do these infostealer logs come from?
@Z3N0H3 күн бұрын
Awesome!!! Thanks Hacker
@PhinkTink2 күн бұрын
and again, it needs a stupid one on the other side, as, 99% of all techniques
@chinedumichael87763 күн бұрын
Bro you're the real hacker. Great 😃
@88tx3 күн бұрын
of course it's cookies. but nice user name tho
@Misanthrope-2 күн бұрын
Was Windows Defender turned on?
@realpiee39 минут бұрын
i stole my own reddit account too. i just input a password and it works
@santiparavano2 күн бұрын
Hello from Argentina !!!!!
@Indiek10 сағат бұрын
Now its my time to unsub, this was the worst clickbait ive ever saw.
@G-Pie2 күн бұрын
Could of sworn you were wearing overalls at first
@AlexTsaava3 күн бұрын
umm, what's the purpose? (also I don't have a Reddit Account so you can't hack mine)
@thecooldudes694203 күн бұрын
Ok.
@uncleburu94643 күн бұрын
John Hammond please talk about app bound encryption and how Hacker bypass it by opening chromium browser on debugging mode
@kitchenpotsnpansКүн бұрын
I lost my account
@ToxicReacts-2 сағат бұрын
Running out of video ideas? 😂
@theehans3 күн бұрын
I would be surprised but Reddit has always had bad programming. Any programmer with a brain can tell.
@somnulltyСағат бұрын
This problem is in all sites that let you in your account after page refreshes
@RandomytchannelGD3 күн бұрын
Hi
@LeonardoZimmermannJF2 күн бұрын
Sorry, but it captures the cookie itself, it's beautiful in practice, it shows me you making a network sniffer in vps, capturing the network packets without any, client-side failure! And capturing session cookies, on an onion network for example! Baby script I am too
@lerenstuderenopschoolКүн бұрын
Can you write a cookie grabber script?
@gurug66663 күн бұрын
CPP book malewear analysis name show mi
@CryptoperPro3 күн бұрын
🎉
@Sam_BentКүн бұрын
Great video.
@JNET_Reloaded3 күн бұрын
mic way too loud hurts the earholes no need to shout dude!
@kim23063 күн бұрын
...turn your volume down?
@XDRosenheim2 күн бұрын
This video is on the same level as any other video I have watched in the past week...
@SammyTech_13 күн бұрын
Wow 😂
@phatiya_nai3 күн бұрын
🎉🎉🎉
@HolyAdilokGames3 күн бұрын
First!
@lerenstuderenopschool3 күн бұрын
If you pin this than you are a legend (actually already).
@TheForgottenOne-g4q3 күн бұрын
First here !
@YjxylzКүн бұрын
I need your help bro please tell me where can i contact