Ps, HUGE THANKS to Snyk for sponsoring this video ! Snyk is putting together their next Capture the Flag 101 workshop! If you are new to CTF challenges and want some extra guidance on how to cut through binary exploitation or web security tasks, jump into their free online session on September 14th at 11am EDT! j-h.io/snyk-ctf101 click the link plz click it CLICK THE LINK j-h.io/snyk-ctf101 click click click
@nighthawk53052 жыл бұрын
Click a posted link, enter "Name", "Company E-Mail", "Company Name" and "Job Title" to register..... Not comfortable with that.
@link_safe2 жыл бұрын
@@nighthawk5305 It's designed for businesses and companies.
@Fl0kii_2 жыл бұрын
I could watch John explaining Python code for the rest of my life!
@caiovinicius84482 жыл бұрын
It's a good idea.
@nikhilsuryanarayanan21332 жыл бұрын
😂nice
@Propertymagnet_boy2 жыл бұрын
why?
@spiegelbestseller98532 жыл бұрын
Me too
@jasonb22212 жыл бұрын
Thanks John, your way of teaching, explaining while you're working on the fly is awesome! Really teaches us how to think and react while troubleshooting.
@zanidd2 жыл бұрын
Thank you -John- Kevin!
@Scorpion_Yug6 ай бұрын
Zanidd ❤
@dayanjihuzefa18272 жыл бұрын
Your channel is best source to learn Cybr security 👍
@michaelwerkov34382 жыл бұрын
Its fun how i know nothing about hacking but when he explains things it makes perfect sense
@bs12wrblimitedsti382 жыл бұрын
I just got my A+, Net+, Sec+ and man there’s SOOO much more to learn haha maybe I’ll under more with time but 80% of the video I know. Just now I have to figure out how to implement everything I learned. Hands on is WAY better for me! Thank you for what you do hopefully one day I will be kind of close to on your level of knowledge.
@flaviomoreira012 жыл бұрын
The more you know the more there is to know. Do you think it is good idea to get CEH cert has my first cert?
@johnpathe2 жыл бұрын
@@flaviomoreira01 yes
@Smithy9572 жыл бұрын
@@flaviomoreira01 the OSCP is so much better than the CEH
@flaviomoreira012 жыл бұрын
@@Smithy957 I have heard that it is harder to get it, but what is the requirement?
@flaviomoreira012 жыл бұрын
@@zebbybobebby But in terms of reputation, would you agree that CEH is more advanced?
@jimo84862 жыл бұрын
this is the only ad sponsor i would watch
@analyzec1372 жыл бұрын
Glad to hear about the snyk ctf webinar John.... can’t wait XD
@daleryanaldover65452 жыл бұрын
I just remembered when I first CTF like experience with Kirshbaum. They have a challenge for job applicants and successfully doing the challenge grants them a chance for an interview. I failed the interview tho but it was a fun experience nonetheless.
@ponan00532 жыл бұрын
Could you do a video on how you make these challenges? like the thought process and steps behind it? I think thatd be awesome
@cnfreitas2 жыл бұрын
Look, I'm not into security but I could not pass this video. Very interesting and made easy to understand some Linux command lines and strategies to find problems. Thanks!
@mohammedbahamid87592 жыл бұрын
It would really be awesome if you could make a video on how to create a CTF challenge based on the vulnerabilities on Exploit DB. The way to navigate through exploit DB, the thinking process, etc...
@khaleedmayas Жыл бұрын
+1
@cheeseIT19922 жыл бұрын
You never disappoint, thanks John!
@Zerback2 жыл бұрын
Great content John! Thanks for all your shared knowledge as usual!
@TheHaircutFish2 жыл бұрын
Awesome vid John!!!
@huzifaahmed14262 жыл бұрын
I learn alot from you man 💚
@NicolaCalore2 жыл бұрын
Thanks John for teaching me 👾
@GeorgeWulfers_882 жыл бұрын
Awesome! :) Great video as always.
@joaoverde77422 жыл бұрын
I loved the office reference :D
@anthonylamoreaux12822 жыл бұрын
Love your videos! Thank you for all that you do.
@JoakimKanon2 жыл бұрын
May I suggest backing off from the mic, or getting a pop filter? Your P’s are pretty brutal on headphones. Great video, anyways. 😍
@moustafakashen36102 жыл бұрын
Love your content Mr. Hammond
@mrobvious61122 жыл бұрын
Its crazy how simple it is to understand python ven though I barely learned python Not really as simple but getting use to how it works makes it simple enough to understand...
@huzifaahmed14262 жыл бұрын
The Greatest man in this feild ❤❤❤
@renatofreirefilho2 жыл бұрын
Obrigado, sempre ótimos conteúdos!
@danielghani39032 жыл бұрын
Thank you for the video suggestions .I will go through one by one
@DEADCODE_2 жыл бұрын
you know what john i love you
@Freeak62 жыл бұрын
One thing I don't understand is why root user in container has root privileges in host filesystem? These shouldn't be treated as different users? To me, users in containers shouldn't 'communicate' with users in host. Why is it the case? Thanks :)
@sdafasfF2 жыл бұрын
Real cool man! Although I completed the box within 3 minutes X3
@0xmkay2 жыл бұрын
Pls was the workshop session recorded cos I missed it
@christophermarshall8712 Жыл бұрын
This is why I never upgrade to a version of PHP when it first comes out. I always stay one or two behind if I can to make sure if any severe vulnerabilities like this come out they are fixed before they can affect me.
@frosecold2 жыл бұрын
Hey John, I've been using rustscan lately and i really like it, is. Slot faster and can be complemented with nmap for full scans but is much faster. I wonder why you don't use it?
@djones01052 жыл бұрын
thanks, John!
@branisgreat2 жыл бұрын
The hair in front of his face the entire time man lmao
@aquaforgegames62072 жыл бұрын
I've always wanted to get into whitehat hacking and this is the best video I've seen so far about it. You're amazing
@badbgp2 жыл бұрын
Zerodium ~ Zero Diem ~ Zero Day
@vipanchika50595 ай бұрын
Thank you sir you would have been intresting to me to become a good business man
@CageTheTurtle2 жыл бұрын
what up KEVIN!!
@georgehammond8672 жыл бұрын
what is proc in Linux directories? and why does its size be 140 TB ,, which system uses that huge amount of memory in the tera bytes?
@caiovinicius84482 жыл бұрын
Very interesting.
@0xm3m2 жыл бұрын
Can you make a video on Creating vulnerable machines for hacking platforms in depth, and that can be in series?
@michaelwerkov34382 жыл бұрын
What is verbosity in this context?
@learnfirst-12 жыл бұрын
Apache tomcat 8.5.58 vuln ??
@kekeke78152 жыл бұрын
Hey, I just wanted to check briesofty if there is a way for to import a new soft into the program, for example softs or sotNice tutorialng that
@ALD7MI20112 жыл бұрын
I learned alot thanks
@Terszel2 жыл бұрын
Think I remember when this backdoor went up, wasn't it a big thing?
@elisansabimana62002 жыл бұрын
Thanks for the video.
@nelaina2 жыл бұрын
Thank you John. Do you think the snyk ctf webinar is good for an absolute beginner? No ctf experience (aside from your channel), and just starting to learn python, cybersec, etc...thanks.
@cartoonchannel55842 жыл бұрын
You are best ;) Thank You !!!!!!!!!!!!!!!!
@themasterofdisastr12262 жыл бұрын
Last year, this exploit was featured in HackTheBox when it was quite new. You had to understand a chinese Blog post to get the shell back then
@ihsankurniawan35912 жыл бұрын
how do you know what to search? what if i cannot tell if PHP 8.1.0-dev is the keyword?
@judylyons1772 жыл бұрын
Sorry, not on this subject. Any advice of how to get rid of Instant Memo? It is messing my tablet up. Tried numerous ways to uninstall, can't. Force stop, clear cache doesn't even slow it down. I can't find any info on it.
@MrsCyImsofly2 жыл бұрын
Thank you John
@onen0zednine7532 жыл бұрын
so who caught the 'Kevin/ Office' refence at the beginning?
@Alisson-Faoli2 жыл бұрын
yeah!!! "Why use more words when less do trick?" 🤣🤣🤣🤣🤣🤣
@onen0zednine7532 жыл бұрын
@@Alisson-Faoli
@soniablanche56722 жыл бұрын
I don't get it, why would you intentionally add a backdoor to php.
@Freeak62 жыл бұрын
It was made by an attacker who compromised git php's servers. So the attacker will have a backdoor on all servers that run this version of php (so possibly millions of servers if the attack had not been detected).
@mathesonstep2 жыл бұрын
Can you do a video on setting up a VM for doing these challenges, I have wanted to do these challenges for a while but want to ensure I am being as safe as possible as I have heard you are all connecting to the same VPN network I want to ensure my vm is as isolated as possible, I was thinking putting my vm behind a virtualized pfSense and blocking access to my network from that pfSense firewall. Am I overthinking this or should I really dedicate one vm and virtual network setup to just CTF challenges?
@eandudley84152 жыл бұрын
Just throw up a kali machine on VMware.
@dopy84182 жыл бұрын
What's with the marvin villain thumbnail ?
@sdafasfF2 жыл бұрын
Every happened to the Ubuntu install?
@WanderlustVisual52 жыл бұрын
Good stuff
@aqsajimmy28032 жыл бұрын
did u already create an exploite sir ?
@brian.-_393i3.-_2 жыл бұрын
Thanks!
@khaleedmayas Жыл бұрын
anyone tried to get rev shell on the machine or could ?
2 жыл бұрын
What I'm really struck by is that it was _planted_, by a security firm that sells exploits no less... wow
@animesubber71362 жыл бұрын
Whats with the thumbnail lol John Hammond Breaking bad XD
@gauthamgamer12142 жыл бұрын
nice one
@wcrb152 жыл бұрын
Whoa that seems really bad. Gonna have to go do some more research on that user agentt situation
@guilherme50942 жыл бұрын
Thanks.
@12346798Mann2 жыл бұрын
The webpage looks like an appseed template
@FidelEmilioSusanaJimenez2 жыл бұрын
👽😍😍😍
@plooshdev2 жыл бұрын
nice
@Rantofthings.4 ай бұрын
I’m guessing I need to know PHP.
@kevinwong_20162 жыл бұрын
Look for mobile malware please
@fdgmedd2 жыл бұрын
Gj :)
@diegocracker2 жыл бұрын
Show thanks obrigado
@juneilquilana51592 жыл бұрын
❤️❤️❤️👏👏👍
@jaume7482 жыл бұрын
Why I got rickrolled ?¿? I only wanted to do the workshop
@LiEnby2 жыл бұрын
LOL'd at this ahaha if you dont provide the "zerodium" at the start of the string it just says "REMOVETHIS: Sold to zerodium in 2017"
@abhishek245062 жыл бұрын
Php is still important??
@sipintarpatrick2 жыл бұрын
why not
@HTWwpzIuqaObMt2 жыл бұрын
Trying to be funny?
@JustinMylo2 жыл бұрын
@@HTWwpzIuqaObMt it is funny
@henrym50342 жыл бұрын
Wordpress.
@_Omni2 жыл бұрын
Yes it is
@chris7010_18 ай бұрын
Astra Linux users can take the hack me challenge.
@azatecas2 жыл бұрын
to all php devs, jump ship while you still can
@SB-qm5wg2 жыл бұрын
php had a backdoor built in. WTF!?
@Freeak62 жыл бұрын
It was a dev version, and from what they showed, it has been caught before going into production.
@InsaneRecords9972 жыл бұрын
Watching on sep 27 lol
@pathfinder7502 жыл бұрын
Agent-T
@rebelsdeveloper3672 жыл бұрын
hmm..
@omari4m2 жыл бұрын
as a php programmer , feeling so sad
@masdadmin2 жыл бұрын
Please laugh a bit so I can see if you sound like Seth Rogen.
@unknown_32932 жыл бұрын
mp4 mp3 files backdoor
@thispacifist90042 жыл бұрын
John your having a laugh arent you with this? I like watching your videos because you are informative. You said at the beginning this was an easy challenge, yet you copy and pasted someone else's code.
@hanomedia2 жыл бұрын
*I feel pity for Php Evangelists*
@MrGeekGamer2 жыл бұрын
I dropped PHP 19 years ago, because I was awful then and it's still awful now. Stop using PHP.
@tutorialsacc73142 жыл бұрын
no its not
@MrGeekGamer2 жыл бұрын
@@tutorialsacc7314 I won't argue with you, because you're clearly an idiot if you're simping for PHP in 2022.
@cirklare2 жыл бұрын
I told you PHP is very vulnerable language Also php 5.3 has RCE exploit Another php vulnerability PHP CGI argument injection
@toifel2 жыл бұрын
PHP 5.3 is older than KZbin and this backdoor is using a "-dev" build which no sane person would ever use in production. I'm not even using PHP, but you obviously don't have any clue what you're even talking about.
@whetfaartz66852 жыл бұрын
@@toifel lol you didn't have to do him like that
@tagKnife2 жыл бұрын
still using nmap rather then zmap. 2000 called they want their shell script kiddies back.
@alezad571212 жыл бұрын
this is good, enjoyment.exe 😊
@Jax_Malren2 жыл бұрын
Ah man tryhackme is so fun. Thanks you for developing some fun challenges for us.