catch EVERY reverse shell while hacking! (VILLAIN)

  Рет қаралды 223,939

John Hammond

John Hammond

Күн бұрын

Пікірлер: 246
@_JohnHammond
@_JohnHammond 2 жыл бұрын
DID YOU KNOW that (obviously intentionally) placing a TYPO within the first THREE seconds of your video helps increase audience engagement and boosts your videos in the algorithm?????/// Please do take a look at all of the sweet stuff that HTB Academy's Certified Penetration Testing Specialist has to offer!! j-h.io/htb-cpts
@builder481
@builder481 2 жыл бұрын
Hey John are you going to do Advent of Cyber for 2022?
@gg-gg-gg-gg
@gg-gg-gg-gg 2 жыл бұрын
John you should consider uploading your videos to Nebula, you'd make a good addition
@gamingravan1713
@gamingravan1713 2 жыл бұрын
how to remove that windows backdoor from your system
@builder481
@builder481 2 жыл бұрын
@@gamingravan1713 do you have a virus?
@gamingravan1713
@gamingravan1713 2 жыл бұрын
@@builder481 nope just trying to know what would be the solution for if I want it to remove from one of my windows vms
@HaxorTechTones
@HaxorTechTones 2 жыл бұрын
The inspiration and "try harder" attitude to create Villain came from the video you made about hoaxshell. For that reason, as well as your remarkable effort to educate people in IT/Cybersec for a decade now, I dedicate Villain to you. Thank you🙏
@janmbaez
@janmbaez 2 жыл бұрын
Really thank you marchus for creating this awesome tool, keep up the great work!
@brianb5723
@brianb5723 2 жыл бұрын
Thank you, you're a legend!
@hlbgghj
@hlbgghj 2 жыл бұрын
i love you sir but one question how did you learn writing your own script can you start a series on this i have asked this to john hammond sir but he didn't respond to that at all so i want you to do it sir it will be really great for the people like me.
@__lasevix_
@__lasevix_ 2 жыл бұрын
@@hlbgghj Try searching for python beginner tutorials
@dedsec5271
@dedsec5271 2 жыл бұрын
I know a legend when I see one 🫡
@Zerback
@Zerback 2 жыл бұрын
Thank you T3l3Machus and John for the amazing tool and usual 10 out of 10 quality education !
@konfushon
@konfushon 2 жыл бұрын
the small differences in this video like the sound track used and the "waves shennanigans on John's head" at the bottom right corner is kinda slick though 👌
@Boolap1337
@Boolap1337 2 жыл бұрын
I love his tools but I love even more your explanations and tutorials. You guys complement each other.
@A_reir_carajo
@A_reir_carajo Жыл бұрын
Regards from Dominican Republic 🇩🇴. I think your channel is pretty cool and I've learned a lot since I found this Channel, I was stuck with the Reverse Shell thing, but thanks to you I got out of that corner, brother. THANK YOU!.
@X_mar0ne_X
@X_mar0ne_X 4 ай бұрын
You deserve every penny for this ad! best explain and show and currently on my cpts path!
@hawk__
@hawk__ 2 жыл бұрын
A dude said in a previous vid of your "John doesn't need fancy thumbnails, has face does it all" and yeah it really does, man! Keep putting nice content 🙂, coool tool. That OTP thing is the coolest one. You haven't done any writeups lately though ;) + Video is nice enough, editing, music. If possible plz share pc specs the one which is running 1 host + 4 vms without any lag.
@karkantas
@karkantas 2 жыл бұрын
Your content is improving like a super sayian after each video.
@_JohnHammond
@_JohnHammond 2 жыл бұрын
SUPER duper thankful for our new editor and the phenomenal work they are doing -- all credit to @Nordgaren!!
@tanja84dk1
@tanja84dk1 2 жыл бұрын
Thank you very much for showcasing that. Tbh I have actually really been looking for a framework like that to when ever I play ctf's ( specially if I ever are going to attend where its teams agenst teams ) so its great to have it in my tools folder
@StrokeMahEgo
@StrokeMahEgo Жыл бұрын
Definitely love the multiplayer aspect, much like cobalt strike's team server concept. Very useful for actual red team engagements where there's multiple operators.
@samfisher8426
@samfisher8426 2 жыл бұрын
i been using this for a week so far .. i have tested it on many OS versions ,windows 7 - 10 -11 / linux ,always bypass any fiirewall/defender never let me down ,the good thing that i can get multiple reverse shell just in one click ,without having to setup a new listener for each reverse shell payload ... thats really amazing tool
@johnb3170
@johnb3170 2 жыл бұрын
John from another John...you are a legend. Coming from and education and training background to cyber warfare now a security researcher. You encompass everything good in our industry. Keep it up! See you around!
@gezzadaverealstuffonlyboth8915
@gezzadaverealstuffonlyboth8915 10 ай бұрын
Hey , I'm learning cyber warfare at the moment, but need some good software as I was helping a young mum getting bullied and was raped , so said I'll sort it out and protect your network till hes moves on , well he payed few different hackers , and they was good , 3 atack me from different countries, not sure if they new each other, but it took 3 days 2 hours sleep they burt out 4 laptop 3 pc towers , my 9 year old boys plug the earth burnt where it burst the plug like it was cheap plastic, I'm still with nothing but my phone, they got everything cloud haswell, so I lost everything's, and was going to give up, but seeing your comment, the only one in 7 years , so hi there and sorry for asking but my eyes lit up 🤝
@JeffNoel
@JeffNoel 2 жыл бұрын
Realizing your video is sponsored by HTB Academy is pretty cool! CPTS is probably my next thing to work on if I pass OSCP on December 12th :D
@_ismail8880
@_ismail8880 Жыл бұрын
did you pass?
@JeffNoel
@JeffNoel Жыл бұрын
@@_ismail8880 I did! I missed one flag but for the bonus points so 100/110 points. The course material is on point and is perfect to prepare your for the exam content.
@struggle375
@struggle375 2 жыл бұрын
Damn John the production quality is on point!
@TheRojaki
@TheRojaki 2 жыл бұрын
Just saw a talk about hoaxshell on which a penetrationtester was hyping it up so much only to not work anymore after two days because everyone burned the signature haha. So interesting to see the new shell framework. Lets see for how long its working on engagements :D
@Alexis82
@Alexis82 2 жыл бұрын
Powershell script blocked of internal antivirus!
@trustedsecurity6039
@trustedsecurity6039 2 жыл бұрын
@@Alexis82 lmao stop using buzz word like you know what it means
@trustedsecurity6039
@trustedsecurity6039 2 жыл бұрын
It was by the author... every open source tool will be burned like that
@Alexis82
@Alexis82 2 жыл бұрын
@@trustedsecurity6039 I know exactly what I'm saying, don't worry about me!
@trustedsecurity6039
@trustedsecurity6039 2 жыл бұрын
@@Alexis82 nope you dont...
@janekmachnicki2593
@janekmachnicki2593 Жыл бұрын
Great tutorial John H. Thanks for your effort to help less advanced hackers or IT lovers understand some of the tricks .
@adesopekingsley9967
@adesopekingsley9967 2 жыл бұрын
The most amazing thing to me is thar the whole script was written with python.... amazing 👏🙀 great to see this ... I subscribed
@vnm2514
@vnm2514 2 жыл бұрын
As always love to watch your videos and see how excited you are about new tools. Keep the great work up.
@gamblezz101
@gamblezz101 Жыл бұрын
This is genius! Kudos to the dev.
@torsec6048
@torsec6048 2 жыл бұрын
And now john detailed video arrived :) go go john Hammond
@gabi-sw8zw
@gabi-sw8zw 2 жыл бұрын
love your content the hacking b-role had me laughing this episode lol
@Neuer_Alias_erstellen
@Neuer_Alias_erstellen 2 жыл бұрын
something is slick: JohnH: that's cool
@عالمالبرمجةالعربي
@عالمالبرمجةالعربي 2 жыл бұрын
I like you very much Mr.John Hammond. You are always teach us new things. Thanks
@nixcutus
@nixcutus 2 жыл бұрын
Used this tool last month and it was super dope.
@_AN203
@_AN203 2 жыл бұрын
Hey John.. I am back ! And that voice interactive background that you have on your thumb during the video... Does sell the HTB theme.. And hey.. Another C2 framework to the arsenal... Pretty cool..
@fdert
@fdert 2 жыл бұрын
I like the new editing!
@hongkonghacker
@hongkonghacker 2 жыл бұрын
Windows defender already blocked those payload after few days later.
@faran_siddiqui-d3t
@faran_siddiqui-d3t 2 жыл бұрын
Loved the video quality, especially your cam circle effects when you speak!
@tayyab.sheikh
@tayyab.sheikh Ай бұрын
The reverse shell thing doesn't works on Windows 10 when firewall is on. It says "This script contains malicious content and has been blocked by your antivirus software"
@theequalizer7297
@theequalizer7297 10 ай бұрын
Thank you very much 🙏My S14 Flip laptop. I was working and left it for a few minutes. When I came back, I was surprised to be asked for a new PIN code and that the old one was disabled and could not be accessed (explorer.exe - System Error). The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application) I felt frustrated and spent 9 hours trying to solve the problem, but the problem was not solved, and I do not know what is the reason for this problem. By the way, it is a completely new laptop that has been in service for only 4 months, an Asus S14Flip Ryzen 5600 laptop, a Radeon card, and RAM. 8 JB and its performance was very slow when browsing websites, but I noticed that sometimes its temperature increased.
@yacce4463
@yacce4463 2 жыл бұрын
This is cool, but relying on "curl" all the time? Would be awesome to have different revshell payloads relying on different programs. I've hit several machines where "curl" or "wget" wasn't available, mostly if running on a container environment. Awesome work t3l3machus and John!
@trevor.viljoen
@trevor.viljoen 2 жыл бұрын
This has a very Metasploit look and feel to it.
@bawalicoder1233
@bawalicoder1233 2 жыл бұрын
totally loved the video😍 btw great editing
@Bobtb
@Bobtb 2 жыл бұрын
Thanks for introducing this awesome tool John.
@ChristopherEGr33n33
@ChristopherEGr33n33 Жыл бұрын
0:02 the old reverse shell "hanlder" 🤣
@toolbgtools
@toolbgtools 2 жыл бұрын
cool tool! and lot of room for improvements
@drvoip
@drvoip Жыл бұрын
Generating connectivity between two endpoints on a private network seems to be the dominant theme on KZbin. Educational and informative, but how about showing how any of the tools work over the Internet, with firewalls and the usual network basic security practices in place?
@grayshell8928
@grayshell8928 2 жыл бұрын
as always, great video John. Good tool for testing
@waqxddgytdcvjj8678
@waqxddgytdcvjj8678 2 жыл бұрын
I’m as hyped as you John!
@HerozTech
@HerozTech 2 жыл бұрын
I love the new editing style❣
@SumanRoy.official
@SumanRoy.official 2 жыл бұрын
Great tool but they need to generate unique obfuscated payloads that bypass every AV and Security endpoints like Crowdstrike and others.
@MartinGaertner
@MartinGaertner Жыл бұрын
Great howto! you a very good teatcher! perfect video, make more for this i love it!
@DarkspaceSoftwareandScurity
@DarkspaceSoftwareandScurity Жыл бұрын
nice intro to HTB
@shenetworks
@shenetworks 2 жыл бұрын
very cool!
@benary5620
@benary5620 Жыл бұрын
That looks really interesting. Question: let's say I generate a linux payload and put it on my (remote) laptop; will it automatically connect if I start my local Villain _after_ that remote machine has run its crontab? Or would it be sufficient to run it every 5 (or so) minutes on the remote machine, so once I start my local Villain, it will take 4:59 secs max to connect (in that case, will the remote machine's crontab kill any active sessions once the payload runs again??)?
@juliusrowe9374
@juliusrowe9374 2 жыл бұрын
Super dope content John!
@CypherX-Sec
@CypherX-Sec Жыл бұрын
Hey John please help me there is an eror while executing this it shows modulenotfound crypto please 🙏 reply
@ThatNateGuy
@ThatNateGuy 2 жыл бұрын
Villain's output reminds me a lot of PowerShell. I dig. Thanks for showing this tool off, John! 🙂
@trustedsecurity6039
@trustedsecurity6039 2 жыл бұрын
Lmao it is powershell output for Windows...
@ThatNateGuy
@ThatNateGuy 2 жыл бұрын
@@trustedsecurity6039 I did not know that!
@AnacardiumOcidentale
@AnacardiumOcidentale Жыл бұрын
Very nice piece of tool. Does it runs on a Raspberry pi? Gonna try to install it on mine...
@jorisschepers85
@jorisschepers85 2 жыл бұрын
Great video again John, but please ditch the soundbars around the webcam feed.
@_JohnHammond
@_JohnHammond 2 жыл бұрын
Appreciate the feedback, thank you! We're experimenting with some of those new flashy video effects and thought we would test the water with the audio visualizer around the face cam. I had a thought it might be too distracting from the content, but wanted to try it in the wild. We will think on it and see if we can scheme up some other nice quality-of-life touches!
@jorisschepers85
@jorisschepers85 2 жыл бұрын
@@_JohnHammond you don't need all those flashy things. Content is A+. Keep doing you
@CyberDevilSec
@CyberDevilSec 2 жыл бұрын
Aswome stuff Jhon I really respect you!
@a_h_m_e_d_43112
@a_h_m_e_d_43112 2 жыл бұрын
This is what i was waiting for
@CiscoJedi
@CiscoJedi Жыл бұрын
Sadly your videos alerted Microsoft to Defender's issue of missing this. Sooooooooo... now Defender catches this and Hoaxshell, even with obfuscation. Bummer.
@Insomnia_2311
@Insomnia_2311 2 жыл бұрын
Thanks John for the Education but I am afraid of that someone of this community would use this for bad things. I am not very sure how dangerous it would be using it on an enterprise network landscape by sending an inconspicuous attachment to an victim email-address ?
@Iampopg
@Iampopg 8 ай бұрын
Does it bypass windows defender?
@bbowling619
@bbowling619 2 жыл бұрын
a turtle in a turtle ? Dude is mentor !!!
@inquisition.musician
@inquisition.musician Жыл бұрын
Easiest way to get Villan reverse shell running is to abuse shortcuts in Windows. Helpful for scambaiting tech support scammers.
@AubreyCute-mo7ry
@AubreyCute-mo7ry 11 ай бұрын
Blocked by Windows Pretender!
@larva5606
@larva5606 10 ай бұрын
i took a shot every time he said "slick" 🥴
@gokul5582
@gokul5582 2 жыл бұрын
My question is anyone of my victim will dare to paste suspicious lines on their cmd? Is there any other way to deliver it? Practically will it work?
@marineplaysairsoft
@marineplaysairsoft 2 жыл бұрын
now THIS is verrrry niiiiiice
@brianb5723
@brianb5723 2 жыл бұрын
Another A+ incredible content and instruction step-through by John. I found the audio pulses around your camera preview a little distracting, though!
@_JohnHammond
@_JohnHammond 2 жыл бұрын
Good to note, thank you! We're experimenting with some of those new flashy video effects and thought we would test the water with the audio visualizer around the face cam. I had a thought it might be too distracting from the content, but wanted to try it in the wild. We will think on it and see if we can scheme up some other nice quality-of-life touches!
@HAGSLAB
@HAGSLAB 2 жыл бұрын
I agree. Not a huge issue, but it was the first thing I noticed and not really in a good way. I've always appreciated the simplicity of your content. Simple as in few elements on screen and straightforward editing.
@AgustinLozada
@AgustinLozada 2 жыл бұрын
The example you shown are all on same subnet, what if its a segmented network?
@jeonghutamilim2259
@jeonghutamilim2259 Жыл бұрын
If this works as intended, it could be great rat for headless servers or remotely assisting friends. Gotta play around.
@lucadistefano9259
@lucadistefano9259 2 жыл бұрын
This tool got so popular so now Microsoft Defender just catch it almost every time with a dedicated name "Xoaxshell". Defender ON!
@kal_dev
@kal_dev Жыл бұрын
I like this one, fastly and easier
@fireloks6362
@fireloks6362 Жыл бұрын
got it to work. I just needed to change permissions
@neppusstreams
@neppusstreams 2 жыл бұрын
Looks good! What happened to pwncat tho?
@nemliveproductions
@nemliveproductions 2 жыл бұрын
FBI has entered the chat.
@abepl
@abepl Жыл бұрын
aaahh "Hack The box" that's where i should go, thanks
@DavidCosta85
@DavidCosta85 2 жыл бұрын
thanks for your videos. very much appreciated
@CypherX-Sec
@CypherX-Sec Жыл бұрын
hey john please help me it's not working while executing it's shows error of crypto module not found
@Pwnedby
@Pwnedby 2 жыл бұрын
I’m building a software exactly like this. I have a few more feature than this but I might implement some techniques which was being used. Thank you for sharing this!
@ibrahimyosif
@ibrahimyosif 2 жыл бұрын
i love you john but please turn off sound wave thingy surrounding your frame.
@boh70326
@boh70326 Жыл бұрын
How many hours htb course consists of ? Not clear, just said 28modules Thanks
@sagiadir
@sagiadir 2 жыл бұрын
Thank you ! its alway great to watch your videos !!!!!
@novianindy887
@novianindy887 Жыл бұрын
can yo do meterpreter payload with it?
@faisalagarbaa1
@faisalagarbaa1 2 жыл бұрын
Hello Dr. how can I access your PhD thesis?
@BobbyBobBob69
@BobbyBobBob69 Жыл бұрын
Hey I don’t wanna sound stupid, but I can’t copy between my Kali vm and my Ubuntu vm? When I’ve got only one vm open the guest isolation can copy and paste but when there’s more then one I can’t?
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Window paword+linux paword equal password attending and different tightening in the password, same password in the continue.
@kashoo_1
@kashoo_1 Жыл бұрын
Thanks John ✌💥
@refaiabdeen5943
@refaiabdeen5943 2 жыл бұрын
Cheers Mate.
@cabbose2552
@cabbose2552 2 жыл бұрын
what software are you using for your webcam feed?
@nordgaren2358
@nordgaren2358 2 жыл бұрын
OBS
@elchinsir
@elchinsir Ай бұрын
when i do this "generate os=windows lhost=eth0 obfuscate" it says argument PAYLOAD not supplied and when I do "generate payload=windows/reverse_tcp/powershell_reverse_tcp lhost=eth0 " this it says "Payload template not found.". Any help?
@HaxorTechTones
@HaxorTechTones Ай бұрын
Hi, do "generate payload=windows/reverse_tcp/powershell". The syntax have changed a lot recently. You can also use tab autocomplete to list templates while navigating payload=*
@chakde59
@chakde59 Күн бұрын
is villan working rghtnow also?
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
How many maintenance the handling files open
@Arjun-eg1lz
@Arjun-eg1lz 2 жыл бұрын
Hi Mr.John i have tested the tool(Villain) the code is executed smoothly ,but unable to get shell and i have tested in multiple win10 machines using obfuscate,encode and constraint_mode . I'll waiting for response.
@Arjun-eg1lz
@Arjun-eg1lz 2 жыл бұрын
tnq Mr.john
@raghulmanikandan
@raghulmanikandan 2 жыл бұрын
what's wrong with Metasploit and Empire?
@Hackedme-ce8fe
@Hackedme-ce8fe Жыл бұрын
Just a question, can i do rce on servers using those generated payload?
@adamwitkowski3822
@adamwitkowski3822 2 жыл бұрын
Are OffSec allowed that kind of hadler in OSCP certification?
@SumanRoy.official
@SumanRoy.official 2 жыл бұрын
Offsec is not about multiplayer hacking exam, its single entity. You won't need this tool for the exam.
@praisong7475
@praisong7475 2 жыл бұрын
Most probably no, since it's automated and kinda similar to Metasploit. They want everything to be done manually for OSCP. Not sure though
@adamwitkowski3822
@adamwitkowski3822 2 жыл бұрын
@@SumanRoy.official Thank You!
@Leo_Aqua
@Leo_Aqua Жыл бұрын
Can you make a video on how to get a reverse shell from a webserver without php?
@alldev
@alldev 2 жыл бұрын
I like the video but i have a simple question will it be a persist session or not
@mav7284
@mav7284 2 жыл бұрын
My windows 10 blocked the script.. So I have to turn off the virus defender only can run the backdoor script..:(
@maxbunnies
@maxbunnies Жыл бұрын
Hi John can you tell me what Glasses you have :)
@zeloigl
@zeloigl Жыл бұрын
what did u do at the cut at 4:49 im struggling to figure it out ive tried everything can anyone help it says module 'Crypto' not found so i checked the crypto file and the c is lowercase but doesnt let me change it to uppercase as it says file location was moved????
@imurovtsev
@imurovtsev 2 жыл бұрын
ssh -R to your temp vps/vds not work more? What if the victim doesn't have a white IP address?
@ZTechSecurity
@ZTechSecurity 2 жыл бұрын
Hi John, Thanks for another nice video it was very helpful. I am having a problem with windows payload please help me out. Payload command used: generate os=windows lhost=eth0 obfuscate CMD output: 'StArT-PR'OCESs'' is not recognized as an internal or external command, operable program or batch file. Powershell output: This script contains malicious content and has been blocked by your antivirus software.
@madezra64
@madezra64 2 жыл бұрын
It's been basically a week since this tool reached the public eyes. The signature of it has long since been captured by Windows Defender and most major anti-malware solutions. Also, you can't run Powershell in Command Prompt. This tool isn't meant to be used in the wild. It's just a proof of concept and educational tool for people to see how reverse shells CAN work and potentially how they work. You need to learn the difference between command prompt and powershell.
@jdogdarkness
@jdogdarkness Жыл бұрын
I couldn't get program to run said a few things then "no module naked Crypto"
@waqxddgytdcvjj8678
@waqxddgytdcvjj8678 2 жыл бұрын
living in the movie where someone is in and others can participate
3 Things You Didn't Know about Windows Command Prompt
25:56
John Hammond
Рет қаралды 96 М.
How Hackers Compromise BIG Networks (with NetExec)
36:41
John Hammond
Рет қаралды 121 М.
Turn Off the Vacum And Sit Back and Laugh 🤣
00:34
SKITSFUL
Рет қаралды 8 МЛН
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 22 МЛН
Accompanying my daughter to practice dance is so annoying #funny #cute#comedy
00:17
Funny daughter's daily life
Рет қаралды 23 МЛН
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
17:44
John Hammond
Рет қаралды 166 М.
Reverse Shells - How Hackers Remote Control PCs
12:57
Hepta Security
Рет қаралды 2,5 М.
How Hackers Hide
20:55
John Hammond
Рет қаралды 240 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 282 М.
Is this the best OSINT tool out there?!
17:10
stuffy24
Рет қаралды 363 М.
The King Of Malware is Back
19:27
John Hammond
Рет қаралды 192 М.
60 Hacking Commands You NEED to Know
27:01
NetworkChuck
Рет қаралды 508 М.
Hacking Windows TrustedInstaller (GOD MODE)
31:07
John Hammond
Рет қаралды 749 М.
How to Hack Web Apps with Caido
31:01
John Hammond
Рет қаралды 62 М.