the thumbnail looks like its from a movie, great work John!
@deepergodeeper76183 жыл бұрын
when nerds attack coming this summer
@andymcnab3263 жыл бұрын
Hes not pulling a stupid face for once well done John
@jbgaud3 жыл бұрын
it's fun to see how this thing works after speding two days patching all my exchange servers. Thanks.
@karimmohamed37443 жыл бұрын
I wasn't feeling good at all today. This video revamped me and bumped me up. Thanks John for not being just educational. But, entertaining and fun to watch too. Sending love and hoping ur having a great day
@scottanderson28713 жыл бұрын
Been a software dev for a long time. Never seen this type of analysis done before... and watching this was absolutely fascinating.
@rtisd3 жыл бұрын
Finishing up my final year in cybersecurity in college and videos like these make me so much more intrigued about this field, and that much more excited and motivated to learn more. Thank you for all the hard work you put into these!
@nosignal57353 жыл бұрын
What's the name of your college? If u don't mind telling me
@zikkthegreat3 жыл бұрын
whole, gigantic powershell script, as a big ol’ format string? that’s neat
@Mbro-dq2do Жыл бұрын
How John doesn't have millions of followers is beside me. Thank you for all this info John. Being 45 I missed the boat in the early 2000's but a year in Im hooked. Thanks to YOU David Bombal and Network Chuck you guys have helped this construction old guy immensely
@rileymccoy81543 жыл бұрын
This high of production quality and you were able to put this out the same day you were prodding around. I appreciate the work you're doing, its extremely informative so thank you.
@ruxxuc20913 жыл бұрын
I want to thank you John because you took me to another stage in the cyber world
@Xilhion3 жыл бұрын
Thanks for bringing awareness to such hacks. Right after the video, i checked the last few customers that still has on-premises exchange, and 75% of them were affected. We could mitigate the risk and apply fixes before anything worse happened. Thanks for this John Hammond.
@insoYT3 жыл бұрын
This is interesting stuff. We've had so many interesting (& super dangerous) exploits and vulnerabilities in last few years. At 22:30 , it's a trick to add timestamps into URL. That's probably easiest way to make sure responses are not cached at any point. Of course it could be just lazy coding and used for monitoring purposes. But little bit later John downloaded the payload (or w/e it turned out be) without the timestamp in URL. I'd always recommend to download payloads with exact same syntax. It's way too easy for malware developer to try to mislead here. If they had some nasty next stage, they could make it look like just like a boring and usual looking malware. And misleading the analysis is absolutely part of the game.
@Aerogamer1583 жыл бұрын
You’re a good guy. Don’t let the others bring you down just because you’re compiling open source information and sharing it in a logical and comprehensive manner. Though I consider myself a home brewed IT craptastistic person, I appreciate the information given every time you put up a video.
@Cyberducky3 жыл бұрын
I don't know how you do it but whenever I watch one of your videos about malware analysis the time simply passes so quickly. Very entertaining thank you!
@netanel1353 жыл бұрын
I never commented on youtube videos before, but, I really want to thank you John Hammond for all the good work you're doing. You are F awesome and please keep it up. BTW, you are my favorite cyber-related KZbinr!
@St3amPunk3 жыл бұрын
I'm absolutely Stoked for the NahamCon CTF!!!!
@Zed00863 жыл бұрын
Best instructor I have come across. New subscriber here! Thank you good sir!
@rainworldenthusiast3 жыл бұрын
This is such an excellent primer for this sort of work, and you make it so entertaining! Looking forward to binging all your videos over the next couple of days :)
@potatoonastick22393 жыл бұрын
I thoroughly enjoyed the premiere + live chat replay feature here, as well as the content itself obviously. Keep up the good work my dude, im already recommending your channel to my friends!!!
@Ylmorko3 жыл бұрын
I'm watching this as I going through our exchange server logs looking for backdoors :D a nice coincidance
@Cavemannnnnn3 жыл бұрын
goodluck lol
@jiu3 жыл бұрын
Same… already patched some servers
@Lexxrt3 жыл бұрын
Title Contains: Post Exploitation Me: Oh Yeah, This is gonna be good
@TheH2OWeb3 жыл бұрын
Thank you John !! Once again, I had fun and learned as much as I could (only some but that's in the right direction). You're awesome !
@RonKirschler3 жыл бұрын
At around 20:54 the $dt is used to ensure cdn caching is bypassed. So the code on the cdn is static, but as soon as it is changed, the client is supposed to request a new copy.
@DCLEE-co3dj3 жыл бұрын
Hopefully no one tries to salem witch trial you for mis speaking because you are human after all.. I'm happy you are sharing public info for education. If someone gets upset about it then they must have ill intentions with that information. Keep up the great work!
@fumfsmdb3 жыл бұрын
Your videos are great! I'm glad I found your channel. You have great information in a lot of topics I cover at work.
@lethil2 жыл бұрын
As someone who knows next to nothing on malware analysis I had a funny feeling mimikatz would turn up haha. I have learnt so much from these exploration videos only knowing intro level programing and just learning cyber security, it was awesome to see the obsfucation techniques and layers built into this and connected so many dots for me. Awesome video.
@fastmover453 жыл бұрын
can you do a longer deep dive into this sort of stuff in the future this is just magic and easy to digest
@TheAnurag693 жыл бұрын
Addicted to this content. How can I watch this whole video without any break? Inner me : You found new love !
@MrBlackFiction3 жыл бұрын
Nice, You helped me a lot to understand the Threat!
@potatoonastick22393 жыл бұрын
Also the powershell explosion + guy fawkes mask was hilarious :D
@xaviercho70633 жыл бұрын
i love all these type of videos, can't wait for more such that solarwinds or more of this helps!
@angelsepulveda92113 жыл бұрын
Thanks John. As a newbie, this was great. Love how you broke it up and explain this so much!!!!
@SentientMuffin3 жыл бұрын
Got mind blown by that huge Powershell script made only for building an fstring piece by piece. Insane stuff!
@revenevan116 ай бұрын
Man, around 45:00 min in you weren't even exaggerating about that being an epiphany 😂 What a cool obfuscation technique!
@jonharper59192 жыл бұрын
Creating shellcode in a piece of malware that base64 encodes to McBAD is next level. Bravo to that 👏 👏
@n-i-n-o3 жыл бұрын
Great reversing. Subscribed
@uniquechannelnames3 жыл бұрын
Hey I signed up for a CTF randomly on CTFtime, and was pleasantly surprised to see it was one you created! Lol, I'm looking forward to it!
@Horstlicious3 жыл бұрын
So how did it go?
@AustralianCyberOps3 жыл бұрын
Excellent work John, love your work mate!
@SwissPGO3 жыл бұрын
Great video & I'm installing my fax machine again ;-)
@fractalmultiverse3 жыл бұрын
Great content John. Education and humour smashed. Big thumbs up for this one. Thanx
@tanveeraalam32713 жыл бұрын
Thank you for your efforts and time, I really appreciate it.
@atsekbatman3 жыл бұрын
It's been a pleasure, John!
@bbowling6193 жыл бұрын
Im never going to move up from my current position because....my current job has nothing to do with this subject. I am literally addicted to this madness that John keeps on about. I literally cannot quit doing it. Lol .. and so i will integrate this with my ongoing studies (beer drinking) as well as continue to try to keep up.
@rxhango3 жыл бұрын
Great Analysis
@TheRogueBro3 жыл бұрын
Seems like an easy way to get around this set of scripts in particular would be to have your environment variable something non-standard.
@Puma21133 жыл бұрын
"I know this is really painful on 'human being' eyeballs" John just confirmed he is a robot.
@VajrangParvate3 жыл бұрын
Quick one: The long dot separated number strings at 1:04:50 such as "1.3.6.1.5.5.7.3.2" or "1.3.6.1.4.1.311.20.2.2" are SNMP MIB OIDs (en.wikipedia.org/wiki/Object_identifier).
@fhacim65683 жыл бұрын
Wonderful as always, great video!
@acevlt3 жыл бұрын
Great Video!!! Can't wait for more.
@SageTheProfessor3 жыл бұрын
Thank you John. As always you are very helpful and I appreciate you going through the reverse engineering process. See you on the next one! --Sage
@PerfectKlaus3 жыл бұрын
Amazing work, thank you for sharing
@brianstarr3 жыл бұрын
T`han`ks for making the video! Good stuff down the rabbit hole. UGH, Empire is scary.
@mikejones40123 жыл бұрын
Thank u! This has been a fun one. Unfortunately not out of the water yet. 🥶
@nikolas87413 жыл бұрын
This is professional evilness thanks for showing us this John this is very interesting to me! Big like
@owns33 жыл бұрын
interesting. Thanks for sharing!
@TexasTimelapse3 жыл бұрын
Thanks for doing this. Very interesting.
@facelesshacker15283 жыл бұрын
Thanks John, learnt a lot.
@Ayush-vy2kq3 жыл бұрын
You're doing a great job Hammond
@logiciananimal3 жыл бұрын
The natural etc. strings are the join types in SQL, presumably part of SQLite
@gp67233 жыл бұрын
great content, as usual !
@savoyblue7773 жыл бұрын
Thank you John Very intresting
@icantfindaproperusername3 жыл бұрын
Most GREAT channel between others
@logiciananimal3 жыл бұрын
Us application security folks know about "format string vulnerabilities" from our C application experience, but this one is interestingly different and yet also suggests that name. :)
@Red4mber3 жыл бұрын
OMG, that puzzle script is so cool
@jamalkhan8153 жыл бұрын
Great work man!!!
@anders66713 жыл бұрын
Great video, thanks for sharing this!
@1wk4073 жыл бұрын
these videos are so fun!
@K2_Chris3 жыл бұрын
Thanks for the good laugh when you copy and paste that big file! :) I would have done the same thing haha
@akazaka35783 жыл бұрын
This was awesome man thanks!
@palva013 жыл бұрын
Thank you, learned alot
@user-lk5qz4wx4q3 жыл бұрын
John always has to ctrl v or ctrl f something big and THEN realizes that he's made a mistake...LOL
@israeltakaw1123 жыл бұрын
John, you make it very entertaining even though it makes my brain ache!
@tetetsky3 жыл бұрын
Thank you, this is very helpful!
@nonoyourbizness84373 жыл бұрын
this is what my org got hit by- i really appreciate the analysis!
@brianbitange66503 жыл бұрын
Now I just like your content before watching! Its that good!!
@custume3 жыл бұрын
video looks great
@janisberzins59193 жыл бұрын
That is some next level PS scripting! Thanks for the video, John. I really enjoyed it.
@GilligansTravels3 жыл бұрын
Man that was fun and I love the recon of it
@rahuldogra92713 жыл бұрын
Crazy Thumbnail John!!
@minhquang31263 жыл бұрын
Cool thumbnail, cool video, cool person, could not asked for more :D
@TinkerTech2 жыл бұрын
Techcraft? That sounds so ominous 😮 When somebody asks me if I have any hobbies, I just say that I like T.I.T.S. in my spare time. Which OF COURSE stands for tinkering in tech services.
@jasoncollum75063 жыл бұрын
Not sure if it was mentioned...but the hig versus low would have shown up in the web logs and help identify instances with higher permissions (Administrator) versus lower permissions (non-Administrator).
@beyerchr3 жыл бұрын
Thanks!
@BugsMoney0073 жыл бұрын
This 1Hr of video teaches more than what I have learnt in past 25 years of my life. Truly appreciate the knowledge you shared and for free.
@sanathkumar10063 жыл бұрын
Thumbnail looks 🔥
@internetdoggo48393 жыл бұрын
I like what ya’ did with the thumbnail
@RIGeek.3 жыл бұрын
Given all the references to IEX, I guess something that can be done that could make you immune to a few of these would be to use a non-standard windows install folder.
@daneilyan64193 жыл бұрын
The image in the photo makes John look like some secret agent
@JohnRickey-b5w Жыл бұрын
Hello dear friend, I wish you success and health ❤
@Sebastian-db6ur3 жыл бұрын
great, had fun
@Ladaria_VoD3 жыл бұрын
That actually killed the video encoder.
@lokeshgs78663 жыл бұрын
ThankYou Jon for this detailed Video. Do you also help us with some video to fix the issue?
@ДмитроМінтенко-м7и3 жыл бұрын
Hi, cool thumbnail!
@JTwisted3 жыл бұрын
Bro, just want you to know, you are awesome!
@PythonisLove2 жыл бұрын
your videos are great
@CoenraadLamprecht_coenster7113 жыл бұрын
Welldone
@Yarisken123 жыл бұрын
More than 10.000 lines of powershell ... created when they notified the exchange exploit ... this is done by a huge team of professionals.
@fastmover453 жыл бұрын
as a computer profesional i love these videos please keep doing the good work you are do.
@gabrote422 жыл бұрын
46:23 This is impressive. That has to be some of the most bullshit obfuscation techniques I have ever seen. And you got it. Bless you
@samuelbarber50972 жыл бұрын
54:30 THE HOLY ONE STRINGS ALL HALE THE STRING GOD
@bbowling49793 жыл бұрын
So what I'm getting from this is to have an obfuscated IEX at the end as a false "wire" to cut, then embed the real IEX in the middle. Got it.