Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE

  Рет қаралды 17,702

John Hammond

John Hammond

Күн бұрын

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnh...
GitHub: github.com/Joh...
Site: www.johnhammond...
Twitter: / _johnhammond

Пікірлер: 29
@nitinmaurya6835
@nitinmaurya6835 3 жыл бұрын
That base64 thing was so good :D. Thanks for making such great videos.
@ilyboc
@ilyboc 3 жыл бұрын
But actual port knocking using knockd or something wouldn't tell you if the port is open or not plus the port sequence can be generated too
@realNAKAMI
@realNAKAMI 6 жыл бұрын
why is python 2 usage still so common...
@bugr33d0_hunter8
@bugr33d0_hunter8 6 жыл бұрын
nakami @ because of all the functions still supported like the. Socket functions for example. For some reason in python 3 they went and changed everything around. You could always port the libraries into python 3, but I bet it would be a pain to figure out.
@lordtony8276
@lordtony8276 4 жыл бұрын
because print doesn't required parentheses.
@dayisnow
@dayisnow 4 жыл бұрын
@@lordtony8276 Lol your comment gave me a solid laugh. Nice joke haha.
@kallikantzaros
@kallikantzaros 4 жыл бұрын
you bastard
@bugr33d0_hunter8
@bugr33d0_hunter8 6 жыл бұрын
Dude that was awesome. I love the python editor, its so colorful, and the way you move so smoothly through it. I'm starting to read black hat python for pentesting. Do you think that will help me understand better how to write those kind of scripts? I'm obviously going to finish all the overthewire challenges. I wonder though if there are just strictly python challenges alone? And if so could you maybe name one or two beginner type challenges. Thanks. Again this was a great video.
@vamsikolati
@vamsikolati 4 жыл бұрын
this is some elite stuff
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Thanks so much for watching!
@AnkitDasOfficial
@AnkitDasOfficial 4 жыл бұрын
This was such a good one! Learnt a lot
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Happy to hear that! Thanks so much for watching!
@NeverGiveUpYo
@NeverGiveUpYo 4 жыл бұрын
Finally some video worth watching! Keep up the good work!
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Thank you! Will do!
@dxlsvy
@dxlsvy Жыл бұрын
Saved me here!! I made new adaptations and it's running as I want!! Thanks!!!
@TheL96
@TheL96 4 жыл бұрын
great! I will refer anybody that wants to learn python in 20 mins...lol
@mauldoto
@mauldoto 5 жыл бұрын
why scanning process so quickly on that ranges? :v
@TheBroadwood
@TheBroadwood 2 жыл бұрын
So cool
@tesloveley
@tesloveley 2 жыл бұрын
i want to see this kind of video on Windows
@mauriciomatias6261
@mauriciomatias6261 5 жыл бұрын
Which is the page?
@KaleshwarVhKaleshwarVh
@KaleshwarVhKaleshwarVh 3 жыл бұрын
This was good.
@Vagelis_Prokopiou
@Vagelis_Prokopiou 6 жыл бұрын
Exquisite stuff!
@jerrybailie
@jerrybailie 4 жыл бұрын
that base64 copy/paste was bananas !!!
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Ha! Thanks so much for watching!
@realgabreal
@realgabreal 6 жыл бұрын
awesome!
@JasonSmith-fu6oi
@JasonSmith-fu6oi 2 жыл бұрын
yeah good luck getting into a real server with knockd configured to the MAX with no other ports running on that box. you're NEVER going to guess the sequence plus it can be configured with two other settings that you overlooked because you want to demonstrate how you could break knockd: that is, a timeout of the sequence. good luck with that permutation loop. i can set my seq timeout to 1 second. if you dont knock within 1 second, you're done. that loop will take several minutes to complete only to disappoint you. and the second setting is basically TCPFlags that can be set. if you dont know this FLAG, you aint gettin a glimpse of my door!
@fsacer
@fsacer 6 жыл бұрын
it's quicker to just base64 -w 0 x
@dayisnow
@dayisnow 4 жыл бұрын
If they're both one-liners, then I don't see how this saves much time. Maybe 1-2 seconds? Cool hint regardless though, gonna try it out!
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
John Hammond
Рет қаралды 144 М.
Why I don't change SSH from port 22
13:31
Dreams of Code
Рет қаралды 23 М.
Ozoda - Lada ( Ko’k jiguli 2 )
06:07
Ozoda
Рет қаралды 15 МЛН
How To Get Married:   #short
00:22
Jin and Hattie
Рет қаралды 23 МЛН
Please Help This Poor Boy 🙏
00:40
Alan Chikin Chow
Рет қаралды 22 МЛН
Port knocking with MikroTik
11:36
MikroTik
Рет қаралды 17 М.
Being Competent With Coding Is More Fun
11:13
TheVimeagen
Рет қаралды 84 М.
How to Secure SSH with Port Knocking and Nftables on CentOS 8
15:43
theurbanpenguin
Рет қаралды 8 М.
Where Does Malware Go On Your Computer?
12:21
John Hammond
Рет қаралды 25 М.
Port Knocking Step by Step - Mikrotik RouterOS v6 & 7
14:13
Wilmer Almazan / The Network Trip
Рет қаралды 7 М.
How A Steam Bug Deleted Someone’s Entire PC
11:49
Kevin Fang
Рет қаралды 1 МЛН
Diffie-Hellman Key Exchange: How to Share a Secret
9:09
Spanning Tree
Рет қаралды 150 М.
Leaking a Flag with Bash - TAMUCTF 2020
16:55
John Hammond
Рет қаралды 15 М.
Injured Android Walkthrough || Android App Hacking || CTF -1
20:18
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
9:50
Ozoda - Lada ( Ko’k jiguli 2 )
06:07
Ozoda
Рет қаралды 15 МЛН