Hey John, I've been following you for a while now and watched almost every video of you because you really have a high quality content and I learned a lot from it. Way back 2019, I didn't really have the money to get a laptop and what I did was just watch your videos and I learned a lot even though I was just watching. Today, a hiring manager called me and told me that I am now officially hired and a part of an international bank's cybersecurity team. You played a big part of my success. You just don't know it. Thank you so much man. Don't stop leading us to the right path
@rawkstar9523 жыл бұрын
I put my Nahamcon certificate on my resume and it did help a lot.
@viv_24893 жыл бұрын
Where there is will there is a way..
@rawkstar9523 жыл бұрын
@@viv_2489 yes that indeed is true. I'm currently on work right now!
@inlusiox71823 жыл бұрын
Great video, John. Something to also note is that this challenge could be solved with the "oleobj" script from the oletools package (same package that olevba comes from). Running it on the PowerPoint will instantly spit out the malicious payload and then it's just a matter of doing the URL decoding and Base64 decoding as you showed. Thanks again for all the great content!
@iulianichim77773 жыл бұрын
That was so quick and masterful I didn`t even notice when it was over! Awesome!
@danielsan9019983 жыл бұрын
CMD: What is my job? Invoke powershell
@TheMadHaxor3 жыл бұрын
the more I learn, the more I get the impression that a Rick was involved somewhere down the line.
@jaymesc44363 жыл бұрын
Or wsl bash
@kemaleddinjohnson53913 жыл бұрын
NO DOUBTS ! one of the best youtube channel ever !
@crooked81683 жыл бұрын
I never got to chance to thank you, so thank you John Hammond for your time, your devotion, for teaching us ! You deserve respect !
@codygaudet80713 жыл бұрын
The man, the legend, The Hammond! You're the man bro! This inspired me.
@aryan26283 жыл бұрын
Great Video! I have gained so much knowledge by just watching your videos and then trying them myself.
@julianvega64053 жыл бұрын
Hi John, I'm new to your channel and I'm loving it so far. I work as a C# .Net Developer, but don't know much about networking and would really like to start learning more about cyber security and how to use my programming knowledge for it. Any advice on where to start? Maybe any book or website to get me started?
@MikeClark73 жыл бұрын
Thanks for these videos John. I have learned a ton from you that I can apply to my day job.
@SuperSohaizai3 жыл бұрын
"You can unzip PowerPoint file" The more you know~ For real though didn't know that haha
@TheodorFridolinvonHermeshausen3 жыл бұрын
Only the newer ones. If I'm not mistaken, the old ones should be binary formats.
@sikkavilla39963 жыл бұрын
@Simon Hansen you are correct. Docx is a ole zip file while anything earlier than 2007 (doc for example) is binary
@TheMadHaxor3 жыл бұрын
@@sikkavilla3996 just the container or everything? I'm 3/4 weeks into self study
@matyhovidea85373 жыл бұрын
@@TheMadHaxor The new office formats are just standard ZIP files with special structure. The content is XML based. Older Office files are based on OLE structured storage. So yeah, its just a container.
@FoX84tac0223 жыл бұрын
You taught me that Office suite files are binary blobs that could be extracted/unzipped. In return, I offer that usually the newer Office suite extensions either have x or m; m stands for macro-enabled. (i.e: pptx (powerpoint) / pptm (macro-enabled powerpoint); xlsx / xlsm)
@motbus32 жыл бұрын
Just commenting because I find it funny. Not criticism or anything :P 2023 requires disclaimers 1) worried about security, download subl extensions without checking if they are safe at least on high level 2) unregistered subl version. Totally agree with that after they started forcing users into undesired upgrades and charging full price again
@Zebby20133 жыл бұрын
Thanks fella. This was one that I managed to follow and understand quite easily for once.
@monKeman4953 жыл бұрын
appreciate ur knowledge..
@temyraverdana64213 жыл бұрын
You are magic. Thanks for teachings
@logiciananimal3 жыл бұрын
I notice the fake "download URL" doesn't seem to be well formed - there's only 1 / instead of 2 ...
@dedkeny3 жыл бұрын
I never knew about URL safe base 64 encoding... nice
@nikolas87413 жыл бұрын
😂 well now you know. Keep learning! people who keeps learning stays young, people who stops learning is old.
@Noone-rz4er3 жыл бұрын
Oh My phuking god , So much to learn!!
@orgozlan3233 жыл бұрын
Thank you
@durzua073 жыл бұрын
John, could you please do a video on the Obsidian note taking app? I usually write my CTF notes on paper but it would be so much better doing it on the computer.
@christophertharp77633 жыл бұрын
the newer office docs. are like zip archives. use didier stevens tool, zipdump
@sanathkumar10063 жыл бұрын
Thanks for that base64 tricks at the end
@MrTripppster3 жыл бұрын
good stuff, nice vid!
@mustafahussien44103 жыл бұрын
Well Done
@CyberAbyss0073 жыл бұрын
Thank you!
@ptkvibes023 жыл бұрын
Please tell which linux distro 2021 is best for ( Raspberry pi 4 model B 8 GB ram) for ethical hacking pentesting or cyber security
@F4YgOqFeaq5lrG8B9s13 жыл бұрын
wow amazing
@youssefennaciri79323 жыл бұрын
I can not seem to find a video of john hammond where her reverse engineer a malware, then he analyses the shell that the malware opens, and after that john hijacked that shell to hack back the C2 server, and he got a reverse shell with the C2 server if anyone knows the video's name, plz write it down
@robertwouda3 жыл бұрын
Very cool
@liamtwine22673 жыл бұрын
Bro how do you do this so easily. I've been using Kali for a while now and barely no the basis. I saw you used some sort of "app store" when searching for a XML decoder. Does Kali have that option built-in or is it something I can GIT.
@HAGSLAB3 жыл бұрын
John is using Ubuntu in this (and most) videos. The "app store" he used is part of Sublime Text.
@liamtwine22673 жыл бұрын
@@HAGSLAB can you still install the same tools as Kali? Using Ubuntu
@HAGSLAB3 жыл бұрын
@@liamtwine2267 Yes, it's just very handy with Kali, because it comes with a lot of pentest tools installed by default.
@viv_24893 жыл бұрын
Nice content ...
@nikolas87413 жыл бұрын
Very nice
@_AN2033 жыл бұрын
Good music though at the outro
@rebootlinux6083 жыл бұрын
Very interesting content
@henry-yu2ju3 жыл бұрын
I learned so much thanky ou.
@_AN2033 жыл бұрын
Hi john If some one challenged you to create a script virus and he should clean That virus without reading the script he can use what ever tools to clean that virus he can scan that virus with some restrictions , would you take that challenge ?
@EnglishRain3 жыл бұрын
Awesome!
@gouravsuram3 жыл бұрын
Hey , I am solving machines by reading and wathcing many walkthroughs still having problems solving machines by researching on my own , would you please provide some seris of boxes wher i can go and work on .
@rckrs-jf8lb3 жыл бұрын
cool man.
@yathinshetty49473 жыл бұрын
Anyone know which os he is using?
@nikolas87413 жыл бұрын
It doesn't matter the OS what matters is what you do with it
@HAGSLAB3 жыл бұрын
Ubuntu
@HaouasLeDocteur3 жыл бұрын
There is a Base64 that’s URL safe?? Holy shit
@piyushsharma37893 жыл бұрын
How this attack works in real world. Is there any blog for reference using powerpoint without macros for phishing? Or how to add these xmls in powerpoint?
@Lasnikers3 жыл бұрын
Cool!
@viewerr693 жыл бұрын
OP
@Heavenig3 жыл бұрын
I can't imagine how this Guy master this hacks
@corel9653 жыл бұрын
"Nice and easy" yea right easy 😂😂 omg man this is crazy haha