This File Steals Passwords

  Рет қаралды 111,526

John Hammond

John Hammond

Күн бұрын

Пікірлер: 100
@CachorroDoMSN
@CachorroDoMSN 7 ай бұрын
one thing that i appreciate about your videos is that you zoom the screen big enough to make it easier to read and watch. and i think people don't point that out enough. thanks.
@mortsaidmort
@mortsaidmort 7 ай бұрын
Further, I also love that he vocalizes the hotkeys he's using, a la 5:10. Really thoughtful, and uncommon for a video unrelated to computer shortcuts
@BillAnt
@BillAnt 7 ай бұрын
It's great, most other videos are barely readable at 1080p/4k. Thanks John! :)
@wcoltters
@wcoltters 7 ай бұрын
Yes! Absolutely! Not everyone has 32 or 43 inch monitors. And not everyone has 20/20 vision right? Keep the big fonts.
@BillAnt
@BillAnt 7 ай бұрын
@@wcoltters - I think the problem is that creators usually have larger displays forgetting about their less than 17" screen users.
@bmc2266
@bmc2266 7 ай бұрын
You can zoom any video on phone and laptop/desktop. Either pause it or not : On phone use 2 fingers on the screen and move then the opposite direction. On laptop/desktop, use the magnifier. (Windows key+CTRL+M) Google it, there is other ways too.
@tonimorton
@tonimorton 7 ай бұрын
really seems like Microsoft should implement some security measures for these scf files
@user-qr4jf4tv2x
@user-qr4jf4tv2x 7 ай бұрын
like showing extension always
@DeNikow
@DeNikow 7 ай бұрын
Not only that. You can do the same thing with hidden desktop.Ini files that are automatically triggered when opening a folder. It's how canary most folder canary tokens work.
@ffggvfg4323
@ffggvfg4323 7 ай бұрын
Lmao imagine
@josecintron85
@josecintron85 7 ай бұрын
@@user-qr4jf4tv2x actually remove the functionality all together, I really don't see the point of having them.
@ecu4321
@ecu4321 7 ай бұрын
i find it odd that microsoft keeps opting to HIDE extension names by default even going as far as force-hiding it even if you set it to always show, like in this case of SCF files. it's like microsoft is allowing threat actors in making windows vulnerable. it's their MacOS/Linux obsession that's influenced this compromised design decision
@skore9975
@skore9975 7 ай бұрын
SMB seems like it's primarily a vulnerability generating protocol that just happens to also let you share files
@mastercodeon42
@mastercodeon42 7 ай бұрын
Yooo, I swear you always have the most absurd things in windows to perform malicious actions with, absolutely love it!
@SolitaryElite
@SolitaryElite 7 ай бұрын
Very old trick, i remember using this to infect my teachers computer so i could steal the tests early
@Naxura
@Naxura 7 ай бұрын
I used this too bro 😊 7 times
@menreikichan8291
@menreikichan8291 6 ай бұрын
@@NaxuraDoes it still work?
@machina123
@machina123 7 ай бұрын
The point is clear - you have just to make somehow a request from victim PC via SMB, fool it that you're going to authenticate it and it gives you it's NTLM hash. But, I couldn't replicate this attack (at least this way). I've done exactly how did you in video and simply nothing happened. Responder was listening correctly and all VMs were in the same network. Windows 10 nor Windows 7 responds to this. Guest OS: Windows 10, Kali Hypervisor: Virtualbox Networking: Bridged (both of them)
@Randomhandle1149
@Randomhandle1149 7 ай бұрын
I'm too dumb to understand everything You present, but how I have been told "I love when You speak technical to me"
@SzaboB33
@SzaboB33 7 ай бұрын
A small correction: You meant "relay" the hash not "pass" because pass the hash attacks are different than NTLM relay attacks. It's quite confusing because of the misused terminology (I did it in the previous sentence as well for traditional reasons :D). But the pass-the-hash attack uses the password hash stored on the machine to generate NetNTLMv2 hashes that will be sent through the network. Relay attacks catch a NetNTLMv2 hash (just like responder does) and sends it through to another service that accepts NTLM authentication. Key differences: NetNTLMv2 hashes cannot be used for long, they expire. SMB signing (in case of SMB servers) can defend against relay attacks (but it will have like a 30% performance cut) while pass-the-hash attacks will work even if it's enabled.
@ak2o614
@ak2o614 7 ай бұрын
Was gonna post a comment about it too, thanks for the precision ;)
@machina123
@machina123 7 ай бұрын
So clearly explained !
@h8handles
@h8handles 7 ай бұрын
Running and gunnin! Hotel YT production. Good to see you John! Great video
@sasjadevries
@sasjadevries 7 ай бұрын
Alright, so you can set a custom icon for a richtext file or word document... 🤷‍♂ Seems cool, but noone really uses it afaik. But then allowing a network location for an icon, on a local document file is really odd🤦‍♂, I don't think anyone asked for that feature whatsoever.
@ExtremeContent-hq
@ExtremeContent-hq 7 ай бұрын
Who cares about you 😔
@Infosecacademynl
@Infosecacademynl 6 ай бұрын
Thanks for sharing! Good to see this is possible, something to be alert for. When I think of protection, blocking SCF files in Ivanti Workspace for example, could prevent this. As for monitoring, detection and response I'm thinking anti virus and SIEM tooling and a SOC to respond to alerts. This covers anti malware and monitoring and logging in ISO27001.
@philosoaper
@philosoaper 7 ай бұрын
I am, have always been and plan on always being...a shift+delete kind of person.
@craigblackie2034
@craigblackie2034 7 ай бұрын
You wouldn't be able to "pass the hash" this isn't ntlm, this is a different format known as net-NTLM, you can relay this though, so long as there is no signing in place.
@craigblackie2034
@craigblackie2034 7 ай бұрын
And yes, you can get ntlm from net-ntlmv1, but that involves a cracking process still.
@pavi013
@pavi013 4 ай бұрын
Hiding in plain sight.
@zanidd
@zanidd 7 ай бұрын
Classic John Hammond, always traveling so we can't pinpoint his location with OSINT
@zackeryhatch436
@zackeryhatch436 7 ай бұрын
Wonder if all these vulnerabilities are recognized by Huntress?
@josecintron85
@josecintron85 7 ай бұрын
I just did something like this not that long ago and pwnd the SOC for the folks that I was working for. I downloaded an SCF to my computer which pointed to my host on the Internet, well the SOC saw the file saved it their desktop and all of the sudden I had a connection to my host from one of the SOC users (which BTW had admin rights on an S* load of systems) after that I used his credentials, with pass the hash, to own the place.
@unstyled3509
@unstyled3509 7 ай бұрын
sounds like you're admitting to a crime (umless you had consent) which isn't a great idea since people might be able to get your email or other potential info
@josecintron85
@josecintron85 7 ай бұрын
@@unstyled3509 Not sure how I said I did anything illegal, but in any case it was authorized as part of my job and the report has already been delivered to the company that hired us.
@charliebeaufils9281
@charliebeaufils9281 7 ай бұрын
So powerfull! If a read teamer put this file in a smb share for example, whould the .ico be fetched by any viewers of the share? Or the ico will be cached by the DC?
@Donder1337
@Donder1337 7 ай бұрын
It's really cool to get this working :P Love your content!
@witwolfdebruin
@witwolfdebruin 7 ай бұрын
Hi John, Thank you for all the information you share with all of us! I need some help some Russians hacked my email account so I have changed all passwords as required. I have the ip address it was accessed from. How can I revert their action towards them back?
@Anonymous-d9b5i
@Anonymous-d9b5i 7 ай бұрын
Windows is the Devil
@BillAnt
@BillAnt 7 ай бұрын
Maybe not the entire Windows, but "The devil is in the details". ;D
@r2k247
@r2k247 7 ай бұрын
Love, John Hammond. :)
@holobolo1661
@holobolo1661 3 ай бұрын
For me Recycle Bin doesn't show up in the open file dialog for any program, and I can't drag it into a text editor either. This is with show All Files set. Anyone know why this could be?
@natoreus
@natoreus 7 ай бұрын
ok that is really cool. Thank you for doing these types of videos.
@LDowning0190
@LDowning0190 7 ай бұрын
Great content as always!! TY!
@themirrazz
@themirrazz 7 ай бұрын
I will never use an SCF file again (maybe)
@DerMarkus1982
@DerMarkus1982 7 ай бұрын
"... will *never show* its file extension ..." That's only true as long as the "NeverShowExt" Registry Value is present under SHCmdFile [HKCR\.scf points to HKCR\SHCmdFile].
@zaidasseh2464
@zaidasseh2464 7 ай бұрын
Hey John big fan here, one thing though I noticed that this only works on windows 10 and does not give me the hash when I tried it on windows 11 is there any reason for that?
@_JohnHammond
@_JohnHammond 7 ай бұрын
I've gotten this to work on Windows 11. How are you setting the icon path? I have had the most success when I wrap it in double quotes and use forward-slashes rather than backlashes, i.e. "//10.0.0.155/share/fake.ico"
@Jacob_WasTaken
@Jacob_WasTaken 4 ай бұрын
im on windows 10 and cant get it working (nothing shows up in responder), ive tried on my raspberry pi aswell as a kali vm, dont know why :(
@blinking_dodo
@blinking_dodo 7 ай бұрын
I have known this for *quite* a while. And there's a bug related to this that might be exploitable too. 😄 It was fun to toy around with, but since nobody was interested i just ignored it for a while. 🤷‍♂
@starlox0
@starlox0 7 ай бұрын
Literally amazing 😲😲😲😎
@jfro_
@jfro_ 7 ай бұрын
yow John, unrelated topic here, just want to ask if you know how to install linux mint or ubuntu dual boot with windows 10 if i don't have flash drive and dvd to create bootable installer. thanks
@0xgordo350
@0xgordo350 7 ай бұрын
we cannot make pass the hash with ntlmv2
@ZoofyZoof
@ZoofyZoof 7 ай бұрын
My recycle bin is named Garbage
@Super--Paper--Fox
@Super--Paper--Fox 7 ай бұрын
Don't give me ideas.
@perfidy47
@perfidy47 7 ай бұрын
Doesn't seem to work on Windows 11
@spraya-ltd
@spraya-ltd 6 ай бұрын
remind me of the old school NETBUS
@JNET_Reloaded
@JNET_Reloaded 7 ай бұрын
thats mad, and i alrway riht click recycle bin to empty it i never open it luckily but i see the point any icon can be used lol
@psalmskhris3925
@psalmskhris3925 7 ай бұрын
Does it still dump the hashes and info via flash disk usage Without placing it in the system storage
@DI0NY5US
@DI0NY5US 7 ай бұрын
Yes. If you open a folder with a .scf file in it Windows will try to display the icon.
@psalmskhris3925
@psalmskhris3925 7 ай бұрын
@@DI0NY5US thanks 👍🏾
@ryanpritchard3755
@ryanpritchard3755 7 ай бұрын
I need that for iPhone and for any laptop in S mode windows
@welter240
@welter240 7 ай бұрын
you should make a anti-viris, malware...etc
@isheamongus811
@isheamongus811 7 ай бұрын
The same with .lnk except the arrow.
@sam_sheridan
@sam_sheridan 7 ай бұрын
You find the strangest things :)
@HexaLabCheats
@HexaLabCheats 7 ай бұрын
Love ur vids
@hamedranaee5641
@hamedranaee5641 7 ай бұрын
You are the one 💪
@ellehooq
@ellehooq 7 ай бұрын
Mind blown
@soggybaguette8457
@soggybaguette8457 7 ай бұрын
Hell yeah new video
@RandomytchannelGD
@RandomytchannelGD 2 ай бұрын
HII
@dand.2944
@dand.2944 7 ай бұрын
Neat info
@HexklTheHexagon
@HexklTheHexagon 7 ай бұрын
WHAT 1 MINUTE AGO?
@Ryder7223
@Ryder7223 7 ай бұрын
22 minutes ago Geometry Dash reference :O
@user-rj6ff8wu6x
@user-rj6ff8wu6x 7 ай бұрын
Ima try this exploit on a big corporation xd
@carsonjamesiv2512
@carsonjamesiv2512 7 ай бұрын
COOL!
@rockpie.iso.tar.bz2
@rockpie.iso.tar.bz2 7 ай бұрын
the odd thing on your desktop is that you use google chrome
@Mr.Robot-E-Corp
@Mr.Robot-E-Corp 7 ай бұрын
Interesting
@ghoost8
@ghoost8 7 ай бұрын
👍🏽
@testingme7936
@testingme7936 7 ай бұрын
can you makea udemy cours please?thanks
@ThePubg3169
@ThePubg3169 7 ай бұрын
🇦🇿🇦🇿🇦🇿🇦🇿🇦🇿🇦🇿🇦🇿
@kucingBermisai
@kucingBermisai 7 ай бұрын
HA
@Happyface-pz5zj
@Happyface-pz5zj 7 ай бұрын
First
@eitancollett
@eitancollett 7 ай бұрын
hate to be that guy but first
@mk-ps6xv
@mk-ps6xv 7 ай бұрын
you aren't that guy
@eitancollett
@eitancollett 7 ай бұрын
@@mk-ps6xv i would never nahhhhhh
@mrch33sehed93
@mrch33sehed93 7 ай бұрын
Probably just me but you sound like Seth Rogen if he wasn't a weed smoker 🫡👌
@tanveeraalam3271
@tanveeraalam3271 7 ай бұрын
First
Self-Extracting Executables for Hackers
41:06
John Hammond
Рет қаралды 88 М.
Finding WEIRD Typosquatting Websites
24:26
John Hammond
Рет қаралды 354 М.
Молодой боец приземлил легенду!
01:02
МИНУС БАЛЛ
Рет қаралды 2,2 МЛН
За кого болели?😂
00:18
МЯТНАЯ ФАНТА
Рет қаралды 3,3 МЛН
Players push long pins through a cardboard box attempting to pop the balloon!
00:31
The IMPOSSIBLE Puzzle..
00:55
Stokes Twins
Рет қаралды 189 МЛН
What Kinds of Files Can Be Viruses?
14:08
ThioJoe
Рет қаралды 283 М.
These Files Don't Show Their Extension
41:26
John Hammond
Рет қаралды 52 М.
Remotely destroying Windows PCs | CVE-2024-38063
5:01
Dragkob
Рет қаралды 1,2 М.
This Company Got Hacked... but HOW?
19:00
John Hammond
Рет қаралды 91 М.
APT Malware (advanced persistent threat)
28:49
John Hammond
Рет қаралды 53 М.
How Hackers Compromise BIG Networks (with NetExec)
36:41
John Hammond
Рет қаралды 121 М.
this vulnerability shouldn’t even exist
14:33
Low Level
Рет қаралды 224 М.
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 722 М.
How to never accidentally run Malware: Must Have Windows Tweaks
7:21
The PC Security Channel
Рет қаралды 601 М.
Hide your files like a hacker (5 Ways)
19:17
NetworkChuck
Рет қаралды 179 М.
Молодой боец приземлил легенду!
01:02
МИНУС БАЛЛ
Рет қаралды 2,2 МЛН