Can you please make a video about tools and shortcuts you use in terminal ,subl and other related stuff for beginners to get advance .
@liamlouw46434 жыл бұрын
This would be great! Good suggestion!
@jacobsurles75554 жыл бұрын
I sent an email asking about this exact thing. Of all the people I follow, he moves the most fluidly through his system/applications
@letsgocamping884 жыл бұрын
Brent Ford practice!
@cooliceman00013 жыл бұрын
He has a video that may help. How to move fast in linux.
@coolhandjake4 жыл бұрын
I have a very VERY small understanding of what you are doing, but still watching you fly through this difficult course with such ease is amazing to watch, also scary knowing that a single exploit can give someone all that info
@PreetisKitchenltr3 жыл бұрын
11:55 . Who do you think doesn't like your videos? You are out GURU! Man keep it going. We all love your content. Keep rocking 🔥🔥🔥The 13 dislikes are from the people who are jealous.
@Zachsnotboard4 ай бұрын
2024 and I just came across this vuln at work lol
@connorsmith96634 жыл бұрын
hey man i just found your channel and you're so entertaining im honestly surprised you haven't got more subs!
@ripmeep4 жыл бұрын
Great vid John :) I never knew johntheripper could do GPG, I've always been doing it manually rip
@oober664 жыл бұрын
Nobody: I didn't like this John: Uhhh...well...... I don't know what to tell you
@nixcutus4 жыл бұрын
Great Video.
@viswakrb10323 жыл бұрын
Lol..It took hours for me and he just made it look soo easy..
@0DayBodyBulder2 жыл бұрын
ur AMAZING
@sasakanjuh76604 жыл бұрын
Cool one! Looking forward to some NahamCon footage :)
@malcolm29144 жыл бұрын
Great Video! Ran into this vuln on a recent pen test.
@musicdudejoe2634 жыл бұрын
I do not understand a thing you just did but it looked fun.
@adhinvs71324 жыл бұрын
True😂😂😂😂
@chiefkhall67264 жыл бұрын
😂😂😂 that's what makes it fun
@Hellohellohello8032 жыл бұрын
I haven't seen John swear so much in 1 video. 😄
@uaebikers2 жыл бұрын
The end 😂😂
@norsie456 ай бұрын
nice!
@maxali65914 жыл бұрын
If people don't like you... they just left the video... putting a down thumb... Because they are mad. Great again. Continue as you use to, you're doing it great!
@365Kedde4 жыл бұрын
Hey John, Love your videos, they have greate educattional value for me and you bring great value for new-commers to the community. One thing i would love to see is your setup. so: - What hardware are you using, - What Dist(ubuntu) - What packages and so forth.... i know it kind of a noob question but the best way to improve is to learn from other people and how they opearate.. But i see you use certain packages such as GostBuster instead of dirbuster and i am just curious why you chose the tools, and hardware you did.
@gajrajsingh514 жыл бұрын
Nice outro music
@yajusgakhar69697 ай бұрын
Apparently you didn't need to log in to merlin to go to his folder and cat out the user.txt file lol
@pranavbanerjee86254 жыл бұрын
Please explain what you did after decrypting the hashes_for_john.txt?
@profitmasterynow4 жыл бұрын
Hey, love your content alot. I'm into cyber security myself aswell. The only thing that I think could give you more views is definitely the thumbnails. They look very messy I'm sure if you were to make them more simple people would watch them more often.
@jb_lofi3 жыл бұрын
First time I've heard you swear and it was super casual. What kind of username was that?!
@monishdhayalan25524 жыл бұрын
When is the next king of the hill live stream, I have never seen it live. This time I am not gonna sleep the night and watch it live
@_JohnHammond4 жыл бұрын
This weekend is NahamCon and I am hosting the NahamCon CTF (register here! ctf.nahamcon.com ) so unfortunately not one this weekend, but perhaps after? Thanks so much!
@apechzzz55783 жыл бұрын
@@_JohnHammond Hi John! Thanks for the great content. Question: Which else files except /WEB-INF/web.xml are there to read? Cause on my target this file is a standard web.xml file without any valuable information?
@checknate88204 жыл бұрын
Did you try the wonderland CTF on Try Hack Me, I'm busting my brains over it at 2:30 am.
@gafur1234564 жыл бұрын
just dont go to rabbit hole
@kraemrz4 жыл бұрын
Is nahamcon beginner friendly
@mrsmashberry43404 жыл бұрын
I must learn to grease my fingers like the master. goal utf-9001 *whispers fading ~finger grease
@0xcallmesenpai4 жыл бұрын
Hi! Just wondering, why did you use gpg2john and what did it do? I believe that file was a private or a public key right? Does that mean If we use ssh2john on a private / public ssh key, we can retrieve thr user password???
@jb_lofi3 жыл бұрын
gpg2john converts the ASC file to a file that can be passed to John The Ripper for a brute force attack. It is not guaranteed to retrieve the password in this manner; in this case, the private key was protected by a weak password contained in the RockYou.txt word list.
@peterarbeitsloser78194 жыл бұрын
Could you please make a video about how to setup Ubuntu for hacking? I know that there is katoolin3 but it doesn't install wordlists and stuff…
@TheBWA26 ай бұрын
Great exploit! But I am not getting any credential :(
@somebody20234 жыл бұрын
Hi can someone help me to download armitage on kali linux 2020.2 I have the root account and got armitage but got the error datafile does not exist connection refused to database. Error is from Metasploit-framework. I would thank you if anyone could help me.
@grgnizz4 жыл бұрын
what a coincidence I just completed this ctf😀 and did learn about pgp encryption 🤓
@ermanfaminiano97564 жыл бұрын
Hiii John! From Philippines ♥️
@_JohnHammond4 жыл бұрын
Hey Erman! Love from the US! Thanks so much for watching!
@m8_9814 жыл бұрын
One general question .. I thought KZbin forbid „hacking“ videos? Or is this some kind of educational hacking?
@UsamaAli-kr2cw4 жыл бұрын
this is not a real target buddy it is a ctf challenge
@m8_9814 жыл бұрын
dark knight you don’t say .. but does it matter? I thought it was „hacking“ in general.
@rajeshwaris66634 жыл бұрын
U can do -w instead of --wordlist
@ItsMeooooooo4 жыл бұрын
Dude, all you do is relying on the work of others. You do nothing with your own knowledge. Just the use of some common tools and googling an exploit is what you do.
@UsamaAli-kr2cw4 жыл бұрын
why reinvent the wheel?
@ItsMeooooooo4 жыл бұрын
@@UsamaAli-kr2cw I can use nmap, a text editor and google allredy by myself. If you enjoy Videos where a guy explains exactly that to you I've a pity on you...
@0xcallmesenpai4 жыл бұрын
Hi! Just wondering, why did you use gpg2john and what did it do? I believe that file was a private or a public key right? Does that mean If we use ssh2john on a private / public ssh key, we can retrieve thr user password???