- Видео 1 502
- Просмотров 53 960 666
John Hammond
США
Добавлен 5 фев 2011
Free Cybersecurity Education and Ethical Hacking.
Discussing Active Directory & Internal Network Security
jh.live/threatreport || Conversations on network security and internal pentesting with James "Shikata" at IBM X-Force! We dig into misconfigurations, default weaknesses, and some great tradecraft and techniques. jh.live/x-force-yt
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/threatreport and learn more about IBM X-Force here: jh.live/x-force-yt
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
WATCH MORE:
Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html
Malware & Hacker Tradecraft: ruclips.net/video/LKR8cdfKeGw/видео.html
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.l...
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/threatreport and learn more about IBM X-Force here: jh.live/x-force-yt
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
WATCH MORE:
Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html
Malware & Hacker Tradecraft: ruclips.net/video/LKR8cdfKeGw/видео.html
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.l...
Просмотров: 3 318
Видео
Finding WEIRD Phishing Websites
Просмотров 22 тыс.7 часов назад
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html Malware & Hac...
Feds Seize Largest Cyber Criminal Forum
Просмотров 66 тыс.9 часов назад
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html Malware & Hacker Tradecraft: ruclips.net/video/LKR8cdfKeGw/видео.html 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.li...
Automated Cloud Security with ONE CLICK
Просмотров 14 тыс.12 часов назад
jh.live/sonrai || Lock down your cloud environments with Sonrai Security, the First Cloud Permissions Firewall! Try a free trial: jh.live/sonrai Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html Malware & Hacker Tradecraft: ruclips.net/video/LKR8cdfKeGw/видео.html...
Yet Another Cybercrime Hacking Forum...
Просмотров 44 тыс.14 часов назад
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL...
Learn to Hack AWS & Cloud Security
Просмотров 26 тыс.16 часов назад
jh.live/hacktricks-arte || Get hands-on with AWS Red Teaming and tackle the HackTricks Training and ARTE course! jh.live/hacktricks-arte Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/...
These Files Don't Show Their Extension
Просмотров 46 тыс.День назад
jh.live/snyk || Try Snyk for free and find vulnerabilities in your code and applications! ➡ jh.live/snyk Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset WATCH MORE: Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE...
Hackers Abuse Zero-Day Exploit for CrushFTP
Просмотров 66 тыс.21 день назад
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email...
This File Steals Passwords
Просмотров 104 тыс.21 день назад
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Hackers Use Github For Malware
Просмотров 67 тыс.21 день назад
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEW...
Finding WEIRD Devices on the Public Internet
Просмотров 188 тыс.28 дней назад
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Government Unveils Malware Analysis Tool, But...
Просмотров 23 тыс.Месяц назад
CISA's Malware Next-Gen: www.cisa.gov/resources-tools/services/malware-next-generation-analysis Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagr...
Bypassing SmartScreen on Web Browsers
Просмотров 57 тыс.Месяц назад
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreo...
I Hacked The Cloud: Azure Managed Identities
Просмотров 60 тыс.Месяц назад
I Hacked The Cloud: Azure Managed Identities
Scraping Dark Web Sites with Python
Просмотров 123 тыс.Месяц назад
Scraping Dark Web Sites with Python
How Hackers Can Hide PowerShell in Environment Variables
Просмотров 59 тыс.Месяц назад
How Hackers Can Hide PowerShell in Environment Variables
Malware & Cybersecurity Threats on the Horizon
Просмотров 62 тыс.Месяц назад
Malware & Cybersecurity Threats on the Horizon
Hackers Hide with Clever Alternate Data Streams
Просмотров 76 тыс.Месяц назад
Hackers Hide with Clever Alternate Data Streams
The Apex Legends Hacker: Destroyer2009
Просмотров 115 тыс.Месяц назад
The Apex Legends Hacker: Destroyer2009
Github Copilot Made My Code More Vulnerable
Просмотров 54 тыс.Месяц назад
Github Copilot Made My Code More Vulnerable
Malware Analysis & Threat Intel: UAC Bypasses
Просмотров 64 тыс.Месяц назад
Malware Analysis & Threat Intel: UAC Bypasses
Hackers Can Phish with PLAINTEXT QR Codes
Просмотров 62 тыс.Месяц назад
Hackers Can Phish with PLAINTEXT QR Codes
How Hackers Compromise BIG Networks (with NetExec)
Просмотров 106 тыс.Месяц назад
How Hackers Compromise BIG Networks (with NetExec)
Finding WEIRD Typosquatting Websites
Просмотров 291 тыс.2 месяца назад
Finding WEIRD Typosquatting Websites
Don't Use CyberChef. Use This Instead.
Просмотров 63 тыс.2 месяца назад
Don't Use CyberChef. Use This Instead.
I Made Malware In Under 20 Minutes
Просмотров 62 тыс.2 месяца назад
I Made Malware In Under 20 Minutes
nice focus, clown.
The convincing and planning of the changes needed, is tricky. And then there are the toes the feel they are stepped on by recommending the changes.
The sad part is the reluctance for the industry to secure their shit. And I still can't get a cybersec job. Eternal Blue Really? Lmao
Really informative video! I'd like to see more of these and more technical.
Give me a golden ticket and your AD is mine
Can you show and explain how to fully secure active directory plus all machine/services in that domain? - AD domain service - AD Certificate Service - Domain jointed devices (PC, Laptop, Servers, printers, etc..)
how about show & tell ??? just taking about it is ok, but .....
love my boy Hammond, another amazing vid
the tangled up cord is tickling my OCD in all the wrong ways
Why did you have had to point it out! Now, I can't get it out of my head!! ☹️😭😭
Glad I’m not the only one 😂
This video was thoroughly interesting. Hope to see more of it in future. Great topics included relationship between NTLM Auth & Kerberos hashing (and dangers associated), EDR efficacy, ADCS, SMB hashing, LSASS, challenges corporate environments face with keeping their systems secure (theory vs practice), pentesting, OT segmentation, PCI compliance & segmentation, and so much more. Well worth watching for security professionals and any security conscious IT engineers.
Sir number to ip ,fip ,address video please
Need more nameyourpricetraining truly awsome and affordable please keep up the support for it
lol that tangled phone cable. brings me back
That's pretty bad for my OCD! XD
What makes it worse is that you know he affords better. 🤣
1st comment :D like this if you're first ones.
First
First after the first :D
a whole video that's just a sponsor segment is WILD
Another 27 min advert
I completely didn't know the read command until yesterday, because I was trying to parallelize some cracking tools, and this gem pops up on my shorts. Awesome timing.
Apparently you didn't need to log in to merlin to go to his folder and cat out the user.txt file lol
can you share the link of volatility commands
Can you please make a comparison video between it and the OSCP?
bro u fucking skid do an actual ctf or stick to malware "analysis" liveoverflow stacksmashing flashback team ur a joke now
Fishing - Live Game
it just says fail and i cant make it to value 4
If you do not configure it willingly, devices in your LAN are not accessible from the WAN. The most problematic devices are these, connected to a cloud, because you have no control over the interfaces. If the cloud is compromised, all devices are as well. If you use webcams, buy them from big brands like DLink, Panasonic, Mobotics, Hikvision.... Think twice where you want to place a webcam as well. Not in the bedroom etc...
I swear to god that I was on that forums some years ago and there is a profile of someone that is in the FBI with real photos and some access to the site, def. that site is driven by FBI
What is this a honeypot after raid forums was taking down?
He couldn't control the inner weeb when he saw Crunchyroll, classic
Sponsored by Flare! (and Nulled)
every tool nowadays try to flex with how it's made in rust 🤦
Super fun video! Thanks for making this. :)
At 8:17, whats the difference between valid account and phishing?
Cyber crime hurts people's feelings, don't do it.....
I think the source code for the site is outthere - so a new one is open soon ;-)
Take a shot every time this guy says "drill down into" or "dig into"
Nice
My god just get into the video
I've gotten a bunch of these as well as the "Thank you for your payment" with a <fake> transaction number that is a link and, of course, a downloadable file. They are usually sent from a Gmail address with a person's name and the sender's name is different.
how to get it back??
Jesus loves you John
Keep it up I want more such type of videos basically on these topics
ok, now read the second line in the file
I watched ThioJoe Videos about this
How run this payload on over internet..?
it's so fun to write scripts to fill their databases with garbage bro
hey man, i'm going to repeat what a few other commenters said, you should edit this video to remove that one "weird" website because showing the link is technically distribution of cp. NOT visiting the website myself, just relaying what other commenters saw when they visited the site out of curiousity, maybe you didn't even realize what you were looking at because you laughed it off so easily in this video.
Hmm🫠 you found Minecraft server 😂
Honestly these websites have been honeypots from the start. You do not simply advertise yourself as a HaCkINg FoRuM on the WORLD WIDE INTERNET. Literally all of the hacking platforms that are available on this platform are honeypots. The owners will cry for enough cash, all of your activity is public, and the infrastructure is assumed compromised by default. Anybody using them is ignorant at best.