John Hammond
John Hammond
  • Видео 1 502
  • Просмотров 53 960 666
Discussing Active Directory & Internal Network Security
jh.live/threatreport || Conversations on network security and internal pentesting with James "Shikata" at IBM X-Force! We dig into misconfigurations, default weaknesses, and some great tradecraft and techniques. jh.live/x-force-yt
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/threatreport and learn more about IBM X-Force here: jh.live/x-force-yt
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
WATCH MORE:
Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html
Malware & Hacker Tradecraft: ruclips.net/video/LKR8cdfKeGw/видео.html
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.l...
Просмотров: 3 318

Видео

Finding WEIRD Phishing Websites
Просмотров 22 тыс.7 часов назад
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html Malware & Hac...
Feds Seize Largest Cyber Criminal Forum
Просмотров 66 тыс.9 часов назад
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html Malware & Hacker Tradecraft: ruclips.net/video/LKR8cdfKeGw/видео.html 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.li...
Automated Cloud Security with ONE CLICK
Просмотров 14 тыс.12 часов назад
jh.live/sonrai || Lock down your cloud environments with Sonrai Security, the First Cloud Permissions Firewall! Try a free trial: jh.live/sonrai Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html Malware & Hacker Tradecraft: ruclips.net/video/LKR8cdfKeGw/видео.html...
Yet Another Cybercrime Hacking Forum...
Просмотров 44 тыс.14 часов назад
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL...
Learn to Hack AWS & Cloud Security
Просмотров 26 тыс.16 часов назад
jh.live/hacktricks-arte || Get hands-on with AWS Red Teaming and tackle the HackTricks Training and ARTE course! jh.live/hacktricks-arte Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/...
These Files Don't Show Their Extension
Просмотров 46 тыс.День назад
jh.live/snyk || Try Snyk for free and find vulnerabilities in your code and applications! ➡ jh.live/snyk Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset WATCH MORE: Dark Web & Cybercrime Investigations: ruclips.net/video/_GD5mPN_URM/видео.html 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE...
Hackers Abuse Zero-Day Exploit for CrushFTP
Просмотров 66 тыс.21 день назад
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email...
This File Steals Passwords
Просмотров 104 тыс.21 день назад
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Hackers Use Github For Malware
Просмотров 67 тыс.21 день назад
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEW...
Finding WEIRD Devices on the Public Internet
Просмотров 188 тыс.28 дней назад
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Government Unveils Malware Analysis Tool, But...
Просмотров 23 тыс.Месяц назад
CISA's Malware Next-Gen: www.cisa.gov/resources-tools/services/malware-next-generation-analysis Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagr...
Bypassing SmartScreen on Web Browsers
Просмотров 57 тыс.Месяц назад
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreo...
Telegram Has Been Hacked
Просмотров 201 тыс.Месяц назад
Telegram Has Been Hacked
I Hacked The Cloud: Azure Managed Identities
Просмотров 60 тыс.Месяц назад
I Hacked The Cloud: Azure Managed Identities
Scraping Dark Web Sites with Python
Просмотров 123 тыс.Месяц назад
Scraping Dark Web Sites with Python
How Hackers Can Hide PowerShell in Environment Variables
Просмотров 59 тыс.Месяц назад
How Hackers Can Hide PowerShell in Environment Variables
Malware & Cybersecurity Threats on the Horizon
Просмотров 62 тыс.Месяц назад
Malware & Cybersecurity Threats on the Horizon
Hackers Hide with Clever Alternate Data Streams
Просмотров 76 тыс.Месяц назад
Hackers Hide with Clever Alternate Data Streams
The Apex Legends Hacker: Destroyer2009
Просмотров 115 тыс.Месяц назад
The Apex Legends Hacker: Destroyer2009
Github Copilot Made My Code More Vulnerable
Просмотров 54 тыс.Месяц назад
Github Copilot Made My Code More Vulnerable
Malware Analysis & Threat Intel: UAC Bypasses
Просмотров 64 тыс.Месяц назад
Malware Analysis & Threat Intel: UAC Bypasses
Hackers Can Phish with PLAINTEXT QR Codes
Просмотров 62 тыс.Месяц назад
Hackers Can Phish with PLAINTEXT QR Codes
How Hackers Compromise BIG Networks (with NetExec)
Просмотров 106 тыс.Месяц назад
How Hackers Compromise BIG Networks (with NetExec)
The Apex Legends Hack.
Просмотров 114 тыс.2 месяца назад
The Apex Legends Hack.
Finding WEIRD Typosquatting Websites
Просмотров 291 тыс.2 месяца назад
Finding WEIRD Typosquatting Websites
Don't Use CyberChef. Use This Instead.
Просмотров 63 тыс.2 месяца назад
Don't Use CyberChef. Use This Instead.
The Secrets of The Tor Browser
Просмотров 76 тыс.2 месяца назад
The Secrets of The Tor Browser
Can a PDF File be Malware?
Просмотров 79 тыс.2 месяца назад
Can a PDF File be Malware?
I Made Malware In Under 20 Minutes
Просмотров 62 тыс.2 месяца назад
I Made Malware In Under 20 Minutes

Комментарии

  • @olegivanov9607
    @olegivanov9607 16 минут назад

    nice focus, clown.

  • @NickMaude
    @NickMaude 20 минут назад

    The convincing and planning of the changes needed, is tricky. And then there are the toes the feel they are stepped on by recommending the changes.

  • @kickeddroid
    @kickeddroid Час назад

    The sad part is the reluctance for the industry to secure their shit. And I still can't get a cybersec job. Eternal Blue Really? Lmao

  • @DeNikow
    @DeNikow Час назад

    Really informative video! I'd like to see more of these and more technical.

  • @0xC47P1C3
    @0xC47P1C3 2 часа назад

    Give me a golden ticket and your AD is mine

  • @fbifido2
    @fbifido2 2 часа назад

    Can you show and explain how to fully secure active directory plus all machine/services in that domain? - AD domain service - AD Certificate Service - Domain jointed devices (PC, Laptop, Servers, printers, etc..)

  • @fbifido2
    @fbifido2 2 часа назад

    how about show & tell ??? just taking about it is ok, but .....

  • @hexsh
    @hexsh 3 часа назад

    love my boy Hammond, another amazing vid

  • @Monkey_lol_
    @Monkey_lol_ 3 часа назад

    the tangled up cord is tickling my OCD in all the wrong ways

    • @takshashilacorporate9787
      @takshashilacorporate9787 3 часа назад

      Why did you have had to point it out! Now, I can't get it out of my head!! ☹️😭😭

    • @Mauzy0x00
      @Mauzy0x00 2 часа назад

      Glad I’m not the only one 😂

  • @HyperDroids
    @HyperDroids 3 часа назад

    This video was thoroughly interesting. Hope to see more of it in future. Great topics included relationship between NTLM Auth & Kerberos hashing (and dangers associated), EDR efficacy, ADCS, SMB hashing, LSASS, challenges corporate environments face with keeping their systems secure (theory vs practice), pentesting, OT segmentation, PCI compliance & segmentation, and so much more. Well worth watching for security professionals and any security conscious IT engineers.

  • @user-lz7dc5ef2m
    @user-lz7dc5ef2m 3 часа назад

    Sir number to ip ,fip ,address video please

  • @normal47712
    @normal47712 4 часа назад

    Need more nameyourpricetraining truly awsome and affordable please keep up the support for it

  • @IndyAdvant
    @IndyAdvant 4 часа назад

    lol that tangled phone cable. brings me back

    • @Alfred-Neuman
      @Alfred-Neuman 3 часа назад

      That's pretty bad for my OCD! XD

    • @HyperDroids
      @HyperDroids 2 часа назад

      What makes it worse is that you know he affords better. 🤣

  • @InfixLyrics
    @InfixLyrics 4 часа назад

    1st comment :D like this if you're first ones.

  • @thomcr
    @thomcr 4 часа назад

    First

  • @bigupbassline58
    @bigupbassline58 4 часа назад

    a whole video that's just a sponsor segment is WILD

  • @TheStevenWhiting
    @TheStevenWhiting 6 часов назад

    Another 27 min advert

  • @RedBigz
    @RedBigz 6 часов назад

    I completely didn't know the read command until yesterday, because I was trying to parallelize some cracking tools, and this gem pops up on my shorts. Awesome timing.

  • @yajusgakhar6969
    @yajusgakhar6969 7 часов назад

    Apparently you didn't need to log in to merlin to go to his folder and cat out the user.txt file lol

  • @lalithagangaraju4
    @lalithagangaraju4 10 часов назад

    can you share the link of volatility commands

  • @HadiALHalbouni
    @HadiALHalbouni 13 часов назад

    Can you please make a comparison video between it and the OSCP?

  • @reset5899
    @reset5899 14 часов назад

    bro u fucking skid do an actual ctf or stick to malware "analysis" liveoverflow stacksmashing flashback team ur a joke now

  • @Sabagegah
    @Sabagegah 19 часов назад

    Fishing - Live Game

  • @TravelDude2
    @TravelDude2 21 час назад

    it just says fail and i cant make it to value 4

  • @oetken007
    @oetken007 21 час назад

    If you do not configure it willingly, devices in your LAN are not accessible from the WAN. The most problematic devices are these, connected to a cloud, because you have no control over the interfaces. If the cloud is compromised, all devices are as well. If you use webcams, buy them from big brands like DLink, Panasonic, Mobotics, Hikvision.... Think twice where you want to place a webcam as well. Not in the bedroom etc...

  • @angelolorenzoni
    @angelolorenzoni 23 часа назад

    I swear to god that I was on that forums some years ago and there is a profile of someone that is in the FBI with real photos and some access to the site, def. that site is driven by FBI

  • @Mrshutter
    @Mrshutter День назад

    What is this a honeypot after raid forums was taking down?

  • @nezu_cc
    @nezu_cc День назад

    He couldn't control the inner weeb when he saw Crunchyroll, classic

  • @maxbd2618
    @maxbd2618 День назад

    Sponsored by Flare! (and Nulled)

  • @atrizzstinks
    @atrizzstinks День назад

    every tool nowadays try to flex with how it's made in rust 🤦

  • @AkiiiMatcha
    @AkiiiMatcha День назад

    Super fun video! Thanks for making this. :)

  • @brandoncpk
    @brandoncpk День назад

    At 8:17, whats the difference between valid account and phishing?

  • @MyMomCallsMeCyb3rMan
    @MyMomCallsMeCyb3rMan День назад

    Cyber crime hurts people's feelings, don't do it.....

  • @harleymandk
    @harleymandk День назад

    I think the source code for the site is outthere - so a new one is open soon ;-)

  • @dooleve
    @dooleve День назад

    Take a shot every time this guy says "drill down into" or "dig into"

  • @TrulyChxse
    @TrulyChxse День назад

    Nice

  • @theGreatCommenterofYoutube
    @theGreatCommenterofYoutube День назад

    My god just get into the video

  • @radscientist
    @radscientist День назад

    I've gotten a bunch of these as well as the "Thank you for your payment" with a <fake> transaction number that is a link and, of course, a downloadable file. They are usually sent from a Gmail address with a person's name and the sender's name is different.

  • @fnomari
    @fnomari День назад

    how to get it back??

  • @floppa.flo88a
    @floppa.flo88a День назад

    Jesus loves you John

  • @amankishore900
    @amankishore900 День назад

    Keep it up I want more such type of videos basically on these topics

  • @constantitus
    @constantitus День назад

    ok, now read the second line in the file

  • @dvsur
    @dvsur День назад

    I watched ThioJoe Videos about this

  • @user-yq9fg9xv9l
    @user-yq9fg9xv9l День назад

    How run this payload on over internet..?

  • @_tr11
    @_tr11 День назад

    it's so fun to write scripts to fill their databases with garbage bro

  • @foundmedia
    @foundmedia 2 дня назад

    hey man, i'm going to repeat what a few other commenters said, you should edit this video to remove that one "weird" website because showing the link is technically distribution of cp. NOT visiting the website myself, just relaying what other commenters saw when they visited the site out of curiousity, maybe you didn't even realize what you were looking at because you laughed it off so easily in this video.

  • @cyber_space09
    @cyber_space09 2 дня назад

    Hmm🫠 you found Minecraft server 😂

  • @GrumpyGrebo
    @GrumpyGrebo 2 дня назад

    Honestly these websites have been honeypots from the start. You do not simply advertise yourself as a HaCkINg FoRuM on the WORLD WIDE INTERNET. Literally all of the hacking platforms that are available on this platform are honeypots. The owners will cry for enough cash, all of your activity is public, and the infrastructure is assumed compromised by default. Anybody using them is ignorant at best.