- 89
- 3 034 114
Marcus Hutchins
United States
Registrace 1. 06. 2015
Ethical hacking, reverse engineering, and tech insights from a software engineer and cybersecurity professional.
More: marcushutchins.com
More: marcushutchins.com
Why I'm Never Concerned About New Technologies (Or Being Replaced)
Discussing my philosophy on tech and why you won't seem me pivoting into whatever new technology is currently being hyped up
Newsletter: malwaretech.com/newsletter
Discord: discord.gg/malwaretech
Newsletter: malwaretech.com/newsletter
Discord: discord.gg/malwaretech
zhlédnutí: 5 656
Video
Responding To Weird Conspiracy Theories About Me
zhlédnutí 6KPřed 14 dny
Responding To Weird Conspiracy Theories About Me
Where Did All The Tech Jobs Go and What You Can Do To Improve Your Chances of Finding One
zhlédnutí 17KPřed 28 dny
Breaking down how tech went from one of the most lucrative industries to nearly impossible to find a job in, and detailing my tips to increase your chances of finding a job in 2024.
Quitting My Job And Returning To YouTube
zhlédnutí 10KPřed měsícem
Quitting My Job And Returning To CZcams
How I Hacked My Garage Remote With a Flipper Zero & Microchip Programmer
zhlédnutí 35KPřed 8 měsíci
The quest for a spare garage door remote turns into an extensive hardware hacking project involving a HackRF One, Flipper Zero, PICKit PIC Programmer, and some soldering. Firmware source code (credit to Kevin Redon): git.cuvoodoo.info/kingkevin/megacode/src/branch/master/pic/318LPW1K-L/318LPW1K-L.c
Getting a Tech Job With No Qualifications
zhlédnutí 21KPřed 10 měsíci
Discussing how I got my first tech job without a single qualification and how you can follow a similar path to achieve the same. Discord server: discord.gg/MalwareTech 00:00 Introduction 00:34 What Really are Qualifications 01:23 My Personal Path 03:05 Social Media 03:54 My First Job Offers 05:33 Building a Work Portfolio 06:45 The HR Trap 08:26 Social Media Networking
Getting ChatGPT to Write a Phishing Email For Me
zhlédnutí 12KPřed rokem
Getting ChatGPT to Write a Phishing Email For Me
My Recommendations For Buying A Computer
zhlédnutí 45KPřed rokem
My Recommendations For Buying A Computer
Starting Cybersecurity in 2024 - Things I'd Wish I Knew
zhlédnutí 133KPřed rokem
Starting Cybersecurity in 2024 - Things I'd Wish I Knew
Hacker Reacts To Mr Robot Hacking Scenes
zhlédnutí 201KPřed 2 lety
Hacker Reacts To Mr Robot Hacking Scenes
Building a 10 Gigabit Network Over Cat5e
zhlédnutí 21KPřed 2 lety
Building a 10 Gigabit Network Over Cat5e
Introduction to Use-After-Free Vulnerabilities | UserAfterFree Challenge Walkthrough (Part: 1)
zhlédnutí 20KPřed 2 lety
Introduction to Use-After-Free Vulnerabilities | UserAfterFree Challenge Walkthrough (Part: 1)
Exploiting Windows RPC - CVE-2022-26809 Explained | Patch Analysis
zhlédnutí 38KPřed 2 lety
Exploiting Windows RPC - CVE-2022-26809 Explained | Patch Analysis
Tips for Getting Started Learning Cybersecurity in 2023
zhlédnutí 58KPřed 2 lety
Tips for Getting Started Learning Cybersecurity in 2023
Why Haven't We Seen a Devastating Log4j Worm Yet?
zhlédnutí 13KPřed 2 lety
Why Haven't We Seen a Devastating Log4j Worm Yet?
Investigating a Log4j Malware Attack (CVE-2021-44228)
zhlédnutí 20KPřed 2 lety
Investigating a Log4j Malware Attack (CVE-2021-44228)
Log4j (CVE-2021-44228) RCE Vulnerability Explained
zhlédnutí 315KPřed 2 lety
Log4j (CVE-2021-44228) RCE Vulnerability Explained
Facebook Outage & Whistleblower, Server Astrology, Twitch Breach - MalwareTech Podcast (S2.E2)
zhlédnutí 10KPřed 2 lety
Facebook Outage & Whistleblower, Server Astrology, Twitch Breach - MalwareTech Podcast (S2.E2)
How Hackers Hack Companies With Microsoft Office
zhlédnutí 46KPřed 3 lety
How Hackers Hack Companies With Microsoft Office
Why Destroying Bitcoin Wouldn't Stop Corporate Ransomware
zhlédnutí 6KPřed 3 lety
Why Destroying Bitcoin Wouldn't Stop Corporate Ransomware
What is an Integer Overflow Vulnerability? | Hacking 101
zhlédnutí 25KPřed 3 lety
What is an Integer Overflow Vulnerability? | Hacking 101
Beginner Reverse Engineering | Part 2: Compiling and Decompiling (Ghidra + IDA)
zhlédnutí 53KPřed 3 lety
Beginner Reverse Engineering | Part 2: Compiling and Decompiling (Ghidra IDA)
A glorified version of Alexa. AI I have always thought of as overblown, watching this has given me a better base to understand how it's basically a mor advanced version of a search engine. It also gives me hope all what I'm learning, all the hard work being put into learning code is worth the while. Cyb Sec student too, so following you Marcus, and also reading of your story on wired has provided an insight of how this world relies on people like you to shield many from cyber attacks. Also how to stay democratic of white, grey and black hacking.
No degrees, No certs, No nothing. But casually stops the one of the most notorious ransomware in the world.
Incorrect. What you actually want to do is some apps like pizzaexpress reward you for joining tables at restaurants, so all you gotta do is set your GPS to one of their restaurants, and then spam try and join table numbers. There is typically no cooldown on trying to join tables and you can rack up infinite free food on a lot of services.
You could also use like android studio or something too probably.
Marcus
Believe it or not, straight to jail. Reminded me of that meme 😂
The industries needs cybersecurity engineers, but they don’t want to educate them. I guess they will search a looooooong time
it’s crazy to me we still use RFID access cards. totally not worth the risk for the “convenience” benefit
Just watched a video about you. Damn, you're a beast. 🫡
more hw hacking please.
W
can i ask a permission to make this video a mandatory and security awarness video for my company? i will include the original owner and crator of course, i really love all your videos it's so helping for me!
That's great, now hack me. Just kidding
Bros a dumby lol Marcus dont pay him no attention.
I know this video is pretty old now and you must have seen the malware programmed in python that is about now. I have one taken apart. It does actually install (copy) the python interpreter from one of the executable resources. A lot safer extracting and reading python than having to use a debugger in a secure test environment. Pretty safe and even safer if you don't have the python executable in the path, or don't have python installed at all.
Step 1: become a sr engineer
You wouldnt know anything about making bank trojans would you? 😅
On one video you said If you hack for money no matter what you will get caught, but if you never saved wannacry you wouldve never got caught so yeah
Didnt know you made this video i watched it like 50 times
What about your project on that one bank trojan that you were forced to make
There is still a place for old skills. I unpacked and deobfuscated a multi-stage malware using nothing but a hex editor and 7zip a few days ago, then some basic python that I'd never programmed in before. Looking at the virustotal sandboxes analysis, it seems the anti-analysis code stopped all of the sandboxes, and ones that didn't have a net connection also failed, none of thevendors detected it at the time either. By using a manual method, I have the python code, the downloaded files and the final payload. The final payload is causing some problems, as it looks like it's written in C, and part of it is encoded / obfuscated. I cannot easily read and interpret the x64 disassembly. I did upload the binary of the final payload to virus total, and it wasn't detected by many scanners at the time, it is now though - 18/64 vs 5 or 6 out of 64.
Why is no one talking about the smoothest hoody transition ever
Just like you got caught 10 years later
People are annoying I hype up that AI will take over soon. I can tell this is like a service like excel or something.
A famous phase from my pastor technology is just things enemy can use good things to do bad things.We can also use bad things to prove something good or glory for God. "all things work together for good"
So the industry will just die 😂
Half the industry tries to scam beginners with borderline useless content, half the industry hates beginners because they have to clean up the mess the rest of the industry made. It really is a moment of “stop hitting yourself”
I personally respect you even tho you may or have not commited those crimes you will still remain the Malware Stopper.
Sounds like a flea market sale😂😂😂
Its a flea market except its on the internet and filled with man children commiting felonies
Fact
Artificial Intelligence is just a parlor trick... We can protect ourselves by not using Android, IOS or Windows over any network or for the internet... WE can use Linux and it's FREE, but people are lazy and companies always put their bottom line first - that's why they get burned by expensive IT bills.
This is what we called Reaction with explaining ♥️
6:38 thank you
I come from Youruber Crumb, I love this video. It’s a super rare perspective. I would love to subscribe if you keep posting videos on your perspective on certain topics like for example you talked about new technology and the VC perspective very rare and insightful. Thank you so much.
I come from the CZcamsr Crumb. Wow you are a legend and a true good human who learns and expands society
0:03 😂😂😂
how have you forgot about wannacry.exe
Not sure what WannaCry has to do with AI
Thanks captain obvious 🤦
unfortunately there's not much else to it, just git gud lulz
loLol
I basically wrote my own version of Wireshark in python. Got me hired!!
As someone who has had a similar path, this is incredibly accurate and helpful. Thank you for this Markus, it's going to help a lot of people.
Do you still hack?
He hacks deez occasionally
Just heard all the details to your journey, I love the work you do and I am a huge fan!!
Examples of the projects that you developed?
Will do post a video on that soon
@@MalwareTechBlog waiting on this!
Saved the world?
Man I’m used to the crazy live chat but there not crazy here
Great advice!!!
Wow You are too smart bro.
Sad that this guys has to even be responded to. My org was effected by this attack, luckily we were small enough that all of our systems were backed up hourly. All we had to do was roll back to the last backup before our 'patient zero' was infected. At no point did we even consider paying the ransom. It was simply going through the motions of retrieving a backup. At that point based on his reasoning we should just let hospitals and governments deal with this "inconvenience". Chronologically who cares who did it, its fucked up for any APT (advanced persistent threat) to effect any other countries' health care system. It was such an issue that we literally had a convention about it in 1949 to stop attacks on the most vulnerable individuals during war time.... let alone FUCKIN CIVILIANS!
I learned about your story from a cybercrime stories channel. Glad to see you're doing well! I'm looking to pivot my career into the cybersecurity field but still not entirely sold on it. Appreciate the advice nonetheless.
Will you mentor me?
Don't spend it on seizable assets, spend it on food, drinks travels and women, what are they gonna do? Put you on a diet?