- 1 502
- 53 960 666
John Hammond
United States
Registrace 5. 02. 2011
Free Cybersecurity Education and Ethical Hacking.
Discussing Active Directory & Internal Network Security
jh.live/threatreport || Conversations on network security and internal pentesting with James "Shikata" at IBM X-Force! We dig into misconfigurations, default weaknesses, and some great tradecraft and techniques. jh.live/x-force-yt
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/threatreport and learn more about IBM X-Force here: jh.live/x-force-yt
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
WATCH MORE:
Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html
Malware & Hacker Tradecraft: czcams.com/video/LKR8cdfKeGw/video.html
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥CZcams ALGORITHM ➡ Like, Comment, & Subscribe!
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/threatreport and learn more about IBM X-Force here: jh.live/x-force-yt
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
WATCH MORE:
Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html
Malware & Hacker Tradecraft: czcams.com/video/LKR8cdfKeGw/video.html
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥CZcams ALGORITHM ➡ Like, Comment, & Subscribe!
zhlédnutí: 3 318
Video
Finding WEIRD Phishing Websites
zhlédnutí 22KPřed 8 hodinami
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html Malware & Hack...
Feds Seize Largest Cyber Criminal Forum
zhlédnutí 66KPřed 10 hodinami
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html Malware & Hacker Tradecraft: czcams.com/video/LKR8cdfKeGw/video.html 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live...
Automated Cloud Security with ONE CLICK
zhlédnutí 14KPřed 13 hodinami
jh.live/sonrai || Lock down your cloud environments with Sonrai Security, the First Cloud Permissions Firewall! Try a free trial: jh.live/sonrai Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html Malware & Hacker Tradecraft: czcams.com/video/LKR8cdfKeGw/video.html 📧...
Yet Another Cybercrime Hacking Forum...
zhlédnutí 44KPřed 15 hodinami
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL...
Learn to Hack AWS & Cloud Security
zhlédnutí 26KPřed 17 hodinami
jh.live/hacktricks-arte || Get hands-on with AWS Red Teaming and tackle the HackTricks Training and ARTE course! jh.live/hacktricks-arte Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/...
These Files Don't Show Their Extension
zhlédnutí 46KPřed dnem
jh.live/snyk || Try Snyk for free and find vulnerabilities in your code and applications! ➡ jh.live/snyk Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset WATCH MORE: Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE ...
Hackers Abuse Zero-Day Exploit for CrushFTP
zhlédnutí 66KPřed 21 dnem
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email...
This File Steals Passwords
zhlédnutí 104KPřed 21 dnem
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Hackers Use Github For Malware
zhlédnutí 67KPřed 21 dnem
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEW...
Finding WEIRD Devices on the Public Internet
zhlédnutí 188KPřed 28 dny
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Government Unveils Malware Analysis Tool, But...
zhlédnutí 23KPřed měsícem
CISA's Malware Next-Gen: www.cisa.gov/resources-tools/services/malware-next-generation-analysis Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagr...
Bypassing SmartScreen on Web Browsers
zhlédnutí 57KPřed měsícem
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreo...
I Hacked The Cloud: Azure Managed Identities
zhlédnutí 60KPřed měsícem
I Hacked The Cloud: Azure Managed Identities
How Hackers Can Hide PowerShell in Environment Variables
zhlédnutí 59KPřed měsícem
How Hackers Can Hide PowerShell in Environment Variables
Malware & Cybersecurity Threats on the Horizon
zhlédnutí 62KPřed měsícem
Malware & Cybersecurity Threats on the Horizon
Hackers Hide with Clever Alternate Data Streams
zhlédnutí 76KPřed měsícem
Hackers Hide with Clever Alternate Data Streams
The Apex Legends Hacker: Destroyer2009
zhlédnutí 115KPřed měsícem
The Apex Legends Hacker: Destroyer2009
Github Copilot Made My Code More Vulnerable
zhlédnutí 54KPřed měsícem
Github Copilot Made My Code More Vulnerable
Malware Analysis & Threat Intel: UAC Bypasses
zhlédnutí 64KPřed měsícem
Malware Analysis & Threat Intel: UAC Bypasses
Hackers Can Phish with PLAINTEXT QR Codes
zhlédnutí 62KPřed měsícem
Hackers Can Phish with PLAINTEXT QR Codes
How Hackers Compromise BIG Networks (with NetExec)
zhlédnutí 106KPřed měsícem
How Hackers Compromise BIG Networks (with NetExec)
Don't Use CyberChef. Use This Instead.
zhlédnutí 63KPřed 2 měsíci
Don't Use CyberChef. Use This Instead.
nice focus, clown.
The convincing and planning of the changes needed, is tricky. And then there are the toes the feel they are stepped on by recommending the changes.
The sad part is the reluctance for the industry to secure their shit. And I still can't get a cybersec job. Eternal Blue Really? Lmao
Really informative video! I'd like to see more of these and more technical.
Give me a golden ticket and your AD is mine
Can you show and explain how to fully secure active directory plus all machine/services in that domain? - AD domain service - AD Certificate Service - Domain jointed devices (PC, Laptop, Servers, printers, etc..)
how about show & tell ??? just taking about it is ok, but .....
love my boy Hammond, another amazing vid
the tangled up cord is tickling my OCD in all the wrong ways
Why did you have had to point it out! Now, I can't get it out of my head!! ☹️😭😭
Glad I’m not the only one 😂
This video was thoroughly interesting. Hope to see more of it in future. Great topics included relationship between NTLM Auth & Kerberos hashing (and dangers associated), EDR efficacy, ADCS, SMB hashing, LSASS, challenges corporate environments face with keeping their systems secure (theory vs practice), pentesting, OT segmentation, PCI compliance & segmentation, and so much more. Well worth watching for security professionals and any security conscious IT engineers.
Sir number to ip ,fip ,address video please
Need more nameyourpricetraining truly awsome and affordable please keep up the support for it
lol that tangled phone cable. brings me back
That's pretty bad for my OCD! XD
What makes it worse is that you know he affords better. 🤣
1st comment :D like this if you're first ones.
First
First after the first :D
a whole video that's just a sponsor segment is WILD
Another 27 min advert
I completely didn't know the read command until yesterday, because I was trying to parallelize some cracking tools, and this gem pops up on my shorts. Awesome timing.
Apparently you didn't need to log in to merlin to go to his folder and cat out the user.txt file lol
can you share the link of volatility commands
Can you please make a comparison video between it and the OSCP?
bro u fucking skid do an actual ctf or stick to malware "analysis" liveoverflow stacksmashing flashback team ur a joke now
Fishing - Live Game
it just says fail and i cant make it to value 4
If you do not configure it willingly, devices in your LAN are not accessible from the WAN. The most problematic devices are these, connected to a cloud, because you have no control over the interfaces. If the cloud is compromised, all devices are as well. If you use webcams, buy them from big brands like DLink, Panasonic, Mobotics, Hikvision.... Think twice where you want to place a webcam as well. Not in the bedroom etc...
I swear to god that I was on that forums some years ago and there is a profile of someone that is in the FBI with real photos and some access to the site, def. that site is driven by FBI
What is this a honeypot after raid forums was taking down?
He couldn't control the inner weeb when he saw Crunchyroll, classic
Sponsored by Flare! (and Nulled)
every tool nowadays try to flex with how it's made in rust 🤦
Super fun video! Thanks for making this. :)
At 8:17, whats the difference between valid account and phishing?
Cyber crime hurts people's feelings, don't do it.....
I think the source code for the site is outthere - so a new one is open soon ;-)
Take a shot every time this guy says "drill down into" or "dig into"
Nice
My god just get into the video
I've gotten a bunch of these as well as the "Thank you for your payment" with a <fake> transaction number that is a link and, of course, a downloadable file. They are usually sent from a Gmail address with a person's name and the sender's name is different.
how to get it back??
Jesus loves you John
Keep it up I want more such type of videos basically on these topics
ok, now read the second line in the file
I watched ThioJoe Videos about this
How run this payload on over internet..?
it's so fun to write scripts to fill their databases with garbage bro
hey man, i'm going to repeat what a few other commenters said, you should edit this video to remove that one "weird" website because showing the link is technically distribution of cp. NOT visiting the website myself, just relaying what other commenters saw when they visited the site out of curiousity, maybe you didn't even realize what you were looking at because you laughed it off so easily in this video.
Hmm🫠 you found Minecraft server 😂
Honestly these websites have been honeypots from the start. You do not simply advertise yourself as a HaCkINg FoRuM on the WORLD WIDE INTERNET. Literally all of the hacking platforms that are available on this platform are honeypots. The owners will cry for enough cash, all of your activity is public, and the infrastructure is assumed compromised by default. Anybody using them is ignorant at best.