John Hammond
John Hammond
  • 1 502
  • 53 960 666
Discussing Active Directory & Internal Network Security
jh.live/threatreport || Conversations on network security and internal pentesting with James "Shikata" at IBM X-Force! We dig into misconfigurations, default weaknesses, and some great tradecraft and techniques. jh.live/x-force-yt
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/threatreport and learn more about IBM X-Force here: jh.live/x-force-yt
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
WATCH MORE:
Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html
Malware & Hacker Tradecraft: czcams.com/video/LKR8cdfKeGw/video.html
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥CZcams ALGORITHM ➡ Like, Comment, & Subscribe!
zhlédnutí: 3 318

Video

Finding WEIRD Phishing Websites
zhlédnutí 22KPřed 8 hodinami
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html Malware & Hack...
Feds Seize Largest Cyber Criminal Forum
zhlédnutí 66KPřed 10 hodinami
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html Malware & Hacker Tradecraft: czcams.com/video/LKR8cdfKeGw/video.html 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live...
Automated Cloud Security with ONE CLICK
zhlédnutí 14KPřed 13 hodinami
jh.live/sonrai || Lock down your cloud environments with Sonrai Security, the First Cloud Permissions Firewall! Try a free trial: jh.live/sonrai Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com WATCH MORE: Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html Malware & Hacker Tradecraft: czcams.com/video/LKR8cdfKeGw/video.html 📧...
Yet Another Cybercrime Hacking Forum...
zhlédnutí 44KPřed 15 hodinami
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL...
Learn to Hack AWS & Cloud Security
zhlédnutí 26KPřed 17 hodinami
jh.live/hacktricks-arte || Get hands-on with AWS Red Teaming and tackle the HackTricks Training and ARTE course! jh.live/hacktricks-arte Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/...
These Files Don't Show Their Extension
zhlédnutí 46KPřed dnem
jh.live/snyk || Try Snyk for free and find vulnerabilities in your code and applications! ➡ jh.live/snyk Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset WATCH MORE: Dark Web & Cybercrime Investigations: czcams.com/video/_GD5mPN_URM/video.html 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE ...
Hackers Abuse Zero-Day Exploit for CrushFTP
zhlédnutí 66KPřed 21 dnem
jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email...
This File Steals Passwords
zhlédnutí 104KPřed 21 dnem
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Hackers Use Github For Malware
zhlédnutí 67KPřed 21 dnem
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEW...
Finding WEIRD Devices on the Public Internet
zhlédnutí 188KPřed 28 dny
jh.live/censys || Get started with the leading Internet Intelligence Platform for threat hunting and attack surface management find what is exposed out on the open Internet with Censys! jh.live/censys Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com Read The Hacker Mindset by Garret Gee: jh.live/hackermindset 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPOR...
Government Unveils Malware Analysis Tool, But...
zhlédnutí 23KPřed měsícem
CISA's Malware Next-Gen: www.cisa.gov/resources-tools/services/malware-next-generation-analysis Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreon 🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor 🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagr...
Bypassing SmartScreen on Web Browsers
zhlédnutí 57KPřed měsícem
jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform keep your users, your data, and your environment secure with Keeper! jh.live/keeper Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com 📧JOIN MY NEWSLETTER ➡ jh.live/email 🙏SUPPORT THE CHANNEL ➡ jh.live/patreo...
Telegram Has Been Hacked
zhlédnutí 201KPřed měsícem
Telegram Has Been Hacked
I Hacked The Cloud: Azure Managed Identities
zhlédnutí 60KPřed měsícem
I Hacked The Cloud: Azure Managed Identities
Scraping Dark Web Sites with Python
zhlédnutí 123KPřed měsícem
Scraping Dark Web Sites with Python
How Hackers Can Hide PowerShell in Environment Variables
zhlédnutí 59KPřed měsícem
How Hackers Can Hide PowerShell in Environment Variables
Malware & Cybersecurity Threats on the Horizon
zhlédnutí 62KPřed měsícem
Malware & Cybersecurity Threats on the Horizon
Hackers Hide with Clever Alternate Data Streams
zhlédnutí 76KPřed měsícem
Hackers Hide with Clever Alternate Data Streams
The Apex Legends Hacker: Destroyer2009
zhlédnutí 115KPřed měsícem
The Apex Legends Hacker: Destroyer2009
Github Copilot Made My Code More Vulnerable
zhlédnutí 54KPřed měsícem
Github Copilot Made My Code More Vulnerable
Malware Analysis & Threat Intel: UAC Bypasses
zhlédnutí 64KPřed měsícem
Malware Analysis & Threat Intel: UAC Bypasses
Hackers Can Phish with PLAINTEXT QR Codes
zhlédnutí 62KPřed měsícem
Hackers Can Phish with PLAINTEXT QR Codes
How Hackers Compromise BIG Networks (with NetExec)
zhlédnutí 106KPřed měsícem
How Hackers Compromise BIG Networks (with NetExec)
The Apex Legends Hack.
zhlédnutí 114KPřed 2 měsíci
The Apex Legends Hack.
Finding WEIRD Typosquatting Websites
zhlédnutí 291KPřed 2 měsíci
Finding WEIRD Typosquatting Websites
Don't Use CyberChef. Use This Instead.
zhlédnutí 63KPřed 2 měsíci
Don't Use CyberChef. Use This Instead.
The Secrets of The Tor Browser
zhlédnutí 76KPřed 2 měsíci
The Secrets of The Tor Browser
Can a PDF File be Malware?
zhlédnutí 79KPřed 2 měsíci
Can a PDF File be Malware?
I Made Malware In Under 20 Minutes
zhlédnutí 62KPřed 2 měsíci
I Made Malware In Under 20 Minutes

Komentáře

  • @olegivanov9607
    @olegivanov9607 Před hodinou

    nice focus, clown.

  • @NickMaude
    @NickMaude Před hodinou

    The convincing and planning of the changes needed, is tricky. And then there are the toes the feel they are stepped on by recommending the changes.

  • @kickeddroid
    @kickeddroid Před 2 hodinami

    The sad part is the reluctance for the industry to secure their shit. And I still can't get a cybersec job. Eternal Blue Really? Lmao

  • @DeNikow
    @DeNikow Před 2 hodinami

    Really informative video! I'd like to see more of these and more technical.

  • @0xC47P1C3
    @0xC47P1C3 Před 3 hodinami

    Give me a golden ticket and your AD is mine

  • @fbifido2
    @fbifido2 Před 3 hodinami

    Can you show and explain how to fully secure active directory plus all machine/services in that domain? - AD domain service - AD Certificate Service - Domain jointed devices (PC, Laptop, Servers, printers, etc..)

  • @fbifido2
    @fbifido2 Před 3 hodinami

    how about show & tell ??? just taking about it is ok, but .....

  • @hexsh
    @hexsh Před 4 hodinami

    love my boy Hammond, another amazing vid

  • @Monkey_lol_
    @Monkey_lol_ Před 4 hodinami

    the tangled up cord is tickling my OCD in all the wrong ways

    • @takshashilacorporate9787
      @takshashilacorporate9787 Před 4 hodinami

      Why did you have had to point it out! Now, I can't get it out of my head!! ☹️😭😭

    • @Mauzy0x00
      @Mauzy0x00 Před 3 hodinami

      Glad I’m not the only one 😂

  • @HyperDroids
    @HyperDroids Před 4 hodinami

    This video was thoroughly interesting. Hope to see more of it in future. Great topics included relationship between NTLM Auth & Kerberos hashing (and dangers associated), EDR efficacy, ADCS, SMB hashing, LSASS, challenges corporate environments face with keeping their systems secure (theory vs practice), pentesting, OT segmentation, PCI compliance & segmentation, and so much more. Well worth watching for security professionals and any security conscious IT engineers.

  • @user-lz7dc5ef2m
    @user-lz7dc5ef2m Před 4 hodinami

    Sir number to ip ,fip ,address video please

  • @normal47712
    @normal47712 Před 5 hodinami

    Need more nameyourpricetraining truly awsome and affordable please keep up the support for it

  • @IndyAdvant
    @IndyAdvant Před 5 hodinami

    lol that tangled phone cable. brings me back

    • @Alfred-Neuman
      @Alfred-Neuman Před 4 hodinami

      That's pretty bad for my OCD! XD

    • @HyperDroids
      @HyperDroids Před 3 hodinami

      What makes it worse is that you know he affords better. 🤣

  • @InfixLyrics
    @InfixLyrics Před 5 hodinami

    1st comment :D like this if you're first ones.

  • @thomcr
    @thomcr Před 5 hodinami

    First

  • @bigupbassline58
    @bigupbassline58 Před 5 hodinami

    a whole video that's just a sponsor segment is WILD

  • @TheStevenWhiting
    @TheStevenWhiting Před 7 hodinami

    Another 27 min advert

  • @RedBigz
    @RedBigz Před 7 hodinami

    I completely didn't know the read command until yesterday, because I was trying to parallelize some cracking tools, and this gem pops up on my shorts. Awesome timing.

  • @yajusgakhar6969
    @yajusgakhar6969 Před 8 hodinami

    Apparently you didn't need to log in to merlin to go to his folder and cat out the user.txt file lol

  • @lalithagangaraju4
    @lalithagangaraju4 Před 11 hodinami

    can you share the link of volatility commands

  • @HadiALHalbouni
    @HadiALHalbouni Před 14 hodinami

    Can you please make a comparison video between it and the OSCP?

  • @reset5899
    @reset5899 Před 15 hodinami

    bro u fucking skid do an actual ctf or stick to malware "analysis" liveoverflow stacksmashing flashback team ur a joke now

  • @Sabagegah
    @Sabagegah Před 20 hodinami

    Fishing - Live Game

  • @TravelDude2
    @TravelDude2 Před 22 hodinami

    it just says fail and i cant make it to value 4

  • @oetken007
    @oetken007 Před 22 hodinami

    If you do not configure it willingly, devices in your LAN are not accessible from the WAN. The most problematic devices are these, connected to a cloud, because you have no control over the interfaces. If the cloud is compromised, all devices are as well. If you use webcams, buy them from big brands like DLink, Panasonic, Mobotics, Hikvision.... Think twice where you want to place a webcam as well. Not in the bedroom etc...

  • @angelolorenzoni
    @angelolorenzoni Před dnem

    I swear to god that I was on that forums some years ago and there is a profile of someone that is in the FBI with real photos and some access to the site, def. that site is driven by FBI

  • @Mrshutter
    @Mrshutter Před dnem

    What is this a honeypot after raid forums was taking down?

  • @nezu_cc
    @nezu_cc Před dnem

    He couldn't control the inner weeb when he saw Crunchyroll, classic

  • @maxbd2618
    @maxbd2618 Před dnem

    Sponsored by Flare! (and Nulled)

  • @atrizzstinks
    @atrizzstinks Před dnem

    every tool nowadays try to flex with how it's made in rust 🤦

  • @AkiiiMatcha
    @AkiiiMatcha Před dnem

    Super fun video! Thanks for making this. :)

  • @brandoncpk
    @brandoncpk Před dnem

    At 8:17, whats the difference between valid account and phishing?

  • @MyMomCallsMeCyb3rMan

    Cyber crime hurts people's feelings, don't do it.....

  • @harleymandk
    @harleymandk Před dnem

    I think the source code for the site is outthere - so a new one is open soon ;-)

  • @dooleve
    @dooleve Před dnem

    Take a shot every time this guy says "drill down into" or "dig into"

  • @TrulyChxse
    @TrulyChxse Před dnem

    Nice

  • @theGreatCommenterofYoutube

    My god just get into the video

  • @radscientist
    @radscientist Před dnem

    I've gotten a bunch of these as well as the "Thank you for your payment" with a <fake> transaction number that is a link and, of course, a downloadable file. They are usually sent from a Gmail address with a person's name and the sender's name is different.

  • @fnomari
    @fnomari Před dnem

    how to get it back??

  • @floppa.flo88a
    @floppa.flo88a Před dnem

    Jesus loves you John

  • @amankishore900
    @amankishore900 Před dnem

    Keep it up I want more such type of videos basically on these topics

  • @constantitus
    @constantitus Před dnem

    ok, now read the second line in the file

  • @dvsur
    @dvsur Před 2 dny

    I watched ThioJoe Videos about this

  • @user-yq9fg9xv9l
    @user-yq9fg9xv9l Před 2 dny

    How run this payload on over internet..?

  • @_tr11
    @_tr11 Před 2 dny

    it's so fun to write scripts to fill their databases with garbage bro

  • @foundmedia
    @foundmedia Před 2 dny

    hey man, i'm going to repeat what a few other commenters said, you should edit this video to remove that one "weird" website because showing the link is technically distribution of cp. NOT visiting the website myself, just relaying what other commenters saw when they visited the site out of curiousity, maybe you didn't even realize what you were looking at because you laughed it off so easily in this video.

  • @cyber_space09
    @cyber_space09 Před 2 dny

    Hmm🫠 you found Minecraft server 😂

  • @GrumpyGrebo
    @GrumpyGrebo Před 2 dny

    Honestly these websites have been honeypots from the start. You do not simply advertise yourself as a HaCkINg FoRuM on the WORLD WIDE INTERNET. Literally all of the hacking platforms that are available on this platform are honeypots. The owners will cry for enough cash, all of your activity is public, and the infrastructure is assumed compromised by default. Anybody using them is ignorant at best.