COBALT STRIKE Forensics: PCAP & Memdump - "Strike Back" HackTheBox University CTF 2021

Sdílet
Vložit
  • čas přidán 11. 09. 2024
  • Join HackTheBox and start rooting boxes! j-h.io/hackthebox
    Find some tips and tricks on their blog! j-h.io/htb-blog
    For more content, subscribe on Twitch! / johnhammond010
    If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    PayPal: paypal.me/john...
    E-mail: johnhammond010@gmail.com
    Discord: johnhammond.or...
    Twitter: / _johnhammond
    GitHub: github.com/Joh...
    If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/g... (disclaimer, affiliate link)

Komentáře • 86

  • @_JohnHammond
    @_JohnHammond  Před 2 lety +95

    UPDATE: HackTheBox has let me know that in the official University CTF game, (NOT my sandbox), they corrected the unintentional after the first couple of hours. The PDF was removed from the process dump, the downloadable was updated and the flag was changed -- so, the "unintentional" that I showcase in the first 10 minutes using Cobalt Strike would NOT have worked for you if you played the CTF after that. Sorry! The Cobalt Strike analysis is much cooler anyway 😎

    • @jacobelliott2420
      @jacobelliott2420 Před 2 lety

      I discovered this when I came back to it after downloading it earlier in the day and immediately found the PDF and felt like I had an easy win. Cue my sadness which they said "Flag Is Incorrect" 😢

    • @splintercelian
      @splintercelian Před 2 lety

      Same as Jacob. Flag wasn't working by the time someone from our team tried to submit it. But I get that for educational purpose it was better to modify the chall and go for the win with the intended way to solve the chall

    • @logiciananimal
      @logiciananimal Před 2 lety +2

      It introduces an interesting "teachable moment" about how sensitive Windows memory dumps can be.

  • @DavidAlvesWeb
    @DavidAlvesWeb Před 2 lety +67

    We should appreciate the fact that besides everything he has on his plate, he still manages to find time to create and upload these awesome educational videos for us!
    He's just the GOAT! ♥

  • @heatherryan9820
    @heatherryan9820 Před 2 lety +6

    I wasn't bored at all, this is real life. You could have edited it and made it look like it was plain and simple, but you didn't. You showed the process of learning, which I think is really important.

  • @SecTechie
    @SecTechie Před 8 měsíci

    John you crank out some of the best videos anywhere! Interesting, thorough and educational. Thanks.

  • @sweelyroot1779
    @sweelyroot1779 Před 2 lety +17

    Finally a new video John 😊

  • @b4nd1t02
    @b4nd1t02 Před rokem +1

    Hey John! I wanted to thank you for putting this together. This made going through a Cobalt Strike beacon very enjoyable and I learned a lot from this. Given how prevalent CS usage is these days, the ability to decrypt the traffic during analysis is very important and the walkthrough has been useful for outside the CTF purposes.

  • @gratefulnoumena1254
    @gratefulnoumena1254 Před rokem +1

    This was thoroughly interesting and enjoyable to watch ... Especially interesting because I'm threat hunting an active ransomware threat at work that's leveraging cobolt strike with the lockbid 3 ransomware payload at work
    Also pretty sure that in the past few months of watching a hand full of your videos I have heard you say the word showcasing More times than I have said in my entire life

  • @Docsfortune
    @Docsfortune Před 2 lety +2

    I forget which challenge it was, but it was one of the first 10 you do when loading into picoCTF. I completely bypassed the entire point of the challenge by finding the key with a phd [filename] and scrolling up. The key was in the far right column. PHD is a "pretty hex dump". I was supposed to use python or normal commands to interact with the file and ask it for help (which i did afterwards), but instead I bypassed all of that and found the key anyway in less than a minute.

  • @chrisclark5135
    @chrisclark5135 Před 2 lety +4

    This was sick and SUPER helpful! Thanks John! More like this, more like this, more like this!!

  • @BrenDinner
    @BrenDinner Před 2 lety +4

    You just get me in the mood for netsec! Thanks for being my source of motivation, you’re awesome!

  • @_CryptoCat
    @_CryptoCat Před 2 lety +6

    all the hard challs as well plz 🥺

  • @tobjasr6034
    @tobjasr6034 Před 2 lety +8

    informative and fun as always! =) thanks John!

  • @MrRandomg23
    @MrRandomg23 Před 2 lety

    I am just amazed that John churns out this kind of content for free, so much respect for you John, Thanks so much

  • @jackysmith1376
    @jackysmith1376 Před 2 lety +2

    I love your content. It's raw. I like it when you 'Learn on the fly'. When you learn, I learn. We learn together. From South Africa.

  • @davidmiller9485
    @davidmiller9485 Před 2 lety +1

    As someone who used to frequent Usenet back in the 90's, Scriptkiddy has really changed definition since it was originally used. (to be honest the first time i heard it was on a BBS back in the 80's.) I'm really getting old.

  • @ok-jq1jh
    @ok-jq1jh Před 2 lety +1

    lmfao when the shell autocompletes the whole key your reaction is just like the dude in the meme spazzing out in his chair xD

  • @Rojawa
    @Rojawa Před 2 lety +9

    John remebered his password again

    • @kylekelley1450
      @kylekelley1450 Před 2 lety +4

      He should add it to the rockyou wordlist, so he doesn't run into that issue anymore.

    • @viv_2489
      @viv_2489 Před 2 lety

      @@kylekelley1450 😂😂

  • @notalessandro
    @notalessandro Před 2 lety

    7:50 the way he said "...or whatever learning value." in a very disappointed way made me laugh lol

  • @timothybadenach2411
    @timothybadenach2411 Před 2 lety +1

    Mr hammond, you make me feel inspired and daunted at the same time lol.

  • @ilikeapple8551
    @ilikeapple8551 Před 2 lety

    Thank you for not editing anything out of it xD

  • @sliceoflife5812
    @sliceoflife5812 Před rokem

    Equally impressive as it is terrifying.

  • @ca7986
    @ca7986 Před 2 lety +1

    Love your work John!

  • @ethanhermsey
    @ethanhermsey Před 2 lety +1

    Soooo... I just watched jurassic park again.. Dr. John Hammond.. :p

  • @NeverGiveUpYo
    @NeverGiveUpYo Před rokem

    Great video as usual.

  • @0xmoaz
    @0xmoaz Před 2 lety +1

    finally a new video

  • @sprBEAST211
    @sprBEAST211 Před 2 lety +3

    At this point if John is a script kiddy then I'm a bacteria on a fleck of worm 💩

  • @andyli
    @andyli Před 2 lety

    John is back!

  • @talbaraz8916
    @talbaraz8916 Před 2 lety +1

    Great Video as always!
    The only part I was a little confused is when you used the 69-byte key extracted from the PCAP file to get the HMAC and AES keys,
    would have it worked with any of the other keys, or did you just get a lucky pick?

  • @burekhacks
    @burekhacks Před 2 lety

    the laugh at 27:25 at reading BEEF lol

  • @peterzudel2420
    @peterzudel2420 Před 2 lety

    I super appreciate your Tshirt John.

  • @JamesCollins90
    @JamesCollins90 Před 2 lety

    The thing that baffles me is when he finds a certain type of file... and then proceeds to know exactly what to do with it, and 8 different tools that can read it and what each one does differently. When I attempted hackthebox back along, I acquired a file, then had 0 clue what it was or what to do with it... I got as far as opening in notepad and gave up.
    Ways to go me thinks.

  • @hmod7389
    @hmod7389 Před 2 lety

    I am so happy! At least one good thing about this Monday.

  • @FOGGY_403
    @FOGGY_403 Před 2 lety +2

    Australia Gang, 2AM Gang!

  • @zikkthegreat
    @zikkthegreat Před 2 lety +4

    i -think- his name is pronounced “d-d-a” or deedee-eh, but no idea where the emphasis goes. love these vids btw, thanks for sharing them with us. i learn a lot

  • @viltran
    @viltran Před 2 lety

    Amazing skill there. Love it.

  • @JB4lly
    @JB4lly Před 2 lety +3

    Hi John, thank you for another video! Why did you set it to unlisted?

  • @pinaibig
    @pinaibig Před 2 lety

    Thank you !!!!!

  • @hannahprobably5765
    @hannahprobably5765 Před 2 lety +1

    OWWWW F...... YEAH :)

  • @securityresearcher3336
    @securityresearcher3336 Před 2 lety +1

    Bro where were you. Your last video was dated 1 month ago. I was waiting long for your video. Nice Video BTW.

  • @0xissam
    @0xissam Před 2 lety

    finally you're back god

  • @BatikanDulger
    @BatikanDulger Před 2 lety

    Sick!

  • @VickyKumar-jg2lc
    @VickyKumar-jg2lc Před 2 lety

    John ur real motivator for me

  • @TheH2OWeb
    @TheH2OWeb Před 2 lety

    Thank you John !

  • @maside7165
    @maside7165 Před 2 lety

    Finally back. Thanks for the entertainment

  • @DcWHaT07
    @DcWHaT07 Před 2 lety

    John love the videos thanks for everything you gave put out. I have learned so many softwares from just watching. Doing write ups watching you, so helpful on understanding where you go and why. Although! Don’t make us wait a month! Hope all is well.

  • @cybersecurity3523
    @cybersecurity3523 Před 2 lety

    That's was very good bro keep going

  • @teddybear9152
    @teddybear9152 Před 2 lety

    Can't wait!

  • @ryanng55aa
    @ryanng55aa Před 2 lety

    Nice video! Learnt a lot!

  • @jaxson8262
    @jaxson8262 Před 2 lety

    NICE work john !

  • @keithmwesigwa9742
    @keithmwesigwa9742 Před 2 lety

    I just can't wait :D

  • @rdp8545
    @rdp8545 Před 2 lety

    Late to the party but this was great!

  • @vasquezitosanchezito
    @vasquezitosanchezito Před 2 lety

    Fantastic!

  • @mrrobot1o1
    @mrrobot1o1 Před 2 lety

    Lol i have used cobalt so that was really relatable for me. now i'm gone decrypt my traffics what i have done with my bacons.

  • @abepl
    @abepl Před 2 lety

    you should have a T-shirt with "If I can type" written on it

  • @jorgevilla6523
    @jorgevilla6523 Před 2 lety

    Great to see ctf again. But love all your content.

  • @hossainratul9221
    @hossainratul9221 Před 2 lety

    What microphone are you using by the way? :p

  • @debarghyadasgupta1931
    @debarghyadasgupta1931 Před 2 lety

    With John Black Friday is 24x7x365 😇😁🙏. Respect 🤗😇

  • @fannah24
    @fannah24 Před 2 lety

    Holy crap that was cool

  • @TechnologyMakers
    @TechnologyMakers Před 2 lety

    i love you jooohn

  • @rationalbushcraft
    @rationalbushcraft Před 2 lety

    Hahaha I thought the dump file for the key about 30 seconds before you did. That is a first as you move so fast most of the time I am just trying to keep up.

  • @nagaprasadvr2893
    @nagaprasadvr2893 Před 2 lety

    Nice one

  • @kevinmitnick6423
    @kevinmitnick6423 Před 2 lety

    Could you share that how did you set up your zsh shell? Many thanks!

  • @user-ux7sy9jf4o
    @user-ux7sy9jf4o Před 2 lety

    Amazing video, thank you for the instructive tips!

  • @cater1337
    @cater1337 Před 2 lety

    awesome

  • @stupiduser6646
    @stupiduser6646 Před 2 lety

    XII Blimp Fleet isa Final Fantasy reference.

  • @autumnqoqo
    @autumnqoqo Před 2 lety

    Nice

  • @Docsfortune
    @Docsfortune Před 2 lety

    15:20 The moment he messed up, and downloaded the malware.

  • @notmyname1486
    @notmyname1486 Před 2 lety

    commenting for the algo,

  • @gacekkosmatek
    @gacekkosmatek Před 2 lety

    lets fucking goo

  • @osman_gedik
    @osman_gedik Před 2 lety

    Can you please create a playlist named forensics?
    I really hope you do more forensics stuff in the future.
    Thanks in regards :)

  • @XiSparks
    @XiSparks Před 2 lety

    Such good content!

  • @fedorp4713
    @fedorp4713 Před 2 lety

    Oh, you're still alive?

  • @kele9127
    @kele9127 Před 2 lety

    Hi John

  • @AXE0710
    @AXE0710 Před 2 lety +2

    It's been a long time since last video,
    What took you so long 🤔

  • @bhaitabahi786
    @bhaitabahi786 Před 2 lety

    waiting for explanation i struggled a lot in forensics

  • @The_Privateer
    @The_Privateer Před 2 lety

    I'm curious what your definition of 'Forensic' is... since there is nothing about this that is actually 'forensics.'
    Data analysis? Yes. 'Forensics'. No.

  • @IAmCandal
    @IAmCandal Před 2 lety

    Ive been doing this for 3 years never found a bug. Im done :)

  • @mikitawagner6694
    @mikitawagner6694 Před 2 lety

    only 2 dislikes XD