catch EVERY reverse shell while hacking! (VILLAIN)

Sdílet
Vložit
  • čas přidán 14. 07. 2024
  • Dive in to the HackTheBox CPTS: Certified Penetration Testing Specialist training at HTB Academy! j-h.io/htb-cpts
    Check out Villian: github.com/t3l3machus/villain
    Help the channel grow with a Like, Comment, & Subscribe!
    ❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
    Check out the affiliates below for more free or discounted learning!
    🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
    💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
    🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering j-h.io/zero2auto
    ⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training j-h.io/escalate
    👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
    📗Humble Bundle ➡ j-h.io/humblebundle
    🐶Snyk ➡ j-h.io/snyk
    🤹‍♀️SkillShare ➡ j-h.io/skillshare
    🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
    📧Contact me! (I may be very slow to respond or completely unable to)
    🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
    🚩 CTF Hosting Requests ➡ j-h.io/ctf
    🎤 Speaking Requests ➡ j-h.io/speaking
    💥 Malware Submission ➡ j-h.io/malware
    ❓ Everything Else ➡ j-h.io/etc
    00:00 Villain
    02:21 About Villain
    04:17 Setup
    04:50 Shellcrafting
    07:42 Sending the payload
    09:09 Multiplayer hacking
    11:55 HQ Ownership
    15:59 A few more features
    16:53 Final thoughts
    18:05 Closing out

Komentáře • 243

  • @_JohnHammond
    @_JohnHammond  Před rokem +71

    DID YOU KNOW that (obviously intentionally) placing a TYPO within the first THREE seconds of your video helps increase audience engagement and boosts your videos in the algorithm?????///
    Please do take a look at all of the sweet stuff that HTB Academy's Certified Penetration Testing Specialist has to offer!! j-h.io/htb-cpts

    • @builder481
      @builder481 Před rokem +2

      Hey John are you going to do Advent of Cyber for 2022?

    • @gg-gg-gg-gg
      @gg-gg-gg-gg Před rokem

      John you should consider uploading your videos to Nebula, you'd make a good addition

    • @gamingravan1713
      @gamingravan1713 Před rokem

      how to remove that windows backdoor from your system

    • @builder481
      @builder481 Před rokem

      @@gamingravan1713 do you have a virus?

    • @gamingravan1713
      @gamingravan1713 Před rokem +1

      @@builder481 nope just trying to know what would be the solution for if I want it to remove from one of my windows vms

  • @HaxorTechTones
    @HaxorTechTones Před rokem +481

    The inspiration and "try harder" attitude to create Villain came from the video you made about hoaxshell. For that reason, as well as your remarkable effort to educate people in IT/Cybersec for a decade now, I dedicate Villain to you. Thank you🙏

    • @janmbaez
      @janmbaez Před rokem +12

      Really thank you marchus for creating this awesome tool, keep up the great work!

    • @brianb5723
      @brianb5723 Před rokem +2

      Thank you, you're a legend!

    • @Synceditxboxoffice
      @Synceditxboxoffice Před rokem +2

      i love you sir
      but one question how did you learn writing your own script
      can you start a series on this i have asked this to john hammond sir but he didn't respond to that at all
      so i want you to do it sir it will be really great for the people like me.

    • @__lasevix_
      @__lasevix_ Před rokem +2

      @@Synceditxboxoffice Try searching for python beginner tutorials

    • @dedsec5271
      @dedsec5271 Před rokem +2

      I know a legend when I see one 🫡

  • @Zerback
    @Zerback Před rokem +14

    Thank you T3l3Machus and John for the amazing tool and usual 10 out of 10 quality education !

  • @mar0ne220
    @mar0ne220 Před 9 dny

    You deserve every penny for this ad! best explain and show and currently on my cpts path!

  • @Boolap1337
    @Boolap1337 Před rokem +15

    I love his tools but I love even more your explanations and tutorials. You guys complement each other.

  • @vnm2514
    @vnm2514 Před rokem

    As always love to watch your videos and see how excited you are about new tools. Keep the great work up.

  • @tanja84dk1
    @tanja84dk1 Před rokem +7

    Thank you very much for showcasing that.
    Tbh I have actually really been looking for a framework like that to when ever I play ctf's ( specially if I ever are going to attend where its teams agenst teams ) so its great to have it in my tools folder

  • @Entre_Latidos
    @Entre_Latidos Před rokem +2

    Regards from Dominican Republic 🇩🇴. I think your channel is pretty cool and I've learned a lot since I found this Channel, I was stuck with the Reverse Shell thing, but thanks to you I got out of that corner, brother. THANK YOU!.

  • @StrokeMahEgo
    @StrokeMahEgo Před 11 měsíci +1

    Definitely love the multiplayer aspect, much like cobalt strike's team server concept. Very useful for actual red team engagements where there's multiple operators.

  • @konfushon
    @konfushon Před rokem +3

    the small differences in this video like the sound track used and the "waves shennanigans on John's head" at the bottom right corner is kinda slick though 👌

  • @janekmachnicki2593
    @janekmachnicki2593 Před 10 měsíci

    Great tutorial John H. Thanks for your effort to help less advanced hackers or IT lovers understand some of the tricks .

  • @struggle375
    @struggle375 Před rokem +1

    Damn John the production quality is on point!

  • @hongkonghacker
    @hongkonghacker Před rokem +3

    Windows defender already blocked those payload after few days later.

  • @grayshell8928
    @grayshell8928 Před rokem

    as always, great video John. Good tool for testing

  • @sam-sw8zw
    @sam-sw8zw Před rokem +2

    love your content
    the hacking b-role had me laughing this episode lol

  • @bawalicoder1233
    @bawalicoder1233 Před rokem +1

    totally loved the video😍 btw great editing

  • @johnb3170
    @johnb3170 Před rokem +2

    John from another John...you are a legend. Coming from and education and training background to cyber warfare now a security researcher. You encompass everything good in our industry. Keep it up! See you around!

    • @gezzadaverealstuffonlyboth8915
      @gezzadaverealstuffonlyboth8915 Před 5 měsíci

      Hey , I'm learning cyber warfare at the moment, but need some good software as I was helping a young mum getting bullied and was raped , so said I'll sort it out and protect your network till hes moves on , well he payed few different hackers , and they was good , 3 atack me from different countries, not sure if they new each other, but it took 3 days 2 hours sleep they burt out 4 laptop 3 pc towers , my 9 year old boys plug the earth burnt where it burst the plug like it was cheap plastic, I'm still with nothing but my phone, they got everything cloud haswell, so I lost everything's, and was going to give up, but seeing your comment, the only one in 7 years , so hi there and sorry for asking but my eyes lit up 🤝

  • @faran4536
    @faran4536 Před rokem +1

    Loved the video quality, especially your cam circle effects when you speak!

  • @Bobtb
    @Bobtb Před rokem

    Thanks for introducing this awesome tool John.

  • @gamblezz101
    @gamblezz101 Před rokem +1

    This is genius! Kudos to the dev.

  • @nixcutus
    @nixcutus Před rokem

    Used this tool last month and it was super dope.

  • @fdert
    @fdert Před rokem +1

    I like the new editing!

  • @waqxddgytdcvjj8678
    @waqxddgytdcvjj8678 Před rokem

    I’m as hyped as you John!

  • @karkantas
    @karkantas Před rokem +5

    Your content is improving like a super sayian after each video.

    • @_JohnHammond
      @_JohnHammond  Před rokem +1

      SUPER duper thankful for our new editor and the phenomenal work they are doing -- all credit to @Nordgaren!!

  • @JeffNoel
    @JeffNoel Před rokem +2

    Realizing your video is sponsored by HTB Academy is pretty cool! CPTS is probably my next thing to work on if I pass OSCP on December 12th :D

    • @_ismail8880
      @_ismail8880 Před rokem

      did you pass?

    • @JeffNoel
      @JeffNoel Před rokem

      @@_ismail8880 I did! I missed one flag but for the bonus points so 100/110 points.
      The course material is on point and is perfect to prepare your for the exam content.

  • @HerozTech
    @HerozTech Před rokem

    I love the new editing style❣

  • @MartinGaertner
    @MartinGaertner Před rokem

    Great howto! you a very good teatcher! perfect video, make more for this i love it!

  • @toolbgtools
    @toolbgtools Před rokem +1

    cool tool! and lot of room for improvements

  • @user-jg2zv1yr1z
    @user-jg2zv1yr1z Před rokem +1

    I like you very much Mr.John Hammond.
    You are always teach us new things.
    Thanks

  • @hawk__
    @hawk__ Před rokem +4

    A dude said in a previous vid of your "John doesn't need fancy thumbnails, has face does it all" and yeah it really does, man!
    Keep putting nice content 🙂, coool tool. That OTP thing is the coolest one.
    You haven't done any writeups lately though ;)
    + Video is nice enough, editing, music.
    If possible plz share pc specs the one which is running 1 host + 4 vms without any lag.

  • @adesopekingsley9967
    @adesopekingsley9967 Před rokem

    The most amazing thing to me is thar the whole script was written with python.... amazing 👏🙀 great to see this ... I subscribed

  • @DavidCosta85
    @DavidCosta85 Před rokem

    thanks for your videos. very much appreciated

  • @samfisher8426
    @samfisher8426 Před rokem

    i been using this for a week so far .. i have tested it on many OS versions ,windows 7 - 10 -11 / linux ,always bypass any fiirewall/defender never let me down ,the good thing that i can get multiple reverse shell just in one click ,without having to setup a new listener for each reverse shell payload ... thats really amazing tool

  • @cyberdevil657
    @cyberdevil657 Před rokem

    Aswome stuff Jhon I really respect you!

  • @sagiadir
    @sagiadir Před rokem

    Thank you ! its alway great to watch your videos !!!!!

  • @_AN203
    @_AN203 Před rokem +1

    Hey John..
    I am back !
    And that voice interactive background that you have on your thumb during the video...
    Does sell the HTB theme..
    And hey..
    Another C2 framework to the arsenal...
    Pretty cool..

  • @juliusrowe9374
    @juliusrowe9374 Před rokem +1

    Super dope content John!

  • @torsec6048
    @torsec6048 Před rokem +1

    And now john detailed video arrived :)
    go go john Hammond

  • @marineplaysairsoft
    @marineplaysairsoft Před rokem

    now THIS is verrrry niiiiiice

  • @refaiabdeen5943
    @refaiabdeen5943 Před rokem

    Cheers Mate.

  • @SatheeshJenne2658
    @SatheeshJenne2658 Před rokem

    Thank u so much.. please do more videos..

  • @Neuer_Alias_erstellen
    @Neuer_Alias_erstellen Před rokem +1

    something is slick:
    JohnH: that's cool

  • @kashoo_1
    @kashoo_1 Před rokem

    Thanks John ✌💥

  • @shenetworks
    @shenetworks Před rokem +1

    very cool!

  • @joaopaulomendesdecarvalho
    @joaopaulomendesdecarvalho Před 6 měsíci

    Great!

  • @a_h_m_e_d_43112
    @a_h_m_e_d_43112 Před rokem

    This is what i was waiting for

  • @trevor.viljoen
    @trevor.viljoen Před rokem +1

    This has a very Metasploit look and feel to it.

  • @tech_raj
    @tech_raj Před rokem

    Nice sir Thank you

  • @ChristopherEGr33n33
    @ChristopherEGr33n33 Před rokem

    0:02 the old reverse shell "hanlder" 🤣

  • @yacce4463
    @yacce4463 Před rokem

    This is cool, but relying on "curl" all the time? Would be awesome to have different revshell payloads relying on different programs. I've hit several machines where "curl" or "wget" wasn't available, mostly if running on a container environment.
    Awesome work t3l3machus and John!

  • @benary5620
    @benary5620 Před rokem +1

    That looks really interesting. Question: let's say I generate a linux payload and put it on my (remote) laptop; will it automatically connect if I start my local Villain _after_ that remote machine has run its crontab? Or would it be sufficient to run it every 5 (or so) minutes on the remote machine, so once I start my local Villain, it will take 4:59 secs max to connect (in that case, will the remote machine's crontab kill any active sessions once the payload runs again??)?

  • @michaelblenkinsop9038

    nice intro to HTB

  • @kal_dev
    @kal_dev Před rokem

    I like this one, fastly and easier

  • @memejamas3818
    @memejamas3818 Před rokem

    excelente tool thanks

  • @Rojawa
    @Rojawa Před rokem +2

    Just saw a talk about hoaxshell on which a penetrationtester was hyping it up so much only to not work anymore after two days because everyone burned the signature haha.
    So interesting to see the new shell framework. Lets see for how long its working on engagements :D

    • @Alexis82
      @Alexis82 Před rokem

      Powershell script blocked of internal antivirus!

    • @trustedsecurity6039
      @trustedsecurity6039 Před rokem

      @@Alexis82 lmao stop using buzz word like you know what it means

    • @trustedsecurity6039
      @trustedsecurity6039 Před rokem

      It was by the author... every open source tool will be burned like that

    • @Alexis82
      @Alexis82 Před rokem

      @@trustedsecurity6039 I know exactly what I'm saying, don't worry about me!

    • @trustedsecurity6039
      @trustedsecurity6039 Před rokem

      @@Alexis82 nope you dont...

  • @Pwnedby
    @Pwnedby Před rokem +1

    I’m building a software exactly like this. I have a few more feature than this but I might implement some techniques which was being used. Thank you for sharing this!

  • @fireloks6362
    @fireloks6362 Před rokem

    got it to work. I just needed to change permissions

  • @guilherme5094
    @guilherme5094 Před rokem

    Nice.

  • @ThatNateGuy
    @ThatNateGuy Před rokem +1

    Villain's output reminds me a lot of PowerShell. I dig. Thanks for showing this tool off, John! 🙂

  • @CodeAcademia00
    @CodeAcademia00 Před rokem

    i love it brother

  • @bbowling619
    @bbowling619 Před rokem

    a turtle in a turtle ? Dude is mentor !!!

  • @SumanRoy.official
    @SumanRoy.official Před rokem +1

    Great tool but they need to generate unique obfuscated payloads that bypass every AV and Security endpoints like Crowdstrike and others.

  • @theequalizer7297
    @theequalizer7297 Před 5 měsíci

    Thank you very much 🙏My S14 Flip laptop. I was working and left it for a few minutes. When I came back, I was surprised to be asked for a new PIN code and that the old one was disabled and could not be accessed (explorer.exe - System Error).
    The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application) I felt frustrated and spent 9 hours trying to solve the problem, but the problem was not solved, and I do not know what is the reason for this problem. By the way, it is a completely new laptop that has been in service for only 4 months, an Asus S14Flip Ryzen 5600 laptop, a Radeon card, and RAM. 8 JB and its performance was very slow when browsing websites, but I noticed that sometimes its temperature increased.

  • @jawadsher1062
    @jawadsher1062 Před rokem

    Hey John i think 🤔 this is help full in OSCP

  • @bulmavegeta23
    @bulmavegeta23 Před rokem

    awesome tool..

  • @ravananasuran
    @ravananasuran Před rokem

    then it is super helpful for battle ground in htb

  • @AnacardiumOcidentale
    @AnacardiumOcidentale Před rokem +1

    Very nice piece of tool. Does it runs on a Raspberry pi? Gonna try to install it on mine...

  • @neppusstreams
    @neppusstreams Před rokem

    Looks good! What happened to pwncat tho?

  • @drvoip
    @drvoip Před 10 měsíci

    Generating connectivity between two endpoints on a private network seems to be the dominant theme on CZcams. Educational and informative, but how about showing how any of the tools work over the Internet, with firewalls and the usual network basic security practices in place?

  • @alldev
    @alldev Před rokem

    I like the video but i have a simple question will it be a persist session or not

  • @larva5606
    @larva5606 Před 6 měsíci

    i took a shot every time he said "slick" 🥴

  • @Waferdicing
    @Waferdicing Před rokem

    💯

  • @auliarahman5399
    @auliarahman5399 Před rokem

    Nice

  • @ccrice1934
    @ccrice1934 Před rokem

    That is OP

  • @ulmaaulambayar7913
    @ulmaaulambayar7913 Před rokem

    super edited video

  • @corners1733
    @corners1733 Před rokem

    Cool

  • @imca_b_5517
    @imca_b_5517 Před rokem

    I feel illigal 😂

  • @brianb5723
    @brianb5723 Před rokem +2

    Another A+ incredible content and instruction step-through by John. I found the audio pulses around your camera preview a little distracting, though!

    • @_JohnHammond
      @_JohnHammond  Před rokem +2

      Good to note, thank you! We're experimenting with some of those new flashy video effects and thought we would test the water with the audio visualizer around the face cam. I had a thought it might be too distracting from the content, but wanted to try it in the wild. We will think on it and see if we can scheme up some other nice quality-of-life touches!

    • @HAGSLAB
      @HAGSLAB Před rokem

      I agree. Not a huge issue, but it was the first thing I noticed and not really in a good way. I've always appreciated the simplicity of your content. Simple as in few elements on screen and straightforward editing.

  • @jorisschepers85
    @jorisschepers85 Před rokem

    Great video again John, but please ditch the soundbars around the webcam feed.

    • @_JohnHammond
      @_JohnHammond  Před rokem +1

      Appreciate the feedback, thank you! We're experimenting with some of those new flashy video effects and thought we would test the water with the audio visualizer around the face cam. I had a thought it might be too distracting from the content, but wanted to try it in the wild. We will think on it and see if we can scheme up some other nice quality-of-life touches!

    • @jorisschepers85
      @jorisschepers85 Před rokem

      @@_JohnHammond you don't need all those flashy things. Content is A+. Keep doing you

  • @quintopecado3379
    @quintopecado3379 Před rokem +1

    I love this guy

  • @waheedmurad4223
    @waheedmurad4223 Před rokem

    Amzing learning videos Can please upload about Andriod 11 SDK payload that can live recorder camera and voice with screen sharing abilities with bypass playstore security

  • @waqxddgytdcvjj8678
    @waqxddgytdcvjj8678 Před rokem

    living in the movie where someone is in and others can participate

  • @abepl
    @abepl Před rokem

    aaahh "Hack The box" that's where i should go, thanks

  • @AgustinLozada
    @AgustinLozada Před rokem

    The example you shown are all on same subnet, what if its a segmented network?

  • @ibrahimyosif
    @ibrahimyosif Před rokem

    i love you john but please turn off sound wave thingy surrounding your frame.

  • @BobbyBobBob69
    @BobbyBobBob69 Před rokem

    Hey I don’t wanna sound stupid, but I can’t copy between my Kali vm and my Ubuntu vm? When I’ve got only one vm open the guest isolation can copy and paste but when there’s more then one I can’t?

  • @gokul5582
    @gokul5582 Před rokem +1

    My question is anyone of my victim will dare to paste suspicious lines on their cmd? Is there any other way to deliver it? Practically will it work?

  • @jeonghutamilim2259
    @jeonghutamilim2259 Před 11 měsíci

    If this works as intended, it could be great rat for headless servers or remotely assisting friends. Gotta play around.

  • @Insomnia_2311
    @Insomnia_2311 Před rokem +1

    Thanks John for the Education but I am afraid of that someone of this community would use this for bad things. I am not very sure how dangerous it would be using it on an enterprise network landscape by sending an inconspicuous attachment to an victim email-address ?

  • @tseringdolker8344
    @tseringdolker8344 Před 6 měsíci

    grt

  • @Hackedme-ce8fe
    @Hackedme-ce8fe Před rokem

    Just a question, can i do rce on servers using those generated payload?

  • @Naath000
    @Naath000 Před rokem

    i have done recently succesfull

  • @Leo_Aqua
    @Leo_Aqua Před rokem

    Can you make a video on how to get a reverse shell from a webserver without php?

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Před rokem

    Window paword+linux paword equal password attending and different tightening in the password, same password in the continue.

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Před rokem

    How many maintenance the handling files open

  • @maxbunnies
    @maxbunnies Před rokem

    Hi John can you tell me what Glasses you have :)

  • @zeloigl
    @zeloigl Před 11 měsíci

    what did u do at the cut at 4:49 im struggling to figure it out ive tried everything can anyone help it says module 'Crypto' not found so i checked the crypto file and the c is lowercase but doesnt let me change it to uppercase as it says file location was moved????

  • @syskey1402
    @syskey1402 Před rokem

    i see the excitment in you eyes lol!

  • @cirklare
    @cirklare Před rokem

    Good as your good looking hair

  • @cabbose2552
    @cabbose2552 Před rokem +1

    what software are you using for your webcam feed?