How Hackers Can Hide PowerShell in Environment Variables

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 71

  • @polycapmuniu8494
    @polycapmuniu8494 7 місяців тому +18

    This video is eye-opening! It's crazy to see how hackers can use something as innocuous as environment variables to hide malicious PowerShell commands. The level of sophistication in cyber attacks is just mind-boggling. Understanding these tactics is crucial for staying safe online. Thanks for the insightful breakdown! Time to up my cybersecurity game.

    • @_JoeVer
      @_JoeVer 7 місяців тому +22

      thanks, chatgpt, very cool!

    • @xenostim
      @xenostim 7 місяців тому +3

      yeah, why have chatgpt write this comment?? lmao

  • @abdirahmann
    @abdirahmann 7 місяців тому +12

    This is a very NEAT technique, did you stumble upon this technique in the wild being used by some bad actors?, how did you come up with it, Its really nice. I LOVED IT

  • @NB-ph6cv
    @NB-ph6cv 7 місяців тому +2

    Im really happy to see you grow, I have recommended you to a "thousand" others and now I see u got 1.3 m subs which is AMAZING. Keep on what ur doing! Greetings!

  • @jacobfreeman8904
    @jacobfreeman8904 7 місяців тому +3

    Its Because PSModulePath include another Environment Variable (%ProgramFiles%)

    • @dyerseve3001
      @dyerseve3001 7 місяців тому +3

      It's because for some reason his Python generated powershell in sublime PSModulePath starts with the fixed system paths, C:\Program Files\W (17).
      Later he starts running the code at a powershell terminal and the output includes his user profile path and things work now, but previously he generated code in sublime then copied to powershell and the indexed were different.
      Besides it should be excluded since it has a user profile path depending on the context it is executed in. In both user and admin terminal i got the user profile, only at system context i did not, so maybe sublime runs python in a funky psuedo-user context. For an exploit that might run as system or admin, best to strike PSModulePath as a candidate .

  • @valorsec
    @valorsec 7 місяців тому +8

    Please bring a video on the new xz malware discovered

    • @baeg1689
      @baeg1689 7 місяців тому +1

      i agree

  • @aadishm4793
    @aadishm4793 7 місяців тому +4

    Great video, seems like a good way to obfuscate commands!

  • @dyerseve3001
    @dyerseve3001 7 місяців тому +1

    As i understand reverse engineering, which is very little admitedly. This is how hackers optimize building ROP gadgets. If you get a fixed number of bytes to add to the execution stack, you make sure that what is added is entirely built from other sections of the static mapped memory, because specific strings of assembly will be in fixed locations to reference. So instead of creating code that takes several bytes you just point to a chunk of that already in memory, thereby keeping the exploit within that limited stack space required to maintain the overflow or use after free or whatever tactic the codespace was permitted to hit the stack without the kernel overflowing. Stringing multiple gadgets together creates a ROP chain which is the set of functions you need the exploit to do.

  • @liamcoates4890
    @liamcoates4890 7 місяців тому

    You disappeared off my algorithm then I tried to remember ur name when I saw the xz hack and then I see u have 1.3 milli subs, you had 350k last time I watched a vid, killin it!!!

  • @YuKonSama
    @YuKonSama 7 місяців тому +2

    If you have variables that only have the user name as a variable path, you could for example use string splitting on \ to get more options.

  • @josecintron85
    @josecintron85 7 місяців тому

    this is a great idea... now i just need to translate python to PS to make it work on any Windows environment. Usually I don't have python available on Windows systems during tests.

  • @MikeyMacc
    @MikeyMacc 7 місяців тому

    One form of obfuscation could even be caps, powershell should be case insensitive

  • @NotMolly-jf2rh
    @NotMolly-jf2rh 7 місяців тому +2

    Love you, dude. I am continuously hacked. Dangerous stalker. I have managed to thwart him a few times thanks to vids like this, many are yours! 🌹

  • @ronin0x_
    @ronin0x_ 7 місяців тому +1

    John please make a video on the xz utils vulnerability and on Jia Tan😭

  • @xYarbx
    @xYarbx 7 місяців тому

    Did this idea come from a sample or just random thought ? Also nice to have more of the red team POV stuff. I've been trying to improve on red side since I've been made part of purple team and stuff like this is helping me make the mental shift.

  • @vlado8587
    @vlado8587 7 місяців тому +1

    TNX bro

  • @jamesroycoronel4987
    @jamesroycoronel4987 7 місяців тому +1

    Watching right now❤

  • @boogieman97
    @boogieman97 7 місяців тому

    You have built a nice very pythonic conditional christmas tree 😊😊

  • @wickedwidget3812
    @wickedwidget3812 7 місяців тому

    I am new to coding so all of this has been informative but very confusing to me. I need to start from the beginning of your videos I guess lol

  • @ndoomTech
    @ndoomTech 7 місяців тому

    love the content!! keep killing it! what keyboard are you using in the newish setup?

  • @Braint-lr6uf
    @Braint-lr6uf 7 місяців тому

    It's worrying the lack of Jurassic Park references.

  • @cyber_space09
    @cyber_space09 7 місяців тому

    This video is interesting and enthusiastic 😁😂

  • @women-mw1uh
    @women-mw1uh 7 місяців тому +1

    Cool video keep it up

  • @exploittutorial8689
    @exploittutorial8689 7 місяців тому +5

    where do you get windows iso to run in vmware or virtualbox, the official site offers 22GB zip which is unreasonable

    • @DS6Prophet
      @DS6Prophet 7 місяців тому +6

      In case my previous comment got deleted for whatever reason, I'll say again: The default ISO from Microsoft's website is about 5-6 GBs. You just download that & install it on virtual box normally. Don't waste time with the "optimized for VM" ISOs.

    • @curious_hrk
      @curious_hrk 7 місяців тому +2

      Media Creation Tools from Microsoft let's you make an iso of windows

    • @robotron1236
      @robotron1236 7 місяців тому +1

      I’ve never once heard of any OS being that large; even something as bloated as windows.

  • @stollenjack6699
    @stollenjack6699 7 місяців тому

    THANKS YOU

  • @carsonjamesiv2512
    @carsonjamesiv2512 7 місяців тому +1

    YES!😃

  • @petko9001
    @petko9001 7 місяців тому

    Thanks for the great video John, I would like to see what kind of setup you are using (home lab, personal rig, laptop etc.). Can you do a home lab, everyday carry video? I think it will be very interesting and inspiring for the community

  • @whoami8234
    @whoami8234 7 місяців тому

    So helpful

  • @houseofcards251
    @houseofcards251 7 місяців тому

    Great stuff. I would like to know how this looks in the event logs. Does it just show the env variables or does it show the cmdlet being run?

  • @chiragartani
    @chiragartani 7 місяців тому

    Going to watch the video. Will ask if I want to know something

  • @SatoshiSky
    @SatoshiSky 5 місяців тому

    Love the python content

  • @joe-skeen
    @joe-skeen 7 місяців тому

    It would be fun to run this on PowerShell Core in Linux or Mac 😂

  • @jimo8486
    @jimo8486 7 місяців тому +33

    😂 powershell_command = 'Write-Output 420'

  • @warlordkeys
    @warlordkeys 7 місяців тому

    leaking my sauce man :( - +10/10 video

  • @ElvisLamAsia
    @ElvisLamAsia 7 місяців тому +2

    Use a debugger bro :D

  • @xAngryDx
    @xAngryDx 7 місяців тому

    You are naughty boy John

  • @rogerioabreu3081
    @rogerioabreu3081 7 місяців тому

    is this really useful if my environment is hardened?

    • @dyerseve3001
      @dyerseve3001 7 місяців тому

      Not to be harsh, but if you don't know, I wonder how hardened your stuff is. This was just an exercise in obfuscation, an attacker would already need a way to execute powershell code on your hardened system.

    • @rogerioabreu3081
      @rogerioabreu3081 7 місяців тому

      @@dyerseve3001 haha yep! Thanks for your reply. That's why I asked. I don't have any environment. I am just studying. some measures:
      Allsigned in the execution policy, no downgrade, ConstrainedLanguage, JEA, no powershell removing,WDAC Policy. Moreover, I could enable the various types of powershell logging in order to catch the execution of this obfuscated command.

  • @brizzelsprout
    @brizzelsprout 7 місяців тому

    fun!

  • @omaroumessaoud8268
    @omaroumessaoud8268 7 місяців тому

    The icons are so big😅

  • @nionioniosmeg
    @nionioniosmeg 7 місяців тому

    Activate Windows got me

  • @gavinmicks227
    @gavinmicks227 7 місяців тому

    Why is there so many ai written comments on this….

  • @xyssxy
    @xyssxy 7 місяців тому +1

    video content is good, but python code quality terrible

  • @exploittutorial8689
    @exploittutorial8689 7 місяців тому +2

    i tried brute-forcing dvwa with hydra but wont work. I had to build a custom script can someone send me the command

  • @webdashnews1211
    @webdashnews1211 7 місяців тому

    make a video on how to detect hacking script which is in encoded javascript , i saw a pastebin post which can hack peoples crypto from g2a account scamming people via encode js code malicious

  • @shakibbro2
    @shakibbro2 7 місяців тому

    please 1 video how to hacked gmail password please please new video
    🙏🙏🙏🙏🙏🙏

  • @romansovetskikh7902
    @romansovetskikh7902 7 місяців тому

    I'm not trust snyk.

  • @b1U3b0i
    @b1U3b0i 7 місяців тому +2

    I guess first

  • @exploittutorial8689
    @exploittutorial8689 7 місяців тому

    420😄

  • @aadishm4793
    @aadishm4793 7 місяців тому +1

    I guess I am first😀

  • @setup.repair
    @setup.repair 7 місяців тому

    Python... wtf

    • @Alfred-Neuman
      @Alfred-Neuman 7 місяців тому +1

      He's using Python, the programming language...
      It's not a snake so don't worry it's not going to bite you!

    • @exploittutorial8689
      @exploittutorial8689 7 місяців тому

      LOL where have you been

    • @Hepad_
      @Hepad_ 7 місяців тому

      What's wrong with python ?

    • @Alfred-Neuman
      @Alfred-Neuman 7 місяців тому

      @@Hepad_
      He's probably thinking: "Why would you spend 30 minutes writing this python script when you can spend 2 days writing a C++ code that will do the same exact thing?" lol