Instagram & Twitter OSINT - DownUnderCTF

Поділитися
Вставка
  • Опубліковано 4 лис 2024

КОМЕНТАРІ • 171

  • @dccybersec
    @dccybersec 4 роки тому +110

    Cheers for the shoutout! Great video mate

    • @cansofcoke
      @cansofcoke 4 роки тому +2

      I said out loud "hey he's talking about an Aussie cyber guy!" when he mentioned you :D Fellow cyber guy from syd here.

    • @dccybersec
      @dccybersec 4 роки тому +2

      @@cansofcoke yooo Australia represent! hahaha

    • @cansofcoke
      @cansofcoke 4 роки тому +1

      @john and @DC you guys going to do the Australian National Missing Persons Hackathon? :)

    • @dccybersec
      @dccybersec 4 роки тому +1

      @@cansofcoke Yes! The CTF team i'm a part of (HYPASEC) is participating this year :)

    • @cansofcoke
      @cansofcoke 4 роки тому

      @@dccybersec sooo awesome :) I'll see you there, i just signed up :)

  • @Zydent
    @Zydent 4 роки тому +125

    I solved this a different way actually. I just got the thought of sending her an email and she responded with another mail where she stated her full name. Love your content John!

    • @avgmean4187
      @avgmean4187 4 роки тому +61

      Lol, I sent her a formal business inquiry, spent like an hour setting up an online persona, bloating the account with bots and writing the message... The reply was automatic...

    • @TalsonHacks
      @TalsonHacks 4 роки тому +5

      avg bndt lol

    • @ultimate8673
      @ultimate8673 3 роки тому +5

      @@avgmean4187 😂😂😂😂😂😂😂

  • @adrianklamut8533
    @adrianklamut8533 4 роки тому +90

    I think this cell phone message is something like "meet me at 9 30" last digits were held down for little longer for digits to appear

    • @skynet1024
      @skynet1024 4 роки тому +30

      who are you so wise in the ways of science

    • @pennym6576
      @pennym6576 3 роки тому +4

      my thoughts exactly

  • @seclilc
    @seclilc 4 роки тому +6

    I really enjoy listening to your methodology so thanks for going down the rabbit hole and explaining every step

  • @satyamvirat3489
    @satyamvirat3489 4 роки тому +6

    Tbh, that was far most the best video by you.
    Unlike rest, you covered the rabbit hole parts and actually did tell us what to do if those holes were actually what we needed to find and work around (like audio extraction and decoding it)
    Thnks pal❤️

  • @Ayahalom123
    @Ayahalom123 4 роки тому +8

    Loved the video!! Your "thinking out loud" process allows me to learn even better than "straight to the punch" videos!

  • @selvinpaul7255
    @selvinpaul7255 4 роки тому +6

    Wow! Mind Blown!!! That's amazing Sir! 🙏 I had to setup a meeting with her on google calendar and that's how I got her middle name 😂

  • @mikeholmesdj
    @mikeholmesdj 4 роки тому +70

    John you always ask if we don't mind you talking so much. We watch your channel to listen and learn, so keep talking. Another great video btw.

    • @reyandutta
      @reyandutta 4 роки тому +3

      yaa.. his talking made me start off my infosec career, i was so inspired just by watching his videos

  • @Raformatico
    @Raformatico 4 роки тому +3

    It is great to have someone who takes your hand and guides you slowly through a challenge 👏😍 Thank you man!!!

  • @minuano8716
    @minuano8716 4 роки тому +6

    Phenomenal video. I don't know if you actually checked the write-ups after the CTF was finished but that t9 decoding that you did was absolutely necessary for a later challenge in the same CTF. You basically had the solution for "A turn of events /w some REALLY bad OPSEC". Great intuition there.

  • @gbravy
    @gbravy 4 роки тому

    Great video John. I appreciate all the depth you go down. The rabbit holes are always appreciated as well.

  • @InfosecGeekz
    @InfosecGeekz 3 роки тому +1

    Great Video John👍 Simply loved the way you extracted all the Juice😍

  • @pasangamage
    @pasangamage Рік тому

    that dialpad tones thing is important! thanks for sharing

  • @SageTheProfessor
    @SageTheProfessor 4 роки тому

    Man that was a rabbit hole but I'm glad you walked is through it.

  • @slaozeren8742
    @slaozeren8742 2 роки тому

    I watched this video twice. Not because I didn't understand it but because I loved it so much.

  • @antaresrepublic
    @antaresrepublic 3 роки тому

    I really like your take on the rabbit hole. Very interesting.

  • @tylerlwsmith
    @tylerlwsmith 3 роки тому +1

    That Sherlock tool is super nifty!

  • @jovi___
    @jovi___ 3 роки тому

    Im enjoying the longer videos and showing multiple tools

  • @sa-a7153
    @sa-a7153 4 роки тому +1

    Really appriciate the descriptions about the rabbit holes. I think much of learning is to do with understanding how to evaluate all of the choices and not just thinking around that there is that single solution that will work. Those old phones had the "push long for the nbr." thing, right? Meet me at 93?

  • @stevenhall2
    @stevenhall2 2 роки тому

    John, I like the fact that you walked us through your process. Long video or not, it shows what it took to complete a process of actually doing the required grunt work. Running into dead ends and learning to pivot on certain datasets is critical to the hunt! Thanks for unpacking all of this, the video is excellent for those who want to get good at OSINT exploitation!

  • @christinewinchester2031
    @christinewinchester2031 2 роки тому

    Thanks, John!

  • @manoharbaratam8792
    @manoharbaratam8792 4 роки тому +1

    I did hit the like button before even watching the video. Iam that much confident on JohnHammod content.. Love u john from India..

  • @gamingandanime9000
    @gamingandanime9000 2 роки тому

    No, This video has to be this long. This was amazing and so informative! 💯

  • @peterzenner2020
    @peterzenner2020 3 роки тому

    Your idea of extracting and decoding the DTMF was exactly my thought also... so I thought it was a viable search!

  • @stanislavsmetanin1307
    @stanislavsmetanin1307 3 роки тому

    Thanks for that DTMF thing.. I did not know about. 👍

  • @MrNomadBrad
    @MrNomadBrad 3 роки тому +1

    Would love to see some more OSINT videos using all the tools you know of.

  • @mehammered
    @mehammered 4 роки тому

    Your videos are the best, thanks!!!!!!! You tricked me on sherlock busting it out at the end.

  • @olidingin6398
    @olidingin6398 4 роки тому +1

    [20] Sebuah senyawa non volatil Z, digunakan untuk membuat dua larutan yang
    berbeda. Larutan A mengandung 5 g senyawa Z yang dilarutkan dalam 100 g air.
    Sedangkan larutan B mengandung 2,31 g senyawa Z yang dilarutkan dalam 100 g
    benzen. Larutan A mempunyai tekanan uap 754,5 mmHg pada titik didih air normal
    dan larutan B mempunyai tekanan uap yang sama pada titik didih normal benzen.
    Hitunglah massa molar dari senyawa Z pada larutan A dan B!

  • @Maniclout
    @Maniclout 4 роки тому +5

    I can't help but focus on your glasses the whole time and those light reflections reminding me of anime smart guy moments.

  • @binaryaction5
    @binaryaction5 4 роки тому

    Love the explanation of what you did

  • @bechararizk7245
    @bechararizk7245 4 роки тому +6

    02:09 that’s the undertaker...

  • @3rg1s
    @3rg1s 4 роки тому +1

    10:00 you can also drag the image and drop it on another tab so it opens the exact link and then you can see the photo without the login.

  • @mxbmvnvmbncmbn
    @mxbmvnvmbncmbn 3 роки тому +1

    2:07
    apparently the undertaker from world wrestling entertainment is a spooky scary hacker man

  • @HeyDudee
    @HeyDudee 4 роки тому +1

    Thankyou John Legend!!! 🔥

  • @bruh_5555
    @bruh_5555 4 роки тому +1

    Osnit stuff is fun for a change from complex hacking

  • @user-sq7hj6hj7h
    @user-sq7hj6hj7h 2 роки тому +1

    For sherlock you can just use --timeout 1 or 3 to speed things up

  • @cli-hope417
    @cli-hope417 4 роки тому

    Thanks for the extra time you took to share 👌

  • @SageTheProfessor
    @SageTheProfessor 4 роки тому

    Fam, that's the Undertaker. Lol. Thanks for the video. Didn't know there were OSINT CTFs.

  • @alexkatsanos8475
    @alexkatsanos8475 2 роки тому

    This was cool. Thanks!

  • @crispyhaole8533
    @crispyhaole8533 4 роки тому

    Dtf was worthwhile to showcase. Good vid

  • @killahb33
    @killahb33 2 роки тому

    Got a laugh out of your DP comment, it's Undertaker.
    Anyways great vid!

  • @Hitu1197
    @Hitu1197 2 роки тому

    Ahaha I was just thinking about Sherlock Tool when you were talking about usernames on different social medias lol

  • @hegen7642
    @hegen7642 3 роки тому +1

    22:05 is saying: meet me at 9:30 I'm guessing

  • @user-uo5id1dd5s
    @user-uo5id1dd5s 2 роки тому

    Thanks

  • @ronakjoshi5093
    @ronakjoshi5093 4 роки тому +2

    again a great video by john❤️

  • @ERr0rhm3-j3c
    @ERr0rhm3-j3c 2 роки тому

    I was earlier inclined towards red teaming, now that i have been introduced to OSiNT. I feel that it is something cooler and easier.

  • @rajith8973
    @rajith8973 4 роки тому

    John good luck for bsides boston ctf

  • @ashutoshmohanty
    @ashutoshmohanty 4 роки тому +1

    Awesome

  • @ErickTosar
    @ErickTosar 2 роки тому

    Oh you clonned some dinasours, i remember you!

  • @somebodystealsmyname
    @somebodystealsmyname 4 роки тому

    Hey John, not every entry in the Wayback Machine is really from the day it says. So even though you clicked on 19.09., you got the version from july.

  • @ovxvii
    @ovxvii 4 роки тому +1

    this was really interesting!

    • @ovxvii
      @ovxvii 4 роки тому

      the cell phone numbers blew my mind

  • @tomotion
    @tomotion 3 роки тому

    You can use -t 1 for Sherlock to set a timeout to 1 second

  • @champmq5385
    @champmq5385 4 роки тому

    By the way to download the video you could also just look at the HTML code and then take the link for the video I guess this would also be simple training for understanding html codes idk.
    But its still nice content

  • @techguy921
    @techguy921 3 роки тому

    U can decode sound using DTMF decoder app in your phone through microphone , much quicker without downloading and converting

  • @AbdennacerAyeb
    @AbdennacerAyeb 4 роки тому

    you r great.. we r learning a lot from your chanel

  • @jaypomal5534
    @jaypomal5534 4 роки тому

    that's really good john

  • @goodgameplays9571
    @goodgameplays9571 3 роки тому

    tysm for the content

  • @HenryPangsatabam
    @HenryPangsatabam 4 роки тому +2

    "And I like these memes here. Nice! Nice!"

  • @jorisschepers85
    @jorisschepers85 4 роки тому

    Keep them coming John.

  • @CyberWorldSec
    @CyberWorldSec 4 роки тому +4

    please make more on osint where a location is given

  • @potatoonastick2239
    @potatoonastick2239 3 роки тому +1

    "hello i am here for the flag plz" yes john great troll😂😂

  • @jacobsan
    @jacobsan 4 роки тому

    Amazing

  • @marcellmagvasi1668
    @marcellmagvasi1668 4 роки тому

    i really like how u tell the things how its works or how i should do that too, so yeah keep doing these vids, u shouldnt care how long the videos are :DD i will watch it anyway...:_D

  • @kal_dev
    @kal_dev 3 роки тому

    wow incredible video, dial tone detect🤗

  • @Phoenix_VR
    @Phoenix_VR 4 роки тому

    I have a very odd one, and I wasn't even playing or interested in CTF games.....a number and a location...that's it. :D

  • @aswinp888
    @aswinp888 3 роки тому

    ITS NOT SPOOKY HACKER GUY, ITS UNDERTAKER MY G!!

  • @GeekBatman
    @GeekBatman 4 роки тому

    The spookey scary hacker man pic. Is that not the wrestler Kane?

  • @user-pe2mf5tg3h
    @user-pe2mf5tg3h 3 роки тому

    I was disappointed you didn't principle skinner the DTMF tones.

  • @JustSomeAussie1
    @JustSomeAussie1 4 роки тому

    It sounds so funny when you say "mum"

  • @b07x
    @b07x 3 роки тому

    2:15
    That's undertaker, a wwe actor

  • @sirw369
    @sirw369 4 роки тому

    Lmao @ 22:56. I would’ve done the same John 😂

  • @jesusxXxlizzard
    @jesusxXxlizzard 3 роки тому

    Very nice buddy!

  • @51mpl3-b9
    @51mpl3-b9 4 роки тому

    Nice method on the phone number/thing

  • @CRSolarice
    @CRSolarice 3 роки тому

    Tell me what brand and model is your PC? CPU model and memory brand and speed or just model number. Your BIOS may not be properly configured and did you do the update for the bios? Have you built a PC before?: My best uninformed guess is going to be heat related. Ie incorrect cpu paste deployement, case arrangement and fans (orientation and position), if water could be air trapped, pump speed, paste and radiator sizing. Photos will help if you still have slowness. Is GPU blowing air out through the back or directly into the path of CPU intake?

  • @gerryolivergerryoliverphot5182
    @gerryolivergerryoliverphot5182 3 роки тому

    The undertaker was his picture

  • @M7_ii
    @M7_ii 2 роки тому

    You shouldve done the timeout to one second for the sherlock search

  • @alph4byt3
    @alph4byt3 4 роки тому

    I believe the twitter pic is the undertaker from wwe

  • @wasfyelking6926
    @wasfyelking6926 4 роки тому

    Respect johnyy ⚡️⚡️

  • @ca7986
    @ca7986 4 роки тому

    ❤️

  • @skynet1024
    @skynet1024 4 роки тому +7

    those guys with the dislike must have their screens upside down

    • @0x7ddf1
      @0x7ddf1 3 роки тому

      Hahahaha true

  • @Enxuvjeshxuf
    @Enxuvjeshxuf 3 роки тому

    Old tweets are sometimes indexed

  • @alcxander
    @alcxander 4 роки тому

    these are really interesting, how does one get started on doing these CTF's etc?

  • @venox314
    @venox314 3 роки тому

    What's the name of these kind of games? This seems so cool!
    EDIT:Ctf right?

  • @AswinHaridasOne_77
    @AswinHaridasOne_77 3 роки тому

    That's undertaker as the profile picture. 😄😄 not hacker man

  • @sofblocks
    @sofblocks 4 роки тому

    Please do a video on sublime text shortcuts and the find replace thing . Thank you.

  • @cardzzz6585
    @cardzzz6585 4 роки тому +2

    HYPA! HYPA!

  • @silverman2263
    @silverman2263 4 роки тому

    Hi Sir your all videos super

  • @kartibok001
    @kartibok001 4 роки тому +1

    What a great video!! (TINDER - wtf :) )

    • @bruh_5555
      @bruh_5555 4 роки тому +3

      Error, extra closing braces, cannot compile comment

    • @kartibok001
      @kartibok001 4 роки тому

      @@bruh_5555 Damn no smiling faces!!

  • @vater7841
    @vater7841 3 роки тому

    nice

  • @ritamchatterjee3307
    @ritamchatterjee3307 3 роки тому

    Im not getting one url in the way back machine,what would be the issue any idea

  • @RuDrAkSh_is_live
    @RuDrAkSh_is_live 2 роки тому

    omg what a challenge

  • @whoamisecurity9586
    @whoamisecurity9586 3 роки тому

    Interesting 🙂

  • @kamalaKannan-gf6ku
    @kamalaKannan-gf6ku 4 роки тому

    Any alternative for the dialabc....thanks in advance

  • @hoodietramp
    @hoodietramp Рік тому

    I think soups watched your this video for the beep64 idea in fetch the flag🤣

  • @thengakola6217
    @thengakola6217 4 роки тому +10

    Zeroth comment ....grow up bois

  • @danbrownlegalbooks
    @danbrownlegalbooks Рік тому

    I would have used "Sherlock"

  • @toddmathews3329
    @toddmathews3329 2 роки тому

    😅😅😅 loved it.

  • @chriskaprys
    @chriskaprys 4 роки тому

    does anyone have the video/audio from that insta? the account is gone (nothing on TWM either) and i'd love to take a peek at those DTMF tones.

  • @matthewfluke7957
    @matthewfluke7957 Рік тому

    Even Tinder… Nice!!! 😂

  • @b07x
    @b07x 3 роки тому

    27:55 I though it was only me because my internet is very slow.