Watch Hackers Demonstrate a Ransomware Attack (ft. Kilian from SecurityFWD)

Поділитися
Вставка
  • Опубліковано 31 тра 2024
  • In this episode, Killian from SecurityFWD meets with Kody from Null Byte/SecurityFWD to show off the new ransomware attack lab simulation, which shows how real ransomware works and how you can stop it.
    Subscribe to Null Byte: goo.gl/J6wEnH
    Kody's Twitter: / kodykinzie
    SecurityFWD: / securityfwd
    Varonis: / varonissystems
    Chapters:
    0:00 Countdown
    0:44 Intro
    1:02 Null Byte Cat Cameo
    2:45 What We're Doing Today
    8:20 Metasploit and Attack Setup
    11:55 Phishing E-mail
    17:55 Command and Control
    20:30 Exploiting the Target Machine
    24:30 Reverse DNS Look-ups
    27:15 Password Spray
    29:00 Ticket Harvesting Attack
    32:00 Hash Cracking
    34:10 We Have the Password, Now What?
    36:30 Finding the most Sensitive Data
    43:10 Launching the Ransomeware
    44:20 Defending Against this Attack
    54:00 What did Kilian Study
    55:40 Kody uses a Macbook
    57:10 Best Programming Languages
    59:10 Anti-virus
    1:01:05 What VM do we use for the Labs
    1:02:05 Zip Bomb
    1:03:45 Hacker Ethics
    1:05:05 Malware Honeypots
    1:07:55 Closing Thoughts
    Follow Null Byte on:
    Twitter: / nullbyte
    Flipboard: flip.it/3.Gf_0
    Website: null-byte.com
    Vimeo: vimeo.com/channels/nullbyte
  • Наука та технологія

КОМЕНТАРІ • 77

  • @NullByteWHT
    @NullByteWHT  3 роки тому +42

    I'm starting to really enjoy these, thank you to everyone who was with us in the live chat and who contributed great questions.

    • @sovereignboss1841
      @sovereignboss1841 3 роки тому +1

      I learned that never click any random buttons. Even if you do, just turn off your wifi, and then click on these buttons.

    • @w3w3w3
      @w3w3w3 3 роки тому

      the past two video formats have been great i also enjoyed them lol! :)

    • @jasonmoore4429
      @jasonmoore4429 3 роки тому

      I am trying to make a Spectrum default wordlist. Characteristics include 12 min 15 max all lowercase and the last three character and number word patterns is 2 words (real) lowercase no uppercase followed by 3 number. words can be 4,5,or 6 letters long. How do I set the pattern on crunch to make this list?

    • @jasonmoore4429
      @jasonmoore4429 3 роки тому

      The question was asked which is worse Ransom or Unprepared. Unprepared and here is why.
      I teach senior citizens how to spot e-predators on social media ie.Facebook. because they are at the highest risk level for e-fraud like romance and FB lottery scams. I teach how to look for clues like names, titles, contact info, pronoun switches, language tells, reverse image look ups, ect. I teach how to protect the three main things Name, Date of birth, SS number. because these are the minimum pieces of info to pull a credit card on you. This also is important because of everything else that is attached to this like friend and family and this weakness makes it easier to phish those people too.

    • @ChanKe
      @ChanKe 3 роки тому

      I'm starting to enjoy the field! Yahooooooo! I love the content!

  • @roguephilosopher2465
    @roguephilosopher2465 3 роки тому +1

    I really like how these videos share new methods and experiments to really understand how things work, rather it be malware or trojan-responses down to simple XML attacks and so forth to help me better understand how I can better protect a company or my networks.

  • @hackingispoetrypoetryismag2409
    @hackingispoetrypoetryismag2409 3 роки тому +7

    Kody you got some undercover cat-rat at 1:48 breach in your backdoor that may be a new ransomware memz-21

  • @mukte81
    @mukte81 3 роки тому

    Very, very good content! Would love to piggy back on this in a way to show what Windows admins using Intune, maybe defender for Endpoint, can do to help minimize some of these openings.

  • @sreekalarajesh9550
    @sreekalarajesh9550 3 роки тому +1

    There's just soooo much of enthusiasm man!!!
    Awww!!!! A lot of urge to learn. Great content too.

  • @sovereignboss1841
    @sovereignboss1841 3 роки тому +5

    Great content. Love to see more

  • @gti_patryk3567
    @gti_patryk3567 2 роки тому

    Literally mind blowing

  • @MALACHAI39
    @MALACHAI39 3 роки тому +1

    Hey Null Bytes (and everyone)
    I just wanted to say that I agree with the point that though ppl have their concerns about things that are shown here and other places because it is giving 'ideas' to ppl that may do bad things with this knowledge....
    The point is that these things already DO EXIST with already bad minded ppl and even worse groups of ppl working together to attack 'unwitting' ones running some network(s) at some place.
    So even if you were to be 'informing' someone of something they can use for bad (should it be in their heart to do so) the point is that there are even worse things going on by extremely well 'educated' and even 'masterminded' wrong-doers' that do these things as a 'way of life' and may even be working for ppl that are paying them to be very good at doing what is bad.
    Thus 'talking to middle schoolers' and opening up thir eyes to realities doesn't mean they are going to be PH.D kind of hackers 'over night' nor will they have that kind of knowledge ALONG with very important 'experience'

  • @sahil49219
    @sahil49219 3 роки тому +1

    which channel is it that you are talking about in the beginning , the android studio hacking one. Reply will be appreciated

  • @gaffadeguysnpl9874
    @gaffadeguysnpl9874 3 роки тому

    Wow it's really awesome love from Nepal 😍😍😍😍

  • @randomvids5890
    @randomvids5890 3 роки тому

    really enjoy the stream. thanks null byte

  • @harrieswanepoel9678
    @harrieswanepoel9678 3 роки тому

    Love these vids please do more

  • @mawortz
    @mawortz 3 роки тому +1

    which is the original hacking software you mention at the beginning?

  • @its_code
    @its_code 3 роки тому

    Very helpful i love your all video

  • @GaN-FaLL
    @GaN-FaLL 2 роки тому

    For the finding sensitive data part, if the Doc document has a canary token... would it be triggered?

  • @SideRocketeer0
    @SideRocketeer0 3 роки тому +1

    Have you got any examples of ransomware based on fileless malware or non-PE file attack?

  • @TuckerMcCannon
    @TuckerMcCannon 3 роки тому

    Nice setup, love the vid...What the heck does noisy really mean? I feel like it's all over the place!

    • @olso8621
      @olso8621 3 роки тому

      Noisey means it's likely to trigger IDS flagging and blow the attack

  • @stcstwwlove
    @stcstwwlove 3 роки тому

    Do you have an episode that shows how to scan my computer for root kits or spyware?

  • @aadichalwa928
    @aadichalwa928 3 роки тому

    great love your videos

  • @ekam_sanatan_dharma
    @ekam_sanatan_dharma 3 роки тому

    Mind blowing

  • @Devildoc11
    @Devildoc11 2 роки тому

    This is so interesting!

  • @SecurityTalent
    @SecurityTalent 3 роки тому

    Thanks

  • @wickhere7996
    @wickhere7996 3 роки тому +1

    great content wow love ya

  • @siamahmed8287
    @siamahmed8287 2 роки тому

    What payload and exploit are you using in metasploit?

  • @modi9148
    @modi9148 3 роки тому

    Is tools.bat part of metasploit?

  • @terryegharevba2767
    @terryegharevba2767 3 роки тому

    what are the key factors that influence the success of a ransomware attack?

  • @unicaller1
    @unicaller1 3 роки тому

    Wait, there are still people not using TempleOS?

  • @a10thunderboltii25
    @a10thunderboltii25 3 роки тому +4

    kali gang

  • @SourceCode347
    @SourceCode347 3 роки тому

    The real document alerts 'Security Warning" , You are Detected ! Kali Noobs Rules!

  • @gaeldesmontagnesnoires1711
    @gaeldesmontagnesnoires1711 3 роки тому +3

    A friend with weed is a friend indeed but a friend with Hash is better... Hash power to mine Bitcoin eh ohhhh😄
    What's shocking is to realise that if I understood any of this ... never mind😑

  • @warpspace7871
    @warpspace7871 3 роки тому

    backups :-) everything important i have is backed up

  • @rhdhcccf6047
    @rhdhcccf6047 3 роки тому

    now adays victim still will pay for the ransomware ???

  • @rhdhcccf6047
    @rhdhcccf6047 3 роки тому +1

    how much u earn per week by running null byte ?

    • @NullByteWHT
      @NullByteWHT  3 роки тому +2

      I don't get paid to do these streams, null byte is owned by wonderhowto so, nothing

    • @sujalchauhan6192
      @sujalchauhan6192 2 роки тому

      You are doing a great job!

  • @williamgomez6087
    @williamgomez6087 3 роки тому +4

    u are FULLY RIGHT... if u dont teach THIS.....we are in danger from black hackers....

  • @shivchaudhary7176
    @shivchaudhary7176 3 роки тому +1

    👍

  • @ketsiketsi8265
    @ketsiketsi8265 3 роки тому

    Dam u look like those cool hackers in movie 🔥

  • @TryPeace888
    @TryPeace888 2 роки тому

    windef off... lol

  • @soundbreaker2485
    @soundbreaker2485 3 роки тому

    Linux is a Kernel Ubuntu, Kali, Parrot are all OS that communicates with the same kernel. Debating about which one of those is better is like having 3 identical cars in different colors and trying to say which one is better. It's the same engine same tires same everything that matters. I doubt anyone ever installs a stripped-down base OS of Kali or a stripped base OS of Parrot they always install the one with preinstalled tools where they won't be using 90% of the tools included. You can install the tools that come with Kali on Ubuntu & you can do the same thing the same way. most "Real hackers" create custom distros in ubuntu or some other OS anyway so the debate is really stupid.

  • @ubuthi7495
    @ubuthi7495 3 роки тому

    Anyone here from Oxfordshire??

  • @wakeupNeo_
    @wakeupNeo_ 3 роки тому

    Temple OS for hacking? is this sarcasm?

  • @Mike-sx5en
    @Mike-sx5en 3 роки тому

    Hey Hacker

  • @Nippiniilo
    @Nippiniilo 3 роки тому

    i see ur long hair its..... nice

  • @rhdhcccf6047
    @rhdhcccf6047 3 роки тому

    social engineering ...

  • @zadekeys599
    @zadekeys599 3 роки тому

    Harden Adobe Reader ; Disable macros in O365

  • @williamgomez6087
    @williamgomez6087 3 роки тому

    AI is comming, and will take over everything¡¡¡

  • @williamgomez6087
    @williamgomez6087 3 роки тому

    Estoy un paso más cerca de ti ALVARO URIBE VELEZ(aplica para todos los narcotraficantes y asesinos del MUNDO) ..... algun día te tendremos tras las rejas¡

  • @tasteful7364
    @tasteful7364 3 роки тому

    hmm

  • @pashtoonlinezdakra9595
    @pashtoonlinezdakra9595 2 роки тому

    Hello sir
    How to Hack FB account on kali linux
    And, How jam mobile signal

  • @terror403
    @terror403 3 роки тому

    Try to make it international please, you both speak really too fast

  • @peacekeepermoe
    @peacekeepermoe 3 роки тому +1

    Why you would teach this to anyone is mind boggling and simply not useful for the public, other than the malicious few who will use this for profit.

    • @garcand
      @garcand 3 роки тому

      Educational purposes

    • @sovereignboss1841
      @sovereignboss1841 3 роки тому +1

      @@garcand yep definitely "educational purposes". We learned that never click button. Even if you do just turn off your wifi, and then click on these buttons.

  • @sovereignboss1841
    @sovereignboss1841 3 роки тому +1

    Bro the bald guy nodding at every word was too cringe. I was cringing too much 😬
    Edit: sorry if I offended you guys.

    • @NullByteWHT
      @NullByteWHT  3 роки тому +18

      you seem like the kind of person who ignores the lesson and judges the teacher, that's cool

    • @sobhaks7231
      @sobhaks7231 3 роки тому +1

      @@NullByteWHT and a kind who likes his own comment

    • @ketsiketsi8265
      @ketsiketsi8265 3 роки тому +2

      @@sobhaks7231 lol facts

    • @sovereignboss1841
      @sovereignboss1841 3 роки тому +1

      @@ketsiketsi8265 you liking your own comment too. Check yourself first before judging me

    • @NullByteWHT
      @NullByteWHT  3 роки тому +7

      Just realize that making this content is tough and we are all putting ourselves out here to try to make this easier for you. Try to keep the comments constructive, that's what's nice about hacker culture is people are generally trying to help you grow.