How Hackers & Malware Spoof Processes

Поділитися
Вставка
  • Опубліковано 20 вер 2024
  • jh.live/evasion || Learn TOP CLASS malware development and evasion techniques with SEKTOR7! Get 20% off the Windows Evasion Course with my link: jh.live/evasion
    🔥 UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

КОМЕНТАРІ • 103

  • @d3c0deFPV
    @d3c0deFPV Рік тому +36

    Good breakdown, John. Assuming you haven't already made a similar video, it would be cool to see the flipside of this, which is how to evade being detected by malware. (VM detection, debugger evasion, etc). You could cover some of the different techniques that malware uses to know it's in a VM.

  • @erickfurukawa1
    @erickfurukawa1 Рік тому +31

    Hey John, just a small observation:
    The function Process32First() already populates the PROCESSENTRY32 struct with a process, so when you call Process32Next() you are effectively skipping the first process entry. I think it would be better to change it to a do-while so that the first process doesn't get skipped.
    Great video btw!

    • @Tygo69
      @Tygo69 Рік тому +7

      The code he wrote is absolute garbage, also forgets to close the handle of the snapshot. I basically stopped watching after this. His GetProcessId function is already a complete mess.

    • @deedos
      @deedos Рік тому +19

      ​@@Tygo69maybe you could make your own video with better code then?

    • @Tygo69
      @Tygo69 Рік тому +3

      @@deedos I write windows kernel drivers and reverse the windows kernel and anti-cheat drivers, I've also worked on uefi bootkits. Not responding to you anymore waste of my time

    • @deedos
      @deedos Рік тому +25

      @@Tygo69 I'm not questioning your abilities, I'm genuinely interested in watching your video if you think John's code is bad

    • @psixfour
      @psixfour Рік тому +3

      True, nice observation.
      Sometimes I find Windows Programming really messy due its COM components nature. It reflects on its own API. Sometimes, I really miss these standardized structures like iterators from modern libraries that help us using for-loops when we do low-level programming.

  • @subashm9039
    @subashm9039 Рік тому +4

    Hi Hammond, Can you make a video about Scammer Payback How he does the hacking via anydesk

  • @mnymic
    @mnymic Рік тому

    quite comprehensive, watched the whole vid and never got bored despite no actual xp with c. cool, thanks!

  • @jeremyng1021
    @jeremyng1021 Рік тому +2

    Very good stuff! I would love to see more malware techniques sharing, such as AV evasion or process hollowing (or process doppelganger), which is also kind of fun too. Thanks!

  • @matthiasnicolai5523
    @matthiasnicolai5523 Рік тому +2

    "Does this make sense?" spilled my coffee, and yes, mostly it does :D

  • @nicojanen3015
    @nicojanen3015 Рік тому +1

    Hei. Little info for using VS. You can press ctrl + shift + space to view intelisence if it disappear while typing your parameter.
    Edit: Or any other time writing a variable

  • @vishalraj7532
    @vishalraj7532 Рік тому +5

    Hey, John thank you so much for this incredible video. And I was wondering if it's possible to write all the C++ code using Nim language. I've developed a great fondness for Nim's syntax, finding it incredibly user-friendly and easy to work with.

  • @detective5253
    @detective5253 Рік тому

    *WE NEED MOOOOOOOOOOOOORE MALDEV VIDEOS LIKE THIS PLEASE*

  • @bluefal
    @bluefal Рік тому

    Oh i am in love with this

  • @preveenramcharan
    @preveenramcharan Рік тому +3

    How come John doesn't have more than "just" 603K subs? Such a cool and knowledgeable guy. Keep up the great work buddy!!! 💪

    • @d3c0deFPV
      @d3c0deFPV Рік тому

      For someone making this kind of content, he has a ton of subs. General public interest just isn't huge.

    • @akt67
      @akt67 Рік тому

      Coz its hard to follow him, we arent all Kevin Mitnick's (RIP)

  • @regulator5
    @regulator5 Рік тому

    I thought I knew things until I watched this video lol. Still a great video john

  • @scottspa74
    @scottspa74 Рік тому

    Great video. Super fun to follow, try, and learn. Thank you! 👍

  • @Red4mber
    @Red4mber Рік тому

    Dope, just as I got into maldev,
    Timing too perfect, I really suspect you're in my walls

  • @Gobillion160
    @Gobillion160 Рік тому

    these videos are amazing please do more maldev videos these are your best videos in years

  • @dmoney5221
    @dmoney5221 Рік тому +1

    I would pay to sit in a room and have this guy teach me

  • @daljeetbhati8353
    @daljeetbhati8353 Рік тому

    Aha bring more malware stuff if possible loved this vid it would be awesome too see a vid on some kernal malware

  • @rectalespionagesailboat4819

    If 'tricknique' isn't official tech-jargon, it should be.

  • @drushkyy2017
    @drushkyy2017 Рік тому

    Any recommendations to learn os and computer architecture? What resources can I use? Can you do some fundamentals tutorials on os and architecture and how it works! Thanks man

  • @lollubrick
    @lollubrick Рік тому

    now THIS is the type of content I like!

  • @karanb2067
    @karanb2067 Рік тому

    This thing is tough....damn you windows 32 api

  • @Acepwokk
    @Acepwokk Рік тому +1

    BANGER TYSM

  • @neilthomas5026
    @neilthomas5026 Рік тому

    You are a Giga Chad honestly love your vids !!

  • @TediousSecurity
    @TediousSecurity Рік тому

    Awesome video, thanks for the breakdown.

  • @aadhiseshandc7260
    @aadhiseshandc7260 Рік тому

    Hi jh. Love ur code even if it breaks my brain (I'm a beginner)

  • @Hacker_Baby
    @Hacker_Baby Рік тому

    Bro! Thank you so much for all you do! 🙇🏼

  • @eckersplode
    @eckersplode Рік тому

    Another banger, keep em' coming John!

  • @petevenuti7355
    @petevenuti7355 Рік тому

    What are your top edr and av recommendations?

  • @gobords
    @gobords Рік тому

    "tricknique".. i like it.

  • @logiciananimal
    @logiciananimal Рік тому

    Does the technique illustrated required elevation? Also, is the code available somewhere?

  • @squid13579
    @squid13579 Рік тому

    John make a video on wazuh ? Open source edr tool and it's awasome.

  • @inquisition.musician
    @inquisition.musician Рік тому +1

    I'm interested in that kind of stuff so that tech support scammers will get punished.

  • @FalcoGer
    @FalcoGer Рік тому +1

    C code is so ugly when compared to c++...
    I think you want a do loop instead of a while loop here 8:40 because you're skipping the first process it found.
    You also most certainly want to return an error value, an std::expected or throw if your name is not found. Not returning from a function with a return value declared is UB. See stmt.return#2. Use "-Werror-return-type".
    If I were to do this, I would just return the entire process handle instead of just the ID.

    • @nordgaren2358
      @nordgaren2358 Рік тому

      The first entry is always system idle process.
      No need to check it.

    • @nordgaren2358
      @nordgaren2358 Рік тому

      Also, the process entry struct he is working with here is over 256 bytes long, so idk about returning the whole thing.

  • @enadalotaibi8181
    @enadalotaibi8181 Рік тому

    Let's be honest
    As L1 SOC Analyst
    You cannot detect these without the EDR alerting you
    This is honestly scares me as SOC Analyst

  • @neikidev
    @neikidev Рік тому

    great video love it!

  • @Md.Mashrur
    @Md.Mashrur Рік тому

    You Are Fire Bro
    🔥🔥
    I Love Your Videos

  • @ДмитрийКузнецов-я4д

    What should I learn to understand this code better?

  • @davidcopenhaver5583
    @davidcopenhaver5583 Рік тому

    more!

  • @islam7337
    @islam7337 Рік тому

    I sent you an invite in linked in but you didn't respond

  • @sreejishnair5922
    @sreejishnair5922 Рік тому

    Bro course are costly, I honestly want to purchase but cannot afford such a costly course to be honest. Otherwise great content

  • @victorswaroop2289
    @victorswaroop2289 Рік тому

    I wish every malware came with the file name of "evil.exe"

  • @GhostGamer3135
    @GhostGamer3135 Рік тому +2

    first comment

  • @janmillerty4528
    @janmillerty4528 Рік тому

    Sup

  • @paradiseexpress3639
    @paradiseexpress3639 Рік тому +2

    Why is your code SO BAD. Please stop nesting everything, there is literally no point in doing that

    • @nordgaren2358
      @nordgaren2358 Рік тому

      What was nested that shouldn't have been?

    • @paradiseexpress3639
      @paradiseexpress3639 Рік тому

      @@nordgaren2358 if statements

    • @paradiseexpress3639
      @paradiseexpress3639 Рік тому

      @@nordgaren2358 It looks like he introduced undefined behavior as well.

    • @nordgaren2358
      @nordgaren2358 Рік тому

      @@paradiseexpress3639 are you trying to say he shouldn't use if statements? What?

    • @nordgaren2358
      @nordgaren2358 Рік тому

      @@paradiseexpress3639 where is the undefined behavior?

  • @herzallahaymen5478
    @herzallahaymen5478 Рік тому

    very poor explanation, bro not everybody is a low level guru.

  • @sent4dc
    @sent4dc Рік тому

    Hmm, you're a good presenter John, but ... coder ... sorry, my friend. At least in a C/C++ sense. This is not Python, you need to close handles and release memory. Also after you call Process32First you are missing whatever it returned by calling Process32Next right away. Additionally, there are so many bugs in what you wrote I don't even know where to begin. But ... malware authors I guess don't care about memory leaks, hah?

    • @nordgaren2358
      @nordgaren2358 Місяць тому

      Process32First always returns the system process as the first entry, and is a waste to check.

    • @nordgaren2358
      @nordgaren2358 Місяць тому

      Where did he forget to close the handle?

    • @nordgaren2358
      @nordgaren2358 Місяць тому

      Oh, the snapshot handle?
      That seems very nit-picky, considering he closed the other handle in the video.
      One mistake in a video where he hand typed a specific technique in C, and he forgot a handle. Do you write perfect code on camera the first time you write it?

  • @hectormorenocampo
    @hectormorenocampo Рік тому

    @john Sektor7 or Maldev academy?

  • @RaGhav363
    @RaGhav363 Рік тому

    You could have make it with NIM

  • @akt67
    @akt67 Рік тому +2

    Too fast and confusing unless Im stupid.

  • @ranjanji3518
    @ranjanji3518 Рік тому

    Hay Bro @_JohnHammond how we can open malware or viruses in our system to examine that like you .
    Also scary about got harmed so plzz guide ❤🎉🎉
    Even u r professional but you didn't care about malware abusing nature
    Big Fan Bro 😎 ❤
    Love from India 🇮🇳❤

  • @lollubrick
    @lollubrick Рік тому

    Also, I am surprised you are using visual studio instead of your favorite sublime text. I could never get into sublime text. I am considering going into the neovim croud a la @ThePrimeagen

  • @janmillerty4528
    @janmillerty4528 Рік тому

    Sup