How Hackers Can Bypass Your Security Defenses

Поділитися
Вставка
  • Опубліковано 2 лис 2024

КОМЕНТАРІ • 91

  • @_JohnHammond
    @_JohnHammond  Рік тому +81

    I tend to prefer "cyber resilience" much more over "zero trust." What do you think?

    • @_AN203
      @_AN203 Рік тому +6

      How about cyber immunity ? 🤔

    • @fluffsquirrel
      @fluffsquirrel Рік тому +4

      One thing I learned in my cybersecurity class was "trust but verify". Idk if this applies but it sounds accurate.

    • @HamedEmine
      @HamedEmine Рік тому +2

      I think "cyber resilience" will become a buzz word too 😅

    • @d_cb
      @d_cb Рік тому +2

      Cracked cobalt strike :/

    • @_JohnHammond
      @_JohnHammond  Рік тому +7

      @@d_cb "Real threat actor" kek

  • @PolaroidDreams-lofibeats
    @PolaroidDreams-lofibeats Рік тому +20

    Hacker-proof method for life: Sell your computer, relinquish any and all technology, live out the rest of your life in a cave - stone tools only.... Your move hackers...

    • @LambdaTechnology
      @LambdaTechnology Рік тому +2

      🤣 this harks to the last point in my comment on this vid. Got a solid laugh from this.
      It’s actually funny to me… some of the best guys I know in the industry have no serious industrial level or even custom made tools at their disposal for home threat detections… you know what they own? A really carnal German Shepherd 😂

    • @UmVtCg
      @UmVtCg Рік тому +2

      You better add a decent door and lock to that cave.

    • @deanvangreunen6457
      @deanvangreunen6457 Рік тому

      Door, nope. Have lion as a door

    • @hubertlenningrad2252
      @hubertlenningrad2252 Рік тому +1

      ..... Drone ....

  • @hrfjio7455
    @hrfjio7455 Рік тому +14

    Having a threat model really helps, but having good security practices is nice as well

  • @MrVampify
    @MrVampify Рік тому +6

    I've said for many years. Your security is only as necessary as your threatmodel dictates.
    My org has alcohol companies as customers, and sales keeps having customer websites blocked.
    The moment I have senority to remove needless security policies, and actually implement good policy, I can't wait.

  • @J_BALVIN_007
    @J_BALVIN_007 Рік тому +1

    This deserves a lot of attention, I have been noticing a lot of people on reddit, UA-cam, linkdin flexing on zero trust without knowing whatever you just said

    • @AntiAtheismIsUnstoppable
      @AntiAtheismIsUnstoppable Рік тому

      Maybe they're not old enough to remember windows vista. The fun thing about vista is, even it was the slowest OS ever made and ever to be made, what people seemed to hate even more, was UAC.
      So, people can live with a slow system, but they cannot live with the computer asking permission to run certain tasks

  • @tablettablete186
    @tablettablete186 Рік тому +4

    6:38 I also have a local account with a similar name: "unprilivileged"
    I guess security folks think in similar ways lol

  • @DexieTheSheep
    @DexieTheSheep Рік тому +1

    17:18 Always remember, "Alert fatigue" is how Uber got hacked! Just because something requires manual approval doesn't mean it's 100% secure!

  • @pitachu_s
    @pitachu_s Рік тому +9

    reminds me of a stupid bypass i found at my workplace, we couldnt access the C: version of cmd.exe . But by copying the executable to my user folder under a different name, a console poped-up

  • @Avaez
    @Avaez Рік тому +1

    Damn, you started getting passionate there near the end. Its so awesome to see someone this dedicated to learning in their field. Thanks for the content!

  • @hrishabh2625
    @hrishabh2625 Рік тому +9

    Thanks John for sharing such informative videos for the security community. Your videos really have good practical approach. Loved it ❤

  • @Manavetri
    @Manavetri Рік тому +1

    This kind of video are extraordinary. Brilliant, keep going

  • @jamesmatthews558
    @jamesmatthews558 Рік тому

    Great video as always John! The mirror image causing the logo on your hoodie to switch sides by the camera freaked me out though 😂😂

  • @TheMAZZTer
    @TheMAZZTer Рік тому +3

    Blacklists and whitelists for apps won't ever really work... first party and third party apps will always have the ability to run arbitrary code from the user. Ultimately the focus must be on controlling the user's permissions, then it doesn't matter what code they run. Maybe they can get local access to everything (because local access to something == game over) but remote access can be controlled.
    As for the permission dialog you show at the end, this is why UAC supports digital signatures. Such a ruse would not work on a UAC dialog if the original app has a digital signature (and you train users to reject unsigned apps... of course, in a "Zero Trust" environment users probably shouldn't be able to use UAC dialogs!). In a "Zero Trust" environment I would expect you would want to digitally sign all your apps, either from the original vendor, or by your own organization's certs if the vendor provides none (that's a thing I assume you can do, right?).
    Also I would suggest such a dialog is not consistent with "Zero Trust", since it shows administrators don't want to manage the whitelist and are pushing that responsibility onto users. As your example shows this can easily negate the benefits.

  • @girirajr4946
    @girirajr4946 Рік тому +5

    Hey John .. this video was really useful as always... Thanks for sharing whatever you are gaining on our cyber domain..

  • @baali9097
    @baali9097 Рік тому +1

    Well, my first comment disappeared. So here's a second one. I find the biological psychological approach a fascinating one. Here, that is demonstrated by the fact that the human brain registers input based on its best ability to reason from previous experience or it uses its best hypothesis for contemplating and reacting to a new experience where it will then formulate a more concrete response later in life from its receive feed back. O/i o/i can change the response in the future for both. If that makes sense, sort of brainstorm explained it.

  • @timoheimann7434
    @timoheimann7434 Рік тому +1

    Gotta start a John Hammond bingo :D

  • @IndexError
    @IndexError Рік тому

    this entire video could be summed up in one word. Would you like to give access to your computer to an unverified application? “yes”

  • @alexc7095
    @alexc7095 Рік тому +1

    Great as always. Keep it up !

  • @puceno
    @puceno Рік тому +1

    sorry for being late, I was in college , i love your videos

  • @dropcake
    @dropcake Рік тому

    Good stuff John! Keep it up!

  • @carlabbasi2845
    @carlabbasi2845 Рік тому

    Awesome insight Johny boy!

  • @_SebJ1000
    @_SebJ1000 Рік тому +5

    I actually really enjoyed this video, and my school I have been trying to find vulnerabilitys out on the computers and servers (not for bad reasons like changing grades)
    Me and 2 of my friends dig deeper everynow and then figuring out more tricks and things that should be blocked.
    When I leave school we are going to have a list of all these things that need to be fixed. we are currently working on trying to find the admin password, we have gotten into private folders (of which students should be able to get too.)

  • @btcgamer1737
    @btcgamer1737 Рік тому

    i like the new studio keep up ^_^

  • @dannyjamespatterson6931
    @dannyjamespatterson6931 Рік тому +1

    Great video. 👍

  • @manticore4952
    @manticore4952 Рік тому

    He spared no expense.

  • @viks9759
    @viks9759 Рік тому

    HiJohn. I’m curious about something. Because you seem to “chill” about all of these viruses & attacks ect.
    What is something you find difficult or challenging? Referring to any sorts of coding or viruses ect.

  • @kholidshalahuddin
    @kholidshalahuddin Рік тому

    Informative video thankss😁

  • @marounahel8205
    @marounahel8205 Рік тому

    thank you bro i appreciate it my friend

  • @jonbutcher3031
    @jonbutcher3031 Рік тому

    Trust Assurance :)

  • @MovieWorldNow
    @MovieWorldNow Рік тому

    Your videos are really awesome..

  • @ilyboc
    @ilyboc Рік тому

    I love your hoodie

  • @kalidsherefuddin
    @kalidsherefuddin Рік тому

    Thanks

  • @0nepeop1e
    @0nepeop1e Рік тому +1

    zero-trust, trust nothing including zero-trust

  • @dmbpadfoot
    @dmbpadfoot Рік тому

    what brand or where did you get your glasses frames

  • @ДимитърДимитров-в7г

    The god is back

  • @PassionforSpace
    @PassionforSpace Рік тому

    That line of code you let us see to (giggles) manipulate the system making it believe we are running legitimate software, is that a fragment of the Windows source code?
    I can imagine you had to ask around to know exactly to what line of code you had to search for otherwise it would take us ages to figure it out with the emphasis on "Figure"?

  • @LouisSerieusement
    @LouisSerieusement Рік тому

    AI Malware ? Here it is we are in Neuromancer ?

  • @tayniagordon9764
    @tayniagordon9764 Рік тому

    Make more cobalt strike vids

  • @smallrug2
    @smallrug2 Рік тому

    so how would hacker bypass the security of a plume pod router i would love to know because i know security is important especially account and networking but about network security how would someone like a hacker bypass my plume pod router security if you could let me know please reply to this comment because ive always wanted to know how so pls and thank you

  • @RandomytchannelGD
    @RandomytchannelGD Рік тому

    I love these videos

  • @HarvestHaven09
    @HarvestHaven09 Рік тому +1

    Ultimate

  • @paularvie9473
    @paularvie9473 Рік тому

    the hta from cobalt not detected by AV / win defender?

  • @gameglitcher
    @gameglitcher Рік тому

    Pretty sure it is a game of cat and cat who are both chasing the mouse to get their cheese.

    • @LambdaTechnology
      @LambdaTechnology Рік тому

      This is a pretty good take… I see what you did there

    • @gameglitcher
      @gameglitcher Рік тому +1

      ​@@LambdaTechnology If a system is built on a lack of trust then who is to blame the people for not trusting your reason given. If you assume the worst in people then the people should assume the worst in you.

    • @LambdaTechnology
      @LambdaTechnology Рік тому

      @gameglitcher Well said.
      This comment (and vid as a whole) reminded me of what I saw a few months back when the new flavor of Emotet came rampaging back. It’s using some super trivial Social Engineering by recreating the Security Warning badge (which downplays the real badge warning at the top of the downloaded excel file)… and then quite literally asks the user to drop the downloaded file in the trusted ../Templates folder. Once there, the system asks for permission, the macros in the excel execute, and Voila! You’re now dealing with an embedded crypto miner, an instance of Cobalt Strike, or even a ransomware event.
      This video shows how Ivan probably took into account and then simply found a way to take advantage of, zero trust policies when he was re-authoring Emotet. Really interesting stuff.

  • @gooniesfan7911
    @gooniesfan7911 Рік тому

    I thought HTA files were dead? Windows Defender detects everything and will block execution !

  • @peculiarfamiliar
    @peculiarfamiliar 4 місяці тому

    I'm stoked to find your channel! Thanks for everything! You are a wonderful teacher! Make no apologies for your style, i dig it tremendously 🫀🫀🫀 You are great!

  • @ahr0cdovlzk3my1lahqtbmftdw7

    14:32 😅

  • @jm-it
    @jm-it 4 місяці тому

    hohoho :D can you try on my system ? sir?

  • @DeNikow
    @DeNikow Рік тому

    Ahh the mshta! LoLbins

  • @DVDplayerz
    @DVDplayerz Рік тому +1

    Googie

  • @guilherme5094
    @guilherme5094 Рік тому

    👍

  • @igu642
    @igu642 Рік тому

    ❤❤

  • @logangraham2956
    @logangraham2956 Рік тому

    the responsibility is on the people who chose the terrible font that makes I look like l.

    • @AntiAtheismIsUnstoppable
      @AntiAtheismIsUnstoppable Рік тому

      Someone blind wouldn't be foooled though. This is one attack which is less likely to succeed with blind people than seeing people

  • @astech.4u
    @astech.4u Рік тому +1

    India Viewer's:) Let me know in Reply -----)

  • @sanskarsingh2504
    @sanskarsingh2504 Рік тому +2

    can you add subtitles in your video?

  • @mindaugaskucinskas8941
    @mindaugaskucinskas8941 Рік тому

    ok now show how create fake Chrome browser with integrated virus like in Brave :D

  • @ChairmanHehe
    @ChairmanHehe Рік тому

    i hate this title so much

  • @durden91tyler
    @durden91tyler Рік тому

    paymoneywubby?

  • @rjain1993
    @rjain1993 Рік тому

    👍🏻