Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software

Поділитися
Вставка
  • Опубліковано 5 жов 2024
  • proton.me/john || Get privacy by default with Proton, stop other companies from exploiting your data, and keep yourself safe during security research! You can get started with Proton for free at proton.me/john
    PS -- play my CTF! huntress.ctf.g...
    Free Cybersecurity Education and Ethical Hacking
    🔥UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

КОМЕНТАРІ • 54

  • @g-whittington
    @g-whittington Рік тому +1

    I got a “fetch the flag ctf” ad of you at the start of the video. I thought it was just the video and didn’t even realize it was a separate ad

    • @_JohnHammond
      @_JohnHammond  Рік тому +2

      This is hysterical and I am also sorry 😂

  • @threatresearcher-kl
    @threatresearcher-kl Рік тому +6

    Thank you John! Always appreciate you taking the time to explain and sharing your insightful knowledge with us all

  • @mattplaygamez
    @mattplaygamez Рік тому +2

    I just clicked on your video and I got an add from Snyk and your are speaking

  • @alexlefevre3555
    @alexlefevre3555 Рік тому

    By far the most interesting part is the rat race between amsi and the specific formatting and obfuscation of the payloads...

  • @JeffNoel
    @JeffNoel Рік тому

    Man I'm loving videos like this. You bring us through each step and explain your thought process, even though it's a rather simple deobfuscation thing, it's super valuable for people that never did any of this (like me)!

  • @jytteolsen9753
    @jytteolsen9753 Рік тому

    That was weird i had a ad with John Hammond before the video started so I thought the video jad startet but I had the skip ad thing 😂

  • @ovalteen4404
    @ovalteen4404 Рік тому +1

    Why is an FTP server allowing Powershell commands at all?

  • @England91
    @England91 Рік тому

    I just got a UA-cam ad for this 20:21 with John doing the ad read

  • @hackwithprogramming7849
    @hackwithprogramming7849 Рік тому +3

    Plz continue on hved exploitation on windows kernel plz ❤

  • @squid13579
    @squid13579 Рік тому

    but proton mail just hit by html vulnerability. and they fixed. tag and some manipulation.
    nice 👍 video

  • @gunnerysergeant8889
    @gunnerysergeant8889 11 місяців тому

    For the malicious IP you tried to curl....do you think the bad actor could be whitelisting IP ranges or excluding VPN IP ranges)?

  • @defaultuserzero
    @defaultuserzero Рік тому +1

    using proton since a few months now, its awesome

  • @demotedc0der
    @demotedc0der Рік тому +1

    Hey John, why don't u start merch, I really love your t-shirts, they're very inspiring ^ ^

  • @Kricket2390
    @Kricket2390 Рік тому

    👍 great video
    Thank-you for the break down.

  • @MrRaja
    @MrRaja Рік тому +1

    I can't wait for Mr. Hammond to exploit my Homelab one day 😘

  • @yramagicman675
    @yramagicman675 Рік тому +3

    Forgive my possibly ignorant question, but why are people re-implementing file transfer software? We have dozens of proven solutions that haven't had massive vulnerabilities. What does the Progress company add to their software that other less vulnerable applications don't offer? It seems like these tools, both the tool behind the moveit vuln and this tool, are bad re-implementations or bad wrappers around otherwise secure software.

    • @PUBGsome12NV
      @PUBGsome12NV Рік тому

      A

    • @yramagicman675
      @yramagicman675 Рік тому

      @@funil6871 Yep, and I'm guilty of that too, but for goodness sake, it feels like some projects are beyond the skill of the involved developers. This is an example of what happens when people fail to acknowledge the edges of their understanding. I've considered implementing the TLS standard in Rust as a learning project, but there's no way on earth I would think about publishing it as anything other than a toy implementation.

    • @raging666
      @raging666 Рік тому

      I've been wondering this as well, same goes with general chat applications and some of the tried-and-true functions baked into many OS these days. I'm all for innovation, just don't understand why reinventing the wheel is needed if holes like this are being discovered. Then again, I am probably nowhere near as knowledgeable in this area as some of the commentors.

    • @yramagicman675
      @yramagicman675 Рік тому +1

      @@raging666 chat applications are a fantastic example. What happened to good old XMPP? That is an open protocol that supports encryption. We should have just stuck with that.

    • @lugoheriberto
      @lugoheriberto Рік тому

      Progress AKA Telerik makes a ton of tools for developers (like Kendo). So I'm thinking they branched out so that their tools can work better with different technologies. I'm not a fan of any Telerik products, but I've had to work with them because many companies use them. But many people do like their products.

  • @editedbycomradezeusman1642
    @editedbycomradezeusman1642 11 місяців тому

    @John Hammond how can i get in contact with you?

  • @dmovies01forF
    @dmovies01forF Рік тому +2

    Hi bro can you help me some scammers stolen my funds...can you trace or recover my funds please

    • @kimmysmith577
      @kimmysmith577 Рік тому +1

      How much did they stole from you 😢

    • @dmovies01forF
      @dmovies01forF Рік тому

      @@kimmysmith577 232603$

    • @dmovies01forF
      @dmovies01forF Рік тому

      @@kimmysmith577 so many people take upfront fee and cheat me

  • @ranjanji3518
    @ranjanji3518 Рік тому

    Thanks John for sharing khatarnak😅 info ...

  • @adamscosmas
    @adamscosmas Рік тому

    Please John is SRA a Scam or Real

  • @karimalbakri33
    @karimalbakri33 Рік тому +1

    Good Video 👍

  • @xCheddarB0b42x
    @xCheddarB0b42x Рік тому

    Decent.

  • @aurelianmotiz123
    @aurelianmotiz123 Рік тому

    good vid

  • @SD-Gamer
    @SD-Gamer Рік тому

    3 number comment 27 number like 285 number viewer in 7 minute 😅😊

  • @flowlime
    @flowlime Рік тому

    First comment (almost)

  • @markc6714
    @markc6714 Рік тому +3

    Forced ads. Automatic down vote

    • @johndeaux8815
      @johndeaux8815 Рік тому +1

      Get the sponsorblock extension and wait a bit before watching. No one will care how early you commented 500 years from now.

    • @robertlemonsjr
      @robertlemonsjr Рік тому +2

      Use Brave lol

    • @simonbrennan7283
      @simonbrennan7283 Рік тому +8

      If you can't figure out how to watch UA-cam without ads then your probably not part of the target audience.
      Hint; you can block them at the application layer (browser extension) or at network layer (DNS sinkhole). You will never know they even existed. 😉

    • @markc6714
      @markc6714 Рік тому

      @@johndeaux8815 assuming a browser.... What a dumb@ss

    • @markc6714
      @markc6714 Рік тому

      @@robertlemonsjr and another browser boy..... Probably on Pc too..... Yeh right