Hide a Hacker's Reverse Shell in ONE Command

Поділитися
Вставка
  • Опубліковано 11 тра 2023
  • j-h.io/plextrac || Save time and effort on pentest reports with PlexTrac's premiere reporting & collaborative platform in a FREE one-month trial! j-h.io/plextrac 😎
    🔥 UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

КОМЕНТАРІ • 59

  • @laurenlewis4189
    @laurenlewis4189 Рік тому +12

    Grzegorz is pronounced "gSehgoS" where the capital "S"s are pronounced like the "s" in "treasure"/"pleasure"/"vision."
    Tworek is easier: "tforek" - just remember that most european languages pronounce "w" the way english speakers pronounce "v," and in some words that can get the "voice" (the hum) taken out of it to become an "f"
    I highly recommend learning the International Phonetic Alphabet. It makes sense of those weird pronunciation symbols on Wikipedia and Wiktionary, and you'll look like you're a smart cookie who speaks multiple languages when you just have figured out how to read pronunciation guides.
    Knowing how to pronounce words in other languages and knowing what phonemes are commonly used in certain languages also helps you fake an accent and better socially engineer people, if that's the type of hacker you're aiming to be.

    • @PR1V4TE
      @PR1V4TE Рік тому +1

      That's a great explanation right there my friend. 😂👍🏻

    • @amine_jbz
      @amine_jbz 6 місяців тому

      Hello man,
      I'm from Belgium and as a native French speaker, we don't pronounce the w like a v for an English-speaker, but It's right for some European-language like German and more.
      Btw, thank you for your good explanations and your advices !

  • @andreadistasi8842
    @andreadistasi8842 Рік тому

    Great one! I like that you kept it slim!

  • @list1726
    @list1726 Рік тому +1

    Thanks for posting

  • @panchakosha
    @panchakosha Рік тому +10

    Yes, that's correct \0 is a null character. \1 would be a null character but with an index of 1, so \0\1 would be two null terminated strings.
    Modifying the registry doesn't affect the RDP query commands directly. It just allows you to customize the output with the key and value. The query commands retrieve the information from multiple sources: WMI, RDS, TS configs, registry, system data structures like Process Management, etc.

    • @keylanoslokj1806
      @keylanoslokj1806 Рік тому

      Meaning exactly?

    • @panchakosha
      @panchakosha Рік тому +1

      @@keylanoslokj1806 I was responding to questions he was asking in the video. Null characters can be used to separate multiple strings stored as a single value in the registry. For example, /d 0\01\0LOLBin\0calc.exe. He was also wondering where the RDP query commands were pulling their info. A more concrete example would be WMI providers specific to RDP, such as the Win32_TerminalService or Win32_TerminalServiceSetting classes.

    • @coltonthomas3658
      @coltonthomas3658 Рік тому

      @@panchakosha can you explain the null character indexing? Can a reg value be "string/0hello/1world/2"? Is this why they show up as newlines when you view the key in regedit?

    • @dineshpavar1724
      @dineshpavar1724 8 місяців тому

      🎉🎉🎉😊🎉

  • @groundwalker2162
    @groundwalker2162 Рік тому

    Love your content
    Inspired me to learn

  • @guyincognito9009
    @guyincognito9009 Рік тому +1

    Dude this guy is incredible. Just like you, thanks so much for All your Videos john

  • @FuzzerHash
    @FuzzerHash Рік тому

    Heavy nice content, already waiting next videos.

  • @cyberdevil657
    @cyberdevil657 Рік тому +2

    That is epic Jhon keep up the great work!

  • @gooniesfan7911
    @gooniesfan7911 Рік тому +8

    So you could instead of run a dropped file/bat loader, you could just make it execute a powershell command that downloads&executes the malicious code? (say reflectively load a dll) Then have a scheduled task to run the bogie query command? Would this be considered fileless?

    • @foeyloozer6299
      @foeyloozer6299 Рік тому +1

      No. Fileless is when the entire payload is contained in the LOLbin. If you have it execute something you drop to disk thats not fileless.

  • @ReligionAndMaterialismDebunked

    AMSI reminds me of Jamsey and Wamsey, an inside joke my friend's friend started. Haha

  • @panchakosha
    @panchakosha Рік тому

    Does CLR Hooking to bypass AMSI still work in Windows 11?

  • @JontheRippa
    @JontheRippa Рік тому +3

    Wow i love it 👍👍👍

  • @HxN0n3
    @HxN0n3 Рік тому

    Superb! man

  • @donttrusttheape
    @donttrusttheape Рік тому

    It will be Gregor in English, actually one of few Polish chaps worth, following!

  • @oildiggerlwd
    @oildiggerlwd Рік тому +2

    Love the comments about webroot. Made me laugh because that’s what our MSP has installed on our endpoints.

  • @mikaeleriksson6504
    @mikaeleriksson6504 Рік тому +1

    Am I missing something. You need to have admin rights to add the query command right?

    • @MasterOfMisc
      @MasterOfMisc Рік тому +1

      Yeah your right. You still need admin access to write to the registry. Which makes this kind of moot

  • @Vort3X-tech
    @Vort3X-tech 6 місяців тому +1

    How can you run that payload on the target machine without them noticing?

  • @rodricbr
    @rodricbr Рік тому

    awesome

  • @kazhiroma9736
    @kazhiroma9736 Рік тому

    I was just watching your video on hoaxshell

  • @MrClawt
    @MrClawt Рік тому

    What if you can't write to HKLM?

  • @franman6831
    @franman6831 Рік тому +1

    Top tier content John

  • @ruthvikas
    @ruthvikas Рік тому +10

    Still waiting for picoCTF 2023 🙃

    • @PR1V4TE
      @PR1V4TE Рік тому +2

      John himself need a walkthrough first 😂.

  • @stevegreen2753
    @stevegreen2753 Рік тому +1

    I like it :)

  • @lancemarchetti8673
    @lancemarchetti8673 Рік тому

    Nery Vice!

  • @bogutkghbkng12
    @bogutkghbkng12 8 місяців тому +1

    Irshad

  • @OfficialAfterLifeEdits
    @OfficialAfterLifeEdits Місяць тому

    the vrisu got me

  • @dariusvlogs3634
    @dariusvlogs3634 Рік тому +3

    How to bypass amsi

    • @ScottPlude
      @ScottPlude Рік тому

      Are you telling us how?

    • @ygx6
      @ygx6 Рік тому

      ​@@ScottPlude nah he's asking

  • @keylanoslokj1806
    @keylanoslokj1806 Рік тому +1

    Dear mr Hammond our favourite security expert. How can the simple, total beginner user, check if someone has hijacked any device of his network? Smartphone, laptop, smart TV etc. How do we detect a compromise or even foreign users?

  • @Gobillion160
    @Gobillion160 Рік тому

    write ur report with chatgpt

  • @alexandrohdez3982
    @alexandrohdez3982 Рік тому

    👏👏👏

  • @d8rh8r35
    @d8rh8r35 Рік тому

    noice

  • @MrEndzo
    @MrEndzo Рік тому +25

    Hacking Windows is cheating.

    • @trojankit
      @trojankit Рік тому +2

      Wym?

    • @Exotic69420
      @Exotic69420 Рік тому

      literally

    • @Exotic69420
      @Exotic69420 Рік тому

      @@trojankit too easy

    • @bc100dev
      @bc100dev Рік тому +1

      True. Better make Linux malware instead of Windows malware

    • @ggsap
      @ggsap 6 місяців тому

      @@bc100dev How? That is so much easier

  • @tyrojames9937
    @tyrojames9937 Рік тому

    👍🏾

  • @anilbangera1
    @anilbangera1 Рік тому

  • @Repossessionn
    @Repossessionn Рік тому

    ayyy

  • @biocode2856
    @biocode2856 Рік тому

    It's a nkritid viris😂😊

  • @ReligionAndMaterialismDebunked

    Early :3

  • @Mezzosd
    @Mezzosd Рік тому

    Windows defender its work lol

  • @adonyz666
    @adonyz666 Рік тому

    first

  • @wha-yuanfh
    @wha-yuanfh Рік тому

    useless