How Hackers Compromise Other Users

Поділитися
Вставка
  • Опубліковано 23 лис 2023
  • jh.live/snyk || Try Snyk for free and find vulnerabilities in your code and applications! ➡ jh.live/snyk
    More Fetch the Flag writeups: jh.live/ftf-writeups
    Free Cybersecurity Education and Ethical Hacking
    🔥UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

КОМЕНТАРІ • 48

  • @FuzzerHash
    @FuzzerHash 7 місяців тому +6

    John, not just the content of your channel are great but too your way of teach

  • @chrisclark5135
    @chrisclark5135 7 місяців тому

    Great vid as always, John and congrats on a MILLY! You da man!!

  • @debarghyamaitra
    @debarghyamaitra 7 місяців тому +3

    Hey John can you make some solution videos for the Huntress CTF?
    really loved the competition, would love to see some of it's solutions!

  • @74mada
    @74mada 7 місяців тому

    Nice lesson, thanks John.

  • @wizzyoo37
    @wizzyoo37 7 місяців тому +3

    It must have been patched on Debian 12 because this exploit doesn't work on my system.

    • @Darkregen9545
      @Darkregen9545 7 місяців тому +1

      Most things John post's are patched exploit hacks. If John finds exploits he usually reports it to the proper organization before making a video of it. Other than that he finds already patched exploits to make a video on.

  • @TRAVESIAA
    @TRAVESIAA 7 місяців тому

    WOW. Thank you

  • @DavidAlvesWeb
    @DavidAlvesWeb 7 місяців тому +1

    Great video John! I don't think I'll ever do hands-on technical videos anymore... I will never do them as good as you 😅
    Big props to the editor! Ps: consider removing all the commas and periods on the captions!

    • @AhegaHOE
      @AhegaHOE 7 місяців тому

      Is no one using the CC feature from UA-cam? Personally I think it's very annoying if you can't turn them off (when they're embedded in the video)

    • @DavidAlvesWeb
      @DavidAlvesWeb 7 місяців тому

      It helps with retention, specially in the beginning of a video@@AhegaHOE And I don't think everyone uses the autogenerated captions

    • @AhegaHOE
      @AhegaHOE 7 місяців тому

      @DavidAlvesWeb yeah I understand but remember that they don't have to be autogenerated, as a creator you can easily upload your own.

  • @dtitan1993
    @dtitan1993 7 місяців тому

    John, how do you mitigate these type of risks?

  • @zemourizemouri2406
    @zemourizemouri2406 7 місяців тому +1

    Always the best.

  • @csa5697
    @csa5697 7 місяців тому

    Beautiful.

  • @MAX-nv6yj
    @MAX-nv6yj 7 місяців тому

    thank u so much

  • @bernardpower1664
    @bernardpower1664 7 місяців тому

    thank you

  • @hassnatshah1112
    @hassnatshah1112 7 місяців тому

    Enjoyed the video. I was trying try hack me and was in the priviledge escalation module for linux and then i was trying to make a poc about setuid when i was learning linux and was trying to see if i can make a bash script that i can run with uid 0 just like passwd command but i failed on that as i was trying to access a file made by root user which my simple can not read, write or execute but with the bash script it just shows out that output as it runs with uid zero. i failed as i was using bash commands and i think i shloud be using a c++ code to make the executable for my requirement to happen. Would really appreciate it you can maybe do some fun stuff like that.

  • @texturebyte
    @texturebyte 6 місяців тому

    Is this different from business logic vulnerability ? if so, how ?

  • @brutalblade619
    @brutalblade619 7 місяців тому

    Someone correct me but this looks similar to Microsoft's/Windows verison called "Sysinternals"?

  • @tametov
    @tametov 7 місяців тому

    Nice nice!

  • @lfcbpro
    @lfcbpro 7 місяців тому

    Off topic here John, but how can you explore the dark web, without 'images' that are definitely illegal getting cached on your PC?
    I recently saw an older video of yours showing how to use a dark web search engine, but you had to blur images on the video because of 'under 18' content being sold, or shown, and that was just on a search engine (banner ads), without going to that particular site.
    This, in my country would be highly illegal, and I don't want any of that content on my PC.
    Is there a way you could do a guide or show how you could look at the dark web, or Tor sites, without having these images etc sent to your PC, or is that just part of going on the dark web? Is there a way to use a browser that you can stop it displaying any images for instance? Or does the Tor browser have any reliable addons such as adblock?
    I am studying computer science and would like to broaden my knowledge, but not if there is a chance I will see that stuff, or worse still end up on a register.
    *as a side note, if you do any further videos on the dark web etc, you might want to inform people that just receiving these images to your screen (even in a banner ad) can in some countries be illegal and get you severe penalties.

    • @maalikserebryakov
      @maalikserebryakov 7 місяців тому

      If u cannot figure this out as a compsci student I recommend transferring to Communications or somethinf hahaha

    • @lfcbpro
      @lfcbpro 7 місяців тому

      @@maalikserebryakov very constructive.

  • @Respect_video223
    @Respect_video223 7 місяців тому +2

    nice

  • @pavi013
    @pavi013 7 місяців тому

    There is so many ways to hack someone.

  • @user-ow5nk3po3d
    @user-ow5nk3po3d 7 місяців тому

    cool!!!

  • @popeyehacks
    @popeyehacks 7 місяців тому +1

    Cool🎉

  • @fmoney
    @fmoney 7 місяців тому

    Ayyy lets learn muahaha!

  • @BurkenProductions
    @BurkenProductions 7 місяців тому

    It's not called "tac" it's dash or a minus.

    • @QuibbleTrouble
      @QuibbleTrouble 7 місяців тому +2

      Tac (or tack) is military slang for a dash.

  • @JNET_Reloaded
    @JNET_Reloaded 7 місяців тому +1

    So why don't they patch find exploits?

    • @zellfaze
      @zellfaze 7 місяців тому +1

      I think because they are side effects of things that are generally useful and there are ways to lock things down so that these exploits are not possible.

    • @Samuel-cr9mc
      @Samuel-cr9mc 7 місяців тому

      Exploits either purposeful or mistake. Most times theyre reported before patched

  • @hitmax087
    @hitmax087 7 місяців тому

    To many words

  • @thomaswagner8650
    @thomaswagner8650 7 місяців тому

    First :D

  • @BenTen1000T
    @BenTen1000T 7 місяців тому +4

    Brother, you are a very good person. I like you very much Enter the realm of Islam. And become Muslims. There is nothing wrong with reading books on Islam. Watching will change your life. Preach to yourself and your friends. Explain this to yourself and your friends. You will find the teachings of Islam very interesting. By accepting Islam, you will find peace of mind. You have to think about what I said while sitting alone. Your life will change.

    • @maalikserebryakov
      @maalikserebryakov 7 місяців тому +1

      I left Islam when i was 12
      How do you still believe this Cope 💀

    • @simen9485
      @simen9485 7 місяців тому

      Lol😂

    • @FistoBlitzkrieg
      @FistoBlitzkrieg 7 місяців тому +3

      Brother, you are a very good person. I like you very much Enter the realm of Arch Linux. And become Arch user. There is nothing wrong with reading Arch Wiki. Watching will change your life. Preach to yourself and your friends. Explain this to yourself and your friends. You will find the teachings of Arch very interesting. By accepting Arch, you will find pacman -Syu. You have to think about what I said while sitting alone. Your life will change.

    • @mechanize6383
      @mechanize6383 7 місяців тому

      ​@@FistoBlitzkriegAmen.

    • @Da1deonly-ip8nj
      @Da1deonly-ip8nj 6 місяців тому +1

      @@maalikserebryakovtuff guess you wasn’t guided

  • @BurkenProductions
    @BurkenProductions 7 місяців тому

    it's called etc, not etcetera.... please don't learn noobs the wrong terminology!

    • @charnak
      @charnak 7 місяців тому

      @@omgboy4939 the etc directory is actually pronounced et-see. while it does mean etcetera, the jargon would be etc. just like we don't call the cat program concatenate, even though it is actually concatenate.

    • @inspired9584
      @inspired9584 7 місяців тому +2

      Document from Bell Labs, /etc is referred to as the etcetera directory,[4] as this directory historically held everything that did not belong elsewhere
      [4] J. DeFelicc (17 March 1972). "E.0". Preliminary Release of UNIX Implementation Document (PDF). p. 8. IMO.1-1.