Introducing Pwncat: Automating Linux Red Team Operations

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024

Комментарии • 91

  • @DM-qm5sc
    @DM-qm5sc 4 года назад +71

    John was focusing on smiling 🤣

    • @_JohnHammond
      @_JohnHammond  4 года назад +36

      It's so weird having the camera still on you when you're not speaking bahahah
      I TOTALLY smiled at random and unnecessary moments xDD

    • @sharghaas7774
      @sharghaas7774 3 года назад +3

      @@_JohnHammond I just now started looking at your screen when Caleb is talking and those random smiles are ways too funny.

  • @jacobsurles3507
    @jacobsurles3507 4 года назад +36

    Haha John looks so serious when he's listening.

  • @blesseduyo3948
    @blesseduyo3948 4 года назад +3

    Wow, this is awesome. Already testing on my box. Saves time and stress. Thanks John and Caleb.

  • @tarikat6870
    @tarikat6870 4 года назад +1

    its amazing , used it , tested it , nothing less than great , well done stewart & john and anyone else involved . thank u all .

  • @texastitan6567
    @texastitan6567 4 года назад +15

    Bruh my LT can’t even unjam a printer and he’s a comm officer. I wish I had this LT

  • @allurbase
    @allurbase 4 года назад +1

    "my job during the work hours i have to put in" feel you bro!

  • @somebodystealsmyname
    @somebodystealsmyname 4 года назад +1

    Hey John,
    I really love the concept. I have 3 weeks of OSCP Lab time left and if I have some breaks in between, I will try to use pwncat against a few machines.

  • @rioruner8377
    @rioruner8377 2 года назад

    alerque & john ~~~ very-niiice!

  • @KrizyzZ00
    @KrizyzZ00 4 года назад

    Thank you so much for sharing this tool, it is awesome and looks like it will grow more because of all the potential it has.
    I did a silly mistake when installing it but you were too quick to point me in the right direction

  • @howardbarnes5604
    @howardbarnes5604 Год назад

    You are a brain, dude! You taught me more about remote shells in the last 45 minutes than all the books, tapes, url's, etc. have taught me in the past five years. Thanks.

  • @parthghughriwala6799
    @parthghughriwala6799 3 года назад

    What you guys are doing deserves a lot of contribution! 👏👏👏

  • @atharvavaidya6230
    @atharvavaidya6230 4 года назад

    This is really really awesome!! Everything looks really cool! Kudos to both of you John and Caleb!!!

  • @muchbuild
    @muchbuild 4 года назад +1

    Most useful thing I ever see I wish I knew it before literally fantastic

  • @ddupree67
    @ddupree67 4 года назад

    Very nice! Thanks for sharing! Awesome stuff!

  • @sb77727
    @sb77727 6 месяцев назад

    Minute 3.43 John glasses looks like a powerful anime character.

  • @amerikraine3401
    @amerikraine3401 3 года назад

    #John Hammond #Caleb Stewart this is pure genius guys I don't know if y'all realize how many doors this opens. This is amazing. Thanks guys.

  • @website8362
    @website8362 4 года назад

    I need to re-watch all of this but it looks amazing!

  • @KrakoonGaming
    @KrakoonGaming 4 года назад

    congrats for 100k and this topic you covered is also nice

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Nice expression morr details explain

  • @crassProgrammer
    @crassProgrammer 4 года назад +2

    Yeahahhahah 100k subs🥳🥳🥳 Congratulations.. Party time😅😅

  • @_Voice_like_me
    @_Voice_like_me 6 месяцев назад

    🎉

  • @cyber_chrisp
    @cyber_chrisp 2 года назад

    😎 very cool

  • @kartibok001
    @kartibok001 4 года назад +2

    John - great video - Would love to try the busybox piece. I assume that busybox would be on your console folder. What binaries or source code would be reqired to get the upload and install completed?

    • @_JohnHammond
      @_JohnHammond  4 года назад +2

      Busybox will be pulled down from it's source online, and it would all be seamlessly compiled and set up. You don't need to have it in your local folder. :)
      Thanks so much for watching!

  • @huhwhatwho7895
    @huhwhatwho7895 4 года назад

    python3 -c 'import pty;pty.spawn("/bin/bash")'
    ctrl + z
    stty raw -echo
    fg
    enter
    enter
    export TERM=xterm
    cheap and easy full tty shell upgrade, interchange python3 with python2 if not available and bash with system shells available
    :)

  • @grandmakisses9973
    @grandmakisses9973 3 года назад

    I love this tool!

  • @maxali6591
    @maxali6591 4 года назад

    Nice too see you 😃

  • @chris8206
    @chris8206 3 года назад

    Awesome video

  • @haraprasadghosh6866
    @haraprasadghosh6866 3 года назад

    I like pwncat tool

  • @RR-fs9wl
    @RR-fs9wl 4 года назад

    when u reach 10th prestige infosec u have resting serial killer face lol good tool guys! very streamlined

  • @ayodub
    @ayodub 3 года назад

    I want to install this but I really like Cytopia's pwncat as well. Does anyone have a recommendation how to install both without causing any sort of collisions between the two scripts?

  • @i_sometimes_leave_comments
    @i_sometimes_leave_comments 4 года назад

    1. Would you consider changing the name? It'd be nice to be able to use both without conflict, and cytopia already has their pwncat packaged for pip & Arch.
    2. With the `on_load` setting, would we be able to decide what exactly we may want it to run based on some conditions like `is_Windows`/`is_Linux` or `UID`/`EID`?
    3. It may be nice to have some known scripts like linpeas as a downloadable & save its output in the database automatically when we run it for later reference.
    4. Please make it able to import custom plugins like vim. We may want to extend this and make our own plugins like one to look up exploits with `exploitdb` or a plugin to upload my own custom tools & compile them on the target machine. You can make the gtfobins module a separate plugin to do lookups using a local database or the official site/repo.
    5. With the `privesc` (& similar) function, we should be able to see every step & exploit tried & used with a `-v` flag. This would also really help in reports.

  • @monishdhayalan2552
    @monishdhayalan2552 4 года назад

    Congrats for 100k

  • @cuttlefishn.w.2705
    @cuttlefishn.w.2705 3 года назад

    If it weren't for this video, I wouldn't have realized that what I downloaded with yay was actually cytopia's pwncat, not the one being showcased in your vids... Is this why you git clone everything into /opt/?
    Oh yeah, is there a rule of thumb to follow for whether something should be downloaded using the package manager/AUR or pulled from git? Starting out in beginner ctf, my biggest challenge is getting around buggy tools (I know what I signed up for, still gonna ask).

  • @anish_chapagai
    @anish_chapagai 3 года назад

    Damn John, I can count all your tooth. Killing smile!

  • @cimihan4816
    @cimihan4816 4 года назад

    congratulation for 100K...

  • @sunmoon2005
    @sunmoon2005 4 года назад

    John you are the pro haker

  • @brogrande9620
    @brogrande9620 4 года назад

    I might have missed it, but does pwncat background or keep-alive multiple sessions? I’m thinking in comparison to a traditional C2 like Koadic, where a stager will keep alive multiple “zombies” and you can launch payloads against more than one host at a time.

  • @Robert_777
    @Robert_777 4 года назад +1

    100k Soon

    • @_JohnHammond
      @_JohnHammond  4 года назад +1

      Finally got it! Thank you so much for all the support!

    • @Robert_777
      @Robert_777 4 года назад

      @@_JohnHammond OMG BIG Fan Sir

  • @jandrodali4901
    @jandrodali4901 4 года назад +3

    Hey man i have a suggestion ! why not you add linpeas as a module it will be super cool !

    • @_JohnHammond
      @_JohnHammond  4 года назад +6

      Ideally we will have all of the LinPEAs functionality baked into the `enum` command and enumeration feature, so pwncat can keep track of all of the information that it finds and and can know how to do more with it in the future.We definitely want to borrow a lot of LinPEAs tricks and make sure they are all in there -- we have been using LinPEAS and LinEnum as the motivation and starting point for the enumeration so far!

  • @good2577
    @good2577 4 года назад

    It might actually be the modern swiss army knife for hackers and replace netcat😯

  • @munaz55
    @munaz55 3 года назад

    pretty sure soon they will release pwncat OS

  • @all_c1ear
    @all_c1ear 4 года назад

    i do like pwncat, it's awesome. Can you plz make one video about config file for it? How do i specify it to pwncat and where i can find this config file. Big thanks.

  • @insaneminer
    @insaneminer 4 года назад

    How do i start the client script, do i need to install the requirements in the requirements.txt file on the target machine.

  • @zezimadude13
    @zezimadude13 3 года назад +1

    Can't get the enum command to work. Says it's not found.

    • @andrewferguson6901
      @andrewferguson6901 3 года назад

      yeah im having some trouble calling the pwncat local methods where stuff isn't casting to the proper type deep deep in the guts

  • @mariusandersons
    @mariusandersons 4 года назад

    what sliding template are you guys using ?

  • @calebshaffer2087
    @calebshaffer2087 4 года назад

    Is there going to be a CTF or something like along those lines that we could use to practice pwncat?

    • @JTwisted
      @JTwisted 3 года назад

      Awesome idea! May be on THM?

  • @mohammeddhiyaeddinegouaour1636
    @mohammeddhiyaeddinegouaour1636 4 года назад

    Does pwncat handle multiple connection to the same host ?

  • @glitchdigger
    @glitchdigger 4 года назад

    whys this better than meterpreter

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Called hi "friend "John hi
    Bool bn synk?

  • @hacksudo
    @hacksudo 3 года назад

    Which is best empire or pwncat

  • @Thunder-dp7du
    @Thunder-dp7du 4 года назад

    it's look cool but does it applicable for OSCP?

  • @all_c1ear
    @all_c1ear 4 года назад

    hi, can you plz upload pdf presentation on github page. Thanks

  • @joshb5857
    @joshb5857 4 года назад

    Do you plan to add Windows support?

  • @adamhuk3624
    @adamhuk3624 4 года назад

    How do you get pwncat on the target machine?

    • @_JohnHammond
      @_JohnHammond  4 года назад +2

      You won't need it on the target machine -- it is agentless, so you just need it to run on your own attacking machine. "pwncat" itself won't touch the target... you are running just a regular reverse or bind shell or SSH connection from the target's perspective. pwncat just opens up the ability for the end target to be automated. Thanks for watching!

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Data search

  • @rakenso
    @rakenso 4 года назад +4

    is that Freddie Mercury ?

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Claed hi

  • @w0lverinew0lverine19
    @w0lverinew0lverine19 4 года назад

    DO YOU HAVE A DISCORD SERVER?

  • @djebbaranon5892
    @djebbaranon5892 4 года назад +2

    99.9k subs hahahah

    • @_JohnHammond
      @_JohnHammond  4 года назад +2

      Finally broke 100k! It is UNREAL! :D

    • @djebbaranon5892
      @djebbaranon5892 4 года назад

      @@_JohnHammond
      Man you deserve more thanks for sharing the knowledge I learned so many things from you
      And thanks again ❤️❤️

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Ftp comments

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Out pot server files