Hey John, I really love the concept. I have 3 weeks of OSCP Lab time left and if I have some breaks in between, I will try to use pwncat against a few machines.
Thank you so much for sharing this tool, it is awesome and looks like it will grow more because of all the potential it has. I did a silly mistake when installing it but you were too quick to point me in the right direction
You are a brain, dude! You taught me more about remote shells in the last 45 minutes than all the books, tapes, url's, etc. have taught me in the past five years. Thanks.
John - great video - Would love to try the busybox piece. I assume that busybox would be on your console folder. What binaries or source code would be reqired to get the upload and install completed?
Busybox will be pulled down from it's source online, and it would all be seamlessly compiled and set up. You don't need to have it in your local folder. :) Thanks so much for watching!
python3 -c 'import pty;pty.spawn("/bin/bash")' ctrl + z stty raw -echo fg enter enter export TERM=xterm cheap and easy full tty shell upgrade, interchange python3 with python2 if not available and bash with system shells available :)
I want to install this but I really like Cytopia's pwncat as well. Does anyone have a recommendation how to install both without causing any sort of collisions between the two scripts?
1. Would you consider changing the name? It'd be nice to be able to use both without conflict, and cytopia already has their pwncat packaged for pip & Arch. 2. With the `on_load` setting, would we be able to decide what exactly we may want it to run based on some conditions like `is_Windows`/`is_Linux` or `UID`/`EID`? 3. It may be nice to have some known scripts like linpeas as a downloadable & save its output in the database automatically when we run it for later reference. 4. Please make it able to import custom plugins like vim. We may want to extend this and make our own plugins like one to look up exploits with `exploitdb` or a plugin to upload my own custom tools & compile them on the target machine. You can make the gtfobins module a separate plugin to do lookups using a local database or the official site/repo. 5. With the `privesc` (& similar) function, we should be able to see every step & exploit tried & used with a `-v` flag. This would also really help in reports.
If it weren't for this video, I wouldn't have realized that what I downloaded with yay was actually cytopia's pwncat, not the one being showcased in your vids... Is this why you git clone everything into /opt/? Oh yeah, is there a rule of thumb to follow for whether something should be downloaded using the package manager/AUR or pulled from git? Starting out in beginner ctf, my biggest challenge is getting around buggy tools (I know what I signed up for, still gonna ask).
I might have missed it, but does pwncat background or keep-alive multiple sessions? I’m thinking in comparison to a traditional C2 like Koadic, where a stager will keep alive multiple “zombies” and you can launch payloads against more than one host at a time.
Ideally we will have all of the LinPEAs functionality baked into the `enum` command and enumeration feature, so pwncat can keep track of all of the information that it finds and and can know how to do more with it in the future.We definitely want to borrow a lot of LinPEAs tricks and make sure they are all in there -- we have been using LinPEAS and LinEnum as the motivation and starting point for the enumeration so far!
i do like pwncat, it's awesome. Can you plz make one video about config file for it? How do i specify it to pwncat and where i can find this config file. Big thanks.
You won't need it on the target machine -- it is agentless, so you just need it to run on your own attacking machine. "pwncat" itself won't touch the target... you are running just a regular reverse or bind shell or SSH connection from the target's perspective. pwncat just opens up the ability for the end target to be automated. Thanks for watching!
John was focusing on smiling 🤣
It's so weird having the camera still on you when you're not speaking bahahah
I TOTALLY smiled at random and unnecessary moments xDD
@@_JohnHammond I just now started looking at your screen when Caleb is talking and those random smiles are ways too funny.
Haha John looks so serious when he's listening.
Hahaha I guess I have RBF in this video :)
Razor sharp focus!
Wow, this is awesome. Already testing on my box. Saves time and stress. Thanks John and Caleb.
its amazing , used it , tested it , nothing less than great , well done stewart & john and anyone else involved . thank u all .
Bruh my LT can’t even unjam a printer and he’s a comm officer. I wish I had this LT
"my job during the work hours i have to put in" feel you bro!
Hey John,
I really love the concept. I have 3 weeks of OSCP Lab time left and if I have some breaks in between, I will try to use pwncat against a few machines.
alerque & john ~~~ very-niiice!
Thank you so much for sharing this tool, it is awesome and looks like it will grow more because of all the potential it has.
I did a silly mistake when installing it but you were too quick to point me in the right direction
You are a brain, dude! You taught me more about remote shells in the last 45 minutes than all the books, tapes, url's, etc. have taught me in the past five years. Thanks.
What you guys are doing deserves a lot of contribution! 👏👏👏
This is really really awesome!! Everything looks really cool! Kudos to both of you John and Caleb!!!
Most useful thing I ever see I wish I knew it before literally fantastic
Very nice! Thanks for sharing! Awesome stuff!
Minute 3.43 John glasses looks like a powerful anime character.
#John Hammond #Caleb Stewart this is pure genius guys I don't know if y'all realize how many doors this opens. This is amazing. Thanks guys.
I need to re-watch all of this but it looks amazing!
congrats for 100k and this topic you covered is also nice
Nice expression morr details explain
Yeahahhahah 100k subs🥳🥳🥳 Congratulations.. Party time😅😅
Thank you so much!
@@_JohnHammond 😅😀
🎉
😎 very cool
John - great video - Would love to try the busybox piece. I assume that busybox would be on your console folder. What binaries or source code would be reqired to get the upload and install completed?
Busybox will be pulled down from it's source online, and it would all be seamlessly compiled and set up. You don't need to have it in your local folder. :)
Thanks so much for watching!
python3 -c 'import pty;pty.spawn("/bin/bash")'
ctrl + z
stty raw -echo
fg
enter
enter
export TERM=xterm
cheap and easy full tty shell upgrade, interchange python3 with python2 if not available and bash with system shells available
:)
I love this tool!
Nice too see you 😃
Awesome video
I like pwncat tool
when u reach 10th prestige infosec u have resting serial killer face lol good tool guys! very streamlined
I want to install this but I really like Cytopia's pwncat as well. Does anyone have a recommendation how to install both without causing any sort of collisions between the two scripts?
1. Would you consider changing the name? It'd be nice to be able to use both without conflict, and cytopia already has their pwncat packaged for pip & Arch.
2. With the `on_load` setting, would we be able to decide what exactly we may want it to run based on some conditions like `is_Windows`/`is_Linux` or `UID`/`EID`?
3. It may be nice to have some known scripts like linpeas as a downloadable & save its output in the database automatically when we run it for later reference.
4. Please make it able to import custom plugins like vim. We may want to extend this and make our own plugins like one to look up exploits with `exploitdb` or a plugin to upload my own custom tools & compile them on the target machine. You can make the gtfobins module a separate plugin to do lookups using a local database or the official site/repo.
5. With the `privesc` (& similar) function, we should be able to see every step & exploit tried & used with a `-v` flag. This would also really help in reports.
Congrats for 100k
If it weren't for this video, I wouldn't have realized that what I downloaded with yay was actually cytopia's pwncat, not the one being showcased in your vids... Is this why you git clone everything into /opt/?
Oh yeah, is there a rule of thumb to follow for whether something should be downloaded using the package manager/AUR or pulled from git? Starting out in beginner ctf, my biggest challenge is getting around buggy tools (I know what I signed up for, still gonna ask).
Damn John, I can count all your tooth. Killing smile!
congratulation for 100K...
Thank you so much!
John you are the pro haker
I might have missed it, but does pwncat background or keep-alive multiple sessions? I’m thinking in comparison to a traditional C2 like Koadic, where a stager will keep alive multiple “zombies” and you can launch payloads against more than one host at a time.
100k Soon
Finally got it! Thank you so much for all the support!
@@_JohnHammond OMG BIG Fan Sir
Hey man i have a suggestion ! why not you add linpeas as a module it will be super cool !
Ideally we will have all of the LinPEAs functionality baked into the `enum` command and enumeration feature, so pwncat can keep track of all of the information that it finds and and can know how to do more with it in the future.We definitely want to borrow a lot of LinPEAs tricks and make sure they are all in there -- we have been using LinPEAS and LinEnum as the motivation and starting point for the enumeration so far!
It might actually be the modern swiss army knife for hackers and replace netcat😯
pretty sure soon they will release pwncat OS
i do like pwncat, it's awesome. Can you plz make one video about config file for it? How do i specify it to pwncat and where i can find this config file. Big thanks.
How do i start the client script, do i need to install the requirements in the requirements.txt file on the target machine.
Can't get the enum command to work. Says it's not found.
yeah im having some trouble calling the pwncat local methods where stuff isn't casting to the proper type deep deep in the guts
what sliding template are you guys using ?
Is there going to be a CTF or something like along those lines that we could use to practice pwncat?
Awesome idea! May be on THM?
Does pwncat handle multiple connection to the same host ?
whys this better than meterpreter
Called hi "friend "John hi
Bool bn synk?
Which is best empire or pwncat
it's look cool but does it applicable for OSCP?
hi, can you plz upload pdf presentation on github page. Thanks
Do you plan to add Windows support?
How do you get pwncat on the target machine?
You won't need it on the target machine -- it is agentless, so you just need it to run on your own attacking machine. "pwncat" itself won't touch the target... you are running just a regular reverse or bind shell or SSH connection from the target's perspective. pwncat just opens up the ability for the end target to be automated. Thanks for watching!
Data search
is that Freddie Mercury ?
Yes
Not even close
Claed hi
DO YOU HAVE A DISCORD SERVER?
99.9k subs hahahah
Finally broke 100k! It is UNREAL! :D
@@_JohnHammond
Man you deserve more thanks for sharing the knowledge I learned so many things from you
And thanks again ❤️❤️
Ftp comments
Out pot server files