Instagram & Twitter OSINT - DownUnderCTF

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024
  • Register for BsidesBOS CTF! bsidesbos.ctf....
    Hang with our community on Discord! johnhammond.or...
    If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    E-mail: johnhammond010@gmail.com
    PayPal: paypal.me/johnh...
    GitHub: github.com/Joh...
    Site: www.johnhammond...
    Twitter: / _johnhammond

Комментарии • 172

  • @dccybersec
    @dccybersec 3 года назад +109

    Cheers for the shoutout! Great video mate

    • @cansofcoke
      @cansofcoke 3 года назад +2

      I said out loud "hey he's talking about an Aussie cyber guy!" when he mentioned you :D Fellow cyber guy from syd here.

    • @dccybersec
      @dccybersec 3 года назад +2

      @@cansofcoke yooo Australia represent! hahaha

    • @cansofcoke
      @cansofcoke 3 года назад +1

      @john and @DC you guys going to do the Australian National Missing Persons Hackathon? :)

    • @dccybersec
      @dccybersec 3 года назад +1

      @@cansofcoke Yes! The CTF team i'm a part of (HYPASEC) is participating this year :)

    • @cansofcoke
      @cansofcoke 3 года назад

      @@dccybersec sooo awesome :) I'll see you there, i just signed up :)

  • @Zydent
    @Zydent 3 года назад +125

    I solved this a different way actually. I just got the thought of sending her an email and she responded with another mail where she stated her full name. Love your content John!

    • @avgmean4187
      @avgmean4187 3 года назад +61

      Lol, I sent her a formal business inquiry, spent like an hour setting up an online persona, bloating the account with bots and writing the message... The reply was automatic...

    • @TalsonHacks
      @TalsonHacks 3 года назад +5

      avg bndt lol

    • @ultimate8673
      @ultimate8673 3 года назад +5

      @@avgmean4187 😂😂😂😂😂😂😂

  • @adrianklamut8533
    @adrianklamut8533 3 года назад +90

    I think this cell phone message is something like "meet me at 9 30" last digits were held down for little longer for digits to appear

    • @skynet1024
      @skynet1024 3 года назад +30

      who are you so wise in the ways of science

    • @pennym6576
      @pennym6576 3 года назад +4

      my thoughts exactly

  • @mikeholmesdj
    @mikeholmesdj 3 года назад +70

    John you always ask if we don't mind you talking so much. We watch your channel to listen and learn, so keep talking. Another great video btw.

    • @reyandutta
      @reyandutta 3 года назад +3

      yaa.. his talking made me start off my infosec career, i was so inspired just by watching his videos

  • @Ayahalom123
    @Ayahalom123 3 года назад +8

    Loved the video!! Your "thinking out loud" process allows me to learn even better than "straight to the punch" videos!

  • @selvinpaul7255
    @selvinpaul7255 3 года назад +6

    Wow! Mind Blown!!! That's amazing Sir! 🙏 I had to setup a meeting with her on google calendar and that's how I got her middle name 😂

  • @seclilc
    @seclilc 3 года назад +6

    I really enjoy listening to your methodology so thanks for going down the rabbit hole and explaining every step

  • @satyamvirat3489
    @satyamvirat3489 3 года назад +6

    Tbh, that was far most the best video by you.
    Unlike rest, you covered the rabbit hole parts and actually did tell us what to do if those holes were actually what we needed to find and work around (like audio extraction and decoding it)
    Thnks pal❤️

  • @Raformatico
    @Raformatico 3 года назад +3

    It is great to have someone who takes your hand and guides you slowly through a challenge 👏😍 Thank you man!!!

  • @minuano8716
    @minuano8716 3 года назад +6

    Phenomenal video. I don't know if you actually checked the write-ups after the CTF was finished but that t9 decoding that you did was absolutely necessary for a later challenge in the same CTF. You basically had the solution for "A turn of events /w some REALLY bad OPSEC". Great intuition there.

  • @pasangamage
    @pasangamage Год назад

    that dialpad tones thing is important! thanks for sharing

  • @gbravy
    @gbravy 3 года назад

    Great video John. I appreciate all the depth you go down. The rabbit holes are always appreciated as well.

  • @InfosecGeekz
    @InfosecGeekz 2 года назад +1

    Great Video John👍 Simply loved the way you extracted all the Juice😍

  • @slaozeren8742
    @slaozeren8742 2 года назад

    I watched this video twice. Not because I didn't understand it but because I loved it so much.

  • @bechararizk7245
    @bechararizk7245 3 года назад +6

    02:09 that’s the undertaker...

  • @manoharbaratam8792
    @manoharbaratam8792 3 года назад +1

    I did hit the like button before even watching the video. Iam that much confident on JohnHammod content.. Love u john from India..

  • @Loicmartins
    @Loicmartins 3 месяца назад

    Thanks for the explanation about the phone!

  • @SageTheProfessor
    @SageTheProfessor 3 года назад

    Man that was a rabbit hole but I'm glad you walked is through it.

  • @stevenhall2
    @stevenhall2 Год назад

    John, I like the fact that you walked us through your process. Long video or not, it shows what it took to complete a process of actually doing the required grunt work. Running into dead ends and learning to pivot on certain datasets is critical to the hunt! Thanks for unpacking all of this, the video is excellent for those who want to get good at OSINT exploitation!

  • @gamingandanime9000
    @gamingandanime9000 2 года назад

    No, This video has to be this long. This was amazing and so informative! 💯

  • @Maniclout
    @Maniclout 3 года назад +5

    I can't help but focus on your glasses the whole time and those light reflections reminding me of anime smart guy moments.

  • @jovi___
    @jovi___ 3 года назад

    Im enjoying the longer videos and showing multiple tools

  • @killahb33
    @killahb33 2 года назад

    Got a laugh out of your DP comment, it's Undertaker.
    Anyways great vid!

  • @tylersmith8245
    @tylersmith8245 3 года назад +1

    That Sherlock tool is super nifty!

  • @sa-a7153
    @sa-a7153 3 года назад +1

    Really appriciate the descriptions about the rabbit holes. I think much of learning is to do with understanding how to evaluate all of the choices and not just thinking around that there is that single solution that will work. Those old phones had the "push long for the nbr." thing, right? Meet me at 93?

  • @antaresrepublic
    @antaresrepublic 2 года назад

    I really like your take on the rabbit hole. Very interesting.

  • @MrNomadBrad
    @MrNomadBrad 3 года назад +1

    Would love to see some more OSINT videos using all the tools you know of.

  • @mehammered
    @mehammered 3 года назад

    Your videos are the best, thanks!!!!!!! You tricked me on sherlock busting it out at the end.

  • @christinewinchester2031
    @christinewinchester2031 2 года назад

    Thanks, John!

  • @Hitu1197
    @Hitu1197 2 года назад

    Ahaha I was just thinking about Sherlock Tool when you were talking about usernames on different social medias lol

  • @SageTheProfessor
    @SageTheProfessor 3 года назад

    Fam, that's the Undertaker. Lol. Thanks for the video. Didn't know there were OSINT CTFs.

  • @mxbmvnvmbncmbn
    @mxbmvnvmbncmbn 3 года назад +1

    2:07
    apparently the undertaker from world wrestling entertainment is a spooky scary hacker man

  • @peterzenner2020
    @peterzenner2020 2 года назад

    Your idea of extracting and decoding the DTMF was exactly my thought also... so I thought it was a viable search!

  • @stanislavsmetanin1307
    @stanislavsmetanin1307 3 года назад

    Thanks for that DTMF thing.. I did not know about. 👍

  • @cli-hope417
    @cli-hope417 3 года назад

    Thanks for the extra time you took to share 👌

  • @ronakjoshi5093
    @ronakjoshi5093 3 года назад +2

    again a great video by john❤️

  • @3rg1s
    @3rg1s 3 года назад +1

    10:00 you can also drag the image and drop it on another tab so it opens the exact link and then you can see the photo without the login.

  • @HeyDudee
    @HeyDudee 3 года назад +1

    Thankyou John Legend!!! 🔥

  • @HenryPangsatabam
    @HenryPangsatabam 3 года назад +2

    "And I like these memes here. Nice! Nice!"

  • @olidingin6398
    @olidingin6398 3 года назад +1

    [20] Sebuah senyawa non volatil Z, digunakan untuk membuat dua larutan yang
    berbeda. Larutan A mengandung 5 g senyawa Z yang dilarutkan dalam 100 g air.
    Sedangkan larutan B mengandung 2,31 g senyawa Z yang dilarutkan dalam 100 g
    benzen. Larutan A mempunyai tekanan uap 754,5 mmHg pada titik didih air normal
    dan larutan B mempunyai tekanan uap yang sama pada titik didih normal benzen.
    Hitunglah massa molar dari senyawa Z pada larutan A dan B!

  • @crispyhaole8533
    @crispyhaole8533 3 года назад

    Dtf was worthwhile to showcase. Good vid

  • @binaryaction5
    @binaryaction5 3 года назад

    Love the explanation of what you did

  • @alexkatsanos8475
    @alexkatsanos8475 2 года назад

    This was cool. Thanks!

  • @ErickTosar
    @ErickTosar 2 года назад

    Oh you clonned some dinasours, i remember you!

  • @bruh_5555
    @bruh_5555 3 года назад +1

    Osnit stuff is fun for a change from complex hacking

  • @ashutoshmohanty
    @ashutoshmohanty 3 года назад +1

    Awesome

  • @aswinp888
    @aswinp888 3 года назад

    ITS NOT SPOOKY HACKER GUY, ITS UNDERTAKER MY G!!

  • @marcellmagvasi1668
    @marcellmagvasi1668 3 года назад

    i really like how u tell the things how its works or how i should do that too, so yeah keep doing these vids, u shouldnt care how long the videos are :DD i will watch it anyway...:_D

  • @user-sq7hj6hj7h
    @user-sq7hj6hj7h 2 года назад +1

    For sherlock you can just use --timeout 1 or 3 to speed things up

  • @ovxvii
    @ovxvii 3 года назад +1

    this was really interesting!

    • @ovxvii
      @ovxvii 3 года назад

      the cell phone numbers blew my mind

  • @user-uo5id1dd5s
    @user-uo5id1dd5s 2 года назад

    Thanks

  • @potatoonastick2239
    @potatoonastick2239 3 года назад +1

    "hello i am here for the flag plz" yes john great troll😂😂

  • @GeekBatman
    @GeekBatman 3 года назад

    The spookey scary hacker man pic. Is that not the wrestler Kane?

  • @thengakola6217
    @thengakola6217 3 года назад +10

    Zeroth comment ....grow up bois

  • @GauravTaxali
    @GauravTaxali Год назад

    I was earlier inclined towards red teaming, now that i have been introduced to OSiNT. I feel that it is something cooler and easier.

  • @goodgameplays9571
    @goodgameplays9571 3 года назад

    tysm for the content

  • @hegen7642
    @hegen7642 2 года назад +1

    22:05 is saying: meet me at 9:30 I'm guessing

  • @skynet1024
    @skynet1024 3 года назад +7

    those guys with the dislike must have their screens upside down

    • @0x7ddf1
      @0x7ddf1 3 года назад

      Hahahaha true

  • @jorisschepers85
    @jorisschepers85 3 года назад

    Keep them coming John.

  • @JustSomeAussie1
    @JustSomeAussie1 3 года назад

    It sounds so funny when you say "mum"

  • @AbdennacerAyeb
    @AbdennacerAyeb 3 года назад

    you r great.. we r learning a lot from your chanel

  • @CyberWorldSec
    @CyberWorldSec 3 года назад +4

    please make more on osint where a location is given

  • @champmq5385
    @champmq5385 3 года назад

    By the way to download the video you could also just look at the HTML code and then take the link for the video I guess this would also be simple training for understanding html codes idk.
    But its still nice content

  • @kal_dev
    @kal_dev 2 года назад

    wow incredible video, dial tone detect🤗

  • @rajith8973
    @rajith8973 3 года назад

    John good luck for bsides boston ctf

  • @b07x
    @b07x 3 года назад

    2:15
    That's undertaker, a wwe actor

  • @jaypomal5534
    @jaypomal5534 3 года назад

    that's really good john

  • @somebodystealsmyname
    @somebodystealsmyname 3 года назад

    Hey John, not every entry in the Wayback Machine is really from the day it says. So even though you clicked on 19.09., you got the version from july.

  • @cardzzz6585
    @cardzzz6585 3 года назад +2

    HYPA! HYPA!

  • @techguy921
    @techguy921 3 года назад

    U can decode sound using DTMF decoder app in your phone through microphone , much quicker without downloading and converting

  • @sirw369
    @sirw369 3 года назад

    Lmao @ 22:56. I would’ve done the same John 😂

  • @Phoenix_VR
    @Phoenix_VR 3 года назад

    I have a very odd one, and I wasn't even playing or interested in CTF games.....a number and a location...that's it. :D

  • @RuDrAkSh_is_live
    @RuDrAkSh_is_live 2 года назад

    omg what a challenge

  • @gerryolivergerryoliverphot5182
    @gerryolivergerryoliverphot5182 3 года назад

    The undertaker was his picture

  • @hoodietramp
    @hoodietramp 10 месяцев назад

    I think soups watched your this video for the beep64 idea in fetch the flag🤣

  • @wasfyelking6926
    @wasfyelking6926 3 года назад

    Respect johnyy ⚡️⚡️

  • @jesusxXxlizzard
    @jesusxXxlizzard 3 года назад

    Very nice buddy!

  • @silverman2263
    @silverman2263 3 года назад

    Hi Sir your all videos super

  • @toddmathews3329
    @toddmathews3329 2 года назад

    😅😅😅 loved it.

  • @matthewfluke7957
    @matthewfluke7957 Год назад

    Even Tinder… Nice!!! 😂

  • @tomotion
    @tomotion 3 года назад

    You can use -t 1 for Sherlock to set a timeout to 1 second

  • @jacobsan
    @jacobsan 3 года назад

    Amazing

  • @51mpl3-b9
    @51mpl3-b9 3 года назад

    Nice method on the phone number/thing

  • @CRSolarice
    @CRSolarice 3 года назад

    Tell me what brand and model is your PC? CPU model and memory brand and speed or just model number. Your BIOS may not be properly configured and did you do the update for the bios? Have you built a PC before?: My best uninformed guess is going to be heat related. Ie incorrect cpu paste deployement, case arrangement and fans (orientation and position), if water could be air trapped, pump speed, paste and radiator sizing. Photos will help if you still have slowness. Is GPU blowing air out through the back or directly into the path of CPU intake?

  • @alcxander
    @alcxander 3 года назад

    these are really interesting, how does one get started on doing these CTF's etc?

  • @AswinHaridasOne_77
    @AswinHaridasOne_77 2 года назад

    That's undertaker as the profile picture. 😄😄 not hacker man

  • @kartibok001
    @kartibok001 3 года назад +1

    What a great video!! (TINDER - wtf :) )

    • @bruh_5555
      @bruh_5555 3 года назад +3

      Error, extra closing braces, cannot compile comment

    • @kartibok001
      @kartibok001 3 года назад

      @@bruh_5555 Damn no smiling faces!!

  • @alph4byt3
    @alph4byt3 3 года назад

    I believe the twitter pic is the undertaker from wwe

  • @vater7841
    @vater7841 3 года назад

    nice

  • @user-pe2mf5tg3h
    @user-pe2mf5tg3h 2 года назад

    I was disappointed you didn't principle skinner the DTMF tones.

  • @b07x
    @b07x 3 года назад

    27:55 I though it was only me because my internet is very slow.

  • @M7_ii
    @M7_ii 2 года назад

    You shouldve done the timeout to one second for the sherlock search

  • @ritamchatterjee3307
    @ritamchatterjee3307 3 года назад

    Im not getting one url in the way back machine,what would be the issue any idea

  • @venox314
    @venox314 2 года назад

    What's the name of these kind of games? This seems so cool!
    EDIT:Ctf right?

  • @Usrthsbcufeh
    @Usrthsbcufeh 3 года назад

    Old tweets are sometimes indexed

  • @whoamisecurity9586
    @whoamisecurity9586 3 года назад

    Interesting 🙂

  • @sofblocks
    @sofblocks 3 года назад

    Please do a video on sublime text shortcuts and the find replace thing . Thank you.

  • @chriskaprys
    @chriskaprys 3 года назад

    does anyone have the video/audio from that insta? the account is gone (nothing on TWM either) and i'd love to take a peek at those DTMF tones.

  • @ca7986
    @ca7986 3 года назад

    ❤️

  • @kamalaKannan-gf6ku
    @kamalaKannan-gf6ku 3 года назад

    Any alternative for the dialabc....thanks in advance