John! Thanks for everything you put into this community. I started my cyber career path last year and you've been a tremendous resource. Thanks again and cheers to the new year!
John, you are a master of the craft. Every time I watch one of your videos, I learn something new and valuable. The way you explain "Living off the Land" hacks is clear and easy to understand, making it accessible to all levels of cyber enthusiasts. Keep up the great work and thank you for all the knowledge you share with the community.
Ion cannon wasn't a botnet? It was just software that spammed request from your computer only to specified site that you started by running it there were no c2's, it was dependent on many people launching the tool at once following others. DDoS will probably go down in history as the method of attack from people with zero knowledge.
Happy New Year guys ! : ) John, I love your content , please keep up the great work! :) ! Btw. Grzegorz Tworek is a great teacher, his knowledge about Windows security is legendary .
ok, off to test if the xdr detects this and if not rule creation and more testing! Thanks John, the red perspective is a great way to continue to build the blue fortress!
I wonder if this will be patched anytime soon... What level of privilege did calc.exe end up spawning with? Could this be a possible avenue for privesc, or is it meant only as a means of obfuscation? As always, love the content!
@@_JohnHammond windows 11 my old computer had a lot of problems with my linux terminals on there never working like Ubuntu and Debian do u use windows 11?
@@demon1058 If you can't Google and find information or education resources, then don't bother going any further to be a hacker, it's probably THE most important skill, to be able to find things out.
John! Thanks for everything you put into this community. I started my cyber career path last year and you've been a tremendous resource. Thanks again and cheers to the new year!
John, you are a master of the craft. Every time I watch one of your videos, I learn something new and valuable. The way you explain "Living off the Land" hacks is clear and easy to understand, making it accessible to all levels of cyber enthusiasts. Keep up the great work and thank you for all the knowledge you share with the community.
Getting to see how you used procmon to investigate the scenario was awesome. Well done
Wow, this is amazing. Thank you for your hard work, John!
Living off the land - a nightmare for script kiddies
lol
just give me my botnet so I can press the funny button.
Ion cannon go brr
Ion cannon wasn't a botnet? It was just software that spammed request from your computer only to specified site that you started by running it there were no c2's, it was dependent on many people launching the tool at once following others. DDoS will probably go down in history as the method of attack from people with zero knowledge.
Best Comment Ever!
@@whateverppl1229 what is your botnet price
Your content is always top notch! Thanks for everything ❤️
This content is gold. Thanks for explaining it in a calm and step by step way. Keep it going John.
Happy New Year guys ! : )
John, I love your content , please keep up the great work! :) !
Btw. Grzegorz Tworek is a great teacher, his knowledge about Windows security is legendary .
ok, off to test if the xdr detects this and if not rule creation and more testing! Thanks John, the red perspective is a great way to continue to build the blue fortress!
6:32 - Tip: the windows equivalent to “which” is “where”, so you can do “where tpmtool”
John your videos make me motivated, Thank you so much for these amazing videos.
This shows how we really need to rework our operating systems.
Interesting! We’d love more videos like this
I wonder if this will be patched anytime soon...
What level of privilege did calc.exe end up spawning with? Could this be a possible avenue for privesc, or is it meant only as a means of obfuscation?
As always, love the content!
I just tried it, it runs as the user who ran tpmtool.exe, so no privesc.
OMG! Awesome Content John, as always!
Great stuff as always John!!!
Thank you John for your content!
Magnificent! Thanks a million! You rock Sir!
Great video John!!!!!
I wanted something like this weeks ago the problem is Windows will stop any weird exec you try to save into the machine
Great video! Love it :D
Buying time - gr8 tutorial
good content as always
Intel, now PlexTrac. Do you feel dirty, reading off these scripted ads?
Actually, tried this and loved it. kudos John...
Wow!
They patched it, it now uses full path of cmd.exe 😂
Which version/patch of Windows are you seeing this on? On a fully updated Windows 11 box it still seems to work just fine for me.
@@_JohnHammond windows 11 my old computer had a lot of problems with my linux terminals on there never working like Ubuntu and Debian do u use windows 11?
You could pronounce his name more less like this: Ghsheghosh Tvorek ;)
hum uma boa falha execution remote do windowns genial
👏👍
Sweet
Wonder if this can work as another applocker bypass
👌
Polska!
Sinapsis
Nice one
😳😲
hey john, could you please make a video on uninstalling microsoft edge via your windows emulator?
same as ark game
Mantap
Damn
Can you teach how to make malware persistent
bro do it your self dont be a *SKID*
@@corruption781i can't find anything related to that
@@demon1058 i highly doubt that lol.
Sektor7
@@demon1058 If you can't Google and find information or education resources, then don't bother going any further to be a hacker, it's probably THE most important skill, to be able to find things out.
U always want to be politicaly correct...or I can watch ur words more than hacking community person does...hahah
do you make more money from youtube or from pentesting?
hi john, i have a problum you might be able to help me with , i think somone is rooted in my system,if interested email me ASAP
someone*
problem*