i BACKDOORED a Desktop Shortcut (to run malware)

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 116

  • @TwoBitSorcerer
    @TwoBitSorcerer 10 месяцев назад +33

    This video is genuinely brilliant! It's one of the things I really admire about this field: using standard stuff differently and creatively!
    Thanks John!

    • @apekatt2007
      @apekatt2007 10 месяцев назад +3

      Research LOLBAS if you liked this :)

    • @htxFINESSA
      @htxFINESSA 9 месяцев назад

      Best way to get control

    • @ima_igo
      @ima_igo 9 месяцев назад

      How to use? ​@@apekatt2007

    • @BillAnt
      @BillAnt 7 месяцев назад

      Really great info even for general users who would like to spot these tricks. I always had a funny feeling about LNK files, and examined every one which I downloaded before executing.

  • @AnthraxGg-by8zz
    @AnthraxGg-by8zz 10 месяцев назад +5

    I made an implant where target device connects back to c2, I was thinking of an idea to somehow make it more user-friendly for windows users, and here you provided ma lead, thanks brother!

  • @marcoimbellicai4419
    @marcoimbellicai4419 10 месяцев назад +2

    Very nice video! As a cybersecurity master student, i really enjoy this content. Also, i envy your hair

  • @foadchode
    @foadchode 10 месяцев назад +3

    fun pranks to try in the school computer lab vol. 2

  • @r3tr0n17
    @r3tr0n17 10 месяцев назад +1

    That watch is SOOOOOOOPERRRRR.... DOPE!!

  • @mayb.developer.inactive
    @mayb.developer.inactive 10 месяцев назад +2

    Ive been waiting for this master piece of a video!

  • @leapbtw
    @leapbtw 10 месяцев назад +2

    many of your videos are mindblowing to me, but you weaponized shortcuts here !!!

  • @RavenStrike_Official
    @RavenStrike_Official 22 часа назад

    This thing is so powerfull. Very nice video!

  • @mrmonday2000
    @mrmonday2000 10 месяцев назад +1

    Windows has a MAX_PATH variable in C that is 256 bytes, therefore, anything taking in a path (even if you /c cmd) will be limited to 256 bytes

  • @gamereditor59ner22
    @gamereditor59ner22 10 месяцев назад +1

    0:15 : Interesting....🤔

  • @MStrong95
    @MStrong95 10 месяцев назад +4

    Are there any other interesting polyglot file format hybrids that exist? Seems like an interesting video series idea

    • @amateurprogrammer25
      @amateurprogrammer25 9 месяцев назад

      PKZIP (.zip files) will polyglot with almost anything since they put all their header information at the end of the file rather than at the beginning. in fact pretty much all self extracting zip files that exist are extremely-easy-to-create .exe/.zip polyglots. you take a generic exe zip extractor that tries to open itself as a zip file and just concatenate whatever zip file you want.

  • @hakeeminfosec
    @hakeeminfosec 10 месяцев назад +1

    I had this doubt (can we alter this application) since I accidentally opened a software's shortcut with VS Code and got to see this whole messy binary thing, and thankfully I understand now. So thankyou for this video :)

  • @philto9999
    @philto9999 7 месяцев назад

    I remember doing this lnk thing to be able to play diablo 2 in windowed mode by adding a -w at the end :p

  • @darkdagger032
    @darkdagger032 10 месяцев назад

    Quite informative video, John. Thanks for your hard work!!!

  • @zionstemple
    @zionstemple 10 месяцев назад +1

    John really appreciate how you take informative information and present it simply and effectively. Love your channel.

  • @vivaanvivaan3920
    @vivaanvivaan3920 10 месяцев назад

    sir awesome stuff... please upload more videos about this kind of topic.... seriously awesome....we love you sir❤

  • @Dannytello
    @Dannytello 10 месяцев назад

    Brilliant creativity bro😁😁

  • @AlwaysInstallElevated
    @AlwaysInstallElevated 23 дня назад

    Keep Going Up❤❤

  • @tinotheplayer
    @tinotheplayer 10 месяцев назад +1

    really creative solution!

  • @Braaaains
    @Braaaains 10 месяцев назад +2

    How would you deploy it tho? (Curious as a nontech [IT-ignorant] individual)

    • @MoofyYT
      @MoofyYT 10 месяцев назад

      post exploitation

    • @Braaaains
      @Braaaains 10 месяцев назад

      @@MoofyYT I realise that. What I was unsure about is whether it's just snooping or also tagging and backdoor -- again, being an nontech individual

    • @iWhacko
      @iWhacko 10 месяцев назад

      @@MoofyYT or even email it in a zip file with other innocent files, and hope the person runs it

    • @MoofyYT
      @MoofyYT 10 месяцев назад

      @@iWhacko yep this. Or even as a standalone with a shortcut to a site, and lolbin download of another payload in the bg. But normally I'd just drop one in an open share of an internal.

  • @theonething-0312
    @theonething-0312 9 месяцев назад +1

    You are on sponsored!

  • @gratisgratos
    @gratisgratos 10 месяцев назад

    I have been here 5 minutes since the video has been uploaded

  • @eno88
    @eno88 10 месяцев назад

    Polyglot is a pretty senseless way to call it.. conglomerate? heck, even alloy makes more sense.

  • @bnk28zfp
    @bnk28zfp 10 месяцев назад

    thank you John!

  • @0oNoiseo0
    @0oNoiseo0 10 месяцев назад

    Love the out of the box thinking in an easy to follow process

  • @ChrisRebik
    @ChrisRebik 10 месяцев назад

    Love your Red Team shirt where can I buy one? I want to get that shirt! Thanks

  • @xCheddarB0b42x
    @xCheddarB0b42x 10 месяцев назад

    🍔

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked 10 месяцев назад +1

    I was thinking about someone on RUclips comments, or in a live chat, I forgot where, who said that he/she hates people that talk with their hands. Hahahaha. Seeing you talk with your hands, like I, and many of us do, reminded me of that. I'm part Italian, and Italians are known for talking with their hands. :3 Cheers, brother! Shalom. 🤝😁

    • @apekatt2007
      @apekatt2007 10 месяцев назад +2

      Weird, dude

    • @casperes0912
      @casperes0912 10 месяцев назад

      It's boring to look at someone completely motionless talk

  • @smartnima
    @smartnima 10 месяцев назад

    Oh wow this is really cool!

  • @kedirmamo7818
    @kedirmamo7818 10 месяцев назад

    It is my unfolded Thanksgiving for your restless and selflessly working for the benefit of needy users like me who founded in the edge of cliff resulting me loose up trust from someone who is presenting youtube videos help fix problems with Google betrayal to privacy, selling users data and irresponsible in stay safe to google account and passwards etc was pushing me to the new" IT and Hacking courses" inorder providing study,, knowledge and skill on how to get out of problems indepently by using my ip adress, google account network,wifi since months ago.
    This is one of usefully presented video out of what you have share users, especially me from the day of onsets of these problems.

  • @f.andersen3824
    @f.andersen3824 9 месяцев назад

    Thank you, now I see those little fellars with different eyes. 😂

  • @XtecherPY
    @XtecherPY 10 месяцев назад +2

    Regular Hackers: Just open this file!
    John: Just open google chrome

  • @Tokga-m5r
    @Tokga-m5r 10 месяцев назад

    guys i need to know is ai the go to for subnet solving now, like literally is it , and by the way john i hear you mentioning opening the flood gates by learning programming first ,i have books but its so theory based and im a hands on guy can you make a in depth video of your theory

  • @apekatt2007
    @apekatt2007 10 месяцев назад +1

    Can it run calc.exe? Yes, it can! ❤

  • @iamwitchergeraltofrivia9670
    @iamwitchergeraltofrivia9670 10 месяцев назад

    More malware super good

  • @TopG_Crypto
    @TopG_Crypto 10 месяцев назад +1

    I was hacked by this same method

  • @Knights_Ride
    @Knights_Ride 10 месяцев назад

    Awesome video jhon❤❤ 🇮🇳🇮🇳🇮🇳🇮🇳❤❤

  • @JohnSmith-jc7dk
    @JohnSmith-jc7dk 3 месяца назад

    You can't get away with this.

  • @IverGameplays
    @IverGameplays 10 месяцев назад

    N O I I C E ! ! 👏👏👍🏼👍🏼

  • @ANOTHERSHITE
    @ANOTHERSHITE 9 месяцев назад +1

    THIS IS FIXED BY NOW RIGHT?? I JUST TRIED IT AND IT DOESN'T WORK SO I'M HOPING ITS FIXED AND I'M NOT JUST FUMBLING SOMETHING

    • @ANOTHERSHITE
      @ANOTHERSHITE 9 месяцев назад +1

      nevermind...super bowl mode fumbles

  • @MrHasooooni
    @MrHasooooni 10 месяцев назад

    how to make every video fun and intersting ??? it is easy just be john hammond !

  • @theinfosecguy
    @theinfosecguy 3 месяца назад

    Amazed!

  • @Eldoradotrueshot
    @Eldoradotrueshot 10 месяцев назад +1

    i just deleted all my shortcuts.... thanks :)

  • @FuzzerHash
    @FuzzerHash 10 месяцев назад

    Jhon ever with nice content

  • @Ahmed95406
    @Ahmed95406 10 месяцев назад

    I Enjoyed ,you are genius I love you thank you very much 🤩😍😍

  • @Dreams_On_the_way
    @Dreams_On_the_way 10 месяцев назад

    after connected with kali a windows machine, what are the commands i can run for showing data of victim machine, if i start anything that thing opens in victim machine, show how can I use victim's computer

  • @sendlocation8476
    @sendlocation8476 10 месяцев назад

    What a good rat program and where to get?

  • @anak_sains_yang_toxic
    @anak_sains_yang_toxic 10 месяцев назад

    Goooooooooooooooooooood 🎉

  • @concepcionwilson5815
    @concepcionwilson5815 9 месяцев назад

    Please help, If I try this with a .lnk file extension with the copy command I get an error saying that the system can not find the file, but if I try it with a .png or any other type file it sees it. PLEASE HELP 6
    hours in!!!🤔🥴

  • @carsonjamesiv2512
    @carsonjamesiv2512 10 месяцев назад

    INTERESTING!

  • @cowbe0x004
    @cowbe0x004 Месяц назад

    When you copy that malicious hta file to the exe, it becomes gibberish. Is there any way to extract the hta?

  • @ollyjxrvis9501
    @ollyjxrvis9501 10 месяцев назад

    I dont see the need for having the .lnk data in the start of the .lnk file, if we are just going to change the target anyway, why not just write a hta file, change the file extention to .lnk and do the same. Wondering if I'm missing something here

    • @mervstar
      @mervstar 10 месяцев назад +2

      To keep things at stealthy as possible and still be functional. A .lnk file will fly under the radar for most users, especially if it looks like it's for an application you have installed. A random .hta file showing up anywhere would raise a few alarm bells or at least a furrowed eyebrow or two.
      With a .lnk file, you can set the properties of it like icon etc. to obscure its true function even further. A .hta file that's been renamed to a .lnk file will just give an error when someone tries to run it because windows will treat it like a .lnk file.

    • @iWhacko
      @iWhacko 10 месяцев назад +2

      if it's renamed to .lnk windows will treat it as a link and give you an error because it doesn't know how to interpret the data as a .lnk file. you specify how to run it using mshta.

  • @hama502
    @hama502 10 месяцев назад +36

    vbscript soon deprecated

    • @MADhatter_AIM
      @MADhatter_AIM 10 месяцев назад +10

      but MS just have added full blown python-support into ms-excel , gotta luv MS for adding some additional attack-vectors.

    • @victorwambugu1115
      @victorwambugu1115 10 месяцев назад

      I've followed the instructions to the latter and it doesn't seem to work on the reverse shell part

    • @FriedMonkey362
      @FriedMonkey362 5 месяцев назад

      ​@@MADhatter_AIMdoest the python run on their servers, and only available for paying people

  • @for14556
    @for14556 10 месяцев назад

    Very nice

  • @hehefer
    @hehefer 10 месяцев назад

    so if .ink extension is a doubftul file meaning can it be mwalre bro

  • @radenadhiyaksa4663
    @radenadhiyaksa4663 3 месяца назад

    can you embed with .pdf file ?

  • @the_yugandharr
    @the_yugandharr 9 месяцев назад

    Interesting!!!

  • @hydrogennetwork
    @hydrogennetwork 9 месяцев назад

    i made a shortcut to run a bat that would run a powershell script that would run a script embedded in a image

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked 10 месяцев назад

    Early crew. :3

  • @eikichi9050
    @eikichi9050 10 месяцев назад +1

    excuse me Mr. Hammond, i have a question. If you have windows defender running, this lnk "malware" file can bypass it or it will be blocked when executed?

    • @iWhacko
      @iWhacko 10 месяцев назад +1

      it can run, but depending on the script it might be detected. the standard metasploit payload will most likely be detected.

  • @E-Power2023
    @E-Power2023 2 месяца назад

    Now defender is detected ink shortcut to run any comments,...

  • @Mrroot-m4f
    @Mrroot-m4f 10 месяцев назад

    i enjoy it

  • @timecop1983Two
    @timecop1983Two 10 месяцев назад

    You should help Ukraine with your cyber skills! I learned some of my most advanced skills here

  • @Meletion1
    @Meletion1 10 месяцев назад

    8 minutes I’m in.

  • @PSL1969
    @PSL1969 10 месяцев назад

    Nice! :)

  • @bkcommando6969
    @bkcommando6969 10 месяцев назад

    plss help me my microsoft account is hacked plss reply

  • @SpektWez
    @SpektWez 10 месяцев назад

    Creative tutorial

  • @SixMaverick
    @SixMaverick 9 месяцев назад

    Eh

  • @josephseed3393
    @josephseed3393 10 месяцев назад

    Yooo

  • @HimonRoy-ns2xp
    @HimonRoy-ns2xp 9 месяцев назад

    Hi

  • @Mazurizi
    @Mazurizi 10 месяцев назад +2

    Is this pay what you can training only available in America or something? The lowest you can pay is $295 - I don’t understand why it is called pay what you can, when it isn’t pay what you can at all.

    • @nordgaren2358
      @nordgaren2358 10 месяцев назад +2

      Did you click on the course and actually go through until you choose a payment option?

    • @xCheddarB0b42x
      @xCheddarB0b42x 10 месяцев назад +1

      That price is for access to their Cyber Range. You can buy the 16 hour SOC Core course for $25, but you don't get access to their infrastructure nor their labs running on there. Honestly, $295 for access to an industry leader Cyber Range is worth it.

    • @apekatt2007
      @apekatt2007 10 месяцев назад

      @@xCheddarB0b42x His point was that the slogan is misleading, not that it is expensive

    • @iWhacko
      @iWhacko 10 месяцев назад

      im in europe, if you go through the registration process at the last option you can choose how much to pay. It used to be free, but I think they changed it to 25usd so they get less no-shows, since people who pay nothing don't lose anything by not showing up.

    • @nordgaren2358
      @nordgaren2358 10 месяцев назад

      @@apekatt2007 it's not, though

  • @alientec258
    @alientec258 10 месяцев назад

    very cool shit ;)

  • @hierarki
    @hierarki 10 месяцев назад

    wtf how

  • @elssarace3957
    @elssarace3957 9 месяцев назад

    Sir can you help me to get back my money i got scam

  • @MiuraUY
    @MiuraUY 10 месяцев назад

    Nice, kinda cringe seeing this here, but nice

  • @Blooded2024
    @Blooded2024 10 месяцев назад +1

    12th comment

  • @anonymousking9797
    @anonymousking9797 10 месяцев назад +1

    I'm first ❤😂

  • @abekomi
    @abekomi 9 месяцев назад

    you lost me a little😅

  • @lokeshb9025
    @lokeshb9025 10 месяцев назад +1

    first

  • @anounTT
    @anounTT 10 месяцев назад

    32nd

  • @pmcforever9686
    @pmcforever9686 10 месяцев назад

    third

  • @cautious-agency8
    @cautious-agency8 10 месяцев назад

    I’ll pay u 1000$ if u can code me a program that force ops on a Minecraft server lol

  • @that_guy1211
    @that_guy1211 4 месяца назад

    lmao, who tf even uses desktop shortcutes when you can just WindowsKey search every program? Or just pin it to the taskbar LOL

  • @activatewindows7415
    @activatewindows7415 10 месяцев назад

    ur channels dying :(

    • @activatewindows7415
      @activatewindows7415 10 месяцев назад

      @@lumikarhuhuh really? isn't John supposed to be a well respected member of the ethical hacking community? or at lest on youtube?

    • @cexeodus
      @cexeodus 10 месяцев назад

      october to end of december is always pretty busy for anyone in cs field. the man can take a break i think. 😂 "cHaNnEl DyInG" naw man thats not gonna happen

    • @KiroKiro-ko3kb
      @KiroKiro-ko3kb 10 месяцев назад

      What is the other content creator​@@lumikarhu

  • @jahguideadnan3784
    @jahguideadnan3784 9 месяцев назад

    Talking much and actually doing less 😂

  • @komodiasupport2547
    @komodiasupport2547 10 месяцев назад

    U can talk about a userland rootkit named r77 rootkit in windows,it is fileless rootkit

  • @Shabbyy.
    @Shabbyy. 10 месяцев назад

    Hello guys I went to support me l. Software open , file type "pksz "