Bypassing SmartScreen on Web Browsers

Поделиться
HTML-код
  • Опубликовано: 17 апр 2024
  • jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform -- keep your users, your data, and your environment secure with Keeper! jh.live/keeper
    Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
    📧JOIN MY NEWSLETTER ➡ jh.live/email
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥RUclips ALGORITHM ➡ Like, Comment, & Subscribe!

Комментарии • 128

  • @JoeHellethemayor
    @JoeHellethemayor Месяц назад +58

    Thanks for the shout!
    And you got it right - Hell - E

  • @mclarenf1gtr99
    @mclarenf1gtr99 Месяц назад +26

    I don't mind having them put warnings when I try access a supposed "dangerous" link, but now they don't even present the option to advance anyway. This makes me worry about the future where you can't access something because someone of a higher power said No, not because it is dangerous, but because they don't want people to access.

    • @L2002
      @L2002 Месяц назад +6

      you can literally just use any other browser that doesn't have safe browsing, nothing to worry.

    • @angeleeh
      @angeleeh Месяц назад

      on chrome, just type 'thisisunsafe' and will let you through

  • @RodrigoPhysicist
    @RodrigoPhysicist Месяц назад +89

    you could also set up a small tcp server that always returns true and add it on the hosts of your co-worker... now he's gonna have the red screen for every site he browses 😂

    • @CZghost
      @CZghost Месяц назад +6

      That's just evil, man! :D

    • @Spiderfffun
      @Spiderfffun Месяц назад +1

      oh dude I really want to do this now
      i would integrate this in my troll tool and it would be so funny

    • @L2002
      @L2002 Месяц назад +1

      you need admin rights?

    • @funil6871
      @funil6871 Месяц назад +2

      That is the punishment people deserve for using edge in the first place 😂

    • @SaintSaint
      @SaintSaint Месяц назад +1

      @@L2002 yes.

  • @ThisIsJustADrillBit
    @ThisIsJustADrillBit Месяц назад +17

    This man is relentless ❤🔥

  • @b3twiise853
    @b3twiise853 Месяц назад +44

    “He was messing around with his piehole “ ohh joel tsk tsk tsk 😂😂😂

    • @5iddd
      @5iddd Месяц назад +1

      Thats crazy

    • @GustavoPinho89
      @GustavoPinho89 Месяц назад +4

      Security researchers always be testing stuff with their pieholes.....

    • @vuufke4327
      @vuufke4327 Месяц назад

      hope he wasn't doing it on company time

  • @arjunraghunadhan3611
    @arjunraghunadhan3611 Месяц назад +3

    After watching his videos i learnt many things including how to be daring and crazy because this gave me inspiration 🤣
    I love his content

  • @claudiafischering901
    @claudiafischering901 Месяц назад +5

    Cool, but is it not more easier to turn it of the SmartScreen ? Maybe by registry or in edge itself? Or is it to avoid the message pops up you turn off SmartScreen ?

  • @CZghost
    @CZghost Месяц назад +5

    One possible thing MS and/or Google could do is that if it can't reach the destination of the safe browsing/smart screen DNS, it flashes an error on the screen warning about this nefarious behaviour of your local network, before it lets you to interact with any page. If you didn't do this, you might want to investigate.

  • @heeshsusnwo666qsbwsjsjeuhwsns
    @heeshsusnwo666qsbwsjsjeuhwsns Месяц назад +2

    Yeah man another great video 🎉

  • @ramseyibe2844
    @ramseyibe2844 Месяц назад +1

    Thank you for this😃 i leant something new today

  • @SzaboB33
    @SzaboB33 Месяц назад +11

    I always had a weird feeling AVs blocking Bloodhound and even maybe mimikatz. I always thought about AVs that protect me from being compromised but in those cases it limits my usage of the machine. Yea, they can be used to compromise OTHER accounts and machines but it's weird that they limit me doing it even in a non AD joined machine. I want AVs to protect me from compromise and then not to moralize about what I want to do with my life!

    • @ThatBlueFalcon
      @ThatBlueFalcon Месяц назад

      It's within a security tool's interest to block downloads of attacker tools, including Bloodhound and Mimikatz. If an attacker gained user priveleges on a host and Microsoft allowed users to freely download hacking tools from Github, that'd be a very convenient loophole to onboard tools.
      It's much better to download and use those tools using a sandbox environment without Defender/security features enabled, or even better just stick to a Kali distro where this wouldn't be an issue

  • @torsec6048
    @torsec6048 Месяц назад

    nice work john

  • @TechnicalHeavenSM
    @TechnicalHeavenSM Месяц назад

    very interesting analysis..loved the video

  • @ancestrall794
    @ancestrall794 Месяц назад

    Very interesting, great video bro 👍

  • @chrisjinks5414
    @chrisjinks5414 Месяц назад +2

    Thank you, i have just built a Defender hunting query to notify us if the hosts file is modified and or if a request to a Microsoft or google domains returns an IP that's not publically routable (as its then been hijacked or sinkholes), many thanks.

  • @cyber_space09
    @cyber_space09 Месяц назад +1

    Thanks for more formation ⚡🐦‍🔥❤️‍🔥

  • @KyleRice
    @KyleRice Месяц назад +1

    great Video

  • @patrickreuvekamp
    @patrickreuvekamp Месяц назад +1

    Am I correct in thinking that this could be a risk in public networks as well?

  • @cmarines7
    @cmarines7 Месяц назад

    I have definitely learned a lot from you and Ryan Montgomery. As well as from David Bombal and Network Chuck. Thanks for all you do and keep them coming.

  • @funil6871
    @funil6871 Месяц назад

    Great john

  • @Hybrid_Netowrks
    @Hybrid_Netowrks Месяц назад

    John just in case if you don't have admin rights on a laptop like your office laptop in that case that Joe solution is more scalable than that of yours. But, still you are the King.

  • @86ajmn
    @86ajmn Месяц назад

    It's def a neat trick to stick in the tool belt and also as a mental exercise to possible defeat other security look up based measures.
    I think a good question here is why doesn't Microsoft and other big tech companies bypass DNS for these type of things?

  • @carsonjamesiv2512
    @carsonjamesiv2512 Месяц назад

    Interesting.

  • @paritoshbhatt
    @paritoshbhatt Месяц назад

    informative

  • @luketurner314
    @luketurner314 Месяц назад

    Pi-hole can also be ran in a Docker container

  • @demonagito666
    @demonagito666 Месяц назад

    can you call the download in terminal to avoid the download via browser? or does it still flag it?

  • @amaurisrodriguez9914
    @amaurisrodriguez9914 Месяц назад

    Hi John, are you planning to do a live demo about the most recent Palo Alto CVE related to Globalprotect RCE?

    • @xYarbx
      @xYarbx Месяц назад

      If you would know the licensing costs to Palo Alto you would not be asking this. It's pretty much among the lines if you need to ask how much it is you can't afford it. When I was in Uni that does co-operation with their development team we had discounted licensing to PA-220 and even price for that was eye watering.

  • @logiciananimal
    @logiciananimal Месяц назад +1

    Microsoft traditionally says that local administrator access being required for anything nullifies any merit to it as a vulnerability.

  • @timecop1983Two
    @timecop1983Two Месяц назад

    OTW

  • @Crysal
    @Crysal Месяц назад

    You can also block the call to their connection test server and you device will have internet access but the Network Icon will change to "No internet access"

  • @rohit.vikram
    @rohit.vikram Месяц назад

    Algorithm boost go!!!

  • @lfcbpro
    @lfcbpro Месяц назад

    I'm curious about the CRDOWNLOAD file.
    While it is a temp file, I am guessing to check there is enough space to complete the download, in this instance, does it download the whole file? Or does it check with google/microsoft before completing the download and then flag it?
    If it does, can the extension be changed to give the original file?

    • @mollthecoder
      @mollthecoder Месяц назад +1

      It's the browser temporarily saving info about the file, which can be used to start off where you left off if, for example, you lose internet for a moment. It can also be used for pausing/unpausing file downloads. That's what I know about CRDOWNLOAD, although I must admit I don't know a ton about it.

  • @usaidkbf
    @usaidkbf Месяц назад +4

    how ur that smart ❤

  • @andrejs.smirnovs
    @andrejs.smirnovs Месяц назад

    Thanks for the video! But is there a way to bypass the verification of phishing site that was made, for example, by security team of a company to educate the personnel? It is possible of course to distribute those changes to hosts file to all assets, but this can be dangerous, since no verification will be made for real malicious sites.

    • @mollthecoder
      @mollthecoder Месяц назад

      If the company makes the phishing site for personnel only then it really shouldn't end up on a SmartScreen or Safe Browsing list.

  • @davisjansons7384
    @davisjansons7384 Месяц назад

    please do a pihole video

  • @younjesus4087
    @younjesus4087 Месяц назад +1

    You should always update windows John...

  • @mattjohnson6276
    @mattjohnson6276 Месяц назад

    Anyone know where I can get that hacker/hunter shirt he is wearing?

  • @aabdulr
    @aabdulr Месяц назад

    This is exactly how I get all my streaming and other things to work on ✈️ Internet. Try it out next time you're flying

  • @Serpensin
    @Serpensin Месяц назад

    If I need to download blocked files, I simply wget, or curl them.

  • @ToniMorton
    @ToniMorton Месяц назад

    you think the browser would notify you "hey some wierd stuff is going on with your dns settings we cant access smartscreen/url screening but your connected.. 🤔
    it could just check another dns name for internet check and use those domains its checking as a sanity check for tampering

    • @ToniMorton
      @ToniMorton Месяц назад

      i think a solution would be a notification explaining your dns settings may have been altered or something just in the case of malware but i guess av is kinda the limit here? hmmm i feel like the browser could totally help notify the user of tampering here tho

  • @L2002
    @L2002 Месяц назад +5

    Did they really contact Microsoft? 😂it's really a basic attack. I also wouldn't call it a security bug. What do you want them to do? Prevent you from downloading any file until you fix your network? Yeah, doesn't make sense.

    • @xdestino
      @xdestino Месяц назад

      yea. i agree. still cool to see

  • @msalih
    @msalih Месяц назад

    I wish to see what data browser sends to these addresses

  • @ankanroy2
    @ankanroy2 Месяц назад

    doesn't need to go and investigate every url just sinkhole the whole smartscreen and its subdomains with wildcard thats just saves time, unless someone wants fine grain control

  • @RyderCragie
    @RyderCragie Месяц назад

    Just disable it in Edge settings.

  • @FusionDeveloper
    @FusionDeveloper Месяц назад

    Not recommended, but good to know.

  • @Pem7
    @Pem7 Месяц назад

    🤞🏾

  • @Spiderfffun
    @Spiderfffun Месяц назад

    This is a little bit of an issue, and good to know, but it takes a lot more in a real world scenario, and if you can do this, you can probably do something much more meaningful.

  • @rainbowdoesinfosec
    @rainbowdoesinfosec Месяц назад

    Classic host file trick

  • @BunnyKhatri-pd8zm
    @BunnyKhatri-pd8zm Месяц назад +1

    I am still waiting for xz video

  • @6pfk
    @6pfk Месяц назад

    useful technique could be used to find malware, but I would use wget or curl for download bit? sorry Linux convert 80)

    • @6pfk
      @6pfk Месяц назад

      Oh! could block Microsoft spyware?????

  • @icebice
    @icebice Месяц назад

    It does render the feature totally useless but it would require an attacker to have access in the first place. Even then, what would be the point of modifying a victim's host file if you already got access to the victim and smart screen doesn't even check for example, file transfers over ALL TCP sessions.
    I can't really see a hacker root a victim and change their host file so that the victim can download "malware" freely. It wouldn't serve the hacker any real purpose unless they are terribly bad and try to use browsers for downloading their files.
    It's a cool thing to break features in browsers but nothing more than that in my opinion.
    Good find though!

  • @Sourpusscandy
    @Sourpusscandy Месяц назад +4

    Eeww dude what are you using? Edge?

  • @Peccavi75
    @Peccavi75 Месяц назад

    Invoke-webrequest?

  • @Boxersteavee
    @Boxersteavee Месяц назад

    what if a new malware turned off smartscreen using this to then download other malware.

  • @onemoreguyonline7878
    @onemoreguyonline7878 Месяц назад

    Isn't the hosts file a bad option nowadays, because Windows regularly reset hosts files?

  • @draugr7693
    @draugr7693 Месяц назад +1

    This is just yet another example of why i only use Windows exclusively for gaming and Linux for everything else cos with Linux i get much better privacy and security and complete control of almost everything on my computer without having to jump through hoops.

    • @L2002
      @L2002 Месяц назад

      you know that the security of SmartScreen/Safe Browsering in Windows and Linux are same?!

    • @thesoftone
      @thesoftone Месяц назад

      i use linux for everything because proton is awesome :3
      the only instance of windows i will allow on my laptop is the stripped-down edition of win11, locked down in ~300gb of storage space to make sure i can have both D2 and fl studio alongside it

  • @user-ow1vi4op4u
    @user-ow1vi4op4u Месяц назад

    " yES"

  • @cybersecadventures01123
    @cybersecadventures01123 Месяц назад

    Bloodhound😂

  • @crunchied8
    @crunchied8 Месяц назад

    John thought on youtube was being hacked

  • @susstevedev
    @susstevedev Месяц назад

    Nice no more Meet circle crap.

  • @harze6818
    @harze6818 Месяц назад

    great video ! , 10 hours later its patched XD

  • @grimsquirrels
    @grimsquirrels Месяц назад

    Brave browser ftw.

  • @sameulbasheer2006xpc
    @sameulbasheer2006xpc Месяц назад

    please tell how to bypass verify browser from Cloudflare

    • @Sammysapphira
      @Sammysapphira Месяц назад

      You don't

    • @mollthecoder
      @mollthecoder Месяц назад

      You won't see it up here as a RUclips tutorial, because Cloudflare is way more serious. If you're able to bypass Cloudflare, then they would likely pay a good amount of money for you to tell them how. Or it might get sold to a government for even more money than Cloudflare would pay, in which case it would be even better kept under wraps.

  • @DavidAlvesWeb
    @DavidAlvesWeb Месяц назад

    Hey don't be mad at google, bloodhounds are good boyyyys! 🐶

  • @m4rt_
    @m4rt_ Месяц назад

    Maybe you could use this for a man in the middle attack, though if you already have a man in the middle thing going, I think there might be worse things you can do.

  • @themirrazz
    @themirrazz Месяц назад

    The fact that Microsoft blocked their own website is beyond me

  • @unknownentity5354
    @unknownentity5354 Месяц назад

    I could see a scammer using this. If they get the local user to run a script or command to modify the host file, they can then have them download malicious files.

    • @mollthecoder
      @mollthecoder Месяц назад

      If they get the user to run a malicious script with administrator privileges then there's no need to convince the user to download more files from their browser - the script itself could download any necessary files.

  • @thesoftone
    @thesoftone Месяц назад

    microsoft try to not mess with their users challenge (impossible)

  • @brbl415
    @brbl415 Месяц назад

    this is not an issue, it's a feature

  • @cleitongbr
    @cleitongbr Месяц назад

    1

  • @robottwrecks5236
    @robottwrecks5236 Месяц назад

    Doing a MITM or honey pot would allow you to block those as well.

  • @SocialIPO
    @SocialIPO Месяц назад

    You might want to change thumbnail It looks like the video is banned

  • @wardrich
    @wardrich Месяц назад

    Smartscreen blocking downloaded files from opening is dead simple to get around with some DIR /R shenanigans too. Just modify the zone datastream to a 1, or delete it altogether and problem solved 🤣

  • @JNET_Reloaded
    @JNET_Reloaded Месяц назад

    no1 would need to do this esp a victum pointless video!

    • @nordgaren2358
      @nordgaren2358 Месяц назад

      Maybe if you watched the first five minutes of the video, you'd know what use cases it's for?

  • @JNET_Reloaded
    @JNET_Reloaded Месяц назад

    starts @5:00 mins boring bs needs to be cut out!

  • @infinite_flesh
    @infinite_flesh Месяц назад

    China is using strong firewall to protect its cyberspace.. How can we enter or control chinese internet ? I wish you make video about that