Hide a Hacker's Reverse Shell in ONE Command

j-h.io/plextrac || Save time and effort on pentest reports with PlexTrac's premiere reporting & collaborative platform in a FREE one-month trial! j-h.io/plextrac 😎
🔥 KZread ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 59

  • @laurenlewis4189
    @laurenlewis4189 Жыл бұрын

    Grzegorz is pronounced "gSehgoS" where the capital "S"s are pronounced like the "s" in "treasure"/"pleasure"/"vision." Tworek is easier: "tforek" - just remember that most european languages pronounce "w" the way english speakers pronounce "v," and in some words that can get the "voice" (the hum) taken out of it to become an "f" I highly recommend learning the International Phonetic Alphabet. It makes sense of those weird pronunciation symbols on Wikipedia and Wiktionary, and you'll look like you're a smart cookie who speaks multiple languages when you just have figured out how to read pronunciation guides. Knowing how to pronounce words in other languages and knowing what phonemes are commonly used in certain languages also helps you fake an accent and better socially engineer people, if that's the type of hacker you're aiming to be.

  • @PR1V4TE

    @PR1V4TE

    Жыл бұрын

    That's a great explanation right there my friend. 😂👍🏻

  • @amine_jbz

    @amine_jbz

    6 ай бұрын

    Hello man, I'm from Belgium and as a native French speaker, we don't pronounce the w like a v for an English-speaker, but It's right for some European-language like German and more. Btw, thank you for your good explanations and your advices !

  • @andreadistasi8842
    @andreadistasi8842 Жыл бұрын

    Great one! I like that you kept it slim!

  • @panchakosha
    @panchakosha Жыл бұрын

    Yes, that's correct \0 is a null character. \1 would be a null character but with an index of 1, so \0\1 would be two null terminated strings. Modifying the registry doesn't affect the RDP query commands directly. It just allows you to customize the output with the key and value. The query commands retrieve the information from multiple sources: WMI, RDS, TS configs, registry, system data structures like Process Management, etc.

  • @keylanoslokj1806

    @keylanoslokj1806

    Жыл бұрын

    Meaning exactly?

  • @panchakosha

    @panchakosha

    Жыл бұрын

    @@keylanoslokj1806 I was responding to questions he was asking in the video. Null characters can be used to separate multiple strings stored as a single value in the registry. For example, /d 0\01\0LOLBin\0calc.exe. He was also wondering where the RDP query commands were pulling their info. A more concrete example would be WMI providers specific to RDP, such as the Win32_TerminalService or Win32_TerminalServiceSetting classes.

  • @coltonthomas3658

    @coltonthomas3658

    Жыл бұрын

    @@panchakosha can you explain the null character indexing? Can a reg value be "string/0hello/1world/2"? Is this why they show up as newlines when you view the key in regedit?

  • @dineshpavar1724

    @dineshpavar1724

    8 ай бұрын

    🎉🎉🎉😊🎉

  • @list1726
    @list1726 Жыл бұрын

    Thanks for posting

  • @cyberdevil657
    @cyberdevil657 Жыл бұрын

    That is epic Jhon keep up the great work!

  • @groundwalker2162
    @groundwalker2162 Жыл бұрын

    Love your content Inspired me to learn

  • @FuzzerHash
    @FuzzerHash Жыл бұрын

    Heavy nice content, already waiting next videos.

  • @guyincognito9009
    @guyincognito9009 Жыл бұрын

    Dude this guy is incredible. Just like you, thanks so much for All your Videos john

  • @JontheRippa
    @JontheRippa Жыл бұрын

    Wow i love it 👍👍👍

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked Жыл бұрын

    AMSI reminds me of Jamsey and Wamsey, an inside joke my friend's friend started. Haha

  • @HxN0n3
    @HxN0n3 Жыл бұрын

    Superb! man

  • @gooniesfan7911
    @gooniesfan7911 Жыл бұрын

    So you could instead of run a dropped file/bat loader, you could just make it execute a powershell command that downloads&executes the malicious code? (say reflectively load a dll) Then have a scheduled task to run the bogie query command? Would this be considered fileless?

  • @foeyloozer6299

    @foeyloozer6299

    Жыл бұрын

    No. Fileless is when the entire payload is contained in the LOLbin. If you have it execute something you drop to disk thats not fileless.

  • @donttrusttheape
    @donttrusttheape Жыл бұрын

    It will be Gregor in English, actually one of few Polish chaps worth, following!

  • @oildiggerlwd
    @oildiggerlwd Жыл бұрын

    Love the comments about webroot. Made me laugh because that’s what our MSP has installed on our endpoints.

  • @Vort3X-tech
    @Vort3X-tech6 ай бұрын

    How can you run that payload on the target machine without them noticing?

  • @panchakosha
    @panchakosha Жыл бұрын

    Does CLR Hooking to bypass AMSI still work in Windows 11?

  • @kazhiroma9736
    @kazhiroma9736 Жыл бұрын

    I was just watching your video on hoaxshell

  • @stevegreen2753
    @stevegreen2753 Жыл бұрын

    I like it :)

  • @rodricbr
    @rodricbr Жыл бұрын

    awesome

  • @ruthvikas
    @ruthvikas Жыл бұрын

    Still waiting for picoCTF 2023 🙃

  • @PR1V4TE

    @PR1V4TE

    Жыл бұрын

    John himself need a walkthrough first 😂.

  • @franman6831
    @franman6831 Жыл бұрын

    Top tier content John

  • @mikaeleriksson6504
    @mikaeleriksson6504 Жыл бұрын

    Am I missing something. You need to have admin rights to add the query command right?

  • @MasterOfMisc

    @MasterOfMisc

    Жыл бұрын

    Yeah your right. You still need admin access to write to the registry. Which makes this kind of moot

  • @OfficialAfterLifeEdits
    @OfficialAfterLifeEdits29 күн бұрын

    the vrisu got me

  • @lancemarchetti8673
    @lancemarchetti8673 Жыл бұрын

    Nery Vice!

  • @bogutkghbkng12
    @bogutkghbkng128 ай бұрын

    Irshad

  • @dariusvlogs3634
    @dariusvlogs3634 Жыл бұрын

    How to bypass amsi

  • @ScottPlude

    @ScottPlude

    Жыл бұрын

    Are you telling us how?

  • @ygx6

    @ygx6

    Жыл бұрын

    ​@@ScottPlude nah he's asking

  • @MrClawt
    @MrClawt Жыл бұрын

    What if you can't write to HKLM?

  • @alexandrohdez3982
    @alexandrohdez3982 Жыл бұрын

    👏👏👏

  • @Gobillion160
    @Gobillion160 Жыл бұрын

    write ur report with chatgpt

  • @anilbangera1
    @anilbangera1 Жыл бұрын

  • @keylanoslokj1806
    @keylanoslokj1806 Жыл бұрын

    Dear mr Hammond our favourite security expert. How can the simple, total beginner user, check if someone has hijacked any device of his network? Smartphone, laptop, smart TV etc. How do we detect a compromise or even foreign users?

  • @tyrojames9937
    @tyrojames9937 Жыл бұрын

    👍🏾

  • @d8rh8r35
    @d8rh8r35 Жыл бұрын

    noice

  • @MrEndzo
    @MrEndzo Жыл бұрын

    Hacking Windows is cheating.

  • @trojankit

    @trojankit

    Жыл бұрын

    Wym?

  • @Exotic69420

    @Exotic69420

    Жыл бұрын

    literally

  • @Exotic69420

    @Exotic69420

    Жыл бұрын

    @@trojankit too easy

  • @bc100dev

    @bc100dev

    Жыл бұрын

    True. Better make Linux malware instead of Windows malware

  • @ggsap

    @ggsap

    6 ай бұрын

    @@bc100dev How? That is so much easier

  • @biocode2856
    @biocode2856 Жыл бұрын

    It's a nkritid viris😂😊

  • @Repossessionn
    @Repossessionn Жыл бұрын

    ayyy

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked Жыл бұрын

    Early :3

  • @Mezzosd
    @Mezzosd Жыл бұрын

    Windows defender its work lol

  • @adonyz666
    @adonyz666 Жыл бұрын

    first

  • @averagejoe404

    @averagejoe404

    Жыл бұрын

    Who asked?

  • @SolitaryElite

    @SolitaryElite

    Жыл бұрын

    @@averagejoe404 me

  • @wha-yuanfh
    @wha-yuanfh Жыл бұрын

    useless