Instagram & Twitter OSINT - DownUnderCTF

Register for BsidesBOS CTF! bsidesbos.ctf.games
Hang with our community on Discord! johnhammond.org/discord
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 172

  • @dccybersec
    @dccybersec3 жыл бұрын

    Cheers for the shoutout! Great video mate

  • @cansofcoke

    @cansofcoke

    3 жыл бұрын

    I said out loud "hey he's talking about an Aussie cyber guy!" when he mentioned you :D Fellow cyber guy from syd here.

  • @dccybersec

    @dccybersec

    3 жыл бұрын

    @@cansofcoke yooo Australia represent! hahaha

  • @cansofcoke

    @cansofcoke

    3 жыл бұрын

    @john and @DC you guys going to do the Australian National Missing Persons Hackathon? :)

  • @dccybersec

    @dccybersec

    3 жыл бұрын

    @@cansofcoke Yes! The CTF team i'm a part of (HYPASEC) is participating this year :)

  • @cansofcoke

    @cansofcoke

    3 жыл бұрын

    @@dccybersec sooo awesome :) I'll see you there, i just signed up :)

  • @adrianklamut8533
    @adrianklamut85333 жыл бұрын

    I think this cell phone message is something like "meet me at 9 30" last digits were held down for little longer for digits to appear

  • @skynet1024

    @skynet1024

    3 жыл бұрын

    who are you so wise in the ways of science

  • @pennym6576

    @pennym6576

    3 жыл бұрын

    my thoughts exactly

  • @Zydent
    @Zydent3 жыл бұрын

    I solved this a different way actually. I just got the thought of sending her an email and she responded with another mail where she stated her full name. Love your content John!

  • @avgmean4187

    @avgmean4187

    3 жыл бұрын

    Lol, I sent her a formal business inquiry, spent like an hour setting up an online persona, bloating the account with bots and writing the message... The reply was automatic...

  • @TalsonHacks

    @TalsonHacks

    3 жыл бұрын

    avg bndt lol

  • @ultimate8673

    @ultimate8673

    3 жыл бұрын

    @@avgmean4187 😂😂😂😂😂😂😂

  • @seclilc
    @seclilc3 жыл бұрын

    I really enjoy listening to your methodology so thanks for going down the rabbit hole and explaining every step

  • @gbravy
    @gbravy3 жыл бұрын

    Great video John. I appreciate all the depth you go down. The rabbit holes are always appreciated as well.

  • @Raformatico
    @Raformatico3 жыл бұрын

    It is great to have someone who takes your hand and guides you slowly through a challenge 👏😍 Thank you man!!!

  • @satyamvirat3489
    @satyamvirat34893 жыл бұрын

    Tbh, that was far most the best video by you. Unlike rest, you covered the rabbit hole parts and actually did tell us what to do if those holes were actually what we needed to find and work around (like audio extraction and decoding it) Thnks pal❤️

  • @Ayahalom123
    @Ayahalom1233 жыл бұрын

    Loved the video!! Your "thinking out loud" process allows me to learn even better than "straight to the punch" videos!

  • @AmCanTech

    @AmCanTech

    3 жыл бұрын

    שלום

  • @djmikeholmes6214
    @djmikeholmes62143 жыл бұрын

    John you always ask if we don't mind you talking so much. We watch your channel to listen and learn, so keep talking. Another great video btw.

  • @reyandutta

    @reyandutta

    3 жыл бұрын

    yaa.. his talking made me start off my infosec career, i was so inspired just by watching his videos

  • @selvinpaul7255
    @selvinpaul72553 жыл бұрын

    Wow! Mind Blown!!! That's amazing Sir! 🙏 I had to setup a meeting with her on google calendar and that's how I got her middle name 😂

  • @minuano8716
    @minuano87163 жыл бұрын

    Phenomenal video. I don't know if you actually checked the write-ups after the CTF was finished but that t9 decoding that you did was absolutely necessary for a later challenge in the same CTF. You basically had the solution for "A turn of events /w some REALLY bad OPSEC". Great intuition there.

  • @sa-a7153
    @sa-a71533 жыл бұрын

    Really appriciate the descriptions about the rabbit holes. I think much of learning is to do with understanding how to evaluate all of the choices and not just thinking around that there is that single solution that will work. Those old phones had the "push long for the nbr." thing, right? Meet me at 93?

  • @jovi___
    @jovi___3 жыл бұрын

    Im enjoying the longer videos and showing multiple tools

  • @pasangamage
    @pasangamage Жыл бұрын

    that dialpad tones thing is important! thanks for sharing

  • @manoharbaratam8792
    @manoharbaratam87923 жыл бұрын

    I did hit the like button before even watching the video. Iam that much confident on JohnHammod content.. Love u john from India..

  • @InfosecGeekz
    @InfosecGeekz2 жыл бұрын

    Great Video John👍 Simply loved the way you extracted all the Juice😍

  • @Loicmartins
    @Loicmartins6 күн бұрын

    Thanks for the explanation about the phone!

  • @MrNomadBrad
    @MrNomadBrad3 жыл бұрын

    Would love to see some more OSINT videos using all the tools you know of.

  • @slaozeren8742
    @slaozeren87422 жыл бұрын

    I watched this video twice. Not because I didn't understand it but because I loved it so much.

  • @Sagescomputerrepair
    @Sagescomputerrepair3 жыл бұрын

    Man that was a rabbit hole but I'm glad you walked is through it.

  • @gamingandanime9000
    @gamingandanime9000 Жыл бұрын

    No, This video has to be this long. This was amazing and so informative! 💯

  • @mehammered
    @mehammered3 жыл бұрын

    Your videos are the best, thanks!!!!!!! You tricked me on sherlock busting it out at the end.

  • @antaresrepublic
    @antaresrepublic2 жыл бұрын

    I really like your take on the rabbit hole. Very interesting.

  • @cli-hope417
    @cli-hope4173 жыл бұрын

    Thanks for the extra time you took to share 👌

  • @3rg1s
    @3rg1s3 жыл бұрын

    10:00 you can also drag the image and drop it on another tab so it opens the exact link and then you can see the photo without the login.

  • @binaryaction5
    @binaryaction53 жыл бұрын

    Love the explanation of what you did

  • @stevenhall2
    @stevenhall2 Жыл бұрын

    John, I like the fact that you walked us through your process. Long video or not, it shows what it took to complete a process of actually doing the required grunt work. Running into dead ends and learning to pivot on certain datasets is critical to the hunt! Thanks for unpacking all of this, the video is excellent for those who want to get good at OSINT exploitation!

  • @HeyDudee
    @HeyDudee3 жыл бұрын

    Thankyou John Legend!!! 🔥

  • @stanislavsmetanin1307
    @stanislavsmetanin13072 жыл бұрын

    Thanks for that DTMF thing.. I did not know about. 👍

  • @christinewinchester2031
    @christinewinchester20312 жыл бұрын

    Thanks, John!

  • @tylersmith8245
    @tylersmith82453 жыл бұрын

    That Sherlock tool is super nifty!

  • @crispyhaole8533
    @crispyhaole85333 жыл бұрын

    Dtf was worthwhile to showcase. Good vid

  • @bechararizk7245
    @bechararizk72453 жыл бұрын

    02:09 that’s the undertaker...

  • @peterzenner2020
    @peterzenner20202 жыл бұрын

    Your idea of extracting and decoding the DTMF was exactly my thought also... so I thought it was a viable search!

  • @ronakjoshi5093
    @ronakjoshi50933 жыл бұрын

    again a great video by john❤️

  • @Sagescomputerrepair
    @Sagescomputerrepair3 жыл бұрын

    Fam, that's the Undertaker. Lol. Thanks for the video. Didn't know there were OSINT CTFs.

  • @user-sq7hj6hj7h
    @user-sq7hj6hj7h2 жыл бұрын

    For sherlock you can just use --timeout 1 or 3 to speed things up

  • @alexkatsanos8475
    @alexkatsanos84752 жыл бұрын

    This was cool. Thanks!

  • @Hitu1197
    @Hitu11972 жыл бұрын

    Ahaha I was just thinking about Sherlock Tool when you were talking about usernames on different social medias lol

  • @jorisschepers85
    @jorisschepers853 жыл бұрын

    Keep them coming John.

  • @marcellmagvasi1668
    @marcellmagvasi16683 жыл бұрын

    i really like how u tell the things how its works or how i should do that too, so yeah keep doing these vids, u shouldnt care how long the videos are :DD i will watch it anyway...:_D

  • @Maniclout
    @Maniclout3 жыл бұрын

    I can't help but focus on your glasses the whole time and those light reflections reminding me of anime smart guy moments.

  • @goodgameplays9571
    @goodgameplays95712 жыл бұрын

    tysm for the content

  • @champmq5385
    @champmq53853 жыл бұрын

    By the way to download the video you could also just look at the HTML code and then take the link for the video I guess this would also be simple training for understanding html codes idk. But its still nice content

  • @mxbmvnvmbncmbn
    @mxbmvnvmbncmbn2 жыл бұрын

    2:07 apparently the undertaker from world wrestling entertainment is a spooky scary hacker man

  • @killahb33
    @killahb33 Жыл бұрын

    Got a laugh out of your DP comment, it's Undertaker. Anyways great vid!

  • @somebodystealsmyname
    @somebodystealsmyname3 жыл бұрын

    Hey John, not every entry in the Wayback Machine is really from the day it says. So even though you clicked on 19.09., you got the version from july.

  • @alcxander
    @alcxander3 жыл бұрын

    these are really interesting, how does one get started on doing these CTF's etc?

  • @HenryPangsatabam
    @HenryPangsatabam3 жыл бұрын

    "And I like these memes here. Nice! Nice!"

  • @techguy921
    @techguy9213 жыл бұрын

    U can decode sound using DTMF decoder app in your phone through microphone , much quicker without downloading and converting

  • @AbdennacerAyeb
    @AbdennacerAyeb3 жыл бұрын

    you r great.. we r learning a lot from your chanel

  • @user-uo5id1dd5s
    @user-uo5id1dd5s Жыл бұрын

    Thanks

  • @olidingin6398
    @olidingin63983 жыл бұрын

    [20] Sebuah senyawa non volatil Z, digunakan untuk membuat dua larutan yang berbeda. Larutan A mengandung 5 g senyawa Z yang dilarutkan dalam 100 g air. Sedangkan larutan B mengandung 2,31 g senyawa Z yang dilarutkan dalam 100 g benzen. Larutan A mempunyai tekanan uap 754,5 mmHg pada titik didih air normal dan larutan B mempunyai tekanan uap yang sama pada titik didih normal benzen. Hitunglah massa molar dari senyawa Z pada larutan A dan B!

  • @CyberWorldSec
    @CyberWorldSec3 жыл бұрын

    please make more on osint where a location is given

  • @tomotion
    @tomotion2 жыл бұрын

    You can use -t 1 for Sherlock to set a timeout to 1 second

  • @sofblocks
    @sofblocks3 жыл бұрын

    Please do a video on sublime text shortcuts and the find replace thing . Thank you.

  • @jaypomal5534
    @jaypomal55343 жыл бұрын

    that's really good john

  • @bruh_5555
    @bruh_55553 жыл бұрын

    Osnit stuff is fun for a change from complex hacking

  • @wasfyelking6926
    @wasfyelking69263 жыл бұрын

    Respect johnyy ⚡️⚡️

  • @ashutoshmohanty
    @ashutoshmohanty3 жыл бұрын

    Awesome

  • @rajith8973
    @rajith89733 жыл бұрын

    John good luck for bsides boston ctf

  • @kal_dev
    @kal_dev2 жыл бұрын

    wow incredible video, dial tone detect🤗

  • @ovxvii
    @ovxvii3 жыл бұрын

    this was really interesting!

  • @ovxvii

    @ovxvii

    3 жыл бұрын

    the cell phone numbers blew my mind

  • @jacobsan
    @jacobsan3 жыл бұрын

    Amazing

  • @jesusxXxlizzard
    @jesusxXxlizzard3 жыл бұрын

    Very nice buddy!

  • @ErickTosar
    @ErickTosar Жыл бұрын

    Oh you clonned some dinasours, i remember you!

  • @GeekBatman
    @GeekBatman3 жыл бұрын

    The spookey scary hacker man pic. Is that not the wrestler Kane?

  • @JustSomeAussie1
    @JustSomeAussie13 жыл бұрын

    It sounds so funny when you say "mum"

  • @GauravTaxali
    @GauravTaxali Жыл бұрын

    I was earlier inclined towards red teaming, now that i have been introduced to OSiNT. I feel that it is something cooler and easier.

  • @alph4byt3
    @alph4byt33 жыл бұрын

    I believe the twitter pic is the undertaker from wwe

  • @aswinp888
    @aswinp8883 жыл бұрын

    ITS NOT SPOOKY HACKER GUY, ITS UNDERTAKER MY G!!

  • @cardzzz6585
    @cardzzz65853 жыл бұрын

    HYPA! HYPA!

  • @M7_ii
    @M7_ii2 жыл бұрын

    You shouldve done the timeout to one second for the sherlock search

  • @potatoonastick2239
    @potatoonastick22393 жыл бұрын

    "hello i am here for the flag plz" yes john great troll😂😂

  • @hegen7642
    @hegen76422 жыл бұрын

    22:05 is saying: meet me at 9:30 I'm guessing

  • @51mpl3-b9
    @51mpl3-b93 жыл бұрын

    Nice method on the phone number/thing

  • @sirw369
    @sirw3693 жыл бұрын

    Lmao @ 22:56. I would’ve done the same John 😂

  • @chriskaprys
    @chriskaprys3 жыл бұрын

    does anyone have the video/audio from that insta? the account is gone (nothing on TWM either) and i'd love to take a peek at those DTMF tones.

  • @ritamchatterjee3307
    @ritamchatterjee33072 жыл бұрын

    Im not getting one url in the way back machine,what would be the issue any idea

  • @Phoenix_VR
    @Phoenix_VR3 жыл бұрын

    I have a very odd one, and I wasn't even playing or interested in CTF games.....a number and a location...that's it. :D

  • @CRSolarice
    @CRSolarice3 жыл бұрын

    Tell me what brand and model is your PC? CPU model and memory brand and speed or just model number. Your BIOS may not be properly configured and did you do the update for the bios? Have you built a PC before?: My best uninformed guess is going to be heat related. Ie incorrect cpu paste deployement, case arrangement and fans (orientation and position), if water could be air trapped, pump speed, paste and radiator sizing. Photos will help if you still have slowness. Is GPU blowing air out through the back or directly into the path of CPU intake?

  • @b07x
    @b07x3 жыл бұрын

    2:15 That's undertaker, a wwe actor

  • @user-pe2mf5tg3h
    @user-pe2mf5tg3h2 жыл бұрын

    I was disappointed you didn't principle skinner the DTMF tones.

  • @vater7841
    @vater78413 жыл бұрын

    nice

  • @kamalaKannan-gf6ku
    @kamalaKannan-gf6ku3 жыл бұрын

    Any alternative for the dialabc....thanks in advance

  • @whoamisecurity9586
    @whoamisecurity95863 жыл бұрын

    Interesting 🙂

  • @ca7986
    @ca79863 жыл бұрын

    ❤️

  • @Usrthsbcufeh
    @Usrthsbcufeh2 жыл бұрын

    Old tweets are sometimes indexed

  • @RuDrAkSh_is_live
    @RuDrAkSh_is_live2 жыл бұрын

    omg what a challenge

  • @hoodietramp
    @hoodietramp6 ай бұрын

    I think soups watched your this video for the beep64 idea in fetch the flag🤣

  • @toddmathews3329
    @toddmathews3329 Жыл бұрын

    😅😅😅 loved it.

  • @thengakola6217
    @thengakola62173 жыл бұрын

    Zeroth comment ....grow up bois

  • @silverman2263
    @silverman22633 жыл бұрын

    Hi Sir your all videos super

  • @skynet1024
    @skynet10243 жыл бұрын

    those guys with the dislike must have their screens upside down

  • @0x7ddf1

    @0x7ddf1

    3 жыл бұрын

    Hahahaha true

  • @gerryolivergerryoliverphot5182
    @gerryolivergerryoliverphot51822 жыл бұрын

    The undertaker was his picture

  • @b07x
    @b07x3 жыл бұрын

    27:55 I though it was only me because my internet is very slow.

  • @mrhangout3670
    @mrhangout3670 Жыл бұрын

    bro how to install kali Linux in window 10

  • @venox314
    @venox3142 жыл бұрын

    What's the name of these kind of games? This seems so cool! EDIT:Ctf right?

  • @AswinHaridasOne_77
    @AswinHaridasOne_772 жыл бұрын

    That's undertaker as the profile picture. 😄😄 not hacker man

  • @matthewfluke7957
    @matthewfluke7957 Жыл бұрын

    Even Tinder… Nice!!! 😂