Instagram & Twitter OSINT - DownUnderCTF
Register for BsidesBOS CTF! bsidesbos.ctf.games
Hang with our community on Discord! johnhammond.org/discord
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond
Пікірлер: 172
Cheers for the shoutout! Great video mate
@cansofcoke
3 жыл бұрын
I said out loud "hey he's talking about an Aussie cyber guy!" when he mentioned you :D Fellow cyber guy from syd here.
@dccybersec
3 жыл бұрын
@@cansofcoke yooo Australia represent! hahaha
@cansofcoke
3 жыл бұрын
@john and @DC you guys going to do the Australian National Missing Persons Hackathon? :)
@dccybersec
3 жыл бұрын
@@cansofcoke Yes! The CTF team i'm a part of (HYPASEC) is participating this year :)
@cansofcoke
3 жыл бұрын
@@dccybersec sooo awesome :) I'll see you there, i just signed up :)
I think this cell phone message is something like "meet me at 9 30" last digits were held down for little longer for digits to appear
@skynet1024
3 жыл бұрын
who are you so wise in the ways of science
@pennym6576
3 жыл бұрын
my thoughts exactly
I solved this a different way actually. I just got the thought of sending her an email and she responded with another mail where she stated her full name. Love your content John!
@avgmean4187
3 жыл бұрын
Lol, I sent her a formal business inquiry, spent like an hour setting up an online persona, bloating the account with bots and writing the message... The reply was automatic...
@TalsonHacks
3 жыл бұрын
avg bndt lol
@ultimate8673
3 жыл бұрын
@@avgmean4187 😂😂😂😂😂😂😂
I really enjoy listening to your methodology so thanks for going down the rabbit hole and explaining every step
Great video John. I appreciate all the depth you go down. The rabbit holes are always appreciated as well.
It is great to have someone who takes your hand and guides you slowly through a challenge 👏😍 Thank you man!!!
Tbh, that was far most the best video by you. Unlike rest, you covered the rabbit hole parts and actually did tell us what to do if those holes were actually what we needed to find and work around (like audio extraction and decoding it) Thnks pal❤️
Loved the video!! Your "thinking out loud" process allows me to learn even better than "straight to the punch" videos!
@AmCanTech
3 жыл бұрын
שלום
John you always ask if we don't mind you talking so much. We watch your channel to listen and learn, so keep talking. Another great video btw.
@reyandutta
3 жыл бұрын
yaa.. his talking made me start off my infosec career, i was so inspired just by watching his videos
Wow! Mind Blown!!! That's amazing Sir! 🙏 I had to setup a meeting with her on google calendar and that's how I got her middle name 😂
Phenomenal video. I don't know if you actually checked the write-ups after the CTF was finished but that t9 decoding that you did was absolutely necessary for a later challenge in the same CTF. You basically had the solution for "A turn of events /w some REALLY bad OPSEC". Great intuition there.
Really appriciate the descriptions about the rabbit holes. I think much of learning is to do with understanding how to evaluate all of the choices and not just thinking around that there is that single solution that will work. Those old phones had the "push long for the nbr." thing, right? Meet me at 93?
Im enjoying the longer videos and showing multiple tools
that dialpad tones thing is important! thanks for sharing
I did hit the like button before even watching the video. Iam that much confident on JohnHammod content.. Love u john from India..
Great Video John👍 Simply loved the way you extracted all the Juice😍
Thanks for the explanation about the phone!
Would love to see some more OSINT videos using all the tools you know of.
I watched this video twice. Not because I didn't understand it but because I loved it so much.
Man that was a rabbit hole but I'm glad you walked is through it.
No, This video has to be this long. This was amazing and so informative! 💯
Your videos are the best, thanks!!!!!!! You tricked me on sherlock busting it out at the end.
I really like your take on the rabbit hole. Very interesting.
Thanks for the extra time you took to share 👌
10:00 you can also drag the image and drop it on another tab so it opens the exact link and then you can see the photo without the login.
Love the explanation of what you did
John, I like the fact that you walked us through your process. Long video or not, it shows what it took to complete a process of actually doing the required grunt work. Running into dead ends and learning to pivot on certain datasets is critical to the hunt! Thanks for unpacking all of this, the video is excellent for those who want to get good at OSINT exploitation!
Thankyou John Legend!!! 🔥
Thanks for that DTMF thing.. I did not know about. 👍
Thanks, John!
That Sherlock tool is super nifty!
Dtf was worthwhile to showcase. Good vid
02:09 that’s the undertaker...
Your idea of extracting and decoding the DTMF was exactly my thought also... so I thought it was a viable search!
again a great video by john❤️
Fam, that's the Undertaker. Lol. Thanks for the video. Didn't know there were OSINT CTFs.
For sherlock you can just use --timeout 1 or 3 to speed things up
This was cool. Thanks!
Ahaha I was just thinking about Sherlock Tool when you were talking about usernames on different social medias lol
Keep them coming John.
i really like how u tell the things how its works or how i should do that too, so yeah keep doing these vids, u shouldnt care how long the videos are :DD i will watch it anyway...:_D
I can't help but focus on your glasses the whole time and those light reflections reminding me of anime smart guy moments.
tysm for the content
By the way to download the video you could also just look at the HTML code and then take the link for the video I guess this would also be simple training for understanding html codes idk. But its still nice content
2:07 apparently the undertaker from world wrestling entertainment is a spooky scary hacker man
Got a laugh out of your DP comment, it's Undertaker. Anyways great vid!
Hey John, not every entry in the Wayback Machine is really from the day it says. So even though you clicked on 19.09., you got the version from july.
these are really interesting, how does one get started on doing these CTF's etc?
"And I like these memes here. Nice! Nice!"
U can decode sound using DTMF decoder app in your phone through microphone , much quicker without downloading and converting
you r great.. we r learning a lot from your chanel
Thanks
[20] Sebuah senyawa non volatil Z, digunakan untuk membuat dua larutan yang berbeda. Larutan A mengandung 5 g senyawa Z yang dilarutkan dalam 100 g air. Sedangkan larutan B mengandung 2,31 g senyawa Z yang dilarutkan dalam 100 g benzen. Larutan A mempunyai tekanan uap 754,5 mmHg pada titik didih air normal dan larutan B mempunyai tekanan uap yang sama pada titik didih normal benzen. Hitunglah massa molar dari senyawa Z pada larutan A dan B!
please make more on osint where a location is given
You can use -t 1 for Sherlock to set a timeout to 1 second
Please do a video on sublime text shortcuts and the find replace thing . Thank you.
that's really good john
Osnit stuff is fun for a change from complex hacking
Respect johnyy ⚡️⚡️
Awesome
John good luck for bsides boston ctf
wow incredible video, dial tone detect🤗
this was really interesting!
@ovxvii
3 жыл бұрын
the cell phone numbers blew my mind
Amazing
Very nice buddy!
Oh you clonned some dinasours, i remember you!
The spookey scary hacker man pic. Is that not the wrestler Kane?
It sounds so funny when you say "mum"
I was earlier inclined towards red teaming, now that i have been introduced to OSiNT. I feel that it is something cooler and easier.
I believe the twitter pic is the undertaker from wwe
ITS NOT SPOOKY HACKER GUY, ITS UNDERTAKER MY G!!
HYPA! HYPA!
You shouldve done the timeout to one second for the sherlock search
"hello i am here for the flag plz" yes john great troll😂😂
22:05 is saying: meet me at 9:30 I'm guessing
Nice method on the phone number/thing
Lmao @ 22:56. I would’ve done the same John 😂
does anyone have the video/audio from that insta? the account is gone (nothing on TWM either) and i'd love to take a peek at those DTMF tones.
Im not getting one url in the way back machine,what would be the issue any idea
I have a very odd one, and I wasn't even playing or interested in CTF games.....a number and a location...that's it. :D
Tell me what brand and model is your PC? CPU model and memory brand and speed or just model number. Your BIOS may not be properly configured and did you do the update for the bios? Have you built a PC before?: My best uninformed guess is going to be heat related. Ie incorrect cpu paste deployement, case arrangement and fans (orientation and position), if water could be air trapped, pump speed, paste and radiator sizing. Photos will help if you still have slowness. Is GPU blowing air out through the back or directly into the path of CPU intake?
2:15 That's undertaker, a wwe actor
I was disappointed you didn't principle skinner the DTMF tones.
nice
Any alternative for the dialabc....thanks in advance
Interesting 🙂
❤️
Old tweets are sometimes indexed
omg what a challenge
I think soups watched your this video for the beep64 idea in fetch the flag🤣
😅😅😅 loved it.
Zeroth comment ....grow up bois
Hi Sir your all videos super
those guys with the dislike must have their screens upside down
@0x7ddf1
3 жыл бұрын
Hahahaha true
The undertaker was his picture
27:55 I though it was only me because my internet is very slow.
bro how to install kali Linux in window 10
What's the name of these kind of games? This seems so cool! EDIT:Ctf right?
That's undertaker as the profile picture. 😄😄 not hacker man
Even Tinder… Nice!!! 😂