Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 29

  • @nitinmaurya6835
    @nitinmaurya68352 жыл бұрын

    That base64 thing was so good :D. Thanks for making such great videos.

  • @NeverGiveUpYo
    @NeverGiveUpYo4 жыл бұрын

    Finally some video worth watching! Keep up the good work!

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    Thank you! Will do!

  • @kallikantzaros
    @kallikantzaros4 жыл бұрын

    you bastard

  • @AnkitDasOfficial
    @AnkitDasOfficial4 жыл бұрын

    This was such a good one! Learnt a lot

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    Happy to hear that! Thanks so much for watching!

  • @dxlsvy
    @dxlsvy Жыл бұрын

    Saved me here!! I made new adaptations and it's running as I want!! Thanks!!!

  • @Vagelis_Prokopiou
    @Vagelis_Prokopiou6 жыл бұрын

    Exquisite stuff!

  • @ilyboc
    @ilyboc3 жыл бұрын

    But actual port knocking using knockd or something wouldn't tell you if the port is open or not plus the port sequence can be generated too

  • @bugr33d0_hunter8
    @bugr33d0_hunter86 жыл бұрын

    Dude that was awesome. I love the python editor, its so colorful, and the way you move so smoothly through it. I'm starting to read black hat python for pentesting. Do you think that will help me understand better how to write those kind of scripts? I'm obviously going to finish all the overthewire challenges. I wonder though if there are just strictly python challenges alone? And if so could you maybe name one or two beginner type challenges. Thanks. Again this was a great video.

  • @vamsikolati
    @vamsikolati4 жыл бұрын

    this is some elite stuff

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    Thanks so much for watching!

  • @realgabreal
    @realgabreal6 жыл бұрын

    awesome!

  • @TheBroadwood
    @TheBroadwood2 жыл бұрын

    So cool

  • @KaleshwarVhKaleshwarVh
    @KaleshwarVhKaleshwarVh3 жыл бұрын

    This was good.

  • @mauldoto
    @mauldoto5 жыл бұрын

    why scanning process so quickly on that ranges? :v

  • @mauriciomatias6261
    @mauriciomatias62615 жыл бұрын

    Which is the page?

  • @jerrybailie
    @jerrybailie4 жыл бұрын

    that base64 copy/paste was bananas !!!

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    Ha! Thanks so much for watching!

  • @realNAKAMI
    @realNAKAMI6 жыл бұрын

    why is python 2 usage still so common...

  • @bugr33d0_hunter8

    @bugr33d0_hunter8

    6 жыл бұрын

    nakami @ because of all the functions still supported like the. Socket functions for example. For some reason in python 3 they went and changed everything around. You could always port the libraries into python 3, but I bet it would be a pain to figure out.

  • @lordtony8276

    @lordtony8276

    4 жыл бұрын

    because print doesn't required parentheses.

  • @dayisnow

    @dayisnow

    4 жыл бұрын

    @@lordtony8276 Lol your comment gave me a solid laugh. Nice joke haha.

  • @TheL96
    @TheL964 жыл бұрын

    great! I will refer anybody that wants to learn python in 20 mins...lol

  • @tesloveley
    @tesloveley2 жыл бұрын

    i want to see this kind of video on Windows

  • @fsacer
    @fsacer6 жыл бұрын

    it's quicker to just base64 -w 0 x

  • @dayisnow

    @dayisnow

    4 жыл бұрын

    If they're both one-liners, then I don't see how this saves much time. Maybe 1-2 seconds? Cool hint regardless though, gonna try it out!

  • @JasonSmith-fu6oi
    @JasonSmith-fu6oi2 жыл бұрын

    yeah good luck getting into a real server with knockd configured to the MAX with no other ports running on that box. you're NEVER going to guess the sequence plus it can be configured with two other settings that you overlooked because you want to demonstrate how you could break knockd: that is, a timeout of the sequence. good luck with that permutation loop. i can set my seq timeout to 1 second. if you dont knock within 1 second, you're done. that loop will take several minutes to complete only to disappoint you. and the second setting is basically TCPFlags that can be set. if you dont know this FLAG, you aint gettin a glimpse of my door!