How to Proxy Command Execution: 'Living Off The Land' Hacks

preview_player
Показать описание


🔥 YOUTUBE ALGORITHM ➡ Like, Comment, & Subscribe!
Рекомендации по теме
Комментарии
Автор

John! Thanks for everything you put into this community. I started my cyber career path last year and you've been a tremendous resource. Thanks again and cheers to the new year!

Logan-vwbg
Автор

John, you are a master of the craft. Every time I watch one of your videos, I learn something new and valuable. The way you explain "Living off the Land" hacks is clear and easy to understand, making it accessible to all levels of cyber enthusiasts. Keep up the great work and thank you for all the knowledge you share with the community.

Counterhackingsafe
Автор

Getting to see how you used procmon to investigate the scenario was awesome. Well done

netscout
Автор

Living off the land - a nightmare for script kiddies

RealCyberCrime
Автор

ok, off to test if the xdr detects this and if not rule creation and more testing! Thanks John, the red perspective is a great way to continue to build the blue fortress!

purplesprout
Автор

Happy New Year guys ! : )
John, I love your content, please keep up the great work! :) !
Btw. Grzegorz Tworek is a great teacher, his knowledge about Windows security is legendary .

patrickslomian
Автор

Wow, this is amazing. Thank you for your hard work, John!

evilcorp
Автор

Your content is always top notch! Thanks for everything ❤️

DarkFaken
Автор

Interesting insight! I really wonder if AV providers look out for something like this. The AV's detection for this would heavily depend on how that malware behaves.

cumMan
Автор

This content is gold. Thanks for explaining it in a calm and step by step way. Keep it going John.

jorisschepers
Автор

John your videos make me motivated, Thank you so much for these amazing videos.

hamzarashid
Автор

I wonder if this will be patched anytime soon...

What level of privilege did calc.exe end up spawning with? Could this be a possible avenue for privesc, or is it meant only as a means of obfuscation?

As always, love the content!

daiceman
Автор

6:32 - Tip: the windows equivalent to “which” is “where”, so you can do “where tpmtool”

centdemeern
Автор

Interesting! We’d love more videos like this

cybersploit
Автор

Magnificent! Thanks a million! You rock Sir!

sentinelaenow
Автор

This shows how we really need to rework our operating systems.

first-thoughtgiver-of-will
Автор

Books of war - Living off the land.
Arrogance - Feed them poison.

Zay-yah
Автор

OMG! Awesome Content John, as always!

ThiagoSouza-oofj
Автор

I wanted something like this weeks ago the problem is Windows will stop any weird exec you try to save into the machine

MygenteTV
Автор

hum uma boa falha execution remote do windowns genial

LindomarkBiohazardYTB