Hide a Hacker's Reverse Shell in ONE Command

preview_player
Показать описание

🔥 YOUTUBE ALGORITHM ➡ Like, Comment, & Subscribe!
Рекомендации по теме
Комментарии
Автор

Yes, that's correct \0 is a null character. \1 would be a null character but with an index of 1, so \0\1 would be two null terminated strings.
Modifying the registry doesn't affect the RDP query commands directly. It just allows you to customize the output with the key and value. The query commands retrieve the information from multiple sources: WMI, RDS, TS configs, registry, system data structures like Process Management, etc.

panchakosha
Автор

Grzegorz is pronounced "gSehgoS" where the capital "S"s are pronounced like the "s" in

Tworek is easier: "tforek" - just remember that most european languages pronounce "w" the way english speakers pronounce "v, " and in some words that can get the "voice" (the hum) taken out of it to become an "f"

I highly recommend learning the International Phonetic Alphabet. It makes sense of those weird pronunciation symbols on Wikipedia and Wiktionary, and you'll look like you're a smart cookie who speaks multiple languages when you just have figured out how to read pronunciation guides.

Knowing how to pronounce words in other languages and knowing what phonemes are commonly used in certain languages also helps you fake an accent and better socially engineer people, if that's the type of hacker you're aiming to be.

laurenlewis
Автор

So you could instead of run a dropped file/bat loader, you could just make it execute a powershell command that downloads&executes the malicious code? (say reflectively load a dll) Then have a scheduled task to run the bogie query command? Would this be considered fileless?

gooniesfan
Автор

How can you run that payload on the target machine without them noticing?

VortX-tech
Автор

Dude this guy is incredible. Just like you, thanks so much for All your Videos john

guyincognito
Автор

Great one! I like that you kept it slim!

andreadistasi
Автор

AMSI reminds me of Jamsey and Wamsey, an inside joke my friend's friend started. Haha

ReligionAndMaterialismDebunked
Автор

That is epic Jhon keep up the great work! <3

cyberdevil
Автор

Love the comments about webroot. Made me laugh because that’s what our MSP has installed on our endpoints.

oildiggerlwd
Автор

Dear mr Hammond our favourite security expert. How can the simple, total beginner user, check if someone has hijacked any device of his network? Smartphone, laptop, smart TV etc. How do we detect a compromise or even foreign users?

keylanoslokj
Автор

It will be Gregor in English, actually one of few Polish chaps worth, following!

donttrusttheape
Автор

Heavy nice content, already waiting next videos.

FuzzerHash
Автор

Love your content
Inspired me to learn

groundwalker
Автор

Am I missing something. You need to have admin rights to add the query command right?

mikaeleriksson
Автор

I was just watching your video on hoaxshell

kazhiroma
Автор

Does CLR Hooking to bypass AMSI still work in Windows 11?

panchakosha