Тёмный

catch EVERY reverse shell while hacking! (VILLAIN) 

John Hammond
Подписаться 1,9 млн
Просмотров 222 тыс.
50% 1

Опубликовано:

 

29 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 241   
@_JohnHammond
@_JohnHammond Год назад
DID YOU KNOW that (obviously intentionally) placing a TYPO within the first THREE seconds of your video helps increase audience engagement and boosts your videos in the algorithm?????/// Please do take a look at all of the sweet stuff that HTB Academy's Certified Penetration Testing Specialist has to offer!! j-h.io/htb-cpts
@builder481
@builder481 Год назад
Hey John are you going to do Advent of Cyber for 2022?
@gg-gg-gg-gg
@gg-gg-gg-gg Год назад
John you should consider uploading your videos to Nebula, you'd make a good addition
@gamingravan1713
@gamingravan1713 Год назад
how to remove that windows backdoor from your system
@builder481
@builder481 Год назад
@@gamingravan1713 do you have a virus?
@gamingravan1713
@gamingravan1713 Год назад
@@builder481 nope just trying to know what would be the solution for if I want it to remove from one of my windows vms
@HaxorTechTones
@HaxorTechTones Год назад
The inspiration and "try harder" attitude to create Villain came from the video you made about hoaxshell. For that reason, as well as your remarkable effort to educate people in IT/Cybersec for a decade now, I dedicate Villain to you. Thank you🙏
@janmbaez
@janmbaez Год назад
Really thank you marchus for creating this awesome tool, keep up the great work!
@brianb5723
@brianb5723 Год назад
Thank you, you're a legend!
@Synceditxboxoffice
@Synceditxboxoffice Год назад
i love you sir but one question how did you learn writing your own script can you start a series on this i have asked this to john hammond sir but he didn't respond to that at all so i want you to do it sir it will be really great for the people like me.
@__lasevix_
@__lasevix_ Год назад
@@Synceditxboxoffice Try searching for python beginner tutorials
@dedsec5271
@dedsec5271 Год назад
I know a legend when I see one 🫡
@mar0ne220
@mar0ne220 2 месяца назад
You deserve every penny for this ad! best explain and show and currently on my cpts path!
@StrokeMahEgo
@StrokeMahEgo Год назад
Definitely love the multiplayer aspect, much like cobalt strike's team server concept. Very useful for actual red team engagements where there's multiple operators.
@hawk__
@hawk__ Год назад
A dude said in a previous vid of your "John doesn't need fancy thumbnails, has face does it all" and yeah it really does, man! Keep putting nice content 🙂, coool tool. That OTP thing is the coolest one. You haven't done any writeups lately though ;) + Video is nice enough, editing, music. If possible plz share pc specs the one which is running 1 host + 4 vms without any lag.
@jorisschepers85
@jorisschepers85 Год назад
Great video again John, but please ditch the soundbars around the webcam feed.
@_JohnHammond
@_JohnHammond Год назад
Appreciate the feedback, thank you! We're experimenting with some of those new flashy video effects and thought we would test the water with the audio visualizer around the face cam. I had a thought it might be too distracting from the content, but wanted to try it in the wild. We will think on it and see if we can scheme up some other nice quality-of-life touches!
@jorisschepers85
@jorisschepers85 Год назад
@@_JohnHammond you don't need all those flashy things. Content is A+. Keep doing you
@hongkonghacker
@hongkonghacker Год назад
Windows defender already blocked those payload after few days later.
@Zerback
@Zerback Год назад
Thank you T3l3Machus and John for the amazing tool and usual 10 out of 10 quality education !
@Boolap1337
@Boolap1337 Год назад
I love his tools but I love even more your explanations and tutorials. You guys complement each other.
@CiscoJedi
@CiscoJedi Год назад
Sadly your videos alerted Microsoft to Defender's issue of missing this. Sooooooooo... now Defender catches this and Hoaxshell, even with obfuscation. Bummer.
@tanja84dk1
@tanja84dk1 Год назад
Thank you very much for showcasing that. Tbh I have actually really been looking for a framework like that to when ever I play ctf's ( specially if I ever are going to attend where its teams agenst teams ) so its great to have it in my tools folder
@CypherX-Sec
@CypherX-Sec Год назад
Hey John please help me there is an eror while executing this it shows modulenotfound crypto please 🙏 reply
@free_venezuela
@free_venezuela Год назад
Regards from Dominican Republic 🇩🇴. I think your channel is pretty cool and I've learned a lot since I found this Channel, I was stuck with the Reverse Shell thing, but thanks to you I got out of that corner, brother. THANK YOU!.
@torsec6048
@torsec6048 Год назад
And now john detailed video arrived :) go go john Hammond
@konfushon
@konfushon Год назад
the small differences in this video like the sound track used and the "waves shennanigans on John's head" at the bottom right corner is kinda slick though 👌
@shenetworks
@shenetworks Год назад
very cool!
@karkantas
@karkantas Год назад
Your content is improving like a super sayian after each video.
@_JohnHammond
@_JohnHammond Год назад
SUPER duper thankful for our new editor and the phenomenal work they are doing -- all credit to @Nordgaren!!
@_AN203
@_AN203 Год назад
Hey John.. I am back ! And that voice interactive background that you have on your thumb during the video... Does sell the HTB theme.. And hey.. Another C2 framework to the arsenal... Pretty cool..
@AubreyCute-mo7ry
@AubreyCute-mo7ry 9 месяцев назад
Blocked by Windows Pretender!
@gokul5582
@gokul5582 Год назад
My question is anyone of my victim will dare to paste suspicious lines on their cmd? Is there any other way to deliver it? Practically will it work?
@gabi-sw8zw
@gabi-sw8zw Год назад
love your content the hacking b-role had me laughing this episode lol
@novianindy887
@novianindy887 Год назад
can yo do meterpreter payload with it?
@Iampopg
@Iampopg 6 месяцев назад
Does it bypass windows defender?
@Arjun-eg1lz
@Arjun-eg1lz Год назад
Hi Mr.John i have tested the tool(Villain) the code is executed smoothly ,but unable to get shell and i have tested in multiple win10 machines using obfuscate,encode and constraint_mode . I'll waiting for response.
@Arjun-eg1lz
@Arjun-eg1lz Год назад
tnq Mr.john
@Insomnia_2311
@Insomnia_2311 Год назад
Thanks John for the Education but I am afraid of that someone of this community would use this for bad things. I am not very sure how dangerous it would be using it on an enterprise network landscape by sending an inconspicuous attachment to an victim email-address ?
@عالمالبرمجةالعربي
I like you very much Mr.John Hammond. You are always teach us new things. Thanks
@Lacsap3366
@Lacsap3366 Год назад
i don't like the new animation around the facecam, i think it distracts from the video.
@khaelkugler
@khaelkugler Год назад
I'd agree
@benary5620
@benary5620 Год назад
That looks really interesting. Question: let's say I generate a linux payload and put it on my (remote) laptop; will it automatically connect if I start my local Villain _after_ that remote machine has run its crontab? Or would it be sufficient to run it every 5 (or so) minutes on the remote machine, so once I start my local Villain, it will take 4:59 secs max to connect (in that case, will the remote machine's crontab kill any active sessions once the payload runs again??)?
@theequalizer7297
@theequalizer7297 8 месяцев назад
Thank you very much 🙏My S14 Flip laptop. I was working and left it for a few minutes. When I came back, I was surprised to be asked for a new PIN code and that the old one was disabled and could not be accessed (explorer.exe - System Error). The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application) I felt frustrated and spent 9 hours trying to solve the problem, but the problem was not solved, and I do not know what is the reason for this problem. By the way, it is a completely new laptop that has been in service for only 4 months, an Asus S14Flip Ryzen 5600 laptop, a Radeon card, and RAM. 8 JB and its performance was very slow when browsing websites, but I noticed that sometimes its temperature increased.
@mav7284
@mav7284 Год назад
My windows 10 blocked the script.. So I have to turn off the virus defender only can run the backdoor script..:(
@SumanRoy.official
@SumanRoy.official Год назад
Great tool but they need to generate unique obfuscated payloads that bypass every AV and Security endpoints like Crowdstrike and others.
@CypherX-Sec
@CypherX-Sec Год назад
It is not working in windows
@jonphinguyen
@jonphinguyen Год назад
Can content creators PLEASE STOP doing the soy face in the thumbnails.
@AnacardiumOcidentale
@AnacardiumOcidentale Год назад
Very nice piece of tool. Does it runs on a Raspberry pi? Gonna try to install it on mine...
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
Window paword+linux paword equal password attending and different tightening in the password, same password in the continue.
@howardbarnes5604
@howardbarnes5604 Год назад
Would you care to tell me what the username/password is for github? I can't join right now for admin reasons. Thanks
@Whatthellisthisthing
@Whatthellisthisthing Год назад
The thumbnail faces are getting out of hand. Does it hurt your face muscles? I like to imagine the process of people posing for the thumbnail. Seems funny. The algorithm must be hard to please.
@BobbyBobBob69
@BobbyBobBob69 Год назад
Hey I don’t wanna sound stupid, but I can’t copy between my Kali vm and my Ubuntu vm? When I’ve got only one vm open the guest isolation can copy and paste but when there’s more then one I can’t?
@JarppaGuru
@JarppaGuru Год назад
yet againsame what we have. victim need launch it/install app/click. are yoiu sure there no admin backdoor LOL no mention bout macos mayby develeper use mac LOL
@boh70326
@boh70326 Год назад
How many hours htb course consists of ? Not clear, just said 28modules Thanks
@inquisition.musician
@inquisition.musician Год назад
Easiest way to get Villan reverse shell running is to abuse shortcuts in Windows. Helpful for scambaiting tech support scammers.
@imurovtsev
@imurovtsev Год назад
ssh -R to your temp vps/vds not work more? What if the victim doesn't have a white IP address?
@ztikart
@ztikart 10 месяцев назад
Hello who can help me. They ask me for a reverse shell, two devices that are in different places, that cross the WAN, does this work? Someone to help me
@johnb3170
@johnb3170 Год назад
John from another John...you are a legend. Coming from and education and training background to cyber warfare now a security researcher. You encompass everything good in our industry. Keep it up! See you around!
@gezzadaverealstuffonlyboth8915
@gezzadaverealstuffonlyboth8915 8 месяцев назад
Hey , I'm learning cyber warfare at the moment, but need some good software as I was helping a young mum getting bullied and was raped , so said I'll sort it out and protect your network till hes moves on , well he payed few different hackers , and they was good , 3 atack me from different countries, not sure if they new each other, but it took 3 days 2 hours sleep they burt out 4 laptop 3 pc towers , my 9 year old boys plug the earth burnt where it burst the plug like it was cheap plastic, I'm still with nothing but my phone, they got everything cloud haswell, so I lost everything's, and was going to give up, but seeing your comment, the only one in 7 years , so hi there and sorry for asking but my eyes lit up 🤝
@lucadistefano9259
@lucadistefano9259 Год назад
This tool got so popular so now Microsoft Defender just catch it almost every time with a dedicated name "Xoaxshell". Defender ON!
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
Microsoft password and CTP password 🔑 confirmly all to using.
@faran_siddiqui-d3t
@faran_siddiqui-d3t Год назад
Loved the video quality, especially your cam circle effects when you speak!
@CypherX-Sec
@CypherX-Sec Год назад
hey john please help me it's not working while executing it's shows error of crypto module not found
@jdogdarkness
@jdogdarkness Год назад
I couldn't get program to run said a few things then "no module naked Crypto"
@JeffNoel
@JeffNoel Год назад
Realizing your video is sponsored by HTB Academy is pretty cool! CPTS is probably my next thing to work on if I pass OSCP on December 12th :D
@_ismail8880
@_ismail8880 Год назад
did you pass?
@JeffNoel
@JeffNoel Год назад
@@_ismail8880 I did! I missed one flag but for the bonus points so 100/110 points. The course material is on point and is perfect to prepare your for the exam content.
@AlexMercersRevenge
@AlexMercersRevenge Год назад
This tutorial is all well and good, but how does one get a potential target to practically click on a payload? I seriously dought some rando layperson is going to go into powershell/cmd and copy/paste that long ass command line into it on their own volition lol.
@struggle375
@struggle375 Год назад
Damn John the production quality is on point!
@trevor.viljoen
@trevor.viljoen Год назад
This has a very Metasploit look and feel to it.
@sugestiesti
@sugestiesti Год назад
Copy to clipboard failed. You need to do it manually. generate failed
@Sizzyful
@Sizzyful Год назад
Required argument LHOST not provided.
@pawepasawski5539
@pawepasawski5539 Год назад
Hi there, Unfortunately it's not working for me (anymore???). Whatever I try, obfuscate, encode... I always get the message at the powershell window: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This script contains malicious content and has been blocked by your antivirus software. + CategoryInfo : ParserError: (:) [], ParentContainsErrorRecordException + FullyQualifiedErrorId : ScriptContainedMaliciousContent This is for both Win 10 Pro and Win 11 Pro with Defender only. Windows Defender protection history says: "Detected: VirTool:PowerShell/Xoashell.F" and Affected Items: amsi: \Device\HarddiskVolume2\Windows\System32\WindowsPowerShell\v1.0\powershell.exe :(
@Neuer_Alias_erstellen
@Neuer_Alias_erstellen Год назад
something is slick: JohnH: that's cool
@joydwipnaskar6554
@joydwipnaskar6554 Год назад
If there this type any other such tool for mobile hacking please suggest me and make a video
@Leo_Aqua
@Leo_Aqua Год назад
Can you make a video on how to get a reverse shell from a webserver without php?
@raghulmanikandan
@raghulmanikandan Год назад
what's wrong with Metasploit and Empire?
@drvoip
@drvoip Год назад
Generating connectivity between two endpoints on a private network seems to be the dominant theme on RU-vid. Educational and informative, but how about showing how any of the tools work over the Internet, with firewalls and the usual network basic security practices in place?
@tntomega
@tntomega Год назад
Required argument payload not supplied what is t
@fdert
@fdert Год назад
I like the new editing!
@juantonio0788
@juantonio0788 Год назад
is that footage of Sam Hyde pretending to be a hacker? lmfao
@abepl
@abepl Год назад
aaahh "Hack The box" that's where i should go, thanks
@TheRojaki
@TheRojaki Год назад
Just saw a talk about hoaxshell on which a penetrationtester was hyping it up so much only to not work anymore after two days because everyone burned the signature haha. So interesting to see the new shell framework. Lets see for how long its working on engagements :D
@Alexis82
@Alexis82 Год назад
Powershell script blocked of internal antivirus!
@trustedsecurity6039
@trustedsecurity6039 Год назад
@@Alexis82 lmao stop using buzz word like you know what it means
@trustedsecurity6039
@trustedsecurity6039 Год назад
It was by the author... every open source tool will be burned like that
@Alexis82
@Alexis82 Год назад
@@trustedsecurity6039 I know exactly what I'm saying, don't worry about me!
@trustedsecurity6039
@trustedsecurity6039 Год назад
@@Alexis82 nope you dont...
@toolbgtools
@toolbgtools Год назад
cool tool! and lot of room for improvements
@ABenOfTheJames
@ABenOfTheJames Год назад
I'm assuming it's pronounced "tuh-lem-ah-kiss" and he's named himself after the son of Odysseus, Telemachus, whose name means 'far-fighter'. Sweet tool though. Fairly nasty.
@fireloks6362
@fireloks6362 Год назад
got it to work. I just needed to change permissions
@sauron89
@sauron89 Год назад
It doesn't work with Kaspersky endpoint
@bawalicoder1233
@bawalicoder1233 Год назад
totally loved the video😍 btw great editing
@maxbunnies
@maxbunnies Год назад
Hi John can you tell me what Glasses you have :)
@waheedmurad4223
@waheedmurad4223 Год назад
Amzing learning videos Can please upload about Andriod 11 SDK payload that can live recorder camera and voice with screen sharing abilities with bypass playstore security
@yacce4463
@yacce4463 Год назад
This is cool, but relying on "curl" all the time? Would be awesome to have different revshell payloads relying on different programs. I've hit several machines where "curl" or "wget" wasn't available, mostly if running on a container environment. Awesome work t3l3machus and John!
@luismarrero9293
@luismarrero9293 Год назад
hello John thanks for this amazing video as always. i tried this villain but when i tried to open it i got required argument PAYLOAD not supplied any help
@frollard
@frollard Год назад
Hopefully constructive feedback: I really really dislike the audio vu meter. I can't follow the text on screen with my eye constantly drawn to the bright movey-animatey-thing. May not apply to everyone, but I have a much harder time watching with it.
@SatheeshJenne2658
@SatheeshJenne2658 Год назад
Thank u so much.. please do more videos..
@nodopamine6243
@nodopamine6243 Год назад
Music in your background set at lower volume would go a long way. Its a thing you and IPPSEC miss. just need a little music
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
How many maintenance the handling files open
@samfisher8426
@samfisher8426 Год назад
i been using this for a week so far .. i have tested it on many OS versions ,windows 7 - 10 -11 / linux ,always bypass any fiirewall/defender never let me down ,the good thing that i can get multiple reverse shell just in one click ,without having to setup a new listener for each reverse shell payload ... thats really amazing tool
@adesopekingsley9967
@adesopekingsley9967 Год назад
The most amazing thing to me is thar the whole script was written with python.... amazing 👏🙀 great to see this ... I subscribed
@faisalagarbaa1
@faisalagarbaa1 Год назад
Hello Dr. how can I access your PhD thesis?
@klickspeur4342
@klickspeur4342 Год назад
love your videos john! great content, but the weird moving ring around you’re face is annoying/distracting me.. ❤
@Kobayashi423
@Kobayashi423 Год назад
Can i use hack the box using windows?
@Jennn
@Jennn Год назад
Completely off subject but the comments sections seem cleaner today. Did youtube finally get the spammer turds? Haha
@zeloigl
@zeloigl Год назад
what did u do at the cut at 4:49 im struggling to figure it out ive tried everything can anyone help it says module 'Crypto' not found so i checked the crypto file and the c is lowercase but doesnt let me change it to uppercase as it says file location was moved????
@jeonghutamilim2259
@jeonghutamilim2259 Год назад
If this works as intended, it could be great rat for headless servers or remotely assisting friends. Gotta play around.
@larva5606
@larva5606 8 месяцев назад
i took a shot every time he said "slick" 🥴
@cabbose2552
@cabbose2552 Год назад
what software are you using for your webcam feed?
@nordgaren2358
@nordgaren2358 Год назад
OBS
@cipher3966
@cipher3966 Год назад
Do you instantly change your outfit and film the Advent of Cyber after recording this?
@nielweting6744
@nielweting6744 Год назад
Is this tool allowed in OSCP?
@ibrahimyosif
@ibrahimyosif Год назад
i love you john but please turn off sound wave thingy surrounding your frame.
@Naath000
@Naath000 Год назад
i have done recently succesfull
@janekmachnicki2593
@janekmachnicki2593 Год назад
Great tutorial John H. Thanks for your effort to help less advanced hackers or IT lovers understand some of the tricks .
@bbowling619
@bbowling619 Год назад
a turtle in a turtle ? Dude is mentor !!!
@juliusrowe9374
@juliusrowe9374 Год назад
Super dope content John!
@AgustinLozada
@AgustinLozada Год назад
The example you shown are all on same subnet, what if its a segmented network?
@ChristopherEGr33n33
@ChristopherEGr33n33 Год назад
0:02 the old reverse shell "hanlder" 🤣
@obfuscated3474
@obfuscated3474 Год назад
Man, sometimes i wish you didn't bring attention to new tools so soon 😅 Makes me have to put in effort on engagements lol
@uuu12343
@uuu12343 Год назад
Who hurt the developer to make this lmao Its awesome, but one gotta wonder how he came up with the idea
Далее
Where Does Malware Go On Your Computer?
12:21
Просмотров 24 тыс.
▼ КАПИТАН НАШЁЛ НЕФТЬ В 🍑
33:40
Просмотров 418 тыс.
pumpkins #shorts
00:39
Просмотров 19 млн
How Hackers Hide
20:55
Просмотров 238 тыс.
Why HACKERS Use PYTHON? | PYTHON USES!!
4:01
Просмотров 1,4 тыс.
When you Accidentally Compromise every CPU on Earth
15:59
i BACKDOORED a Desktop Shortcut (to run malware)
13:58
60 Hacking Commands You NEED to Know
27:01
Просмотров 462 тыс.
Hacking Windows TrustedInstaller (GOD MODE)
31:07
Просмотров 650 тыс.
Tactics of Physical Pen Testers
44:17
Просмотров 904 тыс.
Windows Privilege Escalation for Beginners
3:11:45
Просмотров 102 тыс.
▼ КАПИТАН НАШЁЛ НЕФТЬ В 🍑
33:40
Просмотров 418 тыс.