Тёмный

I Stole a Microsoft 365 Account. Here's How. 

John Hammond
Подписаться 1,9 млн
Просмотров 354 тыс.
50% 1

Опубликовано:

 

1 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 521   
@theblankuser
@theblankuser 11 месяцев назад
Thanks for this. Now my concerns are real. Pushing the anti-phishing filters to a new level to all my clients
@trackker16
@trackker16 11 месяцев назад
How do you plan to do this? I believe it's all about real time monitoring of incoming emails and end user education We've even hacked banks with this -ethically-
@ryanfrank4834
@ryanfrank4834 11 месяцев назад
Will still get through regardless. Need to use hardware key mfa or Conditional Access policies..
@PedroMonteiro217c
@PedroMonteiro217c 11 месяцев назад
@@trackker16 Conditional Access based on Device identity and location or fido keys :)
@eshin087
@eshin087 11 месяцев назад
@@ryanfrank4834which specific conditional access policies do you recommend to combat this?
@NK-fx1qs
@NK-fx1qs 11 месяцев назад
Right. There should be a phishing network card interface designed to simply 'be dumb' override by default to allow the 'script kiddy' into a honey pot. Give them all sorts of useless information using Bot Framework Composer. ;/
@ankanroy2
@ankanroy2 11 месяцев назад
Yeah that's why I blocked .zip domain at my dns level😅 btw nice tool
@WilliamK99
@WilliamK99 11 месяцев назад
I've only casually followed you over the years, but your last few videos have been superb and unlike what other content creators are producing, you are now to the top of my viewing list. Excellent job!
@mindaugasdailidonis
@mindaugasdailidonis 11 месяцев назад
Cool demo! This is why admin folks should be configured for eligible role assignments where another MFA prompt is required to elevate privileges to admin. I wonder if a proper domain would be used (domain flipping), whether zScaler or Menlo (or any other modern proxy) would detect and prevent Evilginx.
@Culumu
@Culumu 11 месяцев назад
Wish you’d use Google as an example for a phish involving the .zip domain
@CZghost
@CZghost 11 месяцев назад
Hehe, that would be ironic. :D
@brandonnn95
@brandonnn95 11 месяцев назад
Love the video as usual but the amount of times the word “ultimately” was said was astounding 😅
@_JohnHammond
@_JohnHammond 11 месяцев назад
well ultimately it's to make a point 🤪
@avonbarksdale2506
@avonbarksdale2506 11 месяцев назад
We just started rolling out conditional access policies because of rampant phishing attacks and vulnerabilities in Microsoft's MFA apps. Now only registered and compliant devices can access company resources. It's cat and mouse but that's the game!
@Jake-km7wp
@Jake-km7wp 11 месяцев назад
This along with BitB attacks, are mad scary. I recently started building out infrastructure for both and they are a slam dunk. Great video John!
@prodKossi
@prodKossi 11 месяцев назад
I have never seen BitB attacks outside of Steam - but im guessing its only going to grow :/
@pravinsingh4184
@pravinsingh4184 11 месяцев назад
But if mails already mark in junk then what will be the use 😂
@prodKossi
@prodKossi 11 месяцев назад
@@pravinsingh4184 Bypassing email filters is a separate thing- not as hard as you'd think if you are spearphishing/whaleing
@soulfulremind
@soulfulremind 11 месяцев назад
I tried the phishlets but every time I use evilnginx “Google Safe browser” marks it as insecure domain even before doing anything. Do guys have any idea why this getting got caught?
@sujalchauhan6192
@sujalchauhan6192 11 месяцев назад
​@@pravinsingh4184Ma boy got a point
@joshdoesntcare3939
@joshdoesntcare3939 Месяц назад
I only want to this within a small company I work at cause our oversight clearly has information they should not have. They made it so obvious that I set very specific traps that only a person who had access to my account would know.. they didn't just fall into one but just about all of them. Ironically it led to illuminating their pet aka my co-worker who has been leaking information (over their long tenure, being this snakey gets them no benefit but they are the equivalent of a head house slave) lol. The deceptive, invasive, and unethical tactics they use have led me here which hacking is something I always frowned upon BUT I 100% condone punching back
@psclplg
@psclplg 11 месяцев назад
Nicely done showcasing Evilginx and its possibilities. Would be nice if you would have mentioned that there are measures to tackle this sort of threat. Like FIDO2 security keys or even Microsoft Authenticator Phone Sign-In paired with the Conditional Access grant control of a compliant device. Maybe something for a new video to follow up with.
@cryptoafc7655
@cryptoafc7655 11 месяцев назад
but they are saying even fido2 can be hacked if they steal the token
@Konarcoffee
@Konarcoffee 11 месяцев назад
Haha follow up? Maybe if the front page of tech sites bring it up again, these videos are nothing but repackaged video versions of headlines from any computer security news site, super basic demonstrations that are obviously following an already written tutorial. Look elsewhere if you want real content
@psclplg
@psclplg 11 месяцев назад
@@cryptoafc7655 do you mean the hardware token or the access token? Basically FIDO2 auth methods tie the auth factor to the online service and therefore you won’t be able to authenticate to the phishing site spun up by the evilginx reverse proxy.
@jarredpow
@jarredpow 11 месяцев назад
@@cryptoafc7655 Pretty sure Fido2 is resistant to this.
@cryptoafc7655
@cryptoafc7655 11 месяцев назад
@@psclplg I have a Yubi key 5, and without touching the button on it. I can't log on anywhere
@astanouk
@astanouk 11 месяцев назад
It would be amazing to see a demo of this tool with things like ubikey and passkeys to demonstrate how they aren't vulnerable to these kinds of attacks.
@OrionsArm
@OrionsArm 11 месяцев назад
Unfortunately even they would not be immune since the attack is targeting the active session cookie
@paulstelian97
@paulstelian97 11 месяцев назад
@@OrionsArm They would be immune because they'd simply fail to work due to the different domain name. The same as the password not being memorised in the browser.
@mountainslopes
@mountainslopes 10 месяцев назад
@@OrionsArm The key exchange would fail with the different domain name, meaning no session cookie would be generated. I was disappointed that wasn't covered in this video.
@OrionsArm
@OrionsArm 10 месяцев назад
@@mountainslopes Not a different domain name he is reverse proxying and using the actual domain name
@RutsuKun
@RutsuKun 9 месяцев назад
@@OrionsArm there is a different domain in the browser and yubikey check domain from the browser, you need to educate yourself
@perryuploads776
@perryuploads776 11 месяцев назад
Wait, When you used the victim page, you used your own ip-adress. When you used the session 3 and copied in firefox (cookie plugin) , did you still use your own ip-adress ? Because in Azure (not sure in M365) every logon is check from which ip-adress it comes from. When you have a session from IP-adres A , and you come with the same session with IP-adres B then this shouldn't work at Microsoft. It should detect and ask to do a MFA again. This is called conditional access in Azure AD. I think this exploit can be done on websites that don't cross check sessions with different ip-adresses. Thank you for the learning John
@azountsu
@azountsu 11 месяцев назад
That was my line of thinking as well. What CA (conditional access) rule can we create to harden a tenant's configuration against this attack? Also great question about IP address usage, how would this behave when Microsoft detects this the session token from a different IP. Is this a default behavior or should we setup a CA rule to harden against it?
@trackker16
@trackker16 11 месяцев назад
Word. When I tried it against office365 it worked, but in the azure portal it didn't. it'd keep me asking for mfa codd
@learneducateteach9624
@learneducateteach9624 11 месяцев назад
This was not configured with conditional access from the looks of it.
@mindaugasdailidonis
@mindaugasdailidonis 11 месяцев назад
Atypical travel CA rule could do the trick here. For example trigger another MFA prompt when attacker attempts to signin instead of blocking the account, this alone could help, but not necessarily prevent the attack as the attacker might be connecting from a similar geographical location.
@avonbarksdale2506
@avonbarksdale2506 11 месяцев назад
@@azountsu conditional access could be it has to be an Entra registered device (registered on your network talking to your domain controller/Active Directory so they'd have to be in your network to register) and it has to be a compliant device (which could be whatever parameters you set). Could also block all IPs from countries you know you'd never have users in or are known threats like Ukraine, Russia, China, etc.
@jirayahatake
@jirayahatake 11 месяцев назад
Would Yubikey prevent this?
@dyerseve3001
@dyerseve3001 11 месяцев назад
It should, as long as other methods are not also enabled.
@godofnothing520
@godofnothing520 Месяц назад
@@dyerseve3001 No. Cause the hacker has the session. You can access the account without entering any password. Yubikey is just a better secure 2FA. But once the hacker has your account session. You can't do anything except to log out to end the session.
@akirawong1639
@akirawong1639 10 месяцев назад
where did u get that template? I only see 1 working GIT project for 3.0 the rest are outdated & broken...
@capability-snob
@capability-snob 11 месяцев назад
This seems a good time to point out that since a capability designates the resource that it operates on, it's largely not vulnerable to this class of attack.
@pichonPoP
@pichonPoP 11 месяцев назад
Really a nice thing. Nevertheless, this thing only caught people who dont know anything about URL.
@UsielMartinez-ew1xl
@UsielMartinez-ew1xl 11 месяцев назад
Anybody enrolled in Evilginx 3.2 Programming Course
@ChiefNimrode
@ChiefNimrode Месяц назад
I have the course
@kainalejandrovelazquez8644
@kainalejandrovelazquez8644 11 месяцев назад
evilginx professional masterclass is what u should be
@hakoo2700
@hakoo2700 11 месяцев назад
Hey john, thanks for the knowledge sharing again! But why not include the ip address of the user in the auth-tokens?? On the server-side just block the request if the auth-token's ip doesn't match the requester's (for instance the attacker). It also doesn't matter if the victim himself is behind a proxy, at least the token is only valid within that LAN. right?? 🤔🤔🤔🤔
@CZghost
@CZghost 11 месяцев назад
Some people are connecting with a dynamic IP address which is changing from time to time, when your connection renews (and it can be forced as well, just restart your modem). So logging an IP address and only whitelisting that will lock you out from your account. Not to mention if you use VPNs for privacy reasons.
@hakoo2700
@hakoo2700 10 месяцев назад
@@CZghostThey dynamic thing u said is fine I guess, cuz as long as you are connected (and even if you get disconnected for few minutes you will most likely get the same ip) you will have the same IP. Its more like a comprise for security rather than user experience which in something like banking web apps is good? IDK this whole thing was actually just a question.
@unyx420
@unyx420 10 месяцев назад
This video is for educational purposes only btw
@jesusavilaacero961
@jesusavilaacero961 10 месяцев назад
3.2.0 yaml files are on gthub already i think
@iRyan230
@iRyan230 11 месяцев назад
Nice video John. Can you make one that shows how FIDO2 keys are not vulnerable to this type of attack? Also, maybe detailing what steps admins can follow to try to mitigate this attack as much as possible?
@sapuseven
@sapuseven 11 месяцев назад
Can you explain how FIDO2 keys protect from session hijacking? Isn't it just like 2FA?
@greyshopleskin2315
@greyshopleskin2315 11 месяцев назад
I’m not sure, but fido2 would be the same. Ultimately what your doing is stealing the cookies. So as long as websites uses cookies or auth tokens, you can do this
@iRyan230
@iRyan230 11 месяцев назад
@@greyshopleskin2315 If you have malware on the client’s machine or have some other way of stealing the session cookie from their browser, then yes, it’s the same. However, if we’re just talking about preventing phishing, then FIDO2 and certificate based auth will never authenticate you on a malicious site to begin with thus no session cookie to steal.
@fraznofire2508
@fraznofire2508 10 месяцев назад
@@greyshopleskin2315FIDO2 will not authenticate through a different domain (the phishing domain used in this video for example), no authentication, no cookie
@mudi2000a
@mudi2000a 10 месяцев назад
@@sapuseven in my opinion FIDO2 would not work as it is tied to the actual domain name cryptographically. So as the phishing site is not using the correct domain name, the FIDO2 token will not work to log in. However still, if the user is able to use some fallback mechanism instead of FIDO2 then it can still be successful.
@rehmankhan6081
@rehmankhan6081 11 месяцев назад
cookies must be verifying the client-agent & change in location. Hope the sign in from different location & device is notified to user & immediately changed the paswd. 🙄
@coffinplayz
@coffinplayz 11 месяцев назад
main problem is its went to junk folder 😂
@AshwinSKumar
@AshwinSKumar 10 месяцев назад
This is illegal KNOCK IT OFF AND STOP IT
@AdrianGrigorica
@AdrianGrigorica 11 месяцев назад
It`s unbelievable how simple and powerful it is
@blablubb1234
@blablubb1234 11 месяцев назад
Am I seeing this right, if we’d use a password manager to autofill the username/password, it wouldn’t suggest us the Microsoft password since the domain in the browser is not actually the Microsoft login?
@slip6699
@slip6699 11 месяцев назад
As a user that happens all the time. You get conditioned to having to paste the password in sometimes when the account creation address doesn't match.
@iRyan230
@iRyan230 11 месяцев назад
Correct.
@CMGMedia487
@CMGMedia487 11 месяцев назад
More videos like this please, great video
@Munch473
@Munch473 11 месяцев назад
Speaking from the defender side, orgs are implementing conditional access policies that will block sign ins not coming from company owned IP address spaces, and there are a lot of security mitigations in place to stop such phishing attacks. Although the large majority of users are never gonna click shady links like these, there will be a portion of users whom will, and there will be a tiny portion of those users whom will get phished all the way. User training and awareness is the number one security counter measure against such attacks.
@iRyan230
@iRyan230 11 месяцев назад
How can you restrict remote logins to only company owned IP space? Force all remote users to use a Full-Tunnel VPN that sends all traffic through the office? What if the company network is down? Then no one can sign in.
@Munch473
@Munch473 11 месяцев назад
@@iRyan230 You divide users in various subsets, for example, users that will always work on site have no reason to log in from foreign IPs. On the other end, there will always be a set of users who will need to use company resources on the go, and for those MFA and managed device policies are strictly enforced, alerting policies are more sensitive, raising alerts wherever any unfamiliar sign in activity is observed. As for the VPN, you can deploy enterprise grade VPN solutions with no downtime (in theory), you can get company specific IP spaces and those can be whitelisted in your IDP. This is by no means a perfect solution, but carefully designing these can mitigate a large portion of the threats, the rest can be easily handled by the incident response team. And regarding the example in this video, admin access is usually deferred to separate accounts that have even stricter access policies.
@Slickjitz
@Slickjitz 10 месяцев назад
@@iRyan230conditional access policies will usually be based on location. If a user logins in from California at 8 am and then an hour later tries authenticating from Florida that sign in attempt will most likely be blocked.
@kylewolf5706
@kylewolf5706 7 месяцев назад
He was asking more-so about the fact that if you do this, how do you handle your remote users (full-tunnel VPN?), or how do folks work when the network is down?@@Slickjitz
@Slickjitz
@Slickjitz 7 месяцев назад
@@kylewolf5706 that’s why any good network engineer has built out redundancy so the network never truly goes down.
@maahiraziz1166
@maahiraziz1166 10 месяцев назад
Am I correct in stating that even if we used stronger forms of device authentication or a FIDO token the fact that you gain access to the session tokens to an extent nullifies those controls as the user session was still proxied?
@leonardofelippine9781
@leonardofelippine9781 10 месяцев назад
It would be interesting to see how features such as Continuous Access Evaluation, from Conditional Access and Smart Links, from Defender for Office 365 would deal with this attack, as Microsoft says token replay is detected and blocked. Very good video anyway
@simonj8174
@simonj8174 10 месяцев назад
Good points, Token machine binding in preview too
@anomsaha8023
@anomsaha8023 11 месяцев назад
At 16:28 you revealed a public IP from Santa Clara and your phone weather notification revealed your location Alameda
@majoryoshi
@majoryoshi 11 месяцев назад
He might have on a vpn, but still worth noting
@techgreyhathacker
@techgreyhathacker 11 месяцев назад
thanks, John super content keep...
@MoxxyPrime
@MoxxyPrime 11 месяцев назад
I love these videos. Now I can grab a copy of the tool, use it, and look for any generated IOCs from default usage. Another easy win for low hanging fruit!
@nordgaren2358
@nordgaren2358 11 месяцев назад
Well, there's nothing on the targets machine, for this. I think maybe you could figure out something by checking the traffic, though, maybe?
@MoxxyPrime
@MoxxyPrime 11 месяцев назад
@@nordgaren2358 the url generator has default values, like the random string at the end has a certain amount of characters and do not spell a word. So scanning for urls with that at the end might be a start
@leeonardoaugusto
@leeonardoaugusto 11 месяцев назад
This is scary. The question now is -- What is Microsoft and other companies doing to prevent this?
@jarredpow
@jarredpow 11 месяцев назад
Only true way to stop is Fido 2 hardware token (stops token stealing)...User training, but that is it or Conditional Access grant control of a compliant device
@MathiasOttsen
@MathiasOttsen 11 месяцев назад
@@jarredpow fido2 or smart card certificate authentication
@exxon47_
@exxon47_ 11 месяцев назад
@@jarredpow The video actually says that this bypasses 2fa.
@oskarz
@oskarz 11 месяцев назад
@@exxon47_you cannot bypass a hardware key as it will not function unless it is at the correct site…
@evertonm.junior31
@evertonm.junior31 11 месяцев назад
@@exxon47_ Not Fido 2 hardware tokens. They only work on the real domain
@Ray_BH
@Ray_BH 11 месяцев назад
This is madness 😅
@viniciusrochadasilva8877
@viniciusrochadasilva8877 11 месяцев назад
How does evilginx generate a tls certificate signed by a trusted ca? Which ca is it using?
@del6856
@del6856 11 месяцев назад
It uses letsencrypt to generate the certificate
@iRyan230
@iRyan230 11 месяцев назад
Most likely Let’s Encrypt.
@MichaelBohemian
@MichaelBohemian 11 месяцев назад
Can you do it with Google tho. I always like to think Google does web better than Microsoft.
@Bloody7890
@Bloody7890 11 месяцев назад
If an admin clicks on a .zip URL and really thinks its from Microsoft and logs in, its really his own fault.
@mountainslopes
@mountainslopes 10 месяцев назад
I wouldn't focus so much on the simple example for social engineering in this video. The methodology around reverse proxies is the takeaway here. There are many examples of visually identical domains using Punycode for example which have successfully tricked admins. That being said, physical security keys resist this method since the domain doesn't match during the key exchange.
@HitemAriania
@HitemAriania 11 месяцев назад
The available phishlets (And the one shown in the video) are not working btw. However, after many hours of tweaking you can get it to work - but password will not be displayed - you will have to know some java script. And it will not prompt user to login unless they are activly logged out (if already logged in you just get the token straight up - even better!).
@Zinojn
@Zinojn 10 месяцев назад
Huh? How would it retrieve the token then? The sign in is coming from a new device so surely it would require a new sign in.
@greyhat1173
@greyhat1173 7 месяцев назад
I have phishlet google available for 3.2, capture user + password + cookie
@_popt_
@_popt_ 11 месяцев назад
man please try this with adfs for steal Microsoft 365(obviously for educating purpose)...i still have a problem with him for my thesis
@mrfalce9411
@mrfalce9411 3 месяца назад
June 2024 UPDATE: this Office 365 phishlet doesn't work anymore
@mrfalce9411
@mrfalce9411 3 месяца назад
Or more like, it works but there is a strange redirection loop bug that happens once all the tokens are intercepted
@i_am_yigit
@i_am_yigit 10 месяцев назад
Thanks! I will use that for Educational Purposes Only!
@BlackHermit
@BlackHermit 11 месяцев назад
I will always eternally steal Microsoft 365 accounts forevermore.
@psytron939
@psytron939 11 месяцев назад
Say it with me... USER! TRAINING! Crucial! This is too easy lol holy.. Kudos.
@Zinojn
@Zinojn 10 месяцев назад
What should we train them to check?
@fotografotimido
@fotografotimido 11 месяцев назад
I recently got an email using this, it evens pulls the tenant branding on the login screen
@devonsurfer7619
@devonsurfer7619 11 месяцев назад
Yes also seen a Tenant branding one at the end of last week however surely that's not a surprise as the Reverse proxy will do whatever the tenant would have shown.
@Zinojn
@Zinojn 10 месяцев назад
@@devonsurfer7619yup… I also worked with one that forwarded to another iDP too (Microsoft login page forwarding to Okta). This is such a mess and really frustrating that Microsoft is dragging their feet here. I know it’s complicated to resolve this at a large scale but it’s got to be one of the worst security threat’s organizations have faced in a long time.
@appleiphoneuser1
@appleiphoneuser1 10 месяцев назад
This is ridiculous bro do you think that someone cant use this? They can. thanks helping hackers
@alexserrano3215
@alexserrano3215 10 месяцев назад
Is there a cheaper course ???? Ima broke college student atm
@diegoemiliorodriguez3155
@diegoemiliorodriguez3155 10 месяцев назад
evilginx pro course??
@dawidblachowski
@dawidblachowski 11 месяцев назад
This won't work until target is an IT illiterate and follow phishing mails.
@fald0
@fald0 7 месяцев назад
Could the session/token be stolen if the end user is already signed in (ie. outlook web mail) or will he need to create a new access token to steal a valid cookie?
@TheMyteeQuinn
@TheMyteeQuinn 10 месяцев назад
A video on how to prevent this would be great, other than user education of phishing emails.
@skrskr9000
@skrskr9000 7 месяцев назад
Pretty self explanatory, you just do the opposite of the attack lol
@StevenKroeger
@StevenKroeger 11 месяцев назад
its easier with an activator
@apekatt2007
@apekatt2007 5 месяцев назад
That .zip domain holds infinite power!
@jonchicoine
@jonchicoine 11 месяцев назад
I worry that this information will end up being used by bad actors instead of pen testers :(
@ToniMorton
@ToniMorton 11 месяцев назад
i keep getting two factor promps for people trying to breach my MS acc lmao
@user-xz9dh9mq3g
@user-xz9dh9mq3g 11 месяцев назад
That means they at least know your password.
@stephen11627
@stephen11627 28 дней назад
The lure is not the hook - lol The lure is the bait on the hook. The hook is the last thing they want. You can tell you're not a fisherman, neither am I. 🤣 (ha ha)
@saltyowl3229
@saltyowl3229 11 месяцев назад
Is this a sponsored video or just you covering a course and tool you thought was sick? Because this DOES seem sick. I’m just curious as to how the video came to be!
@gururajmoger8649
@gururajmoger8649 10 месяцев назад
Hey bro.. I lost contact of my best friend.. have just gmail and don't know whether it's using currently or not.... Is it possible to get the contact details by name and location 😔?
@leebertie57
@leebertie57 8 месяцев назад
This is scary but the phishing email came from a Gmail account. Even the least technical users I have will not be fooled by this.
@Cowboy-Trucking61
@Cowboy-Trucking61 11 месяцев назад
Question: Just asking, why would you show someone how to do this.
@mrmay398
@mrmay398 Месяц назад
Because the tool is publicly available and the average individual such as yourself wouldn’t know about it, making you a target. The ‘bad guys’ already know about it and the more awareness generated towards the tool will push companies to strengthen their security architecture also making you aware of the tool.
@ChiefNimrode
@ChiefNimrode Месяц назад
Chill 😂😂😂guys
@heyitsbacon599
@heyitsbacon599 11 месяцев назад
Creating a .zip TLD was a horrible idea. It's just begging to be abused by attackers.
@jbaris
@jbaris 11 месяцев назад
When did they create this? I've never heard of it till just now
@SecOps-7
@SecOps-7 10 месяцев назад
@_JohnHammond Do you know why companies like Microsoft are not mitigating this threat with the Security Hardening techniques you mentioned at 9:10 like "Security Token Validation". Is there a downside to implementing this?
@Zinojn
@Zinojn 10 месяцев назад
They are dragging their feet with this attack which is seriously frustrating. This has got to be one of the largest security concerns organizations face today and they are practically silent in it(minus a blog post or two…)
@RaulCouto-sf5wh
@RaulCouto-sf5wh 11 месяцев назад
Você tem um incrível potencial criativo
@Fathippo449
@Fathippo449 11 месяцев назад
Disclaimer: education purpose only
@ashton9643
@ashton9643 10 месяцев назад
Remember kids this is for educational purposes only.
@unsureofachannelname1257
@unsureofachannelname1257 10 месяцев назад
not like they may mistake it as a way to built for your haters
@dd_Dedsec
@dd_Dedsec Месяц назад
Does this thing reverts the authentic user to home page of M 365 or redirects him/her to logged in page
@MyStopMotionProduction
@MyStopMotionProduction 10 месяцев назад
I am surprised this video has not taken down
@swapnilharale2643
@swapnilharale2643 11 месяцев назад
It will not working with Google account 😩
@pentest-lq5sl
@pentest-lq5sl 28 дней назад
Thank John for all video, with you i start my CPTS i hope to win it
@neuroadneuroad-precisionel9660
@neuroadneuroad-precisionel9660 11 месяцев назад
Super content Brother, keep it up!!!!!!!
@SgtStarSlayer
@SgtStarSlayer 11 месяцев назад
You will be hearing from lawyers of Microsoft and that client.
@YWVAS
@YWVAS 6 месяцев назад
I am 9 years old and I’ve managed to hack inside of 10 Microsoft accounts, Look you can call me a stupid young kid But I just might be the smartest kid on earth
@mohamadgamer1576
@mohamadgamer1576 6 месяцев назад
Can you hack an account for me?
@kevinagecido1715
@kevinagecido1715 10 месяцев назад
where did u get that template? I only see 1 working GIT project for 3.0 the rest are outdated & broken...
@omkargadave1089
@omkargadave1089 11 месяцев назад
Hack nasa 😂😅
@ab-zf2fk
@ab-zf2fk 4 месяца назад
Great work! More people will be able to steal from little old ladies than ever before!
@peterchari2302
@peterchari2302 11 месяцев назад
Excellent content as always.
@sailingbikeruk
@sailingbikeruk Месяц назад
John, I love your work and your content, I come here all the time, but RU-vid are making it almost impossible to follow along and pay attention. Ive just watched this and had adverts injects every 60-90 seconds. I really appreciate the work you do here. Please try to reduce the ads so i can watch and make notes (or tell me how I can subscribe to YOUR content without paying Google even more)
@janmillerty4528
@janmillerty4528 11 месяцев назад
Hello 👋 :)
@paulhetherington3854
@paulhetherington3854 10 месяцев назад
STOL >>> My situate = my personal movement! You joined - the "Red Dragon's Brigade - Frankenstein!" Zen Buddist!
@0fie.
@0fie. 11 месяцев назад
John, that thumbnail is killing me. 😂
@Johnydanerous
@Johnydanerous 11 месяцев назад
Require token protection for sign-in sessions ( in preview ) should fix this
@dyerseve3001
@dyerseve3001 11 месяцев назад
Yeah but only if you pay for Entra P2. 😢
@iRyan230
@iRyan230 11 месяцев назад
It only works for Windows clients and only for some could apps.
@xxcopesilva2xs
@xxcopesilva2xs 10 месяцев назад
ALL THAT SHIT TO GO TO EDIT COOKIES IN FIRE FOX LOL .. IM OLD SCHOOL LOVE CMD LOL ..
@felixkamara-q2m
@felixkamara-q2m 7 месяцев назад
who wants to work with me on a job we want to pull? Comment below if u want to team up
@MoBeigi
@MoBeigi Месяц назад
Interesting idea for sure to reverse proxy all the traffic seamlessly. But again, at the end of the day, don't click dodgy links and verify which links you visit.
@scottedmonston9392
@scottedmonston9392 7 месяцев назад
This is the response im getting, im on evilginx v2.4.2. We're unable to complete your request invalid_request: The provided value for the input parameter 'redirect_uri' is not valid. The expected value is a URI which matches a redirect URI registered for this client application.
@mark661
@mark661 2 месяца назад
I get error "Failed to parse or set cookie named "WLSC"" when pasting the cookie. Can anybody help?
@fuljostrujec2845
@fuljostrujec2845 Месяц назад
You have too many ads. Annoying af.
@mszary
@mszary 11 месяцев назад
That's the coolest evilginx presentation I've seen. PS. FIDO2 (crypto keys, local biometric authenticators, passkeys) to the rescue :)
@russellbaker4256
@russellbaker4256 10 месяцев назад
Next week: incorporating ransomware into EvilGinx phishlets, sponsored by Bitcoin
@popeadenuga
@popeadenuga 2 месяца назад
Some people are absolute beginners. I have a question John, How did you connect your name and the server together? I mean digital ocean and your domain?
@cyberdevil657
@cyberdevil657 10 месяцев назад
Jhon i was wondering if you could help me. I got blocked out of my own account because i cleared my cookies everytime i close my browser. Because i follow privacy online as a religion Microsoft AI got confused and locked my account because of "Suspiscious acitivity" Now there is a chain reaction that is triggerd and i lost most of my accounts because i have 30+ emails.. Can you please help me?
@The_Ginger-Bread
@The_Ginger-Bread 5 месяцев назад
... I am sorry for who I'm about to do this to.
@adrian17ftw
@adrian17ftw 11 месяцев назад
YOU ARE NOW STRAIGHT OFFERING PEOPLE WAYS TO HACK MORE PEOPLE !
@jirayahatake
@jirayahatake 11 месяцев назад
It is just as available to anyone with google my friend
@nordgaren2358
@nordgaren2358 11 месяцев назад
I would have never known this was possible, if it weren't for this video, and I am safer for it.
@ryanandray
@ryanandray 11 месяцев назад
You must be new to the field or just stumbled upon this video by accident. These demonstrations show us how to defend against these sort of attacks. It gives us new perspective. "You are now straight offering people ways to hack more people!" But this video is showing the importance of not blindly clicking on malicious links, and not blindly putting in your credentials into said malicious link. I understand your concerns when you stumble upon something like this, but I promise it's for the better.
@SkyeRobinson-pr7kv
@SkyeRobinson-pr7kv 11 месяцев назад
Appreciate💖 Your video, Goodnight💐 Hope You have superb Day tomorrow
@zengamer7405-new
@zengamer7405-new Месяц назад
this can steal normal microsoft acc?
@aldreisenpai.2474
@aldreisenpai.2474 12 дней назад
pls help me get my account back
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 11 месяцев назад
Bypass MFA. haha. I've heard of it before. 305 likes. That's the area code to the city I was born and raised in.
@ACCL9165
@ACCL9165 11 месяцев назад
CONAN O HACKING BACK AGAIN WITH BANGER VID
@float_3.14
@float_3.14 11 месяцев назад
I should delete my micro365 account:'(
@unsureofachannelname1257
@unsureofachannelname1257 10 месяцев назад
unless your in college and schools than it be bad because they don`t really seen to use anything else than Microsoft they Forced less security than they should
Далее
Finding WEIRD Devices on the Public Internet
27:48
Просмотров 290 тыс.
How Hackers Move Through Networks (with Ligolo)
20:01
Просмотров 272 тыс.
ОБЗОР НА ШТАНЫ от БЕЗДNA
00:59
Просмотров 391 тыс.
I Took Over a Microsoft Cloud Account. Again.
25:40
Просмотров 106 тыс.
Run your own AI (but private)
22:13
Просмотров 1,5 млн
He tried to hack me...
34:15
Просмотров 382 тыс.
Where Does Malware Go On Your Computer?
12:21
Просмотров 27 тыс.
3 Levels of WiFi Hacking
22:12
Просмотров 2 млн
Somebody emailed me a trojan virus
14:06
Просмотров 807 тыс.
ОБЗОР НА ШТАНЫ от БЕЗДNA
00:59
Просмотров 391 тыс.