Тёмный

Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE 

John Hammond
Подписаться 1,7 млн
Просмотров 18 тыс.
50% 1

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Опубликовано:

 

28 июл 2018

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 29   
@nitinmaurya6835
@nitinmaurya6835 2 года назад
That base64 thing was so good :D. Thanks for making such great videos.
@kallikantzaros
@kallikantzaros 4 года назад
you bastard
@NeverGiveUpYo
@NeverGiveUpYo 4 года назад
Finally some video worth watching! Keep up the good work!
@_JohnHammond
@_JohnHammond 4 года назад
Thank you! Will do!
@AnkitDasOfficial
@AnkitDasOfficial 4 года назад
This was such a good one! Learnt a lot
@_JohnHammond
@_JohnHammond 4 года назад
Happy to hear that! Thanks so much for watching!
@dxlsvy
@dxlsvy Год назад
Saved me here!! I made new adaptations and it's running as I want!! Thanks!!!
@ilyboc
@ilyboc 3 года назад
But actual port knocking using knockd or something wouldn't tell you if the port is open or not plus the port sequence can be generated too
@Vagelis_Prokopiou
@Vagelis_Prokopiou 6 лет назад
Exquisite stuff!
@bugr33d0_hunter8
@bugr33d0_hunter8 6 лет назад
Dude that was awesome. I love the python editor, its so colorful, and the way you move so smoothly through it. I'm starting to read black hat python for pentesting. Do you think that will help me understand better how to write those kind of scripts? I'm obviously going to finish all the overthewire challenges. I wonder though if there are just strictly python challenges alone? And if so could you maybe name one or two beginner type challenges. Thanks. Again this was a great video.
@vamsikolati
@vamsikolati 4 года назад
this is some elite stuff
@_JohnHammond
@_JohnHammond 4 года назад
Thanks so much for watching!
@realgabreal
@realgabreal 6 лет назад
awesome!
@TheBroadwood
@TheBroadwood 2 года назад
So cool
@KaleshwarVhKaleshwarVh
@KaleshwarVhKaleshwarVh 3 года назад
This was good.
@mauldoto
@mauldoto 5 лет назад
why scanning process so quickly on that ranges? :v
@jerrybailie
@jerrybailie 4 года назад
that base64 copy/paste was bananas !!!
@_JohnHammond
@_JohnHammond 4 года назад
Ha! Thanks so much for watching!
@mauriciomatias6261
@mauriciomatias6261 5 лет назад
Which is the page?
@realNAKAMI
@realNAKAMI 6 лет назад
why is python 2 usage still so common...
@bugr33d0_hunter8
@bugr33d0_hunter8 6 лет назад
nakami @ because of all the functions still supported like the. Socket functions for example. For some reason in python 3 they went and changed everything around. You could always port the libraries into python 3, but I bet it would be a pain to figure out.
@lordtony8276
@lordtony8276 4 года назад
because print doesn't required parentheses.
@dayisnow
@dayisnow 4 года назад
@@lordtony8276 Lol your comment gave me a solid laugh. Nice joke haha.
@tesloveley
@tesloveley 2 года назад
i want to see this kind of video on Windows
@TheL96
@TheL96 4 года назад
great! I will refer anybody that wants to learn python in 20 mins...lol
@fsacer
@fsacer 6 лет назад
it's quicker to just base64 -w 0 x
@dayisnow
@dayisnow 4 года назад
If they're both one-liners, then I don't see how this saves much time. Maybe 1-2 seconds? Cool hint regardless though, gonna try it out!
@JasonSmith-fu6oi
@JasonSmith-fu6oi 2 года назад
yeah good luck getting into a real server with knockd configured to the MAX with no other ports running on that box. you're NEVER going to guess the sequence plus it can be configured with two other settings that you overlooked because you want to demonstrate how you could break knockd: that is, a timeout of the sequence. good luck with that permutation loop. i can set my seq timeout to 1 second. if you dont knock within 1 second, you're done. that loop will take several minutes to complete only to disappoint you. and the second setting is basically TCPFlags that can be set. if you dont know this FLAG, you aint gettin a glimpse of my door!
Далее
GoogleCTF - Cross-Site Scripting "Pasteurize"
29:21
Просмотров 96 тыс.
Stray Kids "Chk Chk Boom" M/V
03:26
Просмотров 28 млн
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
Просмотров 142 тыс.
Hacking Windows TrustedInstaller (GOD MODE)
31:07
Просмотров 233 тыс.
TryHackMe! PickleRick - BYPASSING Denylists
17:23
Просмотров 293 тыс.
DNS Exfiltration with ChatGPT
22:16
Просмотров 4,1 тыс.
Leaking a Flag with Bash - TAMUCTF 2020
16:55
Просмотров 15 тыс.
Google CTF - BEGINNER Reverse Engineering w/ ANGR
39:47