Тёмный

TARGETED Phishing - Fake Outlook Password Harvester 

John Hammond
Подписаться 1,9 млн
Просмотров 258 тыс.
50% 1

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/g... (disclaimer, affiliate link)
For more content, subscribe on Twitch! / johnhammond010
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
PayPal: paypal.me/john...
E-mail: johnhammond010@gmail.com
Discord: johnhammond.or...
Twitter: / _johnhammond
GitHub: github.com/Joh...

Опубликовано:

 

26 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 473   
@stef9019
@stef9019 3 года назад
Great video 0:00 intro 4:30 file inspection 6:00 code inspection 17:35 looking at the phishing attempt 19:27 curling 23:15 checking out domain info 32:35 reporting the scam 45:35 golly gee, an outro
@sodiboo
@sodiboo 3 года назад
Dear John, How come you hearted this comment, but didn't put it in the description? Timestamps are useful, and when the original creator doesn't add any, some commenters are nice enough to do it anyways, such as Stef. You hearted it. Why don't you put it in the description? I've seen some people that don't make timestamps still add viewer-provided ones with a note like "thanks to Stef for providing timestamps". Why don't you do it? Chapters are nice. pls Sincerely, ME
@potatoonastick2239
@potatoonastick2239 3 года назад
@@sodiboo THIS
@IgnoreMyChan
@IgnoreMyChan 3 года назад
@@sodiboo I think for the same reason he's still blowing and popping into his mike; He doesn't care.
@_CryptoCat
@_CryptoCat 3 года назад
@@sodiboo no chapters mean you need to watch it all 😆
@MakN.
@MakN. 3 года назад
Increased watch time
@abc.2924
@abc.2924 3 года назад
You already know John went and snooped around with that RDP right after this video lmao
@dylanrobledo7234
@dylanrobledo7234 3 года назад
just enjoy
@TheChriscrowder
@TheChriscrowder 3 года назад
I RDP'ed to it and got a login prompt. Didn't try to sign in.
@greengenix8804
@greengenix8804 3 года назад
@@TheChriscrowder time to crack the pass
@DasUberAdmin
@DasUberAdmin 3 года назад
@@TheChriscrowder If you save the connection as an .rdp file and add enablecredsspsupport:i:0 to the bottom of the file using your favorite text editor, save it and then open it you can take a look at the accounts on the machine without trying to sign in
@kylefaust7743
@kylefaust7743 3 года назад
Episode 2 anyone? John goes hammond on this server and we get a hack the box outside hackthebox. I even got the name of your next episode! It's Hammond time! php.wnd
@HeadsetGuy
@HeadsetGuy 3 года назад
Wait... The Registrant City is listed as Los Angeles, but the Registrant State is listed as NY.
@zoes17
@zoes17 3 года назад
Better yet, the zip is for LA, Cali but the phone goes to a different city in Cali. Then there's the fact the street address is likely fake too given it's numbers and first two letters repeat which makes it look like a 1234 address...
@josephferren6372
@josephferren6372 3 года назад
What's interesting too is that the registered address belongs to a medical laboratory
@joeymelo2882
@joeymelo2882 3 года назад
I enjoy how your videos are always uncut (aside from the long pauses). This gives us a legitimate feel of your work and inspires us to follow these steps. As usual, thanks for the content.
@callmemc6
@callmemc6 3 года назад
Found this channel through youtube recommendation and by far one of the best recommendations I've gotten to date. I recently got into IT work and I'm looking to branch into cybersecurity as I make my way back to college. These videos have really shown me how cool and fun this stuff can be to analyze. Can't wait to start learning more about this field.
@acidopcodes
@acidopcodes 3 года назад
Best Of luck buddy 👍
@lalithkumar1029
@lalithkumar1029 3 года назад
I saw this type of comments pretty much in so many videos
@thax0r172
@thax0r172 3 года назад
Don't need college for i.t. biggest lesson I learned.
@Monsizr
@Monsizr 3 года назад
This dude talks way too much. Cant watch
@acidopcodes
@acidopcodes 3 года назад
@@Monsizr then why are you here
@JTwisted
@JTwisted 3 года назад
I love how he just showed us how to spam these guys using bash, but then said “But we don’t do it”
@kylefaust7743
@kylefaust7743 3 года назад
The absolute shock in your face when you ran into that RDP info was priceless. I know sometimes you do alot of the legwork off cam and then kinda roll through the thought process and show us a live step by step for the videos. That's what I think you were doing until that RDP moment and the sudden conflict your face showed when you seemed to think "can I/should I chase this down right now?" Truly an awesome video man.
@velomeister
@velomeister 3 года назад
Amazing video! It's a pretty simple but pretty well-done hashing attack. What I really loved was your call to action on reporting this kind of stuff.
@michellerose3796
@michellerose3796 3 года назад
Great video, John, it was super cool to see something I deal with at work every day featured on your channel. You clearly went above and beyond with your explanations, breaking it down into all the small components to make it really easy to understand every step of the way. Thanks so much for this one in particular! 🤓
@dedkeny
@dedkeny 3 года назад
I've been hoarding phishing links for months... I think it's time to pay it forward to those guys, thanks for the inspiration 🙏
@deancrypto5939
@deancrypto5939 3 года назад
in most cases they only last a few days at most before they are either taken down or flagged by GSB and the threat actors then ditch them
@duckqlz777
@duckqlz777 2 года назад
He doesn't "advocate" hacking forward then shows the code ( 28:45 ) for an infinite while loop to spam "F-You" to the server for anyone to copy. Smooth 😎
@roadmonitoroz
@roadmonitoroz 2 года назад
Wouldn't doing just a while loop attract too much attention if its banging away as fast as it can ? It's like if you are attacking a system the IDS will notice weird things like this . Maybe put some random timeouts (10 - 20 seconds apart) would be a better idea. Apart from that, you'd want to randomize the data so they don't all say F-you as the password or have the same username / email etc.
@duckqlz777
@duckqlz777 2 года назад
@@roadmonitoroz =_=
@johnathon3067
@johnathon3067 3 года назад
The 1 dislike on this video is the guy that sent the phishing email XD
@v01d_r34l1ty
@v01d_r34l1ty 2 года назад
"You could start the Holy Wars with ViM and Emacs" Favorite John quote ever
@PtolemyPetrie
@PtolemyPetrie 2 дня назад
That was a fun one. I uncovered this exact one a couple years ago. Pretty clever, if you're not paying close attention I can see this one catching unsuspecting folks.
@FalcoGer
@FalcoGer 2 года назад
My guess is that they try the credentials automatically in the background, that's why it took 20 seconds draw a box in gimp: 1. use box select 2. select region 3. right click 4. edit > stroke selection 5. ??? 6. profit
@timberlock
@timberlock 3 года назад
Best defense is a great offense! My Python bot is thirsty for these phising attacks!
@ankitminz5872
@ankitminz5872 3 года назад
Imagine phishing scam getting spammed lol
@timberlock
@timberlock 2 года назад
@@gites8740 Go ahead.
@roadmonitoroz
@roadmonitoroz 2 года назад
@@ankitminz5872 Happens more often than you think :D
@tommeleyn
@tommeleyn 2 года назад
You forgot to report them where they host their vm. Only one disadvantage is that they don’t give the owners information of the vm if you can show that they attack you. But at least they bring it down.
@kr4k3nn
@kr4k3nn 3 года назад
Totally awesome... Really enjoyed it. Thank you very much for showcasing it.
@TheH2OWeb
@TheH2OWeb 3 года назад
During the video I was hoping that you showed us how and where to report... and 10 sec later, you just started showing it. Great work and great video as always ! Thanks John !
@adildada6939
@adildada6939 3 года назад
This felt like a 5minute vid. It s fun watching and learning from you so thanks 🙏🏼
@louislove795
@louislove795 3 года назад
This might be the best RU-vid channel I've come across
@Tbman00
@Tbman00 3 года назад
Very 2000's kinda phishing attack. Funny to see it again in the open. since most of the servers don't allow these types of pages/scripts, it died soon after few years, but it spawned huge amount of email addresses back in the day! And, in the present, after soooo many years, surprisingly none of those AVs caught that. Lol.
@alice20001
@alice20001 2 года назад
It's for stuff like this that I LOVE this channel! Incredible work!
@jakeevans6935
@jakeevans6935 3 года назад
i loved that you included the documentation and reporting part!
@Bobtb
@Bobtb 3 года назад
Hey John, just a heads-up. First of all, awesome video, again! Thanks for sharing this. Secondly, You may want to mask the VT file hash as well. Someone silly enough, like me, for example, might type it over and see more than you wanted to share ;) Edit: I see that you masked it out later in the video, but you missed something.
@Ylmorko
@Ylmorko 3 года назад
Yup I was just about to write this when i found your comment, once it is on VT it is public :) and can be harvested
@dq303
@dq303 3 года назад
Ouu please explain
@tarunkumar6727
@tarunkumar6727 2 года назад
That was holy fucking awesome informational video... definitely deserves comment, share , like and subscribe and what not.... the way you broke down each part and explained ... gold man!!! thanks a ton!!
@_CryptoCat
@_CryptoCat 3 года назад
this was awesome! i like how you showed how to report as well, hope to see more real world examples like this 😊
@pewpew215
@pewpew215 3 года назад
Very creative phishing attack. great video man!!
@redjhone8209
@redjhone8209 Год назад
I can't believe this content is free. Thanks a lot man, your the best
@1nspir3dx
@1nspir3dx 2 года назад
Watched two of your videos and definitely subscribing. Keep making great content : )
@CarRamrod-uf2ub
@CarRamrod-uf2ub 3 года назад
Thank you John. This video legitimately helped me do my job better!
@m7mdarwani964
@m7mdarwani964 3 года назад
OMG, time flies when you are having fun! Didn't feel that this was a 47 min video.
@TriSept
@TriSept 3 года назад
Thanks for going over this email, I have to deal with stuff like this all too often and thank you for showing people on how to report this stuff.
@martinkirilov999
@martinkirilov999 3 года назад
As someone working in infosec, I take down a few of those each day, they are almost all the same as the one displayed by John.
@michellerose3796
@michellerose3796 3 года назад
Yep, I see a bunch of these. The clever bit really is the redirect to a legit website after posting the credentials.
@dominicdoretto2775
@dominicdoretto2775 2 года назад
"...nor would I want to do that on RU-vid."
@fredb5626
@fredb5626 3 года назад
Honestly, i REALLY enjoyed that one
@mushenji
@mushenji 3 года назад
This was trivial but also extremely awesome
@buhaytza2005
@buhaytza2005 3 года назад
Really good stuff and great use of OSINT. However, the registrar could be a victim of the phishing scam and just had their server hijacked. I know the probability of this is low as the server was setup to return fake 404 on the files present and didn’t have anything else but if this is a major operation they might be swapping servers at a certain interval 🤷‍♂️ Great advice too: MFA rullz and the IT department is there for a reason!
@zoes17
@zoes17 3 года назад
The zip code is for LA, Cali but the phone goes to a different city in Cali. Then there's the fact the street address is likely fake too given it's numbers and first two letters repeat which makes it look like a 1234 address... Given that with the 404's being fake'd I'm guessing the WHOIS is spoofed or otherwise fake too, but, innocent people could be used as a front here too just to further shroud this in layers of shade.
@blackandwhitegamingproduct7356
@@zoes17the state says New York, there’s no Los Angeles New York first of all
@Ookami8raven
@Ookami8raven 3 года назад
thanks! John. Thanks to this video, I was able to stop the malware, when an employee got a similar phishing email. Keep up the great work!
@tomstechnews
@tomstechnews Год назад
Thanks John! Great explanation how a phishing attack works under the hood! Hope Namecheap take the necessary steps to shut down this domain and the related server and services! To catch and arrest the real "bad guys" is the bigger task in the story and depends on official entities and the will to pursue them. Waiting for you next vid .. 👍
@ZeBadger
@ZeBadger 3 года назад
The probable reason that the virus scanners aren't detecting it is because the organisation name is embedded in the payload... and will be different for every target.
@logiciananimal
@logiciananimal 3 года назад
Possible, but some of the scanners now use regexes or other partial matches from what I understand.
@JF743
@JF743 2 года назад
I've seen a few similar emails in my organisation in the last few months where they even replicated the look of the specific organisation's login page (the image background matches the custom one set by the organisation rather than the basic regular one). Thankfully our users have been shown to signal us suspicious emails.
@itiswtitis
@itiswtitis 3 года назад
Real followers gonna skip the updated videos and see the 3 - 5 years old videos from john
@jhbonarius
@jhbonarius 3 года назад
reporting stuff takes more time than reverse engineering it!!
@stephenv167
@stephenv167 2 года назад
The target would be outlook's login, it's literally targeting the Microsoft office login, since that's where it /redirects/ to.
@ianmcpherson2301
@ianmcpherson2301 3 года назад
The irony is not lost me. Using a Microsoft service to harvest Microsoft user data. That is "flipping the bird" to Microsoft big time.
@sharmarahul384
@sharmarahul384 Год назад
I don't regret spending my 47 minutes on this!!
@bryc42013
@bryc42013 3 года назад
Wow great content! Very informative! I would love to see more videos like this!
@LocSec
@LocSec 3 года назад
Honestly, I really dig this video. Really puts into perspective the defensive and investigative side of things.
@powerporridge1337
@powerporridge1337 3 года назад
great video John, you are a cybersec inspiration!
@CoolFire666
@CoolFire666 3 года назад
A few small notes; There's a very good chance the credential harvesting page is on a legitimate website that was compromised by the attacker. I don't know that this is what happened here, but just be aware of that before going after the domain owner quite so hard. Second, it is generally far more useful to make the abuse report to the hosting provider that is hosting the malicious content, rather than the domain name registrar. Reporting to both is also fine of course, and frequently the two are the same entity but not in this case. Lastly, this sort of thing is pretty common. Any reasonably sized organization will see these sort of phishing campaigns regularly.
@donnie1581
@donnie1581 2 года назад
This is all fascinating to me and makes me wish i had stuck with it back in the day. I haven't even used Linux in years.
@pqudah
@pqudah 3 года назад
Don't forget to add this to the malware analysis playlist
@znxster
@znxster 3 года назад
2FA is needed indeed. But it should be noted, if you use a OTP style password fill, that too can be phished. Highly recommend using MS Authenticator (or others) which prompt on your phone, rather than prompting for a OTP.
@logiciananimal
@logiciananimal 3 года назад
Hi - good stuff. I would have been tempted to put *Microsoft* as one target - it is them that is being impersonated. I look forward to hearing whether or not your reporting was successful to any degree.
@damianwallace8761
@damianwallace8761 3 года назад
This was awesome! Please do some more of these, Great video
@froido123456
@froido123456 2 года назад
Liked the video. The whois lookup shows City of Los Angeles state New York. Surprised you missed that. Also Google maps shows that’s a Bank of America about a block from my house
@franzbertros4858
@franzbertros4858 2 года назад
I really love your videos, just the detail paired with great Explantation :-) Keep going!!!
@cc12yt
@cc12yt 2 года назад
This video is INSANE! I love this very much
@kingkong1040
@kingkong1040 Год назад
Los Angeles, New York with a CA zip code nice lol
@masons3389
@masons3389 2 года назад
Great video. I've seen this phishing attempt. Cool to see the deep dive.
@nicklatcham
@nicklatcham 2 года назад
26:40 Engineer Man has entered the chat...
@atsa1
@atsa1 11 месяцев назад
This video makes me glad that i never ever open links from emails. And second - i never ever remember my password first try and i always use 2 factor
@anonymos7994
@anonymos7994 3 года назад
Awsome work you did there john, But i cant remember the last time i opened outlook 😂😂✌
@The-Dev-Ninja
@The-Dev-Ninja 3 года назад
i see 30 minutes of video, because is the best video i ever seen
@blackandwhitegamingproduct7356
I know nothing about CyberSec, but I know Los Angeles New York isn’t a thing…I would have IMMEDIATELY called that out (which I did while watching). That shit is shady as fuck
@maxmerwijk187
@maxmerwijk187 Год назад
With target they meant who the phishing attack was trying to impersonate john
@cheeseisgud7311
@cheeseisgud7311 2 года назад
I got this recently, and I had alot of fun messing around with it and changing the post request address I also reported the domain
@theroxenes
@theroxenes Год назад
I've seen phishing attempts in this style quite a few times. Some of them even do some sort of automated login + 2FA harvesting. Also, the webmaster contact location of Los Angeles, New York definitely sounds like fake info, somehow.
@GerardoBelot
@GerardoBelot 3 года назад
Dammmm, I can't be alive, hopefully next time, your content is amassing!!!
@ShinigamiAnger
@ShinigamiAnger 3 года назад
I hope you can resurrect. Btw this is not live but première. Also his content is not just amassed, but also amazing, just like your english. (just joking on your typos, have a nice day)
@GerardoBelot
@GerardoBelot 3 года назад
Sorry, I was running out of time XD!!
@lumpanimalyt971
@lumpanimalyt971 3 года назад
Damn man you gave me a heart attack because last night I got an email from MS and changed my password on their site through my own doing and not a link
@PacoPatron
@PacoPatron 3 года назад
Awesome stuff John, always enjoy your videos
@joshuampere4327
@joshuampere4327 2 года назад
I deal with these files every frickin day lol love it
@jacobebrock
@jacobebrock 3 года назад
Thanks for the content John. Always love these videos.
@EmilNaydenov
@EmilNaydenov 2 года назад
Well done John!
@ventjemazzel8822
@ventjemazzel8822 2 года назад
Nice work John!
@anonymoushacker1690
@anonymoushacker1690 3 года назад
is that you ? ...... john Hammond ? ...... from the 2013 movie " Jurassic Park " ? ........ nice ...... so you are a pets ( dinosaurs ) lover and infosec pro ....... that's what l call " THE REAL SUCCESSFUL GUY " ....... btw ........ thnx for the great efforts ...... keep it up!
@Stealthycybertaco
@Stealthycybertaco 3 года назад
I've seen hurley auctions for a long time now. Awesome video
@desmene
@desmene 2 года назад
i really love these password harvesting sites cuz jokes on you I never get my password right on the first try
@maxencedc
@maxencedc 3 года назад
VSauce be like It's returning a 404... Or is it ?
@OrangeYTT
@OrangeYTT 3 года назад
JSauce
@BorisMediaProds
@BorisMediaProds 2 года назад
maybe it took 20 seconds due to Azure cold boot? Cloud Functions typically scale down when there's no traffic.
@hatit8074
@hatit8074 3 года назад
I am always jealous of u broo.. 😂😂 I have been struggling a lot to become like u. I hope I'll meet u someday. Thank u so much for constant motivation and inspiration. 💖
@YawadoudouAllahou
@YawadoudouAllahou 2 года назад
Eog command was a good thing for me. Thanks
@p_1320_
@p_1320_ 3 года назад
For anyone who is wondering, this is very similar to something I would do any given day of the week as a cybersecurity analyst at a large organization. Another great video John!
@notchimorin
@notchimorin 3 года назад
sooo happy to see a new vid from you after school :)
@sodiboo
@sodiboo 3 года назад
31:50 To be fair, this is undetectable. How is antimalware supposed to know that a 404 status code is actually a malicious endpoint?
@vinzzbe
@vinzzbe 2 года назад
When someone like John reports the endpoint as malicious
@SV_Sangha
@SV_Sangha 2 года назад
Love it John!
@monKeman495
@monKeman495 3 года назад
i can watch john sec 101 all day . thank you for engulfing us your knowledge .
@infotechyeti
@infotechyeti 2 года назад
amazing video...great presentation! appreciate the content and time you took to post this.
@northwesternbear
@northwesternbear 2 года назад
I would just like to point out the registered address is for Los Angles, New York. A non-existent city, verifying that the details are bogus.
@esosaueso
@esosaueso 3 года назад
Could be less than targeted, though. They could run a script on their own malicious script where they replace the identity with a different email from a db for that specific org. Am I going wrong about this?
@EscurKo
@EscurKo 2 года назад
They might be harvesting LinkedIn or Hunter data
@treadmillrepair754
@treadmillrepair754 3 года назад
Is nice to see electronics videos for Jürgen Klopp.
@b391i
@b391i 3 года назад
John On YT: Breaking Into Someone Else's Device Is Illegal 😇 John At Night: Let's Play In Mother F@@@er 😈
@-Giuseppe
@-Giuseppe 3 года назад
Hi John, what kind of programming languages do you recommend to learn in 2021/2022 to be successful in malware analysis?
@RossWillett83
@RossWillett83 2 года назад
Me googling "Where is Los Angeles, NY"
@mastereu5019
@mastereu5019 3 года назад
...nice work, smart than me...
@bradley6727
@bradley6727 3 года назад
Great break down and explanation as always.
@checknate8820
@checknate8820 3 года назад
The city and state don't match on the domain. Los Angeles isn't in NY. Prob completely fake creds leading to a burner account.
@ChristopherBruns-o7o
@ChristopherBruns-o7o Месяц назад
31:00 Should have used that email for the curl.
@AyeAJ
@AyeAJ Год назад
Amazing job
Далее
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
1:42:04
Cryptocoin Miner - Unpeeling Lemon Duck Malware
1:01:02
Finding WEIRD Devices on the Public Internet
27:48
Просмотров 288 тыс.
Network Security - Deep Dive Replay
3:08:19
Просмотров 158 тыс.
Unraveling the IcedID Malware Stager & Phishing Email
33:34
The Home Server I've Been Wanting
18:14
Просмотров 55 тыс.
How the Best Hackers Learn Their Craft
42:46
Просмотров 2,6 млн
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
1:28:19
Uncovering NETWIRE Malware - Discovery & Deobfuscation
59:46
Self-Extracting Executables for Hackers
41:06
Просмотров 78 тыс.