Good looking out! I was struggling through these DLL’s in Powershell now I don’t have to!👏
@fabiancostamoling
3 жыл бұрын
thank you, as always Great You Are !!! even if subscribed and "patreonized" , i usually check if you uploaded something
@kenny-kvibe
3 жыл бұрын
message: you're not santa; John: "how did they know?" haha made me laugh, love your videos - very enlightening!
@thatquietkid8610
3 жыл бұрын
Unlike Jon ( from Game of thrones) . This John knows everything 😂.
@Luftimore
3 жыл бұрын
When you miss a John Hammond stream by 8 minutes... feels bad man ^^
@th3g3ntl3man6
3 жыл бұрын
Thank you Johhhhhnn!
@phaberest_
3 жыл бұрын
Reversing reminds me of the times when (not me, not me) games CD checks where nulled to run games without CD inserted
@raunvk
3 жыл бұрын
Happy Teacher's Day (5th Sept) John ! Love from India
@CyberWorldSec
3 жыл бұрын
JOHN is amaaaaaziiiiiiiingggggggggggggggggggggg
@aaronwhite1786
3 жыл бұрын
I look forward to watching through and hopefully seeing that the actual solution wasn't what I did which was "click through and then suddenly go "Wait...this says password in it" and then click on the module (?) and see that it has the password I need to get Santa's sweet, sweet key. These last 2 challenges have definitely made me feel like an idiot it terms of what I don't know, but it's sure as hell interesting. I look forward to a day years down the road when I'm not hitting email responses to applications with "Well, I don't have any cybersecurity experience, but I've been doing IT for 8 years" and looking at decompiled code and thinking "how did those magical nerds make this into a thing?".
@carlkobin7279
3 жыл бұрын
Thank You again
@BlogTernet
3 жыл бұрын
Amazing job once again! Thank you John.
@KaLata123456
3 жыл бұрын
Fairly new to your channel , but falling in love with it. Started watching your Pickle Develepment room video and love it. Should we tackle application reverse engineering and assembly language for OSCP? Thanks
@_JohnHammond
3 жыл бұрын
Thanks so much! Reverse engineering and assembly knowledge won't be too necessary for OSCP, other than a slight understanding for the buffer overflow. But honestly, the buffer overflow is a "classic" attack that does have a straightforward process, so you won't need much more outside if that. Thanks so much for watching!
@nashonightmare
3 жыл бұрын
Missed the live.
@hussienfaour2066
3 жыл бұрын
Great Job Man!!
@shramandas2721
3 жыл бұрын
I will make a program that calculates how many times John says "I'll slap that in..."
@nayjer2576
3 жыл бұрын
I cant connect to the machine with rammina, i set everything up like showed
@nayjer2576
3 жыл бұрын
it asks me everytime again for the password
@nayjer2576
3 жыл бұрын
okay i got it, it was without "!", even here it is with !... hm
@ninjasploit
3 жыл бұрын
should try out dnspy
@lahcenedaif7953
3 жыл бұрын
C++ or c#?
@矢作浩一-s2b
3 жыл бұрын
Absolutely, this is not for beginners....
@moseskariuki9438
3 жыл бұрын
I,m I the only one having issues connecting to remmina it says connection lost
@lawrenceShellawk
3 жыл бұрын
Had the same problem. Click on the plus button at the top of remmina to add a new profile and under color depth set it to RemoteFX (32bpp)
@nayjer2576
3 жыл бұрын
@@lawrenceShellawk doesnt work for me :(
@grawr3534
3 жыл бұрын
xfreerdp /u:cmnatic /p:AdventofCyber! /w:1400 /h:800 /v:10[.]10.238.70 RDP application for Kali.
@logiciananimal
3 жыл бұрын
Using unsafe and bitfiddling to "store" a password, yeesh.
Пікірлер: 34