Discord Malware - "i hacked MYSELF??"

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 มี.ค. 2021
  • To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?... (disclaimer, affiliate link)
    For more content, subscribe on Twitch! / johnhammond010
    If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    PayPal: paypal.me/johnhammond010
    E-mail: johnhammond010@gmail.com
    Discord: johnhammond.org/discord
    Twitter: / _johnhammond
    GitHub: github.com/JohnHammond

ความคิดเห็น • 492

  • @_JohnHammond
    @_JohnHammond  3 ปีที่แล้ว +377

    For the frenzy of folks that are concerned YoOuUUuU LLEeeEAAaKKEEDdA TOOKKkKEKEENNNNN!N!N!N!!nn1n1hhbjgngn:
    No. If you got clever and looked at individual frames, the one you see returns an Unauthorized. Others have been obscured.
    Thank you for your concern. :)

    • @crit7_
      @crit7_ 3 ปีที่แล้ว +12

      Very nice video

    • @DoorThief
      @DoorThief 3 ปีที่แล้ว +16

      I feel like I was called out on this, lol

    • @nikolanojic6861
      @nikolanojic6861 3 ปีที่แล้ว +3

      Dosent tokens change with time

    • @XenorioWasTaken
      @XenorioWasTaken 3 ปีที่แล้ว +16

      If you stitch together the frames where the working token is visible, you can make out about half of a token. Just to be sure, i would advise changing your password as that generates a new authentication token and invalidates the old one. You wouldn't even have had to blur any tokens if you did that before releasing the video.

    • @_JohnHammond
      @_JohnHammond  3 ปีที่แล้ว +44

      Yes, passwords were changed before releasing the video ;)

  • @jamesoneill2606
    @jamesoneill2606 3 ปีที่แล้ว +444

    Please don't stop explaining the simple stuff, I've learned loads thanks.

    • @Khusyasy
      @Khusyasy 3 ปีที่แล้ว +1

      same

    • @ajayk643
      @ajayk643 2 ปีที่แล้ว

      Then why did you see these kind of videos

    • @ajayk643
      @ajayk643 2 ปีที่แล้ว

      John Hammond thanks for this video😍😍

    • @trouty7947
      @trouty7947 2 ปีที่แล้ว +4

      It's good to remember every video, especially when they're popular, will have a lot of new people that this is literally their first in depth look at malware analysis. So it's always worth explaining for the new guys.

    • @oltn7142
      @oltn7142 2 ปีที่แล้ว +1

      same here

  • @flightstatic4662
    @flightstatic4662 3 ปีที่แล้ว +275

    I don't think I have ever heard anyone say "please send me malware" before

    • @ko-Daegu
      @ko-Daegu 3 ปีที่แล้ว +2

      it's all over Twitter if you follow at least one malware analyst

    • @recommendastra_hack_zoneon709
      @recommendastra_hack_zoneon709 3 ปีที่แล้ว +2

      A ban was placed on my Ticktok, PSN account which affected my score but all Thanks To #global_hackweiser1 i got all access to my banned accounts within some minutes which i summon the trust to work with him after i saw most of his good recommandations on You-Tube. You trully a Man of your word.💯

    • @recommendastra_hack_zoneon709
      @recommendastra_hack_zoneon709 3 ปีที่แล้ว +2

      A ban was placed on my Ticktok, PSN account which affected my score but all Thanks To #global_hackweiser1 i got all access to my banned accounts within some minutes which i summon the trust to work with him after i saw most of his good recommandations on You-Tube. You trully a Man of your word.💯

    • @tamilxctf4075
      @tamilxctf4075 3 ปีที่แล้ว +5

      @@recommendastra_hack_zoneon709 y spam.exe

    • @bitten2up
      @bitten2up 2 ปีที่แล้ว

      tbh I said that to someone who was infected with this malware so then I can report the links

  • @xFalduR
    @xFalduR 3 ปีที่แล้ว +99

    I'm only 5 minutes in, but i feel its relevant to say I appreciate the "easy baby stuff" being reiterated for people like me. I'm learning python for data science. I don't know what all of these imports do. So when you explain every import or at least give basic descriptions of what they do, it really helps me follow along.

    • @JonSnyderfudge
      @JonSnyderfudge 3 ปีที่แล้ว +4

      Lol yup. Never assume our knowledge base. Those that already know python can easily skip forward that part if they want.

    • @cedricvillani8502
      @cedricvillani8502 2 ปีที่แล้ว +1

      Ok well lol, if your actually learning python you KNOW what import does. Lmao think about the word for a moment…… hmmm do a little work looking up maybe? No? Just wait for someone to do it for you?

    • @xFalduR
      @xFalduR 2 ปีที่แล้ว +6

      @@cedricvillani8502 not only are you pretentious, you also can't read. That's astounding.

    • @issecret1
      @issecret1 2 ปีที่แล้ว +3

      @@cedricvillani8502 yes. Feel free to lose your mind over this fact

    • @shawazonfire
      @shawazonfire ปีที่แล้ว

      Well said, I think that's probably the reason I like this guy's videos. Clear, comprehensive step by step instructions and explanations.

  • @davidfrischknecht8261
    @davidfrischknecht8261 3 ปีที่แล้ว +123

    That ".il" file is actual CIL (Common Intermediate Language, formerly known as MSIL) code that C# and VB source code files are compiled down to before they're turned into executables.

    • @nimitzufo94
      @nimitzufo94 3 ปีที่แล้ว

      thanks man

    • @THEbraylonbarnes
      @THEbraylonbarnes 3 ปีที่แล้ว +1

      thanks david frisk neck

    • @yeppiidev
      @yeppiidev 2 ปีที่แล้ว

      @@THEbraylonbarnes lmaoo

    • @rogogo1244
      @rogogo1244 2 ปีที่แล้ว

      @@THEbraylonbarnes Its german: David Fresh-Knight

  • @highvisibilityraincoat
    @highvisibilityraincoat 3 ปีที่แล้ว +65

    This will blow up. So many script kiddies on DS

    • @_JohnHammond
      @_JohnHammond  3 ปีที่แล้ว +44

      I tried to make this as cl1ckb@!t as possible 😎

    • @JarredRandom
      @JarredRandom 3 ปีที่แล้ว +8

      @@_JohnHammond i think youve succeeded in making it that

    • @JimTheScientist
      @JimTheScientist 3 ปีที่แล้ว +4

      I see them every day. Lots of the exploits people use “generators” for (python scripts you can find on GitHub) are electron related. So many ways to download files to other people’s computers and to crash other people’s computers.

    • @JarredRandom
      @JarredRandom 3 ปีที่แล้ว +1

      @@JimTheScientist lol hey jim, fancy seeing you here!

    • @highvisibilityraincoat
      @highvisibilityraincoat 3 ปีที่แล้ว +5

      JimTheScientist electron is a shit piece of software and I wish permanent annoyance on its devs and applications that use it. should not crash because of a video codec issue

  • @matthewlandry1352
    @matthewlandry1352 3 ปีที่แล้ว +26

    Omg..can’t wait for this I started seeing a lot of discord trojans in the news last year and I would love to here more in depth analysis.

  • @MrTubeMeToo
    @MrTubeMeToo ปีที่แล้ว

    Thanks for making it 'approachable'. I am a beginner in all of this and your quick description of the basic commands is extrememely helpful. It allows me to continue to follow what you are doing and also learn about a wide variety of commands. Of course, further real study is necessary but your presentation helps one broaden understanding of the overall field to be studied. Thanks.

  • @nv_takeout
    @nv_takeout 2 ปีที่แล้ว +1

    Recently stumbled upon some of your malware analysis videos and boy am I hooked! love your approach, you make things super easy to understand even for someone with little to no coding knowledge. I hope soon I can find some videos on your channel about learning to program in some of these languages that you work in with malware :) some more gamer-catered stuff would be awesomeee too! thanks John for some very entertaining videos!

  • @Marten..
    @Marten.. 3 ปีที่แล้ว +2

    one of your most easy to understand videos yet. well explained. learned a lot. thank you John!

  • @MsThekiller02
    @MsThekiller02 2 ปีที่แล้ว

    Learning new stuff with you is always great. You always manage to draw my attention for a whole hour.

  • @unknownlordd
    @unknownlordd 2 ปีที่แล้ว

    Honestly I've not watched a full malware analysis vid from you but this one rly interesting and honestly very well written

  • @Kurowe.
    @Kurowe. 2 ปีที่แล้ว +2

    I hope more of you guys look into this Discord malware, a lot of this stuff is going undetected and creating a lot of headaches and some of these stealers have keyloggers, gets login sessions from your browsers etc.

  • @DoorThief
    @DoorThief 3 ปีที่แล้ว +1

    Love your content, John! It's really fun to step through code with you.

  • @kylelarson7840
    @kylelarson7840 3 ปีที่แล้ว

    Hey John a little off topic for this video, but your terminator vid, (among all the others!) really helped me pass the eJPT in less than 4 hours last week. Thanks for all great content man!

  • @Nitradoz
    @Nitradoz 3 ปีที่แล้ว +2

    200k! good job man you deserve it :)

  • @lethalboar6755
    @lethalboar6755 3 ปีที่แล้ว +5

    Great video John, would love to see you de-obfuscate that JavaScript!

  • @joeymelo2882
    @joeymelo2882 3 ปีที่แล้ว

    Great content! Thank you for your contribution and for taking the risk of exposing yourself. Very informative.

  • @andyburton5912
    @andyburton5912 3 ปีที่แล้ว +1

    Was doing exchange patching a week ago and they reference @john Hammond gist love it

  • @evinces
    @evinces 3 ปีที่แล้ว +1

    Omg, we need to see more of this hog stealer code and whatever else you can find in the land of Discord malware! Keep up the great work and congrats on 200k!

  • @jaygeemmo
    @jaygeemmo 3 ปีที่แล้ว

    ive learned allot from this and that says something because time enrolled in college for this and I feel like these breakdowns help immensely for someone like myself.

  • @Basieeee
    @Basieeee 3 ปีที่แล้ว

    I Love you John. Great video again, interpreted languages is cool to reverse. Congratz on the 200k :)

  • @djoser4977
    @djoser4977 2 ปีที่แล้ว +1

    THC For (4) L(ife)
    9-TetraHydroCannabinol (THC) is a chemical component in Weed and Hasj.
    Probably a smoker.
    nice vid btw, Learned a lot!

  • @alincraciunescu
    @alincraciunescu 3 ปีที่แล้ว

    You are the best! Thank you for explaining also for the beginners.

  • @keissetje
    @keissetje 3 ปีที่แล้ว +6

    Holy smokes, how can it be so easy to retrieve all your discord data without logging in essentially. I wouldn't have guessed that discord is saving these tokens as plaintext in your appdata folder. Very nice video! You've got another sub :)

    • @ayva1106
      @ayva1106 2 ปีที่แล้ว +1

      Late comment, but they're finally releasing a beta tests that encrypts your tokens... and it only took them a few years

    • @MakotoIchinose
      @MakotoIchinose ปีที่แล้ว +1

      @@ayva1106 And even then it's still compromised. People found out malware that circumvented it and managed to reverse engineer it for documentation.

  • @JimTheScientist
    @JimTheScientist 3 ปีที่แล้ว +26

    This is going to be interesting. I’ve studied RCE attacks and Trojans on discord, as well as some more tame malware. I can say that discord is really bad in the security area, but it’s not much to worry about as there are few people who know how to do the attacks and how they work.
    Edit: I’ve started watching the video, and I’ve seen almost this exact same script before while moderating a server

    • @Odsku
      @Odsku 3 ปีที่แล้ว +6

      More advanced scripts add malicious js to discord core modules it allows the malware to keep persistence while having a low detection rate

    • @DM-qm5sc
      @DM-qm5sc 3 ปีที่แล้ว

      That's ok, only a few people know how these attacks work

    • @Odsku
      @Odsku 3 ปีที่แล้ว +1

      @@DM-qm5sc only the RCE are private but the scripts are well public

    • @tlocto
      @tlocto 2 ปีที่แล้ว

      oh hey jim fancy seeing you here

    • @JimTheScientist
      @JimTheScientist 2 ปีที่แล้ว

      @@tlocto hello

  • @elthxr4692
    @elthxr4692 3 ปีที่แล้ว

    You're making it happen John ! :) BigUps . Learned lot from you my Guy !! Hopefully more to come. Peace

  • @superpowerforhire
    @superpowerforhire 3 ปีที่แล้ว +20

    This is much better, John. You’ve dissect each components and explained thoroughly. Rather than rushing always.

  • @jonoisedev
    @jonoisedev 3 ปีที่แล้ว

    I literaly saw this on my youtube feed and inmediately went to make popcorn!!

  • @jonny-mp3
    @jonny-mp3 3 ปีที่แล้ว

    Hey John, love the Malware stuff. Would love to see some Dynamic Analysis with some ransomware or something , cheers

  • @driden1987
    @driden1987 3 ปีที่แล้ว

    Awesome content as always, John 👏🏻

  • @omniflas_2065
    @omniflas_2065 ปีที่แล้ว

    I love these kind of videos, fun new channel to nerd out to. :) Joined the Discord as well! :p

  • @randallsalyer
    @randallsalyer 3 ปีที่แล้ว +1

    You always have great videos!

  • @shawazonfire
    @shawazonfire ปีที่แล้ว

    i'm not gonna lie to you bro, the way you teach is excellent and i appreciate your videos more than you could ever imagine... ever...

  • @jdbjdb2
    @jdbjdb2 3 ปีที่แล้ว +7

    The delay is to prevent maxing out discord API requests so it's maximum efficiency

  • @aravbudhiraja
    @aravbudhiraja 3 ปีที่แล้ว

    ayy congrats on 200k John!

  • @rahealmazumder6811
    @rahealmazumder6811 3 ปีที่แล้ว

    Great video John! Many thanks :-)

  • @rabbitear0
    @rabbitear0 3 ปีที่แล้ว

    Great Video, and learned a bunch!

  • @shivashiva8021
    @shivashiva8021 3 ปีที่แล้ว +10

    I am eagerly waiting .

  • @crazymonkeyVII
    @crazymonkeyVII 2 ปีที่แล้ว

    Absolutely fantastic content!

  • @apollogeist8513
    @apollogeist8513 3 ปีที่แล้ว

    Congrats on 200k!

  • @Kemankes111
    @Kemankes111 2 ปีที่แล้ว

    Awsome video man. I appreciate it a lot

  • @Enigmahax
    @Enigmahax 3 ปีที่แล้ว

    really good explication, please keep this up

  • @krlst.5977
    @krlst.5977 3 ปีที่แล้ว

    Great video, man. As always :)

  • @algalib2631
    @algalib2631 3 ปีที่แล้ว

    YOUR explanation is Osm!!!🖤🖤🖤

  • @charismaticmedia8585
    @charismaticmedia8585 3 ปีที่แล้ว

    Love your videos sir .Hope you have a great day.

  • @ajayk643
    @ajayk643 2 ปีที่แล้ว

    Thanks for this video sir

  • @cassandradawn780
    @cassandradawn780 3 ปีที่แล้ว +76

    by the end of the premiere you're gonna have 200k.

  • @aalekhmotani3877
    @aalekhmotani3877 ปีที่แล้ว

    you are genius, you are exceptional tutor, thank you, thank you so much, i got a project idea from this vid.

  • @hubsoftecommerce
    @hubsoftecommerce 3 ปีที่แล้ว +1

    cant wait for 200k so excited !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @TehIdiotOne
    @TehIdiotOne 3 ปีที่แล้ว

    By no means the most advanced malware i've seen, like it does rely on a lot of user error to work, but still nice breakdown

  • @Xn4W
    @Xn4W 3 ปีที่แล้ว

    Are you using Whonix for your malware analysis sandbox? I saw a glimpse of the Whonix desktop (little mouse and blue background) and recognized it, so I'm assuming your Virtualbox session is a Whonix VM?

  • @WeirdDuck781
    @WeirdDuck781 2 ปีที่แล้ว +1

    If you open the webhook URL you can identify the name of the webhook, the Guild ID and Channel ID. That information is kinda basic but might help when reporting to Discord

  • @sentinalprime8838
    @sentinalprime8838 3 ปีที่แล้ว

    amazing content john

  • @JonSnyderfudge
    @JonSnyderfudge 3 ปีที่แล้ว

    Looked like that first sketchy website at 33:50 was a peertube instance. It was probably a community dedicated for malware videos.

  • @tocraft573
    @tocraft573 3 ปีที่แล้ว +40

    Props to this guy managing to get a discord nuker/token logger to 1 hour

    • @aty4282
      @aty4282 3 ปีที่แล้ว +7

      @@recommendastra_hack_zoneon709 hope it gets banned again, tiktok does not deserve users

    • @IkeVoodoo
      @IkeVoodoo 3 ปีที่แล้ว

      @@aty4282 Its a bot, he is so shit and one of the worst people ngl (the person running the bot)

    • @aty4282
      @aty4282 3 ปีที่แล้ว

      @@IkeVoodoo goddamn, cant believe that i fell for the classic ones

  • @bryanvuyk
    @bryanvuyk 3 ปีที่แล้ว +1

    Seriously the best content creator out there. Love the videos. Keep them coming.

  • @vittthevecc1390
    @vittthevecc1390 3 ปีที่แล้ว

    This seems very intresting. Can't wait to see it

  • @TheHyperplayer
    @TheHyperplayer 3 ปีที่แล้ว +10

    I would advise you to use solid colored bars instead of pixelation since there is currently a promising tool in development that can reverse pixelation to some extend.

    • @eericjacobson
      @eericjacobson 2 ปีที่แล้ว +3

      hollywood isnt real bro

    • @LuciSheppy
      @LuciSheppy ปีที่แล้ว

      Reversing pixelation requires context and information, now I haven't actually seen the pixelated part in this video but unless the pixelated content is unambiguously readable as any character, an algorithm won't know either, I bet you'd be able to get an approximation of what it could look like but that may just be as unreadable as it already is, but less pixelated

    • @lonelyanthem
      @lonelyanthem ปีที่แล้ว

      @@eericjacobson neural networks exist, and they've been in use for years.

  • @ape4926
    @ape4926 3 ปีที่แล้ว

    This is going to be an amazing video!

  • @syrefaen
    @syrefaen 3 ปีที่แล้ว

    Oh its a fun series keep it up!

  • @nanvinor
    @nanvinor 3 ปีที่แล้ว +1

    Do you prefer Virtual Box over Hyper-V manager or other softwares? And if you have some spare time, I would love to know the reason behind your choice of Virtualization software! Kind regards.

  • @EddiePenta
    @EddiePenta 3 ปีที่แล้ว

    I believe it is grabbing also grabbing Chrome, Opera and Brave tokens. The file structure generated by get_tokens seem to also work for those other directories listed

  • @marckerkvliet2999
    @marckerkvliet2999 3 ปีที่แล้ว

    Great video!

  • @DoorThief
    @DoorThief 3 ปีที่แล้ว +3

    I definitely want to see your deobfuscuate that js code :D

  • @hk5716
    @hk5716 3 ปีที่แล้ว +1

    it could be the location for discord tokens in those browser since discord uses electron which uses chromium which chrome and a lot of other browsers also use, so it might be that cookies are stored there.

    • @KnightOfEvil
      @KnightOfEvil 3 ปีที่แล้ว

      The path has leveldb which is a nosql db where chromium stores it's cookies and local storage

  • @acticfl
    @acticfl 3 ปีที่แล้ว

    I was thinking if i should like this video - then you pointed out your TLOZ shirt. You win

  • @Car777777777
    @Car777777777 3 ปีที่แล้ว

    yes i am interested in more discord stuff
    and yes it is bad, but it's good to see and know what is actually out there

  • @dommbrown
    @dommbrown 2 ปีที่แล้ว

    Love ya work chap! Sub'd

  • @picardftw1313
    @picardftw1313 3 ปีที่แล้ว

    yikes. .. follow up on what more you learn about this for sure lol.
    dropped a like. already subbed.

  • @Deralica
    @Deralica 3 ปีที่แล้ว +1

    54:55 I was kind of expecting a "it's bad mmmkay?"

  • @NevRS32
    @NevRS32 2 ปีที่แล้ว

    51:50 Hammond enters the freaking Matrix... xD You know a content creator is entertaining when you don't understand shit, and still watches until the end, entertained!

  • @dtvdavid
    @dtvdavid ปีที่แล้ว

    Instant pressed like, as I saw the Triforce. :)

  • @KriTixXPlayer1
    @KriTixXPlayer1 ปีที่แล้ว

    Hey! Can u make a list of all the malware you have explored so far, making we all can send unique malware programs

  • @buleini
    @buleini 3 ปีที่แล้ว

    I don't mind you ending this one on sort of a cliffhanger. I thought to myself, I have Discord but I don't have a Python installation. I remembered I specifically installed Perl (yeah not Python) for Blender, and then I searched for Python on my machine. Python comes with a lot of programs ( I have ones for Blender, GIMP 2, Inkscape, LibreOffice, Visual Studio Community Edition ..... and in Windows Apps?? What The ?) This developer dad does not install a default extension handler without blinking at least once, but it seems the Python script is not as harmless if you accepted to automatically open .py files??

  • @DZ-lm4le
    @DZ-lm4le 3 ปีที่แล้ว

    you have a new sub
    keep it up.

  • @GenerationLex
    @GenerationLex 2 ปีที่แล้ว

    Hi there John, are you still accepting files to diagnose? I was hit earlier with an exe which took my discord offline and I assume let the other person log in via my token? I am now panicked as dozens of my friends also clicked on it, and it's caused chaos... If you do, how would I get it to you securely?

  • @SintaxErorr
    @SintaxErorr 3 ปีที่แล้ว

    you can get the user data as well from walking through the code when you send a message. it requests all that for all the other people on the server you are on

  • @swpq_
    @swpq_ 3 ปีที่แล้ว +4

    19:00 It's not stealing your passwords on the browsers, discord is literally just a browser and so is chrome/opera. So it is checking in the browsers for discord tokens;;

    • @swpq_
      @swpq_ 3 ปีที่แล้ว +2

      20:20 MFA might be safe, but the tokens it makes, really aren't. From my experience they don't re-generate new ones.

    • @uslph.
      @uslph. 3 ปีที่แล้ว +1

      @@swpq_ your token changes 100% when your password does and maybe when you change your username.

    • @swpq_
      @swpq_ 3 ปีที่แล้ว

      @@uslph. yeah buddy i know

  • @UmbraAtrox_
    @UmbraAtrox_ 3 ปีที่แล้ว +1

    question: if you going to "hack yourself" why not clear/backup the discord appdata folder and log in with a dummy account?

  • @funguslars
    @funguslars 3 ปีที่แล้ว +10

    I love how the token stealer disguises as a token stealer 🤣

  • @dedkeny
    @dedkeny 3 ปีที่แล้ว

    I thought it was clickbait, but DAMN!! legit content

  • @Carlosponceahora
    @Carlosponceahora 3 ปีที่แล้ว

    Ok John I stopped at second 0:36 as I have one question before I continue....What is the best Zelda game ?

  • @lucasedkins2095
    @lucasedkins2095 2 ปีที่แล้ว

    I liked at the Zelda shirt. Thanks!

  • @radomane
    @radomane 3 ปีที่แล้ว +2

    I'm pretty sure the password cache of Chrome etc. uses your Windows user creds to encrypt the passwords, so accessing them would at least require some user action.

    • @IkeVoodoo
      @IkeVoodoo 3 ปีที่แล้ว +1

      nope, Chrome uses window's CryptUnprotecData() if i remember correctly (i believe it is from windows.h file).

    • @radomane
      @radomane 3 ปีที่แล้ว +1

      Yeah nvm, as long as you are signed in you can call CryptUnprotecData, and dumping the passwords can easily be done in python, lol.

  • @buleini
    @buleini 3 ปีที่แล้ว +14

    Ok, seeing this premiere I think I can do two unfair bets right now. 1. Bet I'm subscribing here. 2. There's something malicious on my son's PC.

    • @IkeVoodoo
      @IkeVoodoo 3 ปีที่แล้ว

      Depends if he downloaded it...

  • @saucymoon7134
    @saucymoon7134 ปีที่แล้ว

    while trying to follow along in windows cmd (i have linux but not discord on it), it won't let me use findstr in windows cmd. how come you were able to do that but i can't? (total newb here)

  • @Haroon_abbasi
    @Haroon_abbasi 3 ปีที่แล้ว

    happy 200k

  • @cubernetes
    @cubernetes 3 ปีที่แล้ว +3

    25:09 leaked invalid ("unathorized") token

  • @LokiCDK
    @LokiCDK ปีที่แล้ว

    Oh wow! I'm impressed.
    Only importing that actually used functions, not the whole libraries.

  • @Jack-zr4kc
    @Jack-zr4kc 3 ปีที่แล้ว

    For the Browsers It takes The Tokens From Them, Because Some People Log into to them. Like you said :)

  • @buleini
    @buleini 3 ปีที่แล้ว

    YT buried my comment from 21 hours ago, but at 1:50- will it run? Yesterday I found I have two Python apps installed from the Windows apps store dating back to 2019. File handler was not enabled though

  • @falcongamingdev8810
    @falcongamingdev8810 3 ปีที่แล้ว +1

    that sever crasher is probably allowing the person to join servers and spam the server with that users token

  • @ayva1106
    @ayva1106 2 ปีที่แล้ว +1

    25:51 uid and avatar are both public values so there's no need to censor them

  • @dieSpinnt
    @dieSpinnt 3 ปีที่แล้ว

    Sometimes you make me really nervous, John.
    No, not the tokens, the clumsiness in the shell:P
    echo %LOCALAPPDATA% ... or cd %APPDATA% jFYI
    But never mind, thanks for the video :)

  • @Vicente75480
    @Vicente75480 3 ปีที่แล้ว

    John! Do the thing!

  • @ryaniw33
    @ryaniw33 3 ปีที่แล้ว

    Hey John any plans for releasing a pentesting/ethical hacking course on Udemy? Keep up the great work.

  • @Gobillion160
    @Gobillion160 3 ปีที่แล้ว

    you can make an undetectable version in nodejs or by running a script directly in ur browser in js

  • @GodBurstPk
    @GodBurstPk 2 ปีที่แล้ว

    Very nice video, wants me to create on myself (for knowledge purposes ofc, mayby will sent you a link once i do ':) )

  • @funil6871
    @funil6871 ปีที่แล้ว

    thank you