John Hammond

Hacker. Friends. Cybersecurity Researcher.

2025-05-19

Golang extravaganza in an exploratory video where we make example "malware" with hidden "secrets" and dig into it with different tools-- between Binja, IDA, GHIDRA, then Redress, GoReSym & finally obfuscate with garble. Then GoStringUngarbler and more! 🤪 youtu.be/gewnAzaZXQo

2025-05-19

Big thanks to @KeeperSecurity for sponsoring this video and their continued support of the channel! Keeper PAM offers a solution for enterprise grade protection all in one unified platform -- keep your users, data, and environment secure with Keeper! jh.live/keeper-pam

2025-05-15

I had a conversation with Pete Allor, a CVE Board member and Co-Chair of the CVE Vulnerability Conference and Events Working Group -- now helping put together The CVE Foundation (learn more at thecvefoundation[.]org) following the recent CVE conundrum: youtu.be/Ofy0LxkwkT8

2025-05-13

HELLO NAHAMCON 2025 CTF IS MAY 23 TO MAY 25
BEN ASKED ME TO HELP PROMOTE AND I FORRGOOTTT
PLEASE REGISTER AND PLAY OUR GAME
ctf.nahamcon.com
I WILL CONTINUE TO SPAM UNTIL SHOWTIME AND DURING EVENT SORRY BUT IT WILL BE FUN I PINKY PROMISE

2025-05-12

Reading up on "Gremlin Stealer," allegedly a new infostealer malware variant described by Unit 42 -- and snooping around ye ol' cheesy dark web to see what cybercrime kiddos are talking about it 🥴 youtu.be/t7vBdvfBG-Q

Big thanks to @FlareSystems for sponsoring this video and their continued support of the channel! Track data on the dark web and manage threat intelligence for your exposed attack surface with Flare -- try a free trial and see what info is out there: jh.live/flare

2025-05-09

Password palooza in a scrappy showcase of DPAPI fundamentals! With a simple PowerShell demo to start and then some Mimikatz fun to dump my own Brave browser passwords -- love to SharpDPAPI, dploot, and other tools MITRE ATT&CK says the baddies are using 👀 youtu.be/Wf520OJDzfs

2025-05-09

Big BIG thanks to @specopssoftware for sponsoring this video and their continued support of the channel! Protect your organization with stronger passwords, and continuously scan and block over FOUR BILLION breached passwords with SpecOps Software! jh.live/specops

2025-05-07

Reading recap of the phish that got Troy Hunt, the owner of the "Have I Been Pwned?" database and service -- and a focus on how anyone can be compromised, cybersecurity folks are no exception -- myself included: youtu.be/pJ1UQsW0EqQ

Big thanks to @PowerDMARC for sponsoring this video! Stop email spoofing and phishing threats, improve email deliverability, and protect your domain reputation with PowerDMARC! Get started with a 15-day free trial: jh.live/powerdmarc

2025-05-06

hey check out my new DUMB ‼️ video where I write STUPID 👏 PowerShell code to block BAD 🤬 living off the land binaries outbound NETWORK 🌐 connections with the LOCAL 😤 Windows Firewall and make MANY 👿 mistakes because i am DUMB 🔥🚀 ETCETERA ETCETERA 🫡 youtu.be/x7L-F4yDXvI

Big thanks to @DropzoneAI for sponsoring this video! Try COACH from Dropzone AI and get a free AI-powered security alert mentor for SOC analysts! jh.live/dropzone-ai-coach

2025-04-15

I got a chance to try out @Burp_Suite Burp AI, and it's... honestly really cool 😅 Video showcase where we cruise through a web app scan, crawl and audit, and it rips through findings including an explicit UNION SQL injection vulnerability and more 🤩 youtu.be/v-McepNOrTQ

2025-04-15

Needless to say, big thanks to our channel partner @PortSwigger for sponsoring this video! Hunt for bugs and perform web app pentests with Burp AI -- an AI assistant not meant to replace human effort, but augment your workflow 😎 jh.live/burpai

2025-04-08

Big big thanks to @PlexTrac for sponsoring this video and their continued support of the channel! Save time and effort on pentest reports with PlexTrac's premiere reporting & collaborative platform: jh.live/plextrac-408 😎

2025-04-08

I Backdoored Cursor AI 😎 youtu.be/FYok3diZY78 Finally getting a chance to play with Loki C2, the super cool Node JS C2 framework for backdooring Electron applications (think Discord, Slack, too!) -- put together by the incredible @0xBoku 🔥We even got to nerd out over DMs to add a new feature, keeping the target app alive and adding persistence! 🤩

2025-03-26

An MP3 file as malware!?! Actually an HTA polyglot -- with some clever error handling tricks, slick PowerShell sub sessions, and an annoyingly obfuscated C# .NET assembly across like seven stages of payloads. The song has a good beat, too! youtu.be/25NvCdFSkA4

2025-03-26

PS, big thanks to @TrustVanta for sponsoring this video! Automate and prove your security compliance with Vanta! Get $1,000 off with my link to cruise through compliance across SOC 2, ISO 27001, ISO 42001, NIST AI RMF, HIPAA, GDPR, and more! jh.live/vanta

2025-03-24

The 9.1 CVSS CVE-2025-29927 authentication bypass vulnerability in Next.js middleware -- covered in a rambling video and teeny tiny demo showcase,
✨ V I B E C O D I N G✨ a vulnerable proof-of-concept app. youtu.be/dL1a0KcAW3Y

Big props to @zhero___ and @inzo____ for their research and writeup! Of course all credit where credit is due, their blog post on it: zhero-web-sec.github.io/resear

2025-03-18

And all credit where credit is due, kudos to @cxnturi0n for building and publishing the convoC2 tool!

2025-03-18

MS Teams as a C2! Command and control with "convoC2," a sweet utility that smuggles in commands to run within hidden HTML span tags in Teams messages and a client agent that parses and executes them from the Teams message logs 😱 Video showcase: youtu.be/FqZIm6vP7XM

2025-03-18

Big thanks to @PlexTrac for sponsoring this video and their continued support of the channel! Save time and effort on pentest reports with PlexTrac's premiere reporting & collaborative platform: jh.live/plextrac-318 😎

2025-03-17

I took the TryHackMe Security Analyst Level 1 certification exam! Video is literally me going through it and discussing it fresh at each break 😅 Honestly very cool training, the SOC Simulator makes it really real-world & practical -- review and showcase: youtu.be/AIPbFFJgD4o

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst