Hands-on Ransomware: Exploring Cybercrime

54,553
0
Published 2023-06-05
Check out what Ryan is up to: twitter.com/rj_chap
My Lockbit tweet: twitter.com/_JohnHammond/status/157256282487823974…

00:00 - Ryan Chapman, Malware Analyst
00:30 - Introduction
04:29 - First Demo
07:29 - Configuring RAASNet
15:58 - Building RAASNet
18:17 - Detonating RAASNet
21:41 - Builder Archive
23:37 - Second Demo
26:20 - Building Yashma
27:54 - Third Demo
30:08 - Configuring Lockbit
35:01 - Building Lockbit
37:50 - Final Thoughts

πŸ”₯ YOUTUBE ALGORITHM ➑ Like, Comment, & Subscribe!
πŸ™ SUPPORT THE CHANNEL ➑ jh.live/patreon
🀝 SPONSOR THE CHANNEL ➑ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➑ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
πŸ’₯ SEND ME MALWARE ➑ jh.live/malware

All Comments (21)
  • @creengton8594
    I’d love to see more of Ryan, hoping he’ll start his own yt channel
  • @cyberguide_in
    Extremely informative. I'd love to see Ryan discussing malware analysis as he mentions at the video's end. Much appreciated Ryan and John!
  • Thank you! The shadowy world relies on secrecy and silence. This effort to teach and explore is so important. The more light you shine, and the more sparks of interest it inspires, the less room there is for the darkness.
  • @user-vp7ld6qb1x
    Great content! Good to see that you synced up with John Hammond! Keep up the great work Ryan!!
  • @reanimationxp
    Wild to see an old work buddy on one of my favorite YouTube channels.. go Ryan!
  • @tmcarter3
    Great content and advisors.. Thanks for keeping this topic in the front of the line!
  • @WanderlustVisual5
    Waiting for Ryan's Malware analysis things and how he does it in real world cases.
  • @Jesse_Johnson
    Some of the best cysec content on planet earth. Thanks Ryan. Killer vid
  • @axjv
    26:46 The ASCII art actually broke the builder. Probably would have worked if you took it out. Whoever wrote that should sanitize their strings…
  • @sutfuf6756
    It's happened before, it will happen again! I saw something similar in the 90's. VCL, IIRC, by Nowhere man of nuke. It was a DOS TUI for creating viruses and the like. It was basically an x86 ASM code generator. You'd select type: com, exec infectors, droppers, etc... type of payload, custom strings and the like. It was password protected, but, if you were skilled with debug tools, you could extract it.
  • Finally πŸ”₯πŸ”₯πŸ”₯πŸ”₯πŸ”₯πŸ”₯πŸ”₯πŸ”₯😘😘😘😘😘😘
  • @ian562ADF52E
    That login is ridiculously easy to bypass. Just supply a profile dictionary object and execute the code in the last if statement in the login function.
  • @anivibe7322
    This man really like to talk, thx it was interesting.
  • @ronin0x_
    Hello John, can you review PNPT certification? How the course is, and what are the preps to do for the exam. And suggestions for machines to do in THM and HTB. It'll be helpful for me to uptake the certification πŸ₯Ί
  • @lordlightspeed
    There was actually an option to change the extension when building it. You just skipped past that screen.