0:00 [Music]
0:07 before we get started with today's video
0:09 i just want to take you through the
0:11 structure of
0:12 this particular series um so i've
0:14 actually partnered with linux to bring
0:15 you this series
0:16 this series will involve two parts so if
0:18 you head over to linux.com under
0:21 events you should find the hack exploit
0:23 linux live
0:24 linux server security series and you can
0:26 just click on more info here
0:28 so this series is going to be a 12-part
0:30 series on how to set up secure and audit
0:32 linux servers
0:34 uh and we'll begin on on the 1st of
0:36 october
0:37 and the first series will be available
0:38 on youtube and will include ssh security
0:41 essentials configuring sudo access
0:43 securing apache 2
0:45 securing engine x and the uncomplicated
0:47 firewall
0:48 the second part of the series will be
0:50 hosted on linux live
0:51 and it's absolutely free you don't have
0:53 to pay anything
0:55 and again you can access you can
0:56 actually register for that there this is
0:58 going to be an
0:59 advanced series that will build up or
1:01 build off
1:02 the first series and we'll cover things
1:04 like brute force protection
1:05 ip tables wordpress security and
1:08 security auditing on linux with
1:10 the linux tool um so to access that just
1:12 click on the registration link
1:14 on on the on24 platform and that will
1:17 take you here so that will give you an
1:18 idea of all the various web costs
1:20 and when they're going to be posted and
1:22 it'll give you a summary of what will be
1:24 covered exactly these are advanced uh
1:26 webcasts that will be about 40 minutes
1:29 and you can register for them absolutely
1:30 free of charge we've also
1:33 partnered with lino to give you guys a
1:35 free credit uh so again if you
1:37 are interested in using lynode for your
1:40 virtual private server or for your
1:41 hosting whether you're a developer or a
1:43 administrator uh you can get a hundred
1:45 dollars of 90 day credit
1:47 uh and this is for new accounts um so
1:50 that's fantastic
1:51 definitely do take advantage of this if
1:53 you're getting started with linux or
1:54 you're actually following uh you're
1:56 following along with this series
1:57 however make sure to actually redeem
1:59 this offer or this code
2:01 uh which is under promo.linu.com
2:04 and the code is hackersploit100 this
2:07 offer will only be limited till the
2:09 15th of december so definitely check
2:11 that out that being said let's get
2:12 started with today's video
2:14 hey guys hackersploit here back again
2:17 with another video welcome to the linux
2:19 security series
2:20 in this particular series we're going to
2:22 be taking a look at how to secure linux
2:24 systems and
2:25 more specifically linux servers now as
2:28 you've read from the title this video is
2:29 going to be about ssh security
2:31 so i'll be taking you through all these
2:33 essentials of securing ssh
2:35 we're not going to be taking a look at
2:37 brute force protection where i'm just
2:39 going to be showing you how to secure
2:40 ssh
2:41 and how to go about setting up ssh
2:44 securely
2:45 now in this particular video or in this
2:47 particular series we'll be following a
2:49 very important
2:50 a premise here or an example if you will
2:53 and the reason i'm doing this is to give
2:55 the videos a bit more context in in
2:58 regards to how you can apply these
2:59 techniques yourself when setting up a
3:01 server regardless of whether it's a
3:03 personal server
3:04 or whether you're setting up one for
3:05 your organization or for your company it
3:08 really doesn't matter
3:09 so the way i'm going to be doing this is
3:11 i'm going to be using
3:12 somewhat intricate but basic examples
3:15 again to give you
3:16 a better idea of of how you can apply
3:19 these techniques so
3:20 in this particular case uh we are going
3:22 to take a simple example of
3:24 the fact that i'm an administrator and
3:27 i've been
3:28 hired uh to again manage the company's
3:31 linux servers
3:32 on the cloud and also some various
3:35 on-premises servers that they have
3:36 and the development team that's
3:38 responsible for developing the web
3:40 applications that they have actually
3:42 told me the linux administrator to fire
3:44 up a few servers on the cloud
3:46 or virtual private servers uh for
3:49 wordpress
3:50 for a wordpress website so we have been
3:52 given that
3:53 that particular role or that particular
3:55 task and
3:56 our first order of business is to set up
3:59 remote authentication so that the
4:00 development
4:01 team can connect to the server and do
4:02 whatever they want and of course they're
4:04 going to be using ssh to do this so ssh
4:07 stands for secure shell it is a
4:09 remote authentication and remote control
4:11 remote
4:12 remote control protocol and it allows
4:15 you to connect to
4:16 linux servers remotely or even windows
4:18 servers
4:20 right so now that we have set up the
4:21 premise we can actually get started now
4:24 uh we have partnered with linux to
4:26 actually give you guys
4:27 some free credits or free access and you
4:29 can access this uh by going to
4:31 lynnote.com
4:32 and take a look at hackersploit so ford
4:34 slash hack exploit
4:36 and that will give you a free 20 credit
4:38 so you can actually
4:39 get started and follow along with this
4:40 if you want to uh and again you can
4:43 create as many linux as you want
4:44 and you get about 20 dollars which is
4:47 fantastic
4:48 excellent so we can now get started now
4:50 this is my dashboard
4:51 and you can see where we're going or
4:53 following along with the premise and
4:55 these are the servers that i'm currently
4:57 managing and i have the marketing server
4:59 and a project management server here
5:01 and now we've been told to create a new
5:03 linux server
5:04 with wordpress installed and we can go
5:07 about setting up
5:08 the security from the ground up so the
5:10 first thing we're going to do
5:12 is we're going to create a new linux so
5:14 i'll click on newly node
5:15 and again i can set up wordpress
5:17 manually or i can go into the
5:19 marketplace here which is great
5:20 a great feature offered by lenoid and i
5:23 have all of these
5:24 applications that again are
5:25 pre-configured to work
5:27 right out of the box so i can set up a
5:29 lamp server a lamp server
5:31 i can also set up a postgresql database
5:33 an open vpn
5:34 instance so that i can actually set up
5:36 my own openvpn server and then of course
5:38 we have the game servers which is
5:39 awesome
5:40 we have we also have the ability to set
5:42 up docker
5:43 which is fantastic you can actually just
5:45 get started immediately without setting
5:47 up or installing anything
5:49 in our case we're going for wordpress um
5:52 so i'm just going to go to the bottom
5:53 it's going to ask us for the wordpress
5:54 options
5:55 so again the development team is has
5:57 given us some some basic credentials and
5:59 of course
6:00 we're just going to uh we're going to
6:02 improvise a little bit so the user is
6:04 going to be user at uh test.com
6:07 and the admin username is going to be
6:08 admin and of course i don't recommend
6:10 doing that but that's
6:11 another topic for another video and then
6:14 of course for the password we're going
6:15 to give it a super secure password right
6:18 so i'll give it the best password i can
6:20 and we're going to disable this
6:22 gradually as we as we move along because
6:24 password-based authentication with ssh
6:26 is
6:26 not really recommended uh because you
6:28 know attackers can brute force the
6:30 server or brute force ssh
6:32 we then need to provide the database
6:34 password which again make sure that is
6:36 equally as
6:36 secure and landlord gives you a password
6:39 strength um
6:40 level right over here and the website
6:43 title we're just going to call this
6:44 development
6:46 development site this is where the you
6:48 know the development team is
6:49 going to just work on uh various
6:52 betas or new new web apps that they're
6:55 currently working on
6:57 and we don't have a domain yet so we're
6:59 not mapping it and the default uh
7:01 image is going to be debian which is
7:03 perfectly fine i then specify the region
7:05 and of course you can specify the region
7:07 that's most uh appropriate or
7:09 advantageous to you based on
7:10 uh what area or what part of the world
7:13 you're in
7:14 my case i'll just go for europe london
7:16 uk as that's the closest to me
7:18 and i can then specify my plan and of
7:20 course these are based on cpu uh
7:23 intensive or cpu dedicated cpus high
7:25 memory
7:26 based lino's and gpu based cleaners as
7:29 well which is great for
7:30 password cracking that's something i'll
7:31 probably want to cover in another video
7:33 um so i'll click on a one gigabyte uh
7:37 ram and one gigabyte oh sorry one cpu
7:40 a linode which is a nanode and that's
7:42 about five dollars a month
7:45 which is perfect so that'll be fine for
7:47 a wordpress server
7:48 and i'll just call this wordpress
7:50 development that's the name of the
7:51 server so wordpress development
7:53 and i'll enter a root password now you
7:55 can see a very interesting thing here
7:57 with most cloud providers and you know
7:58 linux
7:59 in particular is the ability to set up
8:01 ssh keys
8:02 which we'll be doing but there's a
8:04 there's there's a flaw here by default
8:06 and that is
8:07 the fact that you'll be logging in
8:09 directly to the server with the root
8:10 user account which is
8:12 our first order of business that we want
8:14 to change so we will stick to
8:16 you know authenticating with the
8:18 password first and i'll not add an ssh
8:21 key
8:21 yet because we're going to add it for a
8:23 different user
8:24 so i'll hit create and that's going to
8:26 create the linux instant in
8:28 instance for us so i'll just wait for
8:30 that to provision and to start and uh
8:32 yeah i'll just wait for that to complete
8:35 all right the node is created so we can
8:38 actually get started so i'm just going
8:40 to copy the ipv4 address here and we're
8:42 going to log in
8:43 using openssh or the openssh client now
8:46 as i said i'm currently
8:47 using linux ubuntu to be specific and of
8:50 course you can log in with various other
8:52 you know ssh clients like uh you have
8:55 putty on windows
8:57 and of course you have the open ssh
8:58 client installed by default on macos i i
9:01 believe
9:02 and on linux it's pretty much the same
9:03 so you want to make sure you have the
9:04 openssh client installed so sudo apt
9:07 install
9:08 um open ssh and we want to specify the
9:13 the open ssh client i believe there we
9:16 are and i'll just specify my password
9:18 here
9:19 and that's gonna tell me it's already
9:20 installed fantastic so to authenticate
9:22 via ssh we say ssh we specify the
9:24 username and
9:26 we'll paste in the ip of the server hit
9:28 enter that's going to ask us for the
9:30 root password um that we specified so
9:33 i'll just specify the root password here
9:35 and
9:36 we are logged in fantastic so now that
9:38 we have access to the server we can we
9:40 can get started with our first
9:42 our first priority which is to add
9:44 another user because
9:46 if i currently list out the users on the
9:48 system
9:49 you can see apart from the other service
9:51 based uh user accounts like mysql users
9:55 which is for the database and dub dub
9:57 dub data
9:58 you can see that we only have the root
10:00 user and we don't have any other user
10:02 accounts which is
10:03 is a problem because when we talk about
10:05 the root account
10:06 and uh in and permissions in regards to
10:09 the power of the root account
10:11 the root account is like the
10:12 administrator account which means you
10:13 can pretty much do
10:14 anything and if an attacker is able to
10:17 get access to the root account
10:19 remotely they can pretty they pretty
10:21 much take over the entire system they
10:23 can change passwords for the users they
10:24 can
10:25 they can you know delete databases dump
10:27 contents of databases so on and so forth
10:29 so
10:29 our first order of business is to
10:32 disable
10:32 the uh disable authentication remote
10:35 authentication to the server
10:37 with the root account and the way we do
10:39 that is first of all we segregate
10:41 duties on the server right so for the
10:43 development team we'll create
10:45 a user for them so that they don't have
10:47 to use the
10:48 the root user to log in so to do that we
10:51 use the user add command so user add
10:54 and i'll say m to create a home
10:56 directory and we specify the shell
10:58 which in this case is going to be bin
11:00 bash right and
11:02 and i'll create the username which is
11:04 just going to be dev and i hit enter so
11:06 we've added the user dev
11:07 and if i just print out the users now
11:10 you can see at the bottom we have the
11:11 user dev right over here and the home
11:13 directory
11:14 is listed as home dev so the next thing
11:16 we want to do is we want to assign a
11:18 password to the user dev so i say
11:20 password
11:21 and i specify the user dev so i say
11:23 password dev it's going to ask us to
11:24 specify a password for the user dev
11:27 which i will do and there we are so we
11:30 have now
11:31 added the user dev and we can try and
11:33 switch to that user by using this uh
11:36 super user or switch user there we are
11:38 so we say su
11:40 and we move on to the dev account and
11:42 you can see we can log in directly
11:44 and if i go to the home directory
11:47 you can see we are currently sorry pwd
11:49 we are currently in the home dev
11:51 directory here
11:52 we can also switch back to the root
11:54 account um like so and it's going to ask
11:56 us for the root account password
11:58 which works out fine so we our first
12:01 order of business as i mentioned
12:03 is to log in as to disable uh
12:05 authentication remote authentication
12:08 uh with the root account and to do this
12:10 we need to uh
12:12 we need to take a look at the ssh or the
12:14 open ssh daemon configuration file
12:17 because the thing you have to understand
12:18 about ssh it is a client server based
12:21 connection
12:21 which means there's the client and the
12:23 server this particular server is running
12:26 open ssh server so we need to
12:28 configure the openssh server settings so
12:31 we'll click we'll use
12:32 an editor i'm using vim you can use nano
12:34 so we want to go into the etsy directory
12:37 so
12:37 hc ssh and we're looking for sshd
12:40 now the reason we're looking for sshd
12:42 the d represents the daemon which
12:44 essentially means the service or the
12:46 server service and we're looking
12:48 and the sshd configuration file so i'm
12:51 just going to hit enter
12:52 and this is the configuration file over
12:55 here now there's tons of options that
12:56 you can change
12:57 and these options are not related uh you
12:59 know only to security
13:01 uh they also pertain or are also related
13:03 to things like networking we can change
13:05 the
13:06 default port that the service is
13:08 currently running on that's also very
13:10 helpful sometimes
13:11 and of course there's tons of other
13:14 options that we can change now the
13:16 option we're looking for
13:17 is an option called permit root login
13:19 now the interesting thing you'll see
13:21 about this file
13:22 is the syntax that is used now by
13:24 default within configuration files
13:26 a hash or a pound symbol represents a
13:29 comment which means that line
13:30 of code or that line is not active now
13:33 if you
13:34 see a line without a hash or a pound
13:36 that means that that
13:37 line is currently active in this case
13:40 all the lines with hashes or pound or
13:42 the pound symbols means they're left to
13:43 their default values
13:45 and open open ssh will will actually use
13:47 that by default
13:49 so any custom options will will not have
13:52 the pound or the
13:53 the hash symbol in this case permit root
13:56 login is set
13:57 to yes we want to disable that to know
14:00 now note this does not mean we cannot
14:02 use the root user that's something we'll
14:04 be disabling
14:05 in another video this just means we
14:07 cannot access
14:08 the server via ssh using the root user
14:11 after this we'll only be able to access
14:13 it using the dev user
14:14 so we'll say permit root login to no we
14:17 want to say no to that
14:18 and then to save this file i'll just use
14:21 wnq
14:22 to write and quit and we can now quit
14:24 there we are fantastic
14:25 so now i can just exit from the server
14:27 so i'll just exit from both users there
14:29 we are
14:31 and if i try and access the server using
14:33 the root user again
14:35 you'll see something interesting happen
14:36 here and of course i think i'll be able
14:38 to authenticate because i haven't
14:40 restarted the service
14:41 so i'll just do that right now so sudo
14:43 system control uh restart
14:45 ssh and i'll that will restart the
14:47 service and if i try and log in again
14:49 now it's gonna ask me for my password
14:52 and if i enter the password
14:54 it's gonna tell me i'm unable to
14:56 authenticate so we'll just wait there we
14:58 are permission denied try again
14:59 and that doesn't necessarily mean that
15:01 my uh my password is incorrect or i've
15:04 done anything wrong
15:05 it just means that i cannot log in to
15:07 the root user
15:08 uh with a password i cannot authenticate
15:12 with the root user of issh and of course
15:15 you can see that that
15:16 that option is explicitly defined within
15:18 the configuration file because
15:20 it does it does offer a a reprieve in
15:23 terms of security because
15:24 a lot of attackers will target the root
15:26 account because it off
15:27 it offers the lowest hanging fruit um
15:30 right so that means we can only access
15:32 the server via the dev user
15:34 all right so i'll open up the dev user
15:37 right over here fantastic so i'll
15:39 specify the
15:40 um i'll specify the password for the dev
15:43 user and i have access and of course
15:44 i can switch back into the root user if
15:47 i want to by saying su
15:48 root and there we are
15:52 fantastic so again i can i can always
15:54 access the root user but that's
15:55 something we'll also want to be
15:56 disabling because
15:58 uh the dev user if compromised can still
16:01 in some way
16:02 access the root account if they have the
16:03 password in most cases that's not going
16:05 to be the case
16:06 but now we have to secure the dev user
16:08 and the way we're going to be doing that
16:09 is
16:10 by using ssh keys now as i said
16:13 we can set up ssh keys by default with
16:15 the cloud provider likely known however
16:17 that does it for the root user
16:19 we want to do this for the dev user so
16:21 we are slowly segregating
16:23 and uh lowering our our security risk
16:26 because we are setting up users based on
16:28 privilege
16:29 and number two we are also increasing
16:31 the
16:32 the amount of uh authentication security
16:34 in place
16:35 so to get started what we want to do is
16:38 i'll open up a new tab on in my terminal
16:40 here
16:41 and we want to generate our ssh key now
16:44 or you can generate your ssh key
16:47 very very simply on linux by specifying
16:49 ssh
16:50 keygen so if i say ssh keygen
16:53 like so you can see it gives me the
16:55 ability to generate a key so
16:57 sh key then i can then specify t rsa
17:00 that is the pro
17:01 the algorithm that is being used and
17:04 on windows you can do it you can also
17:06 generate your ssh keys
17:08 using using putty if you want and i'm
17:11 going to
17:12 enter and it's going to tell us it's
17:14 generating the public
17:15 private rsa key pair and it's going to
17:17 save it into the default home directory
17:20 under ssh here
17:21 in most cases you just want to leave
17:22 that as it is so i'm just going to enter
17:24 and it's going to tell me it already
17:26 exists and i'm going to overwrite this
17:28 for a very important reason i'll hit
17:30 enter
17:31 now ssh keys also allow you to specify a
17:34 passphrase this is like two-factor
17:36 authentication because
17:38 in addition to your ssh keys uh you can
17:40 also
17:41 uh secure them with a password so if
17:43 someone gets a hold of your ssh key
17:45 they'll not be able to authenticate
17:46 without that particular passphrase in my
17:48 case i'm not going to enter a passphrase
17:51 so i'm just going to hit enter right and
17:53 your your uh your keys are going to be
17:56 stored
17:56 within your home uh your home directory
17:59 under ssh
18:00 and the file is going to be called id
18:02 rsa that's your private key
18:04 and you have idrsa.pub which means
18:06 public in that we can
18:08 list out the contents of my ssh
18:10 directory here
18:11 so ssh and um if i list it you can see
18:15 we have the private key this is what we
18:17 want to keep securely
18:18 and we have the public key now of course
18:21 when we talk about
18:22 the the public key as i said we need to
18:24 copy this onto the server
18:26 so how do we do this well we can we can
18:27 copy it manually however much easier way
18:30 of doing it
18:30 is through a utility called ssh copy id
18:34 so we say ssh copy
18:36 id and then we specify the user that we
18:38 we want to authenticate as so dev
18:40 at and then i paste in the ip of the
18:42 server and i hit enter and that's going
18:44 to copy our public key to the server
18:47 so we're just going to wait for that to
18:50 prompt us to authenticate with the
18:52 password
18:53 so it's going to say enter our password
18:54 for the dev user so there we are
18:57 it's going to now tell us the number of
18:59 keys added is two
19:01 right so we've added two keys here and
19:03 um there we are so we've added our key
19:06 and that means we can now authenticate
19:08 to the um
19:10 we can all authenticate to the server
19:12 without entering a password for the dev
19:13 user that's only for
19:15 us however a password-based
19:18 authentication is still available so
19:20 i'll just explain this to you shortly so
19:22 if i try and log in to the ssh
19:26 to the server of issh using the dev user
19:29 you'll see that i'll be able to log in
19:31 without entering a password so i'll hit
19:32 enter
19:33 it's going to use my private key and
19:36 again we'll just
19:37 sorry that is an incorrect ip let me
19:39 just paste in the correct one
19:40 which is this one right over here if i
19:43 just paste that in here
19:45 and you can see i'll now be able to
19:47 authenticate without entering any
19:49 password there we are
19:50 i'm now logged in as dev at the lynnode
19:52 instance right over here
19:54 so i didn't have to enter any password
19:56 although password-based authentication
19:58 is still set up
19:59 now if i try and authenticate using
20:00 another system like my windows system
20:02 with putty
20:04 and i'll just open up lynode and copy
20:06 the ip there and i try and log in
20:08 let's open up putty again uh like so
20:11 you can see that it still is going to
20:14 ask me for my
20:15 password so i'll say you log in as dev
20:17 it's going to ask me for my password
20:20 and i can still log in regardless of
20:23 whether i've set up an ssh key we need
20:24 to remedy this
20:26 the way we remedy this is by disabling
20:29 uh password logins or disabling uh
20:32 password-based authentication so what
20:34 i'm going to do is i'm just going to
20:35 minimize that and i'll switch into the
20:37 root user
20:38 so i'll say su root and it's going to
20:41 ask me for my root password
20:43 there we are and we'll go back into the
20:45 sshd
20:46 configuration file so we're looking into
20:49 the
20:50 hc ssh and sshd
20:53 configuration file and we want to go
20:58 we want to go all the way to the bottom
20:59 here right over
21:02 it should be over here uh under
21:04 authentication
21:05 we have changed permit root login to no
21:08 and we just want to go slightly to the
21:11 bottom here on
21:12 under disable tunneled clear text
21:14 password so
21:15 to disable tunnel clear text passwords
21:17 change to no here so
21:19 for password authentication we want to
21:21 disable this so we
21:22 we again will just get rid of the the
21:24 pound or the hash symbol
21:26 and we're going to set the option to no
21:29 right so we'll set that to no
21:31 now what this means is that under no
21:33 circumstance are we going to be able to
21:36 access this server
21:37 using passwords the only way we're going
21:40 to be accessing this server
21:42 is through our ssh keys so that's
21:45 something you want to take into
21:46 consideration before you activate this
21:48 particular option or this particular
21:49 setting
21:50 make sure you have the ssh key available
21:52 because there'll be no way you'll be
21:54 able to get access to this via ssh then
21:57 so i'll write in i'll write the changes
22:00 and save it and again in this case i'll
22:01 just restart ssh so
22:03 system control restart ssh
22:06 sorry ssh like so and if i now exit or i
22:09 log out
22:11 again on this system i'll be able to log
22:13 in without the password because i have
22:15 the ssh key
22:16 and i can then share this ssh key with
22:19 the development team and they'll be able
22:20 to log in using the ssh key
22:22 so if i hit enter you'll be able to see
22:25 there we are i have access i still have
22:27 access here
22:28 however if i go on over to my windows
22:30 system and i try and
22:31 uh log in using putty so what i'll do is
22:34 i'll just
22:35 open up a new session here i'll close
22:37 that one
22:38 and i'll just copy the ip one more time
22:40 here just to make sure i have the right
22:41 one
22:42 and uh i'll open up putty
22:46 let me just load my profile hit open
22:49 you can now see if i try and say login
22:51 as dev it's going to give me an error
22:53 telling me no supported authentication
22:55 methods available
22:57 server sent public key so again that
23:00 means that
23:01 now on this server there's no way we are
23:04 authenticating with
23:05 with any password of any kind regardless
23:07 of the user
23:08 so again we've disabled uh the root user
23:10 logins which is very important number
23:12 two
23:12 we've set up and secured the other user
23:15 account which is the dev user the only
23:17 way
23:17 anyone is logging onto it now is through
23:19 the ssh key
23:20 and of course as i said the ssh key is
23:23 going to be under your home directory in
23:25 ssh
23:26 uh and it's um it's the the file that is
23:29 in uh
23:30 that we're referring to is the id rsa
23:32 key right over here so this is the file
23:34 you want to share with the development
23:35 team
23:36 and again they can then use it to log in
23:38 however as i mentioned it's very
23:39 important
23:40 to take into consideration the fact that
23:42 you want to keep the private key
23:44 as personal and as private as possible
23:46 that's the reason it has the name
23:47 private uh now of course in the next
23:51 videos we'll be talking about uh giving
23:53 the dev uh the dev user account the
23:55 appropriate permissions to run
23:57 administrative tasks
23:58 like installing software updating
24:00 software and we'll also then go a step
24:03 further
24:04 by disabling the root account
24:06 permanently so that you cannot even
24:08 switch to it in the event an attacker is
24:10 able to compromise the system
24:11 through one of the lower privileged
24:13 accounts like the dev user they'll not
24:14 be able to get
24:15 access to the root account that being
24:18 said that's going to be it for this
24:19 video
24:20 let me know what you thought in the
24:21 comments if you have any questions or
24:22 suggestions and i'll be seeing you
24:24 in the next video i just want to take a
24:27 moment to thank all our patreons at
24:29 patreon.com forward slash hackersploit
24:31 for all
24:32 the support your support and help is
24:34 truly appreciated you keep us making uh
24:37 newer and fresher
24:38 and better content so i just want to say
24:40 thank you to all the patreons
24:42 so thank you murph the surf daniel bork
24:45 jonathan kyle
24:46 adam mack jamal guillory defean barry
24:48 jeremy nikolai
24:49 marie harrah max ciao dustin empress
24:53 michael hubbard and jerry speds
25:04 you