HackTheBox - PermX

Поделиться
HTML-код
  • Опубликовано: 28 дек 2024

Комментарии •

  • @Indranil_2004
    @Indranil_2004 Месяц назад +6

    The box content is pretty good , i already completed the machine, in the first day of realise

  • @kevinkehoe9950
    @kevinkehoe9950 Месяц назад +3

    Ty for showing us the fingerprint with github, learnt how to make alias with a fantastic example ❤

  • @Reelix
    @Reelix Месяц назад +4

    CVE-2023-4226 requires "authenticated attackers with learner role"
    In the Github example, it was completely unauthenticated. The description of the Github also shows that it was for CVE-2023-4220 which is a stored XSS attack (Which this very much is not).
    So - Which exploit was even used? Did a random Github repo for an unrelated authenticated exploit just happen to work unauthenticated? If so, that's one HELL of a misclassification, and results in quite the increase of the CVSS rating o_O

    • @charlesnathansmith
      @charlesnathansmith Месяц назад

      It's CVE-2023-4220. It's unauthenticated upload and has a CVSS of 8.1
      Stored XSS is mentioned because if execution is disallowed from the uploads folder, you could still serve XSS out of it

  • @sanify1300
    @sanify1300 Месяц назад

    Thanks alot bro, without your videos it would really not help me understand how and why everything worked.

  • @ruaidhrimulgrew6568
    @ruaidhrimulgrew6568 Месяц назад

    Thank you for all your videos! ❤

  • @YGNIGHT.
    @YGNIGHT. Месяц назад +2

    Thanks for the githunt

  • @AUBCodeII
    @AUBCodeII Месяц назад +11

    Ipp, you are alright. Don't go to school tomorrow

    • @AUBCodeII
      @AUBCodeII Месяц назад +4

      Because tomorrow will be Sunday and the school's gonna be closed

    • @YourFavoriteHacker8666
      @YourFavoriteHacker8666 Месяц назад +1

      Don’t go to school ever again.

    • @ippsec
      @ippsec  Месяц назад +8

      So glad winter is coming. Hopefully we just get snow days and not white walkers.

    • @UCNTIsvjEd-cW_MsOoOpeG2w
      @UCNTIsvjEd-cW_MsOoOpeG2w Месяц назад +1

      will the happening forum post be posted tomorrow on HTB forums?

    • @azdirtnaper
      @azdirtnaper Месяц назад +1

      😭😭😭😭

  • @jennyleeb6722
    @jennyleeb6722 4 дня назад

    i cannot for the life of me figure out what’s wrong with my bash one-liner… followed you exactly and restarted and keep getting error “fatal: ambiguous argument ‘$commitomposer.json’: unknown revision or path not in the working tree. git log and show work individually like in your video all up until combining them into the one liner … any help appreciated:’)

  • @rogersjgregory
    @rogersjgregory Месяц назад

    When I ran the command ln -s /etc/sudoers, then the sudo /opt/acl.sh command, a few seconds later and my sudoers at /home/mtz was gone. I tried with the /etc/passwd approach as well, and the same thing happened, my stuff keeps getting deleted.

  • @lendumore
    @lendumore Месяц назад +1

    I’m two mos into learning pentesting and installed virtualbox & kali on a drive. I’m always getting “all ports are being ignored” messages when running nmap even tho I get an IP for my machine and a target IP. I hate pwnbox because they only give an hour per machine. Anyway, I’m stuck

    • @ippsec
      @ippsec  Месяц назад +1

      If you are connected to the VPN, chances are you aren't running nmap with sudo.

    • @lendumore
      @lendumore Месяц назад

      @ what do you mean by “I’m not running nmap with sudo” if I’m connected to the VPN? You mean a command like [sudo nmap -sV etc..] won’t work when connected to the VPN?

    • @Mario-zb9wu
      @Mario-zb9wu Месяц назад

      ​@@lendumore You need to be connected with VPN (leave a terminal with that opened) to get access to the HackTheBox Machine (test you can reach it with `ping`command). If the ping is no succeed, the error is with the VPN connection.
      After you have tested you can reach the Machine, run `nmap`command (maybe you need to run it with sudo in front to get the required permissions) without closing the VPN (remember, the VPN is needed all the time to reach the VM)

    • @mukeshsingh7069
      @mukeshsingh7069 Месяц назад +1

      Never really heard of this issue before, & at the same time not a big fan of Virtual Box. I would recommend you to try switching to VMware. I am pretty sure you won't face that issue.

    • @lendumore
      @lendumore Месяц назад +1

      @ ok. I’ll try it. I hear people talking more about VMWare anyway. Rookie mistake 🤷‍♂️

  • @doraemonnobita2572
    @doraemonnobita2572 Месяц назад

    Hello ippsec can you help bloodhound is showing 0 percent upload while it works fine on other files i used windows to execute sharphound remotely and tried uploading it but got error can you help?

  • @0xbeven462
    @0xbeven462 Месяц назад

    King

  • @ДмитрийКузнецов-я4д
    @ДмитрийКузнецов-я4д Месяц назад +1

    Why I feel so frustrated while watching his video? Brw thabsk for the great content

  • @codermomo1792
    @codermomo1792 Месяц назад

    is there any other way to root. (other than the symlink). I tried this but it failed (error: only files are allowed ...).
    export pwd=../../
    this will make ~ = ../../ so when u do cd ~ this will be like cd ../../
    it bypassed the first if but not the last );

  • @sotecluxan4221
    @sotecluxan4221 Месяц назад

    Wow!

  • @tg7943
    @tg7943 Месяц назад

    Push!

  • @jmprcunha
    @jmprcunha Месяц назад

    thanks

  • @fadiallo1
    @fadiallo1 Месяц назад +1

    Why we use githunt?
    how it is helpful?

    • @ippsec
      @ippsec  Месяц назад +5

      Without knowing the version of a web application, how do you know what exploit to throw? Yes, you could just blindly use them until they work but without knowing the version you don't know if it should have worked.
      There are plenty of times when the public POC fails because the server configuration is slightly different. So if you pull the version, confirm it is likely vulnerable, you can be somewhat confident digging into the exploit when it fails won't be a complete waste of time.

    • @fadiallo1
      @fadiallo1 Месяц назад +1

      @@ippsec But you did not care about the version
      you just used the first link

    • @ippsec
      @ippsec  Месяц назад

      @fadiallo1 I showed the way I expected most people to solve it, then showed a more optimal way I would go about it.

    • @fadiallo1
      @fadiallo1 Месяц назад

      @@ippsec And Second way is about know the version, and not first link?
      But

    • @ippsec
      @ippsec  Месяц назад +2

      No. Watch the video again please, I explain it. It’s not needed for this box, but it’s still a good skill to learn.
      Obtaining versions information of software simply helps troubleshoot or find vulnerabilities. Imagine you drive a car made in 2022. There’s a recall for models prior to 2021, since you know the version you can ignore the recall instead of wasting time with it.
      It’s there wasn’t a public exploit but you looked at the changelog for on GitHub and saw a security change you’d know if the webserver was vulnerable to it

  • @RISE_BEFORE_YOU_GREECE
    @RISE_BEFORE_YOU_GREECE Месяц назад

    I Love Doing Attack Than Defend 😂

  • @null_1065
    @null_1065 Месяц назад +2

    First?