John, you really have a gift for teaching. I absolutely love that you just jump in, no script, mistakes, pivots, thoughts, workarounds and all.. Lets all of us noobs/beginners know that even the best slip up and go through a lot of trial and error. Your content is top notch and I looks forward to more videos from you. Thank you for all that you do and for covering even some of the easier stuff and explaining along the way. It really helps make things "click." 🙏
Man, you have some mad skills. I love your channel. I can't get enough. The TryHackMe playlist is a lot of FUN. I have a subscription with them, but I am at the beginning level. I am going to school for my BS in CyberSecurity. I hope I am half as good as you are. Great channel.
I hope to, at least! I know it is a little boring when I go through a room that the audience has already done before -- hope I can at least showcase some good tricks and techniques. Thanks for watching!
I saw the premier this morning, I then sat down to solve the box and watch how you did it after I solved it. I got everything right, only the last part with the curl got me stuck a little. Thanks for the awesome videos. I hope you make more walkthroughs!
Love your teaching method, John. This video was interesting to watch. I am finishing Network Services on THM and justed discussed SMB, so I understood everything you were saying...hahah. Keep up the great work
One of the small bits while learning how to hack as a beginner, is the way you use your notes properly. This has helped my methodology, I can go back to see how I attacked other Windows machines. As a beginner, using Kali Linux for my eCPPT, OSCP, and capture the flag events this video really goes a long way to help me understand what I’m doing. Keep up the great work! This OSCP path from TryHackMe is awesome.
Thank Yuu man !! I have started tryhack oscp path yesterday . I complete the mahine there and then come here to watch your videos to smoothen my knowledge .
Appreciate the unedited approach. I find seeing your mistakes to really make the video more engaging, even if it means shouting CHMOD at the screen because its the only thing I understand!
When I was in college, I had a professor who did labs in a format similar to this THM. The questions were always, "Run this command. What is the result?", or similar.
Bro, you are making things nice and neat. I've been banging my head to my keyboard last night trying to understand this machine(since it's the first time I use samba) and you made it very clear now. I wonder if you have any course here or there, I am willing to buy a pentesting course that you make (if you want to make one)
I still have NO CLUE whats going on. Im complete Newb :D What i see is just a bunch of text flying through the screen in a terminal. But still, why the heck do i love watching this? :D Been going over all the TryHackMe videos, and its soo cool to watch. Maybe its bec i wish i could do this type of pentesting/hacking myself. But in my mind this is too hard to learn, and i never will. Thanks to you, i actually switch to Ubuntu now full-time now. And what i have learned so far is Terminal commands that is usefull :P Keep the videos/streams coming. Inspiring.
when we copy files/directories from one place to another on the server then why don't you copy the " /home/kenobi/.ssh/id_rsa " to " /home/kenobi/share/id_rsa " .And Then access it via samba. This will make our work more easier
You're a great teacher. Try Hack Me is such a garbage platform as the priv-esc section demonstrates. I didn't learn squat doing this room on my own. It's only vids like this that make that site halfway worth a look at
Great vid man.. thx i learned quite a bit. just so your not wondering what happened the reason it didn't work on the first try with bin/bash was not making your "curl" script executable so it went for the file that was executable. it looked like you mentioned something along those lines in the text that ran across the vid but if not hope it helps someone... thx again
Hi John! did this box earlier and I can't figure one thing: if I cp ifconfig I get root but if I cp uname or curl it doesn't work. but if I echo those it does. what is the difference between cp and echo in this case ? parameters ? The bash script is indeed a good approach
May please someone clarify the following. 1. Is it a Linux machine or Windows one? Why it has drive C but when we SSH into it, we see a linux distro? 2. What exactly happened with mount command? Did we mount remote disk locally and why we need that? Thank you, John for the great content!
to all of you who couldnt mount the nfs share ( i didnt have the helper file in the sbin directory and couldnt install it): just copy the id_rsa file into the kenobi share and download it like the log.txt with smbget - this works for me
Hey there, i'm starting in THM but i've got some trouble with the wordlists of gobuster. I just can't find them.. Hope you could help me. And i want to say that i love your videos ! I started with this web site thanks to you !
How did you have your profile setup like that; the colorized filetype, size, user, and date? I haven't found anything on that. Is there a better way to optimize /opt when installing programs/commands under it? modifying the owner to be $USER instead of root without the explicit chown command every time?
Oh, that output is the beautiful and lovely `exa`. You can get it at the.exa.website. I have set it as an alias for my `ls` command. For making /opt usable for tools, I tend to just `chown -R $USER:$USER /opt`. Thanks so much for watching!
It's quite common... Whacks, tacks, splats, and bangs: cd / : "see dee whack" ls -la /tmp : "ell ess tack ell ayy whack temp" rm -f /tmp/file* : "arr emm tack f whack temp whack file splat" sudo !! : "sue due bang bang" You get used to it, but often it's easier to just say: cd / : "see dee slash" ls -la /tmp : "ell ess minus ell ayy slash temp" rm -f /tmp/file* : "arr emm dash eff slash temp slash file star" sudo !! : "sue due bang bang" I personally appreciate "bang" over "exclamation mark" any day as not only does it save syllables, but it's kind of a cool homage to old school comics and/or cartoons where a speech bubble with just an exclamation would be over a character that had a gun pointed at them, or a flag with "BANG!" would come out of a gun (Looney Tunes). But "whack" over "slash", "tack" over "dash", "splat" over "star" ... they don't really save you any syllables and tend to confuse most people. It's a novelty thing I guess, but I never really used them (outside of "bang").
John, you really have a gift for teaching. I absolutely love that you just jump in, no script, mistakes, pivots, thoughts, workarounds and all.. Lets all of us noobs/beginners know that even the best slip up and go through a lot of trial and error. Your content is top notch and I looks forward to more videos from you. Thank you for all that you do and for covering even some of the easier stuff and explaining along the way. It really helps make things "click." 🙏
Thank you so much, John! The amount of learning is enormous! So grateful for that!
Never thought about exporting the ip to a variable. Cool. Going to do it from now on. Makes more convenient than typing the ip over and over again.
Just set it in the hosts file. u can always use the hostname in every terminal.
Yeah you'll get insane if you do it over and over again? Remember what vaas said?
Man, you have some mad skills. I love your channel. I can't get enough. The TryHackMe playlist is a lot of FUN. I have a subscription with them, but I am at the beginning level. I am going to school for my BS in CyberSecurity. I hope I am half as good as you are. Great channel.
Ah thank you so much! TryHackMe certainly is a lot of fun! Thanks for watching and keeping up with the content!
Ahh, man excited to see you go through this room. You surely end up teaching me something cool every time.
:)
I hope to, at least! I know it is a little boring when I go through a room that the audience has already done before -- hope I can at least showcase some good tricks and techniques. Thanks for watching!
I saw the premier this morning, I then sat down to solve the box and watch how you did it after I solved it.
I got everything right, only the last part with the curl got me stuck a little. Thanks for the awesome videos. I hope you make more walkthroughs!
I love when you do mistakes. It show the path we all make to understand why it doesn't work.. it's the best way to learn.
Love your teaching method, John. This video was interesting to watch. I am finishing Network Services on THM and justed discussed SMB, so I understood everything you were saying...hahah. Keep up the great work
One of the small bits while learning how to hack as a beginner, is the way you use your notes properly. This has helped my methodology, I can go back to see how I attacked other Windows machines. As a beginner, using Kali Linux for my eCPPT, OSCP, and capture the flag events this video really goes a long way to help me understand what I’m doing. Keep up the great work! This OSCP path from TryHackMe is awesome.
hey
That was really good, thanks for all those learning parts ♥️
Thank you! And thanks so much for watching!
Thank Yuu man !! I have started tryhack oscp path yesterday . I complete the mahine there and then come here to watch your videos to smoothen my knowledge .
*definetely one of THE BEST pentesting chanels we have on RUclips. TOP 3 my lovely guys* CHEERS mate.
John Hammond, the John Wick of the internet. The one guy you definitely NEVER piss-off online! Thank you for the absolutely amazing content!! 💚💚💛
Your walkthrough videos are really helpfull, when you get stuck on something and you need push in the right direction.
great video John,I loved it ,I like that when you go and start explain something in deep details
again thanks for the video
Appreciate the unedited approach. I find seeing your mistakes to really make the video more engaging, even if it means shouting CHMOD at the screen because its the only thing I understand!
Great video. I really learned a lot. Always a joy to peek over your shoulder :)
When I was in college, I had a professor who did labs in a format similar to this THM. The questions were always, "Run this command. What is the result?", or similar.
Bro, you are making things nice and neat.
I've been banging my head to my keyboard last night trying to understand this machine(since it's the first time I use samba) and you made it very clear now.
I wonder if you have any course here or there, I am willing to buy a pentesting course that you make (if you want to make one)
Awesome video man. I'm learning a lot from you!!! Thanks a lot dude!!!
I still have NO CLUE whats going on. Im complete Newb :D What i see is just a bunch of text flying through the screen in a terminal. But still, why the heck do i love watching this? :D Been going over all the TryHackMe videos, and its soo cool to watch. Maybe its bec i wish i could do this type of pentesting/hacking myself. But in my mind this is too hard to learn, and i never will. Thanks to you, i actually switch to Ubuntu now full-time now. And what i have learned so far is Terminal commands that is usefull :P Keep the videos/streams coming. Inspiring.
Dude your videos are awesome! I learn something new every video I watch. Your voice reminds me of Seth Rogen 😀
Another great walkthrough thanks!
Happy to hear that! Thanks so much for watching!
Subscribing you is the most correct thing I have done in this year... :3
Very easy to follow and I'm learning extra stuff with JH. Noice.
I can't wait lol see you dude.
Your explanations are so good💙
Thanks for these... learning a lot
One of only a few dudes on youtube I've seen who i need to slow down the video from to follow.
Learnt a few more methodologies post more stuffs like this. Thanks
Great walkthrough 👍
I hope to have one as much knowledge as you !
Awesome video and nicely explained thank you so much.
I love these VIDEOS!!!
when we copy files/directories from one place to another on the server then why don't you copy the " /home/kenobi/.ssh/id_rsa " to " /home/kenobi/share/id_rsa " .And Then access it via samba. This will make our work more easier
@_JohnHammond ??
You're right, this path is easier
Yes i hope to catch it life this time
Whatever you want John!
Wherever you want
Dude, you're so quick I have to keep rewinding...lol. I guess that comes with years of experience
Very cool as always
i think this guy just knows everything including technology
Doing the youtube algorithm ......
Your videos are great ..
Fantastic as always :-)
Thank You!
You're a great teacher. Try Hack Me is such a garbage platform as the priv-esc section demonstrates. I didn't learn squat doing this room on my own. It's only vids like this that make that site halfway worth a look at
I enjoyed watching you play the "the king of the hill", it was so exciting! Could you play the game with online streaming? Thx a lot 😊
I can certainly make more time for the King of the Hill games! Thanks so much for watching!
make more video bro i really love how you explain things
What ever you want
great video bro!
another cool video john 👍
"Say whatever you want" :)
love more videos like that....
I can't wait
can't wait!
i mean, you're called just the same as the old man in Jurassic Park, i mean what? ofc im going to suscribe!
How?? how can you mount the /var to your local machine?? I don't get it. Or is this some public folder?
What ever I want!!!!
Great vid man.. thx i learned quite a bit. just so your not wondering what happened the reason it didn't work on the first try with bin/bash was not making your "curl" script executable so it went for the file that was executable. it looked like you mentioned something along those lines in the text that ran across the vid but if not hope it helps someone... thx again
Hi John! did this box earlier and I can't figure one thing: if I cp ifconfig I get root but if I cp uname or curl it doesn't work. but if I echo those it does. what is the difference between cp and echo in this case ? parameters ? The bash script is indeed a good approach
May please someone clarify the following.
1. Is it a Linux machine or Windows one? Why it has drive C but when we SSH into it, we see a linux distro?
2. What exactly happened with mount command? Did we mount remote disk locally and why we need that?
Thank you, John for the great content!
to all of you who couldnt mount the nfs share ( i didnt have the helper file in the sbin directory and couldnt install it): just copy the id_rsa file into the kenobi share and download it like the log.txt with smbget - this works for me
ok in task4 there is my missing file and i could download this file to my station the same way, now i could also mount the nfs filesystem
hahahaaha I literally looked this video up just because I got stuck at the mount part, where you got confused I did aswell lol what r the chances
How did you search from within the man page like that?
very good video bro keep it up
You're awesome
whatever you want
what's book name mentioned you JH..? didn't get it
You did confuse me a bit. I solved that right up to the last question. I guess I'll get it after I watch this again. Tired myself so I just bailed.
i got stuck in the walkthrough so i jumped here
hey does anyone know what's the name of the note keeping app he is using?
Sublime text 3, you can download it from the Sublime website
Whatever you want
Hey there, i'm starting in THM but i've got some trouble with the wordlists of gobuster. I just can't find them.. Hope you could help me.
And i want to say that i love your videos ! I started with this web site thanks to you !
@@louisvdwalt thanks ! I found it a few days ago :)
bash by default drops the SUID bit
Nice!
If you want to get a space between text for the file name use this;
First\ second
25:16 ..privelege ecalation with path VENERIABLE?? LOL
lovely
How did you have your profile setup like that; the colorized filetype, size, user, and date? I haven't found anything on that.
Is there a better way to optimize /opt when installing programs/commands under it? modifying the owner to be $USER instead of root without the explicit chown command every time?
Oh, that output is the beautiful and lovely `exa`. You can get it at the.exa.website. I have set it as an alias for my `ls` command.
For making /opt usable for tools, I tend to just `chown -R $USER:$USER /opt`.
Thanks so much for watching!
@@_JohnHammond Thank you for the content! And thank you for the tips, I love exa already!
Hello There
Hello There!
I think I can I think I can I think I can.
THM > *
I wish i unmounted the folder!!!
oddly satisfying
Are you running all this locally on your machine, a VM, a VPS? I'm at a loss with switching between my Mac and a Linux VM
Glenn Bravy He is not using a VM, hes using a local installed OS of Ubuntu
Which tiling manager do you use and recommend?
Sure he mentioned in another video it is guake I tried would never use anything else
Are you calling a forward slash "whack"? Never heard that before.
It's quite common... Whacks, tacks, splats, and bangs:
cd / : "see dee whack"
ls -la /tmp : "ell ess tack ell ayy whack temp"
rm -f /tmp/file* : "arr emm tack f whack temp whack file splat"
sudo !! : "sue due bang bang"
You get used to it, but often it's easier to just say:
cd / : "see dee slash"
ls -la /tmp : "ell ess minus ell ayy slash temp"
rm -f /tmp/file* : "arr emm dash eff slash temp slash file star"
sudo !! : "sue due bang bang"
I personally appreciate "bang" over "exclamation mark" any day as not only does it save syllables, but it's kind of a cool homage to old school comics and/or cartoons where a speech bubble with just an exclamation would be over a character that had a gun pointed at them, or a flag with "BANG!" would come out of a gun (Looney Tunes).
But "whack" over "slash", "tack" over "dash", "splat" over "star" ... they don't really save you any syllables and tend to confuse most people. It's a novelty thing I guess, but I never really used them (outside of "bang").
11:10 huh..😅😅
super
Whatever I want ..
Back to Ubuntu? RIP Arch Linux
i didn't understand anything but i watch.
♥️
boom
0:45 true bro, no offense
same
Windows and Windows, oof
Anybody say Seth Rogen of the tech universe???
Like :)
Something in the comments... lol