HackTheBox - Jupiter

Поделиться
HTML-код
  • Опубликовано: 1 окт 2024

Комментарии • 29

  • @tortotifa5287
    @tortotifa5287 11 месяцев назад +13

    As always, thanks for these videos !

  • @lonelyorphan9788
    @lonelyorphan9788 11 месяцев назад +8

    Ippsec rocks! 🙂 Awesome video as always! I liked the end. I didn't know about the privileges with cron jobs either. Thank you for your content!

  • @tntxqx8281
    @tntxqx8281 11 месяцев назад +6

    In 12:24 you can get raid of "==" by running echo -n

  • @c0ri
    @c0ri 11 месяцев назад +2

    Very cool man.. I can't beleive I never knew about the ~C dropping to ssh shell so you could port forward from there. Very handy thanks!

  • @ImShivaMaharjan
    @ImShivaMaharjan 11 месяцев назад +2

    Great content as always. But as you mentioned the ssh would only work if the /root/.ssh folder existed, but as we can see in 30:14, the sattrack binary created any folder if it didn't existed already. So, I think it would still work.

  • @aniket4652
    @aniket4652 11 месяцев назад +2

    I'm not getting rev shell in the zipping machine after bypassing the upload vulnerability...can anyone help me

  • @SplitUnknown
    @SplitUnknown 11 месяцев назад +1

    Root was fun in this box 😮 and strange way to get shell😀 fun box thanks 🔥♥️

  • @_hackwell
    @_hackwell 11 месяцев назад +1

    as always excellent video. I learnt zillions of things thanks to you !

  • @kosmonautofficial296
    @kosmonautofficial296 11 месяцев назад +1

    That is really interesting. I wonder if this raw SQL from the client is the same when other SQL servers are connected. Like I thought there was some built in database, and you could also specify another for some data. I could really see it happening where people didn't know this and connect to a database that accidentally has more important info. I had no idea about the copy command and that you could get bash command execution from it.

    • @mateuszgierblinski
      @mateuszgierblinski 11 месяцев назад

      When I initially created the box I tested it with MySQL and it was exactly the same. The effect was not as dramatic as here but you are still allowed to query the database however you want.

  • @AUBCodeII
    @AUBCodeII 11 месяцев назад +1

    Oh, Ipp, I regret not starting doing free retired boxes way earlier. Could've done them since at least February 2021. If I started back them I would have completed over 100 boxes! Probably would have enough knowledge to ace OSCP.

    • @ippsec
      @ippsec  11 месяцев назад +3

      Certainly would - With all the videos you have been watching, it wouldn't surprise me if you're in better shape for the OSCP than you think.

    • @AUBCodeII
      @AUBCodeII 11 месяцев назад

      @@ippsec Thanks for the pep talk ❤

  • @NicolastheThird-h6m
    @NicolastheThird-h6m 11 месяцев назад

    I could'nt see the /api/ds/query request in grafana when i did this box, not sure why but i think the request must be inconsistent or cached.

  • @berthold9582
    @berthold9582 11 месяцев назад

    It's crazy ippsec is too much. It was so cool looked at the horizontal privilege escalation 😮

  • @solcloud
    @solcloud 11 месяцев назад

    Thank you for awesome video 👍

  • @sand3epyadav
    @sand3epyadav 11 месяцев назад

    We was missing your videos❤❤

  • @Ms.Robot.
    @Ms.Robot. 11 месяцев назад

    This was well thought out.❤

  • @OmphemetseMokene
    @OmphemetseMokene 11 месяцев назад

    Great vid my mentor.

  • @heapbytes
    @heapbytes 11 месяцев назад

    16:38 how did u opened the ssh> prompt ? what keystroke ??

    • @ippsec
      @ippsec  11 месяцев назад +1

      Hit enter then the first thing you type is ~c

  • @TadakichiSan777
    @TadakichiSan777 11 месяцев назад

    Been always wondering why do you have to base64 encrypt when trying to get a reverse shell using burp? I mean all the commands before were plain text.

    • @ippsec
      @ippsec  11 месяцев назад +1

      You don't have to but where my commands ran, I was already inside of a " and ' -- which means if I wanted to use those characters I'd have to escape them. I rarely get the syntax right the first time in that scenario. For example, escaping " could be \", or if i have to escape the \, it could be \\\", and its just painful to keep track of all the quotes/escapes. When that fails, there are multiple reasons why it failed and operator error is high on the list.
      So to make it easy, I first try encoding the command which removes the ". If it does fail, then the super likely reason to why it failed is that | is a bad character and I can move onto another way like using curl to drop a file and execute a file. If it failed with quotes there is just more troubleshooting I'd have to do as I don't know exactly why it failed.

    • @TadakichiSan777
      @TadakichiSan777 11 месяцев назад

      @@ippsec thanks for the Exploration

  • @tg7943
    @tg7943 11 месяцев назад

    Push!