HackTheBox - Blackfield

Поделиться
HTML-код
  • Опубликовано: 10 ноя 2024

Комментарии • 49

  • @loganmay2105
    @loganmay2105 4 года назад +3

    Had a lot of fun with this one, always love seeing how you do things differently. The BloodHound idea was really great, I'll admit I just guessed based on the fact it was a support account. Great job!

  • @ul7987
    @ul7987 3 года назад +3

    lmfao @46:56. Dude I was laughing so hard watching this. I was like: "looks good to me....oh wait....." omg.... thanks for the videos ippsec. As a complete noob, I've learned a ton from you!

  • @Marselmarsemars
    @Marselmarsemars 2 месяца назад

    I've loved to do box myself and then watch ippsec's walkthrough

  • @DHIRAL2908
    @DHIRAL2908 4 года назад +26

    You always make it seem easy lol! At the time of doing it, I didn't even think of doing this and that!

  • @macgyver1761
    @macgyver1761 6 месяцев назад

    Şahane 🎉 Etkileyici bi yaklaşım. Eline sağlık ❤

  • @jasmeetsinghsaroya
    @jasmeetsinghsaroya 3 года назад +1

    Very good explanation !
    the last column can be printed using $NF
    #cat kerbrute-userenum.txt | grep -i black | awk {'print $NF'}
    audit2020@blackfield
    support@blackfield
    svc_backup@blackfield

  • @armandkruger911
    @armandkruger911 3 года назад +1

    This is a very realistic attack approach , following the path of least resistance

  • @amitreddy6148
    @amitreddy6148 4 года назад +4

    I don't understand most of the stuff right now but keep on uploading! I'm sure I'll get to that level someday

    • @UN5T48L3
      @UN5T48L3 4 года назад +1

      Of course!
      If you are following ippsec and you are a curious person, then you are definitely on right path. 🖖🏼

  • @mehmetux4186
    @mehmetux4186 4 года назад +3

    After many weeks Still amazing work but after watching one hours every week i feel foregeiner in my terminal.

  • @kalidsherefuddin
    @kalidsherefuddin Год назад

    The great work

  • @goebbelsx
    @goebbelsx 4 года назад

    Also, can you please recommend us which your videos help us to do HTB offshore lab? I just bought it and it seems hard for me. Which boxes will help us do offshore?

  • @mayankdeshmukh8752
    @mayankdeshmukh8752 4 года назад

    Great explanation !

  • @amishra2236
    @amishra2236 4 года назад +1

    Amazing 👍

  • @Reelix
    @Reelix 4 года назад +5

    Got the svc_backup NTLM hash - Tried to crack it - Failed - Moved on.
    Didn't think of passing it to login >_

  • @MoScoopTV
    @MoScoopTV 3 месяца назад

    Thats a lot work man

  • @goebbelsx
    @goebbelsx 4 года назад

    I have question. why you switched from kali to parrot os? is it because of some reason or is it just personal preference.

  • @kret63
    @kret63 4 года назад

    Crazy stuff

  • @magnfiyerlmoro3301
    @magnfiyerlmoro3301 4 года назад

    why is it not for -d in kerbrute blackfield.local instead of blackfield ? thanks

  • @utkarshagrawal6060
    @utkarshagrawal6060 3 года назад

    Hi Ippsec, Just one doubt, I read that for winrm exploitation, port 5985, 5986 must be open in the remote host but I can't see any port open in your case but still you got pwned.
    How? What am I missing?

    • @mukeshsingh7069
      @mukeshsingh7069 2 года назад

      It is always a good idea to perform a Full Port Scan with -p- option. You will see the Port is open.

  • @jonathangasca8287
    @jonathangasca8287 4 года назад

    were the machine hashes invalided? can you just create silver tickets and skip low priv user?

  • @Deep_880er
    @Deep_880er 4 года назад

    informative :)

  • @jonathangasca8287
    @jonathangasca8287 4 года назад

    also isnt winrm usually limited to administrators?

    • @Ivan_lulz
      @Ivan_lulz 3 года назад +2

      No need for admin, the user just needs to be in the Remote Management Users group

  • @Ms.Robot.
    @Ms.Robot. 4 года назад

    I watched this twice 💋💖😍

    • @wolfrevokcats7890
      @wolfrevokcats7890 Год назад

      I watch this many times, thanks ippsec. Learned a lot from you

  • @tyrewald9083
    @tyrewald9083 4 года назад

    Not my topic, but well taught!

  • @elmehdielkorri6362
    @elmehdielkorri6362 4 года назад

    I think that enum4linux can give you the shares as well the users

    • @ippsec
      @ippsec  4 года назад +1

      It's possible, but I really hate that script. It's a bunch of perl that wraps around the rpc/smbclient commands I use but hasn't been updated for a long time.

    • @iLionSilver
      @iLionSilver 4 года назад

      No , it will not work

    • @element-1254
      @element-1254 2 года назад

      @@ippsec cddmp's enum4linux is kinda updated, its a python3 script. it does the same thing like original enum4linux + some other features

  • @someyounggamer
    @someyounggamer 4 года назад

    Senpai

  • @rev0luci0n
    @rev0luci0n 4 года назад +1

    Thanks IppSec! BTW I searched ippsec.rocks for zero login but the video for Multimaster doesn't show up

    • @MoxResearcher
      @MoxResearcher 4 года назад

      Well, here is a link to the video. ruclips.net/video/iwR746pfTEc/видео.html

    • @csmole1231
      @csmole1231 4 года назад

      i see someone created a pull request on that website's github page! to include video after fatty into the dataset! literally 9 hours ago!
      we shall have those video searchable soon oh yeeaaah!

    • @csmole1231
      @csmole1231 4 года назад

      i should learn how to do that😂

    • @rev0luci0n
      @rev0luci0n 4 года назад

      @@MoxResearcher yeah all good I knew the video was just informing that the website cannot search for it yet, cheers.

  • @punitdarji1871
    @punitdarji1871 4 года назад

    Try out Vulnmachines labs

  • @oussamasky1
    @oussamasky1 4 года назад +1

    Hi

  • @pratiksawant8119
    @pratiksawant8119 4 года назад +2

    First Here 😁

  • @philn19872
    @philn19872 Год назад

    Anyone going through this and wondering how to get round the "smb share only creating one folder" problem. In the smb.conf file, under your share options, add the line:
    inherit permissions = yes
    I mounted a share in the /mnt directory and had no issues with this
    🤘

  • @wolfrevokcats7890
    @wolfrevokcats7890 Год назад

    32:10 rpcclient -U support%#00^Blacknight 10.10.10.192
    Use this if you don't to keep repeating typing the same password over and over again in lab/ctf, but please take note that the password will be visible in history. Don't use this in a real production environment