TryHackMe! Sudo - CVE-2019-14287

Поделиться
HTML-код
  • Опубликовано: 19 окт 2024

Комментарии • 82

  • @ProfessorParno
    @ProfessorParno 4 года назад +67

    1:44 - port scanning /w nmap
    2:43 - Web vulnerability scanning w/ Nikto
    2:50 - finding web dir /w gobuster
    6:18 - cracking password /w hydra
    7:11 - FTP login
    10:17 - doing some forensic stuff
    11:20 - cracking zip file
    14:54 - SSH & finding task 4 answer
    20:48 - Privilege Escalation
    Always fun to watch John Hammond doing some TryHackMe room, hope my channel can grow as good as John Hammond

    • @DDBAA24
      @DDBAA24 4 года назад +1

      I was just watching an ippsec vid and he has chapters with titles and descriptions that display when you hover over the seek bar. I guess this is a new feature in RUclips , at least its the first time I've noticed it. The feature should save you some keystrokes 👍🏻

    • @_JohnHammond
      @_JohnHammond  4 года назад +12

      This is AWESOME! Thank you so much for the timestamps, I really need to put stuff like this in my other videos!

    • @anantikatokas7149
      @anantikatokas7149 2 года назад

      All your videos are amazing 👍!!

  • @Kimbojangles
    @Kimbojangles 4 года назад +22

    I don’t know why, but I find your TryHackMe! videos to be super relaxing. I only vaguely understand what you’re doing, because I don’t possess any of this IT knowledge that you’re implementing. Thanks for the great content.

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Happy to hear that! You'll definitely pick up the skills and the IT knowledge if you keep watching more, I think! Thanks so much for watching and thanks for all the kind words!

  • @cosmintibuleac969
    @cosmintibuleac969 2 года назад +2

    Agent Sudo is so awesome, especially if you're like me and have never gotten into steganography. Not to mention seeing you doing it with your knowledge is even more awesome! Thank you, John!

  • @QzSG
    @QzSG 4 года назад +1

    It makes me happy that what you did was more or less what I wrote in my writeup as a beginner back in December, awesome that I did it like you too!

  • @matncerqueira
    @matncerqueira 4 года назад

    I just got here (on your channel) this week and i'm learning a lot from your videos, thank you! Keep doing them, they are awesome!

  • @neilthomas5026
    @neilthomas5026 4 года назад +1

    I love how every morning I wake up and there is a new video waiting and new things to learn!! Very cool video :)

    • @_JohnHammond
      @_JohnHammond  4 года назад +1

      Hopefully I can keep up the every-week-day uploads! Thanks so much for watching!

  • @benkato_
    @benkato_ 4 года назад +3

    Your videos are rlly chill and I like to watch solve CTFs that I solved :D
    Thanks for uploading :3

    • @Noah-hk4ec
      @Noah-hk4ec 4 года назад +1

      Du auch hier

    • @_JohnHammond
      @_JohnHammond  4 года назад +1

      Happy to hear that! Thanks so much!

    • @benkato_
      @benkato_ 4 года назад

      @@Noah-hk4ec
      Schon lange xD

  • @cristhianz91
    @cristhianz91 4 года назад +1

    Nice room John! I've learned some nice stuff with this video. I'm new in the hacking world, I started in THM a week ago and I'm learning a lot. Keep up with the good content, greetings from Argentina!

  • @mangalangnanasegaram6536
    @mangalangnanasegaram6536 8 месяцев назад

    Addicted to John's explanations

  • @daheck81
    @daheck81 4 года назад +6

    19:26 *"2.2.3 Crash at Corona."*
    Theyve planned this whole thing back then already 😦

  • @SAinTIdiVAca
    @SAinTIdiVAca Год назад +1

    How did you know to try curling the website with an added header? That seems so random is that a very common technique?

  • @1nd0m1t
    @1nd0m1t 8 месяцев назад

    nice!!
    In this machine Linpeas reported permissions in lxd so I mounted a container and get root. I didn't know about this CVE :')

  • @thatcrockpot1530
    @thatcrockpot1530 4 года назад +10

    Of course I never get to exploit this bug when I want to find it, but I watch a video and there it is :)
    Good video tho!

    • @_JohnHammond
      @_JohnHammond  4 года назад +1

      Thanks so much! And thanks for watching!

    • @thatcrockpot1530
      @thatcrockpot1530 4 года назад +1

      @@_JohnHammond I'm 22 but I wanna be like you when I grow up hahaha

  • @Prim1TiveCH
    @Prim1TiveCH 4 года назад

    enumeration videos like this is great to learn file extractions and finding hidden stuff

  • @dwpersGC
    @dwpersGC 3 года назад +1

    say it with me John - 'autoSPY'...the box is agent sudo after all :D

  • @tentra7548
    @tentra7548 4 года назад

    damn dude, subscribing forsure! Awesome content in all your videos. Thanks a mil for the knowledge. :)

  • @MultiBiggie007
    @MultiBiggie007 2 года назад

    thanks for making these videos. helpfull to see someone elses sollution!

  • @mi2has
    @mi2has 4 года назад

    hydra part was great. i watched your CTF videos from 2018 and it was very useful? Do you have a place where all your past videos can be listed?

  • @checknate8820
    @checknate8820 4 года назад

    Why did you immediately chose binwalk when you found that string in the png? I personally spent time using stegcracker on both images hoping there was some regular form of stenagraphy

  • @kumarniloy3893
    @kumarniloy3893 3 года назад

    ngl I was also fetching Alien_autopsy.jpg , fun room and great video as always !

  • @prohat7674
    @prohat7674 4 года назад +5

    You make very good tutorials 🖒

    • @_JohnHammond
      @_JohnHammond  4 года назад +2

      Thank you so much! Appreciate all the kind words!

    • @damienkali
      @damienkali 4 года назад

      @@_JohnHammond Hi John, would love to see more Windows side stuff, Im currently studying for OSCP & I know there is a lot of Windows based, most of the stuff we tend to learn from CTF is all linux based, which is fine, for e.g. Could you do a review or something along the lines of using tools like psexec.py, crackmapexec etc... More Active Directory based attacks (or your next video for Attactive Directory) :) Thank you

  • @Godmil
    @Godmil 5 месяцев назад

    oh man, I spent sooo long trying to find a steno tool that would work with PNG files... when I eventually tried binwalk I then spent ages trying to work out how to extract the extra data... had no idea binwalk would do that for me :D

  • @davidraymond7420
    @davidraymond7420 4 года назад

    Nice one, thanks, always cool to watch 👍

  • @DHIRAL2908
    @DHIRAL2908 3 года назад

    Those fonts at 0:42 look cool!!! What are they called?

  • @MD4564
    @MD4564 4 года назад

    Thank you very much, how long does hydra normally take?

  • @hermansildnes2806
    @hermansildnes2806 4 года назад

    I would love a video on how you setup kali and all your tools. These tryhackme vids are awesome tho!

  • @code4720
    @code4720 4 года назад

    thanks i learned so much

  • @maxabbasov9016
    @maxabbasov9016 4 года назад

    John, how do you use kali tools on Ubuntu? You installed them with Katoolin?

  • @SunDevilThor
    @SunDevilThor 2 года назад

    I got stuck on the zip file section. I did not see anything related to that. I’ll have to research the “binwalk” command, since this is the first time I’m hearing about it.

  • @ElChowDinamico
    @ElChowDinamico 4 года назад +1

    Had to come here for the image title lmao

  • @anonded
    @anonded 4 года назад

    omg very informative... like even for starters. greatwork!

  • @sebi9721
    @sebi9721 4 года назад

    Sry for this question, but I am really knew to this stuff. How can I access to the scripts which you are using?

  • @ghadeeralhayek4373
    @ghadeeralhayek4373 4 года назад

    dud ,what is the name of the music in the end of the video ?

  • @MaximusIA
    @MaximusIA 4 года назад

    Thanks man

  • @alexfullstop
    @alexfullstop 4 года назад

    You are amazing

  • @khalidaldrouby719
    @khalidaldrouby719 4 года назад +1

    What type of machine are you using ? is it a ubuntu VM if yes would you share the tools installed on it. i also assume your using tmux. great content btw

    • @arwl
      @arwl 4 года назад

      John uses Terminator rather than tmux

  • @pedrofontes8441
    @pedrofontes8441 4 года назад

    what terminal emulator are u using john?

  • @therealgunny
    @therealgunny 4 года назад

    your videos are very entertaining, keep going D:

  • @Laflamablanca969
    @Laflamablanca969 4 года назад

    The pain in this entire video is the exact reason I purchased a subscription with Tryhackme lol... so much faster and a lot more stable.

  • @cocosloan3748
    @cocosloan3748 4 года назад

    Very cool!

  • @orgozlan323
    @orgozlan323 4 года назад

    Great video!

  • @waheedmurad4223
    @waheedmurad4223 4 года назад

    your cam is on the command way

  • @bulutkumbul_
    @bulutkumbul_ 3 года назад

    i used burp suite for change the user agent to C in repeater but it didnt work?

  • @zeg0noidpils26
    @zeg0noidpils26 4 года назад

    Really cool!

  • @tannercampbell
    @tannercampbell 4 года назад

    I’m sure your asked a lot but do you have a link or guide to install the tools on Ubuntu your using?

  • @malifalitiko495
    @malifalitiko495 3 года назад

    You can also do this with lxd privesc.

  • @knowledgeboy6137
    @knowledgeboy6137 4 года назад

    Hi can you make walkthrough the burp suite room. it is not free but want to learn this badly.

  • @munakk1981
    @munakk1981 4 года назад

    Thanks for the tutorial.....

  • @ashutoshpanda4336
    @ashutoshpanda4336 4 года назад

    After ubuntu 20 arch you came back to 16 why 🙄🙄

  • @richieparkerich9202
    @richieparkerich9202 4 года назад

    when trying crack the zip2john file i named " cracked.txt" is not working any ideas ? i have the output
    john --wordlist=/usr/share/wordlist/rockyou.txt cracked.txt
    Using default input encoding: UTF-8
    Loaded 1 password hash (ZIP, WinZip [PBKDF2-SHA1 256/256 AVX2 8x])
    No password hashes left to crack (see FAQ)

    • @sanlan9755
      @sanlan9755 3 года назад

      I have the same problem. Did you find a solution?

  • @ca7986
    @ca7986 4 года назад

    ♥️

  • @SARAVANATECH
    @SARAVANATECH 4 года назад

    Super.....

  • @TEAM4o4
    @TEAM4o4 3 года назад

    ❤️❤️😍

  • @padaloni
    @padaloni 4 года назад

    cool vid, but it's super annoying having your face over the commands your typing lol can you move the active console pane to the top or hide your camera when typing?

  • @floatingblaze8405
    @floatingblaze8405 4 года назад

    2 openvpn connection just like in the king of the hill live

    • @_JohnHammond
      @_JohnHammond  4 года назад

      I'm so bad with that -- I really need to script that to kill it and bring it back as just one instance! Thanks for watching!

  • @nangianilkumar1428
    @nangianilkumar1428 4 года назад

    I'ld like to learn basics for free give me advice as soon as possible pls

  • @yashpatel-vf8zq
    @yashpatel-vf8zq 4 года назад

    make videos editing hangout streams !! 😀

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Bash files open

  • @Anth0ny001
    @Anth0ny001 4 года назад

    good tutorial.. but too fast.

  • @dreamlands627
    @dreamlands627 Год назад

    13:03

  • @mattplaygamez
    @mattplaygamez 3 года назад

    Im the 1000 liker

  • @0x2fd
    @0x2fd Год назад

    it was not easy :s

  • @VeNoM____
    @VeNoM____ 3 года назад

    Everything goes smoothly until i have to use John The Ripper piece of crap software that is completely broken and bugged lol

  • @sgaleta
    @sgaleta 4 года назад

    I feel like the last couple of videos have been unpolished at the begining.
    I feel like i takes 0 effort to clear stuff from previous videos, deploy the machine, make a directory and open a text file with the IP copied.
    In my opinion this can all be done before the video starts thus avoiding the first/first and a half minute of the video.

  • @alexpearce3083
    @alexpearce3083 4 года назад

    ahahhahaha, cringe. i dont wanna see that!!!!!

  • @clementhenriet9779
    @clementhenriet9779 3 года назад

    Your videos are Nice to watch but You're way too fast and don't explain very much Sadly