HackTheBox - Love

Поделиться
HTML-код
  • Опубликовано: 2 янв 2025

Комментарии •

  • @PierreMandrou
    @PierreMandrou 3 года назад +21

    I'm feeling so nostalgic watching your video. The first time i watched your RUclips channel, i was a software engineer dreaming about knowing how to pwn boxes. 1 year after, i have oscp and currently work as a professional pentester.
    Thank you a lot for this amazing content, you have no idea how many of us consider you as our "hack daddy" 😂 !

  • @buhaytza2005
    @buhaytza2005 3 года назад +65

    13:30 Does anyone else just scream “file!!! Not fule!!” at their screen? My wife asked me who am I arguing with 🤣🤣

    • @buhaytza2005
      @buhaytza2005 3 года назад +3

      20:12 cursor was right there!!!

    • @djjoaosarmento
      @djjoaosarmento 3 года назад +2

      ippsec and his tunnel vision :D

    • @ippsec
      @ippsec  3 года назад +14

      Thankfully that’s not the issue hahaha

    • @buhaytza2005
      @buhaytza2005 3 года назад +3

      @@ippsec still… the OCD kills me. Futher down the road: cookes 🤣🤣
      Great content though, troubleshooting an exploit is hard for us script kiddies and you doing it live helps expand the mind map. Not just inserting print statements but showing us how a more functional exploit could be built on the back of what you found on searchsploit. BTW, ever thought of doing what John Hammond did and do a bit of reverse engineering on a video for the Kaseya ransomware code? With the level of detail you showcase it should be interesting to follow the thought process 🤷‍♂️
      As everyone else has said: thank you for the content, I was itching for your video - even after a bike (motorcycle) ride as I am still struggling with the damn Writer box 😡

    • @buhaytza2005
      @buhaytza2005 3 года назад

      @@djjoaosarmento tbh it just shows that our insecurities are warranted. That’s why I am not fast. I check every command twice before hitting enter - most of the time still doesn’t yield the desired result because I got the wrong exploit but at least I know it’s not because of a typo

  • @ramiahmed312
    @ramiahmed312 3 года назад +33

    You know by putting both your time & effort making such content u will be forever in our hearts …. Keep it up champ ..

  • @julianopl
    @julianopl 3 года назад +8

    The end of the video with debugging the exploit is just awesome! I mean, how many of us stops after rooting the box to understand what could've been done different? Where did it fail and why? Where did it work and why? These extra steps is what almost everyone misses when trying to get better on this cyber sec world... KUDOS as always Ippsec... just love your videos it really teaches me tons!!!

  • @chrisrice8836
    @chrisrice8836 3 года назад +14

    I always feel like a Fule when I notice I have a typo in a command....

  • @thepioneer517
    @thepioneer517 3 года назад +2

    IppSec you have been my teacher since i started with htb! Trank you for all your Videos

  • @124BHP
    @124BHP 3 года назад +1

    Awesome video. I have stopped wasting my time on social media and Started watching your videos. You are awesome

  • @uppilibadri2170
    @uppilibadri2170 3 года назад +3

    Thank you for all the good content! Stay safe and well!

  • @_tartofraise
    @_tartofraise 3 года назад +2

    I love your videos man, keep up the good work ;)

  • @richardjones9598
    @richardjones9598 3 года назад

    Thanks for all your content and tips, will definitely keep your words in mind for next time.

  • @engray685
    @engray685 3 года назад +6

    3:21 This is the syntax.
    sed -z 's/
    /\,/g'
    You have to specify the -z flag

  • @aryan7tiwary
    @aryan7tiwary 3 года назад +8

    You can use tr (translate) command for getting ports in a line. tr "
    " ","

  • @ChristopherPelnar
    @ChristopherPelnar 3 года назад +2

    I mentioned you in my AWS interview for a position on their RED Team. They knew who you were and asked me what I found so interesting about your videos. I told them your videos are like plugging into the Matrix and downloading vast amounts of information in a small amount of time.

    • @ippsec
      @ippsec  3 года назад +3

      Awesome, great to hear! Hope you get the job!

  • @MrJCollector
    @MrJCollector 3 года назад

    Hi IppSec and guys, I am running into some issues while running WinPEAS (Basically on Windows). Just like you mentioned at 46:56, what are some other methods of executing it?

    • @cadenfore8298
      @cadenfore8298 3 года назад +1

      What’s the error or issue you are having?

  • @ibnsaltus
    @ibnsaltus 3 года назад

    I think when using the 2to3 program, it shows the changes that should be applied to convert it to py3, but doesn’t actually write anything to the file, there’s a flag that I can’t remember you need to supply in order to actually write the changes

  • @hidayatbachtar
    @hidayatbachtar 3 года назад

    53:58 why using MSI? its because AlwaysInstallElevated is automaticly use System / administrator to installed MSI?

    • @LoayMatar
      @LoayMatar 2 года назад

      Living-off-the-land.

  • @DjZyklon
    @DjZyklon 3 года назад +2

    I think your idea of returning something from functions is just healthy programming. I can't imagine how painful it is debugging scripts that don't do that at scale.

  • @somebodystealsmyname
    @somebodystealsmyname 3 года назад +1

    I guess the video is old? I did the box the day before it was retired and on 06/05/2021 a new exploit (EDB 49843) was published that lets you bypass the admin authentication for the voting system. But this also means, that you miss the SSRF completely.

  • @hashibi-d4d
    @hashibi-d4d 2 года назад

    what i learn from this video is the phrase _"speak of the devil"_

  • @rafaelfonseca6163
    @rafaelfonseca6163 3 года назад +1

    Great video!. I got foothold in a different way. I noticed there was a sqli in the login form, then I use sqlmap to spawn a shell. To get the complete location of the website in the file system, I had to generate an error in the login form.

  • @ul7987
    @ul7987 3 года назад +1

    not sure why `cme` doesn't work like yours.

  • @flawlesscode6471
    @flawlesscode6471 3 года назад

    You could use rustscan to speed up your nmap enumeration.

  • @Dave-ll2fm
    @Dave-ll2fm 3 года назад

    Any idea why we can't execute msi files while connected via winrm?
    I found Phoebe's password in the web server config files and connected via winrm. I spent forever trying to execute an msi file while connected via winrm but it would not work.

  • @stefanosbek
    @stefanosbek 3 года назад +1

    Could someone please explain why we fuzzed those ports using the file scanner request and the significance of port 5000?

    • @deepb5204
      @deepb5204 3 года назад +1

      Look up SSRF vulnerability. Nothing special about port 5000, it's just serving a HTTP webpage but port 5000 is forbidden, but not when the connection is from the internal network (that'd be SSRF).

  • @y784y
    @y784y 3 года назад +1

    Ty🙃

  • @salluc1712
    @salluc1712 3 года назад

    Thank you so much ❤️

  • @yamunaudayanthi3266
    @yamunaudayanthi3266 3 года назад

    Super video...❤️❤️🤟

  • @aminhatami3928
    @aminhatami3928 3 года назад

    Respect.

  • @TheErixcode
    @TheErixcode 3 года назад

    Scan+Fule?

  • @raj77in
    @raj77in 3 года назад

    Nice one btw for removing newlines you can use tr

  • @simplaysgames1967
    @simplaysgames1967 3 года назад

    A solution to your Google'ing problem, instead of going to google.com each time, you can press the down button on your keyboard, or click the google icon and it will search in google. Or you can start the searches with @Google
    Hope this helps a little

  • @SweatSculptSucceed
    @SweatSculptSucceed 3 года назад +1

    Could you have uploaded the magic bytes to an image and then uploaded a reverse shell that way

  • @marsanmarsipan
    @marsanmarsipan 3 года назад +2

    He have another week to fix his google search, guess he dont have the time tho.
    I think using scripts on the user exploit was a long travel in my eyes, the easyest thing here was just to upload a script manually imo. I didnt catch the root esc so just user for me on this one :/

  • @luoc3415
    @luoc3415 3 года назад

    File , Not Fule

  • @aniketkokate20
    @aniketkokate20 3 года назад +2

    First View!!

  • @900dm4n
    @900dm4n 3 года назад

    Lmao our legend still haven't fix his google search
    Keep us waiting huh?

  • @boogieman97
    @boogieman97 3 года назад +1

    The exploit uses a session.post, setting a proxy with a session is slightly different than with requests.post. That's why it didn't work. Really like your videos, but sometimes you are a bit hasty impatient.

  • @elfinpok
    @elfinpok 3 года назад +1

    ok

  • @potatoonastick2239
    @potatoonastick2239 3 года назад +3

    >still hasn't fixed his google

  • @nnawaff
    @nnawaff 2 года назад

    /votingsystem/ == /

  • @nikolausseverson4537
    @nikolausseverson4537 Год назад

    Fuff faster your Fules.

  • @sakisekiz
    @sakisekiz 3 года назад

    ippsec when ı broke up my girlfriend.