I think getting a root shell was possible. Correct me if I am wrong, but since `cat` was an SUID binary, it could've been used to overwrite the `shadow` and `passwd` file to add a new user, then overwrite the `sudoers` file to give it full sudo access to the system as root, then simply `su` to the new user, and do cleanup later on.
As always really informative video! Could you maybe do like a tutorial or introduction video for pwncat and show your tricks and usage with it? Would be really awesome I think!
@@asitbiswas6217 The most well-known commands are well known for a reason. For example "awk" is really commonly used because of its versatility, and to use it *well* you'll need to learn a lot of syntax (i.e, it's not necessarily the command itself, but how you use it). If you're looking for something that's less well-known you can search up " linux tool" and 99% of the time it'll have something.
@@_JohnHammond Hi John, I instead suggest to make a video on data exfil methods like with nc and other tools. Kind like what we can use during a HTB machine. Great video as always ❤
John Hammond, you rock! I wanted to tell you that in addition to helping Mr RUclips Algorithm find your videos.
I have learned a bit from you so far, great content buddy!
21:42 this part is epic, true work of art here :|
Great video man. These help out a lot especially if you do them straight through, to see the thought process of a senior security professional.
Master John, thank you again... love the vid
Great to follow the journey through the box
just starting out and learning alot. Thanks
You are learning still 😬. I am sooo lost 🤣🤣. Love the vids, just getting interested in all this stuff and the beginner lvl baffles me.
John Hammond tu est vrement tres tres fort
Cool video. I learn new things - great. Thanks John Hammond!
Nice vid man. Really interesting to watch you work. Thanks!
Incredible stuff as always, John
Man!! that's just impressive....
Great content! I love learning from your videos. Super helpful
I think getting a root shell was possible. Correct me if I am wrong, but since `cat` was an SUID binary, it could've been used to overwrite the `shadow` and `passwd` file to add a new user, then overwrite the `sudoers` file to give it full sudo access to the system as root, then simply `su` to the new user, and do cleanup later on.
Very cool to watch, keep it up!
quality content
Thanks to you John, you rocks!!!
Thanks for the walkthrough🔥
Hi, this ctf has some webpage of past events ?
sir.. i have work .. bt still m watching.. like fuck it.. John Hammond is the new netflix 4 me
John please please plzzz make a video on Request Smuggling 101 plz, i want this attack explanation from u bcoz i feel u are best explainer.
As always really informative video! Could you maybe do like a tutorial or introduction video for pwncat and show your tricks and usage with it? Would be really awesome I think!
loved the vid :D first time catching a premier from you lol
Hi. How did you switch from remote to local when using pwncat?
I think its ctrl + d
Nice video 👍
great
damn you're a wizard
Delphine? :o
could have cat /root/.ssh/* and maybe found a private key? who knows. nice vid dude!
I was thinking the same. Or possibly crack Belle's hash from /etc/shadow and then privesc from her access level.
make a video about advanced linux commands
What Linux commands do you consider "advanced"?
Every RUclipsr make video like common linux command
@@asitbiswas6217 The most well-known commands are well known for a reason. For example "awk" is really commonly used because of its versatility, and to use it *well* you'll need to learn a lot of syntax (i.e, it's not necessarily the command itself, but how you use it).
If you're looking for something that's less well-known you can search up " linux tool" and 99% of the time it'll have something.
@@_JohnHammond Hi John, I instead suggest to make a video on data exfil methods like with nc and other tools. Kind like what we can use during a HTB machine.
Great video as always ❤
password123 if not password it's super protected.
Home key /ind key
....u said this was beginner ...handholding penetration testing ..........
Ok full eg simple
Ummm hello I guess
thank for these man!!
edit: I've been using *nix/bsd since mid 90s and your skills really 10^10 increased my pen tools knowledge base. -haxbwn0r!-