Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 43

  • @XiSparks
    @XiSparks 4 года назад +24

    John Hammond, you rock! I wanted to tell you that in addition to helping Mr RUclips Algorithm find your videos.

  • @montgomery4340
    @montgomery4340 4 года назад +17

    I have learned a bit from you so far, great content buddy!

  • @lonelycount1
    @lonelycount1 4 года назад +3

    21:42 this part is epic, true work of art here :|

  • @CB-gi7kd
    @CB-gi7kd 4 года назад +1

    Great video man. These help out a lot especially if you do them straight through, to see the thought process of a senior security professional.

  • @fabiancostamoling
    @fabiancostamoling 4 года назад +4

    Master John, thank you again... love the vid

  • @sammo7877
    @sammo7877 4 года назад

    Great to follow the journey through the box

  • @mcncyo
    @mcncyo 3 года назад

    just starting out and learning alot. Thanks

  • @0101UnknownUser
    @0101UnknownUser 3 года назад

    You are learning still 😬. I am sooo lost 🤣🤣. Love the vids, just getting interested in all this stuff and the beginner lvl baffles me.

  • @angelineguo7527
    @angelineguo7527 3 года назад

    John Hammond tu est vrement tres tres fort

  • @claudiafischering901
    @claudiafischering901 3 года назад

    Cool video. I learn new things - great. Thanks John Hammond!

  • @AsmodeusMictian
    @AsmodeusMictian 3 года назад +1

    Nice vid man. Really interesting to watch you work. Thanks!

  • @seclilc
    @seclilc 4 года назад +1

    Incredible stuff as always, John

  • @popooj
    @popooj 4 года назад

    Man!! that's just impressive....

  • @cooliceman0001
    @cooliceman0001 3 года назад

    Great content! I love learning from your videos. Super helpful

  • @sohailsaha7427
    @sohailsaha7427 3 года назад

    I think getting a root shell was possible. Correct me if I am wrong, but since `cat` was an SUID binary, it could've been used to overwrite the `shadow` and `passwd` file to add a new user, then overwrite the `sudoers` file to give it full sudo access to the system as root, then simply `su` to the new user, and do cleanup later on.

  • @michel_dutch
    @michel_dutch 4 года назад

    Very cool to watch, keep it up!

  • @mi2has
    @mi2has 4 года назад

    quality content

  • @gamlielhernandez974
    @gamlielhernandez974 4 года назад

    Thanks to you John, you rocks!!!

  • @shadowconn4376
    @shadowconn4376 4 года назад

    Thanks for the walkthrough🔥

  • @pwndumb2903
    @pwndumb2903 3 года назад +1

    Hi, this ctf has some webpage of past events ?

  • @subhamkrnavneet7110
    @subhamkrnavneet7110 4 года назад

    sir.. i have work .. bt still m watching.. like fuck it.. John Hammond is the new netflix 4 me

  • @goodboy8833
    @goodboy8833 4 года назад +2

    John please please plzzz make a video on Request Smuggling 101 plz, i want this attack explanation from u bcoz i feel u are best explainer.

  • @colinschaffer320
    @colinschaffer320 4 года назад +1

    As always really informative video! Could you maybe do like a tutorial or introduction video for pwncat and show your tricks and usage with it? Would be really awesome I think!

  • @LapisOnTheMoon
    @LapisOnTheMoon 4 года назад

    loved the vid :D first time catching a premier from you lol

  • @ichigok2594
    @ichigok2594 4 года назад +1

    Hi. How did you switch from remote to local when using pwncat?

  • @aakashgautam3851
    @aakashgautam3851 4 года назад

    Nice video 👍

  • @SecurityTalent
    @SecurityTalent 2 года назад

    great

  • @jameselliot9114
    @jameselliot9114 3 года назад

    damn you're a wizard

  • @user-lk5qz4wx4q
    @user-lk5qz4wx4q 4 года назад +1

    Delphine? :o

  • @padaloni
    @padaloni 4 года назад +2

    could have cat /root/.ssh/* and maybe found a private key? who knows. nice vid dude!

    • @mattsmelser
      @mattsmelser 4 года назад +1

      I was thinking the same. Or possibly crack Belle's hash from /etc/shadow and then privesc from her access level.

  • @asitbiswas6217
    @asitbiswas6217 4 года назад +1

    make a video about advanced linux commands

    • @_JohnHammond
      @_JohnHammond  4 года назад +5

      What Linux commands do you consider "advanced"?

    • @asitbiswas6217
      @asitbiswas6217 4 года назад

      Every RUclipsr make video like common linux command

    • @NullPxl
      @NullPxl 4 года назад

      ​@@asitbiswas6217 The most well-known commands are well known for a reason. For example "awk" is really commonly used because of its versatility, and to use it *well* you'll need to learn a lot of syntax (i.e, it's not necessarily the command itself, but how you use it).
      If you're looking for something that's less well-known you can search up " linux tool" and 99% of the time it'll have something.

    • @anubhav9476
      @anubhav9476 4 года назад

      @@_JohnHammond Hi John, I instead suggest to make a video on data exfil methods like with nc and other tools. Kind like what we can use during a HTB machine.
      Great video as always ❤

  • @hellcatchuck2723
    @hellcatchuck2723 3 года назад

    password123 if not password it's super protected.

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Home key /ind key

  • @AmanSharma-il3hd
    @AmanSharma-il3hd 3 года назад

    ....u said this was beginner ...handholding penetration testing ..........

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Ok full eg simple

  • @ARZ10198
    @ARZ10198 4 года назад

    Ummm hello I guess

  • @djosearth3618
    @djosearth3618 2 года назад

    thank for these man!!
    edit: I've been using *nix/bsd since mid 90s and your skills really 10^10 increased my pen tools knowledge base. -haxbwn0r!-