This is why I’m using these days. Terminal colors are a work in progress. The Font is Hack Bold 16px This is the top row of the color palette: coolors.co/000000-c01c28-f8e45c-e01b24-ff7800-e01b24-e01b24-34ff03 This is the bottom row: coolors.co/31fbb6-c01c28-5100ff-6100ff-64ffed-e01b24-34ff03-34ff03 The forground is #01FA9A The background is #000000 Show bold text in bright colors is selected
I don't think that's a dumb question. I'm putting the computer and domain name into my /etc/hosts file because it maps the IP addresses to hostnames. It's also partially habit. If we map it and run nmap again we have the potential to get more results. If there were a webserver running on this machine it might redirect us from the IP to the hostname and since our computer doesn't know where the hostname is it wouldn't return. It also makes it so we can enumerate subdomain if we needed to fuzz for them. Because it's a domain controller I wouldn't expect to see a web server running on it but if this were another box we might. But we're adding it because there's no DNS server to tell our computer where DC01.blackfield.htb is, so we can map it manually to our /etc/hosts file.
Here’s the list I’m following if you’re wondering. There are actually a few hard boxes in there. It does seem like most of the hard rated boxes are hard because they require manual sql injection or there’s one single piece from the machines that is oscp like. I don’t think we’ll be reverse engineering to get stored credentials but then again I haven’t taken it just yet so maybe that is a part of OSCP docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview# I’m down to Proving Grounds play. I haven’t been enjoying those and it’s almost hard to find the lessons in them but I seem to be finding they tend to have an exploit that has a metasploit module but also a way to manually perform the attack. SQL injection that can’t be done with sqlmap, or some kind of code review. That’s what I’ve noticed so far. Im trying to take the lessons from each box and not the rating so much. Think of each stage as its own attack and I think that’s why this person recommends them as OSCP-like machines.
@noxlumens good point! I think I just have heard too many people say the typical "htb hard boxes are far harder than the oscp" and that probably skewed my memory or something lol. I did most of TJ NL a year ago but forgot there were hard ones in there lol. I hope you have fun doing the test like I did (I loved it). I'm sure you will do great on it. :)
@wolfk.l.5582 oh hell! Congrats on the pass! I bet it’ll be fun and nerve wracking at the same time. I will say the proving grounds machines have a whole different feel from the hackthebox machines. I’ve seen several people saying they would have spent more time using proving grounds practice and ply for practice since offsec makes those specifically.
@noxlumens thanks man! Yeah those help. However, the most valuable machines for me personally were the labs and mocks in offsec and the htb Dante prolab. Those were all extremely great material to learn from.
28:00 I was screaming the username, the username 😂
LMAO. Sorry. :) I can't not see the mispelling now. but it was a good lesson at the same time, right?
@@noxlumens exactly. Thanks for the video man
Like your terminal coloring, can you share the theme?
This is why I’m using these days. Terminal colors are a work in progress.
The Font is Hack Bold 16px
This is the top row of the color palette: coolors.co/000000-c01c28-f8e45c-e01b24-ff7800-e01b24-e01b24-34ff03
This is the bottom row: coolors.co/31fbb6-c01c28-5100ff-6100ff-64ffed-e01b24-34ff03-34ff03
The forground is #01FA9A
The background is #000000
Show bold text in bright colors is selected
Dumb question but why do you keep adding things to the etc file ?
I don't think that's a dumb question. I'm putting the computer and domain name into my /etc/hosts file because it maps the IP addresses to hostnames. It's also partially habit. If we map it and run nmap again we have the potential to get more results. If there were a webserver running on this machine it might redirect us from the IP to the hostname and since our computer doesn't know where the hostname is it wouldn't return. It also makes it so we can enumerate subdomain if we needed to fuzz for them. Because it's a domain controller I wouldn't expect to see a web server running on it but if this were another box we might.
But we're adding it because there's no DNS server to tell our computer where DC01.blackfield.htb is, so we can map it manually to our /etc/hosts file.
@@noxlumens ah ok that makes sense, thank you for detailed explanation
First time im seeing someone recommend a hard htb box to prep for the oscp. Interesting...
Here’s the list I’m following if you’re wondering. There are actually a few hard boxes in there. It does seem like most of the hard rated boxes are hard because they require manual sql injection or there’s one single piece from the machines that is oscp like. I don’t think we’ll be reverse engineering to get stored credentials but then again I haven’t taken it just yet so maybe that is a part of OSCP
docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#
I’m down to Proving Grounds play. I haven’t been enjoying those and it’s almost hard to find the lessons in them but I seem to be finding they tend to have an exploit that has a metasploit module but also a way to manually perform the attack. SQL injection that can’t be done with sqlmap, or some kind of code review. That’s what I’ve noticed so far. Im trying to take the lessons from each box and not the rating so much. Think of each stage as its own attack and I think that’s why this person recommends them as OSCP-like machines.
@noxlumens good point! I think I just have heard too many people say the typical "htb hard boxes are far harder than the oscp" and that probably skewed my memory or something lol. I did most of TJ NL a year ago but forgot there were hard ones in there lol. I hope you have fun doing the test like I did (I loved it). I'm sure you will do great on it. :)
@wolfk.l.5582 oh hell! Congrats on the pass! I bet it’ll be fun and nerve wracking at the same time. I will say the proving grounds machines have a whole different feel from the hackthebox machines. I’ve seen several people saying they would have spent more time using proving grounds practice and ply for practice since offsec makes those specifically.
@noxlumens thanks man! Yeah those help. However, the most valuable machines for me personally were the labs and mocks in offsec and the htb Dante prolab. Those were all extremely great material to learn from.
nice voice and temperament ...
Great content