TryHackMe! Bypassing Upload Filters & DirtySock

Поделиться
HTML-код
  • Опубликовано: 28 янв 2025

Комментарии • 136

  • @ayodub
    @ayodub 3 года назад +48

    Videos of you solving challenges with no fore-knowledge of the box are the best. Please do more of these.

    • @samfisher8426
      @samfisher8426 Год назад

      bro its fake ,he must have done this 100 times before start recording lol

  • @Mysticsam86
    @Mysticsam86 3 года назад +13

    The "stabilizing the shell manually" part was awesome!

  • @wasifekbal
    @wasifekbal 3 года назад +9

    What an amazing journey. Totally enjoyed the raw experience. Keep uploading John. JohnHammond's video = Motivation.

  • @mossdem
    @mossdem 3 года назад +50

    Oooop we almost, very almost, had a swear in there haha!

  • @KaliMax1337
    @KaliMax1337 3 года назад +2

    John Hammond "You are an exploit!" - hilarious!!-another great write up and I was able to follow your steps and root it myself tonite- well done!

    • @KaliMax1337
      @KaliMax1337 3 года назад

      Did I fail to mention I spent most of the week struggling on this one during the contest?? I am on 1st name basis with all the animals on the site!! BTW, please, what is the Firefox extension you use in tool menu that drops down and shows you the site cookies?? Gotta get that tool!

  • @popooj
    @popooj 3 года назад +29

    editing that python script on the fly was definitely dope 🔥🔥

    • @blaisemuhune8160
      @blaisemuhune8160 3 года назад +2

      Mwana boka, du moins un congolais ici,j'y m'entendais pas

  • @lepsycho3691
    @lepsycho3691 3 года назад +3

    Man that was impressive! I will definitely study this video a lot more, to get a better sense of how to interact with a remote server like this! Thank you for sharing!

  • @imuser007
    @imuser007 3 года назад +1

    thanks john, the art of editing the exploit for foothold is really amazing

  • @jacobslaver7887
    @jacobslaver7887 3 года назад

    I was watching one of the old vids where there was more light and the cam was closer and I just noticed how beautiful jhon is.
    You got a life dude try to keep it

  • @pedrocunha9266
    @pedrocunha9266 2 года назад

    Awesome!!
    Was a pleasure seeing this

  • @jorisschepers85
    @jorisschepers85 3 года назад

    Glad your back to kind of content (HTB,THM). Keep it up.

  • @savoyblue777
    @savoyblue777 3 года назад

    Thank you John your going back and forth teaches me the many different ways to go after the solutions your looking for!!!!!!

  • @GaryFrancis-q3r
    @GaryFrancis-q3r 3 года назад

    It's insane how you make it "easy"... unbelievable! Super super interesting videos! Thanks

  • @AlexElement
    @AlexElement 3 года назад

    Really dope! Enjoyed this live a lot!

  • @hayaanrizvi
    @hayaanrizvi 3 года назад +1

    Just subscribed, you deserve a lot more of subs :)

  • @gans512
    @gans512 3 года назад

    50:13 John: I dont think that was too awful
    Me: It would have taken me yearsss !!! LOL - As always great xploit. Keep the good stuff coming. Hope you win the raffle !!

  • @elliotdohm2883
    @elliotdohm2883 3 года назад +1

    The first searchsplit script was making the request via POST. When you tried to see if the path exists, it was a GET. Not sure if using POST would've worked, but it's possible that the request path 404s if it's not a POST.

  • @AJXD2
    @AJXD2 2 года назад +1

    I’ve learned a couple of things from watching this guy. The most important thing is to not mess with him

  • @yanex4631
    @yanex4631 3 года назад

    8:41 You are very funny 😂😂

  • @abdirahmann
    @abdirahmann 2 года назад

    i loved this. this was soooooo fun. i really enjoyed it. i love it. thanks john. :)

  • @raven8592
    @raven8592 3 года назад

    cool that was one of your best videos, please make more like this

  • @aditikeni804
    @aditikeni804 3 года назад +25

    He is better then my computer teacher 😂🤣

    • @koreliusk
      @koreliusk 3 года назад +14

      Wtf is a computer teacher

    • @JTwisted
      @JTwisted 3 года назад

      @@koreliusk Bruh

    • @aditikeni804
      @aditikeni804 3 года назад +3

      @@koreliusk in our country there are teacher/sir who teaches basics and above about computers. We (actually everyone) call them computer teacher/sir

    • @DHIRAL2908
      @DHIRAL2908 3 года назад

      Even I know more than my cyber-security professor lol..

    • @sparrow243
      @sparrow243 3 года назад

      Wtf 😂😒

  • @nxmxss
    @nxmxss 3 года назад +3

    Getting the foothold for this one was one of the most annoying thing i have dealt with.

  • @Ctrl-Alt-Hack
    @Ctrl-Alt-Hack 3 года назад +28

    I've completed the room :)
    It was nice, for me it was a new concept

  • @xB-yg2iw
    @xB-yg2iw 3 года назад +5

    I have a chance at this! Here's hoping!

  • @myusernameisrighther
    @myusernameisrighther 2 года назад

    Gotta get all those jifs. Wouldn’t want to miss all those jraffics.

  • @RareSushi
    @RareSushi 3 года назад +1

    so was jellyfin just a rabbit hole?

  • @dedkeny
    @dedkeny 3 года назад +3

    Almighty Algo stuff!!!!!

  • @NothingPicksLocks
    @NothingPicksLocks 3 года назад

    That was freaking awesome

  • @AUBCodeII
    @AUBCodeII 3 года назад +2

    Thanks for uploading this video, John! I learned a lot from it. Unfortunately I wasn't even able to get the first flag. That made me feel really bad :(
    Maybe I gotta try harder

    • @cuttlefishn.w.2705
      @cuttlefishn.w.2705 3 года назад +1

      After an hour or 2, go out for some fresh air for about 5 minutes, brainstorm, and come back googling whatever you came up with.

    • @AUBCodeII
      @AUBCodeII 3 года назад

      @@cuttlefishn.w.2705 I'm afraid this wouldn't have worked in this case because I got stuck in the /etc/hosts part. I didn't even know that was necessary to proceed with the CTF. I was trying to exploit the main subdomain, using its IP address

    • @bmbiz
      @bmbiz 3 года назад +2

      @@AUBCodeII That suggests you shouldn't be doing rooms with "hard" difficulty yet.

    • @AUBCodeII
      @AUBCodeII 3 года назад

      @@bmbiz oh that was a room with "hard" difficulty? I didn't know lol

    • @bmbiz
      @bmbiz 3 года назад +1

      @@AUBCodeII 😀

  • @pw5687
    @pw5687 3 года назад

    great video as always! :)

  • @TalsonHacks
    @TalsonHacks 3 года назад +1

    29:44 that moment xD

  • @wasifekbal
    @wasifekbal 3 года назад

    What happed between 29:43 - 29:56 ?? What you were thinking ??

  • @johtodev
    @johtodev 3 года назад +3

    Let's goo! Love this

  • @saifallahchakroun6253
    @saifallahchakroun6253 3 года назад

    thank you for the video , it helps me a lots to improve my skills

  • @ARZ10198
    @ARZ10198 3 года назад +6

    Peculiar

  • @erosmlima5981
    @erosmlima5981 3 года назад +5

    ​🏂Like always, the most Top on the field!!☕

  • @jimgetsjob9551
    @jimgetsjob9551 2 года назад

    i have watched so many of johns videos. really started to respect him... untill 1:15 ...it is a sad day... Pfft Jiff

  • @mossdem
    @mossdem 3 года назад +3

    Can someone give me the shortcut John is using to open a new instance of his shell please. Absolutely nothing I have searched gives me the answer lol

    • @_JohnHammond
      @_JohnHammond  3 года назад +6

      I use Terminator, and have the keybinding hotkeys so Super+Right will split vertically and Super+Down will split horizontally. Very convenient for just jumping into a new shell in the same current directory :)

    • @mossdem
      @mossdem 3 года назад +1

      @@_JohnHammond ah that’s awesome! Thanks for getting back to me. Awesome video by the way

  • @clarksoft
    @clarksoft 3 года назад

    I spent all the time to get foothold. no clue about privesc.. nice machine.

  • @PreetisKitchenltr
    @PreetisKitchenltr 3 года назад +3

    This was hard!

  • @jeromesheerin1982
    @jeromesheerin1982 3 года назад

    your the cream of the crop, John, very very good.

  • @mossdem
    @mossdem 3 года назад +8

    One more comment then I'm out of here lol but I am currently trying to learn how RSA works and how I can decrypt it effectively to complete some CTF's but i am finding it incredibly difficult to learn. Would it be possible for you to make a tutorial on how to get around these types of things using python etc.

    • @xB-yg2iw
      @xB-yg2iw 3 года назад +2

      Check out cryptohack, they have a pretty comprehensive series of challenges to learn this

    • @mossdem
      @mossdem 3 года назад +1

      @@xB-yg2iw ah you absolute legend! Much appreciated

    • @mossdem
      @mossdem 3 года назад +1

      @@xB-yg2iw wow it’s perfect just checked it out. Couldn’t thank you enough for this 👍🏼

  • @_AN203
    @_AN203 3 года назад

    20:11
    SO THAT IS A USER IMAGE !!!!

  • @AUBCodeII
    @AUBCodeII 3 года назад

    About ngrok, I think the only reason it didn't work is because the outbound traffic to the port created (11559) is not allowed by the box. I may be wrong though

    • @AUBCodeII
      @AUBCodeII 3 года назад +3

      [SPOILER]
      After rooting the machine, if you run the command "iptables -nL" you can check out the allowed ports: 443,445,80,25,53

  • @abulaman8713
    @abulaman8713 3 года назад

    How did he "stablize the shell", he has done it like multiple times, but I have no idea what he does

  • @Johnstuart2023
    @Johnstuart2023 2 года назад

    Ah a shrek reference a man of cloture 👌

  • @untitled8027
    @untitled8027 3 года назад

    what's the song at the end of the video?

  • @Maik.iptoux
    @Maik.iptoux 3 года назад

    Is there a way to specify the installation directory of Programms with the standard apt-get packet manager? Like you with all your tools in one folder /opt

  • @mohinparamasivam5189
    @mohinparamasivam5189 3 года назад

    I guess you wouldn't need to use ngrok, since ur in THM VPN connection... cool video @John Hammond

  • @neilslater877
    @neilslater877 3 года назад

    everytime I run the exploit for monitorr it's giving me a " is not an image". Its like it's not uploading anything at all???

  • @48pluto
    @48pluto 3 года назад

    Nice Job

  • @maxbunnies
    @maxbunnies 2 года назад

    Love watching these. Have no idea what’s going on. All seems wayyyy to hard

  • @venomanonymous916
    @venomanonymous916 Год назад

    Like your videos maybe you can do a easier one and Chyna do a walk-through explanation of what you’re doing and why like so much

  • @cuttlefishn.w.2705
    @cuttlefishn.w.2705 3 года назад

    How do you determine what's considered "cheating" when the game is hacking, i.e. unauthorized/roundabout access to information? Apparently searchsploit's on the table, how about prior writeups?

  • @lorenzo42p
    @lorenzo42p 3 года назад +1

    jif is wrong, Gif! it's a G

  • @ХадіАлХабуні
    @ХадіАлХабуні 3 года назад

    3:15
    You are inside a VPN, how your ISP will know that you are doing an Nmap scan?

    • @_JohnHammond
      @_JohnHammond  3 года назад

      This box uses a public IP address that is not within the VPN.

  • @anonymous.reddy0
    @anonymous.reddy0 2 года назад

    PLEASE make a video how to install sublime in linux i am unable to install sublime text editor

  • @kuldeepkasab
    @kuldeepkasab Год назад

    l love you john you are the best :)

  • @lioralalouf61
    @lioralalouf61 2 года назад

    youre so awsome

  • @mayurahir9340
    @mayurahir9340 3 года назад

    I trying this room and i am successful uplod the shell but i dont know why my reverce connection of net cat is not get back i also try with ngrok but still not working pless help me

  • @ahmad_el6861
    @ahmad_el6861 3 года назад

    can I ask to teach the Termux application?

  • @jkobain
    @jkobain 3 года назад

    - _That should request the page!-
    Yes, if only you had edited both requests to use the same path.

  • @softwarecyclist5348
    @softwarecyclist5348 3 года назад

    What computer set up do you use John ?

  • @neilljamieson9606
    @neilljamieson9606 3 года назад

    Great content again. Thank you John for this. Really cool stuff.

  • @abdullahshoukat2075
    @abdullahshoukat2075 3 года назад +1

    Bro thus room was very hard

  • @tanrrivtko1249
    @tanrrivtko1249 3 года назад

    Trying to join your discord, but can't seem to get the link to work :(

  • @v4ltonn
    @v4ltonn 2 года назад

    Every time I get blocked for reverse shell i use 53 port so that can bypass firewall and so i can have shell give it a try !

  • @vordann2829
    @vordann2829 3 года назад

    what is ur os?

  • @Shiv_the_human_code
    @Shiv_the_human_code 3 года назад

    Hello sir I am also interested penetrate testing but sir I have little bit confusion when I play start CTF on try hack me platform. Many of concept I never be familiar with them so it makes difficult to solve so sir you have resources which can help us plz tell and If you make the videos on pentrate testing concept which things exactly to know for beginners it's very helpful
    And what to do when we stuck ?
    And I solved blue machine (tryhackme) by taken reference from your video

  • @grim.reaper
    @grim.reaper 3 года назад

    What OS you are on?

  • @mechadrake
    @mechadrake 3 года назад +1

    hey, would you try analyzing RotaJakiro linux malware next?

    • @SentientMuffin
      @SentientMuffin 3 года назад

      I would be interested in this as well!

  • @lorenzo42p
    @lorenzo42p 3 года назад

    what is updog

  • @SecurityTalent
    @SecurityTalent 2 года назад

    Great

  • @dedkeny
    @dedkeny 3 года назад

    Alistair the Alligator is legit

  • @mattburks5243
    @mattburks5243 3 года назад

    What's updog?

  • @liamlouw4643
    @liamlouw4643 3 года назад

    Did this exceptional specimen say... jif?!??

  • @joelpainchaud4887
    @joelpainchaud4887 3 года назад

    Why does it sound like John has a 75 character password.

  • @themightiestofbooshes9443
    @themightiestofbooshes9443 2 года назад

    i made a python module to do my math homework for me but watching you do all this is making me feel just a little unintelligent

  • @stirringthepot3652
    @stirringthepot3652 3 года назад

    what OS does he use?

  • @rajdipdeysarkar4553
    @rajdipdeysarkar4553 3 года назад

    Great 🔥😍

  • @REBL0X3RSCREW
    @REBL0X3RSCREW 3 года назад

    Ok nice

  • @LuisSieira
    @LuisSieira 3 года назад +1

    Great video, as always.
    Just a little comment about python, becuase this seems to be a really common misconception I've found in thousands of scripts out in the wild.
    You don't really need to
    `str.join(list(generator))`
    You should instead just
    `str.join(generator)`
    (x for x in y) is a generator, and it does not need to have parens around it when already enclosed in some (as it is when it is an argument):
    ```
    In [2]: (lol for lol in 'lalala')
    Out[2]:
    In [3]: def lol(a):
    ...: print(a.__class__)
    ...:
    In [4]: lol(a for a in 'lol')
    In [5]: lol((a for a in 'lol'))
    In [6]: lol(((a for a in 'lol')))
    ```
    I mean `" ".join(lol for lol in 'lalala')` works, you don't need to create the intermediate list `" ".join(here->[lol for lol in 'lalala']

  • @kraemrz
    @kraemrz 3 года назад +1

    9/10 likes
    1 down because you missed to rename the extension on rev-shell script 🤪
    Love your videos ❤️

  • @roshantiwaree8737
    @roshantiwaree8737 3 года назад +1

    I'm waiting for zeus 😐

  • @jd-raymaker
    @jd-raymaker 3 года назад

    ooknib and ogwxxb collab when?

  • @magicball60
    @magicball60 3 года назад

    Pretty easy for a contest

  • @anthony6604
    @anthony6604 3 года назад

    cool

  • @babekpasha
    @babekpasha 3 года назад

    I want to get this :)

  • @BluEhui09
    @BluEhui09 3 года назад +5

    Oh Jesus, this is a big giveaway, and I really need this😛

    • @PreetisKitchenltr
      @PreetisKitchenltr 3 года назад +4

      Nononono. You aren't aware. This giveaway is not by John Sir... There is a room on TryHackMe Called Year Of The Jellyfish. The rooters of that box are participating in the giveaway. It's gonna end soon.

    • @aditikeni804
      @aditikeni804 3 года назад

      @@PreetisKitchenltr yeah

  • @neilslater877
    @neilslater877 3 года назад +1

    man how do you even cheat in these boxes?? lmfao

  • @ayush_panwar1
    @ayush_panwar1 3 года назад +3

    Hi sir, you should use clipboard extension to have your copy paste functionality more fast , btw im your big fan , your videos are awesome .
    Hope to meet you one day.
    Love from india🤗🤗

  • @eliasmoreira7335
    @eliasmoreira7335 3 года назад

    Desafio muito bom, mas dificil

  • @shivaganesh6939
    @shivaganesh6939 3 года назад

    🤩🤩🤩🤩🤩😍

  • @dafivehd1953
    @dafivehd1953 3 года назад

    Wee

  • @Lone_God
    @Lone_God 3 года назад

    I need it ...

  • @itxmustfa
    @itxmustfa 3 года назад

    The room does not look hard as before advertising the Ctf.
    It's a really easy one not so much tough
    Thanks by the way because I was also stuck on the back connection but my scenario style is different.

  • @vibiemood1079
    @vibiemood1079 3 года назад +1

    ♥️🇮🇳 pretty cool and knowledgeable !!!

  • @ImagoCanis
    @ImagoCanis 3 года назад

    yo frick muiri! this box was harder than anything that’d be on oscp. i’m so sick of being made to doubt my readyness for it because of this kinda shit. and the oscp itself isn’t even a fair representation of what any netsec job would entail. ctfs are literally cancer.

  • @sablanex
    @sablanex 3 года назад

    Please don't make things so big, zoom out a bit