TryHackMe | Publisher Room Walkthrough

Поделиться
HTML-код
  • Опубликовано: 28 ноя 2024

Комментарии • 16

  • @bobbyrandomguy1489
    @bobbyrandomguy1489 4 месяца назад +1

    thanks! this was really confusing as i couldnt download linpeas. got a reverse shell easy with metasploit and the id_rsa but couldnt use wget. so much to learn. priv escalation is hard

    • @TechMafia7
      @TechMafia7  4 месяца назад

      @@bobbyrandomguy1489 Indeed, this room teaches a lot.

  • @JayJay-hb5ig
    @JayJay-hb5ig 4 месяца назад

    can you tell me why you had to encode this in base64 for it to work?

    • @TechMafia7
      @TechMafia7  4 месяца назад

      This is based on experience. When something does not work, we try the other way. The original payload consisted of special characters which may not be properly sent to the remote server, therefore we base64 encode our payload to get rid of special chars and keep it simple alphabets.

    • @JayJay-hb5ig
      @JayJay-hb5ig 4 месяца назад

      @@TechMafia7 My man thanks for the response. I could not get any payload to work and thought I was just mucking it up. This has been incredibly informative.

  • @MrZiolelle
    @MrZiolelle 5 месяцев назад

    wonderful, thanks

  • @cyvorsec
    @cyvorsec 5 месяцев назад

    Can you explain how you get write permissions to /opt dir?

    • @TechMafia7
      @TechMafia7  5 месяцев назад +1

      AppArmor profile restricts us from writing to /opt directory but getting a reverse shell bypasses the profile settings for think user as the settings are different now as we're in a reverse shell. I'll provide more information on this on a separate video.

    • @cyvorsec
      @cyvorsec 5 месяцев назад

      @@TechMafia7 Thanks! :)

  • @hiteshverma8728
    @hiteshverma8728 5 месяцев назад

    ruclips.net/video/iOdsbF05k7s/видео.html, at this point how you knew you have to base 64 encode, please explain

    • @TechMafia7
      @TechMafia7  5 месяцев назад +3

      This is based on experience. When something does not work, we try the other way. The original payload consisted of special characters which may not be properly sent to the remote server, therefore we base64 encode our payload to get rid of special chars and keep it simple alphabets.

    • @hiteshverma8728
      @hiteshverma8728 5 месяцев назад

      @@TechMafia7 thankyou so much i stuck whole day there😅

    • @TechMafia7
      @TechMafia7  5 месяцев назад

      @@hiteshverma8728 No worries. Glad I was able to help.

    • @ManbirSingh-xv3oq
      @ManbirSingh-xv3oq 4 месяца назад

      ​@@TechMafia7Damnn.. you have a lot of experience can you pls tell us how to get job in this field

    • @TechMafia7
      @TechMafia7  4 месяца назад

      I don't have a job yet, haha.