HackThebox - Wifinetic

Поделиться
HTML-код
  • Опубликовано: 3 авг 2024
  • 00:00 - Introduction
    01:00 - Start of nmap
    02:00 - Using wget to download all files from FTP then examining files, taking notes of the usernames
    05:00 - Taking a look at the backup, discovering a password in the wireless config
    06:45 - Using CrackMapExec to spray SSH with our password and getting a success with netadmin
    09:15 - Running LinPeas to discover Reaver has the capability cap_net_raw
    13:15 - Explaining why Reaver has this capability is interesting
    14:40 - Running Reaver to attempt to brute force the WPS Pin and getting the WPA PSK which is also the root password
    15:30 - Start of building a bash script to spray a single password across valid users with su
    22:00 - Converting our script into a Bash Function so its easier to run without touching disk
    24:55 - Talking about WPS and how this exploit worked
    25:30 - The first vulnerability in the WPS Pin, the eighth digit is just a checksum
    28:30 - The second flaw in WPS, the PIN is broken in half if the first four digits are wrong the responses tell you. Making the possibilities of hashes from 10^7 to 10^4 + 10^3.
    30:00 - Showing the WSC Nack gets sent after Message 4 if the first four of the pin is wrong
    31:15 - Changing the PIN and playing more with reaver to showcase how reaver works.

Комментарии • 38

  • @DavidAlvesWeb
    @DavidAlvesWeb 10 месяцев назад +10

    Using only one binary for the password spraying part was very insightful!
    I actually think that it's better than using cat, grep and awk at the same time, when it comes to detection.
    Thank you for taking the time to explain all of that and also for going much further than just solving the box!

  • @ChristopherPelnar
    @ChristopherPelnar 10 месяцев назад +1

    The beyond-root-segment taught me a lot I didn't know. I appreciate you always going the extra mile.

  • @marekkozlovsky586
    @marekkozlovsky586 10 месяцев назад +5

    "never do math online" :)
    also: awk -F':' '/sh$/ {print $1;}' /etc/passwd (no need to specifically check last column since it's also the end of the whole line)

  • @stevet7522
    @stevet7522 10 месяцев назад +2

    Absolutely fantastic explanation. This was a learning experience.

  • @arorarachit
    @arorarachit 10 месяцев назад

    freakin cool, it was really great understanding what's happening under the hood when we use reaver!

  • @nightfox9007
    @nightfox9007 10 месяцев назад +2

    So dope! Well done!

  • @LikeThizzz
    @LikeThizzz 10 месяцев назад

    Loved the explanations while writing that bash script

  • @AzCowboyOne
    @AzCowboyOne 10 месяцев назад

    Of all the things I should remember from watching the best walk throughs on the internet, I can't get "cat spray" out of my brain.

  • @jordanadams7665
    @jordanadams7665 10 месяцев назад +4

    Can you do a setup tour? I'd be interested in seeing what you work with and your kraken machine too.

  • @Chukxztv
    @Chukxztv 10 месяцев назад

    Dud you are soo good a this, it’s crazy. I’m more and more thinking about stopping doing software and do security just because of those vids

  • @tydewalt5425
    @tydewalt5425 10 месяцев назад

    I love your content Ip, I just wish I didn't have to double my volume to hear you. :P

  • @diaahanna8882
    @diaahanna8882 10 месяцев назад +1

    Loved the post root part thank you

  • @KyserClark
    @KyserClark 10 месяцев назад

    Thanks for the video and learning experience!

  • @rosehacksyoutube
    @rosehacksyoutube 10 месяцев назад

    Above and Beyond!

  • @pepemunic3661
    @pepemunic3661 10 месяцев назад +1

    That's great

  • @UntrackedEndorphins
    @UntrackedEndorphins 10 месяцев назад

    I enjoy the extra bits after root

  • @DavidAlvesWeb
    @DavidAlvesWeb 10 месяцев назад +3

    Did you made a typo with the maths at the end? I'm confused 😭😅

  • @tg7943
    @tg7943 10 месяцев назад

    Push!

  • @tntxqx8281
    @tntxqx8281 10 месяцев назад +1

    awsome ippsec

  • @kalidsherefuddin
    @kalidsherefuddin 10 месяцев назад

    The Great idea

  • @mattstorr
    @mattstorr 10 месяцев назад +1

    May I ask (at 11:01) why Netadmin was selected as a process of interest? There were several user accounts listed all with processes started by root. What's so special about netadmin? I noticed that all of the others except _laurel had a PPID of 1. Thanks.

    • @GajendraMahat
      @GajendraMahat 10 месяцев назад

      when i did this box. i tried every user which was listed on /home 😂😂😂
      But you have a point. and i really wanna know about this

    • @ippsec
      @ippsec  10 месяцев назад +4

      Just because that is who we are running as. The chance of root starting a process we can write to is greater.

    • @mattstorr
      @mattstorr 10 месяцев назад +1

      Thanks @@ippsec :-) Still watching and still learning. Thanks for replying

  • @abdosama
    @abdosama 10 месяцев назад

    Hello ipp, dis you have the chance to use Caido tool, it's like burp suit and it has an integrated AI, can do a video about it ?

  • @toyshopenterprises
    @toyshopenterprises 10 месяцев назад

    Why don't you use --open in nmap scanning

    • @MasakiKyosuke
      @MasakiKyosuke 10 месяцев назад +1

      Filtered/closed could be useful in rare cases (especially in CTF).
      For example if there is a firewall, it could tell you the port could be open but only accessible from the inside of the box (through things like SSRF), or a port knocking (a port that needs to be knocked to pass from filtered to open).
      It is what I guessed, but maybe I am wrong !

  • @sand3epyadav
    @sand3epyadav 10 месяцев назад +1

    Love ippsec,but we have not proper pentest knowledge , please help us

  • @sotecluxan4221
    @sotecluxan4221 10 месяцев назад

    !

  • @mtech1935
    @mtech1935 10 месяцев назад +1

    1st comment 🎉

    • @mtech1935
      @mtech1935 10 месяцев назад +1

      @aubcodell Interesting

  • @r3dp4rrot
    @r3dp4rrot 10 месяцев назад

    Boring box !
    Not worth 250$

  • @AUBCodeII
    @AUBCodeII 10 месяцев назад +8

    Ipp, please post the write-up for cybermonday. I implore you 🥺

    • @_fr3d_
      @_fr3d_ 10 месяцев назад +2

      Cybermonday is still active… he can’t do that

    • @AUBCodeII
      @AUBCodeII 10 месяцев назад

      @@_fr3d_ sniff sniff

    • @lamehacker3491
      @lamehacker3491 10 месяцев назад +1

      Lol its intresting box you can play with