HackTheBox - BroScience

Поделиться
HTML-код
  • Опубликовано: 20 окт 2024

Комментарии • 18

  • @bmdyy
    @bmdyy Год назад +5

    Poisoning the PHP session file was the intended solution, so I'm glad you included it! I guess I forgot you can just include a remote file 😅

  • @lool7922
    @lool7922 Год назад +9

    I cant stop watching your videos - you are the best ever.

    • @AUBCodeII
      @AUBCodeII Год назад +2

      Yes, IppSec, John Hammond, David Bombal and Joe are the BEST pentesting folks

  • @joyemoticon
    @joyemoticon Год назад +4

    BroScience was a really strong classical Linux box

  • @zeroordie453
    @zeroordie453 Год назад +3

    I liked the defense and the bypass step! Thanks ippsec from the future! lol.
    Another defense, making the web root read only via extended acls. Wonder if there is a cool bypass then!

    • @ippsec
      @ippsec  Год назад +3

      I doubt you'd be able to exploit if the www-data could not write to the web directory.

  • @issamafifi
    @issamafifi Год назад +1

    Thank you Ippsec, I appreciate your efforts 💐

  • @claudiafischering901
    @claudiafischering901 Год назад

    Thanks for shareing the php vuln. I know to watchout what I missed earlier. Take care and made more. I love your videos.

  • @groknaut
    @groknaut Год назад

    I'm using VCS and Snyk for the first time. When I scan the src dir contents (created by our crawler), Snyk said no vulnerabilities found. Trying to get Snyk working, I installed composer and had it create composer.json and composer.lock, which Snyk seemed to like. But it still finds no vulns. How did you get it to work?

  • @StevenHokins
    @StevenHokins Год назад

    Great video as always ❤ thank you

  • @alanisam6220
    @alanisam6220 Год назад

    Thank you ippsec!

  • @oceancurrentsea
    @oceancurrentsea Год назад

  • @code_dictator
    @code_dictator Год назад

    Isn't that box still active?

  • @tg7943
    @tg7943 Год назад

    Push!