HackTheBox - Spectra

Поделиться
HTML-код
  • Опубликовано: 8 янв 2025

Комментарии • 60

  • @Jake-nh4ek
    @Jake-nh4ek 3 года назад +29

    When you used "less" and "vim" to view the "wpscan" output, it showed the colour codes: [32m[+][0m etc.
    If you read the file with "less -r" it will intepret those colour codes and display the pretty colour like in stdout :)

    • @DHIRAL2908
      @DHIRAL2908 3 года назад +1

      Oh yeah I usually use "more" to see it!

  • @cyberfreak2268
    @cyberfreak2268 3 года назад +10

    Hi ippsec, your videos are bypassing the learning curve! Thanks for the efforts here I am with no basic knowledge of linux programming networking, playing HTB and learning hell new things!

    • @Aryan_86
      @Aryan_86 3 года назад

      Which software ues

  • @Ms.Robot.
    @Ms.Robot. 3 года назад +4

    Very smart choices. This is helping me in my college classes.

  • @medoangel8370
    @medoangel8370 3 года назад +3

    The sticky bit is called a sticky bit cause it prevents users from deleting or renaming the files in the directory that has it

  • @ryuparish8851
    @ryuparish8851 3 года назад +1

    THANK YOU SO MUCH FOR SHOWING HOW TO DISABLE THE FIREFOX KEYWORDS!!! That has probably been the biggest annoyance in htb since macos is finnicky with dns resolution and testing domains when firefox keeps taking you to google is uber-annoying!

  • @sechvnnull1524
    @sechvnnull1524 3 года назад

    Amazing job as usual and learned a few additional things that I hadn't tried before! Thank you!

  • @oriel360
    @oriel360 3 года назад +1

    thank you so much for your content keep up the good work!

  • @hackersworld2974
    @hackersworld2974 3 года назад +20

    The netcat reverse shell would have worked, it's just that u forgot to see that there is an extra 10 in the IP. It was supposed to be 10.10.14.2 , you wrote it as 10.10.10.14.2 !!!

    • @p4nz9r60
      @p4nz9r60 3 года назад +16

      I said it once and I'm saying it again: when Ippsec stops making typos in his videos, I'll stop watching his content!

  • @wisdomovermoney3394
    @wisdomovermoney3394 2 года назад

    How do you setup a static ip for the reverse shell to start connection to your machine?

  • @nullnull6032
    @nullnull6032 3 года назад

    at 19:59, from where did you get that xclip-selection command, was it copied before, or is it a shortcut you are using?

    • @ippsec
      @ippsec  3 года назад

      I have it in a tmux config. Think it was the attended video

  • @ziaratorres1988
    @ziaratorres1988 3 года назад

    At the end when i'm editing the /etc/init/test.conf i'm finding that my changes aren't being kept. . . . I have the netcat listener waiting and when I start the test service nothing happens. I stop the test job and have to re-edit the test.conf because it reverted back to the original... I'm not sure what I'm doing wrong :-(

  • @InsomniaFire
    @InsomniaFire 3 года назад

    Nice video Ipp! Looks like the chmod would have worked but nice to see a method where a root shell hits a listener :)

  • @bulmavegeta23
    @bulmavegeta23 3 года назад

    excelente explicación, me perdí en un para de pasos que hiciste pero buenísimo.

  • @Ali-em7lo
    @Ali-em7lo 3 года назад

    Hey @ippsec you got any refenrce to make tmux easier to use since I'm trying to integrate it but it still giving me hardtime, I need something to split my pane and create new bash tab for convenience.

  • @Ms.Robot.
    @Ms.Robot. 3 года назад

    Very educational. Love it.

  • @S2eedGH
    @S2eedGH 3 года назад

    Great Walkthrough, but may I ask why you always use port 9001 in reverse shells?

    • @ippsec
      @ippsec  3 года назад +3

      Because it’s over 9000. Really no reason just a meme

  • @NatabuAzamari
    @NatabuAzamari 3 года назад

    31:05 you chmod /bin/dash then ls /bin/bash. oops :)

  • @grzegorztlusciak
    @grzegorztlusciak 3 года назад

    Great vid as usual!
    Just small thing:
    09:16 - the login was “devtest” but you wrote “devteam”
    31:16 you said "bin/dash" but wrote "bin/bash"

  • @joshuavaccaro1347
    @joshuavaccaro1347 3 года назад

    Hey Ippsec this is the video you changed firefox setting, 11:43

    • @ippsec
      @ippsec  2 года назад +1

      Yeah I could change it back, but I’ve grown to like it

  • @k_xx
    @k_xx 3 года назад

    Excellent as always!

  • @pwndumb2903
    @pwndumb2903 3 года назад +1

    Amazing video. you put chmod +s in /bin/dash and not in /bin/bash

  • @kasuntechtest8871
    @kasuntechtest8871 3 года назад +1

    Thank you .... Master !!!

  • @MrMeLaX
    @MrMeLaX 3 года назад

    Thank you for your work.

  • @harshilshah980
    @harshilshah980 3 года назад

    I don’t get it why you’re so underrated!!

  • @evke
    @evke 3 года назад +2

    you could got shell with just chmod +s /bin/bash and ls -la /bin/bash

  • @pl7771
    @pl7771 3 года назад

    can someone please explain function system($_REQUEST['ippsec']) ??

    • @ippsec
      @ippsec  3 года назад +2

      It's PHP Code, System() means run system command.... $_REQUEST gets the variable name (what is in [], in this case ippsec) from the POST or GET parameter... So your saying go get $ippsec and run it as a system command.

    • @pl7771
      @pl7771 3 года назад

      @@ippsec aha so in the url field you are assigning whoami to $ippsec variable, and request this variable through system(), now I got this, and this makes me happy, thank you. (Correct me if I'm wrong).

  • @mohameai5997
    @mohameai5997 3 года назад

    when i was doing this box some one remove root.txt so i gave up

  • @MiguelLopez-ox9ld
    @MiguelLopez-ox9ld 3 года назад

    a hacker being organised Using OBSIDIAN! niceee

  • @sakthis6689
    @sakthis6689 3 года назад +3

    12:03 😂😂

  • @marekkozlovsky586
    @marekkozlovsky586 3 года назад +1

    nice. I have to wonder how much easier it would be if you didn't make so many typos :) (5-octet IP address, bash x dash ...)

    • @ippsec
      @ippsec  3 года назад +6

      😂 that would explain things. But least there’s troubleshooting of things ever don’t just work

  • @roieshmuel7314
    @roieshmuel7314 3 года назад +1

    The shell didn’t work because of the ip 😂😂 17:40 happened to all of us

  • @wahabwahab2042
    @wahabwahab2042 3 года назад

    are you sure this is an easy bro !?
    man i felt down after i saw this job done to fix the "to be said easy " lab

  • @dskho
    @dskho 3 года назад

    Hi ippsec,can I know the tool’s name that you take notes?

  • @sand3epyadav
    @sand3epyadav 3 года назад

    We know about all method but during pentest we forget all thin

  • @udaybalaji185
    @udaybalaji185 3 года назад +1

    Hi bro I'm. Pure beginner so from where should I start

    • @aravbudhiraja
      @aravbudhiraja 3 года назад +1

      INE's free starter pass is really gud for beginners :)

    • @princethilak6213
      @princethilak6213 3 года назад +1

      Believe me just start, you don't need to be ready to start, just dive into main topic like how am I going to exploit this, then explore the ways, and learn how it works, its far greater than learn basics first cause u don't know where to apply, where we can use!

  • @aminhatami3928
    @aminhatami3928 3 года назад

    Hi ipp. Please compelete rope 2.
    I really like to see your method for it.

  • @ardiansyahrukua3020
    @ardiansyahrukua3020 3 года назад

    Awesome

  • @TrapFenix
    @TrapFenix 3 года назад +1

    i'm just new to hacking how i can study it and what is the best certifications i can get i don't have any knowledge about network or web application

  • @theone4808
    @theone4808 3 года назад

    IppSec Sensei

  • @Aryan_86
    @Aryan_86 3 года назад

    Which software ues

  • @asiffaizal6158
    @asiffaizal6158 3 года назад

    Thanks man

  • @อัศวินโต๊ะกลม-ฑ3ส

    มีแฟนยังครับ

  • @k4id095
    @k4id095 3 года назад +1

    Hi first comment