When you used "less" and "vim" to view the "wpscan" output, it showed the colour codes: [32m[+][0m etc. If you read the file with "less -r" it will intepret those colour codes and display the pretty colour like in stdout :)
Hi ippsec, your videos are bypassing the learning curve! Thanks for the efforts here I am with no basic knowledge of linux programming networking, playing HTB and learning hell new things!
THANK YOU SO MUCH FOR SHOWING HOW TO DISABLE THE FIREFOX KEYWORDS!!! That has probably been the biggest annoyance in htb since macos is finnicky with dns resolution and testing domains when firefox keeps taking you to google is uber-annoying!
The netcat reverse shell would have worked, it's just that u forgot to see that there is an extra 10 in the IP. It was supposed to be 10.10.14.2 , you wrote it as 10.10.10.14.2 !!!
At the end when i'm editing the /etc/init/test.conf i'm finding that my changes aren't being kept. . . . I have the netcat listener waiting and when I start the test service nothing happens. I stop the test job and have to re-edit the test.conf because it reverted back to the original... I'm not sure what I'm doing wrong :-(
Hey @ippsec you got any refenrce to make tmux easier to use since I'm trying to integrate it but it still giving me hardtime, I need something to split my pane and create new bash tab for convenience.
It's PHP Code, System() means run system command.... $_REQUEST gets the variable name (what is in [], in this case ippsec) from the POST or GET parameter... So your saying go get $ippsec and run it as a system command.
@@ippsec aha so in the url field you are assigning whoami to $ippsec variable, and request this variable through system(), now I got this, and this makes me happy, thank you. (Correct me if I'm wrong).
Believe me just start, you don't need to be ready to start, just dive into main topic like how am I going to exploit this, then explore the ways, and learn how it works, its far greater than learn basics first cause u don't know where to apply, where we can use!
When you used "less" and "vim" to view the "wpscan" output, it showed the colour codes: [32m[+][0m etc.
If you read the file with "less -r" it will intepret those colour codes and display the pretty colour like in stdout :)
Oh yeah I usually use "more" to see it!
Hi ippsec, your videos are bypassing the learning curve! Thanks for the efforts here I am with no basic knowledge of linux programming networking, playing HTB and learning hell new things!
Which software ues
Very smart choices. This is helping me in my college classes.
The sticky bit is called a sticky bit cause it prevents users from deleting or renaming the files in the directory that has it
THANK YOU SO MUCH FOR SHOWING HOW TO DISABLE THE FIREFOX KEYWORDS!!! That has probably been the biggest annoyance in htb since macos is finnicky with dns resolution and testing domains when firefox keeps taking you to google is uber-annoying!
Amazing job as usual and learned a few additional things that I hadn't tried before! Thank you!
thank you so much for your content keep up the good work!
The netcat reverse shell would have worked, it's just that u forgot to see that there is an extra 10 in the IP. It was supposed to be 10.10.14.2 , you wrote it as 10.10.10.14.2 !!!
I said it once and I'm saying it again: when Ippsec stops making typos in his videos, I'll stop watching his content!
How do you setup a static ip for the reverse shell to start connection to your machine?
at 19:59, from where did you get that xclip-selection command, was it copied before, or is it a shortcut you are using?
I have it in a tmux config. Think it was the attended video
At the end when i'm editing the /etc/init/test.conf i'm finding that my changes aren't being kept. . . . I have the netcat listener waiting and when I start the test service nothing happens. I stop the test job and have to re-edit the test.conf because it reverted back to the original... I'm not sure what I'm doing wrong :-(
Nice video Ipp! Looks like the chmod would have worked but nice to see a method where a root shell hits a listener :)
excelente explicación, me perdí en un para de pasos que hiciste pero buenísimo.
Hey @ippsec you got any refenrce to make tmux easier to use since I'm trying to integrate it but it still giving me hardtime, I need something to split my pane and create new bash tab for convenience.
Very educational. Love it.
Great Walkthrough, but may I ask why you always use port 9001 in reverse shells?
Because it’s over 9000. Really no reason just a meme
31:05 you chmod /bin/dash then ls /bin/bash. oops :)
Great vid as usual!
Just small thing:
09:16 - the login was “devtest” but you wrote “devteam”
31:16 you said "bin/dash" but wrote "bin/bash"
Hey Ippsec this is the video you changed firefox setting, 11:43
Yeah I could change it back, but I’ve grown to like it
Excellent as always!
Amazing video. you put chmod +s in /bin/dash and not in /bin/bash
Thank you .... Master !!!
Thank you for your work.
I don’t get it why you’re so underrated!!
you could got shell with just chmod +s /bin/bash and ls -la /bin/bash
can someone please explain function system($_REQUEST['ippsec']) ??
It's PHP Code, System() means run system command.... $_REQUEST gets the variable name (what is in [], in this case ippsec) from the POST or GET parameter... So your saying go get $ippsec and run it as a system command.
@@ippsec aha so in the url field you are assigning whoami to $ippsec variable, and request this variable through system(), now I got this, and this makes me happy, thank you. (Correct me if I'm wrong).
when i was doing this box some one remove root.txt so i gave up
a hacker being organised Using OBSIDIAN! niceee
12:03 😂😂
nice. I have to wonder how much easier it would be if you didn't make so many typos :) (5-octet IP address, bash x dash ...)
😂 that would explain things. But least there’s troubleshooting of things ever don’t just work
The shell didn’t work because of the ip 😂😂 17:40 happened to all of us
are you sure this is an easy bro !?
man i felt down after i saw this job done to fix the "to be said easy " lab
Hi ippsec,can I know the tool’s name that you take notes?
Obsidian
We know about all method but during pentest we forget all thin
Hi bro I'm. Pure beginner so from where should I start
INE's free starter pass is really gud for beginners :)
Believe me just start, you don't need to be ready to start, just dive into main topic like how am I going to exploit this, then explore the ways, and learn how it works, its far greater than learn basics first cause u don't know where to apply, where we can use!
Hi ipp. Please compelete rope 2.
I really like to see your method for it.
Awesome
i'm just new to hacking how i can study it and what is the best certifications i can get i don't have any knowledge about network or web application
IppSec Sensei
Which software ues
Thanks man
มีแฟนยังครับ
Hi first comment
Cool.
@@sreyanchakravarty7694 NOT cool