TryHackMe! PickleRick - BYPASSING Denylists

Поделиться
HTML-код
  • Опубликовано: 27 апр 2020
  • If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    E-mail: johnhammond010@gmail.com
    PayPal: paypal.me/johnhammond010
    GitHub: github.com/JohnHammond
    Site: www.johnhammond.org
    Twitter: / _johnhammond

Комментарии • 328

  • @KoalaPlaying
    @KoalaPlaying 4 года назад +582

    I wish to understand what is happening on my screen right now, but I love watching stuff like this

    • @Jib420
      @Jib420 4 года назад +9

      i dont know why im watching this... i just am

    • @tanyayadav15
      @tanyayadav15 4 года назад +2

      Same ..

    • @Nossody
      @Nossody 4 года назад +5

      Lookup Red Hat courses if you want to learn linux :)

    • @senseifr0st819
      @senseifr0st819 4 года назад +3

      @@Nossody or just use linux and consume someones legg because that also helps

    • @panicswitch1271
      @panicswitch1271 4 года назад +6

      @@Jib420Half way through the video I asked myself, "how the hell did I get here?"

  • @ReySoMLB
    @ReySoMLB 10 месяцев назад +44

    John, I know you're a professional and im still a beginner .. but this was the first 'CTF' that i faced in THM and its labeled as easy. This was impressive but watching you fly through this was very discouraging lol. I've gone through the rooms up to this point in the "complete beginner" path, ive taken notes, studied, and re-read rooms... and i got to this and my brain just fried watching you do this. I couldn't follow what you were doing, you were running so many cmd pages and dropping commands left and right, it was hard to keep up. This is 100% educational and inspiring at least, but holy Christ. I'm subbing now... lol

    • @kutloano.mp4
      @kutloano.mp4 6 месяцев назад +1

      I will come back to this video in the future and I vow to be able to understand this video

    • @laronthomas2006
      @laronthomas2006 5 месяцев назад +1

      I just got lost. I was doing well with easy rooms but now im initimidated

    • @Alberto-ww7vb
      @Alberto-ww7vb 4 месяца назад

      I'm pretty sure he mention that he did the room previously to making the video, but still It wouldn't surprise me if he flew through it. I just did the ctf after around 3 months of learning in the junior pentest path and got stuck in various places running around in circles hahaha. Still I think is a great way to learn to watch someone so experienced to things because we can learn so fu...ng much. Good luck on your learning journey

    • @onex_vu
      @onex_vu 2 месяца назад

      yeh fr, I got lost when I see him doing things. I have learnt so many things like u but it's still not enough

    • @dreamkiller2693
      @dreamkiller2693 Месяц назад

      ​@@kutloano.mp4 come back 😂

  • @RossMitchell
    @RossMitchell 3 года назад +17

    John - absolutely loving the videos dude. I'm an absolute level 0 n00b so some of this was over my head, but trying my best to work hard and grasp the basics! Appreciate the effort you put into your videos and the time you spend to explain things, you're a top dude. Peace!

  • @4ag2
    @4ag2 4 года назад +11

    Big fan ! I do learn a lot from you, I'll make sure to support whenever I'll be able to do that. GREAT JOB

  • @adriasanchez6633
    @adriasanchez6633 Год назад

    Thanks John! That was my first ctf, i learned a lot trying stuff and your video gave me the tips i’m not aware of at the moment to run forward.

  • @Laflamablanca969
    @Laflamablanca969 4 года назад +9

    What a great series. Please keep doing these! :)

  • @Steefie70
    @Steefie70 3 года назад +3

    Thank you, every day I learn something new, also thanks to you John, you are very fast, but there is no limit to repeat the video (haha). All the best from Rotterdam.

  • @Godmil
    @Godmil 4 месяца назад

    Oh wow, that took me hours 😆 I'm going to write down everything you did here because that was just beautiful seeing how efficiently you got through it.

  • @kentharris7427
    @kentharris7427 Год назад

    I like the way you take notes. I am going to implement it since I can use text files over different operating systems. I used Burp suite which didn't work for this room. Typically Burp suite will show the pages of a website which was not the case for this room. I joined THM about a week ago, with a background in IT hardware, so this has been a challenge. Thank you for your video.

  • @CleanCivilian
    @CleanCivilian 2 года назад +2

    I really wanted to do this room without help, but man... there is just some things i do not know and the 'basic' room did not teach! Thanks for the walkthrough, took notes while following along and trying to figure out as you gave info.

  • @yankeesouth
    @yankeesouth 3 года назад +2

    Your content has helped me learn so many things. My brain has one wrinkle in it now. Thank you

  • @giovanniromio2767
    @giovanniromio2767 4 года назад +10

    Loved the recap at the end. Also perfect editing of the video.

  • @davidthedreamer0
    @davidthedreamer0 4 года назад +150

    Me: Omg, Jon! How many command lines do you know???
    Jon: Yes.

  • @CybrJames
    @CybrJames 4 года назад

    Kind of cool to see the Thumbnail work you did yesterday live today. Great video. Keep up the great work you're doing.

  • @jalajkumar9955
    @jalajkumar9955 4 года назад +40

    Hey John! Please create more THM videos, as they are very good for understanding new concepts and ways to exploit a box.
    Thank You !

  • @capivaradeprograma
    @capivaradeprograma 11 месяцев назад +2

    At first I was kind of afraid of not manage to complete this room.
    But watching your video makes me understand every concept tha I have been through in the path "Web fundamentals" and make this room way less scarier 🤣🤣🤣
    Great video

  • @jacquescilliers4511
    @jacquescilliers4511 2 года назад +34

    To be honest as an absolute beginner in the cyber security space, watching videos like this makes me doubt myself, but excites and scares me all the same time

    • @angeatgr
      @angeatgr 2 года назад +2

      Its like learning to code, I remember feeling like shit when learning OOP, today is a second nature and so is ethical hacking, there is a lot to learn, networking, pentesting tool, a bit of programming, linux, windows etc.. but you will get there !
      It takes time, lot of it and more with practice

    • @blazingfalcon7387
      @blazingfalcon7387 Год назад +1

      I feel the same way lol

    • @iCyberVenom
      @iCyberVenom Год назад +4

      Well he's absolutely ripping through the challenge at one million miles per hour, so....don't feel bad. He clearly posted this video to showcase his skills and speed, not to teach others. He couldn't possibly type, switch screens/apps, speak any faster than the pace he's moving in this video. Change the playback speed to 1/4 speed and you'll still see he's moving quickly.

    • @john_wick_catcher26
      @john_wick_catcher26 Год назад +1

      how is it going after 9 months ?

    • @IGORDYES
      @IGORDYES Год назад +1

      @@iCyberVenomhe clearly stated he spent a while in this before recording. The video is nearly 20 minutes and the box is just about as easy and beginner friendly as they come. He was not trying to show off his skill. It’s clear you need to practice alot. Good luck and cheer up.

  • @real.xplo1t
    @real.xplo1t 3 года назад

    strings also helps in the portal.php page. Good stuff

  • @BenKadel
    @BenKadel 4 года назад

    Love your videos dude! This was awesome!!!

  • @kyiwong3804
    @kyiwong3804 11 дней назад

    I learn a lot from this video. Thanks.

  • @masterbloon9812
    @masterbloon9812 3 месяца назад

    Ahhhhhhhhhhhh thanks for the tipp with the reverse shell, i was really stuck at that point XD

  • @patrickavognon2850
    @patrickavognon2850 4 месяца назад

    Thanks John, this is video is very helpful

  • @the_offsec_noob1120
    @the_offsec_noob1120 4 года назад

    You are an awesome mentor.. Thanx you helped a lot and know i started my own channel..

  • @sergiohernandez273
    @sergiohernandez273 2 года назад

    All this it's awesome, at the beginning, I didn't know how to upload rev' sh, but from now on I can see it's very easy. 'E= Congratulations!

  • @CybrJames
    @CybrJames 4 года назад +4

    Damn, you make it look so easy. Hard to follow as a beginner, as I don't always understand. But I will get there. NICE

  • @nicolaslaborie5015
    @nicolaslaborie5015 4 года назад +2

    for the cat "file" that didn't work, less did :) Very nice walkthrough. It was a fun box :)

  • @SeaDraGraphics
    @SeaDraGraphics 4 года назад +9

    man i would love to see another king of the hill livestream

  • @ggmaxx66
    @ggmaxx66 2 года назад

    excellent presentation John!

  • @sfxElrick
    @sfxElrick 4 года назад +2

    @John Hammond you can also use wildcards to evade that type of blacklist: /bin/ca? *.txt will work

  • @andrevwebb
    @andrevwebb 9 месяцев назад

    Wow…..thank you. This is great

  • @rellsw02
    @rellsw02 4 года назад

    A great video that you made look very simple.

  • @rodriquh
    @rodriquh 4 года назад +1

    This was an excellent example of owning a box. Great job using the poor mans pentest, it’s really an awesome accomplishment.

    • @su8z3r03
      @su8z3r03 Год назад

      What is the poor man pentest ?

  • @jamaledineamarir6724
    @jamaledineamarir6724 3 года назад +13

    netcat is actually in there. You can redirect the STDERR output to STDOUT (as no result were shown in the portal.php page). Here's the command for that 10:50 :
    $ nc --version 2>&1
    $ nc -h 2>&1
    $ man nc
    That way, any error (stderr) will be prompted in the web page (stdout), instead of staying blank ^^.
    $ nc --version doesn't exist

    • @bcordone
      @bcordone 3 месяца назад

      Yep. I found out netcat was on there via man nc, and then I used msfvenom to get the reverse shell. The part that had me stumped was how to get ROOT, ironically. "sudo -s" gave me some sort of error (forgot what it was exactly), su root prompted me for a password I couldn't figure out (I don't think ROOT even has a password in this one. I wonder if it works if you just hit enter without typing anything in) so I never would have thought of trying "sudo su root" which worked without asking for a password.
      When I saw "you can run all, nopasswd" I thought it meant you could run all commands that don't require a password (i.e. guest access) so I spent a while trying to dig around to see if there was some sort of local privilege escalation exploit but gave up and was asking for help on the discord, then I frustratedly tried sudo cat /etc/shadow after someone pointed out "Doesn't one thing stick out?" and it worked, then I tried sudo su root and got root.

  • @4rikkkk
    @4rikkkk 6 месяцев назад

    I'm beginner and this is my 3rd machine, I completed it without running a reverse shell, but the fact is I tried to :') I will keep this way to run a revershe shell, thanks!

  • @lance_lot2866
    @lance_lot2866 3 года назад +2

    Hello, when I walked through this room, I googled commands to output the file contents and one of them was "nl". It is not forbidden and is on the system. And file "second ingredients" I read with the command: "nl /home/rick/second\ ingredients". It's great that you can go through it in different ways.

  • @cooliceman0001
    @cooliceman0001 3 года назад

    Really enjoy your videos

  • @pascalkasparian1316
    @pascalkasparian1316 2 года назад

    It's seems so easy for you.. i'am a beginner and it was a little hard for me to understand all stuff ;) Love your vidéo Thx

  • @tizkit1
    @tizkit1 Год назад

    Thank you for this helpful vid

  • @cyberdevil657
    @cyberdevil657 2 года назад

    Holuy shit John you are a ninja at this!
    Ive seen the intervieuws with networkchuck & David Bombal. And what u do is amazing!

  • @Micahs0day
    @Micahs0day 2 года назад

    Excellent video!

  • @natking1u1z99
    @natking1u1z99 Год назад

    The first two flags were simple. But the third was stuck on because i couldn't figure out how review the source code for the php page, even though we didn't need it.
    Python3 didn't work for me so i had to see if the perl and php commands work which they did. A php shell wouldnt connect but perl reverse shell worked.
    I going to revisit this room once i really all fet a hold of what im learning . Been working on the support side of IT for 9 years so this is a new realm for me.

  • @TRD_Mike
    @TRD_Mike 2 года назад

    Type things in and hit the enter button to submit a comment. Thanks for making this video my dude.

  • @robertoquinones785
    @robertoquinones785 3 года назад

    I tried using head, cat and less, and less was the only one who worked. But happy to learn the grep . approach. !

  • @CuteTransGirlxD
    @CuteTransGirlxD 4 года назад

    I didnt know this was a thing. I wish my college classes was this cool when it came to doing this

  • @kylemagness5172
    @kylemagness5172 4 года назад

    nice stuff! ive gotten into linux a little, have it running on my laptop and RasPI but nothing as cool as this!

  • @talio-5469
    @talio-5469 4 года назад +4

    Liked, already subscribed, and I'm typing things to then press enter.

  • @silf6950
    @silf6950 2 года назад

    Thanks for the help!

  • @nayeemislam574
    @nayeemislam574 2 года назад

    Love the way he teaches these stuff.

  • @omerahmed463
    @omerahmed463 2 года назад

    You are awesome
    Love you John

  • @fongjon
    @fongjon 3 года назад +1

    A question, at 13:45 ish when quake is used the commands in the script (stablize_shell.sh) are echoed on the other netcat shell, how is this happening? If I do the same on my system the script writes out the commands on the guake shell. What am I missing? Thanks to anyone who can help

  • @DrRedrum
    @DrRedrum 2 года назад +2

    that... was.. TOTALLY AWESOME!!! I wanna do stuff like this too! By the way your typing speed is insane!

  • @lugasiyt899
    @lugasiyt899 3 года назад

    love ur videosss keep up the good work btw i just did less clue.txt its worked well :)

  • @ashelift
    @ashelift Год назад

    Great video! By the way you can solve the entire thing from the website command panel (without any reverse shell)

  • @onlylikenerd
    @onlylikenerd 4 года назад

    Fantastic video!

  • @xorinzor
    @xorinzor 4 года назад +28

    7:30 searching for incredibly difficult workarounds, while all he had to do was just add the filename to the base URL since they're located in the webroot, lol.

    • @imTyp0_
      @imTyp0_ 2 года назад +2

      Commands: less and tac work to read the files. Also everything was doable from the website, aka without a shell

    • @iCyberVenom
      @iCyberVenom Год назад

      I remember thinking, "It's impressive he knows multiple paths to get where he wants to go, but there's no way this is the easiest path"

  • @felipecg6587
    @felipecg6587 3 года назад

    gracias amigo, you rock!

  • @dopy8418
    @dopy8418 4 года назад +32

    Hey i've see that thumbnail somewhere...

  • @keithreynolds4108
    @keithreynolds4108 4 года назад

    Gotta say, it's impossible for me to follow that without pausing this but bravo!

  • @haXez_org
    @haXez_org 2 года назад

    Cheers John

  • @oussamanbou1090
    @oussamanbou1090 4 года назад

    i love what you are doing

  • @starcloister4651
    @starcloister4651 Год назад +1

    I still haven't learned all the stuff he did in the last few minutes. I did the web app hacking path and it taught me a lot but I still feel like it didn't prepare me for this exercise.

  • @osmanisiktas
    @osmanisiktas 2 года назад

    He is in another dimension!

  • @francoramirezcastillo8075
    @francoramirezcastillo8075 2 года назад

    doing it I only got to the part where the command can be executed, where the reverse shell was done, but then I had to watch this video and even so it took me about 2 hours in total to complete this CTF, and that was an easy level...

  • @justangryvideos47
    @justangryvideos47 3 года назад +2

    This is not even close to how I did this ctf. But thats the cool part, there are so many ways to tackle the same room

  • @mr.meatbeat9894
    @mr.meatbeat9894 4 месяца назад

    Thanks dude

  • @travisthayer8563
    @travisthayer8563 4 года назад

    Hmmm, WSL doesn't seem to work properly when instantiating local servers using netcat, either that or my AV or Firewall is getting in the way. I have the latest build and according to Microsoft's docs it should work. Anyone have any ideas?
    Solution: needed to make connection via OpenVpn for both Windows and WSL

  • @HackSyndicate
    @HackSyndicate Год назад

    less works better than cat for me, in most situations. Great video, thank you!

  • @phoenixbird09
    @phoenixbird09 3 года назад

    Thank you!!!

  • @Noeth
    @Noeth 3 года назад

    Very nice. I actually used strings to cat out.

  • @skinhoe
    @skinhoe 4 года назад

    Are you on the Redteam at VZ? I loved this video, can't wait for more; subed and all notifications on

  • @nothingreallymatters7530
    @nothingreallymatters7530 3 года назад

    i love watching this

  • @Zeeshan220dtsi
    @Zeeshan220dtsi 4 года назад

    Helped me alot !!

  • @shubhamsoin2429
    @shubhamsoin2429 4 года назад

    Thanks for the super neat walkthrough John.
    Could you please share the link to the video on setting up a stable reverse shell?

    • @UsamaAli-kr2cw
      @UsamaAli-kr2cw 4 года назад +3

      python -c 'import pty;pty.spawn("/bin/bash")'
      Ctrlz
      stty raw -echo
      fg
      Enter key 2 times
      export TERM=xterm

  • @RicondaRacing
    @RicondaRacing 2 года назад

    I started getting lost after you popped the reverse shell...lol

  • @Nixamina
    @Nixamina 4 года назад +2

    I didn't understand anything but i still watched the whole video.

    • @Melvin420x12
      @Melvin420x12 4 года назад

      It’s worthy to do the basic rooms in TryHackMe. OpenVPN, Linux Basics and Vulnversity. Just those three are enough to understand everything. Personal experience haha

  • @Sami-xv8ve
    @Sami-xv8ve 4 года назад

    great video man.

  • @issahmidan5821
    @issahmidan5821 3 года назад

    that machine has nc installec but i tried everything to make a reverse shell it didn't work for me i had to navigate around the system with that command line on the webserver and do 'less' command to read the files

  • @comedytime9010
    @comedytime9010 2 года назад

    Superb sir ❤️❤️

  • @TheTubejunky
    @TheTubejunky 2 года назад

    Well made video!

  • @Jsfun
    @Jsfun Год назад

    Rough seeing LastPass knowing what we now know.

  • @ryzein8450
    @ryzein8450 4 года назад

    i don't understand what is he doing, but it's so fun to watch.

  • @edgarchan5251
    @edgarchan5251 4 года назад

    I appreciate you fully prepared before you start recording.
    but... its better to clear your browser caches on those text boxes, which shows your submission histories~

  • @nestorvillafane7737
    @nestorvillafane7737 Год назад

    What a ninja.

  • @danielclv97
    @danielclv97 4 месяца назад

    the 2nd command I used after the cat failed was less, and it just worked! haha, weird they blocked head but not less

  • @chrisshevlin7771
    @chrisshevlin7771 Год назад

    I've been trying for ages to use gtfo bins for privilege escalation in the command line, I'm assuming now having watched this video that it won't work and I'm looking in the wrong place and only a reverse shell is the answer?

  • @s1ked_416
    @s1ked_416 Год назад

    hey how do you get your shell to give you some colors on the text whether it be directories or files and stuff? I saw when you were at "second ingredient" the text was in green, on my shell it didn't gve me that at all... is that dependent of the OS you use or something? if it wasn't for that I wouldn't have been able to figure out that you had to "cat *" the thing to get the 2nd one....

  • @nullpwn
    @nullpwn 4 года назад

    thanks man, now i know where i suck at..

  • @lame7904
    @lame7904 2 года назад

    How by running stabilise shell on other terminal he got all the commands executed on reverse shell ??? Can someone help me with that

  • @carnifex17
    @carnifex17 2 года назад +1

    To bypass blacklist in command panel we could just use "less" command

  • @alsongadizo1692
    @alsongadizo1692 10 месяцев назад

    Great video you kind of lost me when it came to python3 and using reverse shell engineering...but thanks..Could you please do a video on reverse shells...much appreciated

  • @FirstLevelMagic
    @FirstLevelMagic Год назад

    I am way late to this party and had been avoiding watching this so I could try it blind. To add on to the cat equivalents that others have posted, for stuff outside the served paths I was doing e.g. ‘base64 /etc/passwd | base64 -d’. Used nc to get the reverse shell, got root via a different path because I was manually enumerating for practice and found something else before I even tried a sudo.

    • @Vrory77
      @Vrory77 Год назад

      if you get revershell running with python 3 all you need to do is "sudo bash" and you have root access.

  • @theITGuy-no3nt
    @theITGuy-no3nt 3 года назад

    🎥🎬🍿 Its like SecDork movie night! 🍿🎬🎥

  • @DoorThief
    @DoorThief 4 года назад +4

    A web server that executes arbitrary commands, with a couple command blacklists? Man. They should have used a restricted shell for those results.

  • @nilanjanpaul5723
    @nilanjanpaul5723 2 года назад +2

    At 7:15 instead of the script (I liked that as I alway wanted to learn more of bash) you could have used 'tac' command in Linux which is opposite of 'cat' as it starts printing from bottom towards the top.

  • @davidthedreamer0
    @davidthedreamer0 4 года назад

    Damn... it looks powerful to use commands like that

  • @francisco1800
    @francisco1800 4 года назад

    i dont understand nothing that he is doing but it is interesting to watch :)

  • @notkorean1224
    @notkorean1224 4 года назад

    I don't understand anything that is going on but its super entertaining

  • @rafaelpedroso7002
    @rafaelpedroso7002 Год назад

    that was nice to do with John

  • @zacktzeng8569
    @zacktzeng8569 2 года назад

    Hi John thanks for the awesome video! Out of curiosity, how do you split the terminal? Is that the native Ubuntu terminal or did you use something else?

  • @unknwonyes3345
    @unknwonyes3345 2 года назад

    WTF the voice of this guy is deep af