HackTheBox - Anubis

Поделиться
HTML-код
  • Опубликовано: 1 фев 2025

Комментарии • 64

  • @skudddle
    @skudddle 3 года назад +59

    Watching this with absolute no clue as to what he is doing, but fully captivated.

  • @SuperNGLP
    @SuperNGLP 3 года назад +14

    I'm not sure what I'm more impressed by.
    It's either, that he's talking on 1.5x speed by default, without a single mistake or that he's hacking the machine with the same kind of routine and ease as I tie my shoelaces.

  • @LuisMorales-bl7fc
    @LuisMorales-bl7fc 3 года назад +15

    Master piece!! I was looking for something like this in order to understand Certified Pre-Owned, outstanding explanation.

  • @lukbie_
    @lukbie_ 3 года назад +4

    I was expecting a fire mixtape when i clicked this and stayed because of your calming voice. Thanks i guess :D

    • @DyLexia21
      @DyLexia21 3 года назад +1

      ahhahaha holy shit I was feeling the same :d

  • @socat9311
    @socat9311 3 года назад +18

    Would love to see an active directory cloud setup and attack vid. There are some out there, I just really like your style.
    Regardless, thanks for all the great vids

  • @Ms.Robot.
    @Ms.Robot. 3 года назад +2

    I had to watch this. It was so hypnotic.

  • @chiragartani
    @chiragartani 3 года назад +3

    Gonna watch tonight. 🙌
    Ippsec rocks! 🔥

  • @pythonxsecurity8287
    @pythonxsecurity8287 3 года назад +16

    bro you soooooo gooood respect

  • @khurramwzd
    @khurramwzd 3 года назад +5

    Another wonderful walkthrough

  • @displaySport
    @displaySport 3 года назад

    Thank you for this video! I learned so much from it

  • @saketsrv9068
    @saketsrv9068 3 года назад +3

    yay.... finally long video

  • @aaryanbhagat4852
    @aaryanbhagat4852 3 года назад +3

    Great explanation!
    I just missed the part where you found out the username to be "localadmin" of the smb share?

    • @road6915
      @road6915 3 года назад +2

      He got the hash of that password with responder, and the hashes have the name:domain:hash structure

    • @LuisMorales-bl7fc
      @LuisMorales-bl7fc 3 года назад +1

      NetNTLMv2 hash captured by responder.

  • @h1dvy
    @h1dvy 3 года назад +4

    Hi IppSec, great video btw!
    Can you please share the contents of your /opt/ directory (Assuming it only contains open-source utilities).
    Thx in advance!

    • @ippsec
      @ippsec  3 года назад +2

      Sorry, nope. There’s potentially sensitive things created by the tools in there. For example responder stores hashes in responder.db

    • @h1dvy
      @h1dvy 3 года назад +1

      @@ippsec I appreciate your prompt response!
      I was just wondering if there was some sort of a list of tools that you commonly use for such exercises;
      It can be quite annoying to do all the things manually, only to find in the end that there is already a handy utility made for the same thing.

    • @h1dvy
      @h1dvy 3 года назад +4

      ​@@ippsec Sorry, I just realised that my initial comment was not phrased correctly; I was not looking for the actual contents of your /opt/ directory xD
      I was wondering if you can share the tool names that you use
      (From what I've seen in your videos, the parent folders are named the same, so something like an "ls" output would do).

    • @k_xx
      @k_xx 2 года назад +2

      Watch some 10-15 videos and take notes as you go. You'll quickly figure out which tools are essential and which are added "as you go".

  • @huuloc8719
    @huuloc8719 3 года назад +5

    Nice.

  • @robbie_984
    @robbie_984 2 года назад

    Very nice video. I had an issue though. When I applied the cert vuln and running Certify again, "Server Authentication" was not there. Client and SmartCard were. Dunno why since I copied the same thing from the blogpost.

  • @zwwx2142
    @zwwx2142 3 года назад +2

    what is the name of this theme programming, I do not understand

  • @BlackHermit
    @BlackHermit 3 года назад +2

    responder is such a great tool!

  • @SS-SoranWaffen
    @SS-SoranWaffen 3 года назад +1

    Good video!

  • @inakitedo475
    @inakitedo475 3 года назад +2

    How is it possible that this box was rooted in 26 minutes? A zero day that we don't know?

    • @ippsec
      @ippsec  3 года назад +5

      The creator had set the admin password of the docker to the same thing as the host. So there was an unintended where you could pass the hash

  • @ca7986
    @ca7986 3 года назад +3

    ❤️

  • @darshacharya1102
    @darshacharya1102 3 года назад +1

    From which playlist of you i can start for ctf plz answer

  • @k1nz30
    @k1nz30 3 года назад +1

    Grate to watch Kermit the frog doing this

  • @dusktime
    @dusktime 3 года назад +1

    What operating system are you using

  • @tthtlc
    @tthtlc 2 года назад

    first, what is the terminal he used, so that it can be split into multiple screen when necessary?

    • @Bob737
      @Bob737 2 года назад

      tmux

  • @piotrpytkowski1542
    @piotrpytkowski1542 3 года назад

    What is your linux distribution? or you working on mac?

  • @bel55604
    @bel55604 2 года назад

    👏🏻👏🏻👏🏻👏🏻👏🏻

  • @ibrahim3690
    @ibrahim3690 3 года назад

    Where and how can I learn the prerequisites for this info

  • @vadik1001
    @vadik1001 3 года назад +1

    damn it, i was hoping that intended way is not through cert

  • @ratapubimi
    @ratapubimi 3 года назад +2

    Where did my comment about chisel go?

    • @ippsec
      @ippsec  3 года назад +1

      No idea, I never saw a comment about chisel and don't see one in the "held for review" section.

    • @ratapubimi
      @ratapubimi 3 года назад +1

      @@ippsec YT is deleting my comments! Seems i Have a buzzword in it.

  • @el3man
    @el3man 3 года назад +1

    damn for a sec i thought u figured out how to hack rekordbox because of ur logo

  • @pampipipi8254
    @pampipipi8254 3 года назад +3

    It's me your fan

  • @Wthisthisx
    @Wthisthisx 3 года назад

    What is this?? I'm lost but also interested.

  • @MrM4rcYT
    @MrM4rcYT 3 года назад +1

    I have no Iddea of hacking and coding, but sat through th whole video. still have no idea, what u did. but likd it anyway.

  • @saranshsarafmr23r06
    @saranshsarafmr23r06 3 года назад +2

    Amazing Sir, I've learnt a lot from you. Can you please cover the new IIS dos & rce cve?

  • @nooblolxd3919
    @nooblolxd3919 3 года назад

    Where can I learn it?

  • @skyone9237
    @skyone9237 3 года назад +1

    This box I had no clue how to exploit it

  • @krishnasoni4427
    @krishnasoni4427 3 года назад +2

    Sir please solve Active Directory labs related to oscp ❤️❤️❤️🙏

    • @ippsec
      @ippsec  3 года назад +4

      No way for me to know what’s on that exam.

    • @skyone9237
      @skyone9237 3 года назад +2

      He should rather do a live stream of exam itself.. 😂😂😂

  • @chemicalzxd
    @chemicalzxd 3 года назад

    This is the longest thing ive watched that i dont understand

  • @kommie27
    @kommie27 2 года назад

    Having Smartcard login is just a open door sign.

  • @newlineschannel
    @newlineschannel 3 года назад

    GD ANUBIS??

  • @xcat4775
    @xcat4775 3 года назад +1

    YOU SAID ANUBIS WRONG

  • @Ladas552
    @Ladas552 3 года назад

    Bro, U hacked my youtube recommendations , not box.

  • @AsadAli-ye8ns
    @AsadAli-ye8ns 2 года назад

    bro slow down a little bit and explains a little bit what are you doing and why are you doing and steps please....

  • @VivaLyaLibertyBibaLyaLiberty
    @VivaLyaLibertyBibaLyaLiberty Год назад

    Realy insane

  • @anamariedevera8635
    @anamariedevera8635 Год назад

    Hello I have tried the Rubeus and reset multiple times; however, I keep getting this error KDC_ERR_PADATA_TYPE_NOSUPP

  • @vonniehudson
    @vonniehudson 3 года назад +2

    Proof @ippsec is leet: check the tmux time in the bottom right of his terminal @52:34