HackTheBox - Gofer

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024

Комментарии • 28

  • @boogieman97
    @boogieman97 10 месяцев назад +7

    This one was done very very well! Outstanding explanations !!

    • @ippsec
      @ippsec  10 месяцев назад +2

      Thanks, glad you liked it. The use after free explanation make sense?

    • @boogieman97
      @boogieman97 10 месяцев назад

      @@ippsec I was already aware of it. But you did a great job explaining it.

  • @WatsonGT
    @WatsonGT 10 месяцев назад +1

    Great video! Thanks for taking the time to explain your thought process in detail, learned a lot.

  • @Sudo_Y3L
    @Sudo_Y3L 10 месяцев назад

    Fantastic video! I really appreciate your thorough explanation of your thought process. I gained a lot of valuable insights.

  • @nirzaaa
    @nirzaaa 10 месяцев назад +1

    Two things I found interesting so far:
    When examining the documentation, it seems important to have a newline between the 'Subject' field and the message body (which I did and it worked). However, in the video, it worked without it:
    A blank line is needed between the 'Subject' field and the message body.
    I attempted to establish a reverse shell on port 22 since I found this port open during the initial scan. Unfortunately, I couldn't get a reverse shell. I then changed to some other random port, and it worked. Maybe it was a mistake on my end, so I will certainly try again :)

  • @AUBCodeII
    @AUBCodeII 10 месяцев назад +15

    Common IppSec phrases:
    What's going on, RUclips, this is IppSec, and we're doing X from Hack The Box
    As always we start with nmap so -sC for default scripts, -sV for enumerate version, -oA to output all formats
    This may take some time to run so I've already ran it
    Please subscribe
    Shoot
    I did not have Ipp relations with that woman
    There we go
    Hey, at least I'm not drinking, Brian
    Hope you guys enjoyed the video, take care, and I will see you all next time

    • @sl4x0
      @sl4x0 10 месяцев назад +1

      Let's Seee!
      😂

    • @72.849
      @72.849 10 месяцев назад

      looking at the resulsts, we see x ports open, the first one being ssh on port 22, and we can see....@@sl4x0

    • @FMisi
      @FMisi 10 месяцев назад +1

      crap

  • @yuyu-ce4fz
    @yuyu-ce4fz 10 месяцев назад +1

    Nice box

  • @tg7943
    @tg7943 10 месяцев назад

    Push!

  • @extravenger9137
    @extravenger9137 10 месяцев назад

    hey ipp, what keyboard r u using if i may ask?

  • @teststudent5032
    @teststudent5032 10 месяцев назад +1

    33 seconds after publishing 🙂

  • @ominousSHELL
    @ominousSHELL 10 месяцев назад

    Ippsec, do you plan on making HTB Battlegrounds content?

    • @ippsec
      @ippsec  10 месяцев назад

      If I ever went back to streaming too and became consistent, I may do some. But no plans on that.

    • @ominousSHELL
      @ominousSHELL 10 месяцев назад

      @@ippsec Okay.

  • @Hashghost21
    @Hashghost21 10 месяцев назад

    It will be good if you will teach us binary exploitation and RE

  • @qgames18
    @qgames18 10 месяцев назад +2

    On Debian there by default is no sudo installed.

  • @heapbytes
    @heapbytes 10 месяцев назад

    ok so why telnet smtp mail ??? i didn't get this :(

    • @ippsec
      @ippsec  10 месяцев назад

      When a program sends mail to SMTP, it is just opening a socket to the SMTP Port and writing the strings showed in this video. Since with Gopher we can write strings to a socket we can use it to send SMTP Commands which end up sending an email.

  • @Heisenberg696
    @Heisenberg696 10 месяцев назад +2

    why don't you make a course that would me great

    • @ippsec
      @ippsec  10 месяцев назад +6

      There is, it's ippsec.rocks. There is no syllabus but IMO the most important part in this field is being able to identify what you need to search for and learn as you go.

    • @Heisenberg696
      @Heisenberg696 10 месяцев назад

      @@ippsec i didn't get the 16:40 part if some can explain whole part

    • @ippsec
      @ippsec  10 месяцев назад +1

      @@Heisenberg696 go to Ippsec.rocks, type in “ip encode” and you’ll see the first time I explain it (holiday video). The first time I explain something I generally go into more detail