HackTheBox - Kotarak

Поділитися
Вставка
  • Опубліковано 1 гру 2024

КОМЕНТАРІ • 54

  • @hellsingx1
    @hellsingx1 4 роки тому +1

    I learn a lot with your videos. Nice job

  • @SuperDanut
    @SuperDanut 4 роки тому +1

    Great stuff ! Thank you, Sir!

  • @Retr0Kid
    @Retr0Kid 6 років тому +2

    I recommend for the next box either Minion or Tally. Also thanks for the video it better helps me understand how CTFs work which I'm finding very fun to do and less frustrating now.

    • @ippsec
      @ippsec  6 років тому +1

      Only do retired machines, which is based upon difficulty/release date. The ones you mentioned are close to retiring but won't be next.

    • @m10xde
      @m10xde 6 років тому

      Is there a way to know which machine will be retired next, before the announcment when a new machine will come?

    • @Retr0Kid
      @Retr0Kid 6 років тому

      m10x.de ya if you click on the machine it should say how old it is I cant remember how long until it's retired but the one on top of list gets close to being retired

    • @ippsec
      @ippsec  6 років тому +1

      @m10x.de nope. The announcement of new page is when the retired machine is set in stone. My "early information" isn't always correct, that's why I accidentally recorded Kotarak 2 weeks ago and was briefly posted before Node

    • @Retr0Kid
      @Retr0Kid 6 років тому

      IppSec ah thanks dude

  • @ShabazDraee
    @ShabazDraee 4 роки тому +2

    when trying to parse the ntds using impackets, for me gets stuck at the Target system bootkey and doesn't finish it off ....

  • @aaryanbhagat4852
    @aaryanbhagat4852 2 роки тому

    I would like to know your understanding, if I would have done an all port scan using nmap I would have not thought of doing an all port scan again using ssrf, what makes you think "I should enumerate ports again using ssrf"?

  • @mattlebutter9162
    @mattlebutter9162 4 роки тому +5

    Well if that's representative of OSCP exam's machines this is going to be tough

    • @wardy540
      @wardy540 3 роки тому +2

      its not

    • @brandonevans5123
      @brandonevans5123 2 роки тому

      I have been thinking the same thing... Did you ever sit for the OSCP?

  • @roninjanjira9687
    @roninjanjira9687 6 років тому +1

    I have a problem running impacket....it keeps telling me I need 4 arguments no matter how many arguments i put

  • @striple765
    @striple765 5 років тому +2

    tbh this was a nice and hard box
    not what you are thinking :3

  • @sakyb7
    @sakyb7 6 років тому

    Awesome one

  • @aiden287
    @aiden287 6 років тому +2

    I feel like I saw this video just the other day... Briefly ;)

  • @waterlord6969
    @waterlord6969 2 роки тому

    There was listed a service AJP on port 8009. This might indicate that the website might be vulnerable to ghostCat - basically LFI. Can be exploited to get Tomcat passwords

    • @brandonevans5123
      @brandonevans5123 2 роки тому

      I don't think this actually works in the box -- yes it is vulnerable to Ghostcat but the only file that should be able to be leaked is /WEB-INF/web.xml. Everything else is restricted.

  • @km0x905
    @km0x905 6 років тому +1

    👏👏👏

  • @spaffhazz
    @spaffhazz 3 роки тому

    after getting and upgrading the shell is anyone experiencing the shell freezing or slow in response?

  • @gilfer88
    @gilfer88 5 років тому +1

    Is "authbind" something that is commonly installed on tomcat servers? How would one know if authbind is installed?

    • @CAlex-yk5bg
      @CAlex-yk5bg 4 роки тому

      what linux command tells you which version of a program you are running?
      more importantly, think about as an administrator when you might want to give users the ability to open ports but don't want to give that user full admin rights. Web server might be a common version of that.

    • @wutangdaug
      @wutangdaug 4 роки тому

      @@CAlex-yk5bg I am having the exactly same wonder. Now, I thank you for point it out, I need a different view to think as an admin, that is a really awesome prospective to help me hacking. Thank you so much.
      BTW, what do you mean by your first sentence? Are you suggesting I should've check tomcat version where I can get a hint for authbind?

    • @shankaranarayana4825
      @shankaranarayana4825 4 роки тому

      @@wutangdaug he is saying run "authbind --version" to answer "How would one know if authbind is installed?". Looks like authbind is a common program. It might've showed up if you ran LinEnum.sh or something.

    • @shankaranarayana4825
      @shankaranarayana4825 4 роки тому

      But --version does not seem to print out the version of auth bind. "man authbind" shows the manpage. But there is no command to print its version. Anyhow the point was to find out if it exists on the system and just running the command "authbind" confirms that it is installed.

  • @hozaifaowaisi1250
    @hozaifaowaisi1250 6 років тому +3

    is your name ippSec because you wanted to make IPSec more secure by adding one more p (Protection)

    • @ippsec
      @ippsec  6 років тому +7

      Nope. Ipp's just a name i use online, but hard to register due to 3 characters either being registered or not allowed.

  • @Honker1337
    @Honker1337 6 років тому

    There's a video of yours that has a bit in where you're running an audio analysis on a file for steganography. I am trying to find it as I cannot remember the name of the tool you used for that?

  • @gilfer88
    @gilfer88 5 років тому

    Also, having a hard time understanding setting the listening IP to 0.0.0.0? Why is this viable for the exploit to work?

    • @ippsec
      @ippsec  5 років тому

      It would help if you linked to the time. My best guess is the IP Address was set to the IP of eth0, however HackTheBox utilizes tun0. Setting it to 0.0.0.0 just says all interfaces.

  • @abhishekchaudhari970
    @abhishekchaudhari970 6 років тому

    Thanks again for nee video
    Ur every video teaching me something new.
    Keep it up..👍👍

  • @salluc1712
    @salluc1712 4 роки тому

    you are so smart

  • @othellomoro9658
    @othellomoro9658 6 років тому +3

    tmux in tmux ... we need to go deeper ! How about fibonacci spiral made of panes? ;)
    good vid btw!

  • @DavidThomsenPhD
    @DavidThomsenPhD 6 років тому

    Whats that addon/extension for firefox you use for the proxy?

  • @somerandomwithacat750
    @somerandomwithacat750 Рік тому

    You mentioned log poisoning when you get a callback from the server early on. You were running a python web server and mentioned that you didn't see a useragent so you deduced that log poisoning wasn't the solution. Python web server doesn't show useragents, iirc. Netcat does. If you want to test for usersgents or to get more info when a server calls back you should run both netcat and python

  • @celticfans1
    @celticfans1 10 місяців тому

    is nc on the box? you literally just used it to send the files over :)

    • @ippsec
      @ippsec  10 місяців тому

      I’d guess Regular nc, not the one with a -e flag. Comes with tcpdump I believe

    • @celticfans1
      @celticfans1 10 місяців тому

      18:29 all you check is nc right?

  • @THOTHO-ie5lz
    @THOTHO-ie5lz 5 років тому

    does SimpleHTTPServer tell you the user agent info? ua-cam.com/video/38e-sxPWiuY/v-deo.html
    i tried to my firefox to browse it, but it always return '- -' without user agent info.

  • @goebbelsx
    @goebbelsx 6 років тому

    I think the best way to do full port range scan is to use masscan tool, isn't it? I just wonder. You always use nmap for full port scan. masscan is much faster. Correct me if I'm wrong, I'm just a regular guy :D

    • @ippsec
      @ippsec  6 років тому +1

      Massscan can cause some issues in a VM and saturate network links. I generally use it if I'm looking for a particular service across a large network. However, for a port scan I prefer to do nmap which has retries and such built in to help ensure accuracy. For single hosts, I'd prefer to wait the few minutes and have an accurate scan.

  • @yashkumar2716
    @yashkumar2716 6 років тому +2

    how can i contact u