HackTheBox - Sink

Поділитися
Вставка
  • Опубліковано 3 гру 2024

КОМЕНТАРІ • 34

  • @marcosduran1948
    @marcosduran1948 2 роки тому +1

    Fyi when you select part of a request in Repeater it tells you the byte length at the top right, right under 'INSPECTOR'. That should save you from having to use wc. Great video, as always!

  • @snailsec
    @snailsec 3 роки тому +6

    Thank you so much for the videos, These videos are what helped me to prepare for the oscp and crack it. I cant thank you enough for all the knowledge that you’ve been giving all of us :)
    Also awesome video 😄

    • @mateensadat2114
      @mateensadat2114 3 роки тому

      have you cracked oscp...congrats

    • @snailsec
      @snailsec 3 роки тому

      @@mateensadat2114 Yes I've already cracked it :)) Now Trying OSEP :)

    • @snailsec
      @snailsec 3 роки тому +1

      @@kishorcodes I got one after passing oscp :)

    • @mateensadat2114
      @mateensadat2114 3 роки тому

      @@snailsec awesome bro...i am also planning to register for the course...but i am afraid whether i can pass or not...

    • @snailsec
      @snailsec 3 роки тому +2

      @@mateensadat2114 honestly just pull the trigger and purchase the course, if you are thinking like “ill purchase the course when im 100% sure that i can crack it in my first attempt” believe me you wont ever be 100% sure that you can pass any test. Imho just dont think about the result as the saying goes “its not the destination, its the journey.”

  • @xmilkman3399x
    @xmilkman3399x 3 роки тому +2

    Interesting that the Black Hills Infosec Podcast talked about the haproxy vulnerability on the 17th

  • @sandiproy9810
    @sandiproy9810 6 місяців тому

    the Boss is here as always

  • @randomguy3784
    @randomguy3784 3 роки тому +1

    Too good!👌

  • @itswellick9507
    @itswellick9507 3 роки тому +2

    you are awesome :)

  • @netbin
    @netbin 3 роки тому +1

    Awesome +

  • @huuloc8719
    @huuloc8719 3 роки тому +1

    Thanks.

  • @r3arie
    @r3arie 3 роки тому +2

    cool

  • @davidvalarti2249
    @davidvalarti2249 3 роки тому +5

    @ippsec You make boxes look so easy! Uh oh, imposter syndrome is starting to kick in over here.

    • @computersciencestuff3405
      @computersciencestuff3405 3 роки тому

      True :D

    • @TalsonHacks
      @TalsonHacks 3 роки тому

      He has tone of experience, also, I think he spends good amount of time in the forums of hackthebox reading and sharing tips on the specific box.

  • @cybersecurity3523
    @cybersecurity3523 3 роки тому +1

    Good bro

  • @root7838
    @root7838 3 роки тому

    Grazie mille !!!

  • @MD4564
    @MD4564 3 роки тому

    Not the kitchen sink! :D fun box IppSec.

  • @nukeem1832
    @nukeem1832 3 роки тому +2

    How do Headers work? I mean html its obvious but the other Headers i.e. openssh or something. Im learning everything by myself but header and banner I dont get it. I mean when I make my own Homepage with Server etc. where are These headers/ banners stored or where do I put them in. Trying Google it I find only html stuff.
    Still want to say Ippsec youre my Main learning material. I learned with you more about programming and pentesting then any udemy/ yt tutorial ever teached me. Thanks for that ALOT.

  • @leesmith7547
    @leesmith7547 3 роки тому

    Where do you or what do you search to learn this type of hacking? What's the best place to learn in other words. TIA. Great work.

    • @mrmathmonkey9582
      @mrmathmonkey9582 3 роки тому

      buy vip and do more htb the ones with writeups and learn

  • @rozbrajaczpoziomow
    @rozbrajaczpoziomow 3 роки тому +3

    meow

  • @berndeckenfels
    @berndeckenfels 3 роки тому

    Binding sessions to client ips would protect a bit against stealing cookies, but it is a pain if clients change IPs

    • @ippsec
      @ippsec  3 роки тому +1

      Binding to IP wasn’t to protect against stealing cookies. It was to make the box fun to play. It’s not fun when you stage an exploit payload and then it doesn’t exist when you try to trigger it because of a load balancer you can’t see.
      Sure Pentesters should know how to deal with load balancer but that wasn’t an learning objective of this box.

  • @CoolFire666
    @CoolFire666 3 роки тому

    To complete the trifecta of janky modulo load balancing, next time use a bpf program to do it xD

  • @creedx8407
    @creedx8407 3 роки тому +2

    Sir we want qna with face reveal....!

    • @cimihan4816
      @cimihan4816 3 роки тому +2

      he had revealed his face just go and check the channel of HackTheBox.