Fyi when you select part of a request in Repeater it tells you the byte length at the top right, right under 'INSPECTOR'. That should save you from having to use wc. Great video, as always!
Thank you so much for the videos, These videos are what helped me to prepare for the oscp and crack it. I cant thank you enough for all the knowledge that you’ve been giving all of us :) Also awesome video 😄
@@mateensadat2114 honestly just pull the trigger and purchase the course, if you are thinking like “ill purchase the course when im 100% sure that i can crack it in my first attempt” believe me you wont ever be 100% sure that you can pass any test. Imho just dont think about the result as the saying goes “its not the destination, its the journey.”
How do Headers work? I mean html its obvious but the other Headers i.e. openssh or something. Im learning everything by myself but header and banner I dont get it. I mean when I make my own Homepage with Server etc. where are These headers/ banners stored or where do I put them in. Trying Google it I find only html stuff. Still want to say Ippsec youre my Main learning material. I learned with you more about programming and pentesting then any udemy/ yt tutorial ever teached me. Thanks for that ALOT.
Binding to IP wasn’t to protect against stealing cookies. It was to make the box fun to play. It’s not fun when you stage an exploit payload and then it doesn’t exist when you try to trigger it because of a load balancer you can’t see. Sure Pentesters should know how to deal with load balancer but that wasn’t an learning objective of this box.
Fyi when you select part of a request in Repeater it tells you the byte length at the top right, right under 'INSPECTOR'. That should save you from having to use wc. Great video, as always!
Thank you so much for the videos, These videos are what helped me to prepare for the oscp and crack it. I cant thank you enough for all the knowledge that you’ve been giving all of us :)
Also awesome video 😄
have you cracked oscp...congrats
@@mateensadat2114 Yes I've already cracked it :)) Now Trying OSEP :)
@@kishorcodes I got one after passing oscp :)
@@snailsec awesome bro...i am also planning to register for the course...but i am afraid whether i can pass or not...
@@mateensadat2114 honestly just pull the trigger and purchase the course, if you are thinking like “ill purchase the course when im 100% sure that i can crack it in my first attempt” believe me you wont ever be 100% sure that you can pass any test. Imho just dont think about the result as the saying goes “its not the destination, its the journey.”
Interesting that the Black Hills Infosec Podcast talked about the haproxy vulnerability on the 17th
the Boss is here as always
Too good!👌
you are awesome :)
Awesome +
Thanks.
cool
@ippsec You make boxes look so easy! Uh oh, imposter syndrome is starting to kick in over here.
True :D
He has tone of experience, also, I think he spends good amount of time in the forums of hackthebox reading and sharing tips on the specific box.
Good bro
Grazie mille !!!
Not the kitchen sink! :D fun box IppSec.
How do Headers work? I mean html its obvious but the other Headers i.e. openssh or something. Im learning everything by myself but header and banner I dont get it. I mean when I make my own Homepage with Server etc. where are These headers/ banners stored or where do I put them in. Trying Google it I find only html stuff.
Still want to say Ippsec youre my Main learning material. I learned with you more about programming and pentesting then any udemy/ yt tutorial ever teached me. Thanks for that ALOT.
Where do you or what do you search to learn this type of hacking? What's the best place to learn in other words. TIA. Great work.
buy vip and do more htb the ones with writeups and learn
meow
Binding sessions to client ips would protect a bit against stealing cookies, but it is a pain if clients change IPs
Binding to IP wasn’t to protect against stealing cookies. It was to make the box fun to play. It’s not fun when you stage an exploit payload and then it doesn’t exist when you try to trigger it because of a load balancer you can’t see.
Sure Pentesters should know how to deal with load balancer but that wasn’t an learning objective of this box.
To complete the trifecta of janky modulo load balancing, next time use a bpf program to do it xD
Sir we want qna with face reveal....!
he had revealed his face just go and check the channel of HackTheBox.