HackTheBox - Haircut

Поділитися
Вставка
  • Опубліковано 29 лис 2024

КОМЕНТАРІ • 67

  • @Clutchisback1PC
    @Clutchisback1PC 6 років тому +19

    The little things like "stty raw -echo" to get tab complete to return to a local shell will never be forgotten. It's these little things that keep me digging through your videos along with the great clarity, simplicity, and comprehensive explanations you provide in your walkthroughs....Thanks!

  • @tigermelissa
    @tigermelissa 5 років тому +18

    Thank you so much for leaving in the "mistakes" or things that just don't work so that we can see your process and troubleshooting. It's extremely helpful.

    • @tigermelissa
      @tigermelissa 3 роки тому

      @@fisherahmad2781 neat, but maybe don't hack your SO's stuff... Those aren't building blocks for a healthy relationship 🤷‍♀️

  • @n1ckhacks697
    @n1ckhacks697 7 років тому +23

    Everytime i watch your videos my way gets more clear Thanks Ippsec 😊

    • @TechyTubeDotCom
      @TechyTubeDotCom 5 років тому +2

      He brings all the reading, courses, videos into one awesome chain of how it works together.. Love your work @ippsec :)

  • @frankleitner
    @frankleitner 4 роки тому +8

    To compile on the box itself, just add the location of cc1 into PATH:
    export PATH=$PATH:/usr/lib/gcc/x86_64-linux-gnu/5/

    • @KM-tz2ef
      @KM-tz2ef 4 роки тому

      Thank you!! Super useful.

    • @redpanda31337
      @redpanda31337 3 роки тому

      Bit late to the party, but in the PATH of www-data is a /. In the end, so would be enough to just cd into that directory maybe

    • @MalikAbdullah-je9cp
      @MalikAbdullah-je9cp Рік тому

      Man, You have gained my respect in totality. Hats off to you man. Really appreciate it! It's people like you we need in the community so much. Thanks man!

  • @gabrielalicea4803
    @gabrielalicea4803 5 років тому

    I love watching your videos. I learn so much from them. Thank you for the effort.

  • @RowanSheridan
    @RowanSheridan 7 років тому

    You should have a lot more subs. I love watching your vids and learning about your thought process when tackling boxes.

  • @PR1V4TE
    @PR1V4TE Рік тому

    I'm enough with uid and gid. Bcus I can directly get clean root from root's uid and gid. With these both..! I just watched this bcus you said you've explained more indepth about screen 4.5.0. but still loved it.

  • @arty3514
    @arty3514 6 років тому +1

    ippsec has to be the guy from My Little Toaster movie. The one with the big 4x4 who collects and works on electronics. Sounds exactly like him; and also works on computers.

  • @morvannozahic6575
    @morvannozahic6575 4 роки тому

    Thanks for all your videos. I might be a little bit late, but at 27', C code needs to end with an empty line after the curly bracket it might be the reason why you have the error

  • @SonOfABeach1997
    @SonOfABeach1997 4 роки тому

    For foothold I managed to get a restricted shell by sending a line feed to the curl command and executing commands, however failed to escalate it to a unrestricted shell. So ended up doing it the same way in the uploads directory.

  • @lIlIllll1
    @lIlIllll1 3 роки тому

    How did you know to edit the rootshell.c file with a system command?

  • @mr.roboter
    @mr.roboter 5 років тому

    This is awsome video.Thanks IPPSec sir

  • @laurencedale3854
    @laurencedale3854 7 років тому

    Congrats on the Shocker first blood :)

  • @krisrp0
    @krisrp0 4 роки тому

    I cannot get tis exploit to work no matter how closely I follow the directions. I wind up with some sort of corruption and I need to keep on re setting the machine

  • @thedawnofslayer
    @thedawnofslayer 5 років тому

    @19:29 Back to the roots, no GTFOBins at that time.

  • @tw3t3
    @tw3t3 7 років тому

    Hello) That is awesome what are you doing)
    You share not only the solution, but the way of thinking.
    Thanks!
    May I ask, where did you get all linux enum scripts for LPE ?
    Seems, you look for /opt directory) That is no default.

    • @ippsec
      @ippsec  7 років тому +1

      Google is your friend, search on filenames I use and generally you'll find them on github somewhere.

    • @tw3t3
      @tw3t3 7 років тому

      IppSec 2/3 scripts has been found. Except unIxprivsec, found similar but too old, more than 4 years.

    • @ippsec
      @ippsec  7 років тому +1

      That is probably it. When doing privesc, new scripts may miss stuff on very old boxes. So it's nice to have legacy stuff around. New isn't always better, right tool for the job.

    • @tw3t3
      @tw3t3 7 років тому

      IppSec , thanks for assist!

  • @DavidThomsenPhD
    @DavidThomsenPhD 6 років тому

    When I edit the request headers in repeater and hit go I'm getting nothing. What am I doing wrong?

  • @Danielmofer
    @Danielmofer 5 років тому

    @ippsec What you press to come back to the tty(with the reverse netcat), because after I execute "stty raw -echo" my terminal doesn't react.

    • @IamFulgus
      @IamFulgus 5 років тому

      I know it's been a while since your comment, but after that command he presses "fg" on the keyboard to invoke the background process (the ncat) to foreground, then press enter and the enter again to get the proper shell

  • @evstefan6686
    @evstefan6686 7 років тому

    great job thank you so much for sharing
    i have a question which is the reason for typing import pty:pty spawn("/bin/bash")?
    thanks again

    • @ippsec
      @ippsec  7 років тому +2

      It's creating a pseudo-terminal for us. Think of it like a persistent session, without having it we send information get information back and close the session. Doing that breaks a lot of things, for example when you type something and it asks a question. Or use less/vi/etc. Having it always makes it easier so that's generally the first step after getting a reverse shell.

    • @evstefan6686
      @evstefan6686 7 років тому

      thank you for respond ippsec

  • @akbarkp4216
    @akbarkp4216 7 років тому

    @IppSec when i run stty -raw echo it works fine for first time and when i try the second session from netcat it just hangs.. ctrl+z also doesnt work at this case.. Can you help me move on?

    • @ippsec
      @ippsec  7 років тому +2

      I'd recommend just getting another shell, changing to the user you want, then doing the tty trick.

  • @amjadhammoudeh7954
    @amjadhammoudeh7954 6 років тому +1

    what does stty raw -echo actually do ?

    • @ippsec
      @ippsec  6 років тому +3

      Watch either popcorn or the video after that, I explain it there. Hard to explain in text

    • @amjadhammoudeh7954
      @amjadhammoudeh7954 6 років тому

      Thank you mate

  • @malikbenkirane4462
    @malikbenkirane4462 6 років тому

    Hey! did I miss something or you didn't said where to get gobuster from ?

    • @ippsec
      @ippsec  6 років тому +1

      Github. But you can just do apt install gobuster now

    • @malikbenkirane4462
      @malikbenkirane4462 6 років тому

      @@ippsec deam i must have mistyped my search last time and commented too quickly sorry for that

  • @panagiotismitkas5526
    @panagiotismitkas5526 7 років тому

    Hello Ippsec,one question that might be irrelevant but i want to ask.Can this input on exposed.php be used as a ssrf exploit?

    • @ippsec
      @ippsec  7 років тому +1

      Yes. If there was no way to perform code execution or save files, I would be categorized as an SSRF. I generally ask myself: "can this be used to act like a proxy into their private network"? and if the answer is yes, I'd label SSRF. Whether or not that's correct or not, I have no idea there are countless labels for exploits.

    • @panagiotismitkas5526
      @panagiotismitkas5526 7 років тому

      IppSec actually I'm not asking how it can be labeled,but if it can be exploited with ssrf.sorry if I was not clear.

    • @ippsec
      @ippsec  7 років тому

      SSRF doesn't directly allow for code execution and I don't believe any other services were listening on loopback. So I believe the answer is no. You'd mark it as a finding as it is indeed a SSRF-able but it does not get you anything.

    • @panagiotismitkas5526
      @panagiotismitkas5526 7 років тому

      Ok, clear!thanks a lot.
      The reason I'm asking is because I found a similar user input on another machine but there I cannot explanation exploit it with command injection

  • @somerandomwithacat750
    @somerandomwithacat750 Рік тому

    All my homies hate compiling exploits

  • @justaguy3158
    @justaguy3158 7 років тому

    Love you man.. keep going 😘

  • @JoshieRonark
    @JoshieRonark 4 роки тому

    hello ippsec. i searched for an hour but i don't get any answer. i'm trying to execute exploit but my gcc throwing errors. which libraries do i need?

    • @ippsec
      @ippsec  4 роки тому

      hard to know without the error mesages, saying what is missing

    • @JoshieRonark
      @JoshieRonark 4 роки тому

      @@ippsec hello ippsec. thank you for the reply. i'm really really sorry. i installed bunch of gcc libs but didn't restarted my system to not lose shell... i tested today and it works well.. :( i'm really sorry for wasting your interest on my problem.

  • @Fatima-ug5rj
    @Fatima-ug5rj 11 місяців тому +1

    Why am I getting this error at the end */tmp/rootshell: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.34' not found (required by /tmp/rootshell)*

  • @DavidThomsenPhD
    @DavidThomsenPhD 6 років тому

    Hey IppSec how did you send the other request to the second tab of repeater at 9:23

    • @ippsec
      @ippsec  6 років тому +1

      Ctrl+R

    • @Danielmofer
      @Danielmofer 5 років тому

      and how did you decode de URL in to plain text?@@ippsec

    • @marcchamizogilabert5766
      @marcchamizogilabert5766 5 років тому +1

      @@Danielmofer Ctrl+Shift+R

    • @kab3800
      @kab3800 4 роки тому

      @@Danielmofer ctrl+shift+U

  • @dahaahk7624
    @dahaahk7624 7 років тому

    IppSec and vap0r thanks thats great!

  • @neoXXquick
    @neoXXquick 7 років тому

    Great stuff.. as alwasy...

  • @hamdisaidani3231
    @hamdisaidani3231 7 років тому

    Thank you
    you the best

  • @MrPakeryoko
    @MrPakeryoko 7 років тому

    i wonder why u didn't Lame, Legacy and Granny !

  • @ajinkyapathare3308
    @ajinkyapathare3308 7 років тому

    hey IppSec Why don't you upload a nice meterpreter php shell rather than doing it via nc and other things? meterpreter even has search features in it so why to let the victim know that you were there by using bash and getting every command logged in .bash_history

    • @ippsec
      @ippsec  7 років тому +1

      I just like netcat better. There aren't any post exploit meterpreter modules I'd want to use on linux, and I don't believe tab autocomplete works? As far as bash history, there are ways to prevent that without meterpreter.

  • @Nakul8007
    @Nakul8007 3 роки тому +1

    Shhh…shhhhh

  • @metasploitation7847
    @metasploitation7847 6 років тому +1

    amore risky way that worked for me without crashing, not recommended for a pentest was - exploits/linux/local/44298.c

  • @kamiixerprivado518
    @kamiixerprivado518 6 років тому

    create a burpsuite curse