HackTheBox - Falafel

Поділитися
Вставка
  • Опубліковано 29 лис 2024

КОМЕНТАРІ • 52

  • @oblivionronin
    @oblivionronin 4 роки тому +4

    Loved, that gid:6(disk) privesc with debugfs, that was badass !

  • @maxmusterspace6037
    @maxmusterspace6037 6 років тому +10

    I like your way of doing these boxes "unprepared". I learn a lot from you keep fighting your own errors. More often than not you do something "minor" which I've never heard of, or did myself or even would have thought about. So, don't worry about it too much. At least I like it. ;)

  • @its-me-dj
    @its-me-dj 4 роки тому +1

    Thanks for showing the SQLi at the end. I always wondered how to do it without SQLMap

  • @mehh5505
    @mehh5505 6 років тому +19

    "perl get away" XD

  • @joshuaspy7139
    @joshuaspy7139 4 роки тому

    I love manual SQLi technique. Enjoyed.

  • @nothing-hm7dz
    @nothing-hm7dz 6 років тому

    thanks ippsec for all your videos i really appreciate it and enjoy watching you .. and learning from you

  • @shilyazid2797
    @shilyazid2797 6 років тому

    thank you so much for all the videos ! very educational for me .

  • @locke4606
    @locke4606 5 років тому +1

    now im craving falafel

  • @JulioUreña
    @JulioUreña 6 років тому +1

    Great! Thanks for Sharing! Love the python stuff :)

  • @komradz5577
    @komradz5577 6 років тому

    A Million thank you for all of this , you Rock

  • @championkali4564
    @championkali4564 6 років тому

    This is really nice video and it has add more value to my work now.... hope to learn more thanks boss

  • @wxrdnx
    @wxrdnx 10 місяців тому

    19:57 I think Ippsec is talking about the Kotarak box

  • @nickhogg5575
    @nickhogg5575 6 років тому +1

    Hey IPP is there any chance you can do some explaining videos just talking through the consepts of the different exploites and attacks you use in a bit more detail to give some more background knowledge to your CTF videos

    • @ippsec
      @ippsec  6 років тому +1

      I don’t believe so, not free at least. Honestly it’s just not fun to put together the material to explain that stuff efficiently. Maybe one day I’ll have enough of a following to where i could make a living off of training/content creation but that’s years away if at all.

    • @nickhogg5575
      @nickhogg5575 6 років тому

      IppSec well I think u deserve more of a following as the content you create is great however mabey it's because it isn't being recognised by the UA-cam audience as it's quite full-on however keep doing what u do as I love Ur videos

  • @MrEthernity
    @MrEthernity 6 років тому +1

    Finally, thank you

  • @omralmdni2835
    @omralmdni2835 6 років тому

    Great vid as always ippsec. Where can I find more info/resources on how/what you did get the video output image?

    • @ippsec
      @ippsec  6 років тому +1

      Just google around for Frame Buffer on linux, that's what the /dev/fb said -- When I did the who command, it showed yossi was logged in and being in the Video Group I could view the "monitor" (/dev/fb0)

  • @IsAMank
    @IsAMank 6 років тому

    My favorite box!

  • @TutoMaker
    @TutoMaker 6 років тому

    Great video, thanks as always :)

  • @fibakos
    @fibakos 6 років тому

    Awesome video! Thanks!

  • @superfishintights901
    @superfishintights901 6 років тому

    Is it possible to increase the volume of your audio going forward? I always find it really quiet and hard to hear, which makes it hard to follow and i'm often having to rewatch sections just to catch what you said. Great videos though, learnt a lot.

    • @ippsec
      @ippsec  6 років тому +2

      Hope to increase it after Nibbles - Just ordered the Blue Yeticaster off amazon, so should be able to increase the volume and increase sound quality.

  • @eatsoup01
    @eatsoup01 6 років тому

    Great technique on the debugfs, did not know about that one, I ended up dd'ing the whole drive over scp, took some minutes but was able to recover root.txt that way

  • @magnfiyerlmoro3301
    @magnfiyerlmoro3301 5 років тому +2

    but why was it too long for the serv and not for your linux distro?

    • @shayberkovich8104
      @shayberkovich8104 3 роки тому

      its too long for wget, not for the server. wget is the one cutting the filename.

  • @Exploitmenot
    @Exploitmenot 6 років тому

    Finally

  • @shayberkovich8104
    @shayberkovich8104 3 роки тому

    If we map wget ubuntu patch for CVE-2016-4971 ( bugs.launchpad.net/ubuntu/+source/wget/1.17.1-1ubuntu1.1 ) it falls on June 2016, whereas SSH banner maps to Jan 2018. Of course this vuln is patched.

  • @jaksan3159
    @jaksan3159 6 років тому

    Thank you

  • @TOn-fx2gr
    @TOn-fx2gr 6 років тому

    Hey can someone help me enable monitor mode on channel 6 i am on channel 1 and cant change it

  • @AmiranAlavidze
    @AmiranAlavidze 6 років тому +1

    KingOfFalafel didn't work as the password, mini rabbit hole ;)

  • @firefart
    @firefart 6 років тому

    btw you can also put metasploit modules modules in $HOME/.msf4/modules/exploits/..... if they don't require any special framework changes. So you don't have to clone the whole git repo (and maybe ruin your installations because of bundle install :) ).

    • @ippsec
      @ippsec  6 років тому

      Good call, created the skeleton now just in case i need it. Hadn't dont it because I forgot the directory structure and didn't feel like doing it live haha

  • @mickymaninthehouse
    @mickymaninthehouse 6 років тому

    I remember you explained how to split the terminal windows like you do, I just can't remember which video it was. Could you or anyone point me to that video.
    Great video once again.

    • @ippsec
      @ippsec  6 років тому +1

      The tmux video

  • @SaeedAlFalasi
    @SaeedAlFalasi 4 роки тому

    very cool ! 1:18:39

  • @TOn-fx2gr
    @TOn-fx2gr 6 років тому +2

    Ana felfoul ohibou l foul .... 😂

    • @anastawtaw6868
      @anastawtaw6868 6 років тому +1

      bruh .... lol

    • @AmineAb
      @AmineAb 6 років тому

      Anas Tawtaw wtf hahahhaa

    • @TOn-fx2gr
      @TOn-fx2gr 6 років тому

      Amine A i hack kol anwa3 alkhodar wel boudour. Lol just joking

  • @lentsukimori8288
    @lentsukimori8288 6 років тому

    Great!! Can you also do a vulnhub machine if possible pls......

  • @KomutanLogarMi
    @KomutanLogarMi 6 років тому

    Thanks :)

  • @shayberkovich8104
    @shayberkovich8104 3 роки тому

    Indeed RationalLove was patched, the easiest way to detect is by following Ubuntu security notices ( ubuntu.com/security/CVE-2018-1000001 ) . "Released (2.23-0ubuntu10) " matches exactly our glibc version.

  • @bnal5tab90
    @bnal5tab90 6 років тому

    where to find gobuster?!

    • @ippsec
      @ippsec  6 років тому

      Check out the Haircut video. Believe I show how to download + compile it there.

    • @bnal5tab90
      @bnal5tab90 6 років тому

      IppSec thanks so much for everything you have done

  • @TOn-fx2gr
    @TOn-fx2gr 6 років тому

    Any easy one to begin with ??

    • @ippsec
      @ippsec  6 років тому +1

      On my channel there’s a beginner playlist

    • @TOn-fx2gr
      @TOn-fx2gr 6 років тому

      IppSec thank you i will see

  • @mrnoone826
    @mrnoone826 6 років тому

    Guys I'am new,can you send me easily vuln. machine link

  • @ronak3600
    @ronak3600 5 років тому

    Ippsec master teach me your way

  • @fl3sh475
    @fl3sh475 6 років тому

    thank you for trick with python3