TryHackMe! Sudo - CVE-2019-14287

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 81

  • @ProfessorParno
    @ProfessorParno 4 роки тому +67

    1:44 - port scanning /w nmap
    2:43 - Web vulnerability scanning w/ Nikto
    2:50 - finding web dir /w gobuster
    6:18 - cracking password /w hydra
    7:11 - FTP login
    10:17 - doing some forensic stuff
    11:20 - cracking zip file
    14:54 - SSH & finding task 4 answer
    20:48 - Privilege Escalation
    Always fun to watch John Hammond doing some TryHackMe room, hope my channel can grow as good as John Hammond

    • @DDBAA24
      @DDBAA24 4 роки тому +1

      I was just watching an ippsec vid and he has chapters with titles and descriptions that display when you hover over the seek bar. I guess this is a new feature in UA-cam , at least its the first time I've noticed it. The feature should save you some keystrokes 👍🏻

    • @_JohnHammond
      @_JohnHammond  4 роки тому +12

      This is AWESOME! Thank you so much for the timestamps, I really need to put stuff like this in my other videos!

    • @anantikatokas7149
      @anantikatokas7149 2 роки тому

      All your videos are amazing 👍!!

  • @Kimbojangles
    @Kimbojangles 4 роки тому +22

    I don’t know why, but I find your TryHackMe! videos to be super relaxing. I only vaguely understand what you’re doing, because I don’t possess any of this IT knowledge that you’re implementing. Thanks for the great content.

    • @_JohnHammond
      @_JohnHammond  4 роки тому

      Happy to hear that! You'll definitely pick up the skills and the IT knowledge if you keep watching more, I think! Thanks so much for watching and thanks for all the kind words!

  • @cosmintibuleac969
    @cosmintibuleac969 3 роки тому +2

    Agent Sudo is so awesome, especially if you're like me and have never gotten into steganography. Not to mention seeing you doing it with your knowledge is even more awesome! Thank you, John!

  • @QzSG
    @QzSG 4 роки тому +1

    It makes me happy that what you did was more or less what I wrote in my writeup as a beginner back in December, awesome that I did it like you too!

  • @neilthomas5026
    @neilthomas5026 4 роки тому +1

    I love how every morning I wake up and there is a new video waiting and new things to learn!! Very cool video :)

    • @_JohnHammond
      @_JohnHammond  4 роки тому +1

      Hopefully I can keep up the every-week-day uploads! Thanks so much for watching!

  • @mangalangnanasegaram6536
    @mangalangnanasegaram6536 9 місяців тому

    Addicted to John's explanations

  • @matncerqueira
    @matncerqueira 4 роки тому

    I just got here (on your channel) this week and i'm learning a lot from your videos, thank you! Keep doing them, they are awesome!

  • @benkato_
    @benkato_ 4 роки тому +3

    Your videos are rlly chill and I like to watch solve CTFs that I solved :D
    Thanks for uploading :3

    • @Noah-hk4ec
      @Noah-hk4ec 4 роки тому +1

      Du auch hier

    • @_JohnHammond
      @_JohnHammond  4 роки тому +1

      Happy to hear that! Thanks so much!

    • @benkato_
      @benkato_ 4 роки тому

      @@Noah-hk4ec
      Schon lange xD

  • @1nd0m1t
    @1nd0m1t 9 місяців тому

    nice!!
    In this machine Linpeas reported permissions in lxd so I mounted a container and get root. I didn't know about this CVE :')

  • @Prim1TiveCH
    @Prim1TiveCH 4 роки тому

    enumeration videos like this is great to learn file extractions and finding hidden stuff

  • @daheck81
    @daheck81 4 роки тому +6

    19:26 *"2.2.3 Crash at Corona."*
    Theyve planned this whole thing back then already 😦

  • @cristhianz91
    @cristhianz91 4 роки тому +1

    Nice room John! I've learned some nice stuff with this video. I'm new in the hacking world, I started in THM a week ago and I'm learning a lot. Keep up with the good content, greetings from Argentina!

  • @MultiBiggie007
    @MultiBiggie007 2 роки тому

    thanks for making these videos. helpfull to see someone elses sollution!

  • @dwpersGC
    @dwpersGC 3 роки тому +1

    say it with me John - 'autoSPY'...the box is agent sudo after all :D

  • @davidraymond7420
    @davidraymond7420 4 роки тому

    Nice one, thanks, always cool to watch 👍

  • @prohat7674
    @prohat7674 4 роки тому +5

    You make very good tutorials 🖒

    • @_JohnHammond
      @_JohnHammond  4 роки тому +2

      Thank you so much! Appreciate all the kind words!

    • @damienkali
      @damienkali 4 роки тому

      @@_JohnHammond Hi John, would love to see more Windows side stuff, Im currently studying for OSCP & I know there is a lot of Windows based, most of the stuff we tend to learn from CTF is all linux based, which is fine, for e.g. Could you do a review or something along the lines of using tools like psexec.py, crackmapexec etc... More Active Directory based attacks (or your next video for Attactive Directory) :) Thank you

  • @SAinTIdiVAca
    @SAinTIdiVAca 2 роки тому +1

    How did you know to try curling the website with an added header? That seems so random is that a very common technique?

  • @thatcrockpot1530
    @thatcrockpot1530 4 роки тому +10

    Of course I never get to exploit this bug when I want to find it, but I watch a video and there it is :)
    Good video tho!

    • @_JohnHammond
      @_JohnHammond  4 роки тому +1

      Thanks so much! And thanks for watching!

    • @thatcrockpot1530
      @thatcrockpot1530 4 роки тому +1

      @@_JohnHammond I'm 22 but I wanna be like you when I grow up hahaha

  • @ElChowDinamico
    @ElChowDinamico 4 роки тому +1

    Had to come here for the image title lmao

  • @Godmil
    @Godmil 7 місяців тому

    oh man, I spent sooo long trying to find a steno tool that would work with PNG files... when I eventually tried binwalk I then spent ages trying to work out how to extract the extra data... had no idea binwalk would do that for me :D

  • @tentra7548
    @tentra7548 4 роки тому

    damn dude, subscribing forsure! Awesome content in all your videos. Thanks a mil for the knowledge. :)

  • @code4720
    @code4720 4 роки тому

    thanks i learned so much

  • @anonded
    @anonded 4 роки тому

    omg very informative... like even for starters. greatwork!

  • @kumarniloy3893
    @kumarniloy3893 3 роки тому

    ngl I was also fetching Alien_autopsy.jpg , fun room and great video as always !

  • @alexfullstop
    @alexfullstop 4 роки тому

    You are amazing

  • @MaximusIA
    @MaximusIA 4 роки тому

    Thanks man

  • @waheedmurad4223
    @waheedmurad4223 4 роки тому

    your cam is on the command way

  • @cocosloan3748
    @cocosloan3748 4 роки тому

    Very cool!

  • @orgozlan323
    @orgozlan323 4 роки тому

    Great video!

  • @zeg0noidpils26
    @zeg0noidpils26 4 роки тому

    Really cool!

  • @therealgunny
    @therealgunny 4 роки тому

    your videos are very entertaining, keep going D:

  • @munakk1981
    @munakk1981 4 роки тому

    Thanks for the tutorial.....

  • @SunDevilThor
    @SunDevilThor 2 роки тому

    I got stuck on the zip file section. I did not see anything related to that. I’ll have to research the “binwalk” command, since this is the first time I’m hearing about it.

  • @MD4564
    @MD4564 4 роки тому

    Thank you very much, how long does hydra normally take?

  • @malifalitiko495
    @malifalitiko495 4 роки тому

    You can also do this with lxd privesc.

  • @DHIRAL2908
    @DHIRAL2908 3 роки тому

    Those fonts at 0:42 look cool!!! What are they called?

  • @Laflamablanca969
    @Laflamablanca969 4 роки тому

    The pain in this entire video is the exact reason I purchased a subscription with Tryhackme lol... so much faster and a lot more stable.

  • @mi2has
    @mi2has 4 роки тому

    hydra part was great. i watched your CTF videos from 2018 and it was very useful? Do you have a place where all your past videos can be listed?

  • @knowledgeboy6137
    @knowledgeboy6137 4 роки тому

    Hi can you make walkthrough the burp suite room. it is not free but want to learn this badly.

  • @SARAVANATECH
    @SARAVANATECH 4 роки тому

    Super.....

  • @ghadeeralhayek4373
    @ghadeeralhayek4373 4 роки тому

    dud ,what is the name of the music in the end of the video ?

  • @bulutkumbul_
    @bulutkumbul_ 4 роки тому

    i used burp suite for change the user agent to C in repeater but it didnt work?

  • @sebi9721
    @sebi9721 4 роки тому

    Sry for this question, but I am really knew to this stuff. How can I access to the scripts which you are using?

  • @maxabbasov9016
    @maxabbasov9016 4 роки тому

    John, how do you use kali tools on Ubuntu? You installed them with Katoolin?

  • @checknate8820
    @checknate8820 4 роки тому

    Why did you immediately chose binwalk when you found that string in the png? I personally spent time using stegcracker on both images hoping there was some regular form of stenagraphy

  • @khalidaldrouby719
    @khalidaldrouby719 4 роки тому +1

    What type of machine are you using ? is it a ubuntu VM if yes would you share the tools installed on it. i also assume your using tmux. great content btw

    • @arwl
      @arwl 4 роки тому

      John uses Terminator rather than tmux

  • @floatingblaze8405
    @floatingblaze8405 4 роки тому

    2 openvpn connection just like in the king of the hill live

    • @_JohnHammond
      @_JohnHammond  4 роки тому

      I'm so bad with that -- I really need to script that to kill it and bring it back as just one instance! Thanks for watching!

  • @tannercampbell
    @tannercampbell 4 роки тому

    I’m sure your asked a lot but do you have a link or guide to install the tools on Ubuntu your using?

  • @ca7986
    @ca7986 4 роки тому

    ♥️

  • @pedrofontes8441
    @pedrofontes8441 4 роки тому

    what terminal emulator are u using john?

  • @yashpatel-vf8zq
    @yashpatel-vf8zq 4 роки тому

    make videos editing hangout streams !! 😀

  • @ashutoshpanda4336
    @ashutoshpanda4336 4 роки тому

    After ubuntu 20 arch you came back to 16 why 🙄🙄

  • @richieparkerich9202
    @richieparkerich9202 4 роки тому

    when trying crack the zip2john file i named " cracked.txt" is not working any ideas ? i have the output
    john --wordlist=/usr/share/wordlist/rockyou.txt cracked.txt
    Using default input encoding: UTF-8
    Loaded 1 password hash (ZIP, WinZip [PBKDF2-SHA1 256/256 AVX2 8x])
    No password hashes left to crack (see FAQ)

    • @sanlan9755
      @sanlan9755 4 роки тому

      I have the same problem. Did you find a solution?

  • @TEAM4o4
    @TEAM4o4 3 роки тому

    ❤️❤️😍

  • @nangianilkumar1428
    @nangianilkumar1428 4 роки тому

    I'ld like to learn basics for free give me advice as soon as possible pls

  • @padaloni
    @padaloni 4 роки тому

    cool vid, but it's super annoying having your face over the commands your typing lol can you move the active console pane to the top or hide your camera when typing?

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    Bash files open

  • @dreamlands627
    @dreamlands627 Рік тому

    13:03

  • @sgaleta
    @sgaleta 4 роки тому

    I feel like the last couple of videos have been unpolished at the begining.
    I feel like i takes 0 effort to clear stuff from previous videos, deploy the machine, make a directory and open a text file with the IP copied.
    In my opinion this can all be done before the video starts thus avoiding the first/first and a half minute of the video.

  • @Anth0ny001
    @Anth0ny001 4 роки тому

    good tutorial.. but too fast.

  • @0x2fd
    @0x2fd Рік тому

    it was not easy :s

  • @VeNoM____
    @VeNoM____ 3 роки тому

    Everything goes smoothly until i have to use John The Ripper piece of crap software that is completely broken and bugged lol

  • @mattplaygamez
    @mattplaygamez 3 роки тому

    Im the 1000 liker

  • @alexpearce3083
    @alexpearce3083 4 роки тому

    ahahhahaha, cringe. i dont wanna see that!!!!!

  • @clementhenriet9779
    @clementhenriet9779 4 роки тому

    Your videos are Nice to watch but You're way too fast and don't explain very much Sadly