Hack The Box Walkthrough - Crocodile

Поділитися
Вставка
  • Опубліковано 7 лют 2025
  • In this video I walkthrough the machine "Crocodile" on HackTheBox's starting point track. We cover how to target a misconfigured FTP server and a vulnerable web application. If you would like a notes repository or written walkthroughs of these labs, check out my Notion repository here: jacobscheetz.n...

КОМЕНТАРІ • 37

  • @hankdean15
    @hankdean15 2 роки тому +4

    He has the best hack the box videos by far! Everyone else just speeds through them and don't explain chit haha Thanks for your videos.

  • @yuvalmusali2492
    @yuvalmusali2492 2 роки тому +2

    I gotta say as a beginner that I watched all the previous walkthroughs and summarized almost every detail you said. That way I was able to figure things out myself and how to go through and answer most of the questions in this challenge (up until the gobuster command, since I didn't know what it was or how to use it). And that just shows how good your explanations were because I'm an absolute beginner to this penetration test world so thank you very very much you helped me A LOT!!🙏🏼🙏🏼

  • @a.c.130
    @a.c.130 3 роки тому +4

    Thank you SO much for this. I'm currently going through machines and reading the pdf instructions but seeing you do this IRT and using slightly different methods helps broaden my knowledge! Thanks again! Love this series.

    • @balthazarlondon9483
      @balthazarlondon9483 2 роки тому

      is there any PDF instructions? I am not able to get gobuster login outcome from cmd.

  • @nikitaprotas9837
    @nikitaprotas9837 3 роки тому +2

    Thank you for also explaining things, calling them properly and giving theory base

  • @voldimmoral
    @voldimmoral 2 роки тому +1

    Back at it again my friend.

  • @pureethiopia1739
    @pureethiopia1739 3 роки тому +1

    you great you are my model to pentesting you are a begginer to youtube youth for speech but you defined it well keep it up

  • @adsizkorku
    @adsizkorku 3 роки тому

    Your videos are SO good. Greetings from Turkey!

  • @deltaray4242
    @deltaray4242 2 роки тому +1

    At 11:00 what did you do to have the terminal show you potential paths for the wordlist?

  • @wolfrevokcats7890
    @wolfrevokcats7890 Рік тому

    Can you show how to brute force it with hydra?

  • @malcolmbulls6741
    @malcolmbulls6741 2 роки тому +1

    Can you do a tut on the new Machine Responder HTB added to the tier 1 machine group I cant find a Tut on it anywhere and Id like to continue to proceed Thanks alot.

    • @FindingUrPasswd
      @FindingUrPasswd  2 роки тому

      Yeah I’ll definitely be covering it! I had plans to cover the other new box as well!

  • @khors3075
    @khors3075 2 роки тому

    When I'm connecting ftp server and trying to list all the files and dirs (ls command), after a few seconds it outputs: 425 Failed to establish connection. What is wrong?

  • @danieloseguera4251
    @danieloseguera4251 3 роки тому +2

    Great videos. Thank you for the content. I do have one question. Has anyone run into a "Permission denied" when getting allowed.userlist or allowed.userlist.passwd?

    • @svenstubes
      @svenstubes 3 роки тому

      Yup. did you ever figure it out?

    • @svenstubes
      @svenstubes 3 роки тому +1

      I figured it out, you were probably in the root directory like i was, which was not writable for my user. just go to a writable directory and you will be able to complete the xfer.

    • @gauthamgamer1214
      @gauthamgamer1214 2 роки тому

      use sudo before your command

    • @gyozabeer6788
      @gyozabeer6788 2 роки тому

      @@svenstubes I had the same issue and ↑ worked.thanks.

  • @kazhiroma9736
    @kazhiroma9736 Рік тому +1

    Wow I didn’t know about the ../ to mv files back one directory

  • @anirudhsaxena9214
    @anirudhsaxena9214 2 роки тому

    how do we get to know that it has the php and js files ':) can someone clear this?

  • @nico3d586
    @nico3d586 3 роки тому +1

    nice job

  • @fusociety1124
    @fusociety1124 2 роки тому +1

    bro you will have my rerspect

  • @marcschweiz
    @marcschweiz 3 роки тому

    Nice and clear Videos. I've subscribed :)

  • @KaZePL
    @KaZePL 2 роки тому

    thx was stuck with the gobuster

  • @Starmanfansunofficial
    @Starmanfansunofficial 2 роки тому

    ❤❤❤❤

  • @rubenix2725
    @rubenix2725 2 роки тому

    Keep doing this, you explain very well, and your english is very good so i understand everything!!!! also I can improve my english jijijiji : )

  • @ira7997
    @ira7997 2 роки тому

    thank you very much

  • @alwan7777
    @alwan7777 3 роки тому

    Nice

  • @mikuaster7087
    @mikuaster7087 3 роки тому

    THX BRO

  • @justinhaynes6291
    @justinhaynes6291 2 роки тому

    Error: error on parsing arguments: wordlist file "/usr/share/dirb/wordlist/common.txt" does not exist: stat /usr/share/dirb/wordlist/common.txt: no such file or directory

    • @bendupuis1892
      @bendupuis1892 2 роки тому

      add "s" after wordlist ! it is wordlists

  • @silme9417
    @silme9417 2 роки тому

    hi bro can you explain me what is for "-w /usr/share/dirb/wordlists/common.txt" in 11:36

    • @johnsummerlin7630
      @johnsummerlin7630 Рік тому

      -w is the flag for using a wordlist with gobuster. after, the /usr/share... is a full path to the file that's used as the wordlist. If you navigated to that directory, you'd find those .txt files.
      gobuster reads the textfile to use it as a reference when trying to find hidden directories, basically trying a bunch of statistically possible names like "index" or "login", but it can be a huge list of words