HackTheBox - October

Поділитися
Вставка
  • Опубліковано 28 лис 2024

КОМЕНТАРІ • 96

  • @0dayCTF
    @0dayCTF 5 років тому +9

    Absolute animal, I always get excited watching your videos. Much appreciated.

  • @4Mevo
    @4Mevo 7 років тому +43

    Hey, just wanted to say thanks for making these videos. They're super helpful for getting a nice understanding of the general steps in hacking. Plus, they're quite entertaining too. Keep it up!

  • @oTarrell13o
    @oTarrell13o 7 років тому +5

    I really do admire how you walk through the box as if its your first time. Showing typical things that you know may be tried and explain WHY it didn't work. Its hard to teach this stuff, but your videos really do help with knowing what to look for and becoming more observant when performing system reconnaissance. Great Job as always...please keep it up :) !

  • @strannyisyn
    @strannyisyn 7 років тому +20

    I would love to see more videos on buffer overflows. Great video as always, thanks!

  • @PaulSchmelzel
    @PaulSchmelzel 7 років тому +11

    Great buffer overflow example

  • @HimmatSingh1005
    @HimmatSingh1005 6 років тому

    Pretty sure this one was hard for those who have never worked on Buffer Overflows. Luckily I covered the basics before going into this video. You can also update the description at 21:15 as it says "Pattner_create". Loved this video.

  • @ashr_
    @ashr_ 6 років тому +1

    Thank you @ippSec. I pwned frolic using the method you show here. This was my first ROP :D Didn't think it'd be so easy!

  • @roguesecurity
    @roguesecurity 7 років тому +1

    I would like to thank you for making such awesome videos. I really appreciate your hard work and time you dedicate. Hats off to you sir.

  • @sekback5939
    @sekback5939 6 років тому +1

    Awesome video, after that i was able to write my first buffer_ovrflw and got root on frolic with the first shot

  • @mimikatz
    @mimikatz 6 років тому +4

    I clapped when you got root! I’ve done a small bit of malware analysis and got to learn about the CPU, Memory and assembly, but all without ASLR or DEP. I didn’t quite understand what you were doing with the system and offsets but going to do some more research tonight. Cheers!

  • @rrioclkls7721
    @rrioclkls7721 6 років тому

    Awesome video. It's so helpful to have a practical example to go with the theory.

  • @husainmurabbi1606
    @husainmurabbi1606 5 років тому +2

    Your videos are really awsome. I have learned a lot from it . Thanks:)

  • @kevinsouthwick5475
    @kevinsouthwick5475 5 років тому +1

    I really enjoy your videos. Thank you for the RE 101. It really helped!

  • @VulcanOnWheels
    @VulcanOnWheels 6 років тому +5

    1:38 This is the first time I see phtml.
    As for the rest of your video, this is *way* over my head.

  • @umapessoa6051
    @umapessoa6051 4 роки тому +1

    I know this is old, but you can avoid the buffer overflow part and use pkexec privilege escalation instead

  • @heyserge
    @heyserge 3 роки тому

    I wonder why on 28:02 the system address was off, but in 31:44 it was right? Was it because he ran 'p system' in ./ovrflw and that that changed it?

  • @sezerguler6483
    @sezerguler6483 3 роки тому

    I love your videos man! Keep going, as many bof machines as possible please :)

  • @caseylgoodrich
    @caseylgoodrich 6 років тому +3

    Did you ever finish the OSCE? Also was the SANs SEC660 good class to take?

    • @ippsec
      @ippsec  6 років тому +7

      Yes to both.

  • @seangreathouse1850
    @seangreathouse1850 5 років тому +2

    Raymond from Everybody Loves Raymond is the best teacher. :) Thumbs up!

  • @Mr19242
    @Mr19242 5 років тому

    AMAZING VIDEO!!!!!!
    LEARN A LOT HOW TO BUFFER OVERFLOW ON LINUX

  • @Myk4my
    @Myk4my Рік тому

    I have a question even though it seems stupid lol.
    If you had set an environment variable with shellcode and looked at the stack to find its location, and then used it to activate the shell, would it have worked?

  • @ronak3600
    @ronak3600 5 років тому

    holy crap now i am able to understand this shit !!! thanks ippsec

  • @YuKonSama
    @YuKonSama 5 років тому

    I did not play the box and do not know how much code the binary contains but to avoid bruteforcing the libc address I would have examined the binary if there are all the necessary gadgets for a rop chain

  • @TheAmzuk
    @TheAmzuk 5 років тому

    Followed from bitterman, this is a great stuff

  • @Prosouth09
    @Prosouth09 7 років тому +1

    Thank you for these videos! I was wondering why you couldn't use tmux to spawn an interactive shell?

    • @ippsec
      @ippsec  7 років тому +4

      I think you can, and I misspoke. Just one of those things I avoid because doing it this way screws up how keyboard hotkeys work for that window and I don't want it to mess with my other tmux windows.
      So I play it safe and keep the window i screw with isolated, that way I can just close it when I'm done.

  • @rika-chan
    @rika-chan 7 років тому

    Good stuff. One thing I'd do differently is use diff recursively instead of md5ing stuff. Shows the exact difference between files when they differ by default, but can also be turned off, along with excluding files.
    Check out pwndbg for gdb too - peda works, but hasn't been active for years.

  • @flrn84791
    @flrn84791 5 років тому +1

    Seems you found out in bitterman how to create a pattern from inside of gdb peda, maybe that's worth mentioning here so that people don't go look for the one from msf :)

  • @bertzefatnl
    @bertzefatnl 6 років тому

    Thanx ippsec. This video teached me a LOT. With this video I could get root on Frolic!!! :-)

  • @buxbbu9512
    @buxbbu9512 3 роки тому

    Thank you for the video. At 9:50 i have an error, failed to daemonize, do I need to enable port forwarding? I am a noob, Thanks

  • @rootabeta9015
    @rootabeta9015 4 роки тому +1

    The hunt to root october

  • @sowhatsupeirik
    @sowhatsupeirik 6 років тому

    Great example and walk through!

  • @Kenshiel
    @Kenshiel 6 років тому

    Hi IppSec,
    After watching this week box I came back to October for the BO, I just have a question. On 32:51 you can see the full exploit that actually pops up the /bin/sh.
    However, on 43:30 the buffer is different.
    Your buffer on 32:51 would be (112 A's + System_addr + exit_addr + arg_addr)
    Your buffer on 43:30 would be (112 A's + libc_base_addr + System_addr + libc_base_addr + exit_addr + libc_base_addr + arg_addr)
    My educated guess is, because everytime you run System_addr or exi_addr it needs to go to libc_base_addr in order to run the next instruction?

    • @danio1021
      @danio1021 5 років тому +2

      I know it's an old comment, but will reply anyways. What he does is adding offsets to the base adrress number so System_addr = libc_base_add + system_off and while System_addr and libc_base_addr are addresses system_off is not, it tells you something like "how far after beggining of libc base address the system address is" so in order to calculate System_addr you need to add that offset number to the base address the same way as you add decimal numbers (1 + 1 = 2) and you end up with address like 0xd3adc0d3 (still 4 bytes not 8). Later after he converts them to little endian he adds them to buffer, but python knows that left operand (buff) is string so he treats the right ones so System_addr etc. like characters and appends them to the buff string (you can see them when he tests out the script on october before editing it and prints out the buff)

  • @jok3rxvitutorials979
    @jok3rxvitutorials979 6 років тому

    at around 15:00 minutes you switched to an ubuntu vm to run a gdb and see where the programs crashes... why did you switch machines rather than just use kali? thanks for the vids mans, really helping me learn alot!

    • @mikimuzika
      @mikimuzika 6 років тому

      Because he tried to replicate the victim machine state (version, distro, architecture) as close as possible to be able to do the buffer overflow

  • @ITRIEDEL
    @ITRIEDEL 4 роки тому +1

    this gave me anxiety
    lol thanks!

  • @madhavareddy3937
    @madhavareddy3937 4 роки тому

    I have one doubt but it's not related to this video,
    If you see in submissions list in htb website ,
    Egotistical submitted one easy box,he only tested it and rejected it.
    I didn't understand ,could you tell me if you knew

  • @HamishHaughey
    @HamishHaughey 7 років тому +1

    Hey, at circa 6:30 in, I'm not sure why you excluded the php files? Surely you were looking for changes in the source code, and the php files are the source code in this instance? So you may have missed a "2 md5sum ./filename.php" ?

    • @ippsec
      @ippsec  7 років тому +1

      PHP files serve dynamic content, performing a md5sum against the physical file and one retrieved from the web server would produce different results.

    • @HamishHaughey
      @HamishHaughey 7 років тому

      Yeah I get that, but you were comparing the php files downloaded from two different versions of the source code? I'm probably missing something (like "the point"). It's minor in the grand scheme... I'm still working through this video and it's awesome. Have watched it through once, and now following step by step on the retired machine. Thank you for all your time and effort :-)

    • @HamishHaughey
      @HamishHaughey 7 років тому

      Awesome walkthrough, thank you. I'm hoping this will help prepare me for calamity, but I think there is still a lot to learn!

    • @ippsec
      @ippsec  7 років тому +1

      The portion of the video you’re referring to is me trying to identify what version of software the web server is running. If you know the version is X revisions behind you can look at all the change logs to see if they fixed any security issues. I don’t believe I ever use the php files, I exclude them

    • @HamishHaughey
      @HamishHaughey 7 років тому

      IppSec got it, makes sense, thanks. You da man!

  • @neoXXquick
    @neoXXquick 7 років тому +1

    Amazing stuff

  • @alex_94-r2g
    @alex_94-r2g 6 років тому +1

    hi ippsec do you still have the ovrflw binary? can i have it :)

  • @CAlex-yk5bg
    @CAlex-yk5bg 5 років тому

    Why does/would libc.so have the address location for /bin/sh in it?
    Trying to understand the thought process there.

    • @ippsec
      @ippsec  5 років тому +1

      Been forever since i did the video but libc contains the string /bin/sh. That string will exist in a ton of places as it's pretty common, however, the majority of the memory space is unknown to us. We know LibC's structure so we make educated guesses to where libc, if we are correct we can piece together everything else using the one known as a pivot point... Watch my Bitterman video, it should be a big help.

    • @CAlex-yk5bg
      @CAlex-yk5bg 5 років тому

      @@ippsec I watched bitterman and that was another great look at BOF. THANK YOU! So /bin/sh can be found in glibc because glibc is back end for most core Linux functionality? So could I find just about every /bin/* or /sbin/* program in glibc?

  • @xenofon939
    @xenofon939 4 роки тому

    @IppSec how to fix this "/bin/bash: warning: command substitution: ignored null byte in input'

  • @jonathanvincent5812
    @jonathanvincent5812 6 років тому

    Hi IppSec,
    I really wanted to thank you for all these videos, so much knowledge inside, keep it up!
    Just a small question please ; at 25:35, I just can't understand the content (arranged in columns and lines) of the stack display area in PEDA / gdb... I don't understand, I see stack addresses (data in blue) with chaining arrow, etc... If someone could quickly explain this to me, that would be great! Thanks again

    • @ippsec
      @ippsec  6 років тому +1

      Top is the memory registers.
      Middle is the disassembled code, the arrow is what instruction the program is on
      Bottom is the stack.

    • @jonathanvincent5812
      @jonathanvincent5812 6 років тому

      Thanks for your help IppSec!
      I've already understood that. In fact I was talking only about the bottom area representing the stack. There are some arrows between stack adresses represented like this --> and I don't get what does it mean...

    • @chrismcknight7164
      @chrismcknight7164 5 років тому

      @@jonathanvincent5812 don't know for sure, but my guess is one arrow is the stack pointer, i.e. the current "top" of the stack and the other is the base pointer, i.e. the reference pointer to which local vars and function args are accessed relative to

  • @danilas2206
    @danilas2206 4 роки тому

    awesome!

  • @blackbelt9853
    @blackbelt9853 6 років тому

    sir but retired machine not accessing how to do practices sir plz help me

  • @metasploitation7847
    @metasploitation7847 6 років тому

    When getting the initial shell i immediately got root. no priv esc needed for me. which was odd...

  •  6 років тому

    Does anyone have problem with vi on October? It's difficult to write script when I can't do vim ~/.vimrc -> no compatible

  • @jediinspandex4584
    @jediinspandex4584 7 років тому +6

    Just your increment was wrong... i+=i should've been i+=1

    • @banuprasanth307
      @banuprasanth307 4 роки тому

      I was like..dude it's 1..
      1..
      then he ran the script.. It worked though!!

  • @SinanAkkoyun
    @SinanAkkoyun 6 років тому

    It doesn't make sense, make a video explaining how to write a buffer overflow
    And why do you had to hack the ovrflw file in order to get a shell? I know you explained the changing address thing but why do you need to crack the file ovrflw?

    • @SinanAkkoyun
      @SinanAkkoyun 6 років тому

      Oh wait, it's to get root access, right?

  • @Kaplan0644
    @Kaplan0644 7 років тому

    nice video, thanks

  • @GuiltySpark
    @GuiltySpark 6 років тому

    October blocks me from uploading any .php files using the media button even with the Admin admin account logged in. NVM I later noticed you changed the ext to .php5 didn't know you could do that ti a php ext and it would still work

  • @Nintendo0994
    @Nintendo0994 6 років тому

    Why can't Ipp spawn a pty shell in a tmux session at ~18:30

    • @ippsec
      @ippsec  6 років тому +1

      Misspoke- I can was just worried doing the stty raw could have affected other panes

  • @Ms.Robot.
    @Ms.Robot. 4 роки тому

    💗🧜‍♀️🧚‍♀️ 💗

  • @rajagopal2023
    @rajagopal2023 2 роки тому

    Why does he say that he can't run the python Pty shell code on Tmux?

    • @ippsec
      @ippsec  2 роки тому +1

      I'm not exactly sure, but keep in mind how old this video is. It's probably just because I didn't know to set the ROWS/COLUMNS.

    • @rajagopal2023
      @rajagopal2023 2 роки тому

      @@ippsec ohhh hahah thanks!

  • @striple765
    @striple765 5 років тому +6

    lol i += i ??
    incrementation fault :V

  • @SuperMarkusparkus
    @SuperMarkusparkus 5 років тому

    We never got to see whether you could exit the application after getting the flag :o

    • @ippsec
      @ippsec  5 років тому +1

      Guess you’ll have to do the box yourself :)

  • @JoshieRonark
    @JoshieRonark 4 роки тому

    hello ippsec
    i need your help to understand linux buffer overflows. i actually can do exe overflows with immunity debugger. but everything goes to crap when trying linux overflows.
    in this video you followed different pointers to exploit. but what is the difference between this box and sneaky? (ua-cam.com/video/1UGxjqTnuyo/v-deo.html). snaky is "classic" overflow and i can do it too. what makes october so complicated? aslr? why dont you just used packetstorm shellcode instead getting libc addresses?
    i found some sources about linux stack overflows but still got nothing. would you like to share some good sources with us? and everyone in your channel wants a buffer overflow video. do you mind to record it? for.. your.. servants?
    sorry for bad english -- im not native. maybe it's the reason i can't find good source for bofs.
    thank you

  • @haroldluizpalazzinicardozo1773
    @haroldluizpalazzinicardozo1773 7 років тому

    ldd ovrflw | grep libc wasnt returning the correct libc offset to the exploit to work on my "aslr off" enviroment

    • @haroldluizpalazzinicardozo1773
      @haroldluizpalazzinicardozo1773 7 років тому

      from googling the command ```LD_TRACE_LOADED_OBJECTS=1 /root/Desktop/hackthebox/October/bof/ovrflw | grep libc``` solved my problem

    • @haroldluizpalazzinicardozo1773
      @haroldluizpalazzinicardozo1773 7 років тому

      BUT i need root to run LD_TRACE_LOADED_OBJECTS=1 (looks like), any alternative commands?

    • @haroldluizpalazzinicardozo1773
      @haroldluizpalazzinicardozo1773 7 років тому

      ended up opening on GDB and looking on proc maps

    • @ippsec
      @ippsec  7 років тому

      Odd what distro of linux are you on? Also 32 or 64 bit?

    • @haroldluizpalazzinicardozo1773
      @haroldluizpalazzinicardozo1773 7 років тому

      IppSec i was on kali linux 64 with ASLR off, the exploit worked after getting the glibc offset on proc maps instead of with ldd, as far as i read (after having this issue) ldd is not precize, let me know if you know a better way to get glibc offset.
      Linux kali 4.9.0-kali4-amd64 #1 SMP Debian 4.9.30-2kali1 (2017-06-22) x86_64 GNU/Linux
      btw thanks for the video, learned a lot!

  • @Wereld03
    @Wereld03 7 років тому

    How are you able to have so smooth vms?

    • @ippsec
      @ippsec  7 років тому

      Probably the open-vm-tools package?

  • @ankitchahar6204
    @ankitchahar6204 7 років тому

    Really liked your video. Can you give some tutorial links or make some videos on the basics of exploiting.

    • @ippsec
      @ippsec  7 років тому +7

      Thanks for the comment. Cybrary may have what you are looking for. As far as me doing videos on "How to Hack", I don't have plans for that. It's a huge time commitment to do for free -- and honestly I don't really want my material to come up when you google "How to Hack".
      I understand it may sound odd as these CTF Write-Ups do show exploits but I believe the demographic that searches for CTF Write-Ups is more favored on the legitimate side of things.

    • @NikhilRaj149
      @NikhilRaj149 6 років тому

      Hi mate, probably you may interested in "Hacking the art of exploitation" boook. Link: nostarch.com/hacking2.htm

  • @ronak3600
    @ronak3600 5 років тому

    Bro u are genius teach me Ur way

  • @pr0mming
    @pr0mming 5 років тому

    Interesing... :)

  • @mehdiboujid8761
    @mehdiboujid8761 4 роки тому

    so good