Playing Return from HackTheBox

Поділитися
Вставка
  • Опубліковано 10 гру 2024

КОМЕНТАРІ • 5

  • @NotaRealUser
    @NotaRealUser Рік тому

    Educational for sure. Never thought about brute-forcing services via a one-liner, definitely a time saver. Thank you!

  • @maxbunnies
    @maxbunnies Рік тому +1

    Hi what did you say you did to powerup? Invoke something

    • @HaxorTechTones
      @HaxorTechTones  Рік тому +1

      At the very end of the PowerUp.ps1 script i have appended the function call "Invoke-AllChecks". That way I can run all checks just by executing the script. In this video I used dot sourcing (. .\PowerUp.ps1) to do so

  • @Richi.Espinaca
    @Richi.Espinaca Рік тому +1

    Bro do you think CTFs are similar to real-life machines? Or is hacking different?

    • @HaxorTechTones
      @HaxorTechTones  Рік тому +1

      Some CTFs tend to be weird and unrealistic because they're like a puzzle that someone came up with for others to solve. There are many boxes in labs that rely on CVE-based vulnerabilities, misconfigurations and/or modern exploitation techniques that are 100% realistic and are commonly exploited in real-life penetration testings etc. But most importantly, there are realistic components in almost all CTFs.