HackTheBox - Office

Поділитися
Вставка
  • Опубліковано 6 лис 2024

КОМЕНТАРІ • 22

  • @jcbenge08
    @jcbenge08 4 місяці тому +21

    I'm constantly amazed when I watch these videos and thinking "HOW DOES HE KNOW TO DO THAT?!?" Great stuff!!!

  • @Securesyntax
    @Securesyntax 4 місяці тому +1

    I'm watching every video of yours, and they are fantastic! I learn something new every time. Keep up the amazing work!

  • @BrunoBsso
    @BrunoBsso 4 місяці тому +1

    Excellent as always, impressive. Good job dude!!!!!

  • @mr-robot8452
    @mr-robot8452 4 місяці тому +2

    Great video! There's another way to pwn the box, but I think it might be not intended. By assigning the SEImpersonatePrivs to the ppotts or even the tstark user using the MySQL UDF payload, you can skip the entire ODT upload/import & DPAPI step. However, the method you used is much more fun and educational!

    • @xprnmz8263
      @xprnmz8263 4 місяці тому

      mind explaining it better? 🙏🏻

    • @mr-robot8452
      @mr-robot8452 4 місяці тому

      @@xprnmz8263 Hi, UA-cam keeps deleting my posts. But google for MySQL UDF payload and look at the Rapid7 post :)

  • @h8handles
    @h8handles 4 місяці тому

    Relaxing this Sunday morning watching my favorite hacker before my first OSCP attempt in a couple hours.

  • @Giugiu7077
    @Giugiu7077 4 місяці тому

    I wish I was half as good as him. You are a pro, keep it up

  • @AUBCodeII
    @AUBCodeII 4 місяці тому +9

    Hey Ipp, do you go hard in the paint?

    • @eIicit
      @eIicit 4 місяці тому +1

      He clearly does

  • @GokEnsar
    @GokEnsar 4 місяці тому

    Very good video ippsec. Thank you.
    Do you think making videos for poc ‘s ?

  • @Ambassador_Kobi
    @Ambassador_Kobi 4 місяці тому

    A new ippsec video nice!

  • @entertainment_in_blood
    @entertainment_in_blood 4 місяці тому

    Just Wowww..!

  • @SOLOxUNS
    @SOLOxUNS 4 місяці тому

    You bestt 🎉😂❤

  • @Marco_Ris
    @Marco_Ris 4 місяці тому +1

    Hey IppSec. Are you really always telling the same about nmap or do you have a script doing it? xD btw is there a reason why you put the flags -sC and -sV separately? I' doing it with -sCV. Thanks for your videos and take care...

    • @ippsec
      @ippsec  4 місяці тому +5

      I don't often run nmap with scripts. No real reason to put -sC and -sV separately other than muscle memory and ease of read. Not all arg parsing libs allow for putting muiltiple args in 1 arg, but all will support it the long way of 1 arg per arg. So it's easier for me to always just use the long way, to avoid keeping track of which programs support what format. It also helps when playing with new tools, as the way you are used to will always just work.
      I guess my way of thinking is - if all you do is focus on optimizing, you will become excellent at that one thing, but won't become good at many things. I prefer to be good at many things as when I have a problem, I have more skills to lean on.

    • @Marco_Ris
      @Marco_Ris 4 місяці тому +1

      @@ippsec thanks for your explanation. I will have it in my mind for the next time

  • @meshelishaool8808
    @meshelishaool8808 4 місяці тому

    Hi app,
    Thank you for the video I learned a lot, I was hoping that you put any resources you used in the description so we can read it after watching the video. Again thank you for your hard work