As always really informative video! Could you maybe do like a tutorial or introduction video for pwncat and show your tricks and usage with it? Would be really awesome I think!
I think getting a root shell was possible. Correct me if I am wrong, but since `cat` was an SUID binary, it could've been used to overwrite the `shadow` and `passwd` file to add a new user, then overwrite the `sudoers` file to give it full sudo access to the system as root, then simply `su` to the new user, and do cleanup later on.
@@asitbiswas6217 The most well-known commands are well known for a reason. For example "awk" is really commonly used because of its versatility, and to use it *well* you'll need to learn a lot of syntax (i.e, it's not necessarily the command itself, but how you use it). If you're looking for something that's less well-known you can search up " linux tool" and 99% of the time it'll have something.
@@_JohnHammond Hi John, I instead suggest to make a video on data exfil methods like with nc and other tools. Kind like what we can use during a HTB machine. Great video as always ❤
John Hammond, you rock! I wanted to tell you that in addition to helping Mr UA-cam Algorithm find your videos.
I have learned a bit from you so far, great content buddy!
21:42 this part is epic, true work of art here :|
Great video man. These help out a lot especially if you do them straight through, to see the thought process of a senior security professional.
Great to follow the journey through the box
Master John, thank you again... love the vid
John Hammond tu est vrement tres tres fort
You are learning still 😬. I am sooo lost 🤣🤣. Love the vids, just getting interested in all this stuff and the beginner lvl baffles me.
Cool video. I learn new things - great. Thanks John Hammond!
just starting out and learning alot. Thanks
Nice vid man. Really interesting to watch you work. Thanks!
Incredible stuff as always, John
Great content! I love learning from your videos. Super helpful
Man!! that's just impressive....
John please please plzzz make a video on Request Smuggling 101 plz, i want this attack explanation from u bcoz i feel u are best explainer.
Thanks to you John, you rocks!!!
Very cool to watch, keep it up!
Thanks for the walkthrough🔥
quality content
sir.. i have work .. bt still m watching.. like fuck it.. John Hammond is the new netflix 4 me
As always really informative video! Could you maybe do like a tutorial or introduction video for pwncat and show your tricks and usage with it? Would be really awesome I think!
loved the vid :D first time catching a premier from you lol
Hi, this ctf has some webpage of past events ?
I think getting a root shell was possible. Correct me if I am wrong, but since `cat` was an SUID binary, it could've been used to overwrite the `shadow` and `passwd` file to add a new user, then overwrite the `sudoers` file to give it full sudo access to the system as root, then simply `su` to the new user, and do cleanup later on.
great
Hi. How did you switch from remote to local when using pwncat?
I think its ctrl + d
Nice video 👍
damn you're a wizard
could have cat /root/.ssh/* and maybe found a private key? who knows. nice vid dude!
I was thinking the same. Or possibly crack Belle's hash from /etc/shadow and then privesc from her access level.
Delphine? :o
make a video about advanced linux commands
What Linux commands do you consider "advanced"?
Every UA-camr make video like common linux command
@@asitbiswas6217 The most well-known commands are well known for a reason. For example "awk" is really commonly used because of its versatility, and to use it *well* you'll need to learn a lot of syntax (i.e, it's not necessarily the command itself, but how you use it).
If you're looking for something that's less well-known you can search up " linux tool" and 99% of the time it'll have something.
@@_JohnHammond Hi John, I instead suggest to make a video on data exfil methods like with nc and other tools. Kind like what we can use during a HTB machine.
Great video as always ❤
Home key /ind key
password123 if not password it's super protected.
Ok full eg simple
....u said this was beginner ...handholding penetration testing ..........
Ummm hello I guess
thank for these man!!
edit: I've been using *nix/bsd since mid 90s and your skills really 10^10 increased my pen tools knowledge base. -haxbwn0r!-