HackTheBox - Investigation

Поділитися
Вставка
  • Опубліковано 5 лис 2024

КОМЕНТАРІ • 20

  • @cvport8155
    @cvport8155 Рік тому +6

    Please make more vd for advanced techniques red team and pivoting

  • @sb77de
    @sb77de Рік тому +1

    solid reversing, I went the lazy strings binary route 😆

  • @pythonlover7660
    @pythonlover7660 Рік тому +3

    There’s a part that I don’t think it makes sense. In your Perl example, you’ve specified the pipe character in the path of the file “TheFile” whose content will be executed. However, this wasn’t the case against the target in which you’ve injected your command in the file name without touching the content of the image. In the latter case, the file content was not executed as was the case in the former Perl example. I would appreciate your clarification on this.
    Thanks for the video!

    • @ippsec
      @ippsec  Рік тому +5

      So in the Demo i showcase perl executing a command when opening a file. Exiftool has to open files to read the metadata. I put the RCE as the filename so when exiftool went to open the file it executed the command instead.

  • @jeb8401
    @jeb8401 Рік тому

    Great video as always. I notice you do some blue team stuff on occasions, it would be really interesting to see some stuff on Windows logs, particually on tracking activity from a user from login to logout if you have anything cool to show.

  • @kerbalette156
    @kerbalette156 Рік тому

    Epic

  • @css2165
    @css2165 Рік тому

    dunno where we would be without you

  • @r3dp4rrot
    @r3dp4rrot Рік тому +7

    I can't digest that 1 dislike.

  • @maoropizzagalli4153
    @maoropizzagalli4153 Рік тому

    Wow I spent so much time on that initial foothold ! I made it work without the '/' by using php -r exec(base64_decode(EXPLOIT_B64)). Even there I had problem executing /bin/sh and /bin/bash. I'm impressed with the mv .sh .html thing to reverse shell move. ggs

  • @buffgarlichero
    @buffgarlichero Рік тому

    Great walkthrough

  • @johnhupperts
    @johnhupperts Рік тому

    differing 404 pages would suggest Apache/NGINX is a reverse proxy in front some other server like Python Flask or something, right?

  • @olawalehassan3632
    @olawalehassan3632 Рік тому

    Awesome Walkthrough IPPSEC, Thanks for showing your metheodology for the log analysis and password extraction. I was waiting for your video till Investigation retired. When I did the box, I had to manaully search special characters using VS code which was daunting. Thanks once again.

  • @kalidsherefuddin
    @kalidsherefuddin Рік тому

    Thanks

  • @tg7943
    @tg7943 Рік тому

    Push!

  • @pgangaraoganga4906
    @pgangaraoganga4906 Рік тому

    Its appear very small letters whatever giving information please increse sizes of words

  • @vijayvj3976
    @vijayvj3976 Рік тому

    Hey ippsec....❤

  • @felixkiprop48
    @felixkiprop48 Рік тому

    Thanks for the videos. I am having a problem viewing gobuster output, i tried less,vim even nano, but i keep seeing those weird coloring symbols. How can i view it correctly??