HackTheBox - FriendZone

Поділитися
Вставка
  • Опубліковано 2 гру 2024

КОМЕНТАРІ • 98

  • @saturten
    @saturten 5 років тому +41

    that series of commands to get the list of hostnames was awesome

  • @Simpfan45
    @Simpfan45 5 років тому +2

    You made this look so easy and it took me like a day and a half of poking around until I got user. Bravo. I have much to learn.

  • @DeDerGutter
    @DeDerGutter 5 років тому +1

    Quick tip for gaining a quick overview of possible entries.
    You can feed nmap.xml to searchsploit as long as you ran nmap with sV
    Like this:
    Searchsploit -v --nmap nmap.xml

  • @wrenchrtlzer0memory975
    @wrenchrtlzer0memory975 5 років тому +7

    man really u are my mentor hehe i get motivation daily seeing this

  • @ZeeAddTv
    @ZeeAddTv 5 років тому +1

    You have all my respect ! You are a living encyclopedia ! Thanks for your teaching !

  • @miketree2192
    @miketree2192 5 років тому +2

    Love your videos man! Thank you for the quality walkthroughs, I learn a lot by watching these!

  • @forzahellas81
    @forzahellas81 5 років тому +4

    I failed too at LFI thing....didn't know about that PHP filter....i need to increase my web skills, thanks for usual awesome job

    • @tejaszarekar9145
      @tejaszarekar9145 5 років тому +1

      Use wfuzz if you suspect anything... You'll see the payloads that you can use the paths for quick manual check ;)

  • @rouhani133
    @rouhani133 2 роки тому +3

    I am just surprised how this machine rated as EASY in Hack the Box!

  • @arenzovich
    @arenzovich 5 років тому +1

    Hey ipp, thanks for all the detailed and thorough walkthroughs, amazing and insightful mathods. Cheers.

  • @issaitani7360
    @issaitani7360 5 років тому +6

    hey ippsec thank you man for the videos, they are really helpful. Regarding the NSE you can use --script-timeout 2m or 20s for example to avoid the issue of a script looping.

  • @bugr33d0_hunter8
    @bugr33d0_hunter8 5 років тому +1

    I was raised in Watertown. One town over from you. I was always told wherever I may roam, theres no place like home. 😄 Great video. Like the new mic as well.

  • @TongaRoots
    @TongaRoots 4 роки тому +1

    I am not able to get uploads/administrator1/admin pages at all. They timeout, as opposed to the other ones. Maybe the box is broken? Anybody else?

  • @robertoquinones831
    @robertoquinones831 5 років тому +1

    Thanks very much for the awesome content mate!, it is advanced for me but I definitely learn a lot with every video. Keep it up please. Blessings.

  • @sand3epyadav
    @sand3epyadav 3 роки тому +1

    very nice guruji

  • @omertuygun944
    @omertuygun944 5 років тому

    You give me peace. love you so much

  • @desktopt328
    @desktopt328 5 років тому +1

    As always IppSec you are so amazing keep going teacher :D

  • @calaydd
    @calaydd 2 місяці тому

    hi, can someone please explain to me why the php wrapper is necessary in the first place? why not just go straight into uploading into the smb. was the php wrapper part necessary to then know that it's possible to upload into smb?

  • @marcobrandoni8433
    @marcobrandoni8433 5 років тому

    Happy birthday from Italy. 😊

  • @asiorgad1
    @asiorgad1 5 років тому +2

    halleluya thats how you pronounce it .

  • @muhamadrifki8837
    @muhamadrifki8837 5 років тому

    thankyou you tell me how to enumerate on right way!!!!

  • @texastitan6567
    @texastitan6567 5 років тому

    Hey ippsec, love the vids! You’re a life saver!just curious, you always start off with the same nmap scan, what’s the benefit of having all output formats? When would you use each of the formats?

    • @ippsec
      @ippsec  5 років тому +3

      No reason not to. Grepable is nice for sed/awk. Regular nice for looking at it. XML is nice for reports

    • @texastitan6567
      @texastitan6567 5 років тому

      Okay thank you so much! I just always see you do those 3 options with nmap and was curious on the reason!

  • @juliavanderkris5156
    @juliavanderkris5156 5 років тому

    Aweome video! One question: why would you need to edit the Python OS module? Doesn't that run with the same permissions as the script itself?

    • @ippsec
      @ippsec  5 років тому +1

      Yes the script executes any library, so whatever permissions it has (user executing it), would be passed to the lib

  • @AndreasHontzia
    @AndreasHontzia 5 років тому

    To fix your terminal, you could also type reset.

  • @fahadalmulhim461
    @fahadalmulhim461 4 роки тому

    why you write stty raw -echo ? what is the benefit of this command.?

  • @ARCHmatux
    @ARCHmatux 5 років тому +3

    Why fix the NC shell when there was a perfectly good ssh session in the next tmux tab ;)
    For future, the smb-enum-shares nmap script showed the paths of the shares and would have confirmed /etc/Development.

    • @ippsec
      @ippsec  5 років тому +9

      Because not many machines have SSH, so wanted to show the process of fixing it for those cases. If you always take the easiest path, you won't learn anything :)

    • @ARCHmatux
      @ARCHmatux 5 років тому

      @@ippsec Makes sense. I'm fairly new to this stuff and I always learn new things from your videos.
      This box took me hours :)

    • @Ivan_lulz
      @Ivan_lulz 4 роки тому

      Is there a way to view the paths of those shares outside of smb-enum-shares from outside?

  • @lukemartin5601
    @lukemartin5601 5 років тому

    Makes it all look like cake

  • @razdingz
    @razdingz 5 років тому

    Thank you very much , how are you able to get that status bar at the bottom of the terminal ? also the regular terminal cant be split like you just do , is this a custom script you are using?

    • @georgewere100
      @georgewere100 5 років тому +1

      check out this video on how he splits it.
      ua-cam.com/video/Lqehvpe_djs/v-deo.html

  • @AmanKumar-vq9eh
    @AmanKumar-vq9eh 3 роки тому

    brooo.. how tf you do this.. respect

  • @MrRobot-eh4bv
    @MrRobot-eh4bv 5 років тому

    real good

  • @RuriRurouni
    @RuriRurouni 5 років тому

    Two questions:
    1.) What are your plans now that UA-cam has declared "hacking videos" against its TOS?
    2.) Are you attending Defcon this year?

    • @ippsec
      @ippsec  5 років тому +8

      1. Carry on as normal as that entire backlash was just irresponsible journalism.
      2. Nope, I don’t care for large crowds or Vegas.

    • @RuriRurouni
      @RuriRurouni 5 років тому

      @@ippsec Thank you so much for the response! I'm a huge fan of yours and thank you so much for everything you do! You've taught me more about this field than any other single source! Keep being awesome, you fucking wizard.

  • @wenzhuding6876
    @wenzhuding6876 4 роки тому

    I added the reverse shell at the top of the os.py but it doesn’t work,can anyone explain why??

    • @nullnull6032
      @nullnull6032 4 роки тому +1

      The reverse shell imports os and use some functions inside os library. and when you placed the shell at the top of the os library, the shell tried to use some functions that were defined below it and this results in undefined functions "since there not defined yet because they are under the shell code"

    • @wenzhuding6876
      @wenzhuding6876 4 роки тому

      @@nullnull6032 thx!

  • @sd9847
    @sd9847 4 роки тому

    Thanks for the walkthrough! Any idea how to find more info about that cron job that PSPY found? Is it something that only the root user can see?

    • @wutangdaug
      @wutangdaug 4 роки тому

      Yes, that cronjob probably can only be seen by the root. However, when the process got execute, you will be able to capture command by watch "ps". However, that will need to be at the specific time.

    • @umityn
      @umityn 3 роки тому

      @@wutangdaug I don't understand how the found cron time before the run py script. im so confused. the linenum output doesn't show anything about it..

  • @PretentiousTea
    @PretentiousTea 5 років тому +3

    just used os.py to run a system command and copy /root/root.txt to /tmp/ 😅 probably ruined the box for some other people...whoops

  • @MrPaddy35
    @MrPaddy35 5 років тому

    can you share your reverse shell for php ???

    • @wutangdaug
      @wutangdaug 4 роки тому

      it is in the built in kali box, or you can find it from pentestmonkey
      pentestmonkey.net/tools/web-shells/php-reverse-shell

  • @errold32
    @errold32 5 років тому

    Woah!

  • @saberkz
    @saberkz 5 років тому

    Great , please add it and update your youtube playlist and add this i also notice few more they are not in your hackthebox playlist , much love

  • @hotandsillycinnamonrollget6697
    @hotandsillycinnamonrollget6697 5 років тому

    Pen testing is much easier than talking to girls. Also 3.5 hours seems a bit off. It took about 10 minuets to do nmap - A -p - for me.

  • @m0nkeyr0ach
    @m0nkeyr0ach 5 років тому +2

    33:39 I like this

  • @lovalim21
    @lovalim21 5 років тому

    how you split terminal into two

  • @anasshaikh5778
    @anasshaikh5778 5 років тому

    Hi guys , I am new here, I kind of suck with priv esc, can you suggest more privilege escalation videos like the one used in this video

    • @danielmonzon7396
      @danielmonzon7396 5 років тому

      www.hackingarticles.in/escalate_linux-vulnhub-walkthrough-part-1/

  • @seanbrodie
    @seanbrodie 5 років тому +1

    Spent so long enumerating on this box going down rabbit holes. Completely missed the other domain in the SSL cert. 😒

  • @vishnurajkvraj
    @vishnurajkvraj 5 років тому

    ❤️

  • @grumpydoggie6389
    @grumpydoggie6389 5 років тому

    Wow !!!

  • @ceciliog6507
    @ceciliog6507 5 років тому

    What did u study?

  • @fs0c1ety_bs92
    @fs0c1ety_bs92 5 років тому

    Wtf did just happened after he cat creds.txt he can't say hallelujah or it's deeper than that

  • @asafcohen3562
    @asafcohen3562 5 років тому

    cool shit

  • @marsanmarsipan
    @marsanmarsipan 5 років тому +1

    CRAP. I felt i was close to get user on this one and bom, it's retired...

  • @raigorxhellscream7657
    @raigorxhellscream7657 5 років тому

    Thanks

  • @sw8carbon
    @sw8carbon 5 років тому +1

    Does anyone know someone who does tutorials like these but also explains why you do something and what it means for beginners?

    • @ippsec
      @ippsec  5 років тому +1

      Try watching the older videos like popcorn.

  • @ethan_6202
    @ethan_6202 5 років тому

    hey man i know its a noob question, but could u maybe do a short video on actually getting access on kali linux for hack the box when u are signed up ?

    • @you-wuzi
      @you-wuzi 5 років тому

      What exactly do you mean by "getting access on kali linux for htb"?

    • @ethan_6202
      @ethan_6202 5 років тому

      @@you-wuzi well i am new to all this in terms of actually doing it, and on htb under the access tab u need to get connected

    • @you-wuzi
      @you-wuzi 5 років тому

      @@ethan_6202 Okay, I'm guessing you mean connecting to a box and trying it out. With that, you'll need your personal VPN configuration file downloaded to your local computer and after that, you can connect to the HTB network on kali with ```openvpn ethan.ovpn``` (i'm assuming that's your username), and that should give you access to the network to start trying out the boxes.

    • @ethan_6202
      @ethan_6202 5 років тому

      @@you-wuzi well in the access tab there is the lab access details and next to connected there is a cross so i though maybe i had to do something before doing boxes

    • @you-wuzi
      @you-wuzi 5 років тому

      @@ethan_6202 yeah you have to connect to the lab using the ovpn file

  • @eliiiiaas
    @eliiiiaas 5 років тому +17

    ippsec havent gone to church...

    • @dzikibill6756
      @dzikibill6756 5 років тому +1

      ahh hall halleujah !:)

    • @ReNNuX
      @ReNNuX 5 років тому

      He is an Alien for sure and that was the confirmation :)

  • @Rezurrektz
    @Rezurrektz 5 років тому

    U missed adding the Chaos box to the Medium playlist ,not that it's triggering my OCD or anything :3

  • @c1ph3rpunk
    @c1ph3rpunk 5 років тому +1

    hal lay loo ya ;-)

  • @arturskepuls490
    @arturskepuls490 5 років тому

    Very good job on box. Please add comments about /usr/bin/mtr-packet = cap_net_raw+ep attack vector. Thank you

  • @SuperEvilMonkee
    @SuperEvilMonkee 5 років тому

    Damnit I was working on this box and they have retired it.......had just got the shell on it.

  • @tejaszarekar9145
    @tejaszarekar9145 5 років тому

    Enumeration level 9001

  • @geordish
    @geordish 5 років тому

    Can you add 'set background=dark' into your vimrc please. Would make your vim much more readable!

  • @bikhlarrovamarakov5392
    @bikhlarrovamarakov5392 5 років тому +2

    i think there is another way to root !
    yes i did exim exploit

  • @tanuelorez2863
    @tanuelorez2863 3 роки тому

    6:21 Put junk in the password and frustration out...lol

  • @cvija997
    @cvija997 5 років тому

    5:10 xd

  • @TOn-fx2gr
    @TOn-fx2gr 5 років тому +1

    Can you suggest to me an Apache 2.4.10 exploit
    And openssh .7... Protocol 2.0 exploit ?

  • @jacquesmit502
    @jacquesmit502 5 років тому +2

    This was a terrible machine....
    My enumeration skillz needs more work

  • @ceciliog6507
    @ceciliog6507 5 років тому

    Man man man dear man . Im spanish and how the fuck u know all this stuff....