HackTheBox - Stacked

Поділитися
Вставка
  • Опубліковано 27 вер 2024

КОМЕНТАРІ • 38

  • @mitchodonnell3976
    @mitchodonnell3976 2 роки тому +5

    First off, great video! Really loved the RCE using a lambda function!
    Around 57:50, you ask, "what did I just do". If you go to 57:41 you'll notice you changed your working directory to /root, the correct directory you wanted was /mnt/root, since the host's files system is mounted to /mnt/ within the docker container. I've made this mistake more times than I'd like to admit lol but we should call this out since all of us will hit the same using kubernetes, k3s, docker, etc.

  • @chiragartani
    @chiragartani 2 роки тому +3

    I will watch this tonight. 🙌 Gonna ask you question after watching the video :).

  • @BluEhui09
    @BluEhui09 2 роки тому +1

    There are a lot of things.. oh god I have to rewatch this again

  • @Vogel42
    @Vogel42 2 роки тому +4

    "fetch" is the modern replacement for XMLHttpRequest

  • @cmdsecure
    @cmdsecure 2 роки тому +1

    Superb!

  • @ne5i_
    @ne5i_ 2 роки тому +4

    Ooh, also, ‘-it’ in ‘docker run’ means ‘interactive, allocate tty’

    • @AUBCodeII
      @AUBCodeII 2 роки тому

      It is also a great mnemonic: "run IT"

  • @declanmcardle
    @declanmcardle 2 роки тому +1

    t means allocate tty/pty in run/start/exec commands, t means tag in build

  • @ctf59
    @ctf59 2 роки тому

    Creating a CSRF to force the victim to navigate to pages and send us the date, read his email to discover an S3 Domain
    "date" or "data" ?)
    спасибо за видео.

  • @sand3epyadav
    @sand3epyadav 2 роки тому +2

    I always see your terminal, when you open burpsuite and send any reqwest using burp, suddenly red light poped... how?....

  • @takeshikovacs1081
    @takeshikovacs1081 2 роки тому

    awesome! thanks for sharing

  • @pythonxsecurity8287
    @pythonxsecurity8287 2 роки тому

    i work in another method but gg you have good idea good work bro you are the best

  • @MohammedElamineHalia
    @MohammedElamineHalia 2 роки тому +3

    hacking is the next gaming

    • @ijustcantseeit
      @ijustcantseeit 2 роки тому +2

      This could actually be a pretty accurate insight I think

    • @MohammedElamineHalia
      @MohammedElamineHalia 2 роки тому

      @@ijustcantseeit yeah when you take a look at the metaverse and what the future holds you'll say its inventable that everyone must learn hacking and security

  • @ingresssmurf5120
    @ingresssmurf5120 2 роки тому

    Thanks man

  • @muhammadghareeb399
    @muhammadghareeb399 2 роки тому

    u r the best

  • @troopsleader4066
    @troopsleader4066 2 роки тому +2

    What can i learn before starting with HACK THE BOX??

    • @AUBCodeII
      @AUBCodeII 2 роки тому +2

      TryHackMe?

    • @readysetexploit
      @readysetexploit 2 роки тому +3

      TryHackMe, and/or overthewire, HTB also has academy modules and a starting point module for beginners

    • @sand3epyadav
      @sand3epyadav 2 роки тому

      Hack the box academy, i am vip user from 1 year.

  • @GC-rg6in
    @GC-rg6in 2 роки тому

    Why did you not search for 200 codes in the vhost gobuster output?? Thanks

  • @spandexvortex1097
    @spandexvortex1097 2 роки тому

    When you mounted host's '/' to docker's '/mnt' directory, and put the public ssh key in root's .ssh, does it also get written to host's root .ssh?

  • @helyosis1509
    @helyosis1509 2 роки тому

    I didn't really understand the privesc part, if a docker container has access to the docket command, it doesn't create containers inside the container but create them on the host instead ?

    • @ne5i_
      @ne5i_ 2 роки тому +2

      Pretty much! If you look at when he opens the docker-compose file, you can see that the host’s docker socket is mounted as a volume in the container. By default, volumes are read/write, so the container can create containers on the host

    • @ne5i_
      @ne5i_ 2 роки тому +1

      If you look into the software ‘portainer’, this is the way it works!

  • @xXThePr0Xx
    @xXThePr0Xx 2 роки тому

    You can just escape docker containers to the host that easily?

    • @ippsec
      @ippsec  2 роки тому +3

      In this case yes, because the docker container was allowed to spawn other docker containers.

    • @xXThePr0Xx
      @xXThePr0Xx 2 роки тому +1

      @@ippsec okay crazy, didn't know that

    • @kiriappeee
      @kiriappeee 2 роки тому +1

      This is why you never run docker in docker if you can help it. When can you expect this irl? With kubernetes, a lot of people are putting their deployment pipelines, CICD infra into kubernetes itself because you get easy "scalability"; each build runs in its own docker container. Injecting code into a build, or finding a poorly configured instance presents a chance you can get code execution into a build container which could end up having the privileges needed. A lot of this has been patched now in most tools but one slip up in configuration and an attacker could find what they need.
      Can't say much more given Google's acceptable content guidelines. I'll just say that that I evaluated this attack path when considering build tools where I work and this was a real world attack path that came up.

  • @ismailarame3756
    @ismailarame3756 2 роки тому +1

    first comment :)

    • @Thiesi
      @Thiesi 2 роки тому

      Nice - really, really nice!

  • @crusader_
    @crusader_ 2 роки тому

    Where are the timestamps

    • @ippsec
      @ippsec  2 роки тому +5

      Look in the description, where they should be :) Just busy with an event this weekend and didn't have time to create the timestamps.

  • @biswajitdutta6063
    @biswajitdutta6063 2 роки тому

    Comment

  • @MD4564
    @MD4564 2 роки тому

    Full Stack = Full Stocker Developer

  • @declanmcardle
    @declanmcardle 2 роки тому

    @1:00:02 - look! DEAD BEEF :-)