Try Hack Me : Windows PrivEsc
Вставка
- Опубліковано 29 вер 2024
- This is our continuation series of Junior pentesting learning path on tryhackme.com. We are exploiting! Lets have some fun! This is the last of our series and covers in depth about windows privelage escalation!
Patreon to help support the channel! Thank you so much!
/ stuffy24
Hacker Discord
/ discord
Get 20% OFF @manscaped + Free Shipping with promo code STUFFY24 at MANSCAPED.com! #ad #manscapedpod
a master piece Thanks man it really helped me out specially in the DLL Hijack
That's awesome man! Love to hear this! We are doing the defense lab now so hopefully that one helps you also!
Your videos are top notch. Easy to follow along and understand. The best part about your videos is you teach the why behind the techniques and hammer home concepts, well done!
Thank you so much! Really appreciate the feedback! That's the goal
So true! The "why" is everything.
sir, new tasks of windows prev esc are added in jr pentester. kindly look into it and help us to resolve the tasks
looks like they updated the room ? Just fyi
Its a shame that the room has been heavilly updated, it's totally different now..
Agreed! I don't think I can go back through it either bc my questions show the old ones.
RE releasing notes/setting up subsciptions -- why wait until you get to 1k? if you set up patreon/kofi you can start whenever - i'd love to look through your notes lol but also i'd be supporting the channel
This is a great idea! I will start looking into it this weekend! Thank you
thank you
🌹🌹🌹🌹🌹
I suscribed u buddy.
Hope u don't upset because most other just upload same information in different voice.
For sc query windefend, replace sc to sc.exe => sc.exe query windefend. It will work :)
Ermagerd....I heard you mention in the Linux PrivEsc walkthrough that you were going to make a Windows PrivEsc walkthrough. As I was finishing up Linux, I was worried you hadn't done this video yet. SO STOKED to see you posted it nearly a year ago. Thanks again for the awesome content. Your explanations are fantastic and I've learned A LOT from you. Keep doing your thing bro! Have a Happy New Year!
Thank you so much!
@@stuffy24 Aw man...they updated the room. It's odd that basics like enumeration techniques are now excluded from this room. It's like....they gutted it and now it's ULTRA basic. :/
@@iCyberVenom ohh dang I haven't gone back and seen that!
@@stuffy24 Finishing up new Windows PrivEsc. I was wrong...they actually added more useful, advanced PrivEsc techniques, but they did in fact exclude basic enumeration techniques that are essential for beginners imo. The room kinda steps you right into the deep end. Not a bad thing, but I'd argue you gotta learn how to crawl before you can run, so excluding basic techniques was a mistake. Anyway! Looking forward to more of your videos!
@@iCyberVenom thanks man! Let me know again if there is a specific video u wanna see
I can’t wait for the note 🤲🏽🥺
Hi What rooms or path would you recommend to do after completing the JR pen tester path?
What is your goals? To take a cert? Become a pentester? Become an analyst?
@@stuffy24 Becoming a pentester/analyst...I know I am being vague.
There's a newer version out, could you please make a walkthrough for that?
Yes I will, the holidays are a busy time and I'm continuing the other videos I had. I will get the new one out when I can though!
@@stuffy24 Thanks! Looking forward to it.
I could be able to finish this path thanks to you brother
Hm… for some reason I was never able to get the process running and I know you mentioned that it’ll error out (it did) but I tried many times after that and I still wasn’t able to gain root access on the last activity. Weird. But this was a great guide nonetheless. Thanks for this!
Hmm I'm not sure without seeing more info. If you wanna hop in the discord or Patreon chat you can upload screenshots and kinda explain what your seeing and I can hopefully trouble shoot it or someone in there may have ran into the same thing!
Why is it that the .exe payload has to have the name Common.exe? how did you arrive at that name
It was required because the way the windows is searching for the path it was the next name the system would look for in a path. so for instance its looking for /common.exe because the path has spaces it doesnt know where the exe is going to sit in that directory so it checks every directory in the path for the next name in the sequence with an exe and if it doesnt find it then it assumes its the next one and keeps going down the line . So we were able to get in the middle of the path and change the directory from common to a file named common.exe and it then finds it instead of the directory first and runs it. Hopefully that makes sense. Sort of hard to explain through just text .
waiting for your next series 🔥
It's going now! The cyber defense path!
Love your videos its helped me a lot in this course. How can I get the notes? I want to write it down but I dont know how :(
I release my notes for the harder boxes on my Patreon. The easier boxes I don't typically release notes bc they arent very requested. Not all my boxes have notes released since I began doing it with the Patreon creation
@@stuffy24 Hey man can you do a video about the latest Windows Priv Escalation because this is not the same that I have been doing right now and I stuck in that room for 2 days already
@@pennyWise_01 ya they changed the box. I will try to get an updated one out there soon.