HackTheBox - OnlyForYou

Поділитися
Вставка
  • Опубліковано 5 лис 2024

КОМЕНТАРІ • 26

  • @ChristopherPelnar
    @ChristopherPelnar Рік тому +6

    IppSec's opening nmap statement before every box is comparable to Bruce Buffer's, "Let's get ready to rumble!!!!!!!!!!"

  • @fabiorj2008
    @fabiorj2008 Рік тому +5

    Excellent. Very cool box and writeup

    • @_7RAW
      @_7RAW Рік тому

      It’s a walkthrough not write up 😊

  • @Rogerson112
    @Rogerson112 Рік тому +1

    Love you!

  • @PhilocyberWithRichie
    @PhilocyberWithRichie Рік тому +1

    Great thanks for sharing! the last part was pretty hard

  • @mistacoolie8481
    @mistacoolie8481 Рік тому

    brutal

  • @chrisbowel3084
    @chrisbowel3084 Рік тому +1

    First Comment

  • @spacenomad5484
    @spacenomad5484 Рік тому

    OMG I didn't realize the first RE only matches the BEGINNING...
    I spun up a bind DNS server and served a TXT record with my payload after the include: because that's a wildcard match :D :D :D

  • @tg7943
    @tg7943 Рік тому

    Push!

  • @StevenHokins
    @StevenHokins Рік тому

    Awesome box

  • @jimjim8125
    @jimjim8125 Рік тому +9

    awesome box! how did you do to make a reverse proxy on ssh without reconnecting again to ssh?

  • @gokul6120
    @gokul6120 Рік тому

    What have you done with Firefox that open a linke in new tab..

  • @buckbarrette898
    @buckbarrette898 Рік тому

    你的那个visual studio检查漏洞的插件叫什么名字额?请麻烦告诉一下,好吗?

  • @qdza
    @qdza Рік тому

    do you solve the labs before recording or is it all live?

  • @aDeveloper-c9o
    @aDeveloper-c9o Рік тому

    How did he know to do VHOST with gobuster near the beginning?

    • @orpheus0108
      @orpheus0108 Рік тому +5

      Always good to have some recon going in the background to see if there are other subdomains the server will route to. On this box, I found the vhost in the source before I remembered to launch my own recon.
      Also, it's a good idea to rerun Nmap scripts after you add a discovered vhost to your host file so that Nmap can follow the redirect. I've almost missed ".git" directory on another box because for some reason my feroxbuster didn't find it but rerunning Nmap with the vhosts added to /etc/hosts found the .git

  • @AUBCodeII
    @AUBCodeII Рік тому +1

    Only for me, Ipp? 🥺

  • @nirlevy8079
    @nirlevy8079 Рік тому +2

    Hi there!
    For me, bypassing the "Hacking Detected" in the LFI I URL encoded the ../ and it worked!
    than, I had access to any file in the machine

    • @PrakashKumar-se1qk
      @PrakashKumar-se1qk Рік тому

      I tried the similar URL encoding, but it got identified
      %2e%2e%2fetc%2e%2e%2fpasswd

    • @LegitZero
      @LegitZero Рік тому +1

      @@PrakashKumar-se1qku need to put a “/“ at the beginning as that’s the bypass in the source code