HackTheBox - Shrek

Поділитися
Вставка
  • Опубліковано 1 гру 2024

КОМЕНТАРІ • 26

  • @DarkLegends2008
    @DarkLegends2008 6 років тому +7

    Nice one! Thanks, i current working on my OSCP and your videos are very helpfull. Thks from Brazil !

  • @nelson1587
    @nelson1587 6 років тому +1

    Thanks for sharing the incident response bit, very helpful!

  • @mehh5505
    @mehh5505 6 років тому +11

    I did the privesc slightly differently actually at that dir /usr/src i created a symlink for /etc/passwd and after owning that one i changed the id of the user sec to 0 and thats how just got root

  • @arodtube7668
    @arodtube7668 6 років тому

    Awesome videos. Keep them coming. Would love to see more explanations on things and alternate methods for all aspects (enumeration and attack vectors). Thanks!

  • @fsacer
    @fsacer 6 років тому +1

    awesome ir stuff, i think i should be doing this on every box from now on

  • @g-o1882
    @g-o1882 6 років тому

    How does your executable not lose it's sticky bit after the cronjob? Everytime I try this the sticky bit gets removed.

  • @tilemachosvalkaniotis5265
    @tilemachosvalkaniotis5265 6 років тому +1

    There is a hint for the cronjob. Do some research on the journalctl command and you'll see

  • @skyone9237
    @skyone9237 4 роки тому

    How you figured out that audio clip last couple of seconds contained password....is hinding key inside audio file always has similar hiding method in ctf boxes.??

  • @XWRIATAKOS
    @XWRIATAKOS 6 років тому

    I tried to make a python script that set the euid to 0:
    ''''
    import pty
    import os
    os.seteuid(0)
    pty.spawn('/bin/bash')
    '''
    I changed it's permissions to 4755. and set owner to root.
    when I run it with python i get : OSError: [Errno 1] Operation not permitted
    Is there a way I can do the privesc with python?

    • @agendaaaa
      @agendaaaa 5 років тому

      adding #!/usr/bin/python in first line would help?

  • @klaboem0
    @klaboem0 6 років тому

    thanks very informative! the part I don't get is, how did you determine that the chmod was applied every x minute(s) on that /usr/src directory? I see that the cronjob file was edited, but you cannot read the contents right?

  • @pasqualeuk
    @pasqualeuk 6 років тому +1

    Hi ippsec, sorry for the stupid question, but how did you know the key was encrypted with an elliptic curve cipher?

    • @ippsec
      @ippsec  6 років тому +3

      I don't believe there was any clues to that. Just lots of trial and error.

  • @rajvardhanagarwal2273
    @rajvardhanagarwal2273 6 років тому

    @ippsec dude i saw some of your earlier videos in which you there was an unauthorised password reset vulnerablity on some of the machines that had WordPress on them but you didn't show it as because the mail function was disabled can you please make a video on that exploit?

    • @ippsec
      @ippsec  6 років тому +4

      Probably won't happen anytime in the near future, don't know of any fun boxes that utilize that exploit. I don't really do tutorials on specific exploits because I don't want to attract the crowd that searches for things like "How to hack wordpress".

  • @kimbol496
    @kimbol496 6 років тому +1

    Does anyone in the comments have a link to where i can improve me hacking skill or some pdf's or sites?

    • @bnal5tab90
      @bnal5tab90 6 років тому

      ATRIX if you know and want to get better hack the box will get your level i didnt even finish easy(having root i just got user)😂😭

    • @kimbol496
      @kimbol496 6 років тому

      thanks

  • @devil3682116
    @devil3682116 6 років тому

    there was no hint on cronjob and what it does. anyway i needed others help to do it. didnt played around much. j payo tei.

  • @007order007
    @007order007 6 років тому +4

    How exactly did you figured out that the cron job is chowning in that directory, at around 22:00? I understood the video so far but you lost me when you magically knew what the cronjob did

    • @ippsec
      @ippsec  6 років тому +6

      Unfortunately, I don't believe there's a good way to know. If you followed my other videos, you may have been able to see /root/chown starting through monitoring processes.
      Was one of those things where it just took a lot of time playing around and eventually I noticed a process change ownership. Then guessed at what was happening. I don't think you needed to give the file a setuid bit for the cron to take ownership. Didn't play around with it enough prior to recording, so just went with what I had in my notes.

    • @007order007
      @007order007 6 років тому +1

      IppSec ah alright thanks :)

  • @allandiego1446
    @allandiego1446 4 роки тому

    Your burp is cracked? If yes please whete I get ?

  • @numonamir9145
    @numonamir9145 4 роки тому

    02:00 you have forgot open firefox)))

  • @alexxinozgz
    @alexxinozgz 6 років тому +2

    Very very annoying machine!

  • @bnal5tab90
    @bnal5tab90 6 років тому +1

    Does anybody know a way to get better in penetrating os webs im kind of new and i nearly owned bash(root is hard but the user is super easy) btw your videos are very helpful but i just need to think 🤔 more❤️🌹👍🏻