Thanks for these videos! Just finished this one and will be visiting the rest later in the playlist. I’m working on eJPT right now, but want to quickly move on to PNPT and OSCP after, and this was a *must* recommendation for OSCP.
Help me please. This was recommended by TryHackMe on its "Ultimate Guide for Beginners" post but the pic opens in a new tab for me, and I don't get a split-screen VM thing. You are using things the beginners' guide rooms haven't taught me but this is the next thing on the "Getting Started" list. I just want to learn some cyber security for free but they've made the jump so big from doable things to this without explaining it that I just feel like giving the whole thing up.
Thankyou for the vid! Is this supposed to be the most simple CTF on TryHackMe? There seems to be a lot of prequired knowledge in here before you could get close to tackling it. What would you suggest learning first to be able to do these CTFs? I have a good understanding of the linux fundamentals, know about nmap, but every CTF there seems to be something unknown. Any help much appreciated! Cheers!
hey nice vedio a simple methode is use hydra to brute force ssh password and do user enumuration there is a user called ubuntu in this challenge and there is a thing called hydra-challenge their is the pass word and user name and even the flag for challenge a short route no!!!🤣🤣
Neither the IP addressed mentioned in this video nor the one listed in the current room work. The only way to complete this module without that is just to copy the flags from this video into our room answers.
On IOS, is it possible to carve out permanently deleted photos and videos? Im talkkng about recovering photos deleted over 6 months ago. Another question is how fast does sqlite deleted data get overwritten?
I got this error when I tried to run nmap (after chmod +x) : ./nmap-test: line 1: payload:allShortcutsEnabled:false: command not found Does anyone know how to resolve this?
I bloked 3 hours cause u writed in Hydra command pwd=PWD but it's pwd=PASS so the hydra was working on but find nothing causse password was not really brutforcing
Hello, in the first steps of connecting the openvpn, im gettin this error here when I run the ' sudo openvpn filename.opvn' I get this error - 'Protocol options: explicit-exit-notify 3 ', do you know how to fix it? thanks!
For everyone trying nowadays Dec/2023, we can use python3, just need to modify the code. 1 - Put from __future__ import print_function in the top of the code 2 - Put ( ) where have print "something" , getting: print("something") 3 - Remove colored from the line print colored("[*] Now try to crack password") , getting print("[*] Now try to crack password") 4 - Just run python3 46635.py -u IP/simple
How exactly do you go about picking the wordlist that you attempt to bruteforce? Since there's so many to choose from I would think each one is specific
Bruteforcing the username field with the fsocity.dic wordlist. You will do the username field first until you get a match. Then using the username you found, do the same bruteforce for passwords until you get a match. Then log in with your creds :)
Using Hydra of course. A couple important notes: Sort the fsocity.dic file to remove any duplicates. The file is unnecessarily bloated originally, you can use uniq & sort in the cli to thin the dupes out. Next note, is that you must provide an error string found from the web page for Hydra to validate if a combination from the wordlist is valid or invalid. I just used the string "ERROR"