Тёмный
h00dy
h00dy
h00dy
Подписаться
come here to pass the time when im alone in my room, not a weirdo! 💯
Комментарии
@0xSN1PE
@0xSN1PE 36 минут назад
@hoodietramp
@hoodietramp Час назад
I also added a blog post for this one - blog.h00dy.me/tryhackme-publisher-writeup-easy
@hoodietramp
@hoodietramp Час назад
Join my discord server - discord.com/invite/QhHe7nNRSU
@Flickzy27
@Flickzy27 Час назад
🔥🔥🔥
@MrJBA79
@MrJBA79 19 часов назад
If someone needs a tutorial to do this then they have no business messing with Kali.
@shubhamjangid4456
@shubhamjangid4456 20 часов назад
gotta know about something new. appreciable ;-)
@TrialByWireOriginal
@TrialByWireOriginal День назад
👍
@prateek3927
@prateek3927 День назад
Much appreciated
@Flickzy27
@Flickzy27 День назад
What i needed
@mohitjaglan1293
@mohitjaglan1293 День назад
Welldone भाई ❤❤
@stormshadow8245
@stormshadow8245 День назад
i will subscribe if you help me in installing vmware pro free version on my kali linux as its throwing errors tried multiple videos already
@hoodietramp
@hoodietramp День назад
okay bro, ping me on discord will ya😂
@iqlip7
@iqlip7 День назад
Keeping going brother ❤❤
@hoodietramp
@hoodietramp День назад
Join my discord server - discord.com/invite/QhHe7nNRSU 🚀
@iqlip7
@iqlip7 4 дня назад
Helpful 🐢🎯
@0xSN1PE
@0xSN1PE 6 дней назад
good video
@Flickzy27
@Flickzy27 7 дней назад
🔥
@vikrampawar8512
@vikrampawar8512 7 дней назад
🎉 demand video
@AashiyaJindal
@AashiyaJindal 7 дней назад
Sir🛐🫡🔥
@AashiyaJindal
@AashiyaJindal 7 дней назад
Sir🛐🫡🔥
@HUNTINGHACKERS45
@HUNTINGHACKERS45 7 дней назад
Such a good video 👍❤️
@hoodietramp
@hoodietramp 7 дней назад
Join my discord server - discord.com/invite/QhHe7nNRSU Find my bash aliases in #important-stuff channel
@CC-nx1vi
@CC-nx1vi 9 дней назад
man i got stucked when trying to achieve initial access. some of my thoughts were: Directories found & tree: /app /castle /application /files /cache (...) /concrete # directory indexing /images /bin/concrete5 <--- bash file /config/openapi.json <--- OpenAPI file specifying routes. /index.php /contact /blog /login /authenticate /concrete /forgot_password /updates /packages Services concrete5 - 8.5.2 PHP 5.5.9 Apache 2.4.7 Features Search over the blog's content Login into the website Request for password reset9 Send message File upload (acceppting only a few extensions) Possible found credentials admin toad More details It's possible to see directories and files by accessing the /app/castle/concrete path. But a lot of files and directories (in php) return "access denied" or internal error. Thoughts: I think that the /app/castle/concrete is a rabbit hole. I tried to find some exposed credential, or available endpoints for requesting for system i nformation or file download. But I couldn't find anything yet. May the file upload is what I need to exploit? But I couldn't figure it out how yet. I tried a lot of possible extensions bypasses, but nothing looks like to work. Maybe a bruteforce in the login panel? Well, I hope I do not get banned. Let's try it then, some of the last of my resources. Well, the last one in to run nikto, wpscan or even trying to find a public exploit about the found services. Initial Access Gain: - Command Injection (until now I wasn't able to find some place for it.) - Server-Side Template Injection (same as above) - File Upload (could not bypass the extension) - Sensitive Credentials retrieve by exposure (could not find anything) - Broken authentication in some API (couldn't even find the API!) (apparently disabled when doing path transversal in index.php like /app/castle/index.php/%2e%2e - Services and softwares vulnerables (my last resource?) but everything i needed to try was trying some username/password combination... i guess i'm very far from being a beginner in ctf also, awesome video, thnx so much
@hoodietramp
@hoodietramp 3 дня назад
there were a few rabbit holes in this 1 hehe, thanks for watching the vid 🙂
@cloudjn7261
@cloudjn7261 11 дней назад
so what's key?
@uartuo
@uartuo 14 дней назад
🔥
@shubhamjangid4456
@shubhamjangid4456 14 дней назад
Noice
@amjad7635
@amjad7635 14 дней назад
thank you man , for real i didnt understand a few parts, how can i learn this parts???
@hoodietramp
@hoodietramp 14 дней назад
No Problem 🙂, can i know which part you didn’t understand although it’s jus practice and a bit of understanding how things work it was more of a CTFy than a real life based challenge
@be6t942
@be6t942 3 дня назад
@@hoodietramp the /bin and all that stuffs . bcz i am new in cyber security so i don't know that much about it only know the basic
@hoodietramp
@hoodietramp 3 дня назад
you can try going through hack the box linux fundamentals academy module, that might help
@be6t942
@be6t942 3 дня назад
@@hoodietramp thanks man i think that will help me a lot. but can i request you somthing? i need someone who will teach me all of this from scratch, can you suggest to me what i should do
@hoodietramp
@hoodietramp 3 дня назад
@@be6t942there are a lot of discord communities out there where you can find and connect with people that will help you in the journey, join tryhackme’s discord and jus keep going bro hope you the best 🚀
@taxon2850
@taxon2850 15 дней назад
are wah bhai 💜
@hoodietramp
@hoodietramp 15 дней назад
Join my discord server - discord.h00dy.me
@LowSpecBro
@LowSpecBro 15 дней назад
h00dy h00dy
@c0ri
@c0ri Месяц назад
I got the ftp flag just from issuing `ftp user@cctv.thm`. Tho there is no FTP running I figured they had something watching for an ftp connection. This box seemed painful do to ssl issues I was having. I had originally written a python script to just get all the flags but wasted so much time haha. I wanted to see how others challenged this box. Nice job! Cheers.
@hoodietramp
@hoodietramp Месяц назад
github.com/hoodietramp/custom-profile-volatility
@cr0wdedroom
@cr0wdedroom Месяц назад
👾
@LowSpecBro
@LowSpecBro Месяц назад
Yey naitik
@cr0wdedroom
@cr0wdedroom Месяц назад
@@LowSpecBro halo
@buggymaytricks
@buggymaytricks Месяц назад
We need a video on burp pro
@hoodietramp
@hoodietramp Месяц назад
okay soon 💯
@LowSpecBro
@LowSpecBro Месяц назад
#1 hacker of india
@hoodietramp
@hoodietramp Месяц назад
yeah somebody is out there who is
@LowSpecBro
@LowSpecBro Месяц назад
@@hoodietramp h00dy
@LowSpecBro
@LowSpecBro Месяц назад
yey h00dy
@tungtranthanh1901
@tungtranthanh1901 2 месяца назад
can you tell me why we have to add cctv.thm , ip in to file /etc/hosts . I dont known why i cannt access directly in to cctv.thm . Please help me known .😞😞😘😘
@hoodietramp
@hoodietramp 2 месяца назад
bcuz the box has configured dns resolution, to be able to access the site you need to add in /etc/hosts file, as the box doesn't have a dns record setup somewhere globally it'll lookup to /etc/hosts file
@amankharb2401
@amankharb2401 2 месяца назад
@iqlip7
@iqlip7 2 месяца назад
🤠🕶️
@cr0wdedroom
@cr0wdedroom 2 месяца назад
🛣️
@ghufranashiq19
@ghufranashiq19 5 месяцев назад
Thankyou it great some concept can't understand i think i miss basic ... How i connect you... Linkedin please
@hoodietramp
@hoodietramp 5 месяцев назад
linkedin.com/in/h00dy 🙂
@zymh2433
@zymh2433 5 месяцев назад
i have a question i don't have /etc/docker/daemon.json config file by default. Should i create new one?
@hoodietramp
@hoodietramp 5 месяцев назад
yeah you’d have to create one
@hoodietramp
@hoodietramp 5 месяцев назад
Search for Privilege Escalation with 2 shells and host mount in this article, you can find the way i got privesc on this box - book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation
@iqlip7
@iqlip7 5 месяцев назад
kudos
@prateek3927
@prateek3927 5 месяцев назад
🔫🔫🫡
@Vishwassoch
@Vishwassoch 5 месяцев назад
🪲🔥
@cr0wdedroom
@cr0wdedroom 5 месяцев назад
☂️
@sahilsehgal8630
@sahilsehgal8630 5 месяцев назад
💟🔒