Welcome to my channel, where I break down ethical hacking tools and techniques in a fun, laid-back style-just like the conversations you’d hear in a barbershop. Whether you’re new to cybersecurity or looking to sharpen your skills, I make complex topics easy to understand and engaging. With over a half-decade of experience, I’m a Senior Cybersecurity & Pentest Consultant, Creator of SentinelMindGPT, and a Certified Information Security Manager (CISM). Connect with me on LinkedIn www.linkedin.com/in/armatthews/ to stay up-to-date with the latest in AI, GRC, and cybersecurity!
This video saved my ass man. I was overthinking why I kept getting 404 on the .exe pull from the windows box, and it didn't even occur to me that I was running the python http server from a different directory than the payload.
i usually read the walkthroughs if i cant figure out something AND learn it cuz im not tryna just get up on try hack me im tryna learn this shit but after watching this video i understand ALOT more on reverse shells thank you fr fam
Great video! I think the problem while logging in was that the PW had a 0 not an o. I have subscribed and hope to get to learn more from you. Thank you for your putting time in to give back.
Just as a heads up, if you are using the AttackBox, or the THM Kali machine instead of your own, the in-browser view uses port 80. This means that at 6:08 you'll want to use another port (port 8000 is the default for python -m http.server), you'll just need to make sure you use the same port at 8:31.
clutch walkthrough just needed extra push past the whoami /priv part and was able to finish without watching the rest of vid, still did after i finished to see if you used alternate method, good work boss!
been doing tryhack me and following tutorials and this is the first one that i actually was able to learn what i was doing, why i was doing it, and actually keep the info i learned. actually finished my first tryhack me using this one and Ive been doing this or 2 or so months. thank you brutha!