Тёмный

HackTheBox RegistryTwo 

IppSec
Подписаться 249 тыс.
Просмотров 12 тыс.
50% 1

Опубликовано:

 

29 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 34   
@spandexvortex1097
@spandexvortex1097 7 месяцев назад
I think the reason you're getting the file content when you do 'ls' @1:34:00 is because of missing break statements for each 'case' condition. In Java, it's required to add the break statement after each 'case' condition ends, otherwise, it'll continue until it finds a break or until the default case.
@ippsec
@ippsec 7 месяцев назад
Ah. Thanks! Yup that would explain it.
@AUBCodeII
@AUBCodeII 8 месяцев назад
Ipp, you have a smooth brain. No ridges or lumps, or valleys or bumps; all ideas slide right off, like a waterslide!
@NicolastheThird-h6m
@NicolastheThird-h6m 7 месяцев назад
Practice over years makes us think like a robot.
@AUBCodeII
@AUBCodeII 7 месяцев назад
@@NicolastheThird-h6m Smooth brain is actually good, because: * Smooth * No wrinkles * Cute * Can't think = no sad
@dadamnmayne
@dadamnmayne 7 месяцев назад
The benefit of this format is not only do you get a walkthrough but you might get a vim tip or a tip to convert your burp suite repeater data to a curl command.
@dadamnmayne
@dadamnmayne 7 месяцев назад
i like when machine creators lead you to either a id_rsa or a password. that way, in practice, you can jump straight to lateral movement or priv esc if desired, especially on insane machine. its like a checkpoint.
@apkanalyze3623
@apkanalyze3623 7 месяцев назад
That sneaky video was the good one :) I'm still smiling when I recall you reading the entire 'Total number of IPv6.' aaah good old days.
@ihavelowiq2723
@ihavelowiq2723 7 месяцев назад
this is a simple request from a beginner. can u add beyond root part to every video. even thought they are easy box nothing crazy to show, can u route us through the box, showing how the site is hosted, how the inside is working, what are the main points we need to check, how the box creator has done things using crons like that. thank you. i always amazed by ur knowledge
@miroslavmetodiev8915
@miroslavmetodiev8915 7 месяцев назад
23:41 You can undo an accidental tab close with ctrl+shift+T Thanks for being awesome! ❤
@eyezikandexploits
@eyezikandexploits 7 месяцев назад
This box was a struggle for me
@tg7943
@tg7943 7 месяцев назад
Push!
@BenasserAitLhajLahcen
@BenasserAitLhajLahcen 8 месяцев назад
Greeting From Morocco
@abdelhay.
@abdelhay. 8 месяцев назад
Mgharba everywhere
@abdelhay.
@abdelhay. 8 месяцев назад
Mgharba everywhere
@BenasserAitLhajLahcen
@BenasserAitLhajLahcen 7 месяцев назад
​@@abdelhay.Wayih
@Y4riss
@Y4riss 7 месяцев назад
hhhhh
@noctavel
@noctavel 7 месяцев назад
Question: Why did you use http to transfer files from your host to victim but used nc the other way around (twice)? any specific reason or just your standard flow?
@ippsec
@ippsec 7 месяцев назад
Habit - Generally speaking when doing offensive work, your target will be behind a NAT. So standing up a listener won't help much as there isn't the port forward (PAT) setup to access the webserver from the outside. On the attacking side, you have control of the router, or are you just are on a routable IP Address, so you can stand up a webserver.
@notTh3Mag1c1an
@notTh3Mag1c1an 7 месяцев назад
is the volume a little lower or is it just to me?
@ippsec
@ippsec 7 месяцев назад
Very well could be -- Something changed my volume settings before recording this video. Think Zoom maxed out my microphone and I had to find out the right settings.
@notTh3Mag1c1an
@notTh3Mag1c1an 7 месяцев назад
@@ippsec No worries Man, I increased the volume. We all good, it wasnt that low.
@vijayvj3976
@vijayvj3976 7 месяцев назад
Out of the box thinking 💯
@b14cky30
@b14cky30 8 месяцев назад
I have one simple question: which technique should we apply for exploiting the machine after lots of enumeration? 1. Breadth First Search (Horizontally Proceed) - Means First of try all thing as surface level for initial foothold 2. Depth First Search (Vertically Proceed) - Means First Take one thing and deep dive into it and then another one.
@moretto8589
@moretto8589 8 месяцев назад
I think it depends on the situation I personally do breadth first if i see a lot of ports and if i see only 2 or 3 ports then depth first.
@ippsec
@ippsec 7 месяцев назад
I go Horizontal, then exploit what I think will be the quickest first.
@NicolastheThird-h6m
@NicolastheThird-h6m 7 месяцев назад
wait when did we start having Algorithms for hacking. Cool. The best way is the ippsec way.
@NicolastheThird-h6m
@NicolastheThird-h6m 7 месяцев назад
​@@moretto8589 I like this. This is what I do too. Probably why I get overwhelmed when there's a lot of ports to check.
@gespoL-
@gespoL- 8 месяцев назад
Se garantiu
@AAA-AAA158
@AAA-AAA158 8 месяцев назад
first
@yuriypalikshanov8628
@yuriypalikshanov8628 8 месяцев назад
@sotecluxan4221
@sotecluxan4221 7 месяцев назад
Далее
HackTheBox - Bookworm
2:05:30
Просмотров 14 тыс.
HackTheBox - Drive
1:46:13
Просмотров 11 тыс.
Почему?
00:22
Просмотров 283 тыс.
БЕЛКА ЗВОНИТ ДРУГУ#cat
00:20
Просмотров 626 тыс.
HackTheBox - CozyHosting
37:18
Просмотров 13 тыс.
Cloud Design Patterns
3:40:10
Просмотров 641
HackTheBox - Awkward
2:01:09
Просмотров 17 тыс.
HackTheBox - Ouija
1:48:11
Просмотров 14 тыс.
HackTheBox - Coder
2:09:39
Просмотров 15 тыс.
pfSense Firewall - pfSense Administration Full Course
3:35:47
HackTheBox - Runner
46:12
Просмотров 10 тыс.