Тёмный

Metasploit: Exploitation - TryHackMe Junior Penetration Tester: 7.2 

Brock Rosen
Подписаться 4,4 тыс.
Просмотров 9 тыс.
50% 1

Опубликовано:

 

29 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 31   
@BrockRosen
@BrockRosen 6 месяцев назад
Check out my new song! - "Prelude" ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-UUi1af8rxjo.html
@berritc466
@berritc466 Год назад
Brock, your videos are legitimately the best TryHackMe videos on youtube and it's not even close. You're on another level. Please keep up the good work and don't give up! I wish you the most success on this platform.
@datag1199
@datag1199 7 месяцев назад
Great walkthrough. Unfortunately, I am in the "Exploitation" section - going through the exact steps you are going through, and when I run 'exploit' my target is not vulnerable (rhost, lhost, etc. is all set and shows as yours does) and getting "Exploit completed, but no session was created). Going to study this but wondering if anyone else came across this? Thanks
@brettgastelum5330
@brettgastelum5330 6 месяцев назад
You have to get the IP addresses on your own machine. I use my own AttackBox, so I use that IP address as LHOST. Each time you run START MACHINE in the room, you are provided with a dynamic IP address that must be used for RHOSTS. Once both of those are set correctly using your own IPs, you SHOULD be able to get a session going. Do yourself a favor though and run show payloads before using 'set payload #'. You'll want to find the reverse tcp with meterpreter in there if you want to rinse/repeat how he got the flag. FOR THE LIFE OF ME I COULD NOT GET THE FLAG TO POP WITHOUT ME ACTUALLY BEING IN THE FOLDER I ran it both using meterpreter AND windows shell meterpreter (linux) command: cat PATH\file.txt or just go cd a bunch until you get to C: before traversing back through to \Users\Jon\Documents\ and then run ' cat flag.txt ' If you're in the windows shell: cd until you get to C: and the traverse to where the file is located. Use ' dir ' to list all the files to verify that you're in the correct folder. Once you see the file, use ' more flag.txt '
@davidvideos1359
@davidvideos1359 6 месяцев назад
me too
@brettgastelum5330
@brettgastelum5330 6 месяцев назад
Did you make sure you set the listening port to the address you get from connecting with your OpenVPN or are you using the AttackBox?
@datag1199
@datag1199 6 месяцев назад
Yes! that did it. I used the wrong IP and was able to correct it. Thanks for the reply. When I was on this task, I had been on THM like 3+ hours lol..... sometimes it helps to just step away and revisit. Cheers! @@brettgastelum5330
@davidvideos1359
@davidvideos1359 6 месяцев назад
@@brettgastelum5330 attack box
@Bodasen
@Bodasen 4 месяца назад
Hello there, thanks for the video, it really helped. I have a question for you if you're willing to answer it here. It might be dumb but I don't understand why we need a reverse shell here. From my understanding , what we do is the following: 1/ We get access to the user Murphy by connecting through ssh to him 2/ From there we're logged in as Murphy and then we type "sudo su" to have root priviliges. 3/ Then we go back to the attacking machine to create the payload and a server so that we can download the payload from Murphy's side. 4/ We then start listening with multi/handler on the port of our chosing to catch the shell 5/ Finally we can run the payload on Murphy's side that will connect to our attacking machine's port and create a meterpreter session from which we'll be able to control Murphy's machine. If this is correct, then I don't understand why we can't simply control his machine with a simple ssh connection that we established on step 1/. Could you help me understand this please?
@Monty-sv7ti
@Monty-sv7ti 3 месяца назад
TL;DR You get to ssh login to simplify some process. If you were to simply control the machine with the ssh defeats the purpose of the exercise. Longer explanation - The first step basically gave us full control over the target machine. However, the only reason this exercise provided the username and the password is so that you can do the following conveniently 1. download the payload from the attacking machine 2. mark the payload as executable and run it. If you didn't have the privileges already, it would be much harder to do these. In a more realistic example I'd imagine that you will not be provided with root from the get-go, so you'll have to figure out how to download the payload and run it on the target machine, but that's out of scope for this exercise.
@digitalturan
@digitalturan 7 месяцев назад
Can someone explain what we did in msfvenom part, I did get nothing
@VirgoAvatar
@VirgoAvatar 13 дней назад
Thank you for this guide, appreciate it 🙏 There were some very tricky parts, thanks to following along step by step, I was able to complete the room 😁
@kasperYJ
@kasperYJ Месяц назад
dude you are so wholesome. thanks a lot for the help! you earned yourself a golden sub.
@EvilGPT
@EvilGPT 6 месяцев назад
hands down one of the best youtube instructors I've found yet. Your videos are to the point, and you are well spoken and easy to understand. These videos are honestly a hidden gem for anyone starting out in cyber.
@jorge88espino
@jorge88espino 8 месяцев назад
I have a question, at 32:33 I don't get the meterpreter console, but the Windows shell. I have already reviewed all the steps and they are the same as shown in the video. I don't understand why it makes that change. 😥
@javierferrr
@javierferrr 8 месяцев назад
I have the same issue!
@javierferrr
@javierferrr 8 месяцев назад
After messing around, I was able to stablish a meterpreter session by upgrading the Windows shell session with the 'sessions -u 1' command. Then I was able to run the 'search -f flag.txt' command and it returned the path however I could not 'cat' the file because of error "stdapi_fs_stat: Operation failed: The system cannot find the file specified."
@jack2040
@jack2040 8 месяцев назад
meterpreter > shell Process 2304 created. Channel 1 created. Microsoft Windows [Version 6.1.7601] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Windows\system32>type c:\Users\Jon\Documents\flag.txt type c:\Users\Jon\Documents\flag.txt THM-5455554845
@gryphon1538
@gryphon1538 7 месяцев назад
same here
@akashdeepnandi
@akashdeepnandi 5 месяцев назад
I had the same issue, basically I think the guide in tryhackme is old. But after selecting the eternal blue exploit (windows/smb/ms17_010_eternalblue) - don't set any payload type. The default payload type is reverse shell with meterpreter (windows/x64/meterpreter/reverse_tcp). Another person pointed out, after you have the session you can upgrade it to meterpreter using 'sessions -u 1'
@anthonydiaz2185
@anthonydiaz2185 7 месяцев назад
Appreciate as always your videos for times when I get stuck!
@somebody3014
@somebody3014 10 месяцев назад
best walkthrough
@kaptankoloni1984
@kaptankoloni1984 6 месяцев назад
bro excellent work:))
@andrewrx88
@andrewrx88 4 месяца назад
I use tryhackme attackbox, does anyone else have an issue using a bruteforce attack? iv never been able to use a bruceforece attack on tryhack me but every thing else works perfect. I followed all your commands and it ends in could not connect. I also noticed you didnt specify an rhost for the password attack. how does the module know what ip to attack?
@falkondezigns5397
@falkondezigns5397 4 месяца назад
Please make more such videos! You are awesome! :D
@danielshitrit6795
@danielshitrit6795 5 месяцев назад
i don't understand how do you know the port for 16:44
@kanikia
@kanikia 4 месяца назад
Hmm, the THM steps must be old because I could not get a number of things, although I followed along precisely.
@solido888
@solido888 3 месяца назад
Same here.
@latonyprod8195
@latonyprod8195 7 месяцев назад
do you use burpsuite at 44.18?
@kaiLon450
@kaiLon450 7 месяцев назад
very useful, thanks.
Далее
Трудности СГОРЕВШЕЙ BMW M4!
49:41
Просмотров 1,7 млн
FATAL CHASE 😳 😳
00:19
Просмотров 1,5 млн
Это нужно попробовать
00:42
Просмотров 437 тыс.
TryHackMe | Metasploit: Exploitation 2/2
1:07:47
Watch me hack a Wordpress website..
28:52
Просмотров 235 тыс.
TryHackMe! EternalBlue/MS17-010 in Metasploit
28:15
Просмотров 269 тыс.
HackTheBox - Intuition
1:32:00
Просмотров 9 тыс.
I Played HackTheBox For 30 Days - Here's What I Learned
10:23
NMAP Revealed: Unleash the Ultimate Hacker Tool
24:19