Тёмный

Tier 1: Three - HackTheBox Starting Point - Full Walkthrough 

CryptoCat
Подписаться 37 тыс.
Просмотров 59 тыс.
50% 1

Опубликовано:

 

30 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 197   
@_CryptoCat
@_CryptoCat Год назад
A lot of comments about *gobuster not working* as shown in the video, this is probably due to the updated version (3.2.0) - github.com/OJ/gobuster/commit/03e7a4557c53764f411074dde74757adcc074def The solution in 3.2.0 is to use the --append-domain flag with gobuster which will "Append main domain from URL to words from wordlist. Otherwise the fully qualified domains need to be specified in the wordlist." Alternatively, use ffuf and filter by response code (rather than length)
@afnercruz181
@afnercruz181 Год назад
with the --append-domain worked perfectly
@_CryptoCat
@_CryptoCat Год назад
@@afnercruz181 Excellent! 🙂
@九傲宋
@九傲宋 Год назад
Hey, I met the same issue and I try the ffuf but it didn't work. For me the best solution is the --append-domain with gobuster. THX anyway
@九傲宋
@九傲宋 Год назад
even if i filter by response code, it didn't work
@ManOZn
@ManOZn Год назад
sadly in ffuf you can't filter with a response status code 404 and 400 the accepteble Response status: 200,204,301,302,307,401,403,405,500
@hellothere909
@hellothere909 2 года назад
for 'very easy' this is surprisingly hard for everybody
@sleepanarchist
@sleepanarchist Год назад
I did find it quite hard LOL, reverse shell is definetly not a beginner friendly topic
@rushikeshgalgale5243
@rushikeshgalgale5243 Год назад
really
@Stefzan19
@Stefzan19 11 месяцев назад
Major facts
@dio-gx9dz
@dio-gx9dz 9 месяцев назад
Ture dude
9 месяцев назад
MY BRAIN IS COMMING OUT MY NOSE AND EARS BECAUSE OF THIS EASY MACHINE
@Fybir_
@Fybir_ Год назад
i just recently got back into hacking after a while and your channel has been SOO helpful on my journey so far, keep up the great work!
@_CryptoCat
@_CryptoCat Год назад
aww thank you 🙏🥰
@NimbleSF
@NimbleSF Год назад
Christ almighty what a goddamn nightmare of a Very Easy flag. As a beginner this makes me feel utterly helpless and clueless but I can't say I didn't learn anything. I owe it to myself to do a writeup of this to reinforce it honestly.
@_CryptoCat
@_CryptoCat Год назад
You learn through the struggle! Write-ups are a great way to reinforce it, that's one of my main reasons for making videos 😊
@ismailmatrix1
@ismailmatrix1 2 года назад
The tldr command is a bloody lifesaver
@_CryptoCat
@_CryptoCat 2 года назад
ikr! can't remember who recommended it to me but I owe them a beer 🙏
@Styrofoamiskindabad
@Styrofoamiskindabad 2 дня назад
Fr Too Long Didn't Read
@HolyGamebot
@HolyGamebot 2 года назад
The official htb walkthrough was so confusing at the end for a beginner like me. They wanted to set up listening, then run a python server, all to use a reverse shell. Your solution was so much simpler. Earned a sub from me 🤙
@_CryptoCat
@_CryptoCat 2 года назад
thank you 🥰
@TheMoatsy
@TheMoatsy Год назад
@@_CryptoCat ditto from me, quick question if you see this, is that webshells collection that you took the shell.php from out of some collection? most of the included kali collections have much more complex things, but this simple shell is similar to what i created from scratch. just wondering if i can find a good collection somewhere
@PHTM04
@PHTM04 Год назад
This is so hard man I legit gave up half way through, the scanning faze requires new things we havent done and the end is crazy for the first level
@nickplays4292
@nickplays4292 11 месяцев назад
Lol so true. Your best friend is google though. I’m beginner too and managed to get through it (in like 3 hours) 😂
@theexclusivecorner
@theexclusivecorner 7 месяцев назад
Hi, fantastic video that helped me a lot but I struggled getting a shell up and running following this video and following the HTB walkthrough. I've followed these as accurate as I can but I can't get a shell connected. I'll keep trying!
@TodiDiang
@TodiDiang Год назад
This machine is too suck for a machine - proxy error can't be fixed always error
@uv8575
@uv8575 2 года назад
Thanks :) Solved this machine few days ago, steps were a bit different and your way is much simpler. Again, learned few new things from your video. Keep them coming ❤
@_CryptoCat
@_CryptoCat 2 года назад
thank you 🙏🥰
@soanzin
@soanzin 4 месяца назад
I cant understand how the s3 bucket could run the php app.. could explain please ? I do some research, try chatgpt, but still without understanding..
@_CryptoCat
@_CryptoCat 3 месяца назад
Without reviewing the challenge/video, I think the s3 bucket was on a different subdomain to the php app? In this case, that's achieved with virtual hosting (rather than an actual subdomain).
@cyberdash7883
@cyberdash7883 10 месяцев назад
When I put the IP address in the browser and click enter, it's taking a lot of time loading and it's not opening the website. However I have a very good internet connection. What should I do? how do I fix this issue?
@_CryptoCat
@_CryptoCat 10 месяцев назад
Hmmm if your connection is OK, maybe the problem is with the instance of the box you're trying to hack (restart?) or with your VPN connection (reset? regenerate? change server?). Could also be some firewall related issue 🤷‍♂
@mohamedreddad2684
@mohamedreddad2684 4 месяца назад
update finaly it appears , i was dump to realize that i put the ip and the domain name in the middle of the hosts file not the end , thakns dude
@_CryptoCat
@_CryptoCat 3 месяца назад
np, glad you got it sorted! 👊
@HoneyBaby-o1m
@HoneyBaby-o1m 8 месяцев назад
does anyone know how to add wordlist file. i newly installed gobuster but don't have all the files i needed for vhost. please help me
@_CryptoCat
@_CryptoCat 8 месяцев назад
You can have a look in /usr/share/wordlists but I'd recommend downloading this: github.com/danielmiessler/SecLists - you can either clone the git repo or might be able to just to "sudo apt-get install seclists" and then point gobuster to the chosen wordlist in /usr/share/seclists
@mcjthemcj521
@mcjthemcj521 Год назад
the walkthrough for this machine just simply doesn't work!!!
@_CryptoCat
@_CryptoCat Год назад
My walkthrough or the official walkthrough? 😆
@wa57s577
@wa57s577 Год назад
Is the s3 bucket running locally on the attacked machine?
@_CryptoCat
@_CryptoCat Год назад
I'd imagine so!
@Hunti21
@Hunti21 2 года назад
Heei man - thanks for the walkthrough. in the walkthrough from hack the box it says: Let's create a PHP file to upload: echo '' > shell.php you did not di that - right? in my case i had to do it as well, i did not exactly that way but i also created ah file with nano with the string '' -in it... my question...where comes this string from? internet search?
@_CryptoCat
@_CryptoCat 2 года назад
Hey, check around 14:35 where I talk about shells and 16:07 you see I search for shells on my system, but you could also just google shells to copy/paste as well (or type it out since this one's short)
@Hunti21
@Hunti21 2 года назад
in my case webshells/shells.php with '' in it did not exist...thats why i had to create it... than i looked in the htb walkthrough and the htb walkthrugh says i have to create the shell.php file..then i just wondered how i was supposed to come up with this command ''
@_CryptoCat
@_CryptoCat 2 года назад
@@Hunti21 Basically the rule is; if you find a way to upload files to a website, try and get command execution by uploading a shell in whatever language the server understands. In this case it's a PHP server so you could just google "PHP shell" or "PHP payloads", but maybe next time it will be an ASP.net server and you'll need to google for an ASP shell. www.revshells.com is good for getting reverse shells for different languages.
@comradedarpos3198
@comradedarpos3198 2 года назад
Without the guide on the hackthebox website, how would you know to enumerate for subdomains? I never see it done on any other machine writeup.
@_CryptoCat
@_CryptoCat 2 года назад
This might be the first starting point machine that's used subdomains but it's super common on normal HTB. First 3 things I normally do on a new machine; port scan, directory busting, subdomain (vhost) enum.
@pl7771
@pl7771 9 месяцев назад
why vhosts in place of dns in gobuster?
@_CryptoCat
@_CryptoCat 9 месяцев назад
This is because hackthebox use virtual hosts instead of registering DNS record
@mooc0102
@mooc0102 2 года назад
How did you know bucket name is thetoppershtb instead of s3thetoppershtb after you find the sub domain, s3thetoppershtb ? And how did you know key id and secret key are "a", I try to create aws account to create those keys, but amazon web required me to submit credit card number then i gave up and stuck.
@_CryptoCat
@_CryptoCat 2 года назад
Hey mate good questions, I should of bit been clearer on this. for listing the bucket names you can do like: aws --endpoint=s3.thetoppers.htb s3 ls Which will show "thetoppers.htb" as the bucket name. As for the "a", those values can be anything; the aws bucket wasn't checking for valid credentials *but* those credentials can't be empty. You shouldn't need to setup any accounts I don't think.. Definitely don't pay for any aws products xD
@mooc0102
@mooc0102 2 года назад
@@_CryptoCat Oh, I have known why I couldn't submit random key value in aws configure, because I set valid region name in aws configure such as "us-west-2", then I did aws s3 command, it responsed me "The AWS Access Key Id you provided does not exist in our records.". And it misled me to consider whether I have to create a valid credentials (my second question). After I set random region name in aws configure, it works. Thanks for your reply.
@daniahmed
@daniahmed Год назад
I cannot get command execution in the box. It returns blank. I've tried so much. If anyone has had the same issue and found the solution, please let me know.
@_CryptoCat
@_CryptoCat Год назад
Also try to check the official walkthrough, hackthebox forum and discord 😉
@daniahmed
@daniahmed Год назад
@@_CryptoCatThanks. It worked after changing the shell that I put in the aws.
@hahahazzz123ify
@hahahazzz123ify 2 года назад
Finally, fianlly, finally, I stuck in the flag.txt for a long time. Thank you for sharing.
@_CryptoCat
@_CryptoCat 2 года назад
🥰
@kylejf9059
@kylejf9059 2 года назад
Forgot to say thanks for this, was a little stuck but got there nicely. You looked at the "RedPanda" machine? It's ridiculously difficult with priv esc. I spent an absolute stack of time on it and had to read up, it's VERY difficult (imo) for those beginning. Would be a worthy video for you to do. Thanks again 👍🏻
@_CryptoCat
@_CryptoCat 2 года назад
I did RedPanda last week and you're right it was hard af lol. I don't really make retired box videos since Ippsec does such a great job xD
@nazimsakhri1558
@nazimsakhri1558 Год назад
so after i finnaly understood gobuster you came up with GOBUSTERZZZZ 😂😂😂😂😂😂😂😂
@_CryptoCat
@_CryptoCat Год назад
hehe i have a tendency to add 'z' to my aliases.. also use 'mscanz', 'nmapz' etc 😆
@mohamedreddad2684
@mohamedreddad2684 4 месяца назад
i cant understand all of this shit be more specific plzzz
@_CryptoCat
@_CryptoCat 4 месяца назад
Ooooft been ages since I made this 😆 Any particular part of the video you're stuck with or have questions on?
@mohamedreddad2684
@mohamedreddad2684 4 месяца назад
@@_CryptoCat first sorry bro i was really agressive , i still stcuking the s3 sub-domain doesnt appear to me even with --append-domain flag , i have gobuster v3.5
@alanledesma987
@alanledesma987 Год назад
what is Burp and how do you use it?
@_CryptoCat
@_CryptoCat Год назад
It's a web proxy that you use to intercept/modify/forward/drop HTTP requests: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-24dUQ1LvopE.html
@Vex7eX
@Vex7eX Год назад
Thank you so much for your tutorial. I have been studying it these days.
@_CryptoCat
@_CryptoCat Год назад
Thanks mate 🙏🥰
@TheSkulldraw
@TheSkulldraw 2 года назад
how can the subdomain enumeration find the s3 if there is no line with the s3 in the hots file? I don't get that part
@_CryptoCat
@_CryptoCat 2 года назад
Good question! When we use ffuf to fuzz subdomains, we are actually using the original hostname, e.g. three.htb in the URL but setting the "Host" header to FUZZ.three.htb Basically this is because the subdomains are setup using virtual hosting, rather than actual subdomains. Hope that makes sense!
@Death_User666
@Death_User666 Год назад
Who else came here after giving up on the crappy walkthrough on the site
@_CryptoCat
@_CryptoCat Год назад
haha 😆 it would be cool if HTB embedded community videos on their site, similar to how Portswigger do with WebSecAcademy.
@Death_User666
@Death_User666 Год назад
question im doing with the walkthrough right now but im stuck on at the end when you use burp but I dont see how to set it up how did you do that? I pasted the IP in the target but nothing is happening, what am i doing wrong?
@_CryptoCat
@_CryptoCat Год назад
@@Death_User666 Hey, you could checkout this intro to burp video: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-24dUQ1LvopE.html 😉
@whilykitt
@whilykitt Год назад
TY dude! I was getting so frustrated at enumerating subdomains step.
@2WheeledNomad
@2WheeledNomad 9 месяцев назад
If I get nothing else out of your video (and I got a lot!) the tldr command is gonna help me immensely!!! I don't think I can fully understand just how helpful that is going to be!!!!!
@_CryptoCat
@_CryptoCat 9 месяцев назад
It is a great tool! 🔥
@ihacktechtips4639
@ihacktechtips4639 Год назад
Hi @CryptoCat i am unable to find crystal webshell on kali and parror os can you help how to reverse shell to crack three tier 1 machine
@_CryptoCat
@_CryptoCat Год назад
I recommend using www.revshells.com but you could also setup an alias for the plzsh() shell I use here: github.com/Crypto-Cat/CTF/blob/main/my_bash_aliases.md
@Gazty
@Gazty 10 месяцев назад
If this is the Starting Point, I'm afraid to look at advanced machines hahahaha. Great video btw
@_CryptoCat
@_CryptoCat 10 месяцев назад
Hahaha I hear that a lot, and totally understand. You'll learn from the struggle though 😉
@FuelaG
@FuelaG Год назад
hi ! where did you download webshells from? i don't have webshells/shell.php on my machine the SecLists laudanum-0.8/php/shell.php don't work for me
@_CryptoCat
@_CryptoCat Год назад
I can't remember actually, maybe here: github.com/BlackArch/webshells - for the PHP one you can just add the following to a file with .php extension:
@chilltooki
@chilltooki Год назад
Glad I came across your channel. Highly appreciating your effort. Keep 'em comin' :) Btw, how do I find "word.txt" file?
@_CryptoCat
@_CryptoCat Год назад
Thank you mate! 💜
@drenleicht6568
@drenleicht6568 2 года назад
why don't any of these walkthroughs follow the walkthrough designed by HTB??
@_CryptoCat
@_CryptoCat 2 года назад
My process for making these videos is generally: 1) solve the machine 2) review the PDF walkthrough 3) make a video When I make the video, I show how I solved it so it might not always be the same as the official walkthrough but I might mention some things I read in the HTB walkthrough if beneficial (and I remember). I always advise to flick through the HTB writeup after solving though 😊
@drenleicht6568
@drenleicht6568 2 года назад
@@_CryptoCat that's fine, but for someone entering into the field, I'm sure someone spent a long time writing the walk through to explain in detail the steps to follow, more for the reader to understand the concepts explained, I understand there are many ways to achieve the same result, but as an introduction it would be wise to follow the script so to speak. Thank you for your reply also, it is wonderful to see someone engaging with their audience, keep up the great work 🙏
@kavishkagihan9495
@kavishkagihan9495 2 года назад
Feels pretty good to be able to contribute to hackthebox academy as well!
@_CryptoCat
@_CryptoCat 2 года назад
You're unstoppable bro! Which academy modules did you make?
@kavishkagihan9495
@kavishkagihan9495 2 года назад
@@_CryptoCat I was the one who made this starting point box😅I wanted to make a module too, but HTB staff insisted its for staff members only.
@_CryptoCat
@_CryptoCat 2 года назад
@@kavishkagihan9495 Oh that's awesome, nice work! HTB should bring you on as permanent employee (if they haven't already) 😎
@kavishkagihan9495
@kavishkagihan9495 2 года назад
​@@_CryptoCat I am planning on working for them once I turn 18. No worries, just one more year! :) Hope they would hire me 😅
@_CryptoCat
@_CryptoCat 2 года назад
@@kavishkagihan9495 I'm sure they would bro you're killing it. I knew *nothing* when I was 17 😂
@fanland332
@fanland332 2 года назад
Thank you ❤️🌹 for this
@_CryptoCat
@_CryptoCat 2 года назад
💜
@Sun_Q
@Sun_Q Год назад
Hello, can you share the subdomain dictionary shown in the video? I can’t find kali, the online dictionaries are very complicated😊
@_CryptoCat
@_CryptoCat Год назад
It's probably in seclists, you can install with apt-get or clone the git repo: github.com/danielmiessler/SecLists
@revivedXrevolver
@revivedXrevolver 2 года назад
I've been working on this machine since it released and havent been able to figure out what was wrong, so thank you so much for your hard work and videos because I was losing my mind
@aliedora
@aliedora 2 года назад
Hi, every starting point machine has a Walkthrough with steps and some info on the topic, You can find it just under the machine name, there is a green icon with download sign :) It will open in a new browser tab. I didn't notice it at first..If I get stuck for few hours, I check that step in there. Hope that helps
@_CryptoCat
@_CryptoCat 2 года назад
Thanks mate! Glad it helped 🥰 Good shout from Allie on the PDF walkthrough though, they explain things very well. I generally solve the box then flick through the walkthrough before making the video in case there's any extra info. Although I often forget to mention things when the time comes 😆
@revivedXrevolver
@revivedXrevolver 2 года назад
@@aliedora I was stuck enumerating the subdomain and was following every step on the walkthrough, yet was still unsuccessful with gobuster for some reason. Looks like /DNS needs to be in the thread in order for it to work for me
@aliedora
@aliedora 2 года назад
@@revivedXrevolver aah ok apologies then :) I also had an issue with subdomains..Used ffuf and amass at first, nothing came up and then gobuster worked ok for me even though I used the same wordlist. Once I had a problem with SSTI machine and the next day when I created a fresh one and tried again, everything was fine.
@nazeefkhan517
@nazeefkhan517 2 года назад
reading package lists... Done Building dependency tree... Done Reading state information... Done E: Unable to locate package subl Everytime I try running the subl command on my kali I get this error> Can you help me resolve this please?
@_CryptoCat
@_CryptoCat 2 года назад
the command you want is "sudo apt-get install sublime-text" for future reference, if you type "sudo apt-get install subl" and then hit the tab key, it will bring up a list of the available packages that begin with "subl" 😉
@johnmellows3914
@johnmellows3914 Год назад
appreciate this video so much. I had a really difficult time with this one
@_CryptoCat
@_CryptoCat Год назад
Very welcome mate, glad it helped! 🥰
@andreaskavellaris7607
@andreaskavellaris7607 2 года назад
What is the navigations shortcuts used at 2:30. really helpfull to see in the dir and dont have to write the whole dir again.
@_CryptoCat
@_CryptoCat 2 года назад
if you just hit the TAB key it should autocomplete 😉
@xxcristianxx07
@xxcristianxx07 2 года назад
omg dudeee u are so awesome
@_CryptoCat
@_CryptoCat 2 года назад
aww ty 🙏🥰
@royalpotato4733
@royalpotato4733 Год назад
hello, I am having trouble after uploading the shell.php on s3 bucket. ls command is showing that bucket been uploaded but its not showing any output on cmd = ls , even repeater is not showing any output
@_CryptoCat
@_CryptoCat Год назад
Hmmmm are you using the shell.php (or one confirmed as working)? Have you checked for URL encoding issues? Does the official PDF walkthrough do something different you can try?
@royalpotato4733
@royalpotato4733 Год назад
@@_CryptoCat omgg u replied .... > Yes it worked ...I tried everything from scratch 2 days ago from a calm mind...didn't know why it didn't work out last time > Second,if I can get your advice on this, I have been doing HTB, THM, pentesterLab since last 3-4 months ....reached almost script kiddie rank in HTB ....it's not much I know....There are a lot of inconsistencies in my knowledge.... But I want to... prepare for HTB CPTS cert....it's cheaper than comptia.....forges one for OSCP.. ..read reviews and all.... But time is of premium to me .....Is next 3-4 months enough time to prepare for it....or will it take atleast 6 months or so...I am ready to give atleast 2 hours for it... everyday Or is it hopeless and I should go for relatively easier ones
@TheBG077
@TheBG077 Год назад
Great video!! This is the second or third time now that I just cannot get a reverse shell to work for me. I triple-checked that everything was done correctly from the walkthrough, but it just wont work for me....and it's really frustrating ;-(
@_CryptoCat
@_CryptoCat Год назад
Thanks mate! You got it working in the end, right?
@Smola0FF
@Smola0FF 10 месяцев назад
@@_CryptoCat yeah i had same problem. and this method is so much easier to understand for newcommer to this
@Sodatex
@Sodatex Год назад
Thank you for your videos bud, much appreciated
@_CryptoCat
@_CryptoCat Год назад
Thanks mate 💜
@e1k138
@e1k138 Год назад
Where did you find all your web shell ? This is pretty useful !
@_CryptoCat
@_CryptoCat Год назад
The shell.php? It's a pretty classic one. Very short way to gain code execution with PHP 🙂
@nikto4475
@nikto4475 2 года назад
Hey, do you recommend HTB academy?
@_CryptoCat
@_CryptoCat 2 года назад
I did some free academy modules ages ago and thought they were good. I'd love to do more but they get quite expensive 😆 Although I'm sure the quality is great, the same info will be available free elsewhere (just maybe not presented as well). As far as paid content goes, I think HTB is generally good quality.
@nikto4475
@nikto4475 2 года назад
@@_CryptoCat thanks :)
@Starmanfansunofficial
@Starmanfansunofficial 2 года назад
❤❤❤❤
@_CryptoCat
@_CryptoCat 2 года назад
💜
@kostasatha9056
@kostasatha9056 Год назад
how someone begins to learn all of this stuff
@_CryptoCat
@_CryptoCat Год назад
HTB starting point is a good place to start xD This box is definitely challenging for beginners though, here's some of my other favourite resources for learning: github.com/Crypto-Cat/CTF#hacking-resources
@doinkydeano2226
@doinkydeano2226 Год назад
you go so fast...its a little difficult to keepup
@_CryptoCat
@_CryptoCat Год назад
It's hard to find the right balance, everyone has a different level of experience/knowledge so videos will always be too fast for some and too slow for others 😁 I've had many people comment the opposite, and say they watch the videos on 1.5-2x speed 😅
@afnercruz181
@afnercruz181 Год назад
I'm having problems when do the gobuster vhost scan it does not shows the subdomain
@afnercruz181
@afnercruz181 Год назад
@@Slexuuu I also had verify the word list that contains the S3
@_CryptoCat
@_CryptoCat Год назад
You could try ffuf again, I think where I went wrong in the video was @ 3:50 I filtered the responses by size and in this case they were all the same. I should of filtered by response code, as you can see at 6:45 the "s3" vhost came back with a 404, while all the others were 200.
@Z0nd4
@Z0nd4 Год назад
Thanks man!
@xhector2181
@xhector2181 2 года назад
thanks!
@_CryptoCat
@_CryptoCat 2 года назад
🥰
@dgknakdgn
@dgknakdgn 2 года назад
Bro how can i install gobusterz when i am searching on google shows me gobuster..
@_CryptoCat
@_CryptoCat 2 года назад
Ah this is a bash alias (shortcut command). You can add this line to your ~/.bash_aliases file: alias gobusterz='gobuster dir -w /usr/share/dirbuster/wordlists/directory-list-lowercase-2.3-medium.txt -u $1'
@dgknakdgn
@dgknakdgn 2 года назад
@@_CryptoCat thank you bro
@jagj0
@jagj0 Год назад
@@_CryptoCat just a suggestion: as much a possible don't use aliases during videos, as most of the viewers for these starting point boxes are beginners so they do not understand the concept of aliases. Other than that keep up the good work, I'm watching all your videos one by one on my HTB journey. Thanks for the free content!
@0xPr3d4T0r
@0xPr3d4T0r Год назад
why did ffuf not work? can someone explain?
@_CryptoCat
@_CryptoCat Год назад
I think where I went wrong in the video was @ 3:50 I filtered the responses by size and in this case they were all the same. I should of filtered by response code, as you can see at 6:45 the "s3" vhost came back with a 404, while all the others were 200.
@0xPr3d4T0r
@0xPr3d4T0r Год назад
@@_CryptoCat true. thanks for the reply
@lyubenpetrov6430
@lyubenpetrov6430 Год назад
I tried the exact same command in gobuster and even tried using the longer list (11000) but it still did not find the s3 domain. I am sure since I saved the output in a file and then searched the file. What I did find is that all requests came back with status 400. Is it possible that gobuster defaults to only this status somehow? And why would that happen to me and not to you if we use the same program and command? Or maybe I went wrong somewhere else? Any ideas would be greatly appreciated.
@_CryptoCat
@_CryptoCat Год назад
A few people have mentioned similar issues, I'm not too sure the reason 🤔 I just booted the machine again and tried to run: "gobuster vhost -u thetoppers.htb -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-20000.txt" and it does correctly show "s3.thetoppers.htb". I wonder if there is some discrepency with the gobuster version.. If I type "gobuster version", it shows me "3.1.0". Is yours the same?
@lyubenpetrov6430
@lyubenpetrov6430 Год назад
@@_CryptoCat Mine is 3.2.0-dev.. I saw your pinned comment - I will try that again and hopefully it works. Thanks for the help! In the meantime, I decided to go ahead and just continue further with the machine. Then I ran into another problem. I am quite new to this so sorry if this is a dumb question. For some reason, I cannot get the shell to work. I created a .php file exactly like yours (when you did "cat ../webshells/shell.php"). It seems not to work. I get blank pages when I go to thetoppers.htb/shell.php?cmd=ls. I tried some other shells (that I found with "locate shell") but they require tuning (like setting the port and IP) and also require me to tune my kali VM accordingly. This is more complicated but I will try to figure it out. However, in case you have any idea why it doesn't work when I try the same shell code as you, I will be very thankful. By the way, great content :)
@_CryptoCat
@_CryptoCat Год назад
@@lyubenpetrov6430 Did you work it out? revshells.com is quite a handy tool for reverse shells as well. Just enter your VPN IP, a port (e.g. 1337) and select the language (PHP). To wait for the reverse shell, you can setup a listenin in kali like "nc -nlvp 1337". good luck! 🙂
@nikolanojic6861
@nikolanojic6861 7 месяцев назад
Mine is 3.6 and i ahave the same problem as the other guy , cant figure it out already tried 2 different progeams to find the subodmain and i also have some bugs on them as well im going crazy@@_CryptoCat
@vedhanarayananv9695
@vedhanarayananv9695 2 года назад
can you explain why ffuf failed but gobuster did the job ? i am not able to follow up on this.
@_CryptoCat
@_CryptoCat 2 года назад
Good question! Looking back I see the reason. Notice at 3:50 I filtered the responses by size and in this case they were all the same. I should of filtered by response code, as you can see at 6:45 the "s3" vhost came back with a 404, while all the others were 200. We can filter responses with web fuzzers is by size, response code or regex so it's worth checking all "three" 😁
@vedhanarayananv9695
@vedhanarayananv9695 2 года назад
@@_CryptoCat Thanks for the explanation.
@erickpries
@erickpries Год назад
Really nice tutorial showing your thoughts on the go! One question though, where did you get the crystal/webshells repository from? Would love to add that to my tools.
@_CryptoCat
@_CryptoCat Год назад
I think I just made a shortcut (symlink) to "/usr/share/webshells/" which is probably installed on your kali/parrot OS by default. You can try "locate webshells" command to check the location 😉
@HuyenNguyen-nn2bh
@HuyenNguyen-nn2bh 11 месяцев назад
@@_CryptoCat hi can i ask why i can't find the "/usr/share/webshells/shell.php" file ? I tried with reverse_shell.php but it didn't work tho
@_CryptoCat
@_CryptoCat 11 месяцев назад
@@HuyenNguyen-nn2bh Hmmm you could just create a shell.php file, the contents are:
@elkiparionarojas9206
@elkiparionarojas9206 Год назад
muchas gracias
@_CryptoCat
@_CryptoCat Год назад
de nada
@theokkali467
@theokkali467 2 года назад
This what furries be in 2056
@_CryptoCat
@_CryptoCat 2 года назад
Haha what does this mean?? I'm intigued!
@PraiseTheLordJesusChristTruth
@PraiseTheLordJesusChristTruth 2 года назад
I've uploaded shell.php and after that when I'm opening it in browser it is showing open close curly braces like this {}
@_CryptoCat
@_CryptoCat 2 года назад
Huh 🤔 I'm not too sure what that's about.. Double check the steps in the video; are you using the same shell? same GET param (cmd)? Let me know if you work out the problem!
@PraiseTheLordJesusChristTruth
@PraiseTheLordJesusChristTruth 2 года назад
@@_CryptoCat solved... because i was using s3 so i removed that ..now everything is working perfect.. Btw thanks
@jesuscordoba9426
@jesuscordoba9426 2 года назад
@@PraiseTheLordJesusChristTruth Hello! I have the same problem you had but I don´t get the solution. Where did you remove that s3 ? thx a lot !
@PraiseTheLordJesusChristTruth
@PraiseTheLordJesusChristTruth 2 года назад
@@jesuscordoba9426 bro it's easy..just remove S3 from link
@ovejanegra6351
@ovejanegra6351 Год назад
I put what you do but it doesn't come out because ffuf -c -w /urs/share/seclists/
@_CryptoCat
@_CryptoCat Год назад
you can use "sudo apt-get install seclists" or install manually from the github: github.com/danielmiessler/SecLists
@rylethirikali8903
@rylethirikali8903 Год назад
i cant find the /usr/share/seclists/discovery
@_CryptoCat
@_CryptoCat Год назад
You should be able to install it with "sudo apt-get install seclists" or you can download here: github.com/danielmiessler/SecLists
@dhruvkothari7530
@dhruvkothari7530 Год назад
i konw gobuster but what is gobusterz ? i can't find that tool tho!
@_CryptoCat
@_CryptoCat Год назад
"gobusterz" is just a bash alias (shortcut) I have setup, you can find it here along with the many others I commonly use: github.com/Crypto-Cat/CTF/blob/main/my_bash_aliases.md Alternatively, you can accomplish the same with "gobuster dir -w /usr/share/dirbuster/wordlists/directory-list-lowercase-2.3-medium.txt -u"
@dhruvkothari7530
@dhruvkothari7530 Год назад
@@_CryptoCat oohk gotcha thanks !! Btw you are active in social media?
@_CryptoCat
@_CryptoCat Год назад
@@dhruvkothari7530 Yes mate! Check the description I have some links for Twitter, Reddit, LinkedIn etc 🙂
@KAV930
@KAV930 Год назад
I'm having problem with he shell part I created the shell uploaded it and checked using ls and I can see my shell uploaded but when I tried to navigate to s3.thetoppers.htb/shell.php it shows {} and when I try to execute cmd=ls or cmd=id I still get {} and nothing else please help me on this
@_CryptoCat
@_CryptoCat Год назад
Hmmm are you using the same shell.php? I would try a couple of things; see if you get the same result using a different tool, e.g. curl. Also, try a different PHP shell. If that fails, check the official PDF walkthrough and see if they did it differently 😊
@pythonxsecurity8287
@pythonxsecurity8287 2 года назад
can you do write up's about ctf.cor.team ?
@_CryptoCat
@_CryptoCat 2 года назад
aghh i wish i could, the challenge quality is probably good. I doubt I'll have time to play though let alone record 😞
@pythonxsecurity8287
@pythonxsecurity8287 2 года назад
@@_CryptoCat yeah if you do it i will learn a loot because the content for it is hard
@aneesaliyar6751
@aneesaliyar6751 Год назад
My gobuster didn't gave me the 's3.thetoppers.htb' in results. Care to explain why..?
@MarcA75
@MarcA75 Год назад
I'm having the same issue found through another comment that it may have to do with the gobuster version 3.2.0 but i didn't found a way yet to downgrade it to 3.1.0
@_CryptoCat
@_CryptoCat Год назад
Ahhh thanks, I've been getting quite a few questions about this. I tested again a few days ago and it worked OK for me on 3.1.0. I wonder what the change is 🤔 edit: OK, I found it - github.com/OJ/gobuster/commit/03e7a4557c53764f411074dde74757adcc074def The solution in 3.2.0 is to use the --append-domain flag with gobuster which will "Append main domain from URL to words from wordlist. Otherwise the fully qualified domains need to be specified in the wordlist."
@MarcA75
@MarcA75 Год назад
@@_CryptoCat Just wanted to write exactly this as i found the same solution about an hour ago. Thankfully now people don't need to go insane like me before finding this out xD.
@patrikhruby1697
@patrikhruby1697 Год назад
Hello, i can confirm, that i had a same problem with gobuster version 3.4. When i downgraded it to version 3.1.0 it works fine :).
Далее
ДЕНЬ УЧИТЕЛЯ В ШКОЛЕ
01:00
Просмотров 1,9 млн
HackTheBox Walkthrough // Three
37:08
Просмотров 29 тыс.