honestly the reason your walk through work so well for me is because its like progressing through the room with a partner, i can start your guide, leave it running in the background and work through it while your working through it, and swap back and forth when i run into issues. Thanks again for your content. really good stuff.
i usually read the walkthroughs if i cant figure out something AND learn it cuz im not tryna just get up on try hack me im tryna learn this shit but after watching this video i understand ALOT more on reverse shells thank you fr fam
Brotha, finally a walk through that follows along with a style that's perfectly tailored to my learning curve. Thank you.. I subscribed and am looking forward to working on the rooms to come while utilizing your guides.. thanks again
clutch walkthrough just needed extra push past the whoami /priv part and was able to finish without watching the rest of vid, still did after i finished to see if you used alternate method, good work boss!
This video saved my ass man. I was overthinking why I kept getting 404 on the .exe pull from the windows box, and it didn't even occur to me that I was running the python http server from a different directory than the payload.
Just as a heads up, if you are using the AttackBox, or the THM Kali machine instead of your own, the in-browser view uses port 80. This means that at 6:08 you'll want to use another port (port 8000 is the default for python -m http.server), you'll just need to make sure you use the same port at 8:31.