Тёмный
No video :(

TryHackMe - Corridor Walk Through 

shenetworks
Подписаться 18 тыс.
Просмотров 4,5 тыс.
50% 1

Опубликовано:

 

5 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 18   
@nature_nd
@nature_nd Год назад
Fun video! I really like how you showed where you learned and what you were thinking instead of pretending to be born perfect like most RU-vid videos! Also, I didn’t hear anything wrong the audio at all. 🤷‍♂️
@simonwatson5299
@simonwatson5299 Год назад
Hey Serena. Your mic volume was a bit quiet, but great video anyway. Yeah, do more CTF stuff, as I'm slowly learning stuff, lol. Have a great rest of the week, and stay beautiful. xx
@user-ic6nm1uu7v
@user-ic6nm1uu7v 11 месяцев назад
writing scripts and all is good for your practice ngl, but this is just a lengthy process, they already gave you a hint in description saying "IDOR" vulnerabilities. It simply means messing with URL, to short this, when you click on the door, they give you some md5 hash saying a number, for instance "c4ca4238a0b923820dcc509a6f75849b" decrypting this md5,we get "1" as an answer. Now ,as I have solved a lot of rooms, all I can say is that you have to think outside the box, Door starts with "1" ,so there is no "0" numbered door. As simple as that, simply go to web of md5 encryption, enter number "0" ,encrypt "0" number to md5 hash, copy that encrypted hash and paste it in the url after the ip, you will get you flag. Again, NO OFFENSE ,you did your hard work, and i appreciate it. Happy Hacking :)
@lterego
@lterego Год назад
You could do the whole fuzzing in the python script with http requests, as an alternative.
@farooqirshad4432
@farooqirshad4432 Год назад
Thank you😊
@tinyxtina_
@tinyxtina_ Год назад
love the content that you post girl
@fitnesstips7157
@fitnesstips7157 Год назад
good info
@ethanPi
@ethanPi Год назад
Nice! Cool video. Keep it up!
@ross.shevchuk
@ross.shevchuk Год назад
great video! keep going
@sirijanthakur
@sirijanthakur Год назад
you're really pretty great work !
@franklinstevens3540
@franklinstevens3540 Год назад
Solid. Nice video!
@Braddeman
@Braddeman Год назад
I want to see someone do hackthebox battlegrounds. Maybe you could do this in the future. You could do blue team since it seems that is where your experience is.
@waelmohameddd
@waelmohameddd Год назад
the vocal fry is distracting, but other than that , Great Video !
@matheusdossi8726
@matheusdossi8726 Год назад
+sub
@BooBoo314159
@BooBoo314159 Год назад
Turns out range starts by defaults at 0 in python (you can check by running list(range(10)) for example) So you had uncovered the door 0 with wfuzz. It's just that wfuzz seems to start it's numbering at 1. We can check that the first hash you get is indeed the hash of 0, for example by running in python, hashlib.md5(b"0").hexdigest(), which'll give you the first hash tried by wfuzz 😊
@shenetworks
@shenetworks Год назад
Omg 😳💀💀💀
@bradturner3990
@bradturner3990 Год назад
HEY SERENA HAVE YOU TRYED OUT BLACKBOX KALI BURP WORKS WELL ON M1 APPRECIATE THE YOUR CONTENT HAK ON
Далее
Lazy Admin Walkthrough - TryHackMe
24:00
Просмотров 10 тыс.
Can Hackers Track Your IP Address?
12:33
Просмотров 4,5 тыс.
Exploiting a File Upload Vulnerability - MetaCTF
8:16
Bounty Hacker Walkthrough -TryHackMe
16:39
Просмотров 7 тыс.
Asking ChatGPT About Hacking
19:24
Просмотров 4,4 тыс.
How I Became a Network Engineer at Cisco
6:13
Просмотров 55 тыс.
40 Windows Commands you NEED to know (in 10 Minutes)
10:54