Тёмный

TryHackMe! PickleRick - BYPASSING Denylists 

John Hammond
Подписаться 1,9 млн
Просмотров 301 тыс.
50% 1

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnh...
GitHub: github.com/Joh...
Site: www.johnhammond...
Twitter: / _johnhammond

Опубликовано:

 

29 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 332   
@KoalaPlaying
@KoalaPlaying 4 года назад
I wish to understand what is happening on my screen right now, but I love watching stuff like this
@Jib420
@Jib420 4 года назад
i dont know why im watching this... i just am
@tanyayadav15
@tanyayadav15 4 года назад
Same ..
@Nossody
@Nossody 4 года назад
Lookup Red Hat courses if you want to learn linux :)
@senseifr0st819
@senseifr0st819 4 года назад
@@Nossody or just use linux and consume someones legg because that also helps
@panicswitch1271
@panicswitch1271 4 года назад
@@Jib420Half way through the video I asked myself, "how the hell did I get here?"
@davidthedreamer0
@davidthedreamer0 4 года назад
Me: Omg, Jon! How many command lines do you know??? Jon: Yes.
@sindrejensen665
@sindrejensen665 4 года назад
John
@vaishnav3735
@vaishnav3735 Год назад
@@sindrejensen665 cena
@pleonexia4772
@pleonexia4772 Год назад
That question doesn't even make sense
@IllusionAI
@IllusionAI Год назад
The amount of knowledge this guy possesses is just crazy
@promerker1892
@promerker1892 6 месяцев назад
Strings will read the files too
@androidenthusiast2806
@androidenthusiast2806 2 года назад
you ran stabilize_shell on your local machine then you got stabilize shell access on the remote machine? there's a step missing here.
@ReySoMLB
@ReySoMLB Год назад
John, I know you're a professional and im still a beginner .. but this was the first 'CTF' that i faced in THM and its labeled as easy. This was impressive but watching you fly through this was very discouraging lol. I've gone through the rooms up to this point in the "complete beginner" path, ive taken notes, studied, and re-read rooms... and i got to this and my brain just fried watching you do this. I couldn't follow what you were doing, you were running so many cmd pages and dropping commands left and right, it was hard to keep up. This is 100% educational and inspiring at least, but holy Christ. I'm subbing now... lol
@kutloano.mp4
@kutloano.mp4 8 месяцев назад
I will come back to this video in the future and I vow to be able to understand this video
@laronthomas2006
@laronthomas2006 7 месяцев назад
I just got lost. I was doing well with easy rooms but now im initimidated
@Alberto-ww7vb
@Alberto-ww7vb 6 месяцев назад
I'm pretty sure he mention that he did the room previously to making the video, but still It wouldn't surprise me if he flew through it. I just did the ctf after around 3 months of learning in the junior pentest path and got stuck in various places running around in circles hahaha. Still I think is a great way to learn to watch someone so experienced to things because we can learn so fu...ng much. Good luck on your learning journey
@onex_vu
@onex_vu 4 месяца назад
yeh fr, I got lost when I see him doing things. I have learnt so many things like u but it's still not enough
@dreamkiller2693
@dreamkiller2693 3 месяца назад
​@@kutloano.mp4 come back 😂
@jalajkumar9955
@jalajkumar9955 4 года назад
Hey John! Please create more THM videos, as they are very good for understanding new concepts and ways to exploit a box. Thank You !
@jamaledineamarir6724
@jamaledineamarir6724 3 года назад
netcat is actually in there. You can redirect the STDERR output to STDOUT (as no result were shown in the portal.php page). Here's the command for that 10:50 : $ nc --version 2>&1 $ nc -h 2>&1 $ man nc That way, any error (stderr) will be prompted in the web page (stdout), instead of staying blank ^^. $ nc --version doesn't exist
@bcordone
@bcordone 5 месяцев назад
Yep. I found out netcat was on there via man nc, and then I used msfvenom to get the reverse shell. The part that had me stumped was how to get ROOT, ironically. "sudo -s" gave me some sort of error (forgot what it was exactly), su root prompted me for a password I couldn't figure out (I don't think ROOT even has a password in this one. I wonder if it works if you just hit enter without typing anything in) so I never would have thought of trying "sudo su root" which worked without asking for a password. When I saw "you can run all, nopasswd" I thought it meant you could run all commands that don't require a password (i.e. guest access) so I spent a while trying to dig around to see if there was some sort of local privilege escalation exploit but gave up and was asking for help on the discord, then I frustratedly tried sudo cat /etc/shadow after someone pointed out "Doesn't one thing stick out?" and it worked, then I tried sudo su root and got root.
@jacquescilliers4511
@jacquescilliers4511 2 года назад
To be honest as an absolute beginner in the cyber security space, watching videos like this makes me doubt myself, but excites and scares me all the same time
@angeatgr
@angeatgr 2 года назад
Its like learning to code, I remember feeling like shit when learning OOP, today is a second nature and so is ethical hacking, there is a lot to learn, networking, pentesting tool, a bit of programming, linux, windows etc.. but you will get there ! It takes time, lot of it and more with practice
@blazingfalcon7387
@blazingfalcon7387 2 года назад
I feel the same way lol
@iCyberVenom
@iCyberVenom Год назад
Well he's absolutely ripping through the challenge at one million miles per hour, so....don't feel bad. He clearly posted this video to showcase his skills and speed, not to teach others. He couldn't possibly type, switch screens/apps, speak any faster than the pace he's moving in this video. Change the playback speed to 1/4 speed and you'll still see he's moving quickly.
@john_wick_catcher26
@john_wick_catcher26 Год назад
how is it going after 9 months ?
@IGORDYES
@IGORDYES Год назад
@@iCyberVenomhe clearly stated he spent a while in this before recording. The video is nearly 20 minutes and the box is just about as easy and beginner friendly as they come. He was not trying to show off his skill. It’s clear you need to practice alot. Good luck and cheer up.
@dopy8418
@dopy8418 4 года назад
Hey i've see that thumbnail somewhere...
@xorinzor
@xorinzor 4 года назад
7:30 searching for incredibly difficult workarounds, while all he had to do was just add the filename to the base URL since they're located in the webroot, lol.
@imTyp0_
@imTyp0_ 2 года назад
Commands: less and tac work to read the files. Also everything was doable from the website, aka without a shell
@iCyberVenom
@iCyberVenom Год назад
I remember thinking, "It's impressive he knows multiple paths to get where he wants to go, but there's no way this is the easiest path"
@RossMitchell
@RossMitchell 3 года назад
John - absolutely loving the videos dude. I'm an absolute level 0 n00b so some of this was over my head, but trying my best to work hard and grasp the basics! Appreciate the effort you put into your videos and the time you spend to explain things, you're a top dude. Peace!
@Victor-vc9br
@Victor-vc9br 4 года назад
I’m suprised you used such a complictaed solution to the cat command. I just used less lol
@Helena-xb8io
@Helena-xb8io 4 года назад
Suffering from knowing too much
@cortex-technologies
@cortex-technologies 4 года назад
just typed the file name on the browser url bar -.-
@ItzPrayy
@ItzPrayy 3 года назад
I did too lmao, less -FX
@angel-sc3ms
@angel-sc3ms 3 года назад
@@cortex-technologies same
@TalsonHacks
@TalsonHacks 3 года назад
@@Helena-xb8io suffering from success
@justangryvideos47
@justangryvideos47 3 года назад
This is not even close to how I did this ctf. But thats the cool part, there are so many ways to tackle the same room
@4ag2
@4ag2 4 года назад
Big fan ! I do learn a lot from you, I'll make sure to support whenever I'll be able to do that. GREAT JOB
@CleanCivilian
@CleanCivilian 2 года назад
I really wanted to do this room without help, but man... there is just some things i do not know and the 'basic' room did not teach! Thanks for the walkthrough, took notes while following along and trying to figure out as you gave info.
@sfxElrick
@sfxElrick 4 года назад
@John Hammond you can also use wildcards to evade that type of blacklist: /bin/ca? *.txt will work
@nicolaslaborie5015
@nicolaslaborie5015 4 года назад
for the cat "file" that didn't work, less did :) Very nice walkthrough. It was a fun box :)
@CybrJames
@CybrJames 4 года назад
Damn, you make it look so easy. Hard to follow as a beginner, as I don't always understand. But I will get there. NICE
@Divox_O
@Divox_O 5 месяцев назад
My machine failed to form a reverse shell using your code from github and the online reverse shell generator. What could actually be the problem?
@Justhangnround
@Justhangnround 8 месяцев назад
Dude, how did you learn all this?
@cortex-technologies
@cortex-technologies 4 года назад
I used python3 -c "f=open('clue.txt','r'); print(f.read())" . But I could've browsed the files using the URL bar LOL -_-
@Laflamablanca969
@Laflamablanca969 4 года назад
What a great series. Please keep doing these! :)
@patrickavognon2850
@patrickavognon2850 6 месяцев назад
Thanks John, this is video is very helpful
@DoorThief
@DoorThief 4 года назад
A web server that executes arbitrary commands, with a couple command blacklists? Man. They should have used a restricted shell for those results.
@nilanjanpaul5723
@nilanjanpaul5723 2 года назад
At 7:15 instead of the script (I liked that as I alway wanted to learn more of bash) you could have used 'tac' command in Linux which is opposite of 'cat' as it starts printing from bottom towards the top.
@lance_lot2866
@lance_lot2866 3 года назад
Hello, when I walked through this room, I googled commands to output the file contents and one of them was "nl". It is not forbidden and is on the system. And file "second ingredients" I read with the command: "nl /home/rick/second\ ingredients". It's great that you can go through it in different ways.
@masterbloon9812
@masterbloon9812 5 месяцев назад
Ahhhhhhhhhhhh thanks for the tipp with the reverse shell, i was really stuck at that point XD
@carnifex17
@carnifex17 2 года назад
To bypass blacklist in command panel we could just use "less" command
@fongjon
@fongjon 3 года назад
A question, at 13:45 ish when quake is used the commands in the script (stablize_shell.sh) are echoed on the other netcat shell, how is this happening? If I do the same on my system the script writes out the commands on the guake shell. What am I missing? Thanks to anyone who can help
@SeaDraGraphics
@SeaDraGraphics 4 года назад
man i would love to see another king of the hill livestream
@talio-5469
@talio-5469 4 года назад
Liked, already subscribed, and I'm typing things to then press enter.
@starcloister4651
@starcloister4651 2 года назад
I still haven't learned all the stuff he did in the last few minutes. I did the web app hacking path and it taught me a lot but I still feel like it didn't prepare me for this exercise.
@Steefie70
@Steefie70 3 года назад
Thank you, every day I learn something new, also thanks to you John, you are very fast, but there is no limit to repeat the video (haha). All the best from Rotterdam.
@capivaradeprograma
@capivaradeprograma Год назад
At first I was kind of afraid of not manage to complete this room. But watching your video makes me understand every concept tha I have been through in the path "Web fundamentals" and make this room way less scarier 🤣🤣🤣 Great video
@AhrenBaderJarvis
@AhrenBaderJarvis 4 года назад
Haha couldn't you also do: tac file.txt | tac? 😂
@Godmil
@Godmil 6 месяцев назад
Oh wow, that took me hours 😆 I'm going to write down everything you did here because that was just beautiful seeing how efficiently you got through it.
@kyiwong3804
@kyiwong3804 2 месяца назад
I learn a lot from this video. Thanks.
@SDavies2010
@SDavies2010 3 года назад
Oh man as a noob, I tired to follow getting the stable shell and can't get it to work.. Went to the poor mans pentest video and still didn't know what was going on 😂
@benforbes5974
@benforbes5974 4 года назад
Anyone else brain kinda explode but they still watched the whole video??
@FantasM
@FantasM 4 года назад
where is archlinux ? xD
@rafaeldacosta8581
@rafaeldacosta8581 3 года назад
7:22 i felt so dumb seeing you have a lil harsh on reavealing txt info when i just entered the full URL with the filename...I felt dumb, because a not even closer being at the same level as you, but i'm working on and i have to start from somewhere right?
@yankeesouth
@yankeesouth 3 года назад
Your content has helped me learn so many things. My brain has one wrinkle in it now. Thank you
@nirmitshah7660
@nirmitshah7660 4 года назад
Nice stabilize shell script ,can you make one to automatically like your video😁❤️🤣
@charlesrainesmusic4783
@charlesrainesmusic4783 Год назад
Slow down, man. Nobody’s gonna take it from ya 😂 we tryna learn
@Ryan-zp5es
@Ryan-zp5es 10 месяцев назад
I agree. Gotta keep pausing and rewinding to keep up.
@asher.lift42
@asher.lift42 Год назад
Great video! By the way you can solve the entire thing from the website command panel (without any reverse shell)
@iCyberVenom
@iCyberVenom Год назад
You're moving ENTIRELY TOO FAST for anyone to understand what you're saying...I mean MACH 100
@sql64
@sql64 4 года назад
Can i use this to bypass bans on minecraft?
@Nixamina
@Nixamina 4 года назад
I didn't understand anything but i still watched the whole video.
@Melvin420x12
@Melvin420x12 4 года назад
It’s worthy to do the basic rooms in TryHackMe. OpenVPN, Linux Basics and Vulnversity. Just those three are enough to understand everything. Personal experience haha
@TheArtyBartfast
@TheArtyBartfast 2 года назад
I didn't Know John won a Superbowl! Or is that a graduation ring? Either way, I didn't realize that people actually wore those. I thought they were like WWE belts or LARP swords.
@samyeah5105
@samyeah5105 2 года назад
It makes me so angry, when you go from basic stuff, to jumping around like a mad man with scripts that you quickly jump over... like how do I stabilize my shell... typing what you have didn't work.
@justkiddieng6317
@justkiddieng6317 Год назад
Because the cat command is blocked, I search what is alternative for that command and you can try "tac" which is the reverse of cat. LOL, 3 hours for solving that dude Im totally beginner, I dont use any tool except for burp suite. LOL 3 hours edit: I forgot that the current user is root and I cant tac it because it require sudo permission which It took a lot of time so before doing this CTF, next time I will make sure I know a lot of commands, files, directories and permissions on the OS running on that vulnerable machines. LOL
@resenddelete6820
@resenddelete6820 2 года назад
UGHHH hackers and the thinking they are ALL POWERFUL... um you need the "internet" too hack something.
@alsongadizo1692
@alsongadizo1692 Год назад
Great video you kind of lost me when it came to python3 and using reverse shell engineering...but thanks..Could you please do a video on reverse shells...much appreciated
@filipagoston6434
@filipagoston6434 8 месяцев назад
Try Hack Me offered this practice based on my experience. I have no clue what you are talking about man. I am going back to study.
@stivunnikolov5941
@stivunnikolov5941 3 года назад
Dudes can someone help me. I'm total noob in this field but this is dream of mine to get into this kind of things. Can you tell me where to star please? For about now I only have some advanced knowledge of Python... Sorry for my broken English
@giovanniromio2767
@giovanniromio2767 4 года назад
Loved the recap at the end. Also perfect editing of the video.
@Colaholiker
@Colaholiker 2 года назад
Once I was logged into the portal, it didn't even occur to me to cat the files I have seen after running ls. After all, they are in the web root directory, so why not just type the file name into my browser's address bar and get them delivered there, without having to worry about the blacklisted cat command. ;-)
@chrisshevlin7771
@chrisshevlin7771 Год назад
I've been trying for ages to use gtfo bins for privilege escalation in the command line, I'm assuming now having watched this video that it won't work and I'm looking in the wrong place and only a reverse shell is the answer?
@Ryan-zp5es
@Ryan-zp5es 10 месяцев назад
Me: This should be easy. Me: Types first command. Doesn't work. 😂
@mystiquegirl2023
@mystiquegirl2023 4 года назад
Hopefully one day I fully understand and reach to your level. Do you have any advise on certification/course(s) that could assist me?
@manoharbaratam8792
@manoharbaratam8792 4 года назад
learn linux, kali linux. Netcat, revershell, python.
@WadiaSoft
@WadiaSoft 5 месяцев назад
You probably already realized this - "less" was not on the commands blacklist. 9:23
@borisg6384
@borisg6384 2 года назад
God this was pissing me off so much, WHY didnt my gobuster using the same lists find anything useful.... turns out you need to add the damn extensions to the enum. f me...
@vamsikolati
@vamsikolati 4 года назад
I tried python didn't work so I tried Perl and it worked 😂
@Thecotilking
@Thecotilking 2 года назад
Can you point me to a separate video to understand getting the stabilize shell setup, linepeas tried to follow up but too fast. You are a king of CTF
@ninoskaramosmiguel9704
@ninoskaramosmiguel9704 Год назад
The question that I would like someone to answer me is… how can I profit from being an expert in this field??
@recon0x7f16
@recon0x7f16 10 месяцев назад
This was hard for me any perquisites to this ctf i don’t understand all those commands I have Linux essentials
@danielclv97
@danielclv97 6 месяцев назад
the 2nd command I used after the cat failed was less, and it just worked! haha, weird they blocked head but not less
@shibaaaaaaaa7993
@shibaaaaaaaa7993 Год назад
To obtain the clues and the supersecretingred text file i literally hosted a python3 server and transferred the files to myself lol
@lame7904
@lame7904 3 года назад
How by running stabilise shell on other terminal he got all the commands executed on reverse shell ??? Can someone help me with that
@SuperMau5head
@SuperMau5head Месяц назад
I dont understand why we have to do lot of things we have never learn before this room...
@justkiddieng6317
@justkiddieng6317 Год назад
WOW, the experience of exploiting a system make it easier. LOL, WOW!
@f-104starfighter7
@f-104starfighter7 4 года назад
Who tf stacks Pringle’s what the hell
@HackSyndicate
@HackSyndicate Год назад
less works better than cat for me, in most situations. Great video, thank you!
@theITGuy-no3nt
@theITGuy-no3nt 3 года назад
🎥🎬🍿 Its like SecDork movie night! 🍿🎬🎥
@FossiFoo
@FossiFoo 3 года назад
echo “comment“ > /dev/yt/johnhammond/piclerick/comments
@melantheoszimurri9981
@melantheoszimurri9981 7 месяцев назад
could you go just a little bit faster and explain just a little bit less please. it is on easy mode ffs
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
I know this one user to using coffee to print command echo details cainfojng
@donki123
@donki123 2 года назад
where's 'best osu skins from my skin folder v1' ??!?!?
@1joaods
@1joaods 4 года назад
i have no fucking idea of anything i´ve just watched lol. liked it
@wellox8856
@wellox8856 4 года назад
no idea what is going on but its entertaining somehow
@SilentContact
@SilentContact 10 месяцев назад
Sad thing about me is I know what is happening but cant do same :(
@BriariusTitan
@BriariusTitan Месяц назад
I want to know the name of the program that lets him split and edit his shell
@blazingfalcon7387
@blazingfalcon7387 2 года назад
Would burpsuit be useful here to crack the usernane password?
@sean_reyes
@sean_reyes 4 года назад
Loved it.. it inspires me do to some CTF.. question.. do you really recommend using linux OS for doing stuffs likes this? if so.. what distribution?
@keepercool98
@keepercool98 4 года назад
Kali
@VRWarehouse
@VRWarehouse 4 года назад
less file.txt (also this is a comment)
@lakshyasingh6841
@lakshyasingh6841 3 года назад
why didn't you just put those files in url they give files very easily
@Skaxarrat
@Skaxarrat 2 года назад
I managed to do everything but got stuck when I found the "base64" string. Took to much time to achieve nothing...and nothing it was! BTW, a little trick: cat was disabled...but not the less command ;)
@Cryptixpx
@Cryptixpx 2 года назад
you must be the guy who keeps booting me offline in rainbow six
@yoyo-gv8zs
@yoyo-gv8zs 2 года назад
Hey, why are you using ubuntu and not kali?
@danakane6772
@danakane6772 2 года назад
because he can 🤣. True that it's easier to just install kali that has all the tools preinstall but nothing say you HAVE to use Kali for cracking boxes as hobby. I personally use Arch and Ubuntu and Debian (but I might install Kali over my Ubuntu).
@yoyo-gv8zs
@yoyo-gv8zs 2 года назад
@@danakane6772 thx for the info. So it's just his preference
@garyruiz2491
@garyruiz2491 Год назад
Why do you store stuff in /dev/shm in all your videos?
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
How to give codo KLU here all apps open "python "
@s1ked_416
@s1ked_416 Год назад
hey how do you get your shell to give you some colors on the text whether it be directories or files and stuff? I saw when you were at "second ingredient" the text was in green, on my shell it didn't gve me that at all... is that dependent of the OS you use or something? if it wasn't for that I wouldn't have been able to figure out that you had to "cat *" the thing to get the 2nd one....
@4rikkkk
@4rikkkk 8 месяцев назад
I'm beginner and this is my 3rd machine, I completed it without running a reverse shell, but the fact is I tried to :') I will keep this way to run a revershe shell, thanks!
@travisthayer8563
@travisthayer8563 4 года назад
Hmmm, WSL doesn't seem to work properly when instantiating local servers using netcat, either that or my AV or Firewall is getting in the way. I have the latest build and according to Microsoft's docs it should work. Anyone have any ideas? Solution: needed to make connection via OpenVpn for both Windows and WSL
@edgarchan5251
@edgarchan5251 4 года назад
I appreciate you fully prepared before you start recording. but... its better to clear your browser caches on those text boxes, which shows your submission histories~
@haXez_org
@haXez_org 2 года назад
Cheers John
@josippavicic7665
@josippavicic7665 2 года назад
My netcat cant catch a ssh from lisening a port plz help
@sergiohernandez273
@sergiohernandez273 2 года назад
All this it's awesome, at the beginning, I didn't know how to upload rev' sh, but from now on I can see it's very easy. 'E= Congratulations!
@BrainFood155
@BrainFood155 3 года назад
Oh man, I tried `python` for a rev shell then I tried `nc` which terminates after the connection automatically. I gave up making a rev shell and just did everything via the cmd injection area. I used `xxd` to read files which wasn't the smartest choice now that I've seen this vid.
@cyberdevil657
@cyberdevil657 2 года назад
Holuy shit John you are a ninja at this! Ive seen the intervieuws with networkchuck & David Bombal. And what u do is amazing!
Далее
TryHackMe! Tartarus - Website Password Bruteforcing
31:59
TryHackMe! Skynet - Wildcard Injection
47:18
Просмотров 111 тыс.
Solving the Pickle Rick CTF
15:19
Просмотров 11 тыс.
Burpsuite Basics (FREE Community Edition)
28:01
Просмотров 496 тыс.
When you Accidentally Compromise every CPU on Earth
15:59
TryHackMe! Sudo - CVE-2019-14287
26:46
Просмотров 51 тыс.
Multiplayer Hacking?! -- King of the Hill by TryHackMe!
40:00
TryHackMe! Overpass - Authentication Bypass
35:18
Просмотров 138 тыс.
How the Best Hackers Learn Their Craft
42:46
Просмотров 2,6 млн