THM Walkthrough: Silver Platter
8:03
14 сағат бұрын
HTB Starting Point: Meow
4:50
Күн бұрын
2025 Book Recomendations
12:03
Күн бұрын
HTB Walkthorugh: Greenhorn
10:44
THM Walkthrough: Lookup
18:24
Ай бұрын
THM CTF Walkthrough: Whiterose
13:17
Review: TryHackMe vs HackTheBox
23:51
CTF Guide:  File Upload RCE
7:23
2 ай бұрын
THM: Cheese CTF Walkthrough
13:44
3 ай бұрын
THM BreakMe Walkthrough
23:49
3 ай бұрын
CTF Guide: Web page crawling
6:20
CTF Guide - Fuzzing
11:14
4 ай бұрын
Black Hat Python - Chapter 5
10:34
CTF Guide - Nmap
15:57
4 ай бұрын
Book Review: Bug Bounty Bootcamp
7:42
Guide to CTFs - Intro to series
5:30
BHP - Black Hat Python Chapter 4
14:28
THM - nanocherryctf walkthrough
18:55
Пікірлер
@drycoal95
@drycoal95 2 күн бұрын
I know this video is a little old but I used the same reverse shell as you with the same listening command but when I run the new command nothing shows up on the port I am listening to. Can you help me please?
@gand0rfTRZ
@gand0rfTRZ Күн бұрын
Sorry for the late reply. I dont mind. Are you on discord?
@drycoal95
@drycoal95 Күн бұрын
@@gand0rfTRZ yes I am. Thanks for replying!
@gand0rfTRZ
@gand0rfTRZ Күн бұрын
sent you a message
@TylerRamsbey
@TylerRamsbey 5 күн бұрын
Great walkthrough! Appreciate you showcasing the room!
@Ninjabowtie
@Ninjabowtie 9 күн бұрын
Nice videos!
@Ninjabowtie
@Ninjabowtie 9 күн бұрын
nice video dude! keep it up
@TRD_Mike
@TRD_Mike 10 күн бұрын
Nice n easy intro room. I can't wait to be done with school so i can get back into the enjoyment of HTB and THM.
@gand0rfTRZ
@gand0rfTRZ 10 күн бұрын
I feel you. When I was going for my B.S., I did my best to find time for boxes and other stuff. Thankfully my job actually lets me slot time for school work and extra learning. That helped a lot.
@MRJAWADBINANCIAN
@MRJAWADBINANCIAN 10 күн бұрын
Thanks sir for honest review ❤❤❤
@piyush_more
@piyush_more 12 күн бұрын
script for sql injection is not working
@gand0rfTRZ
@gand0rfTRZ 11 күн бұрын
Sorry for getting back so late. Was busy. Try: ' || '1'='1';-- -
@TRD_Mike
@TRD_Mike 13 күн бұрын
Happy New Year! These look like some great books to add to my collection. I just got Black Hat Bash for Christmas I'm excited to dig into. -DW @ TRZ
@gand0rfTRZ
@gand0rfTRZ 12 күн бұрын
That is one I plan on getting next as well. Let me know what you think of it.
@saifmohammed9075
@saifmohammed9075 14 күн бұрын
thx man keep up the great work of your's
@russellcarter6451
@russellcarter6451 16 күн бұрын
some feedback fwiw I'm new to hacking, as I figure most people who would look up a walkthrough on an easy rated room would be. You start your video setting up variables and talking about scripts you've written as well as using an interface outside of the tryhackme website's default attackbox setup. That pretty much told me right off the bat, as a new user/hacker this isn't the video for me. I stopped watching after the first minute. being an easy room, the people who are looking up walk throughs are brand new. We are typing everything you type into our own instance of the room. We are learning by following..if that makes sense. You may be trying to cater to more advanced hackers who, for some reason, need a walkthrough of an easy room. If that's the case please disregard the above. I just wanted to leave some feedback in a helpful way.
@Jamaal_Ahmed
@Jamaal_Ahmed 20 күн бұрын
❤❤🎉 .
@bearkraus8530
@bearkraus8530 26 күн бұрын
thank you!
@TRD_Mike
@TRD_Mike Ай бұрын
Hey great to put a face to a name! Now your handle makes so much more sense. Great walkthrough.
@gand0rfTRZ
@gand0rfTRZ Ай бұрын
That gave me a good laugh!!
@treborsan5948
@treborsan5948 Ай бұрын
everything was clear on my end
@gand0rfTRZ
@gand0rfTRZ Ай бұрын
Glad to hear!
@treborsan5948
@treborsan5948 Ай бұрын
thanks!
@Macj707
@Macj707 Ай бұрын
CHEF WUZ HERE!
@MarcelN1980
@MarcelN1980 Ай бұрын
🎉🎉🎉 thanks!
@h4x0z-t9i
@h4x0z-t9i Ай бұрын
Thx ❤
@smartspidy5726
@smartspidy5726 Ай бұрын
Superb sir
@shininglight6
@shininglight6 Ай бұрын
I was asked for comte's Password
@gand0rfTRZ
@gand0rfTRZ Ай бұрын
Was it when you tried to ssh in as comte? Did you set the permissions on the id_rsa file to 600?
@MarcelN1980
@MarcelN1980 Ай бұрын
1. Amazing! 2. Please don't stop creating these! All the best from Europe :)
@kozzek7287
@kozzek7287 2 ай бұрын
But didnt you notice that the code is slightly broken? With netcat for example. It really makes it hard for me to follow.
@gand0rfTRZ
@gand0rfTRZ 2 ай бұрын
In the book, yeah. Not a big fan. I often have to jump to the end where they have the full code layed out and look at it there first.
@kaueberto8384
@kaueberto8384 2 ай бұрын
So instructive. Thanks for your channel!
@yoshi8171
@yoshi8171 2 ай бұрын
Very informative and helpful, many thanks🎉
@gand0rfTRZ
@gand0rfTRZ 2 ай бұрын
You are very welcome!
@guilhermealonso3214
@guilhermealonso3214 2 ай бұрын
Where is the file 'payload.txt'? Is it a file from Kali itself or did you create it? I'm a bit confused about this part. Can you please help me?
@gand0rfTRZ
@gand0rfTRZ 2 ай бұрын
Hey!! Just now seeing this. If you go back and check out my last python video, there is a link in the discriptuon to a sql injectuon list. That makes up payloads.txt. i have add some to it sense then as well. Link to vid: kzbin.info/www/bejne/f4CQc2Njbs-CpdE
@Akshaypanther
@Akshaypanther 2 ай бұрын
Can you make a video about the experience in the hackthebox program
@gand0rfTRZ
@gand0rfTRZ 2 ай бұрын
@Akshaypanther Do you mean what it is like doing HTB vs THM kind of thing?
@ftgljared
@ftgljared 3 ай бұрын
why didnt you just use elastic gui as provided?
@gand0rfTRZ
@gand0rfTRZ 3 ай бұрын
Honestly, not much experiance with it. Plus I just like being in the terminal more. While tools like that are great, you may not always have access to them.
@lms605
@lms605 3 ай бұрын
Great channel, good explanation. Also first time I see someone posting their mistakes, really nice. It shows how long it can take someone to go over these challenges and keep it real
@gand0rfTRZ
@gand0rfTRZ 3 ай бұрын
Thsnks for the comment. Yeah, I would rather people know that sometimes it can take a whole afternoon to do a box. Not just an hour. Sometimes people get caught up in useing tools and being as fast as possible. You can miss good chances to learn something like that.
@Akshaypanther
@Akshaypanther 3 ай бұрын
Amazon provide a good quality refurbished monitors you can buy from there for a small amount of money and how was it going your health condition after the surgery are you fine right now..
@gand0rfTRZ
@gand0rfTRZ 3 ай бұрын
Things are going good. Thanks for asking. As for the monitors, yeah I have looked at some of them. It has more to do with just clicking the buy button then the price. Just to lazy to click it. 😅
@Jamaal_Ahmed
@Jamaal_Ahmed 3 ай бұрын
Thanks bro , subscribed ❤🎉 .
@dummymaster-j2y
@dummymaster-j2y 3 ай бұрын
import argparse import socket # import shlex import subprocess import sys import textwrap import threading def execute(cmd): cmd = cmd.strip(' ') if not cmd: return cmd = cmd.split(' ') output = subprocess.Popen(cmd,text=True,stderr=subprocess.PIPE,stdout=subprocess.PIPE) result,error = output.communicate() return result # output = subprocess.check_output(shlex.split(cmd),stderr=subprocess.STDOUT) # return output.decode() class NetCat: def __init__(self, args, buffer=None): self.args = args self.buffer = buffer self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) def run(self): if self.args.listen: self.listen() else: self.send() def send(self): # client mode print('client mode') self.socket.connect((self.args.target, self.args.port)) if self.buffer: # send the initial buffer self.socket.send(self.buffer) try: while True: recv_len = 1 response = '' while recv_len: data = self.socket.recv(4096) recv_len = len(data) response += data.decode() if recv_len < 4096: break if response: print(response) buffer = input('> ') buffer += ' ' self.socket.send(buffer.encode()) except KeyboardInterrupt: print('User terminated.') self.socket.close() sys.exit() def listen(self): # server mode print('listening') self.socket.bind((self.args.target, self.args.port)) self.socket.listen(5) # Queue of upto 5 pending connection while True: client_socket, _ = self.socket.accept() client_thread = threading.Thread(target=self.handle, args=(client_socket,)) client_thread.start() def handle(self, client_socket): if self.args.execute: output = execute(self.args.execute) client_socket.send(output.encode()) elif self.args.upload: file_buffer = b'' while True: data = client_socket.recv(4096) if data: file_buffer += data print(len(file_buffer)) else: break with open(self.args.upload, 'wb') as f: f.write(file_buffer) message = f'Saved file {self.args.upload}' client_socket.send(message.encode()) elif self.args.command: cmd_buffer = b'' while True: try: client_socket.send(b' #> ') while ' ' not in cmd_buffer.decode(): cmd_buffer += client_socket.recv(64) response = execute(cmd_buffer.decode()) if response: client_socket.send(response.encode()) cmd_buffer = b'' except Exception as e: print(f'server killed {e}') self.socket.close() sys.exit() if __name__ == '__main__': parser = argparse.ArgumentParser( description='BHP NetCat Tool', formatter_class=argparse.RawDescriptionHelpFormatter, epilog=textwrap.dedent('''Example: netcat.py -t 192.168.1.108 -p 5555 -l -c # command shell netcat.py -t 192.168.1.108 -p 5555 -l -u=mytest.whatisup # upload to file netcat.py -t 192.168.1.108 -p 5555 -l -e=\"cat /etc/passwd\" # execute command echo 'ABCDEFGHI' | ./netcat.py -t 192.168.1.108 -p 135 # echo local text to server port 135 netcat.py -t 192.168.1.108 -p 5555 # connect to server ''')) # below are the command line arguments parser.add_argument('-c', '--command', action='store_true', help='initialize command shell') parser.add_argument('-e', '--execute', help='execute specified command') parser.add_argument('-l', '--listen', action='store_true', help='listen') parser.add_argument('-p', '--port', type=int, default=5555, help='specified port') parser.add_argument('-t', '--target', default='192.168.1.203', help='specified IP') parser.add_argument('-u', '--upload', help='upload file') args = parser.parse_args() if args.listen: buffer = '' else: buffer = sys.stdin.read() nc = NetCat(args, buffer.encode('utf-8')) nc.run()
@gand0rfTRZ
@gand0rfTRZ 3 ай бұрын
Kind of odd to do a code dump in the comments. Looking over it, it looks like you made some small adjustments to the code from the BHP zip download. Looks good. Added comments which is nice. I see you kept the socket buffer at 4096. Overall nice.
@susstevedev-u5f
@susstevedev-u5f 3 ай бұрын
Any ways to protect my site from this?
@gand0rfTRZ
@gand0rfTRZ 3 ай бұрын
Input validation and an IDS like Suricata would go a long way to help.
@susstevedev-u5f
@susstevedev-u5f 3 ай бұрын
@@gand0rfTRZ what is ids?
@gand0rfTRZ
@gand0rfTRZ 3 ай бұрын
Intrusuon Detection System. I use suricata on my web site. I had a big problem with spray and pray ssh login attempts. After setting it up and adding a rule to drop ssh connects, and adding a ufw rule to only allow ssh logins from the ip address of a mchine I control. The ssh brute forcing has been stopped and isnt taking up resources on my server or clogging up my SIEM logs.
@heathbruce9928
@heathbruce9928 3 ай бұрын
Does this attack work with Microsoft sites? The normal Ms query has brackets which would cause the query to fail.
@gand0rfTRZ
@gand0rfTRZ 3 ай бұрын
It all depends on the database used on the backend. Thats why it is normally a good habit to have several txt files with different payloads. Scripts like this can also be tweeked for different cases. Or you can make several scripts. One for sql, nosql, or what ever you come across. The key is learning the differences and building a tools that can work with the different types.
@mathewmccloskey8242
@mathewmccloskey8242 3 ай бұрын
good vid
@Akshaypanther
@Akshaypanther 3 ай бұрын
🎉👍🏻
@K_Kanjo
@K_Kanjo 3 ай бұрын
the fuking mario steps are so A. s 😅
@ArtusMagnificus3_2_1
@ArtusMagnificus3_2_1 4 ай бұрын
Hello, can you suggest top 10-5 books that are really good (in your opinion) for ethical hacking / cyber security learning for getting from level 0 to 100. Also I have a question, currently my logic is to try different types of hacking on my own stuff as I think practice is the fastest way to understand a specific topic, what do you think about such an approach?
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
A book list like that would be an interesting idea. I will have to try and put one togethet. I do agree that have you own stuff to try things on is a great idea. I am following this pkaylist to vuild my own homelab for that reason. But you can just spin up a vm of any of the vuln boxes he list on your own machine to play with. kzbin.info/aero/PL3ljjyal211AbTqlxSo6CGBiVqsXw8wrp&si=uYGMUOjYc89tvp_3
@ArtusMagnificus3_2_1
@ArtusMagnificus3_2_1 4 ай бұрын
@@gand0rfTRZ Thank you for the playlist, I will check it out. Ok I'll wait for the book list video then
@hankpeterson628
@hankpeterson628 4 ай бұрын
Would you recommend this book for someone with experience?
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
Actually yes. I have several years of experience with python. It is always good to look at code from others to see how they would do something. Never know what you may learn. Plus it is a good way to work on code review and troubleshooting.
@hankpeterson628
@hankpeterson628 4 ай бұрын
Tho the information isn't really challenging, you have a very good voice for teaching and instructing. Please make more videos 🙌🏽
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
Thank you! I really want to do more but life be life right now. Hopfully I will have more free time in the next coming weeks to start making more again.
@bartomiejpotaman6973
@bartomiejpotaman6973 4 ай бұрын
Awesome content! Learned a lot in this room as well!
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
Great to hear!
@santiago.bassett
@santiago.bassett 4 ай бұрын
Thank you for the book review! 👏👏
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
You are so welcome!
@Akshaypanther
@Akshaypanther 4 ай бұрын
Hii sir....great news i has been haired as infra L1 support Engineer in trivandrum, Kerala... It was my first interview i answered 95% of the question and next one was hr round also i cracked it then i got the offer letter yesterday
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
Thats great to hear. Congrats!!
@Akshaypanther
@Akshaypanther 4 ай бұрын
@@gand0rfTRZ thank you sir...
@sad0n3
@sad0n3 4 ай бұрын
which course did you studied in the school?
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
Cybersecurity and Information Assurance at WGU
@TrevorCassells
@TrevorCassells 4 ай бұрын
what would you have done if you didnt know about PSPY64? That was where I hit a wall and didnt know what to do! Thanks for the walkthrough.
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
You know what, that is a good question. Honestly, if you go through enough of the walkthroughs and easy boxes, it is hard to not know about pspy64. But this has got me thinking and wanting to explore...
@TrevorCassells
@TrevorCassells 4 ай бұрын
@@gand0rfTRZ awesome, i had to do a bit of research on sed too from this video, as i hadn't seen that little gem either. How long have you been hacking? I'm 18 months in and working on CEH, feeling like the learning curve is gradually becoming less steep! I've subbed and look forward to more content :)
@Akshaypanther
@Akshaypanther 4 ай бұрын
Sir...add sume hashtag in the video..... The Video will reach to people who searching for the tools and about CTF......like #CTF #hacking etc...
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
I honestly did even think of that. Thanks for the suggestion. I will have to take some time and go back and add them onto other videos.
@kei8491
@kei8491 4 ай бұрын
Hey man ty so much for your vids, they are really helpfull and are helping me a lot to understand what am i reading. I hope you continue these series!
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
Thank you. As for the black hat python series, this is the last one I will be doing on it. I do plan on doing more things with python. More of a focus on security and related stuff. Feel free to drop a question about some code you would like help with. I don't mind doing code reviews to help people understand.
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
I am so sorry. I forgot to push the code up to github. It is there now.
@TRD_Mike
@TRD_Mike 4 ай бұрын
Love the look of your setup and layout for Arch. I have a friend who's been running Arch for about 6 months now. Seems like more work than I'm willing to put in lol.
@gand0rfTRZ
@gand0rfTRZ 4 ай бұрын
Don't get me work, it can be. Espically if you want to customize it. Which I love doing that. But you learn alot while doing it.