I know this video is a little old but I used the same reverse shell as you with the same listening command but when I run the new command nothing shows up on the port I am listening to. Can you help me please?
@gand0rfTRZКүн бұрын
Sorry for the late reply. I dont mind. Are you on discord?
@drycoal95Күн бұрын
@@gand0rfTRZ yes I am. Thanks for replying!
@gand0rfTRZКүн бұрын
sent you a message
@TylerRamsbey5 күн бұрын
Great walkthrough! Appreciate you showcasing the room!
@Ninjabowtie9 күн бұрын
Nice videos!
@Ninjabowtie9 күн бұрын
nice video dude! keep it up
@TRD_Mike10 күн бұрын
Nice n easy intro room. I can't wait to be done with school so i can get back into the enjoyment of HTB and THM.
@gand0rfTRZ10 күн бұрын
I feel you. When I was going for my B.S., I did my best to find time for boxes and other stuff. Thankfully my job actually lets me slot time for school work and extra learning. That helped a lot.
@MRJAWADBINANCIAN10 күн бұрын
Thanks sir for honest review ❤❤❤
@piyush_more12 күн бұрын
script for sql injection is not working
@gand0rfTRZ11 күн бұрын
Sorry for getting back so late. Was busy. Try: ' || '1'='1';-- -
@TRD_Mike13 күн бұрын
Happy New Year! These look like some great books to add to my collection. I just got Black Hat Bash for Christmas I'm excited to dig into. -DW @ TRZ
@gand0rfTRZ12 күн бұрын
That is one I plan on getting next as well. Let me know what you think of it.
@saifmohammed907514 күн бұрын
thx man keep up the great work of your's
@russellcarter645116 күн бұрын
some feedback fwiw I'm new to hacking, as I figure most people who would look up a walkthrough on an easy rated room would be. You start your video setting up variables and talking about scripts you've written as well as using an interface outside of the tryhackme website's default attackbox setup. That pretty much told me right off the bat, as a new user/hacker this isn't the video for me. I stopped watching after the first minute. being an easy room, the people who are looking up walk throughs are brand new. We are typing everything you type into our own instance of the room. We are learning by following..if that makes sense. You may be trying to cater to more advanced hackers who, for some reason, need a walkthrough of an easy room. If that's the case please disregard the above. I just wanted to leave some feedback in a helpful way.
@Jamaal_Ahmed20 күн бұрын
❤❤🎉 .
@bearkraus853026 күн бұрын
thank you!
@TRD_MikeАй бұрын
Hey great to put a face to a name! Now your handle makes so much more sense. Great walkthrough.
@gand0rfTRZАй бұрын
That gave me a good laugh!!
@treborsan5948Ай бұрын
everything was clear on my end
@gand0rfTRZАй бұрын
Glad to hear!
@treborsan5948Ай бұрын
thanks!
@Macj707Ай бұрын
CHEF WUZ HERE!
@MarcelN1980Ай бұрын
🎉🎉🎉 thanks!
@h4x0z-t9iАй бұрын
Thx ❤
@smartspidy5726Ай бұрын
Superb sir
@shininglight6Ай бұрын
I was asked for comte's Password
@gand0rfTRZАй бұрын
Was it when you tried to ssh in as comte? Did you set the permissions on the id_rsa file to 600?
@MarcelN1980Ай бұрын
1. Amazing! 2. Please don't stop creating these! All the best from Europe :)
@kozzek72872 ай бұрын
But didnt you notice that the code is slightly broken? With netcat for example. It really makes it hard for me to follow.
@gand0rfTRZ2 ай бұрын
In the book, yeah. Not a big fan. I often have to jump to the end where they have the full code layed out and look at it there first.
@kaueberto83842 ай бұрын
So instructive. Thanks for your channel!
@yoshi81712 ай бұрын
Very informative and helpful, many thanks🎉
@gand0rfTRZ2 ай бұрын
You are very welcome!
@guilhermealonso32142 ай бұрын
Where is the file 'payload.txt'? Is it a file from Kali itself or did you create it? I'm a bit confused about this part. Can you please help me?
@gand0rfTRZ2 ай бұрын
Hey!! Just now seeing this. If you go back and check out my last python video, there is a link in the discriptuon to a sql injectuon list. That makes up payloads.txt. i have add some to it sense then as well. Link to vid: kzbin.info/www/bejne/f4CQc2Njbs-CpdE
@Akshaypanther2 ай бұрын
Can you make a video about the experience in the hackthebox program
@gand0rfTRZ2 ай бұрын
@Akshaypanther Do you mean what it is like doing HTB vs THM kind of thing?
@ftgljared3 ай бұрын
why didnt you just use elastic gui as provided?
@gand0rfTRZ3 ай бұрын
Honestly, not much experiance with it. Plus I just like being in the terminal more. While tools like that are great, you may not always have access to them.
@lms6053 ай бұрын
Great channel, good explanation. Also first time I see someone posting their mistakes, really nice. It shows how long it can take someone to go over these challenges and keep it real
@gand0rfTRZ3 ай бұрын
Thsnks for the comment. Yeah, I would rather people know that sometimes it can take a whole afternoon to do a box. Not just an hour. Sometimes people get caught up in useing tools and being as fast as possible. You can miss good chances to learn something like that.
@Akshaypanther3 ай бұрын
Amazon provide a good quality refurbished monitors you can buy from there for a small amount of money and how was it going your health condition after the surgery are you fine right now..
@gand0rfTRZ3 ай бұрын
Things are going good. Thanks for asking. As for the monitors, yeah I have looked at some of them. It has more to do with just clicking the buy button then the price. Just to lazy to click it. 😅
@Jamaal_Ahmed3 ай бұрын
Thanks bro , subscribed ❤🎉 .
@dummymaster-j2y3 ай бұрын
import argparse import socket # import shlex import subprocess import sys import textwrap import threading def execute(cmd): cmd = cmd.strip(' ') if not cmd: return cmd = cmd.split(' ') output = subprocess.Popen(cmd,text=True,stderr=subprocess.PIPE,stdout=subprocess.PIPE) result,error = output.communicate() return result # output = subprocess.check_output(shlex.split(cmd),stderr=subprocess.STDOUT) # return output.decode() class NetCat: def __init__(self, args, buffer=None): self.args = args self.buffer = buffer self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) def run(self): if self.args.listen: self.listen() else: self.send() def send(self): # client mode print('client mode') self.socket.connect((self.args.target, self.args.port)) if self.buffer: # send the initial buffer self.socket.send(self.buffer) try: while True: recv_len = 1 response = '' while recv_len: data = self.socket.recv(4096) recv_len = len(data) response += data.decode() if recv_len < 4096: break if response: print(response) buffer = input('> ') buffer += ' ' self.socket.send(buffer.encode()) except KeyboardInterrupt: print('User terminated.') self.socket.close() sys.exit() def listen(self): # server mode print('listening') self.socket.bind((self.args.target, self.args.port)) self.socket.listen(5) # Queue of upto 5 pending connection while True: client_socket, _ = self.socket.accept() client_thread = threading.Thread(target=self.handle, args=(client_socket,)) client_thread.start() def handle(self, client_socket): if self.args.execute: output = execute(self.args.execute) client_socket.send(output.encode()) elif self.args.upload: file_buffer = b'' while True: data = client_socket.recv(4096) if data: file_buffer += data print(len(file_buffer)) else: break with open(self.args.upload, 'wb') as f: f.write(file_buffer) message = f'Saved file {self.args.upload}' client_socket.send(message.encode()) elif self.args.command: cmd_buffer = b'' while True: try: client_socket.send(b' #> ') while ' ' not in cmd_buffer.decode(): cmd_buffer += client_socket.recv(64) response = execute(cmd_buffer.decode()) if response: client_socket.send(response.encode()) cmd_buffer = b'' except Exception as e: print(f'server killed {e}') self.socket.close() sys.exit() if __name__ == '__main__': parser = argparse.ArgumentParser( description='BHP NetCat Tool', formatter_class=argparse.RawDescriptionHelpFormatter, epilog=textwrap.dedent('''Example: netcat.py -t 192.168.1.108 -p 5555 -l -c # command shell netcat.py -t 192.168.1.108 -p 5555 -l -u=mytest.whatisup # upload to file netcat.py -t 192.168.1.108 -p 5555 -l -e=\"cat /etc/passwd\" # execute command echo 'ABCDEFGHI' | ./netcat.py -t 192.168.1.108 -p 135 # echo local text to server port 135 netcat.py -t 192.168.1.108 -p 5555 # connect to server ''')) # below are the command line arguments parser.add_argument('-c', '--command', action='store_true', help='initialize command shell') parser.add_argument('-e', '--execute', help='execute specified command') parser.add_argument('-l', '--listen', action='store_true', help='listen') parser.add_argument('-p', '--port', type=int, default=5555, help='specified port') parser.add_argument('-t', '--target', default='192.168.1.203', help='specified IP') parser.add_argument('-u', '--upload', help='upload file') args = parser.parse_args() if args.listen: buffer = '' else: buffer = sys.stdin.read() nc = NetCat(args, buffer.encode('utf-8')) nc.run()
@gand0rfTRZ3 ай бұрын
Kind of odd to do a code dump in the comments. Looking over it, it looks like you made some small adjustments to the code from the BHP zip download. Looks good. Added comments which is nice. I see you kept the socket buffer at 4096. Overall nice.
@susstevedev-u5f3 ай бұрын
Any ways to protect my site from this?
@gand0rfTRZ3 ай бұрын
Input validation and an IDS like Suricata would go a long way to help.
@susstevedev-u5f3 ай бұрын
@@gand0rfTRZ what is ids?
@gand0rfTRZ3 ай бұрын
Intrusuon Detection System. I use suricata on my web site. I had a big problem with spray and pray ssh login attempts. After setting it up and adding a rule to drop ssh connects, and adding a ufw rule to only allow ssh logins from the ip address of a mchine I control. The ssh brute forcing has been stopped and isnt taking up resources on my server or clogging up my SIEM logs.
@heathbruce99283 ай бұрын
Does this attack work with Microsoft sites? The normal Ms query has brackets which would cause the query to fail.
@gand0rfTRZ3 ай бұрын
It all depends on the database used on the backend. Thats why it is normally a good habit to have several txt files with different payloads. Scripts like this can also be tweeked for different cases. Or you can make several scripts. One for sql, nosql, or what ever you come across. The key is learning the differences and building a tools that can work with the different types.
@mathewmccloskey82423 ай бұрын
good vid
@Akshaypanther3 ай бұрын
🎉👍🏻
@K_Kanjo3 ай бұрын
the fuking mario steps are so A. s 😅
@ArtusMagnificus3_2_14 ай бұрын
Hello, can you suggest top 10-5 books that are really good (in your opinion) for ethical hacking / cyber security learning for getting from level 0 to 100. Also I have a question, currently my logic is to try different types of hacking on my own stuff as I think practice is the fastest way to understand a specific topic, what do you think about such an approach?
@gand0rfTRZ4 ай бұрын
A book list like that would be an interesting idea. I will have to try and put one togethet. I do agree that have you own stuff to try things on is a great idea. I am following this pkaylist to vuild my own homelab for that reason. But you can just spin up a vm of any of the vuln boxes he list on your own machine to play with. kzbin.info/aero/PL3ljjyal211AbTqlxSo6CGBiVqsXw8wrp&si=uYGMUOjYc89tvp_3
@ArtusMagnificus3_2_14 ай бұрын
@@gand0rfTRZ Thank you for the playlist, I will check it out. Ok I'll wait for the book list video then
@hankpeterson6284 ай бұрын
Would you recommend this book for someone with experience?
@gand0rfTRZ4 ай бұрын
Actually yes. I have several years of experience with python. It is always good to look at code from others to see how they would do something. Never know what you may learn. Plus it is a good way to work on code review and troubleshooting.
@hankpeterson6284 ай бұрын
Tho the information isn't really challenging, you have a very good voice for teaching and instructing. Please make more videos 🙌🏽
@gand0rfTRZ4 ай бұрын
Thank you! I really want to do more but life be life right now. Hopfully I will have more free time in the next coming weeks to start making more again.
@bartomiejpotaman69734 ай бұрын
Awesome content! Learned a lot in this room as well!
@gand0rfTRZ4 ай бұрын
Great to hear!
@santiago.bassett4 ай бұрын
Thank you for the book review! 👏👏
@gand0rfTRZ4 ай бұрын
You are so welcome!
@Akshaypanther4 ай бұрын
Hii sir....great news i has been haired as infra L1 support Engineer in trivandrum, Kerala... It was my first interview i answered 95% of the question and next one was hr round also i cracked it then i got the offer letter yesterday
@gand0rfTRZ4 ай бұрын
Thats great to hear. Congrats!!
@Akshaypanther4 ай бұрын
@@gand0rfTRZ thank you sir...
@sad0n34 ай бұрын
which course did you studied in the school?
@gand0rfTRZ4 ай бұрын
Cybersecurity and Information Assurance at WGU
@TrevorCassells4 ай бұрын
what would you have done if you didnt know about PSPY64? That was where I hit a wall and didnt know what to do! Thanks for the walkthrough.
@gand0rfTRZ4 ай бұрын
You know what, that is a good question. Honestly, if you go through enough of the walkthroughs and easy boxes, it is hard to not know about pspy64. But this has got me thinking and wanting to explore...
@TrevorCassells4 ай бұрын
@@gand0rfTRZ awesome, i had to do a bit of research on sed too from this video, as i hadn't seen that little gem either. How long have you been hacking? I'm 18 months in and working on CEH, feeling like the learning curve is gradually becoming less steep! I've subbed and look forward to more content :)
@Akshaypanther4 ай бұрын
Sir...add sume hashtag in the video..... The Video will reach to people who searching for the tools and about CTF......like #CTF #hacking etc...
@gand0rfTRZ4 ай бұрын
I honestly did even think of that. Thanks for the suggestion. I will have to take some time and go back and add them onto other videos.
@kei84914 ай бұрын
Hey man ty so much for your vids, they are really helpfull and are helping me a lot to understand what am i reading. I hope you continue these series!
@gand0rfTRZ4 ай бұрын
Thank you. As for the black hat python series, this is the last one I will be doing on it. I do plan on doing more things with python. More of a focus on security and related stuff. Feel free to drop a question about some code you would like help with. I don't mind doing code reviews to help people understand.
@gand0rfTRZ4 ай бұрын
I am so sorry. I forgot to push the code up to github. It is there now.
@TRD_Mike4 ай бұрын
Love the look of your setup and layout for Arch. I have a friend who's been running Arch for about 6 months now. Seems like more work than I'm willing to put in lol.
@gand0rfTRZ4 ай бұрын
Don't get me work, it can be. Espically if you want to customize it. Which I love doing that. But you learn alot while doing it.