love your rooms brother. This room and second are the rooms where I have learned the most! Amazing box designer and I cannot wait for your next box!
@readysetexploit2 ай бұрын
Thank you for the kind words Second is still one of my favorites that I made as well Appreciate you taking the time to play the rooms
@behindYOUR63 ай бұрын
thanks for the amazing content.
@0xM2r3 ай бұрын
You are amazing! I really enjoyed your writeup!
@readysetexploit3 ай бұрын
Thank you for watching and the kind words!
@Feos-mo1ee4 ай бұрын
good explaination but i still have a litlle confusing --> do you know another CTF ' s like this ? having the same idea 's?
@readysetexploit4 ай бұрын
Hello Thanks for watching and not off the top of my head
@Zortdedifare4 ай бұрын
there is no lsadump file in the zip file for me
@readysetexploit4 ай бұрын
Sorry for the late reply I just checked on two different downloads and I do see the lsass dump file. The MD5 of the ZIP file is 286c133a1b67c068f86cef06785e104d Hopefully you were able to resolve it
@djalilayed5 ай бұрын
I need to start using Docker, clearly will save me time. thanks for a good video
@MalwareCube5 ай бұрын
Such a cool idea for a challenge! Super well put together 👏 also, watching you set up Docker to run pypykatz was super helpful for someone like myself who is beyond useless when it comes to containerization.
@readysetexploit5 ай бұрын
Thank you! And thanks for watching Docker has saved my sanity so many times from the dependency hell that is Python-based cyber tools :_D
@제노비아-y7f6 ай бұрын
Thank you for making it like real hacking. How were Chisel Client and Server created, which were not in Part 1 when you started?
@제노비아-y7f6 ай бұрын
😂🥵😁
@제노비아-y7f6 ай бұрын
It's perfect
@제노비아-y7f6 ай бұрын
It was a very good lecture.
@readysetexploit6 ай бұрын
Thank you for taking the time to watch the video
@제노비아-y7f6 ай бұрын
It's a good video. however b = b'C^_M@__DC\\7,' Can you tell what encryption technique was used just by looking at this? xor += chr(b[b_index] ^ ord(pass_key[b_index % len(pass_key)])) Is there a way to infer this?
@제노비아-y7f6 ай бұрын
very very good~~
@readysetexploit3 ай бұрын
Thank you!
@poplu70767 ай бұрын
really nice explaination.. thanks
@readysetexploit7 ай бұрын
Thank you for watching the video!
@naveen10018 ай бұрын
Great Work sir,,, Thank's a lot for making the machine
@namenickname12268 ай бұрын
Thanks a lot for the challenge, especially for setting up the profile. It helped me learn more about the Linux mem/profiles in volatility. Much appreciated!
@readysetexploit8 ай бұрын
Thank you 🙂 I am happy you enjoyed the challenge See ya at the next one
@MalwareCube8 ай бұрын
Finally a dependable method of installing Volatility. 😅 Awesome challenge
@readysetexploit8 ай бұрын
For now 😅 Python dependency hell always keeps me up at night And thank you!
@abieknutt74099 ай бұрын
"Promosm"
@ezinnekalu9059 ай бұрын
This is really a hard box. Thank you for this explanation. I also learnt a lot of cool shortcuts just by watching you navigate your system. Love it. Great work
@readysetexploit9 ай бұрын
Thank you for playing the room and watching the video I am glad you were able to learn something from it This was a different kind of room for the platform, keep an eye out for more
@MalwareCube10 ай бұрын
DANG this was a super involved box. I learned a lot, very impressive stuff! 👏
@readysetexploit10 ай бұрын
Thank you 🙂 It was a pain to build and a pain solve
@albertoarevalo437211 ай бұрын
In spanish please
@readysetexploit11 ай бұрын
Hola, En un mundo perfecto, lo podría hacer en español y inglés, pero el tiempo se me escapa. La página web en la descripción se puedes traducir de inglés a español usando servicios de Google. Gracias por mirar
@albertoarevalo437211 ай бұрын
Entendí la explicación en inglés y está súper me costó un poco pero ahí vamos Más bien gracias por compartir tus conocimientos Y lo que te decía en español era para que sea más fácil para otras personas para que tú información llegué a más personas O se podría usar subtitulos en español
@subject_1611 ай бұрын
Awesome ❤
@ArnoNym6911 ай бұрын
thank you for this lesson in sqli :)
@tarandalinux8323 Жыл бұрын
Here, here same as @divinedreams5657. Bigger letters would have been great!
@readysetexploit Жыл бұрын
Yes, It’s an old video and one of my first ones. Didn’t quite have the right settings figured out. Thanks for watching
@hackwrld1895 Жыл бұрын
So video is so inspirationnal and awesome, like I love the whole content, each step is a delight. I loved the way you continued with generating the SSH keys instead of just going on, that was dope. Great job really, I learnt alot.
@readysetexploit Жыл бұрын
Thank you for your kind words and for watching the video! I am glad I was able to help you learn something
@arthureiseb1633 Жыл бұрын
Man!!! im still a beginner. I was doing basic stuff and did'nt know it was going to be that hard WOW. I completed the AOC2023 but this challenge got me stuff at the console pin section after running go buster. What new to me is Burp suite. Thank you for the video i give it a bash, i just need to get burp suite. I think the Pentesting and Red teaming is a total new world for me but got start somewhere right :-)
@readysetexploit Жыл бұрын
Hey thank you for watching the video and playing the room! I remember when it was all new to me as well three years ago. Just keep learning and keep trying. Look at good writeups if you get really stuck and even if you solve a room to learn what others have done But the most important thing is to have fun while doing so
@hackwrld1895 Жыл бұрын
😣began well with finding the SQLi, and SSRF but got blocked on how to do next, cool room, gonna go and take my revenge on it
@mattanderson2074 Жыл бұрын
One of the most enjoyable yet frustrating, but enjoyable (yes I said it twice) challenges I've ever done. Great job putting this together, and to the whole THM team for all the side quests!
@readysetexploit Жыл бұрын
Thank you for your kind words!
@krishapsreenivasan376 Жыл бұрын
Took me 2 days to find the privesc because I didn't notice the 'enable' command. Finally I discovered the '[' executable by running the shell script with 'strace' and grepping for 'execv' calls. You can also grep for 'stat' calls and notice how bash is searching for the '[' executable in the locations specified in the path variable. Awesome challenge, had a lot of fun doing it.
@readysetexploit Жыл бұрын
Oh that is also a good method, I’ll be taking note of that one! Thanks! It was a sneaky one
@boomboom-9451 Жыл бұрын
Can you make all 4 walkthroughs?
@readysetexploit Жыл бұрын
I’ll try to find the time, I do both written and video and all of the challenges were very technical so hopefully I can find some time to do them all, thank you for watching this one
@boomboom-9451 Жыл бұрын
@@readysetexploit I'm really interested in watching your content. I hope you find the time to do it so. thanks
@subject_16 Жыл бұрын
Awesome. Learned few new things. Thanks man.
@readysetexploit Жыл бұрын
Glad to hear it! Thanks for watching
@hengkilodwig Жыл бұрын
It's a nice tutor ... thank you for share, i will try to upload my video based on your way if you don't mind. May be i am to lamme not check on git.
@readysetexploit Жыл бұрын
Sure I don’t mind, thanks for watching
@MalwareCube Жыл бұрын
Wooooah, that path hijacking privesc was crazy! 🤯Definitely requires a keen eye. Awesome challenge and walk-through.
@readysetexploit Жыл бұрын
Haha thank you! It’s a sneaky one
@muhammadhamzakaleem3243 Жыл бұрын
how did your console is revealing the your vpn ip can u share the custiomization procedure? Thank
@readysetexploit Жыл бұрын
Hello, You can review it here on my GitHub repo github.com/hadrian3689/rse_pwnbox
@perfectionist1337 Жыл бұрын
Some Nice content here🔥Really learnt a lot
@readysetexploit Жыл бұрын
Thank you :)
@evil_b1t Жыл бұрын
first payload was "...http:%3a//" so it was two :
@cyborg71. Жыл бұрын
you're doing great. keep uploading video.
@ayham.alali.11 Жыл бұрын
Very nice video 🤩Thank you for creating this video on my room!
@readysetexploit Жыл бұрын
Thank you for the room and taking the time to watch it
@H088YHaX0R Жыл бұрын
Nice video. Simply adding a reverse shell into .profile is enough to trigger the reverse shell. No need for messing with cat or the path.
@readysetexploit Жыл бұрын
Ahh I missed that one, thank you for that. I sometimes tend to miss the simplest approach
@H088YHaX0R Жыл бұрын
As you mentioned bash -lc will execute from .profile
@ayush_panwar1 Жыл бұрын
13:55 you can just do `| tr -d " "` to remove new lines.
@readysetexploit Жыл бұрын
Hey there, thanks! Looks like I need to review some basics, appreciate you taking the time to share that
@hassnainayub648 Жыл бұрын
this is legit content deep knowledge thank god I found this. Thank you very much sir
@readysetexploit Жыл бұрын
Thank you for your kind words!
@hassnainayub648 Жыл бұрын
@@readysetexploit please upload complete series
@readysetexploit Жыл бұрын
@@hassnainayub648 any particular series?
@zxlings080244 Жыл бұрын
Ez
@bricktrooperproductions Жыл бұрын
thank you
@kevinhalim8937 Жыл бұрын
i cannot find that ip address
@anatoliynikolaev5229 Жыл бұрын
Interesting machine, thanks!
@MadisonHind Жыл бұрын
I'm having an issue with the hydra, it tells me it found no password
@htankhaishan4611 Жыл бұрын
Thank you for sharing the video. The explanation provided was excellent and it also offered valuable supplementary insights.
@readysetexploit Жыл бұрын
Thank you for watching 😀 and playing the machine
@presequel Жыл бұрын
wow great video! i just did this box today and rooted it via the online exploit but seeing your video i learned a lot! thx, amazing :)
@readysetexploit Жыл бұрын
Thank you for taking the time to watch the video 😀 I am happy you took something valuable from it