TryHackMe Simple CTF Official Walkthrough

  Рет қаралды 61,594

DarkSec

DarkSec

Күн бұрын

Пікірлер: 67
@scottwilliams7395
@scottwilliams7395 3 жыл бұрын
This works for python3 but you have to add ( ) brackets to every line that starts with print or cprint. Luckily, there are only 4-5 lines that need this. For example, the script might say: print "blah blah" __ these need to be changed to say: print ("blah blah")
@KultrunAus
@KultrunAus 3 жыл бұрын
Yeah I fixed all that but I still got errors in the script when it tried to call on previous functions. Gave up in the end and used python2 to run the script. Which still didn't work as it just ends up spitting out 11111111...
@animo-kun9554
@animo-kun9554 3 жыл бұрын
I did that but unfortunately it gave me a UnicodeDecodeError: 'utf-8' codec can't decode byte 0xf1 in position 923: invalid continuation byte error. do you know the specific syntax to tackle this error?
@Onuorahh
@Onuorahh Жыл бұрын
Bro, you saved me. Thank you
@ryandinh6479
@ryandinh6479 Жыл бұрын
Thanks for the tip, I was stuck at that part until I saw your comment.
@carlopetrini7799
@carlopetrini7799 2 жыл бұрын
Excellent video DarkSec! Thank you very much because it helped me to tackle this task with confidence and whole-understanding.
@javierdash1
@javierdash1 3 жыл бұрын
thanks! was very helpful. Greetings from Argentina!
@ucTran-bb1mt
@ucTran-bb1mt 3 жыл бұрын
Your challenge helps me to learn lots of new things. Thank you so much.
@Chanchothecorgi
@Chanchothecorgi 3 жыл бұрын
love the walkthroughs, but is it possible to see what you do when you go on the breaks... often times, we get stuck too there and we dont actually see what happened... for example, the cve with the whole python2 and python 3 thing. would have loved to see if we could have ran that python3 and what we needed to do... but maybe that cve doesnt work on python3. Thanks again!
@Patocoh
@Patocoh 3 жыл бұрын
Hey Dark, great video!. Just yesterday I did the same room, but I had problems with the installation of the termcolor because, as u know, python2 is no longer maintained. So, I couldn't install that. What I did as a walkthrough was editing the code to change a few things to make it available for python3. and it worked. !! Good luck and keep doing it !!
@DarkSec
@DarkSec 3 жыл бұрын
Thanks so much!!! :D
@RX_100.0
@RX_100.0 3 жыл бұрын
Wow can you give ur modified code I was strucked with term color
@thecyberkratos7056
@thecyberkratos7056 3 жыл бұрын
@@RX_100.0 same i also stuck in termcolor
@DarkSec
@DarkSec 3 жыл бұрын
Good by me, as long as people are helped (and there's no blatant advertising) I'm happy :)
@Patocoh
@Patocoh 3 жыл бұрын
@@thecyberkratos7056 I can't see the post I wrote with the link, but is the following guys! shorturl .at/fouzZ
@nandorbacso4625
@nandorbacso4625 9 ай бұрын
How did you guess immediately that you'll need to use an sqli vulnerability?
@hallabel8154
@hallabel8154 9 ай бұрын
I think the same
@wijeweerajayasundera2043
@wijeweerajayasundera2043 3 жыл бұрын
Dark keep it up 💪
@quinkydinkend
@quinkydinkend 7 ай бұрын
Thankyou for the vid! Is this supposed to be the most simple CTF on TryHackMe? There seems to be a lot of prequired knowledge in here before you could get close to tackling it. What would you suggest learning first to be able to do these CTFs? I have a good understanding of the linux fundamentals, know about nmap, but every CTF there seems to be something unknown. Any help much appreciated! Cheers!
@devilbatman215
@devilbatman215 Ай бұрын
Same here bro! How is your journey going now?
@quinkydinkend
@quinkydinkend Ай бұрын
@ not toooo bad but haven’t found the answer yet. I’ve been using picoCTF which has been good for more simple ones, I recommend that. How about you?
@devilbatman215
@devilbatman215 Ай бұрын
@@quinkydinkend I am currently doing the Junior Pentester in thm. I get bored with the information, but I try to push through it.
@pgltsmn
@pgltsmn 11 ай бұрын
you made me question my brain existence
@pgltsmn
@pgltsmn 11 ай бұрын
same here
@pgltsmn
@pgltsmn 11 ай бұрын
me tooooo
@pgltsmn
@pgltsmn 11 ай бұрын
я в ахуе
@uriya8899
@uriya8899 4 ай бұрын
Lol it's the same person commenting each time 😂
@pawagnathom
@pawagnathom 2 жыл бұрын
Great video! It's very informative. It requires a lot of knowdlege about tools which and how to use. Thanks for showing the way.
@ShahriyarRzayev
@ShahriyarRzayev Жыл бұрын
if somebody get stuck on python2 version issue, just open the exploit file and replace all print statements with print(), and all good.
@ugli1440
@ugli1440 2 жыл бұрын
First I went to IP/simple/admin which directed me to a login page, then I used the forgot password functionality to find that there was a user named mitch, finally I used burpsuite intruder to find the password as secret. I didn't even try the exploit as I had already discovered all this before even needing to look for one. I remembered the text to mitch saying the password was weak so I just thought a simple brute force would be sufficent.
@-_-zz6zh
@-_-zz6zh 2 жыл бұрын
also brute force of ssh port would give a password
@Minzccy
@Minzccy 2 жыл бұрын
Great Content love learning this !
@bahai02
@bahai02 3 жыл бұрын
600th view! And thank you for making this video
@bacalhaugostoso1594
@bacalhaugostoso1594 7 ай бұрын
how did u know that data that u got from exploit CMS was tha same data to enter on SSH, because CMS data was a data to enter on interface web
@danyalloyal8414
@danyalloyal8414 6 ай бұрын
i cant run ls command it enters passive mode and even if i disable it, it just says no connection
@azf9982
@azf9982 11 ай бұрын
I have wifi connexion in my pc but the vm in tryhackme won't work , any solution please
@daraek_
@daraek_ 2 жыл бұрын
Thanks man 🖤👏
@ap3660
@ap3660 3 жыл бұрын
good stuff dark!!
@miguelofre
@miguelofre 2 жыл бұрын
modified the cve and every print or cprint close with () run it with python3 e.i. print ("work") or cprint ("work")
@wardellcastles
@wardellcastles 3 жыл бұрын
I found it easier to update the python script to python3. It ran fine in Kali.
@johnn8643
@johnn8643 Жыл бұрын
nice video however i wasn't able to run the exploit with python2 so I converted the code to python3 by adding () to the prints
@jasonardelean7958
@jasonardelean7958 2 жыл бұрын
i got a "Entering Extended Passive Mode (|||40556|)" when trying to 'ls' after ftp(IP). everything looks the same as his, but it tries to open on port 40556. what am i doing wrong?
@srishtichoudhury8575
@srishtichoudhury8575 Жыл бұрын
What u can do is Type passive after loging in as anonymous Then dir Followed by ls U might also wanna type binary to execute it
@abdelzarrazledba9846
@abdelzarrazledba9846 Жыл бұрын
@@srishtichoudhury8575 just type "passive" in ftp terminal
@theredstoneritsme
@theredstoneritsme 3 жыл бұрын
Appearently the exploit doesn't work anymore, it just spits out "111111111111111111....." for the username until you stop it :/
@filipbrom3322
@filipbrom3322 3 жыл бұрын
Yeah, I can't even get to download that requests module and even if I try using python3 it just says: Requirement already satisfied: requests in /usr/lib/python3/dist-packages...
@devanshkhare3532
@devanshkhare3532 3 жыл бұрын
@@filipbrom3322 use a virtual environment
@animo-kun9554
@animo-kun9554 3 жыл бұрын
apparently in my case it gives a terrible UnicodeDecodeError :/
@defyteryt2452
@defyteryt2452 3 жыл бұрын
thank you sir
@miguelofre
@miguelofre 2 жыл бұрын
ive tried installin python2 -m pip install termcolor and didnt workit... it is in python3 but python3 doesnt work with this cve
@xqcupdate
@xqcupdate 2 жыл бұрын
use 2to3 , it will convert the script to python3
@gabrielangelo1760
@gabrielangelo1760 Жыл бұрын
@@xqcupdate ty bro it worked, this python2 is so garbage
@ReHabReLap
@ReHabReLap Жыл бұрын
Where’d you get ip from still so confused
@uscninja4190
@uscninja4190 5 ай бұрын
i am unable to scan the ip using nmap can someone help me? i am trying to scan it from my parrot virtualmachine
@animo-kun9554
@animo-kun9554 3 жыл бұрын
it gave me a UnicodeDecodeError: 'utf-8' codec can't decode byte 0xf1 in position 923: invalid continuation byte! , can anyone help me with it?
@urchoice-in-house5884
@urchoice-in-house5884 4 ай бұрын
I tried using the python2 exploit file but it wasn't working 😭 someone should send help
@qasimabbasi158
@qasimabbasi158 2 жыл бұрын
This exploit is not working on my machine every time i run script it give me some random Salt for password username and email and password.
@Junior-cp3cn
@Junior-cp3cn 2 жыл бұрын
me too, did you solve it?
@AC-he8ln
@AC-he8ln Жыл бұрын
Video would be better if you normalized the audio, it's hard to hear clearly at times. Also, could you select the text when you are mentioning something on the code? Thanks!
@wijeweerajayasundera2043
@wijeweerajayasundera2043 3 жыл бұрын
Dark 😁 remember me? 😅
@nsanegaming5425
@nsanegaming5425 2 жыл бұрын
I had to use the password you brute forced the python script never ran for me. it would go through the steps and then NOT display the output. and I've never seen a priv esc with vim before so that was cool. Thanks for the help
@777jac
@777jac Жыл бұрын
the exploit dont show username, password and email
Beginner and Easy CTF | TryHackme Wget CTF
16:22
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 9 М.
TryHackMe Linux Backdoors Official Walkthrough
24:10
DarkSec
Рет қаралды 9 М.
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
CTF Walkthrough with John Hammond
28:07
David Bombal
Рет қаралды 181 М.
Cheese CTF TryhackMe Walkthrough | Easy Room
18:33
MatSec
Рет қаралды 3,8 М.
TryHackMe Bounty Hacker Official Walkthrough
10:25
DarkSec
Рет қаралды 9 М.
TryHackMe! Sudo - CVE-2019-14287
26:46
John Hammond
Рет қаралды 52 М.
How To Learn Hacking With CTFs
7:44
LiveOverflow
Рет қаралды 263 М.
TryHackMe Introductory Research Official Walkthrough
29:19
DarkSec
Рет қаралды 282 М.
Advent of Cyber 2024 - TryHackMe (Day 1)
31:41
Ryan Montgomery
Рет қаралды 69 М.
Agent Sudo : Tryhackme Walkthrough
20:05
stuffy24
Рет қаралды 4,6 М.