Man, I was struggling with the privilege escalation and now from this video I've learned something new, thank you so much Ippsec, your videos are such great educational material.
@vonniehudson4 жыл бұрын
@03:00: ORS = Output Record Separator! Wtf never even heard of that! Thanks @ippsec !
@craig38804 жыл бұрын
also available in powershell under "OFS:"
@jaylal48993 жыл бұрын
the sql part of the box is arguably the most difficult bit....Thanks Ippsec for the demo, it makes much more sense now.
@maz31464 жыл бұрын
“This is a easy box” 😂😂 gg ippsec u are the best!
@tzachihazan34594 жыл бұрын
Thank you ippsec as always amazing video 💪
@mehmetux41864 жыл бұрын
i was preparing for Hollywood movie but i found better one :)
@scottieaustin13974 жыл бұрын
When you discovered the admin_tasks.php, could you just have done command injection using the "tasks" parameter as part of the HTML request? @19:50 you might have been able to do like ?task=&& whoami or something like that?
@lazula4 жыл бұрын
This won't work because the parameter must be a literal number between 1 and 7. I tried a few different null terminators to get around this but it's a red herring.
@scottieaustin13974 жыл бұрын
@@lazula ah okay, cool thanks! I hadn't actually messed around with this box, it was just a thought I had while watching the vid.
@DHIRAL29084 жыл бұрын
It took way longer time in setting my own sql server to accept connections lol!
@pauliehorgan4 жыл бұрын
Yeah, I'd question why this machine was labelled easy, it was a medium for sure
@Eric-the-wise4 жыл бұрын
@@pauliehorgan it was very easy...
@CuteLittleHen4 жыл бұрын
@@Eric-the-wise Perhaps we weren't blessed with your supreme knowledge of penetration testing techniques. Forgive us for being lesser beings, oh mighty Lord Eric. May we find HTB challenges as easy as you do, one magical day.
@flrn847914 жыл бұрын
@@CuteLittleHen I think what he meant is that the difficulty wasn't in the hacking, but the possible setup which can be new for some people.
@locke84122 жыл бұрын
@@CuteLittleHen eric the wise
@Kiiib44 жыл бұрын
Hey there Ipp! Since your Patreon is paused due to the recent events: Is there any .way I can toss a few coins to you? I just want to thank you for the great content and all the things you've taught me so far :).
@lazula4 жыл бұрын
I got the reverse shell to work on my first try using pty.spawn() where you had p=subprocess.call(), so there might have been an issue with subprocess's availability (I can't test it since I don't have a subscription). pty tends to be so much more reliable on top of being easy to work with, so it's always my first choice for a shell. Also, you can use *args if you don't know how many arguments the function you're hijacking has.
@lazarvukasinovic48784 жыл бұрын
this was very interesting one
@nonasuomynona17344 жыл бұрын
Balkans?
@lazarvukasinovic48784 жыл бұрын
@@nonasuomynona1734 jes maj frend
@nonasuomynona17344 жыл бұрын
@@lazarvukasinovic4878 epik
@zgeekdiver4 жыл бұрын
Ooo the mic sounds crispy.
@JuanBotes4 жыл бұрын
thanks again
@geeshta4 жыл бұрын
I think the lazy eval() approach would work if you wrapped the content of the function in single quotes, eval() evaluates a string (and there already were double quotes somewhere). Not that the reverse shell worked anyway.
@kosmonautofficial2964 жыл бұрын
awesome video!
@onlyastron4ut4 жыл бұрын
Had a go at this box today but unfortunately it retired while I was going at it. Foothold was such a pain, I couldn’t find anything for hours. I even checked all the images for any stego.. I ended up trying different wordlists on the /admin-dir directory and finally found that juicy file with the ftp creds. Managed to login over ftp and wanted to grab the files but the box wouldn’t let me because it got retired that instant :-(
@checknate88204 жыл бұрын
I don't mean to be spammy, but I wrote a python script for that pentest monkey page called insta_shell. You supply the type of shell, the ip, and port and it fills out the correct syntax for you. Its on github.If anyone wants to try it, I can provide more info. Saves you the time of actually going to the website and finding the right shell to modify
@bdorr174 жыл бұрын
how do you split the console like that, you are like a keyboard wizard with shortcuts...I have tried forever to tab out the standard parrot terminal and I cant. Additionally, I had to use terminator and right click for tabs. any help would be greatly appreciated. Love the vids
@bdorr174 жыл бұрын
@True Miller I have tried tmux before, but can't seem to figure out how to split the terminal, I google how to and it seems I keep messing it up in some way
@PolTen724 жыл бұрын
That's odd, I tried this box, but when I used nmap it showed me others ports open, like 25, and 80 was filtered
@lutfahelal91404 жыл бұрын
Since when did KZbin start adding two unskippable Ads???
@danieldolen19454 жыл бұрын
Which linux distro are you using?
@themasterofdisastr12264 жыл бұрын
Parrot os
@rujotheone4 жыл бұрын
Good video. Where can we get that wordlist?
@flrn847914 жыл бұрын
SecLists
@kret634 жыл бұрын
See You next week!
@pn_tedro30134 жыл бұрын
One question, when you got the user waldo and understood that you can execute a file with a sudo perm, you chose to get a shell, but could you just write a bash script to copy the root.txt to a new txt file in the waldo home dir? is it possible? If anyone else can answer i will appreciate it.
@redpanda313374 жыл бұрын
Yes you can just: bash -c “cp /root/root.txt /tmp/root.txt” Instead of the command ippsec used, but why would you just want to copy the root flag if you can get a root shell and potentially just get a backdoor in the system for the long run? Speaking for a real-life engagement.
@pn_tedro30134 жыл бұрын
@@redpanda31337 yes, thank you, because this is a box and i know already where is the root flag, just dont wanted to mess up with the shell as he did, im lazy, i know
@DHIRAL29084 жыл бұрын
@@pn_tedro3013 also, anyone else would be able to access the root flag as well.. so it's better to not spoil it!
@marcostorres5724 жыл бұрын
:)
@longdashes4 жыл бұрын
I really enjoyed this box. I do not understand it's relatively bad rating.
@longdashes4 жыл бұрын
@Aidan Collins Yeah I was stuck on that a bit myself, but I think it was pretty manageable. The other stuff, especially the getting onto the box due to the adminer exploit was pretty cool imo.
@Eric-the-wise4 жыл бұрын
Es q ell...oh boy
@pauliehorgan4 жыл бұрын
I really didnt like this box. It needed such a leap to run gobuster again on the utility scripts folder. and "the usual" wordlist didnt have what was required
@user-fp6dt1os1l4 жыл бұрын
That whole nmap "optimisation" thing at the start is totally uneccessary, nmap only runs scripts on open ports anyway
@craig38804 жыл бұрын
I don't think its strictly for this box. He's showing examples of "how" to use the tool other than just typing the usual. The great thing about ippsec is that he teaches you little tips and tricks that you might need on other boxes or for a specific reason. This is a very simple method for showing a powershell way to filter output from one tool and use it with others.
@ajjjjjjbullrider4 жыл бұрын
I found this program called ShellGen github.com/thejoker3000/ShellGen where you can create shells automatically. I use it sometimes and it comes in handy when I need a new shell. Someone called Th3J0k3r made it. Might want to take a look at it.
@Rahul-me8ws4 жыл бұрын
How to get so much knowledge like you
@armandkruger9114 жыл бұрын
I always replace the reverse shell with "chmod +s /bin/bash" to just make /bin/bash and SUID instead of causing more egress traffic out... Hitting "bin/bash -p" then you are root... Reverse Shells are always buggy
@ippsec4 жыл бұрын
I avoid doing things like that because of the insecurity it creates *especially* if you forget to clean anything up. Reverse shells are buggy but its a bit safer than just dropping an easily findable binary that lets anyone privesc.
@armandkruger9114 жыл бұрын
@@ippsec Thanx a lot! makes sense, something one can forget very easily!
@muralidharansubburaman88634 жыл бұрын
Hi great explanation.. I know u r using parrot os .. i would like some help in tmux session.. u have ur ip address and u r running bash in zsh .. i would like to know how.. any help wil be great
@jacquesmit5024 жыл бұрын
Ippsec is using the Hack the box “pwnbox” that’s an in-browser parrot install for VIP users. There is a github repository showing how to set up your parrot to look the same Can’t remember the link now but just google: pwnbox site:github.com
@muralidharansubburaman88634 жыл бұрын
@@jacquesmit502 thank u
@Ms.Robot.4 жыл бұрын
I'm your admirer💋.
@bruh_55554 жыл бұрын
Fact: all great hackers are lazy, that's what makes them great
@Eric-the-wise4 жыл бұрын
Keep telling that to yourself skiddie
@themasterofdisastr12264 жыл бұрын
@@Eric-the-wise Yeah and while everybody else is pwning anytjing left and right, you are writing your programs and waste your time. Deal? Deal.
@bruh_55554 жыл бұрын
@@Eric-the-wise your condescending nature shows you're the skid