HackTheBox - Driver

  Рет қаралды 45,223

IppSec

IppSec

Күн бұрын

Пікірлер: 38
@haXez_org
@haXez_org Жыл бұрын
This was amazing!!! thank you. I love how you take us through this really long learning path of swapping out the architecture and finally getting the metasploit payload to work. Then right at the end you do in a second by using Evil-WinRM and the powershell script. This was an immensely fun box.
@spacenomad5484
@spacenomad5484 2 жыл бұрын
MFP certainly stands for MultiFunction Printer and nothing else, I can't think of any other (possibly obscene) meaning for the letters M and F.
@MD4564
@MD4564 2 жыл бұрын
Correct.
@ripmeep
@ripmeep 2 жыл бұрын
Correct x2.
@D3M0320
@D3M0320 2 жыл бұрын
This is really interesting timing considering I spent most of yesterday turning off FTP, SMB and changing SNMP community strings for a lot of printers in our environment, and changing default passwords if I found any…
@TracerPortable
@TracerPortable 2 жыл бұрын
So the intended way was way I didn't even notice. Nice.
@abhishekmorla1
@abhishekmorla1 2 жыл бұрын
i was waiting for it🥰
@ethicalhackosa
@ethicalhackosa Жыл бұрын
Great video! Question, when you created the MsfVenom exploit file, are we able to specify/use a non-meterpreter payload too? and if we go that route can I use netcat instead of metasploit to catch the shell?
@gabrielsantos19
@gabrielsantos19 2 жыл бұрын
What happened at 33:44? The exploit created session 5 before you Ctrl+c? Thank you for your videos, IppSec.
@MrShooksy
@MrShooksy 2 жыл бұрын
Thanks Ippsec! Great video!
@softwaredeveloper9652
@softwaredeveloper9652 2 жыл бұрын
Waaao. I like very much this. I am happy for this tutorials.
@declanmcardle
@declanmcardle 2 жыл бұрын
@3:00 would 389 be open if it was a DC / TGS?
@PR1V4TE
@PR1V4TE Жыл бұрын
5:33 how to make Firefox to run whatever we type to execute as domain instead of default Google search. Cus when ever I type an IP address it takes me to Google. I have to type http at least at the beginning.
@jarmeh6185
@jarmeh6185 19 күн бұрын
id like to know how to do this as well!
@josephsarkisian
@josephsarkisian 2 жыл бұрын
Wouldn't uploading the SCF file to an MFP as a firmware update in a prod environment potentially break the MFP?
@SamNetw0rk
@SamNetw0rk 2 жыл бұрын
🔥🔥 awesome, thanks for interest content
@Heyhey_1792
@Heyhey_1792 2 жыл бұрын
I checked the patreon for peass, and there’s only 1 extra patreon :(
@ippsec
@ippsec 2 жыл бұрын
I will - the MFA for my patreon is setup to an old phone. So I'm locked out temporarily lol
@Carpcontrol
@Carpcontrol 2 жыл бұрын
@@ippsec that is ironic lol
@Kaminchen
@Kaminchen 2 жыл бұрын
This is called penetration testing right? That would be the job title?
@AOSRoyal
@AOSRoyal 2 жыл бұрын
crack dealer
@Carpcontrol
@Carpcontrol 2 жыл бұрын
Yeah penetration hardens the system iukwim
@cybersecurity3523
@cybersecurity3523 2 жыл бұрын
Good job bro
@declanmcardle
@declanmcardle 2 жыл бұрын
IPP/CUPS is 631? I've forgotten what lpd is...lost in the annals of time...let's see what happens here...
@declanmcardle
@declanmcardle 2 жыл бұрын
515 I think...however, it's Windows which is being attacked, not the printer :-)
@uchiha6428
@uchiha6428 2 жыл бұрын
How did u install evilwinrm on parrot os? Im having trouble installing it thats y
@podavu7044
@podavu7044 2 жыл бұрын
He is using the htb parrot machine , which comes with a bunch of pre-installed tools , but if u want i guess u can just git clone and install the requirements
@ButIfWeSurvive-WeHereInTheEnd
@ButIfWeSurvive-WeHereInTheEnd 2 жыл бұрын
👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻
@johns0n328
@johns0n328 2 жыл бұрын
Great!
@muhammadghareeb399
@muhammadghareeb399 2 жыл бұрын
prince
@blackthorne-rose
@blackthorne-rose Жыл бұрын
O.k. Ok... wtf is a "lull bend"?!?! lol Google gives me nothing!
@ruthwikkrishna8234
@ruthwikkrishna8234 2 жыл бұрын
first veiw
@marcelomedina7969
@marcelomedina7969 2 жыл бұрын
hello can you make the new machine removed from hackthebox OBJECT please!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
@0xrobinho0d41
@0xrobinho0d41 2 жыл бұрын
Check out my writeup 😁😁
@ryanboland7307
@ryanboland7307 2 жыл бұрын
No
HackTheBox - Sau
16:21
IppSec
Рет қаралды 17 М.
HackTheBox - Trick
43:18
IppSec
Рет қаралды 30 М.
Правильный подход к детям
00:18
Beatrise
Рет қаралды 11 МЛН
人是不能做到吗?#火影忍者 #家人  #佐助
00:20
火影忍者一家
Рет қаралды 20 МЛН
Hacking Windows TrustedInstaller (GOD MODE)
31:07
John Hammond
Рет қаралды 901 М.
HackTheBox - Absolute
1:31:13
IppSec
Рет қаралды 29 М.
Inside the V3 Nazi Super Gun
19:52
Blue Paw Print
Рет қаралды 2,9 МЛН
Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡
18:41
Flashback Team
Рет қаралды 603 М.
HackTheBox - Support
1:02:25
IppSec
Рет қаралды 61 М.
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,6 МЛН
Malware Development: Processes, Threads, and Handles
31:29
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 292 М.
HackTheBox - Horizontall
1:04:53
IppSec
Рет қаралды 23 М.
HackTheBox - ServMon
1:03:13
IppSec
Рет қаралды 37 М.