This was amazing!!! thank you. I love how you take us through this really long learning path of swapping out the architecture and finally getting the metasploit payload to work. Then right at the end you do in a second by using Evil-WinRM and the powershell script. This was an immensely fun box.
@spacenomad54842 жыл бұрын
MFP certainly stands for MultiFunction Printer and nothing else, I can't think of any other (possibly obscene) meaning for the letters M and F.
@MD45642 жыл бұрын
Correct.
@ripmeep2 жыл бұрын
Correct x2.
@D3M03202 жыл бұрын
This is really interesting timing considering I spent most of yesterday turning off FTP, SMB and changing SNMP community strings for a lot of printers in our environment, and changing default passwords if I found any…
@TracerPortable2 жыл бұрын
So the intended way was way I didn't even notice. Nice.
@abhishekmorla12 жыл бұрын
i was waiting for it🥰
@ethicalhackosa Жыл бұрын
Great video! Question, when you created the MsfVenom exploit file, are we able to specify/use a non-meterpreter payload too? and if we go that route can I use netcat instead of metasploit to catch the shell?
@gabrielsantos192 жыл бұрын
What happened at 33:44? The exploit created session 5 before you Ctrl+c? Thank you for your videos, IppSec.
@MrShooksy2 жыл бұрын
Thanks Ippsec! Great video!
@softwaredeveloper96522 жыл бұрын
Waaao. I like very much this. I am happy for this tutorials.
@declanmcardle2 жыл бұрын
@3:00 would 389 be open if it was a DC / TGS?
@PR1V4TE Жыл бұрын
5:33 how to make Firefox to run whatever we type to execute as domain instead of default Google search. Cus when ever I type an IP address it takes me to Google. I have to type http at least at the beginning.
@jarmeh618519 күн бұрын
id like to know how to do this as well!
@josephsarkisian2 жыл бұрын
Wouldn't uploading the SCF file to an MFP as a firmware update in a prod environment potentially break the MFP?
@SamNetw0rk2 жыл бұрын
🔥🔥 awesome, thanks for interest content
@Heyhey_17922 жыл бұрын
I checked the patreon for peass, and there’s only 1 extra patreon :(
@ippsec2 жыл бұрын
I will - the MFA for my patreon is setup to an old phone. So I'm locked out temporarily lol
@Carpcontrol2 жыл бұрын
@@ippsec that is ironic lol
@Kaminchen2 жыл бұрын
This is called penetration testing right? That would be the job title?
@AOSRoyal2 жыл бұрын
crack dealer
@Carpcontrol2 жыл бұрын
Yeah penetration hardens the system iukwim
@cybersecurity35232 жыл бұрын
Good job bro
@declanmcardle2 жыл бұрын
IPP/CUPS is 631? I've forgotten what lpd is...lost in the annals of time...let's see what happens here...
@declanmcardle2 жыл бұрын
515 I think...however, it's Windows which is being attacked, not the printer :-)
@uchiha64282 жыл бұрын
How did u install evilwinrm on parrot os? Im having trouble installing it thats y
@podavu70442 жыл бұрын
He is using the htb parrot machine , which comes with a bunch of pre-installed tools , but if u want i guess u can just git clone and install the requirements
@ButIfWeSurvive-WeHereInTheEnd2 жыл бұрын
👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻
@johns0n3282 жыл бұрын
Great!
@muhammadghareeb3992 жыл бұрын
prince
@blackthorne-rose Жыл бұрын
O.k. Ok... wtf is a "lull bend"?!?! lol Google gives me nothing!
@ruthwikkrishna82342 жыл бұрын
first veiw
@marcelomedina79692 жыл бұрын
hello can you make the new machine removed from hackthebox OBJECT please!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!