HackTheBox - Hawk

  Рет қаралды 22,717

IppSec

IppSec

Күн бұрын

Пікірлер: 55
@jacmarpett
@jacmarpett 5 жыл бұрын
At 15:52 it screws up because the output files of the script begins with numbers, which means they become input files for the script :)
@IS33UUU
@IS33UUU 5 жыл бұрын
Learned SO much on this box. Thanks for your walk-through! Cheers
@dylankeir
@dylankeir 6 жыл бұрын
Your encrypt.sh issue was due to your regex, you were checking if the file started with a number, then anything after. So when you encrypted one of the files, you had a bunch more for the next cypher. A simple $ on the end of the regex would've solved your issue.
@84xyzabc
@84xyzabc 2 жыл бұрын
For those that does not want to copy the whole bunch of lines during 15:52 As correctly pointed out by @JP, the problem is with the file names. I just changed $length$cipher to $cipher$length in openssl cmd. If you do the above, now your ls *.enc | xargs wc -c should be ls ./*.enc | xargs wc -c as now your files names are starting with '-'
@Z3R0xPl01T
@Z3R0xPl01T 5 жыл бұрын
do you have any advice on a good book to read about encryption
@fs0c1ety_bs92
@fs0c1ety_bs92 6 жыл бұрын
I used nikto to scan the drupal and didnt even login on admin panel /?q=user/password/
@DavidThomsenPhD
@DavidThomsenPhD 6 жыл бұрын
What is the bind keys to copy in tmux at 16:20
@ippsec
@ippsec 6 жыл бұрын
Go watch the tmux video, I believe is it Ctrl+[ then space to copy, then Ctrl+]. However it may change depending what mode your in (vi vs emac)
@DavidThomsenPhD
@DavidThomsenPhD 6 жыл бұрын
damn, doesn't work for me. :( @@ippsec
@ippsec
@ippsec 6 жыл бұрын
Then watch my tmux video - I haven’t changed anything since then and it’s certainly covered there
@mugundhanbalaji
@mugundhanbalaji 6 жыл бұрын
@ippsec did you checked local kali tmp for h2 info leak exploit
@yashwanthkl4420
@yashwanthkl4420 6 жыл бұрын
Heyy... 49:30 at this timestamp, you are listening on port 8000 but you don't mention it while pulling the 45105.py file, curl also gave you an error... but i guess you probably didn't notice it.. The script would have worked.. isn't it @ippsec ??
@ippsec
@ippsec 6 жыл бұрын
Yup you are correct didn't notice the error - Often times I just skim the screen, since I can't read and talk simultaneously... So just read the start of the last line and it looked like it was valid, didn't read the end. Ha.
@yashwanthkl4420
@yashwanthkl4420 6 жыл бұрын
@@ippsec yeah i can understand...😁👍
@jacks16384
@jacks16384 5 жыл бұрын
Awesome hope to see future videos like this
@andreas3578
@andreas3578 4 жыл бұрын
doesn't make sense to cat and then grep although its a common practice. you can just grep .. took me a while to get rid of the habbit.
@douglasmclainberdeaux1534
@douglasmclainberdeaux1534 6 жыл бұрын
I didn't lose points? Aren't I supposed to lose points/percentage towards my next rank when a box is decommissioned?
@ippsec
@ippsec 6 жыл бұрын
Check again, if it doesn't show then it'll probably update tonight. Not sure when points get calculated.
@douglasmclainberdeaux1534
@douglasmclainberdeaux1534 6 жыл бұрын
@@ippsec Yep, dang it, I just checked again. I guess I am too slow at these. It's hard for me to get a good rank when I have a day+night job and a family lol oh, well.
@fabianasilva9368
@fabianasilva9368 6 жыл бұрын
ola ippsec...boa tarde me chamo fabiana gosto muito dessa area de pentest e ctf...mas so sei o basico de pentest mas criei uma conta no hackthebox e estou assistindo todos videos das maquinas aposentadas e tentando fazer voce acha que estou estudando da forma correta ou voce acha que preciso procurar outra forma de aprendizagem...se voce poder me indicar uns materiais de estudo sobre o assunto agradeço...
@pepemunic3661
@pepemunic3661 6 жыл бұрын
Hola brasileiro, no creo que te responda ya que habla en ingles. Si no sabes nada no creo que entiendas los videos de ippsec, deberias empezar con lo basico. Que sistema operativo usas? Por ej si usas kali, parrot, black hat, etc. fijate que todos los programas traen manuales de como usarlos. Si no entendes esos manuales pues debes ir aun mas a lo basico. Saludos desde Arg y suerte
@fabianasilva9368
@fabianasilva9368 6 жыл бұрын
@@pepemunic3661 uso o kali light nao é la grande coisa mas da pra quebrar o galho...eu assisto os procedimento de como fazer nas maquinas aposentadas escrevo tudo e em seguida tento fazer nas maquinas...voce pode me indicar algum contudo bom pra mim estudar..???,,,eu leio aquele livro teste de invasao mas so li pra ver se pegava uma base por que as tecnicas desses livros sao tudo ultrapassadas...queria pegar uma base bom mas nao sei como:-(
@juniorGs12
@juniorGs12 6 жыл бұрын
Fabiana Mello, ja eh um começo bom. Mas eh importante estudar metodologia de Pentest. Entender cada fase, e gosta de pesquisar. Vulnhub, e hackthebox são ótimos lugares para praticar,mas eh important estudar conceitos também. Espero que isso ajude.
@pepemunic3661
@pepemunic3661 6 жыл бұрын
@@fabianasilva9368 TENES 2 OPCIONES, SI TENES PLATA (y tiempo) O SINO. SI TENES PLATA: TE LA HAGO CORTA, ESTUDIA ING EN SISTEMAS Y SACA ALGUN MASTER EN SEGURIDAD O HACE CURSOS PARA SACAR CERTIFICACIONES EJEMPLO LAS DE CCNA O CISP O CEH O OCSP. SI NO TENES PLATA: PRIMERO APRENDE A MOVERTE EN LINUX, ENTRA A LA PAGINA OFICIAL DE LINUX Y SI ES KALI LINUX MEJOR, O BACKBOX O PARROT SECURITY, TODOS SON SISTEMAS OPERATIVOS BASADOS EN LINUX (UNIX, LINUX SERIA EL KERNEL) DESPUES QUE APRENDAS EL SISTEMA OPERATIVO LINUX EMPEZA EN APRENDER LAS HERRAMIENTAS QUE HAY EN EL Y CUALES SE USAN, LEE EL MANUAL EN TODOS O EN CASI TODOS ESTAN EN LAS PAGINAS OFICIALES DE SUS CREADORES, PROGRAMAS USADOS EJEMPLO: MSFCONSOLE NMAP ETTERCAP SQLINJECTION AIRCRACK Y TODA LA GAMA DE AIRCRACK. ETC TENES QUE PENSAR Y VIVIR COMO HACKER EN LO QUE RESPECTA A SEGURIDAD, ESO NO SIGNIFICA VIVIR EN LA PC, EJ YO HAGO DEPORTES. ATAQUES SSLSTRIP ATAQUES ARP SPOOFING ATAQUES DNS SPOOFING EN hak5 tenes buenos tutoriales. HACKING THE SOFTWARE INGENIERIA SOCIAL LEER LEER LEER Y MAS LEER Y PRACTICAR, PRACTICAR PRACTICAR. ALGO DE PROGRAMACION DEBES SABER, EJEMPLO APRENDETE PHP O MARIADB (ANTES SE USABA MUCHO MYSQL AHORA MARIADB QUE ES FREESOFTWARE, MYSQL LO COMPRO UNA EMPRESA), PYTHON, JAVA O JAVA SCRIPT, DESPUES SI QUERES HTML Y ESTILOS PERO CON BASE DE DATOS Y PHP MAS ALGUNO DE LOS OTROS QUE TE DIJE EJ PYTHON, JAVA O JAVASCRIPT VAS DE 10. SIN OLVIDAR DE APRENDER A MOVERSE EN WINDOWS TMB QUE CASI TODAS LAS PC HOGAREÑAS USAN WINDOWS: HACE CURSOS POR INTERNET O FIJATE LA AYUDA CONTEXTUAL CUANDO ABRAS CADA COSA: FIREWALL DE WINDOWS (MAS IMPORTANTE QUE UN ANTIVIRUS, ACA VEZ LAS CONEXIONES QUE PERMITES Y CUALES NEGAS EN TU PC) REGISTRO DE WINDOWS CMD (NETSTAT (te fijas la ayuda contextual ej netstat ? o netstat /? o netstat --help no recuerdo), nslookup, ping, tracert o traceroute) SERVICIOS DE WINDOWS APLICACIONES LOGS ETC POR CIERTO SI POR ALGUN MOTIVO MI COMENTARIO CAMBIO TU VIDA, EN 10 AÑOS BUSCAME Y AGRADECEME, ACEPTO DOLARES, EUROS, PESOS ARGENTINOS O UN SIMPLE ABRAZO O QUE AYUDES A OTRA PERSONA.? jejejejeje
@sonyreview2270
@sonyreview2270 6 жыл бұрын
i don't understand what are you doing in 19:00==>19:10
@ippsec
@ippsec 6 жыл бұрын
Openssl isn't limited to just printable ascii characters like a-z, 0-9, etc. That being said I'm use to seeing 'salted_' at the start of files encrypted with openssl. However when using cat to view the contents, I don't see salted. I use xxd to examine the hex, for non-printable characters it displays it as a "." -- Since I see salted_ within xxd, I can assume there are some bytes that are making the salted_ not appear when viewing it in cat.
@sonyreview2270
@sonyreview2270 6 жыл бұрын
@@ippsec thanx
@darwinyu4171
@darwinyu4171 6 жыл бұрын
When you select something in Kali, it will automaticly add them to your clipboard, that's why you have trouble at 31:11
@Raul111591
@Raul111591 6 жыл бұрын
Hey IppSec, what scripting language are you using when you create the encrypt.sh file, just curious. Also what scripting language do you recommend to learn?
@ippsec
@ippsec 6 жыл бұрын
That's just bash commands. Learn any language, if you don't know start with python.
@Raul111591
@Raul111591 6 жыл бұрын
IppSec So I know a bit of python but im guessing it would be good to combine it with bash then to run automations and such...
@V0lk3n_
@V0lk3n_ 6 жыл бұрын
Fallen angels in the past ^^ now we are checksec! :3 happy you used the owodelta exploit on your video :p
@V0lk3n_
@V0lk3n_ 6 жыл бұрын
Oh but you fail to use it! XD When you try to import it on the box you are on the good way but you got connection refused the reason why you cant do python exploit.py So for use it, if you want know, i personally do that 1. Make a hidden dir like .test in /tmp/ 2. cd /tmp/.test 3. Upload the exploit on it like you try before 4. Launch it python3 exploit.py -H 127.0.0.1:8082 -D /tmp/.test/ -F /root/root.txt 5. It will save as .zip on tmp/.test folder 6. Encode the zip as base64 7.dedode the base64 on your computer and extract the zip you got root :)
@nickmc01
@nickmc01 6 жыл бұрын
Hmmm I had this done already but HTB is showing is as still active lol.
@ippsec
@ippsec 6 жыл бұрын
Yep, I was off by one hour. Had forgotten about DST when scheduling it.
@ScryptStudios1
@ScryptStudios1 4 ай бұрын
Please append the word "Tuah" to the video name. Thanks.
@TsukiCTF
@TsukiCTF 6 жыл бұрын
IppSec, the father of Hackthebox
@Exploitmenot
@Exploitmenot 6 жыл бұрын
I lost few hours to discover that encryption !!!
@itra7360
@itra7360 6 жыл бұрын
Hi ippsec, I have problem when I try to connect to server (I connected to HTB labs, but when I put ip on browser, nothing going on) why?
@bnal5tab90
@bnal5tab90 6 жыл бұрын
Couldn't you just go to root by sudo -u and use daniel password? and thanks for every video you have done a learn alot of things
@ippsec
@ippsec 6 жыл бұрын
Yup. However reverse shells can behave funny, if SSH is available I'd rather just log into SSH :)
@effbiai
@effbiai 6 жыл бұрын
I believe you actually found a vulnerability when creating new databases with the "test connection". If you haven't done already, please report it to H2.
@MuckingFedic
@MuckingFedic 5 жыл бұрын
for those that come after me, for handling the brute force of the encrypted data you can just use this github.com/deltaclock/go-openssl-bruteforce works perfectly
@adamziane
@adamziane 6 жыл бұрын
every time i start a box a vid comes out a week later
@ippsec
@ippsec 6 жыл бұрын
Boxes are sorted by age - Try picking boxes near the bottom of the list. That being said the best time to watch a video is after you have done a box, or just given up on trying to do a box.
@adamziane
@adamziane 6 жыл бұрын
@@ippsec not your fault I just randomly pick one true will help if stuck on a part.
@nictuniema1249
@nictuniema1249 6 жыл бұрын
Dude I m impressed by your skills ! I love your videos , but do you plan something different as hack the box ? Meybe some tutorials for noobies like me ? Have a gr8 day ✌
@charleshall376
@charleshall376 6 жыл бұрын
These are pretty much "Noobie" tutorials... Granted some of the concepts and methods are kinda complex, but if u go and look thru the previous videos you will see the method to the madness so to speak
@nictuniema1249
@nictuniema1249 6 жыл бұрын
@@charleshall376 I know more about assembler then about those programs . But I would love to learn more .
@ippsec
@ippsec 6 жыл бұрын
If I do, it'll be blue team focused not red team.
@TheSuperGaco
@TheSuperGaco 6 жыл бұрын
@@ippsec I would love to see some blue team videos, we don't get enough love.
HackTheBox - Tartarsauce
50:01
IppSec
Рет қаралды 30 М.
HackTheBox - Nineveh
52:03
IppSec
Рет қаралды 50 М.
HackTheBox - Sizzle
1:27:59
IppSec
Рет қаралды 45 М.
Ansible 101 - Episode 2 - Ad-hoc tasks and Inventory
1:02:45
Jeff Geerling
Рет қаралды 139 М.
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,5 МЛН
HackTheBox - Bart
1:41:28
IppSec
Рет қаралды 32 М.
HackTheBox - Mist
2:20:46
IppSec
Рет қаралды 17 М.
Gitlab DELETING Production Databases | Prime Reacts
17:27
ThePrimeTime
Рет қаралды 366 М.
Coding a Web Server in 25 Lines - Computerphile
17:49
Computerphile
Рет қаралды 360 М.
Secure TailsOS Setup For The Average Dark Web Enjoyer
18:00
Mental Outlaw
Рет қаралды 167 М.
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,8 МЛН
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Рет қаралды 1,5 МЛН