At 15:52 it screws up because the output files of the script begins with numbers, which means they become input files for the script :)
@IS33UUU5 жыл бұрын
Learned SO much on this box. Thanks for your walk-through! Cheers
@dylankeir6 жыл бұрын
Your encrypt.sh issue was due to your regex, you were checking if the file started with a number, then anything after. So when you encrypted one of the files, you had a bunch more for the next cypher. A simple $ on the end of the regex would've solved your issue.
@84xyzabc2 жыл бұрын
For those that does not want to copy the whole bunch of lines during 15:52 As correctly pointed out by @JP, the problem is with the file names. I just changed $length$cipher to $cipher$length in openssl cmd. If you do the above, now your ls *.enc | xargs wc -c should be ls ./*.enc | xargs wc -c as now your files names are starting with '-'
@Z3R0xPl01T5 жыл бұрын
do you have any advice on a good book to read about encryption
@fs0c1ety_bs926 жыл бұрын
I used nikto to scan the drupal and didnt even login on admin panel /?q=user/password/
@DavidThomsenPhD6 жыл бұрын
What is the bind keys to copy in tmux at 16:20
@ippsec6 жыл бұрын
Go watch the tmux video, I believe is it Ctrl+[ then space to copy, then Ctrl+]. However it may change depending what mode your in (vi vs emac)
@DavidThomsenPhD6 жыл бұрын
damn, doesn't work for me. :( @@ippsec
@ippsec6 жыл бұрын
Then watch my tmux video - I haven’t changed anything since then and it’s certainly covered there
@mugundhanbalaji6 жыл бұрын
@ippsec did you checked local kali tmp for h2 info leak exploit
@yashwanthkl44206 жыл бұрын
Heyy... 49:30 at this timestamp, you are listening on port 8000 but you don't mention it while pulling the 45105.py file, curl also gave you an error... but i guess you probably didn't notice it.. The script would have worked.. isn't it @ippsec ??
@ippsec6 жыл бұрын
Yup you are correct didn't notice the error - Often times I just skim the screen, since I can't read and talk simultaneously... So just read the start of the last line and it looked like it was valid, didn't read the end. Ha.
@yashwanthkl44206 жыл бұрын
@@ippsec yeah i can understand...😁👍
@jacks163845 жыл бұрын
Awesome hope to see future videos like this
@andreas35784 жыл бұрын
doesn't make sense to cat and then grep although its a common practice. you can just grep .. took me a while to get rid of the habbit.
@douglasmclainberdeaux15346 жыл бұрын
I didn't lose points? Aren't I supposed to lose points/percentage towards my next rank when a box is decommissioned?
@ippsec6 жыл бұрын
Check again, if it doesn't show then it'll probably update tonight. Not sure when points get calculated.
@douglasmclainberdeaux15346 жыл бұрын
@@ippsec Yep, dang it, I just checked again. I guess I am too slow at these. It's hard for me to get a good rank when I have a day+night job and a family lol oh, well.
@fabianasilva93686 жыл бұрын
ola ippsec...boa tarde me chamo fabiana gosto muito dessa area de pentest e ctf...mas so sei o basico de pentest mas criei uma conta no hackthebox e estou assistindo todos videos das maquinas aposentadas e tentando fazer voce acha que estou estudando da forma correta ou voce acha que preciso procurar outra forma de aprendizagem...se voce poder me indicar uns materiais de estudo sobre o assunto agradeço...
@pepemunic36616 жыл бұрын
Hola brasileiro, no creo que te responda ya que habla en ingles. Si no sabes nada no creo que entiendas los videos de ippsec, deberias empezar con lo basico. Que sistema operativo usas? Por ej si usas kali, parrot, black hat, etc. fijate que todos los programas traen manuales de como usarlos. Si no entendes esos manuales pues debes ir aun mas a lo basico. Saludos desde Arg y suerte
@fabianasilva93686 жыл бұрын
@@pepemunic3661 uso o kali light nao é la grande coisa mas da pra quebrar o galho...eu assisto os procedimento de como fazer nas maquinas aposentadas escrevo tudo e em seguida tento fazer nas maquinas...voce pode me indicar algum contudo bom pra mim estudar..???,,,eu leio aquele livro teste de invasao mas so li pra ver se pegava uma base por que as tecnicas desses livros sao tudo ultrapassadas...queria pegar uma base bom mas nao sei como:-(
@juniorGs126 жыл бұрын
Fabiana Mello, ja eh um começo bom. Mas eh importante estudar metodologia de Pentest. Entender cada fase, e gosta de pesquisar. Vulnhub, e hackthebox são ótimos lugares para praticar,mas eh important estudar conceitos também. Espero que isso ajude.
@pepemunic36616 жыл бұрын
@@fabianasilva9368 TENES 2 OPCIONES, SI TENES PLATA (y tiempo) O SINO. SI TENES PLATA: TE LA HAGO CORTA, ESTUDIA ING EN SISTEMAS Y SACA ALGUN MASTER EN SEGURIDAD O HACE CURSOS PARA SACAR CERTIFICACIONES EJEMPLO LAS DE CCNA O CISP O CEH O OCSP. SI NO TENES PLATA: PRIMERO APRENDE A MOVERTE EN LINUX, ENTRA A LA PAGINA OFICIAL DE LINUX Y SI ES KALI LINUX MEJOR, O BACKBOX O PARROT SECURITY, TODOS SON SISTEMAS OPERATIVOS BASADOS EN LINUX (UNIX, LINUX SERIA EL KERNEL) DESPUES QUE APRENDAS EL SISTEMA OPERATIVO LINUX EMPEZA EN APRENDER LAS HERRAMIENTAS QUE HAY EN EL Y CUALES SE USAN, LEE EL MANUAL EN TODOS O EN CASI TODOS ESTAN EN LAS PAGINAS OFICIALES DE SUS CREADORES, PROGRAMAS USADOS EJEMPLO: MSFCONSOLE NMAP ETTERCAP SQLINJECTION AIRCRACK Y TODA LA GAMA DE AIRCRACK. ETC TENES QUE PENSAR Y VIVIR COMO HACKER EN LO QUE RESPECTA A SEGURIDAD, ESO NO SIGNIFICA VIVIR EN LA PC, EJ YO HAGO DEPORTES. ATAQUES SSLSTRIP ATAQUES ARP SPOOFING ATAQUES DNS SPOOFING EN hak5 tenes buenos tutoriales. HACKING THE SOFTWARE INGENIERIA SOCIAL LEER LEER LEER Y MAS LEER Y PRACTICAR, PRACTICAR PRACTICAR. ALGO DE PROGRAMACION DEBES SABER, EJEMPLO APRENDETE PHP O MARIADB (ANTES SE USABA MUCHO MYSQL AHORA MARIADB QUE ES FREESOFTWARE, MYSQL LO COMPRO UNA EMPRESA), PYTHON, JAVA O JAVA SCRIPT, DESPUES SI QUERES HTML Y ESTILOS PERO CON BASE DE DATOS Y PHP MAS ALGUNO DE LOS OTROS QUE TE DIJE EJ PYTHON, JAVA O JAVASCRIPT VAS DE 10. SIN OLVIDAR DE APRENDER A MOVERSE EN WINDOWS TMB QUE CASI TODAS LAS PC HOGAREÑAS USAN WINDOWS: HACE CURSOS POR INTERNET O FIJATE LA AYUDA CONTEXTUAL CUANDO ABRAS CADA COSA: FIREWALL DE WINDOWS (MAS IMPORTANTE QUE UN ANTIVIRUS, ACA VEZ LAS CONEXIONES QUE PERMITES Y CUALES NEGAS EN TU PC) REGISTRO DE WINDOWS CMD (NETSTAT (te fijas la ayuda contextual ej netstat ? o netstat /? o netstat --help no recuerdo), nslookup, ping, tracert o traceroute) SERVICIOS DE WINDOWS APLICACIONES LOGS ETC POR CIERTO SI POR ALGUN MOTIVO MI COMENTARIO CAMBIO TU VIDA, EN 10 AÑOS BUSCAME Y AGRADECEME, ACEPTO DOLARES, EUROS, PESOS ARGENTINOS O UN SIMPLE ABRAZO O QUE AYUDES A OTRA PERSONA.? jejejejeje
@sonyreview22706 жыл бұрын
i don't understand what are you doing in 19:00==>19:10
@ippsec6 жыл бұрын
Openssl isn't limited to just printable ascii characters like a-z, 0-9, etc. That being said I'm use to seeing 'salted_' at the start of files encrypted with openssl. However when using cat to view the contents, I don't see salted. I use xxd to examine the hex, for non-printable characters it displays it as a "." -- Since I see salted_ within xxd, I can assume there are some bytes that are making the salted_ not appear when viewing it in cat.
@sonyreview22706 жыл бұрын
@@ippsec thanx
@darwinyu41716 жыл бұрын
When you select something in Kali, it will automaticly add them to your clipboard, that's why you have trouble at 31:11
@Raul1115916 жыл бұрын
Hey IppSec, what scripting language are you using when you create the encrypt.sh file, just curious. Also what scripting language do you recommend to learn?
@ippsec6 жыл бұрын
That's just bash commands. Learn any language, if you don't know start with python.
@Raul1115916 жыл бұрын
IppSec So I know a bit of python but im guessing it would be good to combine it with bash then to run automations and such...
@V0lk3n_6 жыл бұрын
Fallen angels in the past ^^ now we are checksec! :3 happy you used the owodelta exploit on your video :p
@V0lk3n_6 жыл бұрын
Oh but you fail to use it! XD When you try to import it on the box you are on the good way but you got connection refused the reason why you cant do python exploit.py So for use it, if you want know, i personally do that 1. Make a hidden dir like .test in /tmp/ 2. cd /tmp/.test 3. Upload the exploit on it like you try before 4. Launch it python3 exploit.py -H 127.0.0.1:8082 -D /tmp/.test/ -F /root/root.txt 5. It will save as .zip on tmp/.test folder 6. Encode the zip as base64 7.dedode the base64 on your computer and extract the zip you got root :)
@nickmc016 жыл бұрын
Hmmm I had this done already but HTB is showing is as still active lol.
@ippsec6 жыл бұрын
Yep, I was off by one hour. Had forgotten about DST when scheduling it.
@ScryptStudios14 ай бұрын
Please append the word "Tuah" to the video name. Thanks.
@TsukiCTF6 жыл бұрын
IppSec, the father of Hackthebox
@Exploitmenot6 жыл бұрын
I lost few hours to discover that encryption !!!
@itra73606 жыл бұрын
Hi ippsec, I have problem when I try to connect to server (I connected to HTB labs, but when I put ip on browser, nothing going on) why?
@bnal5tab906 жыл бұрын
Couldn't you just go to root by sudo -u and use daniel password? and thanks for every video you have done a learn alot of things
@ippsec6 жыл бұрын
Yup. However reverse shells can behave funny, if SSH is available I'd rather just log into SSH :)
@effbiai6 жыл бұрын
I believe you actually found a vulnerability when creating new databases with the "test connection". If you haven't done already, please report it to H2.
@MuckingFedic5 жыл бұрын
for those that come after me, for handling the brute force of the encrypted data you can just use this github.com/deltaclock/go-openssl-bruteforce works perfectly
@adamziane6 жыл бұрын
every time i start a box a vid comes out a week later
@ippsec6 жыл бұрын
Boxes are sorted by age - Try picking boxes near the bottom of the list. That being said the best time to watch a video is after you have done a box, or just given up on trying to do a box.
@adamziane6 жыл бұрын
@@ippsec not your fault I just randomly pick one true will help if stuck on a part.
@nictuniema12496 жыл бұрын
Dude I m impressed by your skills ! I love your videos , but do you plan something different as hack the box ? Meybe some tutorials for noobies like me ? Have a gr8 day ✌
@charleshall3766 жыл бұрын
These are pretty much "Noobie" tutorials... Granted some of the concepts and methods are kinda complex, but if u go and look thru the previous videos you will see the method to the madness so to speak
@nictuniema12496 жыл бұрын
@@charleshall376 I know more about assembler then about those programs . But I would love to learn more .
@ippsec6 жыл бұрын
If I do, it'll be blue team focused not red team.
@TheSuperGaco6 жыл бұрын
@@ippsec I would love to see some blue team videos, we don't get enough love.