HackTheBox - Lazy

  Рет қаралды 61,607

IppSec

IppSec

Күн бұрын

00:39 - Basic Web Page Discovery
03:30 - Examining Cookies - Pt1 (Burp Sequencer)
05:05 - Fuzzing Usernames (2nd Order SQL Injection)
07:15 - Examining Cookies - Pt2
07:40 - Cookie Bitflip
12:45 - Oracle Padding Attack - Pt1
15:30 - Rooting the Box
22:50 - Oracle Padding Attack - Pt2

Пікірлер: 57
@Layer8Conference
@Layer8Conference 5 жыл бұрын
One of my favorite things about your videos is that you make mistakes, admit it, don't edit those out and show workarounds. We all run into snags and all to often, youtube tutorial videos only show a clean path. What you show is great because it is the same types of issues that we run into and you show a solution for even little mistakes. Whether it's a typo you did or the box not playing nice, it's always good to see. Thank you.
@sullivancastiel4780
@sullivancastiel4780 3 жыл бұрын
you probably dont care at all but does anyone know a method to log back into an Instagram account..? I was dumb lost the password. I appreciate any tips you can offer me.
@hugojayden9376
@hugojayden9376 3 жыл бұрын
@Sullivan Castiel instablaster =)
@sullivancastiel4780
@sullivancastiel4780 3 жыл бұрын
@Hugo Jayden thanks so much for your reply. I got to the site on google and Im in the hacking process atm. Takes quite some time so I will get back to you later when my account password hopefully is recovered.
@sullivancastiel4780
@sullivancastiel4780 3 жыл бұрын
@Hugo Jayden It worked and I finally got access to my account again. Im so happy! Thank you so much, you really help me out :D
@hugojayden9376
@hugojayden9376 3 жыл бұрын
@Sullivan Castiel You are welcome :D
@neoXXquick
@neoXXquick 7 жыл бұрын
I learn a lot from every video you post.. thx for sharing...
@candyman8451
@candyman8451 6 жыл бұрын
thanx man. This is awesome and learning every day new techniques thanks to you! Thanx again!
@filipdragovic2665
@filipdragovic2665 7 жыл бұрын
Man you are just awesome!!! Learned so much things from you!!
@mabalito
@mabalito 5 жыл бұрын
Your first chmod to set executable bit on cat was with capital X, that's why it didn't work..
@ruhruhruhruhruheisjsij
@ruhruhruhruhruheisjsij 6 жыл бұрын
You should make a video or series on how you learn this stuff. These ctf's always stump me but you seem to always nail them with ease.
@ippsec
@ippsec 6 жыл бұрын
It’s difficult because I’ve been doing this type of stuff for over a decade, so just have a really strong foundation. Additionally, i started out as a sysadmin so had a different starting point when going into security
@creedx8407
@creedx8407 3 жыл бұрын
Watching this one in 2021 lol almost all video i watch it
@berndeckenfels
@berndeckenfels 4 жыл бұрын
It does the explode to extract the username from the cookie I guess, so it results in "user=admin=" -> "user","admin",""
@Hozzizay
@Hozzizay 5 жыл бұрын
host is down so gon' sit back and watch this one
@marcobrandoni8433
@marcobrandoni8433 6 жыл бұрын
Thank you so much for this wonderful video. Lots of things learned today too.
@the_terrorizer
@the_terrorizer 4 жыл бұрын
It's like getting to shadow a senior pentester at work for free, whenever you want, on countless engagements
@jlxip
@jlxip 5 жыл бұрын
Thank you for uploading this and sharing your methods
@rastamouse4946
@rastamouse4946 7 жыл бұрын
I solved with padBuster, but that bit flip thing was a nice tip :)
@securitywarrior7989
@securitywarrior7989 7 жыл бұрын
sir you please also show your solution writeup
@ippsec
@ippsec 7 жыл бұрын
padBuster is in this video as well :) -- Just do it later as it takes some time so padBuster was going in the background while i privesc'd.
@paired7815
@paired7815 5 жыл бұрын
Lots of new things to learn ...i brute foreced the admin using hydra , then used dirtycow
@flofgr575
@flofgr575 6 жыл бұрын
Love your videos! Thanks :)
@howto...6298
@howto...6298 4 жыл бұрын
can you help me out with the Under Construction challange... i dont know where to look :(
@dawnsix
@dawnsix 4 жыл бұрын
Can someone tell me why creating a new cat script with #!/bin/bash does not give root, while #!/bin/sh does?
@alexstoubis890
@alexstoubis890 3 жыл бұрын
Πως τους πετσόκοψες έτσι!; 15:30
@xandercage740
@xandercage740 7 жыл бұрын
Hi @Ippsec.. Love your videos.. Great explanation.. One quick question though.. Could you please guide me how to get this mindset of thinking in the right direction and info of tools and working knowledge of how a particular service works. I am trying hard on my OSCP. One thing I found is no matter how much I learn there is something new always. Please shed some light on how you started and your working knowledge. I wanna get an inside of a hacker's mind. If that makes sense.
@thomaseof2466
@thomaseof2466 7 жыл бұрын
The basis is having a good methodology to cover as much of the attack surface as possible. After that experience and knowledge of all the common services could be very beneficial.
@xandercage740
@xandercage740 7 жыл бұрын
Thomas Underhay right.. But sometime the path is too confusing.
@ippsec
@ippsec 7 жыл бұрын
Hard to say. I was a sysadmin for a decade, so I've spent a lot of time digging into random crap to find silly errors. Thomas EOF said it pretty well. Hacking is more of an art than a science. If you try to cover everything in any phase such as enumeration, you'll never finish. Need to know when you have enough to move on.
@xandercage740
@xandercage740 7 жыл бұрын
IppSec so experience matters a lot!
@justaguy3158
@justaguy3158 7 жыл бұрын
.Legend!! Thank you so much
@saubhagyasrivastava1241
@saubhagyasrivastava1241 7 жыл бұрын
Great stuff! :D
@tyleraustin8134
@tyleraustin8134 7 жыл бұрын
Do you have a terminal add-on? How do you swap terminal sessions like that? I really like it, because I am not a fan of terminator.
@km0x905
@km0x905 7 жыл бұрын
He use tmux , see Popcron Video
@tyleraustin8134
@tyleraustin8134 7 жыл бұрын
Thanks!
@barserbey7123
@barserbey7123 6 жыл бұрын
why in shell not working with #!/bin/bash but working #!/bin/sh. bash and sh similar...? i can not root with #!/bin/bash but im root #!/bin/sh in own cat script?
@energy-tunes
@energy-tunes Жыл бұрын
Great beginner shell
@DefinitelyNotSr.S
@DefinitelyNotSr.S 6 жыл бұрын
Anyone could explain me why the "admin=" register worked? I don't get the "explode" part in the decrypt function. Thanks. Edit1: Could be the case where register process accepts "=" as a valid character, then it creates the user "admin=" but when it tries to login "admin=", it remove all the "=" and login as "admin"?
@paulrobertson9731
@paulrobertson9731 6 жыл бұрын
Where did you find the decrypt function? I also want to have a look, as i'm not sure why the admin= works.
@MrIamedible
@MrIamedible 6 жыл бұрын
Bit late, but essentially the explode function within php splits a string into an array based on a delimiter (in this case '=', so in the standard usage, the encrypted string is 'user=john' which becomes an array of "array('user', 'john')" what list does is assigns those indices within the array to local variables, so in this scenario $user variable becomes 'john' as the 2nd item in the array is the value 'john'. In the case of 'admin=' the encrypted string becomes 'user=admin=' since '=' is the delimiter it becomes the third item in the array, so 'user=admin=foobar' would create an array of "array('user', 'admin', ''). So it effectively strips any of the delimiters from the string. In php: php > $f = 'user=john'; php > print_r(explode('=', $f)); Array ( [0] => user [1] => john ) php > $f = 'user=admin='; php > print_r(explode('=', $f)); Array ( [0] => user [1] => admin [2] => ) Hope that helps!
@darwinyu4171
@darwinyu4171 5 жыл бұрын
@@MrIamedible Very helpful !!
@TheAmzuk
@TheAmzuk 5 жыл бұрын
@@MrIamedible thanks for such clear explanation
@aidenpierce5397
@aidenpierce5397 4 жыл бұрын
what's the point of adding a bunch of space behind admin?
@happyharry2145
@happyharry2145 4 жыл бұрын
trying different stuff to figure out what he's allowed to insert in that input
@sarrcheikh9095
@sarrcheikh9095 5 жыл бұрын
Great tutorial but next time try to zoom enough because it is difficile to read what you key in.
@correabuscar
@correabuscar Жыл бұрын
hash -r , for the cat issue
@pratikktejani9655
@pratikktejani9655 7 жыл бұрын
I am looking for step by step tutorial regarding shellshock. If you have it then kindly upload it as soon as possible.
@ippsec
@ippsec 7 жыл бұрын
I do shell shock in beep.
@7Shol
@7Shol 4 жыл бұрын
From 17:20 i have no idea what you're doing :/
@happyharry2145
@happyharry2145 4 жыл бұрын
he's using the gdb debugger to look into the (backup) program as it runs and see what it's doing then he figures out its running the command (cat /etc/passwd) by reading from that address from the program , then notices that the command is using relative paths instead of absolute path so he then adds his own path to the variable $PATH so his program (which is also named cat) runs first and his program is a script that runs a shell (/bin/sh) thus giving him a shell as root
@KshitijGunjale
@KshitijGunjale 6 жыл бұрын
Wow awesome I tried both tricks on HackTheBox - I know Mag1c but its not working :'(
@RowanSheridan
@RowanSheridan 7 жыл бұрын
kzbin.info/www/bejne/aYfbi4Gcoa-kqdk i think it didnt work as you used a capital X instead of lowercase x
@Sachin_Sinh_Chouhan
@Sachin_Sinh_Chouhan 10 ай бұрын
i need your help regarding my crypto wallet dat file i need its password how can i contact you
HackTheBox - Haircut
35:18
IppSec
Рет қаралды 43 М.
HackTheBox - iClean
34:20
IppSec
Рет қаралды 10 М.
إخفاء الطعام سرًا تحت الطاولة للتناول لاحقًا 😏🍽️
00:28
حرف إبداعية للمنزل في 5 دقائق
Рет қаралды 79 МЛН
Миллионер | 2 - серия
16:04
Million Show
Рет қаралды 1,4 МЛН
РОДИТЕЛИ НА ШКОЛЬНОМ ПРАЗДНИКЕ
01:00
SIDELNIKOVVV
Рет қаралды 3,9 МЛН
Сюрприз для Златы на день рождения
00:10
Victoria Portfolio
Рет қаралды 2 МЛН
HackTheBox - Jab
40:07
IppSec
Рет қаралды 10 М.
HackTheBox - Mailing
34:35
IppSec
Рет қаралды 11 М.
HackTheBox - Crafty
26:17
IppSec
Рет қаралды 13 М.
HackTheBox - Perfection
29:25
IppSec
Рет қаралды 15 М.
HackTheBox - WifineticTwo
33:47
IppSec
Рет қаралды 9 М.
HackTheBox - Office
1:16:05
IppSec
Рет қаралды 12 М.
HackTheBox - POV
41:08
IppSec
Рет қаралды 10 М.
HackThebox - Boardlight
46:33
IppSec
Рет қаралды 8 М.
HackTheBox - EvilCUPS
43:25
IppSec
Рет қаралды 9 М.
HackTheBox - Runner
46:12
IppSec
Рет қаралды 10 М.
إخفاء الطعام سرًا تحت الطاولة للتناول لاحقًا 😏🍽️
00:28
حرف إبداعية للمنزل في 5 دقائق
Рет қаралды 79 МЛН