Another great video, always learing something new. Thanks
@plurby17035 ай бұрын
Thanks Ippsec, this is always refreshing to watch someone do something so smoothly and confidently
@M0h4mud5 ай бұрын
Ippsec rocks 🔥🔥
@alexhusley18903 ай бұрын
Awesome thank you
@drewsky28365 ай бұрын
I had trouble with the Moniker link and NTLM, but smooth sailing otherwise. Thanks Ippsec.
@StevenHokins5 ай бұрын
Cool ❤
@dummyy81454 ай бұрын
I completely stumble into this video and without any knowledge of what is being shown here but somehow I kinda understand it. what I don't get is how did you get from 1 step to another.
@0xchilli5 ай бұрын
🎉🎉🎉🎉
@mohammadhosein775 ай бұрын
Ippsec💥💥💥
@tg79435 ай бұрын
Push!
@hugoaraujo29205 ай бұрын
6:32 ‘Para’ means ‘for’ in spanish
@smbsid5 ай бұрын
@29:10 : using this to enumerate software versions in Windows : Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname; Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname
@ancestrall7945 ай бұрын
Is this your OSCP writeups ? :p
@AUBCodeII4 ай бұрын
You can also run Get-wmiObject -Class win32_product
@Ambassador_Kobi5 ай бұрын
I could not get for the world that Moniker link in the mail to return the NTLM.
@eine3365 ай бұрын
Been stuck on this part too, try resetting the box🤦♂at least this is how I fix it
@Ambassador_Kobi5 ай бұрын
@@eine336 resetting the box, without any change in my commandline, finally fixed it for me
@Lets-Bike-EAT5 ай бұрын
@@eine336 yea me too. I've been stuck since yesterday waiting for the hash in responder.
@Lets-Bike-EAT5 ай бұрын
I was also stuck on this responder not receiving anything. But after maybe 8 times resetting the box from yesterday and today. I managed to get the NTLM hash, try changing the contents of running the CVE, because I just randomly change anything because I don't know what else to do. Best of luck bro.
@Razzkrsimons3 ай бұрын
Am not getting the ntlm hash in the responder , i even tried with impacket.
@mkowalski9972 ай бұрын
i have the same problem
@Marco_RisАй бұрын
Got the right network interface? eth0, tun0
@obiawelbornalfred7035 ай бұрын
@28:06 can someone detail how I could detect the inability to leak NTML hash from the server using file disclosure in a back box perspective
@ippsec5 ай бұрын
If I could grab download.php without the ../, then I know it would be likely the user input isn’t being appended to a string. Also, I don’t believe this would work with a non-internal IP. So if you are coming from the internet windows won’t try to auth via ntlm. This worked because we had an internal ip because of the vpn
@obiawelbornalfred7035 ай бұрын
@@ippsec thanks well explained
@fab5749Ай бұрын
I have tried everything but I don't get anything back. If I'm using Responder, is it ok to use any path for the url parameter? Has to be a specific one with certain permissions on the folder? How do you get \test\meeting ?
@natking1u1z993 ай бұрын
Brought to you by the video search tool he has posted in his links.
@chrysun98915 ай бұрын
para translated to English is the preposition "for"
@AUBCodeII5 ай бұрын
6:39 I'll have to disagree with you on this one, IppLovin. There's a CVE by a Russian researcher called Povandolakoviviscoba Kintayionshinkovjaktuk since you skipped the name I will not tell you the whole story
@Jigsaww645 ай бұрын
Amazing explanations as always IppSec Have you ever considered coaching? I would definitely be interested!
@Smoth485 ай бұрын
*Says one of the very few things in these videos that I fully understand and follow* "Hopefully I didn't confuse the * out of you" Lol trust me Ippsec, I am almost always confused :)
@hydr0nium_4 ай бұрын
Can someone explain how someone should know that stuff in "Important Documents" is opened?
@AUBCodeII4 ай бұрын
By trial and error and guessing, I guess. The official .pdf walkthrough says "Further examination of the filesystem reveals a directory named C:\Important Documents , which seems like a strong candidate for our target location to upload the malicious file due to its promising name".
@nikolanojic68615 ай бұрын
Someone said easy machinesa re not easy anymore and i agree :D
@I_Print_Like_J-Pow5 ай бұрын
Can you make a video about your firefox extensions? Also, why wouldn't you run hashcat in a vm?
@ippsec5 ай бұрын
Because cracking is bound by the speed of your CPU/GPU. If you are running in a VM, you likely aren't dedicated 100% of the processor to the VM so it will go extremely slow.
@ustad-005 ай бұрын
İs this retired machine?
@nournote5 ай бұрын
of course
@0xrobinho0d415 ай бұрын
Ippsec only uploads a writeup for retired machines
@brendonbruh40365 ай бұрын
easy Machines are not Easy nowadays 😂
@rajisimon29433 ай бұрын
what is Kraken ?
@asaduzzamansujon46052 ай бұрын
Kraken is a linux server in his network
@aamirrehman94765 ай бұрын
Normally i dont comment on videos. but i have noticed that IppSec is making alot of mistakes in his recent videos 🤣, like in this video when he typed .bin, i was like nooo bro its .ini not bin. May be he got married 🤣
@berthold95825 ай бұрын
I don't know but for me this box wasn't very realistic. I didn't understand what I was doing. I stopped when I had access to email after BAM!! I crash my brain bug