Thank you for doing this. I am going through HTBA and just watching and taking notes on this is priceless for me.
@RISE_BEFORE_YOU_GREECE2 күн бұрын
Yeaaa,,, Boyz Ippsec Upload 🎉
@mozzamileltayeeb29482 күн бұрын
35:53 what you click on keyboard when you login throw ssh to do port forwarding?
@ВячеславНепохеловский2 күн бұрын
Enter + ~C
@charlesnathansmith2 күн бұрын
On some ssh client versions, you also need to add "EnableEscapeCommandLine yes" to ~/.ssh/config
@blackhacker93932 күн бұрын
What type of terminal you're using?
@juniper1312xКүн бұрын
how did you just get root through duplicati i though it was running inside Docker? where does the “source” directory come from?
@matheusespindola49712 күн бұрын
Ipp, which monitor do you use? I got a 28 inches monitor and is awful to use vms, everything is small and selecting it to strectch in Vmware makes things bigger, but with a very low image quality.
@haidarkaraali2 күн бұрын
how did you know that duplicati was running as root or had the necessary privileges?
@ippsec2 күн бұрын
Educated guess - backup software generally will have full disk access because it needs it companies want a full backup
@user-up2rz4oo7vКүн бұрын
I was thinking, i have never seen you using scp / sftp not even for kraken. Is there a security risk i am not aware of or are you just more used netcat and c/p? I guess for the boxes you don't want always to setup ssh_config. Thanks.
@ippsecКүн бұрын
No security risk - Just easier for me to copy and paste
@enhboldotgonbaatar2482 күн бұрын
absolute cinema
@dopy84182 күн бұрын
If you are into netsec, this is so rich. I watch those just like a hockey player watches hockey games. Rewind every 10 seconds, pause understand his moves. Replicate his moves on my won workstation. I should donate some money to you, how can we do this ? I mean i'm benefiting so much from this.
@ippsec2 күн бұрын
@@dopy8418 I have YT memberships open, I don’t accept donations any other way
@MohanedBakrihamad2 күн бұрын
The TikTok generation need to know that this is the real entertainment🙏🏼
@sotecluxan4221Күн бұрын
What a breeze!
@anonymousvevo8697Күн бұрын
Bravo
@ДмитрийКузнецов-я4д2 күн бұрын
20:00 (password 21,20) should be password(21,40) keep watching, thank you very much in advance! (or am i mistaken)))
@ippsec2 күн бұрын
@@ДмитрийКузнецов-я4д the second number is length. Not start/end.
@GajendraMahat2 күн бұрын
@@ippsecoh, thanks a lot. i had the same doubt.
@jwouterКүн бұрын
Nice but I am missing a lot of enumeration steps making it look so easy.
@mohammadhosein77Күн бұрын
great
@MR-Gh0st_0day2 күн бұрын
Thank IppSec
@Hope-kf1nl2 күн бұрын
@IppSec Blind Boolean-based SQL injection isn't nearly as time-consuming as you suggest-at least, not if you're using the right approach. By implementing a binary search tree in your enumeration script, you can drastically cut down the time it takes to retrieve characters. This technique allows for rapid data extraction, even in a blind scenario. With a bit of scripting finesse, you can efficiently enumerate the target and save yourself a lot of headaches.
@ippsec2 күн бұрын
@@Hope-kf1nl I do show speeding up Boolean SQL injection here: m.kzbin.info/www/bejne/o3ebgmR8ndOIbZI, which probably is the same method you are talking about. You’re still likely making 4-6 requests per character, when this can do 32 characters in a single request. For an md5sum, I believe every character would be 4 requests (maybe 3). So you’re talking about making 64 or 128 requests per password hash versus the 2 requests this way. It’s exponentially faster to go with error injection when you can.
@Hope-kf1nl2 күн бұрын
@@ippsec Yes, this was what I was talking about. Also, yes, no arguing it. You're correct that the error-based strategy is best here.
@tg79432 күн бұрын
Push!
@2187nobody2 күн бұрын
fuck yea
@AUBCodeII2 күн бұрын
Hey Ipp, let's assume, hypothetically, you have 426.8 billion USD. Would you buy an OSCP/OSWE/OSEP/OSED/OSEE voucher pack for all your subscribers and Discord Nitro for all the homies?
@ippsec2 күн бұрын
@@AUBCodeII id buy everyone HTB vouchers, I don’t like the way offsec has gone in the last couple of years. Laying off a lot of their content team left a bad taste in my mouth
@AUBCodeII2 күн бұрын
@ippsec fair enough. I didn't know they laid off their staff
@ippsec2 күн бұрын
@AUBCodeII yup, they got rid of the community team (falconspy/tjnull) ~2 years ago. Then a lot of the content creators (ex: Siren) and such a year ago. To my knowledge a lot of their content is just created by contractors nowadays, which isn’t a recipe for long term success
@AUBCodeII2 күн бұрын
@@ippsec that sucks :(
@GajendraMahat2 күн бұрын
@@ippsec lol, HTB voucher will be more interesting to be honest 🥰