I love this guy, great teacher, well spoken, knowledgeable and takes the time to explain things in details
@jhc19792 жыл бұрын
Your explanation made me understand this x10 better than the official HTB tutorial. Thank you!
@IGWIT29 Жыл бұрын
Couldn't agree more! Keep up the good work @FindingUrPasswd!!!
@pietrowy-pieriewod-i-subtitr Жыл бұрын
For 15:19, if ur gobuster version is 3.5, u'll need to add "--append-domain true" to the command for that the option is by default false. Otherwise, u won't get the subdomain name in the scan result.
@akotamaki3385 Жыл бұрын
Thank you 🙏
@rogert144 Жыл бұрын
Thank you, and Yes for gobuster version above 3.1 we need to use the option --append-domain to view sub domain
@kourygg8738 Жыл бұрын
thanks you that wa the same issue l was having appreaciate your help
@defX0bite Жыл бұрын
great job! Thanks
@9gogox Жыл бұрын
Merci
@jarvis32aj9 ай бұрын
Awesome walk through, thank you for this. You did a great job of breaking down the "why" that a lot of others might take for granted or skip over, it's greatly appreciated.
@KevinJohn5569 ай бұрын
Your awesome. Your guides are helping me understand so MUCH MORE! I am half way through my google classes and this is well past what I’m doing right now so I’m getting lost easily. It’s so much easier listening to you than following their write ups.
@karthikbt7239 Жыл бұрын
Hey thank you so much for this tutorial. This box was very challenging for me especially because I'm a complete beginner and have no experience with Amazon. But your explanation on the working of the things in the backend, setting up a reverse shell made things clear. It was challenging to understand all this but hopefully I get better. Your explanation helped me understand this box so much better
@gamingandtech5151 Жыл бұрын
Best! I understood everything,I had watched many tutorials but didn't understand a thing. Cheers
@itSinger Жыл бұрын
Great explanation. Finally understood this gobuster thing after I spent 2 hours of useless search. Thank u ♥️
@MarcA752 жыл бұрын
For everyone that had the same problem as me that gobuster didn't showed the s3.thethoppers.htb subdomain. The problem comes from a change from gobuster 3.1.0 to 3.2.0. With the current version you have to include the flag --append-domain. So your command should now look like this: gobuster vhost --append-domain -u TARGET -w WORDLIST
@TheAbnormalDesigner2 жыл бұрын
There's 2 dashes before append-domain, for those that couldn't see the space :-)
@1amkdm2 жыл бұрын
you win the internet today :D
@JuanfeDV2 жыл бұрын
My respects sir
@AgungDimasIrawan2 жыл бұрын
thank you sir
@macstar952 жыл бұрын
Taz you a real one
@iannavarro1382 жыл бұрын
Incredible video!! I was strugling with the parameters in the url and setting up the listener and this video really help me to understand everything, best of lucks. Hope to see you in the top channels one day!
@shawnawan2092 жыл бұрын
You a G bro! Three days to figure this out and this vid was the one! Was literally 30 seconds from throwing my desktop out the window - appreciate you
@arthurbenavides465 Жыл бұрын
This is my first htb walkthrough vid i watched. Haven’t done any of my own labs on the site yet. Very informative and well put together. Subscribing!
@cazatesorosmurcia3832 Жыл бұрын
Me uno al resto de comentarios. Solo he visto un video y puedo decir que tu forma de explicar es una maravilla. Voy a repasar los walkthroughs que ya habia terminado con tus videos ya que añaden mucha informacion extra e incluso a veces de forma mas practica. Enhorabuena!
@tone_loc9 ай бұрын
Great walkthrough! thank you! subscribed!
@nickm1080p2 жыл бұрын
Amazing video, commenting for algo, keep it up. Its hard to find quality HTB videos and you are filling a void in the youtube market!!
@dnk4eva Жыл бұрын
This is great man . Thank you for the writeup.
@ditapeskova4 Жыл бұрын
This is a great video. I finally got reverse shells!
@kavishkagihan9495 Жыл бұрын
Nice walkthrough. Hope you enjoyed the box!
@papafhill9126 Жыл бұрын
This one was super confusing in the walk through, thank you for this video!
@cyberrastachimp Жыл бұрын
man, great explanation! it was extremely helpful and you’re very talented in teaching!
@haydenbruinsma50912 жыл бұрын
Awesome video! I learned a few new methods such as your way of achieving a reverse shell :) love it!
@mikuaster70872 жыл бұрын
I really like your videos, it's very helpful for me as a noob,thx.
@smar3tech3432 жыл бұрын
im glad i found this video this will help me understand everything for the oscp test preparing very well explain keep up the good work👍
@Ged3252 жыл бұрын
Thank you for actually showing the reverse shell. Tutorial was off and have a better understanding of what's going on.
@danielechiappa1046 Жыл бұрын
Best explanation ever. I really appreciate what you are doing bro
@flintl0ck792 жыл бұрын
the --open tag for nmap is clutch, thanks for sharing!
@7311Kento Жыл бұрын
Que forma tan clara de explicar. Muchas gracias!
@carlosolvera55562 жыл бұрын
you're amazing, man. Thank you for sharing your knowledge about the topic
@danielmoncayo37322 жыл бұрын
you are an outstanding explainer haha thanks so much for the walkthrough!
@domydew Жыл бұрын
you've earned my sub! please do more like this.
@nightenamoured47982 жыл бұрын
A video that deserves million likes
@rodolfomoro20292 жыл бұрын
Thank you so much for your videos. It's been really helpful
@FindingUrPasswd2 жыл бұрын
Absolutely! I’m glad they’ve been able to help out 😄
@elamishne89822 жыл бұрын
Thank you! Please continue making more videos.
@FindingUrPasswd2 жыл бұрын
Absolutely! The next one is already in progress
@songyh42902 жыл бұрын
Great explanation! However I think since we can put the php web shell to the bucket to run command on it, we can just pass the command "cat ../flag.txt" to get the flag without using reverse shell.
@FindingUrPasswd2 жыл бұрын
Yep you technically can! However it’s basically always best practice to escalate to a rev shell because it gives us an interactive session with the host and in a real world scenario you’d always want to try to take it a step further to see if you can fully compromise (privilege escalate) a server from an initial foothold! And you need an interactive session to do so! :)
@monkeyparadise87672 жыл бұрын
Hello from Russia, I love you and your videos. I watch with auto subtitles and even in this case understand your explaining. Waiting for new content 👍
@mohammedhijazi46032 жыл бұрын
Your really amazing at explaining things ❤️
@FindingUrPasswd2 жыл бұрын
Thank you ❤️
@mariojules18148 ай бұрын
Thank you i was ready to give up untill i saw your tutorial.
@timeskipbeatz29902 жыл бұрын
thanks a lot man im doing all of them and dont know how to thank you man! i wish you everything you wish, god bless you big brother. also sorry for the bad english
@FindingUrPasswd2 жыл бұрын
no worries! The english is awesome! Glad you like the video :)
@Secure_Play2 жыл бұрын
🥳 Very good walkthrough my friend 🖖
@patriciobriones2536 Жыл бұрын
i always think shell and reverse shell a little bit confuse, but you make me understad better this way
@Death_User666 Жыл бұрын
you are a legend sir
@jamesk40011 ай бұрын
the walkthrough that HTB provided didn't get me the answer, your explanation got me to the flag, thank you
@lukasjerabek2504 Жыл бұрын
Hi could someone please explain to me, why couldnt execute directly the content of shell.sh in the url instead of that curl command? Id be very glad, because it seems like an unnecessary step.
@derekberthiaume5367 Жыл бұрын
My Firefox flat out refuses to get the s3 subdomain to show up. I've added it to the etc/hosts. I discovered it in my gobuster but I just read through the walkthrough and skipped the step where I check if it's running
@ArcamNight2 жыл бұрын
it's difficult to do this machine without a walkthrough
@sebangel91822 жыл бұрын
14:46 where you get a download the list seclists/ Discovery/DNS/... ?
@firefox.34962 жыл бұрын
you are so underrated.
@twoBitSoda3 ай бұрын
This is an awesome tutorial! But my netcat can't pick up the command, I can't figure out the issue :(
@Vejinx Жыл бұрын
My linux installation doesn't have a Dev/TCP directory, is there another way for me to run the reverse shell?
@haydengiles4022 жыл бұрын
when i tried running that gobuster command i do not get the s3 sub domain and i have tried using different lists from the seclist repository
@dbuckner542 жыл бұрын
I am having the same issue. Have you found a resolution
@dbuckner542 жыл бұрын
I figured it out use the - - append-domain hope this helps
@nickparisie8741 Жыл бұрын
Try adding -append-domain
@aaronhenderson5712 жыл бұрын
Hi! im having a issues with AWS, when I put the commanded in I get a error that reads "could not connect to the endpoint URL" would you know anything about this? Thanks!
@infiniteformless Жыл бұрын
did you figure this out im experiencing this same issue
@aaronhenderson571 Жыл бұрын
@@infiniteformless hey! I did. I had to reboot the box and that seemed to fix it. Hope you figure it out!
@starlox02 жыл бұрын
That's too tough...but at last understood 😃
@jamesdaniels20942 жыл бұрын
I had a few issues along the way, and worked through them on my own with just the papwerwork from HTB and then at the very last step couldnt figure out what I was doing incorrectly at the stage of getting the reverse shell established. - Because i have a VM with kali, and the VPN established on the host, I sort of crashed through this, and have had a hard time wrapping my head around setting up my vm to perform all this - and actually get this all done from the VM
@matheusblimblien8978 Жыл бұрын
Hi Dude, could explain for me, why we necessary web server on python? Sorry if u explain in the video, but I'm Brazil and my listening is trash. Thx for that Bro, thx for the content!
@Angel-dq1mo Жыл бұрын
Bien explicado, se agradece.
@hichamouabellla98362 жыл бұрын
i don't know why netcat Don't catch up the connection
@deliciousdestiny4502 жыл бұрын
After getting the listening command ID is not coming which is shown on the http window showing var/www/html $ then nothing can you help
@mcjthemcj521 Жыл бұрын
Thank you for this walkthrough! The one in pdf on hack the box must have some errors because the python script refused to work. But I've followed your approach for the final step and everything works finally... gosh, what a tiresome machine for a "very easy" instance
@amineboumosbah21262 жыл бұрын
you are the best thank you
@waipak73782 жыл бұрын
very nice video. :)
@elyjahmusee3733 Жыл бұрын
Broooo..Thankyou
@Hunter-em3dr2 жыл бұрын
I can't find ifconfig tun0, do you know why?
@AsrorOdilov-bk5xc Жыл бұрын
the best
@gregO00O2 жыл бұрын
love you
@codewithraiju14242 жыл бұрын
Hello sir great video.. Can you make a video on htb red panda lab?
@FindingUrPasswd2 жыл бұрын
👀👀
@dylancardenas2 жыл бұрын
my kali has no seclists =(
@jonphinguyen2 жыл бұрын
Great videos! Any chance you'll be joining Odysee?
@Kevindavegan8 ай бұрын
I didn't get the flag.
@GajendraMahat2 жыл бұрын
Big Fan bro
@FindingUrPasswd2 жыл бұрын
thanks for the support! :)
@ovejanegra63512 жыл бұрын
este comando subl no me sale
@zayya93622 жыл бұрын
Waiting for so long . Why dont you upload regularly ?
@FindingUrPasswd2 жыл бұрын
Sorry for such a long wait! I was moving into a new apartment and it took me a while to get everything sorted out. I’m going to try to upload a lot more regularly now!
@legalemma2 жыл бұрын
aws cli isn't installing
@FindingUrPasswd2 жыл бұрын
What is the error you’re getting?
@legalemma2 жыл бұрын
@@FindingUrPasswd can I send an email with a screenshot? Or on twitter?
@legalemma2 жыл бұрын
@@FindingUrPasswd I’ve solved it. Thanks
@joseluisramirezpolanco53102 жыл бұрын
i cant use comands in the url, i think its because the shell.php dont work it to me, maybe i have to write it of other way, please tell me how i can do it
@priyachhatwani43702 жыл бұрын
i have used gobuster to find the s3 domain but i tried everything using ffuf can you tell me how to find the subdomain using fuff thanks :)
@therabbit57022 жыл бұрын
great stuff man i was stuck on this one an was waiting for you to do this video thanks again man From Aus... FollowThewhiteRabbit
@dheerajrp1212 Жыл бұрын
Please give us more videos like this 🥲 Your explanations are just great
@ovejanegra63512 жыл бұрын
Found: 1 Status: 400 [Size: 306] I only get this because it should come out 03 thetoppers.htb