HackTheBox Walkthrough // Three

  Рет қаралды 30,829

FindingUrPasswd

FindingUrPasswd

Күн бұрын

Пікірлер: 115
@lucmarrouche71
@lucmarrouche71 10 ай бұрын
I love this guy, great teacher, well spoken, knowledgeable and takes the time to explain things in details
@jhc1979
@jhc1979 2 жыл бұрын
Your explanation made me understand this x10 better than the official HTB tutorial. Thank you!
@IGWIT29
@IGWIT29 Жыл бұрын
Couldn't agree more! Keep up the good work @FindingUrPasswd!!!
@pietrowy-pieriewod-i-subtitr
@pietrowy-pieriewod-i-subtitr Жыл бұрын
For 15:19, if ur gobuster version is 3.5, u'll need to add "--append-domain true" to the command for that the option is by default false. Otherwise, u won't get the subdomain name in the scan result.
@akotamaki3385
@akotamaki3385 Жыл бұрын
Thank you 🙏
@rogert144
@rogert144 Жыл бұрын
Thank you, and Yes for gobuster version above 3.1 we need to use the option --append-domain to view sub domain
@kourygg8738
@kourygg8738 Жыл бұрын
thanks you that wa the same issue l was having appreaciate your help
@defX0bite
@defX0bite Жыл бұрын
great job! Thanks
@9gogox
@9gogox Жыл бұрын
Merci
@jarvis32aj
@jarvis32aj 9 ай бұрын
Awesome walk through, thank you for this. You did a great job of breaking down the "why" that a lot of others might take for granted or skip over, it's greatly appreciated.
@KevinJohn556
@KevinJohn556 9 ай бұрын
Your awesome. Your guides are helping me understand so MUCH MORE! I am half way through my google classes and this is well past what I’m doing right now so I’m getting lost easily. It’s so much easier listening to you than following their write ups.
@karthikbt7239
@karthikbt7239 Жыл бұрын
Hey thank you so much for this tutorial. This box was very challenging for me especially because I'm a complete beginner and have no experience with Amazon. But your explanation on the working of the things in the backend, setting up a reverse shell made things clear. It was challenging to understand all this but hopefully I get better. Your explanation helped me understand this box so much better
@gamingandtech5151
@gamingandtech5151 Жыл бұрын
Best! I understood everything,I had watched many tutorials but didn't understand a thing. Cheers
@itSinger
@itSinger Жыл бұрын
Great explanation. Finally understood this gobuster thing after I spent 2 hours of useless search. Thank u ♥️
@MarcA75
@MarcA75 2 жыл бұрын
For everyone that had the same problem as me that gobuster didn't showed the s3.thethoppers.htb subdomain. The problem comes from a change from gobuster 3.1.0 to 3.2.0. With the current version you have to include the flag --append-domain. So your command should now look like this: gobuster vhost --append-domain -u TARGET -w WORDLIST
@TheAbnormalDesigner
@TheAbnormalDesigner 2 жыл бұрын
There's 2 dashes before append-domain, for those that couldn't see the space :-)
@1amkdm
@1amkdm 2 жыл бұрын
you win the internet today :D
@JuanfeDV
@JuanfeDV 2 жыл бұрын
My respects sir
@AgungDimasIrawan
@AgungDimasIrawan 2 жыл бұрын
thank you sir
@macstar95
@macstar95 2 жыл бұрын
Taz you a real one
@iannavarro138
@iannavarro138 2 жыл бұрын
Incredible video!! I was strugling with the parameters in the url and setting up the listener and this video really help me to understand everything, best of lucks. Hope to see you in the top channels one day!
@shawnawan209
@shawnawan209 2 жыл бұрын
You a G bro! Three days to figure this out and this vid was the one! Was literally 30 seconds from throwing my desktop out the window - appreciate you
@arthurbenavides465
@arthurbenavides465 Жыл бұрын
This is my first htb walkthrough vid i watched. Haven’t done any of my own labs on the site yet. Very informative and well put together. Subscribing!
@cazatesorosmurcia3832
@cazatesorosmurcia3832 Жыл бұрын
Me uno al resto de comentarios. Solo he visto un video y puedo decir que tu forma de explicar es una maravilla. Voy a repasar los walkthroughs que ya habia terminado con tus videos ya que añaden mucha informacion extra e incluso a veces de forma mas practica. Enhorabuena!
@tone_loc
@tone_loc 9 ай бұрын
Great walkthrough! thank you! subscribed!
@nickm1080p
@nickm1080p 2 жыл бұрын
Amazing video, commenting for algo, keep it up. Its hard to find quality HTB videos and you are filling a void in the youtube market!!
@dnk4eva
@dnk4eva Жыл бұрын
This is great man . Thank you for the writeup.
@ditapeskova4
@ditapeskova4 Жыл бұрын
This is a great video. I finally got reverse shells!
@kavishkagihan9495
@kavishkagihan9495 Жыл бұрын
Nice walkthrough. Hope you enjoyed the box!
@papafhill9126
@papafhill9126 Жыл бұрын
This one was super confusing in the walk through, thank you for this video!
@cyberrastachimp
@cyberrastachimp Жыл бұрын
man, great explanation! it was extremely helpful and you’re very talented in teaching!
@haydenbruinsma5091
@haydenbruinsma5091 2 жыл бұрын
Awesome video! I learned a few new methods such as your way of achieving a reverse shell :) love it!
@mikuaster7087
@mikuaster7087 2 жыл бұрын
I really like your videos, it's very helpful for me as a noob,thx.
@smar3tech343
@smar3tech343 2 жыл бұрын
im glad i found this video this will help me understand everything for the oscp test preparing very well explain keep up the good work👍
@Ged325
@Ged325 2 жыл бұрын
Thank you for actually showing the reverse shell. Tutorial was off and have a better understanding of what's going on.
@danielechiappa1046
@danielechiappa1046 Жыл бұрын
Best explanation ever. I really appreciate what you are doing bro
@flintl0ck79
@flintl0ck79 2 жыл бұрын
the --open tag for nmap is clutch, thanks for sharing!
@7311Kento
@7311Kento Жыл бұрын
Que forma tan clara de explicar. Muchas gracias!
@carlosolvera5556
@carlosolvera5556 2 жыл бұрын
you're amazing, man. Thank you for sharing your knowledge about the topic
@danielmoncayo3732
@danielmoncayo3732 2 жыл бұрын
you are an outstanding explainer haha thanks so much for the walkthrough!
@domydew
@domydew Жыл бұрын
you've earned my sub! please do more like this.
@nightenamoured4798
@nightenamoured4798 2 жыл бұрын
A video that deserves million likes
@rodolfomoro2029
@rodolfomoro2029 2 жыл бұрын
Thank you so much for your videos. It's been really helpful
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
Absolutely! I’m glad they’ve been able to help out 😄
@elamishne8982
@elamishne8982 2 жыл бұрын
Thank you! Please continue making more videos.
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
Absolutely! The next one is already in progress
@songyh4290
@songyh4290 2 жыл бұрын
Great explanation! However I think since we can put the php web shell to the bucket to run command on it, we can just pass the command "cat ../flag.txt" to get the flag without using reverse shell.
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
Yep you technically can! However it’s basically always best practice to escalate to a rev shell because it gives us an interactive session with the host and in a real world scenario you’d always want to try to take it a step further to see if you can fully compromise (privilege escalate) a server from an initial foothold! And you need an interactive session to do so! :)
@monkeyparadise8767
@monkeyparadise8767 2 жыл бұрын
Hello from Russia, I love you and your videos. I watch with auto subtitles and even in this case understand your explaining. Waiting for new content 👍
@mohammedhijazi4603
@mohammedhijazi4603 2 жыл бұрын
Your really amazing at explaining things ❤️
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
Thank you ❤️
@mariojules1814
@mariojules1814 8 ай бұрын
Thank you i was ready to give up untill i saw your tutorial.
@timeskipbeatz2990
@timeskipbeatz2990 2 жыл бұрын
thanks a lot man im doing all of them and dont know how to thank you man! i wish you everything you wish, god bless you big brother. also sorry for the bad english
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
no worries! The english is awesome! Glad you like the video :)
@Secure_Play
@Secure_Play 2 жыл бұрын
🥳 Very good walkthrough my friend 🖖
@patriciobriones2536
@patriciobriones2536 Жыл бұрын
i always think shell and reverse shell a little bit confuse, but you make me understad better this way
@Death_User666
@Death_User666 Жыл бұрын
you are a legend sir
@jamesk400
@jamesk400 11 ай бұрын
the walkthrough that HTB provided didn't get me the answer, your explanation got me to the flag, thank you
@lukasjerabek2504
@lukasjerabek2504 Жыл бұрын
Hi could someone please explain to me, why couldnt execute directly the content of shell.sh in the url instead of that curl command? Id be very glad, because it seems like an unnecessary step.
@derekberthiaume5367
@derekberthiaume5367 Жыл бұрын
My Firefox flat out refuses to get the s3 subdomain to show up. I've added it to the etc/hosts. I discovered it in my gobuster but I just read through the walkthrough and skipped the step where I check if it's running
@ArcamNight
@ArcamNight 2 жыл бұрын
it's difficult to do this machine without a walkthrough
@sebangel9182
@sebangel9182 2 жыл бұрын
14:46 where you get a download the list seclists/ Discovery/DNS/... ?
@firefox.3496
@firefox.3496 2 жыл бұрын
you are so underrated.
@twoBitSoda
@twoBitSoda 3 ай бұрын
This is an awesome tutorial! But my netcat can't pick up the command, I can't figure out the issue :(
@Vejinx
@Vejinx Жыл бұрын
My linux installation doesn't have a Dev/TCP directory, is there another way for me to run the reverse shell?
@haydengiles402
@haydengiles402 2 жыл бұрын
when i tried running that gobuster command i do not get the s3 sub domain and i have tried using different lists from the seclist repository
@dbuckner54
@dbuckner54 2 жыл бұрын
I am having the same issue. Have you found a resolution
@dbuckner54
@dbuckner54 2 жыл бұрын
I figured it out use the - - append-domain hope this helps
@nickparisie8741
@nickparisie8741 Жыл бұрын
Try adding -append-domain
@aaronhenderson571
@aaronhenderson571 2 жыл бұрын
Hi! im having a issues with AWS, when I put the commanded in I get a error that reads "could not connect to the endpoint URL" would you know anything about this? Thanks!
@infiniteformless
@infiniteformless Жыл бұрын
did you figure this out im experiencing this same issue
@aaronhenderson571
@aaronhenderson571 Жыл бұрын
@@infiniteformless hey! I did. I had to reboot the box and that seemed to fix it. Hope you figure it out!
@starlox0
@starlox0 2 жыл бұрын
That's too tough...but at last understood 😃
@jamesdaniels2094
@jamesdaniels2094 2 жыл бұрын
I had a few issues along the way, and worked through them on my own with just the papwerwork from HTB and then at the very last step couldnt figure out what I was doing incorrectly at the stage of getting the reverse shell established. - Because i have a VM with kali, and the VPN established on the host, I sort of crashed through this, and have had a hard time wrapping my head around setting up my vm to perform all this - and actually get this all done from the VM
@matheusblimblien8978
@matheusblimblien8978 Жыл бұрын
Hi Dude, could explain for me, why we necessary web server on python? Sorry if u explain in the video, but I'm Brazil and my listening is trash. Thx for that Bro, thx for the content!
@Angel-dq1mo
@Angel-dq1mo Жыл бұрын
Bien explicado, se agradece.
@hichamouabellla9836
@hichamouabellla9836 2 жыл бұрын
i don't know why netcat Don't catch up the connection
@deliciousdestiny450
@deliciousdestiny450 2 жыл бұрын
After getting the listening command ID is not coming which is shown on the http window showing var/www/html $ then nothing can you help
@mcjthemcj521
@mcjthemcj521 Жыл бұрын
Thank you for this walkthrough! The one in pdf on hack the box must have some errors because the python script refused to work. But I've followed your approach for the final step and everything works finally... gosh, what a tiresome machine for a "very easy" instance
@amineboumosbah2126
@amineboumosbah2126 2 жыл бұрын
you are the best thank you
@waipak7378
@waipak7378 2 жыл бұрын
very nice video. :)
@elyjahmusee3733
@elyjahmusee3733 Жыл бұрын
Broooo..Thankyou
@Hunter-em3dr
@Hunter-em3dr 2 жыл бұрын
I can't find ifconfig tun0, do you know why?
@AsrorOdilov-bk5xc
@AsrorOdilov-bk5xc Жыл бұрын
the best
@gregO00O
@gregO00O 2 жыл бұрын
love you
@codewithraiju1424
@codewithraiju1424 2 жыл бұрын
Hello sir great video.. Can you make a video on htb red panda lab?
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
👀👀
@dylancardenas
@dylancardenas 2 жыл бұрын
my kali has no seclists =(
@jonphinguyen
@jonphinguyen 2 жыл бұрын
Great videos! Any chance you'll be joining Odysee?
@Kevindavegan
@Kevindavegan 8 ай бұрын
I didn't get the flag.
@GajendraMahat
@GajendraMahat 2 жыл бұрын
Big Fan bro
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
thanks for the support! :)
@ovejanegra6351
@ovejanegra6351 2 жыл бұрын
este comando subl no me sale
@zayya9362
@zayya9362 2 жыл бұрын
Waiting for so long . Why dont you upload regularly ?
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
Sorry for such a long wait! I was moving into a new apartment and it took me a while to get everything sorted out. I’m going to try to upload a lot more regularly now!
@legalemma
@legalemma 2 жыл бұрын
aws cli isn't installing
@FindingUrPasswd
@FindingUrPasswd 2 жыл бұрын
What is the error you’re getting?
@legalemma
@legalemma 2 жыл бұрын
@@FindingUrPasswd can I send an email with a screenshot? Or on twitter?
@legalemma
@legalemma 2 жыл бұрын
@@FindingUrPasswd I’ve solved it. Thanks
@joseluisramirezpolanco5310
@joseluisramirezpolanco5310 2 жыл бұрын
i cant use comands in the url, i think its because the shell.php dont work it to me, maybe i have to write it of other way, please tell me how i can do it
@priyachhatwani4370
@priyachhatwani4370 2 жыл бұрын
i have used gobuster to find the s3 domain but i tried everything using ffuf can you tell me how to find the subdomain using fuff thanks :)
@therabbit5702
@therabbit5702 2 жыл бұрын
great stuff man i was stuck on this one an was waiting for you to do this video thanks again man From Aus... FollowThewhiteRabbit
@dheerajrp1212
@dheerajrp1212 Жыл бұрын
Please give us more videos like this 🥲 Your explanations are just great
@ovejanegra6351
@ovejanegra6351 2 жыл бұрын
Found: 1 Status: 400 [Size: 306] I only get this because it should come out 03 thetoppers.htb
HackTheBox Walkthrough - Jerry // OSCP Prep
16:22
FindingUrPasswd
Рет қаралды 4,7 М.
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
Cat mode and a glass of water #family #humor #fun
00:22
Kotiki_Z
Рет қаралды 42 МЛН
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.
HackTheBox Walkthrough - Responder (full) // Starting Point
32:31
FindingUrPasswd
Рет қаралды 22 М.
Defeating Facial Recognition - Retia on Hak5
10:00
Hak5
Рет қаралды 468 М.
Hacking Bank from Hackthebox |  HTB Bank Walkthrough | Ethical Hacking
28:17
HackTheBox Walkthrough - Vaccine
42:08
FindingUrPasswd
Рет қаралды 9 М.
Hacking into Google's Network for $133,337
31:32
LiveOverflow
Рет қаралды 1 МЛН
HackTheBox - Analytics
32:44
IppSec
Рет қаралды 13 М.
HackTheBox - Photobomb
20:23
IppSec
Рет қаралды 17 М.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 2,5 МЛН
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН