TryHackMe! Advent of Cyber Day 16 - Where's Santa?

  Рет қаралды 21,355

John Hammond

John Hammond

Күн бұрын

Пікірлер: 53
@AutumnSkerritt
@AutumnSkerritt 4 жыл бұрын
Good luck on the challenge today! I made it, hope you all have fun 🔥🔥
@thengakola6217
@thengakola6217 4 жыл бұрын
bruh that was awesome
@idoabitoftrolling2172
@idoabitoftrolling2172 4 жыл бұрын
eyy beesec nice
@nashonightmare
@nashonightmare 4 жыл бұрын
Enjoyed it thanks
@akashkashyap8445
@akashkashyap8445 4 жыл бұрын
love the concept you have used to 🔥🔥 to make us learn the concept
@BeerMunkii
@BeerMunkii 4 жыл бұрын
Very fun exercise, thanks!!! ^_^
@bahai02
@bahai02 3 жыл бұрын
The only reason why John Hammond is my favourite teacher is because the way he explained what each and every line of code does.....thanks a lot sir! And lots of love and support from North-east India
@cooliceman0001
@cooliceman0001 3 жыл бұрын
I like that you speak to everyone. I really enjoy watching your videos. Thank you
@donnieb390
@donnieb390 4 жыл бұрын
Hey John, really enjoyed this walk through. You have a great personality for the camera, you seem genuine and passionate about what you do. Keep up the good work. I look forward to following your content!
@BlogTernet
@BlogTernet 4 жыл бұрын
If any of you keep getting error: Couldn't find a tree builder with the features you requested: lxml. Do you need to install a parser library? This worked for me: pip3 install lxml Great Job John!
@asalaa5752
@asalaa5752 4 жыл бұрын
also you can use "html.parser" instead of lxml
@BlogTernet
@BlogTernet 4 жыл бұрын
@@asalaa5752 good to know! Thanks.
@chef3215
@chef3215 3 жыл бұрын
Thx John, for the enlightenment.
@MarcelN1980
@MarcelN1980 4 жыл бұрын
bs4.FeatureNotFound: Couldn't find a tree builder with the features you requested: lxml. Do you need to install a parser library? You need to install lxml also on the machine, I think. just a pipe install lxml should suffice. I used the Attackbox, not some other default Kali machine and installing lxml solved the issue.
@h4cker
@h4cker 2 жыл бұрын
Thanks ☺️
@akashkashyap8445
@akashkashyap8445 4 жыл бұрын
To see John hammond doing walkthrough is always fun with lots of learning 🔥🔥
@SDavies2010
@SDavies2010 4 жыл бұрын
This is definitely not a beginner programming box.
@ManSplained22
@ManSplained22 4 жыл бұрын
your voice is too good it makes your videos even better
@LapisOnTheMoon
@LapisOnTheMoon 4 жыл бұрын
nice video! another way to solve href KeyError is passing href=True to the find_all function i found out :) keep up the good work
@h8handles
@h8handles 4 жыл бұрын
Cool addition with the tablet John
@Sam-ux5rw
@Sam-ux5rw 4 жыл бұрын
I was very tempted to think, literally, outside the box and just run burp on the THM page for the question
@ashiqurrahman275
@ashiqurrahman275 3 жыл бұрын
thanks
@jasonallnutt5049
@jasonallnutt5049 4 жыл бұрын
Hi John, thanks for the video. Is the Attackbox suppose to already have beautifulsoup installed? When I ran the python script it kept telling me "no module names bs4". I tried to run the pip command but these attack boxes don't have internet, right?
@docmalitt
@docmalitt 4 жыл бұрын
hi John, nice, very nice... now I've tried (too) many times learning python and didn't get far... or anywhere tbh. but if you decided to put a course or a larger video with you using python for all those ctf's, answers, tricks, challenges.. u used python (during your long yt career) in numerous videos where I can really see the full potential and power of python in real world env... now that would be something i would pay in gold (or whatever you youngsters use for trading these days)... i'm sure i'm not the only one thinking the same... it's always much easier leaning from examples (not skipping the proper learning curve, of course)
@naeem8434
@naeem8434 2 жыл бұрын
Amazing
@ihak070
@ihak070 4 жыл бұрын
I actually loved the Python series. I was able to find my own solution and it makes me so happy. Really enjoyed this task :)
@deepakkumawatwarrior7776
@deepakkumawatwarrior7776 4 жыл бұрын
Best of luck 👍
@cursem4170
@cursem4170 4 жыл бұрын
Actually, i found IP/static/test. And the answer is just given inside. Is this also meant to be like this?
@dannyv12
@dannyv12 4 жыл бұрын
I found the same thing. I'm also confused because they said you need python. If this is intended I'm really disappointed
@leesugden9555
@leesugden9555 4 жыл бұрын
Damn I spent a good hour before coming to your solution, I still have so much to learn when it comes to python
@GuiltySpark
@GuiltySpark 4 жыл бұрын
ANSWER 3 AND 4 DO NOT WORK FOR ME on this day 16. How is this possible ? i got the same answers but when I copy paste them in to TryHack me it says incorrect
@jamesLG1
@jamesLG1 3 жыл бұрын
the room has been updated. the questions are swapped around.
@bhupatithapa289
@bhupatithapa289 4 жыл бұрын
Nice video bro
@Fahodinho
@Fahodinho 4 жыл бұрын
16:37 i don't get what `link["herf"]` did
@NarendraS
@NarendraS 4 жыл бұрын
it will pick all the links with href attr
@HACKPHILES
@HACKPHILES 4 жыл бұрын
Chill brother love you mahn,😘
@WaseemLaghari
@WaseemLaghari 4 жыл бұрын
love you too
@kalifornia909
@kalifornia909 4 жыл бұрын
how would you print only the api request that was valid in the python script
@batbato9593
@batbato9593 3 жыл бұрын
If u check the output u just jave to say something like "if the json is not of the form {'item_id': XX, 'q': 'Error. Key not valid!'} then print"
@code4720
@code4720 4 жыл бұрын
Anyone have a problem with the api script ? Does not return which key worked .
@cimihan4816
@cimihan4816 4 жыл бұрын
Nope, it works fine
@code4720
@code4720 4 жыл бұрын
@@cimihan4816 didn't work for me
@was3490
@was3490 4 жыл бұрын
#!usr/bin/python3 import requests import time import sys print(len(sys.argv)) if len(sys.argv) != 3: print("usage: \'python3 apikeyscanner.py [TARGET_IP] [TARGET_PORT]\"") sys.exit() target_ip = sys.argv[1] target_port = sys.argv[2] print(f"running against {target_ip}:{target_port}") for i in range(1,101,2): print(f"Checking: {i}",end=" - ") x = requests.get(f"{target_ip}:{target_port}/api/{i}") data = x.json() if "Error. Key not valid!" not in data["q"]: print(f"+++++++++ found key: {i}") print("content:",data["q"]) break elif "SANTA PROTECTION" in data["q"]: print(f"IP BLOCKED: {data['q']}") #continue if input("continue[y/N]") == "y" else break print("invalid",end=" ") time.sleep(5) +++++++++++ Edit: You might need to adjust the indentation bc of youtube.
@ihak070
@ihak070 4 жыл бұрын
@@code4720 Try this: import requests import json for i in range(100): if i % 2 == 1: response = requests.get('YOUR_MACHINE_IP:8000/api/' + str(i)) data = response.json() if data["q"] != "Error. Key not valid!": print(i) break
@code4720
@code4720 4 жыл бұрын
@@ihak070 i will thanks
@Inexpertamit
@Inexpertamit 3 жыл бұрын
I got port 80 open in http
@MukeshSingh-ew7ld
@MukeshSingh-ew7ld 4 жыл бұрын
Here is a new task for you. Find out how many times I pressed that like button. (Hint : Its an odd number)
@Twistidskull
@Twistidskull 4 жыл бұрын
69
@Lakshit.
@Lakshit. 4 жыл бұрын
omg... 401 likes with 0 dislikes.. there u go ❤
@thecscontent5110
@thecscontent5110 4 жыл бұрын
I also do videos about programming!😁
Reversing .NET Applications with ILSpy - TryHackMe AoC2 Day 18
24:40
TryHackMe Advent of Cyber 2: Day 17
35:30
DarkSec
Рет қаралды 11 М.
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
TryHackMe! Tartarus - Website Password Bruteforcing
31:59
John Hammond
Рет қаралды 95 М.
PowerShell in the Filesystem - TryHackMe! Advent of Cyber Day 20
28:51
Decoding with CyberChef - TryHackMe! Advent of Cyber Day 22
27:57
John Hammond
Рет қаралды 36 М.
TryHackMe Advent of Cyber Day 14: Where's Rudolph?
23:11
The Cyber Mentor
Рет қаралды 19 М.
How to Get a Developer Job - Even in This Economy [Full Course]
3:59:46
freeCodeCamp.org
Рет қаралды 3,3 МЛН
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 146 М.
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
John Hammond
Рет қаралды 145 М.
Ansible 101 - Episode 1 - Introduction to Ansible
1:03:43
Jeff Geerling
Рет қаралды 559 М.
Exploiting Unauthenticated Redis - TryHackMe!
35:08
John Hammond
Рет қаралды 32 М.
TryHackMe Advent of Cyber 2: Day 21
15:40
DarkSec
Рет қаралды 9 М.