Someone commented "Watching John makes me realize just how little i actually know about cyber-security". Thanks for giving me a reality check xDDD
@kaviyarasup57354 жыл бұрын
true lol
@GajendraMahat2 жыл бұрын
realted lol🤣😂
@abisrug48984 жыл бұрын
0day was so good in the manner he prepared the box
@0dayCTF4 жыл бұрын
Thank you!!
@abisrug48984 жыл бұрын
@@0dayCTF ur Story is grt and u deserve respect mate
@ronakjoshi50934 жыл бұрын
Ryan is a fighter, he has an epic past♥️♥️ #respect
@anishagrawal70684 жыл бұрын
@@0dayCTF was the initial encrypted RSA key really a rabbit hole?
@0dayCTF4 жыл бұрын
@@anishagrawal7068 Yes, that was a completely fake key. I had to do some things to distract from the real exploit!
@ympaquet4 жыл бұрын
I've been following you for a bit now and I love those "long and boring" parts! Your videos gave me the spark I needed to dive into InfoSec. Keep it going, i'm feeling a little less dumb each time you get a video out! Cheers!
@Tekionemission2 жыл бұрын
(18:57)-SHELL shock reference (20:00)-Need to be an absolute path, cmd using curl (23:41)-Using Metasploit console (26:03)-Upload linpeash via meterpreter (31:04)-searchsploit tack m to mirror the dot c file and upload the dot c file via meterpreter
@adicandra9940 Жыл бұрын
I didn't know shit about hacking, and this video give me so many insight how to do offensive hacking (metasploit, cve, the cve poc, etc). This is literally goldmine. I recommend this channel to any software engineer trying to make sense the "hacking world". I tried to watch LifeOverflow channel and most of the time, the content just went over my head because he mostly doing low level stuff. This channel on the other hand, hits closer to home because I use linux daily, so I already familiar with it.
@testu1testu294 Жыл бұрын
To sum up the things I've learned and needed to learn from this video: God bless you, John Hammond!!
@GuardianNative Жыл бұрын
Okay. I do not understand all of this YET. but this makes me excited to go deeper into it. Lol I can follow along and it actually makes sense to me 😂. Wow this is awesome. Subbed!
@nizaabbie44033 жыл бұрын
Thanks for sharing real way of thinking instand of just showing off the answers eventhough you had already pawnd it. Supporting to you!
@0__0retr0tg62 жыл бұрын
man i love your videos about ctfs, it's really inspiring and motivates me to keep going i like your dynamic of explaining the videos. and you also demystify the idea that to be a good hacker you have to be an elliot alderson keep going all the love in the world
@ElliyahuRosha4 жыл бұрын
Me: Satisfying yt algo. Also me: enjoying every minute watching JH.
@XiSparks4 жыл бұрын
There's that beautiful pea-head!
@osincipeu64122 жыл бұрын
The reaaaal realty hack! Awesome i love it ❤️🔥
@pushkarnandwalkar3 жыл бұрын
solving the machine was fun but infinite scrolling which i didn't knew and I now know was damn good
@abhhibirdawade96574 жыл бұрын
I really enjoy with you and ippsec. You guys are amazing. Like your voice man... See you around
@GuardianNative Жыл бұрын
No.. I understood a lot more than I thought I would ❤❤❤
@mdsazzadhossainsajib13872 жыл бұрын
Great job great tutorial so far i found about try hack mee series. Go ahead John
@stevearivera2 жыл бұрын
Just wow, it was awesome seen this in action!
@Fybir_3 жыл бұрын
that sad moment when he forgets that "export TERM=xterm" allows him to clear screen from the shell
@serpasha Жыл бұрын
Hi John, great job !
@samrudhkashyap28654 жыл бұрын
good content mate!! plz keep uploading such next level crazy stuff
@HomelessDeamon4 жыл бұрын
John Hammond .... +1 You ROCK!!!!!!!!!
@gouthamj75534 жыл бұрын
Oh yeah legend in action 😂😊 waiting John bro ☺️
@danielsalloum30063 жыл бұрын
Educational and entertaining. Excellent.
@richarddalton43054 жыл бұрын
0days box was fun
@koomer22374 жыл бұрын
no idea what the fuck im watching but cool i want to do things now
@ronakjoshi50934 жыл бұрын
Ryan and john big fan ♥️♥️
@0dayCTF4 жыл бұрын
@mrroobt49682 жыл бұрын
thx good joooooooobbb🐯🐯🐯
@mattplaygamez4 жыл бұрын
The next room is OWASP Juice Shop. It would by fun
@Insomniac_Insights4 жыл бұрын
Fun fact: As you know linux sometimes dosen't let you to "do clear screen command". Clear your terminal screen anytime using this guide. Guide: (1)Open terminal and click on 3 dots, then click on preference (2)Then click on 'shortcuts' and then find option named 'reset and clear' option could be 'disabled' (3)Click on "disabled" and enter a special key that you don't use in terminal. (I suggest you use this key)"i am using ''END'' key". And whenever you press that key it will clear terminal screen anywhere.
@camarada19964 жыл бұрын
doesn't 'ctrl+L' work? always use it edit: nvm, probably about the meterperter
@Insomniac_Insights4 жыл бұрын
@@camarada1996 Yes Exactly. When terminal is doing something While processing previously given command, for instance "exploit" in metasploit. You will first have to stop running "whatever" process with Ctrl + c and then you can use "Ctrl + L or clear" command to clear your screen. With method which I wrote, by simply adding a shortcut In terminal you can clear the screen anytime.
@karstenroelofs92163 жыл бұрын
19:04 who else checked their discord?
@UmbraAtrox_3 жыл бұрын
MORE! THE MOB DEMANDS MORE
@derrenmarcusturner4084 жыл бұрын
I had no idea Seth Rogan had this side to him
@0dayCTF4 жыл бұрын
🙏🙏🙏
@_JohnHammond4 жыл бұрын
I SEE YOU BOO
@0dayCTF4 жыл бұрын
Ayeeeeee 🙏🙏
@bgokj14 жыл бұрын
I Really love your energies ngl. Big fan here haha could you maybe give me some tips on how to get better in cyber security? A beginner here haha. Again big fan
@HowToCyber4 жыл бұрын
Energy really comes from passion. Did you see his reaction when he got root ? That was a priceless expression that only comes out if you are passionate about what you are doing.
@Randy-nb6fw9 ай бұрын
why does he prounounce room as rum or rim but not door as dur or dir
@abdullatifnizamani68503 жыл бұрын
amazing dude
@mehammered4 жыл бұрын
I have looked to see if you did a rust scan set up. Could you show how to set up rust scan on kali?
@user-us6qm2dr9u4 жыл бұрын
29:55? Green screen?
@pjrox94584 жыл бұрын
anybody saw the irony that john himself couldn't find ssh2john XP.
@fastshovel70363 жыл бұрын
you were an inspiration to me to start a yt channel in my native language for OffSec and general comluter stuff
@AcezeroGame4 жыл бұрын
Wow there's race to be 1st or 2nd didn't know that XD
@sand3epyadav3 жыл бұрын
Lots of fun
@vb6code4 жыл бұрын
I'm wondering what is the music name n the end!
@causeitis3 жыл бұрын
Why not use tab completion on files and folders in your terminal?
@ChrisLeftBlank10 ай бұрын
wait so what if spoofed the dhcp instead of targeting the service
@ARZ101984 жыл бұрын
John will you showcase HTB battlegrounds ?
@alexpearce30834 жыл бұрын
31:24 nice nice thats why they pay me the big backs XD
@ih3xo.o4334 жыл бұрын
Which os you are using ?
@Bryan_Kay Жыл бұрын
Linux Kali
@chandramouleeswaranv51153 жыл бұрын
Hi John, I want to know is there a way to take priv esc without using kernel exploit on this box?
@jeremyklein9533 жыл бұрын
There was a recent bug in the sudo binary that was recently discovered that is supposed to be ~9 years old. That would probably work
@enadalotaibi81814 жыл бұрын
I hate when already solve it without us
@mikeholmesdj4 жыл бұрын
I think some of the rooms take hours to solve. Couldn't really stream live for that long. Maybe John can answer this a little better.
@enadalotaibi81814 жыл бұрын
@@mikeholmesdj maybe, but it would be awesome if he did
@mikeholmesdj4 жыл бұрын
@@enadalotaibi8181 It would be truly awesome. I'm hoping his 1000th video is going to be something special for us all. He has done 998 at mo.
@fahimprotik32032 жыл бұрын
Hi ,unfortunately my nikto is not showing any shellshock vulnerability, I could only know from your video ,so then in other cases /cgi-bin/test.cgi can be vulnerable then .If I see these somewhere I should try shellshock
@fahimprotik32032 жыл бұрын
I was using parrot os in there nikto doesnt show this vulnerabiltry
@nikolacekov90992 жыл бұрын
Dope
@codekibaat4 жыл бұрын
i love you so much sir
@krlst.59774 жыл бұрын
That was cool
@rahishnamikaze15164 жыл бұрын
I'm a little late but I'm here
@ronnieaggarwal47454 жыл бұрын
love you love from India...........
@psychoSherlock3 жыл бұрын
ssh2john is located on /usr/share/john/ssh2john ❤️
@fedelecavaliere52494 жыл бұрын
What does WAAAAAAAK mean LMAO
@allurbase4 жыл бұрын
Dud, try Turtles? as the password? maybe??
@jackcarter18974 жыл бұрын
I’m getting the ‘cc1’ error message you said you got before filming. Shame you wasn’t able to quickly show what you did to solve it. Made this challenge far too frustrating. I tried to watch your video as less as possible and do it on my own. I thought I was doing something wrong and you ended up using the same exact file as I did, so I knew I didn’t make a mistake. Clearly a bug. Just annoying :(
@Liquidhun4 жыл бұрын
Spoiler alert: 32:58
@cuttlefishn.w.27052 жыл бұрын
In spirit, metasploit is as much cheating as using google. If anything should be considered cheating or cheap, shouldn't it be linpeas? Because you should already know where to check for privesc vectors, whereas expecting you to know every exploit in every language is ridiculous.
@ca79864 жыл бұрын
❤️
@morganpg4 жыл бұрын
hi
@ivanvalentini93454 жыл бұрын
ssh2john, just like other john scripts is located at /usr/share/john/ssh2john.py
@alexpearce30834 жыл бұрын
car . secret ahhahaaha
@NexInfernis3 жыл бұрын
hey john while I try to upload the .c file I'm getting an error "4: Operation failed: 1" and I am using metasploit 6 . Anyone who reads it if he has the solution for this can help me It will be a great pleasure from my side. Please help me with this situation.
@4ag24 жыл бұрын
1st 😎😁
@all_c1ear4 жыл бұрын
msf5 1337
@DarkSide32114 жыл бұрын
Im a 12th grade programming student and seeing this kinda overwhelms me lol
@Dpoint04 жыл бұрын
dont worry broda he is on a very different level, just chill and learn slowly
@jeremyklein9533 жыл бұрын
Sadly this has nearly nothing to do with programming. Just pen testing.
@Daniel-so9rg4 жыл бұрын
6th
@silamoolan52284 жыл бұрын
2st
@whowins344 жыл бұрын
Hello, my fifa21 Account got a transfermarket ban. Could you remove it with nmap or could you show me how i could remove it. Greetings from Germany
@rajith89734 жыл бұрын
0th
@JNET_Reloaded4 жыл бұрын
USE TAB FFS typing filenames in full is anoying asf, type some of it then hit tab!!!! easy!!!!
@jclongy78864 жыл бұрын
Doesn't always work in your shell. You can see that he tried that a few times and had to go back and type the full file name. I do agree with your sentiment though. You get used to the autocomplete.