That room is a fantastic walkthrough for simple buffer overflows. Great job on the vid and to the room creator!
@Ropex4 жыл бұрын
Lord Pingu didn't deserve his name to be slandered >:(
@_JohnHammond4 жыл бұрын
NOOT N00T
@jazzorgangrooves4 жыл бұрын
You are just amazing. Thank you for making such worthful videos. I'm learning so much, everyday, just lookin' at your tutorials. God bless you John
@ChamplooMusashi4 жыл бұрын
Happy to see a video on the whole process of executing a buffer overflow exploit. Helps from the programming side to understand more of what needs to be done to make code more secure (evil strings!)
@TataruTaru4 жыл бұрын
This is one of the first I've seen where we actually fills in the readme. Most of them, he makes the readme, and never goes back to it :)
@bluefloyd90583 жыл бұрын
"noot noot!". That penguin is from a kids show I used to watch here in NZ called pingu.
@nuridincersaygili3 жыл бұрын
This is pure gold for me!
@masonfuller98234 жыл бұрын
"now we are papa"
@garrettblackard22884 жыл бұрын
Thats so awesome about the room u made congratulations
@_JohnHammond4 жыл бұрын
Thanks so much! Peak Hill seemed to be well-received!
@crump4044 жыл бұрын
This is a brilliant room John also a brilliant video. Thanks.
@davidfox42534 жыл бұрын
Thanks for that great walk thru and the "Think allowed" approach!! Cheers
@petehinch38714 жыл бұрын
Cool man. Learning so much watching your videos
@samsepi0l2273 жыл бұрын
thank you for everything john!!!
@cooliceman00013 жыл бұрын
Thank you for another great video
@mi2has4 жыл бұрын
buffer overflow part is great
@671Neuhof Жыл бұрын
Tryhackme is great for learning. I used to learn new techniques or new languages only on Udemy, but in my opinion I learn much better on THM as it's quite practical. Without your channel id propably never found that website
@Thmyris4 жыл бұрын
I did the same thing with wget a few days ago lol. Downloading the source instead of raw output.
@neilthomas50264 жыл бұрын
very cool vid as always :) , and cant wait to work on your room :)
@softicecreamer4 жыл бұрын
Even I have the habit of keeping a log/notes/writeup of any ctf or task
@D3fconNull4 жыл бұрын
Here we go, bring it up John :)
@ritabandas4 жыл бұрын
Lol that's what I do. Throw my notes on GitHub as a writeup.
@mattstorr2 жыл бұрын
Nice run through. was a wee bit fast in some locations though to see what you were doing.
@xBDCFF4 жыл бұрын
4:36 Lies, i screamed ^^
@SiliconSentry4 жыл бұрын
Did this one last night and got caught at the same point with the 'hidden' passwd file, looking for a file owned by pingu.
@_JohnHammond4 жыл бұрын
That was tricky! Thanks for watching!
@abdulsamihamedi55842 жыл бұрын
this room took me 4 hours to complete!!!
@cocosloan37484 жыл бұрын
Peak hill hype !!! Im choosing not to watch this video (for now) sinve I will try it myself.If I stuck-I know where to find all the answers John :)
@MrZyman4 жыл бұрын
Soo good!
@Laflamablanca9694 жыл бұрын
Do an easy room for us newbies 😁
@hiimzackjones3 жыл бұрын
whoa whoa whoa. what is this guake and stabilize shell thing you did? I need that so so much. Incoming DM.
@NeelNarayan4 жыл бұрын
What does stablise shell do ?
@KaLata1234564 жыл бұрын
Hey John-love your videos , keep it up. On this particular video when you perform the netcat for reverseshell you use 2 commands on the your attacking machine to connect to the victim besides setting up the listener (nc -lnvp 12789). Those 2 commands are nc_reverseshell.sh and nc_stabilize.sh. Can you explain where do you get those executables and how they apply to this use case. Thanks
@znation44343 жыл бұрын
Aaand WHAT IS HAPPENING made me laugh lmao
@ashutoshpanda43364 жыл бұрын
How come you're not using "dir" option in gobuster in current version it's necessary i guess... ippsec does use it... i struggled with that few times
@AgentPenguinHack4 жыл бұрын
More please!
@_JohnHammond4 жыл бұрын
More on the way! Thanks so much for watching!
@01nfluence4 жыл бұрын
Great video! Do you have a video that explains all of the scripts/repositories you're using? Thanks!
@hypedz14952 жыл бұрын
John.. john hammond.. ngl the only thing bugging me on this one is the 15% packet drop.
@sol25884 жыл бұрын
Does anybody know what software he uses for the Linux terminal? Or is it the default for some distro? Would like to use. Thanks!
@nicolassurfay25854 жыл бұрын
it's terminator
@Thmyris4 жыл бұрын
This box whooped my ass. Certainly not easy for me, I was completely lost at the buffer overflow part. Any good tutorial suggestions fellow commenters?
@gitgudsec2 жыл бұрын
Can't find it - has the room been removed?
@xBDCFF4 жыл бұрын
10:05 I'm just curious, why is it not the best to take it from the repos ? is it not updated regularly ?
@scheli4 жыл бұрын
Mostly for ubuntu universe packages, it will get no updates at all. He is using xenial, the sqlmap package there is 4 years old :)
@Thmyris4 жыл бұрын
@@scheli oof
@MD45644 жыл бұрын
Nice! What's the command at 16:25 ?
@jovangazivoda20334 жыл бұрын
you can find it on pentestmonkey(dot)net like it's described in [Task 5] (reverse shell for netcat)
@jeromekim58564 жыл бұрын
you the real mvp :'(
@viraat_maurya4 жыл бұрын
i also try buffer overflow but it printed out permission denied on $ cat /var/backups/shadow.bak
@patonwhite93854 жыл бұрын
Can someone comment what the multi window term is? I like the way John jumps quickly to a split for the ping then closes (what hotkeys are being used?)
@zerofuchs69764 жыл бұрын
4:37 - I did!
@lizardfog3 жыл бұрын
great, but would have been even better if you slowed down a bit
@sahilsaxena22754 жыл бұрын
Could please make a video on what you did at 16:21
@mohammdrezamollasalehi48224 жыл бұрын
plz make video for Ignite room !!
@JashanSaini184 жыл бұрын
This seems super cool/fun to do. Is there a way to go about learning all this? If so, does anyone have any tips/ places I can go to and learn? (I am brand new to this and would need to start from the very beginning)
@Apathy4742 жыл бұрын
What did you end up doing
@mmarsyad4 жыл бұрын
Can i know what the version of ubuntu that you are using now?
@aquibjavedrollnumber17634 жыл бұрын
Cade copper??
@traperti90984 жыл бұрын
Where can I start learning about hacking ? I’m very interested
@0xshaheen4 жыл бұрын
I want to know how you are using gobuster without dir flag 😅
@ransomware90864 жыл бұрын
@Shaun he is using an old version or an alias
@Sutatu2 жыл бұрын
10:16-10:20 *me, looking at the time left*: hmmmmmmmm
Was I the only one havig issue to crack the root password? John takes ages (On the video it looks like more than 24 hours, while doing the room I left it for about 20 mins) and hashcat was not starting (I think some issue with the VMWare environment) have someone sort it out? Any Advice for next time? Thanks :)
@sand3epyadav3 жыл бұрын
So hard
@viraat_maurya4 жыл бұрын
also tried your syntax stil same result
@bhagyalakshmi1053 Жыл бұрын
Ceqylenjoy ?
@josephschady17284 жыл бұрын
What video recording software do you use?
@_JohnHammond4 жыл бұрын
I use OBS Studio. I should make a tutorial on it soon!
@josephschady17284 жыл бұрын
John Hammond thank you, pls do! Right now I’m using Kazam but the audio is not the best, that might just be my computer though.
@lama-chan2 жыл бұрын
DID YOU JUST SAY "WHATEVER THAT IS" TO PINGU'S NAME??? HOW DARE YOU
@VRWarehouse4 жыл бұрын
this is a comment.
@cheekibreeki46244 жыл бұрын
Its pronounced Ping Goo
@jaydensh73804 жыл бұрын
Did anyone tell you that you look similar to Harry Potter 😅😅