TryHackMe! Buffer Overflow & Penetration Testing

  Рет қаралды 78,693

John Hammond

John Hammond

Күн бұрын

Пікірлер: 83
@stevecooper3574
@stevecooper3574 4 жыл бұрын
That room is a fantastic walkthrough for simple buffer overflows. Great job on the vid and to the room creator!
@Ropex
@Ropex 4 жыл бұрын
Lord Pingu didn't deserve his name to be slandered >:(
@_JohnHammond
@_JohnHammond 4 жыл бұрын
NOOT N00T
@jazzorgangrooves
@jazzorgangrooves 4 жыл бұрын
You are just amazing. Thank you for making such worthful videos. I'm learning so much, everyday, just lookin' at your tutorials. God bless you John
@ChamplooMusashi
@ChamplooMusashi 4 жыл бұрын
Happy to see a video on the whole process of executing a buffer overflow exploit. Helps from the programming side to understand more of what needs to be done to make code more secure (evil strings!)
@TataruTaru
@TataruTaru 4 жыл бұрын
This is one of the first I've seen where we actually fills in the readme. Most of them, he makes the readme, and never goes back to it :)
@bluefloyd9058
@bluefloyd9058 3 жыл бұрын
"noot noot!". That penguin is from a kids show I used to watch here in NZ called pingu.
@nuridincersaygili
@nuridincersaygili 3 жыл бұрын
This is pure gold for me!
@masonfuller9823
@masonfuller9823 4 жыл бұрын
"now we are papa"
@garrettblackard2288
@garrettblackard2288 4 жыл бұрын
Thats so awesome about the room u made congratulations
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Thanks so much! Peak Hill seemed to be well-received!
@crump404
@crump404 4 жыл бұрын
This is a brilliant room John also a brilliant video. Thanks.
@davidfox4253
@davidfox4253 4 жыл бұрын
Thanks for that great walk thru and the "Think allowed" approach!! Cheers
@petehinch3871
@petehinch3871 4 жыл бұрын
Cool man. Learning so much watching your videos
@samsepi0l227
@samsepi0l227 3 жыл бұрын
thank you for everything john!!!
@cooliceman0001
@cooliceman0001 3 жыл бұрын
Thank you for another great video
@mi2has
@mi2has 4 жыл бұрын
buffer overflow part is great
@671Neuhof
@671Neuhof Жыл бұрын
Tryhackme is great for learning. I used to learn new techniques or new languages only on Udemy, but in my opinion I learn much better on THM as it's quite practical. Without your channel id propably never found that website
@Thmyris
@Thmyris 4 жыл бұрын
I did the same thing with wget a few days ago lol. Downloading the source instead of raw output.
@neilthomas5026
@neilthomas5026 4 жыл бұрын
very cool vid as always :) , and cant wait to work on your room :)
@softicecreamer
@softicecreamer 4 жыл бұрын
Even I have the habit of keeping a log/notes/writeup of any ctf or task
@D3fconNull
@D3fconNull 4 жыл бұрын
Here we go, bring it up John :)
@ritabandas
@ritabandas 4 жыл бұрын
Lol that's what I do. Throw my notes on GitHub as a writeup.
@mattstorr
@mattstorr 2 жыл бұрын
Nice run through. was a wee bit fast in some locations though to see what you were doing.
@xBDCFF
@xBDCFF 4 жыл бұрын
4:36 Lies, i screamed ^^
@SiliconSentry
@SiliconSentry 4 жыл бұрын
Did this one last night and got caught at the same point with the 'hidden' passwd file, looking for a file owned by pingu.
@_JohnHammond
@_JohnHammond 4 жыл бұрын
That was tricky! Thanks for watching!
@abdulsamihamedi5584
@abdulsamihamedi5584 2 жыл бұрын
this room took me 4 hours to complete!!!
@cocosloan3748
@cocosloan3748 4 жыл бұрын
Peak hill hype !!! Im choosing not to watch this video (for now) sinve I will try it myself.If I stuck-I know where to find all the answers John :)
@MrZyman
@MrZyman 4 жыл бұрын
Soo good!
@Laflamablanca969
@Laflamablanca969 4 жыл бұрын
Do an easy room for us newbies 😁
@hiimzackjones
@hiimzackjones 3 жыл бұрын
whoa whoa whoa. what is this guake and stabilize shell thing you did? I need that so so much. Incoming DM.
@NeelNarayan
@NeelNarayan 4 жыл бұрын
What does stablise shell do ?
@KaLata123456
@KaLata123456 4 жыл бұрын
Hey John-love your videos , keep it up. On this particular video when you perform the netcat for reverseshell you use 2 commands on the your attacking machine to connect to the victim besides setting up the listener (nc -lnvp 12789). Those 2 commands are nc_reverseshell.sh and nc_stabilize.sh. Can you explain where do you get those executables and how they apply to this use case. Thanks
@znation4434
@znation4434 3 жыл бұрын
Aaand WHAT IS HAPPENING made me laugh lmao
@ashutoshpanda4336
@ashutoshpanda4336 4 жыл бұрын
How come you're not using "dir" option in gobuster in current version it's necessary i guess... ippsec does use it... i struggled with that few times
@AgentPenguinHack
@AgentPenguinHack 4 жыл бұрын
More please!
@_JohnHammond
@_JohnHammond 4 жыл бұрын
More on the way! Thanks so much for watching!
@01nfluence
@01nfluence 4 жыл бұрын
Great video! Do you have a video that explains all of the scripts/repositories you're using? Thanks!
@hypedz1495
@hypedz1495 2 жыл бұрын
John.. john hammond.. ngl the only thing bugging me on this one is the 15% packet drop.
@sol2588
@sol2588 4 жыл бұрын
Does anybody know what software he uses for the Linux terminal? Or is it the default for some distro? Would like to use. Thanks!
@nicolassurfay2585
@nicolassurfay2585 4 жыл бұрын
it's terminator
@Thmyris
@Thmyris 4 жыл бұрын
This box whooped my ass. Certainly not easy for me, I was completely lost at the buffer overflow part. Any good tutorial suggestions fellow commenters?
@gitgudsec
@gitgudsec 2 жыл бұрын
Can't find it - has the room been removed?
@xBDCFF
@xBDCFF 4 жыл бұрын
10:05 I'm just curious, why is it not the best to take it from the repos ? is it not updated regularly ?
@scheli
@scheli 4 жыл бұрын
Mostly for ubuntu universe packages, it will get no updates at all. He is using xenial, the sqlmap package there is 4 years old :)
@Thmyris
@Thmyris 4 жыл бұрын
@@scheli oof
@MD4564
@MD4564 4 жыл бұрын
Nice! What's the command at 16:25 ?
@jovangazivoda2033
@jovangazivoda2033 4 жыл бұрын
you can find it on pentestmonkey(dot)net like it's described in [Task 5] (reverse shell for netcat)
@jeromekim5856
@jeromekim5856 4 жыл бұрын
you the real mvp :'(
@viraat_maurya
@viraat_maurya 4 жыл бұрын
i also try buffer overflow but it printed out permission denied on $ cat /var/backups/shadow.bak
@patonwhite9385
@patonwhite9385 4 жыл бұрын
Can someone comment what the multi window term is? I like the way John jumps quickly to a split for the ping then closes (what hotkeys are being used?)
@zerofuchs6976
@zerofuchs6976 4 жыл бұрын
4:37 - I did!
@lizardfog
@lizardfog 3 жыл бұрын
great, but would have been even better if you slowed down a bit
@sahilsaxena2275
@sahilsaxena2275 4 жыл бұрын
Could please make a video on what you did at 16:21
@mohammdrezamollasalehi4822
@mohammdrezamollasalehi4822 4 жыл бұрын
plz make video for Ignite room !!
@JashanSaini18
@JashanSaini18 4 жыл бұрын
This seems super cool/fun to do. Is there a way to go about learning all this? If so, does anyone have any tips/ places I can go to and learn? (I am brand new to this and would need to start from the very beginning)
@Apathy474
@Apathy474 2 жыл бұрын
What did you end up doing
@mmarsyad
@mmarsyad 4 жыл бұрын
Can i know what the version of ubuntu that you are using now?
@aquibjavedrollnumber1763
@aquibjavedrollnumber1763 4 жыл бұрын
Cade copper??
@traperti9098
@traperti9098 4 жыл бұрын
Where can I start learning about hacking ? I’m very interested
@0xshaheen
@0xshaheen 4 жыл бұрын
I want to know how you are using gobuster without dir flag 😅
@ransomware9086
@ransomware9086 4 жыл бұрын
@Shaun he is using an old version or an alias
@Sutatu
@Sutatu 2 жыл бұрын
10:16-10:20 *me, looking at the time left*: hmmmmmmmm
@ca7986
@ca7986 4 жыл бұрын
♥️
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Sull emply skills development adr parsin skills tools URL grpoing arrows work.
@gianlu9858
@gianlu9858 4 жыл бұрын
Was I the only one havig issue to crack the root password? John takes ages (On the video it looks like more than 24 hours, while doing the room I left it for about 20 mins) and hashcat was not starting (I think some issue with the VMWare environment) have someone sort it out? Any Advice for next time? Thanks :)
@sand3epyadav
@sand3epyadav 3 жыл бұрын
So hard
@viraat_maurya
@viraat_maurya 4 жыл бұрын
also tried your syntax stil same result
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Ceqylenjoy ?
@josephschady1728
@josephschady1728 4 жыл бұрын
What video recording software do you use?
@_JohnHammond
@_JohnHammond 4 жыл бұрын
I use OBS Studio. I should make a tutorial on it soon!
@josephschady1728
@josephschady1728 4 жыл бұрын
John Hammond thank you, pls do! Right now I’m using Kazam but the audio is not the best, that might just be my computer though.
@lama-chan
@lama-chan 2 жыл бұрын
DID YOU JUST SAY "WHATEVER THAT IS" TO PINGU'S NAME??? HOW DARE YOU
@VRWarehouse
@VRWarehouse 4 жыл бұрын
this is a comment.
@cheekibreeki4624
@cheekibreeki4624 4 жыл бұрын
Its pronounced Ping Goo
@jaydensh7380
@jaydensh7380 4 жыл бұрын
Did anyone tell you that you look similar to Harry Potter 😅😅
@sagar2030
@sagar2030 4 жыл бұрын
its better if "Try hack me" do not have hints.
@cassandradawn780
@cassandradawn780 4 жыл бұрын
Help guys i cant think of a good comment
TryHackMe! SweetRice Exploit & Stabilizing Shells
20:25
John Hammond
Рет қаралды 55 М.
Buffer Overflow 101: Ep 3 - Fuzzing the Target
14:57
flipthebit
Рет қаралды 2 М.
If people acted like cats 🙀😹 LeoNata family #shorts
00:22
LeoNata Family
Рет қаралды 20 МЛН
Do you love Blackpink?🖤🩷
00:23
Karina
Рет қаралды 18 МЛН
TryHackMe! PickleRick - BYPASSING Denylists
17:23
John Hammond
Рет қаралды 306 М.
TryHackMe! Sudo - CVE-2019-14287
26:46
John Hammond
Рет қаралды 52 М.
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
John Hammond
Рет қаралды 145 М.
Best 10 Items I Tested in 2024!
20:12
Project Farm
Рет қаралды 562 М.
Buffer Overflows Made Easy - Part 3: Fuzzing
6:27
The Cyber Mentor
Рет қаралды 53 М.
TryHackMe GAMING SERVER - LXD Privilege Escalation
34:50
John Hammond
Рет қаралды 163 М.
TryHackMe! Basic Penetration Testing
30:14
John Hammond
Рет қаралды 2,4 МЛН
Exploit Writing | Buffer Overflow | Reverse Shell Windows 10
18:06
Buffer Overflow 101: Ep 1 - x86 Memory Fundamentals
8:43
flipthebit
Рет қаралды 11 М.
If people acted like cats 🙀😹 LeoNata family #shorts
00:22
LeoNata Family
Рет қаралды 20 МЛН