TryHackMe! Ghostcat CVE-2020-1938

  Рет қаралды 47,806

John Hammond

John Hammond

Күн бұрын

Пікірлер: 57
@technocrats2360
@technocrats2360 4 жыл бұрын
Can you please make a video about tools and shortcuts you use in terminal ,subl and other related stuff for beginners to get advance .
@liamlouw4643
@liamlouw4643 4 жыл бұрын
This would be great! Good suggestion!
@jacobsurles7555
@jacobsurles7555 4 жыл бұрын
I sent an email asking about this exact thing. Of all the people I follow, he moves the most fluidly through his system/applications
@letsgocamping88
@letsgocamping88 4 жыл бұрын
Brent Ford practice!
@cooliceman0001
@cooliceman0001 3 жыл бұрын
He has a video that may help. How to move fast in linux.
@coolhandjake
@coolhandjake 4 жыл бұрын
I have a very VERY small understanding of what you are doing, but still watching you fly through this difficult course with such ease is amazing to watch, also scary knowing that a single exploit can give someone all that info
@PreetisKitchenltr
@PreetisKitchenltr 3 жыл бұрын
11:55 . Who do you think doesn't like your videos? You are out GURU! Man keep it going. We all love your content. Keep rocking 🔥🔥🔥The 13 dislikes are from the people who are jealous.
@Zachsnotboard
@Zachsnotboard 4 ай бұрын
2024 and I just came across this vuln at work lol
@connorsmith9663
@connorsmith9663 4 жыл бұрын
hey man i just found your channel and you're so entertaining im honestly surprised you haven't got more subs!
@ripmeep
@ripmeep 4 жыл бұрын
Great vid John :) I never knew johntheripper could do GPG, I've always been doing it manually rip
@oober66
@oober66 4 жыл бұрын
Nobody: I didn't like this John: Uhhh...well...... I don't know what to tell you
@nixcutus
@nixcutus 4 жыл бұрын
Great Video.
@viswakrb1032
@viswakrb1032 3 жыл бұрын
Lol..It took hours for me and he just made it look soo easy..
@0DayBodyBulder
@0DayBodyBulder 2 жыл бұрын
ur AMAZING
@sasakanjuh7660
@sasakanjuh7660 4 жыл бұрын
Cool one! Looking forward to some NahamCon footage :)
@malcolm2914
@malcolm2914 4 жыл бұрын
Great Video! Ran into this vuln on a recent pen test.
@musicdudejoe263
@musicdudejoe263 4 жыл бұрын
I do not understand a thing you just did but it looked fun.
@adhinvs7132
@adhinvs7132 4 жыл бұрын
True😂😂😂😂
@chiefkhall6726
@chiefkhall6726 4 жыл бұрын
😂😂😂 that's what makes it fun
@Hellohellohello803
@Hellohellohello803 2 жыл бұрын
I haven't seen John swear so much in 1 video. 😄
@uaebikers
@uaebikers 2 жыл бұрын
The end 😂😂
@norsie45
@norsie45 6 ай бұрын
nice!
@maxali6591
@maxali6591 4 жыл бұрын
If people don't like you... they just left the video... putting a down thumb... Because they are mad. Great again. Continue as you use to, you're doing it great!
@365Kedde
@365Kedde 4 жыл бұрын
Hey John, Love your videos, they have greate educattional value for me and you bring great value for new-commers to the community. One thing i would love to see is your setup. so: - What hardware are you using, - What Dist(ubuntu) - What packages and so forth.... i know it kind of a noob question but the best way to improve is to learn from other people and how they opearate.. But i see you use certain packages such as GostBuster instead of dirbuster and i am just curious why you chose the tools, and hardware you did.
@gajrajsingh51
@gajrajsingh51 4 жыл бұрын
Nice outro music
@yajusgakhar6969
@yajusgakhar6969 7 ай бұрын
Apparently you didn't need to log in to merlin to go to his folder and cat out the user.txt file lol
@pranavbanerjee8625
@pranavbanerjee8625 4 жыл бұрын
Please explain what you did after decrypting the hashes_for_john.txt?
@profitmasterynow
@profitmasterynow 4 жыл бұрын
Hey, love your content alot. I'm into cyber security myself aswell. The only thing that I think could give you more views is definitely the thumbnails. They look very messy I'm sure if you were to make them more simple people would watch them more often.
@jb_lofi
@jb_lofi 3 жыл бұрын
First time I've heard you swear and it was super casual. What kind of username was that?!
@monishdhayalan2552
@monishdhayalan2552 4 жыл бұрын
When is the next king of the hill live stream, I have never seen it live. This time I am not gonna sleep the night and watch it live
@_JohnHammond
@_JohnHammond 4 жыл бұрын
This weekend is NahamCon and I am hosting the NahamCon CTF (register here! ctf.nahamcon.com ) so unfortunately not one this weekend, but perhaps after? Thanks so much!
@apechzzz5578
@apechzzz5578 3 жыл бұрын
@@_JohnHammond Hi John! Thanks for the great content. Question: Which else files except /WEB-INF/web.xml are there to read? Cause on my target this file is a standard web.xml file without any valuable information?
@checknate8820
@checknate8820 4 жыл бұрын
Did you try the wonderland CTF on Try Hack Me, I'm busting my brains over it at 2:30 am.
@gafur123456
@gafur123456 4 жыл бұрын
just dont go to rabbit hole
@kraemrz
@kraemrz 4 жыл бұрын
Is nahamcon beginner friendly
@mrsmashberry4340
@mrsmashberry4340 4 жыл бұрын
I must learn to grease my fingers like the master. goal utf-9001 *whispers fading ~finger grease
@0xcallmesenpai
@0xcallmesenpai 4 жыл бұрын
Hi! Just wondering, why did you use gpg2john and what did it do? I believe that file was a private or a public key right? Does that mean If we use ssh2john on a private / public ssh key, we can retrieve thr user password???
@jb_lofi
@jb_lofi 3 жыл бұрын
gpg2john converts the ASC file to a file that can be passed to John The Ripper for a brute force attack. It is not guaranteed to retrieve the password in this manner; in this case, the private key was protected by a weak password contained in the RockYou.txt word list.
@peterarbeitsloser7819
@peterarbeitsloser7819 4 жыл бұрын
Could you please make a video about how to setup Ubuntu for hacking? I know that there is katoolin3 but it doesn't install wordlists and stuff…
@TheBWA2
@TheBWA2 6 ай бұрын
Great exploit! But I am not getting any credential :(
@somebody2023
@somebody2023 4 жыл бұрын
Hi can someone help me to download armitage on kali linux 2020.2 I have the root account and got armitage but got the error datafile does not exist connection refused to database. Error is from Metasploit-framework. I would thank you if anyone could help me.
@grgnizz
@grgnizz 4 жыл бұрын
what a coincidence I just completed this ctf😀 and did learn about pgp encryption 🤓
@ermanfaminiano9756
@ermanfaminiano9756 4 жыл бұрын
Hiii John! From Philippines ♥️
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Hey Erman! Love from the US! Thanks so much for watching!
@m8_981
@m8_981 4 жыл бұрын
One general question .. I thought KZbin forbid „hacking“ videos? Or is this some kind of educational hacking?
@UsamaAli-kr2cw
@UsamaAli-kr2cw 4 жыл бұрын
this is not a real target buddy it is a ctf challenge
@m8_981
@m8_981 4 жыл бұрын
dark knight you don’t say .. but does it matter? I thought it was „hacking“ in general.
@rajeshwaris6663
@rajeshwaris6663 4 жыл бұрын
U can do -w instead of --wordlist
@ItsMeooooooo
@ItsMeooooooo 4 жыл бұрын
Dude, all you do is relying on the work of others. You do nothing with your own knowledge. Just the use of some common tools and googling an exploit is what you do.
@UsamaAli-kr2cw
@UsamaAli-kr2cw 4 жыл бұрын
why reinvent the wheel?
@ItsMeooooooo
@ItsMeooooooo 4 жыл бұрын
@@UsamaAli-kr2cw I can use nmap, a text editor and google allredy by myself. If you enjoy Videos where a guy explains exactly that to you I've a pity on you...
@0xcallmesenpai
@0xcallmesenpai 4 жыл бұрын
Hi! Just wondering, why did you use gpg2john and what did it do? I believe that file was a private or a public key right? Does that mean If we use ssh2john on a private / public ssh key, we can retrieve thr user password???
TryHackMe! Overpass 2  Recovering from THE HACK
21:22
John Hammond
Рет қаралды 33 М.
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
John Hammond
Рет қаралды 145 М.
She wanted to set me up #shorts by Tsuriki Show
0:56
Tsuriki Show
Рет қаралды 8 МЛН
"Идеальное" преступление
0:39
Кик Брейнс
Рет қаралды 1,4 МЛН
ССЫЛКА НА ИГРУ В КОММЕНТАХ #shorts
0:36
Паша Осадчий
Рет қаралды 8 МЛН
GIAIC CMS Headless e-commerce-app #2 | Installation & Intro #viralvideo
9:13
Dynamic Coding with MajidIslam
Рет қаралды 84
Exploiting Apache Tomcat
14:28
Elevate Cyber
Рет қаралды 14 М.
TryHackMe! SweetRice Exploit & Stabilizing Shells
20:25
John Hammond
Рет қаралды 55 М.
catch EVERY reverse shell while hacking! (VILLAIN)
19:03
John Hammond
Рет қаралды 225 М.
TryHackMe - Kenobi Walkthrough
35:37
HackerSploit
Рет қаралды 30 М.
TryHackMe! Exploiting Nagios XI - NAX
30:24
John Hammond
Рет қаралды 27 М.
Exploiting Unauthenticated Redis - TryHackMe!
35:08
John Hammond
Рет қаралды 32 М.
TryHackMe! Tartarus - Website Password Bruteforcing
31:59
John Hammond
Рет қаралды 95 М.
TryHackMe! Overpass - Authentication Bypass
35:18
John Hammond
Рет қаралды 139 М.