Liked this box, it has more puzzle-solving rather than actually hunting for vulnarabilities, which is quite a breath of fresh air.
@nareshg72924 жыл бұрын
you have no idea how much i'm learning here . Please never stop doing this.
@marmont80053 жыл бұрын
Big Brother John
@karimmohamed37444 жыл бұрын
Really enjoyed the dive into the unknown territory at the end. Thank you for all your amazing work John.
@Alex-ht1oq4 жыл бұрын
That last segment you did is what changes the game for me, and all other aspiring hackers out there :) really appreciate it John !
@mina_ashraf4 жыл бұрын
You are a true king John. Thank you for your efforts to teach us. Hope you get to 1 millions subs soon
@jd-raymaker4 жыл бұрын
Love the deep dive! very educational
@ElliyahuRosha4 жыл бұрын
That thing with Alice private key- that's why I ALWAYS run "ls -laR /home"
@puppe19774 жыл бұрын
But without read permission it wouldn't show any files in alice home directory.
@infohacking4 жыл бұрын
Simple and easy to understand every step well explained thnx for your efforts 😀😀
@chaosfiredragon77834 жыл бұрын
Awesome walkthrough, all those open ports were messing with me when I first started the room
@trottingfoxinc3 жыл бұрын
John not recognizing the Jabberwock poem even AFTER decrypting it was both painful and hysterical. That's probably what I get watching these videos with an arts degree....
@Marineio2 жыл бұрын
Or the reference "looking glass", and tweedledum, alice, it all makes reference to Lewis Carroll's work!
@svampebob0074 жыл бұрын
Seriously I've been binge watching your videos all day. spamming connections is what lead to the 10600 ban list on my server, I had initially set it to 3 tries max, until I lowered it down to 1 try. the total was around 5000 different IP being blocked (mostly from China/Russia). What really stopped this useless waste of bandwidth was just changing the port for a couple of minutes :) Anyway in my eyes the amount of reasonable attempt you really need to connect to a server is around 1, 2 at most (for critical servers like the one that holds all the pw). That's also how I got banned from my registar :) I fired up a script that would connect back to the tiny VPS I had set up and forgot a character, and sure enough after 4 tries I got kicked off. I really like all the videos I've watched so far, because they really go into details and highlight some of the things that can go wrong in security, but also, most of the issues arise from either easy passwords, or storing the password in plain text on the server, the real juicy parts are random exploitation of an underlying program. So fare I think I'm still secured with my boxes :)
@ricardoruiz39862 жыл бұрын
I love these videos. Every time I watch one of your videos I wonder if you know about clipboard managers lol Clipboard history is SO good.
@sentinalprime88384 жыл бұрын
amazing video again had an amazing learning experience you rock man
@DarkaFire4 жыл бұрын
Great video John, thanks - learnt a lot!
@netharuM3 жыл бұрын
really liked this room and your pwncat thanks for this ❤❤
@BalajiRavichandiran4 жыл бұрын
Nice informative video. Kudos to box Creator.
@nologic184 жыл бұрын
Scrolling through the Linpeas output isn't so bad (except the 3k ports on this one lol), you stop and explain things when you see them. Gives me idea of what I can look for in the future and what it might mean.
@Master_Duplex4 жыл бұрын
tryhackme videos from you always teached me new things. thanks john
@XtecherPY2 жыл бұрын
There was more puzzle than hacking for the first 21 mins 😆
@48pluto3 жыл бұрын
I know some script languages and shell commands but never touched Python. Your'e video are so inspiring that i will start to learn some Python language. Wrote already 4 simple scripts to learn a bit about the syntax just for fun. Thanks for the video!
@richardjones95984 жыл бұрын
Thanks boss! Great content ;)
@OSGoat4 жыл бұрын
Nice Job. Good to see those.
@stefanodevenuto18674 жыл бұрын
What a beautiful video ❤️
@DrRobbo-ig9kn4 жыл бұрын
Aaarggh, How can you have never heard of the Jabberwocky. But apart from that - awseome as usual.
@TimArnoldIsMe3 жыл бұрын
That poem is so etched into my soul that I knew what it was by the char counts of the first line ;)
@samcameron67344 жыл бұрын
I live for that hair
@mehdiboujid87614 жыл бұрын
on fire these last 4 days
@user-rc3tm4of7c4 жыл бұрын
Just like california
@mehdiboujid87614 жыл бұрын
@@user-rc3tm4of7c HAHAHAHHHAHA
@blackjack44944 жыл бұрын
You could use tac command. It's the reverse of cat. No need to explicitly pipe rev
@LikeThizzz3 жыл бұрын
6:30 yea... we both asking the same questions.
@khaloodkj8864 жыл бұрын
11 hours, cant wait!
@kraemrz3 жыл бұрын
love when u ranting!
@ghadeeralhayek43734 жыл бұрын
great man .. jest great
@GameLord20214 жыл бұрын
very nice video thanks for share :)
@mirzu428 ай бұрын
How do you do that prompt --fancy thing in pwncat
@fordorth3 жыл бұрын
@JohnHammond I really like the pwncat deep dive it was nice to see you not just you complete a challange but modify a tool when it did not meet your needs that is what I feel like hacking is at the core! No?
@shreenidhibodas98164 жыл бұрын
Do you run linux in wsl or do you have it installed as your main OS?
@CybrJames4 жыл бұрын
Very excited. I will be in class while watching your video tomorrow lol. I am so far behind on your videos. SUCKS
@ARZ101984 жыл бұрын
Im also too far behind him , i just started to solve boxes but due to university assignments and all that shit i wasn't able to stay focused
@kenLovesToCode4 жыл бұрын
You're soooo awesome!
@Dratted9 Жыл бұрын
heard the intro before i looked at the screen... could've sworn this was seth rogans voice.
@jantvrdy24613 жыл бұрын
6:30 - that's what I thought to myself after trying to run linPeas on a windows machine
@paulsesh4 жыл бұрын
6:30 Maybe I'm too high?
@cdbcbd49304 жыл бұрын
12:21 nmap has script for leet speak. is the direction i would have went. maybe the gobbledygook is base64 or something.
@harleymandk3 жыл бұрын
Great video... I have to try pwncat ;-) - Some ideas for pwncat : In the old days we run Satan on Unix systems (Worked with SCO,Ultrix and HPUX) Today we run "Lynis" on our Linux systems and pipe to to a mail. It gives alot for fail config info and missing updates. Also look for an old nmap or proftpd server....etc (just ask the package system for versions and find the exploit !)
@paulcrinq4 жыл бұрын
What’s the config of the pwncat you’re using ?
@Insomnia_23113 жыл бұрын
good Tutorial:)
@maiky55653 жыл бұрын
why not to use binary search in connecting script?
@praveshgaire34374 жыл бұрын
I am at reboot, I want to solve it myself before watching this video but no cluess, can't wait
@kirandawadi42024 жыл бұрын
Haitt..Hacker
@praveshgaire34374 жыл бұрын
@@kirandawadi4202 ko ho yo pheri
@mble4 жыл бұрын
9:00 you could do this with binary search algorithm
@nareshg72924 жыл бұрын
that's what he did , he even said logn
@niekgevers9814 жыл бұрын
can someones help me. i downloaded pwncat and everything works fine except the privesc command i re downloaded it and it still does't work. is this something i have to add myself or how do i do this?
@batchhd75104 жыл бұрын
Cant you just get around the changing password by injecting your ssh key into the .ssh/authorized_keys before rebooting? (30:45)
@nithechosenoneppon3 жыл бұрын
It's not writable by other users. That wouldn't work. The perms for authorized_keys are "-rw-r--r--" (644) which only allows the owner to write to the file (which is alice). The group and others are only able to read it.
@mehdiboujid87614 жыл бұрын
Are u using ubuntu 16.04 or 20.04 with unity desktop?
@okfine75504 жыл бұрын
This is interesting ....
@cacurazi2 жыл бұрын
I see there's a lot of deciphering going on here... Any good recommendations for cryptographic courses?
@jezielsuzana86434 жыл бұрын
you're the best
@Corybcrook4 жыл бұрын
Are you just slaying the content or what, I see you out there trying the hacks like every day now. GG, John your one of my favorite content creates out there I learn how to be more productive && tactful after MAKE INSTALL your content to the /brain.
@pubgmomenthack124 жыл бұрын
Nice bro ket it up
@ankitkumarjat98864 жыл бұрын
You should make long videos It's great
@JohnDoe-by1xg4 жыл бұрын
U d best john❤❤ I lost the connection twice to the machine by 1.rebooting with a typo in my reverse shell command 2. Hitting ctrl c on nc shell ( forgot to stabalize)🥺🥺😭 #poorme
@ARZ101984 жыл бұрын
Finally with pwncat xD
@FantasM4 жыл бұрын
59 minute video wooooo XD
@karimwassef98924 жыл бұрын
I've been trying to use pwncat for shells but i doesn't work like it does in this clip, it just gives me a shell that is less stable than netcat. I have it downloaded and also the environment but it doesn't seem to run like this clip
@_JohnHammond4 жыл бұрын
Can you give me a bit more detail? What is doing that is different than the video? Are there any errors messages, or strange output? How exactly is it less stable that netcat and what target are you using it against?
@karimwassef98924 жыл бұрын
@@_JohnHammond I removed it and reinstalled it according to the README on the github and now whenever I run it i get a module not found error
@karimwassef98924 жыл бұрын
and I am most likely doing something wrong because I just started learning this stuff.
@israelgonzalez5464 жыл бұрын
What Linux Os is he using?
@peterarbeitsloser78194 жыл бұрын
Ubuntu, but just don't...
@jorisschepers854 жыл бұрын
Best vid so far. Thanks
@stanislavsmetanin1307 Жыл бұрын
"I hope you enjoy this"? Really?? 🙂 I was - freaking - applauded standing 🧍♀️ 👏👏👏👏👏👏👏👏👏 Thanks, John! 🤝
@Joshua1_7sc4 жыл бұрын
They don't teach The Jabberwocky at USCGA?
@anish_chapagai3 жыл бұрын
I would've watched whole stream of you going through this the first time. My opinion is that you create a different channel for streaming these rooms and later use clips from them to create video for this channel.
@mcncyo3 жыл бұрын
Would love it also
@TehPwnerer3 жыл бұрын
automate the process with a bsearch
@MrAvalanches4 жыл бұрын
Does anyone else watch him because he sounds like Seth Rogen... no? Just me? Alright..
@6r0b4 жыл бұрын
The discord link says it is invalid
@6r0b4 жыл бұрын
Works now ^^P
@neils_xd41003 жыл бұрын
u could have done a binary search to find that mid port way faster editing: ohh you have done that
@ino1453 жыл бұрын
9224 though, hope you fixed it, although it's not a huge error xD
@mastex55754 жыл бұрын
youtube allgorithm thing! ;-)
@kenLovesToCode4 жыл бұрын
rabbit hole
@williamn5433 жыл бұрын
vin-ie-ehre
@dranhkwar4 жыл бұрын
Nice ❤️❤️🌹
@zoes174 жыл бұрын
Why `cat | rev` instead of `tac `?
@Cycl_ps4 жыл бұрын
It looks Like tac will reverse line order, but not character order. You could read with 'tac ' and get the same output but it would still need to be piped to 'rev'
@dannyv124 жыл бұрын
Am I the only one that created a python script for the ssh port game ? 😅 Btw thanks to this box I now always do cat /home/*/.ssh/id_rda on each box 😀
@yesstude Жыл бұрын
StrictKeyHeck...
@hamu.u4 жыл бұрын
Can someone help me out am trying to do hackthebox machines and tryhackme using wls2 but am having difficulty when doing web related tasks i can seem to get the ip of machine to work on my Windows host browser
@naomimendoza71644 жыл бұрын
Hey, thanks to the recommendation to me of @ magical hack on Instagram, I unlocked my iCloud in 30 minutes.
@Cycl_ps4 жыл бұрын
You will need to connect your machine to THM's network to use the local IP address provided to you. On the Sidebar go to Access Machines >> Open VPN and follow the instructions there to set up an Open VPN connection. Once done you will be able to connect to any active room on the network.
@davidpanic4 жыл бұрын
I thought this was gonna involve KVM looking-glass :/ dissapointed to say the least.
@notyoursanymore9027 Жыл бұрын
Port 9224
@pubgmomenthack124 жыл бұрын
Kep*
@LinuxJedi3 жыл бұрын
try monitoring ssh conversations first
@Luftbubblan4 жыл бұрын
:D
@noemacias42273 жыл бұрын
find . -not -user alice -ls
@Cooliofamily Жыл бұрын
Lewis Carroll. Pretty interesting stuff, clearly the nonsense poem. Cmon Hammond go take an English course!
@remychaverot29814 жыл бұрын
for i in $(seq 9000 100 13000); do ssh -o StrictHostKeyChecking=no -p $i IP ; done ; echo "John Hammond do the best content of security" :)
@ZakMaxinIT2 жыл бұрын
This was a fun room! Not sure if anyone else had this issue but i was getting the "No matching host key type found. Their offer: ssh-rsa" error message when attempting to SSH to the ports. To get around this I had to add the '-o' switch with 'HostkeyAlogrithms=+ssh-rsa' as the argument so, my working ssh command was: ssh -p 9001 -o HostKeyAlogrithms=+ssh-rsa user@victim.ip hopefully this helps anyone!