TryHackMe! PickleRick - BYPASSING Denylists

  Рет қаралды 306,233

John Hammond

John Hammond

Күн бұрын

Пікірлер: 337
@KoalaPlaying
@KoalaPlaying 4 жыл бұрын
I wish to understand what is happening on my screen right now, but I love watching stuff like this
@Jib420
@Jib420 4 жыл бұрын
i dont know why im watching this... i just am
@tanyayadav15
@tanyayadav15 4 жыл бұрын
Same ..
@Nossody
@Nossody 4 жыл бұрын
Lookup Red Hat courses if you want to learn linux :)
@senseifr0st819
@senseifr0st819 4 жыл бұрын
@@Nossody or just use linux and consume someones legg because that also helps
@panicswitch1271
@panicswitch1271 4 жыл бұрын
@@Jib420Half way through the video I asked myself, "how the hell did I get here?"
@ReySoMLB
@ReySoMLB Жыл бұрын
John, I know you're a professional and im still a beginner .. but this was the first 'CTF' that i faced in THM and its labeled as easy. This was impressive but watching you fly through this was very discouraging lol. I've gone through the rooms up to this point in the "complete beginner" path, ive taken notes, studied, and re-read rooms... and i got to this and my brain just fried watching you do this. I couldn't follow what you were doing, you were running so many cmd pages and dropping commands left and right, it was hard to keep up. This is 100% educational and inspiring at least, but holy Christ. I'm subbing now... lol
@kutloano.mp4
@kutloano.mp4 10 ай бұрын
I will come back to this video in the future and I vow to be able to understand this video
@laronthomas2006
@laronthomas2006 9 ай бұрын
I just got lost. I was doing well with easy rooms but now im initimidated
@Alberto-ww7vb
@Alberto-ww7vb 8 ай бұрын
I'm pretty sure he mention that he did the room previously to making the video, but still It wouldn't surprise me if he flew through it. I just did the ctf after around 3 months of learning in the junior pentest path and got stuck in various places running around in circles hahaha. Still I think is a great way to learn to watch someone so experienced to things because we can learn so fu...ng much. Good luck on your learning journey
@onex_vu
@onex_vu 6 ай бұрын
yeh fr, I got lost when I see him doing things. I have learnt so many things like u but it's still not enough
@dreamkiller2693
@dreamkiller2693 5 ай бұрын
​@@kutloano.mp4 come back 😂
@RossMitchell
@RossMitchell 3 жыл бұрын
John - absolutely loving the videos dude. I'm an absolute level 0 n00b so some of this was over my head, but trying my best to work hard and grasp the basics! Appreciate the effort you put into your videos and the time you spend to explain things, you're a top dude. Peace!
@davidthedreamer0
@davidthedreamer0 4 жыл бұрын
Me: Omg, Jon! How many command lines do you know??? Jon: Yes.
@sindrejensen665
@sindrejensen665 4 жыл бұрын
John
@vaishnav3735
@vaishnav3735 2 жыл бұрын
@@sindrejensen665 cena
@pleonexia4772
@pleonexia4772 2 жыл бұрын
That question doesn't even make sense
@IllusionAI
@IllusionAI 2 жыл бұрын
The amount of knowledge this guy possesses is just crazy
@jacquescilliers4511
@jacquescilliers4511 2 жыл бұрын
To be honest as an absolute beginner in the cyber security space, watching videos like this makes me doubt myself, but excites and scares me all the same time
@compote-s1r
@compote-s1r 2 жыл бұрын
Its like learning to code, I remember feeling like shit when learning OOP, today is a second nature and so is ethical hacking, there is a lot to learn, networking, pentesting tool, a bit of programming, linux, windows etc.. but you will get there ! It takes time, lot of it and more with practice
@blazingfalcon7387
@blazingfalcon7387 2 жыл бұрын
I feel the same way lol
@iCyberVenom
@iCyberVenom Жыл бұрын
Well he's absolutely ripping through the challenge at one million miles per hour, so....don't feel bad. He clearly posted this video to showcase his skills and speed, not to teach others. He couldn't possibly type, switch screens/apps, speak any faster than the pace he's moving in this video. Change the playback speed to 1/4 speed and you'll still see he's moving quickly.
@john_wick_catcher26
@john_wick_catcher26 Жыл бұрын
how is it going after 9 months ?
@IGORDYES
@IGORDYES Жыл бұрын
@@iCyberVenomhe clearly stated he spent a while in this before recording. The video is nearly 20 minutes and the box is just about as easy and beginner friendly as they come. He was not trying to show off his skill. It’s clear you need to practice alot. Good luck and cheer up.
@CleanCivilian
@CleanCivilian 2 жыл бұрын
I really wanted to do this room without help, but man... there is just some things i do not know and the 'basic' room did not teach! Thanks for the walkthrough, took notes while following along and trying to figure out as you gave info.
@Godmil
@Godmil 8 ай бұрын
Oh wow, that took me hours 😆 I'm going to write down everything you did here because that was just beautiful seeing how efficiently you got through it.
@jalajkumar9955
@jalajkumar9955 4 жыл бұрын
Hey John! Please create more THM videos, as they are very good for understanding new concepts and ways to exploit a box. Thank You !
@4ag2
@4ag2 4 жыл бұрын
Big fan ! I do learn a lot from you, I'll make sure to support whenever I'll be able to do that. GREAT JOB
@capivaradeprograma
@capivaradeprograma Жыл бұрын
At first I was kind of afraid of not manage to complete this room. But watching your video makes me understand every concept tha I have been through in the path "Web fundamentals" and make this room way less scarier 🤣🤣🤣 Great video
@yankeesouth
@yankeesouth 3 жыл бұрын
Your content has helped me learn so many things. My brain has one wrinkle in it now. Thank you
@Laflamablanca969
@Laflamablanca969 4 жыл бұрын
What a great series. Please keep doing these! :)
@Steefie70
@Steefie70 3 жыл бұрын
Thank you, every day I learn something new, also thanks to you John, you are very fast, but there is no limit to repeat the video (haha). All the best from Rotterdam.
@jamaledineamarir6724
@jamaledineamarir6724 3 жыл бұрын
netcat is actually in there. You can redirect the STDERR output to STDOUT (as no result were shown in the portal.php page). Here's the command for that 10:50 : $ nc --version 2>&1 $ nc -h 2>&1 $ man nc That way, any error (stderr) will be prompted in the web page (stdout), instead of staying blank ^^. $ nc --version doesn't exist
@bcordone
@bcordone 7 ай бұрын
Yep. I found out netcat was on there via man nc, and then I used msfvenom to get the reverse shell. The part that had me stumped was how to get ROOT, ironically. "sudo -s" gave me some sort of error (forgot what it was exactly), su root prompted me for a password I couldn't figure out (I don't think ROOT even has a password in this one. I wonder if it works if you just hit enter without typing anything in) so I never would have thought of trying "sudo su root" which worked without asking for a password. When I saw "you can run all, nopasswd" I thought it meant you could run all commands that don't require a password (i.e. guest access) so I spent a while trying to dig around to see if there was some sort of local privilege escalation exploit but gave up and was asking for help on the discord, then I frustratedly tried sudo cat /etc/shadow after someone pointed out "Doesn't one thing stick out?" and it worked, then I tried sudo su root and got root.
@mvv.3431
@mvv.3431 Ай бұрын
Glad I read your comment this is just brilliant.
@giovanniromio2767
@giovanniromio2767 4 жыл бұрын
Loved the recap at the end. Also perfect editing of the video.
@kyiwong3804
@kyiwong3804 4 ай бұрын
I learn a lot from this video. Thanks.
@nicolaslaborie5015
@nicolaslaborie5015 4 жыл бұрын
for the cat "file" that didn't work, less did :) Very nice walkthrough. It was a fun box :)
@adriasanchez6633
@adriasanchez6633 Жыл бұрын
Thanks John! That was my first ctf, i learned a lot trying stuff and your video gave me the tips i’m not aware of at the moment to run forward.
@patrickavognon2850
@patrickavognon2850 7 ай бұрын
Thanks John, this is video is very helpful
@dopy8418
@dopy8418 4 жыл бұрын
Hey i've see that thumbnail somewhere...
@kentharris7427
@kentharris7427 Жыл бұрын
I like the way you take notes. I am going to implement it since I can use text files over different operating systems. I used Burp suite which didn't work for this room. Typically Burp suite will show the pages of a website which was not the case for this room. I joined THM about a week ago, with a background in IT hardware, so this has been a challenge. Thank you for your video.
@xorinzor
@xorinzor 4 жыл бұрын
7:30 searching for incredibly difficult workarounds, while all he had to do was just add the filename to the base URL since they're located in the webroot, lol.
@imTyp0_
@imTyp0_ 3 жыл бұрын
Commands: less and tac work to read the files. Also everything was doable from the website, aka without a shell
@iCyberVenom
@iCyberVenom Жыл бұрын
I remember thinking, "It's impressive he knows multiple paths to get where he wants to go, but there's no way this is the easiest path"
@CybrJames
@CybrJames 4 жыл бұрын
Damn, you make it look so easy. Hard to follow as a beginner, as I don't always understand. But I will get there. NICE
@masterbloon9812
@masterbloon9812 7 ай бұрын
Ahhhhhhhhhhhh thanks for the tipp with the reverse shell, i was really stuck at that point XD
@real.xplo1t
@real.xplo1t 3 жыл бұрын
strings also helps in the portal.php page. Good stuff
@sfxElrick
@sfxElrick 4 жыл бұрын
@John Hammond you can also use wildcards to evade that type of blacklist: /bin/ca? *.txt will work
@4rikkkk
@4rikkkk 10 ай бұрын
I'm beginner and this is my 3rd machine, I completed it without running a reverse shell, but the fact is I tried to :') I will keep this way to run a revershe shell, thanks!
@rodriquh
@rodriquh 4 жыл бұрын
This was an excellent example of owning a box. Great job using the poor mans pentest, it’s really an awesome accomplishment.
@su8z3r03
@su8z3r03 Жыл бұрын
What is the poor man pentest ?
@CybrJames
@CybrJames 4 жыл бұрын
Kind of cool to see the Thumbnail work you did yesterday live today. Great video. Keep up the great work you're doing.
@sergiohernandez273
@sergiohernandez273 3 жыл бұрын
All this it's awesome, at the beginning, I didn't know how to upload rev' sh, but from now on I can see it's very easy. 'E= Congratulations!
@lavendercode
@lavendercode Ай бұрын
I like how you explain what you were doing.
@talio-5469
@talio-5469 4 жыл бұрын
Liked, already subscribed, and I'm typing things to then press enter.
@lance_lot2866
@lance_lot2866 4 жыл бұрын
Hello, when I walked through this room, I googled commands to output the file contents and one of them was "nl". It is not forbidden and is on the system. And file "second ingredients" I read with the command: "nl /home/rick/second\ ingredients". It's great that you can go through it in different ways.
@TRD_Mike
@TRD_Mike 3 жыл бұрын
Type things in and hit the enter button to submit a comment. Thanks for making this video my dude.
@Nixamina
@Nixamina 4 жыл бұрын
I didn't understand anything but i still watched the whole video.
@Melvin420x12
@Melvin420x12 4 жыл бұрын
It’s worthy to do the basic rooms in TryHackMe. OpenVPN, Linux Basics and Vulnversity. Just those three are enough to understand everything. Personal experience haha
@SeaDraGraphics
@SeaDraGraphics 4 жыл бұрын
man i would love to see another king of the hill livestream
@ggmaxx66
@ggmaxx66 2 жыл бұрын
excellent presentation John!
@DoorThief
@DoorThief 4 жыл бұрын
A web server that executes arbitrary commands, with a couple command blacklists? Man. They should have used a restricted shell for those results.
@Victor-vc9br
@Victor-vc9br 4 жыл бұрын
I’m suprised you used such a complictaed solution to the cat command. I just used less lol
@Helena-xb8io
@Helena-xb8io 4 жыл бұрын
Suffering from knowing too much
@cortex-technologies
@cortex-technologies 4 жыл бұрын
just typed the file name on the browser url bar -.-
@ItzPrayy
@ItzPrayy 4 жыл бұрын
I did too lmao, less -FX
@angel-sc3ms
@angel-sc3ms 3 жыл бұрын
@@cortex-technologies same
@TalsonHacks
@TalsonHacks 3 жыл бұрын
@@Helena-xb8io suffering from success
@Justhangnround
@Justhangnround 10 ай бұрын
Dude, how did you learn all this?
@omerahmed463
@omerahmed463 2 жыл бұрын
You are awesome Love you John
@justangryvideos47
@justangryvideos47 3 жыл бұрын
This is not even close to how I did this ctf. But thats the cool part, there are so many ways to tackle the same room
@andrevwebb
@andrevwebb Жыл бұрын
Wow…..thank you. This is great
@haXez_org
@haXez_org 2 жыл бұрын
Cheers John
@BenKadel
@BenKadel 4 жыл бұрын
Love your videos dude! This was awesome!!!
@the_offsec_noob1120
@the_offsec_noob1120 4 жыл бұрын
You are an awesome mentor.. Thanx you helped a lot and know i started my own channel..
@HackSyndicate
@HackSyndicate Жыл бұрын
less works better than cat for me, in most situations. Great video, thank you!
@Divox_O
@Divox_O 7 ай бұрын
My machine failed to form a reverse shell using your code from github and the online reverse shell generator. What could actually be the problem?
@DrRedrum
@DrRedrum 3 жыл бұрын
that... was.. TOTALLY AWESOME!!! I wanna do stuff like this too! By the way your typing speed is insane!
@CyberDevilSec
@CyberDevilSec 2 жыл бұрын
Holuy shit John you are a ninja at this! Ive seen the intervieuws with networkchuck & David Bombal. And what u do is amazing!
@starcloister4651
@starcloister4651 2 жыл бұрын
I still haven't learned all the stuff he did in the last few minutes. I did the web app hacking path and it taught me a lot but I still feel like it didn't prepare me for this exercise.
@robertoquinones785
@robertoquinones785 3 жыл бұрын
I tried using head, cat and less, and less was the only one who worked. But happy to learn the grep . approach. !
@carnifex17
@carnifex17 2 жыл бұрын
To bypass blacklist in command panel we could just use "less" command
@kevindedecker-bd1pt
@kevindedecker-bd1pt 2 ай бұрын
I like ur workflow👍
@cooliceman0001
@cooliceman0001 3 жыл бұрын
Really enjoy your videos
@osmanisiktas
@osmanisiktas 2 жыл бұрын
He is in another dimension!
@theITGuy-no3nt
@theITGuy-no3nt 3 жыл бұрын
🎥🎬🍿 Its like SecDork movie night! 🍿🎬🎥
@emanuele6
@emanuele6 3 жыл бұрын
7:00 echo < clue.txt this shell code will not print the contents of the clue.txt file. You probably got confused with this (bash only): echo "$(< clue.txt)" Thanks for the video, very nice to watch :)
@bmbiz
@bmbiz 3 жыл бұрын
Which is equivalent to the command substitution "$(cat clue.txt)" ... but faster.
@emanuele6
@emanuele6 3 жыл бұрын
@@bmbiz No... The whole point of using that instead of cat in the context of the video was that you couldn't use cat... echo "$(< clue.txt)" will print the contents of clue.txt without external programs
@bmbiz
@bmbiz 3 жыл бұрын
@@emanuele6 Not sure how you read what I wrote and concluded that I was unaware of that. My comment is a simple fact that people who aren't well-versed in Bash probably don't know.
@emanuele6
@emanuele6 3 жыл бұрын
@@bmbiz That is what he was trying to do in the video; printing the contents of clue.txt, so it is obvious that that is what this shell code is doing in my opinion :/ Also you wrote "is equivalent, but faster": 1. that is arguably true: it's not guaranteed anywhere that $(
@bmbiz
@bmbiz 3 жыл бұрын
​@@emanuele6 Oh, yes, sure, make your long, clueless, point-missing statement then say "we don't need to discuss it any more". Trust me, Skippy, having a continued dialog with someone is obviously socially inept, if not crippled, is not high on my list. Ponder, though, whether your reaction to what is a harmless post about some Bash facts is appropriate. That's right "facts"...everything I said can be found in the Bash man page, you amazing Whiz Kid. LOL.
@rellsw02
@rellsw02 4 жыл бұрын
A great video that you made look very simple.
@snoozybara
@snoozybara 2 жыл бұрын
Hi John thanks for the awesome video! Out of curiosity, how do you split the terminal? Is that the native Ubuntu terminal or did you use something else?
@sean_reyes
@sean_reyes 4 жыл бұрын
Loved it.. it inspires me do to some CTF.. question.. do you really recommend using linux OS for doing stuffs likes this? if so.. what distribution?
@keepercool98
@keepercool98 4 жыл бұрын
Kali
@TheArtyBartfast
@TheArtyBartfast 3 жыл бұрын
I didn't Know John won a Superbowl! Or is that a graduation ring? Either way, I didn't realize that people actually wore those. I thought they were like WWE belts or LARP swords.
@AniruddhaGA
@AniruddhaGA Ай бұрын
well I was stuck commands panel that which commands are blacklisted, to figureout that part
@roundabout5593
@roundabout5593 Жыл бұрын
I understood 80% of the video, I'm proud of myself.
@silf6950
@silf6950 2 жыл бұрын
Thanks for the help!
@rafaeldacosta8581
@rafaeldacosta8581 3 жыл бұрын
7:22 i felt so dumb seeing you have a lil harsh on reavealing txt info when i just entered the full URL with the filename...I felt dumb, because a not even closer being at the same level as you, but i'm working on and i have to start from somewhere right?
@unknwonyes3345
@unknwonyes3345 3 жыл бұрын
WTF the voice of this guy is deep af
@Jsfun
@Jsfun Жыл бұрын
Rough seeing LastPass knowing what we now know.
@nilanjanpaul5723
@nilanjanpaul5723 2 жыл бұрын
At 7:15 instead of the script (I liked that as I alway wanted to learn more of bash) you could have used 'tac' command in Linux which is opposite of 'cat' as it starts printing from bottom towards the top.
@pascalkasparian1316
@pascalkasparian1316 2 жыл бұрын
It's seems so easy for you.. i'am a beginner and it was a little hard for me to understand all stuff ;) Love your vidéo Thx
@keithreynolds4108
@keithreynolds4108 4 жыл бұрын
Gotta say, it's impossible for me to follow that without pausing this but bravo!
@felipecg6587
@felipecg6587 3 жыл бұрын
gracias amigo, you rock!
@onlylikenerd
@onlylikenerd 4 жыл бұрын
Fantastic video!
@tizkit1
@tizkit1 2 жыл бұрын
Thank you for this helpful vid
@natking1u1z99
@natking1u1z99 2 жыл бұрын
The first two flags were simple. But the third was stuck on because i couldn't figure out how review the source code for the php page, even though we didn't need it. Python3 didn't work for me so i had to see if the perl and php commands work which they did. A php shell wouldnt connect but perl reverse shell worked. I going to revisit this room once i really all fet a hold of what im learning . Been working on the support side of IT for 9 years so this is a new realm for me.
@s1ked_416
@s1ked_416 Жыл бұрын
hey how do you get your shell to give you some colors on the text whether it be directories or files and stuff? I saw when you were at "second ingredient" the text was in green, on my shell it didn't gve me that at all... is that dependent of the OS you use or something? if it wasn't for that I wouldn't have been able to figure out that you had to "cat *" the thing to get the 2nd one....
@phoenixbird09
@phoenixbird09 3 жыл бұрын
Thank you!!!
@shubhamsoin2429
@shubhamsoin2429 4 жыл бұрын
Thanks for the super neat walkthrough John. Could you please share the link to the video on setting up a stable reverse shell?
@UsamaAli-kr2cw
@UsamaAli-kr2cw 4 жыл бұрын
python -c 'import pty;pty.spawn("/bin/bash")' Ctrlz stty raw -echo fg Enter key 2 times export TERM=xterm
@SuperMau5head
@SuperMau5head 3 ай бұрын
I dont understand why we have to do lot of things we have never learn before this room...
@nothingreallymatters7530
@nothingreallymatters7530 4 жыл бұрын
i love watching this
@kylemagness5172
@kylemagness5172 4 жыл бұрын
nice stuff! ive gotten into linux a little, have it running on my laptop and RasPI but nothing as cool as this!
@rud2k881
@rud2k881 3 жыл бұрын
good stuff, just one question. at 2:55 how did you pull up the website source like that? thats the one thing thats stumping me about this CTF.
@reidjohnson3964
@reidjohnson3964 2 жыл бұрын
ctrl + u
@androidenthusiast2806
@androidenthusiast2806 2 жыл бұрын
you ran stabilize_shell on your local machine then you got stabilize shell access on the remote machine? there's a step missing here.
@BriariusTitan
@BriariusTitan 3 ай бұрын
I want to know the name of the program that lets him split and edit his shell
@ryzein8450
@ryzein8450 4 жыл бұрын
i don't understand what is he doing, but it's so fun to watch.
@asher.lift42
@asher.lift42 Жыл бұрын
Great video! By the way you can solve the entire thing from the website command panel (without any reverse shell)
@Sami-xv8ve
@Sami-xv8ve 4 жыл бұрын
great video man.
@championparrots2476
@championparrots2476 2 жыл бұрын
Is cybersecurity or software more advantageous? Which should we specialize in
@mr.meatbeat9894
@mr.meatbeat9894 8 ай бұрын
Thanks dude
@bimmerboy18
@bimmerboy18 Жыл бұрын
from someone who is just starting to get into the field, what you are doing is crazy ! Now do the instructions explain how to do all of what your doing or is this a different way to complete the task ? Thanks
@tilde00
@tilde00 8 ай бұрын
Master Linux it’s your best friend
@lugasiyt899
@lugasiyt899 3 жыл бұрын
love ur videosss keep up the good work btw i just did less clue.txt its worked well :)
@fongjon
@fongjon 3 жыл бұрын
A question, at 13:45 ish when quake is used the commands in the script (stablize_shell.sh) are echoed on the other netcat shell, how is this happening? If I do the same on my system the script writes out the commands on the guake shell. What am I missing? Thanks to anyone who can help
@oussamanbou1090
@oussamanbou1090 4 жыл бұрын
i love what you are doing
@comedytime9010
@comedytime9010 2 жыл бұрын
Superb sir ❤️❤️
@RicondaRacing
@RicondaRacing 3 жыл бұрын
Woah, this is a really advanced room...
@iCyberVenom
@iCyberVenom Жыл бұрын
It's actually not - he made it more complex than it had to be
@SDavies2010
@SDavies2010 3 жыл бұрын
Oh man as a noob, I tired to follow getting the stable shell and can't get it to work.. Went to the poor mans pentest video and still didn't know what was going on 😂
@FantasM
@FantasM 4 жыл бұрын
where is archlinux ? xD
@nestorvillafane7737
@nestorvillafane7737 Жыл бұрын
What a ninja.
@Swagg2Foolish
@Swagg2Foolish Ай бұрын
You're so smart 😵‍💫
@notkorean1224
@notkorean1224 4 жыл бұрын
I don't understand anything that is going on but its super entertaining
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
John Hammond
Рет қаралды 145 М.
TryHackMe! DOGCAT - PHP Filters for Local File Inclusion
32:04
John Hammond
Рет қаралды 79 М.
Мама у нас строгая
00:20
VAVAN
Рет қаралды 11 МЛН
ТВОИ РОДИТЕЛИ И ЧЕЛОВЕК ПАУК 😂#shorts
00:59
BATEK_OFFICIAL
Рет қаралды 6 МЛН
Чистка воды совком от денег
00:32
FD Vasya
Рет қаралды 1,9 МЛН
Multiplayer Hacking?! -- King of the Hill by TryHackMe!
40:00
Tyler Ramsbey || Hack Smarter
Рет қаралды 5 М.
TryHackMe! EternalBlue/MS17-010 in Metasploit
28:15
John Hammond
Рет қаралды 272 М.
CTF Walkthrough with John Hammond
28:07
David Bombal
Рет қаралды 181 М.
I Challenged 3 Hackers for 1 Hour in TryHackMe's King of the Hill.
8:30
TryHackMe! Sudo - CVE-2019-14287
26:46
John Hammond
Рет қаралды 52 М.
GoogleCTF - Cross-Site Scripting "Pasteurize"
29:21
John Hammond
Рет қаралды 97 М.
TryHackMe! Skynet - Wildcard Injection
47:18
John Hammond
Рет қаралды 112 М.
Exploiting Tomcat with LFI & Container Privesc - "Tabby" HackTheBox
45:54
Analysing a Firefox Malware browserassist.dll - FLARE-On 2018
16:26
LiveOverflow
Рет қаралды 253 М.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,6 МЛН