- 761
- 110 283
Junhua Wong
United States
เข้าร่วมเมื่อ 9 ส.ค. 2013
Cyber security, pentesting, Python for security
Cyber Security | Pentesting | Vulnhub | Walkthrough | BlackMarket | SQLI | Decryption
Pentesting Lab Exercises Series - Vulnhub
Virtual Machine Name: BlackMarket: 1
Link: www.vulnhub.com/entry/blackmarket-1,223/
My Twitter:@ junhua_cyber
Tips:
1. Another MD5 decryption:
www.md5online.org/md5-decrypt.html
2. Convert hex to string
www.rapidtables.com/convert/number/hex-to-ascii.html
3. Vigenere decrypt:
www.quipqiup.com/#google_vignette
Virtual Machine Name: BlackMarket: 1
Link: www.vulnhub.com/entry/blackmarket-1,223/
My Twitter:@ junhua_cyber
Tips:
1. Another MD5 decryption:
www.md5online.org/md5-decrypt.html
2. Convert hex to string
www.rapidtables.com/convert/number/hex-to-ascii.html
3. Vigenere decrypt:
www.quipqiup.com/#google_vignette
มุมมอง: 71
วีดีโอ
Cyber Security | Pentesting | Vulnhub | Walkthrough | Gemini Inc 2 | Python | Command Execution
มุมมอง 3344 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Gemini Inc: 2 Link: www.vulnhub.com/entry/gemini-inc-2,234/ My Twitter:@ junhua_cyber Tips: 1. Uses Python to crack activation code rather than Burp-suite or others. Cookies should be considered. 2. Has to escape blacklist of command execution. 3. Python regular expression editor: pythex.org/ 4. Redis penetration: book.hacktricks.x...
Cyber Security | Pentesting | Vulnhub | Walkthrough | Android 4 | Phonesploit | Metasploit | Adb
มุมมอง 727 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Android4: 1 Link: www.vulnhub.com/entry/android4-1,233/ My Twitter:@ junhua_cyber Tips: 1. 3 ways are used in this video to penetrate into Android mobile phone.
Cyber Security | Pentesting | Vulnhub | Walkthrough | Trollcave | Python | Port Forwarding
มุมมอง 589 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Trollcave: 1.2 Link: www.vulnhub.com/entry/trollcave-12,230/ My Twitter:@ junhua_cyber Tips: 1. I use a lot the following website to edit regular expression: pythex.org/
Cyber Security | Pentesting | Vulnhub | Walkthrough | Jarbas | Jenkins RCE | Escalate Priv By Cron
มุมมอง 8116 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Jarbas: 1 Link: www.vulnhub.com/entry/jarbas-1,232/ My Twitter:@ junhua_cyber Tips: 1. Exploit Jenkins blog.pentesteracademy.com/abusing-jenkins-groovy-script-console-to-get-shell-98b951fa64a6 2. Groovy script for reverse shell (Didn't work for me) gist.github.com/rootsecdev/273f22a747753e2b17a2fd19c248c4b7
Cyber Security | Pentesting | Vulnhub | Walkthrough | WinterMute | Neuromancer | Pivot Metasploit
มุมมอง 4319 ชั่วโมงที่ผ่านมา
Tips: 1. The entire video for the machine as follows: th-cam.com/video/c4R6xMKLsyo/w-d-xo.htmlsi=le_ZAh2Zwgn5dgV2
Cyber Security | Pentesting | Vulnhub | Walkthrough | WinterMute | Neuromancer | Pivot With Socat
มุมมอง 5419 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: WinterMute: 1 Link: www.vulnhub.com/entry/wintermute-1,239/ My Twitter:@ junhua_cyber Tips: 1. Some guys are using local exploits to elevate privilege. However, since the second machine(Neuromance) doesn't have gcc compiler, the code should be compiled on Kali and transferred to the target machine. Unfortunately you will possibly g...
Cyber Security | Pentesting | Vulnhub | Walkthrough | WinterMute | Straylight | Mail Poisoning
มุมมอง 5721 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: WinterMute: 1 Link: www.vulnhub.com/entry/wintermute-1,239/ My Twitter:@ junhua_cyber Tips: 1. SMTP commands: www.geeksforgeeks.org/smtp-commands/
Cyber Security | Pentesting | Vulnhub | Walkthrough | Basic Pentesting: 2 | SSH Crack
มุมมอง 89วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Basic Pentesting: 2 Link: www.vulnhub.com/entry/basic-pentesting-2,241/ My Twitter:@ junhua_cyber
Cyber Security | Pentesting | Vulnhub | Walkthrough | Node 1 | Hash Decryption
มุมมอง 79วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Node: 1 Link: www.vulnhub.com/entry/node-1,252/ My Twitter:@ junhua_cyber Tips: 1. Web enumeration especially manual enumeration. 2. Hash identifier and decryption. 3. Privilege escalation.
Cyber Security | Pentesting | Vulnhub | Walkthrough | Temple of Doom 2 | Deserialization
มุมมอง 47วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Temple of Doom: 1 Link: www.vulnhub.com/entry/temple-of-doom-1,243/ My Twitter:@ junhua_cyber Tips: 1. Entire video for the machine : Temple of Doom 2. Exploiting Node.JS deserialization: (Manually exploit) opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/ 3.Python script to generate ...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Temple of Doom
มุมมอง 63วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Temple of Doom: 1 Link: www.vulnhub.com/entry/temple-of-doom-1,243/ My Twitter:@ junhua_cyber Tips: 1. Node.JS Express Framework: de-serialization attack.
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Blacklight
มุมมอง 14714 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Blacklight: 1 Link: www.vulnhub.com/entry/blacklight-1,242/ My Twitter:@ junhua_cyber
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Toppo
มุมมอง 19714 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Toppo: 1 Link: www.vulnhub.com/entry/toppo-1,245/ My Twitter:@ junhua_cyber Tips: 1. Two ways were taken to escalate privilege. 2. One begging-level machine
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | wakanda
มุมมอง 11314 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: wakanda: 1 Link: www.vulnhub.com/entry/wakanda-1,251/ My Twitter:@ junhua_cyber Tips: 1. You can get a quick recap of local file inclusion detection and exploitation from this video 2. Exploit sudoer with /usr/bin/pip install * github.com/0x00-0x00/FakePip
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Fowsniff
มุมมอง 8114 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Fowsniff
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Moonraker
มุมมอง 12414 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Moonraker
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | XXE Lab
มุมมอง 17114 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | XXE Lab
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld.local MERCY
มุมมอง 18314 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld.local MERCY
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Pinky's Palace v3
มุมมอง 6421 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Pinky's Palace v3
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Typhoon 2
มุมมอง 9121 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Typhoon 2
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Typhoon 1
มุมมอง 21321 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Typhoon 1
Pentesting General | Python for Security | Install Modules for Python2 on Kali Linux
มุมมอง 3821 วันที่ผ่านมา
Pentesting General | Python for Security | Install Modules for Python2 on Kali Linux
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld DEVELOPMENT
มุมมอง 9621 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld DEVELOPMENT
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SP IKE
มุมมอง 13621 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SP IKE
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Leopold | Metasploit
มุมมอง 15121 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Leopold | Metasploit
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SolidState | Metasploit
มุมมอง 7928 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SolidState | Metasploit
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | W34kn3ss
มุมมอง 9828 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | W34kn3ss
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 2
มุมมอง 63หลายเดือนก่อน
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 2
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 1
มุมมอง 132หลายเดือนก่อน
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 1
I am here.😁😁😁
Great.
You're doing a fantastic job! Just a quick off-topic question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
Thank you.
1st
Thanks
How you identify ip of the machine?
Many ways can be taken to identify IP address, such as netdiscover, arpscan, nmap ,etc.
@ nah bro, i just get it that this task cant be solved on arm64
@@bravoalfa56 i see.
Amazing as always.❤❤❤
Thank you, my dear friend.
I am downloading panabee...😁😁😁
Great
I am here.😁😁😁
Thanks
I am here.😁😁😁
so good of you.
@@junhuawong1419 thx
So nice of you.
nice
Thanks
Thanks for the breakdown! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
I have no idea how to help.
I am here.😁😁😁
Thanks
Nice
Thanks
This was almost annoying and definitely not an easy machine; I wonder why the author described it that way😄😄
haha
Erverytime I practice on a new box, I learn something new.😁😁😁
Great
I have been learning. I plan to practice at least one machine a week, since I want to robust my foundation of hacking and pen-testing, I have to review network fundamental knowledge and keep practicing coding. After my foundation is robusted, I think I can practice more machines a week. 😁😁😁
Keep it up
Keep it up
I will do this machine, today.😁😁😁Thx
Go ahead.
i did everything same as you but when i input it doesn`t output the /bin/bash line, only /bin/su and others, so i can`t escalate. why is that?
You can escalate privilege by utilizing SUID bit of bash. Running /bin/bash -p could give you elevated privilege.
Please raise your voice 🙏
Sorry about this. I am not feeling good with my throat. I'm getting cold. I hope I can feel better quite soon.
I am here.😁😁😁
Thanks
What should happen after we got the flag.txt on Straylight
This lab has two machines. If you can get the flag.txt on Straylight, it means that you've completed the first step, however, you should go on. Then you should make pivoting from the Straylight to find vulnerabilities of the second machine.
@@junhuawong1419 How did you get to root directory from tmp? Is that a hash displayed for the root flag? Exactly, what is that, how can I crack it to go on?
Thank you for your video
So nice of you
Thank you for uploading videos every day.
Thank you.
I am here.😁😁😁
Thanks
I like your skills ❤
Glad you like it.
Nice
Thanks
I am here.😁😁😁
Thanks
Thanks
take care of your health.
Thank you, I will.
Improve you captions ie label the vulnhub as depicting the technology ie apis, ssrf,csrf etc if they are web
Thanks for your suggestion.
I am here.😁😁😁
Thanks
Thank you for your video
Thanks
I have been recently having some difficulties using my NAT Network, so that my kali and vulnhub machines can share the same network. It used to work, but for some reason it doesn't now, it shows the network is disconnected. I literally tried everything, but still can't. If you could help please?
You need to check at least the following things: 1. Make sure NAT service has started successfully by checking processes in the task manager of Windows. 2. Other machines (not Kali) which configured as NAT can access Internet through NAT network. 3. "The network is disconnected"? You mean network to Internet through NAT? Or Kali can't ping vulnhub machine? 4. I prefer to configure Kali to have two interfaces, one of them can configured as NAT, another can be configured as Host-only. Vulnhub machine can be configured as Host-only. Kali can reach the vulnhub machine through host-only network.
❤❤❤❤. Amazing as always
Thank you so much 😀
I am here.😁😁😁
Thanks
❤
Thanks.
:)
So nice of you.
I am here.😁😁😁
Thanks
I am here.😁😁😁
Thanks
Thank you for your video
So nice of you,sir
Thank You
You're welcome
and BONUS; **OUT** and **GUESS** in uppercase likely indicate something significant. Searching on Google, we found the following information about **Outguess**: Outguess is a tool that allows you to hide messages within images. It analyzes an image to find redundant bits that can be altered without causing noticeable changes. By accessing the root user's `bash_history` file, we identified the exact command executed: ```bash $ outguess -d flag2.txt blacklight.jpg flag2-inside.jpg ``` To reverse this process, simply run: ```bash $ outguess -r flag2-inside.jpg flag2.txt Reading flag2-inside.jpg.... Extracting usable bits: 18496 bits Steg retrieve: seed: 180, len: 133 # cat flag2.txt {flag2:88ea7554cbc7e89526943e9ad5d3ce2ed5ec3db4} ``` **Francis Bacon says:** `BAAAAAABAAAAAAAAAABB AABAABAABAAAABA AAAABAAAAAAAABAABBABABBAA` **Second flag identified.** Further analysis of the `bash_history` file revealed another command: ```bash $ nano /etc/bacon ``` Since this file is not native to the system, it’s worth investigating: ```bash $ cat /etc/bacon {flag3:7cc90cfe5304801c0ed71d76bb4a92062d967bb9} Congratulations! Thanks for using BLACKLIGHT v1! I hope you enjoyed this CTF and come back for more :) ``` **All flags found!** --- ### **Bonus:** You might have noticed that the admin console (mk1) provided a command called `readhash`. ```bash $ nc 10.0.2.13 9072 BLACKLIGHT console mk1. Type .help for instructions .help .readhash - Get one step closer .exec - Execute commands .quit - Exit the server ``` The output of this command is a SHA-256 hash: ```bash .readhash b5f4723bd6df85b54b0905bd6d734be9ef1cc1eb977413a932a828b5c52ef5a6 You have one more command until the server shuts down. Choose wisely! ``` **Hash-Identifier confirmed this as SHA-256.** To crack the hash, we attempted using a dictionary from the `robots.txt` file but were unsuccessful: ```bash $ john --format=raw-sha256 --wordlist=blacklight.dict hash.txt Using default input encoding: UTF-8 Loaded 1 password hash (Raw-SHA256 [SHA256 128/128 SSE2 4x]) Press 'q' or Ctrl-C to abort, almost any other key for status 0g 0:00:00:00 DONE (2018-10-23 20:13) 0g/s 9950p/s 9950c/s 9950C/s zzzzzz..covfefe Session completed ``` **Better luck next time!**
**Outguess** is a tool that enables you to hide messages within images. It analyzes an image looking for redundant bits that can be modified without causing noticeable changes. By accessing the `bash_history` file of the root user, we identified the exact command that was executed: ```bash $ outguess -d flag2.txt blacklight.jpg flag2-inside.jpg ``` To reverse the process, simply run: ```bash $ outguess -r flag2-inside.jpg flag2.txt Reading flag2-inside.jpg.... Extracting usable bits: 18496 bits Steg retrieve: seed: 180, len: 133 # cat flag2.txt {flag2:88ea7554cbc7e89526943e9ad5d3ce2ed5ec3db4} ``` **Francis Bacon says:** `BAAAAAABAAAAAAAAAABB AABAABAABAAAABA AAAABAAAAAAAABAABBABABBAA` **Second flag identified.** Further analysis of the `bash_history` file revealed another command: ```bash $ nano /etc/bacon ``` Since we know this file is not native to the system, it’s worth taking a look: ```bash $ cat /etc/bacon {flag3:7cc90cfe5304801c0ed71d76bb4a92062d967bb9} Congratulations! Thanks for using BLACKLIGHT v1! I hope you enjoyed this CTF and come back for more :) ``` **All flags found!**
I used GVIM to edit the bin file to hex file. It works.😁😁😁
Nice work!
@@junhuawong1419 Thx
And I saved the hex file and successfully used xxd to transfer it back to bin . it works...😁😁😁finally.
The problem is the content has the hex codes but it does not have the string in the far right.🤣🤣🤣
As pentester, we need to know so many different tools or techniques.
I tried another editor hexedit and it did not work...🤣🤣🤣
Finally you got the way to work. So great of you.
I changed the font of the vim and it did not work.🤣🤣🤣
You got the way.
@@junhuawong1419 thx
Because when I cat the file the content is readable, I think I need to change the font of the vim?🤣🤣🤣
Thanks.
I tried to set the font of the system but I did not know which one to choose. Usually, I choose UTF8
I even see your hard working on this.
what can I do?😁😁😁
Go on.
I get a problem, I have dumped the client.bin file but when I use the vim to open file, the content is not like yours but when I cat the client.bin.dump, the content is exactly like yours, and I think I need to set the font of the vim, or the font of the system, but I do not know how. Helps. thx
Thanks