Shopping Website's DATABASE Dumped!! +PrivEsc to ROOT using systemctl ! (THM challenge)

แชร์
ฝัง
  • เผยแพร่เมื่อ 16 พ.ย. 2024

ความคิดเห็น • 26

  • @DJChesley
    @DJChesley ปีที่แล้ว

    I love this! It's advanced the point where I'm just barely able to follow along but I am able to and I'm able to learn so much!

  • @slmadi
    @slmadi 7 หลายเดือนก่อน

    bro u dont have to thank us we need to thank you becuase some people cant afford buying thm premium to access rooms since some of them are free and some are premium and the way your teaching us is fast and like your tutorials make like your executing sudo su like very easy i love your teaching thank you.❤

    • @HoxFramework
      @HoxFramework  7 หลายเดือนก่อน

      sure bro no problem whatsoever

  • @angelpriya-gj1eq
    @angelpriya-gj1eq ปีที่แล้ว

    Got it dude completely got it 😀

  • @wanderingknight10
    @wanderingknight10 3 ปีที่แล้ว

    Good vid..a shortcut would be to run nmap ..sooof ip to local system..run nmap as local an search for services..which should render open or closed ports for MySQL..then SQL inject

    • @HoxFramework
      @HoxFramework  3 ปีที่แล้ว +1

      Sure i could have done that too, fair point!

  • @emconix2123
    @emconix2123 ปีที่แล้ว

    Svaka cast

  • @ds-pp8ow
    @ds-pp8ow 3 ปีที่แล้ว +1

    I was practicing sql injection the other day and I came across this string " mi+qlg==" just wondering if you could tell me what it is thanks

    • @ds-pp8ow
      @ds-pp8ow 3 ปีที่แล้ว +1

      and congrats on 1k

    • @HoxFramework
      @HoxFramework  3 ปีที่แล้ว

      @@ds-pp8ow Thank you! Sure i can explain but i'll need more context - where did you find that string? Where from and whats the rest of it?

    • @ds-pp8ow
      @ds-pp8ow 3 ปีที่แล้ว

      @@HoxFramework I found it in an English database. It was used under (for example : card_number.
      I also found this string "!~!1" repeated lots of times.I think it may represent null data or something. Any info you could give me would be grately appreciated.

    • @ds-pp8ow
      @ds-pp8ow 3 ปีที่แล้ว

      @@HoxFramework and that is the end of the string. I'm not sure if it's and encryption because of the == at the end but there are similar strings in the database

    • @HoxFramework
      @HoxFramework  3 ปีที่แล้ว +1

      @@ds-pp8ow Well im hoping you arent doing anything illegal so im going to assume you are just legally testing a webapp's db or smthn...
      I dont know why those characters would be repeated many times - maybe its an encoding thing, maybe encryption - maybe it gives the webapp some kind of an instruction - i cant know - if its in database's rows then its just a value of sorts - depending on the context of the value's type id google it and try to find what i can on that specific match. Ideally id take a look at it live and see what i would do with it - but i cant do that so you are gonna have to do some more research on that. The first result google gives me for "!~!1" is SHA-1 (tho i doubt thats the case - but still)

  • @newwspaper2110
    @newwspaper2110 ปีที่แล้ว

    when i try doing a nmap scan it tells me that the host is down
    any solutions to this?

    • @HoxFramework
      @HoxFramework  ปีที่แล้ว

      Considering you are using tryhackme its most likely not their fault, id assume you arent connected to the VPN they provide you.

  • @hvhpixel9440
    @hvhpixel9440 ปีที่แล้ว

    epic content

  • @shahbozbekahmadjonov1408
    @shahbozbekahmadjonov1408 ปีที่แล้ว

    can you explain slowly