I'm impressed how much I can learn new things even on easy machines in ippsec videos. There is always a valuable tip that helps me a lot in my daily work.
Great video, as usual! Learned a ton, thanks. Just a quick note, the wpscan aggressive plugins enumation can be sped up a lot by using more threads (-t flag). I've used -t 200 and got the result in less than 3 minutes. YMMV.
You can use "show advanced" or just "advanced" to see the advanced options in Metasploit. Use "set DisablePayloadHandler true" to disable Metasploit's payload handler and use your own (like nc).
Another way to find the cmdline behind the open 1337 port instead of brute forcing could be looking in the /proc/sched_debug file (By the way I would appreciate if someone can explain more about that file to me. This file did not seem to exist on my machine and I don't understand it to a degree I'm comfortable with.)
@@ippsec Yeah, I don't think it will, but it may help with intuition about interesting processes to get the cmdline of. If I recall correctly, what I did was using it and my intuition to get the cmdline of some processes, and it was a bash process so it was one of the first ones I checked, and then (in the cmdline) I found the port and connected the dots
Please can you give me a nudge on how to get root access on meta machine.. I have been on it for some days now. Thanks in anticipation of your response.
Hey thank you for your guide. But in the Part of 44:17 i get this message after command: user@Backdoor:/home/user$ screen -r root screen -r root Must be connected to a terminal. user@Backdoor:/home/user$ screen -S root screen -S root Must be connected to a terminal. I did follow your guide step by step. Do you have an idea, what the problem is?
I'm impressed how much I can learn new things even on easy machines in ippsec videos. There is always a valuable tip that helps me a lot in my daily work.
Ippsec and John Hammond get me through my day
In the mood for quality YT content and look who just uploaded ⛱️😎
Great video, as usual! Learned a ton, thanks. Just a quick note, the wpscan aggressive plugins enumation can be sped up a lot by using more threads (-t flag). I've used -t 200 and got the result in less than 3 minutes. YMMV.
You can use "show advanced" or just "advanced" to see the advanced options in Metasploit. Use "set DisablePayloadHandler true" to disable Metasploit's payload handler and use your own (like nc).
I really wish I could have spent more time on this box. This was awesome
32:53 - This should be in the timestamps 😂
Really good video, thank you for the effort for showing us how privesc worked and for waiting 30+ minutes to show wpscan is not useless :P
videonun olayı ney
The trick to stealing the process information to identify what was listening on port 1337 was a great technique.
29:04 🐶
Hi Ippsec, which do you prefer as your daily laptop? Windows or Mac? 🤔
29:05 Was that a dog ? Do you have a dog ?!
great work :D
great as always
Another way to find the cmdline behind the open 1337 port instead of brute forcing could be looking in the /proc/sched_debug file
(By the way I would appreciate if someone can explain more about that file to me. This file did not seem to exist on my machine and I don't understand it to a degree I'm comfortable with.)
The sched_debug won't display the port afaik. It may say GDB is running but not the arguments that started it.
@@ippsec Yeah, I don't think it will, but it may help with intuition about interesting processes to get the cmdline of. If I recall correctly, what I did was using it and my intuition to get the cmdline of some processes, and it was a bash process so it was one of the first ones I checked, and then (in the cmdline) I found the port and connected the dots
You can also use `screen -x root/root` to attach to a detached session. Format of -x is `username/session_name` I guess.
🔥🔥🔥🔥
keep going man!
@ippsec can you share your bash prompt ?
i wanna learn more request stuff what box you suggest
Why do you run `sudo msfdb run` instead of just `msfconsole`?
its starts the database if needed and opens the console. i always do the same thing. probably just habbit
Please can you give me a nudge on how to get root access on meta machine.. I have been on it for some days now. Thanks in anticipation of your response.
Hey thank you for your guide. But in the Part of 44:17 i get this message after command: user@Backdoor:/home/user$ screen -r root
screen -r root
Must be connected to a terminal.
user@Backdoor:/home/user$ screen -S root
screen -S root
Must be connected to a terminal.
I did follow your guide step by step. Do you have an idea, what the problem is?
why not using xmlrpc?
Ippsec Rocks
Ipprock 'n roll
@Voldemort however he's never gonna let me down
Is there a tool to test API zend
Please sir tell me the format of fullname of hackthebox i want to create new account m new user
How did you know '/self/' to add there on URL (/proc/self/cmdline)? I dont get it.
Edit:
8:30
It's part of the default Linux directory structure: man7.org/linux/man-pages/man5/proc.5.html
@@AUBCodeII Ah, Ty! Good to know!
can anyone explain how hack so easy box(i try but never could it) plz?
Yes!
cannot find port 1337
👍👏👏
is that MacBook? cuz I see three button it have yellow green and red we have that MacBook😮😮😮😮
It's parrotos
Rockstar of hacking
@22:30 $MANPAGER
Please sir tell me the format of fullname of hackthebox i want to create new account m new user