HackTheBox - Mist

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 พ.ย. 2024

ความคิดเห็น • 44

  • @philippg4261
    @philippg4261 หลายเดือนก่อน +7

    Good stuff on that discovering Defender Exclusions part. I was fiddling around obfuscating all my tools and eventually saw that 0xdf could just run stuff from htdocs so I was wondering how he enumerated that. Great addition to my notes!

    • @ippsec
      @ippsec  29 วันที่ผ่านมา +7

      I had told him 😀

  • @The_Dark_Cats
    @The_Dark_Cats หลายเดือนก่อน +3

    That was one hell of a box! Great stuff you shared there. Thank you so much!

  • @glitse4288
    @glitse4288 หลายเดือนก่อน +5

    Hey ipp even though ima beginner in the space i love watching all your videos even if i dont understand them fully yet lol. Hoping some of the knowledge will stick with me from these when i need it.

  • @jmprcunha
    @jmprcunha 18 วันที่ผ่านมา

    This one took me some time to "digest" :) Excellent video! Thank You

  • @AUBCodeII
    @AUBCodeII หลายเดือนก่อน +20

    Hey Ipp, let's buy OffSec, rename it back to Offensive Security and delete all non-offensive security certifications

    • @insect6003
      @insect6003 หลายเดือนก่อน +2

      Why?

    • @petevlr
      @petevlr หลายเดือนก่อน +10

      GET OUT!! 💯🗣️

    • @AUBCodeII
      @AUBCodeII หลายเดือนก่อน

      @@insect6003 a company called OffSec offering courses not related to offensive security is like if a Chinese restaurant started selling tacos. Just doesn't seem right. One could argue that defense is the best attack, though

    • @zerukz
      @zerukz หลายเดือนก่อน +7

      Bro is on to nothing 🗣️🗣️‼️‼️

    • @AUBCodeII
      @AUBCodeII หลายเดือนก่อน

      @@insect6003 a company called OffSec offering courses not related to offensive security is like if a Chinese restaurant started selling tacos. It just doesn't seem right. One could argue that defense is the best offense, though

  • @younessaitichou5319
    @younessaitichou5319 24 วันที่ผ่านมา

    Great walkthrough 💪 waiting for the University box 😅

  • @thomsejenkins7544
    @thomsejenkins7544 หลายเดือนก่อน +3

    This machine was insane

  • @OUSSAMABAKALI-h5m
    @OUSSAMABAKALI-h5m 29 วันที่ผ่านมา +1

    nice content and a good metholody of breaking insane boxes.just a question is there sonner any video about dns attacks ?

  • @covertivy
    @covertivy 25 วันที่ผ่านมา

    I would have loved it if you went really in depth into the world of ADCS exploitation and the different tools used to do so.
    I noticed you preferred using tools running locally on the box itself instead of over a tunnel, I would love to know what are the options for doing everything remotely as well - as this pretty much eliminates the problems of AV evasion.
    Great video and a great box, really cool!

    • @ippsec
      @ippsec  25 วันที่ผ่านมา +4

      I really don't have a preference. Both Rubeus and Impacket will create unique things that can be alerted on, so its not really opsec related.
      Most of the time I think I will show impacket because you don't have to fight with AV, but it's certainly quicker to do it locally and for a box this size I didn't want to increase the video length by going 100% Impacket.
      As for a video just on ADCS, I may consider it but I don't really like putting out targeted guides like that. I know its what people want and it's possible to just run the commands to do it. But I think you learn the attacks at a more -intimate level by seeing them inside of boxes like this.
      It's definitely not the quickest way to learn, but if my goal was to get you to a spot to be making $$$ as quick as possible, I'd be selling a high-priced course. Which again people want but I just don't want to do for a few reasons, mostly being stress and piracy.
      So I think of my videos as unoptimized in terms of time, but highly optimized in terms of building foundational skills and knowledge. I find there are a lot more people who do unethical things in the group that cares heavily about how much time it takes to learn things (and would pirate a course). The people that are just passionate don't care about being quick and they tend to be more ethical.
      Atleast that's my viewpoint and what helps me sleep at night putting this type of content out there for free.

  • @Handler82
    @Handler82 หลายเดือนก่อน +2

    Hey, love your content. I have just one question, I don't want to offend you, but I was just wondering, how old are you? If this question is too personal I am sorry, but I am really curious regarding this question. Love the content. Thanks

    • @ippsec
      @ippsec  29 วันที่ผ่านมา +2

      Mid 30’s

  • @rjvar
    @rjvar 28 วันที่ผ่านมา +2

    Thank You..

  • @WyldeZk
    @WyldeZk 25 วันที่ผ่านมา

    Hey Ipp thanks for the amazing video. I was wondering if a c2 like meterpreter wouldn’t be more handy to collect all the rev shells plus it has some built in upload/download features.

    • @ippsec
      @ippsec  25 วันที่ผ่านมา +1

      Yup probably would be, I just don't really showcase them on my channel because C2's don't always age that well. Either they become abandoned projects or the code changes and the video is no longer correct.

  • @F.M671
    @F.M671 14 วันที่ผ่านมา

    How come AV did not flag Sharphound?

  • @mohammadhosein6847
    @mohammadhosein6847 หลายเดือนก่อน +1

    17:52 thanks for posing malisious content :)

  • @kevinkehoe9950
    @kevinkehoe9950 หลายเดือนก่อน +1

    Heya Ipp, can you update your ParrotOS ansible script? ❤

  • @Progressive_Entrepreneur
    @Progressive_Entrepreneur 28 วันที่ผ่านมา

    CRTP course would have been great for you, could have done all of this from one shell using winrs

    • @MoxResearcher
      @MoxResearcher 10 วันที่ผ่านมา +1

      He doesn't need it.

  • @miloslavpalik9949
    @miloslavpalik9949 29 วันที่ผ่านมา

    Is it necessary do run with Bloodhound CE ? I have installation problems with community edition.. Also if someone have free time for help I will be grateful to him.

  • @lydialitvyak7750
    @lydialitvyak7750 25 วันที่ผ่านมา

    why win machine is so complicated?

  • @tg7943
    @tg7943 28 วันที่ผ่านมา

    Push!

  • @amaankhan8436
    @amaankhan8436 หลายเดือนก่อน +1

    hey ippsec!

  • @dorklymorkly3290
    @dorklymorkly3290 24 วันที่ผ่านมา

    Today I found out I am a mongoloid of apocalyptic proportions cause I understood nothing of this. Lol.
    Nah, not a mongoloid, just ignorant. I have so much to learn.

  • @VivaLyaLibertyBibaLyaLiberty
    @VivaLyaLibertyBibaLyaLiberty หลายเดือนก่อน +1

    Hey ipp, can u record real-time hacking/pentesting infra/bb?
    Htb techniques never help me bypass auth/perimeter/etc on real pentest targets. That's frustrated

    • @DiscomfortPioneer
      @DiscomfortPioneer 3 วันที่ผ่านมา

      Men if you want to learn how to bypass EDR or any security mechanism you have to know how they works and learn on the fly! It's good to learn about blue team and how they protect and detect us. A good exercise is try to detect yourself.

    • @VivaLyaLibertyBibaLyaLiberty
      @VivaLyaLibertyBibaLyaLiberty 3 วันที่ผ่านมา

      @DiscomfortPioneer lol, for example i know how works nginx and nginx proxy manager - but that's unhelpful for any fuzzing and misconfig searching. I mean only initial access techniques, which didn't include edr/xdr/av/siem/soc and some else mechanism's of defense.

  • @zoes17
    @zoes17 หลายเดือนก่อน +1

    53:37 and 54:03 you forgot your python server us running on port 8000 when you tried to curl the shell directly.
    Petit Potam meaning "Little Hippo" in French made me giggle far more than it should.

    • @ippsec
      @ippsec  หลายเดือนก่อน +2

      I've used that for years, and never put that connection together. lol. Did not know Potam was hippo, but definitely knew Petit was French for little.

  • @nareshg7292
    @nareshg7292 หลายเดือนก่อน +1

    first

  • @andro1dxd
    @andro1dxd หลายเดือนก่อน

    Can someone help pls?, when i trying to reverse - i got this mistake, connection immediately down, but i have response
    (root@kali)-[~]
    #rlwrap nc -lvnp 9001
    listening on [any] 9001
    connect to [10.10.14.10] from (UNKNOWN) [10.10.11.17] 65434
    (root@kali)-[~]

    • @irshadmuhammed4021
      @irshadmuhammed4021 23 วันที่ผ่านมา

      Just recheck the reverse shell code