Damn you breezed through this box great job! Could you elaborate your thought process om running strings on the redis-status binary? You seemed surprised to find the authorization key there, so i was curious as to what you were looking for there
Strings is a tool that essentially extracts text strings from any file. Its part of the first tools you run when doing static analysis on a binary before going deeper with gdb or ghidra. Sometimes (like in this case) you get lucky and find secrets hidden inside a binary string. The intended path was to fully reverse engineer the binary.
I don't throw this around very often but from all the hacking content I've consumed overall I give Jimmy that MJ23 status on his both his knowledge and content.
@@JosephValentine-o5w my guy! but hey hey, many people came before me that have inspired my content and given me the knowledge. I couldn't accept that. But I definitely appreciate it a lot!
Hi, what you are doing is amazing. I really like the way you use the tools and export everything to obsidian. Can you make a video to share how did you setup your tmux or all the things you did in recon phase? I appreciate that
How do you guys like the webcam mask? Keep or Revert?
It looks cool. So happy to see the channel grow!
Keep it
No complains bro it cool
you are my hero
Haha thanks man! Appreciate it
Banger Keep going !!!
Thank you man, thanks a lot. I am on a little break at the moment as life is catching up to me. Will be back soon!
@@ByteSizedSec come back stronger brother 💪💪
Thank you for doing these really helping me stay motivated to get through the course section of the Pen-200.
Glad to hear it! Keep putting in the work, you got this!
Damn you breezed through this box great job! Could you elaborate your thought process om running strings on the redis-status binary? You seemed surprised to find the authorization key there, so i was curious as to what you were looking for there
Strings is a tool that essentially extracts text strings from any file. Its part of the first tools you run when doing static analysis on a binary before going deeper with gdb or ghidra. Sometimes (like in this case) you get lucky and find secrets hidden inside a binary string. The intended path was to fully reverse engineer the binary.
You are the Lionel Messi of Blackgate hacking 👌
😂😂😂😂
I don't throw this around very often but from all the hacking content I've consumed overall I give Jimmy that MJ23 status on his both his knowledge and content.
@@JosephValentine-o5w my guy! but hey hey, many people came before me that have inspired my content and given me the knowledge. I couldn't accept that. But I definitely appreciate it a lot!
Hi,
what you are doing is amazing. I really like the way you use the tools and export everything to obsidian. Can you make a video to share how did you setup your tmux or all the things you did in recon phase? I appreciate that
Thank you very much, your appreciated. There is a setup video already that should answer your questions. Thanks fot thr suppott !🙏🏾
@@ByteSizedSec Oh, I just found it in your all videos. Thanks a lot.
can you share your obsidian template
Its rather simple, you can make it
> enum > external > port documents
> internal
>Privesc
>Exploit
>General Information
>Loot
Just watch. Given time, jimmys name will be searched along with the likes of guys like john Hammond, network chuck, etc
Man, this is so incredibly kind and motivating! I appreciate you so so much, thank you! 🙏🏾
am following you for sometime, brilliant mind. However i find that you may want to slow down and explain your thought process in detail...