HackTheBox - RedPanda

แชร์
ฝัง
  • เผยแพร่เมื่อ 18 ธ.ค. 2024

ความคิดเห็น • 28

  • @BluEhui09
    @BluEhui09 2 ปีที่แล้ว +7

    Have done this on htb when it is active , but watching IPsec talk about how to did it in his way, it is marvellous.

  • @Zen_Monkey
    @Zen_Monkey ปีที่แล้ว

    Man, thank you for showcasing the fuzzing for special chars errors. This helped me find an RFI on an OSCP practice lab :)

  • @null_1065
    @null_1065 2 ปีที่แล้ว +2

    Setting group via sudo was very interesting, thanks for sharing that at the end

  • @mkowalski997
    @mkowalski997 11 หลายเดือนก่อน

    Good that you explained what's going on with these groups because since halfway through the video it hasn't given me peace.

  • @skyone9237
    @skyone9237 2 ปีที่แล้ว +7

    Great work done by ippsec like always
    Priv esc on this box was a nightmare...
    learned alot while trying to get user shell but was pissed off in priv esc part and in the end didn't get root and moved on.. 😑

  • @JoesZone
    @JoesZone ปีที่แล้ว

    This priv esc is something else, absolutely bonkers

  • @jorgevilla6523
    @jorgevilla6523 ปีที่แล้ว

    Always get the best part at the end! Thanks

  • @sand3epyadav
    @sand3epyadav 2 ปีที่แล้ว

    I have improved ssti and xml tq once again sir... we will brush up...
    I am big fan

  • @احمدالخالدي-ذ7ه
    @احمدالخالدي-ذ7ه 2 ปีที่แล้ว +1

    Thank you very much, I learned many things from you, you are the best

  • @energy-tunes
    @energy-tunes ปีที่แล้ว +1

    2:35 it literally said it's made with spring boot in response beforehand

  • @ES-cf4ph
    @ES-cf4ph 2 ปีที่แล้ว +2

    In one Respone it said "Made with Spring Boot" in the header of the HTML

  • @atefbouallegue605
    @atefbouallegue605 2 ปีที่แล้ว

    Finally 😅 i was waiting for this box lol
    Thanks Ipp 🙏

  • @zensec01
    @zensec01 2 ปีที่แล้ว

    IppSec, you are the father of all junior hackers.

  • @f50ciety
    @f50ciety 2 ปีที่แล้ว +1

    thank you a lot for this kind of content

  • @DM-qm5sc
    @DM-qm5sc 10 หลายเดือนก่อน

    I am having a really hard time with the curling of the shell. I have exactly what you have in your header and I have the python server set like your and a listener set and the shell file the same and I cant get it to curl but I can for sure do all of the other commands. I am so frustrated.
    I am using kali from a physical install on a laptop. I have tried encoding all of the characters to make sure there are no bad chars and tried with sudo permissions when running the terminals but it simply wont work.
    Any ideas?

  • @nika-p1f6y
    @nika-p1f6y หลายเดือนก่อน

    this box got updated somehow? I couldn't get a reverse shell

  • @pranav9068
    @pranav9068 2 ปีที่แล้ว +3

    I got to know of ssti from forums but executed everything else to get user.txt
    Didn't get root but looking forward to a time when i can identify exploits on my own

    • @dadamnmayne
      @dadamnmayne 2 ปีที่แล้ว

      priv esc on hackthebox is a moving target. come to tryhackme.

  • @markuche1337
    @markuche1337 2 ปีที่แล้ว

    Learnt something new thanks Ippsec

  • @AsadAli-ye8ns
    @AsadAli-ye8ns 2 ปีที่แล้ว

    is Ben Hur channel is also you??? bcz the vioce is 1000% same

  • @ClinicalDepression420
    @ClinicalDepression420 2 ปีที่แล้ว

    6:00 'squigly bracket 😭😭😭😭'

  • @yuyu-ce4fz
    @yuyu-ce4fz 2 ปีที่แล้ว

    ❤❤nice

  • @sleepeybunney
    @sleepeybunney 2 ปีที่แล้ว +3

    I couldn't get a reverse shell going on this so I ended up doing a lot of it the hard way, dodging banned characters in the search box 😅

  • @Jet1337x
    @Jet1337x 2 ปีที่แล้ว

    Good Work!

  • @sp3ct3r71
    @sp3ct3r71 2 ปีที่แล้ว

    hey ippsec how to enable terminal regex search function on..

  • @lumenknotty6355
    @lumenknotty6355 2 ปีที่แล้ว

    How do you request a GET response in the url?
    Nevermind. Burp assisted in that. Also "*{7*'7'}" got to the Whitelabel Error Page

  • @marcostorres572
    @marcostorres572 2 ปีที่แล้ว

    IppSec ❤❤❤❤❤❤❤❤❤❤❤❤