Thank you for another nice video Darksec! I was wondering if I wanted to test/ build up a good foundation before having oscp course, which machines/rooms you recommended to do to check?
Yeah Steel Mountain is a great example! I can look into getting a walkthrough for that whipped up maybe for this next week :) also hey, I'm happy you're finding the platform to be worth the admission!
whad does -p on "/tmp/rootbash -p" means? i tried to execute rootbash whiteout that flag and it didn't escalete privileges, it is something equivalent to sudo?
16:50 I'm disappointed you didn't cat the /etc/copy sh file. The contents are very interesting. There was already code for a reverse shell inside. I suppose it was an Easter egg left behind for us to simulate that we were not the only attackers to break into root.
your explanations are so good easy to understand
Your content is quality. Thanks for amazing walkthroughs DarkSec
last part ! , a new way to escalate privileges !
Thank you for another nice video Darksec!
I was wondering if I wanted to test/ build up a good foundation before having oscp course, which machines/rooms you recommended to do to check?
Steel Mountain? Or something that involves powershell_shell and such? I signed up with Tryhackme. Best 10 bucks ever spent.
Yeah Steel Mountain is a great example! I can look into getting a walkthrough for that whipped up maybe for this next week :) also hey, I'm happy you're finding the platform to be worth the admission!
4Dalgorithms! Thank You for the nice videos :)
great vid, DarkSec. What does the bash -p do I'm wondering?
Yep, great stuff! Thanks mate!
thx bro
why is it necessary for the -p.... when i looked at the echo, i dont recall anything rerferrring to that? Thanks for the video!
do you know what the -p does? I have no idea
whad does -p on "/tmp/rootbash -p" means? i tried to execute rootbash whiteout that flag and it didn't escalete privileges, it is something equivalent to sudo?
can you give me the link about the course in udemi
16:50 I'm disappointed you didn't cat the /etc/copy sh file. The contents are very interesting. There was already code for a reverse shell inside. I suppose it was an Easter egg left behind for us to simulate that we were not the only attackers to break into root.
what is account or password name.???????????
In this room you dont need any acc of psw
"manager" is login
Password123@@muci.72