HackTheBox - Investigation

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ก.พ. 2025

ความคิดเห็น •

  • @sb77de
    @sb77de ปีที่แล้ว +1

    solid reversing, I went the lazy strings binary route 😆

  • @jeb8401
    @jeb8401 ปีที่แล้ว

    Great video as always. I notice you do some blue team stuff on occasions, it would be really interesting to see some stuff on Windows logs, particually on tracking activity from a user from login to logout if you have anything cool to show.

  • @cvport8155
    @cvport8155 ปีที่แล้ว +6

    Please make more vd for advanced techniques red team and pivoting

  • @css2165
    @css2165 ปีที่แล้ว

    dunno where we would be without you

  • @maoropizzagalli4153
    @maoropizzagalli4153 ปีที่แล้ว

    Wow I spent so much time on that initial foothold ! I made it work without the '/' by using php -r exec(base64_decode(EXPLOIT_B64)). Even there I had problem executing /bin/sh and /bin/bash. I'm impressed with the mv .sh .html thing to reverse shell move. ggs

  • @johnhupperts
    @johnhupperts ปีที่แล้ว

    differing 404 pages would suggest Apache/NGINX is a reverse proxy in front some other server like Python Flask or something, right?

  • @olawalehassan3632
    @olawalehassan3632 ปีที่แล้ว

    Awesome Walkthrough IPPSEC, Thanks for showing your metheodology for the log analysis and password extraction. I was waiting for your video till Investigation retired. When I did the box, I had to manaully search special characters using VS code which was daunting. Thanks once again.

  • @pythonlover7660
    @pythonlover7660 ปีที่แล้ว +3

    There’s a part that I don’t think it makes sense. In your Perl example, you’ve specified the pipe character in the path of the file “TheFile” whose content will be executed. However, this wasn’t the case against the target in which you’ve injected your command in the file name without touching the content of the image. In the latter case, the file content was not executed as was the case in the former Perl example. I would appreciate your clarification on this.
    Thanks for the video!

    • @ippsec
      @ippsec  ปีที่แล้ว +5

      So in the Demo i showcase perl executing a command when opening a file. Exiftool has to open files to read the metadata. I put the RCE as the filename so when exiftool went to open the file it executed the command instead.

  • @kerbalette156
    @kerbalette156 ปีที่แล้ว

    Epic

  • @buffgarlichero
    @buffgarlichero ปีที่แล้ว

    Great walkthrough

  • @r3dp4rrot
    @r3dp4rrot ปีที่แล้ว +7

    I can't digest that 1 dislike.

  • @tg7943
    @tg7943 ปีที่แล้ว

    Push!

  • @pgangaraoganga4906
    @pgangaraoganga4906 ปีที่แล้ว

    Its appear very small letters whatever giving information please increse sizes of words

  • @felixkiprop48
    @felixkiprop48 ปีที่แล้ว

    Thanks for the videos. I am having a problem viewing gobuster output, i tried less,vim even nano, but i keep seeing those weird coloring symbols. How can i view it correctly??

    • @kariminal2999
      @kariminal2999 ปีที่แล้ว +2

      Use less with -R

    • @somerandomwithacat750
      @somerandomwithacat750 ปีที่แล้ว +2

      Pass it to less, and then pass it to more. This will give you more of less

    • @felixkiprop48
      @felixkiprop48 ปีที่แล้ว

      @@kariminal2999 Thanks man

  • @vijayvj3976
    @vijayvj3976 ปีที่แล้ว

    Hey ippsec....❤