HackThebox - Explore

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ม.ค. 2025

ความคิดเห็น •

  • @socat9311
    @socat9311 3 ปีที่แล้ว +45

    Taking OSCP tomorrow. Regardless of the result, thank you for all the amazing content. Goes far beyond a simple cert.

    • @quriusfox
      @quriusfox 3 ปีที่แล้ว +10

      Good luck! Be calm, take breaks and keep a opened mind. There is always a way in and most of the times people failed because they have missed basic stuff during the enumeration process. If you'll be stuck for a long time, take a break, make yourself a cup of tea/coffee, chill out for a while and get back to work. Enumerate like your life depends on it :D You've got this!

    • @cy_wareye7395
      @cy_wareye7395 3 ปีที่แล้ว

      Good luck! :) make things happen

    • @socat9311
      @socat9311 3 ปีที่แล้ว +2

      @@quriusfox thank you yeah coffee definitely haha! :)

    • @socat9311
      @socat9311 3 ปีที่แล้ว +1

      @@cy_wareye7395 will try hehe thanks!

    • @JoPraveen
      @JoPraveen 3 ปีที่แล้ว +1

      Gl man

  • @jondoe79
    @jondoe79 3 ปีที่แล้ว +3

    We really appreciate the time and knowledge you are giving you us. True dedication

  • @shyhotboy1352
    @shyhotboy1352 3 ปีที่แล้ว +8

    Extra content maybe tomorrow? 👉👈

    • @ippsec
      @ippsec  3 ปีที่แล้ว +13

      I don't have anything planned. Was busy last week, so didn't have time to put anything togather.

    • @shyhotboy1352
      @shyhotboy1352 3 ปีที่แล้ว +1

      @@ippsec It´s ok, thank you for the great content. ❤

  • @didyouknowthat1541
    @didyouknowthat1541 ปีที่แล้ว

    Bro, really ready good
    Your teaching is awesome ❤❤

  • @answoddlawnrlwk5978
    @answoddlawnrlwk5978 3 ปีที่แล้ว +1

    ippsec you are a great teacher.

  • @nuclearnoodlesman8656
    @nuclearnoodlesman8656 ปีที่แล้ว

    So happy to see the legendary Ippsec using my exploit in 05:16

  • @kasuntechtest8871
    @kasuntechtest8871 3 ปีที่แล้ว +1

    As usual the king of htb

  • @nekomimi_moe5855
    @nekomimi_moe5855 3 ปีที่แล้ว +15

    In fact, the most difficult part of this machine is to be able to type the credentials without making mistakes.
    This is where I lost the most time :(

    • @andresstreetpunk
      @andresstreetpunk 3 ปีที่แล้ว

      for me the port forwarding, I dont feel it natural lol...

  • @Baeyk
    @Baeyk 2 ปีที่แล้ว

    damn man i love u

  • @ca7986
    @ca7986 2 ปีที่แล้ว

    ❤️

  • @adstudio5046
    @adstudio5046 2 ปีที่แล้ว

    Is there any problem with the machine, i am not able to ssh on port 2222 :(

  • @NecroKennny
    @NecroKennny 3 ปีที่แล้ว

    after i use 'squiggly c' it says not found, can anyone explain what im missing?

  • @droox6372
    @droox6372 3 ปีที่แล้ว +1

    7:26 haha you are trapped

  • @sand3epyadav
    @sand3epyadav 3 ปีที่แล้ว

    Very nice video sr,

  • @MrMeLaX
    @MrMeLaX 3 ปีที่แล้ว

    Thank you.

  • @BasavarajBanakar
    @BasavarajBanakar 3 ปีที่แล้ว

    i cant understand how to get that ssh> in victim machine

    • @rohitthakur.9587
      @rohitthakur.9587 3 ปีที่แล้ว

      Same

    • @BasavarajBanakar
      @BasavarajBanakar 3 ปีที่แล้ว

      @@rohitthakur.9587 I understood bro first of all we need ssh access of the victim machine there we can access that ssh interactive shell

    • @NicolastheThird-h6m
      @NicolastheThird-h6m 3 ปีที่แล้ว

      @@BasavarajBanakar type ' ~C ' . it launches an interactive ssh shell.

    • @BasavarajBanakar
      @BasavarajBanakar 3 ปีที่แล้ว

      @@NicolastheThird-h6m Thanks brother I got it already.

    • @NecroKennny
      @NecroKennny 3 ปีที่แล้ว

      @@NicolastheThird-h6m i keep getting this "/system/bin/sh: ~C: not found
      "

  • @biniesh7097
    @biniesh7097 3 ปีที่แล้ว

    cool

  • @aymanhafez8798
    @aymanhafez8798 3 ปีที่แล้ว

    Please please please make more videos for android hacking .... You very good 🙂 thank you

  • @ragumu_rugiku
    @ragumu_rugiku 3 ปีที่แล้ว +2

    Ten ten ten

  • @tanja84dk1
    @tanja84dk1 3 ปีที่แล้ว +2

    Thank you very much for showcasing the box.
    Just curious do you believe that the adb port were open because USB-debugging were activated in android ( perhaps also why it were filtered over device ip )
    Also thank you for reminding us about how easy it is to list content without knowing the files ( it has really made me think about perhaps not always transfer files that way when in environments that I don’t control )

    • @anon6612
      @anon6612 3 ปีที่แล้ว

      In one of the scan, we saw that the box was a VMWARE virtual machine and in a scan we found that it was running a ES File explorer and the box was an android device. It was pretty clear that the box was android vm which was hosted over VMWARE. I think it was rooted android VM by default and in rooted VM's USB debugging is enabled by default. The main challenge was to discover that there is 5555 port was internally running with an adb shell and doing the port forwarding over ssh.

    • @anon6612
      @anon6612 3 ปีที่แล้ว

      and in rooted android vm's gaining root privileges can be accessed easily as "ippsec" demonstrated by using a simple command su.

  • @coopergaffney2012
    @coopergaffney2012 3 ปีที่แล้ว

    The password was such a pain when i ssh'd. I kept getting It wrong but couldn't see which character. So i started making my own passwords that difficult just to troll any would be foes.

  • @passerby184
    @passerby184 3 ปีที่แล้ว +2

    Didn't know there is android box

  • @hansolo7785
    @hansolo7785 3 ปีที่แล้ว

    Ooooo

  • @ismail5344
    @ismail5344 3 ปีที่แล้ว +4

    Can u please do Bounty hunter machine next?love the content

    • @hadrian3689
      @hadrian3689 3 ปีที่แล้ว +4

      He will once the machine retires

  • @vikkyvini1234
    @vikkyvini1234 3 ปีที่แล้ว +1

    Hello, your videos are so detailed, do you have tutorial for beginner frdly?

  • @GunniBusch1
    @GunniBusch1 3 ปีที่แล้ว +1

    Can I have your brain?