If you spotted any areas for improvement, have alternative techniques, or discovered other creative ways to hack this machine, please share them in the comments. Your insights help us all grow as ethical hackers! 👍
I like the pace of the actions / narration taken here. There's no need to speed through it, let the CPU speed thru hashcat instead. I'd rather be accurate than fast, less bugs that way.
Sure thing! We first created the symlink ( ln -s / rooot ) which gives us access to /etc/shadow file, in which we gave RWX (read,write,exec) permissions to with the acl.sh script by ( sudo /opt/acl.sh mtz rwx /home/mtz/rooot/etc/shadow and then echo in a new password into /etc/shadow for root user.
Hello Chris, have you thought about doing videos on bug bounty hunting for hackerone? I feel like that could be a very educational video and I believe someone with your skills could it.
If you spotted any areas for improvement, have alternative techniques, or discovered other creative ways to hack this machine, please share them in the comments. Your insights help us all grow as ethical hackers! 👍
WTF, I thought you had millions of subscribers. Quality is amazing, so is the content. Keep that good work man.
Thanks for the kind words!
Maaaaaan this channel is lit, really glad i founded you. Keep the hard work!
Glad you enjoy it!
This video is amazing, beautifully edited and layed out. I’m honestly shocked at your sub count. Keep up the quality, you’re gonna blow up for sure
Thank you! Will do!
How do you only have 700 subs? Insane production quality and very detailed walkthrough
I appreciate it! I'm working on always improving.
I like the pace of the actions / narration taken here. There's no need to speed through it, let the CPU speed thru hashcat instead. I'd rather be accurate than fast, less bugs that way.
Appreciate it! Accuracy over speed for sure, let the CPU handle the rush 👍
Πολύ ωραία δουλειά. Συνέχισε!
Appreciate you!
Very nice man love the content! Don't quit
Appreciate it!
Hey Chris, could you please put light on how you got the root access. It was bit confusing what exactly you did there?
Sure thing! We first created the symlink ( ln -s / rooot ) which gives us access to /etc/shadow file, in which we gave RWX (read,write,exec) permissions to with the acl.sh script by ( sudo /opt/acl.sh mtz rwx /home/mtz/rooot/etc/shadow and then echo in a new password into /etc/shadow for root user.
Great you understand in easyway😊
Appreciate you! 👍
If you already added the target machine IP to your local hosts. You can "getent hosts" on the terminal to avoid cat it out your etc/hosts
Great tip! 👍getent hosts is definitely a cleaner way to check entries without dumping the whole /etc/hosts file. Appreciate you sharing this!
You are a great teacher
Appreciate it!
What cli terminal are you using?
looks like the default on elementary os
kali linux with zsh and tmux
@@chrisalupului 🫡
Keep up making these kind of videos
That's the plan!
Hello Chris, have you thought about doing videos on bug bounty hunting for hackerone? I feel like that could be a very educational video and I believe someone with your skills could it.
That sounds like a great idea, will jolt that down and look into it more. Appreciate ya!
Please I’m a beginner, I want to know if i can start learning with your videos
You got it! My channel is designed to help beginners, so you're in the right place. 😄
Nicely done 👍
Thank you 😄
Hi cris why you hacking sites ?
I'm practicing ethical hacking on platforms like Hack The Box to improve my cybersecurity skills, not hacking any sites maliciously
Speak faster pls
Will work on it! You can also chipmunk me at 1.5x speed me which is what I do when I work on my videos. lol
Just 1.5x speed. I personally like his speaking rate because newcomers will be able to follow easier
@@chrisalupului 😂