Комментарии:
Great video as usual.Any plans about smasher?
ОтветитьWoohoo 😍😍
ОтветитьLol this box was hardest than i thought...
ОтветитьDamn...there are so many ways :D
Ответитьbro what u did to make good skill at web app pentesting??plz share......
ОтветитьNice to know the route I went down is similar to yours!
Great video as always!
You are my Master🙏
ОтветитьNice, How long you learning hacking?
ОтветитьSo let me understand I used sql injection , this vulnerability on this box was an error by the creator or just another way to exploit it?
ОтветитьWow I over thought this box
ОтветитьLove every single video of ippsec :)
ОтветитьThanks brother, I have learned a lots of techniques from you those helped in many situations. Keep going.
ОтветитьWhere can i get the wordlists you use ?
ОтветитьGreat show
Ответитьawesome video!!
ОтветитьYet another great video from Ippsec. The breakdown you include in the description is perfect for referencing later on - thanks, and keep up the phenomenal work!
ОтветитьLike potato chips or heroin: now I just can’t stop. Thanks Ipp!
Ответить@ippSec master teach me your way
ОтветитьHello IPSEC
I really like to see the challenges you're advertising
I'm currently doing a challenge at HTB
And I need to upload permissions from a simple user to a root user
You can post one or more videos showing how to perform Linux Privilage Escalation
Thank you....
Why dont you use the built in bruteforcer of burpsuite?
ОтветитьI didn't quite understand the situation, did the machine stimulate a situation where tyler(as a human being) click the link or is there some kind of auto link opening that is common?
Ответитьyou are fucking awesome
Ответитьanyone knows the purpose of single minus after the double minus 'or 1=1 -- -
ОтветитьCongrats mate, I hope I'll be working with the same easy approach u have! Big up!
ОтветитьThanks for mentioning JuicyPotato. That small mention sent me down a rabbit hole of knowledge :)
ОтветитьHi Ippsec, thanks for the videos. I'm learning so much from them. I have a question though, why do we need to use netcat64 instead of just nc.exe?
ОтветитьGreat and quick box, loved how xss and iframe were shown. Thanks dude
Ответитьlmao
"it just deleted my note"
Next screen when prompted to enter a new note: "sad"
I've noticed that if you do the "Sign Out" too quick, after sending the link to change the password, it didn't work. You need to wait some seconds before Signing OUT. I guess that if you sign out the process that handle the "contact us" message die with your session so you need to give him some time to finish.
ОтветитьBasic nc.exe from /usr/share/windows-binaries got blocked by AV. Thanks to you, learned about nc64.exe.
ОтветитьHow do you know that an admin clicks the link sent by contact form? just experience?
Ответить