HackTheBox - SecNotes

HackTheBox - SecNotes

IppSec

5 лет назад

32,435 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@swift87100
@swift87100 - 19.01.2019 18:02

Great video as usual.Any plans about smasher?

Ответить
@pwnweb5734
@pwnweb5734 - 19.01.2019 18:47

Woohoo 😍😍

Ответить
@antoniosalinas8178
@antoniosalinas8178 - 19.01.2019 19:39

Lol this box was hardest than i thought...

Ответить
@50ksubscribers49
@50ksubscribers49 - 19.01.2019 19:59

Damn...there are so many ways :D

Ответить
@oxovi
@oxovi - 19.01.2019 20:02

bro what u did to make good skill at web app pentesting??plz share......

Ответить
@joshuacarter4298
@joshuacarter4298 - 19.01.2019 20:14

Nice to know the route I went down is similar to yours!

Great video as always!

Ответить
@anujpanchal1390
@anujpanchal1390 - 19.01.2019 20:26

You are my Master🙏

Ответить
@neafirmisani5199
@neafirmisani5199 - 19.01.2019 20:54

Nice, How long you learning hacking?

Ответить
@Virgula7eBloomO
@Virgula7eBloomO - 19.01.2019 22:26

So let me understand I used sql injection , this vulnerability on this box was an error by the creator or just another way to exploit it?

Ответить
@Anbualex
@Anbualex - 20.01.2019 00:32

Wow I over thought this box

Ответить
@TsukiCTF
@TsukiCTF - 20.01.2019 04:21

Love every single video of ippsec :)

Ответить
@sumeshms7481
@sumeshms7481 - 20.01.2019 06:00

Thanks brother, I have learned a lots of techniques from you those helped in many situations. Keep going.

Ответить
@professorenglish1145
@professorenglish1145 - 20.01.2019 13:39

Where can i get the wordlists you use ?

Ответить
@cactusjuice9709
@cactusjuice9709 - 20.01.2019 14:00

Great show

Ответить
@audi1800G36C
@audi1800G36C - 21.01.2019 08:25

awesome video!!

Ответить
@teeceetime2
@teeceetime2 - 21.01.2019 18:07

Yet another great video from Ippsec. The breakdown you include in the description is perfect for referencing later on - thanks, and keep up the phenomenal work!

Ответить
@SchoolforHackers
@SchoolforHackers - 22.01.2019 05:11

Like potato chips or heroin: now I just can’t stop. Thanks Ipp!

Ответить
@ronak3600
@ronak3600 - 24.01.2019 20:11

@ippSec master teach me your way

Ответить
@yanivmoyal5518
@yanivmoyal5518 - 25.01.2019 10:01

Hello IPSEC
I really like to see the challenges you're advertising
I'm currently doing a challenge at HTB
And I need to upload permissions from a simple user to a root user
You can post one or more videos showing how to perform Linux Privilage Escalation
Thank you....

Ответить
@VNMHCKR
@VNMHCKR - 26.01.2019 01:38

Why dont you use the built in bruteforcer of burpsuite?

Ответить
@avishabat5167
@avishabat5167 - 26.01.2019 22:17

I didn't quite understand the situation, did the machine stimulate a situation where tyler(as a human being) click the link or is there some kind of auto link opening that is common?

Ответить
@2dcoders110
@2dcoders110 - 26.01.2019 23:28

you are fucking awesome

Ответить
@warzinn
@warzinn - 02.02.2019 18:56

anyone knows the purpose of single minus after the double minus 'or 1=1 -- -

Ответить
@maphioso
@maphioso - 12.02.2019 10:10

Congrats mate, I hope I'll be working with the same easy approach u have! Big up!

Ответить
@nopnopnopnopnopnopnop
@nopnopnopnopnopnopnop - 27.03.2019 23:18

Thanks for mentioning JuicyPotato. That small mention sent me down a rabbit hole of knowledge :)

Ответить
@vuanh0110
@vuanh0110 - 27.12.2019 02:39

Hi Ippsec, thanks for the videos. I'm learning so much from them. I have a question though, why do we need to use netcat64 instead of just nc.exe?

Ответить
@desktopt328
@desktopt328 - 28.01.2020 22:01

Great and quick box, loved how xss and iframe were shown. Thanks dude

Ответить
@InfiniteLogins
@InfiniteLogins - 10.12.2020 22:09

lmao
"it just deleted my note"
Next screen when prompted to enter a new note: "sad"

Ответить
@jess_a_es
@jess_a_es - 20.03.2021 19:32

I've noticed that if you do the "Sign Out" too quick, after sending the link to change the password, it didn't work. You need to wait some seconds before Signing OUT. I guess that if you sign out the process that handle the "contact us" message die with your session so you need to give him some time to finish.

Ответить
@Repeatunt1l
@Repeatunt1l - 06.05.2021 22:47

Basic nc.exe from /usr/share/windows-binaries got blocked by AV. Thanks to you, learned about nc64.exe.

Ответить
@hashibi-d4d
@hashibi-d4d - 29.01.2022 09:57

How do you know that an admin clicks the link sent by contact form? just experience?

Ответить