Exploiting Unauthenticated Redis - TryHackMe!

  Рет қаралды 31,897

John Hammond

John Hammond

3 жыл бұрын

To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?... (disclaimer, affiliate link) Hang with our community on Discord! johnhammond.org/discord
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 65
@garoyse
@garoyse 3 жыл бұрын
FYI. Redis is pronounced like the color, not the plant. REDis. As an employee of said company, I can say this with authority.
@_JohnHammond
@_JohnHammond 3 жыл бұрын
This is great to hear, I will correct my vernacular. :) Thanks for the heads up!
@lonelycount1
@lonelycount1 3 жыл бұрын
Not the hero we deserved, but the hero we need, great video Seth Rogen.
@ARZ10198
@ARZ10198 3 жыл бұрын
Whenever I feel down your videos always motivates me to do more TryHackMe
@kotiwa
@kotiwa 3 жыл бұрын
same
@xBZZZZyt
@xBZZZZyt 3 жыл бұрын
16:10 You need to escape "&" with "%26" because "&" is query parameter separator
@aaaabbbb2553
@aaaabbbb2553 3 жыл бұрын
True, although it’s the servers’s job to parse the query string so it doesn’t really matter in this case
@Giperium
@Giperium Жыл бұрын
Great video! I am glad to see your walkthroughs for non-standard approaches to solving problems. I always learn something new. That's why I love you John)! Keep it up !!!
@abhishekaaronstone
@abhishekaaronstone 3 жыл бұрын
Your videos are very informative and helpful, keep up the good work!!
@sibyskaria6694
@sibyskaria6694 3 жыл бұрын
Great video fun to watch and learn from your videos. Thank you John.
@aungkyawminnaing7011
@aungkyawminnaing7011 3 жыл бұрын
Thanks ! always motivate for me
@diabawii
@diabawii 3 жыл бұрын
for the bash reverse shell you need to url encode the payload as it contain & and special chars , encode the payload and it will work :) , Good hacking guys.
@fabiancostamoling
@fabiancostamoling 3 жыл бұрын
best... as always you are!
@checknate8820
@checknate8820 3 жыл бұрын
Interesting that you just posted a video on redis. I just came across that in one of the ejpt labs and did some research on it.
@kotiwa
@kotiwa 3 жыл бұрын
Hey John. i was wondering if you came up with a twitch schedule at all? or if theres a certain day or time that you stream. Also, thank you for all the great videos.
@Multivdeos
@Multivdeos 3 жыл бұрын
Hey john I think that the bash reverse shell at 19:00 did not work because of the special characters used being confused with the HTTP protocol, what you could do is URL encoding, send the request to burp, highlight the payload and do ctrl u to URL encode the payload, that might work
@mattplaygamez
@mattplaygamez 3 жыл бұрын
Who is ready for the next tryhackme video
@000t9
@000t9 3 жыл бұрын
+ 1
@NodePoint
@NodePoint 3 жыл бұрын
On the part where you were trying to use bash to access the machine though netcat, chances are that the bash method didn't work because the raw '&' in the given command in the browser omnibar is being interpreted as a (GET) parameter separator and so the command ended up being cut up. As a result, 'bash -i>' (just before the first occurring '&') will only be seen with the 'c' GET parameter on the PHP side of things. For it to not be seen as a query separator but rather part of a value, '&' needs to be URI encoded ('%26').
@shauncollins1280
@shauncollins1280 3 жыл бұрын
I just did this in NCL recently!
@glitchdigger
@glitchdigger 2 жыл бұрын
never seen gtfobins. awesome bro.
@ichigok2594
@ichigok2594 3 жыл бұрын
I wonder feom where does John gets so much of energy. Wish I can know his secret. 🙏 I will start tryhackme and htb from tomorrow and will dedicate lot of time.
@akashhansda4306
@akashhansda4306 3 жыл бұрын
Caleb did a great job.
@hermansildnes2806
@hermansildnes2806 3 жыл бұрын
Would love a video on how you set up Kali and especially your terminal! It looks soo good
@mccoysebrell630
@mccoysebrell630 3 жыл бұрын
Terminator, tmux on macos
@codewithjd8731
@codewithjd8731 3 жыл бұрын
@john hammond u teached me more than my college did....thanks brother :)
@devanshujain3222
@devanshujain3222 3 жыл бұрын
College never use to teach usefull things 😂
@ARZ10198
@ARZ10198 3 жыл бұрын
College ? Man university don't even teach shit
@devanshujain3222
@devanshujain3222 3 жыл бұрын
@@ARZ10198 yeah , but white hat junior does 😂😂😂😂😂
@theguildofsilence
@theguildofsilence 3 жыл бұрын
sponsored by my favorite actor, Norman Redis
@DHIRAL2908
@DHIRAL2908 3 жыл бұрын
Ed Sheeran again with an amazing video!
@kundananji1
@kundananji1 3 жыл бұрын
Rustscan is pretty decent, can u do a box completely with pawncat?
@alexandervanpuyenbroeck4612
@alexandervanpuyenbroeck4612 3 жыл бұрын
This is really cool but how do I learn it myself?
@Serj772
@Serj772 3 жыл бұрын
Hey man, do you have any ideas or suggestions regarding pentesteracademy.com?
@rohullahalavi
@rohullahalavi 3 жыл бұрын
Nice
@ihatethesensors
@ihatethesensors 3 жыл бұрын
John Hammond, have you ever looked at CyberChef?
@marijuanarocks
@marijuanarocks 3 жыл бұрын
i was having the same problem with the docker container of rustscan. installing rustscan locally didn't give any issues.
@tannercampbell
@tannercampbell 3 жыл бұрын
Good to know, I have run into the same problem. I also got got better result by increasing the memory but your prob right to just install locally
@chrisrice8836
@chrisrice8836 3 жыл бұрын
28.00 gimmicks and fun things though, before I dive into dirty_cow and moo-ve into other things 😅 very punny John
@zezimadude13
@zezimadude13 3 жыл бұрын
pwncat is a pain in the ass to install and get working.. and then the confusion between pwncat and pwncat.. oh man.. and to have to run it in venv pretty much just because the custom paramiko fork that doesn't want to install properly makes it almost unusable.. which is heartbreaking cause I think this thing is amazing.
@mklucifer
@mklucifer 3 жыл бұрын
What would you try if it wouldn't accept php code execution?
@cheesesandwich1393
@cheesesandwich1393 3 жыл бұрын
i guess next video would be 0day or the market place
@yuk4z3
@yuk4z3 3 жыл бұрын
When did John switch to Kali?
@mccoysebrell630
@mccoysebrell630 3 жыл бұрын
This man uses so many system's it's hard to keep track of tbh
@klemenko345
@klemenko345 3 жыл бұрын
can we participate in the development of pwncat? Looks fun!
@XtecherPY
@XtecherPY Жыл бұрын
This guy might as well just know everything when it comes to hacking
@bruh_5555
@bruh_5555 3 жыл бұрын
I see you have switched to kali
@Luftimore
@Luftimore 3 жыл бұрын
A little tip for anyone regarding nmap: You can speed up full-range portscans with the --min-rate= command. E.g.: nmap -sC -sV --min-rate=10000 127.0.0.1
@brayangph
@brayangph 3 жыл бұрын
hi John, love your videos. I have a question that I have been wanted to ask you for some time. Like 6 months ago I was on a CTF from the University and they gave us a brute force challenge (CTF is already close :)). The challenge is truly intended to use brute force to get the password of the user admin, no other technique or backdoor. This is the only information available in the challange: Never give out your password to anyone. Don't just use one password. Make password at least 12 characters long. Include number, capital letters and symbols. Don't use dictionary words. Don't post it in plain sight. Consider using a password manager (KeePass, LastPass, etc). Consider using multi-factor authentication. Don't fall for "phishing attacks". Make sure your devices are secure Any recommendations? Hydra would not make for 12 characters passwords
@tymekl1509
@tymekl1509 3 жыл бұрын
Why not use rustscan since you used it before?
@tymekl1509
@tymekl1509 3 жыл бұрын
nwm
@imranthoufeeque165
@imranthoufeeque165 3 жыл бұрын
Ippsec already confirmed that -sC is not safe scripts its just the default scripts😊😊😊
@nikohegeheiskanen
@nikohegeheiskanen 3 жыл бұрын
Btw there is literally a command in pwncat to fix the stty size that was messing up your command :D
@_JohnHammond
@_JohnHammond 3 жыл бұрын
Yeah I was thinking either `reset` or `sync` would get it right for me but I might have messed something up there. Ah well!
@nikohegeheiskanen
@nikohegeheiskanen 3 жыл бұрын
@@_JohnHammond eh i dont remember which command has worked for me so oh well :D Nice video tho
@Spawn47
@Spawn47 6 ай бұрын
Linux is easy what if the redis in on windows that is challenging
@bhagyalakshmi1053
@bhagyalakshmi1053 11 ай бұрын
D codo details and corp codo details
@cybercub4367
@cybercub4367 3 жыл бұрын
do a thm livestream man
@tempus_fugit__
@tempus_fugit__ 3 жыл бұрын
It's redis not reedis
@mattplaygamez
@mattplaygamez 3 жыл бұрын
Use metasploit for reverse shell
@neilslater877
@neilslater877 3 жыл бұрын
How do I switch back to the local terminal? It says "C-k" but i have no idea what that is. I tried control k too?
@paulosaireldon3698
@paulosaireldon3698 3 жыл бұрын
I'm early
ShellShock & Kernel Exploits - TryHackMe! 0day
35:10
John Hammond
Рет қаралды 79 М.
Exploiting Tomcat with LFI & Container Privesc - "Tabby" HackTheBox
45:54
请善待你的娃娃第二集 #naruto  #cosplay  #shorts
00:52
佐助与鸣人
Рет қаралды 24 МЛН
КАКАЯ ХИТРАЯ КОШКА! #cat #funny #pets
00:50
SOFIADELMONSTRO
Рет қаралды 19 МЛН
Tax Geek ALERT: How to spot a FAKE "IRS Letter"
6:24
The Tax Geek
Рет қаралды 89
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 135 М.
I KNEW I’d Hate this (I Was Wrong)
12:19
Linus Tech Tips
Рет қаралды 382 М.
Bruteforcing MFA & Fail2ban Manipulation - TryHackMe! (Biteme)
44:38
JavaScript Fighting Game Tutorial with HTML Canvas
3:56:20
Chris Courses
Рет қаралды 4,7 МЛН
HackTheBox - "Remote" - Umbraco & Windows
48:23
John Hammond
Рет қаралды 81 М.
TryHackMe! Overpass - Authentication Bypass
35:18
John Hammond
Рет қаралды 136 М.
TryHackMe! Tartarus - Website Password Bruteforcing
31:59
John Hammond
Рет қаралды 94 М.
TryHackMe! DOGCAT - PHP Filters for Local File Inclusion
32:04
John Hammond
Рет қаралды 77 М.
Finding WEIRD Typosquatting Websites
24:26
John Hammond
Рет қаралды 230 М.