TryHackMe! Buffer Overflow & Penetration Testing

  Рет қаралды 77,670

John Hammond

John Hammond

4 жыл бұрын

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 84
@Ropex
@Ropex 4 жыл бұрын
Lord Pingu didn't deserve his name to be slandered >:(
@_JohnHammond
@_JohnHammond 4 жыл бұрын
NOOT N00T
@stevecooper3574
@stevecooper3574 4 жыл бұрын
That room is a fantastic walkthrough for simple buffer overflows. Great job on the vid and to the room creator!
@jazzorgangrooves
@jazzorgangrooves 3 жыл бұрын
You are just amazing. Thank you for making such worthful videos. I'm learning so much, everyday, just lookin' at your tutorials. God bless you John
@ChamplooMusashi
@ChamplooMusashi 4 жыл бұрын
Happy to see a video on the whole process of executing a buffer overflow exploit. Helps from the programming side to understand more of what needs to be done to make code more secure (evil strings!)
@crump404
@crump404 4 жыл бұрын
This is a brilliant room John also a brilliant video. Thanks.
@davidfox4253
@davidfox4253 4 жыл бұрын
Thanks for that great walk thru and the "Think allowed" approach!! Cheers
@petehinch3871
@petehinch3871 4 жыл бұрын
Cool man. Learning so much watching your videos
@samsepi0l227
@samsepi0l227 2 жыл бұрын
thank you for everything john!!!
@TataruTaru
@TataruTaru 3 жыл бұрын
This is one of the first I've seen where we actually fills in the readme. Most of them, he makes the readme, and never goes back to it :)
@cooliceman0001
@cooliceman0001 3 жыл бұрын
Thank you for another great video
@garrettblackard2288
@garrettblackard2288 4 жыл бұрын
Thats so awesome about the room u made congratulations
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Thanks so much! Peak Hill seemed to be well-received!
@KaLata123456
@KaLata123456 3 жыл бұрын
Hey John-love your videos , keep it up. On this particular video when you perform the netcat for reverseshell you use 2 commands on the your attacking machine to connect to the victim besides setting up the listener (nc -lnvp 12789). Those 2 commands are nc_reverseshell.sh and nc_stabilize.sh. Can you explain where do you get those executables and how they apply to this use case. Thanks
@D3fconNull
@D3fconNull 4 жыл бұрын
Here we go, bring it up John :)
@01nfluence
@01nfluence 4 жыл бұрын
Great video! Do you have a video that explains all of the scripts/repositories you're using? Thanks!
@nuridincersaygili
@nuridincersaygili 2 жыл бұрын
This is pure gold for me!
@neilthomas5026
@neilthomas5026 4 жыл бұрын
very cool vid as always :) , and cant wait to work on your room :)
@MrZyman
@MrZyman 4 жыл бұрын
Soo good!
@Thmyris
@Thmyris 4 жыл бұрын
I did the same thing with wget a few days ago lol. Downloading the source instead of raw output.
@bluefloyd9058
@bluefloyd9058 2 жыл бұрын
"noot noot!". That penguin is from a kids show I used to watch here in NZ called pingu.
@ashutoshpanda4336
@ashutoshpanda4336 4 жыл бұрын
How come you're not using "dir" option in gobuster in current version it's necessary i guess... ippsec does use it... i struggled with that few times
@masonfuller9823
@masonfuller9823 4 жыл бұрын
"now we are papa"
@mattstorr
@mattstorr 2 жыл бұрын
Nice run through. was a wee bit fast in some locations though to see what you were doing.
@mi2has
@mi2has 4 жыл бұрын
buffer overflow part is great
@patonwhite9385
@patonwhite9385 3 жыл бұрын
Can someone comment what the multi window term is? I like the way John jumps quickly to a split for the ping then closes (what hotkeys are being used?)
@cocosloan3748
@cocosloan3748 4 жыл бұрын
Peak hill hype !!! Im choosing not to watch this video (for now) sinve I will try it myself.If I stuck-I know where to find all the answers John :)
@hiimzackjones
@hiimzackjones 2 жыл бұрын
whoa whoa whoa. what is this guake and stabilize shell thing you did? I need that so so much. Incoming DM.
@xBDCFF
@xBDCFF 4 жыл бұрын
10:05 I'm just curious, why is it not the best to take it from the repos ? is it not updated regularly ?
@scheli
@scheli 4 жыл бұрын
Mostly for ubuntu universe packages, it will get no updates at all. He is using xenial, the sqlmap package there is 4 years old :)
@Thmyris
@Thmyris 4 жыл бұрын
@@scheli oof
@xBDCFF
@xBDCFF 4 жыл бұрын
4:36 Lies, i screamed ^^
@671Neuhof
@671Neuhof Жыл бұрын
Tryhackme is great for learning. I used to learn new techniques or new languages only on Udemy, but in my opinion I learn much better on THM as it's quite practical. Without your channel id propably never found that website
@NeelNarayan
@NeelNarayan 4 жыл бұрын
What does stablise shell do ?
@sol2588
@sol2588 4 жыл бұрын
Does anybody know what software he uses for the Linux terminal? Or is it the default for some distro? Would like to use. Thanks!
@nicolassurfay2585
@nicolassurfay2585 4 жыл бұрын
it's terminator
@viraat_maurya
@viraat_maurya 4 жыл бұрын
i also try buffer overflow but it printed out permission denied on $ cat /var/backups/shadow.bak
@faanross
@faanross Жыл бұрын
Can't find it - has the room been removed?
@mmarsyad
@mmarsyad 4 жыл бұрын
Can i know what the version of ubuntu that you are using now?
@traperti9098
@traperti9098 4 жыл бұрын
Where can I start learning about hacking ? I’m very interested
@AgentPenguinHack
@AgentPenguinHack 4 жыл бұрын
More please!
@_JohnHammond
@_JohnHammond 4 жыл бұрын
More on the way! Thanks so much for watching!
@JashanSaini18
@JashanSaini18 4 жыл бұрын
This seems super cool/fun to do. Is there a way to go about learning all this? If so, does anyone have any tips/ places I can go to and learn? (I am brand new to this and would need to start from the very beginning)
@Apathy474
@Apathy474 Жыл бұрын
What did you end up doing
@sahilsaxena2275
@sahilsaxena2275 3 жыл бұрын
Could please make a video on what you did at 16:21
@abdulsamihamedi5584
@abdulsamihamedi5584 Жыл бұрын
this room took me 4 hours to complete!!!
@hypedz1495
@hypedz1495 2 жыл бұрын
John.. john hammond.. ngl the only thing bugging me on this one is the 15% packet drop.
@sovietcat4825
@sovietcat4825 3 жыл бұрын
Even I have the habit of keeping a log/notes/writeup of any ctf or task
@Laflamablanca969
@Laflamablanca969 4 жыл бұрын
Do an easy room for us newbies 😁
@ritabandas
@ritabandas 3 жыл бұрын
Lol that's what I do. Throw my notes on GitHub as a writeup.
@znation4434
@znation4434 2 жыл бұрын
Aaand WHAT IS HAPPENING made me laugh lmao
@thatonesilverfuck6954
@thatonesilverfuck6954 4 жыл бұрын
Loved peak hill
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Happy to hear that, thanks so much for playing!
@mohammdrezamollasalehi4822
@mohammdrezamollasalehi4822 4 жыл бұрын
plz make video for Ignite room !!
@SiliconSentry
@SiliconSentry 4 жыл бұрын
Did this one last night and got caught at the same point with the 'hidden' passwd file, looking for a file owned by pingu.
@_JohnHammond
@_JohnHammond 4 жыл бұрын
That was tricky! Thanks for watching!
@gianlu9858
@gianlu9858 3 жыл бұрын
Was I the only one havig issue to crack the root password? John takes ages (On the video it looks like more than 24 hours, while doing the room I left it for about 20 mins) and hashcat was not starting (I think some issue with the VMWare environment) have someone sort it out? Any Advice for next time? Thanks :)
@MD4564
@MD4564 4 жыл бұрын
Nice! What's the command at 16:25 ?
@jovangazivoda2033
@jovangazivoda2033 4 жыл бұрын
you can find it on pentestmonkey(dot)net like it's described in [Task 5] (reverse shell for netcat)
@josephschady1728
@josephschady1728 4 жыл бұрын
What video recording software do you use?
@_JohnHammond
@_JohnHammond 4 жыл бұрын
I use OBS Studio. I should make a tutorial on it soon!
@josephschady1728
@josephschady1728 4 жыл бұрын
John Hammond thank you, pls do! Right now I’m using Kazam but the audio is not the best, that might just be my computer though.
@aquibjavedrollnumber1763
@aquibjavedrollnumber1763 3 жыл бұрын
Cade copper??
@jeromekim5856
@jeromekim5856 4 жыл бұрын
you the real mvp :'(
@0xshaheen
@0xshaheen 4 жыл бұрын
I want to know how you are using gobuster without dir flag 😅
@ransomware9086
@ransomware9086 4 жыл бұрын
@Shaun he is using an old version or an alias
@viraat_maurya
@viraat_maurya 4 жыл бұрын
also tried your syntax stil same result
@ca7986
@ca7986 4 жыл бұрын
♥️
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Ceqylenjoy ?
@zerofuchs6976
@zerofuchs6976 3 жыл бұрын
4:37 - I did!
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Sull emply skills development adr parsin skills tools URL grpoing arrows work.
@lizardfog
@lizardfog 3 жыл бұрын
great, but would have been even better if you slowed down a bit
@Sutatu
@Sutatu Жыл бұрын
10:16-10:20 *me, looking at the time left*: hmmmmmmmm
@Thmyris
@Thmyris 4 жыл бұрын
This box whooped my ass. Certainly not easy for me, I was completely lost at the buffer overflow part. Any good tutorial suggestions fellow commenters?
@aidancollins1591
@aidancollins1591 4 жыл бұрын
LiveOverflow has a great series on binary exploitation, "Binary Exploitation".
@VRWarehouse
@VRWarehouse 4 жыл бұрын
this is a comment.
@sand3epyadav
@sand3epyadav 3 жыл бұрын
So hard
@lama-chan
@lama-chan 2 жыл бұрын
DID YOU JUST SAY "WHATEVER THAT IS" TO PINGU'S NAME??? HOW DARE YOU
@jaydensh7380
@jaydensh7380 3 жыл бұрын
Did anyone tell you that you look similar to Harry Potter 😅😅
@cheekibreeki4624
@cheekibreeki4624 4 жыл бұрын
Its pronounced Ping Goo
@cassandradawn780
@cassandradawn780 4 жыл бұрын
Help guys i cant think of a good comment
@sagar2030
@sagar2030 4 жыл бұрын
its better if "Try hack me" do not have hints.
TryHackMe! KENOBI - Linux Pentest: Samba Shares
34:11
John Hammond
Рет қаралды 91 М.
Basic Buffer Overflow - VulnServer TRUN
1:03:04
John Hammond
Рет қаралды 194 М.
ХОТЯ БЫ КИНОДА 2 - официальный фильм
1:35:34
ХОТЯ БЫ В КИНО
Рет қаралды 2,4 МЛН
Como ela fez isso? 😲
00:12
Los Wagners
Рет қаралды 28 МЛН
Cat story: from hate to love! 😻 #cat #cute #kitten
00:40
Stocat
Рет қаралды 14 МЛН
How to Set Up Nextcloud on Ubuntu 24.04 LTS
41:20
Learn Linux TV
Рет қаралды 6 М.
TryHackMe GAMING SERVER - LXD Privilege Escalation
34:50
John Hammond
Рет қаралды 162 М.
TryHackMe! Skynet - Wildcard Injection
47:18
John Hammond
Рет қаралды 109 М.
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
John Hammond
Рет қаралды 141 М.
TryHackMe! Tartarus - Website Password Bruteforcing
31:59
John Hammond
Рет қаралды 94 М.
Buffer Overflows: A Symphony of Exploitation
30:18
crow
Рет қаралды 65 М.
how do hackers exploit buffers that are too small?
8:25
Low Level Learning
Рет қаралды 184 М.
SQLite Injection
1:59
Ketan Mukane
Рет қаралды 767
TryHackMe! Bypassing Upload Filters & DirtySock
53:38
John Hammond
Рет қаралды 68 М.
ХОТЯ БЫ КИНОДА 2 - официальный фильм
1:35:34
ХОТЯ БЫ В КИНО
Рет қаралды 2,4 МЛН