TryHackMe! Exploiting Nagios XI - NAX

  Рет қаралды 27,133

John Hammond

John Hammond

3 жыл бұрын

Hang with our community on Discord! johnhammond.org/discord
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 50
@liamlouw4643
@liamlouw4643 3 жыл бұрын
So so so happy you're doing one of these again! Loving the tools you're building and expanding, but these videos just hit different!
@fabiancostamoling
@fabiancostamoling 3 жыл бұрын
i love it when you recreate such descriptive videos... well done
@jhonycash6119
@jhonycash6119 3 жыл бұрын
Every time I look one of your videos, I learn something cool from you!! thanks man, here you got a big fan!
@nexenti3107
@nexenti3107 3 жыл бұрын
Great instructional video! found your channel after the Defcon talk :D
@x7331x
@x7331x 9 ай бұрын
Great content as always, thanks for making this! Although I get your "obsession" to automate everything, I found the atomic number of each element using the Interactive Fishersci table online, and then converted into ASCII using the handy converter from onlinetools, as I always lean on the simpler side of things. But it was great learning about the periodictable module, I have never seen it before! Getting an initial foothold on this room felt more like a treasure hunt, but it is always great to learn new things like the Piet language which also I have never heard before! Keep it up!
@shubhamdwivedi7766
@shubhamdwivedi7766 3 жыл бұрын
This video is going to help me in my upcoming practical exams machine solving🙂 Thank you for posting great content keep it up👌
@d0gkiller87
@d0gkiller87 3 жыл бұрын
The vars() trick is so neat!! thanks John
@MrPaddy35
@MrPaddy35 3 жыл бұрын
Very informative :) that piet thingy is very complex
@bnthsrikanth
@bnthsrikanth 3 жыл бұрын
Good see u back on THM 💕
@JvGenderen
@JvGenderen 3 жыл бұрын
The reason why you pronounce Piet as 'peet' is because this is a reference to Piet Mondrian who is a Dutch painter. This is how you proniounce his first name. Also thank you for the video, this is really interesting and I had no idea that his art has had influence in computers, strange world we live in!
@ARZ10198
@ARZ10198 3 жыл бұрын
Return of John's CTF
@rakenso
@rakenso 3 жыл бұрын
26:26 is the best part, better than the root part obviously :)
@jorisschepers85
@jorisschepers85 3 жыл бұрын
Keep them coming John.
@dopy8418
@dopy8418 3 жыл бұрын
Cool ! CTFs are back baby !!
@tataglontz
@tataglontz 3 жыл бұрын
"ASS...nice John :))" i laughed so hard. Thanks for sharing the knowledge. You are the reason i joined TryHackMe and this year i am planing on taking the eJPT, again because of your review and honest opinion.
@aravbudhiraja
@aravbudhiraja 3 жыл бұрын
Hello! Any update abt ur ejpt?
@tecnolinux1469
@tecnolinux1469 3 жыл бұрын
Second, happy to see you back on Tryhackme.
@prasadbroo
@prasadbroo 3 жыл бұрын
I really love your try hack me videos 😍
@Spaggelaar
@Spaggelaar 2 жыл бұрын
Really liked the Piet part!
@ruthvikvegunta7249
@ruthvikvegunta7249 3 жыл бұрын
I have written a python script which exploits the Nagios xi exploit, It checks if the Nagios version is vulnerable or not, if vulnerable it then uploads a PHP payload and then check for a privilege escalation vector, if a privilege escalation vector is found, it will exploit that also, it can give the user a low privilege shell if needed or root shell if needed, the script will do everything for you guys, right from connecting and creating a web server and starting a Netcat listener and catching the connection back. github.com/ruthvikvegunta/nagiosxi_rce-to-root @johnhammond I'd love if you can review the script as you are too good at python Comments and Feedback are welcome :)
@dudz6093
@dudz6093 3 жыл бұрын
Wtf, this is like sqlmap for nagios xi
@ruthvikvegunta7249
@ruthvikvegunta7249 3 жыл бұрын
@@dudz6093 😅, thanks man, I hope you did find it useful 🙂
@djebbaranon5892
@djebbaranon5892 3 жыл бұрын
thanks for all of these videos John please don't forget to cover win32 simple stack overflow please i m beging you .. 🙏🙏🙏
@snipeSec351
@snipeSec351 3 жыл бұрын
You can add -t 70 to increase the number of theards used by gobuster. This really decreases its time of completion.
@CybrJames
@CybrJames 3 жыл бұрын
Very excited. Can't wait. It's like going to see StarWars at midnight. did that once, never again. John, you're worth it. How is who's on FIRST, and what's on SECOND doing?
@arjunpeter9614
@arjunpeter9614 3 жыл бұрын
Cicada periodic table is very intresting
@cre8ive65
@cre8ive65 3 жыл бұрын
Does anyone know what the outro music is?
@Majkieboy
@Majkieboy 3 жыл бұрын
Commenting for youtube engagement.
@lordmummie
@lordmummie 3 жыл бұрын
Awesome video, the starting page part was really insightful! Why not run gimp PI3T.png in the terminal though 😭😭
@zur_hck
@zur_hck 3 жыл бұрын
You gotta install it first just follow these commands ~> apt install gimp -y
@cl2829
@cl2829 3 жыл бұрын
Angry dutchman here, Piet is the Dutch version of Pete. It's pronounced roughly the same
@Ambassador_Kobi
@Ambassador_Kobi 3 жыл бұрын
I get a sorry dave i can't let you do that error trying to login to Nagios IX, indicating a time difference between the server and the client machine.
@robertkee8134
@robertkee8134 3 жыл бұрын
How to decrypt sha512 hash plz tell me my bro
@dan-garden
@dan-garden 3 жыл бұрын
Naxx is out?
@subhamkrnavneet7110
@subhamkrnavneet7110 3 жыл бұрын
Can't we exploits by using ssh RSA n ECDSA along with all sys information.???
@mehdiboujid8761
@mehdiboujid8761 3 жыл бұрын
Finaly
@rajith8973
@rajith8973 3 жыл бұрын
Back on linux
@Robert_777
@Robert_777 3 жыл бұрын
Hmmmm
@constroyanonymous7830
@constroyanonymous7830 3 жыл бұрын
Can u really do a video on how to be effective in research ? Because your leap of faith in periodic table I don't know how to put it lucky I think or because of experience. because as a newbie solving this boxes and ctf is like what next ? It won't click that it's a periodic table
@arnoldkyei-baffour4540
@arnoldkyei-baffour4540 3 жыл бұрын
Ikr... the experience comes with time man... just practise as many boxes as you can and you will surely get there... sometimes you have to lookup the walkthroughs, its ok if you don't get it on a first try..keep practising.... tryhackme is a great platform for learning...just follow the path and you will surely find things that will surprise you... All the best
@constroyanonymous7830
@constroyanonymous7830 3 жыл бұрын
Ty
@mehdiboujid8761
@mehdiboujid8761 3 жыл бұрын
happy that u uninstalled windows
@highvisibilityraincoat
@highvisibilityraincoat 3 жыл бұрын
windows BAD!! I am a stupid elitist that only has a personality reflective of my operating system! Windows bad!!
@mehdiboujid8761
@mehdiboujid8761 3 жыл бұрын
@@highvisibilityraincoat get some help XD
@highvisibilityraincoat
@highvisibilityraincoat 3 жыл бұрын
Savgorgeous Help with what?
@mehdiboujid8761
@mehdiboujid8761 3 жыл бұрын
@@highvisibilityraincoat it was a joke and u took it seriously why u feel so offended?
@sskroller5276
@sskroller5276 3 жыл бұрын
Seventh 👾
@abhishekmorla1
@abhishekmorla1 3 жыл бұрын
love from india
TryHackMe! Wonderland - Python Module Manipulation & Capabilities
24:04
TryHackMe! Tartarus - Website Password Bruteforcing
31:59
John Hammond
Рет қаралды 94 М.
Please be kind🙏
00:34
ISSEI / いっせい
Рет қаралды 169 МЛН
버블티로 체감되는 요즘 물가
00:16
진영민yeongmin
Рет қаралды 64 МЛН
How Nagios XI Works
5:55
nagiosvideo
Рет қаралды 109 М.
How Microsoft Accidentally Backdoored 270 MILLION Users
14:45
Daniel Boctor
Рет қаралды 244 М.
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 1,1 МЛН
Exploiting Tomcat with LFI & Container Privesc - "Tabby" HackTheBox
45:54
HackTheBox - "Remote" - Umbraco & Windows
48:23
John Hammond
Рет қаралды 82 М.
PHP is Wack. (Coding in a Random Language Every Day)
14:41
Low Level Learning
Рет қаралды 57 М.
rust runs on EVERYTHING (no operating system, just Rust)
18:10
Low Level Learning
Рет қаралды 347 М.
Google CTF - Authentication Bypass
24:27
John Hammond
Рет қаралды 117 М.
TryHackMe! Overpass - Authentication Bypass
35:18
John Hammond
Рет қаралды 137 М.