Pentesting for n00bs: Episode 9 - Grandpa

Sdílet
Vložit
  • čas přidán 11. 09. 2024
  • Get my:
    25 hour Practical Ethical Hacking Course: www.udemy.com/...
    Windows Privilege Escalation for Beginners Course: www.udemy.com/...
    Our Sponsor: www.victsing.c...
    ❓Info❓
    ___________________________________________
    Need a Pentest?: tcm-sec.com
    Learn to Hack: academy.tcm-se...
    🔹The Cyber Mentor Merch🔹
    ___________________________________________
    teespring.com/...
    📱Social Media📱
    ___________________________________________
    Website: thecybermentor...
    Twitter: / thecybermentor
    Twitch: / thecybermentor
    Discord: tcm-sec.com/di...
    LinkedIn: / heathadams
    💸Donate💸
    ___________________________________________
    Like the channel? Please consider supporting me on Patreon:
    / thecybermentor
    Support the stream (one-time): streamlabs.com...
    Hacker Books:
    Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
    The Hacker Playbook 3: amzn.to/34XkIY2
    Hacking: The Art of Exploitation: amzn.to/2VchDyL
    The Web Application Hacker's Handbook: amzn.to/30Fj21S
    Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
    Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
    Linux Basics for Hackers: amzn.to/34WvcXP
    Python Crash Course, 2nd Edition: amzn.to/30gINu0
    Violent Python: amzn.to/2QoGoJn
    Black Hat Python: amzn.to/2V9GpQk
    My Build:
    lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
    darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
    EVGA 2080TI: amzn.to/30d2lj7
    MSI Z390 MotherBoard: amzn.to/30eu5TL
    Intel 9700K: amzn.to/2M7hM2p
    G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
    Razer Nommo Chroma Speakers: amzn.to/30bWjiK
    Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
    CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
    Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
    My Recording Equipment:
    Panasonic G85 4K Camera: amzn.to/2Mk9vsf
    Logitech C922x Pro Webcam: amzn.to/2LIRxAp
    Aston Origin Microphone: amzn.to/2LFtNNE
    Rode VideoMicro: amzn.to/309yLKH
    Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
    Elgato Cam Link 4K: amzn.to/2QlicYx
    Elgate Stream Deck: amzn.to/2OlchA5
    *We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

Komentáře • 48

  • @TCMSecurityAcademy
    @TCMSecurityAcademy  Před 3 lety

    I hope you enjoyed this video! If so, please consider dropping a like and subscribing.

  • @sunny-qj4ge
    @sunny-qj4ge Před 5 lety +13

    Starting my OSCP training this Saturday... your channel has done wonders for my confidence and mindset going into this thing, best of luck with all your exploits and ventures going forward, you've got my sub :D

  • @daaprill
    @daaprill Před 4 lety +6

    Cracked them both before watching the video... loving the series. Thank you!

  • @th3ndktn
    @th3ndktn Před 5 lety +17

    Dude this helps. Me so much with my oscp, things i didnt knew i keep learning from you, much appreciated

  • @gapptricks3487
    @gapptricks3487 Před 3 lety

    TCM : Search exploits in Google
    Me : Granny Walkthrough
    Btw great Mentor 😃

  • @davyrogersuk
    @davyrogersuk Před 5 lety +11

    Today we will be “Attacking granny and grandpa” ... I wonder why CZcams take their time approving these videos. 🤔

  • @Musiclyrics-vj5br
    @Musiclyrics-vj5br Před 5 lety +8

    Already looking forward for next video, great job like always

  • @supciobudyn3953
    @supciobudyn3953 Před 4 lety +3

    Thank you TCM! Will there be more? I`m looking forward for next one.

  • @MikeClark7
    @MikeClark7 Před 4 lety +2

    Thank you for these videos! They are really helping me get a handle on methodology. Looking forward to the next video.

  • @CristiVladZ
    @CristiVladZ Před 5 lety +1

    To the point, but thorough!

  • @ShabazDraee
    @ShabazDraee Před 4 lety

    Another TIP I learned when doing this machine.
    When searching for the exact exploit, just type in the CVE, so for example,
    msf5 > search 2017-7269

  • @mallikarjunkishore4345

    Both grandpa and granny are unreachable

  • @munhumutapa1330
    @munhumutapa1330 Před 5 lety +1

    Thanks Cyber mentor, always looking forward to your videos

  • @antonioa5697
    @antonioa5697 Před 4 lety +1

    question: i just read that if you are going to take the OSCP you can't really use metasploit (just once) but you can use it as a capture tool? I got stuck on this box trying to inject the bad files with msfvenom... i ended up looking at ippsec's only to see he used Burp. In the sense of taking the OSCP should we try and execute most of this stuff manually?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  Před 4 lety +1

      For OSCP I recommend using Metasploit to ensure the exploit exists and then going back to manually attempt it. With a timed lab, it's best to make sure the exploit you're after is actually the right one and Metasploit can do that a lot quicker than the manual method. Of course, you will have to go mostly manual (outside of the one use) on the exam.

  • @elikelik3574
    @elikelik3574 Před 5 lety +1

    What I can not understand is why (here 10:33) do you put it in the background? and what will be if we do not put it in background and later (here 12:17) do not set that session? I mean exploit will not work without that session? really confused =D

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  Před 5 lety +1

      Background means to keep the session but allow me to do other things in the meantime. And yes, the exploit utilizes the active session and needs it to work.

    • @elikelik3574
      @elikelik3574 Před 5 lety

      @@TCMSecurityAcademy oh now It makes sense. Thanks for explanation. ✌️

  • @rusirumunasinghe7354
    @rusirumunasinghe7354 Před 5 lety +1

    Step aside, Grandpa!

  • @Edovsky
    @Edovsky Před 4 lety +2

    Where is episode 10? :

  • @torontogrey2809
    @torontogrey2809 Před 5 lety

    Thanks again for such an awesome video!
    I had some issues.. I started on this box and made good progress but once exploited the migrate option did not work and any privesc failed.. I even reset the machine a couple of times :(
    Sometimes after a reset and trying what worked previously, it would fail. I didn't record the error, but something about being killed/ended by a 'user'
    After two days - something just worked.. I have no idea what happed.
    It was weird and frustrating and then one day... it just worked. everything fell into place.
    I was wondering after finishing these (I did the same process for each) if it was different when the boxes 'were' live? I watched ippsec's videos and there was pivoting from one to the next.. I think we lost part of the challenge when they were retired? I could be wrong?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  Před 5 lety

      I haven't seen the video, so I'm unsure about the pivoting. It's entirely possible as they are so similar. If there was pivoting, there's not really a way to do it now since you can only have one box spun up at a time.
      Migrate is always a finicky thing. Some boxes on HTB are also unstable and require constant resetting to have everything work just right.

  • @issammbarek78
    @issammbarek78 Před 5 lety +1

    thank you so so much we really appreciate it

  • @zoph1723
    @zoph1723 Před 4 lety

    Any luck doing this box without Metasploit? I've scoured the Internet and haven't been able to find a guide/walkthrough for it. Getting a shell on the box with the exploit from www.exploit-db.com/raw/41738 is easy enough. However, when it comes to permissions elevation I'm at a loss.

  • @hardwork3196
    @hardwork3196 Před 5 lety +1

    Thank you a lot.. :) please keep going :)

  • @accountman9082
    @accountman9082 Před 5 lety

    All these exploits are done over lan if I am not wrong. Could you tell me how to do the same thing(mainly remote code executions and other exploits) over WAN.

    • @bene5431
      @bene5431 Před 4 lety

      I think it is actually a VPN. For how to connect check out hackthebox.eu

  • @allmines1092
    @allmines1092 Před 4 lety +1

    What happens if "migrate" failrs you?

  • @PuppyWallet
    @PuppyWallet Před 4 lety

    I had a session that died. After resetting the machine the exploit is no longer working to get a shell.

    • @griffin3706
      @griffin3706 Před 4 lety

      I have the same problem, did you figure out why this is happening?

    • @PuppyWallet
      @PuppyWallet Před 4 lety

      @@griffin3706 So I havn't messed with this box since but I think it might be an issues with the payload. try to find out if the os is 64 or 32 bit and correct the payload.

  • @salluc1712
    @salluc1712 Před 5 lety +1

    Thank you for this helpful video 🔥☺️

  • @BuddyJesus
    @BuddyJesus Před 5 lety

    Any recommendations on which one to work on next?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  Před 5 lety

      Give some of the easy ones a go and see how you do. Maybe give netmon a try.

    • @BuddyJesus
      @BuddyJesus Před 5 lety

      @@TCMSecurityAcademy Thanks! Just had fun finishing that one up (netmon). At a previous site we used that software so was fun to see it again!

  • @mohamedadam9749
    @mohamedadam9749 Před 5 lety

    Hi.
    I'm beginner pentester I need a road map to be professional
    thanks.

  • @away2993
    @away2993 Před 5 lety

    secondly