TryHackMe! Buffer Overflow & Penetration Testing

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 84

  • @Ropex
    @Ropex4 жыл бұрын

    Lord Pingu didn't deserve his name to be slandered >:(

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    NOOT N00T

  • @stevecooper3574
    @stevecooper35744 жыл бұрын

    That room is a fantastic walkthrough for simple buffer overflows. Great job on the vid and to the room creator!

  • @jazzorgangrooves
    @jazzorgangrooves3 жыл бұрын

    You are just amazing. Thank you for making such worthful videos. I'm learning so much, everyday, just lookin' at your tutorials. God bless you John

  • @ChamplooMusashi
    @ChamplooMusashi4 жыл бұрын

    Happy to see a video on the whole process of executing a buffer overflow exploit. Helps from the programming side to understand more of what needs to be done to make code more secure (evil strings!)

  • @crump404
    @crump4044 жыл бұрын

    This is a brilliant room John also a brilliant video. Thanks.

  • @davidfox4253
    @davidfox42534 жыл бұрын

    Thanks for that great walk thru and the "Think allowed" approach!! Cheers

  • @petehinch3871
    @petehinch38714 жыл бұрын

    Cool man. Learning so much watching your videos

  • @bluefloyd9058
    @bluefloyd90582 жыл бұрын

    "noot noot!". That penguin is from a kids show I used to watch here in NZ called pingu.

  • @samsepi0l227
    @samsepi0l2272 жыл бұрын

    thank you for everything john!!!

  • @cooliceman0001
    @cooliceman00013 жыл бұрын

    Thank you for another great video

  • @TataruTaru
    @TataruTaru3 жыл бұрын

    This is one of the first I've seen where we actually fills in the readme. Most of them, he makes the readme, and never goes back to it :)

  • @garrettblackard2288
    @garrettblackard22883 жыл бұрын

    Thats so awesome about the room u made congratulations

  • @_JohnHammond

    @_JohnHammond

    3 жыл бұрын

    Thanks so much! Peak Hill seemed to be well-received!

  • @neilthomas5026
    @neilthomas50264 жыл бұрын

    very cool vid as always :) , and cant wait to work on your room :)

  • @D3fconNull
    @D3fconNull4 жыл бұрын

    Here we go, bring it up John :)

  • @nuridincersaygili
    @nuridincersaygili2 жыл бұрын

    This is pure gold for me!

  • @01nfluence
    @01nfluence4 жыл бұрын

    Great video! Do you have a video that explains all of the scripts/repositories you're using? Thanks!

  • @masonfuller9823
    @masonfuller98234 жыл бұрын

    "now we are papa"

  • @KaLata123456
    @KaLata1234563 жыл бұрын

    Hey John-love your videos , keep it up. On this particular video when you perform the netcat for reverseshell you use 2 commands on the your attacking machine to connect to the victim besides setting up the listener (nc -lnvp 12789). Those 2 commands are nc_reverseshell.sh and nc_stabilize.sh. Can you explain where do you get those executables and how they apply to this use case. Thanks

  • @mi2has
    @mi2has4 жыл бұрын

    buffer overflow part is great

  • @Thmyris
    @Thmyris4 жыл бұрын

    I did the same thing with wget a few days ago lol. Downloading the source instead of raw output.

  • @mattstorr
    @mattstorr2 жыл бұрын

    Nice run through. was a wee bit fast in some locations though to see what you were doing.

  • @ashutoshpanda4336
    @ashutoshpanda43364 жыл бұрын

    How come you're not using "dir" option in gobuster in current version it's necessary i guess... ippsec does use it... i struggled with that few times

  • @patonwhite9385
    @patonwhite93853 жыл бұрын

    Can someone comment what the multi window term is? I like the way John jumps quickly to a split for the ping then closes (what hotkeys are being used?)

  • @NeelNarayan
    @NeelNarayan4 жыл бұрын

    What does stablise shell do ?

  • @MrZyman
    @MrZyman4 жыл бұрын

    Soo good!

  • @faanross
    @faanross Жыл бұрын

    Can't find it - has the room been removed?

  • @xBDCFF
    @xBDCFF4 жыл бұрын

    4:36 Lies, i screamed ^^

  • @671Neuhof
    @671Neuhof Жыл бұрын

    Tryhackme is great for learning. I used to learn new techniques or new languages only on Udemy, but in my opinion I learn much better on THM as it's quite practical. Without your channel id propably never found that website

  • @xBDCFF
    @xBDCFF4 жыл бұрын

    10:05 I'm just curious, why is it not the best to take it from the repos ? is it not updated regularly ?

  • @scheli

    @scheli

    4 жыл бұрын

    Mostly for ubuntu universe packages, it will get no updates at all. He is using xenial, the sqlmap package there is 4 years old :)

  • @Thmyris

    @Thmyris

    4 жыл бұрын

    @@scheli oof

  • @cocosloan3748
    @cocosloan37484 жыл бұрын

    Peak hill hype !!! Im choosing not to watch this video (for now) sinve I will try it myself.If I stuck-I know where to find all the answers John :)

  • @mmarsyad
    @mmarsyad4 жыл бұрын

    Can i know what the version of ubuntu that you are using now?

  • @hiimzackjones
    @hiimzackjones2 жыл бұрын

    whoa whoa whoa. what is this guake and stabilize shell thing you did? I need that so so much. Incoming DM.

  • @AgentPenguinHack
    @AgentPenguinHack4 жыл бұрын

    More please!

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    More on the way! Thanks so much for watching!

  • @sovietcat4825
    @sovietcat48253 жыл бұрын

    Even I have the habit of keeping a log/notes/writeup of any ctf or task

  • @traperti9098
    @traperti90984 жыл бұрын

    Where can I start learning about hacking ? I’m very interested

  • @sol2588
    @sol25884 жыл бұрын

    Does anybody know what software he uses for the Linux terminal? Or is it the default for some distro? Would like to use. Thanks!

  • @nicolassurfay2585

    @nicolassurfay2585

    4 жыл бұрын

    it's terminator

  • @viraat_maurya
    @viraat_maurya4 жыл бұрын

    i also try buffer overflow but it printed out permission denied on $ cat /var/backups/shadow.bak

  • @abdulsamihamedi5584
    @abdulsamihamedi5584 Жыл бұрын

    this room took me 4 hours to complete!!!

  • @ritabandas
    @ritabandas3 жыл бұрын

    Lol that's what I do. Throw my notes on GitHub as a writeup.

  • @jeromekim5856
    @jeromekim58564 жыл бұрын

    you the real mvp :'(

  • @sahilsaxena2275
    @sahilsaxena22753 жыл бұрын

    Could please make a video on what you did at 16:21

  • @znation4434
    @znation44342 жыл бұрын

    Aaand WHAT IS HAPPENING made me laugh lmao

  • @thatonesilverfuck6954
    @thatonesilverfuck69544 жыл бұрын

    Loved peak hill

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    Happy to hear that, thanks so much for playing!

  • @Laflamablanca969
    @Laflamablanca9694 жыл бұрын

    Do an easy room for us newbies 😁

  • @JashanSaini18
    @JashanSaini184 жыл бұрын

    This seems super cool/fun to do. Is there a way to go about learning all this? If so, does anyone have any tips/ places I can go to and learn? (I am brand new to this and would need to start from the very beginning)

  • @Apathy474

    @Apathy474

    Жыл бұрын

    What did you end up doing

  • @mohammdrezamollasalehi4822
    @mohammdrezamollasalehi48224 жыл бұрын

    plz make video for Ignite room !!

  • @SiliconSentry
    @SiliconSentry4 жыл бұрын

    Did this one last night and got caught at the same point with the 'hidden' passwd file, looking for a file owned by pingu.

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    That was tricky! Thanks for watching!

  • @josephschady1728
    @josephschady17284 жыл бұрын

    What video recording software do you use?

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    I use OBS Studio. I should make a tutorial on it soon!

  • @josephschady1728

    @josephschady1728

    4 жыл бұрын

    John Hammond thank you, pls do! Right now I’m using Kazam but the audio is not the best, that might just be my computer though.

  • @MD4564
    @MD45644 жыл бұрын

    Nice! What's the command at 16:25 ?

  • @jovangazivoda2033

    @jovangazivoda2033

    4 жыл бұрын

    you can find it on pentestmonkey(dot)net like it's described in [Task 5] (reverse shell for netcat)

  • @hypedz1495
    @hypedz14952 жыл бұрын

    John.. john hammond.. ngl the only thing bugging me on this one is the 15% packet drop.

  • @aquibjavedrollnumber1763
    @aquibjavedrollnumber17633 жыл бұрын

    Cade copper??

  • @gianlu9858
    @gianlu98583 жыл бұрын

    Was I the only one havig issue to crack the root password? John takes ages (On the video it looks like more than 24 hours, while doing the room I left it for about 20 mins) and hashcat was not starting (I think some issue with the VMWare environment) have someone sort it out? Any Advice for next time? Thanks :)

  • @0xshaheen
    @0xshaheen4 жыл бұрын

    I want to know how you are using gobuster without dir flag 😅

  • @ransomware9086

    @ransomware9086

    4 жыл бұрын

    @Shaun he is using an old version or an alias

  • @ca7986
    @ca79864 жыл бұрын

    ♥️

  • @zerofuchs6976
    @zerofuchs69763 жыл бұрын

    4:37 - I did!

  • @viraat_maurya
    @viraat_maurya4 жыл бұрын

    also tried your syntax stil same result

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Жыл бұрын

    Ceqylenjoy ?

  • @lizardfog
    @lizardfog3 жыл бұрын

    great, but would have been even better if you slowed down a bit

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Жыл бұрын

    Sull emply skills development adr parsin skills tools URL grpoing arrows work.

  • @Sutatu
    @Sutatu Жыл бұрын

    10:16-10:20 *me, looking at the time left*: hmmmmmmmm

  • @Thmyris
    @Thmyris4 жыл бұрын

    This box whooped my ass. Certainly not easy for me, I was completely lost at the buffer overflow part. Any good tutorial suggestions fellow commenters?

  • @aidancollins1591

    @aidancollins1591

    4 жыл бұрын

    LiveOverflow has a great series on binary exploitation, "Binary Exploitation".

  • @sand3epyadav
    @sand3epyadav3 жыл бұрын

    So hard

  • @VRWarehouse
    @VRWarehouse4 жыл бұрын

    this is a comment.

  • @lama-chan
    @lama-chan2 жыл бұрын

    DID YOU JUST SAY "WHATEVER THAT IS" TO PINGU'S NAME??? HOW DARE YOU

  • @cheekibreeki4624
    @cheekibreeki46244 жыл бұрын

    Its pronounced Ping Goo

  • @jaydensh7380
    @jaydensh73803 жыл бұрын

    Did anyone tell you that you look similar to Harry Potter 😅😅

  • @cassandradawn780
    @cassandradawn7804 жыл бұрын

    Help guys i cant think of a good comment

  • @sagar2030
    @sagar20304 жыл бұрын

    its better if "Try hack me" do not have hints.