Комментарии:
ty
ОтветитьFrom where we can get the Linux Local Privilege Escalation C code?
Ответитьhello how can ı find your documents ?
ОтветитьHow do i easily copy from attacker machine to target and vice versa its eating a lot of my time?
Ответитьsays permission denied when i try to get the first flag1.txt
ОтветитьThanks man, this video was a big help!
ОтветитьHow to download this cheatsheet to my obsidian? For free of course.
ОтветитьI really appreciate your hard work on this video. I have a doubt: when you cracked missy's hash, how did you do it? I created a file named "missy" just like yours, and then I put the hash in it. I saved and closed the file, and finally, I used the same "john" command. However, my output was "0 password hashes craked, 1 left", Can you help me? :(
Ответитьyour videos are so helpful, you have no idea, for someone trying to break into the field, and seeing someone struggle with these exercises even if already working for a while in the industry is reassuring! showing the whole process of problem-solving is helpful too. Definitely going to subscribe in order to access your notes too! keep it up man
Ответитьthankyou helped a lot
Ответить🔥🔥🔥🔥🔥
ОтветитьExcellent video my friend. You are a great teacher. Thank you for taking the time to make these videos.
ОтветитьYou saved my ass. Thanks mate.
ОтветитьFYI, if you are using the attack machine provided by THM you will not be able to gcc the exploit to compiled file on your attach machine, however accessing the target from browser and saving the exploit /tmp then gcc then ./exploit will result in successful privilege escalation
Ответитьwhy we need to give the thm the suid bit ???
Ответитьhey can i get all of your scripts from which you choose
Ответитьvery good topic but unfortunately sound is very low.. please amend it. ty
ОтветитьCan we have a copy of your note on obsidian of Tryhackme subject ?
ОтветитьGreat video but the volume level is horribly low.
ОтветитьHello great video, I learned a lot, you have already helped me a lot in several rooms at THM, I would like to ask where do you get these ready-made scripts from, if they are yours and they are somewhere, or if it is from a site open for use?
ОтветитьYou are life saver bro
ОтветитьThank you for this video.
ОтветитьAwesome walkthrough, 10/10, thanks a lot
ОтветитьI did the same thing with the capstone where i used the gtfo stuff to read it and didn't bother needing to switch to the root user (assume this is all that's expected)
ОтветитьGreat content, I learned a lot from you, but your voice is low
ОтветитьOn task five, in order to get the exploit to run, add the -static flag when compiling with gcc if you have a GLIBC version issue.
ОтветитьThanks Motasem for sharing your knowledge, amazing job!!!
ОтветитьGreat video, but PLEASE USE CNTRL + L next time for cleaning up terminal.
Ответить/ofc: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.34' not found (required by ./ofc)
help anyone please
That blew my mind that you used nano to PrivEsc. There are so many unique and creative ways to move around a system I feel like the options are nearly limitless. The amount there is to learn feels infinite.
ОтветитьFor who is having NFS issue in task 11, use the flag "-static" when compiling. You're welcome
Ответитьwaht can i do if my kali linux making compile this "ofc" file using libc version 2.34 and target linux system got installer oleder version (2.19) and i recieve error?
ОтветитьHi Motasem! I'm very thankful for your walkthroughts - they brings me a lot of knowledge. I have one question for you. In this task about Privilage Escalation NFS I've done everything like you show in movie above but on finish I saw an error about conflicts in libriaries. I think kali linux which I use had higher version of gcc than target machine. So I can't finish this task my own because targeted machine don't want open te code file. How we can handle this problem in this task and in real situation when targeted machine had other version of libraries and didn't open a file with code?
ОтветитьI appreciate your videos, I'm not sure why i can never ssh into try hack me from my kali vm terminal... either way it won't stop me from completing my training and getting my comp tia certificate!
Ответитьmota , how could you log in second terminal >> , with ur user name@kali /desktop/tryhackme?
ОтветитьExcellent walk-through, many thanks for your help, and all the knowledge you share 🙏
ОтветитьReally nice tutorial. I have been able to understand not only how to complete the tasks but the process itself. Thanks !!!
ОтветитьAwesome vid!
Ответитьthank you so much lifesaver
Ответитьwhy I can't able to download from exploit-db website.
Can anyone help me. I am very thankful to you.
for task 10.2 the thm file should have "cat /home/matt/flag6.txt" so when you run the test file it would read the flag file.
Ответитьyou are such a life saver. Thank you for all the knowledge bombs!
ОтветитьThanks a lot for your help. I feel like this section privilege escalation was a jump on tryhackme
ОтветитьThanks, Bro.
100% Life saver video!
Have you try CVE-2017-1000253.c for capstone challenge?