HackTheBox - Obscurity
00:00 - Intro
01:03 - Quick rant about Security through Obscurity and why it can be good
02:30 - Begin of nmap'ing the box
06:30 - Checking out the webpage, GoBuster giving weird errors, try WFUZZ
12:05 - Taking a deeper look at the website while we have some recon running
17:45 - Wfuzz found nothing hunting for /$directory/SuperSecureServer.py
18:00 - Doing some Directory Traversal attempts against the webserver, and seeing it looks like its vulnerable
20:50 - Extracting the source code to the webserver by specifying /../SuperSecureServer.py
23:30 - Installing VS Code so we can run this webserver and insert breakpoints
28:20 - Creating main.py then running the code in VSCode
36:00 - Exploiting the exec() statement in the WebServer
39:00 - Explaining that we can't use + for spaces in the url, have to do %20, then testing a reverse shell
45:00 - Reverse shell returned
46:50 - Turns out the intended way is to find the /develop/ directory. Looking into why wfuzz missed it
53:30 - Copying the SuperSecureCrypt files back to our local box, then reading the source
56:00 - Explaining modulus
59:45 - Explaining Known Plaintext Attack
01:03:35 - Having trouble deciphering arguments, typing out the arguments on decrypting the key
01:07:00 - Decrypting the PasswordReminder.txt
01:10:39 - Explaining Block Ciphers and how to protect against Known-PlainText
01:11:25 - Rant about Initialization Vectors (IV) and why repeating them is bad (WEP)
01:14:30 - Looking at the BetterSSH Source Code
01:17:10 - Explaining why we can overload the -u parameter of Sudo
01:20:30 - Setting up a watch command to copy all files in /tmp/SSH to /dev/shm so we can crack them later
01:21:10 - Root #1: Exploiting BetterSSH via overloading parameters
01:25:20 - Root #2: Cracking the password
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
What 44 CVEs Tell You About Rust's Safety Boundary
Dev.to · Arthur
The Technology Isn’t the Question. Trust Is.
Medium · Cybersecurity
Common Cyber Threats That Strong Threat Protection Can Prevent
Medium · Cybersecurity
The “Vibe Coding” Mirage: Why AI-Generated Code Has 2.74x More Vulnerabilities
Medium · Startup
Chapters (26)
Intro
1:03
Quick rant about Security through Obscurity and why it can be good
2:30
Begin of nmap'ing the box
6:30
Checking out the webpage, GoBuster giving weird errors, try WFUZZ
12:05
Taking a deeper look at the website while we have some recon running
17:45
Wfuzz found nothing hunting for /$directory/SuperSecureServer.py
18:00
Doing some Directory Traversal attempts against the webserver, and seeing it l
20:50
Extracting the source code to the webserver by specifying /../SuperSecureServe
23:30
Installing VS Code so we can run this webserver and insert breakpoints
28:20
Creating main.py then running the code in VSCode
36:00
Exploiting the exec() statement in the WebServer
39:00
Explaining that we can't use + for spaces in the url, have to do %20, then tes
45:00
Reverse shell returned
46:50
Turns out the intended way is to find the /develop/ directory. Looking into w
53:30
Copying the SuperSecureCrypt files back to our local box, then reading the sou
56:00
Explaining modulus
59:45
Explaining Known Plaintext Attack
1:03:35
Having trouble deciphering arguments, typing out the arguments on decrypting t
1:07:00
Decrypting the PasswordReminder.txt
1:10:39
Explaining Block Ciphers and how to protect against Known-PlainText
1:11:25
Rant about Initialization Vectors (IV) and why repeating them is bad (WEP)
1:14:30
Looking at the BetterSSH Source Code
1:17:10
Explaining why we can overload the -u parameter of Sudo
1:20:30
Setting up a watch command to copy all files in /tmp/SSH to /dev/shm so we can
1:21:10
Root #1: Exploiting BetterSSH via overloading parameters
1:25:20
Root #2: Cracking the password
🎓
Tutor Explanation
DeepCamp AI