VulnHub - DC-9

IppSec · Beginner ·🔐 Cybersecurity ·6y ago
00:34 - Explaining how networking is setup, then nmap 04:00 - Examining why nmap says a port is filtered in Wireshark 07:30 - Exploring the webpage and doing basic SQL Injections in the search functionality 08:10 - Starting GoBuster in the background, #AlwaysHaveReconRunning 10:10 - Explaining SQL Injection 13:55 - Explaining SQL Union Injection 15:15 - Testing Union Injection by doing “UNION SELECT”, then testing it by doing “ORDER BY”. 19:00 - Explaining how to get data out of INFORMATION_SCHEMA 20:55 - Doing GROUP_CONCAT to extract multiple lines from a UNION Statement 27:00 - Using SED to replace “,” with line breaks and extracting a bunch of information out of the database 33:00 - Cracking the hash to see admin’s password is transorbital1 34:41 - Using wfuzz to brute force a login prompt with two FUZZ Variables (some troubleshooting) 43:30 - Fuzzing the MANAGE.PHP script for a filename parameter with wfuzz 48:50 - Exploring the LFI 1:00:00 - Using LFI with /proc/sched_debug to get processes running and discovering KnockD 1:04:30 - The Opening up the SSH Port with port knocking 1:10:00 - Using medusa combo list to test SSH Credentials, then logging chandlerb and running linpeas 1:16:00 - Exploring the MySQL Database, discovering Janitor was created at a different time. Explore his directory to discover new credentials 1:22:00 - Using find to output a list of readable files for other users then finding files that can only be read by single users 1:28:50 - FredF can execute the “test” binary as root. Looking at source, it allows appending lines to a file. 1:30:15 - File Write Method 1: Appending a line to allow joeyt to sudo 1:33:30 - File Write Method 2: Appending line to passwd to create a new user 1:36:50 - Extra content, going over the Source Code to view the LFI Exploit and a pretty funny login bypass bug
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Playlist

Uploads from IppSec · IppSec · 0 of 60

← Previous Next →
1 HHC2016 - Analytics
HHC2016 - Analytics
IppSec
2 HackTheBox - October
HackTheBox - October
IppSec
3 HackTheBox - Arctic
HackTheBox - Arctic
IppSec
4 HackTheBox - Brainfuck
HackTheBox - Brainfuck
IppSec
5 HackTheBox - Bank
HackTheBox - Bank
IppSec
6 HackTheBox - Joker
HackTheBox - Joker
IppSec
7 HackTheBox - Lazy
HackTheBox - Lazy
IppSec
8 Camp CTF 2015 - Bitterman
Camp CTF 2015 - Bitterman
IppSec
9 HackTheBox - Devel
HackTheBox - Devel
IppSec
10 Reversing Malicious Office Document (Macro) Emotet(?)
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
11 HackTheBox - Granny and Grandpa
HackTheBox - Granny and Grandpa
IppSec
12 HackTheBox - Pivoting Update: Granny and Grandpa
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
13 HackTheBox - Optimum
HackTheBox - Optimum
IppSec
14 HackTheBox - Charon
HackTheBox - Charon
IppSec
15 HackTheBox - Sneaky
HackTheBox - Sneaky
IppSec
16 HackTheBox - Holiday
HackTheBox - Holiday
IppSec
17 HackTheBox - Europa
HackTheBox - Europa
IppSec
18 Introduction to tmux
Introduction to tmux
IppSec
19 HackTheBox - Blocky
HackTheBox - Blocky
IppSec
20 HackTheBox - Nineveh
HackTheBox - Nineveh
IppSec
21 HackTheBox - Jail
HackTheBox - Jail
IppSec
22 HackTheBox - Blue
HackTheBox - Blue
IppSec
23 HackTheBox - Calamity
HackTheBox - Calamity
IppSec
24 HackTheBox - Shrek
HackTheBox - Shrek
IppSec
25 HackTheBox - Mirai
HackTheBox - Mirai
IppSec
26 HackTheBox - Shocker
HackTheBox - Shocker
IppSec
27 HackTheBox - Mantis
HackTheBox - Mantis
IppSec
28 HackTheBox - Node
HackTheBox - Node
IppSec
29 HackTheBox - Kotarak
HackTheBox - Kotarak
IppSec
30 HackTheBox - Enterprise
HackTheBox - Enterprise
IppSec
31 HackTheBox - Sense
HackTheBox - Sense
IppSec
32 HackTheBox - Minion
HackTheBox - Minion
IppSec
33 VulnHub - Sokar
VulnHub - Sokar
IppSec
34 VulnHub - Pinkys Palace v2
VulnHub - Pinkys Palace v2
IppSec
35 HackTheBox - Inception
HackTheBox - Inception
IppSec
36 Vulnhub - Trollcave 1.2
Vulnhub - Trollcave 1.2
IppSec
37 HackTheBox - Ariekei
HackTheBox - Ariekei
IppSec
38 HackTheBox - Flux Capacitor
HackTheBox - Flux Capacitor
IppSec
39 HackTheBox - Jeeves
HackTheBox - Jeeves
IppSec
40 HackTheBox - Tally
HackTheBox - Tally
IppSec
41 HackTheBox - CrimeStoppers
HackTheBox - CrimeStoppers
IppSec
42 HackTheBox - Fulcrum
HackTheBox - Fulcrum
IppSec
43 HackTheBox - Chatterbox
HackTheBox - Chatterbox
IppSec
44 HackTheBox - Falafel
HackTheBox - Falafel
IppSec
45 How To Create Empire Modules
How To Create Empire Modules
IppSec
46 HackTheBox - Nightmare
HackTheBox - Nightmare
IppSec
47 HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
48 HackTheBox - Bart
HackTheBox - Bart
IppSec
49 HackTheBox -  Aragog
HackTheBox - Aragog
IppSec
50 HackTheBox - Valentine
HackTheBox - Valentine
IppSec
51 HackTheBox - Silo
HackTheBox - Silo
IppSec
52 HackTheBox - Rabbit
HackTheBox - Rabbit
IppSec
53 HackTheBox - Celestial
HackTheBox - Celestial
IppSec
54 HackTheBox - Stratosphere
HackTheBox - Stratosphere
IppSec
55 HackTheBox - Poison
HackTheBox - Poison
IppSec
56 HackTheBox - Canape
HackTheBox - Canape
IppSec
57 HackTheBox - Olympus
HackTheBox - Olympus
IppSec
58 HackTheBox - Sunday
HackTheBox - Sunday
IppSec
59 HackTheBox - Fighter
HackTheBox - Fighter
IppSec
60 HackTheBox - Bounty
HackTheBox - Bounty
IppSec

Related AI Lessons

LetsDefend — Investigate Web Attack
Investigate web attack logs from the bWAPP application to learn about cybersecurity threats and how to defend against them
Medium · Cybersecurity
Breaking OAuth Trust: An Analysis of CVE-2026–45430 in Backdrop CMS
Learn about the critical OAuth vulnerability CVE-2026-45430 in Backdrop CMS and its implications for cybersecurity
Medium · Cybersecurity
Discord now encrypts every voice and video call by default, and not even it can listen in
Discord enables end-to-end encryption for all voice and video calls, ensuring private conversations
The Next Web AI
Mythic C2 Server ile AS-REP Roasting Attack ve Splunk ile Detection
Learn to detect AS-REP Roasting attacks using Splunk and understand how Mythic C2 Server is used in such attacks
Medium · Cybersecurity

Chapters (23)

0:34 Explaining how networking is setup, then nmap
4:00 Examining why nmap says a port is filtered in Wireshark
7:30 Exploring the webpage and doing basic SQL Injections in the search functionali
8:10 Starting GoBuster in the background, #AlwaysHaveReconRunning
10:10 Explaining SQL Injection
13:55 Explaining SQL Union Injection
15:15 Testing Union Injection by doing “UNION SELECT”, then testing it by doing “ORD
19:00 Explaining how to get data out of INFORMATION_SCHEMA
20:55 Doing GROUP_CONCAT to extract multiple lines from a UNION Statement
27:00 Using SED to replace “,” with line breaks and extracting a bunch of informatio
33:00 Cracking the hash to see admin’s password is transorbital1
34:41 Using wfuzz to brute force a login prompt with two FUZZ Variables (some troubl
43:30 Fuzzing the MANAGE.PHP script for a filename parameter with wfuzz
48:50 Exploring the LFI
1:00:00 Using LFI with /proc/sched_debug to get processes running and discovering Knoc
1:04:30 The Opening up the SSH Port with port knocking
1:10:00 Using medusa combo list to test SSH Credentials, then logging chandlerb and ru
1:16:00 Exploring the MySQL Database, discovering Janitor was created at a different t
1:22:00 Using find to output a list of readable files for other users then finding fil
1:28:50 FredF can execute the “test” binary as root. Looking at source, it allows app
1:30:15 File Write Method 1: Appending a line to allow joeyt to sudo
1:33:30 File Write Method 2: Appending line to passwd to create a new user
1:36:50 Extra content, going over the Source Code to view the LFI Exploit and a pretty
Up next
How do I resolve the "Kernel panic - not syncing" error in my EC2 instance?
Amazon Web Services
Watch →