VulnHub - DC-9
00:34 - Explaining how networking is setup, then nmap
04:00 - Examining why nmap says a port is filtered in Wireshark
07:30 - Exploring the webpage and doing basic SQL Injections in the search functionality
08:10 - Starting GoBuster in the background, #AlwaysHaveReconRunning
10:10 - Explaining SQL Injection
13:55 - Explaining SQL Union Injection
15:15 - Testing Union Injection by doing “UNION SELECT”, then testing it by doing “ORDER BY”.
19:00 - Explaining how to get data out of INFORMATION_SCHEMA
20:55 - Doing GROUP_CONCAT to extract multiple lines from a UNION Statement
27:00 - Using SED to replace “,” with line breaks and extracting a bunch of information out of the database
33:00 - Cracking the hash to see admin’s password is transorbital1
34:41 - Using wfuzz to brute force a login prompt with two FUZZ Variables (some troubleshooting)
43:30 - Fuzzing the MANAGE.PHP script for a filename parameter with wfuzz
48:50 - Exploring the LFI
1:00:00 - Using LFI with /proc/sched_debug to get processes running and discovering KnockD
1:04:30 - The Opening up the SSH Port with port knocking
1:10:00 - Using medusa combo list to test SSH Credentials, then logging chandlerb and running linpeas
1:16:00 - Exploring the MySQL Database, discovering Janitor was created at a different time. Explore his directory to discover new credentials
1:22:00 - Using find to output a list of readable files for other users then finding files that can only be read by single users
1:28:50 - FredF can execute the “test” binary as root. Looking at source, it allows appending lines to a file.
1:30:15 - File Write Method 1: Appending a line to allow joeyt to sudo
1:33:30 - File Write Method 2: Appending line to passwd to create a new user
1:36:50 - Extra content, going over the Source Code to view the LFI Exploit and a pretty funny login bypass bug
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Security Basics
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
LetsDefend — Investigate Web Attack
Medium · Cybersecurity
Breaking OAuth Trust: An Analysis of CVE-2026–45430 in Backdrop CMS
Medium · Cybersecurity
Discord now encrypts every voice and video call by default, and not even it can listen in
The Next Web AI
Mythic C2 Server ile AS-REP Roasting Attack ve Splunk ile Detection
Medium · Cybersecurity
Chapters (23)
0:34
Explaining how networking is setup, then nmap
4:00
Examining why nmap says a port is filtered in Wireshark
7:30
Exploring the webpage and doing basic SQL Injections in the search functionali
8:10
Starting GoBuster in the background, #AlwaysHaveReconRunning
10:10
Explaining SQL Injection
13:55
Explaining SQL Union Injection
15:15
Testing Union Injection by doing “UNION SELECT”, then testing it by doing “ORD
19:00
Explaining how to get data out of INFORMATION_SCHEMA
20:55
Doing GROUP_CONCAT to extract multiple lines from a UNION Statement
27:00
Using SED to replace “,” with line breaks and extracting a bunch of informatio
33:00
Cracking the hash to see admin’s password is transorbital1
34:41
Using wfuzz to brute force a login prompt with two FUZZ Variables (some troubl
43:30
Fuzzing the MANAGE.PHP script for a filename parameter with wfuzz
48:50
Exploring the LFI
1:00:00
Using LFI with /proc/sched_debug to get processes running and discovering Knoc
1:04:30
The Opening up the SSH Port with port knocking
1:10:00
Using medusa combo list to test SSH Credentials, then logging chandlerb and ru
1:16:00
Exploring the MySQL Database, discovering Janitor was created at a different t
1:22:00
Using find to output a list of readable files for other users then finding fil
1:28:50
FredF can execute the “test” binary as root. Looking at source, it allows app
1:30:15
File Write Method 1: Appending a line to allow joeyt to sudo
1:33:30
File Write Method 2: Appending line to passwd to create a new user
1:36:50
Extra content, going over the Source Code to view the LFI Exploit and a pretty
🎓
Tutor Explanation
DeepCamp AI