Tier 1: Responder - HackTheBox Starting Point - Full Walkthrough

preview_player
Показать описание
Learn the basics of Penetration Testing: Video walkthrough for the "Responder" machine from tier one of the @HackTheBox "Starting Point" track; "you need to walk before you can run". We'll be exploring the basics of enumeration, service discovery, Local File Inclusion (LFI), Remote File Inclusion (RFI), NTLM hash grabbing with Responder, hashcracking (john the ripper), evil-winrm and more! Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #HackTheBox #HTB #CTF #Pentesting #OffSec

↢Social Media↣

↢HackTheBox↣

↢Video-Specific Resources↣

↢Resources↣

↢Chapters↣
Start: 0:00
Enumerate ports/services (NMap): 0:19
Wappalyzer/Nikto/Gobuster: 1:45
WinRM/evil-winrm: 5:20
Local File Inclusion: 6:55
LFI PHP filter Trick: 11:00
RFI + Responder = NTLM Hashes: 12:04
Crack hash with John: 17:04
Shell with evil-winrm: 17:58
End: 19:13
Рекомендации по теме
Комментарии
Автор

Fkn lifesaver dude! Been stuck on that LFI question for days, because of the way they had formatted it. The answer they wanted made no sense to me - had they presented them in bullet points, it would've been much more clear - I genuinely just got confused as they had 3 strings back to back.

Also, didn't think to add the IP to my /etc/hosts file & was wondering why it wouldn't connect to the website; thx!

Keep up the great work, man!

thenextdoorpanda
Автор

awesome thank you so much for this guide, I'm still very new so a little extra help here was needed. You talked the process and explained things very well. Helpful videos like this means it's less likely that people will quit when they hit a bit of a wall as i did here, I will run the process through a few times again solo, just to graps it all. Again many thanks.

retro-tvhead
Автор

I've been struggling for a few days trying to connect with certain machines, looking at hundreds of forum posts, and all i needed to do was add the address to host file, which i did learn ages ago btw lol. Really happy i stumbled on this video, thanks for the upload.

EliteBuildingCompany
Автор

Was praying for a walkthrough. I don't like that flags aren't randomly generated per-person on htb, but on instances where I physically can't reach the flag because of a bug and not being able to use a tool just being able to progress the starting point is really helpful.
Loved the approach as well CryptoCat, thanks!

erica.
Автор

Dude, you're my hero! I couldn't figure out why responder was picking up my local router instead of the htb IP. I was using wlan0 instead of tun0. Thanks so much!

JohnS
Автор

You're walkthroughs are incredible. Thank You.

patrickmoloney
Автор

Subbed, host appending and responder were new concepts for me, just those bits helped me a lot. Thank you.

I didn't realise we could cat out the flag, ended up downloading it :')

kris
Автор

Well done bruv, your hacking skills are insane!
keep it up, your videos are great!!

idodo
Автор

THANK YOU SO MUCH! I love how you show different methods and hacks! Keep it up!

AstraGamesStudios
Автор

Amazing walkthrough!
It really helps that you show us how you are moving forward and how you are googling to get learn all the different things needed. I did this box before I saw your video, but I didn't manage to get through it without having a peek at the walkthrough provided on htb as I didn't really know about the responder and it didn't show up in any of my google searches neither. But searching for the exact TCP port like you did would have probably gotten me on the right track :)

stig
Автор

Nice video ! I feel like this challenge is much more difficult than the other one of the same tier, I was able to do the other challenges by myself but without the write-up I wouldn't have been able to complete this one.

Riushda
Автор

Thank you for this. This machine was too tough for me and I still need to understand a lot of what you did but very insightful video

karthikbt
Автор

make more I subbed ive been stuck on this one for almost 2 months

Death_User
Автор

You are a lifesaver!!! And you've earned a new subscriber 🤝🏽

athimngqundaniso
Автор

@cryptocat Thank you for the Video.. I was stuck and needed help. This was what I needed. Thanks!

cyberhound_tech_
Автор

Thanks for this video buddy :) good one.

bj
Автор

THANKS FOR THE TIP ON 12:18 sometimes HEADACHE IS NOT SUFFICIENT TO FIND THE ANSWER

firecasts
Автор

awesome, thanks for the video ! I tried adding /etc/hosts in WSL, but I still cant open unika.htb, I use windows. Does WSL configuration doesnt come in-line with windows?

rottenfanger
Автор

Damn I installed tldr but when I run 'tldr nmap' it says 'No tldr entry for nmap'

joseph
Автор

where do you get these wordlist files for john? I'm guess that a lot of these tools are pre-installed in kali and you would have to figure out how to get them installed for a different distro or maybe if it is pre-installed in kali maybe just load up that distro and grab the wordlist I need?

ryanwalker