TryHackMe! Wonderland - Python Module Manipulation & Capabilities

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

Between these videos and THM, I've learned so much over the past 8 months.

dsyncd
Автор

This was really good. When I did this room earlier this week I thought it would be a good one for you to make a video for. Great minds and what not!!

claymoody
Автор

Dang I'm so far from getting that level. Hard work mien!

jasonmikinskiwallet
Автор

Hey John. Do you have plans to make a Video on hosting your own CTF, Joepardy and A&D? I would really like that

JayPJC
Автор

Thank You Mr. Sheeran for taking time away from your music to be "John Hammond"😉

majinroot
Автор

Great work John, as usual! Thanks for these videos, not only quite educative but also super entertaining. Any suggestion about good resources about Python for cyber security, it's obvious you love it :)

roquellucerop
Автор

Outro is dope like closing with the hand and music

rajith
Автор

Realy helpful and u r doing a great job

shijothomas
Автор

Thanks a lot for an amazing explanation !

asadparkar
Автор

Hey John!! I love your videos and would you advise me to choose between learning binary hacking or web exploitation

bruh_
Автор

You are love man 100% quality content in free ❤

mr_ehmed
Автор

What Linux OS do you use? Any you recommendations for a beginner Linux user?

hurleynukka
Автор

I might make my scripts exit by printing "Segmentation fault (core dumped)" just for the LOLs

domdf
Автор

I am a little bit confused on a part and would appreciate some help and answers: the teaParty binary in the rabbit home directory has the sticky bits set and is also owned by root. my question is, why do we get shell as hatter and not root if the binary has SUID set? what commands can we use to check what is going on?

MsNecroth
Автор

Hey john. Do you have plans on making a video explaining how you setted up the poor mans pentester?

lenierortiz
Автор

11:07 which font? Thank you and have a great day. The font looks pleasant to read.

acmclud
Автор

I have a few questions....
1.Whats the difference between bash and bash -p?
2.When u ran teaparty, shouldn't u have become root and not hatter as the owner of the file is root?

gokulkarthik
Автор

How long did it take you to figure out the url was supposed to spell out rabbit? and why cant you grab the root.txt on you machine and switch the permissions on your end?

checknate
Автор

sir is there any specific reason why you use ubuntu instead of Kali or parrot which have already installed tools you needed?

krknn
Автор

Hello sir !
Will you please provide us the scripts that you used to find vuln in Linux box ...
It will be great if you make a video on it !!!

asepsayyad