• ClipSaver
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

HackTheBox - Ghost скачать в хорошем качестве

HackTheBox - Ghost 1 month ago

video

sharing

camera phone

video phone

free

upload

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
HackTheBox - Ghost
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: HackTheBox - Ghost в качестве 4k

У нас вы можете посмотреть бесплатно HackTheBox - Ghost или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон HackTheBox - Ghost в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



HackTheBox - Ghost

00:00 - Intro 01:00 - Start of nmap 05:20 - Taking a look at all the websites 06:45 - Showing why you should be careful when enumerating VHOSTS, also using gobuster in DNS mode since there are multiple web services and a DNS Server 12:45 - Discovering LDAP Injection in intranet page 15:40 - Showing how our LDAP Injection is boolean injection which lets us enumerate data in LDAP 21:30 - Creating a python program to perform the boolean injection 33:15 - Got the password for gitea_temp_principal 35:00 - Looking at the Intranet Backend code that was in Gitea which is written in Rust using the Rocket Web Library, finding a RCE but it protected by auth 41:00 - Looking at the Blog project in Gitea, that shows there is a modification to the Ghost CMS Application which has a File Disclosure vulnerability 45:30 - Exploiting the File Disclosure in the blog, downloading the SQL Lite Database, Grabbing the API Key from the environment and then getting a shell through the Rust API 50:00 - Shell returned on intranet container, discovering a SSH Control Master socket, which lets us ssh into the dev workstation without a password 56:00 - On the workstation, Florence.Ramirez has a KRB Ticket, downloading it and then testing it 58:30 - Running bloodhound, which is giving us trouble because of some weird connection issues as Impacket isn't trying all the IP's given for a DC. 01:09:20 - Editing our bloodhound to hardcode the IP Address, which is a really hacky thing to do, but it worked. Then looking at Bloodhound and not seeing much 01:17:20 - Using dnstool to create a DNS Record on the domain controller, then responder to steal the hash of a user trying to connect to that item 01:21:00 - Got Justin.Bradley's password, who can grab dump the GMSA Password, getting the ADFS Service accounts password 01:27:15 - Dumping the ADFS Data (ADFSDump), then using ADFSpoof to perform the Golden SAML Attack to impersonate Administrator on a federated web login 01:42:00 - Logged into core as administrator, which is a MSSQL Shell. Enumerating the database, discovering linked databases, enumerating permissions, discovering we can impersonate SA, enable and run xp_cmdshell for rce 02:01:10 - Editing our powershell script to bypass defender by renaming a bunch of variables. Using EFSPotato to escalate from the service account to system 02:13:00 - System on the Corp DC, which has a bi-directional trust 02:17:36 - Using mimikatz to dump the Ghost$ account which the parent subdomain trusts, then using ticketer to create a TGT that abuses this inter-realm trust to say we can access the parent domain 02:20:50 - Using getST to create a service ticket that requests a TGS that says we have access to DC01's CIFS Service, then running Secretsdump to dump all the credentials

Comments
  • HackTheBox - BigBang 5 days ago
    HackTheBox - BigBang
    Опубликовано: 5 days ago
    6826
  • HackTheBox - Forest 5 years ago
    HackTheBox - Forest
    Опубликовано: 5 years ago
    211496
  • Ставлю 100к на будущее игр: что взорвёт индустрию к 2027 1 day ago
    Ставлю 100к на будущее игр: что взорвёт индустрию к 2027
    Опубликовано: 1 day ago
    562223
  • The Most Destructive Hack Ever Used: NotPetya 4 weeks ago
    The Most Destructive Hack Ever Used: NotPetya
    Опубликовано: 4 weeks ago
    1389879
  • HackTheBox - LinkVortex 3 weeks ago
    HackTheBox - LinkVortex
    Опубликовано: 3 weeks ago
    10056
  • HackTheBox - Alert 1 month ago
    HackTheBox - Alert
    Опубликовано: 1 month ago
    10319
  • Backend web development - a complete overview 3 years ago
    Backend web development - a complete overview
    Опубликовано: 3 years ago
    2113154
  • they tried to hack me so i confronted them 1 month ago
    they tried to hack me so i confronted them
    Опубликовано: 1 month ago
    534841
  • Calming music for nerves 🌿 healing music for the heart and blood vessels, relaxation, music for soul 1 year ago
    Calming music for nerves 🌿 healing music for the heart and blood vessels, relaxation, music for soul
    Опубликовано: 1 year ago
    4639728
  • HackTheBox - Vintage 12 days ago
    HackTheBox - Vintage
    Опубликовано: 12 days ago
    8093

Контактный email для правообладателей: [email protected] © 2017 - 2025

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS