CTF Workshop: Hacking Methodology || Silver Platter - TryHackMe

CTF Workshop: Hacking Methodology || Silver Platter - TryHackMe

Tyler Ramsbey - Hack Smarter

5 месяцев назад

6,143 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@nathanezra1
@nathanezra1 - 12.01.2025 09:12

UDP Scan just got added to rustscan on the latest release, so not user error 😊

Ответить
@official.sirhaxalot
@official.sirhaxalot - 12.01.2025 09:36

Awesome stream and my first workshop. 💯 enjoyed it. Thanks again Tyler

Ответить
@KaungKhant-yz8nd
@KaungKhant-yz8nd - 12.01.2025 10:34

I joined workshop and I missed it due to my job but I rewatched the record. It's horribly amazing and I am trying following every steps you did including note taking and learned a lot and lot. While I rewatched it, I just couldn't forward or skip video because I am afraid of missing incredible things. Thank you Man. This is my first workshop and I hope you will do more workshops in the future.

Ответить
@JoeSmith-xv8ot
@JoeSmith-xv8ot - 12.01.2025 14:37

Excellent Tyler. I learned a lot from this one video, keep up the good work it's very much appreciated. It is good to see you grow on all the channels, and being part of your journey is unreal thank you mate

Ответить
@ArnoNym69
@ArnoNym69 - 12.01.2025 16:48

thank you for this very well explained methology :)

Ответить
@TheSQL-Lover
@TheSQL-Lover - 12.01.2025 17:12

Thanks for helping the community. I am not a newbie myself but not at your level either. But I applaud your suggestion of teaching what we know; we solidify concepts and help others to learn new material during the process.

Ответить
@klr607
@klr607 - 12.01.2025 17:34

Good stuff Tyler. Thank you.

Ответить
@CoryCatSun
@CoryCatSun - 13.01.2025 03:16

Caught the record! Good stuff! I learned a lot!!

Ответить
@hengkilodwig
@hengkilodwig - 13.01.2025 06:18

Am i from unintended way to not using "cewl" just delete the parameter password on burp to login ..

Ответить
@box228
@box228 - 13.01.2025 06:43

I blame harder CTFs for making this machine harder than it was. It was a a nice machine. Definitely need to go back and refine my pentesting methodology

Ответить
@shxikrf
@shxikrf - 13.01.2025 10:00

Hey Tyler I don't know if you will read this comment but I just wanted to tell you thank you and being that authentic with us. You a real example of person and your carrier give me a lot of motivation to continue in cyber security thank you very much please don't change

Ответить
@Macj707
@Macj707 - 13.01.2025 20:30

neovim btw

Ответить
@Macj707
@Macj707 - 13.01.2025 20:31

CHEF WUZ HERE!

Ответить
@oildiggerlwd
@oildiggerlwd - 14.01.2025 01:07

I can hit the target via SSH from the attack box on THM, but I cannot from either a VMware kali vm over vpn or kali in WSL. Both systems have ssh enabled in systemd and I can ssh into one of my own boxes from both. Any ideas what may be wrong? I spent some time last night and today trying to troubleshoot.

Ответить
@xB-yg2iw
@xB-yg2iw - 14.01.2025 01:08

Ah I did the root step slightly different, I continued with your CVEs and mounted the docker image filesystem with silver crawler, then read the DB credentials from the config and thought to try it to su tyler!

Ответить
@simonst9r
@simonst9r - 14.01.2025 01:14

What a great video! Thanks a lot, Tyler.

Ответить
@KoTuSmej
@KoTuSmej - 14.01.2025 15:01

Great teaching! Thanks for your tips and time.

Ответить
@Cosborn21
@Cosborn21 - 15.01.2025 05:11

This was a great box Tyler I havent been watching you long but ive already learned so much. I turned into the live stream as long as I could to see this. Please do more of these it helps people like me see so many new things and pick up more info each time!

Ответить
@jjjww975
@jjjww975 - 15.01.2025 16:33

in Parrot -- $sudo apt-get install dirsearch | Burp Suite CE - Intruder -- look for Response Length

Ответить
@debrikchakraborty2845
@debrikchakraborty2845 - 15.01.2025 18:12

Thanks Tyler for the amazing methodology and note taking tips. Looking forward to more such exciting workshops.

Ответить
@flea2play
@flea2play - 15.01.2025 23:49

what a great room this one felt different as a beginner for me for a ctf room

Ответить
@arkwinger
@arkwinger - 17.01.2025 13:05

As with the many others, I just wanted to say how well done this box was.

Thankyou Tyler

Ответить
@flyeagle320
@flyeagle320 - 19.01.2025 13:19

learnt a lot tyler . Thank you .

Ответить
@vaibhavsuri2389
@vaibhavsuri2389 - 20.04.2025 14:18

bro need one help how your first nmap command always run so fast, I used the same flags, and it always take like 20-30 minutes, and I am using THM vpn, can you please help me with the solution

Ответить
@DefiDev-f2i
@DefiDev-f2i - 06.05.2025 16:01

Honestly , For some reason i was stuck at the hash i found in the /var/log/journal
though i am not doin ctf for that long but it was dumb of me

Ответить