15 thoughts on “HackTheBox – Topology

  • My google-fu sucks. I spend such a long time looking for bypass and I remember I couldn't find one.

  • There used to be a great TeX book called “The Joy of TeX” (kinda hinting on a different book with similar name) and they pronounced is as “Teks” back then 😅

  • 8:12 it's parts like this, that discourages me from ever being good at CTF's and Hacking overall. How is one supposed to know that you need to use '$' in order to passthrough as text. You really do get better at these things by constantly practicing over time but man the imposter syndrome kicks in 10x when you get stuck because of a simple character you didn't include. I understand GOOGLE is my friend but I wouldn't have even known what to ask it in this situation. . Like Offensive Security says, I guess I need to "Try Harder".

    Thank you so much for these videos ippsec. You truly keep me motivated.

  • That was such a good video, I had to comment to say thank you for such an extensive approach!

  • Out of curiosity, when running nmap, why do you use -sC -sV and not just -A ?

  • I still cannot comprehend why we need the $ before and after the initial payload to leak files. Can someone please elaborate further maybe with examples?

  • Yeah I solved using the catcode trick to replace backslash with something and was able to write php webshell. Didn’t realize it was unintended

  • 34:32 Thanks for informing people, because I've already used that trick and I informed the victim by sending a message to their server.
    echo -n "Hello man" | nc 10.10.14.xx 8000

  • i learn lot's of things from you you help me in lot's of things

Comments are closed.