Back to Browse

HackTheBox Jeeves CTF walkthrough - Juicy Potato Attack

1.7K views
Dec 31, 2023
25:04

NEW: I'm launching a course for security practitioners If you're a threat hunter, detection engineer, or incident responder who wants to build your own AI-powered tools (no coding required) - check out "Mastering Agentic AI for Threat Hunting" → Join the waitlist for 20% off: https://aionsec.ai/course --- link to hacktricks overview of juicy potato attacks: https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/juicypotato link to htb jeeves: https://app.hackthebox.com/machines/114 ================================================== in this video we explore privilege escalation via a juicy potato attack. we'll attack the hackthebox machine called 'jeeves', here using metasploit, while in the following video we'll follow a manual approach. the initial foothold is obtained by running a groovy reverse tcp script on a jenkins server. ================================================== music: 'shop' from the undertale OST by toby fox twitter: @faanross #cybersecurity #redteaming #c2 #hackthebox #ctf

Download

0 formats

No download links available.

HackTheBox Jeeves CTF walkthrough - Juicy Potato Attack | NatokHD