HackTheBox Jeeves CTF walkthrough - Juicy Potato Attack
NEW: I'm launching a course for security practitioners If you're a threat hunter, detection engineer, or incident responder who wants to build your own AI-powered tools (no coding required) - check out "Mastering Agentic AI for Threat Hunting" → Join the waitlist for 20% off: https://aionsec.ai/course --- link to hacktricks overview of juicy potato attacks: https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/juicypotato link to htb jeeves: https://app.hackthebox.com/machines/114 ================================================== in this video we explore privilege escalation via a juicy potato attack. we'll attack the hackthebox machine called 'jeeves', here using metasploit, while in the following video we'll follow a manual approach. the initial foothold is obtained by running a groovy reverse tcp script on a jenkins server. ================================================== music: 'shop' from the undertale OST by toby fox twitter: @faanross #cybersecurity #redteaming #c2 #hackthebox #ctf
Download
0 formatsNo download links available.