www.youtube.com
Open in
urlscan Pro
2607:f8b0:4006:81f::200e
Public Scan
Submitted URL: https://t.co/O2Hj9mmzDq
Effective URL: https://www.youtube.com/watch?v=WW3kv4f2W68&feature=youtu.be
Submission: On November 08 via api from IN — Scanned from CA
Effective URL: https://www.youtube.com/watch?v=WW3kv4f2W68&feature=youtu.be
Submission: On November 08 via api from IN — Scanned from CA
Form analysis
1 forms found in the DOM/results
<form id="search-form" action="/results" class="style-scope ytd-searchbox">
<div id="container" class="style-scope ytd-searchbox">
<yt-icon id="search-icon" class="style-scope ytd-searchbox"><!--css-build:shady--><!--css-build:shady--><span class="yt-icon-shape style-scope yt-icon yt-spec-icon-shape">
<div style="width: 100%; height: 100%; display: block; fill: currentcolor;"><svg xmlns="http://www.w3.org/2000/svg" fill="currentColor" height="24" viewBox="0 0 24 24" width="24" focusable="false" aria-hidden="true"
style="pointer-events: none; display: inherit; width: 100%; height: 100%;">
<path clip-rule="evenodd" d="M16.296 16.996a8 8 0 11.707-.708l3.909 3.91-.707.707-3.909-3.909zM18 11a7 7 0 00-14 0 7 7 0 1014 0z" fill-rule="evenodd"></path>
</svg></div>
</span></yt-icon>
<div id="search-input" class="ytd-searchbox-spt" slot="search-input"><input id="search" autocapitalize="none" autocomplete="off" autocorrect="off" name="search_query" tabindex="0" type="text" spellcheck="false" placeholder="Search"
aria-label="Search"></div>
<div id="search-clear-button" class="style-scope ytd-searchbox" hidden=""><ytd-button-renderer class="style-scope ytd-searchbox" button-renderer="" button-next=""><!--css-build:shady--><yt-button-shape><button
class="yt-spec-button-shape-next yt-spec-button-shape-next--text yt-spec-button-shape-next--mono yt-spec-button-shape-next--size-m yt-spec-button-shape-next--icon-only-default yt-spec-button-shape-next--enable-backdrop-filter-experiment"
aria-disabled="false" aria-label="Clear search query" title="" style="">
<div class="yt-spec-button-shape-next__icon" aria-hidden="true"><yt-icon style="width: 24px; height: 24px;"><!--css-build:shady--><!--css-build:shady--><span class="yt-icon-shape style-scope yt-icon yt-spec-icon-shape">
<div style="width: 100%; height: 100%; display: block; fill: currentcolor;"><svg xmlns="http://www.w3.org/2000/svg" enable-background="new 0 0 24 24" height="24" viewBox="0 0 24 24" width="24" focusable="false" aria-hidden="true"
style="pointer-events: none; display: inherit; width: 100%; height: 100%;">
<path d="m12.71 12 8.15 8.15-.71.71L12 12.71l-8.15 8.15-.71-.71L11.29 12 3.15 3.85l.71-.71L12 11.29l8.15-8.15.71.71L12.71 12z"></path>
</svg></div>
</span></yt-icon></div><yt-touch-feedback-shape style="border-radius: inherit;">
<div class="yt-spec-touch-feedback-shape yt-spec-touch-feedback-shape--touch-response" aria-hidden="true">
<div class="yt-spec-touch-feedback-shape__stroke" style=""></div>
<div class="yt-spec-touch-feedback-shape__fill" style=""></div>
</div>
</yt-touch-feedback-shape>
</button></yt-button-shape><tp-yt-paper-tooltip offset="8" disable-upgrade=""></tp-yt-paper-tooltip></ytd-button-renderer></div>
</div>
<div id="search-container" class="ytd-searchbox-spt" slot="search-container"></div>
</form>
Text Content
• NaN / NaN • NaN / NaN Play (k) Back CA Skip navigation Search Search Search with your voice Sign in CA Brains TryhackMe Walkthrough Easy Room Search Watch later Share Copy link Info Shopping Subscribe for more content !!! Tap to unmute 2x If playback doesn't begin shortly, try restarting your device. • Up next Live Upcoming CancelPlay Now MatSec Subscribe Subscribed Welcome to MatSec's Cybersecurity Hub! 🚀 Dive into ethical hacking, network security, and ctf challenges. Join our community to stay secure online and enhance your cybersecurity skills CyberSecurity, EthicalHacking, TryHackMe, NetworkSecurity, CTF, CyberAwareness, InfoSec, HackingTutorial, CyberSecurityTraining, CyberSecurityTips, CyberSecurityBasics, OnlineSecurity, CyberDefense, PenetrationTesting, VulnerabilityAssessment TryHackMe WhiteRose Room Walkthrough: Cracking Credentials, Exploiting SSTI, and Rooting Access! 22:16 MatSec Subscribe Subscribed You're signed out Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer. CancelConfirm Share Include playlist An error occurred while retrieving sharing information. Please try again later. 0:00 0:02 / 10:53•Watch full videoLive • • Scroll for details BRAINS TRYHACKME WALKTHROUGH EASY ROOM MatSec MatSec 183 subscribers <__slot-el> Subscribe <__slot-el> Subscribed 15 Share Download Download Save 789 views 1 month ago #CTF #Splunk #EthicalHacking 789 views • Oct 6, 2024 • #CTF #Splunk #EthicalHacking LICENSE Creative Commons Attribution license (reuse allowed) Show less In this video, we explore the "Brains" TryHackMe room, which focuses on exploiting an authentication bypass vulnerability in TeamCity (CVE-2024-27198). We'll take on the role of an attacker, perform remote code execution (RCE) to capture a flag, and then shift to defense mode, using Splunk to analyze logs and track the attack. If you're passionate about offensive and defensive security, this walkthrough is for you! …...more ...more Transcript Follow along using the transcript. Show transcript MATSEC 183 subscribers Videos About Videos About Subscribe Discord MatSec 183 subscribers LICENSE Creative Commons Attribution license (reuse allowed) Show less #CTF #Splunk #EthicalHacking BRAINS TRYHACKME WALKTHROUGH EASY ROOM 789 views789 views Oct 6, 2024 15 Share Download Download Save 11 COMMENTS Sort comments Sort by Top comments Newest first Add a comment... @ANUJCHAUHAN-Y4O 3 weeks ago Nice bro :) heart heart heart heart Show less Read more Like Dislike ❤ by MatSec Reply · 1 reply · 1 reply @B1N4RYXPL0IT 3 weeks ago (edited) Hi sir, may I know how did you customise your terminal? It looks amazing ️ Could you kindly do a tutorial on it and also add in how to change the host name and Kali Linux username for the same? Show less Read more Like 1 Dislike ❤ by MatSec Reply · 2 replies · 2 replies @MUHAMMADTAHA2578 1 month ago like your videos sir Show less Read more Like Dislike ❤ by MatSec Reply @89HOUSEMUSIC 11 days ago Can somebody tell me why eviluser is the name of the user created? I don't get it! :S The dates do not match for me! Thank you in advance. Show less Read more Like Dislike ❤ by MatSec Reply · 1 reply · 1 reply @MUHAMMADTAHA2578 1 month ago i already subscribeed🫶🫶🫶 Show less Read more Like Dislike ❤ by MatSec Reply @MUHAMMADTAHA2578 1 month ago I hope you're doing well. I wanted to ask if you could please create a video on any room in TryHackMe that involves accessing the wwwroot file of a website. If there is such a room available, it would be really helpful if you could guide us through it. Show less Read more Like Dislike ❤ by MatSec Reply · 0 replies · 0 replies COMMENTS 11 Top comments Newest first IN THIS VIDEO Transcript DESCRIPTION Brains TryhackMe Walkthrough Easy Room 15Likes 789Views Oct 62024 In this video, we explore the "Brains" TryHackMe room, which focuses on exploiting an authentication bypass vulnerability in TeamCity (CVE-2024-27198). We'll take on the role of an attacker, perform remote code execution (RCE) to capture a flag, and then shift to defense mode, using Splunk to analyze logs and track the attack. If you're passionate about offensive and defensive security, this walkthrough is for you! Room: https://tryhackme.com/r/room/brains CVE-2024-27198-Exploit: https://github.com/W01fh4cker/CVE-202... Blog: https://www.vicarius.io/vsociety/post... Follow me on social media: Twitter: https://x.com/matsec2125 Discord: / discord About Me: Hi, I'm MatSec, a cybersecurity enthusiast and your guide on this journey. On my channel, I share tutorials, tips, and insights on cybersecurity, ethical hacking, and staying safe online. Join me as we uncover the world of cybersecurity together! Call to Action: 👍 If you found this video helpful, please like, comment, and subscribe for more content! 🔔 Don’t forget to hit the bell icon to get notified about my latest videos! Tags: #TryHackMe #TeamCityExploit #Cybersecurity #EthicalHacking #Splunk #InfoSec #CTF Show less ...more In this video, we explore the "Brains" TryHackMe room, which focuses on exploiting an authentication bypass vulnerability in TeamCity (CVE-2024-27198). We'll take on the role of an attacker, perform remote code execution (RCE) to capture a flag, and then shift to defense mode, using Splunk to analyze logs and track the attack. If you're passionate about offensive and defensive security, this walkthrough is for you! Room: https://tryhackme.com/r/room/brains CVE-2024-27198-Exploit: https://github.com/W01fh4cker/CVE-202... Blog: https://www.vicarius.io/vsociety/post... Follow me on social media: Twitter: https://x.com/matsec2125 Discord: / discord About Me: Hi, I'm MatSec, a cybersecurity enthusiast and your guide on this journey. On my channel, I share tutorials, tips, and insights on cybersecurity, ethical hacking, and staying safe online. Join me as we uncover the world of cybersecurity together! Call to Action: 👍 If you found this video helpful, please like, comment, and subscribe for more content! 🔔 Don’t forget to hit the bell icon to get notified about my latest videos! Tags: #TryHackMe #TeamCityExploit #Cybersecurity #EthicalHacking #Splunk #InfoSec #CTF …...more ...moreShow less Transcript Follow along using the transcript. Show transcript MATSEC 183 subscribers Videos About Videos About Subscribe Discord MatSec 183 subscribers TRANSCRIPT NaN / NaN 18:33 18:33 Now playing CHEESE CTF TRYHACKME WALKTHROUGH | EASY ROOM MatSec MatSec • • 2.9K views 1 month ago 22:16 22:16 Now playing TRYHACKME WHITEROSE ROOM WALKTHROUGH: CRACKING CREDENTIALS, EXPLOITING SSTI, AND ROOTING ACCESS! MatSec MatSec • • 405 views 6 days ago New 35:08 35:08 Now playing BACKTRACK TRYHACKME WALKTHROUGH | MEDIUM ROOM MatSec MatSec • • 426 views 3 weeks ago 39:00 39:00 Now playing 🧠🧠 TRYHACKME BRAIN: EXPLOIT THE OPEN GATE - TEAMCITY CVE-2024-27198 CHALLENGE 🧠🧠 Djalil Ayed Djalil Ayed • • 468 views 1 month ago 18:09 18:09 Now playing U A HIGH SCHOOL TRYHACKME WALKTHROUGH - EASY ROOM MatSec MatSec • • 2.1K views 2 months ago 48:49 48:49 Now playing WHITEROSE CTF WALKTHROUGH | TRYHACKME | CYBERPRANAVA Pranava Rao Pranava Rao • • 617 views 5 days ago New 33:28 33:28 Now playing APIWIZARDS BREACH TRYHACKME ROOM: COMPLETE WALKTHROUGH & TIPS MatSec MatSec • • 254 views 3 months ago 44:20 44:20 Now playing TRYHACKME - RESET (WALKTHROUGH) | DETAILED EXPLAINED, ACTIVE DIRECTORY Osman Dağdelen Osman Dağdelen • • 1.5K views 9 months ago 25:04 25:04 Now playing THE LONDON BRIDGE TRYHACKME WALKTHROUGH: MEDIUM ROOM MatSec MatSec • • 1K views 1 month ago 10 videos TRYHACKME WALKTHROUGH - MEDIUM DIFFICULTY MatSec • Playlist View full playlist 11 videos TRYHACKME WALKTHROUGH - EASY DIFFICULTY MatSec • Playlist Updated 6 days ago View full playlist 24:28 24:28 Now playing TRY HACK ME: PHISHING stuffy24 stuffy24 • • 785 views 2 years ago 14:28 14:28 Now playing HAMMER TRYHACKME WALKTHROUGH - MEDIUM ROOM MatSec MatSec • • 431 views 2 months ago 14:58 14:58 Now playing SOCIAL ENGINEERING - HOW BAD GUYS HACK USERS IBM Technology IBM Technology Verified • • 58K views 1 year ago 44:22 44:22 Now playing PYRAT CTF TRYHACKME | PYTHON CODE EXECUTION VULNERABILITY EXPLOIT | CYBERPRANAVA Pranava Rao Pranava Rao • • 278 views 1 month ago 36:29 36:29 Now playing LEARNING WIRESHARK! | TRYHACKME - WIRESHARK BASICS WireDogSec WireDogSec • • 315 views 1 year ago 16:36 16:36 Now playing CYBERSECURITY ARCHITECTURE: APPLICATION SECURITY IBM Technology IBM Technology Verified • • 73K views 1 year ago 38:03 38:03 Now playing BACKTRACK TRYHACKME WALKTHROUGH || BACKTRACK CTF TRYHACKME || CTF || TRYHACKME || TTY PUSHBACK ||THM NEXUSECURITIES NEXUSECURITIES • • 214 views 3 weeks ago 47:24 47:24 Now playing DEVELOP YOUR OWN RAT: EDR + AV DEFENSE BY DOBIN RUTISHAUSER DEFCON Switzerland DEFCON Switzerland • • 9.6K views 2 years ago 28:17 28:17 Now playing HACKING BANK FROM HACKTHEBOX | HTB BANK WALKTHROUGH | ETHICAL HACKING Chris Alupului Chris Alupului • • 16K views 7 days ago Show more