Тёмный
No video :(

All-Army CyberStakes! Cross-Site Scripting Filter Evasion 

John Hammond
Подписаться 1,8 млн
Просмотров 46 тыс.
50% 1

Опубликовано:

 

5 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 90   
@SB-rf2ye
@SB-rf2ye 2 года назад
I love how John teaches the subject. He most likely already knows the answer, but knows that showing the methodology is more important. Trying different things, failing sometimes, then finally winning, are what makes a good hacker.
@joshuakorbut239
@joshuakorbut239 3 года назад
I know it's old but I've been binging your videos and bro, just amazing. The use of python to wreck like everything makes me sooo sooo happy.. I've literally understood coding 1000% better just watching your content.
@booruledie3052
@booruledie3052 2 года назад
One of best ctf question i’ve ever seen so far. Also great solution! Congrats John
@blackmagicprod7039
@blackmagicprod7039 4 года назад
New to your channel but eating it up. I’m not a security guy or a CS/SE major or anything, I just like computers and find these videos so interesting. I could never solve these boxes by myself but the way you present these solutions makes it FEEL like I could have come to the same conclusions myself. I think that’s a hallmark of a great teacher, keep it up!
@dw0x
@dw0x 4 года назад
This was very interesting! More of this (:
@DrovaRS
@DrovaRS 4 года назад
Your videos have been great to watch while I’m stuck in a tractor away from my laptop
@tanercoder1915
@tanercoder1915 4 года назад
I just stuck to the screen when I saw you used python to do injections. so cool. you have a unique method I haven't seen elsewhere. go python in BB!
@Vogel42
@Vogel42 4 года назад
13:30 You can call functions using square brackets notation instead of a period. String.fromCharCode -> String['fromCharCode']
@Vogel42
@Vogel42 4 года назад
@@GiQQ Oh, you are right. How about using slash string instead of single quote?
@ethisfreedom
@ethisfreedom Год назад
same lol
@legndery
@legndery 4 года назад
Haha from js dev perspective template literals(backticks) were the first thing that came to my mind when you were searching for string without quotes.
@telnobynoyator_6183
@telnobynoyator_6183 4 года назад
Me too !
@erich8456
@erich8456 4 года назад
"hit the dislike button twice" - just when I though you couldn't be any more clever... kudos to you sir.
@_JohnHammond
@_JohnHammond 4 года назад
Ha! I think that is a common joke among RU-vidrs. :) Thanks so much for watching!
@leblanc666666
@leblanc666666 2 года назад
I would have never thought about that base64 and atob(), nice little trick to bypass filters to keep in my pocket! Great fun lab!
@abdulbasit-jj8qf
@abdulbasit-jj8qf 2 года назад
I love how you approach the problem... it is excellent.. also how do you get the output of python in new window.. by default it opens in a panel...
@nickcarter7063
@nickcarter7063 3 года назад
I know I'm late on this one, but I'm just binging on your old stuff at 2:30am. The backticks allow you to use ES6 syntax to create a template literal, previously referred to as a template string I believe. So instead of: var name = "Nick" var output = "My name is" + name alert(output) // outputs "My name is Nick" We can use name and change output to: var output = `My name is ${name}` Our alert will produce the same result without needing to concatenate the string and variable and eliminates the need for using quotes for the string. This is a very simple example, but when you need to concatenate a lot of stuff it saves a bunch of time. It also apparently helps to make this attack work which is super cool.
@dephy2003
@dephy2003 2 года назад
Binging on your content. Love seeing your thought process as you run into roadblocks.
@jaiganesh851
@jaiganesh851 4 года назад
The way you were using python..mind boggling...Please if possible do make a tutorials on Python and Javascript for Pentesters or Bug Hunters. Thank You for bringing the great content. Love
@rehmankhan6081
@rehmankhan6081 3 года назад
I see myself there doing PT with my client application finding all possible xyz. Exactly, I got that PT feel bro..🍻🔥
@abhhibirdawade9657
@abhhibirdawade9657 4 года назад
You are amazing 😀
@Synceditxboxoffice
@Synceditxboxoffice 2 года назад
incredible sir i really loved it and please keep coming these videos
@viv_2489
@viv_2489 2 года назад
This was so informative and beautiful in a short video 👌
@tomasgorda
@tomasgorda 4 года назад
Again amazing video. Every day i'm checking youtube and looking forward your next one :)). Great job, keep going ;)
@stackoverflow2155
@stackoverflow2155 3 года назад
really enjoyed this!!!
@3xp0netken
@3xp0netken Год назад
el verdadero proceso de un hacker , investigar , persistir , evadir los obstaculos .... te ganaste un subscriptor bro , buen video
@newtimes
@newtimes 4 года назад
When you submitted the URL you just were hoping that an admin/moderator would click on that link? Or how did you get that cookie
@saeedsaeed9
@saeedsaeed9 4 года назад
Yup that's correct. Typically in a CTF challenge there will be an automated browser that will access what you submit with and admin session.
@Andrei-ds8qv
@Andrei-ds8qv 3 года назад
Wowww, that was awesome!!!!!
@manmoon7396
@manmoon7396 3 года назад
Man, john looking forward to "python primer for hackers!" great stuff keep it up.
@cocosloan3748
@cocosloan3748 4 года назад
Youre amazing..Period.
@_JohnHammond
@_JohnHammond 4 года назад
Thanks so much! And thanks for watching!
@adamstrickland97
@adamstrickland97 Год назад
Hey John, wondering if you can expand on your CORS comments from the end of the video. You mention that when a script from the target site tries to reach out to the attacker's site, you can see a CORS error. However, isn't that error entirely in the attacker's control? Couldn't you have returned the right CORS headers from your server to allow the request through?
@Beast-cc7xd
@Beast-cc7xd 2 года назад
Amazing video man !! new sub and like , more XSS videos !!!! Do you give a course on udemy or something like that on web hacking? If not, it would be great, we would all buy it
@nicola1421
@nicola1421 3 года назад
That was so epic man 🤘🏼🤘🏼
@Cooliofamily
@Cooliofamily Год назад
That ad at 18 minutes was 🤌🏼
@imaok4721
@imaok4721 4 года назад
I quite enjoyed that.
@HerozTech
@HerozTech 4 года назад
Best of its kind Thanks so much mentor
@joewharton7735
@joewharton7735 Год назад
What I would do is make the string the fragment and pull it from there
@kuldeepsingh2983
@kuldeepsingh2983 3 года назад
This is awesome.
@Synceditxboxoffice
@Synceditxboxoffice 11 месяцев назад
sir start a series on python like solving CTF on python its gonna be really fun ❤
@prakasakatheilluminator6904
@prakasakatheilluminator6904 3 года назад
which package are you using 6:35 for Build Output tab ?
@mariusandersons
@mariusandersons 4 года назад
17:00 base64 also have forward slash, thats why i think it didnt work.
@akashrakshit8446
@akashrakshit8446 3 года назад
Dude quality stuff 👌👌👌
@whosdavidce
@whosdavidce 3 года назад
this is amazing man
@mostafanasser3065
@mostafanasser3065 3 года назад
great video and I love your unique way in solving the challenge with python but couldn't you have don all this with burp suite ?
@lordvoldemort7692
@lordvoldemort7692 4 года назад
Thank's Bro i really learn New techniques every Time i watche Your Vedeos I wish If you Teach us how to hunt bulk url's and work with bulk 😁😁😁✔
@nonoperation2356
@nonoperation2356 4 года назад
love this can you suggest any other XSS ctfs?
@sudha2373
@sudha2373 3 года назад
Where u learn python for cyber security
@luckypathan1958
@luckypathan1958 4 года назад
Love your work bro❤️❤️
@LuminousWatcher
@LuminousWatcher 3 года назад
`b to a` and `a to b`
@anujchourange1792
@anujchourange1792 4 года назад
You are just awesome bro !!!!!!!!!!!!
@Vagelis_Prokopiou
@Vagelis_Prokopiou 4 года назад
Awesome 👍
@gunblad3
@gunblad3 4 года назад
Very nice. Wonder if it’s a bot clicking on the links you submit or an actual person
@sudosuraj
@sudosuraj 3 года назад
That Was awesome
@serafeimzaragas5573
@serafeimzaragas5573 3 года назад
Great video.I want to block my mobile carrirer xss protection to have free internet.give me an idea please.
@ahmedezealdean6189
@ahmedezealdean6189 2 месяца назад
seeing you hacking made me love hacking very much.
@imhassan9119
@imhassan9119 4 года назад
Can anyone explain how he made a request sending the dictionary and it injected the code?
@jatinmahida4660
@jatinmahida4660 4 года назад
Watch the article in incognito mode for medium
@lordykarus
@lordykarus 4 года назад
amazing
@NeelNarayan
@NeelNarayan 4 года назад
you gotta add "JOIN" button for content exclusive to your members, i reckon it would be totally worth it.
@domasjanulis106
@domasjanulis106 3 года назад
trying encode but getting this one Traceback (most recent call last): File "/home/bango/Desktop/project.py", line 10, in payload = base64.b64encode(payload) File "/usr/lib/python3.8/base64.py", line 58, in b64encode encoded = binascii.b2a_base64(s, newline=False) TypeError: a bytes-like object is required, not 'str'
@domasjanulis106
@domasjanulis106 3 года назад
i added payload = base64.b64encode(payload.encode('utf-8'))
@neilthomas5026
@neilthomas5026 4 года назад
This was actually so cool lol
@slonkazoid
@slonkazoid 4 года назад
TIL: he doesn't know javascript syntax
@onions5113
@onions5113 4 года назад
can you make a video how to make different types of payloads?
@offmymeds13
@offmymeds13 3 года назад
What is your primary job? I noticed you have to be in mil to do this challenge. I'm in the Army myself
@Shintowel
@Shintowel 2 года назад
Teacher
@MatteoGariglio
@MatteoGariglio 3 года назад
Couldn't you just do "document.cookie" with the browser dev tools? Why create a script to send this info to your server? To whom actually belong that session?
@_Omni
@_Omni 3 года назад
🤦‍♂️
@d3vashishs0ni
@d3vashishs0ni 3 года назад
I think I have to leave bash and start python🐍🐍
@p.kay_____
@p.kay_____ 4 года назад
Cool🤩
@Colaholiker
@Colaholiker 3 года назад
So basically if you don't have a server on the internet, you're SOL?
@_JohnHammond
@_JohnHammond 3 года назад
No, you can use ngrok and tunnel out a local listener, and you don't need a server on the internet for that.
@Colaholiker
@Colaholiker 3 года назад
@@_JohnHammond If your router allows this. Unfortunately most DSL routers you get from your provider here in Germany won't allow open ports at all. All that mine offers externally is VPN access into my home network. But you can't open up any ports like for a local running web server to be accessible from the outside. And even more unfortunately with most providers you can't even replace the router with something of your choice, as your account is linked to the router's serial number and it won't connect with another device. With some providers you don't even get a true IP that can be reached normally from the internet, like some provder level NAT. I guess we drew the short straw. ;-) The most crappy thing is that a very popular router model with the stock firmware would allow all of that, but provider customization removed these features for "enhanced customer security".
@assunecotlage8682
@assunecotlage8682 4 года назад
What extension is that in sublime
@optimistemo01
@optimistemo01 11 месяцев назад
I rather had idea lile h1 on dom content full load do function :3
@nusn43
@nusn43 2 года назад
Bro where script code phyton this video
@shaistasiddic1822
@shaistasiddic1822 3 года назад
Nice()
@mattfowler6504
@mattfowler6504 4 года назад
meme review 👏👏
@threeMetreJim
@threeMetreJim 4 года назад
You are out of free articles? Looks like a div overlay thing with a css blur filter on the article below. Some sites actually used to use that (now they use mostly a blurred generic background), suffice to say I never had trouble reading the articles. In chrome, dev tools, remove element (the overlay), then disable any css blur effects, and enable y-overflow (a lot stop you from scrolling the page too). Submit article, does it appear rendered to other users? Next thing is try to enter something that confuses their anti xss system into displaying what you need. You can view page source to check for any odd effects. If you can get an external script into a src attribute somehow, then host it remotely would be a good trick to play.
@threeMetreJim
@threeMetreJim 4 года назад
Comment written before watching the entire video, just in case anyone wondered.
@DOMPurify.isSupported
@DOMPurify.isSupported 3 года назад
Man 😍
@ca7986
@ca7986 4 года назад
♥️
@nusn43
@nusn43 2 года назад
Bro how are u today? I am anonymous haha
@sorrefly
@sorrefly 3 года назад
Your videos are priceless. You don't just show the attack but also the process and the evolving of ideas while designing the attack. Premium content, thank you really.
Далее
GoogleCTF - Cross-Site Scripting "Pasteurize"
29:21
Просмотров 97 тыс.
TryHackMe! SweetRice Exploit & Stabilizing Shells
20:25
All-Army CyberStakes! AES-ECB Plaintext Recovery
30:11
Finding WEIRD Devices on the Public Internet
27:48
Просмотров 274 тыс.
Local Root Exploit in HospitalRun Software
20:48
Просмотров 68 тыс.
Cross-Site Scripting (XSS) Explained
11:27
Просмотров 442 тыс.
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
Просмотров 143 тыс.