Тёмный

Don't make random HTTP requests. 

PwnFunction
Подписаться 203 тыс.
Просмотров 386 тыс.
50% 1

In this episode we'll explore the world of SSRFs.
⭐ LiveOverflow Blog Post + Instructions: liveoverflow.c...
✨ Info
➜ Tools used are: Adobe Animate, Adobe Premiere Pro, Adobe Illustrator & Audacity.
➜ VSCode: Monokai Pro Theme, Dank Mono Font.
➜ Video Production time: 60-ish hours.
➜ 6 Gatorades were consumed.
💬 Discord: / discord
🐤 Twitter: / pwnfunction
🎵 Track: Lost Sky - Dreams
NCS link: • Lost Sky - Dreams | Tr...

Опубликовано:

 

15 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 269   
@AhrenBaderJarvis
@AhrenBaderJarvis 2 года назад
This is the BEST explanation of SSRF I've ever heard and I finally understand it now. Thank you.
@PwnFunction
@PwnFunction 2 года назад
Means a lot, thanks!
@RAGHAVENDRASINGH17
@RAGHAVENDRASINGH17 2 года назад
That's debatable
@algorythmis4805
@algorythmis4805 2 года назад
@@RAGHAVENDRASINGH17 then debate
@vitaminncpp
@vitaminncpp Год назад
@@algorythmis4805 Where Link to the talk you mentioned in video
@avi12
@avi12 2 года назад
This channel is heavily underrated
@kanekino9507
@kanekino9507 2 года назад
Holy fucking shit yes
@NanoTrasen
@NanoTrasen 2 года назад
It's like LiveOverflow, but before they went to shit.
@android-user
@android-user 2 года назад
@@NanoTrasen what went wrong with them? :/
@manuyel4845
@manuyel4845 2 года назад
@@NanoTrasen since when liveoverflow went to shit?
@lexnastin9011
@lexnastin9011 2 года назад
@@manuyel4845 ikr like wut does he mean?
@floridamanfloridaman1687
@floridamanfloridaman1687 2 года назад
the funny thing about this channel is that it always flew under my radar because i thought by the graphics in the thumbnails that it wouldn't dive too deep into the topics. I guess I'll never judge a book by its cover again. Real nice vid, keep it up!
@sodiboo
@sodiboo 2 года назад
I swear i've heard someone jokingly say "CRLF injection" before, and although i've seen that fuck with UI only intended for single lines (chat text boxes in some games, Muck for example and you can impersonate others in chat), but i never thought it would be an actual security vulnerability in a real application that can actually cause damage without another human element lol
@tauon_
@tauon_ 2 года назад
Hi terrain!
@alb12345672
@alb12345672 2 года назад
who needs cr lf when you have && and ; :lol
@SirusStarTV
@SirusStarTV 2 года назад
Muck
@Hardcorelactation
@Hardcorelactation Год назад
muck
@adygombos4469
@adygombos4469 2 года назад
I love this videos. Every time I see one I understand around 30% of what he's saying but I'm still watching 'till the end.
@KentoNishi
@KentoNishi 2 года назад
Just found your channel and I think it's heavily underrated. Keep making more videos plz, even tho I don't do security stuff myself I find it really interesting and your explanations are super easy to understand for noobs like me too. Love it!
@Ikxi
@Ikxi 2 года назад
Lmao the LiveTL guy Hi
@sanderd17
@sanderd17 2 года назад
11:50 rubocop reported that line for a reason apparently.
@phanirithvij
@phanirithvij 2 года назад
Great video, thank's for introducing SSRFs in a practical, hands on and easy to understand way.
@triularity
@triularity 2 года назад
So remember when connecting to random URLs: Either bind your client to an IP which only has public internet access (i.e. via firewall settings); Use a client library which has an option to only connect to public addresses (or can do so via an access control callback); Or funnel all the requests through a proxy which denies access to any internal addresses.
@chilversc
@chilversc 2 года назад
Envoy proxy is good for this, supports mTLS and access control.
@cybercdh
@cybercdh 2 года назад
Really great video. I love your editing skills, so slick, nice job.
@Henrix1998
@Henrix1998 2 года назад
I'm constantly surprised by the amount of languages and frameworks that allow executing any string you give them
@MechanicalMooCow
@MechanicalMooCow 2 года назад
just webdev things
@JMurph2015
@JMurph2015 Год назад
I think it's the hacky way around having proper abstractions for modules/extensions in your codebase. Want to have a middleware system without properly defining the interfaces? No problem, just give your users a hook that's passed into the eval() function as it processes requests! Problem solved!
@basspotion846
@basspotion846 2 года назад
This one is definitely make my day...!
@BigYoshi826
@BigYoshi826 2 года назад
It kinda ruined my day
@luandasilva4639
@luandasilva4639 2 года назад
this channel is as good as it gets man, props
@ModernAtomX
@ModernAtomX 2 года назад
I was in the middle of this video, but I set it down and when I came back, the video was off youtube. Glad to see its back so I can finish it lmao
@Dziaji
@Dziaji 2 года назад
Cool video, and your english is terrific. I almost didn’t notice that you weren’t a native english speaker.
@liesdamnlies3372
@liesdamnlies3372 2 года назад
2:38 Hold-up a second. That’s a Python REPL, but my god it’s beautiful. How was this magic accomplished?!
@PwnFunction
@PwnFunction 2 года назад
Bpython Interpreter
@liesdamnlies3372
@liesdamnlies3372 2 года назад
@@PwnFunction Thank you so much. This is way more comfy than the stock interpreter. :D
@alb12345672
@alb12345672 2 года назад
@@liesdamnlies3372 If you do something like path = require("path") in the node repl you get some minimal documentation (e.g. just a list of methods)
@sugiii9616
@sugiii9616 2 года назад
"Kinda like, you know, when you were young and you want those beers but you were underage" No, sir, I dont. I'm an European
@fitmotheyap
@fitmotheyap 2 года назад
Europe ftw
@P4INKiller
@P4INKiller 2 года назад
_A_ European.
@sugiii9616
@sugiii9616 2 года назад
​@@P4INKiller un Européen* één Europeaan* und Europäer* un Europeo* un Europeista* un European* um Eurpeu* ktoś Europejczyk* (idk my Polish sucks ?) Unu Eŭropujo/Unu Eŭropio* And sorry mates I dont have keyboard for Czech, Ukrainian, etc.
@fitmotheyap
@fitmotheyap 2 года назад
@@sugiii9616 европјанец(this is in macedonian,idk about other slavic)
@sugiii9616
@sugiii9616 2 года назад
@@fitmotheyap Thank you sir! I know how to read your alphabet for 2 weeks hehe 😎😎
@mohamedfatheem2872
@mohamedfatheem2872 2 года назад
Amazing work my brother! Lots of Love! Keep making awesome contents like this.
@fmenguy
@fmenguy 2 года назад
Thank you for these explanations. I was waiting for a video on this type of problem. Your diagrams and your speech (rather slow) are a plus for me which sucks in English: ').
@Evoleo
@Evoleo 2 года назад
FINALLY guys he uploaded!
@MarcusAndersonsBlog
@MarcusAndersonsBlog 2 года назад
Self generated code execution is considered a extremely useful feature in interpretive languages, and I don't see it disappearing. However one does wonder if it's a fools errand arising out of lazy thinking. You can add a lot of power for very little effort this way but the unnoticed security envelope (usually) requiring executable code to sit in OS protected memory is bypassed in any kind of interpreter. This violates the implied security model of the Von-Neuman/Harvard architectures. So the security model never taking into account interpreters is actually responsible for the problem to start with. Browsers should never have been enabled to run interpreted scripts either (go ahead and laugh, but I'm deadly serious). I was pretty amazed when HTML appeared in the 1980s as uncompiled & unencrypted, but when Netscape introduced Javascript I pretty well fell off my chair. My suspicions were confirmed when I subsequently learned HTML was invented by a self taught non-computer professional. The danger of interpreters were already quite apparent to me after just 4 months into my IT career on the DecSystem-10. The TECO editor (aka 'vi') used a privileged operation that could allow TECO code to receive passwords in a fake login attempt. Only a privileged program like TECO could do this, but TECO was an editor with its own interpretive language. All SSRFs work this same way. Interpreters that allow (new) code execution are a really really bad idea. There is simply no need for it, although, its makes a FEW difficult things much much easier without having to write code for, at the expense of violating the fundamental computer architecture security model.
@hexrays6150
@hexrays6150 2 года назад
I have been waiting for a new video from this channel. Very good content and explanation, nice animation and voice
@ilikememes9052
@ilikememes9052 2 года назад
I am from a software engineering background got interested in cybersecurity too now.
@resphantom
@resphantom 2 года назад
One of the reasons you should enable password authentication on your Redis and separate your automation from your environments. Here is one of the biggest risk in some companies, having a central user that has admin access to an entire Kubernetes or ECS cluster. If the credentials or token of this user becomes compromised, the attacker will essentially have full control over your entire cluster. We should probably also separate hackers into 2 categories: - People who want to do damage - People who want to gather valuable information *Hacker (Gatherer)* Large quantities of categorized accurate data is extremely valuable. Many companies big or small store general user data, such as overall sales data to determine which products does a majority of their clients like and try to cater to the larger audience. There are usually big data based systems that uses these datasets to build statistical models to help make sense of a majority of this data. Now for the hacker gathering data, if they somehow got a hold of these datasets, they could sell it to the competitors of the company they stole from, thus now using that data to push specific products out to the same customers faster, making themselves look better. A strange strategic tactic of stealing another company's customer base. *Hacker (Attacker)* The common malicious Attacker could attempt a similar thing but with a different route. They can simply be paid by a company to shut down or to compromise their competitors. For one if they somehow got access to those same datasets, they could simply permanently delete that data, crippling the vision of the competitor. When a company does not know whats happening in their own sales, they may bring out products that the clients won't buy, costing the competitor insane amounts of lost revenue. Or if the attacker somehow got access to the system, they could be paid by a company to simply cripple critical systems of their competitor. If the competitor can't make sales or has a crappy service, then the customer base would most likely flock to whatever works. *Conclusion* Think of it this way, if you suddenly can't use Google, what other search engine would you use? Probably bing or duckduckgo, right?
@dareenoch6880
@dareenoch6880 2 года назад
Welcome back Hope you fine and dandy?
@PwnFunction
@PwnFunction 2 года назад
I'm good, hope you're well too
@Ikxi
@Ikxi 2 года назад
You give me such LiveOverflow vibes haha I like it
@ShouldBeKnown
@ShouldBeKnown 2 года назад
where are the comments?
@dinoscheidt
@dinoscheidt 2 года назад
3:07 “there is an old talk, but still great” Talk is from Jan 9, 2020 👀 … one really has to awe that in tech we move so fast that a year old talk is considered old. Borderline outdated. Now the doctors office that happily works with best practices learned at college 15 years ago needs to defend against this world. 😅 ehm… yeah, my bet is on black
@PwnFunction
@PwnFunction 2 года назад
That video was re-uploaded in 2020, but the first video surfaced in 2017. You can also see "2017" in the top left corner ;)
@dinoscheidt
@dinoscheidt 2 года назад
@@PwnFunction Ok ok, fine its 4 instead of 2 years - still far off 15 years 😬….. 🐌
@jamisonmartino1136
@jamisonmartino1136 2 года назад
Your channel has helped me out greatly. Tysm!
@badreddinechamkhi3785
@badreddinechamkhi3785 2 года назад
hey man we are waiting for the binary exploitation series !
@franciscolucarini8761
@franciscolucarini8761 2 года назад
we must become 'Pro Jedi 1337 samurai ninja Warrior'
@barack454
@barack454 2 года назад
at 12:53 you are giving redis port 6379 but in terminal when you check at 13:18 port number is 1337 that it is connected to could you please explain this
@colorspace5541
@colorspace5541 2 года назад
port 1337 is what the "outside" ncat server listens to, and as he said in 12:58, this was just the proof of concept. He sent this instruction to the redis server on port 6479: "Execute the linux ID command (returns current shell user-id or short UID) and post the result to the ncat server running on port 1337"
@verolyn8459
@verolyn8459 2 года назад
Probably the Best Explanation So far, Thanks bud
@potatoonastick2239
@potatoonastick2239 2 года назад
Good vid bud, thanks for making it! And have a nice day
@Milten130
@Milten130 2 года назад
This video somehow shows as uploaded 6 months ago. Good explanation
@agoogleuser5420
@agoogleuser5420 2 года назад
I finally understand why Roblox doesn’t allow requests to their own domain through Roblox game servers.
@samuelnarciso9110
@samuelnarciso9110 2 года назад
Este compa es la pinga, me fascinan tus vídeos
@giaphatha88
@giaphatha88 2 года назад
This is top tier contents, keep it up!!!!
@josephseed3393
@josephseed3393 2 года назад
Isn't the JSONified class also insecure deserialization? Ruby executes whatever it sees in the function of that class, so that is insecure deserialization right? The complete vulnerability chain in this case would then be SSRF + CRLF + Insecure Deserialization
@laurinneff4304
@laurinneff4304 2 года назад
How did you get the docs in your Python REPL at 2:44?
@olo90
@olo90 2 года назад
Any chance you can cover the Twitch hack? Would be nice to get some more info there
@hakura88
@hakura88 2 года назад
I love your videos. keep your work up it's amazing.
@realcartoongirl
@realcartoongirl 2 года назад
my brain is to dumb to process this
@bwbs7410
@bwbs7410 Год назад
“I just learned ruby last night” LMAOO hard flex
@MrNicKO81
@MrNicKO81 2 года назад
cool! very inresting, i feel a little smarter already, thx ;)
@SlySportz
@SlySportz 2 года назад
Really enjoying your channel my friend. Keep it up
@b391i
@b391i 2 года назад
Awesome as usual like Fireship 😁
@michaelhackman3195
@michaelhackman3195 2 года назад
Keep it up! Love your videos
@daltonb
@daltonb 2 года назад
Excellent explanation earned my follow!
@abdullahessam6998
@abdullahessam6998 Год назад
Hello, I would like to know if there is a way to predict the semi-random numbers to get profits from betting applications and semi-crash??😢
@itsmerg5273
@itsmerg5273 2 года назад
you have such quality content but you should upload more
@jakob_123
@jakob_123 2 года назад
Agree
@tatianatub
@tatianatub 2 года назад
if i had found this channel when i was highschool i'd have ended up going to juve
@Whootzie
@Whootzie 2 года назад
I didn't ask people to buy my booze. I did beer runs
@SurajGaud
@SurajGaud 2 года назад
Quality content
@superhero1
@superhero1 2 года назад
Great video my friend! ❤️
@reizinhodojogo3956
@reizinhodojogo3956 2 года назад
a guy made a video of bed trapping someone but he forgot to censor about 1 or more frame(s), the guy is lucky i wont use his (idk what) for any bad
@nakulgopal60
@nakulgopal60 2 года назад
Your content is really good , also animation is great. It'll be great if you make a video on how you research all this thing , how to approach the research and what sources are best.
@tiscrispin
@tiscrispin 2 года назад
Oh my, this was an insightful one :D
@FedoraRose
@FedoraRose 2 года назад
Finally a new video :D
@zyansheep
@zyansheep 2 года назад
All the comments are gone :( At least the video is back!
@salluc1712
@salluc1712 2 года назад
Keep it up that's amazing thank you
@iraklisskepasianos5095
@iraklisskepasianos5095 2 года назад
Great video as always! Could you please send the link of the github repo with the SSRF examples?
@Asrashas
@Asrashas 2 года назад
Dumb question and not really related to the topic but: Is there a tool to make isometric graphs like at around 2:00? That looks pretty neat.
@triularity
@triularity 2 года назад
Along side the newline injection vulnerability, it seems Redis should abort the connection the moment it gets an invalid line. This likely would have also prevented this particular exploit.
@kanekino9507
@kanekino9507 2 года назад
Dude i dont usually share any video or Channel but you man u are fucking Gold keep up good luck
@go_fuck_yourself
@go_fuck_yourself 2 года назад
So this is basically... An HTTP injection attack?🙈
@Linuxdirk
@Linuxdirk 2 года назад
sigh ... Why the heck are SSRFs are still possible? It's 2022 for ducks sake!
@Jakemontana91
@Jakemontana91 2 года назад
Im new to this stuff and learning, but what is the difference between an SSRF and a CSRF? Thanks for the knowledge!
@lonelybookworm
@lonelybookworm 2 года назад
SS = Server Side CS = Cross Site
@jayshah5695
@jayshah5695 2 года назад
the netcat technique was great, would u make a video on all the use cases it enables ?
@Hextator
@Hextator 2 года назад
When I was still a teenager I found out that a website I used for an online game could be used to send e-mails to anyone AS anyone registered on the website. I never reported it because it never occurred to me how big of a deal that is at the time, and I forgot to write down how I did it, which goes against the whole "it's not science if you don't write it down" belief I've been operating on for the past 16 or so years ;/
@d-o-n-u-t
@d-o-n-u-t 2 года назад
Just want to know, what terminal shell/extensions are you using?
@june4171
@june4171 2 года назад
i died when u compared sitting out side of the liqour store to ssrf
@lmlagg
@lmlagg 2 года назад
Wait that outro... It sounds... Familiar...
@optimiserlenergie1094
@optimiserlenergie1094 2 года назад
Redis does not requires authentication ?
@FelixHdez
@FelixHdez 2 года назад
Old talk ?? It was like 16 months old when this vid was made
@Afitz200
@Afitz200 2 года назад
Back from the dead!
@winkcla
@winkcla 2 года назад
Nice video! But it's not "random HTTP requests" if it's the Git protocol 🤔
@paulstelian97
@paulstelian97 2 года назад
You have enough control over the URL to do whatever the fuck you want though.
@davidlee588
@davidlee588 7 месяцев назад
As a hello-world engineer, I cannot fully get what this video means, but I know this is good. What should I learn in order to understand this video?
@Verrisin
@Verrisin 2 года назад
ok, so... just route all "external-origin" url requests through adapters that only lead directly outside ... ? - essentially, through the "public-ip router" ...
@Verrisin
@Verrisin 2 года назад
yeah, in fact, no need to error-pronely sanitize my urls - just load them all through a proxy which runs outside of the internal network. ... I think that solves it perfectly.
@Sparkette
@Sparkette 2 года назад
Which of the Community Guidelines did this allegedly violate?
@dxxx.
@dxxx. 2 года назад
Shush....
@drishalballaney6590
@drishalballaney6590 2 года назад
Same question
@hipster2283
@hipster2283 2 года назад
He said there was a joke that violated guidelines that has been removed
@Sparkette
@Sparkette 2 года назад
@@hipster2283 What was the joke?
@hipster2283
@hipster2283 2 года назад
@@Sparkette not sure, the video got taken down before I watched it
@ashvinbhuttoo
@ashvinbhuttoo 2 года назад
Great content, subbed! 🐧
@hengyongming3676
@hengyongming3676 2 года назад
Finally waited so long for this video
@mohamed-0101-i8e
@mohamed-0101-i8e 2 года назад
Cn I ask you what's the tool that you used for the diagram In 1:52 ?
@parthipankalayini8
@parthipankalayini8 2 года назад
I got the person who is responsible for server down of Facebook 😂
@realslimchaggy
@realslimchaggy 2 года назад
yo bro ho does every body got free websites.. of course not every one have wifi and money so how can they create a server for free.. please answer my question and tell me how can I build a server (linux) for free
@wusluf
@wusluf 2 года назад
What tool do I need to make visualization like the one at 1:53?
@dummyna2335
@dummyna2335 2 года назад
Bro, you're a legend.
@hanabi6841
@hanabi6841 2 года назад
can you demo how we bypass ssl pinning windows application?
@lowborn7231
@lowborn7231 2 года назад
Where are the videos? Did you forgot you have a channel? I'm waiting new content :(
@apidas
@apidas 2 года назад
just found your channel. thought you're liveoverflow brother or something
@insanity2753
@insanity2753 2 года назад
Great video, thank you.
@RobertBlair
@RobertBlair 2 года назад
Timestamp 11:41 - comment disabling the security lint check for the loooze
@randomguy3784
@randomguy3784 2 года назад
Excellent video!
@binedstudios
@binedstudios 2 года назад
this is helpful
@wlockuz4467
@wlockuz4467 2 года назад
I kinda feel bad for LiveOverflow, He suggested your channel and now I am binge watching yours and haven't watched his in a while xD
@Hchris101
@Hchris101 2 года назад
I like penguins
@valeenoi2284
@valeenoi2284 2 года назад
Nobody is SAFE!
@dorb1337
@dorb1337 2 года назад
YOU ARE THE REAL MVP.
@millco-.-
@millco-.- 2 года назад
thank you for your great video. it's interesting because the server can't determine raw string and operators...
@a3animations
@a3animations 2 года назад
6 Gatorades :)
@FalcoGer
@FalcoGer 2 года назад
What do you mean? Random HTTP requests give you the most useful results! Fuzzing is a whole thing that people do.
Далее
HTTP Parameter Pollution Explained
11:08
Просмотров 252 тыс.
Dangerous Code Hidden in Plain Sight for 12 years
18:00
Doors Harpy Hare (Doors 2 Animation)
00:16
Просмотров 569 тыс.
one wrong npm package
19:27
Просмотров 182 тыс.
Why you should Close Your Files | bin 0x02
8:11
Просмотров 320 тыс.
How some functions can be Dangerous | bin 0x01
15:20
Просмотров 141 тыс.
What are Executables? | bin 0x00
8:35
Просмотров 186 тыс.
how hackers hack any websites in minutes?!
23:17
Просмотров 230 тыс.
Hacking into Google's Network for $133,337
31:32
Просмотров 1 млн
Cross-Site Scripting (XSS) Explained
11:27
Просмотров 443 тыс.
I Installed The Hardest System Known To Man...
45:06
Просмотров 992 тыс.
Doors Harpy Hare (Doors 2 Animation)
00:16
Просмотров 569 тыс.