Тёмный

Path Traversal Lab Walkthrough using Burp Suite CE - PortSwigger Web Security Academy Series 

Daniel Lowrie
Подписаться 12 тыс.
Просмотров 3,9 тыс.
50% 1

Опубликовано:

 

23 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 23   
@Nicrophelia
@Nicrophelia Год назад
Yeah Daniel!! Always great to see someone using Parrot! I'm pumped to check this video out after work, thank you for the timely and fun content!
@daniellowrie
@daniellowrie Год назад
Thanks for watching! Much love for ParrotOS 🦜
@SalmanKhan.78692
@SalmanKhan.78692 11 месяцев назад
Awesome video thank you sir for providing quality content and Love from India 🇮🇳
@daniellowrie
@daniellowrie 11 месяцев назад
Thanks again for your support, Salman! My Indian viewers are always so very gracious 😊
@chiperspark
@chiperspark Год назад
Hello Sir, I am big fan you and i had watched you on LinkedIn, It Pro Tv. And your way of teaching is amazing. I am requesting you to just be continued in this series.
@daniellowrie
@daniellowrie Год назад
Thanks for your comments! I'm so glad to hear that you enjoy my content! I'm also happy to inform you that I will be making a walkthrough video for every lab in the Portswigger Web Academy lab in the Apprentice track, so hit that notification bell so that you get an alert when the next video is available. 👍
@HAZIQZA
@HAZIQZA Месяц назад
owsome!!!
@daniellowrie
@daniellowrie Месяц назад
I'm so glad that you enjoyed it! Thanks for watching
@terraflops
@terraflops Год назад
i finished the Try Hack Me Burp Suite module and so my timing is spot on for the series. Great video!
@daniellowrie
@daniellowrie Год назад
I believe we call that 'serendipity' 😁 Thanks for watching!
@Mr.Reporter
@Mr.Reporter 6 месяцев назад
Okay love the explanation but what i can do with that information like in real time if I am doing a pentest how would I move forward with investigating what i can find further
@daniellowrie
@daniellowrie 6 месяцев назад
I LOVE this question!!! The quick answer is this...if I can find and abuse a path traversal vulnerability, then I probably also have found a Local File Inclusion(LFI) vulnerability, which is what we did in this video, and we can then abuse those vulnerabilities to read system files. Let me elaborate on the consequences of that. In the lab, we were able to switch the file requested by the web app from a .jpg file to the /etc/passwd file. We then used the path-traversal and LFI vulnerabilities to READ SYSTEM FILES (not yelling, just emphasizing). If I can read files on the host operating system, then, as an attacker, I'm really interested in all the files I could possibly read. Like, can I read the code in the files of the web app itself? Maybe there are some juicy creds or api keys that are hard-coded in one of those files. I've literally discovered creds to backend databases in config files and .php files. I've also found ssh keys using this technique. You'd be surprised what admins leave laying around when they assume that no one other than admins can access their server's filesystem. Also, you could possibly chain attacks together to get shell like with an LFI2RCE attack. (read more about that here... book.hacktricks.xyz/pentesting-web/file-inclusion/lfi2rce-via-phpinfo ) Whew! Well I hope that helps clear things up a bit for you. Cheers!
@Naath000
@Naath000 Год назад
❤❤
@daniellowrie
@daniellowrie Год назад
Thanks, @psychocybernetics911! Glad you enjoyed the video!
@SalmanKhan.78692
@SalmanKhan.78692 11 месяцев назад
Thank you sir ❤ Love from India 🇮🇳
@daniellowrie
@daniellowrie 11 месяцев назад
You're very welcome, Salman! I'm glad you enjoyed the video. Thanks for watching!
@cydni326
@cydni326 4 месяца назад
subscribed.
@daniellowrie
@daniellowrie 4 месяца назад
Thanks for the sub! 😀💯
@JosephKozak
@JosephKozak Год назад
Daniel This was AWESOME!!!!!
@daniellowrie
@daniellowrie Год назад
Thanks, Joe! I'm glad you enjoyed it 😀👍
@henchnerd9404
@henchnerd9404 3 месяца назад
so is nologin the passwords?
@daniellowrie
@daniellowrie 3 месяца назад
Great question! The short answer is 'no'. The man page for nologin explains it like this... "nologin displays a message that an account is not available and exits non-zero. It is intended as a replacement shell field to deny login access to an account." "If the file /etc/nologin.txt exists, nologin displays its contents to the user instead of the default message." I hope that helps clear things up for you. Cheers!
@henchnerd9404
@henchnerd9404 3 месяца назад
@@daniellowrie aah that makes sense thanks
Далее
How to (actually) learn Linux
11:57
Просмотров 16 тыс.
Directory Traversal | Complete Guide
22:33
Просмотров 21 тыс.
Path Traversal in Action! - Billu Walkthrough Ep1
12:03
Burp Suite Certified Practitioner Exam Review
27:59
Просмотров 2,2 тыс.
I'll Let Myself In: Tactics of Physical Pen Testers
44:56