hexdump
hexdump
  • Видео 116
  • Просмотров 319 981
DOM Clobbering + XSS Chaining - BackdoorCTF 2024
Hi there, and welcome to this new video!
Today we will analyze a web challenge named "Cascade Chaos" taken from the Backdoor CTF 2024. To solve the challenge we will need to chain two different XSS. The first one is triggered by using DOM Clobbering to bypass the check on window.isSafe.
As always, I hope you find the video helpful, and I would appreciate if you leave your feedback down in the comments, and share this video with like-minded people.
Thank you very much!
-------------------------
TIMESTAMP
00:00 Introduction
01:30 Initial Analysis
10:10 Brainstorming a solution
13:40 DOM Clobbering
18:40 First XSS in Remote Service
20:00 Second XSS in Local Service
23:13 Chaining the two XSS
25:20 Final ...
Просмотров: 92

Видео

Setup a Simple Active Directory Lab!
Просмотров 8199 часов назад
Hi there, and welcome to this new series! This serie will be about "Active Directory Exploitation". That is, it will focus on Active Directory from a point of view of security, and it will showcase the most important attacks that can be performed on an Active Directory Domain. In the course we will also showcase useful enumeration techniques. As always, I hope that this series, like my other se...
Piracy Shield: Italy's Failed Attempt at Stopping Streaming Piracy
Просмотров 41414 часов назад
Hi, there! Today we discuss about Piracy Shield, italy's failed attempt at stopping streaming piracy. Specifically, Piracy Shield is a web platform that was developed as a result of a new law that was approved in july 2023 by the italian parliament. The law states that copyrights holder have the right to ban IP address and domain names that host pirated streaming content. In the video we analyz...
Simple and Effective Virtualization in Linux (QEMU + Quickemu)
Просмотров 1,2 тыс.21 час назад
Hi and welcome to this new video! In this video I show how to use quickemu in combination with QEMU, virt-manager and spicy to quickly setup and manage virtual machines running different operating systems. To explain the process I show how to setup a simple Windows 10 machine. The basic idea is that I use quickemu to download the official ISO of the OS, and to do the initial installation with s...
A Lisp in a CTF! - 0xL4ugh CTF 2024
Просмотров 239День назад
Hi there, and welcome to this new video! Today we will analyze a challenge taken from the 0xL4ugh CTF 2024. The challenge consists in analyzing the code of a Clojure application in order to find an authentication bypass and an improper input validation. The vulnerabilities were pretty simple, however the application was written in Clojure, a member of the loved Lisp family of languages. This ma...
Extend Burpsuite with your own Extensions!
Просмотров 35814 дней назад
Hi and welcome to this new video! Burpsuite is a powerful tool that allows penetration testers and researchers to analyze the securiy of web applications. One of the most useful aspect of Burpsuite is that it can be extended by using Java or Python code through the Montoya APIs. In this video I showcase a simple development pipeline that can be used to build your own custom extensions for Burps...
PHP-CGI RCE via BestFit! - CVE-2024-4577
Просмотров 59814 дней назад
Hi there, In this video we take a look at CVE-2024-4577, a vulnerability discovered by the joint research of Orange Tsai and splitline. The vulnerability affects windows OS, and particulary instaces of Apache that support PHP-CGI. It allows attackers to obtain RCE by introducing arbitrary arguments to the executable being called. The vulnerability makes use of "BestFit", a character conversion ...
Exploiting a Blind NoSQL Injection - NiteCTF 2024
Просмотров 35821 день назад
Hi there, and welcome to this new video! Today we will analyze a challenge taken from the NiteCTF 2024. The challenge consists in analzing the code of a NextJS application in order to find a Blind NoSQL Injection. The injection can be used to obtain the flag and solve the challenge. During the video I discuss how to define simple objectives for performing a secure code review (SCR) on a codebas...
A Sensible Approach to Sponsorships
Просмотров 17621 день назад
Hi there, and welcome to this new video! In this video I give my thoughts on sponsorship and on the criteria that I will use in the future of my channel to accept or deny sponsorship. It is not really a technical video, more so a video to understand how I want to work in this space. I will try my best to make the mentions have meaning with respect to the technical content of the video! At the e...
Windows Privilege Escalation - Full Course
Просмотров 2,7 тыс.28 дней назад
Upload of the full Windows Privilege Escalation Course. All the material developed for the course is available in the github repository of the channel - github.com/LeonardoE95/yt-en. References are also present in the OSCP repository - github.com/LeonardoE95/OSCP Share this video to support my efforts and help me grow. Thanks. TIMESTAMP 00:00:00 Windows Privilege Escalation Course 01 Introducti...
A Cheatsheet and A Methodology
Просмотров 644Месяц назад
A Cheatsheet and A Methodology
Apache Tomcat Race Condition To RCE - CVE-2024-50379
Просмотров 1,4 тыс.Месяц назад
Apache Tomcat Race Condition To RCE - CVE-2024-50379
AMSI Bypass
Просмотров 728Месяц назад
AMSI Bypass
Useful Tools
Просмотров 460Месяц назад
Useful Tools
Critical Registry Paths
Просмотров 444Месяц назад
Critical Registry Paths
Scheduled Tasks
Просмотров 347Месяц назад
Scheduled Tasks
Stored Credentials and the Windows Vault
Просмотров 311Месяц назад
Stored Credentials and the Windows Vault
Windows Hashes
Просмотров 403Месяц назад
Windows Hashes
Files with Sensitive Data
Просмотров 465Месяц назад
Files with Sensitive Data
How Computers Capture Meaning
Просмотров 2822 месяца назад
How Computers Capture Meaning
Always Install Elevated
Просмотров 4232 месяца назад
Always Install Elevated
Are You Anxious About OSCP?
Просмотров 6522 месяца назад
Are You Anxious About OSCP?
UAC Bypass
Просмотров 7592 месяца назад
UAC Bypass
DLL Hijacking
Просмотров 1,2 тыс.2 месяца назад
DLL Hijacking
Emulate Android Devices in Linux!
Просмотров 6362 месяца назад
Emulate Android Devices in Linux!
Unquoted Service Path
Просмотров 5712 месяца назад
Unquoted Service Path
Reverse Engineering with Flare-On!
Просмотров 4602 месяца назад
Reverse Engineering with Flare-On!
Weak Service Permissions
Просмотров 6882 месяца назад
Weak Service Permissions
Okta Auth Bypass: A Quick Explanation!
Просмотров 5372 месяца назад
Okta Auth Bypass: A Quick Explanation!
Crypto 101 - Classical Cryptography
Просмотров 4753 месяца назад
Crypto 101 - Classical Cryptography

Комментарии

  • @h4cker_io
    @h4cker_io 6 часов назад

    I'm first

  • @onjajaboy
    @onjajaboy День назад

    First I want to appreciate the dedication and this long hours of work you put it for free , as well as thorough explanation throughout this videos , please make udemy for for advance stuff thank you !!!!🙏

  • @jullyanolino
    @jullyanolino 2 дня назад

    You serve the community brilliantly. Kudos to you. Thank you.

  • @miguelofre
    @miguelofre 2 дня назад

    Your content is gold!!!! im your student now

  • @josephmohamad-hx5ul
    @josephmohamad-hx5ul 3 дня назад

    do u want complete this series ? if yes how many episode do u want make

    • @hexdump1337
      @hexdump1337 3 дня назад

      Of course I will complete it. With respect to the number of episodes I don’t know it yet, making it as I go

    • @josephmohamad-hx5ul
      @josephmohamad-hx5ul 2 дня назад

      @@hexdump1337 thank u bro this content will help a lot of people

  • @HarikaRessam
    @HarikaRessam 3 дня назад

    echo -n "bro u the best"

  • @saivenkatmaheshwaram9868
    @saivenkatmaheshwaram9868 3 дня назад

    Waiting for Active Directory series

  • @shuvobiswas4046
    @shuvobiswas4046 3 дня назад

    I was waiting for this.

  • @ronitgandhi7716
    @ronitgandhi7716 3 дня назад

    Just completed your web exploitation and windows and linux privelliage escalation. Wow man thanks for providing this quality of resources. I would love to learn about networking like core networking from you ex: packets, tcp/udp. Maybe wireshark. The core basic stuff but in advance, if you can make a playlist on that. But anyways will always love and support the content you are making right now.

    • @hexdump1337
      @hexdump1337 3 дня назад

      Thanks for the suggestions! Yeah Ideally I would want to cover those too. Problem is just time and energy, since I have like few hrs per day to prepare, record and edit. But no worries, with enough time I will cover everything, core concepts in depth too!

  • @NAVEENKUMAR-ht9rd
    @NAVEENKUMAR-ht9rd 3 дня назад

    wonderful..content...Thanks bro. fr the helping..community with ur knowledge...

  • @kc-onehundred
    @kc-onehundred 3 дня назад

    It would be cool if you started doing projects we can put on resumes ❤

    • @hexdump1337
      @hexdump1337 3 дня назад

      Thats an interesting suggestions!

  • @senatecufpb
    @senatecufpb 3 дня назад

    Congratulations, great work. Are you going to continue the course? Can I ask a question, why not put your courses on Udemy? If so, in the future, don't forget to put the subtitles in Portuguese, lol Hugs! :)

    • @hexdump1337
      @hexdump1337 3 дня назад

      For sure, already recorded second episode, they will come in time! Why not in udemy? Right now I want to help people learn the basics for free. It is also a way for me to practice teaching. Will keep in mind the Portuguese subtites, thanks.

    • @senatecufpb
      @senatecufpb 3 дня назад

      @@hexdump1337 I hope to learn a lot,🔥🔥🔥🔥🔥

    • @senatecufpb
      @senatecufpb 3 дня назад

      @@hexdump1337 I really hope to learn a lot from you, thank you!

  • @h4cker_io
    @h4cker_io 4 дня назад

    ❤🎉❤🎉❤🎉❤🎉❤🎉❤

  • @paulleroux386
    @paulleroux386 4 дня назад

    perfect! thank you

  • @tteccs
    @tteccs 4 дня назад

    what do you use to take notes ?

  • @ZeroSaber_7
    @ZeroSaber_7 4 дня назад

    My favourite part

  • @ДмитрийКузнецов-я4д

    Its very important to share this knowledge to the world

  • @omodo-a
    @omodo-a 5 дней назад

    informative video, great work 👍

  • @borish5417
    @borish5417 5 дней назад

    Is apache tomcat 9.0.86 also vulnerable to this ?

    • @hexdump1337
      @hexdump1337 5 дней назад

      According to the advisory versions between 9.0.0.M1 AND 9.0.97 are vulnerable, which means that, yes, 9.0.86 should be vulnerable. Of course remember the two other conditions: must run on windows, and must allow users to upload file through PUT

  • @LearnWithError
    @LearnWithError 6 дней назад

    Great knowledge video ❤

  • @miguelofre
    @miguelofre 6 дней назад

    OMG!!!!!! you are the man !!!!! thanks a lot for your techings!!

  • @MajorKassad
    @MajorKassad 6 дней назад

    So am I right in saying that there is no more pivoting and tunnelling? And also does that mean that the AD set machine will only have root flags and not user flags?

    • @hexdump1337
      @hexdump1337 6 дней назад

      No, the structure of the AD itself will not be changed. What changed is that instead of accessing the first machine of the AD through an external exploit, now you immediately have access to it and you need to perform privilege escalation. With respect to the user/root flags, the AD was always setup to only have root flags. So yeah, you still have to do pivoting and tunneling. It's just that now you don't have to get a foothold within the AD, you already have access to the first machine. Hope it was clear!

  • @mela_nova
    @mela_nova 6 дней назад

    how intregetd host nvidia to vm with kvm/qemu ?

    • @hexdump1337
      @hexdump1337 4 дня назад

      Sorry but I rarely use VM with GPU, also nvidia support in linux is always kinda meh sadly

    • @mela_nova
      @mela_nova 4 дня назад

      @@hexdump1337 that true!, we in same pages then

  • @kiran_bharadwaj
    @kiran_bharadwaj 6 дней назад

    Hello Hexdump I would appreciate it if you could create in-depth courses or videos on threat hunting and malware analysis. Thank you!

    • @hexdump1337
      @hexdump1337 6 дней назад

      Thanks for the suggestion, right now I'm focusing more on active exploitation, but threat hunting is also a very interesting field, as it is malware analysis. One of the two I would probably give priority to the second, as that is extremely linked with Reverse Engineering.

  • @FurqanHun
    @FurqanHun 7 дней назад

    19:06 I just use virt-manager directly. First, I click "Create a new virtual machine." I usually have the iso downloaded, so I go with "Local install." When it asks for the iso, I click "Browse," and it shows up there (I set up a pool for the dir where I keep my isos). Then, I assign some ram. For the disk, when it asks for the size, I pick "Select or create custom storage," then hit "Manage," and since I already have a disk pool on a mounted HDD, I just add a new volume there. After that, it shows the selected configurations, and once I press "Finish," the VM is created and starts automatically. If i don't have the iso i could go with "Network Install", however i prefer downloading the iso separately first...

  • @PhamThanh-s2q
    @PhamThanh-s2q 7 дней назад

    Thank you, sir

  • @kundann_n9989
    @kundann_n9989 8 дней назад

    how do use this in my windows laptop

    • @hexdump1337
      @hexdump1337 8 дней назад

      I believe you can use QEMU on windows, although I never tried personally.

    • @welly7973
      @welly7973 7 дней назад

      Try Linux man

  • @jigyasakang2469
    @jigyasakang2469 8 дней назад

    This video is worth the reach you deserve million view bro ! I got all the concepts Thanks

    • @hexdump1337
      @hexdump1337 8 дней назад

      That’s so precious, thanks!

  • @ronitgandhi7716
    @ronitgandhi7716 8 дней назад

    Oh man what a gem of a content you have here. You deserve alot like a lot subscriber. I have watched and learned alot from your linux previliage escalation and web exploitation series. I would love to learn more cybersecurity stuff from you.

    • @hexdump1337
      @hexdump1337 8 дней назад

      Thanks so much, I will keep teaching much, much more!

  • @SuperRealhigh
    @SuperRealhigh 8 дней назад

    Hey! Awesome video man , Can you please share the Emacs config you using?

    • @hexdump1337
      @hexdump1337 8 дней назад

      @@SuperRealhigh Planning to do a video on it with the config file as video material 💪🏻👍🏻

    • @SuperRealhigh
      @SuperRealhigh 8 дней назад

      @@hexdump1337 Sounds great, Looking forward!

  • @drmikeyg
    @drmikeyg 8 дней назад

    What's the note taking app you use?

    • @hexdump1337
      @hexdump1337 8 дней назад

      @@drmikeyg It’s called Emacs! I made a video on it, in the future I will showcase it more thoroughly

  • @Neferhetep
    @Neferhetep 8 дней назад

    you are awesome

  • @reiayanami1441
    @reiayanami1441 9 дней назад

    How do you manage the gpu power to the virtual machine? Every time i use qemu it feels really slow, much slower than virtualbox

    • @hexdump1337
      @hexdump1337 8 дней назад

      @@reiayanami1441 Hmm, for my use cases I don’t require much GPU, as I mostly use the windows VM to research vulns on software, some debugging and some powershell Maybe its a config thing? QEMU is powerfully but less friendly to configure properly If you enable KVM and GPU pass-through performance should be good, try to checkout this guide github.com/bryansteiner/gpu-passthrough-tutorial

  • @NAVEENKUMAR-ht9rd
    @NAVEENKUMAR-ht9rd 10 дней назад

    thanks bro..best content, waiting fr active directory series..

  • @allangauna8960
    @allangauna8960 12 дней назад

    Hey progra-mario!

  • @MDAASIF-i6f
    @MDAASIF-i6f 12 дней назад

    Nice video sir, I have one question regarding oscp, can I use google or chatgpt in oscp exam

    • @hexdump1337
      @hexdump1337 12 дней назад

      Thanks, so according to this official reference directly from OffSec, chatGPT is not allowed. As always, refer to official sources: help.offsec.com/hc/en-us/articles/360040165632-OSCP-Exam-Guide-Newly-Updated

  • @mgheinkyawkyawmyint1866
    @mgheinkyawkyawmyint1866 12 дней назад

    Thanks for sharing sir.

  • @0xTS05
    @0xTS05 13 дней назад

    Bro just don't fucking stop ....❤

    • @hexdump1337
      @hexdump1337 13 дней назад

      I shall not, especially with the knowledge that what I do can be useful to other people

  • @adityasharma5294
    @adityasharma5294 13 дней назад

    Great :)

  • @spencerriley5747
    @spencerriley5747 14 дней назад

    Bonjourno Leonardo, I really appriciate your videos, I am currently watching OSCP Guide, I went on to github to download the cheatsheat, but my windows security flagged it and would not let me download it, any thoughts ? I wish to have this cheatsheat for reference while I learn how to use the tools properly. Also, I am worried if I download Kali, on my laptop that it might corrupt it and then I would have to reinstall windows. Am I better off purchaing an external ssd and intall/run Kali from the ssd ?

    • @hexdump1337
      @hexdump1337 14 дней назад

      It gets flagged by security solutions because the files contains various commands which can be used with malicious intent, but by itself is not an executable and it does not really represent a security threat. I would configure the tool you're using to whitelist it. It's just a simple text file with a bunch of commands. With respect to the kali setup, you can use a virtual machine if you're worried about that. Either a virtual machine or windows, or a dual-boot (but if you do it wrong it can end up corrupting windows), or yes, also an external SSDs. Personally I went with VM first, then moved on to dual-boot, and now pretty much I only use linux (not kali tho). If I need to use kali I have a dedicated VM.

  • @angelonunziolombardi
    @angelonunziolombardi 14 дней назад

    Great video, we really needed a technical video like this! Will you ever bring it to the Italian channel? Also, will you create more content like this? I'm curious about how to develop a custom module for Metasploit, for example, or NSE scripts for Nmap. A series on both would be truly educational! Maybe on the Italian channel as well, since there’s a lack of this kind of information in Italian.

    • @hexdump1337
      @hexdump1337 14 дней назад

      Yeah probably gonna cover it in italian as well! Also, thanks for the other suggestions, will definitely create more content on burpsuite and other tools such as nmap and metasploit

    • @angelonunziolombardi
      @angelonunziolombardi 14 дней назад

      @@hexdump1337 Great, great news, I will definitely follow this content.

  • @V3ryB4s1cH4ck1ng
    @V3ryB4s1cH4ck1ng 14 дней назад

    Awesome video! Would love to see another where you showcase the ExtensionProvidedHttpResponseEditor interface, how to add tabs to the response section inside the repeater, and working with external libraries.

    • @hexdump1337
      @hexdump1337 14 дней назад

      Awesome suggestions, will remember them for future burp related videos

  • @ДмитрийКузнецов-я4д

    you are GOAT in cybersecurity teaching, thanks much

    • @hexdump1337
      @hexdump1337 14 дней назад

      Thanks, hope it’s useful!