ZipSlip w/ TAR & Server-Side Template Injection - HackTheBox University CTF - "Slippy"

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • Join HackTheBox and start rooting boxes! j-h.io/hackthebox
    Find some tips and tricks on their blog! j-h.io/htb-blog
    For more content, subscribe on Twitch! / johnhammond010
    If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    PayPal: paypal.me/john...
    E-mail: johnhammond010@gmail.com
    Discord: johnhammond.or...
    Twitter: / _johnhammond
    GitHub: github.com/Joh...
    If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/g... (disclaimer, affiliate link)

Комментарии • 58

  • @Gweedzy
    @Gweedzy 2 года назад +24

    heyy John, I've been watching hours of your content and I think this is the right moment to leave a comment.
    I really love your videos and especially the rythm and the way you say everything that goes through your mind
    I'm still kind of half a noob at programming but listening to you thinking and testing stuff is way more enjoyable and inspiring than boring tutorials
    Thank your for sharing your knowledge, I wish you the best from France
    -A random dude that learns and devs web and python apps in his bedroom at parents'

  • @coreyknutson-huddleston8852
    @coreyknutson-huddleston8852 2 года назад +13

    Love your vids man, teaching me to be a better programmer and problem solver...thanks for sharing your brain and time.

  • @karlkoch5417
    @karlkoch5417 2 года назад +10

    "Werkzeug" is german for "tool". Watching you is so interesting and helpful, love your videos. Greetings from germany.

    • @itssebis8183
      @itssebis8183 2 года назад

      Just wanted to send this information too... In germany we say: "dEr FrÜhE vOGeL fÄNgT dEN wuRM."

  • @highvisibilityraincoat
    @highvisibilityraincoat 2 года назад +2

    john i've been subscribed for years and was really big on your channel about early last year. I fell off because of school and other stuff but tonight i sat down and watched the whole thing through, which I normally never do to any youtube video. now my itch is back and I want to get back into CTFs. thanks for sticking around and for the constant flow of informative engaging content.

  • @m4rt_
    @m4rt_ 2 года назад +2

    I found your channel many months ago through these kinds of videos, and here I am, still watching these videos.

  • @maurox1614
    @maurox1614 2 года назад +1

    That's why I always run the webserver as a low privileged user and set all permission on files as read-only (for the web server user).
    Anyway as always thank you for sharing the knowledge!

  • @creaky2436
    @creaky2436 2 года назад

    I’m a front end dev but can’t stop watching your videos. Is this a sign?? Haha

  • @saite2560
    @saite2560 2 года назад +1

    Love the videos, they are always so much to absorb I love it. your probably aware of this one, but when you get a code output that's is all jumbled.
    rather then trying to splitting the code up. which works no doubt, just seems quicker or run it through an online code beautifier. some code editors might have a auto beautifier. they have them for most of the code language's.
    they doesn't alter the code just makes it human readable. puts in the tabs in the right spot for python. or other code types. also adds color for more complicated code which is a nice touch.

  • @user-ii2hp9tp1z
    @user-ii2hp9tp1z 2 года назад

    opening a totally new world with you man, excellent

  • @JonathanLeeDev
    @JonathanLeeDev 2 года назад +4

    Would be interested to see a CTF where you are to attack a Spring Boot Java application. Love the videos BTW!

  • @XiSparks
    @XiSparks 2 года назад

    I'm 100% using "That floated my fancy" in my day to day conversation from now on.

  • @_CryptoCat
    @_CryptoCat 2 года назад +1

    no chapters in a 40 min video 😱 this was a great challenge! nice to see the extra exploration of SSTI, i just replaced one of the python files with a modified version containing some friendly (totally non malicious) code 😈

  • @sevadazohrabian4021
    @sevadazohrabian4021 2 года назад

    As always, amazing video. Thank you John.

  • @kevinalexander4959
    @kevinalexander4959 2 года назад +3

    Since it was running as root, could have just injected a python script to give you reverse TCP and it should be a reverse shell running as root, correct?

  • @avishekkumar8477
    @avishekkumar8477 2 года назад

    I am your great fan john,
    I have learnt many stuffs from your vids

  • @ZeldoKavira
    @ZeldoKavira 2 года назад

    Sublime allows you to open an entire folder at a time so that its easier for the viewers to follow along on where you are in the file tree

  • @claymoody
    @claymoody 2 года назад

    well done as always! Thanks.

  • @greob
    @greob 2 года назад

    Great video, thanks for sharing!

  • @marshalstewart7776
    @marshalstewart7776 2 года назад

    So cool

  • @Vilvee
    @Vilvee 2 года назад +2

    I love pretending like I know what's going on.
    *internal screaming*

  • @PythonisLove
    @PythonisLove 2 года назад +1

    impressed and subscribed

  • @Gigawipf
    @Gigawipf 2 года назад

    That tickled my boat

  • @vrushabhpatil2867
    @vrushabhpatil2867 2 года назад

    How did u find that file i want that filewhere i can that file or information plzz reply

  • @guardit_
    @guardit_ 2 года назад +1

    can you tell us about Cyber Santa is Coming to Town (hackthebox ) challenge

  • @1stAshaMan
    @1stAshaMan 2 года назад +2

    Is StackOverflow really for anything Other Than new bastardized code?

    • @Nunya58294
      @Nunya58294 2 года назад +1

      Lmfao I'm sorry to laugh.... I seen "bastardized" and almost spit my drink out

  • @sergten
    @sergten 2 года назад

    If that's Difficulty 1 I'm curious to what's involved in the 4-star problems.

  • @yanex4631
    @yanex4631 2 года назад

    welcom back cyber sct

  • @-willplaysgames
    @-willplaysgames 2 года назад

    As a hypothetical, if you were to engage this type of web app in a black box situation, how would you go about identifying the Zip Slip vuln on this machine? I'm having trouble wrapping my head around how to look at CTF boxes from a scope of work type of perspective. Do most of these types of vulns only get discovered in situations where you're allowed to audit (via source code or some other grey/white box situation) that this app is mishandling TAR and such? sorry if that's a complex question. Love your videos. Thanks for all you do for this community.

    • @luketurner314
      @luketurner314 2 года назад +2

      About 1:50 he views the source of the webpage (all web browsers can do this, how would they display a webpage otherwise?) and at the bottom (in this case) is "/static/js/main.js". One could copy-paste that relative path into the browser's address bar to view the file. The contents of this file would be the same as 11:50, where he finds the TAR mishandling code and the "/api/unslippy" POST url. As for the ssti, he finds the server type in the request headers in the browser dev tools (3:18).
      All this recon solely through the browser, no special tools needed. The only additional info possibly needed would be experience

  • @anonymousshadow8308
    @anonymousshadow8308 2 года назад +2

    why are all these unlisted?

  • @walidlam2411
    @walidlam2411 2 года назад

    Hey man .. can u please share the downloadable files (Dockerfile , app source code etc) from the challenge ?

  • @davidmiller9485
    @davidmiller9485 2 года назад

    Class Pickle??!!??!! That better damn well be a DILL class!!!
    Look near his image at 34:00

  • @roypolinder8158
    @roypolinder8158 2 года назад +1

    when day 2?

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Malloc?

  • @MsTarguisti
    @MsTarguisti 2 года назад

    I loved how you were analysing the source codes, is there any tutorials for that?

    • @Djamieson713
      @Djamieson713 2 года назад +2

      start writing code

    • @jaredteaches894
      @jaredteaches894 2 года назад +2

      Learn how to code? You can't really reverse engineer, if you can't even forward engineer

    • @MsTarguisti
      @MsTarguisti 2 года назад

      Right Indeed, thank you guys!

  • @DePhoegonIsle
    @DePhoegonIsle 2 года назад +1

    Ya know.... The thing that actually bothers me deeply is .
    'Why the hell .. Why the bloody hell is directory climbing ALLOWED?'
    Preventing the ' .. ' would seriously nix the 'slippy' faults, and alot of the injection exploits?
    -- I'd also be very warry of how I allowed updates & debugging, let alone enabling some Read Only access to the web server to key script files.

    • @SumanRoy.official
      @SumanRoy.official 2 года назад

      it helps in exploiting LFI

    • @DePhoegonIsle
      @DePhoegonIsle 2 года назад

      @@SumanRoy.official isn't that malware design?
      My point is, why is it even allowed when there should be no valid use of it in public sector use.

  • @gacekkosmatek
    @gacekkosmatek 2 года назад

    didn’t even get a reverse shell into the container, very disappointed

  • @superchiaki
    @superchiaki 2 года назад

    dont get the exploit. its just normal posix behaviour? lol

  • @ahmadfaisal6356
    @ahmadfaisal6356 2 года назад +1

    Where i can learn cybersec from scratch for free (sorry for my english)

    • @_JohnHammond
      @_JohnHammond  2 года назад +6

      On this channel ;)

    • @Pkay120
      @Pkay120 2 года назад

      I think it depends on how familiar you are with Linux/Windows/Networking/Programming. I’d build a base with those then try to venture out.

  • @m4rt_
    @m4rt_ 2 года назад +1

    Is it only me or is there something weird with the sound?

  • @MsTarguisti
    @MsTarguisti 2 года назад

    How this is supposed to be beginner level

  • @sandra8139
    @sandra8139 Год назад

    I posted the phone number Melissa Vicky Stevenson and Jimbo identity thefts scammers ask to call me

  • @appdevelopersandrelatedcha6498
    @appdevelopersandrelatedcha6498 2 года назад +1

    2nd comment

  • @lifebarier
    @lifebarier 2 года назад

    God damn. Those soy face thumbnails are really an eye sore in my suggestions...

  • @colin-campbell
    @colin-campbell 2 года назад +1

    Finally gotta unsubscribe because of the thumbnails.

  • @inhnguyento8903
    @inhnguyento8903 2 года назад +1

    Anybody know why changing info.mtime make it work ?