Hacking a Website with Remote Code Execution!

Поделиться
HTML-код
  • Опубликовано: 17 ноя 2024

Комментарии • 72

  • @prasanthganesan8829
    @prasanthganesan8829 4 года назад +2

    For this hack to work, I think the subprocess library must be already imported in the server's python code. So it is not possible to execute random remote scripts unless the library used in the script was already present in the server.
    So in the reduce method, the first line should be import `the_lib_you_need_for_the_script` followed by the script you would like to run. Only this will work if you like to run every script in the server.
    correct me if I'm wrong :)

  • @CyberAcademyHindi
    @CyberAcademyHindi 4 года назад +18

    Bhai meinai ye bug bahut pele find kiya tha, par bahut try karne ke baad bhi exploit nahi kar pata,
    It's bug name is "Serialised Data In HTTP Message"
    Whenever i tried to inject any malicious code, i get 500 server error.

    • @CyberAcademyHindi
      @CyberAcademyHindi 4 года назад +3

      This is prove of that, after trying for 1-2 weeks, I asked a question in this forum also
      hackersploit.org/t/need-help-how-to-exploit-serialized-object-in-http-message-vulnerability/2722

    • @TechRaj156
      @TechRaj156  4 года назад +7

      @@CyberAcademyHindi I read the forum. You did exploit it but was unable to capture the secret key, because you were using os.system()
      You need to use subprocess.check_output() so that the output is actually returned.
      os.system() executes the command but doesn't return the output. That's why you were getting Server Error.
      So close, well done!

    • @TechRaj156
      @TechRaj156  4 года назад +4

      I forgot to mention in my previous comment. You can even solve it by os.system() by getting a reverse shell. Harshit Luthra has written a write-up about it here, check out : hackmd.io/JKI5fglISfG9cEvDR6F6sg

    • @CyberAcademyHindi
      @CyberAcademyHindi 4 года назад

      @@TechRaj156 Thanks 😊, Please make more CTFs, I am really interested in to participate

    • @rootuser2245
      @rootuser2245 3 года назад

      Which os do u use bruh..??

  • @tarun4705
    @tarun4705 4 года назад +1

    We want more challenges like this. Waiting for next challenge.

  • @nylasland8743
    @nylasland8743 3 года назад +1

    RCE via insecure deserialization....NICE!

  • @VamsiKrishna-ms4um
    @VamsiKrishna-ms4um 4 года назад +11

    Bro how to start hacking i mean what course to do first

    • @jayarajnr965
      @jayarajnr965 4 года назад +1

      Start doing CTFs like this goto CTF Times and find low weighted ctfs.

    • @DetectiveTaylor
      @DetectiveTaylor 3 года назад

      @@jayarajnr965 yeah sure.... Actually have veen doing CTF challenges for more than 3yrs and have advanced more on field of hacking 👽👽

  • @AshokKumar-ix4nf
    @AshokKumar-ix4nf 4 года назад +22

    Where and what r u studying bro...😍😘

  • @zaksly8143
    @zaksly8143 4 года назад +1

    tech raj your videos are very clear and just amazing if I coul I would not just subscribe to your channel once but I would subscribe a million times. You always have great content please make more videos.

  • @drramdasudmale
    @drramdasudmale 4 года назад

    Are you doing software engineering or computer engineering what are you learning in VIT

  • @megalaselvam1840
    @megalaselvam1840 4 года назад +3

    U have copied from hackthebox

  • @mclovin816
    @mclovin816 4 года назад +11

    I just watched a 6min video of a guy saying pickle in a Indian accent 😂

  • @RoyalG254
    @RoyalG254 4 года назад +3

    This situation can only happen if the secret key is not protected i.e if it was left exposed during deployment of a website
    that was a good challenge though 😁

  • @aabirraghib8826
    @aabirraghib8826 Год назад

    how do i keep session ON for 24/7 (onworks)..can u help me

  • @boxerpaalan6150
    @boxerpaalan6150 4 года назад +2

    Hi bro.. if you don't mind.. can I get your source code?

  • @arjjun.g750
    @arjjun.g750 4 года назад

    How to get the page were you write the malicious code

  • @piyushpiyush5349
    @piyushpiyush5349 4 года назад

    cookie ka konsa extension tha ye

  • @jayarajnr965
    @jayarajnr965 4 года назад

    So basically you are starting a ctf ?

  • @muhammadrafidaug30
    @muhammadrafidaug30 2 года назад

    How can i do participate on your challenges?

  • @shasank6854
    @shasank6854 4 года назад +5

    Python tutorial full in 1 week pls sir..🙏🙏

  • @RakibulHasan-pz7ro
    @RakibulHasan-pz7ro 4 года назад

    I am looking for a solution :
    I have a team of 6 members. I am the head of the team. I basically works on freelancing projects in some freelancing website. So that's why sometimes I have to give them (team member) access of website for work purpose. But I don't want to share my website username & password with them for security purpose. I want to give them access of this website without sharing my username & password. For the solution of this problem I have done quite research on internet. I saw people's are suggesting password manager. Then I bought a password manager (Lastpass premium) account for 1 year. But it doesn't work well. There is a loophole. After filling website log in form(username & password) by the password manager saved username & password, they can still see my website password by using inspect element in any browser.
    I have researched a lot on this topic in internet but didn't get any suitable solution.
    I think you can give me a solution of this problem.
    Bro please help me.

    • @TechRaj156
      @TechRaj156  4 года назад

      Try chrome extensions like ShareAccount.

    • @RakibulHasan-pz7ro
      @RakibulHasan-pz7ro 4 года назад

      @@TechRaj156 Thanks bro for your suggestion.
      Is it safe to use share Account extension?

    • @mrrobot2878
      @mrrobot2878 4 года назад

      @@RakibulHasan-pz7ro ya it is safe

    • @evbike
      @evbike 4 года назад

      Omar Farukh, Shall I work with you on freelance projects?

  • @thiruppathi.9876
    @thiruppathi.9876 4 года назад

    sir python in hash sha256 convert string sha 256. give me string value sir

    • @rohitsijoria7211
      @rohitsijoria7211 3 года назад

      You can't reverse engineer the hash, its only used for verification of the data. its essentially a digital signature.

  • @alimughal3332
    @alimughal3332 3 года назад

    How we can hack whatapp plzz

  • @shyambinu4464
    @shyambinu4464 2 года назад

    That was a Good Video...Thank You Tech Raj

  • @rohitzeiq7260
    @rohitzeiq7260 4 года назад

    Bro how to learn programming which is related to computers ..in our clg they are just saying about creating class and object .. but where can we learn about computer coding..
    I know you are not going to reply bro . Please try to reply bro

    • @bmark0092
      @bmark0092 4 года назад +1

      creating classes and objects is very important in programming lol, try to attentively learn that because it 'is' computer coding, eventually you will get good enough where you'll be able to design things by your own

  • @MySachincool
    @MySachincool 4 года назад +4

    Thanks bruh! :D

  • @lemonxl6629
    @lemonxl6629 4 года назад +2

    This guy is one of the reasons I still live india

  • @JibonCare
    @JibonCare 4 года назад

    Please make a challenge with php code...
    Actually I don't know python but I known php

  • @spark3675
    @spark3675 4 года назад

    Hey can u tell me how you created the web app

    • @aakashjana6225
      @aakashjana6225 4 года назад

      it's just a simple HTML web app that is running a Django Python backend

  • @tarekahmed2976
    @tarekahmed2976 4 года назад

    ভাই প্লিজ হেপ মি Facebook এর message gmail এর মধ্যে যায়। এগুলা কি এফ বি মেসেঞ্জার ছারা কেউ কি gmail থেকে দেখতে পারবে কি টেক্স আসছে। please tel me bro.....

  • @riiisk1408
    @riiisk1408 3 года назад

    Nah

  • @knowledgeschool4brilliants535
    @knowledgeschool4brilliants535 4 года назад +1

    Hi bro

  • @publicaccount4337
    @publicaccount4337 3 года назад

    Tech bro osm 😍

  • @AnamEjaz
    @AnamEjaz 4 года назад +1

    I want to be your permanent student

  • @unknownavatar2016
    @unknownavatar2016 4 года назад

    I haven't heard so much pickle in my whole life as I heard in this video!!😂
    btw great vid man

  • @shasank6854
    @shasank6854 4 года назад

    Nice method...well sqli and ddos would have been easier...but I really loved this one

  • @mohithguptakorangi1766
    @mohithguptakorangi1766 4 года назад

    Now these kind of videos with proper explanation I was talking about👍👍👍

  • @ashutoshgavali3086
    @ashutoshgavali3086 4 года назад

    You make apache struct deserilezed exploite i am waiting same pikal

  • @lxa1121
    @lxa1121 4 года назад

    Thank you for the explanation. I was messing up the payload. smh.

  • @Captain-os9dc
    @Captain-os9dc 4 года назад

    Awesome

  • @rajilasamad4832
    @rajilasamad4832 4 года назад

    👍🏻

  • @TechinalBibek
    @TechinalBibek 4 года назад

    Informative video. Thank you

  • @ijtihademon
    @ijtihademon 4 года назад

    thanks, such a nice video

  • @prenom_nom
    @prenom_nom 4 года назад

    You're amazing