If you spotted any areas for improvement, have alternative techniques, or discovered other creative ways to hack this machine, please share them in the comments. Your insights help us all grow as ethical hackers! 👍
Thanks! White-box testing is an awesome way to understand code syntax and logic. In this case, the lack of input sanitization and validation made the exploit possible. It’s also a great step toward finding and reporting CVEs in open-source projects. Practicing on challenges like these helps build the skills needed to identify real-world vulnerabilities! 👍
I am still not sure where in the script the actual payload executed and why it did so. It's kind of bothering me. Otherwise it is a nice video and you have a pleasant voice to listen to.
Appreciate ya! 😄 Great question! The payload executes when the server deserializes the auth cookie. During deserialization, the " __reduce__ " method of the RCE class returns os.system(payload), which triggers the command execution on the server. Hope that helps clarify things. 👍
If you spotted any areas for improvement, have alternative techniques, or discovered other creative ways to hack this machine, please share them in the comments. Your insights help us all grow as ethical hackers! 👍
Very good idea to do white-box testing, personally I have never done it before, great initiative!
Thanks! White-box testing is an awesome way to understand code syntax and logic. In this case, the lack of input sanitization and validation made the exploit possible. It’s also a great step toward finding and reporting CVEs in open-source projects. Practicing on challenges like these helps build the skills needed to identify real-world vulnerabilities! 👍
Glad I stumbled onto your content!
Appreciate you checking it out! 😊
Epic! Thanks:)
I am still not sure where in the script the actual payload executed and why it did so. It's kind of bothering me.
Otherwise it is a nice video and you have a pleasant voice to listen to.
Appreciate ya! 😄 Great question! The payload executes when the server deserializes the auth cookie. During deserialization, the " __reduce__ " method of the RCE class returns os.system(payload), which triggers the command execution on the server. Hope that helps clarify things. 👍
How did you make your kali look like this?
You need to switch from bash to zsh, which has customizations and many terminal themes
@@Sheeessh-g1 thank you
I wonder if you could make a video on this topic
Actually working on a video on my kali setup which will be out soon. 👍
What is the name of your big monitor?
The main monitor I'm using is the ultra-wide g9 odyssey. 😊
Thank you ❤