This Bug Got Me A $30,000 Bounty

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 68

  • @NahamSec
    @NahamSec  Месяц назад +5

    🔗Links:
    💸Purchase my code at a discounted rate using code 'RCE'👉🏼 hhub.io/Mt32ZHP4790
    👀Free Remote Command Execution (RCE) Lab: shorturl.at/1QATs
    💬Join the discord 👉🏼 Discord.gg/NahamSec

  • @geetub9073
    @geetub9073 Месяц назад +9

    Cool video! Other methods of exploiting blind RCE to exfiltrate data:
    * Write to a text file somewhere under the web site folder, then access this file from the web site.
    * Use curl to send internal traffic to the website to imitate a public user feedback, like comments or post (if the site provides such functionality) and access it later from the web.

    • @NahamSec
      @NahamSec  Месяц назад +7

      The first one is a good idea, but that requires you to find out where the web directories are and if you have access to write in those folders. Will make a video on this later, maybe.

  • @dukedud9743
    @dukedud9743 Месяц назад +6

    nice catch bro,
    the ideas of exfiltrating data u have explained is also provided by portswiger in sqli labs
    i didn't thought of that we could do the same but in bash environment instead , so
    thanks for this infos

    • @NahamSec
      @NahamSec  Месяц назад +1

      Thanks for watching!

  • @Saeed-ko9wp
    @Saeed-ko9wp Месяц назад +2

    Your videos are so helpful thnk you Behrooz❤❤

    • @NahamSec
      @NahamSec  Месяц назад

      My pleasure 😊

  • @Jarling-so4oi
    @Jarling-so4oi Месяц назад

    Watched the video, very good, I like how it is designed sort of like DVWA with options of a firewall or no

  • @elwi655
    @elwi655 20 дней назад

    Hi Ben,
    I may have missed it if you've mentioned it before; but am I correct to assume that your course on hackinghub is updated vs the one on udemy?
    Thanks in advance

  • @MianHizb
    @MianHizb Месяц назад +2

    This is also possible with Blind sql attacks, and is a very common attack vector.

  • @mohittirkey7889
    @mohittirkey7889 Месяц назад +1

    Great Approach .! Is it possible to determine the length of the string first and then applying the character bruteforcing

    • @manufaleschini
      @manufaleschini Месяц назад +2

      You can with
      if [ $(whoami | wc - c) = X ]
      where X is the length + 1.
      I see no reason for doing that. You do the approach in the video until you don't get any matches.

  • @abdirahmann
    @abdirahmann Месяц назад +1

    as a software eng, i was seriously mind blown when it clicked what you were doing with `sleep`, this is wild OMG 😳😳

  • @lorenzociavatti7238
    @lorenzociavatti7238 Месяц назад

    Basically a time based SQLi, but with RCE. Cool.

  • @parthshukla1216
    @parthshukla1216 Месяц назад +1

    This is Crazyyyy!! 😍

  • @alizareii8307
    @alizareii8307 Месяц назад

    awesome. I enjoyed very much.tnx

  • @SD-Gamer
    @SD-Gamer Месяц назад

    this video shows how much smart you have become to become a hacker

  • @kosacimadri3386
    @kosacimadri3386 Месяц назад +1

    Hey @nahamsec
    Why is rate limiting not a valid bug even though the server is exhausted from handling multiple requests?

  • @tonyr8888
    @tonyr8888 Месяц назад +1

    could the output of a command be redirected to a file which the server is serving, as an alternative to using sleep?

  • @Mohacks
    @Mohacks 4 дня назад

    That's freaking smart

  • @SumanRoy.official
    @SumanRoy.official Месяц назад +4

    Unbelievable, how did you even think there could be an RCE in stock checking app?

    • @NahamSec
      @NahamSec  Месяц назад +2

      This is a made up scenario to show the exploitation process. Sorry about the confusion.

  • @HexRo0t
    @HexRo0t Месяц назад

    Comando curl ajuda muito ,ética heck

  • @MustafaGains
    @MustafaGains Месяц назад

    Wow thats smart idea 💡

  • @TravelVInee
    @TravelVInee Месяц назад

    @NahamSec please give us more discount on your bug bounty course in this festive season

  • @leghdaf
    @leghdaf Месяц назад

    Amazing Content ;

  • @SumherShankal
    @SumherShankal Месяц назад +1

    The point is, how did you spot the vulnerability?

    • @NahamSec
      @NahamSec  Месяц назад +4

      When we were working on this program, we had documentation that allowed us to know how the application worked. The scenario wasn't the same as this but the exploitation route was the same. A lot of times, you have throw sh*t at the wall and see what sticks.

  • @MP-eq8fx
    @MP-eq8fx 21 день назад

    I thought companies have stopped paying bounties.

  • @mohadjermohamed3439
    @mohadjermohamed3439 Месяц назад

    WHY NOT TRYING DIRECT REVERSE SHELL ?

  • @fnulnu5645
    @fnulnu5645 Месяц назад

    that RCE helper url isn't working, is it possible to self host or..?

    • @NahamSec
      @NahamSec  Месяц назад

      We haven't had any issues reported with the lab and I just tested it out as well. Seems to be working.

    • @fnulnu5645
      @fnulnu5645 Месяц назад

      @@NahamSec Getting 'hub not started'

  • @Mo5_483
    @Mo5_483 Месяц назад

    هکر پارسیش قشنگه❤❤❤

  • @ashhl9826
    @ashhl9826 Месяц назад

    I wonder, can burp scan pick this up?

    • @NahamSec
      @NahamSec  Месяц назад

      Sometimes, yeah. In my instance, we had to upload a file that was rendered server-side where we invoked a function that allowed us to RCE. So burp wouldn't be able to catch it. But something like this where you are injecting a command, burp may be able to pick it up

  • @NauSikhiya-sf3gf
    @NauSikhiya-sf3gf Месяц назад

    BRO I AM DEEPLY LOOKING FOR OS COMMAND INJECTION BUT FINDING SOME ISSUE HAVE DONE PORTSWIGGER BUT I WANT DIFFER APPROACH INSTEAD OF FORMS TESTING COULD YOU HELP

  • @Exploit5lover
    @Exploit5lover Месяц назад

    Thanks for you free content

  • @AdedayoEnoch
    @AdedayoEnoch Месяц назад

    At 8:40.... 15:23:30 to 15:23:56 is not one second... Still don't get why no one saw that

    • @Bug-Boss
      @Bug-Boss Месяц назад +3

      Observer that wheever nahamsec clicks enter at that moment only the timer get prints. you can consider it as a timer/clock is not getting the packet latency it just get prints whever he enters, enter button is the trigger not the request time.

  • @abdelrahmanmostafa9489
    @abdelrahmanmostafa9489 Месяц назад

    How do you capture dnslookup results?

    • @abdelrahmanmostafa9489
      @abdelrahmanmostafa9489 Месяц назад

      I dont understand this part how can you see the result from nslookup

    • @hussamalamza4531
      @hussamalamza4531 Месяц назад

      @@abdelrahmanmostafa9489 nslookup is like dig, they send dns queries.

    • @NahamSec
      @NahamSec  Месяц назад +1

      I'm capturing the results using interact.sh that has that capability for me. It has the ability to capture DNS and HTTP requests.

  • @blackyogurt
    @blackyogurt Месяц назад

    awsomeee

  • @WebWonders1
    @WebWonders1 Месяц назад +1

    Yes sqli

  • @somanverma9644
    @somanverma9644 Месяц назад +3

    Please a make video on sql injection zero to hero

    • @AKBD-sl7ms
      @AKBD-sl7ms Месяц назад

      google and learning zero to hero :3

  • @mehrankurd
    @mehrankurd 7 дней назад

    peace

  • @tommyboyhacking
    @tommyboyhacking Месяц назад

    All these hackers

    • @NahamSec
      @NahamSec  Месяц назад +1

      TOMMYBOYDUPING!!!

  • @ahmjksjssd
    @ahmjksjssd Месяц назад

    هكر

  • @musstafaalhashme9249
    @musstafaalhashme9249 Месяц назад

    هكر ؟؟

  • @SD-Gamer
    @SD-Gamer Месяц назад

    noice

  • @erfanhap4758
    @erfanhap4758 Месяц назад

    هکر🫀

  • @danishbhat1536
    @danishbhat1536 Месяц назад

    shit this is an amzaing

  • @Exploit5lover
    @Exploit5lover Месяц назад +8

    Now Hacker in Urdu , ❤

    • @WaseemLaghari-m4e
      @WaseemLaghari-m4e Месяц назад

    • @0xlol64
      @0xlol64 Месяц назад

      its arabic

    • @0xlol64
      @0xlol64 Месяц назад

      its Arabic bro

    • @Exploit5lover
      @Exploit5lover Месяц назад

      @@0xlol64 thanks, ( ہیکر ) I know brother

    • @NahamSec
      @NahamSec  Месяц назад

      It's Farsi :P but I guess the same letters, right?

  • @cybersecuritycs8129
    @cybersecuritycs8129 Месяц назад

    First 🎉

  • @zalert-884
    @zalert-884 Месяц назад

    amazing