This Bug Got Me A $30,000 Bounty

Поделиться
HTML-код
  • Опубликовано: 9 окт 2024
  • LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍
    📚 If you want to learn bug bounty hunting from me: bugbounty.naha...
    💻 If you want to practice some of my free labs and challenges: app.hackinghub.io
    💵 FREE $200 DigitalOcean Credit:
    m.do.co/c/3236...
    🔗 LINKS:
    📖 MY FAVORITE BOOKS:
    Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -amzn.to/3Re8Pa2
    Hacking APIs: Breaking Web Application Programming Interfaces - amzn.to/45g4bOr
    Black Hat GraphQL: Attacking Next Generation APIs - amzn.to/455F9l3
    🍿 WATCH NEXT:
    If I Started Bug Bounty Hunting in 2024, I'd Do this - • If I Started Bug Bount...
    2023 How to Bug Bounty - • How to Bug Bounty in 2023
    Bug Bounty Hunting Full Time - youtu.be/watch...
    Hacking An Online Casino - youtu.be/watch...
    WebApp Pentesting/Hacking Roadmap - youtu.be/watch...
    MY OTHER SOCIALS:
    🌍 My website - www.nahamsec.com/
    👨‍💻 My free labs - app.hackinghub...
    🐦 Twitter - / nahamsec
    📸 Instagram - / nahamsec
    👨‍💻 Linkedin - / nahamsec
    WHO AM I?
    If we haven't met before, hey 👋! I'm Ben, most people online know me online as NahamSec. I'm a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.
    FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

Комментарии • 53

  • @NahamSec
    @NahamSec  3 дня назад +4

    🔗Links:
    💸Purchase my code at a discounted rate using code 'RCE'👉🏼 hhub.io/Mt32ZHP4790
    👀Free Remote Command Execution (RCE) Lab: shorturl.at/1QATs
    💬Join the discord 👉🏼 Discord.gg/NahamSec

  • @geetub9073
    @geetub9073 2 дня назад +5

    Cool video! Other methods of exploiting blind RCE to exfiltrate data:
    * Write to a text file somewhere under the web site folder, then access this file from the web site.
    * Use curl to send internal traffic to the website to imitate a public user feedback, like comments or post (if the site provides such functionality) and access it later from the web.

    • @NahamSec
      @NahamSec  20 часов назад +2

      The first one is a good idea, but that requires you to find out where the web directories are and if you have access to write in those folders. Will make a video on this later, maybe.

  • @dukedud9743
    @dukedud9743 2 дня назад +3

    nice catch bro,
    the ideas of exfiltrating data u have explained is also provided by portswiger in sqli labs
    i didn't thought of that we could do the same but in bash environment instead , so
    thanks for this infos

    • @NahamSec
      @NahamSec  20 часов назад +1

      Thanks for watching!

  • @MianHizb
    @MianHizb 2 дня назад +2

    This is also possible with Blind sql attacks, and is a very common attack vector.

  • @Saeed-ko9wp
    @Saeed-ko9wp 2 дня назад +2

    Your videos are so helpful thnk you Behrooz❤❤

    • @NahamSec
      @NahamSec  20 часов назад

      My pleasure 😊

  • @mohittirkey7889
    @mohittirkey7889 2 дня назад +1

    Great Approach .! Is it possible to determine the length of the string first and then applying the character bruteforcing

    • @manufaleschini
      @manufaleschini День назад +2

      You can with
      if [ $(whoami | wc - c) = X ]
      where X is the length + 1.
      I see no reason for doing that. You do the approach in the video until you don't get any matches.

  • @abdirahmann
    @abdirahmann 2 дня назад +1

    as a software eng, i was seriously mind blown when it clicked what you were doing with `sleep`, this is wild OMG 😳😳

  • @lorenzociavatti7238
    @lorenzociavatti7238 2 дня назад

    Basically a time based SQLi, but with RCE. Cool.

  • @SumanRoy.official
    @SumanRoy.official 2 дня назад +4

    Unbelievable, how did you even think there could be an RCE in stock checking app?

    • @NahamSec
      @NahamSec  20 часов назад +1

      This is a made up scenario to show the exploitation process. Sorry about the confusion.

  • @kosacimadri3386
    @kosacimadri3386 2 дня назад +1

    Hey @nahamsec
    Why is rate limiting not a valid bug even though the server is exhausted from handling multiple requests?

  • @tonyr8888
    @tonyr8888 2 дня назад +1

    could the output of a command be redirected to a file which the server is serving, as an alternative to using sleep?

  • @alizareii8307
    @alizareii8307 День назад

    awesome. I enjoyed very much.tnx

  • @somanverma9644
    @somanverma9644 3 дня назад +3

    Please a make video on sql injection zero to hero

    • @AKBD-sl7ms
      @AKBD-sl7ms 2 дня назад

      google and learning zero to hero :3

  • @parthshukla1216
    @parthshukla1216 2 дня назад

    This is Crazyyyy!! 😍

  • @SumherShankal
    @SumherShankal 2 дня назад +1

    The point is, how did you spot the vulnerability?

    • @NahamSec
      @NahamSec  20 часов назад +3

      When we were working on this program, we had documentation that allowed us to know how the application worked. The scenario wasn't the same as this but the exploitation route was the same. A lot of times, you have throw sh*t at the wall and see what sticks.

  • @bloatless
    @bloatless 2 дня назад

    Amazing Content ;

  • @MustafaGains
    @MustafaGains 3 дня назад

    Wow thats smart idea 💡

  • @NauSikhiya-sf3gf
    @NauSikhiya-sf3gf 2 дня назад

    BRO I AM DEEPLY LOOKING FOR OS COMMAND INJECTION BUT FINDING SOME ISSUE HAVE DONE PORTSWIGGER BUT I WANT DIFFER APPROACH INSTEAD OF FORMS TESTING COULD YOU HELP

  • @fnulnu5645
    @fnulnu5645 День назад

    that RCE helper url isn't working, is it possible to self host or..?

    • @NahamSec
      @NahamSec  20 часов назад

      We haven't had any issues reported with the lab and I just tested it out as well. Seems to be working.

    • @fnulnu5645
      @fnulnu5645 19 часов назад

      @@NahamSec Getting 'hub not started'

  • @ashhl9826
    @ashhl9826 День назад

    I wonder, can burp scan pick this up?

    • @NahamSec
      @NahamSec  20 часов назад

      Sometimes, yeah. In my instance, we had to upload a file that was rendered server-side where we invoked a function that allowed us to RCE. So burp wouldn't be able to catch it. But something like this where you are injecting a command, burp may be able to pick it up

  • @Exploit5lover
    @Exploit5lover 3 дня назад

    Thanks for you free content

  • @abdelrahmanmostafa9489
    @abdelrahmanmostafa9489 2 дня назад

    How do you capture dnslookup results?

    • @abdelrahmanmostafa9489
      @abdelrahmanmostafa9489 2 дня назад

      I dont understand this part how can you see the result from nslookup

    • @hussamalamza4531
      @hussamalamza4531 День назад

      @@abdelrahmanmostafa9489 nslookup is like dig, they send dns queries.

    • @NahamSec
      @NahamSec  20 часов назад

      I'm capturing the results using interact.sh that has that capability for me. It has the ability to capture DNS and HTTP requests.

  • @AdedayoEnoch
    @AdedayoEnoch 2 дня назад

    At 8:40.... 15:23:30 to 15:23:56 is not one second... Still don't get why no one saw that

    • @Bug-Boss
      @Bug-Boss 2 дня назад +3

      Observer that wheever nahamsec clicks enter at that moment only the timer get prints. you can consider it as a timer/clock is not getting the packet latency it just get prints whever he enters, enter button is the trigger not the request time.

  • @WebWonders1
    @WebWonders1 2 дня назад +1

    Yes sqli

  • @blackyogurt
    @blackyogurt 2 дня назад

    awsomeee

  • @Exploit5lover
    @Exploit5lover 3 дня назад +7

    Now Hacker in Urdu , ❤

    • @WaseemLaghari-m4e
      @WaseemLaghari-m4e 2 дня назад

    • @0xlol64
      @0xlol64 2 дня назад

      its arabic

    • @0xlol64
      @0xlol64 2 дня назад

      its Arabic bro

    • @Exploit5lover
      @Exploit5lover 2 дня назад

      @@0xlol64 thanks, ( ہیکر ) I know brother

    • @NahamSec
      @NahamSec  20 часов назад

      It's Farsi :P but I guess the same letters, right?

  • @musstafaalhashme9249
    @musstafaalhashme9249 2 дня назад

    هكر ؟؟

  • @danishbhat1536
    @danishbhat1536 21 час назад

    shit this is an amzaing

  • @ahmjksjssd
    @ahmjksjssd 14 часов назад

    هكر

  • @cybersecuritycs8129
    @cybersecuritycs8129 3 дня назад

    First 🎉

  • @PZSpiel
    @PZSpiel 2 дня назад

    amazing