Hack Websites with PHP!

Поделиться
HTML-код
  • Опубликовано: 30 сен 2024
  • Hack Websites with PHP!
    ~Links~
    Stuck with Ethical Hacking?: www.udemy.com/...
    My socials: gr1ff1nsec.car...
    My Other Tech Channel: @JohnDoeTech
    Github: github.com/4R1...
    --IGNORE
    kali linux,hacker,learn to code,oscp,owasp,parrot os,nmap,bash aliases,htb,como instalar kali linux,vmware,digital forensics,windows subsystem for linux,cyber security,sql injection,linux,comptia linux+ exam
    -IGNORE-

Комментарии • 26

  • @RahulPalXDA
    @RahulPalXDA 3 месяца назад +6

    You just didn't shown me how to crack a php site. Also you helped me to save my php sites from this.
    (Solution: just make an shell script or java app or python script or whatever, that will keep continuously checking my /img/avatars/ folder & just erase instantly if any non png/jpg/jpeg file found. )
    Thanks for it. ❤

    • @pklvo
      @pklvo 3 месяца назад +3

      Just don’t accept files that aren’t images in first place

    • @JohnDoeSec
      @JohnDoeSec  3 месяца назад +1

      @@pklvo it doesn't work like that, since we can bypass that too!

    • @JohnDoeSec
      @JohnDoeSec  3 месяца назад +1

      Run Nuclei or Burp Scanner on your website and it should show you some basic vulnerabilities that your website may have.
      It can save you from script-kiddies breaking your website!

    • @jotunnpy
      @jotunnpy 3 месяца назад +1

      @@JohnDoeSec Im pretty sure correct me if im wrong that this only bypasses content-type headers, but if the server itself checks for what they file itself is rather than the HTTP headers it wont be the case.

    • @JohnDoeSec
      @JohnDoeSec  3 месяца назад +1

      @@jotunnpy If the website checks, even before it allows you to upload a file then HTTP Headers bypass won't work. Because you won't even get a response to try to manipulate it.
      But you can always try different ways, extension bypass, changing hex values in the files itself.

  • @byteafterlife
    @byteafterlife 3 месяца назад +3

    watch wordpress cry

  • @Undergroundrhythmz
    @Undergroundrhythmz 2 месяца назад +1

    lol

  • @PatrickStaight
    @PatrickStaight 3 месяца назад +4

    Will this still work if the image folder only has read but not execute permission?

    • @JohnDoeSec
      @JohnDoeSec  3 месяца назад +3

      It has to execute.
      So upload a dummy image, if it shows, that means a payload will work too.

    • @PatrickStaight
      @PatrickStaight 3 месяца назад +2

      @@JohnDoeSec It's cool that YT recommended your video to me.
      I happen to be working on a PHP based website with an image upload feature.
      I guess the algorithm includes my recent search history.
      My website isn't done yet but I'll see if I can figure out a way to avoid this PHP vulnerability.
      I'll try posing the link to my work in progress in a reply to this comment.
      If YT really doesn't allow links I'll see if I can message it to you more directly.
      No worries if you don't have time to look at it, but thanks if you do.

    • @PatrickStaight
      @PatrickStaight 3 месяца назад

      Wow! YT really doesn't like links in the comments.
      I would think Google would be less of a sledge hammer with spam detection.
      Anyway, you will need to just figure out where the . and the com go in this, my 6th attempt:
      political-streamers /RegisterStreamer

    • @PatrickStaight
      @PatrickStaight 3 месяца назад

      I guess I'm a little autistic or something.
      I've been trying to post this reply for 35 minutes.
      Now, I'm just curious if anything will work.
      I should probably give up eventually.
      You will need to figure out the missing parts yourself:
      political-streamers slash RegisterStreamer
      This is my 7th attempt.

    • @PatrickStaight
      @PatrickStaight 3 месяца назад +3

      I've been trying to post reply this for 40 minutes.
      I'm pretty sure I've tripped something.
      This is my 8th attempt.
      I may give up eventually.

  • @skeeterstudies8109
    @skeeterstudies8109 Месяц назад +1

    My target still doesn't allow php file upload. How do I upload php file as png or jpg

    • @JohnDoeSec
      @JohnDoeSec  Месяц назад +2

      So what you can try to do is
      -Bypass HTTP Client Side Verification with Burpsuite
      -Run through Blacklist/Whitelist
      -Double extensions
      And much more, I can recommend checking out OWASP for more Info

    • @skeeterstudies8109
      @skeeterstudies8109 Месяц назад +1

      @@JohnDoeSec I wish you could refer me to a video

    • @JohnDoeSec
      @JohnDoeSec  Месяц назад +1

      @@skeeterstudies8109 ruclips.net/video/ZWG1nNdUnBc/видео.html

  • @kawaiihikari0
    @kawaiihikari0 3 месяца назад +2

    First one here

  • @gdm_music
    @gdm_music 3 месяца назад +2

    is there a better alternative for burp suite?

    • @JohnDoeSec
      @JohnDoeSec  3 месяца назад +2

      Burpsuite Pro : D
      But to be honest, a lot of people use Caido, ZAP. It's personal preference in my opinion.
      But Burpsuite Pro has some functions that are worth buying.

  • @nk07m
    @nk07m 3 месяца назад +2

    second!!!!!

  • @hyperion.8732
    @hyperion.8732 3 месяца назад +2

    Third maybe!?