Hackers Abuse Zero-Day Exploit for CrushFTP

Поделиться
HTML-код
  • Опубликовано: 25 апр 2024
  • jh.live/flare || You can track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: jh.live/flare
    Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
    Read The Hacker Mindset by Garret Gee: jh.live/hackermindset
    📧JOIN MY NEWSLETTER ➡ jh.live/email
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥RUclips ALGORITHM ➡ Like, Comment, & Subscribe!

Комментарии • 78

  • @mu11668B
    @mu11668B Месяц назад +45

    I still find it funny that quite often people goes for paid products with fancy presentations and unnecessary black-box automations. We use OpenSSH sftp with Linux access control and rarely do we have to worry about random 10/10 RCEs.

    • @CZghost
      @CZghost Месяц назад +9

      That's just Apple's ecosystem. All it is is just a shiny polished shit.

    • @mu11668B
      @mu11668B Месяц назад +5

      @@CZghost Microsoft has been doing it for years too.

    • @morgannelson5756
      @morgannelson5756 Месяц назад

      Familiar with CVE-2024-33663?

    • @biigsmokee
      @biigsmokee Месяц назад

      @@CZghost macos has ssh and built-in nfsd

  • @Napert
    @Napert Месяц назад +49

    can we like calm the fuck down with all the vulnerabilities this year?

    • @fokyewtoob8835
      @fokyewtoob8835 Месяц назад +2

      N O

    • @carsonjamesiv2512
      @carsonjamesiv2512 Месяц назад +1

      🤣😂

    • @BillAnt
      @BillAnt Месяц назад +3

      Exploits and vuln are found almost every day. What's different lately, which has nothing to do with April in particular, is that more of them are being published on RUclips, so it seems like a whole lot of them all of a sudden. More and higher bug-bounties are also a factor. ;)

  • @trisnguyen4625
    @trisnguyen4625 Месяц назад

    Thanks for the demonstration. Very helpful !!!

  • @kintag4459
    @kintag4459 Месяц назад

    Thank you

  • @BakersBuilds23
    @BakersBuilds23 Месяц назад

    Great Vid!

  • @juandig
    @juandig Месяц назад +4

    Flare doesn't show their pricing on their website... I hate that

    • @crashtfa
      @crashtfa Месяц назад +1

      They charge based on identifiers, we pay for flare and we get 1000 identifiers and pay 36k a year

  • @kettlestew
    @kettlestew Месяц назад +6

    Nice "enterprise grade" software you got there.

    • @xenostim
      @xenostim Месяц назад

      shodilly reinventing the wheel?

  • @TheMAZZTer
    @TheMAZZTer Месяц назад +3

    This is nuts. It seems like they don't have a proper security model in place if it's just that easy.
    Also the CrushFTP desktop UI doesn't instill me with confidence lol. At least the web UI looks decent.

  • @Palmit_
    @Palmit_ Месяц назад +4

    Flare looks very interesting. however, the pricing is elite and well crafted 0-day. I ain't buyin to something even for a trial to find out it's extortionate pricing. the FREE trial is not free. They should be open with their pricing.

  • @hgvhjfcjdudrsxhxj
    @hgvhjfcjdudrsxhxj Месяц назад

    hey i have a question Jhon, what virtual machine manager u use Vb or vmware?

  • @guilhermeAK9
    @guilhermeAK9 26 дней назад

    Nice video, thanks for that.
    Allow me to do a question: how can the ssh_host_rsa_key can be useful in some way for hacking once its not related to any user?

  • @pixl_xip
    @pixl_xip Месяц назад +27

    *another* vulnerability this april‽‽

    • @pepesreal
      @pepesreal Месяц назад +5

      i swear theres a vulnerability every day now XD

    • @xCheddarB0b42x
      @xCheddarB0b42x Месяц назад +1

      A lot more than one!

  • @RichardinSA
    @RichardinSA Месяц назад +6

    Can we all agree that JH is the goat?

  • @hamzarashid7579
    @hamzarashid7579 Месяц назад

    I'm surprised that you didn't talked about Linux XZ malware.

  • @carsonjamesiv2512
    @carsonjamesiv2512 Месяц назад

    COOL!

  • @SpectralAI
    @SpectralAI Месяц назад +54

    Having inside information on this one I can only laugh, and laugh, and laugh. There are more vulnerabilities. You just haven't found them yet. 😂

    • @mangodude-nq6su
      @mangodude-nq6su Месяц назад +12

      Classic closed-source tomfoolery

    • @skellybin
      @skellybin Месяц назад +2

      Chill, I was expecting you wise ahh comment

    • @SpectralAI
      @SpectralAI Месяц назад +2

      @@mangodude-nq6su well having seen that source, trust me, you’re better off.

    • @Daveychief23
      @Daveychief23 Месяц назад +1

      Sec researcher here - any info you can drop without breaching NDAs?

    • @SpectralAI
      @SpectralAI Месяц назад +3

      @@Daveychief23 No NDA but common decency prevents me from trashing a former colleague. Plus I have a competing product that makes his look like a child’s toy.

  • @Rachaelshaw7
    @Rachaelshaw7 Месяц назад

    Hi! If you can please create a video on the brokewell malware thx 😊

  • @akashaki11
    @akashaki11 Месяц назад

    Hello @john hammond, recently my Discord was hacked by someone who used it to send phishing links in the NahamSec general discussion group. I’ve resolved the issue, but now I’m unable to rejoin your Discord. Could you please allow me back in?

  • @dukeofwelington
    @dukeofwelington Месяц назад

    John are you going to be in the people's call center this year?

  • @userou-ig1ze
    @userou-ig1ze Месяц назад

    So why would anyone use crushFTP?

  • @xTwistCinema
    @xTwistCinema Месяц назад

    hell yea

  • @harald4game
    @harald4game Месяц назад +1

    Die sitzen in ihrer Ideologieblase und sind anderem gegenüber Beratungsresistent.
    Selbst wenn der jemand gefragt hätte aus seiner Umgebung hätte er keine Kritik bekommenm

  • @nickcarnevalino7462
    @nickcarnevalino7462 Месяц назад

    cant stand places that have a "start free trial" button with no price given for full ver

  • @goodthingforall8973
    @goodthingforall8973 Месяц назад +1

    April and its vulnerabilities 😂

  • @0x32_l3git
    @0x32_l3git Месяц назад

    another zero day.... im not even surprised at this point

  • @BurkenProductions
    @BurkenProductions Месяц назад

    But no one is using crushftp whats wrong with people

  • @mrdkaaa
    @mrdkaaa Месяц назад

    24:25 "almost in a sense server side template injection sort of"
    Almost sort of. That's exactly what it is!

  • @CesSanchez
    @CesSanchez Месяц назад

    Hi, I don't know how to send this to you, but are you aware of the Sabrent situation? They're apparently hosting malware as legitimate firmware updates in their web. Maybe a video could help people not to fall on this and make the company finally solve the issue. Thanks a lot, and please excuse me if this is not the right way to reach you.

  • @HwSystems
    @HwSystems Месяц назад +3

    I do not understand enterprise using app developed in Java. It is like using an NES emulator to do your presentation.

  • @WakiwakiJayson-rw4lc
    @WakiwakiJayson-rw4lc Месяц назад

    should i be worried haha i dont even know that software lolz

  • @wafinashwan8242
    @wafinashwan8242 Месяц назад +1

    15 min gang

  • @ArsalanRamazan-zx1ux
    @ArsalanRamazan-zx1ux Месяц назад

    ‏‪4:56‬‏

  • @SuperWabo
    @SuperWabo Месяц назад

    08:53

  • @TituDas-pl2ch
    @TituDas-pl2ch Месяц назад

    help me sir

  • @ExplosiveAnyThing
    @ExplosiveAnyThing Месяц назад

    Can somebody explain? I dont really understand how it can read a file outside of the virtual machine?

  • @technicalkalilinux
    @technicalkalilinux Месяц назад

    make video on CVE-2023-24059 sir if its exploit is free

  • @dirkthomas1042
    @dirkthomas1042 Месяц назад

    There is no cloud. It's just someone else's computer.

  • @fimdy6530
    @fimdy6530 Месяц назад +1

    i just pissed on my wall

    • @Olflix
      @Olflix Месяц назад

      good for you

  • @dyna.
    @dyna. Месяц назад

    Never heard of this software before... Enterprise ready? The vulnerability info on the download page looks like it's written by a kid and the linux installation instructions are just a joke. Custom start scripts? Then scrolling down i see a systemd service file and at first i thought like oh maybe it's not that bad, but then i look at the actual content and they are not just wrapping their script in a systemd service, no it's wrapped in rc.local and the systemd service is to call rc.local...with a "start" argument that is not used, and without a shebang while it's called directly??? Suprised that even works tbh.
    I was gonna say, what is this 1995? But heck even in 1995 things weren't this amateuristic.

  • @psyonix_2829
    @psyonix_2829 Месяц назад

    27th

  • @LazyPlays_
    @LazyPlays_ Месяц назад +1

    am i dumb or did you just not realize that u were able to pretty much do %hostname% which is effectively a command execution? lol

    • @_JohnHammond
      @_JohnHammond  Месяц назад +3

      %hostname% isn't getting passed to cmd.exe as if it were an environment variable, it is being specifically handled within the application with their custom processing-- so per your question, no, it isn't command execution, and you are dumb. (You said it, not me)

  • @ishanpatel597
    @ishanpatel597 Месяц назад

    😁😁🙌🙌

  • @itsnee
    @itsnee Месяц назад +1

    abit too early i guess lmao

  • @davidlu1003
    @davidlu1003 Месяц назад

    😁😁😁

  • @gojo99998
    @gojo99998 Месяц назад

    First !❤

  • @sunilgaikwad6335
    @sunilgaikwad6335 Месяц назад

    Sir please next video social media authentication bypass make this video please 🥲😭

  • @estersone
    @estersone Месяц назад

    Most liked comment 👍

  • @sweetshit4931
    @sweetshit4931 Месяц назад +2

    Hell of month.

  • @xCheddarB0b42x
    @xCheddarB0b42x Месяц назад

    PRO-see-yohn
    Thanks for the info dude!