Ps, HUGE THANKS to Snyk for sponsoring this video ! Snyk is putting together their next Capture the Flag 101 workshop! If you are new to CTF challenges and want some extra guidance on how to cut through binary exploitation or web security tasks, jump into their free online session on September 14th at 11am EDT! j-h.io/snyk-ctf101 click the link plz click it CLICK THE LINK j-h.io/snyk-ctf101 click click click
Thanks John, your way of teaching, explaining while you're working on the fly is awesome! Really teaches us how to think and react while troubleshooting.
I just got my A+, Net+, Sec+ and man there’s SOOO much more to learn haha maybe I’ll under more with time but 80% of the video I know. Just now I have to figure out how to implement everything I learned. Hands on is WAY better for me! Thank you for what you do hopefully one day I will be kind of close to on your level of knowledge.
I just remembered when I first CTF like experience with Kirshbaum. They have a challenge for job applicants and successfully doing the challenge grants them a chance for an interview. I failed the interview tho but it was a fun experience nonetheless.
Look, I'm not into security but I could not pass this video. Very interesting and made easy to understand some Linux command lines and strategies to find problems. Thanks!
It would really be awesome if you could make a video on how to create a CTF challenge based on the vulnerabilities on Exploit DB. The way to navigate through exploit DB, the thinking process, etc...
Its crazy how simple it is to understand python ven though I barely learned python Not really as simple but getting use to how it works makes it simple enough to understand...
Hey John, I've been using rustscan lately and i really like it, is. Slot faster and can be complemented with nmap for full scans but is much faster. I wonder why you don't use it?
Thank you John. Do you think the snyk ctf webinar is good for an absolute beginner? No ctf experience (aside from your channel), and just starting to learn python, cybersec, etc...thanks.
One thing I don't understand is why root user in container has root privileges in host filesystem? These shouldn't be treated as different users? To me, users in containers shouldn't 'communicate' with users in host. Why is it the case? Thanks :)
Can you do a video on setting up a VM for doing these challenges, I have wanted to do these challenges for a while but want to ensure I am being as safe as possible as I have heard you are all connecting to the same VPN network I want to ensure my vm is as isolated as possible, I was thinking putting my vm behind a virtualized pfSense and blocking access to my network from that pfSense firewall. Am I overthinking this or should I really dedicate one vm and virtual network setup to just CTF challenges?
This is why I never upgrade to a version of PHP when it first comes out. I always stay one or two behind if I can to make sure if any severe vulnerabilities like this come out they are fixed before they can affect me.
Sorry, not on this subject. Any advice of how to get rid of Instant Memo? It is messing my tablet up. Tried numerous ways to uninstall, can't. Force stop, clear cache doesn't even slow it down. I can't find any info on it.
It was made by an attacker who compromised git php's servers. So the attacker will have a backdoor on all servers that run this version of php (so possibly millions of servers if the attack had not been detected).
John your having a laugh arent you with this? I like watching your videos because you are informative. You said at the beginning this was an easy challenge, yet you copy and pasted someone else's code.
PHP 5.3 is older than RUclips and this backdoor is using a "-dev" build which no sane person would ever use in production. I'm not even using PHP, but you obviously don't have any clue what you're even talking about.
Ps, HUGE THANKS to Snyk for sponsoring this video ! Snyk is putting together their next Capture the Flag 101 workshop! If you are new to CTF challenges and want some extra guidance on how to cut through binary exploitation or web security tasks, jump into their free online session on September 14th at 11am EDT! j-h.io/snyk-ctf101
click the link plz
click it
CLICK THE LINK
j-h.io/snyk-ctf101
click click click
Click a posted link, enter "Name", "Company E-Mail", "Company Name" and "Job Title" to register..... Not comfortable with that.
@@nighthawk5305 It's designed for businesses and companies.
I could watch John explaining Python code for the rest of my life!
It's a good idea.
😂nice
why?
Me too
Thanks John, your way of teaching, explaining while you're working on the fly is awesome! Really teaches us how to think and react while troubleshooting.
Thank you -John- Kevin!
Zanidd ❤
Its fun how i know nothing about hacking but when he explains things it makes perfect sense
Your channel is best source to learn Cybr security 👍
Could you do a video on how you make these challenges? like the thought process and steps behind it? I think thatd be awesome
this is the only ad sponsor i would watch
Glad to hear about the snyk ctf webinar John.... can’t wait XD
I just got my A+, Net+, Sec+ and man there’s SOOO much more to learn haha maybe I’ll under more with time but 80% of the video I know. Just now I have to figure out how to implement everything I learned. Hands on is WAY better for me! Thank you for what you do hopefully one day I will be kind of close to on your level of knowledge.
The more you know the more there is to know. Do you think it is good idea to get CEH cert has my first cert?
@@flaviomoreira01 yes
@@flaviomoreira01 the OSCP is so much better than the CEH
@@Smithy957 I have heard that it is harder to get it, but what is the requirement?
@@zebbybobebby But in terms of reputation, would you agree that CEH is more advanced?
I just remembered when I first CTF like experience with Kirshbaum. They have a challenge for job applicants and successfully doing the challenge grants them a chance for an interview. I failed the interview tho but it was a fun experience nonetheless.
I loved the office reference :D
I learn alot from you man 💚
Awesome vid John!!!
You never disappoint, thanks John!
Look, I'm not into security but I could not pass this video. Very interesting and made easy to understand some Linux command lines and strategies to find problems. Thanks!
It would really be awesome if you could make a video on how to create a CTF challenge based on the vulnerabilities on Exploit DB. The way to navigate through exploit DB, the thinking process, etc...
+1
Thanks John for teaching me 👾
May I suggest backing off from the mic, or getting a pop filter? Your P’s are pretty brutal on headphones.
Great video, anyways. 😍
Great content John! Thanks for all your shared knowledge as usual!
Awesome! :) Great video as always.
Zerodium ~ Zero Diem ~ Zero Day
Love your content Mr. Hammond
Love your videos! Thank you for all that you do.
Its crazy how simple it is to understand python ven though I barely learned python
Not really as simple but getting use to how it works makes it simple enough to understand...
Obrigado, sempre ótimos conteúdos!
Hey John, I've been using rustscan lately and i really like it, is. Slot faster and can be complemented with nmap for full scans but is much faster. I wonder why you don't use it?
Pls was the workshop session recorded cos I missed it
The Greatest man in this feild ❤❤❤
you know what john i love you
Thank you for the video suggestions .I will go through one by one
Thank you John. Do you think the snyk ctf webinar is good for an absolute beginner? No ctf experience (aside from your channel), and just starting to learn python, cybersec, etc...thanks.
The hair in front of his face the entire time man lmao
Real cool man! Although I completed the box within 3 minutes X3
what up KEVIN!!
Hey, I just wanted to check briesofty if there is a way for to import a new soft into the program, for example softs or sotNice tutorialng that
thanks, John!
One thing I don't understand is why root user in container has root privileges in host filesystem? These shouldn't be treated as different users? To me, users in containers shouldn't 'communicate' with users in host. Why is it the case? Thanks :)
Very interesting.
Thank you sir you would have been intresting to me to become a good business man
Thanks for the video.
Can you make a video on Creating vulnerable machines for hacking platforms in depth, and that can be in series?
I learned alot thanks
I've always wanted to get into whitehat hacking and this is the best video I've seen so far about it. You're amazing
You are best ;) Thank You !!!!!!!!!!!!!!!!
what is proc in Linux directories? and why does its size be 140 TB ,, which system uses that huge amount of memory in the tera bytes?
Can you do a video on setting up a VM for doing these challenges, I have wanted to do these challenges for a while but want to ensure I am being as safe as possible as I have heard you are all connecting to the same VPN network I want to ensure my vm is as isolated as possible, I was thinking putting my vm behind a virtualized pfSense and blocking access to my network from that pfSense firewall. Am I overthinking this or should I really dedicate one vm and virtual network setup to just CTF challenges?
Just throw up a kali machine on VMware.
Thank you John
Think I remember when this backdoor went up, wasn't it a big thing?
This is why I never upgrade to a version of PHP when it first comes out. I always stay one or two behind if I can to make sure if any severe vulnerabilities like this come out they are fixed before they can affect me.
so who caught the 'Kevin/ Office' refence at the beginning?
yeah!!! "Why use more words when less do trick?" 🤣🤣🤣🤣🤣🤣
@@Alisson-Faoli
Sorry, not on this subject. Any advice of how to get rid of Instant Memo? It is messing my tablet up. Tried numerous ways to uninstall, can't. Force stop, clear cache doesn't even slow it down.
I can't find any info on it.
Whats with the thumbnail lol
John Hammond Breaking bad XD
What's with the marvin villain thumbnail ?
how do you know what to search? what if i cannot tell if PHP 8.1.0-dev is the keyword?
Every happened to the Ubuntu install?
Good stuff
Last year, this exploit was featured in HackTheBox when it was quite new.
You had to understand a chinese Blog post to get the shell back then
What is verbosity in this context?
Apache tomcat 8.5.58 vuln ??
did u already create an exploite sir ?
What I'm really struck by is that it was _planted_, by a security firm that sells exploits no less... wow
I don't get it, why would you intentionally add a backdoor to php.
It was made by an attacker who compromised git php's servers. So the attacker will have a backdoor on all servers that run this version of php (so possibly millions of servers if the attack had not been detected).
anyone tried to get rev shell on the machine or could ?
Thanks!
nice one
Whoa that seems really bad. Gonna have to go do some more research on that user agentt situation
👽😍😍😍
Show thanks obrigado
Thanks.
The webpage looks like an appseed template
I’m guessing I need to know PHP.
Gj :)
Why I got rickrolled ?¿? I only wanted to do the workshop
nice
❤️❤️❤️👏👏👍
to all php devs, jump ship while you still can
Watching on sep 27 lol
LOL'd at this ahaha
if you dont provide the "zerodium" at the start of the string it just says "REMOVETHIS: Sold to zerodium in 2017"
Look for mobile malware please
Astra Linux users can take the hack me challenge.
php had a backdoor built in. WTF!?
It was a dev version, and from what they showed, it has been caught before going into production.
Php is still important??
why not
Trying to be funny?
@@HTWwpzIuqaObMt it is funny
Wordpress.
Yes it is
Agent-T
hmm..
mp4 mp3 files backdoor
as a php programmer , feeling so sad
Please laugh a bit so I can see if you sound like Seth Rogen.
*I feel pity for Php Evangelists*
John your having a laugh arent you with this? I like watching your videos because you are informative. You said at the beginning this was an easy challenge, yet you copy and pasted someone else's code.
I dropped PHP 19 years ago, because I was awful then and it's still awful now. Stop using PHP.
no its not
@@tutorialsacc7314 I won't argue with you, because you're clearly an idiot if you're simping for PHP in 2022.
I told you PHP is very vulnerable language
Also php 5.3 has RCE exploit
Another php vulnerability
PHP CGI argument injection
PHP 5.3 is older than RUclips and this backdoor is using a "-dev" build which no sane person would ever use in production.
I'm not even using PHP, but you obviously don't have any clue what you're even talking about.
@@toifel lol you didn't have to do him like that
still using nmap rather then zmap. 2000 called they want their shell script kiddies back.
this is good, enjoyment.exe 😊
Ah man tryhackme is so fun. Thanks you for developing some fun challenges for us.