PHP 8.1.0-dev BACKDOOR Hack (Easy RCE)

Поделиться
HTML-код
  • Опубликовано: 18 дек 2024

Комментарии • 137

  • @_JohnHammond
    @_JohnHammond  2 года назад +22

    Ps, HUGE THANKS to Snyk for sponsoring this video ! Snyk is putting together their next Capture the Flag 101 workshop! If you are new to CTF challenges and want some extra guidance on how to cut through binary exploitation or web security tasks, jump into their free online session on September 14th at 11am EDT! j-h.io/snyk-ctf101
    click the link plz
    click it
    CLICK THE LINK
    j-h.io/snyk-ctf101
    click click click

    • @nighthawk5305
      @nighthawk5305 2 года назад

      Click a posted link, enter "Name", "Company E-Mail", "Company Name" and "Job Title" to register..... Not comfortable with that.

    • @link_safe
      @link_safe 2 года назад

      @@nighthawk5305 It's designed for businesses and companies.

  • @Fl0kii_
    @Fl0kii_ 2 года назад +78

    I could watch John explaining Python code for the rest of my life!

  • @jasonb2221
    @jasonb2221 2 года назад +13

    Thanks John, your way of teaching, explaining while you're working on the fly is awesome! Really teaches us how to think and react while troubleshooting.

  • @zanidd
    @zanidd 2 года назад +23

    Thank you -John- Kevin!

  • @michaelwerkov3438
    @michaelwerkov3438 2 года назад +1

    Its fun how i know nothing about hacking but when he explains things it makes perfect sense

  • @dayanjihuzefa1827
    @dayanjihuzefa1827 2 года назад +4

    Your channel is best source to learn Cybr security 👍

  • @ponan0053
    @ponan0053 2 года назад +20

    Could you do a video on how you make these challenges? like the thought process and steps behind it? I think thatd be awesome

  • @jimo8486
    @jimo8486 2 года назад

    this is the only ad sponsor i would watch

  • @analyzec137
    @analyzec137 2 года назад

    Glad to hear about the snyk ctf webinar John.... can’t wait XD

  • @bs12wrblimitedsti38
    @bs12wrblimitedsti38 2 года назад +9

    I just got my A+, Net+, Sec+ and man there’s SOOO much more to learn haha maybe I’ll under more with time but 80% of the video I know. Just now I have to figure out how to implement everything I learned. Hands on is WAY better for me! Thank you for what you do hopefully one day I will be kind of close to on your level of knowledge.

    • @flaviomoreira01
      @flaviomoreira01 2 года назад +2

      The more you know the more there is to know. Do you think it is good idea to get CEH cert has my first cert?

    • @johnpathe
      @johnpathe 2 года назад

      @@flaviomoreira01 yes

    • @Smithy957
      @Smithy957 2 года назад

      @@flaviomoreira01 the OSCP is so much better than the CEH

    • @flaviomoreira01
      @flaviomoreira01 2 года назад

      @@Smithy957 I have heard that it is harder to get it, but what is the requirement?

    • @flaviomoreira01
      @flaviomoreira01 2 года назад

      @@zebbybobebby But in terms of reputation, would you agree that CEH is more advanced?

  • @daleryanaldover6545
    @daleryanaldover6545 2 года назад +4

    I just remembered when I first CTF like experience with Kirshbaum. They have a challenge for job applicants and successfully doing the challenge grants them a chance for an interview. I failed the interview tho but it was a fun experience nonetheless.

  • @joaoverde7742
    @joaoverde7742 2 года назад

    I loved the office reference :D

  • @huzifaahmed1426
    @huzifaahmed1426 2 года назад +3

    I learn alot from you man 💚

  • @TheHaircutFish
    @TheHaircutFish 2 года назад

    Awesome vid John!!!

  • @kaas12
    @kaas12 2 года назад

    You never disappoint, thanks John!

  • @cnfreitas
    @cnfreitas 2 года назад +11

    Look, I'm not into security but I could not pass this video. Very interesting and made easy to understand some Linux command lines and strategies to find problems. Thanks!

  • @mohammedbahamid8759
    @mohammedbahamid8759 Год назад +4

    It would really be awesome if you could make a video on how to create a CTF challenge based on the vulnerabilities on Exploit DB. The way to navigate through exploit DB, the thinking process, etc...

  • @NicolaCalore
    @NicolaCalore 2 года назад

    Thanks John for teaching me 👾

  • @JoakimKanon
    @JoakimKanon 2 года назад +3

    May I suggest backing off from the mic, or getting a pop filter? Your P’s are pretty brutal on headphones.
    Great video, anyways. 😍

  • @Zerback
    @Zerback 2 года назад

    Great content John! Thanks for all your shared knowledge as usual!

  • @GeorgeWulfers_88
    @GeorgeWulfers_88 2 года назад

    Awesome! :) Great video as always.

  • @badbgp
    @badbgp 2 года назад +1

    Zerodium ~ Zero Diem ~ Zero Day

  • @moustafakashen3610
    @moustafakashen3610 2 года назад

    Love your content Mr. Hammond

  • @anthonylamoreaux1282
    @anthonylamoreaux1282 2 года назад

    Love your videos! Thank you for all that you do.

  • @mrobvious6112
    @mrobvious6112 2 года назад

    Its crazy how simple it is to understand python ven though I barely learned python
    Not really as simple but getting use to how it works makes it simple enough to understand...

  • @renatofreirefilho
    @renatofreirefilho 2 года назад +3

    Obrigado, sempre ótimos conteúdos!

  • @frosecold
    @frosecold 2 года назад +1

    Hey John, I've been using rustscan lately and i really like it, is. Slot faster and can be complemented with nmap for full scans but is much faster. I wonder why you don't use it?

  • @0xmkay
    @0xmkay 2 года назад

    Pls was the workshop session recorded cos I missed it

  • @huzifaahmed1426
    @huzifaahmed1426 2 года назад

    The Greatest man in this feild ❤❤❤

  • @DEADCODE_
    @DEADCODE_ 2 года назад

    you know what john i love you

  • @danielghani3903
    @danielghani3903 2 года назад

    Thank you for the video suggestions .I will go through one by one

  • @nelaina
    @nelaina 2 года назад

    Thank you John. Do you think the snyk ctf webinar is good for an absolute beginner? No ctf experience (aside from your channel), and just starting to learn python, cybersec, etc...thanks.

  • @branisgreat
    @branisgreat 2 года назад

    The hair in front of his face the entire time man lmao

  • @sdafasfF
    @sdafasfF 2 года назад

    Real cool man! Although I completed the box within 3 minutes X3

  • @CageTheTurtle
    @CageTheTurtle 2 года назад

    what up KEVIN!!

  • @kekeke7815
    @kekeke7815 2 года назад

    Hey, I just wanted to check briesofty if there is a way for to import a new soft into the program, for example softs or sotNice tutorialng that

  • @djones0105
    @djones0105 2 года назад

    thanks, John!

  • @Freeak6
    @Freeak6 2 года назад +1

    One thing I don't understand is why root user in container has root privileges in host filesystem? These shouldn't be treated as different users? To me, users in containers shouldn't 'communicate' with users in host. Why is it the case? Thanks :)

  • @caiovinicius8448
    @caiovinicius8448 2 года назад +1

    Very interesting.

  • @vipanchika5059
    @vipanchika5059 4 месяца назад +1

    Thank you sir you would have been intresting to me to become a good business man

  • @elisansabimana6200
    @elisansabimana6200 2 года назад

    Thanks for the video.

  • @0xm3m
    @0xm3m 2 года назад +1

    Can you make a video on Creating vulnerable machines for hacking platforms in depth, and that can be in series?

  • @ALD7MI2011
    @ALD7MI2011 2 года назад

    I learned alot thanks

  • @aquaforgegames6207
    @aquaforgegames6207 2 года назад

    I've always wanted to get into whitehat hacking and this is the best video I've seen so far about it. You're amazing

  • @cartoonchannel5584
    @cartoonchannel5584 2 года назад

    You are best ;) Thank You !!!!!!!!!!!!!!!!

  • @georgehammond867
    @georgehammond867 2 года назад

    what is proc in Linux directories? and why does its size be 140 TB ,, which system uses that huge amount of memory in the tera bytes?

  • @mathesonstep
    @mathesonstep 2 года назад

    Can you do a video on setting up a VM for doing these challenges, I have wanted to do these challenges for a while but want to ensure I am being as safe as possible as I have heard you are all connecting to the same VPN network I want to ensure my vm is as isolated as possible, I was thinking putting my vm behind a virtualized pfSense and blocking access to my network from that pfSense firewall. Am I overthinking this or should I really dedicate one vm and virtual network setup to just CTF challenges?

    • @eandudley8415
      @eandudley8415 2 года назад

      Just throw up a kali machine on VMware.

  • @MrsCyImsofly
    @MrsCyImsofly 2 года назад

    Thank you John

  • @Terszel
    @Terszel 2 года назад

    Think I remember when this backdoor went up, wasn't it a big thing?

  • @christophermarshall8712
    @christophermarshall8712 Год назад

    This is why I never upgrade to a version of PHP when it first comes out. I always stay one or two behind if I can to make sure if any severe vulnerabilities like this come out they are fixed before they can affect me.

  • @onen0zednine753
    @onen0zednine753 2 года назад +1

    so who caught the 'Kevin/ Office' refence at the beginning?

    • @Alisson-Faoli
      @Alisson-Faoli 2 года назад +1

      yeah!!! "Why use more words when less do trick?" 🤣🤣🤣🤣🤣🤣

    • @onen0zednine753
      @onen0zednine753 2 года назад +1

      @@Alisson-Faoli

  • @judylyons177
    @judylyons177 2 года назад

    Sorry, not on this subject. Any advice of how to get rid of Instant Memo? It is messing my tablet up. Tried numerous ways to uninstall, can't. Force stop, clear cache doesn't even slow it down.
    I can't find any info on it.

  • @animesubber7136
    @animesubber7136 2 года назад

    Whats with the thumbnail lol
    John Hammond Breaking bad XD

  • @dopy8418
    @dopy8418 2 года назад

    What's with the marvin villain thumbnail ?

  • @ihsankurniawan3591
    @ihsankurniawan3591 2 года назад

    how do you know what to search? what if i cannot tell if PHP 8.1.0-dev is the keyword?

  • @sdafasfF
    @sdafasfF 2 года назад

    Every happened to the Ubuntu install?

  • @WanderlustVisual5
    @WanderlustVisual5 2 года назад

    Good stuff

  • @themasterofdisastr1226
    @themasterofdisastr1226 2 года назад

    Last year, this exploit was featured in HackTheBox when it was quite new.
    You had to understand a chinese Blog post to get the shell back then

  • @michaelwerkov3438
    @michaelwerkov3438 2 года назад

    What is verbosity in this context?

  • @learnfirst-1
    @learnfirst-1 2 года назад

    Apache tomcat 8.5.58 vuln ??

  • @aqsajimmy2803
    @aqsajimmy2803 2 года назад

    did u already create an exploite sir ?

  •  2 года назад +3

    What I'm really struck by is that it was _planted_, by a security firm that sells exploits no less... wow

  • @soniablanche5672
    @soniablanche5672 2 года назад

    I don't get it, why would you intentionally add a backdoor to php.

    • @Freeak6
      @Freeak6 2 года назад

      It was made by an attacker who compromised git php's servers. So the attacker will have a backdoor on all servers that run this version of php (so possibly millions of servers if the attack had not been detected).

  • @khaleedmayas
    @khaleedmayas Год назад

    anyone tried to get rev shell on the machine or could ?

  • @brian.-_393i3.-_
    @brian.-_393i3.-_ 2 года назад

    Thanks!

  • @gauthamgamer1214
    @gauthamgamer1214 2 года назад

    nice one

  • @wcrb15
    @wcrb15 2 года назад

    Whoa that seems really bad. Gonna have to go do some more research on that user agentt situation

  • @FidelEmilioSusanaJimenez
    @FidelEmilioSusanaJimenez 2 года назад

    👽😍😍😍

  • @diegocracker
    @diegocracker 2 года назад

    Show thanks obrigado

  • @guilherme5094
    @guilherme5094 2 года назад

    Thanks.

  • @12346798Mann
    @12346798Mann 2 года назад

    The webpage looks like an appseed template

  • @Rantofthings.
    @Rantofthings. 3 месяца назад

    I’m guessing I need to know PHP.

  • @fdgmedd
    @fdgmedd 2 года назад

    Gj :)

  • @jaume748
    @jaume748 2 года назад

    Why I got rickrolled ?¿? I only wanted to do the workshop

  • @plooshdev
    @plooshdev 2 года назад

    nice

  • @juneilquilana5159
    @juneilquilana5159 2 года назад

    ❤️❤️❤️👏👏👍

  • @azatecas
    @azatecas 2 года назад

    to all php devs, jump ship while you still can

  • @InsaneRecords997
    @InsaneRecords997 2 года назад

    Watching on sep 27 lol

  • @LiEnby
    @LiEnby 2 года назад

    LOL'd at this ahaha
    if you dont provide the "zerodium" at the start of the string it just says "REMOVETHIS: Sold to zerodium in 2017"

  • @kevinwong_2016
    @kevinwong_2016 2 года назад

    Look for mobile malware please

  • @chris7010_1
    @chris7010_1 7 месяцев назад

    Astra Linux users can take the hack me challenge.

  • @SB-qm5wg
    @SB-qm5wg 2 года назад

    php had a backdoor built in. WTF!?

    • @Freeak6
      @Freeak6 2 года назад +1

      It was a dev version, and from what they showed, it has been caught before going into production.

  • @abhishek24506
    @abhishek24506 2 года назад +3

    Php is still important??

  • @pathfinder750
    @pathfinder750 2 года назад

    Agent-T

  • @rebelsdeveloper367
    @rebelsdeveloper367 2 года назад

    hmm..

  • @unknown_3293
    @unknown_3293 2 года назад

    mp4 mp3 files backdoor

  • @omari4m
    @omari4m 2 года назад +1

    as a php programmer , feeling so sad

  • @masdadmin
    @masdadmin 2 года назад

    Please laugh a bit so I can see if you sound like Seth Rogen.

  • @hanomedia
    @hanomedia 2 года назад +1

    *I feel pity for Php Evangelists*

  • @thispacifist9004
    @thispacifist9004 2 года назад

    John your having a laugh arent you with this? I like watching your videos because you are informative. You said at the beginning this was an easy challenge, yet you copy and pasted someone else's code.

  • @MrGeekGamer
    @MrGeekGamer 2 года назад

    I dropped PHP 19 years ago, because I was awful then and it's still awful now. Stop using PHP.

    • @tutorialsacc7314
      @tutorialsacc7314 2 года назад

      no its not

    • @MrGeekGamer
      @MrGeekGamer 2 года назад

      @@tutorialsacc7314 I won't argue with you, because you're clearly an idiot if you're simping for PHP in 2022.

  • @cirklare
    @cirklare 2 года назад +1

    I told you PHP is very vulnerable language
    Also php 5.3 has RCE exploit
    Another php vulnerability
    PHP CGI argument injection

    • @toifel
      @toifel 2 года назад +13

      PHP 5.3 is older than RUclips and this backdoor is using a "-dev" build which no sane person would ever use in production.
      I'm not even using PHP, but you obviously don't have any clue what you're even talking about.

    • @whetfaartz6685
      @whetfaartz6685 2 года назад +1

      @@toifel lol you didn't have to do him like that

  • @tagKnife
    @tagKnife 2 года назад

    still using nmap rather then zmap. 2000 called they want their shell script kiddies back.

  • @alezad57121
    @alezad57121 2 года назад

    this is good, enjoyment.exe 😊

  • @wolfmafia5621
    @wolfmafia5621 2 года назад

    Ah man tryhackme is so fun. Thanks you for developing some fun challenges for us.