Web Post Exploitation Neonify HTB Challenge

Поделиться
HTML-код
  • Опубликовано: 27 авг 2024
  • Web Exploitation 3/30

Комментарии • 7

  • @anuzravat
    @anuzravat 22 дня назад +1

    why does it takes new line ?

    • @Black1_1Hat
      @Black1_1Hat  21 день назад +1

      When dealing with web exploits and request formatting, a new line or space after a variable name can often be significant. This is because web servers and applications may interpret input differently based on formatting.
      In some cases, a new line might be included in a request to bypass certain filters or to alter how the input is processed. For instance, if you're injecting an exploit into a variable, adding a new line might help in separating the exploit from the rest of the request, which can be crucial for ensuring that the exploit is executed as intended.
      If you see a new line after `name='name'` in your exploit, it could be a deliberate tactic to manipulate how the server handles your input or to test how different parts of the request are parsed.
      In summary, while it might seem like an extra detail, the inclusion of a new line or space can have a meaningful impact on how exploits are executed and how your input is processed by the server.

    • @anuzravat
      @anuzravat 20 дней назад

      @@Black1_1Hat i see, tyvm for replying.. so it was meant to be a urlencoded
      and not a
      ykwim.. more of a script kiddie rn, trying to learn fundamentals.. thanks

    • @Black1_1Hat
      @Black1_1Hat  18 дней назад +1

      Hi @anuzravat,
      You're welcome! Yes, URL-encoding the newline character (
      ) as %0A is the correct approach. I’m glad I could help clarify that.
      It’s great to see you diving into the fundamentals of web development. Everyone starts somewhere, and learning the basics is an important step. If you have any more questions or need further assistance, feel free to ask. Keep up the good work!

    • @anuzravat
      @anuzravat 18 дней назад

      @@Black1_1Hat do you have a discord server or telegram group?

  • @Noman22410
    @Noman22410 9 месяцев назад

    Why doing the exact same thing in burp repeater's doesn't work while in firefox it does

    • @Black1_1Hat
      @Black1_1Hat  3 месяца назад

      When using Firefox to send data in a web exploit, it's important to note that Firefox automatically URL-encodes the data. This means that any special characters, including new lines, spaces, or other characters that could affect the payload, will be converted to their URL-encoded equivalents.
      To address this, you should manually encode your payload to URL encoding before sending it. By doing this, you ensure that special characters in your exploit are properly formatted and will be interpreted correctly by the server.
      In other words, encode your payload to URL encoding first, and then send it through burp. This approach should help in successfully executing your exploit. Inchallah (God willing), it will work as expected.