GoogleCTF - Cross-Site Scripting "Pasteurize"

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 165

  • @frankfernandez1957
    @frankfernandez1957 4 года назад +80

    John: Im a newbie, still have a lot to learn
    Me: *sobs*

  • @granitbajraktari1600
    @granitbajraktari1600 3 года назад +26

    Just a heads-up: at 19:40, when you wanted to only POST to the first URL and then follow the redirect without POST, you could have just dropped the "-X POST", since "-d" already implies POST, and curl would have followed to the redirected URL with GET.

  • @mrhappysmiley2968
    @mrhappysmiley2968 4 года назад +28

    This was incredible! Loved it! Never seen a challenge like this. This was very valuable to me. Please make more.

  • @LESLEYYY0
    @LESLEYYY0 4 года назад +37

    Would love to see you do the other ones :p

  • @BCRooke1
    @BCRooke1 4 года назад +21

    The b/1337 is just a reference to a bug ID. At Google they use an internal bug tracking tool called buganizer, and short links are in the form of b/bug-id. Usually you see this in the code: TODO(b/5746327): fix foo

    • @ancestrall794
      @ancestrall794 2 года назад +5

      I thought 1337 meant LEET

    • @userou-ig1ze
      @userou-ig1ze 2 года назад +1

      @@ancestrall794 that is what it stands for...

  • @novanuke1356
    @novanuke1356 4 года назад +7

    I think I need to start reading more writeups. I've always tried to do a CTF and if I can't get it after trying for some time I guess I usually walk away and I end up not actually learning from the CTF which is the point. Great video man!

  • @christianrang5782
    @christianrang5782 4 года назад +16

    I really enjoyed seeing the thought process. This was one I was super close to solving, but I'm a noob at XSS. I didn't know any cool tricks like shown in the vid.
    Keep up the great content!

  • @LUKESLYTALKER
    @LUKESLYTALKER 4 года назад +44

    I’m getting buff doing all these cURLs bro!

  • @SiyuJiang
    @SiyuJiang 4 года назад +3

    Your content is great. It’s easy to follow, and I really like the perspective that we get when you show how you think through the challenges

  • @rodrigo1300
    @rodrigo1300 Год назад

    A lot of people out there try to portrait something that they aren't and seeing someone like you being honest about not solving this CTF. Respect

  • @padaloni
    @padaloni 4 года назад +3

    That was actually super awesome. Thanks heaps my bro. love your honesty. that was not an easy challenge. you're such a smart dude it's kinda nice to see you need the help of others too.

  • @mossdem
    @mossdem 3 года назад +3

    This really helped understand XXS properly. Now I feel I can learn a little more! I would love to see a little shortcuts video. You fly around a terminal and subl! Maybe even just a little write-up, just a thought but great video

  • @Brontosauredumarais
    @Brontosauredumarais 4 года назад +1

    Thanks John, super interesting! Can’t wait to see the new challenges you are preparing!

  • @ibragimabdulazizli4230
    @ibragimabdulazizli4230 2 года назад

    Wow! You are the one who leads to how to think as a hacker. I searched looots of sources to learning CS. And you are my fav. Thankss

  • @maoropizzagalli4153
    @maoropizzagalli4153 4 года назад

    Glad to see I'm not the only one you get discouraged when those things happens.
    Lesson learned I hope, Thank you papa for the teaching

  • @claythearc8342
    @claythearc8342 4 года назад +1

    You may have answered this later in the video but b/1337 or any number is generally just shorthand for Bug 1337 or Bug whatever that's being tracked on some external issue tracker.

  • @krlst.5977
    @krlst.5977 4 года назад

    Real good explanation, i came here from LiveOverflow where he covered this CTF and mentioned yours explanation and, no offense for LiveOverflow :-), now i got it much clearly. Thank you!

  • @cam545
    @cam545 4 года назад +49

    I'm here for the F U L L F R O N T A L honesty. 13:30

  • @ch33zer
    @ch33zer 4 года назад +2

    The b/1337 refers to a bug on Google's internal bug tracker, commonly accessed on the intranet at b/$bugid. I'm surprised they left this in for an external event. Source: I'm a google employee :)

  • @Stupid_Money
    @Stupid_Money 2 года назад +1

    Definitely a good beginning point to have your video on ctf. I just became proficient in Javascript a couple months ago and being able to follow along with this task really motivated me!

  • @captainsalazar7166
    @captainsalazar7166 4 года назад +2

    Sir please tell us how did you install that sublime build view? I am looking for it but couldn't install it. I am using sublime text 3

  • @harshrai6259
    @harshrai6259 3 года назад +1

    Really insightful video 👍 and now I want the pleasure of finding those flags
    I feel so lucky to have a node js and js background

  • @gaurav1565
    @gaurav1565 4 года назад +1

    It'll be really nice if you did the other web challenges as well. More than the solution seeing the rabbit holes and methodology of sorts is really important.

  • @ryansoma6782
    @ryansoma6782 4 года назад

    Thank you ! , can't wait for another google ctf web challenge video !

  • @exoooooooo
    @exoooooooo 4 года назад

    You are very kind and humbly willing, to tell the truth when you solve this with the help of others. It's not like someone there who considers himself as "a hacker that your friends told you about" but is only good at making videos and making up a tale.

  • @KaleshwarVhKaleshwarVh
    @KaleshwarVhKaleshwarVh 4 года назад +3

    I lost it when cookie and hookbin came up. I'm weak there.

  • @ratatouille7301
    @ratatouille7301 4 года назад +5

    Hello, thanks for this video. How did you know about the "[ ]" in the "content[ ]" ? How can I find it if I'v never seen it ?

    • @Dogelition
      @Dogelition 4 года назад +1

      If you look at the body-parser documentation here: www.npmjs.com/package/body-parser
      It says "The extended option allows to choose between parsing the URL-encoded data with the querystring library (when false) or the qs library (when true). [...] For more information, please see the qs library.
      If you follow that link, you can see a bunch of examples for how it lets you parses variou query strings into objects/arrays.

  • @nft_explorer
    @nft_explorer 4 года назад +1

    You are so so good man, its interesting to watch your videos and learn from you.

  • @yoshi5113
    @yoshi5113 4 года назад

    Thanks u Sir.. love the way you explain all the stuff 👏👏👏

  • @somebodystealsmyname
    @somebodystealsmyname 4 года назад +7

    Hey John, take a look at webhook.site, I think the UI is much more intuitive for XSS/SSRF/CSRF.

    • @eeengoh5189
      @eeengoh5189 4 года назад

      It doesn't work on hookbin for me for some reason, but webhook does ! Thanks for the recommandation !

  • @liamlouw4643
    @liamlouw4643 4 года назад

    John ima need you to chill on these videos, my sleep schedule can't take it!! Loving them man, really fun to see your thought process!

  • @newuser2474
    @newuser2474 4 года назад

    First time motivated by watching your video

  • @dylanhess4906
    @dylanhess4906 4 года назад

    Thank you for this video please post more of these

  • @rafaelgontijo5792
    @rafaelgontijo5792 2 года назад

    Absolute amazing!

  • @akashrakshit8446
    @akashrakshit8446 3 года назад

    Wow dude thanks 👍🙏🏾 loved it

  • @KDevGaming1921
    @KDevGaming1921 3 года назад

    Thank you for this learned a lot from this video.

  • @krlst.5977
    @krlst.5977 4 года назад

    The one question how it supposed to get where issue is by this "b/1337"? I know it means leet but how it leads to JSON.stringify row of the code, can someone explain please?

  • @tecdom
    @tecdom 3 года назад

    Muito bom!!!!! Grato por compartilhar seu conhecimento. Aprendo muito com seus vídeos.

  • @ta8ta841
    @ta8ta841 4 года назад

    more google CTFs will be appreciable

  • @abhisurwade
    @abhisurwade 4 года назад +1

    Appreciate the video walkthrough.

  • @JustFun-dj3pq
    @JustFun-dj3pq 4 года назад

    Great walk through, love your video

  • @orange6946
    @orange6946 4 года назад +1

    Actually really interesting. It did strike me as odd that he used JSON.stringify when there was really no need, but I would have never looked much farther than that. Good content!

  • @q-bert558
    @q-bert558 3 года назад

    Thus was incredible!!

  • @adhilazeez6039
    @adhilazeez6039 4 года назад

    Awsome bro... You're inspiring us... Thank you.

  • @Dogelition
    @Dogelition 4 года назад

    I think the Tracing challenge would make for another great walkthrough video!

  • @arshiyakhan6789
    @arshiyakhan6789 4 года назад

    Thank you bring more these kinds of ctfs and python scripting.

  • @rootdev8106
    @rootdev8106 4 года назад

    At first I assumed the solution was to post because .slice(1, -1) would only remove the outer ;) Nice video, keep it up!

  • @ServusChristi777
    @ServusChristi777 Год назад +2

    Ed Sheeran really is talented.

  • @4ag2
    @4ag2 4 года назад

    Amazing content always! I struggled so much last weekend hopefully I learned a lot!!! thnx

  • @dlcrdz00
    @dlcrdz00 3 года назад +1

    wow...it always amazes me how much information and syntax you input for the CTF. How did you learn all this stuff? haha

  • @ElliyahuRosha
    @ElliyahuRosha 4 года назад

    Hi, john.
    Can u point me to an article which discusses when tp use request.session() and when request.get/post() ?
    Thx

  • @xFreeman4
    @xFreeman4 4 года назад

    Pretty Nutz! Keep up the good work man!

  • @Wakkas
    @Wakkas 4 года назад

    Hey John, I'm an officer for the Cyber Security club at my university. We would love if you could come in for 30 minutes and give a talk about some pen testing or any networking exploits that are interesting to you!

    • @_JohnHammond
      @_JohnHammond  4 года назад

      Feel free to send me an e-mail, I'm always happy to hang out! :)

  • @Ulyeney
    @Ulyeney 2 года назад

    Thanks, John

  • @ziil7525
    @ziil7525 2 года назад

    very cool ctf real video, thanks man.

  • @nmg555w
    @nmg555w 4 года назад

    note that sending the object using the url encoded parameter is only possible because of the `extended=True` bit below the comment saying "we need this for the captcha for some reason" :) (understanding this was for me the clue that helped me solve the challange)

  • @h8handles
    @h8handles 4 года назад

    My name is, what? My name is who? *imitates turntables zickazicka john hammond *to the tune of my name is slim shady*

  • @tenex
    @tenex 2 года назад

    I really liked but I got list and cannot understand how figured out the double slash

  • @bruh_5555
    @bruh_5555 4 года назад

    Why does log-me-in above pasteurize in the challenge list have only 7 points or has it been solved by too many people or my eyes aren't working??

  • @karanagarwal282
    @karanagarwal282 4 года назад

    Please provide links to the writeups you are talking about....

  • @siddharthjohri2935
    @siddharthjohri2935 4 года назад +1

    Very Nice video just as always. Stay frosty.🥶

  • @Hexbyte965
    @Hexbyte965 4 года назад +3

    Awww, I missed the live stream.

  • @nessiev780
    @nessiev780 4 года назад +1

    Hmm, i really dont have a clue about anything going on here, but i still watched it

  • @peterarbeitsloser7819
    @peterarbeitsloser7819 4 года назад

    #commenting_for_the_algorithm
    You are great John!

  • @kyngcytro
    @kyngcytro 4 года назад +1

    Dude I didn't even know something like hookbin exists thanks John and yes I'm a John too 😅

  • @moriartyshelby1618
    @moriartyshelby1618 4 года назад +6

    something never be changed..: "Hello, my name is John Hammond.."..NICE

  • @shivambeeyani6758
    @shivambeeyani6758 4 года назад

    for the algo
    Always love your videos, especially because I'm shit in web challenges

  • @Hanhan099
    @Hanhan099 4 года назад +2

    we want more

  • @nicktm2005
    @nicktm2005 3 года назад

    great tutorial ... like always ... thank you

  • @jimanky
    @jimanky 4 года назад

    Thank you so much for sharing your knowledge.
    +1 sub

  • @ChupoCro
    @ChupoCro 4 года назад

    How come the microphone character 🎤 @7:10 in your Sublime is in color?

  • @erickgiffoni
    @erickgiffoni 4 года назад

    that was very cool ! thanks !

  • @mahfuzkabir7812
    @mahfuzkabir7812 2 года назад

    This was great!

  • @Smilin_Chris
    @Smilin_Chris 4 года назад +6

    Commentingforthealgorithm

  • @matthewshen
    @matthewshen 4 года назад

    This was the only challenge I got. Can you also explain some other challenges as well?

  • @website8362
    @website8362 4 года назад

    Writeups ❤️

  • @maxxxy910
    @maxxxy910 4 года назад

    YESS PLEASE DOO MORE OF THESEE PLEASSEEEEEE!!!!!!!!!

  • @amellcotts6650
    @amellcotts6650 4 года назад

    Please continue doing those.

  • @immyslave2952
    @immyslave2952 3 года назад

    thank you so much!!!

  • @muhammadbellabuaynunyai2754
    @muhammadbellabuaynunyai2754 4 года назад

    I love you solved this problem

  • @darklord_656
    @darklord_656 4 года назад

    Sir can u also explain both rev and pwning in google ctf . Please

  • @tears_falling
    @tears_falling 4 года назад

    feels good to know node

  • @krzysztof-ws9og
    @krzysztof-ws9og 4 года назад

    Personally I ended by not knowing how to send an object to the server and get out of the quetes, but sending cookie would probably be the second injected js ( right after alert(1); )

  • @karimmohamed3744
    @karimmohamed3744 4 года назад

    Loved it

  • @bazboz1468
    @bazboz1468 3 года назад

    not disrespect you, but mid vod i had this idea 💡 of a drinkin game, when ever you say peculiar we take a shot 🥃 now i continu watching i love what you doing btw keep up the good work ❤️

  • @mr.meatbeat9894
    @mr.meatbeat9894 Год назад

    Thanks dude!

  • @NoONE-bk7ud
    @NoONE-bk7ud 2 года назад

    i like how said i'm not that good

  • @abhinavkishoregv273
    @abhinavkishoregv273 4 года назад

    aswm broooo

  • @amir.m5550
    @amir.m5550 2 года назад

    you are great.👍

  • @gopalmore315
    @gopalmore315 4 года назад

    Excellent

  • @R4B3326
    @R4B3326 4 года назад

    Missed the live Stream, but loved the video!

  • @msalih
    @msalih 4 года назад

    awesome!

  • @techchannel3107
    @techchannel3107 3 года назад

    hey pls replied me why d you use usr/bin/python3 . we need in kali linux?

    • @sheepy0125
      @sheepy0125 2 года назад

      that's the path to the python3 executable file

  • @whistletoe
    @whistletoe 4 года назад

    keep up the good work!

  • @inginerdemulslapte9378
    @inginerdemulslapte9378 4 года назад

    Johnito, thank you for you video!!!11!!!!

  • @henriqueramos3816
    @henriqueramos3816 4 года назад

    why put "[]" after "content" it work?

  • @MrJCollector
    @MrJCollector 4 года назад

    Please do the REV beginner ones!

  • @vuongnguyen-yo7lv
    @vuongnguyen-yo7lv 4 года назад

    COOL!

  • @mina_ashraf
    @mina_ashraf 4 года назад +3

    Hey John, Amazing content as usual. I have a small question, where would you recommend for a python beginner to learn the necessary libraries and tools? Do you suggest a specific course or a website to learn the tools that you usually use such as pwntools, Crypto, requests, and so on? C++ is just not the tool for something like this

  • @varunkumar3361
    @varunkumar3361 4 года назад

    please make a complete one.