hey so I've got a quick question, noticed that this logger hack works when exitMsg is used, but doesn't write anything when you use innitMsg any clue what thats about?
@HMCyberAcademy16 күн бұрын
interesting!! If you see the complete code, there are 2 functions. _construct() and _destruct(). Please check time 11:23 in video. _construct() function has initMsg() _destruct() function has exitMsg() When we _construct() a serialized object and send it to server, the only function that acts in server is _destruct(). It cannot double construct our serialized object. isn't it? So, initMsg never gets a chance to execute. Hope that's clear. If any further queries let me know.
@ajayvekariya420523 күн бұрын
sir please can i get a manual of this video?
@N4t0rАй бұрын
thx really helped old guides were just using white spaces which doesnt work anymore so the %00 character idea really helped 🤝 also liked the easy to go along explanation
@lovroxyz311917 күн бұрын
huh... thats rly Weird... i just did it using white spaces
@navinr5121Ай бұрын
Thanks for sharing videos
@HarshitMalhotra_Ай бұрын
Nicely explained
@XedmilАй бұрын
Thank you 🙏
@thelampheadАй бұрын
Thanks for explaining so wisely.😊
@PouriaJafari-e1vАй бұрын
thanks bro you are the best god bless you
@Gp92i1Ай бұрын
Thanks again for your videos. I have a problem with Narnia5, I can't increment "i" as expected by the commands. I arrived at this step and the address of i is indeed "0xffffd310". When I run this command, I get the expected result: narnia5@gibson:/narnia$ ./narnia5 $(echo -e "\x10\xd3\xff\xff")\%n Change i's value from 1 -> 500. No way...let me give you a hint! buffer: [ ] (4) i = 4 (0xffffd310) The value of "i" is correctly incremented. But when I go to the next step, I no longer have the increment of "i" (should be i==24) and the address of "i" changes??: narnia5@gibson:/narnia$ ./narnia5 $(echo -e "\x10\xd3\xff\xff")%20x%1\$n Change i's value from 1 -> 500. No way...let me give you a hint! buffer: [ ffffd310] (24) i = 1 (0xffffd300) Can you help me my friend? THANKS.
@Gp92i1Ай бұрын
I thank you for your videos, it took level 6 for me to understand that your commands did not work on my session?? This command, for example, (gdb) run 'echo -e "AAAAAAAAA\x30\xd4\xdc\xf7" "BBBBBBBBls"' does not return me the expected result?? I had to do: (gdb) run $(echo -e "AAAAAAAA\x30\xd4\xdc\xf7" "BBBBBBBBls") for it to work?? If you have an explanation, I'm interested. Thank you.
@HMCyberAcademyАй бұрын
Thanks for feedback. You're welcome. In the video I have given 8 A's in the payload. Please check 9:35 . And I think you're talking about the single quote. and $ symbol. But What I have done in the video is, I gave a back tick ` This is different from single quote. This symbol is above the tab key in keyboard. This symbol also pre-processes the commands like the subshell $(command) == `command` != 'command'
Great explanation dude! Can you please tell me how did you learn the maths required for Cryptography CTFs?
@HMCyberAcademyАй бұрын
Well. That's a difficult question. When I was 5 yrs old in school, my class teacher was solving some arithematic and didn't get the right answer. I said "ma'am you're doing it wrong, there is a -ve sign missing on 2nd step." Ma'am got mad(ego) and sent me out of class. Then I went to my room and started solving overthewire and HTB machines. Then all those individual labs gave me tiny tiny dots of knowledge in logic and math, which i was able to connect and now see the big picture of problem solving. Once I know the rules of the game, I was able to figure out how to play. I just had to sit and take it one step at a time. I didn't have to learn from school or university or anyone else. Everything was available to me in the form of vulnerable labs. PS: True story.
@satyanarayana9297Ай бұрын
That was a Nice Explanation!!
@ishaanagarwal75042 ай бұрын
what is this roleid tag? is it a part of cookies ? or what? and why cant we listen it using intercept if it is sent by the server. please help
@HMCyberAcademyАй бұрын
You can listen to it using intercept, but you have to first turn on the setting "intercept responses". roleid(Role ID) is not part of cookies, but it is just a parameter that we identified from the response. Now, we tested to see if that parameter can be updated if I add it in the request. We can. In a secured application, we are not supposed to change the roleid of any user. Since, we can do that, there is huge access control issue. We can be any user, even administrator. But we don't know the exact role id number. We guess the number like 0,1,2,3 .... to get to higher privileges. Hope that clears your doubt.
@irun2jump2 ай бұрын
okay okay okay :D
@MohamedAbisheikmohamedali2 ай бұрын
bro is asking a keyupdate in level 16 - level 17 and what i do pls replay
@tbltjrd39182 ай бұрын
very good explanations sir thank you
@HackWithSayed2 ай бұрын
Thank you.... I completed all the labs after watching your videos
@DevkiDhoni-jw4km2 ай бұрын
Okk 😂😍
@Rahmat-e-kuchch2 ай бұрын
Dear Amazing hacker, Thanks for the tutorial, how we can get the token or code in burpsuite only
@HMCyberAcademy2 ай бұрын
If you followed same steps in this tutorial, then you can get the code in burpsuite like this: Select any GET request from the same website. Send it to repeater. Change the endpoint (or URL) to "/files/avatars/virus.php" and send it.
@ET-pn4mk2 ай бұрын
what if you did not know the /etc/natas_webpass directory existed, is there a way to "ls" the /etc dir without use of the ";"?
@HMCyberAcademy2 ай бұрын
The server side code doesn't allow symbols [;|&] . but you can try the following using wild cards. grep -i a /etc/*/natas* dictionary.txt grep -i a /*/*natas* dictionary.txt
@ivanpetrov17462 ай бұрын
Сколько смотрел решений этого задания, везде использовался пробел - и это не работало. %00 - это соль всей атаки. Благодарю.
@ET-pn4mk2 ай бұрын
Great video, I like how you actually explain what you are doing and what the commands are doing.
@Rahmat-e-kuchch2 ай бұрын
Thanks IItian, how i can see this flag in the burp?
@HMCyberAcademy2 ай бұрын
If you have followed all the steps here, then send any GET request in this website to repeater, then change the endpoint to "/files/virus.php" and send it.
@saurabhkulkarni11762 ай бұрын
wow this is surprise for me thank you so much sir
@Jamaal_Ahmed2 ай бұрын
❤🎉 .
@ak01ops32 ай бұрын
idk why but no matter what i try i always get failed to open stream: internal corruption of phar (truncated manifest header) even when i copied the text axactly as in the video but the moment i send phar://natas.phar/test.php it works, it's probably the same upload from this dude that haven't been overridden yet, but i wonder why? internal bug maybe?
@RitwikBhattacharya-k6u2 ай бұрын
good explain but you talk too much.
@saurabhkulkarni11762 ай бұрын
awesome lecture sir thank you so much
@mavrick232 ай бұрын
you are a gem of a person <3 but sir what about people who are new to it and just have pocket money around 10 to 15k, how can we utitlize this? ..
@HMCyberAcademy2 ай бұрын
It doesn't work with small amounts, as each trade is atleast 10$. So, minimum amount should be like 100 times the least amount you can trade, i.e, 1k$ . But It is better to have atleast 5k$ to see optimum results.
@mavrick232 ай бұрын
@@HMCyberAcademy well ok sir will save some amount and get back to you ! thankyou sir
@saurabhkulkarni11762 ай бұрын
sir next banao na please ?
@HMCyberAcademy2 ай бұрын
Okay. Next video in this series will come on saturday.
@saurabhkulkarni11762 ай бұрын
thankyou so much sir
@AdedayoEnoch3 ай бұрын
historyyyy😂... Good explanation 👍
@bislash3 ай бұрын
amazing work keep it up
@jaldiwahasehato_tora3 ай бұрын
i did the same actually but even after changing the role of wiener to admin the lab still says not solved what's the issue
@showkassangbo33863 ай бұрын
Your explanation is clear and easy to understand. Thanks and keep uploading
@HhhaHhhy3 ай бұрын
great explaination , thanks from iraq
@HhhaHhhy3 ай бұрын
very good explanation, thanks from iraq
@saurabhkulkarni11763 ай бұрын
please sir make next part
@alialmasry83323 ай бұрын
king
@gj95853 ай бұрын
Amazing
@yousef34643 ай бұрын
Thanks for the nice explanation
@anishvk653 ай бұрын
Nice bro
@mohanrajrj82393 ай бұрын
Browser name
@HMCyberAcademy3 ай бұрын
Firefox. It can be done from any browser.
@mohanrajrj82393 ай бұрын
Bro how to put on proxy
@HMCyberAcademy3 ай бұрын
You have to install a browser extension called "Foxy proxy" It can be found in any browser. Once installed, you need to run burpsuite and then enable foxy proxy and configure foxy proxy to keep IP 127.0.0.1 and port 8080. Because burpsuite acts as proxy in port 8080 by default. Then you can see all traffic in browser going through burpsuite.
@leslywarnakulasuriya90223 ай бұрын
Thank you so much
@Usernumberamillion4 ай бұрын
Thank you so much for this amazing series of portswigger lab solving 👏🏻🙏🏻