EARN WHILE YOU SLEEP!!!
13:54
2 ай бұрын
TwoMillion | Easy | Linux Machine
37:32
Lame | Easy | Linux Machine
6:24
5 ай бұрын
Bandit [Complete] | OverTheWire
4:26:26
Mr Robot CTF | TryHackMe
33:54
5 ай бұрын
Natas [Complete] | OverTheWire
8:11:31
Narnia [Complete] | OverTheWire
2:06:14
Пікірлер
@FriikkiAki123
@FriikkiAki123 Күн бұрын
Great video!👍
@FriikkiAki123
@FriikkiAki123 2 күн бұрын
Much appreciated! Thanks a lot.
@KhodingTata
@KhodingTata 17 күн бұрын
awesome work, thank you.
@Happy_forever665
@Happy_forever665 17 күн бұрын
You are the best
@HMCyberAcademy
@HMCyberAcademy 16 күн бұрын
Thanks
@lovroxyz3119
@lovroxyz3119 17 күн бұрын
hey so I've got a quick question, noticed that this logger hack works when exitMsg is used, but doesn't write anything when you use innitMsg any clue what thats about?
@HMCyberAcademy
@HMCyberAcademy 16 күн бұрын
interesting!! If you see the complete code, there are 2 functions. _construct() and _destruct(). Please check time 11:23 in video. _construct() function has initMsg() _destruct() function has exitMsg() When we _construct() a serialized object and send it to server, the only function that acts in server is _destruct(). It cannot double construct our serialized object. isn't it? So, initMsg never gets a chance to execute. Hope that's clear. If any further queries let me know.
@ajayvekariya4205
@ajayvekariya4205 23 күн бұрын
sir please can i get a manual of this video?
@N4t0r
@N4t0r Ай бұрын
thx really helped old guides were just using white spaces which doesnt work anymore so the %00 character idea really helped 🤝 also liked the easy to go along explanation
@lovroxyz3119
@lovroxyz3119 17 күн бұрын
huh... thats rly Weird... i just did it using white spaces
@navinr5121
@navinr5121 Ай бұрын
Thanks for sharing videos
@HarshitMalhotra_
@HarshitMalhotra_ Ай бұрын
Nicely explained
@Xedmil
@Xedmil Ай бұрын
Thank you 🙏
@thelamphead
@thelamphead Ай бұрын
Thanks for explaining so wisely.😊
@PouriaJafari-e1v
@PouriaJafari-e1v Ай бұрын
thanks bro you are the best god bless you
@Gp92i1
@Gp92i1 Ай бұрын
Thanks again for your videos. I have a problem with Narnia5, I can't increment "i" as expected by the commands. I arrived at this step and the address of i is indeed "0xffffd310". When I run this command, I get the expected result: narnia5@gibson:/narnia$ ./narnia5 $(echo -e "\x10\xd3\xff\xff")\%n Change i's value from 1 -> 500. No way...let me give you a hint! buffer: [ ] (4) i = 4 (0xffffd310) The value of "i" is correctly incremented. But when I go to the next step, I no longer have the increment of "i" (should be i==24) and the address of "i" changes??: narnia5@gibson:/narnia$ ./narnia5 $(echo -e "\x10\xd3\xff\xff")%20x%1\$n Change i's value from 1 -> 500. No way...let me give you a hint! buffer: [ ffffd310] (24) i = 1 (0xffffd300) Can you help me my friend? THANKS.
@Gp92i1
@Gp92i1 Ай бұрын
I thank you for your videos, it took level 6 for me to understand that your commands did not work on my session?? This command, for example, (gdb) run 'echo -e "AAAAAAAAA\x30\xd4\xdc\xf7" "BBBBBBBBls"' does not return me the expected result?? I had to do: (gdb) run $(echo -e "AAAAAAAA\x30\xd4\xdc\xf7" "BBBBBBBBls") for it to work?? If you have an explanation, I'm interested. Thank you.
@HMCyberAcademy
@HMCyberAcademy Ай бұрын
Thanks for feedback. You're welcome. In the video I have given 8 A's in the payload. Please check 9:35 . And I think you're talking about the single quote. and $ symbol. But What I have done in the video is, I gave a back tick ` This is different from single quote. This symbol is above the tab key in keyboard. This symbol also pre-processes the commands like the subshell $(command) == `command` != 'command'
@Ritzzz_Ke_Vlogs
@Ritzzz_Ke_Vlogs Ай бұрын
ye lo bhai kar lo copy [ "123456", "password", "12345678", "qwerty", "123456789", "12345", "1234", "111111", "1234567", "dragon", "123123", "baseball", "abc123", "football", "monkey", "letmein", "shadow", "master", "666666", "qwertyuiop", "123321", "mustang", "1234567890", "michael", "654321", "superman", "1qaz2wsx", "7777777", "121212", "000000", "qazwsx", "123qwe", "killer", "trustno1", "jordan", "jennifer", "zxcvbnm", "asdfgh", "hunter", "buster", "soccer", "harley", "batman", "andrew", "tigger", "sunshine", "iloveyou", "2000", "charlie", "robert", "thomas", "hockey", "ranger", "daniel", "starwars", "klaster", "112233", "george", "computer", "michelle", "jessica", "pepper", "1111", "zxcvbn", "555555", "11111111", "131313", "freedom", "777777", "pass", "maggie", "159753", "aaaaaa", "ginger", "princess", "joshua", "cheese", "amanda", "summer", "love", "ashley", "nicole", "chelsea", "biteme", "matthew", "access", "yankees", "987654321", "dallas", "austin", "thunder", "taylor", "matrix", "mobilemail", "mom", "monitor", "monitoring", "montana", "moon", "moscow" ]
@aaryan1143
@aaryan1143 Ай бұрын
Great explanation dude! Can you please tell me how did you learn the maths required for Cryptography CTFs?
@HMCyberAcademy
@HMCyberAcademy Ай бұрын
Well. That's a difficult question. When I was 5 yrs old in school, my class teacher was solving some arithematic and didn't get the right answer. I said "ma'am you're doing it wrong, there is a -ve sign missing on 2nd step." Ma'am got mad(ego) and sent me out of class. Then I went to my room and started solving overthewire and HTB machines. Then all those individual labs gave me tiny tiny dots of knowledge in logic and math, which i was able to connect and now see the big picture of problem solving. Once I know the rules of the game, I was able to figure out how to play. I just had to sit and take it one step at a time. I didn't have to learn from school or university or anyone else. Everything was available to me in the form of vulnerable labs. PS: True story.
@satyanarayana9297
@satyanarayana9297 Ай бұрын
That was a Nice Explanation!!
@ishaanagarwal7504
@ishaanagarwal7504 2 ай бұрын
what is this roleid tag? is it a part of cookies ? or what? and why cant we listen it using intercept if it is sent by the server. please help
@HMCyberAcademy
@HMCyberAcademy Ай бұрын
You can listen to it using intercept, but you have to first turn on the setting "intercept responses". roleid(Role ID) is not part of cookies, but it is just a parameter that we identified from the response. Now, we tested to see if that parameter can be updated if I add it in the request. We can. In a secured application, we are not supposed to change the roleid of any user. Since, we can do that, there is huge access control issue. We can be any user, even administrator. But we don't know the exact role id number. We guess the number like 0,1,2,3 .... to get to higher privileges. Hope that clears your doubt.
@irun2jump
@irun2jump 2 ай бұрын
okay okay okay :D
@MohamedAbisheikmohamedali
@MohamedAbisheikmohamedali 2 ай бұрын
bro is asking a keyupdate in level 16 - level 17 and what i do pls replay
@tbltjrd3918
@tbltjrd3918 2 ай бұрын
very good explanations sir thank you
@HackWithSayed
@HackWithSayed 2 ай бұрын
Thank you.... I completed all the labs after watching your videos
@DevkiDhoni-jw4km
@DevkiDhoni-jw4km 2 ай бұрын
Okk 😂😍
@Rahmat-e-kuchch
@Rahmat-e-kuchch 2 ай бұрын
Dear Amazing hacker, Thanks for the tutorial, how we can get the token or code in burpsuite only
@HMCyberAcademy
@HMCyberAcademy 2 ай бұрын
If you followed same steps in this tutorial, then you can get the code in burpsuite like this: Select any GET request from the same website. Send it to repeater. Change the endpoint (or URL) to "/files/avatars/virus.php" and send it.
@ET-pn4mk
@ET-pn4mk 2 ай бұрын
what if you did not know the /etc/natas_webpass directory existed, is there a way to "ls" the /etc dir without use of the ";"?
@HMCyberAcademy
@HMCyberAcademy 2 ай бұрын
The server side code doesn't allow symbols [;|&] . but you can try the following using wild cards. grep -i a /etc/*/natas* dictionary.txt grep -i a /*/*natas* dictionary.txt
@ivanpetrov1746
@ivanpetrov1746 2 ай бұрын
Сколько смотрел решений этого задания, везде использовался пробел - и это не работало. %00 - это соль всей атаки. Благодарю.
@ET-pn4mk
@ET-pn4mk 2 ай бұрын
Great video, I like how you actually explain what you are doing and what the commands are doing.
@Rahmat-e-kuchch
@Rahmat-e-kuchch 2 ай бұрын
Thanks IItian, how i can see this flag in the burp?
@HMCyberAcademy
@HMCyberAcademy 2 ай бұрын
If you have followed all the steps here, then send any GET request in this website to repeater, then change the endpoint to "/files/virus.php" and send it.
@saurabhkulkarni1176
@saurabhkulkarni1176 2 ай бұрын
wow this is surprise for me thank you so much sir
@Jamaal_Ahmed
@Jamaal_Ahmed 2 ай бұрын
❤🎉 .
@ak01ops3
@ak01ops3 2 ай бұрын
idk why but no matter what i try i always get failed to open stream: internal corruption of phar (truncated manifest header) even when i copied the text axactly as in the video but the moment i send phar://natas.phar/test.php it works, it's probably the same upload from this dude that haven't been overridden yet, but i wonder why? internal bug maybe?
@RitwikBhattacharya-k6u
@RitwikBhattacharya-k6u 2 ай бұрын
good explain but you talk too much.
@saurabhkulkarni1176
@saurabhkulkarni1176 2 ай бұрын
awesome lecture sir thank you so much
@mavrick23
@mavrick23 2 ай бұрын
you are a gem of a person <3 but sir what about people who are new to it and just have pocket money around 10 to 15k, how can we utitlize this? ..
@HMCyberAcademy
@HMCyberAcademy 2 ай бұрын
It doesn't work with small amounts, as each trade is atleast 10$. So, minimum amount should be like 100 times the least amount you can trade, i.e, 1k$ . But It is better to have atleast 5k$ to see optimum results.
@mavrick23
@mavrick23 2 ай бұрын
@@HMCyberAcademy well ok sir will save some amount and get back to you ! thankyou sir
@saurabhkulkarni1176
@saurabhkulkarni1176 2 ай бұрын
sir next banao na please ?
@HMCyberAcademy
@HMCyberAcademy 2 ай бұрын
Okay. Next video in this series will come on saturday.
@saurabhkulkarni1176
@saurabhkulkarni1176 2 ай бұрын
thankyou so much sir
@AdedayoEnoch
@AdedayoEnoch 3 ай бұрын
historyyyy😂... Good explanation 👍
@bislash
@bislash 3 ай бұрын
amazing work keep it up
@jaldiwahasehato_tora
@jaldiwahasehato_tora 3 ай бұрын
i did the same actually but even after changing the role of wiener to admin the lab still says not solved what's the issue
@showkassangbo3386
@showkassangbo3386 3 ай бұрын
Your explanation is clear and easy to understand. Thanks and keep uploading
@HhhaHhhy
@HhhaHhhy 3 ай бұрын
great explaination , thanks from iraq
@HhhaHhhy
@HhhaHhhy 3 ай бұрын
very good explanation, thanks from iraq
@saurabhkulkarni1176
@saurabhkulkarni1176 3 ай бұрын
please sir make next part
@alialmasry8332
@alialmasry8332 3 ай бұрын
king
@gj9585
@gj9585 3 ай бұрын
Amazing
@yousef3464
@yousef3464 3 ай бұрын
Thanks for the nice explanation
@anishvk65
@anishvk65 3 ай бұрын
Nice bro
@mohanrajrj8239
@mohanrajrj8239 3 ай бұрын
Browser name
@HMCyberAcademy
@HMCyberAcademy 3 ай бұрын
Firefox. It can be done from any browser.
@mohanrajrj8239
@mohanrajrj8239 3 ай бұрын
Bro how to put on proxy
@HMCyberAcademy
@HMCyberAcademy 3 ай бұрын
You have to install a browser extension called "Foxy proxy" It can be found in any browser. Once installed, you need to run burpsuite and then enable foxy proxy and configure foxy proxy to keep IP 127.0.0.1 and port 8080. Because burpsuite acts as proxy in port 8080 by default. Then you can see all traffic in browser going through burpsuite.
@leslywarnakulasuriya9022
@leslywarnakulasuriya9022 3 ай бұрын
Thank you so much
@Usernumberamillion
@Usernumberamillion 4 ай бұрын
Thank you so much for this amazing series of portswigger lab solving 👏🏻🙏🏻