Chaining Script Gadgets to Full XSS - All The Little Things 2/2 (web) Google CTF 2020

  Рет қаралды 27,261

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 55
@wouterr6063
@wouterr6063 4 жыл бұрын
Moral of the story: "Don't try to come up with original solutions during a CTF, but rather go to all tweets of the challenge author to find the trick."
@terjanq
@terjanq 4 жыл бұрын
None of the intended parts of the solutions were to be found on my Twitter wall. That was just a fully unintended way to solve the challenge by weaponazing some of my tricks ;)
@advaithmadhukar2609
@advaithmadhukar2609 4 жыл бұрын
lol
@Zedoy
@Zedoy 4 жыл бұрын
"wtf is this magic!!!" Best line ever!!! ❤️
@danielfernandes1010
@danielfernandes1010 4 жыл бұрын
I got so scared when he said that lmao
@AntiAtheismIsUnstoppable
@AntiAtheismIsUnstoppable 4 жыл бұрын
LO is very under rated. This might be a bit too complex for me, but the way he thinks is extremely good for teaching beginners about work ethics. I don't know many other who thinks the same way. It's like an art form.
@neekonsaadat2532
@neekonsaadat2532 4 жыл бұрын
You truly understand what it means to "teach" effectively. I am glad I found your channel back in middle school, you inspired me to go into infosec. Great job leading us along the problem solving process, big thanks!
@internetdoggo4839
@internetdoggo4839 3 жыл бұрын
What a good damn journey! This _has_ to be most _convoluted_ XSS CTF I've ever seen Amazing work
@flirtyemy042
@flirtyemy042 Жыл бұрын
Watched this a couple of times and still can’t wrap my head around it
@soggytoast111
@soggytoast111 3 жыл бұрын
Wow. I'm usually pretty good at following along with these videos but this was really tough for me. I think it would have helped if you had a diagram that showed all of the interfaces and how you chained the exploits to get across them. There's a lot of moving around here.
@ajholmes4867
@ajholmes4867 4 жыл бұрын
I fricking like this video format
@Timooooooooooooooo
@Timooooooooooooooo 4 жыл бұрын
This is the kind of content I love
@rasool2753
@rasool2753 4 жыл бұрын
I Like Your Funny Words, Magic Man
@maruswielki5174
@maruswielki5174 4 жыл бұрын
Nice video! This challenge was really hard - not yet to solve for me :( I've been watching you since a while. So I'm really proud of myself that I solved one of your challenges - I found a flag in your /ctf repo on your github :D
@krlst.5977
@krlst.5977 4 жыл бұрын
It seems i need to rewatch this video like 10 times more to understand "wtf is this magic" :-) Great video!
@580maramir
@580maramir 4 жыл бұрын
CTF challenges in other languages: buffer overflow, reverse engineering, memory leak, cryptography....... JS challenges: „how can i override the prototype 🤔“
@nukexplosion6679
@nukexplosion6679 4 жыл бұрын
LOL
@DHIRAL2908
@DHIRAL2908 4 жыл бұрын
Damn, mind=blown!!! One of the hardest xss challenge lol!
@AntiAtheismIsUnstoppable
@AntiAtheismIsUnstoppable 4 жыл бұрын
Yes, but how can you inject an if is not allowed. An is an no matter the source, isn't it?
@ence7846
@ence7846 4 жыл бұрын
​@@AntiAtheismIsUnstoppable Actually they are allowed but the CSPs leads to restrictions on their source, but when using srcdoc, is considered without source so it does not interfere with CSPs
@AntiAtheismIsUnstoppable
@AntiAtheismIsUnstoppable 4 жыл бұрын
@@ence7846 OK, I need to read up on this with srcdoc, because I do use CSP, and I absolutely want it to work as I intend, not everyone else, lol
@techchannel3107
@techchannel3107 3 жыл бұрын
thank you very much
@darklord_656
@darklord_656 4 жыл бұрын
Vanakam Live Overflow can u put 2 videos per week so i can learn many things😅😅😅
@kevinwydler4405
@kevinwydler4405 3 жыл бұрын
This is sooo beautful!!
@kezzyhko
@kezzyhko 4 жыл бұрын
5:46 I was surprized that in JS you can just pass extra parameters to functions, and everything works
@mrocto329
@mrocto329 2 жыл бұрын
JS works in such a way that it never gives errors basically, if you have a function foo that takes no args and a bar that takes one all of the following are valid: foo(3) bar() bar(3, 5)
@samfoxman7046
@samfoxman7046 4 жыл бұрын
Seems like a contrived challenge, but interesting nonetheless (especially the srcdoc trick)
@adtiyamuhammadakbar2711
@adtiyamuhammadakbar2711 4 жыл бұрын
I still couldn't understand from the previous video until now LOL
@klikkolee
@klikkolee 4 жыл бұрын
I had to look up the explanation posted by the author of the trick at 11:30 in order to get it. It mostly came down to a lack of knowledge about the Javascript standard library. RegExp's ToString uses values from some of the attributes of the object. It doesn't matter which of the attributes used by tostring is selected for the attack. source happened to be chosen. flags should work just as well. the inconvenient object's source attribute is set to the exfil data by setting the attribute for the object prototype. the inconvenient object's tostring is configured to include the source attribute by setting the function for the object prototype to one which includes the source attribute (RegExp's tostring) concat calls tostring on the inconvenient object, which uses RegExp's tostring, which includes the source attribute, which was set to the exfil data. concat adds the result of tostring, which includes the exfil data, to the exfil url.
@lukor-tech
@lukor-tech 4 жыл бұрын
Can someone just clip the part 11:26 ? :D I feel like this everyday and never been happier with your comment on the challenges you've been working on. Great watch!
@DevsLikeUs
@DevsLikeUs 4 жыл бұрын
This is great !
@liorcraftblockil5995
@liorcraftblockil5995 3 жыл бұрын
Just saying that everyone would not mind for like a 20 or a 25 minute video, why? because it is interesting, and I would really love to know how you got to the solution, it sucked that you just jumped with the reason that there is no time, next time please make the video longer, we want to really understand and not just say, uhmmmm ok, Thanks
@mnj-adam3862
@mnj-adam3862 3 жыл бұрын
i love youuuuu
@metalpachuramon
@metalpachuramon 4 жыл бұрын
Well donde, that was a hard one
@RohanOnBike
@RohanOnBike 4 жыл бұрын
Nice.... I was stuck on a html injection on a angular site 10days back couldnt turn it into xss, all event handlers were blocked... Going to try with srcdoc.. Thanks
@AntiAtheismIsUnstoppable
@AntiAtheismIsUnstoppable 4 жыл бұрын
I don't uynbderstand how you can inject an when is not allowed. That doesn't make any sense.
@lingon27
@lingon27 3 жыл бұрын
I believe this 14min video took me about 30min to watch 😅
@ichigo-nms9418
@ichigo-nms9418 4 жыл бұрын
5Head 🍷 ahh yes
@ve9
@ve9 4 жыл бұрын
interesting how none of ur latest vids (like last 3 weeks) have shown up in subbox
@jakekarreofficial
@jakekarreofficial 4 жыл бұрын
why don't people actually watch the video before commenting? edit: I posted this comment to poke fun at the people who do this, not get confused replies.
@jakekarreofficial
@jakekarreofficial 4 жыл бұрын
@TutorialsByKevin I only stated that because I looked at the recent comments, and saw a bunch of people saying "hi" which has nothing to do with the video.
@namenlos4198
@namenlos4198 4 жыл бұрын
Are you new to the KZbin game?
@jakekarreofficial
@jakekarreofficial 4 жыл бұрын
@@namenlos4198 no i just thought someone would see this and agree
@heroslippy6666
@heroslippy6666 4 жыл бұрын
why does it matter, it's been happening forever?
@medjassertoubib4467
@medjassertoubib4467 4 жыл бұрын
nice . can you please make a discord channel .it will be great
@fitzydke
@fitzydke 4 жыл бұрын
EARLY
@cumMan270
@cumMan270 4 жыл бұрын
I need a hogwarts scholarship
@justsahilgamer9742
@justsahilgamer9742 3 жыл бұрын
i am imaging that when i will understand him
@1e1001
@1e1001 4 жыл бұрын
yes?
@fierles7989
@fierles7989 4 жыл бұрын
damn it's boring waiting for a new video
@machinexa1
@machinexa1 4 жыл бұрын
WTF is this magic
@lior_haddad
@lior_haddad 4 жыл бұрын
Hi
@Techinfo665
@Techinfo665 4 жыл бұрын
Sec
@RepublikSivizien
@RepublikSivizien 4 жыл бұрын
wtf
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
9:15
LiveOverflow
Рет қаралды 18 М.
HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128
15:47
HAH Chaos in the Bathroom 🚽✨ Smart Tools for the Throne 😜
00:49
123 GO! Kevin
Рет қаралды 13 МЛН
XSS on the Wrong Domain T_T - Tech Support (web) Google CTF 2020
13:40
Generic HTML Sanitizer Bypass Investigation
14:05
LiveOverflow
Рет қаралды 141 М.
The Weird History of JavaScript
12:09
Fireship
Рет қаралды 1,2 МЛН
How The RIDL CPU Vulnerability Was Found
25:24
LiveOverflow
Рет қаралды 121 М.
Script Gadgets! Google Docs XSS Vulnerability Walkthrough
18:57
LiveOverflow
Рет қаралды 142 М.
Cracking Active Directory Passwords & MFA Fatigue
17:31
John Hammond
Рет қаралды 25 М.
Hacking into Google's Network for $133,337
31:32
LiveOverflow
Рет қаралды 1 МЛН
Nintendo Hire me!!!!!!!!
16:52
LiveOverflow
Рет қаралды 673 М.
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 114 М.
HAH Chaos in the Bathroom 🚽✨ Smart Tools for the Throne 😜
00:49
123 GO! Kevin
Рет қаралды 13 МЛН