Cracking the Lens: Targeting HTTP's Hidden Attack-Surface

  Рет қаралды 95,356

Black Hat

Black Hat

Күн бұрын

Пікірлер: 52
@syntasec1433
@syntasec1433 3 жыл бұрын
just now stumbling onto this. I find all of James' stuff very insightful, and his critical thinking abilities in this context is really something to be admired.
@siddharthchhetry4218
@siddharthchhetry4218 2 жыл бұрын
I love how his research got better with time :)
@mo938
@mo938 3 жыл бұрын
i've watched this like 5 times. this guy is amazing.
@Bestself2015
@Bestself2015 3 жыл бұрын
Cool. Did it actually help you find any findings in the real-world? I am still having trouble on how I can apply this in real-world is there is not enough specific information. Make no mistake, the speaker is a genius.
@mo938
@mo938 3 жыл бұрын
@@Bestself2015 nice try nsa
@yoshi5113
@yoshi5113 2 жыл бұрын
and i dont really understand how to re create this attack 😂
@mo938
@mo938 2 жыл бұрын
@@yoshi5113 you first need to find a target that's using a load balancer. Then you need to specially craft http requests (like modifying headers, etc..)
@PERRECTUMpl
@PERRECTUMpl 7 жыл бұрын
Great research! Wasn't aware of this at all. Thank you for sharing.
@AntiAtheismIsUnstoppable
@AntiAtheismIsUnstoppable 5 жыл бұрын
Words are, he is now hired by Yahoo
@alexxnica
@alexxnica 7 жыл бұрын
Excellent presentation! Congratulations on your findings and thanks for sharing!
@brianx2405
@brianx2405 3 жыл бұрын
thanks blackhat & thank you james kettle. amazing bug hunter-ing and excellent packet analysis.
@thepuzzlemaker2159
@thepuzzlemaker2159 4 жыл бұрын
Love how almost all the shown addresses at 27:50 from Tor have Tor in all caps at the end
@jean-claudekuo3252
@jean-claudekuo3252 7 жыл бұрын
Thanks for the OAST
@xssfun
@xssfun 7 жыл бұрын
In first case of yahoo - how did you find the ip of the load balancer for you to update the same in host header?
@CheshireSwift
@CheshireSwift 7 жыл бұрын
I'd honestly be prepared to believe the Netflix iPhone thing is them running something on an iOS simulator.
@tobysonline4356
@tobysonline4356 2 жыл бұрын
Took me three days to find this video again
@avatarstudios7041
@avatarstudios7041 5 жыл бұрын
haa late comment james kattle is something else guys :) what a serious research
@0xgodson119
@0xgodson119 3 жыл бұрын
neega vera maari dholarae
@xdman2956
@xdman2956 2 жыл бұрын
17:18 how does setting the url help?
@Stopinvadingmyhardware
@Stopinvadingmyhardware 2 жыл бұрын
These days they don’t even need that. Little hypnosis on a video and they can walk right up to you and plug in devices right into your USB ports.
@DefaultYoutubeHandle
@DefaultYoutubeHandle 4 жыл бұрын
i saw this guy break that code sandbox website by breaking up like 2 php commands. OG
@flawlesscode6471
@flawlesscode6471 3 жыл бұрын
@Houston Nash nope just a scam
@glowingone1774
@glowingone1774 3 жыл бұрын
@@flawlesscode6471 I like how they think people like us fall for this 😆
@flawlesscode6471
@flawlesscode6471 3 жыл бұрын
@@glowingone1774 yea. they pull it under every hacking video
@green_quirk
@green_quirk 3 жыл бұрын
Awesome.
@yoloswaggins2161
@yoloswaggins2161 6 жыл бұрын
New videos have their comments disable, why is this?
@user-iu3ii8sq6t
@user-iu3ii8sq6t 6 жыл бұрын
there were too many grammar mistakes in the comments, so they just disabled them
@PacAnimal
@PacAnimal 7 жыл бұрын
Why do all these damn servers have access to internal infrastructure other than maybe a single port on an isolated sql server? Have any of these companies heard of the consept of a DMZ? Of multiple isolated DMZ's for different purposes? They're kind of ancient concepts...
@pjsmith4471
@pjsmith4471 7 жыл бұрын
dmz DONT protect them... it is easily to go more in depth in the network even the org have a web server in their DMZ
@PacAnimal
@PacAnimal 7 жыл бұрын
Don't try to be clever. If the DMZ is properly isolated, as it damn well should be, it's the same as hacking a completely different company. Leaves you no better off than you were. It's not as if a DMZ requires any access to an internal network unless you're horrible at designing networks. If the DMZ has any better access to the rest of your network than the outside does, you're doing it wrong.
@qtpie2630
@qtpie2630 6 жыл бұрын
oh you need to keep watching blackhat
@autohmae
@autohmae 6 жыл бұрын
What I'm also surprised about: Why do these proxies not have whitelists of what they should be connecting to. Or better use something like haproxy connect to configured backends and nothing else.
@qtpie2630
@qtpie2630 6 жыл бұрын
If there's a cable, there's probably a way.
@vaniahaddad3239
@vaniahaddad3239 4 жыл бұрын
0:53 What's wrong with it?
@fedemtz6
@fedemtz6 5 жыл бұрын
What app is he using to send the http packets?
@RaceForMoney
@RaceForMoney 7 жыл бұрын
Awesome!
@adeadcrab
@adeadcrab 7 жыл бұрын
shout outs
@RAGHAVENDRASINGH17
@RAGHAVENDRASINGH17 6 жыл бұрын
Nice
@Z111211211
@Z111211211 7 жыл бұрын
What is a ping back ?
@supercombinecp860
@supercombinecp860 7 жыл бұрын
4:55
@maverickstclare3756
@maverickstclare3756 4 жыл бұрын
putting your hostname in the request and specifying your DNS server as authoritative so anyone that wants to know the IP of that hostname has to ask your DNS server for the IP. If the DNS lookup doesn't come from the expected destination then you can begin to explore.
@thewhitefalcon8539
@thewhitefalcon8539 Жыл бұрын
This is internet phreaking.
@FennecTECH
@FennecTECH 6 жыл бұрын
only reason i could see doing that (thats not nasty) is silently redirecting users to the HTTPS version of the site
@LiEnby
@LiEnby 5 жыл бұрын
sucks if your trying to use the non-http version of the site for whatever reason... (maybe trying to see if theres some weird vulnerability w using HTTP but not HTTPS? or maybe an old device that doesnt support SSL?)
@LiEnby
@LiEnby 5 жыл бұрын
lmfao yahoo hacked 300 times
@cipheroth
@cipheroth 4 жыл бұрын
bad
Web Cache Deception Attack
23:02
Black Hat
Рет қаралды 22 М.
Vampire SUCKS Human Energy 🧛🏻‍♂️🪫 (ft. @StevenHe )
0:34
Alan Chikin Chow
Рет қаралды 138 МЛН
OCCUPIED #shortssprintbrasil
0:37
Natan por Aí
Рет қаралды 131 МЛН
Хаги Ваги говорит разными голосами
0:22
Фани Хани
Рет қаралды 2,2 МЛН
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
32:30
DEFCONConference
Рет қаралды 57 М.
Exploiting Network Printers
45:09
Black Hat
Рет қаралды 45 М.
HTTP Desync Attacks: Request Smuggling Reborn
47:36
Black Hat
Рет қаралды 30 М.
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
50:58
Practical Web Cache Poisoning: Redefining 'Unexploitable'
43:55
Vampire SUCKS Human Energy 🧛🏻‍♂️🪫 (ft. @StevenHe )
0:34
Alan Chikin Chow
Рет қаралды 138 МЛН