This is the BEST explanation of SSRF I've ever heard and I finally understand it now. Thank you.
@PwnFunction3 жыл бұрын
Means a lot, thanks!
@RAGHAVENDRASINGH172 жыл бұрын
That's debatable
@algorythmis48052 жыл бұрын
@@RAGHAVENDRASINGH17 then debate
@vitaminncpp Жыл бұрын
@@algorythmis4805 Where Link to the talk you mentioned in video
@avi123 жыл бұрын
This channel is heavily underrated
@kanekino95073 жыл бұрын
Holy fucking shit yes
@NanoTrasen3 жыл бұрын
It's like LiveOverflow, but before they went to shit.
@android-user3 жыл бұрын
@@NanoTrasen what went wrong with them? :/
@manuyel48453 жыл бұрын
@@NanoTrasen since when liveoverflow went to shit?
@nas736033 жыл бұрын
@@manuyel4845 ikr like wut does he mean?
@sanderd173 жыл бұрын
11:50 rubocop reported that line for a reason apparently.
@sodiboo3 жыл бұрын
I swear i've heard someone jokingly say "CRLF injection" before, and although i've seen that fuck with UI only intended for single lines (chat text boxes in some games, Muck for example and you can impersonate others in chat), but i never thought it would be an actual security vulnerability in a real application that can actually cause damage without another human element lol
@tauon_3 жыл бұрын
Hi terrain!
@alb123456723 жыл бұрын
who needs cr lf when you have && and ; :lol
@SirusStarTV3 жыл бұрын
Muck
@Hardcorelactation2 жыл бұрын
muck
@floridamanfloridaman16872 жыл бұрын
the funny thing about this channel is that it always flew under my radar because i thought by the graphics in the thumbnails that it wouldn't dive too deep into the topics. I guess I'll never judge a book by its cover again. Real nice vid, keep it up!
@adygombos44693 жыл бұрын
I love this videos. Every time I see one I understand around 30% of what he's saying but I'm still watching 'till the end.
@phanirithvij2 жыл бұрын
Great video, thank's for introducing SSRFs in a practical, hands on and easy to understand way.
@KentoNishi3 жыл бұрын
Just found your channel and I think it's heavily underrated. Keep making more videos plz, even tho I don't do security stuff myself I find it really interesting and your explanations are super easy to understand for noobs like me too. Love it!
@Ikxi3 жыл бұрын
Lmao the LiveTL guy Hi
@basspotion8463 жыл бұрын
This one is definitely make my day...!
@BigYoshi8263 жыл бұрын
It kinda ruined my day
@triularity2 жыл бұрын
So remember when connecting to random URLs: Either bind your client to an IP which only has public internet access (i.e. via firewall settings); Use a client library which has an option to only connect to public addresses (or can do so via an access control callback); Or funnel all the requests through a proxy which denies access to any internal addresses.
@chilversc2 жыл бұрын
Envoy proxy is good for this, supports mTLS and access control.
@cybercdh3 жыл бұрын
Really great video. I love your editing skills, so slick, nice job.
@luandasilva46392 жыл бұрын
this channel is as good as it gets man, props
@ModernAtomX2 жыл бұрын
I was in the middle of this video, but I set it down and when I came back, the video was off youtube. Glad to see its back so I can finish it lmao
@Evoleo3 жыл бұрын
FINALLY guys he uploaded!
@Dziaji3 жыл бұрын
Cool video, and your english is terrific. I almost didn’t notice that you weren’t a native english speaker.
@Henrix19982 жыл бұрын
I'm constantly surprised by the amount of languages and frameworks that allow executing any string you give them
@MechanicalMooCow2 жыл бұрын
just webdev things
@JMurph20152 жыл бұрын
I think it's the hacky way around having proper abstractions for modules/extensions in your codebase. Want to have a middleware system without properly defining the interfaces? No problem, just give your users a hook that's passed into the eval() function as it processes requests! Problem solved!
@mohamedfatheem28723 жыл бұрын
Amazing work my brother! Lots of Love! Keep making awesome contents like this.
@fmenguy3 жыл бұрын
Thank you for these explanations. I was waiting for a video on this type of problem. Your diagrams and your speech (rather slow) are a plus for me which sucks in English: ').
@liesdamnlies33723 жыл бұрын
2:38 Hold-up a second. That’s a Python REPL, but my god it’s beautiful. How was this magic accomplished?!
@PwnFunction3 жыл бұрын
Bpython Interpreter
@liesdamnlies33723 жыл бұрын
@@PwnFunction Thank you so much. This is way more comfy than the stock interpreter. :D
@alb123456723 жыл бұрын
@@liesdamnlies3372 If you do something like path = require("path") in the node repl you get some minimal documentation (e.g. just a list of methods)
@sugiii96163 жыл бұрын
"Kinda like, you know, when you were young and you want those beers but you were underage" No, sir, I dont. I'm an European
@fitmotheyap3 жыл бұрын
Europe ftw
@P4INKiller3 жыл бұрын
_A_ European.
@sugiii96163 жыл бұрын
@@P4INKiller un Européen* één Europeaan* und Europäer* un Europeo* un Europeista* un European* um Eurpeu* ktoś Europejczyk* (idk my Polish sucks ?) Unu Eŭropujo/Unu Eŭropio* And sorry mates I dont have keyboard for Czech, Ukrainian, etc.
@fitmotheyap3 жыл бұрын
@@sugiii9616 европјанец(this is in macedonian,idk about other slavic)
@sugiii96163 жыл бұрын
@@fitmotheyap Thank you sir! I know how to read your alphabet for 2 weeks hehe 😎😎
@ilikememes90523 жыл бұрын
I am from a software engineering background got interested in cybersecurity too now.
@Ikxi3 жыл бұрын
You give me such LiveOverflow vibes haha I like it
@chiefkeeflover43 жыл бұрын
Your channel has helped me out greatly. Tysm!
@verolyn84592 жыл бұрын
Probably the Best Explanation So far, Thanks bud
@hexrays61503 жыл бұрын
I have been waiting for a new video from this channel. Very good content and explanation, nice animation and voice
@potatoonastick22393 жыл бұрын
Good vid bud, thanks for making it! And have a nice day
@giaphatha883 жыл бұрын
This is top tier contents, keep it up!!!!
@Aolpha3 жыл бұрын
Welcome back Hope you fine and dandy?
@PwnFunction3 жыл бұрын
I'm good, hope you're well too
@Milten1302 жыл бұрын
This video somehow shows as uploaded 6 months ago. Good explanation
@samuelnarciso91103 жыл бұрын
Este compa es la pinga, me fascinan tus vídeos
@b391i3 жыл бұрын
Awesome as usual like Fireship 😁
@dinoscheidt3 жыл бұрын
3:07 “there is an old talk, but still great” Talk is from Jan 9, 2020 👀 … one really has to awe that in tech we move so fast that a year old talk is considered old. Borderline outdated. Now the doctors office that happily works with best practices learned at college 15 years ago needs to defend against this world. 😅 ehm… yeah, my bet is on black
@PwnFunction3 жыл бұрын
That video was re-uploaded in 2020, but the first video surfaced in 2017. You can also see "2017" in the top left corner ;)
@dinoscheidt3 жыл бұрын
@@PwnFunction Ok ok, fine its 4 instead of 2 years - still far off 15 years 😬….. 🐌
@daltonb2 жыл бұрын
Excellent explanation earned my follow!
@badreddinechamkhi37853 жыл бұрын
hey man we are waiting for the binary exploitation series !
@franciscolucarini87613 жыл бұрын
we must become 'Pro Jedi 1337 samurai ninja Warrior'
@hakura882 жыл бұрын
I love your videos. keep your work up it's amazing.
@agoogleuser54202 жыл бұрын
I finally understand why Roblox doesn’t allow requests to their own domain through Roblox game servers.
@SlySportz2 жыл бұрын
Really enjoying your channel my friend. Keep it up
@michaelhackman31953 жыл бұрын
Keep it up! Love your videos
@resphantom2 жыл бұрын
One of the reasons you should enable password authentication on your Redis and separate your automation from your environments. Here is one of the biggest risk in some companies, having a central user that has admin access to an entire Kubernetes or ECS cluster. If the credentials or token of this user becomes compromised, the attacker will essentially have full control over your entire cluster. We should probably also separate hackers into 2 categories: - People who want to do damage - People who want to gather valuable information *Hacker (Gatherer)* Large quantities of categorized accurate data is extremely valuable. Many companies big or small store general user data, such as overall sales data to determine which products does a majority of their clients like and try to cater to the larger audience. There are usually big data based systems that uses these datasets to build statistical models to help make sense of a majority of this data. Now for the hacker gathering data, if they somehow got a hold of these datasets, they could sell it to the competitors of the company they stole from, thus now using that data to push specific products out to the same customers faster, making themselves look better. A strange strategic tactic of stealing another company's customer base. *Hacker (Attacker)* The common malicious Attacker could attempt a similar thing but with a different route. They can simply be paid by a company to shut down or to compromise their competitors. For one if they somehow got access to those same datasets, they could simply permanently delete that data, crippling the vision of the competitor. When a company does not know whats happening in their own sales, they may bring out products that the clients won't buy, costing the competitor insane amounts of lost revenue. Or if the attacker somehow got access to the system, they could be paid by a company to simply cripple critical systems of their competitor. If the competitor can't make sales or has a crappy service, then the customer base would most likely flock to whatever works. *Conclusion* Think of it this way, if you suddenly can't use Google, what other search engine would you use? Probably bing or duckduckgo, right?
@MrNicKO812 жыл бұрын
cool! very inresting, i feel a little smarter already, thx ;)
@tiscrispin2 жыл бұрын
Oh my, this was an insightful one :D
@barack4543 жыл бұрын
at 12:53 you are giving redis port 6379 but in terminal when you check at 13:18 port number is 1337 that it is connected to could you please explain this
@colorspace55413 жыл бұрын
port 1337 is what the "outside" ncat server listens to, and as he said in 12:58, this was just the proof of concept. He sent this instruction to the redis server on port 6479: "Execute the linux ID command (returns current shell user-id or short UID) and post the result to the ncat server running on port 1337"
@olo903 жыл бұрын
Any chance you can cover the Twitch hack? Would be nice to get some more info there
@ShouldBeKnown2 жыл бұрын
where are the comments?
@superhero13 жыл бұрын
Great video my friend! ❤️
@FedoraRose3 жыл бұрын
Finally a new video :D
@tatianatub2 жыл бұрын
if i had found this channel when i was highschool i'd have ended up going to juve
@bwbs74102 жыл бұрын
“I just learned ruby last night” LMAOO hard flex
@laurinneff43043 жыл бұрын
How did you get the docs in your Python REPL at 2:44?
@MarcusAndersonsBlog2 жыл бұрын
Self generated code execution is considered a extremely useful feature in interpretive languages, and I don't see it disappearing. However one does wonder if it's a fools errand arising out of lazy thinking. You can add a lot of power for very little effort this way but the unnoticed security envelope (usually) requiring executable code to sit in OS protected memory is bypassed in any kind of interpreter. This violates the implied security model of the Von-Neuman/Harvard architectures. So the security model never taking into account interpreters is actually responsible for the problem to start with. Browsers should never have been enabled to run interpreted scripts either (go ahead and laugh, but I'm deadly serious). I was pretty amazed when HTML appeared in the 1980s as uncompiled & unencrypted, but when Netscape introduced Javascript I pretty well fell off my chair. My suspicions were confirmed when I subsequently learned HTML was invented by a self taught non-computer professional. The danger of interpreters were already quite apparent to me after just 4 months into my IT career on the DecSystem-10. The TECO editor (aka 'vi') used a privileged operation that could allow TECO code to receive passwords in a fake login attempt. Only a privileged program like TECO could do this, but TECO was an editor with its own interpretive language. All SSRFs work this same way. Interpreters that allow (new) code execution are a really really bad idea. There is simply no need for it, although, its makes a FEW difficult things much much easier without having to write code for, at the expense of violating the fundamental computer architecture security model.
@zyansheep2 жыл бұрын
All the comments are gone :( At least the video is back!
@realcartoongirl2 жыл бұрын
my brain is to dumb to process this
@abdullahessam6998 Жыл бұрын
Hello, I would like to know if there is a way to predict the semi-random numbers to get profits from betting applications and semi-crash??😢
@hundredchaos78313 жыл бұрын
Finally you are back ☺️
@kanekino95073 жыл бұрын
Dude i dont usually share any video or Channel but you man u are fucking Gold keep up good luck
@salluc17123 жыл бұрын
Keep it up that's amazing thank you
@SurajGaud3 жыл бұрын
Quality content
@Whootzie2 жыл бұрын
I didn't ask people to buy my booze. I did beer runs
@ashvinbhuttoo2 жыл бұрын
Great content, subbed! 🐧
@june41712 жыл бұрын
i died when u compared sitting out side of the liqour store to ssrf
@dummyna23352 жыл бұрын
Bro, you're a legend.
@josephseed33932 жыл бұрын
Isn't the JSONified class also insecure deserialization? Ruby executes whatever it sees in the function of that class, so that is insecure deserialization right? The complete vulnerability chain in this case would then be SSRF + CRLF + Insecure Deserialization
@winkcla3 жыл бұрын
Nice video! But it's not "random HTTP requests" if it's the Git protocol 🤔
@paulstelian973 жыл бұрын
You have enough control over the URL to do whatever the fuck you want though.
@itsmerg52733 жыл бұрын
you have such quality content but you should upload more
@jakob_1233 жыл бұрын
Agree
@triularity2 жыл бұрын
Along side the newline injection vulnerability, it seems Redis should abort the connection the moment it gets an invalid line. This likely would have also prevented this particular exploit.
@lowborn72312 жыл бұрын
Where are the videos? Did you forgot you have a channel? I'm waiting new content :(
@dorb13373 жыл бұрын
YOU ARE THE REAL MVP.
@jayshah56952 жыл бұрын
the netcat technique was great, would u make a video on all the use cases it enables ?
@int4_t3 жыл бұрын
I miss the old drawing style videos
@hanabi68413 жыл бұрын
can you demo how we bypass ssl pinning windows application?
@Linuxdirk2 жыл бұрын
sigh ... Why the heck are SSRFs are still possible? It's 2022 for ducks sake!
@Afitz2002 жыл бұрын
Back from the dead!
@randomguy37843 жыл бұрын
Excellent video!
@Jakemontana913 жыл бұрын
Im new to this stuff and learning, but what is the difference between an SSRF and a CSRF? Thanks for the knowledge!
@lonelybookworm2 жыл бұрын
SS = Server Side CS = Cross Site
@optimiserlenergie10942 жыл бұрын
Redis does not requires authentication ?
@lmlagg2 жыл бұрын
Wait that outro... It sounds... Familiar...
@insanity27533 жыл бұрын
Great video, thank you.
@hengyongming36763 жыл бұрын
Finally waited so long for this video
@Sparkette2 жыл бұрын
Which of the Community Guidelines did this allegedly violate?
@dxxx.2 жыл бұрын
Shush....
@drishalballaney65902 жыл бұрын
Same question
@hipster22832 жыл бұрын
He said there was a joke that violated guidelines that has been removed
@Sparkette2 жыл бұрын
@@hipster2283 What was the joke?
@hipster22832 жыл бұрын
@@Sparkette not sure, the video got taken down before I watched it
@FelixHdez2 жыл бұрын
Old talk ?? It was like 16 months old when this vid was made
@mrala3 жыл бұрын
awesome job man
@nakulgopal603 жыл бұрын
Your content is really good , also animation is great. It'll be great if you make a video on how you research all this thing , how to approach the research and what sources are best.
@iraklisskepasianos50953 жыл бұрын
Great video as always! Could you please send the link of the github repo with the SSRF examples?
@reizinhodojogo39562 жыл бұрын
a guy made a video of bed trapping someone but he forgot to censor about 1 or more frame(s), the guy is lucky i wont use his (idk what) for any bad
@st0ox3 жыл бұрын
Man, I like these flaps.
@apidas3 жыл бұрын
just found your channel. thought you're liveoverflow brother or something
@kenGPT3 жыл бұрын
Stok sent me, you got my sub.
@kunai98093 жыл бұрын
I feel like i should know what you're talking about, but i really don't... Well i understand the broad concepts and some bits of what you say but thats it
@d-o-n-u-t3 жыл бұрын
Just want to know, what terminal shell/extensions are you using?
@Verrisin2 жыл бұрын
ok, so... just route all "external-origin" url requests through adapters that only lead directly outside ... ? - essentially, through the "public-ip router" ...
@Verrisin2 жыл бұрын
yeah, in fact, no need to error-pronely sanitize my urls - just load them all through a proxy which runs outside of the internal network. ... I think that solves it perfectly.
@TrashwareArt3 жыл бұрын
Are you interested in working for the monero research labs?
@krystofoxik3 жыл бұрын
Great content!
@millco-.-2 жыл бұрын
thank you for your great video. it's interesting because the server can't determine raw string and operators...
@RobertBlair3 жыл бұрын
Timestamp 11:41 - comment disabling the security lint check for the loooze
@realslimchaggy2 жыл бұрын
yo bro ho does every body got free websites.. of course not every one have wifi and money so how can they create a server for free.. please answer my question and tell me how can I build a server (linux) for free
@mohamed-0101-i8e3 жыл бұрын
Cn I ask you what's the tool that you used for the diagram In 1:52 ?
@kasrow123 жыл бұрын
Where is your intro? It was awesome.
@wusluf3 жыл бұрын
What tool do I need to make visualization like the one at 1:53?
@deinpapa37692 жыл бұрын
like blind sql / http header injection?
@davidlee5888 ай бұрын
As a hello-world engineer, I cannot fully get what this video means, but I know this is good. What should I learn in order to understand this video?