Don't make random HTTP requests.

  Рет қаралды 389,387

PwnFunction

PwnFunction

Күн бұрын

Пікірлер: 270
@AhrenBaderJarvis
@AhrenBaderJarvis 3 жыл бұрын
This is the BEST explanation of SSRF I've ever heard and I finally understand it now. Thank you.
@PwnFunction
@PwnFunction 3 жыл бұрын
Means a lot, thanks!
@RAGHAVENDRASINGH17
@RAGHAVENDRASINGH17 2 жыл бұрын
That's debatable
@algorythmis4805
@algorythmis4805 2 жыл бұрын
@@RAGHAVENDRASINGH17 then debate
@vitaminncpp
@vitaminncpp Жыл бұрын
@@algorythmis4805 Where Link to the talk you mentioned in video
@avi12
@avi12 3 жыл бұрын
This channel is heavily underrated
@kanekino9507
@kanekino9507 3 жыл бұрын
Holy fucking shit yes
@NanoTrasen
@NanoTrasen 3 жыл бұрын
It's like LiveOverflow, but before they went to shit.
@android-user
@android-user 3 жыл бұрын
@@NanoTrasen what went wrong with them? :/
@manuyel4845
@manuyel4845 3 жыл бұрын
@@NanoTrasen since when liveoverflow went to shit?
@nas73603
@nas73603 3 жыл бұрын
@@manuyel4845 ikr like wut does he mean?
@sanderd17
@sanderd17 3 жыл бұрын
11:50 rubocop reported that line for a reason apparently.
@sodiboo
@sodiboo 3 жыл бұрын
I swear i've heard someone jokingly say "CRLF injection" before, and although i've seen that fuck with UI only intended for single lines (chat text boxes in some games, Muck for example and you can impersonate others in chat), but i never thought it would be an actual security vulnerability in a real application that can actually cause damage without another human element lol
@tauon_
@tauon_ 3 жыл бұрын
Hi terrain!
@alb12345672
@alb12345672 3 жыл бұрын
who needs cr lf when you have && and ; :lol
@SirusStarTV
@SirusStarTV 3 жыл бұрын
Muck
@Hardcorelactation
@Hardcorelactation 2 жыл бұрын
muck
@floridamanfloridaman1687
@floridamanfloridaman1687 2 жыл бұрын
the funny thing about this channel is that it always flew under my radar because i thought by the graphics in the thumbnails that it wouldn't dive too deep into the topics. I guess I'll never judge a book by its cover again. Real nice vid, keep it up!
@adygombos4469
@adygombos4469 3 жыл бұрын
I love this videos. Every time I see one I understand around 30% of what he's saying but I'm still watching 'till the end.
@phanirithvij
@phanirithvij 2 жыл бұрын
Great video, thank's for introducing SSRFs in a practical, hands on and easy to understand way.
@KentoNishi
@KentoNishi 3 жыл бұрын
Just found your channel and I think it's heavily underrated. Keep making more videos plz, even tho I don't do security stuff myself I find it really interesting and your explanations are super easy to understand for noobs like me too. Love it!
@Ikxi
@Ikxi 3 жыл бұрын
Lmao the LiveTL guy Hi
@basspotion846
@basspotion846 3 жыл бұрын
This one is definitely make my day...!
@BigYoshi826
@BigYoshi826 3 жыл бұрын
It kinda ruined my day
@triularity
@triularity 2 жыл бұрын
So remember when connecting to random URLs: Either bind your client to an IP which only has public internet access (i.e. via firewall settings); Use a client library which has an option to only connect to public addresses (or can do so via an access control callback); Or funnel all the requests through a proxy which denies access to any internal addresses.
@chilversc
@chilversc 2 жыл бұрын
Envoy proxy is good for this, supports mTLS and access control.
@cybercdh
@cybercdh 3 жыл бұрын
Really great video. I love your editing skills, so slick, nice job.
@luandasilva4639
@luandasilva4639 2 жыл бұрын
this channel is as good as it gets man, props
@ModernAtomX
@ModernAtomX 2 жыл бұрын
I was in the middle of this video, but I set it down and when I came back, the video was off youtube. Glad to see its back so I can finish it lmao
@Evoleo
@Evoleo 3 жыл бұрын
FINALLY guys he uploaded!
@Dziaji
@Dziaji 3 жыл бұрын
Cool video, and your english is terrific. I almost didn’t notice that you weren’t a native english speaker.
@Henrix1998
@Henrix1998 2 жыл бұрын
I'm constantly surprised by the amount of languages and frameworks that allow executing any string you give them
@MechanicalMooCow
@MechanicalMooCow 2 жыл бұрын
just webdev things
@JMurph2015
@JMurph2015 2 жыл бұрын
I think it's the hacky way around having proper abstractions for modules/extensions in your codebase. Want to have a middleware system without properly defining the interfaces? No problem, just give your users a hook that's passed into the eval() function as it processes requests! Problem solved!
@mohamedfatheem2872
@mohamedfatheem2872 3 жыл бұрын
Amazing work my brother! Lots of Love! Keep making awesome contents like this.
@fmenguy
@fmenguy 3 жыл бұрын
Thank you for these explanations. I was waiting for a video on this type of problem. Your diagrams and your speech (rather slow) are a plus for me which sucks in English: ').
@liesdamnlies3372
@liesdamnlies3372 3 жыл бұрын
2:38 Hold-up a second. That’s a Python REPL, but my god it’s beautiful. How was this magic accomplished?!
@PwnFunction
@PwnFunction 3 жыл бұрын
Bpython Interpreter
@liesdamnlies3372
@liesdamnlies3372 3 жыл бұрын
@@PwnFunction Thank you so much. This is way more comfy than the stock interpreter. :D
@alb12345672
@alb12345672 3 жыл бұрын
@@liesdamnlies3372 If you do something like path = require("path") in the node repl you get some minimal documentation (e.g. just a list of methods)
@sugiii9616
@sugiii9616 3 жыл бұрын
"Kinda like, you know, when you were young and you want those beers but you were underage" No, sir, I dont. I'm an European
@fitmotheyap
@fitmotheyap 3 жыл бұрын
Europe ftw
@P4INKiller
@P4INKiller 3 жыл бұрын
_A_ European.
@sugiii9616
@sugiii9616 3 жыл бұрын
​@@P4INKiller un Européen* één Europeaan* und Europäer* un Europeo* un Europeista* un European* um Eurpeu* ktoś Europejczyk* (idk my Polish sucks ?) Unu Eŭropujo/Unu Eŭropio* And sorry mates I dont have keyboard for Czech, Ukrainian, etc.
@fitmotheyap
@fitmotheyap 3 жыл бұрын
@@sugiii9616 европјанец(this is in macedonian,idk about other slavic)
@sugiii9616
@sugiii9616 3 жыл бұрын
@@fitmotheyap Thank you sir! I know how to read your alphabet for 2 weeks hehe 😎😎
@ilikememes9052
@ilikememes9052 3 жыл бұрын
I am from a software engineering background got interested in cybersecurity too now.
@Ikxi
@Ikxi 3 жыл бұрын
You give me such LiveOverflow vibes haha I like it
@chiefkeeflover4
@chiefkeeflover4 3 жыл бұрын
Your channel has helped me out greatly. Tysm!
@verolyn8459
@verolyn8459 2 жыл бұрын
Probably the Best Explanation So far, Thanks bud
@hexrays6150
@hexrays6150 3 жыл бұрын
I have been waiting for a new video from this channel. Very good content and explanation, nice animation and voice
@potatoonastick2239
@potatoonastick2239 3 жыл бұрын
Good vid bud, thanks for making it! And have a nice day
@giaphatha88
@giaphatha88 3 жыл бұрын
This is top tier contents, keep it up!!!!
@Aolpha
@Aolpha 3 жыл бұрын
Welcome back Hope you fine and dandy?
@PwnFunction
@PwnFunction 3 жыл бұрын
I'm good, hope you're well too
@Milten130
@Milten130 2 жыл бұрын
This video somehow shows as uploaded 6 months ago. Good explanation
@samuelnarciso9110
@samuelnarciso9110 3 жыл бұрын
Este compa es la pinga, me fascinan tus vídeos
@b391i
@b391i 3 жыл бұрын
Awesome as usual like Fireship 😁
@dinoscheidt
@dinoscheidt 3 жыл бұрын
3:07 “there is an old talk, but still great” Talk is from Jan 9, 2020 👀 … one really has to awe that in tech we move so fast that a year old talk is considered old. Borderline outdated. Now the doctors office that happily works with best practices learned at college 15 years ago needs to defend against this world. 😅 ehm… yeah, my bet is on black
@PwnFunction
@PwnFunction 3 жыл бұрын
That video was re-uploaded in 2020, but the first video surfaced in 2017. You can also see "2017" in the top left corner ;)
@dinoscheidt
@dinoscheidt 3 жыл бұрын
@@PwnFunction Ok ok, fine its 4 instead of 2 years - still far off 15 years 😬….. 🐌
@daltonb
@daltonb 2 жыл бұрын
Excellent explanation earned my follow!
@badreddinechamkhi3785
@badreddinechamkhi3785 3 жыл бұрын
hey man we are waiting for the binary exploitation series !
@franciscolucarini8761
@franciscolucarini8761 3 жыл бұрын
we must become 'Pro Jedi 1337 samurai ninja Warrior'
@hakura88
@hakura88 2 жыл бұрын
I love your videos. keep your work up it's amazing.
@agoogleuser5420
@agoogleuser5420 2 жыл бұрын
I finally understand why Roblox doesn’t allow requests to their own domain through Roblox game servers.
@SlySportz
@SlySportz 2 жыл бұрын
Really enjoying your channel my friend. Keep it up
@michaelhackman3195
@michaelhackman3195 3 жыл бұрын
Keep it up! Love your videos
@resphantom
@resphantom 2 жыл бұрын
One of the reasons you should enable password authentication on your Redis and separate your automation from your environments. Here is one of the biggest risk in some companies, having a central user that has admin access to an entire Kubernetes or ECS cluster. If the credentials or token of this user becomes compromised, the attacker will essentially have full control over your entire cluster. We should probably also separate hackers into 2 categories: - People who want to do damage - People who want to gather valuable information *Hacker (Gatherer)* Large quantities of categorized accurate data is extremely valuable. Many companies big or small store general user data, such as overall sales data to determine which products does a majority of their clients like and try to cater to the larger audience. There are usually big data based systems that uses these datasets to build statistical models to help make sense of a majority of this data. Now for the hacker gathering data, if they somehow got a hold of these datasets, they could sell it to the competitors of the company they stole from, thus now using that data to push specific products out to the same customers faster, making themselves look better. A strange strategic tactic of stealing another company's customer base. *Hacker (Attacker)* The common malicious Attacker could attempt a similar thing but with a different route. They can simply be paid by a company to shut down or to compromise their competitors. For one if they somehow got access to those same datasets, they could simply permanently delete that data, crippling the vision of the competitor. When a company does not know whats happening in their own sales, they may bring out products that the clients won't buy, costing the competitor insane amounts of lost revenue. Or if the attacker somehow got access to the system, they could be paid by a company to simply cripple critical systems of their competitor. If the competitor can't make sales or has a crappy service, then the customer base would most likely flock to whatever works. *Conclusion* Think of it this way, if you suddenly can't use Google, what other search engine would you use? Probably bing or duckduckgo, right?
@MrNicKO81
@MrNicKO81 2 жыл бұрын
cool! very inresting, i feel a little smarter already, thx ;)
@tiscrispin
@tiscrispin 2 жыл бұрын
Oh my, this was an insightful one :D
@barack454
@barack454 3 жыл бұрын
at 12:53 you are giving redis port 6379 but in terminal when you check at 13:18 port number is 1337 that it is connected to could you please explain this
@colorspace5541
@colorspace5541 3 жыл бұрын
port 1337 is what the "outside" ncat server listens to, and as he said in 12:58, this was just the proof of concept. He sent this instruction to the redis server on port 6479: "Execute the linux ID command (returns current shell user-id or short UID) and post the result to the ncat server running on port 1337"
@olo90
@olo90 3 жыл бұрын
Any chance you can cover the Twitch hack? Would be nice to get some more info there
@ShouldBeKnown
@ShouldBeKnown 2 жыл бұрын
where are the comments?
@superhero1
@superhero1 3 жыл бұрын
Great video my friend! ❤️
@FedoraRose
@FedoraRose 3 жыл бұрын
Finally a new video :D
@tatianatub
@tatianatub 2 жыл бұрын
if i had found this channel when i was highschool i'd have ended up going to juve
@bwbs7410
@bwbs7410 2 жыл бұрын
“I just learned ruby last night” LMAOO hard flex
@laurinneff4304
@laurinneff4304 3 жыл бұрын
How did you get the docs in your Python REPL at 2:44?
@MarcusAndersonsBlog
@MarcusAndersonsBlog 2 жыл бұрын
Self generated code execution is considered a extremely useful feature in interpretive languages, and I don't see it disappearing. However one does wonder if it's a fools errand arising out of lazy thinking. You can add a lot of power for very little effort this way but the unnoticed security envelope (usually) requiring executable code to sit in OS protected memory is bypassed in any kind of interpreter. This violates the implied security model of the Von-Neuman/Harvard architectures. So the security model never taking into account interpreters is actually responsible for the problem to start with. Browsers should never have been enabled to run interpreted scripts either (go ahead and laugh, but I'm deadly serious). I was pretty amazed when HTML appeared in the 1980s as uncompiled & unencrypted, but when Netscape introduced Javascript I pretty well fell off my chair. My suspicions were confirmed when I subsequently learned HTML was invented by a self taught non-computer professional. The danger of interpreters were already quite apparent to me after just 4 months into my IT career on the DecSystem-10. The TECO editor (aka 'vi') used a privileged operation that could allow TECO code to receive passwords in a fake login attempt. Only a privileged program like TECO could do this, but TECO was an editor with its own interpretive language. All SSRFs work this same way. Interpreters that allow (new) code execution are a really really bad idea. There is simply no need for it, although, its makes a FEW difficult things much much easier without having to write code for, at the expense of violating the fundamental computer architecture security model.
@zyansheep
@zyansheep 2 жыл бұрын
All the comments are gone :( At least the video is back!
@realcartoongirl
@realcartoongirl 2 жыл бұрын
my brain is to dumb to process this
@abdullahessam6998
@abdullahessam6998 Жыл бұрын
Hello, I would like to know if there is a way to predict the semi-random numbers to get profits from betting applications and semi-crash??😢
@hundredchaos7831
@hundredchaos7831 3 жыл бұрын
Finally you are back ☺️
@kanekino9507
@kanekino9507 3 жыл бұрын
Dude i dont usually share any video or Channel but you man u are fucking Gold keep up good luck
@salluc1712
@salluc1712 3 жыл бұрын
Keep it up that's amazing thank you
@SurajGaud
@SurajGaud 3 жыл бұрын
Quality content
@Whootzie
@Whootzie 2 жыл бұрын
I didn't ask people to buy my booze. I did beer runs
@ashvinbhuttoo
@ashvinbhuttoo 2 жыл бұрын
Great content, subbed! 🐧
@june4171
@june4171 2 жыл бұрын
i died when u compared sitting out side of the liqour store to ssrf
@dummyna2335
@dummyna2335 2 жыл бұрын
Bro, you're a legend.
@josephseed3393
@josephseed3393 2 жыл бұрын
Isn't the JSONified class also insecure deserialization? Ruby executes whatever it sees in the function of that class, so that is insecure deserialization right? The complete vulnerability chain in this case would then be SSRF + CRLF + Insecure Deserialization
@winkcla
@winkcla 3 жыл бұрын
Nice video! But it's not "random HTTP requests" if it's the Git protocol 🤔
@paulstelian97
@paulstelian97 3 жыл бұрын
You have enough control over the URL to do whatever the fuck you want though.
@itsmerg5273
@itsmerg5273 3 жыл бұрын
you have such quality content but you should upload more
@jakob_123
@jakob_123 3 жыл бұрын
Agree
@triularity
@triularity 2 жыл бұрын
Along side the newline injection vulnerability, it seems Redis should abort the connection the moment it gets an invalid line. This likely would have also prevented this particular exploit.
@lowborn7231
@lowborn7231 2 жыл бұрын
Where are the videos? Did you forgot you have a channel? I'm waiting new content :(
@dorb1337
@dorb1337 3 жыл бұрын
YOU ARE THE REAL MVP.
@jayshah5695
@jayshah5695 2 жыл бұрын
the netcat technique was great, would u make a video on all the use cases it enables ?
@int4_t
@int4_t 3 жыл бұрын
I miss the old drawing style videos
@hanabi6841
@hanabi6841 3 жыл бұрын
can you demo how we bypass ssl pinning windows application?
@Linuxdirk
@Linuxdirk 2 жыл бұрын
sigh ... Why the heck are SSRFs are still possible? It's 2022 for ducks sake!
@Afitz200
@Afitz200 2 жыл бұрын
Back from the dead!
@randomguy3784
@randomguy3784 3 жыл бұрын
Excellent video!
@Jakemontana91
@Jakemontana91 3 жыл бұрын
Im new to this stuff and learning, but what is the difference between an SSRF and a CSRF? Thanks for the knowledge!
@lonelybookworm
@lonelybookworm 2 жыл бұрын
SS = Server Side CS = Cross Site
@optimiserlenergie1094
@optimiserlenergie1094 2 жыл бұрын
Redis does not requires authentication ?
@lmlagg
@lmlagg 2 жыл бұрын
Wait that outro... It sounds... Familiar...
@insanity2753
@insanity2753 3 жыл бұрын
Great video, thank you.
@hengyongming3676
@hengyongming3676 3 жыл бұрын
Finally waited so long for this video
@Sparkette
@Sparkette 2 жыл бұрын
Which of the Community Guidelines did this allegedly violate?
@dxxx.
@dxxx. 2 жыл бұрын
Shush....
@drishalballaney6590
@drishalballaney6590 2 жыл бұрын
Same question
@hipster2283
@hipster2283 2 жыл бұрын
He said there was a joke that violated guidelines that has been removed
@Sparkette
@Sparkette 2 жыл бұрын
@@hipster2283 What was the joke?
@hipster2283
@hipster2283 2 жыл бұрын
@@Sparkette not sure, the video got taken down before I watched it
@FelixHdez
@FelixHdez 2 жыл бұрын
Old talk ?? It was like 16 months old when this vid was made
@mrala
@mrala 3 жыл бұрын
awesome job man
@nakulgopal60
@nakulgopal60 3 жыл бұрын
Your content is really good , also animation is great. It'll be great if you make a video on how you research all this thing , how to approach the research and what sources are best.
@iraklisskepasianos5095
@iraklisskepasianos5095 3 жыл бұрын
Great video as always! Could you please send the link of the github repo with the SSRF examples?
@reizinhodojogo3956
@reizinhodojogo3956 2 жыл бұрын
a guy made a video of bed trapping someone but he forgot to censor about 1 or more frame(s), the guy is lucky i wont use his (idk what) for any bad
@st0ox
@st0ox 3 жыл бұрын
Man, I like these flaps.
@apidas
@apidas 3 жыл бұрын
just found your channel. thought you're liveoverflow brother or something
@kenGPT
@kenGPT 3 жыл бұрын
Stok sent me, you got my sub.
@kunai9809
@kunai9809 3 жыл бұрын
I feel like i should know what you're talking about, but i really don't... Well i understand the broad concepts and some bits of what you say but thats it
@d-o-n-u-t
@d-o-n-u-t 3 жыл бұрын
Just want to know, what terminal shell/extensions are you using?
@Verrisin
@Verrisin 2 жыл бұрын
ok, so... just route all "external-origin" url requests through adapters that only lead directly outside ... ? - essentially, through the "public-ip router" ...
@Verrisin
@Verrisin 2 жыл бұрын
yeah, in fact, no need to error-pronely sanitize my urls - just load them all through a proxy which runs outside of the internal network. ... I think that solves it perfectly.
@TrashwareArt
@TrashwareArt 3 жыл бұрын
Are you interested in working for the monero research labs?
@krystofoxik
@krystofoxik 3 жыл бұрын
Great content!
@millco-.-
@millco-.- 2 жыл бұрын
thank you for your great video. it's interesting because the server can't determine raw string and operators...
@RobertBlair
@RobertBlair 3 жыл бұрын
Timestamp 11:41 - comment disabling the security lint check for the loooze
@realslimchaggy
@realslimchaggy 2 жыл бұрын
yo bro ho does every body got free websites.. of course not every one have wifi and money so how can they create a server for free.. please answer my question and tell me how can I build a server (linux) for free
@mohamed-0101-i8e
@mohamed-0101-i8e 3 жыл бұрын
Cn I ask you what's the tool that you used for the diagram In 1:52 ?
@kasrow12
@kasrow12 3 жыл бұрын
Where is your intro? It was awesome.
@wusluf
@wusluf 3 жыл бұрын
What tool do I need to make visualization like the one at 1:53?
@deinpapa3769
@deinpapa3769 2 жыл бұрын
like blind sql / http header injection?
@davidlee588
@davidlee588 8 ай бұрын
As a hello-world engineer, I cannot fully get what this video means, but I know this is good. What should I learn in order to understand this video?
How some functions can be Dangerous | bin 0x01
15:20
PwnFunction
Рет қаралды 141 М.
How SUDO on Linux was HACKED! // CVE-2021-3156
19:56
LiveOverflow
Рет қаралды 202 М.
They Chose Kindness Over Abuse in Their Team #shorts
00:20
I migliori trucchetti di Fabiosa
Рет қаралды 12 МЛН
Server-Side Template Injections Explained
9:54
PwnFunction
Рет қаралды 90 М.
Full HTTP Networking Course - Fetch and REST APIs in JavaScript
5:08:48
freeCodeCamp.org
Рет қаралды 899 М.
Hacking into Google's Network for $133,337
31:32
LiveOverflow
Рет қаралды 1 МЛН
How To Predict Random Numbers Generated By A Computer
13:54
PwnFunction
Рет қаралды 555 М.
Hacking Electron Applications
11:43
PwnFunction
Рет қаралды 95 М.
The Strange Physics Principle That Shapes Reality
32:44
Veritasium
Рет қаралды 5 МЛН
7 Cryptography Concepts EVERY Developer Should Know
11:55
Fireship
Рет қаралды 1,3 МЛН
This Website has No Code, or Does it?
10:08
PwnFunction
Рет қаралды 1,1 МЛН
Dangerous Code Hidden in Plain Sight for 12 years
18:00
PwnFunction
Рет қаралды 1,6 МЛН
How to put an HTML website online (on the Internet)
29:37
SuperSimpleDev
Рет қаралды 1,7 МЛН