Exploiting a Server Side Request Forgery (SSRF) in WeasyPrint to hack Lyft & HackerOne’s $50M CTF

  Рет қаралды 44,651

NahamSec

NahamSec

Күн бұрын

Пікірлер
@STOKfredrik
@STOKfredrik 5 жыл бұрын
LOOVE IT!!
@NahamSec
@NahamSec 5 жыл бұрын
@hardwork3196
@hardwork3196 5 жыл бұрын
I saw ur repository (bug bounty for beginners), thank you :)
@DragonStoneCreations
@DragonStoneCreations 4 жыл бұрын
Awesome! Similar to yours I did RCE through jasper a Report parsing library
@ujwalkumar1040
@ujwalkumar1040 5 жыл бұрын
Nahamsec is genius. Your videos are absolutely amazing. 🌟Great work, to educate the community.
@J0R1AN
@J0R1AN 5 жыл бұрын
Quick tip: to type the correct quote on iOS, just hold the “ button and select the straight quotes. For me they are directly above the original quote
@NahamSec
@NahamSec 5 жыл бұрын
yep. That's how I did it but wasn't really paying attention because of the excitement that came with finding the bug! haha
@theedmbrewery6234
@theedmbrewery6234 5 жыл бұрын
One of the exercises on pentester lab is about your weazy print find.
@cyberdruid9100
@cyberdruid9100 4 жыл бұрын
This is just genius! And to think you found this 6 months ago and didn't even realise it, very cool
@fedes9626
@fedes9626 4 жыл бұрын
Hi mahamsec! I want you to help out with reports, for example I found that a website would let me provide an URL that gives a 413 error, and discloses what kind of backed they are using, it is just low severity but the way they are handling the URL letting me add 0 in front of ids is not something secure, also when providing a long input on forms I can get a 500 error but I have not been able to exploit, maybe because I am lacking the knowledge, the 413 error exposes they are using a library that was exploitable in the past. I have seen that if I report this non bugs, it depends on how you put it to be able to earn some low bounty. What do you think can you help figuring out if this is something that still needs work or can be reported?
@AnshumanPattnaik
@AnshumanPattnaik 5 жыл бұрын
Great tip thanks and 0:29 nice intro :)
@theenlightenpath5194
@theenlightenpath5194 4 жыл бұрын
Hey @nahamsec, you should aslo try BXSS if its vulnerable to HTML. I did on a bounty program and had similar functionality so I tried Xss Hunter and the payload fired on the back end also giving interal path disclosure
@or5248
@or5248 4 жыл бұрын
This was really good, thanks for posting
@offlife77
@offlife77 5 жыл бұрын
Hi sir, which profile is better as a fresher...VAPT or SOC
@KishoreKumar-bo3iv
@KishoreKumar-bo3iv 5 жыл бұрын
Do you like breaking or building?
@offlife77
@offlife77 5 жыл бұрын
@@KishoreKumar-bo3iv breaking
@audiogenius8570
@audiogenius8570 5 жыл бұрын
Then SOC
@armansurti2745
@armansurti2745 5 жыл бұрын
Thanks Ben !
@jinupatel0_0eth09
@jinupatel0_0eth09 5 жыл бұрын
Bro really thanks for this type of contents... Real inspiration!! Lot of love from india n from personally. Keep helping us. Thanks & Regards, 0_0eth0
@NahamSec
@NahamSec 5 жыл бұрын
Thanks for watching!
@wadagehome7414
@wadagehome7414 4 жыл бұрын
You don't read files in the network ☺️
@CookieHF
@CookieHF 5 жыл бұрын
Great video
@gamerited
@gamerited 5 жыл бұрын
lets do more of your bug finding explained stuffs XD
@marcschweiz
@marcschweiz 4 жыл бұрын
awesome content!
@0m1d
@0m1d 4 жыл бұрын
دوست داریم داداش:)
@xxhanukexx
@xxhanukexx 5 жыл бұрын
hello friend thankyou
@wadagehome7414
@wadagehome7414 4 жыл бұрын
Naham is best
@termux-api
@termux-api 3 жыл бұрын
who else found vulnerability by mistake I (from future) 🙋
@masonhck3578
@masonhck3578 5 жыл бұрын
Badass shit right here!!
@meh.7539
@meh.7539 3 жыл бұрын
I need that shirt...
@deepbhalerao7661
@deepbhalerao7661 5 жыл бұрын
cool find by cool guys
@cipherundoer
@cipherundoer 5 жыл бұрын
i liked it
@Kattue
@Kattue 4 жыл бұрын
*cough* lyft *cough*
@alihassam8748
@alihassam8748 4 жыл бұрын
Lyft
@hehe1205
@hehe1205 4 жыл бұрын
خسته نباشی
@sowhatsupeirik
@sowhatsupeirik 4 жыл бұрын
Lyft
Server-Side Request Forgery (SSRF) Explained
15:58
NahamSec
Рет қаралды 31 М.
Easy $500 Vulnerabilities! // How To Bug Bounty
13:19
NahamSec
Рет қаралды 85 М.
黑天使被操控了#short #angel #clown
00:40
Super Beauty team
Рет қаралды 61 МЛН
The Blueprint to Your First $1,000+ Bounty
12:14
NahamSec
Рет қаралды 38 М.
I Helped 2,000 People Walk Again
15:31
MrBeast
Рет қаралды 27 МЛН
Understanding ⛔️403 Bypasses⛔️ (With Examples)
13:07
NahamSec
Рет қаралды 26 М.
Do This For Your First $100,000 in Bounties
11:11
NahamSec
Рет қаралды 21 М.
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
19:58
Bug Bounty Reports Explained
Рет қаралды 16 М.
Find and Exploit Server-Side Request Forgery (SSRF)
8:56
The Cyber Mentor
Рет қаралды 45 М.
Next Gen Hacker?
43:03
David Bombal
Рет қаралды 236 М.