File Inclusion Vulnerability Explained | TryHackMe Junior Penetration Tester | OSCP

  Рет қаралды 64,292

Motasem Hamdan | Cyber Security & Tech

Motasem Hamdan | Cyber Security & Tech

Күн бұрын

Пікірлер: 137
@DeeMeltDown
@DeeMeltDown 2 жыл бұрын
I somehow struggled my way through these challenges but didn't really feel like I understood the material. Your explanation was much better than the written material
@TKollaKid
@TKollaKid Жыл бұрын
I agree. It was very poorly written and confusing.
@MzOliveOyl
@MzOliveOyl 11 ай бұрын
believe me when I tell you, you're not alone!!!
@farhadturabi5354
@farhadturabi5354 5 ай бұрын
absolutely agree
@anonuser260
@anonuser260 8 ай бұрын
I really loved to study cybersecurity for the past month but after I got to this point i gave up convincing myself that i am too stupid for all of this since i couldnt understand a single word they wrote on the site but after coming across this video and reading the comments i decided i am going to try again, thank you
@farhadturabi5354
@farhadturabi5354 5 ай бұрын
I wouldn't be able to do this task without this video. good explanation
@justinnewberry1763
@justinnewberry1763 3 жыл бұрын
Thank you for a thorough and concise tutorial. There is no way I could have completed that challenge without your help. Now I just need to do it another five times and I might be able to remember how to do this! Keep up the GREAT work!
@av4055
@av4055 2 жыл бұрын
This room was the first room where i started getting problems. Thanks for this tutorial.
@G_Deon
@G_Deon Ай бұрын
Exactly
@uscmhudson5504
@uscmhudson5504 2 жыл бұрын
Well done, much better explanations than the provided material. I really think they need to revise or flesh out some of these labs, for example some of the tools that may be helpful such as burp suite aren't covered until later in the path. I ran into a similar issue when they were talking about decoding sha, md5, and base64, they gave you a link to help you with the later but not the base64, later in the path they provided a link. Funny enough it was the one I just happened upon to complete the lab.
@edgeofthegrasstactics1106
@edgeofthegrasstactics1106 3 жыл бұрын
This really helped me sir ! But I must say that this is a liitle too advanced for beginners.
@dingus2332
@dingus2332 2 жыл бұрын
Its very fun though !
@DeeMeltDown
@DeeMeltDown 2 жыл бұрын
Try Hack Me has a beginner course called How the Web Works or something like that. If you’re getting a little lost on this video I’d try that course out
@supreetmavintop1829
@supreetmavintop1829 4 ай бұрын
@@DeeMeltDown even after completing that its still overwhelming
@AhmedMohamed-kn9sf
@AhmedMohamed-kn9sf Жыл бұрын
انا لقيت اسمك عربي فسمحلي اكتب بالعربي فبجد مجهود رائع وشرح سهل ومبسط كمان اخر جزء في الفيديو كان رهيب. حقيقي فخور ان في مسلمين بالمهارة دي. اتمنى أوصل لمستوى حضرتك.
@4lph4V
@4lph4V 2 жыл бұрын
The only video you need to understand whole file inclusion concept!! Thank you so much for this. ❤❤
@alexandrosmitsouli8763
@alexandrosmitsouli8763 7 ай бұрын
nice work on this one, really cleared up my mind. Thanks keep it up
@FrugalThinkin187
@FrugalThinkin187 2 жыл бұрын
love the videos man - so informative and plenty of time to pause and try out yourself out without blurting out the answers
@jeitzi89
@jeitzi89 2 жыл бұрын
thanks man! tried the challenges by myself for a while but had no chance. with your help I completed it while still learning a lot.
@jodokast2000
@jodokast2000 3 жыл бұрын
Thank you for this walkthrough! I could not wrap my head around this room. So much help!
@tonyYoutube2
@tonyYoutube2 9 ай бұрын
thank you for activating the subtitles, it gives us the possibility to put the translation in French
@rbrookes
@rbrookes Жыл бұрын
This helped so much even after I'd read the written write up.
@Adam-ko6dx
@Adam-ko6dx Жыл бұрын
Thanks very much, the written tutorial for this was not particularly helpful but this is much better.
@xpwnstar6079
@xpwnstar6079 2 жыл бұрын
I thought it was well done! the best break down I've seen out here. I'm glad to have subscribed and will check out the rest of the vids. Keeo up the great work!
@draco24able
@draco24able 3 жыл бұрын
26:53 its already configured to POST right?(-->curl -X POST
@MotasemHamdan
@MotasemHamdan 3 жыл бұрын
Totally right. I was just experimenting with it.
@TheSpecialist54
@TheSpecialist54 2 жыл бұрын
thanks for the help brother. I didn't just want the answers so I'm happy I came across your channel so I could actually learn step by step. that made much more sense then the verbage they had.
@worldbuilder9971
@worldbuilder9971 Жыл бұрын
thank you so much for this. This walk through is so much better then the room. And i was able to follow along as a mid level cyber learner. 💕
@cajunfox
@cajunfox Жыл бұрын
Thank you for sharing this video, I got a lil stuck on this one but you helped me finally understand what needed to be done/what I was supposed todo
@Nino-xe3oj
@Nino-xe3oj 2 жыл бұрын
New Subscriber! Awsome work, my brother! Keep them coming! You are explaining in such an easy way, its easy to understand! Natural talent! Keep it up! :))))
@felipecg6587
@felipecg6587 3 жыл бұрын
Amazing, this helps so much, you have no idea how great of a instructor you are. Muchas Gracias
@N0_N4M3z
@N0_N4M3z 2 жыл бұрын
Thank you! Challenge 3 was whooping my a** and this helped me through. Great explanation good sir!
@sumneetsharma9383
@sumneetsharma9383 Жыл бұрын
loved the content and the way of explanation thanku brother i was lacking in this specific topic i think i am cleard with it now ❤‍🔥❤‍🔥❤‍🔥❤‍🔥❤‍🔥
@CyberAbyss007
@CyberAbyss007 Жыл бұрын
Thank you!!! Really appreciate the time you put in to this. It was a big help with my limited time to study! I could not repeat the very last bonus challenge. My attack box is not using a TryHackMe accout, only root and I don't the same files and folder on it. I wonder why the attack boxes are so different. Thanks for doing it though.
@x-man8889
@x-man8889 10 ай бұрын
Wow! Great video, very helpful... Thank you!
@MotasemHamdan
@MotasemHamdan 10 ай бұрын
Thankss
@slybandit8117
@slybandit8117 2 жыл бұрын
Very well done sir, I needed a little help with the final 3 questions and you're 'answers' were perfect. Using curl to switch the methods was a great idea, I tried it with Burpsuite but it wasn't working for some reason.
@vacumecleaner
@vacumecleaner 2 жыл бұрын
Me too with burpsuite it wouldn't work...have you figured out why?
@slybandit8117
@slybandit8117 2 жыл бұрын
@@vacumecleaner no I did not. I DID finish the room, but I must have used a different method, looking at my comment I used CURL instead.
@slybandit8117
@slybandit8117 2 жыл бұрын
Were you able to complete the room at least?
@vacumecleaner
@vacumecleaner 2 жыл бұрын
@@slybandit8117 Yeah I managed to finish the room, I had to do the CURL method too I still don't know why burpsuite didnt work?! lol thanks for replying
@CyberAbyss007
@CyberAbyss007 Жыл бұрын
Thanks!
@MotasemHamdan
@MotasemHamdan Жыл бұрын
Thank you too.
@catchorale912
@catchorale912 3 жыл бұрын
He sounds like a lawyer or a medic talking to a patient. Becoming surprised when hearing concerning details, but trying to keep you calm.
@darkgrouptw
@darkgrouptw 2 жыл бұрын
Thank you so much for letting us for this tutorial. And thanks for the php reverse shell XD It's really helpful for a beginner
@michaelrix4156
@michaelrix4156 2 жыл бұрын
Was stuck on Lab 3. Thanks for the help
@EM-cg4iy
@EM-cg4iy Жыл бұрын
This one is massively unclear in the room. I’ve never had such problems yet as this room.
@rfamily360
@rfamily360 3 жыл бұрын
I always like your video. well explained and clear
@edwarddoyle5585
@edwarddoyle5585 Жыл бұрын
Hello Motasem, thank you for taking the time to make this video. I would have never finished without you help. The one thing that really confuses me is using burp on the THM vm. So I basically followed along from there. Is there a way to complete the challenge without burb? Thanks again, Ed
@sandeepnainwal13
@sandeepnainwal13 Жыл бұрын
this is the best walkthrough on FI- Thanks for the post! One quick question : I cannot navigate to the tools>php.reverseshell to gain RCE, please assist if you can?
@whitby1208
@whitby1208 7 ай бұрын
At 20:00 can someone explain me why he changed the get request to get when it was get already.
@Diegovalle90
@Diegovalle90 2 жыл бұрын
Thank you so much! Has been a great guide and help with this challenges!
@Gitalien1
@Gitalien1 Жыл бұрын
What's your labs techno behind ? Kubernetes namespaces and PODs popping on-demand ? or static site ?
@huuloc8719
@huuloc8719 3 жыл бұрын
Thank you so much Motasem.
@samandthewolf
@samandthewolf 3 жыл бұрын
Thank you, this really helped 🙂
@HollyTroll
@HollyTroll 3 жыл бұрын
this was good. Thank you!
@allTimeFavorite
@allTimeFavorite 2 жыл бұрын
Great walk through. The question I have, is how does changing the cookie to a file path work. I saw you do it. But I do not understand how or why it works.
@noided-insight537
@noided-insight537 2 жыл бұрын
very coherent, earned my sub
@mystispy
@mystispy 11 ай бұрын
you tell me why we could not do it with burp suite and we could do it with curl, and can you explain the commands you wrote in curl, I need to understand please :)
@vintagecafe4540
@vintagecafe4540 Жыл бұрын
task 8, Capture Flag2 at /etc/flag2 starts from 00:20:41
@sebastienroux1790
@sebastienroux1790 3 жыл бұрын
Can you demonstrate how to use curl to do the cookie instead of burp?
@madanagdi
@madanagdi 3 жыл бұрын
--cookie
@RAD_3YA
@RAD_3YA 2 жыл бұрын
I found an alternative in inspect element. Turns out you can access the cookies through there.
@TotemYuri
@TotemYuri 2 жыл бұрын
Challenge 3 and the last challenge remote execution were very difficult. After spending over 1.5 hours, I decided just to use your answer so I can move on to the next stage. ..
@missx0
@missx0 2 жыл бұрын
In challenge 1, it was specified in the page that we have to use post req and yet we used get in this part of curl "-d 'method=get&file=/etc/flag1'. Why is it so? Can someone please explain this to me? Thanks!
@HarounaCOULIBALY-q3u
@HarounaCOULIBALY-q3u Жыл бұрын
I would also like to get an answer.
@gemuhhans2262
@gemuhhans2262 7 ай бұрын
how can one view the contents of flag1 with burn suite. I guess many of us can't use burp suite. A tutorial will be great. thanks
@tpavan
@tpavan 2 жыл бұрын
Thanks, it was very clear and useful!
@frybait0626
@frybait0626 9 ай бұрын
On Challenge 2 why is my Burp Intercept Tab doesnt pick up anything whenever I try to reload the page?
@tyrraider7136
@tyrraider7136 3 жыл бұрын
Thanks for video! Somehow I am unable to execute RFI tasks - no code executed neither from my local web server nor from external ones, even the simpliest scripts or shells, according to server logs - vulnerable host not getting it from my server and showing blank "File content preview". Cheated to read /etc/hostname via simple LFI ;(
@MartyYavorcik
@MartyYavorcik 3 жыл бұрын
did you modify the scripts? for example on the php-reverse-shell script you need to open in an editor [nano/subl/vi] and change the IP and port to your local attack machine and port you want to catch the reverse shell back on? Then open net cat listener for example [nc -lvnp 4444] and then execute the command on victim machine and you should catch that shell
@RaEndymion
@RaEndymion 3 жыл бұрын
Thank you for a great walkthrough.
@deifio
@deifio 10 ай бұрын
Thanks, I was really stuck on a couple of the challenges later. I tried and tried and it didn't work.
@danielgervasio5806
@danielgervasio5806 Жыл бұрын
How would anyone who's a beginner be able to figure out these last few tasks without a video like this? They cannot possibly expect people to be able to solve these with such poor instructions. It makes me feel like I'm trying to tackle something that's just not possible.
@sameergotur1098
@sameergotur1098 2 жыл бұрын
Why do we change the method to post in the 3rd challenge and why do we not change the method in the first challenge ???
@charliea856
@charliea856 Жыл бұрын
Where can I obtain that 'php-reverse-shell.php' file to gain access?
@eliasantoniadis8556
@eliasantoniadis8556 Жыл бұрын
Very helpful. thank you
@acerkake4451
@acerkake4451 2 жыл бұрын
Thanks! Just a quick question about playground challenge. What is the difference between apache server and python3 that you used? And why is apache using my IP and python using VPN IP?
@DeeMeltDown
@DeeMeltDown 2 жыл бұрын
That’s a good question but best guess is if the Apache web server is using your WAN IP that would be available through the internet while the python web server would only be reachable on the local 10.10.X.X network you’re connected to through the VPN. Once you set up the python web server you can connect to it through the browser by putting in your local IP address
@adsfwef1331
@adsfwef1331 Жыл бұрын
How do you get your console to split view like that?
@qj1eo
@qj1eo 2 жыл бұрын
when you used a reverse shell by netcat why you used 4545port instead 8000 ?
@MotasemHamdan
@MotasemHamdan 2 жыл бұрын
It's just a personal preference. What's your preferred port?
@simonbolivar9146
@simonbolivar9146 3 жыл бұрын
im just curious about this... you have to use without know anything Burpsuite? when the burpsuite room is on the next module? this room is a bit hard for people like us.
@MotasemHamdan
@MotasemHamdan 3 жыл бұрын
In a typical scenario, you don't need Burp Suite. Any HTTP interceptor works
@simonbolivar9146
@simonbolivar9146 3 жыл бұрын
@@MotasemHamdan i decided to stop this room for a while and start the other easy modules about the web fundamentals and Comptia Pentest+, because i need more logic and more understanding about how this works.
@gottem5369
@gottem5369 2 жыл бұрын
@@simonbolivar9146 I know its been a while but you can use inspect element, e.g for the cookies bit just go into storage and change the cookies there
@tcaa2tcaa2
@tcaa2tcaa2 2 жыл бұрын
Is it possible to use the method as suggest in the Task? edit the method as POST in the Web Developer. I know Burp suit is an option, but this module comes after the RFI task are completed in the learning path
@Startrakk989
@Startrakk989 Жыл бұрын
Every time I type the curl command verbatim it doesn't give me the flag. What is it that I'm doing wrong?
@TheKing-yd6cf
@TheKing-yd6cf Жыл бұрын
can u give us the repo directory? any github link or something else ??
@ashlove8554
@ashlove8554 7 ай бұрын
Good walkthrough but you should put timestamps in video
@ReverseShell1337
@ReverseShell1337 11 ай бұрын
What’s the code for that reverse shell?
@SLILLZ718
@SLILLZ718 7 ай бұрын
Can you set cookies from the developer tools instead of using burp suite?
@MotasemHamdan
@MotasemHamdan 7 ай бұрын
of course
@BykerSoosh
@BykerSoosh Жыл бұрын
I'm not sure if challenge 3 was updated, but this method does not work for me to retrieve the third flag. I am completely lost.
@sudt4581
@sudt4581 Жыл бұрын
you can learn some thing in Authentication Bypass room. The PHP $_REQUEST variable is an array that contains data received from the query string and POST data. If the same key name is used for both the query string and POST data, the application logic for this variable favours POST data fields rather than the query string
@xionarxfl
@xionarxfl Жыл бұрын
did someone do LAB 5 and if yes what was the bypass
@invisibleliberty2275
@invisibleliberty2275 3 жыл бұрын
Just wondering what software or vm are you using?
@MotasemHamdan
@MotasemHamdan 3 жыл бұрын
Kali KDE Plasma
@invisibleliberty2275
@invisibleliberty2275 3 жыл бұрын
@@MotasemHamdan I was wondering if you were using VM fusion?
@invisibleliberty2275
@invisibleliberty2275 3 жыл бұрын
Oops I mean vsphere?
@ragesh9192
@ragesh9192 3 жыл бұрын
could you please show me how to do with burpsuite? because that's the first thing I did by changing the request to POST but didn't get the page
@berkeuyanik6247
@berkeuyanik6247 2 жыл бұрын
When right-klickinh in the proxy Tab you will see the option "change method". It will also change a bit of the structure of the request. Hope that helps
@devskoll
@devskoll 3 жыл бұрын
I watched this whole video only to find out I forgot to use :8000 on the webserver when targeting my RCE. Good content though!
@G_Deon
@G_Deon Ай бұрын
I thought I could do it in the developer options or is there no way?
@Ligariuz
@Ligariuz Жыл бұрын
Thanks, I change method and url by inspecting but didn't work 😞
@wardellcastles
@wardellcastles 3 жыл бұрын
Thank You!
@pedallknife
@pedallknife 3 жыл бұрын
TY brother
@gihandilshara847
@gihandilshara847 3 жыл бұрын
Firt view and first like
@hugovolny413
@hugovolny413 11 ай бұрын
thanks so much
@frownless
@frownless 3 жыл бұрын
Wow, love your channel men. How can i get access to your notes, i need notes for web penetration
@MotasemHamdan
@MotasemHamdan 3 жыл бұрын
Hello, Notes are available as part of the channel memberships. kzbin.info/door/NSdU_1ehXtGclimTVckHmQjoin
@modmah7191
@modmah7191 2 жыл бұрын
ty bro!
@jamesos2744
@jamesos2744 3 жыл бұрын
another comment: what icon set are you using in Kali? I want to try it out
@MotasemHamdan
@MotasemHamdan 3 жыл бұрын
KALI KDE Plasma
@jamesos2744
@jamesos2744 3 жыл бұрын
@@MotasemHamdan Thank you! Never tried it
@StudiofrogPl
@StudiofrogPl 2 жыл бұрын
man, why your recordings are on so low volume? Is so annoying when the commercial comes.
@jamesos2744
@jamesos2744 3 жыл бұрын
This is a great video, but every time I watch you go find and then copy and paste instead of typing "%00" I get a little anxious! :P
@MotasemHamdan
@MotasemHamdan 3 жыл бұрын
I will try :)
@daryltan9130
@daryltan9130 3 жыл бұрын
hi i am using THM attackbox to attempt the RCE challange , how do i start a webserver ?
@MotasemHamdan
@MotasemHamdan 3 жыл бұрын
sudo python3 -m http.server
@myfaveyoutube
@myfaveyoutube 3 жыл бұрын
Domu arigato, sensei
@PHươngTrần-x9j8i
@PHươngTrần-x9j8i Жыл бұрын
I need file shell.php:)
@montala3380
@montala3380 3 жыл бұрын
Please next time just volume up your voice. I cannot hear you clearly even I turn it on max volumn
@lokix5243
@lokix5243 3 ай бұрын
This Room was the go for me to switch to HTB. This Room is dogshit sorry ...
@MotasemHamdan
@MotasemHamdan 3 ай бұрын
All in all, THM is a great platform and I guess you know that there is no platform that is perfect :) I have had my own share of tech problems in HTB too.
@lokix5243
@lokix5243 3 ай бұрын
@@MotasemHamdan good Point… i should use this Video to step up. Ty Brother 👍🏼
@lbm5296
@lbm5296 Жыл бұрын
thanks for the walkthrough. I think it could have been slightly more in-depth in describing why you did certain things. but wow, the low quality of this tryhackme lesson itself was mind-boggling and painful to go through.
@PaperIsCool5
@PaperIsCool5 Жыл бұрын
for the last one, you could also just get the hostname by ../../../../etc/hostname lol
@sudt4581
@sudt4581 Жыл бұрын
if if use this reverse shell: my nc shuts down as soon as the link is established, what is the reason
@lbm5296
@lbm5296 Жыл бұрын
what the hell? this tryhackme module made 0 sense.
@vz7742
@vz7742 Жыл бұрын
They show you basic stuff then when you need to practice that stuff,they add allot of more that they didnt explain to you. This is why i canceled my sub,and im switching to HTB Academy in first july.
@DeeMeltDown
@DeeMeltDown 2 жыл бұрын
Was having a bit of trouble with the reverse shell at the end of the video. I'm using kali and ran the command 'locate webshells | grep php' to find where my php webshells were and then I ran the webserver from the directory that php-reverse-shell.php is in. But when I use that as the payload I got an error that said: WARNING: Failed to daemonise. This is quite common and not fatal. Warning: fsockopen() [function.fsockopen]: unable to connect to 127.0.0.1:1234 (Connection refused) in 10.13.49.109:8000/php-reverse-shell.php on line 100 I looked at the script at line 100 which says: $sock = fsockopen($ip, $port, $errno, $errstr, 30); If you scroll to the top of the script there's comments that tell you to edit the variables $ip and $port I only edited the ip to match my local IP on the 10.10.x.x network - the one you get when you run ifconfig. The port in the script is set to 1234 so I ran: nc -lvp 1234 as the listener. After I did all this the reverse shell worked for me.
@SatisfyingSleepASMR
@SatisfyingSleepASMR Жыл бұрын
thank you!
Web Application Content Enumeration  | TryHackMe Content Discovery
30:28
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 13 М.
Web Hacker Basics 04 (Local and Remote File Inclusion)
9:52
Netsec Explained
Рет қаралды 35 М.
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 36 МЛН
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
File Inclusion - TryHackMe Junior Penetration Tester 3.6
44:02
Brock Rosen
Рет қаралды 15 М.
Server Side Request Forgery | Junior Penetration Tester TryHackMe SSRF
20:51
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 27 М.
Remote File Inclusion Explained and Demonstrated!
9:54
Loi Liang Yang
Рет қаралды 41 М.
The Complete Linux Privilege Escalation Course | TryHackMe Junior Penetration Tester | OSCP
1:03:46
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 99 М.
TryHackMe! [Web Vulnerabilities] Local File Inclusion
10:52
John Hammond
Рет қаралды 89 М.
Reverse and Bind Shells Basics | TryHackMe What the Shell? | OSCP
29:20
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 27 М.
Cross Site Scripting XSS  Explained | TryHackMe Junior Penetration Tester | OSCP
26:38
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 28 М.
Command Injection - TryHackMe Junior Penetration Tester 3.9
20:09
Brock Rosen
Рет қаралды 4,4 М.
TryHackMe! Basic Penetration Testing
30:14
John Hammond
Рет қаралды 2,4 МЛН
Advanced Local and Remote File Inclusion - PHP Wrappers
11:19
Netsec Explained
Рет қаралды 10 М.