John: Im a newbie, still have a lot to learn Me: *sobs*
@ucheugbomah222810 ай бұрын
me too 😂😩
@mrhappysmiley29684 жыл бұрын
This was incredible! Loved it! Never seen a challenge like this. This was very valuable to me. Please make more.
@granitbajraktari16004 жыл бұрын
Just a heads-up: at 19:40, when you wanted to only POST to the first URL and then follow the redirect without POST, you could have just dropped the "-X POST", since "-d" already implies POST, and curl would have followed to the redirected URL with GET.
@christianrang57824 жыл бұрын
I really enjoyed seeing the thought process. This was one I was super close to solving, but I'm a noob at XSS. I didn't know any cool tricks like shown in the vid. Keep up the great content!
@rodrigo1300 Жыл бұрын
A lot of people out there try to portrait something that they aren't and seeing someone like you being honest about not solving this CTF. Respect
@novanuke13564 жыл бұрын
I think I need to start reading more writeups. I've always tried to do a CTF and if I can't get it after trying for some time I guess I usually walk away and I end up not actually learning from the CTF which is the point. Great video man!
@AdiSings20232 жыл бұрын
ye. the struggle is real
@padaloni4 жыл бұрын
That was actually super awesome. Thanks heaps my bro. love your honesty. that was not an easy challenge. you're such a smart dude it's kinda nice to see you need the help of others too.
@LESLEYYY04 жыл бұрын
Would love to see you do the other ones :p
@SiyuJiang4 жыл бұрын
Your content is great. It’s easy to follow, and I really like the perspective that we get when you show how you think through the challenges
@krlst.59774 жыл бұрын
Real good explanation, i came here from LiveOverflow where he covered this CTF and mentioned yours explanation and, no offense for LiveOverflow :-), now i got it much clearly. Thank you!
@ibragimabdulazizli42302 жыл бұрын
Wow! You are the one who leads to how to think as a hacker. I searched looots of sources to learning CS. And you are my fav. Thankss
@BCRooke14 жыл бұрын
The b/1337 is just a reference to a bug ID. At Google they use an internal bug tracking tool called buganizer, and short links are in the form of b/bug-id. Usually you see this in the code: TODO(b/5746327): fix foo
@ancestrall7942 жыл бұрын
I thought 1337 meant LEET
@userou-ig1ze2 жыл бұрын
@@ancestrall794 that is what it stands for...
@Brontosauredumarais4 жыл бұрын
Thanks John, super interesting! Can’t wait to see the new challenges you are preparing!
@liamlouw46434 жыл бұрын
John ima need you to chill on these videos, my sleep schedule can't take it!! Loving them man, really fun to see your thought process!
@mossdem3 жыл бұрын
This really helped understand XXS properly. Now I feel I can learn a little more! I would love to see a little shortcuts video. You fly around a terminal and subl! Maybe even just a little write-up, just a thought but great video
@Stupid_Money2 жыл бұрын
Definitely a good beginning point to have your video on ctf. I just became proficient in Javascript a couple months ago and being able to follow along with this task really motivated me!
@nft_explorer4 жыл бұрын
You are so so good man, its interesting to watch your videos and learn from you.
@maoropizzagalli41534 жыл бұрын
Glad to see I'm not the only one you get discouraged when those things happens. Lesson learned I hope, Thank you papa for the teaching
@LUKESLYTALKER4 жыл бұрын
I’m getting buff doing all these cURLs bro!
@exoooooooo4 жыл бұрын
You are very kind and humbly willing, to tell the truth when you solve this with the help of others. It's not like someone there who considers himself as "a hacker that your friends told you about" but is only good at making videos and making up a tale.
@harshrai62594 жыл бұрын
Really insightful video 👍 and now I want the pleasure of finding those flags I feel so lucky to have a node js and js background
@ryansoma67824 жыл бұрын
Thank you ! , can't wait for another google ctf web challenge video !
@newuser24744 жыл бұрын
First time motivated by watching your video
@cam5454 жыл бұрын
I'm here for the F U L L F R O N T A L honesty. 13:30
@claythearc83424 жыл бұрын
You may have answered this later in the video but b/1337 or any number is generally just shorthand for Bug 1337 or Bug whatever that's being tracked on some external issue tracker.
@ch33zer4 жыл бұрын
The b/1337 refers to a bug on Google's internal bug tracker, commonly accessed on the intranet at b/$bugid. I'm surprised they left this in for an external event. Source: I'm a google employee :)
@rootdev81064 жыл бұрын
At first I assumed the solution was to post because .slice(1, -1) would only remove the outer ;) Nice video, keep it up!
@gaurav15654 жыл бұрын
It'll be really nice if you did the other web challenges as well. More than the solution seeing the rabbit holes and methodology of sorts is really important.
@dylanhess49064 жыл бұрын
Thank you for this video please post more of these
@yoshi51134 жыл бұрын
Thanks u Sir.. love the way you explain all the stuff 👏👏👏
@akashrakshit84463 жыл бұрын
Wow dude thanks 👍🙏🏾 loved it
@JustFun-dj3pq4 жыл бұрын
Great walk through, love your video
@xFreeman44 жыл бұрын
Pretty Nutz! Keep up the good work man!
@ta8ta8414 жыл бұрын
more google CTFs will be appreciable
@KDevGaming19213 жыл бұрын
Thank you for this learned a lot from this video.
@orange69464 жыл бұрын
Actually really interesting. It did strike me as odd that he used JSON.stringify when there was really no need, but I would have never looked much farther than that. Good content!
@bazboz14683 жыл бұрын
not disrespect you, but mid vod i had this idea 💡 of a drinkin game, when ever you say peculiar we take a shot 🥃 now i continu watching i love what you doing btw keep up the good work ❤️
@adhilazeez60394 жыл бұрын
Awsome bro... You're inspiring us... Thank you.
@KaleshwarVhKaleshwarVh4 жыл бұрын
I lost it when cookie and hookbin came up. I'm weak there.
@abhisurwade4 жыл бұрын
Appreciate the video walkthrough.
@ServusChristi777 Жыл бұрын
Ed Sheeran really is talented.
@FunnyVideos-fd3ts9 ай бұрын
Lol so relative
@q-bert5583 жыл бұрын
Thus was incredible!!
@rafaelgontijo57923 жыл бұрын
Absolute amazing!
@Dogelition4 жыл бұрын
I think the Tracing challenge would make for another great walkthrough video!
@somebodystealsmyname4 жыл бұрын
Hey John, take a look at webhook.site, I think the UI is much more intuitive for XSS/SSRF/CSRF.
@eeengoh51894 жыл бұрын
It doesn't work on hookbin for me for some reason, but webhook does ! Thanks for the recommandation !
@arshiyakhan67894 жыл бұрын
Thank you bring more these kinds of ctfs and python scripting.
@Ulyeney2 жыл бұрын
Thanks, John
@4ag24 жыл бұрын
Amazing content always! I struggled so much last weekend hopefully I learned a lot!!! thnx
@Wakkas4 жыл бұрын
Hey John, I'm an officer for the Cyber Security club at my university. We would love if you could come in for 30 minutes and give a talk about some pen testing or any networking exploits that are interesting to you!
@_JohnHammond4 жыл бұрын
Feel free to send me an e-mail, I'm always happy to hang out! :)
@ziil75252 жыл бұрын
very cool ctf real video, thanks man.
@h8handles4 жыл бұрын
My name is, what? My name is who? *imitates turntables zickazicka john hammond *to the tune of my name is slim shady*
@captainsalazar71664 жыл бұрын
Sir please tell us how did you install that sublime build view? I am looking for it but couldn't install it. I am using sublime text 3
@ratatouille73014 жыл бұрын
Hello, thanks for this video. How did you know about the "[ ]" in the "content[ ]" ? How can I find it if I'v never seen it ?
@Dogelition4 жыл бұрын
If you look at the body-parser documentation here: www.npmjs.com/package/body-parser It says "The extended option allows to choose between parsing the URL-encoded data with the querystring library (when false) or the qs library (when true). [...] For more information, please see the qs library. If you follow that link, you can see a bunch of examples for how it lets you parses variou query strings into objects/arrays.
@kyngcytro4 жыл бұрын
Dude I didn't even know something like hookbin exists thanks John and yes I'm a John too 😅
@peterarbeitsloser78194 жыл бұрын
#commenting_for_the_algorithm You are great John!
@siddharthjohri29354 жыл бұрын
Very Nice video just as always. Stay frosty.🥶
@shivambeeyani67584 жыл бұрын
for the algo Always love your videos, especially because I'm shit in web challenges
@mina_ashraf4 жыл бұрын
Hey John, Amazing content as usual. I have a small question, where would you recommend for a python beginner to learn the necessary libraries and tools? Do you suggest a specific course or a website to learn the tools that you usually use such as pwntools, Crypto, requests, and so on? C++ is just not the tool for something like this
@moriartyshelby16184 жыл бұрын
something never be changed..: "Hello, my name is John Hammond.."..NICE
@dlcrdz003 жыл бұрын
wow...it always amazes me how much information and syntax you input for the CTF. How did you learn all this stuff? haha
@nmg555w4 жыл бұрын
note that sending the object using the url encoded parameter is only possible because of the `extended=True` bit below the comment saying "we need this for the captcha for some reason" :) (understanding this was for me the clue that helped me solve the challange)
@erickgiffoni4 жыл бұрын
that was very cool ! thanks !
@domaincontroller4 жыл бұрын
disclaimer 01:30
@nicktm20053 жыл бұрын
great tutorial ... like always ... thank you
@jimanky4 жыл бұрын
Thank you so much for sharing your knowledge. +1 sub
@tecdom3 жыл бұрын
Muito bom!!!!! Grato por compartilhar seu conhecimento. Aprendo muito com seus vídeos.
@amellcotts66504 жыл бұрын
Please continue doing those.
@Hanhan0994 жыл бұрын
we want more
@R4B33264 жыл бұрын
Missed the live Stream, but loved the video!
@ChupoCro4 жыл бұрын
How come the microphone character 🎤 @7:10 in your Sublime is in color?
@nessiev7804 жыл бұрын
Hmm, i really dont have a clue about anything going on here, but i still watched it
@NoONE-bk7ud2 жыл бұрын
i like how said i'm not that good
@matthewshen4 жыл бұрын
This was the only challenge I got. Can you also explain some other challenges as well?
@immyslave29523 жыл бұрын
thank you so much!!!
@tears_falling4 жыл бұрын
feels good to know node
@muhammadbellabuaynunyai27544 жыл бұрын
I love you solved this problem
@maxxxy9104 жыл бұрын
YESS PLEASE DOO MORE OF THESEE PLEASSEEEEEE!!!!!!!!!
@mahfuzkabir78122 жыл бұрын
This was great!
@amir.m55502 жыл бұрын
you are great.👍
@whistletoe4 жыл бұрын
keep up the good work!
@Smilin_Chris4 жыл бұрын
Commentingforthealgorithm
@sontapaa11jokulainen944 жыл бұрын
Replying for algorithm.
@_JohnHammond4 жыл бұрын
You're the best! Thanks so much!
@SeanCMonahan4 жыл бұрын
Commenting the flagorithm
@mr.meatbeat9894 Жыл бұрын
Thanks dude!
@Hexbyte9654 жыл бұрын
Awww, I missed the live stream.
@inginerdemulslapte93784 жыл бұрын
Johnito, thank you for you video!!!11!!!!
@_JohnHammond4 жыл бұрын
Thanks so much for watching!
@krlst.59774 жыл бұрын
The one question how it supposed to get where issue is by this "b/1337"? I know it means leet but how it leads to JSON.stringify row of the code, can someone explain please?
@bruh_55554 жыл бұрын
Why does log-me-in above pasteurize in the challenge list have only 7 points or has it been solved by too many people or my eyes aren't working??
@tenex2 жыл бұрын
I really liked but I got list and cannot understand how figured out the double slash
@a_personlol8944 жыл бұрын
Cookie Monster does not approve of all the cookie stealing going on here.
@website83624 жыл бұрын
Writeups ❤️
@farjamfarahbakhsh90304 жыл бұрын
when did Ed Sheeran become interested in IT?!! JK :)) Thanks John for good content.
@msalih4 жыл бұрын
awesome!
@BrainFood1554 жыл бұрын
So was the "JSON.stringy()" portion unnecessary? It doesn't seem like your exploit at the end used what you learned from the JSON.stringify()? Or am I missing something?
@zwiebelopi98984 жыл бұрын
Vincent Zhen Did you actually watched the video? He was creating a post request and assigned an object to the content parameter. Because it’s an object, Json.stringify allowed to break out of the double quotes.
@BrainFood1554 жыл бұрын
@@zwiebelopi9898 I did watch it but I don't know JS very well. I saw that he was sending an object via the POST request but I didn't understand how `content[]=` was the object in the JSON.stringify(). I think I get it now though. Thanks
@dralfonzo244 жыл бұрын
"what is 1337" lol
@Dilpreetsinghbaath624 жыл бұрын
Leet
@cameraman19393 жыл бұрын
It might shock you but it's a number..
@yakonick3 жыл бұрын
Yo In Russia it was (maybe it's not anymore, it was a long time ago (about 10-15 years) ) a "true young Men number" 13 - your age 3 - your average mark at school (max value is 5) And finally, 7 - the number of your class at school
@karanagarwal2824 жыл бұрын
Please provide links to the writeups you are talking about....
@karimmohamed37444 жыл бұрын
Loved it
@gopalmore3154 жыл бұрын
Excellent
@scottch44444 жыл бұрын
does this man really not know the fable of 1337
@MrJCollector4 жыл бұрын
Please do the REV beginner ones!
@ElliyahuRosha4 жыл бұрын
Hi, john. Can u point me to an article which discusses when tp use request.session() and when request.get/post() ? Thx