Man, i have to say: i love how your vids on these challenges are uncut and honest! It makes me feel less of a fool myself, when i'm stuck on something trivial. At least next time i can say:"It's okay you little doofus, John Hammond forgot to use backticks when setting a JS-variable. Apparently even the best guys out there make mistakes." Thanks for the wonderful content John!
@lobley23 жыл бұрын
The best guys are all the better for being honest about their mistakes and demonstrating that they are human. For example I love that prominent scam fighting youtuber Jim Browning fell for a scam that lost him his channel temporarily, but made sure to tell the world he fell for it. It shows no matter how experienced you think you are you still have to be on your guard.
@drewrad83 жыл бұрын
Love the videos where you're doing it for the first time. It's all about learning how other people learn!
@_xpl0it_3 жыл бұрын
.. that satisfaction .. It's priceless
@kritagyagupta86193 жыл бұрын
John thanks for this opportunity for us to learn from this
@NateRoberts3 жыл бұрын
I actually appreciate when John does it the first time and struggles. Bc I know he does “easy rooms” but sometimes when I struggle I feel bad. So seeing John struggle too validated my struggling 😅 thanks again! Learned a lot from your struggle 😂😂
@PhilAlbu3 жыл бұрын
Our failures teach us much more than our successes. Thanks for being so organic in your content. I think it's great to see that people don't always figure things out on the first try.
@develepre3 жыл бұрын
I'm that Node Guy that laugh at all `back-tick moments`
@diddyman19583 жыл бұрын
I understood very little of that but still immensely enjoy your videos.
@i-negm2 жыл бұрын
Nice video , I liked your uncut way of recording this. It makes a lot of sense to me when watching you put all things together. Thanks for sharing such knowledge. Have a nice day sir.
@maxxroach80333 жыл бұрын
I love watching you do these for the first time. I know the satisfaction you get when solving problems. Keep it up man!
@Khusyasy3 жыл бұрын
i just found this channel randomly, and i love the videos 😅
@fr8trainUS3 жыл бұрын
You call it painful, imo observing the thought process and troubleshooting was great! Congrats on the success
@annikablohm3 жыл бұрын
Weird as hell payload. Love it.
@MI7DJT3 жыл бұрын
This is why it's called Hacking!! Great job John!
@adbirdk3 жыл бұрын
As someone trying to secure my code, I really enjoy watching your web security vids..
@swapnilbhosale22303 жыл бұрын
Great video man. Big fan! Thanks for sharing the knowledge with the community. I appreciate it. 🙏🏻
@mattrickbeats2 жыл бұрын
Bro! You are a genius fam!
@ca79863 жыл бұрын
Love this new style with struggling. ❤️
@rbchoyce3 жыл бұрын
I don’t understand much on here but it’s still fun to watch and learn
@anthonutty3 жыл бұрын
I think jsonp is a common technique where cross-domain configurations are not setup, which means you can only basically do GET requests. So you basically send a GET request with a callback name of your choice, and take the response text of the response and eval it which essentially gets you to result passed into your function callback by name.
@_CryptoCat3 жыл бұрын
didn't solve this one, looking forward to a detailed walkthrough 😸
@OMER3-1-32 жыл бұрын
DAMNN That was a great video thanks.
@jelgue2 жыл бұрын
This one was really cool and interesting to me. Loved it!
@CodyHoskin2 жыл бұрын
Such a good video. It’s awesome learning with you. Lol.
@haseebarshad74512 жыл бұрын
I WAS SCREAMING TACS JOHN!!!
@alexcordovac Жыл бұрын
This is gold!!!!
@sallytaylor63 жыл бұрын
Great content John
@HackerPaints2 жыл бұрын
You’ve spared no expense
@BearkFearGamer3 жыл бұрын
Anxious thinking in backticks, hahaha. Congratulations man!
@soniablanche56722 жыл бұрын
jsonp was a hacky way of sending data directly via javascript back when all cross site resources were not allowed by browsers. you're supposed to run it as the src of a script tag (script tags ignore CORS policies). That's why it's asking for the name of the callback, you would write a function that expect the data passed as argument.
@SandyOC1003 жыл бұрын
Always better problem solving live
@gurujiguruji80503 жыл бұрын
Awesome 🔥
@orgozlan3233 жыл бұрын
Thank you
@jmsanchez56313 жыл бұрын
IM SCREAMING FOR THE BACKTICKS CMON
@0xfsec3 жыл бұрын
I love this htb apocalypse series.. I can learn not just a black box but also white box testing. Do you have any video or tutorial recomendation for beginner on white box testing?
@SIRBOB1023 жыл бұрын
the backticks of doom
@abhishekmorla12 жыл бұрын
thanks
@logiciananimal3 жыл бұрын
A great example to illustrate that CSP is not a cure-all.
@bulmavegeta233 жыл бұрын
that was intense
@choleralul3 жыл бұрын
Cool!
@dopy84183 жыл бұрын
Hey john how can we rewatch the hacking game you commented on with ippsec ?
@viv_24893 жыл бұрын
I haven't found the videos on Twitch.. it was only live stream I guess...
@_CryptoCat3 жыл бұрын
i think HTB said they would be uploading on their YT channel
@viv_24893 жыл бұрын
@@_CryptoCat oh cool
@tylerrake91483 жыл бұрын
@Do py you can get it now available on youtube, on hack the box channel.....
@dopy84183 жыл бұрын
@@tylerrake9148 Yeah i saw thanks.
@daveminion62095 ай бұрын
never thought a man could suffer so much outside of Purgatory - till now.
@tkstdude3 жыл бұрын
Awesome
@hakimelmansouri31663 жыл бұрын
Bro u just so smart i was thinking with you but u always think outside the box and i keep getting stuck hahahaha
@optional.3 жыл бұрын
owsem ❤️
@isiraadithya3 жыл бұрын
If the content type is "application/javascript" you cannot use html tags inside it. Browser will ignore it and throw a exception. I think I wasted about 5 hours without knowing this on a bug bounty program. If I made a mistake please correct me. (I am 16 years old noob 😅)
@kvikkenni3 жыл бұрын
No that was not painful that was epic
@hihihi17333 жыл бұрын
where are you.. ? i am eagerly waiting for your videos.
@RicondaRacing3 жыл бұрын
I'm definitely not that advanced with BASH to be calling out syntaxes and functions like that. Is there any more entry-level stuff on HTB?
@auro30583 жыл бұрын
❤❤
@adityasinghixc33973 жыл бұрын
Hey John what's your main os ???? Which Linux ??? This is a VM like the original one ??
@acolddayinhell62063 жыл бұрын
did you go live or uploaded a video?
@dandan78843 жыл бұрын
Why would someone use puppeteer to access some hidden localhost page on the backend after a user post something? Automate administrative work? Feels very risky to do it in that way IMO Or maybe... It's just an insecure code for people to learn from...
@Qwerasd3 жыл бұрын
The puppeteer instance simulates an administrator.
@ebux9885 Жыл бұрын
28:39 ngrok actually put your IP in the X-Forwarded-For header
@raymond254753 жыл бұрын
how do you download an entire website folders and file ?
@juliachild93773 жыл бұрын
I did it all for the cookie.
@dev__0042 жыл бұрын
So what did we learn today? Everything needs to be url encoded😝😝
@hasibavi75393 жыл бұрын
Hi Hammond, I usually watch your every video and your contents are very rich. I have a query, suppose my SIEM detect potential cobalt strike on a internal communication (local to local) and as per checking it was detected by JA3 fingerprint. So, how can I locate on the machines, is there any true beacon or just false positive.
@phecdaDia3 жыл бұрын
Does anyone know if you can still download these boxes like John does? Feel like having some nice coding examples would be useful to learn.
@kritagyagupta86193 жыл бұрын
Sup people
@thecaretaker66593 жыл бұрын
17:22 Eureka!
@hakoo27003 жыл бұрын
amazing ty so much i leant a loooooooooooooooot from this tnx:) ... btw i was doing '${val}' and seeing it not working and wondering why until i saw the exact same stackoverflow page and see `` and go like but why?!
@Akhand_Bharat181133 жыл бұрын
Sir which Linux os your are using in this video
@usha42203 жыл бұрын
Ubuntu
@LyraMakes3 жыл бұрын
I believe that it's Kali
@ahmedhajjami27443 жыл бұрын
@@LyraMakes Ubuntu , look at the terminal!
@LyraMakes3 жыл бұрын
@@ahmedhajjami2744 Whoops! My bad. I was going off the logo in the top left.
@JacksonMarshal3 жыл бұрын
I like the fact that John acting like he has never solved this problem before 😄
@PC-fe1pf3 жыл бұрын
I think he was solving it for the first time.
@JacksonMarshal3 жыл бұрын
@@PC-fe1pf nah dude. Checkout his other videos and you will see
@PC-fe1pf3 жыл бұрын
@@JacksonMarshal You mean the other Cyber Apocalypse videos?
@JacksonMarshal3 жыл бұрын
@@PC-fe1pf every Video of his is pre-scripted. Because he doesn't want to spend hours on recording himself trying to find it. So he does it ahead and then show us
@JacksonMarshal3 жыл бұрын
@@PC-fe1pf and yes every HTB
@kaihuang54203 жыл бұрын
I wish john know I was yelling the back-ticks, but I didn't skip the video tho.
@corbezzz3 жыл бұрын
~yt algorithm things~
@jhbonarius3 жыл бұрын
javascript is such a mess. i still cannot believe its the fabric behind most of the ui in the world today
@ElGhadraouiTaha3 жыл бұрын
Vote for john to be a president.
@edwardortiz85803 жыл бұрын
I am also a veteran. I had some questions regarding certifications, and if you paid for them out of pocket and has the VA reimburse you, or had the VA pay for them via the GI Bill, if so, which ones were covered, and which were not ? I found some information. But nothing very clear. Best regards, TIA Eddie
@vinkuu3 жыл бұрын
while true; do nc -klnvp 9000; done
@aayushkubitkar48276 ай бұрын
why do you need the display in the payload to trigger the payload? When the bot visits the /list for the first time via puppeteer, then the feedbacks would be loaded since empty callback would default to display. In one of those feedbacks would also be the payload and that would trigger the src request which loads the /list endpoint again on the localhost and this time the callback function is populated with the window.location which ends up making the GET request to ngrok url. i don't understand the need for display in the payload. Can someone explain? @johnhammond maybe?