Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF

  Рет қаралды 43,887

John Hammond

John Hammond

Күн бұрын

Пікірлер: 67
@dedkeny
@dedkeny 3 жыл бұрын
Many things were learned today from Javascript & XSS to video-editing, thanks John!
@anonymousmokona8541
@anonymousmokona8541 3 жыл бұрын
This video series got me to finally start learning pentesting - I always perceived it as something arcane and intimidating, but seeing how you struggle with node got me thinking that there is no shame in sucking at stuff.
@timothybadenach2411
@timothybadenach2411 3 жыл бұрын
good to see that a security professional with 10 plus years can still struggle getting up the hill, so to speak. Gives guys that are learning motivation to keep going
@CyberAbyss007
@CyberAbyss007 3 жыл бұрын
Thank you! I'm actually starting to get this stuff! Appreciate that you show how hard this stuff is and how much patience is required.
@hamzabettache497
@hamzabettache497 3 жыл бұрын
I just like how you talk with your self and make actions :D it helps a lot : ) thanks for your videos, keep them ON.
@sumedh1678
@sumedh1678 3 жыл бұрын
Let’s give a moment of appreciation for the amazing walkthrough. Thanks John.
@kaihuang5420
@kaihuang5420 3 жыл бұрын
38:08 is starting of the dulpicate of previous content till 51:58. hope you can fix it! But great job!!!! John Thanks a lot for suffering for us non-javascript fanboys.
@dennismunyaka6537
@dennismunyaka6537 3 жыл бұрын
watching john work is like watching myself hack. I would've however given up, the live learning, googling and also building of payloads gives your channel an authentic human touch. as opposed to all other channels just regurgitating payloads from writeups. kudos
@teddybear9152
@teddybear9152 3 жыл бұрын
another video and another day of learning for me, thanks again John for all your hard work. Kudos to you for doing all this for us and still doing a day job and "life"!
@giusepperandazzo5357
@giusepperandazzo5357 2 жыл бұрын
I like your approach...it's is similar to a software engineer daily job...read, understand, try, fail repeat and so on...
@xAngoryx
@xAngoryx 3 жыл бұрын
Just found your channel and really loving your content
@mukundbhuva
@mukundbhuva 3 жыл бұрын
Hey, seems like the video is duplicated from 38:08. Love from India ❤️.
@theisoj
@theisoj 3 жыл бұрын
I noticed the same thing. I think that John made a mistake accidentally.
@jacobsilva421
@jacobsilva421 3 жыл бұрын
I love the videos where there is 5 minutes left and he's still pulling his hair out. Just knowing he's about to find the one little mistake borking it up.
@businessgoose8605
@businessgoose8605 3 жыл бұрын
Like last year when I subed to you, you had like 80k followers. Keep going bro!
@peterchari3839
@peterchari3839 3 жыл бұрын
This is amazing. We learn new things everyday!!!!!!! CSP, fetch
@Grommish
@Grommish 3 жыл бұрын
An Ide or setting Sublime for the context you're languaging on would help. Would make the inevitable formatting errors stand out
@diddyman1958
@diddyman1958 3 жыл бұрын
I understood very little of that but it was great to see you get the flag in the end.
@_DeProgrammer
@_DeProgrammer 3 жыл бұрын
Using an editor like vim with bracket highlighting would prevent painful mistakes like this. Brutal! Good video tho.
@blackjackdealer204
@blackjackdealer204 3 жыл бұрын
I pace around my room when John releases content..
@neilthomas1907
@neilthomas1907 3 жыл бұрын
ngl !! lowkey better than netflix rn
@jannikmeissner
@jannikmeissner 3 жыл бұрын
Yes, I had fun! Another great video that made my day
@kadensharpin2156
@kadensharpin2156 3 жыл бұрын
my eyes struggled to watch John struggle through the JS
@alandonaly457
@alandonaly457 3 жыл бұрын
I always learn a lot from you , thanks!
@chriss8825
@chriss8825 3 жыл бұрын
I am no JS expert, but in my experience JS is good at breaking itself and proceeding lines of code. I kept thinking you should just look at the browser console, or even even just copy paste known working attack to confirm nothing is borked. Not sure if this would have worked (ive only played with node with one small app), tho the way I would have approached getting the final data: Either sending it all to the console, or injecting it all into an element in the list page, or perhaps the easiest is just alert the data with something like match('CHTB.{50}') .
@mossdem
@mossdem 3 жыл бұрын
This has been me trying to wrap my head around 'self' the past few days in Python lol
@0x8badf00d
@0x8badf00d 3 жыл бұрын
I've been screaming punctuation at the screen: "CHTB\\{.*\\}" You kept escaping the asterisk. Probably just needed to double the backslashes when using normal strings.
@jonharper5919
@jonharper5919 2 жыл бұрын
Hah I was saying the same thing. Why are you escaping the *??? On the other hand he does everything else much better than I could ever do
@ankurverma1157
@ankurverma1157 3 жыл бұрын
Waiting for the video ❤️
@algerienizer
@algerienizer 3 жыл бұрын
this is great, thanks!
@SabrinaSays
@SabrinaSays 3 жыл бұрын
Really awesome video! I'm just confused as to how the flag was decoded. And if we already had the coded version of it from /alien, then why did we need to fetch it through the terminal? Sorry if this is a stupid question.
@BilelBM
@BilelBM 3 жыл бұрын
Looking at the browser console would ve helped you debug the fetch regex problem. GG
@vater7841
@vater7841 3 жыл бұрын
realy exiting when you post a video,i hope someday you can teach how to investigate crypto scam with hacking skill like how they code or something else,thank you
@tg7943
@tg7943 3 жыл бұрын
Push!
@cair0_
@cair0_ 2 жыл бұрын
holly molly
@viv_2489
@viv_2489 3 жыл бұрын
Nice content as usual...
@Lacsap3366
@Lacsap3366 2 жыл бұрын
I dont't really understand why the javascript alert popup only opens two times if there are so many XSS payloads on that site.
@choleralul
@choleralul 3 жыл бұрын
Cool!
@anonanon1400
@anonanon1400 3 жыл бұрын
PS1 var in .bashrc could help to fix that long pathname problem.
@aryangurung30
@aryangurung30 3 жыл бұрын
sheeeeeeeesh
@JuanBotes
@JuanBotes 2 жыл бұрын
thanks for making the content. \o/
@Zebby2013
@Zebby2013 3 жыл бұрын
Who the heck downvoted this only a few min in to the Premier?
@253nate
@253nate 3 жыл бұрын
A dumbass hater. Haha! They obviously don’t know who this man is. Hahahahaha! The world is so lucky we all took an oath.
@gtdt5666
@gtdt5666 3 жыл бұрын
that was cool :)
@cletusmugane
@cletusmugane 2 жыл бұрын
i love you too
@georgehammond867
@georgehammond867 2 жыл бұрын
regex is some nightmare>
@mahmutivanov1204
@mahmutivanov1204 3 жыл бұрын
Keep it up,
@vineet1
@vineet1 3 жыл бұрын
24:15 . 1 hr break lol
@cherifxtitou6822
@cherifxtitou6822 3 жыл бұрын
i hope if one day i will have skill like y have am very jealous
@azeesabdul2674
@azeesabdul2674 3 жыл бұрын
How to review code to find bugs
@iliaschymas1851
@iliaschymas1851 3 жыл бұрын
i dont want to be that guy but in 4:18 i think he is ironing a humam suit not a actual human
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
How many times also spending master season 9 times also collection anyone 29 test collection master in the past for collecting 2 nc .lnc ......X collection master in the
@fordorth
@fordorth 3 жыл бұрын
LEARN node!
@fordorth
@fordorth 3 жыл бұрын
I remember when I first started watching your videos you at one point said you should not use scripts if you don't know what they do... now you just go out and grab scripts for everything and fight with them to make them work.!?
@randomnickname00
@randomnickname00 3 жыл бұрын
hey
@hocmuong28tv89
@hocmuong28tv89 3 жыл бұрын
💋💖💖💕
@alawe220
@alawe220 3 жыл бұрын
Swae Lee
@MrDeicide128
@MrDeicide128 Жыл бұрын
i'm glad regex destroys you as much as me
@akashkhan1988
@akashkhan1988 3 жыл бұрын
I would love to get your help in bug bounty hunt Can you help me please..! By the way bro LoVe From Bangladesh🇧🇩🇧🇩
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Ther ck cash tp link 🖇️ password 🔑 confirmly flag 🚩
@udhavkansal3426
@udhavkansal3426 3 жыл бұрын
Sirr big fan ❤ I want ur guidence. Plzz help And also, luv from india 🇮🇳
HackTheBox! Magic - SQL injection, Magic Bytes & Setuid
43:44
John Hammond
Рет қаралды 51 М.
Cool Parenting Gadget Against Mosquitos! 🦟👶 #gen
00:21
TheSoul Music Family
Рет қаралды 27 МЛН
黑的奸计得逞 #古风
00:24
Black and white double fury
Рет қаралды 16 МЛН
Flipping Robot vs Heavier And Heavier Objects
00:34
Mark Rober
Рет қаралды 59 МЛН
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
28:13
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
34:34
TryHackMe! Bypassing Upload Filters & DirtySock
53:38
John Hammond
Рет қаралды 68 М.
HTB Cyber Apocalypse - cURL As a Service
26:07
John Hammond
Рет қаралды 38 М.
GoogleCTF - Cross-Site Scripting "Pasteurize"
29:21
John Hammond
Рет қаралды 97 М.
How to Actually Escape the Botnet
32:17
Mental Outlaw
Рет қаралды 527 М.
Exploiting Tomcat with LFI & Container Privesc - "Tabby" HackTheBox
45:54
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
19:11
Jailbreaking the Simulation with George Hotz | SXSW 2019
55:59
Cool Parenting Gadget Against Mosquitos! 🦟👶 #gen
00:21
TheSoul Music Family
Рет қаралды 27 МЛН