XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"

  Рет қаралды 42,008

John Hammond

John Hammond

Күн бұрын

Пікірлер: 76
@joseurena7116
@joseurena7116 3 жыл бұрын
I love the fact that you’re doing CTF stuff, every influencer is doing mostly box pwning and ctfs develop those quick thought skills required. Nice to see a pro do it 👊🏻
@durzua07
@durzua07 3 жыл бұрын
Not gonna lie, I was lost on the whole video but I loved it! Insane stuff John!
@lepsycho3691
@lepsycho3691 3 жыл бұрын
That was fun, I felt the same feeling watching you as I do when I'm not sure if this is the right track or not! Good job!
@mossdem
@mossdem 3 жыл бұрын
Loving these videos as always John! I'm now beginning to actually understand what it is you're writing so its a lot easier to follow along. Keep up the grind, love to see it!
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
Call me crazy but the way he’s going through this isn’t a normal happening out in the wild. It’s too obvious and too rehearsed, he never went into anything technical, it was more of a Öh of course”kind of thing. WITH everything nice and tidy and human readable, one natural logical discovery flowing into the next, it’s like watching someone go through a page of pseudocode. Idk 🤷 I just have not seen any actual exploits work so fluidly and without any obfuscation put into the so called errors he was getting.
@cenkgokce4404
@cenkgokce4404 3 жыл бұрын
Really great solution John, probably I will never figure out that challenge.
@BRYDN_NATHAN
@BRYDN_NATHAN 3 жыл бұрын
11:14 confusion it creates entropy thank you 13:51 [✓] moving "toward" a limit, [✓] moving "towards" a limit
@dancingtiger577
@dancingtiger577 3 жыл бұрын
algorithm, love learning by watching you learn
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
Like algorithms you do? Ok.. Let P = Bn, the Boolean algebra of subsets of {1,2,...,n} ordered by inclusion. Let 2 be the poset with two elements (it has two elements ˆ0 ≤ ˆ1) ✅ WiTh M3 S0 FAR?? OK Cool 😎 SO….. because we can view Bn as a zero-one vector. Let us compute μ for Bn. μ for 2 is given by μ(0,0) = μ(1,1) = 1 and μ(0,1) = −1. With the lemma, we find that μ(T,S) = (−1)|T−S| i.e. μ(T,S) = (−1)# times T and S differ. I think the only thing Mr. Hammond is learning is how to make a KZbin Video about Hacking, without actually showing any real useable code so it doesn’t get the BAN hammer 🔨 and costing him a ton of money 💰. It is fun fiction though
@telephonedude
@telephonedude 3 жыл бұрын
I've been really enjoying these videos! I'm a game programmer by trade and this is far enough outside my wheelhouse that I'm learning a ton, but close enough that everything is super easy to follow. A lot of stuff has quickly gotten demystified for me over the past few weeks :p Keep it up!
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
A real one? Actually that’s mean to say these days, so instead one that designs his own game engines and that does the physics and complex logic, like linear algebra and combinatorics maths (M ̈obius functions for breakfast) OR a GUI drag-n-drop Unreal Engine guy?
@telephonedude
@telephonedude 3 жыл бұрын
@@cedricvillani8502 Says the guy with an "introduction to Unity's new visual scripting tool" vid in his playlist? For reak though, whatever it is that's making you feel so negative, I hope it passes soon
@georgehammond867
@georgehammond867 2 жыл бұрын
Leaking the last part of flag was hard. New thing !
@aceldama
@aceldama 3 жыл бұрын
watching a sequential string search is fun, but painful - kinda like mxsturbating with a cheese grater. it's easier finding the string length first, then doing a binary search. still, great job getting there. i rather enjoy your content. :3
@FrankTranDesign
@FrankTranDesign 3 жыл бұрын
This was fun to watch, thanks JH
@anthonutty
@anthonutty 3 жыл бұрын
I think one other thing you could have done is provide an XPath that selected the n-th occurrence of selfDestructCode.
@viv_2489
@viv_2489 3 жыл бұрын
Thanks for great video ... really enjoying python part of solving problems
@TheH2OWeb
@TheH2OWeb 3 жыл бұрын
John ! Thanks again ! Just took a little time to get how you reached the second occurence. It clicked just after asking on your Discord :-)
@DirkBaumeister
@DirkBaumeister 3 жыл бұрын
I think the second part would have been easier if you had changed the search to ends-with starting with a closing curly braces and reversing the string afterwards :) nevertheless great video! :)
@chriss8825
@chriss8825 3 жыл бұрын
Yea good idea exploiting known knowledge of the flag. His method would also not work if the first char of the second part of the flag started with a 'C'. My initial idea was to leak name, so you ignore the staff with the first part of the flag completely on your second blind sql injection. My method would have took longer, but in theory it would work irregardless what the second part of flag contained.
@patrickdonohue4518
@patrickdonohue4518 3 жыл бұрын
Appreciate these videos Sir! Thanks!!
@Skavin1000
@Skavin1000 3 жыл бұрын
This felt a bit like everything looking like a nail once you have a hammer. owe knew the key ended with } so maybe "ends-with" would have been easier for the second part?
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
It’s a logical flow, so anyone, even people who don’t program can follow along and even guess at the answer before he types it. Very mentally rewarding, I mean even the error’s were giving pseudocode answers.
@nothingreallymatters7530
@nothingreallymatters7530 3 жыл бұрын
dude that was awesome
@andrescappiello1514
@andrescappiello1514 3 жыл бұрын
Amazing John!!
@berndeckenfels
@berndeckenfels 3 жыл бұрын
I am not sure what the { did in the string concatenation, but both expressions should work without it as only the fist flag part starts with it.
@capability-snob
@capability-snob 3 жыл бұрын
Do you usually find on a job you are guessing how the sql or xpath that the developer wrote is structured or do cheat sheets and scripts usually get you all the way there?
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
HAHA right , I wish when I got errors they gave me the fix and clue to the next step in Pseudocode
@ЮЗЛЕС
@ЮЗЛЕС 3 жыл бұрын
Good content!
@s.aravindh6227
@s.aravindh6227 3 жыл бұрын
Nice video bro 👍👍
@praetorprime
@praetorprime 3 жыл бұрын
Great content, as always! I seem to learn something new that I should've already known, every time.
@prateekkuber8444
@prateekkuber8444 3 жыл бұрын
Can someone help me understand how exactly the second part worked for the second part of the flag!?!
@jannikmeissner
@jannikmeissner 3 жыл бұрын
Could be a really stupid question, but what is actually the limiting factor in the speed of trying different characters? Is it Network speed to the box or could it be made faster if you used multi threading to try multiple possible combinations at once?
@krlst.5977
@krlst.5977 3 жыл бұрын
That was fun, thx
@overgrowncarrot1
@overgrowncarrot1 3 жыл бұрын
@johnhammond, don't know if this will help in the future but there is xcat for kali that can be used. I know you use parrot and Ubuntu and stuff, but xcat is a tool for XPath injection and can be used with blind XPath. I learned about it in eWPT
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
He knows, it was even in the document he showed in the beginning, but would not have made a very entertaining story. Not to mention it would be to close to something someone could do in the real world and possibly cost him his KZbin channel, and that is a big $$$ deal. I wouldn’t see why he would risk it, he probably wrote this CTF in the first place. John has taken on and beaten ppl in the real world, like at Def-Con.
@dedkeny
@dedkeny 3 жыл бұрын
Almighty ALGO!!!
@akhileshp3523
@akhileshp3523 3 жыл бұрын
Nice stuff ❤️
@RikhiRozzay
@RikhiRozzay 3 жыл бұрын
Are you doing all of this on a VM, wsl2 or Linux os?
@AlexElement
@AlexElement 3 жыл бұрын
John, what song is the Outro , it sounds like a very cool instrumental? :D
@LiEnby
@LiEnby 3 жыл бұрын
im confused how that 2nd injection even worked lol i kept saying the answer was //selfDestructCode[1].StartsWith or whatever
@elizabethsheriff5075
@elizabethsheriff5075 Жыл бұрын
Hay, how can someone contact you for a CTF teaching
@arivanhouten6343
@arivanhouten6343 3 жыл бұрын
The outro is just build different
@kennymd
@kennymd 3 жыл бұрын
I feel like John is gonna be so hyped about Python 3.10's new match-case statement
@nothingnothing1799
@nothingnothing1799 3 жыл бұрын
@panda doesn't need END
@kennymd
@kennymd 3 жыл бұрын
@panda It's basically switch-case on steroids
@rasooledwards3129
@rasooledwards3129 3 жыл бұрын
Can you do a video of you explaining your videos. The methods you're using and your mindset when you're faced with the challenge.
@ko-Daegu
@ko-Daegu 3 жыл бұрын
You are kidding right ?
@rasoolnjesus
@rasoolnjesus 3 жыл бұрын
@@ko-Daegu no, you must not get the question.
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
You mean explains how to not only code the problem (ex. CTF) but also do a human readable “hack”that won’t actually work in the real world? Because yes I’m also curious, and I wonder if he employs a few other programmers to make sure he doesn’t step to far outa line and cost him a lot of money
@HoaPham-rg8rm
@HoaPham-rg8rm 3 жыл бұрын
What is problem with python 2 ?
@shirshak3699
@shirshak3699 3 жыл бұрын
I hope HTB discord would be better than THM in terms of helping people who dont know how to solve something and also the mods😅
@SecurityTalent
@SecurityTalent 2 жыл бұрын
Great
@anirvinyasharma6455
@anirvinyasharma6455 3 жыл бұрын
what Linux distro is Mr. John using ??
@nothingnothing1799
@nothingnothing1799 3 жыл бұрын
Ubuntu i think
@ЮЗЛЕС
@ЮЗЛЕС 3 жыл бұрын
@@nothingnothing1799 +
@thedoctor2880
@thedoctor2880 3 жыл бұрын
@@nothingnothing1799 What DE tho?
@_AN203
@_AN203 3 жыл бұрын
5INALLY !!! Some john hammond things sorry that i haven't watched the stream because of the dummy isp Edit : me see john do some blind things and it works 😐🤨😬🤯🤯🤯😵
@GunniBusch1
@GunniBusch1 3 жыл бұрын
Can you make Hardware hacking?
@abhayakarte5207
@abhayakarte5207 3 жыл бұрын
Nice
@Lexxrt
@Lexxrt 3 жыл бұрын
Hello, Computer? - John Hammond 2021
@raspberrypi4970
@raspberrypi4970 3 жыл бұрын
Or Star Trek IV when Scotty grabbed the computer mouse and tried to talk to it saying, "Hello Computer ." 🤣🤣
@chetanpatil2473
@chetanpatil2473 3 жыл бұрын
please start with basic to advanced daily 1 ctf basic to advanced 🙏
@qualtersty
@qualtersty 3 жыл бұрын
22:20 I'm no hacker lol but I'm pretty sure you could've reversed the original script to check using XPath ends-with instead of using starts-with.
@nothingreallymatters7530
@nothingreallymatters7530 3 жыл бұрын
more x path injection
@viniciusdaltro5220
@viniciusdaltro5220 3 жыл бұрын
hello yt algorithm
@abdulrahmanfaisal288
@abdulrahmanfaisal288 3 жыл бұрын
Hello
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Burp suite 4woinders one 🕐 nod pasbul
@wolfgtweb
@wolfgtweb 3 жыл бұрын
I have watched a lot of you videos and enjoy them. I guess I finally have to ask. Why is your face on the screen? It doesn't benefit the viewer at all. In fact all it does is get in the way. Is it an ego thing?
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
It’s a BRAND thing.
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
19:11
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
32:03
John Hammond
Рет қаралды 73 М.
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН
Coding a Web Server in 25 Lines - Computerphile
17:49
Computerphile
Рет қаралды 357 М.
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
24:16
XML External Entities (XXE) Explained
20:11
PwnFunction
Рет қаралды 161 М.
HTB Cyber Apocalypse - cURL As a Service
26:07
John Hammond
Рет қаралды 38 М.
I'M BACK! Find The 10 Hidden Treasures! - LEGO Clue Puzzle
20:16
Chris Ramsay
Рет қаралды 434 М.
HTA JScript to PowerShell - Novter Malware Analysis
1:24:19
John Hammond
Рет қаралды 97 М.
Spying on Scammers
22:26
John Hammond
Рет қаралды 51 М.
Dear Game Developers, Stop Messing This Up!
22:19
Jonas Tyroller
Рет қаралды 788 М.
HAFNIUM - Post-Exploitation Analysis from Microsoft Exchange
1:18:33
John Hammond
Рет қаралды 139 М.