GoogleCTF - Cross-Site Scripting "Pasteurize"

  Рет қаралды 96,410

John Hammond

John Hammond

3 жыл бұрын

Hang with our community on Discord! johnhammond.org/discord
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 165
@frankfernandez1957
@frankfernandez1957 3 жыл бұрын
John: Im a newbie, still have a lot to learn Me: *sobs*
@ucheugbomah2228
@ucheugbomah2228 3 ай бұрын
me too 😂😩
@mrhappysmiley2968
@mrhappysmiley2968 3 жыл бұрын
This was incredible! Loved it! Never seen a challenge like this. This was very valuable to me. Please make more.
@granitbajraktari1600
@granitbajraktari1600 3 жыл бұрын
Just a heads-up: at 19:40, when you wanted to only POST to the first URL and then follow the redirect without POST, you could have just dropped the "-X POST", since "-d" already implies POST, and curl would have followed to the redirected URL with GET.
@christianrang5782
@christianrang5782 3 жыл бұрын
I really enjoyed seeing the thought process. This was one I was super close to solving, but I'm a noob at XSS. I didn't know any cool tricks like shown in the vid. Keep up the great content!
@SiyuJiang
@SiyuJiang 3 жыл бұрын
Your content is great. It’s easy to follow, and I really like the perspective that we get when you show how you think through the challenges
@LESLEYYY0
@LESLEYYY0 3 жыл бұрын
Would love to see you do the other ones :p
@Stupid_Money
@Stupid_Money 2 жыл бұрын
Definitely a good beginning point to have your video on ctf. I just became proficient in Javascript a couple months ago and being able to follow along with this task really motivated me!
@LUKESLYTALKER
@LUKESLYTALKER 3 жыл бұрын
I’m getting buff doing all these cURLs bro!
@BCRooke1
@BCRooke1 3 жыл бұрын
The b/1337 is just a reference to a bug ID. At Google they use an internal bug tracking tool called buganizer, and short links are in the form of b/bug-id. Usually you see this in the code: TODO(b/5746327): fix foo
@ancestrall794
@ancestrall794 2 жыл бұрын
I thought 1337 meant LEET
@userou-ig1ze
@userou-ig1ze Жыл бұрын
@@ancestrall794 that is what it stands for...
@Brontosauredumarais
@Brontosauredumarais 3 жыл бұрын
Thanks John, super interesting! Can’t wait to see the new challenges you are preparing!
@markgentry8675
@markgentry8675 3 жыл бұрын
That was actually super awesome. Thanks heaps my bro. love your honesty. that was not an easy challenge. you're such a smart dude it's kinda nice to see you need the help of others too.
@novanuke1356
@novanuke1356 3 жыл бұрын
I think I need to start reading more writeups. I've always tried to do a CTF and if I can't get it after trying for some time I guess I usually walk away and I end up not actually learning from the CTF which is the point. Great video man!
@AdiSings2023
@AdiSings2023 Жыл бұрын
ye. the struggle is real
@liamlouw4643
@liamlouw4643 3 жыл бұрын
John ima need you to chill on these videos, my sleep schedule can't take it!! Loving them man, really fun to see your thought process!
@nft_explorer
@nft_explorer 3 жыл бұрын
You are so so good man, its interesting to watch your videos and learn from you.
@mossdem
@mossdem 3 жыл бұрын
This really helped understand XXS properly. Now I feel I can learn a little more! I would love to see a little shortcuts video. You fly around a terminal and subl! Maybe even just a little write-up, just a thought but great video
@maoropizzagalli4153
@maoropizzagalli4153 3 жыл бұрын
Glad to see I'm not the only one you get discouraged when those things happens. Lesson learned I hope, Thank you papa for the teaching
@rodrigo1300
@rodrigo1300 11 ай бұрын
A lot of people out there try to portrait something that they aren't and seeing someone like you being honest about not solving this CTF. Respect
@krlst.5977
@krlst.5977 3 жыл бұрын
Real good explanation, i came here from LiveOverflow where he covered this CTF and mentioned yours explanation and, no offense for LiveOverflow :-), now i got it much clearly. Thank you!
@4ag2
@4ag2 3 жыл бұрын
Amazing content always! I struggled so much last weekend hopefully I learned a lot!!! thnx
@ryansoma6782
@ryansoma6782 3 жыл бұрын
Thank you ! , can't wait for another google ctf web challenge video !
@harshrai6259
@harshrai6259 3 жыл бұрын
Really insightful video 👍 and now I want the pleasure of finding those flags I feel so lucky to have a node js and js background
@ibragimabdulazizli4230
@ibragimabdulazizli4230 2 жыл бұрын
Wow! You are the one who leads to how to think as a hacker. I searched looots of sources to learning CS. And you are my fav. Thankss
@mina_ashraf
@mina_ashraf 3 жыл бұрын
Hey John, Amazing content as usual. I have a small question, where would you recommend for a python beginner to learn the necessary libraries and tools? Do you suggest a specific course or a website to learn the tools that you usually use such as pwntools, Crypto, requests, and so on? C++ is just not the tool for something like this
@JustFun-dj3pq
@JustFun-dj3pq 3 жыл бұрын
Great walk through, love your video
@yoshi5113
@yoshi5113 3 жыл бұрын
Thanks u Sir.. love the way you explain all the stuff 👏👏👏
@cam545
@cam545 3 жыл бұрын
I'm here for the F U L L F R O N T A L honesty. 13:30
@xFreeman4
@xFreeman4 3 жыл бұрын
Pretty Nutz! Keep up the good work man!
@gaurav1565
@gaurav1565 3 жыл бұрын
It'll be really nice if you did the other web challenges as well. More than the solution seeing the rabbit holes and methodology of sorts is really important.
@akashrakshit8446
@akashrakshit8446 3 жыл бұрын
Wow dude thanks 👍🙏🏾 loved it
@arshiyakhan6789
@arshiyakhan6789 3 жыл бұрын
Thank you bring more these kinds of ctfs and python scripting.
@dylanhess4906
@dylanhess4906 3 жыл бұрын
Thank you for this video please post more of these
@abhisurwade
@abhisurwade 3 жыл бұрын
Appreciate the video walkthrough.
@newuser2474
@newuser2474 3 жыл бұрын
First time motivated by watching your video
@KDevGaming1921
@KDevGaming1921 2 жыл бұрын
Thank you for this learned a lot from this video.
@Ulyeney
@Ulyeney 2 жыл бұрын
Thanks, John
@R4B3326
@R4B3326 3 жыл бұрын
Missed the live Stream, but loved the video!
@adhilazeez6039
@adhilazeez6039 3 жыл бұрын
Awsome bro... You're inspiring us... Thank you.
@tecdom
@tecdom 3 жыл бұрын
Muito bom!!!!! Grato por compartilhar seu conhecimento. Aprendo muito com seus vídeos.
@ch33zer
@ch33zer 3 жыл бұрын
The b/1337 refers to a bug on Google's internal bug tracker, commonly accessed on the intranet at b/$bugid. I'm surprised they left this in for an external event. Source: I'm a google employee :)
@exoooooooo
@exoooooooo 3 жыл бұрын
You are very kind and humbly willing, to tell the truth when you solve this with the help of others. It's not like someone there who considers himself as "a hacker that your friends told you about" but is only good at making videos and making up a tale.
@davidcrdz1966
@davidcrdz1966 2 жыл бұрын
wow...it always amazes me how much information and syntax you input for the CTF. How did you learn all this stuff? haha
@Dogelition
@Dogelition 3 жыл бұрын
I think the Tracing challenge would make for another great walkthrough video!
@captainsalazar7166
@captainsalazar7166 3 жыл бұрын
Sir please tell us how did you install that sublime build view? I am looking for it but couldn't install it. I am using sublime text 3
@q-bert558
@q-bert558 3 жыл бұрын
Thus was incredible!!
@orange6946
@orange6946 3 жыл бұрын
Actually really interesting. It did strike me as odd that he used JSON.stringify when there was really no need, but I would have never looked much farther than that. Good content!
@rootdev8106
@rootdev8106 3 жыл бұрын
At first I assumed the solution was to post because .slice(1, -1) would only remove the outer ;) Nice video, keep it up!
@ta8ta841
@ta8ta841 3 жыл бұрын
more google CTFs will be appreciable
@jimanky
@jimanky 3 жыл бұрын
Thank you so much for sharing your knowledge. +1 sub
@rafaelgontijo5792
@rafaelgontijo5792 2 жыл бұрын
Absolute amazing!
@erickgiffoni
@erickgiffoni 3 жыл бұрын
that was very cool ! thanks !
@KaleshwarVhKaleshwarVh
@KaleshwarVhKaleshwarVh 3 жыл бұрын
I lost it when cookie and hookbin came up. I'm weak there.
@immyslave2952
@immyslave2952 2 жыл бұрын
thank you so much!!!
@nicktm2005
@nicktm2005 3 жыл бұрын
great tutorial ... like always ... thank you
@ratatouille7301
@ratatouille7301 3 жыл бұрын
Hello, thanks for this video. How did you know about the "[ ]" in the "content[ ]" ? How can I find it if I'v never seen it ?
@Dogelition
@Dogelition 3 жыл бұрын
If you look at the body-parser documentation here: www.npmjs.com/package/body-parser It says "The extended option allows to choose between parsing the URL-encoded data with the querystring library (when false) or the qs library (when true). [...] For more information, please see the qs library. If you follow that link, you can see a bunch of examples for how it lets you parses variou query strings into objects/arrays.
@claythearc8342
@claythearc8342 3 жыл бұрын
You may have answered this later in the video but b/1337 or any number is generally just shorthand for Bug 1337 or Bug whatever that's being tracked on some external issue tracker.
@kyngcytro
@kyngcytro 3 жыл бұрын
Dude I didn't even know something like hookbin exists thanks John and yes I'm a John too 😅
@moriartyshelby1618
@moriartyshelby1618 3 жыл бұрын
something never be changed..: "Hello, my name is John Hammond.."..NICE
@Hexbyte965
@Hexbyte965 3 жыл бұрын
Awww, I missed the live stream.
@siddharthjohri2935
@siddharthjohri2935 3 жыл бұрын
Very Nice video just as always. Stay frosty.🥶
@ziil7525
@ziil7525 Жыл бұрын
very cool ctf real video, thanks man.
@mr.meatbeat9894
@mr.meatbeat9894 11 ай бұрын
Thanks dude!
@mahfuzkabir7812
@mahfuzkabir7812 2 жыл бұрын
This was great!
@matthewshen
@matthewshen 3 жыл бұрын
This was the only challenge I got. Can you also explain some other challenges as well?
@msalih
@msalih 3 жыл бұрын
awesome!
@gopalmore315
@gopalmore315 3 жыл бұрын
Excellent
@somebodystealsmyname
@somebodystealsmyname 3 жыл бұрын
Hey John, take a look at webhook.site, I think the UI is much more intuitive for XSS/SSRF/CSRF.
@eeengoh5189
@eeengoh5189 3 жыл бұрын
It doesn't work on hookbin for me for some reason, but webhook does ! Thanks for the recommandation !
@shivambeeyani6758
@shivambeeyani6758 3 жыл бұрын
for the algo Always love your videos, especially because I'm shit in web challenges
@h8handles
@h8handles 3 жыл бұрын
My name is, what? My name is who? *imitates turntables zickazicka john hammond *to the tune of my name is slim shady*
@amellcotts6650
@amellcotts6650 3 жыл бұрын
Please continue doing those.
@ElliyahuRosha
@ElliyahuRosha 3 жыл бұрын
Hi, john. Can u point me to an article which discusses when tp use request.session() and when request.get/post() ? Thx
@whistletoe
@whistletoe 3 жыл бұрын
keep up the good work!
@amir.m5550
@amir.m5550 Жыл бұрын
you are great.👍
@BrahimN09
@BrahimN09 3 жыл бұрын
we want more
@bazboz1468
@bazboz1468 2 жыл бұрын
not disrespect you, but mid vod i had this idea 💡 of a drinkin game, when ever you say peculiar we take a shot 🥃 now i continu watching i love what you doing btw keep up the good work ❤️
@karimmohamed3744
@karimmohamed3744 3 жыл бұрын
Loved it
@Wakkas
@Wakkas 3 жыл бұрын
Hey John, I'm an officer for the Cyber Security club at my university. We would love if you could come in for 30 minutes and give a talk about some pen testing or any networking exploits that are interesting to you!
@_JohnHammond
@_JohnHammond 3 жыл бұрын
Feel free to send me an e-mail, I'm always happy to hang out! :)
@tears_falling
@tears_falling 3 жыл бұрын
feels good to know node
@muhammadbellabuaynunyai2754
@muhammadbellabuaynunyai2754 3 жыл бұрын
I love you solved this problem
@krlst.5977
@krlst.5977 3 жыл бұрын
The one question how it supposed to get where issue is by this "b/1337"? I know it means leet but how it leads to JSON.stringify row of the code, can someone explain please?
@abhinavkishoregv273
@abhinavkishoregv273 3 жыл бұрын
aswm broooo
@samsepiol6355
@samsepiol6355 3 жыл бұрын
Cool video!
@maxxxy910
@maxxxy910 3 жыл бұрын
YESS PLEASE DOO MORE OF THESEE PLEASSEEEEEE!!!!!!!!!
@bruh_5555
@bruh_5555 3 жыл бұрын
Why does log-me-in above pasteurize in the challenge list have only 7 points or has it been solved by too many people or my eyes aren't working??
@vuongnguyen-yo7lv
@vuongnguyen-yo7lv 3 жыл бұрын
COOL!
@farjamfarahbakhsh9030
@farjamfarahbakhsh9030 3 жыл бұрын
when did Ed Sheeran become interested in IT?!! JK :)) Thanks John for good content.
@ChupoCro
@ChupoCro 3 жыл бұрын
How come the microphone character 🎤 @7:10 in your Sublime is in color?
@peterarbeitsloser7819
@peterarbeitsloser7819 3 жыл бұрын
#commenting_for_the_algorithm You are great John!
@nmg555w
@nmg555w 3 жыл бұрын
note that sending the object using the url encoded parameter is only possible because of the `extended=True` bit below the comment saying "we need this for the captcha for some reason" :) (understanding this was for me the clue that helped me solve the challange)
@RonaldRaiden
@RonaldRaiden 3 жыл бұрын
I have no idea whats happening, I'm currently learning how binary runs through cables/routers/nodes etc. But this looks super cool I wanna get into security stuff
@nessiev780
@nessiev780 3 жыл бұрын
Hmm, i really dont have a clue about anything going on here, but i still watched it
@tenex
@tenex Жыл бұрын
I really liked but I got list and cannot understand how figured out the double slash
@inginerdemulslapte9378
@inginerdemulslapte9378 3 жыл бұрын
Johnito, thank you for you video!!!11!!!!
@_JohnHammond
@_JohnHammond 3 жыл бұрын
Thanks so much for watching!
@Smilin_Chris
@Smilin_Chris 3 жыл бұрын
Commentingforthealgorithm
@sontapaa11jokulainen94
@sontapaa11jokulainen94 3 жыл бұрын
Replying for algorithm.
@_JohnHammond
@_JohnHammond 3 жыл бұрын
You're the best! Thanks so much!
@SeanCMonahan
@SeanCMonahan 3 жыл бұрын
Commenting the flagorithm
@website8362
@website8362 3 жыл бұрын
Writeups ❤️
@NoONE-bk7ud
@NoONE-bk7ud Жыл бұрын
i like how said i'm not that good
@BrainFood155
@BrainFood155 3 жыл бұрын
So was the "JSON.stringy()" portion unnecessary? It doesn't seem like your exploit at the end used what you learned from the JSON.stringify()? Or am I missing something?
@zwiebelopi9898
@zwiebelopi9898 3 жыл бұрын
Vincent Zhen Did you actually watched the video? He was creating a post request and assigned an object to the content parameter. Because it’s an object, Json.stringify allowed to break out of the double quotes.
@BrainFood155
@BrainFood155 3 жыл бұрын
@@zwiebelopi9898 I did watch it but I don't know JS very well. I saw that he was sending an object via the POST request but I didn't understand how `content[]=` was the object in the JSON.stringify(). I think I get it now though. Thanks
@karanagarwal282
@karanagarwal282 3 жыл бұрын
Please provide links to the writeups you are talking about....
@darklord_656
@darklord_656 3 жыл бұрын
Sir can u also explain both rev and pwning in google ctf . Please
@humanflybzzz4568
@humanflybzzz4568 3 жыл бұрын
Wait a minute, is that a guinness water bottle on your table there... where can I get one ?
@techchannel3107
@techchannel3107 3 жыл бұрын
hey pls replied me why d you use usr/bin/python3 . we need in kali linux?
@sheepy0125
@sheepy0125 2 жыл бұрын
that's the path to the python3 executable file
Google CTF - Authentication Bypass
24:27
John Hammond
Рет қаралды 117 М.
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
32:03
John Hammond
Рет қаралды 69 М.
Как быстро замутить ЭлектроСамокат
00:59
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 12 МЛН
100❤️ #shorts #construction #mizumayuuki
00:18
MY💝No War🤝
Рет қаралды 20 МЛН
Can you beat this impossible game?
00:13
LOL
Рет қаралды 51 МЛН
Cracking Websites with Cross Site Scripting - Computerphile
8:34
Computerphile
Рет қаралды 1,5 МЛН
All-Army CyberStakes! Cross-Site Scripting Filter Evasion
26:04
John Hammond
Рет қаралды 45 М.
HTML Templates Instead Of Reactivity | Prime Reacts
12:42
ThePrimeTime
Рет қаралды 107 М.
Script Gadgets! Google Docs XSS Vulnerability Walkthrough
18:57
LiveOverflow
Рет қаралды 141 М.
Web(XSS, SQLi), "Основы практической информационной безопасности" | Кружок CTF от команды SPRUSH
53:40
Кафедра Криптология и кибербезопасность НИЯУ МИФИ
Рет қаралды 2,4 М.
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
42:23
John Hammond
Рет қаралды 1 МЛН
TryHackMe! Overpass - Authentication Bypass
35:18
John Hammond
Рет қаралды 137 М.
Cross Site Request Forgery - Computerphile
9:20
Computerphile
Рет қаралды 755 М.
TryHackMe! Abusing SETUID Binaries - Vulnversity
29:35
John Hammond
Рет қаралды 141 М.
Как быстро замутить ЭлектроСамокат
00:59
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 12 МЛН