PHP include and bypass SSRF protection with two DNS A records - 33c3ctf list0r (web 400)

  Рет қаралды 37,632

LiveOverflow

LiveOverflow

Күн бұрын

Easy solution of list0r web challenge from the 33c3ctf thanks to unintended bugs in the challenge.
Join the discussion: / php_include_and_bypass...
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
#CTF #WebSecurity

Пікірлер: 34
@TheVamp
@TheVamp 7 жыл бұрын
We also found the intended way, how to get the admin entries. You only must copy a list entry and set the ID to some low values.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
Oh! thx :D ^ this is the person that did more work on the challenge than me. Should have talked to him first :P
@kalaxlimas
@kalaxlimas 7 жыл бұрын
Yup....i got that too ;)
@Demonslay335
@Demonslay335 5 жыл бұрын
I love how this challenge was basically broken like 3 times over. Just shows how hard security is. XD
@CalumBoal
@CalumBoal 5 жыл бұрын
Awesome format, subbed.
@aidan3994
@aidan3994 7 жыл бұрын
Loving the CTFs, provides us with real world examples of exploits. However, I'm still having trouble learning to apply the knowledge and theory I've learned. I know all about various protocols, common problems with them, knowledge on various exploits, etc. I'm just having trouble looking at places to apply the thing's I've learned. Is there any help you could give me?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
you mean for the realworld? If you don't have a work in that field, pick a research topic that interests you. By that I just mean pick for example a web framework and apply your knowledge to it, to understand it as deep as possible and potentially find security issues.
@nios1515
@nios1515 7 жыл бұрын
Wonderful Bro keep up good work (y)
@ewan91
@ewan91 7 жыл бұрын
Haha 7:44 :D another great video :)
@benfolland8977
@benfolland8977 Жыл бұрын
4:03
@OmarTriguiTn
@OmarTriguiTn 7 жыл бұрын
This guy is awesome X)
@intellectualize6354
@intellectualize6354 6 жыл бұрын
Exploiting unintended bugs for the win!
@keeper2828
@keeper2828 5 жыл бұрын
Good stuff.
@damejelyas
@damejelyas 6 жыл бұрын
Whys would someone dislike this
@cybrsec
@cybrsec Жыл бұрын
I'm starting learning web security from today, but i see Twitter post then get demotivated. am i too late?
@kalaxlimas
@kalaxlimas 7 жыл бұрын
You could also trick parse_url w/ an url like "some:thing@127.0.0.1:80@33c3ctf.ccc.ac/reeeaally/reallyy/c00l/and_aw3sme_flag" in case you don't want the work of messing w/ dns XD
@LiveOverflow
@LiveOverflow 7 жыл бұрын
sweet! thanks for that
@Xeratec
@Xeratec 7 жыл бұрын
Would it also work if you use 127.0.1.1 instead of 127.0.0.1? because the code checks only for 127.0.0.1/24 but the IPv4 loopback addresss is 127.0.0.1/8, isn't it?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
The syntax here is a bit misleading. If you read the function that uses it to check the URL, it actually uses the /24 in a different way. Basically it checks the last 24 bits of the IP, the front must be the same. So 127.0.0.0-127.255.255.255 is blocked.
@Xeratec
@Xeratec 7 жыл бұрын
Oh, okay, thanks for the explanation
@rogervanbommel1086
@rogervanbommel1086 5 жыл бұрын
What about IPv6 loopback
@far2ez539
@far2ez539 5 жыл бұрын
Was it possible to just bypass the 127.0.0.1/8 check by typing the IP differently? E.g., in binary or integer format or in IPv6?
@ellcs4506
@ellcs4506 5 жыл бұрын
i had the same thing in mind. At 3:42, the function `filter_val` is called. It is a php-function. You can look up those arguments by googling "php filter filters validate". But don't know man. php is shitty. :D
@kennyken7604
@kennyken7604 5 жыл бұрын
im at a loss, proxy for what?
@Hans5958
@Hans5958 6 жыл бұрын
sponsored by hover
@LiveOverflow
@LiveOverflow 6 жыл бұрын
No ?
@emre9916
@emre9916 4 жыл бұрын
Please disable automatic video title translation. Technical stuff lose their meaning when translated :)
@yq8dev679
@yq8dev679 7 жыл бұрын
Hey, ich wollte mal fragen ob du bereit wärst eine fasm/masm tutorial reihe zu starten? @LiveOverflow
@LiveOverflow
@LiveOverflow 7 жыл бұрын
Ich denke irgendwann sollte ich mal ein paar videos über assembler machen. Aber leider hab ich so ziemlich null Ahnung von Windows :S
@yq8dev679
@yq8dev679 7 жыл бұрын
Wäre interessant. Mir persönlich wären windows basierte tutorials am liebsten da ich auf windows reverse und programmiere aber linux geht auch, geht ja ums verständnis :) Welche assembler beherrscht du?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
Beherrschen tu ich absolut keinen assembler :D But whatever uses intel syntax I should be comfortable with.
@SourceCodeDeleted
@SourceCodeDeleted 7 жыл бұрын
I would like to participate in more CTFs . Is there a place where I can do this? List0r seems like there are more official teams and events that get announced. I am looking for something more constant and less official. I just work a lot and don't want my work to disrupt my team .
@kalaxlimas
@kalaxlimas 7 жыл бұрын
Try shellterlabs.com and pwnerrank.com
@SourceCodeDeleted
@SourceCodeDeleted 7 жыл бұрын
kalaxlimas thanks ! I will check it out ))
Finding 0day in Apache APISIX During CTF (CVE-2022-24112)
12:41
LiveOverflow
Рет қаралды 87 М.
Bike Vs Tricycle Fast Challenge
00:43
Russo
Рет қаралды 82 МЛН
А ВЫ ЛЮБИТЕ ШКОЛУ?? #shorts
00:20
Паша Осадчий
Рет қаралды 8 МЛН
Girl, dig gently, or it will leak out soon.#funny #cute #comedy
00:17
Funny daughter's daily life
Рет қаралды 64 МЛН
What is PHP and why is XSS so common there? - web 0x02
10:40
LiveOverflow
Рет қаралды 138 М.
Is your PC hacked? RAM Forensics with Volatility
14:29
The PC Security Channel
Рет қаралды 911 М.
Trying to Find a Bug in WordPress
18:07
LiveOverflow
Рет қаралды 91 М.
Website Vulnerabilities to Fully Hacked Server
19:50
John Hammond
Рет қаралды 148 М.
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
13:18
Authentication Bypass Using Root Array
13:24
LiveOverflow
Рет қаралды 126 М.
Find and Exploit Server-Side Request Forgery (SSRF)
8:56
The Cyber Mentor
Рет қаралды 40 М.
Hacking Google Cloud?
21:59
LiveOverflow
Рет қаралды 124 М.
DNS Enumeration Tutorial - Dig, Nslookup & Host
20:52
HackerSploit
Рет қаралды 120 М.
Bike Vs Tricycle Fast Challenge
00:43
Russo
Рет қаралды 82 МЛН