Node.js "Pug" Server-Side Template Injection

  Рет қаралды 32,896

John Hammond

John Hammond

Күн бұрын

Пікірлер: 39
@ChrisPatti
@ChrisPatti 2 жыл бұрын
I really love this video! Watching you pick up a new technology that you really haven’t touched before and use off the shelf readily available tools to leverage exploits and create reverse shells is totally fascinating and as an Infosec voyeur, incredibly educational!
@verolyn8459
@verolyn8459 2 жыл бұрын
I love how you searched pug and google giving cute little dogs.
@Gregoots
@Gregoots 2 жыл бұрын
Great video JH. I've been working on exploiting SSTI on a hackthebox machine and came here to see an example of the process. Thanks a bunch!
@peterarnell8112
@peterarnell8112 2 жыл бұрын
Great video John, love the web app security content
@UAJXE7n5m3wSew6gj7
@UAJXE7n5m3wSew6gj7 5 ай бұрын
This video is very helpful for me in solving a CTF challenge.
@XtobbeX
@XtobbeX 2 жыл бұрын
You are the best cyber security content creator.
@snugpugz
@snugpugz 2 жыл бұрын
Well this is awkward 👀....
@flannelbeard4621
@flannelbeard4621 2 жыл бұрын
Did this for WordPress years ago at my agency. Not on the server, but we would compile it with Gulp then upload those files to the server. There was a Gulp plugin that allowed us to use PHP with it flawlessly.
@Mlynus666
@Mlynus666 2 жыл бұрын
Fantastic work John! I love the part in some of your videos where you show how and where one could look for potential security weakness.
@yeanahjustjake3442
@yeanahjustjake3442 2 жыл бұрын
Awesome content as always John. Keep it coming 🙏🙏🙏
@johndicarlo225
@johndicarlo225 2 жыл бұрын
Yeah nah
@bawalicoder1233
@bawalicoder1233 2 жыл бұрын
missed these THM series sooo much😍
@brightglow
@brightglow 2 жыл бұрын
Currently learning pentesting on my own. Even if I don’t understand everything on screen, there are concepts I’ve studied that are starting to build upon themselves. Thank you for providing up to date content 💙
@logiciananimal
@logiciananimal 2 жыл бұрын
Good stuff as always - do you know if Snyk allows bring your own data store yet? We were looking at it but found that we couldn't host our own data store - or at least keep it in Canada.
@TAPCybersec
@TAPCybersec 2 жыл бұрын
OMFG!!! sO mUcH aDs 🤣🤣 Nice work!
@johndicarlo225
@johndicarlo225 2 жыл бұрын
Good john, love nodejs
@youssefshehadeh5799
@youssefshehadeh5799 2 жыл бұрын
do you recommend us any book to further our cyber knowledge study ?
@quietube.
@quietube. 2 жыл бұрын
I'm new in this i wanted to know "how do we get to know what js lib does an web app is using?"
@fram1111
@fram1111 2 жыл бұрын
My bad I watched thinking pug was a dog my bad.🤣
@chrisclarke8187
@chrisclarke8187 2 жыл бұрын
how would you find out if a server was running pug.?? love your videos btw...
@codeplay4947
@codeplay4947 2 жыл бұрын
you can use ad blocker for blocking ads ublock origin (browser extension)
@neutrino2211_
@neutrino2211_ 2 жыл бұрын
Looks like server side template engines are the latest attack surfaces in town. RIP to devs that thought “Regex is good enough”
@eyeshezzy
@eyeshezzy 2 жыл бұрын
Its amazing how teenagers make us learn all this stuff 😅
@kavinduwijewickrama8591
@kavinduwijewickrama8591 2 жыл бұрын
❤❤❤
@BrandonSparkman_Maker
@BrandonSparkman_Maker 2 жыл бұрын
What shirt is that?
@tom-on
@tom-on 2 жыл бұрын
Really Cool!
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Translation souto form synk ?
@diyara3
@diyara3 2 жыл бұрын
nice vid 🥶
@TheMAZZTer
@TheMAZZTer 2 жыл бұрын
As a programmer it drives me a little nuts when you just copy and paste exploit code without understanding really how it works. Sure, you're getting it from places you trust, but it's important to understand the nuances of how it works sometimes. For example, nodejs exec call does not wait for the called process to exit, which is why you had problems getting output or sleeping. You'd have to use a callback or event handler to get that stuff (which wouldn't help in this template anyway). You'd want execSync to get the pause or output you're looking for. Also I am a bit mystified why you were hunting for exploits right off the bat. In the challenge pug is clearly being used in an unintended way (processing templates provided by users instead of the developer) so there's a potential security hole right there. So I would look for ACE functionality built right into pug (which you did find). Pretty cool snyk could figure that out just by looking at the code though. Tracing how variables are set and used through a program's source code is not trivial.
@izaak791
@izaak791 2 жыл бұрын
I understand where you come from but being a hacker requires you to think quickly and come up with solutions even if you do not have a lot of knowledge so...
@AnujSharma-yv6gy
@AnujSharma-yv6gy 2 жыл бұрын
@The MAZZTer basically, on converting to HTML, the following should give id's output right? doctype html head title #{function(){localLoad=global.process.mainModule.constructor._load;sh=localLoad("child_process").execSync('id')}()} If yes, it's the same with execSync as it was with exec. There's no output. The sleep command works fine though. But can't we output anything at all?
@flanwithaq2724
@flanwithaq2724 2 жыл бұрын
Why do you, as a security expert, use google chrome? I really hope someone responds to this; this truly boggles my mind how you use spyware for your browser
@_JohnHammond
@_JohnHammond 2 жыл бұрын
I wouldn't consider myself a security expert, but what browser would you like me to use instead?
@flanwithaq2724
@flanwithaq2724 2 жыл бұрын
@@_JohnHammond One that isn't proven to be spyware Ungoogled chromium would be a good start for you
@twistedsim
@twistedsim 2 жыл бұрын
pug
@FahadAli-ot5kn
@FahadAli-ot5kn 2 жыл бұрын
me using ejs instead of pug now I am using reactjs for frontend
@lifebest4404
@lifebest4404 2 жыл бұрын
Sir php website injection tutorial
@VinnyXL420
@VinnyXL420 2 жыл бұрын
Yep, Im not a hater, but I try to stay away of these exotic frameworks amap, since these projects are ripe for CVE. Try to review your packages, sometimes all you need is in one file or method, just copy that over, do your changes and use it as your own, just dont forget to credit the original sob who worked hard to write that. the beauty of oss...
@JNET_Reloaded
@JNET_Reloaded 2 жыл бұрын
starts @10:00 mins!
How Hackers Hide
20:55
John Hammond
Рет қаралды 241 М.
How To Pivot Through a Network with Chisel
33:45
John Hammond
Рет қаралды 132 М.
Леон киллер и Оля Полякова 😹
00:42
Канал Смеха
Рет қаралды 4,7 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
Filter Evasion in a REVERSE SHELL (no spaces!!)
29:11
John Hammond
Рет қаралды 40 М.
Binary Ninja Scripting with Python!
23:39
John Hammond
Рет қаралды 3,4 М.
DATAFORM TOOLS VSCODE EXTENSION DEMO
27:34
Ashish Alex
Рет қаралды 146
HAVOC C2 - Demon Bypasses Windows 11 Defender
29:50
John Hammond
Рет қаралды 156 М.
How To Bypass Website File Upload Restrictions
20:18
John Hammond
Рет қаралды 137 М.
Detection Engineering with Wazuh
30:23
John Hammond
Рет қаралды 11 М.
INSTANT File Downloads with JavaScript
21:05
John Hammond
Рет қаралды 163 М.
Learn Active Directory!
1:15:28
John Hammond
Рет қаралды 17 М.
Bruteforcing MFA & Fail2ban Manipulation - TryHackMe! (Biteme)
44:38
Spying on Scammers
22:26
John Hammond
Рет қаралды 54 М.