I really love this video! Watching you pick up a new technology that you really haven’t touched before and use off the shelf readily available tools to leverage exploits and create reverse shells is totally fascinating and as an Infosec voyeur, incredibly educational!
@verolyn84592 жыл бұрын
I love how you searched pug and google giving cute little dogs.
@Gregoots2 жыл бұрын
Great video JH. I've been working on exploiting SSTI on a hackthebox machine and came here to see an example of the process. Thanks a bunch!
@peterarnell81122 жыл бұрын
Great video John, love the web app security content
@UAJXE7n5m3wSew6gj75 ай бұрын
This video is very helpful for me in solving a CTF challenge.
@XtobbeX2 жыл бұрын
You are the best cyber security content creator.
@snugpugz2 жыл бұрын
Well this is awkward 👀....
@flannelbeard46212 жыл бұрын
Did this for WordPress years ago at my agency. Not on the server, but we would compile it with Gulp then upload those files to the server. There was a Gulp plugin that allowed us to use PHP with it flawlessly.
@Mlynus6662 жыл бұрын
Fantastic work John! I love the part in some of your videos where you show how and where one could look for potential security weakness.
@yeanahjustjake34422 жыл бұрын
Awesome content as always John. Keep it coming 🙏🙏🙏
@johndicarlo2252 жыл бұрын
Yeah nah
@bawalicoder12332 жыл бұрын
missed these THM series sooo much😍
@brightglow2 жыл бұрын
Currently learning pentesting on my own. Even if I don’t understand everything on screen, there are concepts I’ve studied that are starting to build upon themselves. Thank you for providing up to date content 💙
@logiciananimal2 жыл бұрын
Good stuff as always - do you know if Snyk allows bring your own data store yet? We were looking at it but found that we couldn't host our own data store - or at least keep it in Canada.
@TAPCybersec2 жыл бұрын
OMFG!!! sO mUcH aDs 🤣🤣 Nice work!
@johndicarlo2252 жыл бұрын
Good john, love nodejs
@youssefshehadeh57992 жыл бұрын
do you recommend us any book to further our cyber knowledge study ?
@quietube.2 жыл бұрын
I'm new in this i wanted to know "how do we get to know what js lib does an web app is using?"
@fram11112 жыл бұрын
My bad I watched thinking pug was a dog my bad.🤣
@chrisclarke81872 жыл бұрын
how would you find out if a server was running pug.?? love your videos btw...
@codeplay49472 жыл бұрын
you can use ad blocker for blocking ads ublock origin (browser extension)
@neutrino2211_2 жыл бұрын
Looks like server side template engines are the latest attack surfaces in town. RIP to devs that thought “Regex is good enough”
@eyeshezzy2 жыл бұрын
Its amazing how teenagers make us learn all this stuff 😅
@kavinduwijewickrama85912 жыл бұрын
❤❤❤
@BrandonSparkman_Maker2 жыл бұрын
What shirt is that?
@tom-on2 жыл бұрын
Really Cool!
@bhagyalakshmi1053 Жыл бұрын
Translation souto form synk ?
@diyara32 жыл бұрын
nice vid 🥶
@TheMAZZTer2 жыл бұрын
As a programmer it drives me a little nuts when you just copy and paste exploit code without understanding really how it works. Sure, you're getting it from places you trust, but it's important to understand the nuances of how it works sometimes. For example, nodejs exec call does not wait for the called process to exit, which is why you had problems getting output or sleeping. You'd have to use a callback or event handler to get that stuff (which wouldn't help in this template anyway). You'd want execSync to get the pause or output you're looking for. Also I am a bit mystified why you were hunting for exploits right off the bat. In the challenge pug is clearly being used in an unintended way (processing templates provided by users instead of the developer) so there's a potential security hole right there. So I would look for ACE functionality built right into pug (which you did find). Pretty cool snyk could figure that out just by looking at the code though. Tracing how variables are set and used through a program's source code is not trivial.
@izaak7912 жыл бұрын
I understand where you come from but being a hacker requires you to think quickly and come up with solutions even if you do not have a lot of knowledge so...
@AnujSharma-yv6gy2 жыл бұрын
@The MAZZTer basically, on converting to HTML, the following should give id's output right? doctype html head title #{function(){localLoad=global.process.mainModule.constructor._load;sh=localLoad("child_process").execSync('id')}()} If yes, it's the same with execSync as it was with exec. There's no output. The sleep command works fine though. But can't we output anything at all?
@flanwithaq27242 жыл бұрын
Why do you, as a security expert, use google chrome? I really hope someone responds to this; this truly boggles my mind how you use spyware for your browser
@_JohnHammond2 жыл бұрын
I wouldn't consider myself a security expert, but what browser would you like me to use instead?
@flanwithaq27242 жыл бұрын
@@_JohnHammond One that isn't proven to be spyware Ungoogled chromium would be a good start for you
@twistedsim2 жыл бұрын
pug
@FahadAli-ot5kn2 жыл бұрын
me using ejs instead of pug now I am using reactjs for frontend
@lifebest44042 жыл бұрын
Sir php website injection tutorial
@VinnyXL4202 жыл бұрын
Yep, Im not a hater, but I try to stay away of these exotic frameworks amap, since these projects are ripe for CVE. Try to review your packages, sometimes all you need is in one file or method, just copy that over, do your changes and use it as your own, just dont forget to credit the original sob who worked hard to write that. the beauty of oss...