PicoCTF Walkthru [24] - Cookies (HTTP Cookie explanation)

  Рет қаралды 11,499

Mike On Tech

Mike On Tech

Күн бұрын

Пікірлер: 22
@yoooouval8723
@yoooouval8723 Жыл бұрын
what a great explanation!!! thorough, concise and still interesting. Im completely new to this so actually succeeding felt great! thanks for that
@mike_on_tech
@mike_on_tech Жыл бұрын
Glad it was helpful!
@nttn3666
@nttn3666 3 жыл бұрын
love your walkthough, please keep making videos
@mike_on_tech
@mike_on_tech 3 жыл бұрын
Thanks, will do!
@tpt_transparent5179
@tpt_transparent5179 Жыл бұрын
for some reason my gave me Errors No payload positions defined. anyone out there that could help
@turhanergene5464
@turhanergene5464 2 жыл бұрын
Amazing teacher. Loving the way you teach
@mike_on_tech
@mike_on_tech 2 жыл бұрын
Thank you! 😃
@alaaalgladi1473
@alaaalgladi1473 2 жыл бұрын
in 0:50 what this bage it is tool ?
@HJ-rj6lx
@HJ-rj6lx 3 жыл бұрын
Vaav😍 your explanation is superb. Thank you for your video . Please keep going . Already subscribe .❤ from sri lanka. 🇱🇰
@mike_on_tech
@mike_on_tech 3 жыл бұрын
Thanks. Appreciate the subscription!
@jenisler7421
@jenisler7421 Жыл бұрын
so used burpsuite poxy intercept and intreduer on the cookies: name = -1 so then i highlight the -1 and right click to send to intruder but then only the value changes but not the result so for every value the resulting name remained snickerdoodle
@CaiN805
@CaiN805 2 жыл бұрын
Nice lesson man! I learned a lot! TY!
@mike_on_tech
@mike_on_tech 2 жыл бұрын
Glad to help!
@BonkLoud
@BonkLoud 3 жыл бұрын
I love these pico videos, pls make more
@mike_on_tech
@mike_on_tech 3 жыл бұрын
Thanks, bit busy with life, but soon!
@soraaaa4158
@soraaaa4158 2 жыл бұрын
Hi Mike, Great tutorial. I have a question. Can you Tell me how can I do this without using burpsuite? That is how can I write my own code for requesting different cookies and capturing the corresponding results? I would like to do it without using burpsuite for better understanding and grasp. Thank you
@mike_on_tech
@mike_on_tech 2 жыл бұрын
Sure, there are many ways you can do this. Fundamentally, cookies are just key-value pairs that are passed as a Header in the end of an HTTP message. I'd recommend taking a look at some of the Wireshark tutorials I've put out to get a sense for how simple they really are. There are many ways you can alter these values. I'd start with using your web browser to inspect the Network Traffic that is sent. In Chrome, there's an option to Copy a given HTTP request in a variety of formats. I made a request to Google and copied it as CURL. It looks like this: curl 'www.google.com/' \ -H 'authority: www.google.com' \ -H 'accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9' \ -H 'accept-language: en-US,en;q=0.9' \ -H 'cookie: NID=511=JXY0FZGgpdIoP_uZjXGtJiyvcMIgAimLHlf5XoF_YMGLHKBAQKXw_oRlJedSKvKEHj5AM7JauUQAwyvBpj5UC3WWQJCleKOSr8KL9qVFnTr3tdu8sQIKEOmLfC5hnXZEBCkNs-TyJtcKT5xWNB03E6TcAOEZOpq05iw0EAwucL4; OTZ=6667302_84_88_104280_84_446940; 1P_JAR=2022-09-18-15; AEC=AakniGO4InRvST1SglB3r0LaFQWrM9NxggPE2zJcO96-ZCsidWP75gt-; DV=E7YUQNnJmKwrYHfm0PDGnWWXrR4VNZjkqNWfmvg5SwQAAAA' \ -H 'sec-ch-ua: "Google Chrome";v="105", "Not)A;Brand";v="8", "Chromium";v="105"' \ -H 'sec-ch-ua-arch: "x86"' \ -H 'sec-ch-ua-bitness: "64"' \ -H 'sec-ch-ua-full-version: "105.0.5195.127"' \ -H 'sec-ch-ua-full-version-list: "Google Chrome";v="105.0.5195.127", "Not)A;Brand";v="8.0.0.0", "Chromium";v="105.0.5195.127"' \ -H 'sec-ch-ua-mobile: ?0' \ -H 'sec-ch-ua-model: ""' \ -H 'sec-ch-ua-platform: "Windows"' \ -H 'sec-ch-ua-platform-version: "10.0.0"' \ -H 'sec-ch-ua-wow64: ?0' \ -H 'sec-fetch-dest: document' \ -H 'sec-fetch-mode: navigate' \ -H 'sec-fetch-site: none' \ -H 'sec-fetch-user: ?1' \ -H 'upgrade-insecure-requests: 1' \ -H 'user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36' \ -H 'x-client-data: CK+1yQEIiLbJAQiktskBCMS2yQEIqZ3KAQjX9MoBCJahywEIibzMAQjrvMwBCNbGzAEIu8nMAQiQy8wBCOPLzAEIntHMAQj10cwBCP3XzAEIoN3MAQ==' \ --compressed Notice the fifth line? That's the Cookie Header. You could then alter that CURL request and re-send. Or you could re-create the call in Python Requests library. Like I said, lots of ways to do this.
@carolinepeace819
@carolinepeace819 6 ай бұрын
my payload attack won't work, my "request count" is 0 and i have no clue how to change it
@carolinepeace819
@carolinepeace819 6 ай бұрын
and i followed step-by-step this video.. so if you have an idea i need it
@sahilshah9678
@sahilshah9678 2 жыл бұрын
please please make a video on XtraORdinary pllllllzzzzz!!! picoCTF
@slaozeren8742
@slaozeren8742 2 жыл бұрын
thank you sir
@mike_on_tech
@mike_on_tech 2 жыл бұрын
Glad to help
PicoCTF Walkthru [25] - Insp3ct0r
2:58
Mike On Tech
Рет қаралды 2,7 М.
PicoCTF Walkthru [103] - More Cookies
21:40
Mike On Tech
Рет қаралды 4,5 М.
Арыстанның айқасы, Тәуіржанның шайқасы!
25:51
QosLike / ҚосЛайк / Косылайық
Рет қаралды 700 М.
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
Windows XP Consumer Demo - Mike Coleman - 2001/06
30:34
WalkingCat
Рет қаралды 349
So AGI is here and it's USELESS! - OpenAI o3
4:22
Pourya Kordi
Рет қаралды 30
How to use Cheat Engine | Full guide + examples
6:43
Recording #10
11:00
Marfo amoa
Рет қаралды 10
PicoCTF Walkthru [99] - Big Zip
5:10
Mike On Tech
Рет қаралды 805
Adding Contacts
4:45
DKDigital
Рет қаралды 2
Арыстанның айқасы, Тәуіржанның шайқасы!
25:51
QosLike / ҚосЛайк / Косылайық
Рет қаралды 700 М.