SSTI Complete Lab Breakdown: Basic server-side template injection (code context)

  Рет қаралды 8,708

Seven Seas Security

Seven Seas Security

Күн бұрын

Пікірлер: 26
@DG-qt3qn
@DG-qt3qn 2 жыл бұрын
FINALLY someone made quality informative videos on Burp labs. Some of their labs are extremely complex and the solutions dont explain how to realistically solve them.
@7SeasSecurity
@7SeasSecurity 2 жыл бұрын
Hey! Appreciate the comment. We were really excited to be able to put this stuff out and have Portswigger list us on there. I hope it was helpful! Planning to do the rest of the labs over time!
@JuanBotes
@JuanBotes 2 жыл бұрын
What I really enjoy about this and other videos from you is the clear explanation of finding, identifying, and determining the template used in the framework, then from there you show nice how you do your payload testing and exploitation, really thanks \o/
@7SeasSecurity
@7SeasSecurity 2 жыл бұрын
Really appreciate the kind words! My goal with covering these labs was to tackle them similar to how I would on a pentest. I wanted to convey not only the solution, but also some reproducible discovery methodology and things that stand out to me to hopefully give some helpful tips. Glad to hear it's been helpful so far! Thanks so much for the support!
@7SeasSecurity
@7SeasSecurity 2 жыл бұрын
Hey all! Appreciate you checking out the vid. Had some audio syncing issues with this one, but wanted to make sure I got it out there raw with the errors we encountered. I got some feedback that it's good to see troubleshooting live, so I kept it in. Hope that works alright! Got new hardware, so shouldn't run into this issue in the future. Appreciate your patience!
@nasombradocodigo
@nasombradocodigo 2 жыл бұрын
This is the type of content that we needed about the portswigger labs!! So informative and with great explanation
@7SeasSecurity
@7SeasSecurity 2 жыл бұрын
Really appreciate that! It's been really great being able to share my perspective / methodology through these videos. Thanks so much for checking out the video!
@MaximMikhAntonov
@MaximMikhAntonov Жыл бұрын
Perfect. Love ur style - clear and concise.
@7SeasSecurity
@7SeasSecurity Жыл бұрын
Hey, really appreciate the kind words. I hope the video was helpful!
@suder54ULs
@suder54ULs 6 ай бұрын
Best resource, among all i have to check. Good Keep going
@7SeasSecurity
@7SeasSecurity 5 ай бұрын
Really appreciate that!
@mf-11111
@mf-11111 Жыл бұрын
Whoaa! Thanks you for that content! New sub
@nishantdalvi9470
@nishantdalvi9470 8 ай бұрын
Hey bro at 1:27 none of the posted comments gets evaluated to 49, So from this can we conclude that the HTML page represented by the web server when we make a request at the route :- /post?postId=3 is not been rendered by the template engine (tornado in this lab) instead just the username is been evaluated at some place else by the template engine and that dynamically generated username is simply presented on the blog post's comment section ?
@wakedxy
@wakedxy 2 жыл бұрын
Well explained. Thank you
@7SeasSecurity
@7SeasSecurity Жыл бұрын
Thanks so much for the kind words. I hope the video was helpful!
@mohammadrasheed8402
@mohammadrasheed8402 2 жыл бұрын
awesome explanation. Thanks for the video.
@7SeasSecurity
@7SeasSecurity 2 жыл бұрын
No problem at all! Really appreciate you checking out the video!
@IT-hk5up
@IT-hk5up 2 жыл бұрын
Really good video. Thanks Seven
@7SeasSecurity
@7SeasSecurity 2 жыл бұрын
Thanks so much! I hope the video was helpful. Appreciate you checking it out!
@علیآقابیگی-ذ5غ
@علیآقابیگی-ذ5غ Жыл бұрын
tnx
@nishantdalvi9470
@nishantdalvi9470 8 ай бұрын
Hey bro at 1:27 none of the posted comments gets evaluated to 49, So from this can we conclude that the HTML page represented by the web server when we make a request at the route :- /post?postId=3 is not been rendered by the template engine (tornado in this lab) instead just the username is been evaluated at some place else by the template engine and that dynamically generated username is simply presented on the blog post's comment section ?
@tmz900x0
@tmz900x0 2 жыл бұрын
Good video !
@7SeasSecurity
@7SeasSecurity 2 жыл бұрын
Thank you! Hope it was helpful. Really appreciate you checking out the video!
@artivishwakarma6087
@artivishwakarma6087 Жыл бұрын
Best video can you share social media accounts and make more videos
@nishantdalvi9470
@nishantdalvi9470 8 ай бұрын
Hey bro at 1:27 none of the posted comments gets evaluated to 49, So from this can we conclude that the HTML page represented by the web server when we make a request at the route :- /post?postId=3 is not been rendered by the template engine (tornado in this lab) instead just the username is been evaluated at some place else by the template engine and that dynamically generated username is simply presented on the blog post's comment section ?
@kshyamasagarminz697
@kshyamasagarminz697 Жыл бұрын
🎇🎇🎇🎇
Random Emoji Beatbox Challenge #beatbox #tiktok
00:47
BeatboxJCOP
Рет қаралды 35 МЛН
Não sabe esconder Comida
00:20
DUDU e CAROL
Рет қаралды 59 МЛН
Friends make memories together part 2  | Trà Đặng #short #bestfriend #bff #tiktok
00:18
2 MAGIC SECRETS @denismagicshow @roman_magic
00:32
MasomkaMagic
Рет қаралды 25 МЛН
Indirect Prompt Injection | How Hackers Hijack AI
22:57
Seven Seas Security
Рет қаралды 1,7 М.
Coding a Web Server in 25 Lines - Computerphile
17:49
Computerphile
Рет қаралды 341 М.
Vim Tips I Wish I Knew Earlier
23:00
Sebastian Daschner
Рет қаралды 74 М.
HTTP Host Header Attacks Lab Breakdown: Basic password reset poisoning
7:14
Seven Seas Security
Рет қаралды 3,7 М.
SSTI Complete Lab Breakdown: Basic server-side template injection
8:32
Seven Seas Security
Рет қаралды 15 М.
Server-Side Request Forgery (SSRF) | Complete Guide
47:04
Rana Khalil
Рет қаралды 70 М.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,6 МЛН
Random Emoji Beatbox Challenge #beatbox #tiktok
00:47
BeatboxJCOP
Рет қаралды 35 МЛН