As a web developer this felt like a horror movie. Would love to see a video hacking a PHP Laravel website. Subscribed
@thehackerish Жыл бұрын
Cool! I'll see what I can do
@TimelessCode Жыл бұрын
same lol
@TimelessCode Жыл бұрын
this is the definition of a horror movie to a web dev
@tsogangmosweswe6545 Жыл бұрын
I'm out here sweating too😅😅 New subscriber gained
@BlueJDev Жыл бұрын
Could be wrong but I believe laravel, *when properly installed*, is more secure than Drupal. Just my opinion of course and nothing is ever truly secure. I've seen plenty of people installing laravel the wrong way with env public and accessible or all files in www folder etc etc. Still would love to see where the more advanced vulnerabilities are... Of course if the video is simply "look a freely accessible env file", I will be truly disappointed teehee
@cken27 Жыл бұрын
First time seeing hacking attempts like this. Amazing content!
@Licardo7 Жыл бұрын
Came for the back door, stayed for the plot
@user-vk2cd9qw7i Жыл бұрын
Sure you didn’t come in the back door?
@demyk214 Жыл бұрын
@@user-vk2cd9qw7i🤡
@steelko665 Жыл бұрын
Learned a whole lot just by watching the video. Currently a second-year cybersecurity student, this is very helpful. Thank you!
@sooivervloessem6246 Жыл бұрын
This is insane! As a second year Cybersecurity student, my mind is blown by the way of thinking. I often find it hard to not have a tunnel vision when searching for exploits. I'm really wondering, how did you learn all this stuff?
@thehackerish Жыл бұрын
At first I did not know about anything, but with time and experience I developed my skills. I vividly remember my first app I hacked! I was hooked, and I'm still learning to this day
@vneem3758 Жыл бұрын
@@thehackerish could you name some resources you found helpful along the way to learn
@thehackerish Жыл бұрын
@@vneem3758 I have shared videos about this yes, watch this one for instance kzbin.info/www/bejne/p5LRfoB3asuDors, you can also watch my web hacking playlist which is a step-by-step course for web hacking
@elexbeats Жыл бұрын
@@thehackerishthe first thing I hacked was when I was 15 and changed the index.html to read PWNED !! via a web shell. I was so damn happy but I quit hacking to focus on other things. Today I feel guilty for not following the path to become a cybersecurity expert. If only did I knew how much money cybersecurity researchers would have been making.
@surplus2720 Жыл бұрын
Experience whit huge amount of repetition a sprinke of writeDown-em-all and googling skill ..... p.s. if u start doing 2-3 times the same box u are on the right way p.p.s it can be frustrating a lot , specially pen-testing /red-teaming it's one of those things that u love or hate
@traumaloop Жыл бұрын
i really understand maybe 5% of what's being said but i can certainly tell that that website got completely folded
@deedikjepijn Жыл бұрын
This is crazy, thanks for the reminder to care about security before its too late
@joelamoako6778 Жыл бұрын
Wow this is insane, i'm a devops engineer and i have learnt a lot from you man, you got a subscriber!
@thehackerish Жыл бұрын
Welcome aboard!
@AbDevSec Жыл бұрын
I was just about to switch from web developpement to cyber security cause I felt I had learned a lot from web developpement, and I've always loved hacking and backdooring. I found this video and your way of explaining stuff is so good and creative I've learned a lot from one video. guess I'm watching all of them now!
@thehackerish Жыл бұрын
Enjoy! I am glad you found what you were looking for :)
@Emmanuel-is7gm Жыл бұрын
great walkthrough video, very informational.
@MrRaja Жыл бұрын
Finally KZbin is recommending me some quality and useful content
@neenus Жыл бұрын
Watching you go through the process was a rollercoaster I was so into the video when you were able to ssh I shouted YESSSS!!! I love what you do man it's awesome
@thehackerish Жыл бұрын
Well that's a comment that made my day! Thanks a lot for watching
@notsparktion Жыл бұрын
Wow... This is so cool! I've been thinking about entering the Cyber Security field for a while! As a student, this is really intriging to me! Thank you!
@thehackerish Жыл бұрын
I decided 10 years ago and I am not disappointed, apart from sitting on desk for hours ;)
@MRJMXHD Жыл бұрын
@@thehackerish is it too late for someone between ages 23 and 25 to start learning?
@thehackerish Жыл бұрын
@@MRJMXHD Absolutely not! You're still young! Go for it if that's something you want to pursue
@kehzHD Жыл бұрын
@@MRJMXHDI’m 26 and I started a bachelors of Cyber sec this month
@davidddo Жыл бұрын
@@thehackerishwhat if im 15
@furti Жыл бұрын
The One Piece images caught my attention but didn't expect to be this interested in the video! Great one
@thehackerish Жыл бұрын
Glad you enjoyed it!
@NaughtyKlaus Жыл бұрын
I am curious; did you use a website you own, or just a random site you found? I find this video quite interesting, and it's amazing how easy it was for you.
@thehackerish Жыл бұрын
No it's not random, I never hack something I don't own or have permission to.
@asaad0x Жыл бұрын
Very happy that your content got viral andgot number of view,, Keep Going ❤❤
@thehackerish Жыл бұрын
Thank you so much 😀
@rogo7330 Жыл бұрын
Instead of rm access.log files I think it's better to copy everything before your activity in another file and then rewrite original with that copy. Or just truncate it to zero if you don't care too much.
@lightyagami3492 Жыл бұрын
That's what I thought to. Just nuking the logs is proof in and of itself of a hack. From my genealogy experience we call it negative evidence.
@ToyataSupras Жыл бұрын
i legit know nothing about this but it is very interesting to watch liked + subbed
@FVT-tn8ji Жыл бұрын
This is such an awesome video! I didn't understand everything you did but I still learned a lot, thank you, I would love to see more of this type of videos!!!
@thehackerish Жыл бұрын
Awesome! Thank you! I will post new ones, but similar videos are ready for you in the same playlist "penetration testing"
@wave707 Жыл бұрын
This is the first of your videos I have watched and Im definitely hooked! Id love to learn more from ur channel :)
@thehackerish Жыл бұрын
Thanks for the kind words
@williamvickers6473 Жыл бұрын
Amazing! Very good to see you in action
@thehackerish Жыл бұрын
Thanks a lot!
@codelinx Жыл бұрын
I really like your content and you talking out your ideas and process
@zchantzis Жыл бұрын
Amazing!! Congrats man 👏👏
@thehackerish Жыл бұрын
Thank you! Cheers!
@kipchickensout Жыл бұрын
the "rpcbind" port could be interesting as well, maybe you can query it for what RPC services are running or it's just an obvious thing so that you get stuck on that no idea xD very nice video btw, i dont have the time to finish it right now but I will just do it later
@thehackerish Жыл бұрын
Good point!
@tacokoneko Жыл бұрын
This Is very awesome but I do think the CTF containing a setuid binary that popens scp is incredibly unrealistically insecure but we can see that it is just placed there to provide an easy privilege escalation after you do the actually realistic part which is the remote code execution exploit
@Log4Jake Жыл бұрын
You could also create a .htaccess file that interprets txt as php then you could upload a php shell.
@extrempty Жыл бұрын
are you a hacker
@LightBlade717 Жыл бұрын
are you learning from port swigger by any chance? if not please advice me im new to this, i started learning and reading like 2 weeks ago
@imdanielmartinez Жыл бұрын
hey, easy satan.
@Kaughts Жыл бұрын
Its amazing how good he is at walking through this, I wish to be able to do this someday
@Kaughts Жыл бұрын
@Sarahmilverton bro what are ya talkin bout
@eitanbirman1195 Жыл бұрын
Awesome video!! i was really invested in the story
@StanleySathler Жыл бұрын
Great content, dude! Awesome! A few Q's I had while watching, would love to clarify: 1. Why didn't you need to point nmapq to your root-me URL? 2. Why doing `cat /etc/passwd` didn't include the whole file, assuming the command does it - did the Web App truncate it? 3. Why playing with `head -n :line` would be very lame? Any technical reason, or just 'cause it was too difficult to read in general? 4. What is the `/opt/s` and what it does?
@thehackerish Жыл бұрын
Wow, I love your questions. 1. my alias already included the url, with a placeholder for the room number I played in. 2. the app returns the first line only 3. With head, I need to use it as many as the lines of the file. Takes time. 4. /opt/s is the vulnerable executable we're trying to exploit for root access
@Gmarkooo Жыл бұрын
This is amazing, made me realize you need to be a debugger first to be a hacker XD
@redlionstudio2750 Жыл бұрын
wow, that was really interesting, I haven't been that interested in the last 6 months or smth!
@byk1lla Жыл бұрын
Hey man nice content i subscribed!
@thehackerish Жыл бұрын
Welcome to the family! Lots of similar content already in the pentesting playlist, let me know what you think of them!
@tecfan-ix2tj Жыл бұрын
i love the way you went about this, earned a sub
@thehackerish Жыл бұрын
Thank you! Are you a developer?
@deedikjepijn Жыл бұрын
As a person that has his own homelab/server etc this was a crazy horror movie. I should really create more warning (and defense) systems.
@dertiedemann718 Жыл бұрын
dont forget to clear the authorized_keys file and history file for the root user :3
@ogwezhiangela8107 Жыл бұрын
Hi,how can I message you? I need help
@justarandomcat7 Жыл бұрын
I really enjoy watching your hacking videos , keep up the good work!
@thehackerish Жыл бұрын
Thanks! Enjoy
@abdessalam8468 Жыл бұрын
We missed you 💗💗💗
@thehackerish Жыл бұрын
Thanks for the kind message
@spyapron Жыл бұрын
you are awesome and also reveals the realities ..stay tuned
@troughy3288 Жыл бұрын
Thank you so much for this video! Learnt a lot.
@connorfratantaro7173 Жыл бұрын
crazy to see a master at work
@youssefsabri8051 Жыл бұрын
Got this vid in my recommendations actual good content thx youtube
@raven-vr5yz Жыл бұрын
extremely underrated, such a goat
@thehackerish Жыл бұрын
Share the love!
@Parrwiz Жыл бұрын
Now thats someone I can subscribe to. Even erased the logs: Perfection
@ilaik Жыл бұрын
Very cool! I want to start learning hacking etc. My qiestion is what did you try to achive by uploading the php file as the picture? What could it have done? Thanks
@thehackerish Жыл бұрын
If I could upload arbitrary files, like PHP, I could have taken control on the server by running arbitrary commands (Remote Code Execution), Here is a concrete example from on of my previous videos: kzbin.info/www/bejne/hmWXmqCsgbZpmaM
@ilaik Жыл бұрын
@@thehackerish thanks! So when you open that file it runs the code and you just made a php file that takes the arg x as a command to run on the server? Also dont most server block access to files via the url?
@thehackerish Жыл бұрын
That's right, and no they don't block it from url because that's how php app works, unless you use routes, frameworks like laravel use them and so you can't directly access the php files
@arcade7651 Жыл бұрын
I liked the video alot. What was the nmapq without the alias?
@thehackerish Жыл бұрын
Glad you asked. Here it is: nmap --top-ports 200 ctf"$1".root-me.org -Pn -v --open -sV 2>/dev/null. I hacked many challenges on root-me, hence the target hostname
@deadspeak5880 Жыл бұрын
Whoosh!!!! Right over my head
@thymichael Жыл бұрын
Great vid, earned a new sub! Helped me understand more of what i thought i already knew.
@thehackerish Жыл бұрын
Thanks for the sub!
@litemint09 Жыл бұрын
awesome stuffs, i learned alot, new subbed🎉
@thehackerish Жыл бұрын
Welcome to the club! Many similar videos on the pentesting playlist are available
@socrayhte4 ай бұрын
Please what is the code behind the Quickened NMAP alias
@powerball200 Жыл бұрын
do ineed to know web dev, python to do this type of hacking? cuz im learning it
@thehackerish Жыл бұрын
Web dev will definitely help you become a great hacker. The first part of hacking is to understand the system, and what better way to understand an app than to code one. Go go go! You got this. Python is great to write quick scripts, although you can do it in any high level language really, but it's widely used among security professionals.
@Log4Jake Жыл бұрын
You could use a php shell. Or some type of reverse shell.
@Dasher_The_Viral Жыл бұрын
I am right on the border of "I have no idea what he's doing" and "Oh, I kinda understand what they're doing here." Me knowing very little about coding makes this very intriguing for me!
@lightyagami3492 Жыл бұрын
Same. I noticed at the end that outright deleting log files is not a good idea though. The lack of those files will cause suspicion and cause further investigation.
@Dasher_The_Viral Жыл бұрын
Yeah, it might be better to just replace any of the traces you had left behind with something else that wouldn't look suspicious.@@lightyagami3492
@bourne_ Жыл бұрын
3:21 I'd check if & char works since the whole phrase went into URL. I'm a newbie tho so idk if it would be even helping in this case, it's just I happen to see the pattern. Great channel and even better content!
@thehackerish Жыл бұрын
Hmm...interesting, but the & would add a new parameter
@Jadkinsa1 Жыл бұрын
What's the terminal ur using with term cmd and powershell?
@thehackerish Жыл бұрын
wsl with ubuntu
@yipyiphooray339 Жыл бұрын
This looks so cool but half the video in and I'm super confused 😂, any resources I can use as a pre requisite before watching ur vids?
@thehackerish Жыл бұрын
Yeah sure, head over to my playlist about web hacking, it takes your by hand from the start. Also check out Academy.thehackerish.com
@yipyiphooray339 Жыл бұрын
@@thehackerish thanks!!
@JuanBotes Жыл бұрын
thanks for making the content \o/
@DailyBoosted Жыл бұрын
lol nice video, forgot to change env var PATH back :)
@anotherarush Жыл бұрын
I loved the stuff you did after root. One thing though, to finish up your clean up and stealthy approach, you would want to delete some of your bash history surely?
@thehackerish Жыл бұрын
yeah, I should have set HISTSIZE and HISTFILESIZE :)
@skuge- Жыл бұрын
@@thehackerish What about auth log for ssh connection? Or some "afterscript" which will delete trace of your ssh access after you'll log out?
@thehackerish Жыл бұрын
@@skuge- You are the man! Good point
@TiredjhTwhsj Жыл бұрын
I have a question, or you a self taught or you have a degree in cybersecurity.
@thehackerish Жыл бұрын
Degree in software engineering, self taught cybersecurity
@ShallowClone Жыл бұрын
Awesome video! Doesn't make me sweat as a web dev at all 🤣
@thehackerish Жыл бұрын
If you own a web app you want me to test, you know where to find me 😉
@mrloyalty4261 Жыл бұрын
I'm from portugal, i don't understan a shit, but i stay the all time ahahahha i'm stuck on your videos
@thehackerish Жыл бұрын
Much appreciated!
@JuVallejo1 Жыл бұрын
Really nice content ! Really interesting !
@thehackerish Жыл бұрын
Glad you enjoyed it
@spacex6997 Жыл бұрын
Bro is going to be hired by the FBI
@zonellobster2509 Жыл бұрын
At 7:47 what tool did you open?
@thehackerish Жыл бұрын
BurpSuite, a web proxy. Have a look at this video to see how cool it is kzbin.info/www/bejne/pl7EdIiVeJadgc0
@NickelCityPixels6 ай бұрын
Isn't that too much work to get default credentials? I must be missing smthg.
@amin9018 Жыл бұрын
watched the video and I am confused haha, where can I learn such concepts?
@thehackerish Жыл бұрын
This channel has many similar videos to learn from. But you can start with the owasp top 10 in the web hacking playlist
@amin9018 Жыл бұрын
@@thehackerish alright thank you!
@AdrianGoG Жыл бұрын
What is the name of the tool "request-response terminal"?
@thehackerish Жыл бұрын
Burpsuite, there is also zap proxy. They are web proxies to play with the http requests
@UmUs Жыл бұрын
I have no idea how any of this works, it's like magic to me, amazing
@thehackerish Жыл бұрын
Enjoy magic 🎩
@RoyalNatangwe Жыл бұрын
I’m not sure if you did it already ahead, but at the upload imput since it say you can only upload jpeg and so on..,I suggest changing magic number of a php file I order to trick the site and get a shell
@thehackerish Жыл бұрын
Indeed, good point
@xt355 Жыл бұрын
are there any client-side filters that can be bypassed?
@thehackerish Жыл бұрын
@@xt355 Since the server was vulnerable, the impact is much higher than any other potential client-side vuln, but that's also good to test for.
@Tchatarero36 Жыл бұрын
Great Content ; how to exploit 0days and CVEs to get bug bountys Boss .
@thehackerish Жыл бұрын
Well, invest time and effort to learn how the system works, to the point of finding a way to abuse something. In short, be a hacker, an ethical hacker of course.
@Tchatarero36 Жыл бұрын
@@thehackerish Thanks Man
@X3ro1-01 Жыл бұрын
duuuuuude i am a full stack dev ( just started ) and i HAVE to learn these things.
@thehackerish Жыл бұрын
Go for it! I have so many techniques with hands-on examples in this channel, go watch the pentesting playlist
@MrCarIgor Жыл бұрын
alright, time to go back to my html tutorial
@mosesnandi Жыл бұрын
Wow! Impressive. Still so much work though
@piti63433 ай бұрын
as I'm a noob in this world, I understand that you somehow you used the vulnerability of the druple version to send a txt file that you used to read the server,but it seems so confusing the fact you see the vulnerability of each element of a page, I like it but I don't think I will be able to this even in 10 years from now on
@accountdeleted5861 Жыл бұрын
Do you use AI for hacking and if so how do you use it?
@thehackerish Жыл бұрын
Yes, I occasionally use chatgpt to assist me in some tedious tasks. Otherwise nothing else
@acc55547 Жыл бұрын
thats crazy, how do you even use it?? is it for like brainstorming@@thehackerish
@thehackerish Жыл бұрын
I write like I am chatting with someone, like please take this csv and extract only the ABC column. These kind of things
@dHeIoxy Жыл бұрын
I don't think I understand any of this but it just looks cool 😆
@equivalent0 Жыл бұрын
Dont idea what is this. Im not familiar with coding but this is fun
@taiquangong9912 Жыл бұрын
What are you using for hacking?
@thehackerish Жыл бұрын
A laptop
@pavevbogovev4045 Жыл бұрын
“Only for educational purposes, yeah yeah” 😂
@TheChemicalWorkshop Жыл бұрын
good job
@shko0o0 Жыл бұрын
Great video! Next time maybe even altering the History of Linux machine would be perfect 😁
@thehackerish Жыл бұрын
Next time!
@joshuapacheco2898 Жыл бұрын
New sub 😊
@thehackerish Жыл бұрын
Welcome on board!
@prathvirajb1052 Жыл бұрын
Now make a video on how to avoid this exploit🔥
@AngryWoodenFork Жыл бұрын
An update is a great start but honestly I wouldn't use Drupal or wordpress to host anything.
@bariscodefx Жыл бұрын
This video shows you to must use latest versions of softwares :)
@thehackerish Жыл бұрын
@@bariscodefx Indeed!
@I_Unintentionally_Morph Жыл бұрын
i am here to start a career on information security and learn more. i have subbed , where do i start boss.
@thehackerish Жыл бұрын
Welcome aboard! Start with the web hacking and penetration testing playlists. Good luck!
@I_Unintentionally_Morph Жыл бұрын
@@thehackerish thank you .
@gabrielkenz Жыл бұрын
I wonder if its possible to hack into a server that has a firewall well implemented with ip rules and such
@thehackerish Жыл бұрын
I'd say yes, since you at least need to open the port for the web application. It will be harder, but not impossible. But you can make the hacker's life harder with a WAF as a secondary security measure, and implement detections to spot suspicious activity early. And of course, the most important thing: develop secure code and have a proper SDLC lifecycle that takes security into consideration
@Loop234 Жыл бұрын
it looks so complicated, but i'm guessing with a ton of experience you can do this casually. Might seem stupid, but what language is this?
@thehackerish Жыл бұрын
The app is developed in a PHP framework, and the OS commands are just bash
@kushjain6756 Жыл бұрын
create one for wordpress websites
@thehackerish Жыл бұрын
Here is a video for a Wordpress example: kzbin.info/www/bejne/mKm4e6iPgrikgtU
@DDBAA24 Жыл бұрын
6:30 this is what 'shellcheck' is for, in case you don't understand at your level yet. Its very specific and it will tell you in a clear concise way whats wrong and not to run it.
@en_ry Жыл бұрын
how would i deface a website that has no login and only has one type of redirect link and its just a default page with text
@thehackerish Жыл бұрын
With a reduced attack surface, you can't do much really. I'd look at other assets owned by the customer I'm hacking
@en_ry Жыл бұрын
@@thehackerish but someone else has defaced it and im trying to help them figure out how
@thehackerish Жыл бұрын
@@en_ry I see, well you need access to logs, and support from the hosting provider if it's shared. It's possible that the website got defaced because of another hacked website on the same hosting server.
@en_ry Жыл бұрын
@@thehackerish so i would have to get into a port still no? also the only thing they have linked is another website
@RobinD-e2m Жыл бұрын
What to do if i forgot burp suite browser intercept password
@thehackerish Жыл бұрын
There is no password for burpsuite
@AlexP-r2q Жыл бұрын
i love the "oooooo"
@thehackerish Жыл бұрын
@Ididor Жыл бұрын
Couldn't you write a php file that triggers a reverse shell and then just send a request to it in the browser?
@thehackerish Жыл бұрын
I believe I tried but I don't recall why it didn't work.
@poneyninja6692 Жыл бұрын
How did you get the kali linux cmd on windows 11?
@thehackerish Жыл бұрын
It's not kali, it's Ubuntu running using WSL
@mdimransarkar1103 Жыл бұрын
Thank God I learned Linux.
@ZephyrysBaum Жыл бұрын
subbed
@rhettpete Жыл бұрын
Wow. Wish I had seen you earlier
@Veraxity Жыл бұрын
good job articulating your thoughts into words. enjoyed the video ( ͡° ͜ʖ ͡°)
@AbelMasanja-w5q3 ай бұрын
good
@Pranshul2002 Жыл бұрын
I did not know this genre of content existed. I guess I know what to do on the weekend😂
@thehackerish Жыл бұрын
Enjoy and have a great weekend 😀
@demolazer Жыл бұрын
Jesus, that was way too easy. Scary to think how many servers are running old versions of software with exploits like this.