I've spent a week learning XML and XXE, and your video just summarized 80% of what I learned. Great job!
@TryX105 жыл бұрын
Even though most of the time I don't completely understand every bit, I really like your editing and presentation of these (for me) 'complex' topics! Keep it up! You're doing great man!
@youssefighzane16685 жыл бұрын
Well, well, well !! That's more than AMAAAAAAAAAAAZING !!! I was unable to understand XML and XXE as well until I watch your video. Thank you so much !! RECOMMENDED FOR ALL #BUG_BOUNTY_HUNTERS
@Yaxqb3 жыл бұрын
The framework for explaining stuff is amazing. About every other video has a ncat -l 1337 command in it, and it has become a standard practice for me in my own work to use that command. The pwnfunction toolbox feels very versatile👍 Really really nice!
@aniceguy25775 жыл бұрын
This is pure gold. Thx for the great content
@InfiniteLogins4 жыл бұрын
I really appreciate your video editing techniques. Make the content easy to follow and engaging.
@dxsp1d3r5 жыл бұрын
Why didnt i find this before Awesome stuff man Thank you I came to know about this channel from stoks tweets xD
@thedude85033 жыл бұрын
I love this channel, the people in it and the people subscribed to it. Thank you for making it simple
@zanidd5 жыл бұрын
I really like the style of your vids! Keep em coming
@sakyb75 жыл бұрын
xxe is just a beginning this line with the background... goosebumps
@fmattia995 жыл бұрын
John's voice is equal to IppSec's voice, this blew my mind :D
@abdallahdamnat3825 жыл бұрын
Fel
@padaloni4 жыл бұрын
hahahaha not just me that got confused for a second
@Sercan_Yilmaz3 жыл бұрын
He is ippsec ;) John Hammond
@TheZethera3 жыл бұрын
I just have to say your opening and music are perfect 👌
@DeltaEchoVictor3 жыл бұрын
It's name is mortals
@abdelrhmanali29554 жыл бұрын
Your explanation is really AWESOME bro
@P4cm4n0x2 жыл бұрын
Best explanation ever. Very very to the point. Thank you :)
@seewhatseeabc4 жыл бұрын
Wow love this style. By the way thanks for the super clear explanation. Especially with the examples, super good clear cut examples.
@domss11745 жыл бұрын
Loving your channel man, keep up the good work!
@petervsjim Жыл бұрын
THanks for the awesome video and slides! Very clear and knowledgeable
@FriedMonkey3626 ай бұрын
I have litterly never heard about this before, this is so cool, i almost tought it was an April fool's video for a second
@overgrowncarrot13 жыл бұрын
I like how John hammond says I have a small youtube channel lol
@joshaprior36995 жыл бұрын
first GREAT CHANNEL
@tapank4155 жыл бұрын
@// Anuj ó_ó
@rhenaldodelfinugraha96944 жыл бұрын
Awesome explanation. It's easy to understand, Thankyou. Please make another cool videos
@venkaraj2 жыл бұрын
Such an insightful video. Thanks a ton
@HyderAli-hl8mw4 жыл бұрын
Very informational for beginners. Thank you so much
@iDontProgramInCpp3 жыл бұрын
3:56 diReRectly
@synthdog28193 жыл бұрын
17:06 willbewillbe
@rahulnair19232 жыл бұрын
Loved the explanation !!!!!!!!!!🤩
@SatsJava5 жыл бұрын
You deserved million subscriber Keep make more videos mate
@PwnFunction5 жыл бұрын
Well that's a longgggggggggg way. Don't think I could ever hit such crazy numbers, If I hit 10k then I feel like I've accomplished something :) but thanks.
@0xExploitXpErtz2 жыл бұрын
@@PwnFunction u will surely achieve it IA
@mikekittelberger79472 жыл бұрын
omg, thank you. This video is so godd :)
@Hope-kf1nl5 жыл бұрын
You're a hero! Thanks my man.
@neadlead2621 Жыл бұрын
thanks bro , I've one question at 18:05 why we need %start and %end why not changing them directely to the value
@pwndumb29035 жыл бұрын
Great Video. Thx for share your knowledge.
@patricksteinmuller8084 Жыл бұрын
Tbh. I wonder why anyone would use DTD anyhow? The reason I am so fond of XML is the existence of XSD and XSLTs. A well defined XML is both human readible and machine readible. Can be validated against an XSD, can be transformed against an XSLT and have XSD, XSLT and both XML input and XML ouput validated against respective XSDs. This is not something that we have for json or yaml. I was to lazy to look ... I somehow suspect that we have similar attack vectors in the X* Suite.
@medjassertoubib44673 жыл бұрын
great video . we look forward to new videos
@giospadaccini1195 жыл бұрын
In Italy xml is use to send invoices to the IRS, and after few day it sand that to you client .... So this video reassuring me..
@anonymouseye48923 жыл бұрын
Nice explanation 🔥
@devsingh60414 жыл бұрын
this video is sufficient to understand XXE. Thanks Pwn You Func well ;-)
@kinjalsangale12253 жыл бұрын
Please make more videos on different vulnerabilities... explainions are 👌
@faizannehal14 жыл бұрын
This is the best video on XXE
@janithmalinga57652 жыл бұрын
Superb explanation
@coastaldemigod2 жыл бұрын
my engineering professor taught the first 10 mins. of this video in 1 month
@stefaunholland66422 жыл бұрын
The way you say "parameter" makes me think of a parking meter with a parachute falling out the sky - an American
@emmanuelafolabi68475 жыл бұрын
Great videom your videos has been educative, can you make a video on based XSS?
@PwnFunction4 жыл бұрын
Next one!
@nuridincersaygili2 жыл бұрын
This is pure gold..
@shrirangdiwakar4 жыл бұрын
Great Explanation !
@BALAKRISHNAN-pf1ol Жыл бұрын
Can you attatch a link to the xml parser you used in the video
@AkashRaj-ui1pj5 жыл бұрын
Your videos are a aaaaaaaaaamaaaaaazinggggg
@carloszavaleta5 жыл бұрын
Awesome content!
@zxuiji3 жыл бұрын
2:42, already think of JSON as easier, just use a string and escape the quote characters **Edit:** I also prefer lua when I need more than just data capabilities
@hydr0nium_5 жыл бұрын
Never heared of that attack before the video. Soo wow amazing. If you think about it its quite simple actually. Btw is there a way of secure it easiely?
@aleksandar53232 жыл бұрын
How can I disable XML parser resources referencing on say an Apache Server? I don't want XML to be making any requests at all, either internal or God forbid accessing a 3rd party URL! I just want hard-coded data from it...
@helloguy11792 жыл бұрын
What should I do if I have to configure a http request to get a file's information, but its content contains special character? We cannot use CDATA in a URL, right?
@eshaan7_5 жыл бұрын
What theme for VScode and terminal are u using? BTW Great video, thanks!
@PwnFunction5 жыл бұрын
Monokai Pro Terminus - eugeny.github.io/terminus/
@Manabender3 жыл бұрын
So how does one defend against this? Say I was running the server you were attacking and *didn't* want you reading /etc/passwd, but still wanted to retain as much (safe) functionality of the XML parser as possible. What would I do?
@annomy14934 жыл бұрын
voice seems to be known. Is it john harmmond ???
@vijaykumar-hc6jz4 жыл бұрын
Why DTD is so called ? It could have also been called Entity Defintition or something like that ? Any answer to this is appeciated.
@ashleypursell97024 жыл бұрын
great video thanks so much
@uplink-on-yt2 жыл бұрын
My reaction (comment, not video): eyes open wide, mouth covered with hand, deep breath - AKA "Surprised Pikachu". This is possibly one ofvthe most evil things I've ever seen (yeah... I'm pretty innocent)
@vxjmrf2 жыл бұрын
& sign showing error while referencing an entity. I tried in ascii or hex too, it is not working. Is there any other ways to reference it?
@huntit45783 жыл бұрын
What software do u use to make these slideshow or animation (Whatever) to explain these attacks in such a interesting way?
@tanishqsachdev83885 жыл бұрын
Amazing video.
@aymanrbati5313 жыл бұрын
why cant u declare the "send" entity directly in the external DTD ? why put it inside 'wrapper' ?
@prudhvidanyamraju80175 жыл бұрын
On a certain java server I’m able to retrieve the data of /sys/power/image_size (basically an number) using OOB xxe but I’m unable to retrieve contents of etc/passwd ; any thoughts?
@patrickslomian74234 жыл бұрын
Love your channel Bro !! So I ran into a failure with Dvwa in the section "file upload",I"ve tried to upload an file with the payload. It seems to me that the server (using docker) wont phrase an xml file, can that be true ? Im getting this error :" This XML file does not appear to have any style information associated with it. The document tree is shown below. " Or should I converte that to an html file ?
@Sparkette3 жыл бұрын
Is it okay to use a '
@laurinneff43043 жыл бұрын
It would've been great if you had included a segment on how to protect against these attacks
@Morgan_iv2 жыл бұрын
Just don't use XML
@xf42293 жыл бұрын
I am having issue accessing id_rsa in .ssh file. Is there any way to bypass it? The current issue is I/O warning: fail to load external entity.
@Wikkido50003 жыл бұрын
do you have a similar video for JSON?
@Pcpiee5 жыл бұрын
What terminal do you use for the examples? it looks very nice. guessing its cygwin based by the looks of it
@PwnFunction4 жыл бұрын
Terminus - eugeny.github.io/terminus/
@G0NZA115 жыл бұрын
I get lost at 15:17. Who is responsible for doing the replacements? If it is attacker.com's server it should have the passwords of attacker in $CONTENTS_OF_PASSWD, and if s/he serves it as raw then the other (pwn.com?) should be responsible for the replacement, then it shouldn't work because you can't have a '%' inside an entity, just as before.
@PwnFunction5 жыл бұрын
The replacements that I've show in the video is just so people can understand it a bit better. During the time of xml parsing on a vulnerable application, entities are replaced like I've talked about. The code @ 15:17 is not accurate, it's more like a parsed representation, so you might wanna see the demo bit 15:38 to understand it a bit more with the real code.
@CosmoCopulates15 жыл бұрын
Dude, your videos are great! What do you use to create the animations?
@PwnFunction4 жыл бұрын
Adobe animate boi.
@SatriaAdyPradana4 жыл бұрын
do you have git repo which collect the scripts and XML files used here?
@AakanshYadav-b6t Жыл бұрын
hey hey hey sir please tell this theme of zsh. I tried searching all of them but i didn't find anyone like this please do tell.
@tuttifrutti418410 ай бұрын
holy shit this is so hard to understand, but I suppose it's supposed to be this way unless you actually practise using XML for quite some time
@muhammadadel95374 жыл бұрын
Super AWESOME!!
@heycherry1005 жыл бұрын
very nice video.
@aidenrhama91475 жыл бұрын
what software did you use to make this content ?
@generalinformation31942 жыл бұрын
hello can i get the xmlsax_parser tool you use it in the video plz
@jasonmikinskiwallet43084 жыл бұрын
I love the Intro
@eduardoandrescastilloperer481011 ай бұрын
OMG why was that even encoded into the standard!!!
@puravida0125 жыл бұрын
this is soo old, HTB show something like this almost a year ago
@PwnFunction5 жыл бұрын
Yeah it's very old, you can even find stuff about it, way back in 2002. www.securityfocus.com/archive/1/297714/2002-10-27/2002-11-02/0
@alexeecs9 ай бұрын
So... How do you defend against it?
@asjidkalam4 жыл бұрын
is stok's video on OOB XXE private?
@d861233 жыл бұрын
那麼...問題是,如何防止XXE注入攻擊呢?
@JD-mz1rl3 жыл бұрын
I don't get it. Unless the web server is running with root permissions, what useful files are you going to get out of it?
@Aidiakapi3 жыл бұрын
It's not just for web servers, it can compromise clients too. Getting someone to open a document and extract information. As for what useful files, plenty of web servers will have access to many useful files. Configuration files, uploaded artifacts, etc.
@ctfs093 жыл бұрын
there is something you need to explore more! You don't have to be root, its not about editing , it is just exfiltrating and you don't have to be root! Try cat /etc/passwd without being root and even you can see that.
@lexibigcheese3 жыл бұрын
so that's why there's a doctype html. that's what it's for!
@r4nd0m253 жыл бұрын
god level videos
@mylyf66845 жыл бұрын
Hai bro will you please share that python script for parsing XML. please...
@PwnFunction4 жыл бұрын
I don't have the code, but it was a simple sax xml parser written in python - docs.python.org/3/library/xml.sax.reader.html
@kallikantzaros2 жыл бұрын
from lxml import etree parser = etree.XMLParser(load_dtd=True, no_network=False) tree = etree.parse("main_attack.xml", parser=parser) etree.dump(tree.getroot())
@itizazadil93695 жыл бұрын
Thanks for the Vedio
@hellb0y7943 жыл бұрын
your sound like @liveoverflow, are you his brother? 😆
@learnfirst-12 жыл бұрын
I hate background color 🤦♂️🤦♂️🤦♂️🤦♂️ change to white color pls But contant is AAmazinggggg👍👍
@jagc22065 жыл бұрын
Xml is so stupid, but maybe it's just that everything using xml is old and "legacy" and thus has a bad structure (or just one for internal us only) and it thus extremely frustrating. I am currently working on a 50k line xml, I don't use the dtds or any other of the extanal information in the document, but I clicked on some links and most of them are 404s at this point................ But hey its better than csv with sometimes quotes, sometimes not containing ~ seperated arrays, with inconsequent formating and id values
@WhyetCecilia-v8u3 ай бұрын
Bartoletti Landing
@yeasirarafat42615 жыл бұрын
awesome
@u0000-u2x4 жыл бұрын
can you link that python xml parser?
@PwnFunction4 жыл бұрын
I don't have the code with me, but I hope this can be helpful - docs.python.org/3/library/xml.sax.reader.html
@acunsumageka39494 жыл бұрын
tools for xml parser ?
@ArthurBurke-c5n4 ай бұрын
Heidenreich Walks
@zanidd5 жыл бұрын
I'd like to do a similar style collab, if you're into it send me an email!