XSS on the Wrong Domain T_T - Tech Support (web) Google CTF 2020

แชร์
ฝัง
  • เผยแพร่เมื่อ 2 ต.ค. 2024
  • Try chatting with tech support about getting a flag. There is a very easy XSS in the support chat, but the problem is, the XSS is on the wrong domain. So we can't easily grab the flag.
    Challenge: capturetheflag...
    Tech Support: typeselfsub.we...
    =[ ❤️ Support ]=
    → per Video: / liveoverflow
    → per Month: / @liveoverflow
    =[ 🐕 Social ]=
    → Twitter: / liveoverflow
    → Website: liveoverflow.com/
    → Subreddit: / liveoverflow
    → Facebook: / liveoverflow
    Don't spend money on courses

ความคิดเห็น • 103

  • @xyzzyx182
    @xyzzyx182 4 ปีที่แล้ว +71

    Overflow is gaining such a deep understanding of computers that he's becoming one. How long before he can't beat recapcha

  • @nyandesu9165
    @nyandesu9165 4 ปีที่แล้ว +54

    "Or whatever, so no clue. But in the end, still solved it. Who cares."
    Every coder ever.

  • @zacksargent
    @zacksargent 4 ปีที่แล้ว +95

    1:15 -> I think you did a bunch of those capchas wrong.
    When it says it wants the traffic lights, you selected the poles as well.

    • @heroslippy6666
      @heroslippy6666 4 ปีที่แล้ว +21

      that feeling when the captcha thinks motorcycles and bicycles are the same thing.

    • @gyroninjamodder
      @gyroninjamodder 4 ปีที่แล้ว +3

      That's because the poles have traffic lights on them

    • @konradw360
      @konradw360 4 ปีที่แล้ว +22

      It's google using the CTF players as free workers. If you want the flag work 5 min for us :D

    • @Anonymous-vh6kp
      @Anonymous-vh6kp 4 ปีที่แล้ว

      Konrad W correct

    • @abbb8615
      @abbb8615 4 ปีที่แล้ว +1

      he a robot

  • @WitherBossEntity
    @WitherBossEntity 4 ปีที่แล้ว +69

    The endless reCaptcha looks about normal for when I use Tor.

    • @IAmOxidised7525
      @IAmOxidised7525 4 ปีที่แล้ว +1

      Underrated comment..

    • @cat47
      @cat47 3 ปีที่แล้ว +1

      ya lol, that's why I don't use it

  • @TheGrimravager
    @TheGrimravager 4 ปีที่แล้ว +92

    today I found a vulnerability at my job's codebase. Essentially arbitrary file deletion.. patched that real quick.
    I like to think your videos gave me the thinking patterns needed to be able to spot this vulnerability. Thank you!

    • @Lolo5
      @Lolo5 4 ปีที่แล้ว +2

      Give some more details please :)

    • @TheGrimravager
      @TheGrimravager 4 ปีที่แล้ว +2

      @@Lolo5 hmmm, no sorry :)

    • @ScorpioneOrzion
      @ScorpioneOrzion 4 ปีที่แล้ว +1

      @@TheGrimravager what was the type of vulnerability, if you want to tell that.

    • @TheGrimravager
      @TheGrimravager 4 ปีที่แล้ว +2

      @@ScorpioneOrzion essentially arbitrary file deletion due to a non-sanitized call to php's unlink function. But luckily most files were not writable by the user that would execute the php-script

    • @NStripleseven
      @NStripleseven 4 ปีที่แล้ว

      Nice

  • @1vader
    @1vader 4 ปีที่แล้ว +46

    Your usage of Promises is ... interesting ...
    The purpose of Promises is exactly to avoid the nesting you are doing and that you would usually get when using callbacks.
    You can just do this:
    fetch("/flag").then(r => r.text()).then(t => fetch(...))

    • @akuviljanen4695
      @akuviljanen4695 4 ปีที่แล้ว +6

      I think modern chrome supports `await` in console too

    • @TimLF
      @TimLF 4 ปีที่แล้ว

      @@akuviljanen4695 only in an async function as the exploit is not run in console

    • @akuviljanen4695
      @akuviljanen4695 4 ปีที่แล้ว

      Fortunately it's easy to wrap everything into an async lambda

    • @AtheistReligionIsCancer
      @AtheistReligionIsCancer 4 ปีที่แล้ว

      Very good info.

    • @IBMboy
      @IBMboy 4 ปีที่แล้ว

      Lol i did that too before learning how promises work

  • @Alkiiis
    @Alkiiis 4 ปีที่แล้ว +3

    There is also an solution where you find the username/password in the document.referer.
    github.com/weibell/ctf-google2020/tree/master/tech-support

  • @imflo1060
    @imflo1060 4 ปีที่แล้ว +14

    13:39, 2 second too long :'(

  • @abadhaiku
    @abadhaiku 3 ปีที่แล้ว +3

    Imagine being on the other end of this... You open up a ticket from a user and suddenly two little embedded windows open and your password is leaked

  • @Zuudo
    @Zuudo 4 ปีที่แล้ว +12

    those nested Promise#then calls cause me pain 😶

  • @Zedoy
    @Zedoy 4 ปีที่แล้ว +7

    Managarmr is so awkward to pronounce 😂😂😂😂

    • @Anonymous-vh6kp
      @Anonymous-vh6kp 4 ปีที่แล้ว +1

      Manager Mr

    • @ChillerDragon
      @ChillerDragon 4 ปีที่แล้ว +1

      Should be smoother if it’s your teammate tho?

  • @barefeg
    @barefeg 4 ปีที่แล้ว +3

    Testing for XSS in all fields of my page RN 😅

  • @RonFarkash
    @RonFarkash 4 ปีที่แล้ว +2

    I recently started to learn some Web Application pen-testing, and a lot of the things here finally made sense for me, thank you for your detailed explanation.

  • @rishabhpant1828
    @rishabhpant1828 4 ปีที่แล้ว +2

    Bro i was eagerly waiting for this since 1 week...
    As a newbie, i wanted the walkthrough.
    Thank you so much bro

  • @hweissi
    @hweissi 4 ปีที่แล้ว +1

    Hi, can you do a video writeup for the mathsh challenge from GoogleCTF? I am searching for a writeup of that challenge since the end of the CTF. I worked on that challenge for many hours but couldn't clear it, and I would just want to know if I was on the right track.

  • @KTibow
    @KTibow 4 ปีที่แล้ว +1

    If you want to get through captchas faster, only check 3 boxes. No more, no less.

  • @zCri
    @zCri 4 ปีที่แล้ว +1

    wtf is that captcha lmfao

  • @kkaran6693
    @kkaran6693 4 ปีที่แล้ว +1

    Where can I learn this stuff????

  • @TheRetsekShow2236
    @TheRetsekShow2236 4 ปีที่แล้ว +2

    In your XSS when you have typed "fetch('/flag').then( r => { ....." What is "r"? Is it the "response" of the fetch request?

    • @machinexa1
      @machinexa1 4 ปีที่แล้ว

      idk much javascript but probably that is r a custom function so is t

    • @dennis-heinrich
      @dennis-heinrich 3 ปีที่แล้ว

      Of course, it is the actual response if no error ocurred in the (hopefully present) ".catch(err => { /** **/ })" function.
      developer.mozilla.org/en-US/docs/Web/API/Fetch_API/Using_Fetch

    • @machinexa1
      @machinexa1 3 ปีที่แล้ว

      @@malloc8634 nice

  • @AnPham-uz3td
    @AnPham-uz3td 4 ปีที่แล้ว +1

    I think people with extensive knowledge about client-side would understand this haha

  • @warker_de
    @warker_de 4 ปีที่แล้ว +2

    🤯🤯🤯... looking this for the 5. time

  • @IAmOxidised7525
    @IAmOxidised7525 4 ปีที่แล้ว +1

    Try using promises .... thats what I thought when I saw timeouts...

  • @aayushk2845
    @aayushk2845 4 ปีที่แล้ว

    hi i'm pretty new to hacking and i wanted to try to find a vuln in iitianspace.com/login.php pls help

  • @ManishShah-qk4lj
    @ManishShah-qk4lj 3 ปีที่แล้ว

    Wow amazing video I love it but I better understand in hindi language

  • @titiloxx
    @titiloxx 4 ปีที่แล้ว

    If anyone have tried using CSRF it does not work because admin can not change his address. Only normal users can do. So, you have to use some technique like preload an like this man did. Or just check the document.referrer

  • @flyingpeter
    @flyingpeter 3 ปีที่แล้ว

    jesus christ, where does one even begins to solve that

  • @MisterL2_yt
    @MisterL2_yt 3 ปีที่แล้ว

    1:00 Wait a second how is there a traffic light in the last box he clicks? I would have failed that captcha...
    edit: nvm, it was him who failed the captchas lol

  • @jockillfull
    @jockillfull 4 ปีที่แล้ว

    Have you played the CSAW? I saw team ALLES, it's yours right? How did it went?

  • @attention_shopping
    @attention_shopping 4 ปีที่แล้ว +1

    great stuff, didn't know self-xss was vulnerable in this way!

  • @felchore
    @felchore 4 ปีที่แล้ว +1

    Awesome video, thanks!

  • @DHIRAL2908
    @DHIRAL2908 4 ปีที่แล้ว +1

    PWN challenges please!!!

  • @WhiteBoiDave
    @WhiteBoiDave 4 ปีที่แล้ว +1

    could u get us deeper into sdr? would be great!

  • @unknown-mh9fk
    @unknown-mh9fk 4 ปีที่แล้ว

    u see from doing ctfs and watching videos i was able to follow i was like wow i really learned a lot i can follow this until about 6 minutes the i was like -_- what

  • @blobthekat
    @blobthekat 2 ปีที่แล้ว

    2:23 learn how to use promises man

  • @Channel-he5fr
    @Channel-he5fr 2 ปีที่แล้ว

    Do you like John Hammond?

  • @danielkrajnik3817
    @danielkrajnik3817 3 ปีที่แล้ว

    1:30 that's a lot of dedication

  • @kmcat
    @kmcat 4 ปีที่แล้ว +3

    When I read the flag name, I sometimes think I could of guest that

    • @gameglitcher
      @gameglitcher 4 ปีที่แล้ว +2

      That's great except for the no brute forcing flags condition on ctf's :)

  • @zsin128
    @zsin128 4 ปีที่แล้ว +9

    Why don't you use Firefox?

    • @LiveOverflow
      @LiveOverflow  4 ปีที่แล้ว +8

      Why don’t you use Chrome?

    • @zsin128
      @zsin128 4 ปีที่แล้ว +1

      @@LiveOverflow it eats ram (and is slower than Firefox on my PC)

    • @0xecho
      @0xecho 4 ปีที่แล้ว +5

      @@zsin128 lol you're out here fighting about browsers, while im out here curling the page and imagining what it looks like im my head

    • @0xecho
      @0xecho 4 ปีที่แล้ว

      P.S. I donot recommend that, not fun

    • @pipony8939
      @pipony8939 4 ปีที่แล้ว +1

      Why don't you use Internet Explorer?

  • @DawnnDusk-k4n
    @DawnnDusk-k4n 4 ปีที่แล้ว

    Come on... Next
    Gibe me Next video LiverFlow!!!

  • @appsecjourney8907
    @appsecjourney8907 4 ปีที่แล้ว

    Hello brother, Can I ask you some questions?
    You told, you using linux in docker. How to set up linux in docker to get the external IP?

    • @crossetta
      @crossetta 4 ปีที่แล้ว

      google is your friend

  • @realyoutubekumar
    @realyoutubekumar 3 ปีที่แล้ว

    that captcha tho...😅

  • @diegodejesus9668
    @diegodejesus9668 4 ปีที่แล้ว

    Do you think that with the passage of time, the systems will be more secure and hacking will be almost impossible (or unnecessary)?

  • @soggytoast111
    @soggytoast111 4 ปีที่แล้ว +2

    Are you sure that setTimeout actually does anything? I've run into issues before when trying to use setTimeout to control a data flow - it's still all executed instantly and doesn't work the same way as async/await/promise.

    • @laurinneff4304
      @laurinneff4304 4 ปีที่แล้ว +2

      setTimeout, at least in my experience, works, but he should've used async/await or promises on this case

    • @pietrohideki
      @pietrohideki 4 ปีที่แล้ว +1

      If you have some doubts or think you need some more insight on setTimeout i suggest you to search on youtube "what the heck is event loop anyway" it's a video of around 26 minutes which gives a good insight on the event loop and how sometimes setTimeout is used in the wrong way. Hope this helps

  • @52.yusrilihsanadinatanegar79
    @52.yusrilihsanadinatanegar79 4 ปีที่แล้ว

    *captcha lol*

  • @tera_hz7125
    @tera_hz7125 4 ปีที่แล้ว

    Team pasten wants to know your location

  • @shubhamdwivedi7766
    @shubhamdwivedi7766 4 ปีที่แล้ว

    I passed the captcha in 2 trials lol😂

  • @lab-at-home
    @lab-at-home 4 ปีที่แล้ว

    Funny, I solved this guy using the referrer. I guess it was not intended solution

    • @Timooooooooooooooo
      @Timooooooooooooooo 4 ปีที่แล้ว

      Do you have a write up (or short explanation) of your solution? I'm very interested in it

  • @vendybirdsvadl7472
    @vendybirdsvadl7472 4 ปีที่แล้ว

    Is there CTF for begineers? Or something like that?

  • @DiggOlive
    @DiggOlive 4 ปีที่แล้ว

    Less Smoked Leet Chicken

  • @cassandradawn780
    @cassandradawn780 4 ปีที่แล้ว

    WOW im early. 4 min ago

  • @yashb.pandhare5772
    @yashb.pandhare5772 4 ปีที่แล้ว

    🧐👍🤝🤜👌

  • @moriartyshelby1618
    @moriartyshelby1618 4 ปีที่แล้ว +1

    "who cares" in a nutshell in this video...XD

  • @BERTDELASPEED
    @BERTDELASPEED 4 ปีที่แล้ว

    I wish I had that knowledge 😑

  • @aashikyadav4439
    @aashikyadav4439 4 ปีที่แล้ว

    wish I could understand this .

  • @muddassirahmed3342
    @muddassirahmed3342 4 ปีที่แล้ว

    wha?

  • @4n1eu
    @4n1eu 4 ปีที่แล้ว

    i don't understand anything

    • @soggytoast111
      @soggytoast111 4 ปีที่แล้ว +2

      The short version:
      The tech support app has a bug in it that allows you to post content that will be parsed as Javascript. This is a major security vulnerability known as xss.
      The point of the challenge is to get the Google bot to leak out his cookie by having it trigger your inserted malicious Javascript code.
      But you can't simply grab the cookie and send it back to you because the CORS check will block it. So the solution is you have to do all kinds of acrobatics with your Javascript code and a second XSS to walk the Google bot around the site and log in and out on different sessions.

    • @internetdoggo4839
      @internetdoggo4839 4 ปีที่แล้ว

      Understandable. I had to watch it 3 times to understand it