All-Army CyberStakes! Cross-Site Scripting Filter Evasion

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 ก.พ. 2025

ความคิดเห็น • 90

  • @SB-rf2ye
    @SB-rf2ye 3 ปีที่แล้ว +15

    I love how John teaches the subject. He most likely already knows the answer, but knows that showing the methodology is more important. Trying different things, failing sometimes, then finally winning, are what makes a good hacker.

  • @joshuakorbut239
    @joshuakorbut239 3 ปีที่แล้ว +7

    I know it's old but I've been binging your videos and bro, just amazing. The use of python to wreck like everything makes me sooo sooo happy.. I've literally understood coding 1000% better just watching your content.

  • @booruledie3052
    @booruledie3052 3 ปีที่แล้ว +2

    One of best ctf question i’ve ever seen so far. Also great solution! Congrats John

  • @blackmagicprod7039
    @blackmagicprod7039 4 ปีที่แล้ว +1

    New to your channel but eating it up. I’m not a security guy or a CS/SE major or anything, I just like computers and find these videos so interesting. I could never solve these boxes by myself but the way you present these solutions makes it FEEL like I could have come to the same conclusions myself. I think that’s a hallmark of a great teacher, keep it up!

  • @dw0x
    @dw0x 4 ปีที่แล้ว +26

    This was very interesting! More of this (:

  • @DrovaRS
    @DrovaRS 4 ปีที่แล้ว +2

    Your videos have been great to watch while I’m stuck in a tractor away from my laptop

  • @leblanc666666
    @leblanc666666 2 ปีที่แล้ว

    I would have never thought about that base64 and atob(), nice little trick to bypass filters to keep in my pocket! Great fun lab!

  • @tanercoder1915
    @tanercoder1915 4 ปีที่แล้ว +10

    I just stuck to the screen when I saw you used python to do injections. so cool. you have a unique method I haven't seen elsewhere. go python in BB!

  • @hlbgghj
    @hlbgghj 3 ปีที่แล้ว

    incredible sir i really loved it and please keep coming these videos

  • @Vogel42
    @Vogel42 4 ปีที่แล้ว +5

    13:30 You can call functions using square brackets notation instead of a period.
    String.fromCharCode -> String['fromCharCode']

    • @Vogel42
      @Vogel42 4 ปีที่แล้ว

      @@GiQQ Oh, you are right. How about using slash string instead of single quote?

    • @ethisfreedom
      @ethisfreedom ปีที่แล้ว

      same lol

  • @legndery
    @legndery 4 ปีที่แล้ว +5

    Haha from js dev perspective template literals(backticks) were the first thing that came to my mind when you were searching for string without quotes.

  • @erich8456
    @erich8456 4 ปีที่แล้ว +42

    "hit the dislike button twice" - just when I though you couldn't be any more clever... kudos to you sir.

    • @_JohnHammond
      @_JohnHammond  4 ปีที่แล้ว +9

      Ha! I think that is a common joke among TH-camrs. :) Thanks so much for watching!

  • @dephy2003
    @dephy2003 3 ปีที่แล้ว

    Binging on your content. Love seeing your thought process as you run into roadblocks.

  • @viv_2489
    @viv_2489 3 ปีที่แล้ว

    This was so informative and beautiful in a short video 👌

  • @rehmankhan6081
    @rehmankhan6081 3 ปีที่แล้ว

    I see myself there doing PT with my client application finding all possible xyz. Exactly, I got that PT feel bro..🍻🔥

  • @3xp0netken
    @3xp0netken 2 ปีที่แล้ว

    el verdadero proceso de un hacker , investigar , persistir , evadir los obstaculos .... te ganaste un subscriptor bro , buen video

  • @nickcarter7063
    @nickcarter7063 3 ปีที่แล้ว

    I know I'm late on this one, but I'm just binging on your old stuff at 2:30am. The backticks allow you to use ES6 syntax to create a template literal, previously referred to as a template string I believe.
    So instead of:
    var name = "Nick"
    var output = "My name is" + name
    alert(output) // outputs "My name is Nick"
    We can use name and change output to:
    var output = `My name is ${name}`
    Our alert will produce the same result without needing to concatenate the string and variable and eliminates the need for using quotes for the string. This is a very simple example, but when you need to concatenate a lot of stuff it saves a bunch of time. It also apparently helps to make this attack work which is super cool.

  • @abhhibirdawade9657
    @abhhibirdawade9657 4 ปีที่แล้ว +1

    You are amazing 😀

  • @Andrei-ds8qv
    @Andrei-ds8qv 3 ปีที่แล้ว

    Wowww, that was awesome!!!!!

  • @stackoverflow2155
    @stackoverflow2155 3 ปีที่แล้ว

    really enjoyed this!!!

  • @tomasgorda
    @tomasgorda 4 ปีที่แล้ว

    Again amazing video. Every day i'm checking youtube and looking forward your next one :)). Great job, keep going ;)

  • @nicola1421
    @nicola1421 4 ปีที่แล้ว +1

    That was so epic man 🤘🏼🤘🏼

  • @kuldeepsingh2983
    @kuldeepsingh2983 3 ปีที่แล้ว

    This is awesome.

  • @HerozTech
    @HerozTech 4 ปีที่แล้ว

    Best of its kind
    Thanks so much mentor

  • @jaiganesh851
    @jaiganesh851 4 ปีที่แล้ว +1

    The way you were using python..mind boggling...Please if possible do make a tutorials on Python and Javascript for Pentesters or Bug Hunters.
    Thank You for bringing the great content. Love

  • @abdulbasit-jj8qf
    @abdulbasit-jj8qf 2 ปีที่แล้ว +1

    I love how you approach the problem... it is excellent..
    also how do you get the output of python in new window.. by default it opens in a panel...

  • @akashrakshit8446
    @akashrakshit8446 3 ปีที่แล้ว

    Dude quality stuff 👌👌👌

  • @Cooliofamily
    @Cooliofamily ปีที่แล้ว

    That ad at 18 minutes was 🤌🏼

  • @cocosloan3748
    @cocosloan3748 4 ปีที่แล้ว +2

    Youre amazing..Period.

    • @_JohnHammond
      @_JohnHammond  4 ปีที่แล้ว

      Thanks so much! And thanks for watching!

  • @imaok4721
    @imaok4721 4 ปีที่แล้ว

    I quite enjoyed that.

  • @manmoon7396
    @manmoon7396 4 ปีที่แล้ว

    Man, john looking forward to "python primer for hackers!" great stuff keep it up.

  • @anujchourange1792
    @anujchourange1792 4 ปีที่แล้ว

    You are just awesome bro !!!!!!!!!!!!

  • @whosdavidce
    @whosdavidce 4 ปีที่แล้ว

    this is amazing man

  • @luckypathan1958
    @luckypathan1958 4 ปีที่แล้ว

    Love your work bro❤️❤️

  • @spikespiangel
    @spikespiangel 4 ปีที่แล้ว +2

    17:00 base64 also have forward slash, thats why i think it didnt work.

  • @prakasakatheilluminator6904
    @prakasakatheilluminator6904 3 ปีที่แล้ว

    which package are you using 6:35 for Build Output tab ?

  • @Beast-cc7xd
    @Beast-cc7xd 3 ปีที่แล้ว

    Amazing video man !! new sub and like , more XSS videos !!!!
    Do you give a course on udemy or something like that on web hacking? If not, it would be great, we would all buy it

  • @sudosuraj
    @sudosuraj 3 ปีที่แล้ว

    That Was awesome

  • @newtimes
    @newtimes 4 ปีที่แล้ว +5

    When you submitted the URL you just were hoping that an admin/moderator would click on that link? Or how did you get that cookie

    • @saeedsaeed9
      @saeedsaeed9 4 ปีที่แล้ว +8

      Yup that's correct. Typically in a CTF challenge there will be an automated browser that will access what you submit with and admin session.

  • @Vagelis_Prokopiou
    @Vagelis_Prokopiou 4 ปีที่แล้ว

    Awesome 👍

  • @LuminousWatcher
    @LuminousWatcher 3 ปีที่แล้ว

    `b to a` and `a to b`

  • @lordvoldemort7692
    @lordvoldemort7692 4 ปีที่แล้ว

    Thank's Bro i really learn New techniques every Time i watche Your Vedeos I wish If you Teach us how to hunt bulk url's and work with bulk 😁😁😁✔

  • @lordykarus
    @lordykarus 4 ปีที่แล้ว

    amazing

  • @joewharton7735
    @joewharton7735 2 ปีที่แล้ว

    What I would do is make the string the fragment and pull it from there

  • @p.kay_____
    @p.kay_____ 4 ปีที่แล้ว +1

    Cool🤩

  • @hlbgghj
    @hlbgghj ปีที่แล้ว

    sir start a series on python like solving CTF on python its gonna be really fun ❤

  • @slonkazoid
    @slonkazoid 4 ปีที่แล้ว +1

    TIL: he doesn't know javascript syntax

  • @neilthomas5026
    @neilthomas5026 4 ปีที่แล้ว +1

    This was actually so cool lol

  • @adamstrickland97
    @adamstrickland97 ปีที่แล้ว

    Hey John, wondering if you can expand on your CORS comments from the end of the video. You mention that when a script from the target site tries to reach out to the attacker's site, you can see a CORS error. However, isn't that error entirely in the attacker's control? Couldn't you have returned the right CORS headers from your server to allow the request through?

  • @mostafanasser3065
    @mostafanasser3065 3 ปีที่แล้ว

    great video and I love your unique way in solving the challenge with python but couldn't you have don all this with burp suite ?

  • @jatinmahida4660
    @jatinmahida4660 4 ปีที่แล้ว

    Watch the article in incognito mode for medium

  • @nonoperation2356
    @nonoperation2356 4 ปีที่แล้ว

    love this can you suggest any other XSS ctfs?

  • @NeelNarayan
    @NeelNarayan 4 ปีที่แล้ว +4

    you gotta add "JOIN" button for content exclusive to your members, i reckon it would be totally worth it.

  • @gunblad3
    @gunblad3 4 ปีที่แล้ว

    Very nice. Wonder if it’s a bot clicking on the links you submit or an actual person

  • @ahmedezealdean6189
    @ahmedezealdean6189 7 หลายเดือนก่อน

    seeing you hacking made me love hacking very much.

  • @sudha2373
    @sudha2373 4 ปีที่แล้ว

    Where u learn python for cyber security

  • @imhassan9119
    @imhassan9119 4 ปีที่แล้ว

    Can anyone explain how he made a request sending the dictionary and it injected the code?

  • @serafeimzaragas5573
    @serafeimzaragas5573 4 ปีที่แล้ว

    Great video.I want to block my mobile carrirer xss protection to have free internet.give me an idea please.

  • @Colaholiker
    @Colaholiker 3 ปีที่แล้ว

    So basically if you don't have a server on the internet, you're SOL?

    • @_JohnHammond
      @_JohnHammond  3 ปีที่แล้ว +1

      No, you can use ngrok and tunnel out a local listener, and you don't need a server on the internet for that.

    • @Colaholiker
      @Colaholiker 3 ปีที่แล้ว

      @@_JohnHammond If your router allows this. Unfortunately most DSL routers you get from your provider here in Germany won't allow open ports at all. All that mine offers externally is VPN access into my home network. But you can't open up any ports like for a local running web server to be accessible from the outside. And even more unfortunately with most providers you can't even replace the router with something of your choice, as your account is linked to the router's serial number and it won't connect with another device. With some providers you don't even get a true IP that can be reached normally from the internet, like some provder level NAT. I guess we drew the short straw. ;-)
      The most crappy thing is that a very popular router model with the stock firmware would allow all of that, but provider customization removed these features for "enhanced customer security".

  • @d3vashishs0ni
    @d3vashishs0ni 3 ปีที่แล้ว

    I think I have to leave bash and start python🐍🐍

  • @Shintowel
    @Shintowel 2 ปีที่แล้ว

    Teacher

  • @offmymeds13
    @offmymeds13 4 ปีที่แล้ว

    What is your primary job? I noticed you have to be in mil to do this challenge. I'm in the Army myself

  • @onions5113
    @onions5113 4 ปีที่แล้ว

    can you make a video how to make different types of payloads?

  • @assunecotlage8682
    @assunecotlage8682 4 ปีที่แล้ว

    What extension is that in sublime

  • @GaryFrancis-q3r
    @GaryFrancis-q3r 3 ปีที่แล้ว

    Couldn't you just do "document.cookie" with the browser dev tools? Why create a script to send this info to your server?
    To whom actually belong that session?

    • @_Omni
      @_Omni 3 ปีที่แล้ว

      🤦‍♂️

  • @ca7986
    @ca7986 4 ปีที่แล้ว

    ♥️

  • @domasjanulis106
    @domasjanulis106 4 ปีที่แล้ว

    trying encode but getting this one Traceback (most recent call last):
    File "/home/bango/Desktop/project.py", line 10, in
    payload = base64.b64encode(payload)
    File "/usr/lib/python3.8/base64.py", line 58, in b64encode
    encoded = binascii.b2a_base64(s, newline=False)
    TypeError: a bytes-like object is required, not 'str'

    • @domasjanulis106
      @domasjanulis106 4 ปีที่แล้ว

      i added payload = base64.b64encode(payload.encode('utf-8'))

  • @shaistasiddic1822
    @shaistasiddic1822 4 ปีที่แล้ว

    Nice()

  • @DOMPurify.isSupported
    @DOMPurify.isSupported 3 ปีที่แล้ว

    Man 😍

  • @mattfowler6504
    @mattfowler6504 4 ปีที่แล้ว

    meme review 👏👏

  • @threeMetreJim
    @threeMetreJim 4 ปีที่แล้ว

    You are out of free articles? Looks like a div overlay thing with a css blur filter on the article below. Some sites actually used to use that (now they use mostly a blurred generic background), suffice to say I never had trouble reading the articles. In chrome, dev tools, remove element (the overlay), then disable any css blur effects, and enable y-overflow (a lot stop you from scrolling the page too). Submit article, does it appear rendered to other users? Next thing is try to enter something that confuses their anti xss system into displaying what you need. You can view page source to check for any odd effects. If you can get an external script into a src attribute somehow, then host it remotely would be a good trick to play.

    • @threeMetreJim
      @threeMetreJim 4 ปีที่แล้ว

      Comment written before watching the entire video, just in case anyone wondered.

  • @optimistemo01
    @optimistemo01 ปีที่แล้ว

    I rather had idea lile h1 on dom content full load do function :3

  • @nusn43
    @nusn43 3 ปีที่แล้ว

    Bro where script code phyton this video

  • @nusn43
    @nusn43 3 ปีที่แล้ว

    Bro how are u today? I am anonymous haha

  • @sorrefly
    @sorrefly 3 ปีที่แล้ว

    Your videos are priceless. You don't just show the attack but also the process and the evolving of ideas while designing the attack.
    Premium content, thank you really.