Hacking an organization with one of the most stealthy and dangerous web attacks

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 ส.ค. 2024
  • DNS exfiltration over HTTP is a stealthy attack that enables you to bypass web application firewalls. Not many security researchers and penetration testers fully understand it. So in this video, we dive deep on what is DNS exfiltration and how it works and how to use it to bypass firewalls and maximize the impact. make sure to subscribe and turn on the notifications bell.
    {----- Lab -----}
    github.com/leetCipher/bug-bou...
    {----- Support -----}
    / leetcipher
    {----- social -----}
    / leetcipher
    {----- Video chapters -----}
    0:00 intro
    0:13 lab setup
    1:04 lab overview
    1:33 fuzzing the vulnerable parameter
    3:20 tcp vs udp traffic
    4:13 what is dns
    4:43 interactsh
    5:17 installing interactsh
    5:53 how dns servers handle domain queries
    6:21 testing our theory
    7:00 domain name anatomy
    8:05 planning the attack/exfiltration
    9:27 implementing the exploit in bash
    10:33 running the exploit in burp suite
    11:37 implementing the exploit in python
    12:29 running the exploit in burp suite
    12:57 decoding the payloads using python
    13:45 adding even more constraints
    14:27 adding a custom base64 encoding to our exploit
    15:03 running the exploit in burp suite
    15:18 decoding the exfiltrated payloads
    16:03 outro
    #hacking #bugbounty #penetrationtesting
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 48

  • @LeetCipher
    @LeetCipher  ปีที่แล้ว +20

    while True:
    subscribe(channel)
    like(video)
    share(video, everywhere)

  • @seiv-
    @seiv- ปีที่แล้ว +9

    Those "small" security channels are the most underrated channels on youtube, and they are my to go place for ACTUAL GOOD CONTENT (and not influencer like content)!
    Keep up the great work mate!
    Liked + Subbed

    • @user-ho9or2mf9k
      @user-ho9or2mf9k 3 หลายเดือนก่อน

      what are some others

    • @deadbeef2482
      @deadbeef2482 หลายเดือนก่อน

      +1, agreed so much

  • @sidss007
    @sidss007 ปีที่แล้ว +4

    Awesome video. Video's like this make me feel that there is so much to learn and I don't know anything 😂

  • @WebWonders1
    @WebWonders1 ปีที่แล้ว +2

    You know what i have been addicted by your content to see again and again.
    Thanks 🙏

  • @mizudatsuraku5590
    @mizudatsuraku5590 ปีที่แล้ว +2

    You're one of my favorite channel when it comes to Security. Thank you very much for giving us a high quality content.

  • @Techbeam
    @Techbeam ปีที่แล้ว +2

    The skills i need to acquire , i smashed subscribe button when I saw your first video . As a beginner it's very hard to grasp this but I'm still getting something out of it 😊 , i understand the effort you taking for this video as a youtuber please don't stop this , keep going ❤❤❤

  • @WebWonders1
    @WebWonders1 ปีที่แล้ว +1

    Also your previous video of ssrf using dns rebinding techniques result my first bounty of $200 that's why I love your videos 😊

  • @martint1775
    @martint1775 ปีที่แล้ว +1

    This video was great! Please don't stop creating these

  • @fahimhussain2704
    @fahimhussain2704 ปีที่แล้ว +1

    Great to see you uploading again!

  • @nicollasalcantara6907
    @nicollasalcantara6907 2 หลายเดือนก่อน

    I subscribred in this channel, really good content.

  • @dev__004
    @dev__004 ปีที่แล้ว

    Another awesome video as always. Worth the wait . It would be great if you uploaded more frequently!!❤

  • @janekmachnicki2593
    @janekmachnicki2593 11 หลายเดือนก่อน

    First time i see you here and Im so impress .Thanks

  • @orestefanovic8961
    @orestefanovic8961 ปีที่แล้ว

    Some awesome content you are putting out man!

  • @hexormc5164
    @hexormc5164 ปีที่แล้ว

    Wow i didn’t know u uploaded a new video,you’ve inspired me once again

  • @S2eedGH
    @S2eedGH ปีที่แล้ว

    what a perfect explanation ! Thanks for great content

  • @md.omarsharafi7528
    @md.omarsharafi7528 ปีที่แล้ว

    Your videos are so awesome i usually revise those in every few days. Although I have subscribed and turned on the notification, i visit your channel oftentimes to see if you have uploaded new video. 😂
    But why didn’t you tried hex encoding? Isn’t hex encoding best for dns based data exfiltration? What if python or dig was not installed?

  • @jissjose1382
    @jissjose1382 ปีที่แล้ว

    Awesome tutorial out there

  • @sajeed433
    @sajeed433 ปีที่แล้ว

    Nailed it! Perfect. Could you please start teaching from scratch or share the roadmap you have followed?

  • @darccau7204
    @darccau7204 ปีที่แล้ว

    Welcome back

  • @tayeblagha484
    @tayeblagha484 8 หลายเดือนก่อน

    great Tutorial

  • @neiltsakatsa
    @neiltsakatsa ปีที่แล้ว +1

    Awesome 😎

  • @draxler.a
    @draxler.a 10 หลายเดือนก่อน

    keep going ❤

  • @0RIPPER0
    @0RIPPER0 ปีที่แล้ว

    bro u r genius man !!

  • @cair0_
    @cair0_ 4 หลายเดือนก่อน

    Nice bro

  • @yasharote1602
    @yasharote1602 7 หลายเดือนก่อน

    GOLD

  • @warnawarni5227
    @warnawarni5227 ปีที่แล้ว

    amazing

  • @sahilabbasi7184
    @sahilabbasi7184 ปีที่แล้ว +2

    Bro how to develop mindsets just like you 😭😭💔 pls reply me 😭 i have 5 year experience still I am not able to find bugs 😞

  • @berthold9582
    @berthold9582 ปีที่แล้ว

    Blind os command
    Si c'est moi je ne serai pas aller si loin chapeau hacker

  • @aswins7781
    @aswins7781 ปีที่แล้ว

    Love you bro, you're fcuking genius

  • @seiv-
    @seiv- 11 หลายเดือนก่อน +2

    Small question: why did you apply b64 and then on top of that you applied b58, and not applied b58 which has no special chars directly from the beginning?

    • @LeetCipher
      @LeetCipher  11 หลายเดือนก่อน +1

      That's actually a good question. Unix-based distributions do not have the base58 binary installed by default, which means there's a high chance our attack won't work, and it was also for demonstration purposes, that's why at the end of the video, we showcased the same attack with only base64 implemented from scratch, and then we converted the special chars to ascii representation.

  • @ByteBandit-777
    @ByteBandit-777 4 หลายเดือนก่อน

    Can you make a video like how did you become a penetration tester able to find real bugs in bug bountys please ?

  • @DZbugbountyhunter
    @DZbugbountyhunter 11 หลายเดือนก่อน

    perfect

  • @janekmachnicki2593
    @janekmachnicki2593 11 หลายเดือนก่อน

    I have a problem.When i send domain;echo code thru burp it does not save it in /tmp directory .How come is like that .Any clue ?

  • @warnawarni5227
    @warnawarni5227 ปีที่แล้ว

    is it possible to do this trick on any Blind SSRF with HTTP ping back?

  • @m7mad540
    @m7mad540 ปีที่แล้ว

    ❤‍🔥❤‍🔥❤‍🔥❤‍🔥❤‍🔥

  • @manishbasnet5230
    @manishbasnet5230 ปีที่แล้ว

    Omg 😮

  • @cybersec9345
    @cybersec9345 3 หลายเดือนก่อน

    Cool, do you have a course on udemy?

  • @ca7986
    @ca7986 ปีที่แล้ว

    Man you are fuckin genius!

  • @DONTLAUGH
    @DONTLAUGH ปีที่แล้ว

    😲

  • @JuanBotes
    @JuanBotes ปีที่แล้ว

    \o/

  • @artieschmidt3039
    @artieschmidt3039 11 หลายเดือนก่อน +3

    the error sound transition is very irritating sorry

  • @flashbrutal
    @flashbrutal ปีที่แล้ว +2

    i saw the same kind of ctf challenges on VishwaCTF2023.. in a web Challege . it was checking if domain was active or not. eventually came out with blind rce

  • @manan5
    @manan5 ปีที่แล้ว

    hey man you are an awesomee teacher! do you have a twitter account or something?

  • @drsaqi649
    @drsaqi649 ปีที่แล้ว

    do u have discord?