Nick Berrie
Nick Berrie
  • 9
  • 12 424
OS Command Injection Attack & Defense Explained
In this video, I demonstrate OS Command Injection from an attacker's perspective using PortSwigger Academy. I'll show you how attackers can exploit command injection vulnerabilities to gain access to a system and execute malicious commands.
But that's not all! I'll also show you how SOC analysts can investigate and respond to a command injection attack using firewall logs and EDR. We'll use LetsDefend.io to demonstrate a real-life scenario, where a SOC analyst must identify the attack, mitigate the threat, and prevent further damage.
This video is perfect for penetration testers, SOC analysts, and security enthusiasts who want to learn about OS Command Injection and improve their security skills. So if you're looking to level up your security game, then this video is a must-watch!
Don't forget to subscribe to my channel for more security-related content and hit the notification bell to be the first to know when I upload a new video. Thank you for watching!
You can find me here:
Twitter▶ machevalia
LinkedIn▶ linkedin.com/nick-berrie
GitHub▶ github.com/machevalia
Blog▶ machevalia.blog
Переглядів: 140

Відео

Weaponizing and Investigating XSS
Переглядів 235Рік тому
Welcome to my latest video on cross-site scripting ("XSS"). In this video, I'll be discussing how to weaponize and investigate XSS, a common vulnerability that can be exploited by malicious actors. First, we'll start with the basics. XSS is a type of vulnerability that allows attackers to inject malicious code into web pages viewed by other users. This type of attack can lead to a range of cons...
CVE-2023-23397 Outlook Privilege Escalation Walkthrough
Переглядів 7 тис.Рік тому
In this video, I'll be walking through the CVE-2023-23397 Outlook Escalation of Privilege exploit via a PoC. This exploit allows an attacker to obtain a victim's NTLM hash by exploiting a vulnerability in Microsoft Outlook's Appointment feature. MDSec’s Dominic Chell looked into the recent Microsoft Office Outlook updates where Dominic found that there is a privilege escalation vulnerability wi...
CVE-2023-23397 Quick & Dirty PoC
Переглядів 2,8 тис.Рік тому
Quick and dirty PoC of CVE-2023-23397 Microsoft Outlook Elevation of Privilege Vulnerability by Dominic Chell of MDSec PoC by @ka7ata Original Research: www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/ PoC: github.com/ka7ana/CVE-2023-23397/blob/main/CVE-2023-23397.ps1
Insecure Direct Object Reference ("IDOR") Attack & Defense
Переглядів 1 тис.Рік тому
In this video, we'll explore the concept of an Insecure Direct Object Reference (IDOR) attack and how to investigate it in the SOC. IDOR is a type of vulnerability that allows an attacker to access sensitive information or perform malicious actions by manipulating direct object references in a web application. As a SOC analyst or DFIR professional, it is crucial to be aware of IDOR and how it c...
LetsDefend.io SOC164 Suspicious Mshta Behavior Walkthrough
Переглядів 351Рік тому
In this video, I'll walk you through a suspicious Microsoft HTML application (Mshta) behavior within LetsDefend's SOC-164 alert. This walkthrough will provide you with an in-depth understanding of how hackers can use Mshta for malicious purposes, and how SOC analysts can detect and investigate such activities. Mshta is an executable application that is used to run and display HTML applications....
LetsDefend SOC-170 Local File Inclusion Attack
Переглядів 352Рік тому
In this video, we will be exploring the Local File Inclusion (LFI) attacks and how to investigate them using the LetsDefend platform. As a SOC analyst, it's essential to understand different forms of hacking techniques and how to mitigate them. LFI is a type of vulnerability in web applications that allows an attacker to read sensitive files on a server, and it's crucial to have the right tools...
Uncovering PHP Web Shells with Grep and Regex
Переглядів 574Рік тому
In this video, I'll provide step-by-step instructions on how to use grep and regex to detect PHP web shells, as well as cover best practices for digital forensics and incident response. Whether you're a seasoned cybersecurity professional or just starting out in the field, this video will equip you with the skills and knowledge you need to stay ahead of the curve and protect your systems from w...

КОМЕНТАРІ

  • @learnwithshahzebb
    @learnwithshahzebb 3 місяці тому

    Hey, is it necessary to be on the same network? I mean what if I’ve private NAT ip using a cafeteria internet. Would that work?

  • @samuellaw3480
    @samuellaw3480 10 місяців тому

    The noise in the background is horrible man

  • @JoachimFosse
    @JoachimFosse 11 місяців тому

    What are the hashes that are retrived with this CVE for? Are they password hashes for the users to access the SMB? Im sorry if I'm asking a dumb question here, i just couldn't really gather what the hashes represent Edit: I guess you get NTLM hashes representing the users AD password?

  • @ryanm5291
    @ryanm5291 Рік тому

    Hey thanks... good video. I'm just dipping my toes into security. When you say "dumping hashes" what exactly is going on there? What is happeneing? I understand its bad... but exactly how? Also, what is that responder application/server you were talking about do?

    • @machevalia
      @machevalia Рік тому

      Hey Ryan, good question. Within a lot of Windows processes there is authentication occurring under the hood that a normal user is unaware of. Being extremely user-friendly Windows takes care of that for us. However, issues can arise when an attacker finds a way to take advantage of this automatic authentication which is what is occurring here. Essentially, Responder.py is a fake SMB share that, when a victim machine requests a resource like our fake appointment sound file via that UNC path we provide, obtains a victim's NTLM password hash. With that, and attacker could attempt to crack the victims password hash to recover their actual password, or they could even relay that NTLM hash in some cases to authenticate to another service as the victim user. I would recommend reading up on pass-the-hash attacks for more.

    • @ryanm5291
      @ryanm5291 Рік тому

      @@machevalia You rule. Thanks man.

  • @NessHypegaming
    @NessHypegaming Рік тому

    such an good video please make more of these! highly underated.

    • @machevalia
      @machevalia Рік тому

      @NessHype will do! Thanks for the kind words!

  • @MalikRabb
    @MalikRabb Рік тому

  • @user-rt3hx1oj4n
    @user-rt3hx1oj4n Рік тому

    Thanks for this - I appreciate the no frills explanation!

    • @machevalia
      @machevalia Рік тому

      Of course! Thanks for the feedback Ronnie!

  • @subtlER0X
    @subtlER0X Рік тому

    Thanks for the walk-through! can you please let me know whether Responder tool and the Attacker's SMB should be on the same machine in order for it to work? I'm getting the invite but I don't see the hashes.

    • @machevalia
      @machevalia Рік тому

      Responder can be anywhere that is either accessible by the victim on the LAN or on the public Internet. If you have SMB outbound blocked then responder on the local network will still work as long as the victim can reach it. An easy way to test is open file explorer on the victim and in the address bar navigate to \\<responder IP\share and you should be prompted to authenticate to responder. If that isn't working, you may also want to make sure you have a vulnerable version of Outlook installed since there is a patch out.

    • @subtlER0X
      @subtlER0X Рік тому

      @@machevalia Thanks, can you please share which Outlook version did you use during your test? I'm running Outlook for Office 365 (16.0.12527.22286) 32-bit and it doesn't seem to work. I checked that SMB outbound isn't blocked on the victim's machine and it can access the share I configured in the PS script.

    • @machevalia
      @machevalia Рік тому

      Interesting, I am not sure without going fully into troubleshooting it. I know the patches version is 16.0.16130.20306+ so it looks like you should be good. May just have to play around with it some more. I haven't done much with it since the video but I had varying degrees of success with different versions of Outlook, network configurations, and each of the various PoCs. Its a finicky one.

    • @subtlER0X
      @subtlER0X Рік тому

      @@machevalia Thanks! it was an environmental issue on my end. I managed to resolve this! Do you by chance know where the UNC path is stored in the .EML file? I couldn't find it which is truly interesting that this info doesn't show but can triggered regardless.

    • @Emily-db5ur
      @Emily-db5ur Рік тому

      ​@@subtlER0X Can I ask what environmental issue you were having and what you did to resolve it? I seem to be having the same issue as you.

  • @user-ud7ey4ld2s
    @user-ud7ey4ld2s Рік тому

    $meeting.ReminderSoundFile = "\\<UNC PATH>" # Change to your SMB server How should fill in here? I filled in my local ip, and started Responder on my machine, Outlook has a calendar reminder popup, but I did not receive the NTLM hash

    • @machevalia
      @machevalia Рік тому

      Sounds like you need to make sure your "victim" running Outlook can access the IP address of the machine running responder. If you're using a virtual machine for Responder, check the NIC settings.

  • @k_a_7_a_n_a
    @k_a_7_a_n_a Рік тому

    Hey, nice walk through! Glad you found the script useful (I'm ka7ana). Would be interested to know if you got round to trying it out on your colleagues and managed to grab their hashes too! :D

    • @machevalia
      @machevalia Рік тому

      Oh cool! Great job with the script. I have not gotten a chance to do much else with it after making this but I'll let you know if I do!

    • @user-ud7ey4ld2s
      @user-ud7ey4ld2s Рік тому

      I successfully received the local ntlm hash during local testing, but only once. When I tried to modify it and send it to the remote user, I did not receive the hash but only an IPC connection.

    • @Milo-vc6lb
      @Milo-vc6lb Рік тому

      @@user-ud7ey4ld2s same as you! I cant replicate this more than once.

  • @Shintowel
    @Shintowel Рік тому

    Awesome

  • @Alex-xb8yo
    @Alex-xb8yo Рік тому

    Looks & sounds great - the font in kali is a bit small though. Looking forward to more content!

  • @electrowizard2658
    @electrowizard2658 Рік тому

    a great video fora cybersceurity student would surely apply it

  • @0xrohit54
    @0xrohit54 Рік тому

    Its a Useful Video sir and thank you for mentioning the command in the description sir

  • @charantejanaikmerajoth380

    Thank you for the video. It was informative and easy to follow along, looking forward to more such amazing videos.

  • @AbbyStrongNPC
    @AbbyStrongNPC Рік тому

    Audio and video is great. Great formatting. Look forward to what's next in the series.