XSS on the Wrong Domain T_T - Tech Support (web) Google CTF 2020

Поділитися
Вставка
  • Опубліковано 4 лют 2025

КОМЕНТАРІ • 102

  • @xyzzyx182
    @xyzzyx182 4 роки тому +71

    Overflow is gaining such a deep understanding of computers that he's becoming one. How long before he can't beat recapcha

  • @nyandesu9165
    @nyandesu9165 4 роки тому +54

    "Or whatever, so no clue. But in the end, still solved it. Who cares."
    Every coder ever.

  • @TheGrimravager
    @TheGrimravager 4 роки тому +91

    today I found a vulnerability at my job's codebase. Essentially arbitrary file deletion.. patched that real quick.
    I like to think your videos gave me the thinking patterns needed to be able to spot this vulnerability. Thank you!

    • @Lolo5
      @Lolo5 4 роки тому +2

      Give some more details please :)

    • @TheGrimravager
      @TheGrimravager 4 роки тому +2

      @@Lolo5 hmmm, no sorry :)

    • @ScorpioneOrzion
      @ScorpioneOrzion 4 роки тому +1

      @@TheGrimravager what was the type of vulnerability, if you want to tell that.

    • @TheGrimravager
      @TheGrimravager 4 роки тому +2

      @@ScorpioneOrzion essentially arbitrary file deletion due to a non-sanitized call to php's unlink function. But luckily most files were not writable by the user that would execute the php-script

    • @NStripleseven
      @NStripleseven 4 роки тому

      Nice

  • @zacksargent
    @zacksargent 4 роки тому +94

    1:15 -> I think you did a bunch of those capchas wrong.
    When it says it wants the traffic lights, you selected the poles as well.

    • @heroslippy6666
      @heroslippy6666 4 роки тому +20

      that feeling when the captcha thinks motorcycles and bicycles are the same thing.

    • @gyroninjamodder
      @gyroninjamodder 4 роки тому +3

      That's because the poles have traffic lights on them

    • @konradw360
      @konradw360 4 роки тому +21

      It's google using the CTF players as free workers. If you want the flag work 5 min for us :D

    • @Anonymous-vh6kp
      @Anonymous-vh6kp 4 роки тому

      Konrad W correct

    • @abbb8615
      @abbb8615 4 роки тому +1

      he a robot

  • @1vader
    @1vader 4 роки тому +45

    Your usage of Promises is ... interesting ...
    The purpose of Promises is exactly to avoid the nesting you are doing and that you would usually get when using callbacks.
    You can just do this:
    fetch("/flag").then(r => r.text()).then(t => fetch(...))

    • @akuviljanen4695
      @akuviljanen4695 4 роки тому +5

      I think modern chrome supports `await` in console too

    • @TimLF
      @TimLF 4 роки тому

      @@akuviljanen4695 only in an async function as the exploit is not run in console

    • @akuviljanen4695
      @akuviljanen4695 4 роки тому

      Fortunately it's easy to wrap everything into an async lambda

    • @AtheistReligionIsCancer
      @AtheistReligionIsCancer 4 роки тому

      Very good info.

    • @IBMboy
      @IBMboy 4 роки тому

      Lol i did that too before learning how promises work

  • @specific_protagonist
    @specific_protagonist 4 роки тому +69

    The endless reCaptcha looks about normal for when I use Tor.

    • @IAmOxidised7525
      @IAmOxidised7525 4 роки тому +1

      Underrated comment..

    • @cat47
      @cat47 4 роки тому +1

      ya lol, that's why I don't use it

  • @RonFarkash
    @RonFarkash 4 роки тому +2

    I recently started to learn some Web Application pen-testing, and a lot of the things here finally made sense for me, thank you for your detailed explanation.

  • @rishabhpant1828
    @rishabhpant1828 4 роки тому +2

    Bro i was eagerly waiting for this since 1 week...
    As a newbie, i wanted the walkthrough.
    Thank you so much bro

  • @AnPham-uz3td
    @AnPham-uz3td 4 роки тому +1

    I think people with extensive knowledge about client-side would understand this haha

  • @abadhaiku
    @abadhaiku 3 роки тому +3

    Imagine being on the other end of this... You open up a ticket from a user and suddenly two little embedded windows open and your password is leaked

  • @attention_shopping
    @attention_shopping 4 роки тому +1

    great stuff, didn't know self-xss was vulnerable in this way!

  • @barefeg
    @barefeg 4 роки тому +3

    Testing for XSS in all fields of my page RN 😅

  • @danielkrajnik3817
    @danielkrajnik3817 3 роки тому

    1:30 that's a lot of dedication

  • @Zuudo
    @Zuudo 4 роки тому +11

    those nested Promise#then calls cause me pain 😶

  • @warker_de
    @warker_de 4 роки тому +2

    🤯🤯🤯... looking this for the 5. time

  • @unknown-mh9fk
    @unknown-mh9fk 4 роки тому

    u see from doing ctfs and watching videos i was able to follow i was like wow i really learned a lot i can follow this until about 6 minutes the i was like -_- what

  • @kkaran6693
    @kkaran6693 4 роки тому +1

    Where can I learn this stuff????

  • @IAmOxidised7525
    @IAmOxidised7525 4 роки тому +1

    Try using promises .... thats what I thought when I saw timeouts...

  • @KTibow
    @KTibow 4 роки тому +1

    If you want to get through captchas faster, only check 3 boxes. No more, no less.

  • @felchore
    @felchore 4 роки тому +1

    Awesome video, thanks!

  • @hweissi
    @hweissi 4 роки тому +1

    Hi, can you do a video writeup for the mathsh challenge from GoogleCTF? I am searching for a writeup of that challenge since the end of the CTF. I worked on that challenge for many hours but couldn't clear it, and I would just want to know if I was on the right track.

  • @TheRetsekShow2236
    @TheRetsekShow2236 4 роки тому +2

    In your XSS when you have typed "fetch('/flag').then( r => { ....." What is "r"? Is it the "response" of the fetch request?

    • @machinexa1
      @machinexa1 4 роки тому

      idk much javascript but probably that is r a custom function so is t

    • @dennis-heinrich
      @dennis-heinrich 4 роки тому

      Of course, it is the actual response if no error ocurred in the (hopefully present) ".catch(err => { /** **/ })" function.
      developer.mozilla.org/en-US/docs/Web/API/Fetch_API/Using_Fetch

    • @machinexa1
      @machinexa1 3 роки тому

      @@malloc8634 nice

  • @WhiteBoiDave
    @WhiteBoiDave 4 роки тому +1

    could u get us deeper into sdr? would be great!

  • @realyoutubekumar
    @realyoutubekumar 4 роки тому

    that captcha tho...😅

  • @ManishShah-qk4lj
    @ManishShah-qk4lj 4 роки тому

    Wow amazing video I love it but I better understand in hindi language

  • @DHIRAL2908
    @DHIRAL2908 4 роки тому +1

    PWN challenges please!!!

  • @jockillfull
    @jockillfull 4 роки тому

    Have you played the CSAW? I saw team ALLES, it's yours right? How did it went?

  • @appsecjourney8907
    @appsecjourney8907 4 роки тому

    Hello brother, Can I ask you some questions?
    You told, you using linux in docker. How to set up linux in docker to get the external IP?

    • @𪛗
      @𪛗 4 роки тому

      google is your friend

  • @imflo1060
    @imflo1060 4 роки тому +13

    13:39, 2 second too long :'(

  • @diegodejesus9668
    @diegodejesus9668 4 роки тому

    Do you think that with the passage of time, the systems will be more secure and hacking will be almost impossible (or unnecessary)?

  • @DawnnDusk-k4n
    @DawnnDusk-k4n 4 роки тому

    Come on... Next
    Gibe me Next video LiverFlow!!!

  • @titiloxx
    @titiloxx 4 роки тому

    If anyone have tried using CSRF it does not work because admin can not change his address. Only normal users can do. So, you have to use some technique like preload an like this man did. Or just check the document.referrer

  • @vendybirdsvadl7472
    @vendybirdsvadl7472 4 роки тому

    Is there CTF for begineers? Or something like that?

  • @Channel-he5fr
    @Channel-he5fr 3 роки тому

    Do you like John Hammond?

  • @aayushk2845
    @aayushk2845 4 роки тому

    hi i'm pretty new to hacking and i wanted to try to find a vuln in iitianspace.com/login.php pls help

  • @shubhamdwivedi7766
    @shubhamdwivedi7766 4 роки тому

    I passed the captcha in 2 trials lol😂

  • @MisterL2_yt
    @MisterL2_yt 4 роки тому

    1:00 Wait a second how is there a traffic light in the last box he clicks? I would have failed that captcha...
    edit: nvm, it was him who failed the captchas lol

  • @soggytoast111
    @soggytoast111 4 роки тому +2

    Are you sure that setTimeout actually does anything? I've run into issues before when trying to use setTimeout to control a data flow - it's still all executed instantly and doesn't work the same way as async/await/promise.

    • @laurinneff4304
      @laurinneff4304 4 роки тому +2

      setTimeout, at least in my experience, works, but he should've used async/await or promises on this case

    • @pietrohideki
      @pietrohideki 4 роки тому +1

      If you have some doubts or think you need some more insight on setTimeout i suggest you to search on youtube "what the heck is event loop anyway" it's a video of around 26 minutes which gives a good insight on the event loop and how sometimes setTimeout is used in the wrong way. Hope this helps

  • @zsin128
    @zsin128 4 роки тому +9

    Why don't you use Firefox?

    • @LiveOverflow
      @LiveOverflow  4 роки тому +8

      Why don’t you use Chrome?

    • @zsin128
      @zsin128 4 роки тому +1

      @@LiveOverflow it eats ram (and is slower than Firefox on my PC)

    • @0xecho
      @0xecho 4 роки тому +5

      @@zsin128 lol you're out here fighting about browsers, while im out here curling the page and imagining what it looks like im my head

    • @0xecho
      @0xecho 4 роки тому

      P.S. I donot recommend that, not fun

    • @neloka4313
      @neloka4313 4 роки тому

      Chrome has more and better tools for hacking and programming.

  • @Zedoy
    @Zedoy 4 роки тому +7

    Managarmr is so awkward to pronounce 😂😂😂😂

  • @DiggOlive
    @DiggOlive 4 роки тому

    Less Smoked Leet Chicken

  • @kmcat
    @kmcat 4 роки тому +3

    When I read the flag name, I sometimes think I could of guest that

    • @gameglitcher
      @gameglitcher 4 роки тому +2

      That's great except for the no brute forcing flags condition on ctf's :)

  • @blobthekat
    @blobthekat 3 роки тому

    2:23 learn how to use promises man

  • @Alkiiis
    @Alkiiis 4 роки тому +3

    There is also an solution where you find the username/password in the document.referer.
    github.com/weibell/ctf-google2020/tree/master/tech-support

  • @yashb.pandhare5772
    @yashb.pandhare5772 4 роки тому

    🧐👍🤝🤜👌

  • @flyingpeter
    @flyingpeter 3 роки тому

    jesus christ, where does one even begins to solve that

  • @tera_hz7125
    @tera_hz7125 4 роки тому

    Team pasten wants to know your location

  • @lab-at-home
    @lab-at-home 4 роки тому

    Funny, I solved this guy using the referrer. I guess it was not intended solution

    • @Timooooooooooooooo
      @Timooooooooooooooo 4 роки тому

      Do you have a write up (or short explanation) of your solution? I'm very interested in it

  • @BERTDELASPEED
    @BERTDELASPEED 4 роки тому

    I wish I had that knowledge 😑

  • @52.yusrilihsanadinatanegar79
    @52.yusrilihsanadinatanegar79 4 роки тому

    *captcha lol*

  • @cassandradawn780
    @cassandradawn780 4 роки тому

    WOW im early. 4 min ago

  • @zCri
    @zCri 4 роки тому +1

    wtf is that captcha lmfao

  • @aashikyadav4439
    @aashikyadav4439 4 роки тому

    wish I could understand this .

  • @moriartyshelby1618
    @moriartyshelby1618 4 роки тому +1

    "who cares" in a nutshell in this video...XD

  • @muddassirahmed3342
    @muddassirahmed3342 4 роки тому

    wha?

  • @4n1eu
    @4n1eu 4 роки тому

    i don't understand anything

    • @soggytoast111
      @soggytoast111 4 роки тому +2

      The short version:
      The tech support app has a bug in it that allows you to post content that will be parsed as Javascript. This is a major security vulnerability known as xss.
      The point of the challenge is to get the Google bot to leak out his cookie by having it trigger your inserted malicious Javascript code.
      But you can't simply grab the cookie and send it back to you because the CORS check will block it. So the solution is you have to do all kinds of acrobatics with your Javascript code and a second XSS to walk the Google bot around the site and log in and out on different sessions.

    • @internetdoggo4839
      @internetdoggo4839 4 роки тому

      Understandable. I had to watch it 3 times to understand it