ZipSlip w/ TAR & Server-Side Template Injection - HackTheBox University CTF - "Slippy"

Поділитися
Вставка
  • Опубліковано 12 січ 2025

КОМЕНТАРІ • 57

  • @Gweedzy
    @Gweedzy 3 роки тому +23

    heyy John, I've been watching hours of your content and I think this is the right moment to leave a comment.
    I really love your videos and especially the rythm and the way you say everything that goes through your mind
    I'm still kind of half a noob at programming but listening to you thinking and testing stuff is way more enjoyable and inspiring than boring tutorials
    Thank your for sharing your knowledge, I wish you the best from France
    -A random dude that learns and devs web and python apps in his bedroom at parents'

  • @highvisibilityraincoat
    @highvisibilityraincoat 3 роки тому +2

    john i've been subscribed for years and was really big on your channel about early last year. I fell off because of school and other stuff but tonight i sat down and watched the whole thing through, which I normally never do to any youtube video. now my itch is back and I want to get back into CTFs. thanks for sticking around and for the constant flow of informative engaging content.

  • @coreyknutson-huddleston8852
    @coreyknutson-huddleston8852 3 роки тому +13

    Love your vids man, teaching me to be a better programmer and problem solver...thanks for sharing your brain and time.

  • @m4rt_
    @m4rt_ 3 роки тому +2

    I found your channel many months ago through these kinds of videos, and here I am, still watching these videos.

  • @karlkoch5417
    @karlkoch5417 3 роки тому +10

    "Werkzeug" is german for "tool". Watching you is so interesting and helpful, love your videos. Greetings from germany.

    • @itssebis8183
      @itssebis8183 2 роки тому

      Just wanted to send this information too... In germany we say: "dEr FrÜhE vOGeL fÄNgT dEN wuRM."

  • @XiSparks
    @XiSparks 3 роки тому

    I'm 100% using "That floated my fancy" in my day to day conversation from now on.

  • @АлексейЛавренович-х7е

    opening a totally new world with you man, excellent

  • @saite2560
    @saite2560 2 роки тому +1

    Love the videos, they are always so much to absorb I love it. your probably aware of this one, but when you get a code output that's is all jumbled.
    rather then trying to splitting the code up. which works no doubt, just seems quicker or run it through an online code beautifier. some code editors might have a auto beautifier. they have them for most of the code language's.
    they doesn't alter the code just makes it human readable. puts in the tabs in the right spot for python. or other code types. also adds color for more complicated code which is a nice touch.

  • @maurox1614
    @maurox1614 3 роки тому +1

    That's why I always run the webserver as a low privileged user and set all permission on files as read-only (for the web server user).
    Anyway as always thank you for sharing the knowledge!

  • @sevadazohrabian4021
    @sevadazohrabian4021 2 роки тому

    As always, amazing video. Thank you John.

  • @JonathanLeeDev
    @JonathanLeeDev 3 роки тому +4

    Would be interested to see a CTF where you are to attack a Spring Boot Java application. Love the videos BTW!

  • @_CryptoCat
    @_CryptoCat 3 роки тому +1

    no chapters in a 40 min video 😱 this was a great challenge! nice to see the extra exploration of SSTI, i just replaced one of the python files with a modified version containing some friendly (totally non malicious) code 😈

  • @avishekkumar8477
    @avishekkumar8477 3 роки тому

    I am your great fan john,
    I have learnt many stuffs from your vids

  • @ZeldoKavira
    @ZeldoKavira 3 роки тому

    Sublime allows you to open an entire folder at a time so that its easier for the viewers to follow along on where you are in the file tree

  • @claymoody
    @claymoody 3 роки тому

    well done as always! Thanks.

  • @kevinalexander4959
    @kevinalexander4959 3 роки тому +3

    Since it was running as root, could have just injected a python script to give you reverse TCP and it should be a reverse shell running as root, correct?

  • @PythonisLove
    @PythonisLove 3 роки тому +1

    impressed and subscribed

  • @guardit_
    @guardit_ 3 роки тому +1

    can you tell us about Cyber Santa is Coming to Town (hackthebox ) challenge

  • @Gigawipf
    @Gigawipf 3 роки тому

    That tickled my boat

  • @Vilvee
    @Vilvee 3 роки тому +2

    I love pretending like I know what's going on.
    *internal screaming*

  • @sergten
    @sergten 3 роки тому

    If that's Difficulty 1 I'm curious to what's involved in the 4-star problems.

  • @-willplaysgames
    @-willplaysgames 3 роки тому

    As a hypothetical, if you were to engage this type of web app in a black box situation, how would you go about identifying the Zip Slip vuln on this machine? I'm having trouble wrapping my head around how to look at CTF boxes from a scope of work type of perspective. Do most of these types of vulns only get discovered in situations where you're allowed to audit (via source code or some other grey/white box situation) that this app is mishandling TAR and such? sorry if that's a complex question. Love your videos. Thanks for all you do for this community.

    • @luketurner314
      @luketurner314 3 роки тому +2

      About 1:50 he views the source of the webpage (all web browsers can do this, how would they display a webpage otherwise?) and at the bottom (in this case) is "/static/js/main.js". One could copy-paste that relative path into the browser's address bar to view the file. The contents of this file would be the same as 11:50, where he finds the TAR mishandling code and the "/api/unslippy" POST url. As for the ssti, he finds the server type in the request headers in the browser dev tools (3:18).
      All this recon solely through the browser, no special tools needed. The only additional info possibly needed would be experience

  • @davidmiller9485
    @davidmiller9485 3 роки тому

    Class Pickle??!!??!! That better damn well be a DILL class!!!
    Look near his image at 34:00

  • @vrushabhpatil2867
    @vrushabhpatil2867 2 роки тому

    How did u find that file i want that filewhere i can that file or information plzz reply

  • @roypolinder8158
    @roypolinder8158 3 роки тому +1

    when day 2?

  • @Walid-Lamraoui
    @Walid-Lamraoui 3 роки тому

    Hey man .. can u please share the downloadable files (Dockerfile , app source code etc) from the challenge ?

  • @1stAshaMan
    @1stAshaMan 3 роки тому +2

    Is StackOverflow really for anything Other Than new bastardized code?

    • @Nunya58294
      @Nunya58294 3 роки тому +1

      Lmfao I'm sorry to laugh.... I seen "bastardized" and almost spit my drink out

  • @MsTarguisti
    @MsTarguisti 3 роки тому

    I loved how you were analysing the source codes, is there any tutorials for that?

    • @Djamieson713
      @Djamieson713 3 роки тому +2

      start writing code

    • @jaredteaches894
      @jaredteaches894 3 роки тому +2

      Learn how to code? You can't really reverse engineer, if you can't even forward engineer

    • @MsTarguisti
      @MsTarguisti 3 роки тому

      Right Indeed, thank you guys!

  • @yanex4631
    @yanex4631 3 роки тому

    welcom back cyber sct

  • @marshalstewart7776
    @marshalstewart7776 3 роки тому

    So cool

  • @anonymousshadow8308
    @anonymousshadow8308 3 роки тому +2

    why are all these unlisted?

  • @DePhoegonIsle
    @DePhoegonIsle 3 роки тому +1

    Ya know.... The thing that actually bothers me deeply is .
    'Why the hell .. Why the bloody hell is directory climbing ALLOWED?'
    Preventing the ' .. ' would seriously nix the 'slippy' faults, and alot of the injection exploits?
    -- I'd also be very warry of how I allowed updates & debugging, let alone enabling some Read Only access to the web server to key script files.

    • @SumanRoy.official
      @SumanRoy.official 3 роки тому

      it helps in exploiting LFI

    • @DePhoegonIsle
      @DePhoegonIsle 2 роки тому

      @@SumanRoy.official isn't that malware design?
      My point is, why is it even allowed when there should be no valid use of it in public sector use.

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    Malloc?

  • @gacekkosmatek
    @gacekkosmatek 3 роки тому

    didn’t even get a reverse shell into the container, very disappointed

  • @ahmadfaisal6356
    @ahmadfaisal6356 3 роки тому +1

    Where i can learn cybersec from scratch for free (sorry for my english)

    • @_JohnHammond
      @_JohnHammond  3 роки тому +6

      On this channel ;)

    • @Pkay120
      @Pkay120 3 роки тому

      I think it depends on how familiar you are with Linux/Windows/Networking/Programming. I’d build a base with those then try to venture out.

  • @appdevelopersandrelatedcha6498
    @appdevelopersandrelatedcha6498 3 роки тому +1

    2nd comment

  • @m4rt_
    @m4rt_ 3 роки тому +1

    Is it only me or is there something weird with the sound?

  • @MsTarguisti
    @MsTarguisti 3 роки тому

    How this is supposed to be beginner level

  • @superchiaki
    @superchiaki 3 роки тому

    dont get the exploit. its just normal posix behaviour? lol

  • @sandra8139
    @sandra8139 2 роки тому

    I posted the phone number Melissa Vicky Stevenson and Jimbo identity thefts scammers ask to call me

  • @lifebarier
    @lifebarier 3 роки тому

    God damn. Those soy face thumbnails are really an eye sore in my suggestions...

  • @colin-campbell
    @colin-campbell 3 роки тому +1

    Finally gotta unsubscribe because of the thumbnails.

  • @inhnguyento8903
    @inhnguyento8903 3 роки тому +1

    Anybody know why changing info.mtime make it work ?

  • @greob
    @greob 3 роки тому

    Great video, thanks for sharing!