IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF

Sdílet
Vložit
  • čas přidán 6. 09. 2024
  • Moving your first steps into hacking? Start from HTB Academy: bit.ly/3vuWp08
    Hungry for more hacking training? Join Hack The Box now: bit.ly/331nQCl
    Hang with our community on Discord! johnhammond.or...
    For more content, subscribe on Twitch! / johnhammond010
    If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    PayPal: paypal.me/john...
    E-mail: johnhammond010@gmail.com
    Discord: johnhammond.or...
    Twitter: / _johnhammond
    GitHub: github.com/Joh...

Komentáře • 92

  • @nikkittb
    @nikkittb Před 3 lety +102

    Man, i have to say: i love how your vids on these challenges are uncut and honest! It makes me feel less of a fool myself, when i'm stuck on something trivial. At least next time i can say:"It's okay you little doofus, John Hammond forgot to use backticks when setting a JS-variable. Apparently even the best guys out there make mistakes." Thanks for the wonderful content John!

    • @lobley2
      @lobley2 Před 3 lety +1

      The best guys are all the better for being honest about their mistakes and demonstrating that they are human. For example I love that prominent scam fighting youtuber Jim Browning fell for a scam that lost him his channel temporarily, but made sure to tell the world he fell for it. It shows no matter how experienced you think you are you still have to be on your guard.

  • @drewrad8
    @drewrad8 Před 3 lety +64

    Love the videos where you're doing it for the first time. It's all about learning how other people learn!

  • @_xpl0it_
    @_xpl0it_ Před 3 lety +40

    .. that satisfaction .. It's priceless

  • @NateRoberts
    @NateRoberts Před 3 lety +15

    I actually appreciate when John does it the first time and struggles. Bc I know he does “easy rooms” but sometimes when I struggle I feel bad. So seeing John struggle too validated my struggling 😅 thanks again! Learned a lot from your struggle 😂😂

  • @kritagyagupta8619
    @kritagyagupta8619 Před 3 lety +13

    John thanks for this opportunity for us to learn from this

  • @PhilAlbu
    @PhilAlbu Před 2 lety +3

    Our failures teach us much more than our successes. Thanks for being so organic in your content. I think it's great to see that people don't always figure things out on the first try.

  • @develepre
    @develepre Před 3 lety +7

    I'm that Node Guy that laugh at all `back-tick moments`

  • @diddyman1958
    @diddyman1958 Před 3 lety +1

    I understood very little of that but still immensely enjoy your videos.

  • @i-negm
    @i-negm Před 2 lety +2

    Nice video , I liked your uncut way of recording this. It makes a lot of sense to me when watching you put all things together.
    Thanks for sharing such knowledge. Have a nice day sir.

  • @Khusyasy
    @Khusyasy Před 3 lety +4

    i just found this channel randomly, and i love the videos 😅

  • @maxxroach8033
    @maxxroach8033 Před 3 lety +1

    I love watching you do these for the first time. I know the satisfaction you get when solving problems. Keep it up man!

  • @annikablohm
    @annikablohm Před 3 lety +3

    Weird as hell payload.
    Love it.

  • @_CryptoCat
    @_CryptoCat Před 3 lety +3

    didn't solve this one, looking forward to a detailed walkthrough 😸

  • @anthonutty
    @anthonutty Před 3 lety +1

    I think jsonp is a common technique where cross-domain configurations are not setup, which means you can only basically do GET requests. So you basically send a GET request with a callback name of your choice, and take the response text of the response and eval it which essentially gets you to result passed into your function callback by name.

  • @MI7DJT
    @MI7DJT Před 3 lety +1

    This is why it's called Hacking!! Great job John!

  • @fr8trainUS
    @fr8trainUS Před 3 lety

    You call it painful, imo observing the thought process and troubleshooting was great! Congrats on the success

  • @adbirdk
    @adbirdk Před 3 lety

    As someone trying to secure my code, I really enjoy watching your web security vids..

  • @swapnilbhosale2230
    @swapnilbhosale2230 Před 3 lety +1

    Great video man.
    Big fan!
    Thanks for sharing the knowledge with the community. I appreciate it. 🙏🏻

  • @haseebarshad7451
    @haseebarshad7451 Před rokem

    I WAS SCREAMING TACS JOHN!!!

  • @rbchoyce
    @rbchoyce Před 3 lety

    I don’t understand much on here but it’s still fun to watch and learn

  • @CodyHoskin
    @CodyHoskin Před rokem

    Such a good video. It’s awesome learning with you. Lol.

  • @soniablanche5672
    @soniablanche5672 Před rokem

    jsonp was a hacky way of sending data directly via javascript back when all cross site resources were not allowed by browsers. you're supposed to run it as the src of a script tag (script tags ignore CORS policies). That's why it's asking for the name of the callback, you would write a function that expect the data passed as argument.

  • @ca7986
    @ca7986 Před 3 lety

    Love this new style with struggling. ❤️

  • @mattrickbeats
    @mattrickbeats Před 2 lety

    Bro! You are a genius fam!

  • @OMER3-1-3
    @OMER3-1-3 Před rokem

    DAMNN That was a great video thanks.

  • @HackerPaints
    @HackerPaints Před 2 lety

    You’ve spared no expense

  • @jelgue
    @jelgue Před 2 lety

    This one was really cool and interesting to me. Loved it!

  • @isiraadithya
    @isiraadithya Před 3 lety +1

    If the content type is "application/javascript" you cannot use html tags inside it. Browser will ignore it and throw a exception. I think I wasted about 5 hours without knowing this on a bug bounty program. If I made a mistake please correct me. (I am 16 years old noob 😅)

  • @BearkFearGamer
    @BearkFearGamer Před 3 lety

    Anxious thinking in backticks, hahaha. Congratulations man!

  • @dandan7884
    @dandan7884 Před 3 lety +1

    Why would someone use puppeteer to access some hidden localhost page on the backend after a user post something? Automate administrative work? Feels very risky to do it in that way IMO
    Or maybe... It's just an insecure code for people to learn from...

    • @Qwerasd
      @Qwerasd Před 3 lety +2

      The puppeteer instance simulates an administrator.

  • @alexcordovac
    @alexcordovac Před rokem

    This is gold!!!!

  • @jmsanchez5631
    @jmsanchez5631 Před 3 lety

    IM SCREAMING FOR THE BACKTICKS CMON

  • @0xfsec
    @0xfsec Před 3 lety

    I love this htb apocalypse series.. I can learn not just a black box but also white box testing. Do you have any video or tutorial recomendation for beginner on white box testing?

  • @h0tPlug1n
    @h0tPlug1n Před 3 lety +1

    He is the real Elliot Alderson of Mr. Robot.

  • @abhishekmorla1
    @abhishekmorla1 Před 2 lety

    thanks

  • @sallytaylor6
    @sallytaylor6 Před 3 lety

    Great content John

  • @dopy8418
    @dopy8418 Před 3 lety +6

    Hey john how can we rewatch the hacking game you commented on with ippsec ?

    • @viv_2489
      @viv_2489 Před 3 lety +1

      I haven't found the videos on Twitch.. it was only live stream I guess...

    • @_CryptoCat
      @_CryptoCat Před 3 lety +2

      i think HTB said they would be uploading on their YT channel

    • @viv_2489
      @viv_2489 Před 3 lety +2

      @@_CryptoCat oh cool

    • @tylerrake9148
      @tylerrake9148 Před 3 lety

      @Do py you can get it now available on youtube, on hack the box channel.....

    • @dopy8418
      @dopy8418 Před 3 lety

      @@tylerrake9148 Yeah i saw thanks.

  • @hakimelmansouri3166
    @hakimelmansouri3166 Před 3 lety

    Bro u just so smart i was thinking with you but u always think outside the box and i keep getting stuck hahahaha

  • @daveminion6209
    @daveminion6209 Před měsícem

    never thought a man could suffer so much outside of Purgatory - till now.

  • @SandyOC100
    @SandyOC100 Před 3 lety

    Always better problem solving live

  • @logiciananimal
    @logiciananimal Před 3 lety

    A great example to illustrate that CSP is not a cure-all.

  • @orgozlan323
    @orgozlan323 Před 3 lety

    Thank you

  • @SIRBOB102
    @SIRBOB102 Před 2 lety

    the backticks of doom

  • @thecaretaker6659
    @thecaretaker6659 Před 3 lety

    17:22 Eureka!

  • @hasibavi7539
    @hasibavi7539 Před 3 lety

    Hi Hammond, I usually watch your every video and your contents are very rich.
    I have a query, suppose my SIEM detect potential cobalt strike on a internal communication (local to local) and as per checking it was detected by JA3 fingerprint. So, how can I locate on the machines, is there any true beacon or just false positive.

  • @tkstdude
    @tkstdude Před 3 lety

    Awesome

  • @gurujiguruji8050
    @gurujiguruji8050 Před 3 lety

    Awesome 🔥

  • @phecdaDia
    @phecdaDia Před 3 lety +1

    Does anyone know if you can still download these boxes like John does? Feel like having some nice coding examples would be useful to learn.

  • @kritagyagupta8619
    @kritagyagupta8619 Před 3 lety +3

    Sup people

  • @ebux9885
    @ebux9885 Před rokem

    28:39 ngrok actually put your IP in the X-Forwarded-For header

  • @bulmavegeta23
    @bulmavegeta23 Před 3 lety

    that was intense

  • @choleralul
    @choleralul Před 3 lety

    Cool!

  • @RicondaRacing
    @RicondaRacing Před 2 lety

    I'm definitely not that advanced with BASH to be calling out syntaxes and functions like that. Is there any more entry-level stuff on HTB?

  • @dev__004
    @dev__004 Před rokem

    So what did we learn today?
    Everything needs to be url encoded😝😝

  • @juliachild9377
    @juliachild9377 Před 3 lety +1

    I did it all for the cookie.

  • @hihihi1733
    @hihihi1733 Před 3 lety

    where are you.. ?
    i am eagerly waiting for your videos.

  • @auro3058
    @auro3058 Před 3 lety

    ❤❤

  • @kaihuang5420
    @kaihuang5420 Před 3 lety +1

    I wish john know I was yelling the back-ticks, but I didn't skip the video tho.

  • @hakoo2700
    @hakoo2700 Před 3 lety

    amazing ty so much i leant a loooooooooooooooot from this tnx:) ... btw i was doing '${val}' and seeing it not working and wondering why until i saw the exact same stackoverflow page and see `` and go like but why?!

  • @adityasinghixc3397
    @adityasinghixc3397 Před 3 lety

    Hey John what's your main os ???? Which Linux ??? This is a VM like the original one ??

  • @acolddayinhell6206
    @acolddayinhell6206 Před 3 lety

    did you go live or uploaded a video?

  • @kvikkenni
    @kvikkenni Před 3 lety

    No that was not painful that was epic

  • @raymond25475
    @raymond25475 Před 2 lety

    how do you download an entire website folders and file ?

  • @optional.
    @optional. Před 3 lety

    owsem ❤️

  • @jhbonarius
    @jhbonarius Před 3 lety +2

    javascript is such a mess. i still cannot believe its the fabric behind most of the ui in the world today

  • @JacksonMarshal
    @JacksonMarshal Před 3 lety +2

    I like the fact that John acting like he has never solved this problem before 😄

    • @PC-fe1pf
      @PC-fe1pf Před 3 lety

      I think he was solving it for the first time.

    • @JacksonMarshal
      @JacksonMarshal Před 3 lety

      @@PC-fe1pf nah dude. Checkout his other videos and you will see

    • @PC-fe1pf
      @PC-fe1pf Před 3 lety

      @@JacksonMarshal You mean the other Cyber Apocalypse videos?

    • @JacksonMarshal
      @JacksonMarshal Před 3 lety

      @@PC-fe1pf every Video of his is pre-scripted.
      Because he doesn't want to spend hours on recording himself trying to find it. So he does it ahead and then show us

    • @JacksonMarshal
      @JacksonMarshal Před 3 lety

      @@PC-fe1pf and yes every HTB

  • @corbezzz
    @corbezzz Před 3 lety

    ~yt algorithm things~

  • @edwardortiz8580
    @edwardortiz8580 Před 3 lety

    I am also a veteran. I had some questions regarding certifications, and if you paid for them out of pocket and has the VA reimburse you, or had the VA pay for them via the GI Bill, if so, which ones were covered, and which were not ? I found some information. But nothing very clear.
    Best regards, TIA
    Eddie

  • @Akhand_Bharat18113
    @Akhand_Bharat18113 Před 3 lety

    Sir which Linux os your are using in this video

    • @usha4220
      @usha4220 Před 3 lety

      Ubuntu

    • @LyraMakes
      @LyraMakes Před 3 lety

      I believe that it's Kali

    • @ahmedhajjami2744
      @ahmedhajjami2744 Před 3 lety

      @@LyraMakes Ubuntu , look at the terminal!

    • @LyraMakes
      @LyraMakes Před 3 lety

      @@ahmedhajjami2744 Whoops! My bad. I was going off the logo in the top left.

  • @ElGhadraouiTaha
    @ElGhadraouiTaha Před 3 lety

    Vote for john to be a president.

  • @vinkuu
    @vinkuu Před 3 lety

    while true; do nc -klnvp 9000; done

  • @aayushkubitkar4827
    @aayushkubitkar4827 Před 2 měsíci

    why do you need the display in the payload to trigger the payload?
    When the bot visits the /list for the first time via puppeteer, then the feedbacks would be loaded since empty callback would default to display. In one of those feedbacks would also be the payload and that would trigger the src request which loads the /list endpoint again on the localhost and this time the callback function is populated with the window.location which ends up making the GET request to ngrok url.
    i don't understand the need for display in the payload. Can someone explain? @johnhammond maybe?