Hack for Fun and Profit

From a lame SSRF to a full $4000 RCE

9 min · 5 jul 20209 min
aflevering From a lame SSRF to a full $4000 RCE artwork

Beschrijving

Hello ethical hackers and bug bounty hunters! Welcome to this bug  bounty write-up where I show you how I found a Server-Side Request  Forgery vulnerability (SSRF). Then, I will explain how I was able to  escalate it to obtain a Remote Code Execution (RCE). Finally, you will  see how it is possible to gain a full SSH shell on the vulnerable  server. If all this seems intimidating for you, let me tell you that  shouldn’t be; just make sure you stick with me until the end. I promise  you are going to learn many things today! Read more on https://thehackerish.com/bug-bounty-write-up-from-ssrf-to-4000/ Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-10-lab-vm-free  Facebook Page: https://www.facebook.com/thehackerish   Follow us on Twitter: https://twitter.com/thehackerish

Reacties

0

Wees de eerste die een reactie plaatst

Meld je nu aan en word lid van de Hack for Fun and Profit community!

Begin hier

1 maand voor € 1

Daarna € 9,99 / maand · Elk moment opzegbaar.

  • Podcasts die je alleen op Podimo hoort
  • 20 uur luisterboeken / maand
  • Gratis podcasts
Begin hier

Alle afleveringen

11 afleveringen

aflevering JavaScript Enumeration for bug bounty hunters artwork

JavaScript Enumeration for bug bounty hunters

JavaScript Enumeration is a critical skill to have if you want to level  up your penetration testing or bug bounty hunting game. Yet, not  everyone does it, partly because it is a boring exercise or it consumes  most of your time, not to mention how intimidated you might feel reading  someone else’s code. Today, we will explore this topic and understand  why it matters, and how you can perform it.    Further reads mentioned in the video:  https://thehackerish.com/cross-site-scripting-xss-explained/  https://portswigger.net/web-security/cross-site-scripting/dom-based  https://labs.detectify.com/2016/12/15/postmessage-xss-on-a-million-sites/  https://medium.com/@alex.birsan/the-bug-that-exposed-your-paypal-password-539fc2896da9    Download your FREE Web hacking LAB:  https://thehackerish.com/owasp-top-10-lab-vm-free  Read more on the blog: https://thehackerish.com  Facebook Page: https://www.facebook.com/thehackerish  Follow us on Twitter: https://twitter.com/thehackerish

24 dec 202010 min
aflevering OSCP Certification: All you need to know artwork

OSCP Certification: All you need to know

Hello ethical hackers! In this episode, you will learn everything  related to OSCP certification. What is OSCP? Why is it a strong  certification? What sets it apart? What are the requirements? How to  properly prepare for the exam? What to do the day of the exam? And  what's next once you earn your OSCP certification? Read more on the blog: https://thehackerish.com/oscp-certification-all-you-need-to-know/  https://thehackerish.com/best-hacking-websites-for-ethical-hackers/  Hacking websites to sharpen your skills: https://youtu.be/iZLo8WiooIY  Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-10-lab-vm-free  Facebook Page: https://www.facebook.com/thehackerish  Follow us on Twitter: https://twitter.com/thehackerish

30 jul 202014 min
aflevering From a lame SSRF to a full $4000 RCE artwork

From a lame SSRF to a full $4000 RCE

Hello ethical hackers and bug bounty hunters! Welcome to this bug  bounty write-up where I show you how I found a Server-Side Request  Forgery vulnerability (SSRF). Then, I will explain how I was able to  escalate it to obtain a Remote Code Execution (RCE). Finally, you will  see how it is possible to gain a full SSH shell on the vulnerable  server. If all this seems intimidating for you, let me tell you that  shouldn’t be; just make sure you stick with me until the end. I promise  you are going to learn many things today! Read more on https://thehackerish.com/bug-bounty-write-up-from-ssrf-to-4000/ Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-10-lab-vm-free  Facebook Page: https://www.facebook.com/thehackerish   Follow us on Twitter: https://twitter.com/thehackerish

5 jul 20209 min
aflevering Hacking a new web application from start to finish artwork

Hacking a new web application from start to finish

Hello ethical hackers and bug bounty hunters! I’ve recently conducted  a successful penetration testing against a web application built using  Google Web Toolkit, and I want to share with you the process I followed  and the bugs I found. Hopefully, this episode will inspire you to try  harder during your own bug bounty hunting and penetration testing  journey. I will briefly explain what Google Web Toolkit is and what research  has already been made around it. Then, I will explain why and how I  built a Burp extension to help me during the penetration testing  process. Finally, I will share with you some vulnerabilities I found,  especially a cool one which required further effort. So stay with me as  we smash this web application into pieces! Read more details on https://thehackerish.com/hacking-a-google-web-toolkit-application/ Watch the Broken Access Control approach on https://youtu.be/TJQpOrtet8E Read about IDOR on https://thehackerish.com/idor-explained-owasp-top-10-vulnerabilities/

4 jun 202015 min