OffSec Live Clip 1 | Exfiltrated

  Рет қаралды 1,505

OffSec

OffSec

5 ай бұрын

Disclaimer - Please be aware that variations in audio quality may occur.
In this clip of Exfiltrated, we discussed manipulating file metadata and content types to bypass security restrictions in web applications.
🟪 We used Burp Suite to change the content field and demonstrated how backend systems might fail to manually check and accept manipulated content types, thus bypassing restrictions.
🟪 We introduced ExifTool which is used for reading metadata and headers to determine a file's type and extension, highlighting the backend's reliance on such tools for security checks.
🟪 A technique called "magic byte" was explained, which involved adding specific characters and headers to a file to alter its MIME type and file type as perceived by security tools, effectively bypassing detection mechanisms.
🟪 The example provided illustrated how adding a specific string ("magic numbers") to the beginning of a file could fool detection tools into misidentifying the file type, using the scenario of a PHP file being treated as an image file to demonstrate the concept.
Exfiltrated is a Proving Grounds Practice machine: portal.offsec.com/labs/practice
Join OffSec Live on Fridays: / offsecofficial
We do demonstrations and walkthroughs of course topics and Proving Grounds machines. Additionally, sessions offer career guidance, including how to build a resume, how to break into #cybersecurity, and interview tips.

Пікірлер
The Biggest Issues I've Faced Web Scraping (and how to fix them)
15:03
Blogger-1 (PG-Play) Box Walkthrough with S1REN
2:01:01
OffSec
Рет қаралды 6 М.
КАК ДУМАЕТЕ КТО ВЫЙГРАЕТ😂
00:29
МЯТНАЯ ФАНТА
Рет қаралды 9 МЛН
Despicable Me Fart Blaster
00:51
_vector_
Рет қаралды 26 МЛН
Stow has forever changed the way I manage my dotfiles
8:09
Dreams of Autonomy
Рет қаралды 224 М.
OffSec x ATA | Overview of Black Hat Training
4:51
OffSec
Рет қаралды 706
Yet another OSCP exam experience video
15:47
redfire359
Рет қаралды 3 М.
How C++ took a turn for the worse
5:03
Code Persist
Рет қаралды 266 М.
CrowdStrike IT Outage Explained by a Windows Developer
13:40
Dave's Garage
Рет қаралды 2 МЛН
Coding a Web Server in 25 Lines - Computerphile
17:49
Computerphile
Рет қаралды 330 М.
OffSec Live | Crane
1:01:07
OffSec
Рет қаралды 470
OffSec Live | Exfiltrated
2:22:48
OffSec
Рет қаралды 1,5 М.
КАК ДУМАЕТЕ КТО ВЫЙГРАЕТ😂
00:29
МЯТНАЯ ФАНТА
Рет қаралды 9 МЛН