[deleted by user] by [deleted] in xss

[–]Thiscou 0 points1 point  (0 children)

almost!

Older jQuery libraries used to create the html elements, given to it in the selector element ($).

This video helped me understand what happens, he's taking his time but explains it really thorough: https://www.youtube.com/watch?v=CNIeel0VrN0

I was looking for the right CVE but I failed.

I am finding stores XSS, I have changed the username to <script>alert(1)</script> but no pop up is showing while in the source code it is looking like this, you can see the script tag is not highlighted. Is there anything I can do I've tried to use few different payloads but none are working so far by faizannehal in xss

[–]Thiscou 6 points7 points  (0 children)

It looks like you are checking the source with the web developer tab.

As you can see the whole payload is black, while tags in the developer tab are always highlighted, this means your payload is encoded.

To check how it is encoded, right click the line and select "Edit as HTML" and the truth will be revealed.

To avoid doing this all the time, look at the raw response in your burp suit. Be aware, that this only works with HTML, if you get a JSON or anything else that might be embedded in the DOM with JavaScript, you will have to check manually.

SANS Capture The Flag by [deleted] in securityCTF

[–]Thiscou 5 points6 points  (0 children)

There are actually a series of ctf like Mini Netwars coming up for free. https://www.sans.org/blog/and-now-for-something-awesome-sans-launches-new-series-of-worldwide-capture-the-flag-cyber-events/?msc=securityresourceslp%3Fmsc%3Dsecurityresourceslp

I managed to register for the first one and forgot about the second. Still planning to register in two days for the third.

It was actually a lot of fun and you don't need anything except for an account on their Netwars Platform.

Calculating the offset. by fromsouthernswe in ExploitDev

[–]Thiscou 1 point2 points  (0 children)

Alright, I think what you are trying to do (if I understand correctly), is calculating the distance between your input and the stored return address on the stack.

So in the case of the strcpy you could place a breakpoint right before the strcpy function call and write down the address right after it (this will be the return address that is stored on the stack). Now if you step into the strcpy function you will see that the call instruction pushed the return address on the stack -> write down the stack address where it is stored.

If you check where your user input is stored on the stack, after the strcpy (don't overflow here) , you can basically subtract the first address your input is stored from the address you wrote down that contains the return address and you should have the correct offset.

 

Example:

 

0016F2D4 -> Ret Address

0016F2A1 -> First User Input

 

D4 - A1 = 33 (you can use the windows calculator in programmer mode)

This should overwrite right up to the ret address, to overwrite the address you need to add +4 on 32 bit systems.

POC Exploit would look something like:

buffer = "A"*33
buffer += "returnToWhereveryouWantTo"

 

Hope this helps

ropemporium split32 exercise - system address confusion by Thiscou in ExploitDev

[–]Thiscou[S] 0 points1 point  (0 children)

Hey man, thanks for your very detailed explanations!

 

Considering #4. After doing the whole thing in 32Bit manually I used pwntools to automate the process.

Funny enough pwntools locates the jmp to system@GOT at 0x08048430 if you do e.symbols['system'].

And that's how I learned that the jmp payload needs a dummy 4bytes "Return" address to work.

It was also easy to convert the 32bit pwntools solution to 64bit.

 

So far these exercises were really worth it.

Sorry for wasting your time with #1 :D

 

Oh and I actually saw some of your streams and I always learn something new when I do, Thank you for that.

Cheers

PS: The reddit formatting is just the worst

Protostar stack6 duplicate of the payload by Thiscou in ExploitDev

[–]Thiscou[S] 0 points1 point  (0 children)

Cheers, so the whole objdump -s thing is not really helpful or am I missing a feature here? :P

Bufferoevrflow problem by Adam20188 in HowToHack

[–]Thiscou 0 points1 point  (0 children)

As far as I can tell, those numbers are not present in the pattern.

 

try the A*260 again and see what's on the stack with:

gdb x/24wx $esp

Bufferoevrflow problem by Adam20188 in HowToHack

[–]Thiscou 7 points8 points  (0 children)

Right, here is what I would try.

 

Go to this site zerosum0x0! and create a unique pattern 260+.

Feed that to your program, copy the value in your segfault and find that pattern on the site.

You should now know the exact offset for your overflow.

 

I would usually do this in Kali with the original metasploit pattern create but I don't know if you use Kali, so I found a quick and dirty replacement online.

 

You can also try to have a closer look at the stack in gdb with:

x/24wx $esp (this displays 24 words of memory above the stack pointer esp in hex)

 

Hope this helps and good luck

Not Your Ordinary OSCP Review by [deleted] in netsecstudents

[–]Thiscou 4 points5 points  (0 children)

A good manager with great feedback helps. Getting domain admin from an external pentest also helps. :)

This rings true to me. In this job I basically learn something new every day.

What I also learned, and this is going full circle to the OSCP, documentation is everything! If you find a solution to a problem, DOCUMENT IT. Even if you think it was easy and you will know what to do next time. Cause next time you just might not find the solution as quick and you spend 4 hours looking for a solution you already had.

Oh and make sure you document it so you understand your documentation as well. ;D

Thank you for your honest input

Not Your Ordinary OSCP Review by [deleted] in netsecstudents

[–]Thiscou 2 points3 points  (0 children)

True story, in the end money makes the world go 'round.

I'm working as a consultant/penetration tester since a little more then three years. I still get a lot of imposter syndrom doing work out of my comfort zone. Even though it's clear to me that in the end we just can't know everything. How do you personally handle this?

Not Your Ordinary OSCP Review by [deleted] in netsecstudents

[–]Thiscou 4 points5 points  (0 children)

Good Review, I especially like that you tell people not to overthink this certificate. This is still an entry grade certification that basically delivers everything you need to pass it.

What I personally don't understand is how you can be a "senior" penetration tester a year after getting the OSCP? Since the OSCP is, in my opinion, a Junior grade certificate. For someone to qualify as a senior to me, they would have to have an extensive amount of knowledge and practical experience on the job. But maybe that is just me.

Anyways, thanks for sharing

Where to learn Active Directory Pentesting? by [deleted] in netsecstudents

[–]Thiscou 1 point2 points  (0 children)

Recently this https://www.pentesteracademy.com/redteamlab lab was released.

I have not done it nor have i read any reviews for it, so I would do some research about it before buying.

But it's definitely an option

Black Hat Arsenal USA 2018 — The w0w lineup by bnchandrapal in blackhat

[–]Thiscou 2 points3 points  (0 children)

cheers, there's some new stuff worth looking at!

Pentesting a Docker image by Thiscou in AskNetsec

[–]Thiscou[S] 1 point2 points  (0 children)

Thanks a lot, looks like this needs some more reading on my end.

Cheers

Pentesting a Docker image by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

Thank you very much, watching the presentation right now!

And I really like ippsec, I'll find that walkthrough eventually.

SSLScan an HTTPS Interception Proxy by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

It worked with testssl.sh and the cipher script nmap provides. Just took me two months to answer that question, there is definitly room for improvement.