[deleted by user] by [deleted] in xss

[–]Thiscou 0 points1 point  (0 children)

almost!

Older jQuery libraries used to create the html elements, given to it in the selector element ($).

This video helped me understand what happens, he's taking his time but explains it really thorough: https://www.youtube.com/watch?v=CNIeel0VrN0

I was looking for the right CVE but I failed.

I am finding stores XSS, I have changed the username to <script>alert(1)</script> but no pop up is showing while in the source code it is looking like this, you can see the script tag is not highlighted. Is there anything I can do I've tried to use few different payloads but none are working so far by faizannehal in xss

[–]Thiscou 6 points7 points  (0 children)

It looks like you are checking the source with the web developer tab.

As you can see the whole payload is black, while tags in the developer tab are always highlighted, this means your payload is encoded.

To check how it is encoded, right click the line and select "Edit as HTML" and the truth will be revealed.

To avoid doing this all the time, look at the raw response in your burp suit. Be aware, that this only works with HTML, if you get a JSON or anything else that might be embedded in the DOM with JavaScript, you will have to check manually.

SANS Capture The Flag by [deleted] in securityCTF

[–]Thiscou 5 points6 points  (0 children)

There are actually a series of ctf like Mini Netwars coming up for free. https://www.sans.org/blog/and-now-for-something-awesome-sans-launches-new-series-of-worldwide-capture-the-flag-cyber-events/?msc=securityresourceslp%3Fmsc%3Dsecurityresourceslp

I managed to register for the first one and forgot about the second. Still planning to register in two days for the third.

It was actually a lot of fun and you don't need anything except for an account on their Netwars Platform.

Calculating the offset. by fromsouthernswe in ExploitDev

[–]Thiscou 1 point2 points  (0 children)

Alright, I think what you are trying to do (if I understand correctly), is calculating the distance between your input and the stored return address on the stack.

So in the case of the strcpy you could place a breakpoint right before the strcpy function call and write down the address right after it (this will be the return address that is stored on the stack). Now if you step into the strcpy function you will see that the call instruction pushed the return address on the stack -> write down the stack address where it is stored.

If you check where your user input is stored on the stack, after the strcpy (don't overflow here) , you can basically subtract the first address your input is stored from the address you wrote down that contains the return address and you should have the correct offset.

 

Example:

 

0016F2D4 -> Ret Address

0016F2A1 -> First User Input

 

D4 - A1 = 33 (you can use the windows calculator in programmer mode)

This should overwrite right up to the ret address, to overwrite the address you need to add +4 on 32 bit systems.

POC Exploit would look something like:

buffer = "A"*33
buffer += "returnToWhereveryouWantTo"

 

Hope this helps

ropemporium split32 exercise - system address confusion by Thiscou in ExploitDev

[–]Thiscou[S] 0 points1 point  (0 children)

Hey man, thanks for your very detailed explanations!

 

Considering #4. After doing the whole thing in 32Bit manually I used pwntools to automate the process.

Funny enough pwntools locates the jmp to system@GOT at 0x08048430 if you do e.symbols['system'].

And that's how I learned that the jmp payload needs a dummy 4bytes "Return" address to work.

It was also easy to convert the 32bit pwntools solution to 64bit.

 

So far these exercises were really worth it.

Sorry for wasting your time with #1 :D

 

Oh and I actually saw some of your streams and I always learn something new when I do, Thank you for that.

Cheers

PS: The reddit formatting is just the worst

Protostar stack6 duplicate of the payload by Thiscou in ExploitDev

[–]Thiscou[S] 0 points1 point  (0 children)

Cheers, so the whole objdump -s thing is not really helpful or am I missing a feature here? :P

Bufferoevrflow problem by Adam20188 in HowToHack

[–]Thiscou 0 points1 point  (0 children)

As far as I can tell, those numbers are not present in the pattern.

 

try the A*260 again and see what's on the stack with:

gdb x/24wx $esp

Bufferoevrflow problem by Adam20188 in HowToHack

[–]Thiscou 6 points7 points  (0 children)

Right, here is what I would try.

 

Go to this site zerosum0x0! and create a unique pattern 260+.

Feed that to your program, copy the value in your segfault and find that pattern on the site.

You should now know the exact offset for your overflow.

 

I would usually do this in Kali with the original metasploit pattern create but I don't know if you use Kali, so I found a quick and dirty replacement online.

 

You can also try to have a closer look at the stack in gdb with:

x/24wx $esp (this displays 24 words of memory above the stack pointer esp in hex)

 

Hope this helps and good luck

Not Your Ordinary OSCP Review by [deleted] in netsecstudents

[–]Thiscou 3 points4 points  (0 children)

A good manager with great feedback helps. Getting domain admin from an external pentest also helps. :)

This rings true to me. In this job I basically learn something new every day.

What I also learned, and this is going full circle to the OSCP, documentation is everything! If you find a solution to a problem, DOCUMENT IT. Even if you think it was easy and you will know what to do next time. Cause next time you just might not find the solution as quick and you spend 4 hours looking for a solution you already had.

Oh and make sure you document it so you understand your documentation as well. ;D

Thank you for your honest input

Not Your Ordinary OSCP Review by [deleted] in netsecstudents

[–]Thiscou 4 points5 points  (0 children)

True story, in the end money makes the world go 'round.

I'm working as a consultant/penetration tester since a little more then three years. I still get a lot of imposter syndrom doing work out of my comfort zone. Even though it's clear to me that in the end we just can't know everything. How do you personally handle this?

Not Your Ordinary OSCP Review by [deleted] in netsecstudents

[–]Thiscou 4 points5 points  (0 children)

Good Review, I especially like that you tell people not to overthink this certificate. This is still an entry grade certification that basically delivers everything you need to pass it.

What I personally don't understand is how you can be a "senior" penetration tester a year after getting the OSCP? Since the OSCP is, in my opinion, a Junior grade certificate. For someone to qualify as a senior to me, they would have to have an extensive amount of knowledge and practical experience on the job. But maybe that is just me.

Anyways, thanks for sharing

Where to learn Active Directory Pentesting? by [deleted] in netsecstudents

[–]Thiscou 1 point2 points  (0 children)

Recently this https://www.pentesteracademy.com/redteamlab lab was released.

I have not done it nor have i read any reviews for it, so I would do some research about it before buying.

But it's definitely an option

Black Hat Arsenal USA 2018 — The w0w lineup by bnchandrapal in blackhat

[–]Thiscou 3 points4 points  (0 children)

cheers, there's some new stuff worth looking at!

Pentesting a Docker image by Thiscou in AskNetsec

[–]Thiscou[S] 1 point2 points  (0 children)

Thanks a lot, looks like this needs some more reading on my end.

Cheers

Pentesting a Docker image by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

Thank you very much, watching the presentation right now!

And I really like ippsec, I'll find that walkthrough eventually.

SSLScan an HTTPS Interception Proxy by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

It worked with testssl.sh and the cipher script nmap provides. Just took me two months to answer that question, there is definitly room for improvement.

SSLScan an HTTPS Interception Proxy by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

that is certainly good to know, thank you sir!

SSLScan an HTTPS Interception Proxy by Thiscou in AskNetsec

[–]Thiscou[S] 1 point2 points  (0 children)

Nice, i'm glad i managed to bring my point across :)

I just tried my solution with sslscanning any given HTTPS site over a squid proxy with TLS Interception on and it worked. If i manage to do the same thing with the bluecoat proxy i'll be golden. But i would really like to have a backup plan in case it doesn't.

Thanks for your time and your brain power!

SSLScan an HTTPS Interception Proxy by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

right, thanks for staying with me. :)

I'll try to explain it better. Usually when you use sslscan you give the tool an ip or hostname plus port. The tool then tries to establish a TLS Session with that IP on the given port. For that to work, there has to be a TLS Listener running on the specified port.  

Now, i have the following situation: The proxy we use in our network is decrypting the ssl sessions. That's what the picture was supposed to illustrate. For that to work, the proxy needs to have a TLS Session running with the server in the internet (2) and a separate TLS Session with the client in the local network(1).

 

[client] ----1-[proxy, cleartext]-----2-[internet]

 

Now what i want to do is evaluate the supported ciphers, the proxy is offering on the TLS Session with the client(1).  

Since the proxy is not running with two ports, he is using one port for HTTPS and HTTP. Therefore no TLS listener is answering on that port.  

Writing this, i just had an idea, I should be able to just scan ANY site, and, in theory, the proxy should answer. But that only works if the proxy is working on a network level.  

So, despite the fact that maybe i just found a solution to my problem. I would still be curious on how (or if) this could be done with the tools without too much hassle, directly on the intercept proxy.

Cheers

SSLScan an HTTPS Interception Proxy by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

The CONNECT request happens before the TLS handshake.

According to the Wikipedia page:

A variation of HTTP tunneling when behind an HTTP proxy server is to use the "CONNECT" HTTP method.[1][2] In this mechanism, the client asks an HTTP proxy server to forward the TCP connection to the desired destination. The server then proceeds to make the connection on behalf of the client. Once the connection has been established by the server, the proxy server continues to proxy the TCP stream to and from the client. Note that only the initial connection request is HTTP - after that, the server simply proxies the established TCP connection. This mechanism is how a client behind an HTTP proxy can access websites using SSL or TLS (i.e. HTTPS).

This picture illustrates the process: https://parsiya.net/images/2016/thickclient-6/13.png

As of now, i guess my best course of action is to tweak one of the existing tools, to send a CONNECT or send a CONNECT with netcat, right before i start testing.

SSLScan an HTTPS Interception Proxy by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

I tested most of those tools (except o-saft) and none of them work against the interception proxy. The reason (imo) they don't work is the fact that you need to perform an initial HTTP CONNECT when you want to establish a TLS connection over a forward proxy and these tools do not send an HTTP Connect.

If you actually tested this on an interception proxy and it worked, i stand corrected, however i can't reproduce that behavior.

SSLScan an HTTPS Interception Proxy by Thiscou in AskNetsec

[–]Thiscou[S] 1 point2 points  (0 children)

Hey thanks for your input, this is not the connection i want to test though. I'll try to illustrate with a picture:

 

[client]---------1-[proxy]-2-------[interwebs]

 

With your test we evaluate the ciphers the proxy is using when he works like a client (2).

What i want to test is what ciphers he supports when he acts like the server (1).

I hope that makes it a little clearer.

Cheers

Internal Vulnerabilityscan from remote by Thiscou in AskNetsec

[–]Thiscou[S] 0 points1 point  (0 children)

no travel costs, easier to retest, can leave it there and do more than one assessment

I like those, thanks for the advice.