У нас вы можете посмотреть бесплатно WAF bypass and vulnerability chain exploiting parser differentials | Waffle-y Order @ HackTheBox или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Waffle-y Order is a medium-difficulty Web challenge from HackTheBox, involving the exploitation of parser differential vulnerabilities to bypass a regex-based WAF and chain a PHP Object Injection with a Blind XXE to read arbitrary files and exfiltrate data. === Timestamp === 00:00 - Introduction and setup 00:23 - The application at-a-glance 🔍 00:58 - Source code review 03:14 - Attack surface review and speculations 04:16 - PHP Object Injection (PHP arbitrary deserialization) 05:33 - XML External Entity Injection 10:00 - preg_match_all bypass (XXE filter) 10:52 - safe_object bypass #1 (PHP magic methods filter) 14:01 - safe_object bypass #2 (PHP magic methods filter) 14:48 - Conclusion If you enjoyed the video leave a like and subscribe to my channel! For writeups in text format or other articles related to Ethical Hacking go to my blog: https://maoutis.github.io/ --- Would you like to support my work? Offer me a virtual coffee :) https://www.buymeacoffee.com/0xbro Check out my socials: Twitter: / 0xbro1 Linkedin: / mattia-0xbro-brollo-b4129614b Documentation and useful articles: https://portswigger.net/web-security/xxe https://portswigger.net/web-security/... https://portswigger.net/burp/applicat... https://portswigger.net/blog/oast-out... https://github.com/Ambrotd/XXE-Notes https://github.com/MegadodoPublicatio... https://www.php.net/manual/en/languag... https://www.php.net/manual/en/languag... https://github.com/MegadodoPublicatio... https://www.phpinternalsbook.com/php5... #hackthebox #bypassWAF #hacking #wafbypass #ctf