text stringlengths 4 952 | start float64 0 9.37k | duration float64 0 0 | meta dict |
|---|---|---|---|
Nomad for clarifying that in my dumping nosql data with python video that was also sponsored by sneak so essentially what I just said if you don't understand um the easy way to do this would just be hey is it a no that's annoying uh we could guess uh hey is it a no okay I'm going to guess B I'm going to guess C I'm G t... | 1,972.96 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
and then column data then table column offset and line is what we want want and then our key space because we're going to do the between statement because we want to avoid less than in greater than it makes this a little bit more hard to read I'm going to have a start and end um I don't know what those values are off t... | 2,030.12 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
do select subring username zero was it from Yes uh username from zero for zero does this return anything it returns nothing that's probably how we want to do it so let's see um let's see hold on a second yeah that's exactly how we want to do it so this will never match anything so that is good so it's always going to b... | 2,116.44 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
same variable name twice because that confuses me I'd rather make them completely separate okay I think this is good we need to do substring here column from 04 Z these double froms are throwing me for a loop right here whenever I look at it offset like that I think that is going to be good um we could test this out re... | 2,217 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
we're going to start using the start and end so we can say while start does not equal and we're going to do end minus one because we're always going to divide in half I don't think end is ever going to equal start it's going to eventually be 33 I think or yeah I don't think it ever goes so I always think we want to do ... | 2,327.76 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
want difference is a bad word there so the guess is going to be start plus difference so what we're doing here is like I said we had uh three things and we wanted to only guess half right so we did the end minus the start so we get how many numbers there are in between those and then divide it by two so our start right... | 2,408.4 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
or so we get a number there we go and now the final thing is in instead of like we're actually going to use the between so we can say between the start and the guess okay so let's just send the request and check it so now we're sending it and then we can say if it is equal to the match so that means um we are within th... | 2,506.8 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
numbers right so that is what we are doing I'm G to do all those and statements um I guess we could print this real quick um between start and end so that'll be for debug purposes and let's see now once we get out of this Loop we only have two guesses left so let's copy the payload real quick so a offset like this that... | 2,597.04 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
text then we will return um the care start yep else the end okay so this Loop's going to get us down to where we just have two characters and then once we have two characters that's when we guess it's a lot of confidence I have in running this the first time but we're going to see how it works so let's do print then co... | 2,671.76 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
text internal server error so we likely have a SQL error so we did a let's just copy this go back here I swear we tested this so the column I had users name it's usernames I think that was it so this is why in all these functions I do put some type of Sanity check to make sure we are good um it's still errored so we ca... | 2,774.4 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
but that is how the divide and conquer type of algorithm is going to work there so let us get rid of this print and we can put it all together and now I'm thinking about it this may be an ordered set of list so maybe it is binary search I am not an algorithm specialist this is just the intuitive way to speed up boing i... | 2,906.44 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
length of all the columns if you haven't been folling around or following along that is going to be length of each of these strings okay so now we can do another loop so we'll do this one for x and range and then zero length and let's see we can print the column dat user users is this right so column data offset is goi... | 2,993.68 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
substring the um offset starts at one not zero so we just add one to each of those and that should work right we should get hipsack Please Subscribe yep that works you can see how fast this bulling injection is going it's making like it's guessing each character one at a time is able to go that quickly um I guess we sh... | 3,095.52 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
zero so our programs a little bit better now and let's see I guess we could show getting password hashers real quick so if we go here let's describe users password so if we did the password table or password column we can also get that data and you can see how quick it goes with special characters and all that um there... | 3,213.799 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
so if we do SQL map like this I'm going to give it all the help so we have a valid query here if we didn't do a valid query um it's going to 404 right away and error so I want to make sure the very first request it does is not a404 so I put a valid user here and then even when we run it will error out I'm trying to dum... | 3,284.92 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
so that's why it's just putting in here because if this command succeeds then we know it is indeed myql um if it was a union injection uh it would just use the version Command right because um where is that pain it would just do version because it can read this right but we don't do that in bulling injection because if... | 3,354 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
really think having just the ability to script this out is instrumental right so I guess at the end of the video we can just go over exactly what is doing add a few more comments so let's see let's start with the program um I guess we should do what is it if name is equal to main like that then we can do a try accept s... | 3,413.559 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
exactly what row count was so first off we're going to start um is our Boolean logic good so that's going to be all of this we're just testing is a Boolean logic good can we enumerate what is a success and a fail okay we can so now we're going to um guess the total numbers and you could also do the binary search algori... | 3,510.92 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
saying like and that's going to be the guess I guess I could have put um guess as this so that makes some more sense right and then we raise exception and then um see test if our logic is good for guessing a character substring uh ver from zero for zero always returns null we can move this down here and we can say weir... | 3,599.68 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
thanks for sneak as a sponsor so take care guys and I'll see you all next time | 3,706.039 | 0 | {
"video_id": "mF8Q1FhnU70",
"title": "Automating Boolean SQL Injection and Evading Filters",
"url": "https://www.youtube.com/watch?v=mF8Q1FhnU70"
} |
what's going on YouTube this is ipsec and today we're going to do something a little bit different and that is do a cliffnote version of a stream I did a couple days ago where we created a python application that would take a file disclosure vulnerability and use that to crawl the website and why would you crawl a webs... | 0.24 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
there's a file disclosure vulnerability it's a little bit weird the application accept zip files and inside the zip file there's a PDF it only enforces the extension it can be anything um like any type of text and once you upload it it will allow you to access that file right so let's just walk through this real quick ... | 42.28 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
if I did a-v uh we can see content type there right so that's why my browser isn't displaying it so the vulnerability is you can put a SIM Link in a zip so let's delete everything here and I'm going to create a symbolic link of etsy passwd and I'm going to call it test.pdf if I look at this we have it pointed there now... | 104.759 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
out we're going to do that zip command again but specify Dy so now if I go into out we do the same zip command we see zip is telling us it processed a symbolic link if I do it lsla we can see the symbolic link followed right so now if I upload that new package. zip I think I put it oh no it's in here and then we grab t... | 168.72 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
you can add a Sim link and a zip I'm sure there's a cleaner way to do it but hey it worked right so we have a way to download files one at a time so I do Python 3 fdp ety passwd it works awesome but this is a big pain because we have to just guess at a lot of the files right so if I do like ver dubdub dub HTML index.ph... | 239.92 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
get the document rout which is where your script lies the alternative is a lot of times you can just use the proc self CWD directory right this will also work so we can get proc self CWD and get the file there that's going to be the current working directory of the current process and in websites normally it's going to... | 302.639 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
handy and I created this pone closure on stream and we'll go over the code in a minute but I want to just kind of run it real quick so let's just run it so you can see the benefit and then we do like talking about the code and then and the video so I'm going to run pone closure and it's just going to start downloading ... | 351.72 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
right we just have all the source code at our fingertips even like all the CSS and JavaScript if we wanted it but we could just run the application ourselves if we had um the database up and running right we see the database config here we get the MySQL password but what's really cool when you download this is we just ... | 406.759 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
application because it's just vanilla PHP if it was like lural or python that had like requirements. text it would be able to scan all those um files for vulnerabilities you have some code quality things it's going to point out in like jQuery how we can fix it and make a code a little bit more readable always gives som... | 453.84 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
if I save this if it will automatically find that this file is no longer vulnerable that's the one thing I really like about is once we do it it says oh you fixed that function no more vulnerabilities awesome let's go to like um index.php there's a file inclusion let's fix the path Traverse of vulnerability right so in... | 502.12 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
they called it right so that is um sneak in a nutshell I'd highly recommend checking it out if you haven't seen it before go to snak.io this is a referral link best way to support me is going here signing up to the platform in trying it out I definitely do love it I don't do sponsors here that often so you know I reall... | 562.56 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
disclosure and a zip but a different one I just have to create a function that will perform the file disclosure vulnerability give the output as a text and then I swap this function out and we're good to go it'll start crawling right so I try to make this so we make as minimal changes as possible to adapt it to other w... | 616.76 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
day I just made everything a set so duplicates couldn't be added we declare crawled right up the St start because this is recursive we don't want to crawl the same page twice so whenever we crawl a page we add it to um the set the queue this is going to be all the files we want to download right it's going to start off... | 665.839 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
download file function specifying the full path then we're going to save it and then after that we're going to call get links if you want to look at save all it does is open up output on the directory make the directory and write it nothing fancy there but what the next function is going to do get links this is going t... | 714.839 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
the reason why that one was there is because there was a directory um that would just just say hre equals shop I want to say it was let's go to index. uh PHP here let's just do shop so this link was just pointing us to the shop directory now Apache automically appended index.php for us but because with the file disclos... | 774 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
product.php it pulls it up so that next drag X is going to look for page equals and then the name and because we know the web service appending PHP it's going to um do that for us if it finds a page that doesn't have an extension it's just going to append PHP unlike before where it appended SL index.php this just does. | 837.639 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
PHP because we have the file name and then we return all the links that it found so we called get links now we're going to go through each link if we have a slash on the beginning of the link we're just going to remove it because we don't want it and that could create a lot of duplicates and we can go into some weird L... | 860.199 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
found functions.php so we didn't want to just save functions.php we wanted to save shopf functions.php so that's why we Preen the um directory there if it ends with two periods we just continue because that was a weird case I don't know exactly what happened there but we never want to get to dot dots right we could pro... | 912.36 | 0 | {
"video_id": "WakZS2BhVfs",
"title": "Automating a File Disclosure Vulnerability to Crawl Website Source",
"url": "https://www.youtube.com/watch?v=WakZS2BhVfs"
} |
What's going on YouTube? This is IPSC and we're going to do something a little bit different today and just talk about device code fishing. Starting with this article from Microsoft Thread Intelligence. After this article, I'm going to bring on a friend. We'll go over a presentation we made on device code fishing. A li... | 0.16 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
it, it's essentially um think back when you like set up a Roku, Firest Stick, Nvidia Shield, something hooking up to your TV. You install a bunch of applications like Netflix, Hulu, Amazon Prime Video, things like that. And then instead of typing the password on the remote, it props up a QR code. You enter some digits ... | 43.36 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
So, right here, the article looks like it was updated February 14th, which is about a month ago. They're talking about storm 2372, which is just um Microsoft designations for unknown threat actors. | 80.56 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
They're like new emerging. They believe it is Russia based upon the interest in Tradecraft, but they're not 100% positive. And then Microsoft saying um the fishing lures use Microsoft and other apps to trick users. However, there's no vulnerability in our code. Everything is good. So um it's kind of funny because Micro... | 92 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
Um, right here they're just talking about who Storm 2372 is targeting, which includes government, non-government, in IT services, uh, defense, telecom, uh, health and higher education, energy, oil and gas, Europe, uh, North America, Africa, and Middle East. So, they're targeting quite a bit. And right here, they're tal... | 121.28 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
not exactly protected because the authentication token doesn't have MFA. That being said, when the user clicks on the link, if they're not logged in, they'll have to enter their MFA token. But in this case, thaces don't have to do any like man the middling to extract MFA. MFA doesn't make the attacker's life any worse ... | 175.12 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
chances are the corporation can't monitor it. Right? If I just um spearfish a bunch of users in an organization, the CIS admin can get alerted to that because they can read the email and then know some type of fishing campaign is targeting them. If you do it through out of bands communication, then it can't really see ... | 223.92 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
cloud guru. So I asked my good friend OD. And he sent me some posts that helped clear it up. and he did such a good job explaining and demoing this attack that I figured I'd bring him on to help show all of you. So, welcome OD. Please talk a little bit about the post you had sent me. Sure. So, to understand how device ... | 270.32 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
came out the same day as the Microsoft threat intelligence blog as well. Now on the detection side, we have an amazing article by Lena Laauo Averse Cause on detecting malicious device code fishing. | 313.36 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
um she provides a lot of great information on the defensive side, especially how to detect if the attack has taken place in your tenant. Then also, you know, how you can prevent against it. Finally, we have probably the most well-known article on this specific attack and that is art of device code fish by Bobby Cook. A... | 325.52 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
start the fish. It's no longer starts as an email. They're trying to start over outofband communications such as signal messages as it's harder to monitor and users are immediately suspicious about emails. My most successful techniques is using ad campaigns on services like LinkedIn or Twitter to target companies and g... | 378.08 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
AAD internals PowerShell toolkit, which if you haven't heard of it before, it's an amazing resource on all things pentesting, Azure, M365, and he also has a lot of administration functions built in as well. Yeah. And the important thing to note here is we'll keep saying hack, tools, exploits, and that kind of does it a... | 429.84 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
We're just using OOTH device authorization grants and bending some assumptions to set up a really good pretext to fish users. That's incredibly effective because it beats how we train users to spot fishing attacks. We train users not to look at the URL and this uses the legitimate one by the service provider, in this c... | 453.36 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
probably scanned a QR code with your phone and shared the authentication with it. Other service providers do support this. It's a little bit silly for office suites like Microsoft too, but thankfully it looks like Microsoft may agree as they're starting to make some changes. Yeah. So, some good news as this came up aga... | 498.08 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
So, again, super important when uh for you to go check this out over in your tenant, get a sense of if your users are actually you using this as part of their legitimate workflow. If not, definitely begin to monitor it in report only mode and then ultimately move to to keep it blocked. Yeah, it's really great that Micr... | 542.64 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
right? Because if you go straight to blocking it, chances are um the seauite's going to get blocked and then they'll tell you to revert it immediately. And once you block someone that high up, whenever you try to put that rule back in place, you'll get a lot of resistance and probably not be able to block it again. So,... | 591.839 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
But first, or audit mode, make sure it's not going to impact users and then switch the switch to, um, block it. | 610.8 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
Exactly. So to really drive home the point about how this is you know a legitimate authentication authorization flow we can see that two of the most popular applications that interact with Azure resources have this as an option. Right up top we have the Azure CLI and we have the use device code option for us to authent... | 617.2 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
there and then move over to a secondary device where we'll complete that authentication. So, let's say we're using Azure CLI. We kick it off. It's going to reach out to the device code endpoint and we're going to get a couple of key pieces of information back. The most important for us are the user code and the verific... | 674.079 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
And really that's just where the user goes to enter the user code. So um really only one piece of dynamic information that is the user code. Exactly. So what we're going to do is visit that device loon page. We're going to enter our user code and then we'll complete the authentication process there. Meanwhile, back on ... | 703.76 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
this working. I'm gonna be the victim and Ryan's going to command the attacker's machine and he's going to fish me using device authorization grants. So now, like IPSC mentioned, we can get into how the attack actually works. And what we're going to do, uh, first of all, check what directory in because we want to impor... | 758.959 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
The most important thing for our malicious use case is we can see that we got a new user code. This is what we're going to now copy and take over to our social engineering um fish that we're building. And for our purposes, right, we are going to use this fake kind of teams message. This is a team's invite, but we're go... | 806.16 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
it is. we see an urgent request to join. If we click on this email, it looks very much like a normal team's invite. It's scheduled with a little bit of urgency saying there's a meeting to discuss the MDR to optics um design. And it wants us to join the meeting now. So, let's go ahead and copy the passcode because we kn... | 876.48 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
If like if I'm the user, I'm just thinking, hey, this is to allow access to the meeting. Um, it should probably say like this is going to give the um recipient full access to your account, right? But I'm just going to paste the code because I'm not typing my password. I kind of trust this, right? It's just a Teams meet... | 909.68 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
screen and see the token has been acquired. Yep. Perfect. We can see that uh the authentication flow has finished and we have our token saved in the response var variable. So what we can do is use this parsing function from token tactics v2 and take a look at whose token and we'll get additional details on about this t... | 949.92 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
of all the users in the entry ID environment. And you can see here that we're using that commandlet and we're specifying the access token from the response. That's how we're going to authenticate into our victim tenant, right? Get a ton of information back. We can see people's job titles, their addresses, right? The ad... | 1,008.88 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
We can specify her specifically and get more information about her as a user. So a lot of ability there. But it doesn't end there. He's now going to run the refresh to Outlook token and that's going to give him the ability to start pillaging my Outlook information. So, right now you're seeing he's changed the scope and... | 1,057.76 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
Yep. Exactly. And a great tool to be able to do that is GraphRunner by uh I believe his name is Bo Bullock uh Daft Hack and it's an postX tool used specifically for M365. So, we're going to import this and then use a couple of the modules from his to tool set. But first, what we need to do is get our token into a uh ve... | 1,081.919 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
employee for a long time, their mailbox may be gigabytes big and take a while to download. So um there is another command that enables you to just search mailboxes. It's invoke search mailbox and allows you to specify a search term. | 1,137.28 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
He's going to use the search term credential. And now it's going to search all my emails for a phrase called credential. It finds the one that he's looking for with temporary credentials. So he could potentially access the developer environment from there. And if he wanted to, he could save the email. | 1,150.24 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
He's just going to do no. And it doesn't end there, right? We've shown a lot of the command line stuff, but if we want to, we can convert this token into one that a web browser likes, and that's going to enable us to um access like Office in a way that's familiar to most users. We can see OD is putting out the refresh ... | 1,163.12 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
message. It's going to look like the attack didn't work, but you'll see he's just going to refresh and magically he'll be let in. So there he goes sending the request. There's the redirect. And now take it away, OD. | 1,208.559 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
Yep. Exactly as you just explained it. So, we're expecting that 302 error. So, what we're going to do is rightclick, open a browser, copy there, and then we'll head on over to our browser. Make sure we click the incognito one. We will enter that in there. We're going to get redirected. This is what we're expecting. So,... | 1,220.24 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
anything else we need to do from here. Yeah. And we're fully logged in as a user. We don't even have to keep using emails. We could switch over to something like teams and just send messages. Now, if he just goes to teams from this window, it's not going to work. You'd have to do some more token tactics type stuff to g... | 1,271.12 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
what it looks like from a defender perspective. Because as scary as this is, it's something that's easy to detect because device authorizations probably aren't happening your organization. So, everyone you see is suspicious. It's relatively easy to filter by. And yeah, let's just go pivot and look at what it looks like... | 1,312.24 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
That's going to be add-ins and things like that, but signin logs is the easiest and it's available to everyone. So, it's a natural place to start. We're going to create a filter for the authentication protocol of a device code and that's going to show us all authentications that are device code login. So, we click on a... | 1,336.24 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
Hopefully, you see zero when you do this. Uh we have quite a few because we've been doing this demo for a while. But we can see the applications Microsoft Office. And if it's a legit one, it probably won't be Office. It'll be something more scary like Azure CLI because I don't think there's any way for users to initiat... | 1,356.08 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
So of course it is device code but this becomes important when we go to the non-interactive signins because we did a lot more authentications in our attack. We use that um token tactics to refresh a token and change its form. Right? So we're going to create a filter for original transfer method and then specify device ... | 1,392.4 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
I think it's set to none whenever you do like refresh tokens, things like that. I'm not 100% positive what all these fields mean. The Vexity article we talked about earlier does a great job talking about that, but I'm going to kick it over to OD. He's going to go into Sentinel and talk a little bit more about the advan... | 1,434 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
device code authentication fishing attack. We think it's for the uh check my signin, which was that little popup page that shows like, hey, are you trying to sign in to Microsoft Office? And then you select yes. So definitely something to check out during our testing. It was um pretty pretty useful for that as well. An... | 1,482.08 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
unmanaged devices from accessing your tenant. So now for additional kind of indicators and for hunting purposes, right? We can check if we have these email events enabled in our seam in our defender portal, we can look for any of those verification URLs, if they've been sent in any emails in our tenant. What you can se... | 1,532.159 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
that this might have taken place in your tenant. And this is just a really good way to keep tabs on emails of your users without actually uh violating the integrity or confidentiality of the email, right? Because we're not reading the contents of the email. We're just reading the subject and the recipient sender and th... | 1,588.4 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
where we can make a conditional access policy to block this device code flow. So let's pretend to set one up and go over what that might look like. So first, as best practice, what we probably want to do is select all users. | 1,638.24 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
Now, this is important because even if we find instances of our users employing this legitimately in our tenant, say we have developers that need to use this, we can make a targeted exclusion rule, put them in a group. That's best practice, right? I don't have even a group right here, but um we can put them in a group ... | 1,651.279 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
Limeire, and torren for my network. But now over time we decided, you know what, block lists aren't really that good. We switched to an allow list where we just block everything at first and then allow what we want. So we're going to block everything and then let's allow um HTTP through because that's what users need. ... | 1,697.36 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
Again, I would rather be on the safer side here. I can't necessarily think of an instance. You could also lock this down further again if you have legitimate users. um and you can like filter them to that specific application that they need. Now, probably the most important part is if we go down to the conditions tab a... | 1,719.84 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
and one of the new things Microsoft has put here we it in preview mode right now is that view policy impact. That's going to take a approach where we can see the um hypothetical um standpoint over the last seven days. So we can see how effective this policy would have been. And of course before enabling the policy, we ... | 1,775.2 | 0 | {
"video_id": "Y8SSYLEq15Q",
"title": "Device Code Login Phishing Presentation Attack, Detect, Mitigate",
"url": "https://www.youtube.com/watch?v=Y8SSYLEq15Q"
} |
What's going on YouTube? This is IPSC and this is the start of a video series I wish existed when I was getting started with Golang. In this video, we're going to write a very basic Golang program to perform Boolean LDAP injection and exfiltrate a password. It likely will take around 40 seconds to get that one password... | 0.16 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
guides use gimmicky programs talking about Dragon Ball Z characters, mountain climbers, etc. So, while this series may be longer than um what you expected, hopefully it brings a bit more to the table because it's going to be exactly what you want. But before we get into programming, let's go over the basics of LDAP inj... | 42.8 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
play along, feel free. Um, the first thing we get is this internet.go.htb login portal. And if we do like admin admin, we'll get invalid combination username and secret saying that's an invalid password. Now if we just use the wild card and LDAP which is a star it performs the LDAP injection and we get logged in. The u... | 89.04 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
because you can ask the database questions, right? So we're going to take this account and then go over to Burpswuite where I already have the um request put out. And if we send this request with username and secret as star, we get a 303 C other and in the body it's just open and closed brackets. If we put something el... | 143.2 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
we'll test that when the time comes. Now, I like testing for case sensitivity when we're doing these boolean injections because that eliminates having to do both lowerase and uppercase, which is like 26 requests that we just no longer have to do, which is nice. The other thing I want to test for is how wild cards are b... | 196.879 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
Wild cards have multiple like definitions, I guess. Like there's theall, which means the wild card will match every character, including special. You can have it just match new lines, everything but new lines. there's other multiple behaviors, right? And we care about that because we're going to want to do something ca... | 215.2 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
of line. Maybe I should do like b. I don't know what that like terminology is. But that way the wild card will match this. Then it matches the beginning of line or string I guess I should say. And now we're left with SAR which matches this. Right? So we can test for that by just putting a wild card at the end of this. ... | 265.6 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
also not case sensitive. So the next thing we want to do is find characters in a password. So we can do a star A and that's invalid combination. B um star B star invalid combination and go all the way until we get it. So there is a C in this password. So that is how we can do um the character set um pruning that we'll ... | 320.32 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
other languages. And if this was no SQL, then we would use like regular expression and that would allow us to do binary search by um asking questions that eliminate half. If it was SQL, we could probably either do reg x. We could convert a character over to hex and saves it greater than or less than and do binary searc... | 379.84 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
So the next question you would ask is the password N through T? Yes. So we would eliminate the second half, right? And then we just keep going down the list. Is the password N through P? | 423.199 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
Nope. Then it must be um is it Q or R? No, it's S or T. Then you ask, hey, is it S? No, it's T. And that would be binary search. So instead of guessing the whole alphabet, we take that um 26 characters, I think, to 1 2 3 4 5 six. So it makes a lot less requests, but that's not something we can do. If you want to see th... | 437.759 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
Open the file main.go. And we're going to do package main. And then we're going to do funk main. And we're just going to make sure a go environment works by doing a print string. So do print length of hello world or print line, not length. And now let's do a go run dot. | 499.84 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
And we get hello world. So our computer is running go. Awesome. Now, the first step into automating this is being able to replicate what we did over in Burpsweet. So, we just want to be able to make this request. So, I'm going to create a um strct or class or object. I don't know the correct terminology. It's not reall... | 519.12 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
from the object itself or class or whatever this is. So, let's instantiate it. And we could instantiate it with like C is equal to LDAP injector and then specify variables. But this isn't really the Golang way. Right now it works because we don't have defaults. We don't have a functional option pattern things like that... | 568.399 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
So I'm going to do C is equal to new LDAP injector. The URL is going to be HTTP um internet.go.htbport 808 and login. And then the username, this is just going to be um gett temp principle. There we go. So now that that's done, we can create the first method of this um strct. So we'll do funk and then li for lap inject... | 604.08 | 0 | {
"video_id": "uJFW4c4QE0U",
"title": "Golang For Hackers: LDAP Injector - Episode 01",
"url": "https://www.youtube.com/watch?v=uJFW4c4QE0U"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.