Загрузка страницы

A $7.500 BUG BOUNTY Bug explained, step by step. (BLIND XXE OOB over DNS) - REDUX

Have you ever wondered what a $7.500 Bug Bounty bug looks like?
In this "re-upload" of the original video created in 2019, il walk you through a theoretical "BLIND XXE OOB over DNS" bug on a super-hardened target and explain the ideas around how to exploit it.
The tool used in this video to create the initial XML/PDF payload is Tobias 'floyd' Ospelt amazing burp plugin "Upload Scanner" I absolutely recommend that you use it for all your file upload automation needs.

https://twitter.com/floyd_ch
https://github.com/portswigger/upload-scanner

Owasp XXE
https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing

Out of band entity XXE explained
https://www.acunetix.com/blog/articles/band-xml-external-entity-oob-xxe/

Burp collaborator
https://portswigger.net/burp/documentation/collaborator

Exploiting XXE with local DTD files
https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/

-------------- -- --
Support my work:
Join me on Patreon! https://www.patreon.com/stokfredrik

Need a shell to hack from? setup your own droplet today!
Get $100 credit on Digital Ocean using this link
https://m.do.co/c/5884b0601466
-------------- -- --
FAQ:

What gear do you use? :
Check out https://www.stokfredrik.com

Dude, I love what you do can we do "work stuff" together?
Sure, Email me at workwith @ stokfredrik.com

Видео A $7.500 BUG BOUNTY Bug explained, step by step. (BLIND XXE OOB over DNS) - REDUX канала STÖK
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
23 марта 2020 г. 21:57:04
00:07:36
Яндекс.Метрика