GOAD-Light OSCP Series: 2024 Exploit development using Python and Pwntools

preview_player
Показать описание
This is an extension of the part 3 video.

I will show you the process on how I create the one click exploit for the file upload vulnerability in castle black.

This is a basic exploit only and although this was originally intended for people starting with ethical hacking, others will find this valuable as well.

// Tags

#oscp #ethicalhacking #activedirectory #windows #fileupload #asp

// Chapters

0:00 - Intro
0:44 - Python basics and interacting with web services
2:59 - Investigating failed request using Burp
3:40 - What is multipart/form-data?
4:55 - ASP view state
5:09 - HTTP Sessions
6:24 - Searching through HTML via python RE module
7:32 - Catching reverse shell via PWNTools
8:38 - TROUBLESHOOTING TIP
9:38 - Windows CRLF again!
10:26 - Threads, thread, threads everywhere ...
10:50 - Creating a multi-threaded program

// Links

None for now sorry.
Рекомендации по теме
Комментарии
Автор

Being a good exploit developer means asking different questions. Like what will happen if I press the like button on the video above?

hacktheclown
Автор

Looking forward to the next one. This was invaluable, watching you troubleshoot your script and explain the thought process.

sdp
Автор

This episode is beyond me man, very impressive work. You should make a discord server for like minded individuals.

borissanra
Автор

just saw this on reddit. god damn this is some good stuff

Demoman_loves_scrumpy
Автор

I really enjoyed this one especially showing the errors and troubleshhoting them. I am wondering, did you have any sources for learning this python stuff or did you pick it up naturally from devops and documentation ?

Xorriath
visit shbcf.ru