filmov
tv
GreHack 2021 - Optimizing Server Side Template Injections payloads for jinja2 (EN)

Показать описание
When attacking Python-based web applications, we often need to find a way to execute commands on the server and escape from the application context. In order to get access to the underlying Python backend of a web application, an attacker can exploit common vulnerabilities such as Server Side Template Injection (SSTI) or Code Injections (CI) but how can we escape from this context?
In this talk, we will deep dive into the template engine jinja2 in order to create the shortest payloads to access the os module from within a template!
#Pentesting #Python #jinja2
In this talk, we will deep dive into the template engine jinja2 in order to create the shortest payloads to access the os module from within a template!
#Pentesting #Python #jinja2
GreHack 2021: Optimizing Server Side Template Injection Payloads for jinja2 - Remi Gascou
GreHack 2021 - Optimizing Server Side Template Injections payloads for jinja2 (EN)
Optimizing Server Side Template Injection Payloads for jinja2 Remi Gascou
ESCALATING SSTI TO RCE IN FLASK APPLICATION
GreHack 2021: Rooting Samsung Q60T Smart TV - Jérémie Boutoille and Vincent Fargues
Find and Exploit Server-Side Template Injection (SSTI)
Server Side Template Injection (SSTI)
SSTI (Server Side Template Injection)
web hacking: python Jinja2 SSTI vulnerability and code execution
GreHack 2021: Windows kernel snapshot based fuzzing the good, the bad and the ugly - Damien Aumaitre
Server-Side Template Injection (SSTI) Flask/Jinja
SSTI reverse shell PUG node js
USENIX Security '21 - Dynamic proofs of retrievability with low server storage
{{SSTI}} From Developing Side
SSTI for Bug Bounty | Server-Side Template Injection
Command Injection Exploitation - Reverse Shell Access | Decrypt3r
Exploring Python SSTI Payloads - Bolt Beyond Root [HackTheBox]
SSTI: Server Side Template Injection | Remote Code Execution | Reverse Connection | TPLMAP
#2 Exploits modernos de binários -ROP e Ret2Libc
Vulnerability SSTI lead to RCE pada Flask
RomHack 2019 - Le Toux - How to impress your management when you are an Active Directory noob?
Fuzzing in Go by Valentin Deleplace
Template Injection Workshop: Twig, Jinja, Freemaker and more
#HITB2021AMS D2T2 - Binary Fuzzing With Snapshot-Assisted-Driven Comparison Branch Analysis - K. Son
Комментарии