video thumbnail 10:21
Failed DOM Clobbering Research - All The Little Things 1/2 (web) Google CTF 2020

2020-09-28

[public] 23.8K views, 1.29K likes, 9.00 dislikes audio only

channel thumbLiveOverflow

All The Little Things was a pretty hard web challenge from the Google CTF 2020. In this video we do some initial recon and research and try to find an angle to attack. Part 1/2.

Challenge: https://capturetheflag.withgoogle.com/challenges/web-littlethings

Pasteurize: /youtube/video/Tw7ucd2lKBk

00:00 - Intro

00:50 - Functionality Overview

01:29 - HTML Injection

02:25 - Making a Plan

02:50 - theme.js Discovering JSONP Endpoint

03:51 - user.js The User Class

04:23 - utils.js Start of Chain

04:44 - No Ideas...

05:07 - DOM Clobbering: window.load_debug

06:05 - Doing Security Research

07:25 - Anything else to clobber?

07:49 - Start from beginning, discover __debug__

08:10 - The load_debug() function

09:20 - window.name is special

09:41 - Try it yourself!

10:00 - Outro

-=[ ā¤ļø Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ• Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Website: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ šŸ“„ P.S. ]=-


XSS a Paste Service - Pasteurize (web) Google CTF 2020 by LiveOverflow
/youtube/video/Tw7ucd2lKBk
Script Gadgets! Google Docs XSS Vulnerability Walkthrough by LiveOverflow
/youtube/video/aCexqB9qi70
Intro
/youtube/video/dZXaQKEE3A8?t=0
Functionality Overview
/youtube/video/dZXaQKEE3A8?t=50
HTML Injection
/youtube/video/dZXaQKEE3A8?t=89
Making a Plan
/youtube/video/dZXaQKEE3A8?t=145
theme.js Discovering JSONP Endpoint
/youtube/video/dZXaQKEE3A8?t=170
user.js The User Class
/youtube/video/dZXaQKEE3A8?t=231
utils.js Start of Chain
/youtube/video/dZXaQKEE3A8?t=263
No Ideas...
/youtube/video/dZXaQKEE3A8?t=284
DOM Clobbering: window.load_debug
/youtube/video/dZXaQKEE3A8?t=307
Doing Security Research
/youtube/video/dZXaQKEE3A8?t=365
Anything else to clobber?
/youtube/video/dZXaQKEE3A8?t=445
Start from beginning, discover __debug__
/youtube/video/dZXaQKEE3A8?t=469
The load_debug() function
/youtube/video/dZXaQKEE3A8?t=490
window.name is special
/youtube/video/dZXaQKEE3A8?t=560
Try it yourself!
/youtube/video/dZXaQKEE3A8?t=581
Outro
/youtube/video/dZXaQKEE3A8?t=600
LiveOverflow just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ā¤ļø Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ šŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany
/youtube/channel/UClcE-kVhqyiHCcjYwcpfj9w
I’m moving, no videos sorry 17,549 views
/youtube/video/9CS3q0uG1LI
Patreon patreon.com
https://www.patreon.com/join/liveoverflow
CTF video write-ups by LiveOverflow
/youtube/video/MpeaSNERwQA