video thumbnail 21:48
Crazy JSP Web Shell to Exploit Tomcat - Real World CTF 2022

2022-02-24

[public] 7.09K views, 3.86K likes, dislikes audio only

channel thumbLiveOverflow

This was a hard web CTF challenge involving a JSP file upload with very restricted character sets. We had to use the Expression Language (EL) to construct useful primitives and upload an ascii-only .jar file.

Alternative writeups: https://github.com/voidfyoo/rwctf-4th-desperate-cat/tree/main/writeup

Fuzzing log4j with Jazzer: /youtube/video/kvREvOvSWt4

-=[ ā¤ļø Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ• Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Instagram: https://instagram.com/LiveOverflow/

→ Blog: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/


Fuzzing Java to Find Log4j Vulnerability - CVE-2021-45046 by LiveOverflow
/youtube/video/kvREvOvSWt4
I’m moving, no videos sorry 17,538 views
/youtube/video/9CS3q0uG1LI
Support liveoverflow.com
https://liveoverflow.com/support
Sudo Vulnerability Walkthrough by LiveOverflow
/youtube/video/TLa2VqcGGEQ