Channels lising page

All videos archived of PwnFunction
How Can A Line Predict Future?

jIfxXzjpmSc | 09 Feb 2024

How Can A Line Predict Future?

Animated guide to linear regression. First episode of AI series. 🐢 Snyk is free forever. Sign up with my link https://snyk.co/pwnfunction ⭐ GitHub: https://github.com/PwnFunction/linear-regression 🐀 X: https://twitter.com/PwnFunction 🧰 Tools used are: https://tools.pwnfunction.com/ 🎡 Track: STRLGHT - Destination

Why You Shouldn't Trust Computer Generated Random Numbers

-h_rj2-HP2E | 14 Jul 2022

Why You Shouldn't Trust Computer Generated Random Numbers

In this episode we'll break the Math.random method in JavaScript with z3. 🐢 Snyk is free forever. Sign up with my link https://snyk.co/pwnfunction ⭐ Randomness Predictor: https://github.com/PwnFunction/v8-randomness-predictor ⭐ Z3 Challenges: https://github.com/PwnFunction/learn-z3 ✨ Info ➜ Tools used are: https://tools.pwnfunction.com/ ➜ Video Production time(Research to Output): 100-ish hours. ➜ About 2L of Almond milk & 3.5L of Gatorade were consumed during the video creation. πŸ’¬ Discord: https://discord.gg/6KKQHvgJwv 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Lost Sky - Dreams NCS link: https://www.youtube.com/watch?v=SHFTHDncw0g

Dangerous code hidden in plain sight for 12 years

eTcVLqKpZJc | 08 Apr 2022

Dangerous code hidden in plain sight for 12 years

In this episode we'll explore a local privilege escalation vulnerability in polkit's pkexec. 🐢 Snyk is free forever. Sign up with my link https://snyk.co/pwnfunction ⭐ Code + All Resources: https://github.com/PwnFunction/CVE-2021-4034 ✨ Info ➜ Tools used are: Adobe Animate, Adobe Premiere Pro, Adobe Illustrator & Adobe Auditions. ➜ VSCode: Monokai Pro Theme, Jetbrains Mono Font, SF Mono Font. ➜ Video Production time: 80-ish hours. ➜ About 2.5L of Almond milk were consumed during the video creation. πŸ’¬ Discord: https://discord.gg/6KKQHvgJwv 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Lost Sky - Dreams NCS link: https://www.youtube.com/watch?v=SHFTHDncw0g

How hackers pollute your code.

XS_UMqQalLI | 13 Dec 2021

How hackers pollute your code.

In this episode we'll explore Javascript Prototype Pollution. 🐢 Snyk is free forever. Sign up with my link https://snyk.co/pwnfunction ⭐ Code + All Resources: https://github.com/PwnFunction/Next.js-Flat-Prototype-Pollution πŸ”— Prototype Pollution in flat: https://security.snyk.io/vuln/SNYK-JS-FLAT-596927 ✨ Info ➜ Tools used are: Adobe Animate, Adobe Premiere Pro, Adobe Illustrator & Audacity. ➜ VSCode: Monokai Pro Theme, Dank Mono Font. ➜ Video Production time: 100-ish hours. ➜ 6 Redbulls were consumed. πŸ’¬ Discord: https://discord.gg/6KKQHvgJwv 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Lost Sky - Dreams NCS link: https://www.youtube.com/watch?v=SHFTHDncw0g

How GitLab was Hacked by making random HTTP requests | SSRF

RCJdPiogUIk | 05 Oct 2021

How GitLab was Hacked by making random HTTP requests | SSRF

In this episode we'll explore the world of SSRFs. ⭐ LiveOverflow Blog Post + Instructions: https://liveoverflow.com/gitlab-11-4-7-remote-code-execution-real-world-ctf-2018/ ✨ Info ➜ Tools used are: Adobe Animate, Adobe Premiere Pro, Adobe Illustrator & Audacity. ➜ VSCode: Monokai Pro Theme, Dank Mono Font. ➜ Video Production time: 60-ish hours. ➜ 6 Gatorades were consumed. πŸ’¬ Discord: https://discord.gg/6KKQHvgJwv 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Lost Sky - Dreams NCS link: https://www.youtube.com/watch?v=SHFTHDncw0g

This Website has No Code or Does It?

msdymgkhePo | 04 Jun 2021

This Website has No Code or Does It?

In this episode we'll explore the world of HTTP and CSS to hide some code. ⭐ Code: https://github.com/PwnFunction/Blank-Rick-Roll ✨ Info ➜ Tools used are: Adobe Animate, Adobe Premiere Pro, Adobe Illustrator & Audacity. ➜ VSCode: Monokai Pro Theme, Dank Mono Font. ➜ Video Production time: 40-ish hours. ➜ 4 Redbulls were consumed. πŸ’¬ Discord: https://discord.gg/6KKQHvgJwv 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Lost Sky - Dreams NCS link: https://www.youtube.com/watch?v=SHFTHDncw0g

Why you should Close Your Files | bin 0x02

6SA6S9Ca5-U | 23 Apr 2021

Why you should Close Your Files | bin 0x02

#BinaryExploitation #FileDescriptor #Attack In this video, we're gonna look at how one can abuse file descriptors in some cases to get access to "sensitive" documents. πŸ”— Code + Build Instructions: https://hackercamp.co/ πŸ”— Original Blog: https://www.sektioneins.de/en/blog/15-07-07-dyld_print_to_file_lpe.html πŸ’¬ Discord: https://discord.gg/6KKQHvgJwv 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

How some functions can be Dangerous | bin 0x01

EJtUW2AklVs | 01 Apr 2021

How some functions can be Dangerous | bin 0x01

#BinaryExploitation #ELF #Executables This is the second video in the series Binary Exploitation. In this video, we're gonna look at some simple attacks via dangerous functions. πŸ”— Code + Build Instructions: https://hackercamp.co/ πŸ’¬ Discord: https://discord.gg/6KKQHvgJwv 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

What are Executables? | bin 0x00

WnqOhgI_8wA | 12 Mar 2021

What are Executables? | bin 0x00

#BinaryExploitation #ELF #Executables This video is an introduction to ELF Executables in Linux. Also it's the first video of a new series called Binary Exploitation. πŸ’¬ Discord: https://discord.gg/6KKQHvgJwv πŸ‘¨β€πŸ’» HackerCamp: https://hackercamp.co 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

Insecure Deserialization Attack Explained

jwzeJU_62IQ | 24 Jan 2021

Insecure Deserialization Attack Explained

#Deserialization #WebSecurity We'll explore the basic concepts of an Insecure Deserialization by attacking a web app written in Python. 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

Server-Side Template Injections Explained

SN6EVIG4c-0 | 27 Nov 2020

Server-Side Template Injections Explained

#SSTI #WebSecurity This video explores the world of Server-Side Template Injections (SSTI), primarily we'll look at Python with Flask framework as an example, but the core ideas explained in the video is applicable to wide set of Languages and Frameworks. Original Research: https://portswigger.net/research/server-side-template-injection 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

Cross-Site Scripting (XSS) Explained

EoaDgUgS6QA | 22 Mar 2020

Cross-Site Scripting (XSS) Explained

#XSS #WebSecurity This time we are going to explore the world of Cross Site Scripting under 12 minutes. πŸ”— Links ✨ XSS Game: https://xss.pwnfunction.com/ Custom Twitch Chat XSS: https://www.youtube.com/watch?v=2GtbY1XWGlQ 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

Abusing iframes to Steal Cookies - Google CTF

2up8J9dErHI | 03 Sep 2019

Abusing iframes to Steal Cookies - Google CTF

#WebSecurity #Google #CTF A video writeup on one of the web challenges from the recent Google CTF 2019. πŸ‘¨β€πŸ’» SPONSORED BY INTIGRITI – https://www.intigriti.com/ πŸ”— Links β€’ Google CTF: https://capturetheflag.withgoogle.com β€’ LiveOverflow Paste-tastic! Stream: https://www.youtube.com/watch?v=zjriIehgAec β€’ LiveOverflow's channel: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w β€’ LiveOverflow - Filemanager: https://www.youtube.com/watch?v=HcrQy0C-hEA 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw P.S. Sorry for my audio quality :(

XXE Challenge - Google CTF

0fdpFQXWVu4 | 07 Jul 2019

XXE Challenge - Google CTF

#WebSecurity #XXE #Google #CTF A video writeup on one of the web challenges from the recent Google CTF 2019. πŸ‘¨β€πŸ’» SPONSORED BY INTIGRITI – intigriti.com πŸ”— Links β€’ Google CTF: https://capturetheflag.withgoogle.com β€’ Insomnia: http://insomnia.rest β€’ XXE video Explanation: https://www.youtube.com/watch?v=gjm6VHZa_8s β€’ Beeceptor: https://beeceptor.com/ πŸ”₯ Exploiting XXE with local DTD files: https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/ 🐀 Twitter: https://twitter.com/PwnFunction 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

Cross-Site Request Forgery (CSRF) Explained

eWEgUcHPle0 | 05 Apr 2019

Cross-Site Request Forgery (CSRF) Explained

#WebSecurity #CSRF A video explaining CSRF and some different types of attacks. πŸ”— CSRF to RCE : https://github.com/zadam/trilium/issues/455 SPONSORED BY INTIGRITI – intigriti.com Sorry for the late upload, was busy with other stuff. 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

XML External Entities (XXE) Explained

gjm6VHZa_8s | 28 Feb 2019

XML External Entities (XXE) Explained

#WebSecurity #XXE A video on Exploiting XML parsers, specifically on XML External Entity attacks. πŸ”— Links John's channel : https://www.youtube.com/user/RootOfTheNull Stok's video on OOB XXE via file uploads : https://www.youtube.com/watch?v=aSiIHKeN3ys Ippsec's Fulcrum walkthrough : https://www.youtube.com/watch?v=46RJxJ-Fm0Y Nicolas GrΓ©goire's works : https://www.agarri.fr/en/ Exploiting XXE with local DTD files : https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/ SPONSORED BY INTIGRITI – intigriti.com 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw #WebSecurity #XXE #CTF

Insecure Direct Object Reference (IDOR) Explained

rloqMGcPMkI | 12 Feb 2019

Insecure Direct Object Reference (IDOR) Explained

#WebSecurity #IDOR A video on how Insecure Direct Object References can affect a web application. SPONSORED BY INTIGRITI – intigriti.com 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

Hacking Electron Applications

jkJWA_CWrQs | 03 Feb 2019

Hacking Electron Applications

#WebSecurity #ElectronJs #RCE A video on the finding Remote Code Execution (RCE) on Electron Js Applications SPONSORED BY INTIGRITI – intigriti.com 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

HTTP Parameter Pollution Explained

QVZBl8yxVX0 | 28 Jan 2019

HTTP Parameter Pollution Explained

#WebSecurity #CTF #HTTPParameterPollution How HTTP parameter parsing could mess things up. SPONSORED BY INTIGRITI – intigriti.com 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw

Open Redirect Vulnerability Explained

4Jk_I-cw4WE | 20 Jan 2019

Open Redirect Vulnerability Explained

#WebSecurity #OpenRedirect 😊 First video A quickie on Open Redirects. SPONSORED BY INTIGRITI – intigriti.com 🎡 Track: Warriyo - Mortals (feat. Laura Brehm) NCS link: https://www.youtube.com/watch?v=yJg-Y5byMMw