Mira – Telegram
Mira
748 subscribers
817 photos
25 videos
20 files
267 links
sporadic attempts at life.
personal channel

files: @mira_files
playlist: @the_coding_playlist
Download Telegram
For my final yapping session, I noticed that Zoomie used handlebars as a templating engine. Lately, I was checking the Server Side Template Injection (SSTI) vulnerability. So... The concept of Server-Side Template Injection (SSTI) was first publicly introduced by PortSwigger researchers in 2015. It is basically when user input is unsafely embedded into server-side templates. These templates are used by web applications to generate dynamic content by combining user data with predefined structures. For example,

Hello {{ username }}


If 'username' contains an expression that's evaluated (say something like {{3*5}}), it will lead to a malicious code execution. Every server side language has its own template engine like for PHP: Smarty, Twig and for Python: Jinja2, Mako and for Java: Freemarker, Velocity. I personally used pug in node js for other projects and handlebars for zoomie. If a site uses a template engine, you can determine its type by running the following payload:

Jinja2 (Python Flask/Django): {{ 7*7 }}  
Freemarker (Java): ${7*7}
Velocity (Java): #set($a = 7*7)${a}
Thymeleaf (Java): ${7*7}
Twig (PHP Symfony): {{ 7*7 }}
Smarty (PHP): {$7*7}
Mako (Python): <% print 7*7 %>


The exploitation flow goes like: inject crafted payloads into vulnerable fields, and execute arbitrary commands or access sensitive server data, and then escalate privileges for full server control. Let us say for example the site uses Jinja2. If you get a response by running the identification payload, you can then execute commands like whoami on the server.

{{self._TemplateReference__context.cycler.__init__.__globals__.os.popen('whoami').read()}}


You can basically run commands you want directly on the server. This shit has medium or high severity impact since it leads to RCE and stuff. You can just avoid this by validating the user input at the first place.
can't relate with bros today
4
🤣17
feeling drained
unusual on Saturdays.
8😁3
Elementary school was wild man
I remembered a vivid memory where a grown ass adult guest telling us the difference between email and gmail was that we use electric to send emails and generator to send gmails. Bro should've been sentenced for life
🤣34🔥2
this random lady greeted me in a taxi.
confidence++
😁9🔥73
sup chat
🔥6🥰1👀1
Mira
The expectations of others were the bars I used for my own cage.
I would sacrifice pieces of my flesh, but I'd still be considered selfish for keeping my bones

#stolenpfp
💯42
> creates a private music channel so that no one knows the cringe songs i listen to
> *looks back*
> 10 views
👀7👍1🤣1
Mira
cringe songs
want access ?
Miki said they are smh good. not top tier taste like @Su_ch_is_life or any of the peeps who are into Art, but they pass the vibe check for a casual listen while doing some chores. here goes:

https://news.1rj.ru/str/+CmBzrluJ4fExMDRk
🔥6
Mira
Kinda pausing all my cybersec activities for 7 weeks.
okay
it kinda feels empty without cybersec and coding. the break was meant to take care of my personal stuff, but I am managing to get some time off. so, I am gonna dive into cloud computing to pass the boredom. I am messing around to get a linux server from oracle cloud currently. will keep you updated
41😁1
If she handles your autistic ass and adhd, she a ten
💯10😁4
in a tribute to brookmg, one of the android chad

https://github.com/brookmg?tab=overview&from=2016-10-01
😁8
Mira
hmm... gonna check this https://www.mygreatlearning.com/cloud-computing/free-courses?p=2 #resources
if your intention is to be a cloud engineer or some sorta cloud specialization, the major providers have free academy dedicated to their vendor (like AWS educate) and that often comes with good free cloud resource tier.

but I am learning cloud computing to automate some stuff which can be useful later on. first had the idea from one of the Stok's interview on bug bounty. he basically conducts parallel network scans using Nmap on the cloud, by spinning up multiple VMs or droplets on a service like DigitalOcean with its own unique IP address so that he can run five parallel Nmap scans by giving five different IPs to each of his droplets. for example, if Stok was targeting a website hosted on the West Coast of the United States, he could deploy a droplet in a nearby data center and use the other droplets for different targets. this is distributed traffic and helps in reducing latency and avoiding detection by firewalls and IPS. so this is basically scanning at scale with minimized noise on a target. practically, this has challenges especially given that our instability in internet speed (writing this while my connection is being throttled lmao). plus, misconfiguration and multi-tenant issue might pose a risk for critical scans. generally speaking tho, cloud skills are a must
👌4