ZillyGurke – Minecraft Anarchy How to Shot Web: Web and mobile hacking in 2015

Video Information

Welcome back to another advertisement episode for laser cutland it’s reachable under lga.silicon.com and it’s a anarchy vanilla server and yeah if you’re interested about more details what the server is and so on just watch any other video on this channel i usually take quite some time explaining what the server is and

And and stuff but i don’t feel like right now so just watch any other video and i’m going to play back a talk um from the deathcon conference now um it’s a youtube video from 2015. it’s uploaded on the general defcon conference and it has the title defcon

23 jason headaches oh that name sounds unfamiliar maybe i know the talk already oh it’s been lying in my watch later playlist since forever and i feel like familiar with it already i don’t know um jason headache’s uh how to shot web web and mobile hacking in 2015.

I i didn’t know that there was like weapon mobile already in 2015. well yeah sure uh i mean the web was there for sure and mobile is when did mobile start when when did it became like a mainstream thing was it like 2015 i think it was already prior to 2010 right

I mean yeah i don’t know um it like for me smartphones uh still so like such a new thing um boy i’m getting old um i don’t know um yeah so if you’re interested in the talk um make sure to check out the original and if you’re interested in this minecraft

Server where you can play anarchy in vanilla the latest version then uh check out lgl.edum.com there are not many players but that’s um yeah that could also be seen as an advantage so nobody will bother you okay cool let’s get started and we’re going to watch the talk

Better web hacking and mobile hacking in 2015 i know you’re talking right now so i really appreciate everyone being here he’s way smarter than me so uh this is me i work for bug crowd i’m the director of technical operations uh i manage a team of hackers who

Validates the bugs behind the scenes of bug brownie large scale bug bounty program in 2014 i participated as only a researcher i didn’t work for them yet and this talk is about my methodology that i used there to do web hacking as well as a little bit of mobile stuff

As well as stuff i learned from other researchers while doing this work so what is this really about it’s just how to hack stuff better and practically um and i put a lot of memes and some of them are not funny apparently my wife says so it’s okay um

So more specifically what i did is i started off with my methodology which was the normal pen tester methodology when i started doing this work you know basic web application assessment and um so i then went out and manually parsed out all of the public researchers of all the

Bad ass club bounty hunters i knew so there’s about 150 people that i knew just around the twitter twitter scene that’s interesting sorry twitter scene as well as people i just knew who were good at it right and so i went through every single article they had ever written from um

From the beginning of the uh crowdsourced bug bounty scene um and also all of the google and facebook programs that i could find like you know enterprise based bhagani stuff and i created a presentation around what i distilled around that knowledge so this is uh kind of the stuff that i’m going to

Bring in this presentation philosophy shifts from doing bug bounty testing to you know from web app testing you know traditional web app testing uh discovery techniques mapping methodology parameters often attacked useful fuzz strings bypass or filter of asian techniques and um some tooling that i think is cooler than other tooling

Cool so the first section is philosophy so the difference is between kind of bug bounty hunting and being a web pen tester you know i’m not really to argue this debate there’s a lot of people who feel strongly about both sides when they’re both right honestly

Um but but when you get down to the practical work you introduce a lot of stuff here you introduce uh time on to a security tester right they’re they’re not used to competition when they’re doing this kind of stuff unless you’re playing in a ctf which you know you’re used to that i

Played in some ctf so i was kind of used to it um you know you’re only you’re only incentivizing in one side for what you what you find and not the hours you put in so i mean this is a basic overview of how they differ but that talks more

About the technical stuff but um but yeah you you basically tailor your methodology based around finding stuff in the 20 as opposed to the 80 across application assessment so we’ll go into how that 80 20 rule kind of fits in the rest of the slides so if you’re doing regular web app

Assessment you’re following these two bibles right the oauth testers guide or the web application hackers handbook this is usually what you’re trained from and what your internal methodologies are built off of that almost any of the good consultancies and the authors are you know super great testers right but

These take you from a to z um and you know even though they find good bugs they take a long time to complete in their full scale so bug bounties are different um so if you want to do web hacking you want to get started these are what you go for

Um but my my talk is a little bit different so let’s talk about discovery in uh web application assessment for a bounty so what you want to do in a bug bounty is basically find the road less traveled and this is if you’re aiming to get paid i think um

So you can attack the flagship application that the company has right but really that’s not where the vulnerabilities are going to be most of the time that application has been tested by a pentest team it’s probably had a bug bounty on it for a long time what you really want to find

Is the parts of the applications that are like sub domains or maybe obscure web servers on different ports you want to find acquisitions that maybe the company has had recently that came in from a different development team and they might have a whole slew of problems that came from a whole different group

You want to look at functionality changes and redesign redesigns on sites mobile’s websites because they’re you’re set to render differently on your phone and also new mobile app versions when you’re testing so we’re going to go into some tools and stuff i use to find a new surface area for you to attack

So recon injury recon ng is this tool that basically allows you to do a whole bunch of automated hosts and stuff and one part of it is it has all these modules to do subdomain through forcing and subdomain discovery now uh subdomain discovery is a big part of finding

You know applications that have been left out there i mean marketing spins up a site you know dev spins up a test site like you have like integration stuff left up so um finding those and hacking those and getting rce or code execution through those sites is kind of where um

You can get big payouts so this script what it does is it iteratively scrapes google for all sub domains on a given uh a given web property so let’s say acme.com this will find um this is great google for everything that is in acme www.acme.com and then iteratively remove

Those results until you’re down to this long list of subdomains it also scrapes being baidu netcraft and brute force’s subdomains like your common fierce tool would so this is on github it’s a simple shelf wrapper around recon ng so you need to have refining g installed if you use kali linux

You can just pop the script in and go yeah so this is the output of something like that against a company like this you can see there’s a lot of output probably a lot of domains here that have gone under assessed as far as you go so

This is that idea of iterating through google to find subdomains so here you have site and then minus dub dub dub sites and then i found on the first hit was sandbox so i removed that on the next run through and this is that scraping that’s happening that the tool is doing

And then you get more entries floating to the top so you get credit apply or business or shopping or advertising and you just keep on removing these until you have all of them and then you group force and then you end up with a huge list of sites to assess and then

You want to go through and on your you know on your entity that you’re attacking um you want to find any you know mergers or acquisitions that maybe aren’t the domain that you’re given right but they’ve just purchased a company right so oculus um you know purchased by facebook had some bugs and

They got popped as soon as they were acquired and they were not under the facebook um place six month rule or i don’t know if today’s six month or i can’t remember how long but uh yeah they got popped immediately right and that was a whole different depth team but

Owned by facebook and worthy for an rce bug they got hit with sql injection and a custom header that was great well not great but it was good for the battery so uh yeah so wikipedia for facebook and google does this really well people update these things all the time when there’s

An acquisition for like stock reasons right so keep an eye on these um if your company has you know purchased something else and they have some new domain and it might not be in the bug bounty brief yet you can go after this if you’re doing those types of families

There’s also a repository of links of every kind of phone that’s come out on facebook and paypal and google people like to share this information this one is hosted on facebook i have no idea why um the link’s in there and the slides have everything hyperlinks you can go

Check it out but these are all the blog articles that reference bugs here now why is this important if somebody else has already found these bugs because bugs get represented across the domain in different places so you can tell a lot about an organization once you read these articles and find

The same bug in other locations like those subdomains you found maybe rogue web servers and things like that it also kind of tells you what they’re going to do to fix them like how they filtered out input you get a lot of intel around the application so you know really doing a

Lot of research on your target um can’t help but it’s not the fast stuff so uh support scanning i mentioned before scanning so 14 is not just for netpen um so yeah i mean how i hacked facebook there was an article by ryan dewhurst who was like i started up core scanning

And found some weird server which was a jenkins script console with no auth and that was it he got in like simple as that right like uh 8 000 buck or something like that right like uh or even more i don’t remember um so is.net the microsoft domain that you know

Evangelizes.net had rdp open to the world with ms 12020 on it uh vulnerable and so that was a thing so yeah just go ahead and you know use a simple nmap syntax to start you know support scanning all of your sites and make sure you check all those services this syntax will

Support uh port scan for all ports uh on a domain as well as pull out any http servers titles and display those in the output um it also it’s a syn scan and os fingerprint so mapping so map so you you found all of these new servers

Right like uh maybe sub domains or maybe you found an acquisition or something like that now you want to move into um you want to move into mapping an individual application so and taking notes is really important when you’re doing this whether you’re doing it inside of like a

Uh like a notepad or you know just using pen and paper or like evernote i use evernote all my all my bugs are templatized so when i find them i can just copy and paste into the disclosure email or whatever like that so um so these are some mapping tips that i

Use right away so google is actually your friend right you can get a lot of parameter information from just googling a domain and figure out like what happens there i know there’s some like parameter parsing scripts i couldn’t find a really good one for this presentation um but you know just will parse

Parameters out of the google uh like you know cache stuff but really the next the next big thing is directory forcing right finding unlinked content content that’s not supposed to be there um so a lot of people use like door buster or content discovery and burp for this kind of thing

And that’s good they’re good lists but those lists were created by going out and spidering the internet and finding you know every path after the top level domain and then prioritizing them there’s some other lists that are better for this type of work so the raft lists are these lists that came

Out of a talk maybe four or five years ago a wrath was a application proxy it was a decent one but it’s since been discontinued but it’s some lists have uh for directory brute forcing have lived on they are um they are a spider of the internet’s robot docs text files so

Everything that everybody doesn’t want you to see is in this directory through forcing list so it’s super sick i can’t tell you how many bugs i found just using this list like big files badly configured to get you know stuff it’s just all over the place sven digger is another list like

This they went out and spied at all the svn projects so if your project of your site or your target is an open source place you can use the you can take all the paths that have been converted for you to directory reports to get better application coverage or find config files

Uh git digger is the same thing for again so um so after you do some unlinked content discovery or directory reporting whatever you want to call it you move on to trying to identify your platform um so there’s just some really simple wins here rockwapolizer and built with are

Chrome extensions that you can just click and they will give you pretty much the whole stack by looking at the uh the headers the comments and the pages the way they render like analytics things that have been integrated and they’ll just give you like the whole server stack and they’ll

Even give you version numbers if they can identify them so webalizer and built with are super sick um retired.js is one of my new favorites uh it will profile all of the server side javascript libraries and tell you if they’re out of date as well as give you all the vulnerabilities

Before that um that patch or you know your voter reversion pass so you’ll get a list of prioritized cross-site scripting or whatever is in jquery at the time right and then once you identify all of these servers uh version numbers you just go check for cves and you know

Server-side stuff so that’s pretty standard that’s web stuff um but these are some good tools now if you happen to come across a cms which is like the pen testers training because those things suck and the plugins suck you want to use these two tools wp scan

For wordpress a lot of people use this already it will identify all plugins and users for wordpress install as well as look up any volumes that are associated with those plugins that have been disclosed and then cms map for uh for drupal and um what is the other cms

There you go thank you awesome so so those are the two that uh have really yielded any value for me across um so here you see a screenshot of a screenshot of wp scan and it’s you know found a version of a plugin or a theme that already has like

Cross-site script or a file upload vulnerability in it sometimes there’s false positives but honestly for what this script does it provides so much value that’s great um so the directory group forcing we talked about a little bit earlier i mean the workflow for this a lot of

People do but i just put the slide in here because i see a lot of people do it a little bit weird i think this will brute force like off the top level path a lot and then just stop right and so they’ll get some errors and

They don’t know what to do with it um so they’ll they’ll go to acme.com and get a 200. and then they’ll go to a backlog and they’ll get a 404 and they’ll get more 404s and more 404s and you know you know there’s nothing there but then they’ll hit like control panel

And see a 401 and then they’ll be like well i can’t do anything i’m not authorized right so they don’t brute force after control panel there’s so many like messed up access control on web server bugs that you can exploit if you just brute force after that

You’ll probably find something so i just see this a lot where people stop after the topical domain directory you know enumeration so that’s kind of the workflow you’re doing there um some other things that you can do is mapping and volume discovery using open source intelligence so

These are one two three four five five sites six six methods that you can use to find already published bugs or almost already public bugs i mean i guess i’m pretty sure i’ve seen the talk already i mean or like someone like describing the same tools

And using the same memes which is also possible um but yeah they’re considered like end day or whatever um but uh xss.com reddit xss punk spider is actually a burp engine that just scans the internet so if you’re if your target is a high profile site information might already be in here for

Your test and you can pull it out and use it to your advantage even if those drugs have already been disclosed and i found bugs that were on here but not disclosed to the customer to the bounty so that’s actually worked before it was like a

Super easy win um they helped you get a feeling for what the company has faced before as far as issues like prevalent cross-site scripting crosstalk request forgery file upload and then you can do regression testing on all the domains that you found earlier in the presentation

So um yeah go out and use these resources to try to find bugs in the platform as quickly as possible because they’re free and they’re already out there and the customers should know about them anyway it’s the responsible thing to do okay so this is my intern ben he’s uh

Never spoken before at that point neither have i actually been speaking but uh he did an awesome project and he’s gonna talk about it for a couple seconds so uh hello everyone my name is ben um like jason mentioned i’m an internet bug crowd on jason’s team

For the past couple of months we actually gathered a bunch of json files that includes all uh the metadata for each block binding program that’s out there so there’s 200 250 plus boundary programs that are included in this project and they all include information like how much the minimum boundary is how

Much the maximum is what uh mobile apps are included while web apps are included what’s not included in the scope of the program as well and we actually use all this data and fed it into different scripts like uh on the screen we put it into noc

And it just went through all every single one of those uh programs and brute force that were supplemented and this also is available on a github account and everyone could go and use it if they want to so the json files look similar to this this is yahoo’s program a couple months ago

We don’t know but what we have is a dns record that shows that’s the yahoo.com itself and all sub domains of it in flickr and all supplements of flickr are included in the scope as well as other mobile apps that are included in the scope as well

And as you can see in the bottom there’s two of them have two domains which is yahoo.net and there’s some stuff domains and yahood itself not being included in the scope of the program so what we ended up doing with this using ruby we wrote a script

We fed every single one of the json files json files and we crawled and using web we for example for this one we have redirect and you can see there was a you couldn’t disclose the domain but there’s a bunch of sites that are out there that have the redirect out there

That you can easily record and take them out and record the vendor taking it further we same idea we use all the json files and we fit that into entry which intrigues our api framework that is for intelligence gathering and it does a bunch of tasks that you can see on the right

Left side of the screen it includes doing supplement brute force web slider and map and you name it we can do it with intrigue so also the tweet is available on github as well it’s open source go ahead and work and commit to it if you need to

What we ended up doing four entries is we parsed every single json file with of ruby and you can see at the line when it says r we are taking the task which is called dns separate dns sub which is a supplement brute forcer and where they give it entity and

Options that are all included in the manual and we are running that for a json file which at the bottom shows it’s being assigned an id that you can just go on your local host and check it out and see what intrigue has found so for example we did intrigue io

And you can see all those top domains that have been out there uh that intrigue found with their ip addresses as well and make sure you guys check it out it’s like i said it’s online and you can do whatever you can think of out there awesome yeah that’s that’s a sick tool

And a sick framework both mapping and recon entry like uh i mean if you’ve used foca and multigo and everything like that it’s like an open source version of those license tools i love both those tools by the way just saying like um using both if you can but uh but

Intriguing is gonna be sick you guys should check it out um okay so on to where we are off in session i’m gonna have to blow through some of this because this presentation is long and like there’s a ton of stuff so off-related bugs the one thing i want

To say about these right these are low shallow bugs that everybody hates people who reported bug bounties the problem is if people start not paying attention to them you can’t chain them to do bigger things right so we’ve had multiple bugs or i’ve had multiple bugs where

Um where we’ve had a couple small issues like with password resets or like you know something like that and then we’ve chained them to make like a critical critical account takeover bug so these are really important but these are the kind of bugs that a

Lot of people uh see in like the hashtag like bag bounty instead of bug bounty you know people really don’t like them don’t discount them just note them and if you don’t wanna if they’re out of scope don’t do anything with them but you might be able to use them later that’s

All i really have to say about about some of these so um so session the science the kind of same things right so failure to invalidate old cookies like new cookies on login or no new cookies on log in and time out never under cookie laying but these are

All things you’re going to be able to use later when you need chain bobs but a lot of times they’re out of state either you’re out of scope or unappreciated or duped or something but uh but yeah you should you should keep them in mind when you continue

Testing because they can’t be chained into bigger issues so the big part of this one is actually tactical buzzing um so so i go through a couple different injection types or um you know vulnerability types here and so we’re gonna talk about cross-site scripting and some research that some really cool

People have done um so the core idea of cross-site scripting right does the page functionality display uh something to the users like you know that’s kind of the question i ask myself you know can i get reflections somehow with javascript um and so you can do manual testing

Which is great right and you enter in your your meta characters and see if you know if they return but um really when i’m trying to work fast in about bounty i have three or four like magic strings that i use so um you probably use them before the the

Technical definition for them is polyglot payloads uh these are web of polyglot halos and so the first one you’ll probably recognize this one is our snakes they used to call it the arsenic battering ram or that’s what i when i work you need a lot of characters for that

You probably use this before you put it into the search bar or comment field and then you pray that you get cross-site scripting right so this is the first one this is actually a multi-context filter bypass based polyglot web payload it’s a mouthful i know but basically it’s designed to evade filters

Uh it’s about to execute in different web contexts and it’s really cool so i have three of these strings that i cite here that if you’re just doing bug bounty hunting you can use and just kind of move along on your on your critical functions on this site

So this one is from a researcher named sharjaved he does cross-site scripting research i think he did his phd in crosstalk scripting which blows my mind so this is a multi-context filter bypass based polyglot as well so um you can see here that he’s trying to

To mark up in a whole bunch of different contexts he’s got like an either like an at sign here to like trick uh trick email like filters or you know maybe a form only takes emails or something like that so uh he actually ran this along like the

Alexa top 100 and like 80 of them were vulnerable to just their search parameters with this strength so um you know more ammo for you guys doing dog batteries this one is one by uh mathias mathias carlson and is he here right now is mathias here hey there he is he’s awesome

Um so he did a whole presentation on this idea of multi our polygon payloads and websites so this is his multi-context holy dot payload and so this is one that i use now so thank you other xss observations when i started parsing bug bounty work as well as getting bugs myself so

Finding input vectors is important so finding customizable three themes or profiles that use css but then you can trick them into using javascript to execute prospect scripting a lot of names of like events or meetings in any application that deals with those types of things

Uh ura uri based xss is still a big thing when people pull things from the uri and render it for some reason um importing from a third party so things like facebook integration where they’re maybe filtering characters but your site actually displays facebook data inline so you can

Set your name on facebook to script alert and it will alert on this site um jsonpost values that didn’t that didn’t return the correct content type so a lot of people discount web services right away because they think that uh the content time will that won’t execute cross-site scripting

Or when it won’t execute javascript so um you have to really check and make sure they’re returning the content type otherwise you can get reflected xss and a lot of web services like that file upload names when you’re uploading i’ll just try to change it to script

Alert or whatever like that it’s going to echo that file name back usually a lot of places uploaded files themselves this is a huge one actually that’s all over the place so a compiled swift file or an html file that’s designed to execute its own javascript and you uh basically attack a file

Upload so a lot of you know file uploads there’s a whole section here about file we’ll talk about it more in a little bit customer pages where they’re echoing out what you can’t find but xss strings in there fake parameters where the page might parse some big parameter data and put it into

Uh into your response and then log in and forgot password problems also this is a swift parameter access this is a huge thing as well i don’t think i’ve ever found a swift file that i’ve decompiled that hasn’t been vulnerable to either cross-site script anymore um for uh remote file include and

Actually dennis here is like the guy i ask questions about all the time so um yeah so those things are like jplayer and like all of these like caught software that are swift files that do like media or whatever like um so there’s a whole oas page on um

On the common params that these players use and then also the injection strings but these you have to kind of do more manual analysis so to do that manual analysis i use this tool called flashbang which i think is super awesome it’s by cure53 you drop it a

Swift file on the other end comes out all of the parameters that might be vulnerable to cross-site stripping it decompiles it for you and it displays them um along with if they’re going to execute out of the context of the swift file i highly suggest this tool if you’re

Going to do some split packing it’s way better than like a lot of the old ones cool so sql injection um the core idea does the page look like it might need to call on some stored data obviously this is matias’s sqli polyglot um where it will execute

Single quote double quote and straight into query context um so i’ve seen a lot of cross-site scripting polyglots and and remember these are things that actually scanners are starting to do right they don’t want to send a million buzzing payloads to a parameter because you have like eight million parameters

On the page so it just takes her to scan things right so matthias in his presentation like has this string and i imagine a lot of buzzers web buzzers and scanners will start to pick up on this type of thing if they haven’t already um the idea of these multi-context

Injection strings so this is awesome as well so for sql injection to kind of go through and fuzz things i also use this project called the sexless sec list project and um it’s got a whole bunch of tits and settings and it was the fork of

The fuzz db and then we added to it with like username and password list and all this crazy stuff daniel miesler here actually helped me um curate it and we designed it together um and it’s uh it’s invaluable right it’s got like buy uh by type of injection so if you

Want to just do like a login bypass in my sql it’s got all those curated all those strings curated that would you you would usually use to do sql injection there i highly suggest using this and i just load these in the burp into intruder when i want to attack a former

Or something like that some parameter i think is vulnerable so other observations um so blind is the predominant sql injection you hardly ever get error-based signal injection anymore um and so like in those cases you use like benchmark strings and stuff to make the page take a long time to load

And that’s how you identify whether you take it the whole exploit way is uh you know it’s up to you right we have a lot of researchers i know who just want to identify and move on right i like to to run sql maps eventually because it’s still king i mean

There’s no other tool that does it as good as sql map um and that’s actually something i learned doing the research with everybody through sql map at some point um so yeah some tips for for sql map uh basically when you’re doing this you can actually

Park and parse a whole burp log file so like enable verb to do logging and then parse the whole log file and actually buzz the whole log file with sql map it takes forever it’s not like the greatest way to do things but it’s also offering a lot of coverage if you’re up

Against some kind of like blacklist or something like that it has a sql map has tamper scripts that you can use which basically encode all of your attacks so that you can try to evade blacklist there’s a really good guide on there it’s somewhere on the bug crowd forum on

Dbms specific syntax for sql map tamper strings so if you’re going up against ms sql or mysql or something like that there’s a simple string you can pass into sql map and start buzzing those parameters and get past blacklists and then a really fast way to instrument um

Sql map is sqli pi which is a verb extension basically allows you to right click in any window at birth and send that request to sql maps api running on your local box so like you can just be inside a verb right click and start buzzing the parameter

So some common parameters and injection points like any id value currency values item number values uh sorting parameters i’m not going to go through all these they’re all on the slide like and eventually this is all going to be on github anyway so you guys can just

Grab it and use it in your methodologies if you think it’s useful but um these are the kind of places where we saw where i saw the most injection and where i you know my research person and other places showed me this is sqli pi so right click on a request

Send it to sql pi scan and now that renders uh scanner results in the target tab but it doesn’t look like this anymore but you get the idea so this is my cheat sheet of sql injection resources when i do sql injection broken down by my skill type and these

Are cheat sheets that let you know uh manual syntax um based on mysql a lot of these people are like pentest monkeys list they’re old they’re still the best like you you have to use these and you have to have them handy when you’re doing injections so

Um there’s some really edge case ones at the bottom like access which god who uses accents that sucks ingress db2 and formix xo light 3 and active record for ruby on rails so i keep those handy in my evernote when i’m doing sql injection testing and when i see

Errors or long load times or something like that i just i start you know getting in that mode um so file uploads and file inclusion is the next area so local file inclusion the core idea is does it or can it interact with the server file system um lithius is my cool

Favorite tool for doing this obviously you can do it manually so i have all of my lfi um scripting stuff up on set list under fuzzing and lfi so you can see here like i’ve you know i’ve tried a bunch of blacklist bypass or encoding to try to get common

You know system files this is on this decklist project um common parameters or injection points for this type of stuff is like you would think of this but it’s good to have it in the list so like file location locale path display load or retrieve these are the most common parameters that you’ll

Find those in malicious file uploads this is an important and common attack vector when doing this type of testing not only just to upload like a swift file and get xss off of it but um you can also do pretty cool attacks so one of the ones i like a lot and it’s

A it’s a dos basically an image that specifies itself to be super large but isn’t so it you can upload it and the server will write all this or will allocate all of this space for it on disk but it’s actually not that big of a file

And you can dos the application server using images crafted like that there was a whole blog on it um and then uh you can you can actually one of the things i think is interesting i’m not going to go into it too much but there’s a slide about it is bypassing like security

Zones and storing malware on client servers so there’s as well as polyglot web payloads there’s also polyglot files which can execute code in different contexts like if you think of a parser reading a file they can you know it basically will look until it finds what it wants and then

Execute that so you can create like a jar that is actually an executable so if i make an executable that is malware but i upload it to your server because you allow me to roll out a jar well is that a volume like i don’t know like you are

Technically storing malware on your server for me right and i can send the black ads to go retrieve it but um can you do anything about that right are you going to implement a parser to look through the binary data and cut stuff out i don’t think so that’s kind

Of hard to do so interesting question there it’s kind of a another road um dan crowley did a presentation on it um here at that pond and it was fun please you should check that out technical errors that that came at the perfect time actually [Applause]

Oh wow okay that’s what we’re doing yeah we’re doing shots okay so uh he’s a first-time speaker and actually a little story about what you can go about right i guess he mentioned that uh like 16. defcon 16 he met someone i met julia my wife here yeah so you know [Applause]

All right cheers are these guys doing all right should i take them off the stage or do you want to keep let’s do them i can go keep listening all right i guess i guess you can stay okay can you give me a second till my throat starts burning

Sweet okay so file upload attack or a thing um i’ve never seen any better presentation to guide you along the road at file upload attacks than this guy’s traditionally presentation and if i put your name i love all these guys just like me so um about file upload vulnerabilities and this includes

Doing new and novel attacks as well as old attacks um to get files past blacklist or you know upload you know bypassing extension triggering or something like that so i’m trying to give you guys resources as well like the ones i would use i mean

A lot of this actually got i think got parsed into the new oauth app testing guide most of it at least so i would i would check that out too uh that’s an intro to malicious file uploads and getting shelves and like web shelves so

Oh this is what i talked about uh dan crowley and um i don’t know that guy’s real name but um yeah these are the types of binary files that can execute in different ways so you can see they have like a pdf that’s a zip that’s a mvr or so like

Um you know interesting research here coming out there i would like to see you know interesting bugs so remote file includes and redirects common parameters there destination continue redirect url uri window next common blacklist bypasses um these are all kinds of escaping tricks that you use

Normally in web stuff but these are the most common ones i found these are also in set lists in the lfi and a heart by buzz list that i use often so for rfi these are the common parameters uh file folder path style templates

Yes yes yes um so these are where i saw the most bugs or you know other researchers you know published data around their rfis so these are kind of the type of parameters you can do and i think eventually right the thing you do here is um is you write

A book extension i haven’t yet right but that just like automates any time you see these it sends it to like blogger or something like that so you can just go test them later i haven’t done it because i just do it with eyeballs but

Uh it’s probably the better way to do it is write an extension to do this work okay so crosstalk request forgery how much time do i have 10 minutes okay i think i can do it okay so caesar if everybody knows about sea surf right like how do you execute ceases

You find some function in the website that does something right and you it’s a security related function password or whatever right like the list of the functions and then you right click and burp and create group of concepts that’s like papers nowadays um so what you really have supposed to

Focus on in bug bounties is c-serve bypasses customers who have c-serve protections but haven’t implemented them enough so common c cert bypasses uh in my research yielded removing the token from the request removing the to the parameter value from the request adding control characters to the parameter value using a second identical

C-serve parameter or changing the request method um so check this out this tool has gotten no love i don’t know why i think it’s been out for two years already it’s called burpee have any of you used this tool before oh good give you something to take away um

So what burpee does uh you enable logging and burp and you crawl a site completely that has cross-site requests forgery protection right like a c-series token and then you create this template and tell it what the token was what a good result is for getting a page

What an error page looks like and this template is actually really easy to edit this is the sample one this has been out for i think two years already i don’t understand why people use this super sweet right so then you write this template it’s a python script

And then you run this timeline to put burpee on your worklog file and they re-request all of those across the whole domain every request that you’ve ever made in birth we request with those first three attacks from cesar bypass then it produces an html report telling you uh which one

Gave different error messages uh which ones came out the same and prioritize this user uh so you made a lot of money doing this to facebook and twitter because it wasn’t a direct verb extension it didn’t get a lot of notice i randomly kind of get up

So this is a part of the html output here’s the base request here’s the crafted the first crafted request and then the response and then you get a report back hanging back so um another way to do it is just to check for every request across the whole first block file that

Didn’t have the token in it it’s the actual parameter um so this is another script that does that it’s another python um so privilege you know off and logic kind of gets word a lot but my testing thing is just you know if you have an administrative user you need a

Couple accounts to do this and then you have a low crippled user and then you know the low that user just tries to directly call functions that are yeah right pretty simple but to automate that across multiple functions um you might need some tooling this is what i use for that it’s called

Motorized this one is available on the web store and basically uh you spider’s like completely you work through it all of your post requests as an admin user and then you go through as a before user and you get that information authorized run the tool and it tells you

Which one the lower user will be able to access that the admin user is also able to access and you can go through those so common functions reviews that i checked for a privileged escalation or anything like that needs to be actually combined with the last three sections

How the users can use their start projects um change account info view customer analytics so like there’s a page that tells everything about whatever that site does and what’s right of that view payment processing view like routine or any view with an api on it this is what that looks like

Authorized browser using a height log in with the a and spammed everybody of the ic group of that company and finally someone accepted it and i tell them i’m not like an i’m not exploring you i just want to tell you this exists because i was buying a train already and um

Headphones and i have so increment decrement negative values of temperature form sensitive uh functions substituting user ids things like the user um these are common functions to use their files that deal with either so uh everything from the c search table anything that says uid password are user hashes emails

Images like that are supposed to be private um so you can you can go through the slides and all this is going to be up if you have questions or whatever so this is a simple eye door i don’t know why i put a simple hydra right here

You need to enable http everywhere there’s an awesome script that will uh basically take up your log file again re-request every request in your site tree over http and put it in https uh um uh logic logic laws are usually pretty manual um uh the one i see a lot is

Substituting half parameters where there’s like spices or something like that and they attach it it’s irreversible or uh they put something to it step manipulation this is like the bread and butter example of what you get for logic clause steps like order or put things in the card order

Check out pay uh ship skip everything you like to put everything in your cart my account um application level docs this one’s kind of interesting right it’s not actual golf right i’m not advocating buck bounty like you know or anything like that but i’ve seen sites that just can’t handle

Uh just like uh parsing a parameter with like you know 40 000 or something or me putting in like a mass function and that’s the parameter value and the server is like i don’t know what to do let me try to process this somehow so those are interesting and the timing is

Mobile really running in so data storage is really important to check these files for data storage as well as logging this is the best tool to quickly get spun up uh on ios it’s called itb it’s by daniel mayer basically jailbreak your phone and solve this tool

It gives you a full really list of handler of all of the files all of the encryption values if it’s using exploit communication et cetera et cetera et cetera it’s the most functional tool uh i think it’s partly based off a talk i gave

A long time ago and he made it in ruby and super sake this is the best way to get into iowa happening we gotta go uh there’s others there’s other bones i repeat them again right they don’t describe them like content spoofing for liquid security headers half disclosure keep

Them in your pocket later to escalate it um this is one idea of like uh you know if i have five or thirty minutes or something like that what can i do so i try to tie myself with a methodology using the stuff in here

So in 15 to 30 minutes i can do most of this using urban the automation maybe an hour like depends on how motivated i am right so these are like the steps i go through i register i i hit the password reset i go to all the forms that do security functions

I’ve checked the cookie um i do like uh all right and perform enumeration on any like uids i see in the url uh i directory reports using one of the short lists in the background i’d upload files and had uploads and within 30 minutes you know an hour i can usually find

Some pretty good thing to take with you crowd source is different um it’s the same but different um you find like twenty percent of the edge case stuff instead of eighty percent and it’s a lot of stuff real quick data analysis is cool you probably do a 15 to 30 minute web

Test and done right you can get something from home set list polyglots are cool and follow all of the bug dining people on this bookmany list i put them all into a twitter list for you and you can watch them it’s also there’s a lot of stuff that

Didn’t get put in here uh there was a lot of data but i didn’t get the parts so 50 of the data is still unparsed so i’m going to put it up on github as a git book i think or maybe smart down and you guys can contribute to it if you

Care enough if you just want to take it and use it on time uh stuff to go in there more tooling than i found uh xmt that’s actually meant to say ssr app a whole bunch of cool ssrf techniques uh capture bypass more detail on logic flaws and to add android mobile tools

That i use often 13 memes is that okay are you good all right attribution and thanks these are bug hunters who did researcher that are these are blockers who did things in this presentation all of them are super awesome i respect every single one of them

Um or who made tools and also my team at bug crowd john uh koch ben ben grant potty patrick katie kim abby casey chris and sam and everybody in the community i love you guys i love doing this for a day job no questions i see um well then that’s

It for this advertisement episode and see you in the next one make sure to join laser going oh i just realized um i did not set up my um obs overlay yet i i built this thing yeah maybe i should do that for the next episode um yeah let’s see

Okay so um make sure to join lgi.edu let me manually write it since i don’t have it overly overlaid um it’s also in the description and if there’s a change of the ip address make sure to check out if the server is done make sure to check out the current website which is

Cityhound.com laser coconut and if that is also down make sure to search the interwebs for laserworkland and maybe the address changed and you will find something um yeah more up to date on maybe like a newer video uploaded on this channel or um yes well you most likely will find a updated url

Or it’s just a temporary downtime because i don’t know the data center exploded and i haven’t yet recovered um yes so that’s about it make sure to join the server and see you in game or if if you’re still not convinced yet see you in the next advertisement episode bye

This video, titled ‘Minecraft Anarchy How to Shot Web: Web and mobile hacking in 2015’, was uploaded by ZillyGurke on 2020-07-14 17:26:41. It has garnered 13 views and 1 likes. The duration of the video is 00:52:30 or 3150 seconds.

Lasergurkenland anarchy server ip: 88.214.56.94 domain: zillyhuhn.com

Small pure vanilla minecraft server. No plugins. No admins. No rules. Chilled anarchy server with stable tps and no queue. No world resets and stable uptime. The server will stay online for at least a few years.

Defcon talks watched in this video: How to Shot Web: Web and mobile hacking in 2015 https://www.youtube.com/watch?v=-FAjxUOKbdI

  • Crafty Creations: Minecraft Skin Made Quick & Easy

    Crafty Creations: Minecraft Skin Made Quick & Easy In the world of Minecraft, where creativity reigns, Crafting your skin, let your imagination take the reins. Open your browser, to Minecraft skins dot com, Click on editor, let the fun begin, no need to be calm. Tools at your disposal, to edit and create, Make your skin unique, don’t hesitate. Download your creation, with a click so fine, New skins to explore, in the latest section, divine. For private servers, download with glee, For public servers, use the link, you’ll see. If this video helped, give it a thumbs up, Subscribe for more tips, don’t interrupt, just sup. Read More

  • Minecraft Animation: Ping Pong Shenanigans

    Minecraft Animation: Ping Pong Shenanigans Minecraft Ping Pong Animation: A Fun Twist in the Minecraft Universe Exploring the vast world of Minecraft always brings surprises, and the latest trend of Minecraft animations adds a whole new dimension to the game. One such unique creation is the Ping Pong animation by bagasgg50yt, a talented Minecraft animator. Engaging Gameplay The Ping Pong animation showcases a friendly game of ping pong between two Minecraft characters. The animation captures the essence of the game, complete with the back-and-forth rallies and competitive spirit. It’s a refreshing take on the traditional Minecraft gameplay, adding a fun and light-hearted element to… Read More

  • Join Minewind: Where Crazy Builds Come to Life!

    Join Minewind: Where Crazy Builds Come to Life! Welcome, Minecraft enthusiasts! Are you ready to take your building skills to the next level? If you’re looking to enhance your structures and create jaw-dropping landscapes, then you need to join Minewind Minecraft Server. With a vibrant community of creative players and a variety of innovative building techniques, secret tricks, and creative strategies, Minewind will inspire and transform the way you approach building in Minecraft. Imagine exploring hidden passages, collaborating on epic builds, and showcasing your unique designs to a supportive gaming community. Whether you’re a seasoned architect or a beginner looking to learn and grow, Minewind is the… Read More

  • Surviving a Terrifying Forest in Minecraft!

    Surviving a Terrifying Forest in Minecraft! Minecraft: Surviving in the Spooky Forest! Arda is back with another thrilling Minecraft adventure, this time exploring a terrifying forest filled with unknown dangers. Join him as he navigates through the eerie landscape, facing challenges and uncovering secrets along the way. Will he survive the night in this spooky forest? Exploring the Unknown Arda sets out on his journey, braving the dark forest and encountering strange creatures like Slimes and Fire Monsters. As he delves deeper into the woods, he discovers hidden treasures and valuable resources that will aid him in his quest for survival. The Importance of Gear… Read More

  • Discover the Evolution of Minecraft on Minewind Server

    Discover the Evolution of Minecraft on Minewind Server Welcome to NewsMinecraft, your go-to source for all things Minecraft-related! Today, we’re diving into the rich history of Minecraft as we celebrate 30 years of this iconic game. From its humble beginnings in 2009 to the exciting updates and additions in 2024, Minecraft has truly evolved into a global phenomenon. As we look back at the journey of Minecraft, it’s clear that this game has something for everyone. Whether you’re a seasoned player or new to the world of block-building adventures, there’s always something new to discover in Minecraft. One of the best ways to experience the magic of… Read More

  • Ultimate Ender Dragon Egg Hack!

    Ultimate Ender Dragon Egg Hack! How to Hatch the Ender Dragon Egg in Minecraft (2024) Introduction In the vast world of Minecraft, players often come across the elusive Ender Dragon Egg. But what do you do with this mysterious item? Fear not, as we delve into the secrets of hatching the Ender Dragon Egg in Minecraft. Methods to Hatch the Ender Dragon Egg Method 1: The End World To begin the hatching process, venture into the End World and place the Ender Dragon Egg on top. Surround it with four End Crystals strategically placed on the bedrock. The ritual will commence, and soon enough,… Read More

  • Ink Farming Fiasco

    Ink Farming Fiasco The Warden: A Unique Addition to Minecraft Procrastination the Warden In a daring survival mode adventure, the player managed to transport the warden, named Procrastination, from the deep dark up to the surface. This feat was not without its challenges, but now Procrastination peacefully resides in the river. Occasionally, the warden showcases its abilities by hunting squids and fish, providing a source of ink for players. Unconventional Ink Farming While this ink farm may not be the most efficient, it certainly adds a unique twist to the gameplay. The player’s creativity in utilizing the warden for ink production showcases… Read More

  • Kaantastic’s Epic 3-Hour Brookhaven Challenge with Friends!

    Kaantastic's Epic 3-Hour Brookhaven Challenge with Friends! Minecraft Adventures with ItsKaantastic and Friends! ItsKaantastic is a channel dedicated to gaming and having a blast! The dynamic duo, Dania and Kaan, dive into the virtual worlds of Roblox, Minecraft, and other exciting games on this channel. Get ready for thrilling roleplays in Brookhaven, Adopt Me Town, and beyond, along with some epic challenges. Don’t miss out on the fun by subscribing to the channel! Exploring Minecraft Worlds Join ItsKaantastic and friends as they embark on exciting adventures in the vast and creative world of Minecraft. From building magnificent structures to surviving the perils of the wilderness, there’s… Read More

  • Arachnid Ambush: Minecraft Spawner Showdown!

    Arachnid Ambush: Minecraft Spawner Showdown! In this episode, we stumble upon a spider spawner, A place where arachnids spawn, a real game-changer. We craft some torches, light up the place, To prevent any surprises, we must keep up the pace. The spiders start crawling, we swing our sword, Defeating them all, we are in accord. With loot in hand, we continue our quest, In this Minecraft world, we are truly blessed. So join me on this journey, full of twists and turns, As we explore this world, our curiosity burns. Stay tuned for more adventures, more challenges to face, In this Minecraft world, our… Read More

  • 100 Players Recreate Minecraft in Garry’s Mod DarkRP

    100 Players Recreate Minecraft in Garry's Mod DarkRP Minecraft Comes to Life in Garry’s Mod DarkRP Imagine the world of Minecraft brought to life within the realms of Garry’s Mod DarkRP. This unique gaming experience recently unfolded as 100 players embarked on a hardcore survival journey with only one life to spare. The fusion of these two popular games created a thrilling and challenging environment for all participants. Exploring the Minecraft Universe in Garry’s Mod Through the use of carefully curated addons from the Steam Workshop, players were able to recreate the iconic elements of Minecraft within the Garry’s Mod universe. From blocky landscapes to familiar mobs,… Read More

  • Minecraft Memes – “Okay grandma, I’ll build my own damn village”

    It’s like grandma is trying to understand Minecraft, but she’s stuck in a different dimension where memes have scores! Read More

  • Save Eggman in Minecraft: Egg-cellent Adventure!

    Save Eggman in Minecraft: Egg-cellent Adventure! In the world of Minecraft, where creativity thrives, Cube Xuan brings laughter with every surprise. Save Eggman, the challenge is set, In a world of blocks, where fun is met. Join the adventure, with humor and glee, As Cube Xuan crafts a world for you and me. Child-friendly content, safe and sound, In a world of Eggman, joy is found. Subscribe to the channel, for daily delight, With MC animations that shine so bright. Cube Xuan’s world, a place to be, Where happiness flows, for you and me. So leap into the verse, with rhymes so fine, In Minecraft’s… Read More

  • Rescued laggy noobs in Minecraft with ping 0770 🔥

    Rescued laggy noobs in Minecraft with ping 0770 🔥 “Saving laggy noobs in Minecraft with ping 0770 is like being the superhero of slow internet connections. I am the hero they never knew they needed!” Read More

  • Are We Really Alone? Minecraft Story by Lendren & Murilo

    Are We Really Alone? Minecraft Story by Lendren & Murilo The Mysterious World of Minecraft Embark on a thrilling adventure through the pixelated universe of Minecraft, where two friends find themselves in a dangerous predicament after accepting an illegal job to cover their expenses. As they navigate through a forest teeming with monsters, their survival skills are put to the ultimate test. A World of Endless Possibilities Step into the blocky realm of Minecraft, a sandbox game that allows players to explore, build, and survive in a procedurally generated world. With no specific goals to accomplish, the game offers endless possibilities for creativity and exploration. Surviving the Unknown As… Read More

  • Join Minewind: The Ultimate Minecraft Server Experience

    Join Minewind: The Ultimate Minecraft Server Experience Welcome Minecraft enthusiasts! Are you tired of dealing with technical issues while trying to download or install Minecraft Launcher from the Microsoft Store? Look no further! We have a solution for you. While watching the video on “How to Fix Minecraft Launcher Not Downloading or Installing Microsoft Store,” you might have realized the frustration that comes with encountering such problems. But fear not, we have a welcoming and thriving community waiting for you at Minewind Minecraft Server. Join us at Minewind Minecraft Server and experience a seamless and enjoyable gameplay experience without any technical hurdles. Our server IP is… Read More

  • 5 Sneaky Minecraft Bedroom Hacks!

    5 Sneaky Minecraft Bedroom Hacks! Minecraft Bedroom Build Hacks & Design Ideas Are you looking to spruce up your Minecraft bedroom with some creative build hacks and design ideas? Look no further! In this article, we’ll explore five unique bedroom build hacks that will take your virtual living space to the next level. Let’s dive in! Japanese Bed One of the featured build hacks is the Japanese bed. This elegant and minimalist design adds a touch of sophistication to any bedroom. With its clean lines and calming aesthetic, the Japanese bed is a perfect choice for those looking to create a serene atmosphere in… Read More

  • Insane Minecraft Build: Rebuilding FNAF Pizzeria!

    Insane Minecraft Build: Rebuilding FNAF Pizzeria!Video Information This video, titled ‘Rebuilding A PERFECT FNAF Pizzeria In Minecraft!’, was uploaded by Jollie on 2024-05-13 21:43:16. It has garnered 1387 views and 44 likes. The duration of the video is 01:05:41 or 3941 seconds. Read More

  • Exploring my first abandoned mine in Minecraft

    Exploring my first abandoned mine in MinecraftVideo Information This video, titled ‘ASMR Minecraft Let’s Play Finding My First Abandoned Mine’, was uploaded by Morpheus ASMR Gaming on 2024-04-21 15:11:27. It has garnered 21752 views and 823 likes. The duration of the video is 02:00:06 or 7206 seconds. ASMR Minecraft Let’s Play Finding My First Abandoned Mine You can help support this channel by subscribing. Thank you Donate via Paypal https://paypal.me/MorpheusASMR Amazon USA https://amzn.to/3V8EUmh Amazon Canada https://amzn.to/2Nbnu3m Amazon UK https://amzn.to/2EgKOtS Read More

  • 🔥 EPIC FireBall Battle – Shizo Unleashed on RuHypixel 😱 #minecraft #anarchy

    🔥 EPIC FireBall Battle - Shizo Unleashed on RuHypixel 😱 #minecraft #anarchyVideo Information This video, titled ‘FireBallFight на RuHypixel 😱 #shorts #minecraft #майнкрафт #anarchy #анархия #сервер’, was uploaded by Чиз on 2024-03-23 18:27:13. It has garnered 882 views and 15 likes. The duration of the video is 00:00:44 or 44 seconds. ̶М̶О̶Й̶ ̶С̶Е̶Р̶В̶Е̶Р̶ 🌞IP: mc.sunnybeach.fun 🪅Version: 1.16.4-1.19.4 —————————— ———— VK: https://vk.com/savchikvyacheslav DONATE: donationalerts.com/r/cheesechill —————————————– – 📫Advertising and cooperation – [email protected] Read More

  • UNBELIEVABLE: Skyrider Mod for Minecraft TADC!!

    UNBELIEVABLE: Skyrider Mod for Minecraft TADC!!Video Information This video, titled ‘Minecraft TADC Addon by @TELUR-Man’, was uploaded by Skyrider on 2024-05-13 11:05:15. It has garnered 2481 views and 22 likes. The duration of the video is 00:08:47 or 527 seconds. Please Like, share these video & subscribe my channel…! ————————————————————————————————- Minecraft, minecraft game, play Minecraft, minecraft tutorial, minecraft tips, minecraft mod, minecraft server, minecraft seed, minecraft skin, minecraft map, minecraft meme, minecraft animation, minecraft machinima, minecraft youtuber, how to play Minecraft, minecraft tips and tricks, minecraft mod tutorial, minecraft server, tutorial, minecraft survival, hardcore Minecraft, minecraft let’s play, minecraft adventure, minecraft creative, minecraft builds, minecraft… Read More

  • PandaDoxx SLAYS in Insane Minecraft PvP Edit! 🐼🔥

    PandaDoxx SLAYS in Insane Minecraft PvP Edit! 🐼🔥Video Information This video, titled ‘Smooth Part 2 🗿🤯🔥 #minecraft #pvpedit #lunarclient #pvp #shorts #trending #edit #crazy #edit #sick’, was uploaded by PandaDoxx on 2024-05-17 11:16:05. It has garnered 182 views and 16 likes. The duration of the video is 00:00:05 or 5 seconds. Pretty Cool ey? Tags: (I just copy pasted from random video lol) I’m a Minecraft PVPer and use Lunar Client because you can Boost your FPS with Lunar Client. I know how to butterfly click and how to dragclick and how to jitterclick in minecraft pvp, my butterfly can easy go up to 16 CPS. Sometimes… Read More

  • Insane Giveaway: Unlock Minecraft Marketplace Pass Now!

    Insane Giveaway: Unlock Minecraft Marketplace Pass Now!Video Information This video, titled ‘[GIVEAWAY] Minecraft Marketplace Pass!’, was uploaded by Wild Goat on 2024-04-05 14:08:03. It has garnered 176 views and 18 likes. The duration of the video is 01:50:30 or 6630 seconds. You can have an entire month FREE! I am giving away a code for a subscription to @minecraft Marketplace Pass. 🎉 General Instructions on How to Enter: 1. You need to have Minecraft Bedrock. 2. Be in the chatbox for the bot to see you when the givaway starts 3. Have a twitter or discord account so I can send you the code 4. Play… Read More

  • Insane Pixel Art Profile! Must Watch! 😮 #viralart

    Insane Pixel Art Profile! Must Watch! 😮 #viralartVideo Information This video, titled ‘Epic Profile Pixel Art 😍 (My Fan Comment) #shorts #ytshorts #viral #shortsviral #viralshorts #art’, was uploaded by Itz Warden YT on 2024-01-08 17:24:28. It has garnered 2369 views and 87 likes. The duration of the video is 00:00:20 or 20 seconds. Epic Profile Pixel Art of my fan 😍 Sub to my 2nd channel @ItzWardenYT_2.O #shorts #minecraft #video #pixelart #newvideo #epic #viral #gaming #gameplay #fan #fancomment #logo #logoart #viralvideo #art #trending #trendingshorts #subscribe #sub #like #likes #share #hypixel #itzWardenYT #ytshorts #shortsviral #viralshorts #viralvideo Read More

  • Mind-blowing Minecraft war history revealed! 😱

    Mind-blowing Minecraft war history revealed! 😱Video Information This video, titled ‘Minecraft Historical War 🤣 – Part 8 #shorts’, was uploaded by Manpixel on 2024-04-11 14:00:16. It has garnered 5766 views and 168 likes. The duration of the video is 00:00:58 or 58 seconds. I make you Laugh! 😂😭 Minecraft Content, Memes, Funny, Animation, Building… 🤔🤨 #minecraft #minecraftanimation #minecraftmemes #minecraftshorts #minecraftfunny #funny #cute #mcpe #herobrine #skibidi #skibiditoilet #minecraftohio #minecraftskibiditoilet Read More

  • INSANE Minecraft Clutch with Imagined Dragons Remix!

    INSANE Minecraft Clutch with Imagined Dragons Remix!Video Information This video, titled ‘Minecraft clutch #imaginedragons #art #song #minecraft #viral #remix #gaming #artist #minecraftbed’, was uploaded by NATION_GAMING on 2024-03-16 14:23:28. It has garnered views and [vid_likes] likes. The duration of the video is or seconds. Minecraft clutch #imaginedragons #art #song #minecraft #viral #remix #gaming #artist #minecraftbed. Read More

  • Frank_INC

    smp server survival greek and english friendly server with shop and trades frank-inc o ο καινουργιος κοσμος που εχει οπως και δηποτε την ευκερια να δοκιμασεις και να ενωθεις μαζι μας για νεες περιπετειες frank_inc.apexmc.co:25594 Read More

  • VanillaPlus – Vanilla Whitelist Dynmap

    Always Latest Version! – 1.20.4 – Bedrock Support Welcome to VanillaPlus, a whitelisted vanilla SMP community focused on pure vanilla gameplay. Join us on the latest version of Minecraft (1.20.4) for an enhanced experience with texture packs, data packs, and crafting tweaks. To join, first connect with us on Discord at https://discord.gg/uuTfJydwTs. Then, join with play.vanillaplus.uk to receive a code to DM our Discord bot. All players are welcome to join us in building, farming, and trading at spawn. We’ve recently added support for bedrock and account linking. Come join the fun on VanillaPlus! Check us out on Planet Minecraft:… Read More

  • Minecraft Memes – Minecraft Memes Nowhere Safe

    Minecraft Memes - Minecraft Memes Nowhere SafeLooks like we’ll have to start a new social media platform just for Minecraft memes! Maybe we’ll call it MineBook or CreeperGram. Read More

  • Mine, Craft, Activate: Bedrock Edition PC + Xbox Live!

    Mine, Craft, Activate: Bedrock Edition PC + Xbox Live! In the world of Minecraft, we take flight, Bedrock Edition on PC, shining bright. Activate Xbox Live, with all your might, Let the gaming adventures ignite. Download the trial, start the quest, Solve errors, be the best. Unlock the game, pass the test, Activate Xbox Live, join the rest. Testing Minecraft, see it unfold, End of the journey, stories told. For more gaming content, be bold, Subscribe, share, let the tales be retold. Read More

  • POV: The Laggy Dog I Saved in Minecraft (HILARIOUS)

    POV: The Laggy Dog I Saved in Minecraft (HILARIOUS) POV: Me trying to save the laggy dog in Minecraft but ending up accidentally punching it instead #fail #minecraftstruggles Read More

  • Discover the Thrills of Minewind Minecraft Server

    Discover the Thrills of Minewind Minecraft Server Welcome to Newsminecraft.com, where we bring you the latest and most exciting news from the world of Minecraft. Today, we want to talk to you about something truly terrifying: Siren Head. This skeletal creature has been causing quite a stir in the Minecraft community, with its chilling sounds and ominous presence in the woods. Legends say that Siren Head lures unsuspecting players with familiar noises before launching a terrifying attack. Its spiny body broadcasts a mix of distorted sounds, mimicking voices, music, and even the screams of lost victims. But fear not, brave adventurers, for there is a place… Read More

  • Beating Minecraft in One Stream?!

    Beating Minecraft in One Stream?! Conquering Minecraft in One Stream: A Legendary Feat Embark on a thrilling journey through the pixelated world of Minecraft as our fearless adventurer sets out to conquer the game in a single stream. Armed with determination and a touch of humor, this player dives headfirst into the challenge of defeating the Ender Dragon on the very same day. A Streamer’s Epic Quest Streaming live for all to witness, our intrepid hero takes on the ultimate goal of slaying the formidable Ender Dragon. With meticulous planning and quick reflexes, every move is calculated to ensure success. The excitement is palpable… Read More

  • Zombie Craft: Insane Basement Battle in Minecraft

    Zombie Craft: Insane Basement Battle in MinecraftVideo Information This video, titled ‘THE BATTLE OF BASEMENTS in MINECRAFT’, was uploaded by Zombie Craft on 2024-04-28 09:00:00. It has garnered 8221 views and 73 likes. The duration of the video is 00:27:56 or 1676 seconds. THE BATTLE OF BASEMENTS in MINECRAFT Read More

  • TacoCat’s Epic Adventure: Minecraft Hardcore #92

    TacoCat's Epic Adventure: Minecraft Hardcore #92Video Information This video, titled ‘FAR FROM HOME: MINECRAFT HARDCORE #92’, was uploaded by T a c o c a t on 2024-04-03 19:24:30. It has garnered 47 views and 7 likes. The duration of the video is 02:15:17 or 8117 seconds. Sub Plz 🙂 #minecraft #minecraftshorts #minecraftmemes #minecraftlive #minecraftsurvival #minecrafthardmode #minecraftbuilding #videogames #peesheep #lofimusic #lofihiphop #synthwave #lego #legofortnite #fortnite #betaminecraft #pokemon #shinypokemon #shinyhunting #pokemonswordshield Check out the entire lore at the Pee Sheep Wiki! – https://pee-sheep.fandom.com/wiki/Pee_Sheep_Wiki Read More

  • Insane Minecraft SMP Drama on Day 38!

    Insane Minecraft SMP Drama on Day 38!Video Information This video, titled ‘UNFILTERED SMP DAY 38 | JAVA + BEDROCK + MCPE | #shorts #publicsmp #manishunfiltered #minecraft’, was uploaded by Manish Unfiltered on 2024-05-17 14:14:58. It has garnered 399 views and likes. The duration of the video is 04:03:45 or 14625 seconds. UNFILTERED SMP DAY 38 | JAVA + BEDROCK + MCPE | #shorts #publicsmp #manishunfiltered #minecraft 😎JAVA : PUBLICSMPS01.aternos.me:50937 😎BEDROCK/PE – PUBLICSMPS01.aternos.me 😎Port: 50937 #publicsmpserverminecraftbedrockedition1 #publicsmplive #publicsmpminecraft #publicsmpserverminecraftpe #publicsmpserverminecraftbedrockeditio #publicsmpserver IN THIS LIVESTREAM I AM PLAYING MINECRAFT GAME WITH MY FRIENDS 🙂 WE ARE ENJOYING THIS GAME A LOT THATS WHY I THOUGHT I SHOULD STREAM… Read More

  • Ultimate Survival House Build in Minecraft #41

    Ultimate Survival House Build in Minecraft #41Video Information This video, titled ‘Minecraft : Buildings. Building a house for survival #41’, was uploaded by Builder on 2023-12-28 16:52:10. It has garnered 65 views and 6 likes. The duration of the video is 00:38:16 or 2296 seconds. Dear viewers and subscribers of my channel, a moment of attention! Preface: Among you – subscribers, there is a subscriber who planted the idea under the past video to build a monument to Lincoln… BUT, in this video I decided not to build this monument, because I do not want my channel to shine such a famous person like Lincoln, I… Read More

  • Haunted Minecraft House Tour! Watch the Mine Exploration

    Haunted Minecraft House Tour! Watch the Mine ExplorationVideo Information This video, titled ‘Minecraft Colorless #002 : the house has windows and the mine started’, was uploaded by Miss Halloween on 2024-01-13 21:20:56. It has garnered 171 views and 5 likes. The duration of the video is 00:26:25 or 1585 seconds. in this series there are ALMOST no colors, today we’ll start mining hehe 😀 Texture Pack: https://www.curseforge.com/minecraft/… Mods: https://essential.gg/ https://www.curseforge.com/minecraft/… https://www.curseforge.com/minecraft/… https://www.curseforge.com/minecraft/… Read More

  • B.H.L.Gaming’s CRAZY Minecraft Shorts!

    B.H.L.Gaming's CRAZY Minecraft Shorts!Video Information This video, titled ‘minecraft #shorts’, was uploaded by B.H.L.Gaming on 2024-03-09 06:13:50. It has garnered 565 views and 29 likes. The duration of the video is 00:00:43 or 43 seconds. minecraft #shorts Game  Name – @minecraft  (Bedrock Edition) Hashtags:- #short #shorts #minecraft #gaming #minecraftshorts #minecrafttrendingshorts #montero #lilnasx #shortsfeed #kingfox #story #story shorts #trendingshorts #trend #ytshorts #youtubeshorts #game #tiktokshorts #minecraftstory #gamingminecraft #minecraft Tags Herobrine😈Vs Null Vs All😏Mob Who is😱The Powerful in Minecraft villager Herobrine Vs Null Herobrine Vs Notch Herobrine Vs All Mob Herobrine Vs Steve Steve Vs Null Steve Vs All mob Steve Vs Notch Notch Vs All… Read More

  • Saving Village in Minecraft?! Watch & Learn with Mr India Gamerz!

    Saving Village in Minecraft?! Watch & Learn with Mr India Gamerz!Video Information This video, titled ‘I Save My Village 🔥@minecraft’, was uploaded by Mr India Gamerz Shorts on 2024-02-27 11:12:45. It has garnered 480 views and 21 likes. The duration of the video is 00:00:41 or 41 seconds. Hello guys it’s Minecraft player aahil and free fire player come and play with me @technogamerzofficial @ujjwal @ajjubhai @totalgaming @smartypie @gamerfleet @anshubhisht @anshuvlogs @notgamerfleet @mrindiagamerzshorts @youtube @skibiditoilet @yasrtv @bardach @hakaitv @desigamers @desivlogs @freefireofficial @illegalmoon . . . . Fans 💫 please support me we are team if you join Mig army you started the game I talk for last subscribe 😄 please… Read More

  • 24 Hour Roblox & Minecraft Stream w/ Subs until We DROP! 🚀

    24 Hour Roblox & Minecraft Stream w/ Subs until We DROP! 🚀Video Information This video, titled ‘🔴Streaming Until I pass out! Yaezer’s Live Roblox & Minecraft with Subscribers!’, was uploaded by Yaezer on 2024-05-03 20:30:31. It has garnered 1074 views and 43 likes. The duration of the video is 01:56:29 or 6989 seconds. Welcome to the ultimate late-night gaming extravaganza! Join Yaezer in an epic livestream adventure as he dives into the virtual worlds of Roblox and Minecraft, accompanied by none other than his awesome subscribers! Get ready for a night filled with laughter, thrills, and endless fun as we explore, build, and conquer together. But wait, there’s more! This isn’t… Read More

ZillyGurke – Minecraft Anarchy How to Shot Web: Web and mobile hacking in 2015