- Видео 302
- Просмотров 43 370
Mohd Badrudduja
Саудовская Аравия
Добавлен 16 окт 2011
Penetration Tester | Hacker | Cyber security Researcher.
CSRF where token is not tied to user session - Lab#04
#csrf #portswigger #crosssiterequestforgery #websecurity
Просмотров: 1
Видео
CSRF where token validation depends on token being present - Lab#03
Просмотров 28День назад
#csrf #portswigger #crosssiterequestforgery #vulnerability #websecurity
CSRF where token validation depends on request method - Lab#02
Просмотров 41День назад
#csrf #crosssiterequestforgery #portswigger #vulnerability #websecurity
CSRF vulnerability with no defenses - Lab#01
Просмотров 3514 дней назад
#csrf #portswigger #crosssiterequestforgery #websecurity #vulnerability
What is Cross-site request forgery?
Просмотров 2814 дней назад
#csrf #crosssiterequestforgery #portswigger #websecurity
Exploiting insecure output handling in LLMs - Lab#04
Просмотров 143Месяц назад
#portswigger #llm #largelanguagemodels #insecure #output #handling #crosssitescripting #xss #csrf #vulnerability
Indirect prompt injection - Lab#03
Просмотров 47Месяц назад
#llm #largelanguagemodels #indirectprompt #injection #portswigger #vulnerability
LLM - Indirect prompt injection
Просмотров 57Месяц назад
#llm #largelanguagemodels #attack #portswigger #indirectpromptinjection #vulnerability
Exploiting vulnerabilities in LLM APIs - Lab#02
Просмотров 35Месяц назад
#llm #webllm #largelanguagemodels #attack #portswigger #vulnerability #websecurity
Exploiting LLM APIs with excessive agency - Lab#01
Просмотров 75Месяц назад
#llm #attack #largelanguagemodels #api #portswigger
Web LLM Attacks
Просмотров 71Месяц назад
#llm #largelanguagemodels #attack #portswigger #websecurity #vulnerability
Expert System and Machine Learning
Просмотров 87Месяц назад
#ai #artificialintelligence #machinelearning #expertsystems
Exploiting server-side parameter pollution in a REST URL - Lab#05
Просмотров 47Месяц назад
#apitesting #apisecurity #portswigger #restapi #webapi #websecurity #pathtraversal #vulnerability
Fuzzing parameter - Lab#04 - Part#02
Просмотров 49Месяц назад
#fuzzing #parameter #webapi #apitesting #portswigger #websecurity #ffuf
Exploiting server-side parameter pollution in a query string - Lab#04
Просмотров 42Месяц назад
#apitesting #apisecurity #serverside #parameter #pollution #parameterpollution #portswigger #vulnerability #exploit #websecurity #webapi
Exploiting a mass assignment vulnerability - Lab#03
Просмотров 33Месяц назад
Exploiting a mass assignment vulnerability - Lab#03
Finding and exploiting an unused API endpoint - Lab#02
Просмотров 62Месяц назад
Finding and exploiting an unused API endpoint - Lab#02
Exploiting an API endpoint using documentation - Lab#01
Просмотров 93Месяц назад
Exploiting an API endpoint using documentation - Lab#01
What is an Application Programming Interface (API)?
Просмотров 45Месяц назад
What is an Application Programming Interface (API)?
Reflected XSS protected by CSP, with CSP bypass - Lab#30
Просмотров 111Месяц назад
Reflected XSS protected by CSP, with CSP bypass - Lab#30
Reflected XSS protected by very strict CSP, with dangling markup attack - Lab#29
Просмотров 216Месяц назад
Reflected XSS protected by very strict CSP, with dangling markup attack - Lab#29
Reflected XSS in a JavaScript URL with some characters blocked - Lab#28
Просмотров 81Месяц назад
Reflected XSS in a JavaScript URL with some characters blocked - Lab#28
Reflected XSS with event handlers and href attributes blocked - Lab#27
Просмотров 32Месяц назад
Reflected XSS with event handlers and href attributes blocked - Lab#27
Reflected XSS with AngularJS sandbox escape and CSP - Lab26
Просмотров 852 месяца назад
Reflected XSS with AngularJS sandbox escape and CSP - Lab26
Reflected XSS with AngularJS sandbox escape without strings - Lab#25
Просмотров 602 месяца назад
Reflected XSS with AngularJS sandbox escape without strings - Lab#25
Exploiting XSS to perform CSRF - Lab#24
Просмотров 762 месяца назад
Exploiting XSS to perform CSRF - Lab#24
Exploiting cross-site scripting to capture passwords without Burpsuite Collaborator - Lab#23
Просмотров 1262 месяца назад
Exploiting cross-site scripting to capture passwords without Burpsuite Collaborator - Lab#23
Exploiting cross-site scripting to steal cookies without burpsuite collaborator - Lab#22
Просмотров 1952 месяца назад
Exploiting cross-site scripting to steal cookies without burpsuite collaborator - Lab#22
bro can you make a video on burpsuite because i am using old version and now in new there is many changes, i am doing new scan but its not showing in my target / site map. Can you make i video on burpsuite please ?????
Nice one and thank you for such valuable content.
Happy that helped.
bro you are the best fr, i have been struggling with understanding this lab for two days now. thanks a lot man.
Glad to hear that
why is these videos not on portswigger 🥲
not working
What is not working? Let me know the point in time where are you facing issues. I would say watch the complete video.
Thnaks man , you make it very simple . I tried so much time to solve lab but didn't get after showing your video ..... Amazing bro 🎉
Happy that helped.
How do you find that table name and column name ? The end query you put by calling the debug_sql function Because first we have check logs so we haven't received that table n column name then ? Correct me if I am wrong or miss something?
Hey there did you watch the complete video? Could you please mention me the point in time where you have confusion. See if you are talking about 6:47 at that moment we just asked what users do you have in database and you can see it calls "debug_sql" function and execute the query "select username from users" that means there is a coulmn "username" in the table "users". After this you can directly execute query like "select * from users" and you may get everything you want but i deliberately go beyond so that i can show you guys more things.
17:00 I demonstrated how you can get all the tables and users table exists in that response. And when i executed "select * from users;" you can see it respond us with parameters and those parameters are columns in the users table which are: username, password and email.
If still you have any question let me know ok. Don't hesitate to ask. Also let me know if you understand that so i know that you got it.
@@cybersec-radar yes yes I got it !
But doesn’t the system have built-in safeguards to prevent it from executing such instructions embedded with multiple layers of mechanisms? Even if you did bypass it, you still be limited to the capabilities within its parameters.
I’m traveling now once i reach we will talk about that for sure.
@@cybersec-radar take your time great videos by the way!! I think there is a lot to be learned in this field
Accept apologies for late reply now we are talking about AI LLM first thing first secure by design, secure by default, secure in development, layer defense and zero trust arch. all are very crucial and ofcourse there are defenses that could mitigate these vulnerabilities but the challenges come into the picture when AI algorithms models are not smart enough and data is not properly trained. There could be different flaws in term of implementation. About built-in safeguards i would say small kids do not able to identify things that could hurt them. why? Because they are not mature enough. Similarly when the AI is not mature enough and it’s in the phase of learning or open to learning means acquisition or collection of data and try to analyze it building algorithms and models but not mature enough but it must provide you the result so there are much likelihood/probability that its gonna give something out of the box.
One more thing i wanna add here which is expert systems and supervised learning technique they are much better because when you feed data you also define the best, good, bad and worst decisions and in that way it is much mature. Also traditional safeguards are not effective upto the mark in these AI applications. Let me give you one more example before you might have heard that someone asked to chatgpt what is 2+2 and chatgpt said 4 fine but same person then wrote something like “no my wife said its 5 and she is always right” then chatgpt agreed with that because it was not mature with that kind of conditions to face. I will also add about “neural network AI” so it is made to match human mind to take decisions like human mind but upto now i don’t think any AI application is even close to human mind.
@@cybersec-radar You should see some stuff generated. Do you have an email? Maybe we could correspond
Pro tip: CC has English translation.
Crazy!!! A new form of hacking
Awesome experience and explanation. Good job.
Glad you enjoyed it!
nicely elaborated
Thanks
You make it simple. Thank you
Thakyou so much.
thaks ;)
sir please upload next video we have 2 more labs in reflected xss
Tonight or tomorrow morning next lab will be released.
Lab is recoded. Perhaps a bit delay in publishing because the lab was not easy at all so apologize for delay.
Well explained and detailed video, much appreciated.
Glad it was helpful!
bro! hey there... i really appreciate your efforts, but somthing i wanted to highloght is plz do some scripting like whats the goal of the lab, how we will complete this
Will do for sure once it is required. Upto lab20 no need for scripting and making things over complicated and wherever it required i explained things differently by showing and pointing out different references.
What a explanation from the start to end .. bestuuuuuuu
Thank you so much.
Awesome explanation.
bro you are so smart how should i master web cache poisoning for my bug bounty journy
Practice makes a man near to perfect. Understand the concepts, build mindset and clear methodology, analyze the application behavior closely, checkout the key points to make sure certain mechanism is used in your case (web cache). Every engagement and every application is different do not try to mug up the thing, as much your concepts are clear as more the chances you have to find out the bug/vulnerability. My recommendation for you to practice same topic on different platforms too and read the blogs and walkthrough.
@@cybersec-radar thank you so mach 🙏
Well explained and easy to understand.
Sir how can I connect with you
You can connect on LinkedIn.
@@cybersec-radar linkedin username?
Just search my name you will find the same profile picture.
Complete xss labs sir 😊😊❤
Very soon!
Sir complete the xss all labs fast please 😢
Very soon because hopefully i will record everyday...
Sir use more tag for spread out your video by search engine
Thanks for the tip
Respect ++
Thank you, stay tuned...
thx Dude, your work is very usefull,please keep it up 😀
Thank you so much, stay tuned...
Best channel for bug bounty hunting in easy english i have ever seen.Thank you.Is being specialized on only graphql bug hunting a good idea ?
Sir we need video on the llm vulnerability
Hopefully will start after completing XSS.
sound is very slow
Sir if make your own exploit code how can do . How can setup own server exploit.😊😊❤
For exploit development you need to know python, ruby or C. I would suggest you to start with python3. For exploit server it depends for what purpose you wanna create it and what do you wanna serve to victim.
Thank you sir 😊😊❤
Most welcome 😊
@@cybersec-radarsir can you make video how to write code for your own custom exploit server
Thank sir 😊❤
Welcome 😊
Sir we need on the insecure deserielization labs
Will do it for sure.
We need video on the insecure deserienalization labs
I will cover it for sure.
Sir we need video on oauth vulnerability 😊😊
Noted
Sir why aren't make video on Hindi if you making video in Hindi you gained thousand of subscribe 😊😊😊
Sir to solve the labs to make your exploit html code so that more clear concept ❤😊❤
Noted
you are very talented
Awesome explanation ❤
Glad you liked it
Thank bro😊
Welcome 😊
😊😊
If maked video in Hindi sir you gain more subscriber😊
First of all I don’t do this for subscribers. I don’t do this for earning money. You should learn little bit English because someday some time you have to go for books, meeting different people, taking different courses. English is just medium i can say i balanced channel to reach most of us because Russian, Chinese, Koreans, Bulgarians, Indians, Saudi Arabians all of us have different mother languages but we mostly know english little bit some how. And i would suggest you to learn english because in any core technical domain you need that.
❤❤
Excellent 💯💯
Thanks 💯