Which XSS payloads get the biggest bounties? - Case study of 174 reports

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024

Комментарии • 46

  • @quad7375
    @quad7375 Год назад +3

    just found you. veeerrry interesting channel. as someone who learns by watching a massive amount of poc videos on one topic, i like how you take the analysis deeper. finally a channel that doesnt have the redundant "how to hack" videos.

  • @dhyeychoksi5178
    @dhyeychoksi5178 Год назад +7

    Fantastic video. Highly informative!

  • @yaseen7749
    @yaseen7749 Год назад +1

    This video is Diamond. Awesome mate very well explained. Gonna signup with BBRE soon.

  • @_CryptoCat
    @_CryptoCat Год назад +4

    Great video! Do you compile the spreadsheet data manually during your research (13:30) or do you automate with some scripting/scraping?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад +3

      Thanks!
      I start off with reports from PentesterLand, then I add a Google webscrape from Hackerone and then I add a few more reports from my memory/Pocket/etc.

  • @rysiacz
    @rysiacz Год назад +3

    is one of the shortest xss payloads, maybe that's why they are use more often

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад +1

      good point!

    • @anonymousx_x3842
      @anonymousx_x3842 Год назад

      Is there any way to bypass = blacklisted?
      Svg runs fine even creates its structure in code base but script tag and = are blocked on a url I'm testing with.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад

      @@anonymousx_x3842 are you sure you are URL-encoding the = in the URL? If yes, then I'm not aware of a bypass.

    • @trustedsecurity6039
      @trustedsecurity6039 7 месяцев назад

      From my experience on the client i pentest img tag is better, 95% of the time svg doesnt work when img does

    • @trustedsecurity6039
      @trustedsecurity6039 7 месяцев назад

      Maybe try a javascript:alert(1)

  • @diegor.mackenzie1593
    @diegor.mackenzie1593 Год назад +3

    Love your vids. The other day I was messing around with a page and found an html injection, I was wondering if there was a way to escalate it to an XSS if the "=" sign is sanitized and leads me to a 403 Forbidden. Thanks!

  • @MrSettler
    @MrSettler Год назад

    Awesome analysis!!

  • @محمّد.09
    @محمّد.09 Год назад +1

    LOVE YOUR VIDEOS
    I know HTML. Currently learning JavaScript. Then I'll put my hand on portswigger labs starting from xss then idor then business logic bugs.
    *My Questions are:*
    should I watch your channel from oldest or newest or most popular?
    should I continue with the approach I wrote above?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад

      I think XSS is actually quite a complex bug class to start with. I'd rather go with access control, IDORs, business logic etc. And yes, Portswigger lab is the resource to go.
      I think watch my channel from newest

  • @_bergee_
    @_bergee_ Год назад +1

    Ten film zawiera lokowanie produktu :)

  • @emilisha-in4xl
    @emilisha-in4xl 9 месяцев назад

    This is Gold man 💥

  • @OthmanAlikhan
    @OthmanAlikhan Год назад

    Thanks for the video =)

  • @brutexploiter
    @brutexploiter Год назад +1

    Can you share the template...No need database

  • @stevesharma6521
    @stevesharma6521 Год назад +1

    What platform will u suggest for leaning bug bounty?

  • @ruttalaabhinav8105
    @ruttalaabhinav8105 Год назад

    Correct me if i am wrong. Can we get XSS on 404 pages.

  • @kalki-fo3ie
    @kalki-fo3ie Год назад

    Can You Share About the BB Automation !

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад +1

      Yes but I'd have to invite someone for that because I don't do any automation

    • @kalki-fo3ie
      @kalki-fo3ie Год назад

      @@BugBountyReportsExplained thanks, Waiting :)

  • @akshaypandey4761
    @akshaypandey4761 Год назад

    Hello brother I am also doing bug bounty but not getting success

  • @ali-barznji
    @ali-barznji 7 месяцев назад

    I love you bro ❤

  • @Al-rt3ec
    @Al-rt3ec Год назад

    is there step how to do for bug bounty each report ?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад

      hm?

    • @Al-rt3ec
      @Al-rt3ec Год назад

      @@BugBountyReportsExplained Excuse me what do you mean? i mean when i subscribed is there what does i mean?

    • @firzainsanudzaky3763
      @firzainsanudzaky3763 7 дней назад

      ​@@Al-rt3ec Bro he questioning your question, it doesn't make sense

  • @rix4uni
    @rix4uni Год назад

    Can you share the notion list

  • @x.plorer
    @x.plorer Год назад +3

    Not 'E'mg tag but 'I'mg tag 😶‍🌫

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад +3

      true, I was reading it more in polish than in english

    • @yaseen7749
      @yaseen7749 Год назад

      😂 exactly i was too scratching my head for the payload which starts from Emg. later i followed his track

  • @vivekkhandagre9274
    @vivekkhandagre9274 Год назад

    i love you bro 🥰😍🤑

  • @Ajax-1432
    @Ajax-1432 2 месяца назад

    Every website would be vulnerable since you are injecting the script into the console yourself. This is not valid

  • @eyephpmyadmin6988
    @eyephpmyadmin6988 Год назад

    Would be interested in using this info as a ML training set

  • @akshaypandey4761
    @akshaypandey4761 Год назад

    Can you help me

  • @Abhi-yc6xs
    @Abhi-yc6xs Год назад

    can you give this cheet sheet in pin comment

  • @trustedsecurity6039
    @trustedsecurity6039 7 месяцев назад

    Better to use than the quoted one