Open Redirect Vulnerability Explained

Поделиться
HTML-код
  • Опубликовано: 25 янв 2025

Комментарии • 142

  • @_JohnHammond
    @_JohnHammond 6 лет назад +400

    These are awesome, dude! Happy you see you starting up a show!

  • @loralori57
    @loralori57 2 года назад +15

    This video gives me a ton of information in a clear logical way in 8 min ! I didnt understand or remeber it all but I can do research on the topic easily ! Thank you ! This is helpful

  • @_shariq
    @_shariq 5 лет назад +19

    I always wait for that cool ending ♥

  • @epic_baller123
    @epic_baller123 3 года назад +25

    I hope for the day where I come back to this video and flawlessly understand everything you said

  • @nahmedfaisal
    @nahmedfaisal 6 лет назад +10

    What a great detailed video.. really loved it!
    next time i will just forward this video link, whenever anyone asks me about open redirects.
    You got me subbed and i will wait for more contents from you :)

  • @topicsoninternet
    @topicsoninternet 5 лет назад +5

    Awesome man! After a long time, I found an awesome video. Please continue to upload such content.

  • @THREAT_CON
    @THREAT_CON 6 лет назад +9

    Amazing video dude !! Keep it up. And thanks for the awesome challenge :)

  • @candidojosepargacruz8331
    @candidojosepargacruz8331 6 лет назад +39

    This is explained so simple. And i feel like i still saw a video on Chinese.

  • @abdilahrf
    @abdilahrf 6 лет назад +50

    the next liveoverflow ? focus on web exploitation topic should be good i think, keep it up buddy!

    • @PwnFunction
      @PwnFunction  6 лет назад +32

      I wish, but he's too good. I'm not even close to his knowledge/experience level and he's a person I look up to.
      For now, yes, I'll be focusing on Web, others later.

    • @PlanetComputer
      @PlanetComputer 3 года назад +1

      fghj

  • @thefrozenindie2056
    @thefrozenindie2056 6 лет назад +2

    Subbed Bro keep up the great work and very good quality

  • @surya-ur5vv
    @surya-ur5vv 4 года назад +2

    One of the best video i seen Open Redirection . Thanks for doing this kinds of videos it will be very usefull for beginers

  • @dougthefiddler
    @dougthefiddler 3 года назад +1

    Very clear explanation with simple graphics. Thanks!

  • @Warpgatez
    @Warpgatez 2 года назад

    Just found you and I love all these videos. You got some pretty nice digital handwriting and drawing. That flask logo. 👍

  • @m5rian
    @m5rian 2 года назад

    I love the drawings lmaoo, good video :0

  • @yoeriyoeri4264
    @yoeriyoeri4264 6 лет назад +2

    You've got my sub man! Keep up the good work!

  • @alextotun
    @alextotun 2 года назад

    Very informative, and deep for understanding video! I have blow in my thinking about this..) Thanks! Good luck!

  • @UsamaAli-kr2cw
    @UsamaAli-kr2cw 6 лет назад +1

    Amzing bro keep going u got my sub😍😍

  • @mrkii2056
    @mrkii2056 5 лет назад +7

    Can I call your Mom, Mom? cause You sounded like, you are my big brother, n you explained everything to me so sweetly

  • @alexgarcia9852
    @alexgarcia9852 3 года назад

    The best quality programing content ever
    Ever

  • @carlos.rberto
    @carlos.rberto 4 года назад +2

    Very good explanation! Thank you.

  • @rahulvaswani4966
    @rahulvaswani4966 5 лет назад +1

    Sir please more videos on different vulnerabilitys
    Great video

  • @0x2shadow19
    @0x2shadow19 4 года назад

    Amazing channel. Don't stop making videos like this

  • @vishaldhanani7241
    @vishaldhanani7241 4 года назад +1

    Very clear and good amazing video.I want to learn more such things from you.

  • @yagi_4048
    @yagi_4048 3 года назад

    Wow, this channel is underrated !

  • @hopeme5941
    @hopeme5941 6 лет назад +2

    Your awesome...and your video to good..bro

  • @theprogrammer9308
    @theprogrammer9308 3 года назад

    Why this channel is so amazing 😌

  • @magnoliacomputerscience7334
    @magnoliacomputerscience7334 6 лет назад +2

    Great content here is your sub

  • @supersaiyan0x016
    @supersaiyan0x016 6 лет назад +4

    Great vedio... explained everything so simply 😍 Keep on going... you earned my respect 😀

  • @TNTpeoplenetwork
    @TNTpeoplenetwork 5 лет назад

    I didn't find video like this. Keep it up

  • @tobiasmayer4492
    @tobiasmayer4492 5 лет назад

    Ok, this was awesome! Nice Tut

  • @kabeerjaffri4015
    @kabeerjaffri4015 3 года назад

    I like how chill he is

  • @esmailahmed1457
    @esmailahmed1457 5 лет назад

    keeeeeep going maaaaan .. u are perfect

  • @sodiboo
    @sodiboo 3 года назад +4

    With your download chrome example, don’t most browsers tell you where the file is downloaded from? Firefox would say “ChromeSetup” for what you downloaded and in a smaller line below it “Downloaded from attacker’s website”, could this possibly be faked in a dangerous way (something like how mega does downloads? completely on the page and only sends your browser the finished file, which i guess is intended for stuff you make in-browser, the browser should handle remote downloads, right?) or does the attack only work on browsers that don’t tell you which server it downloaded the file from?

    • @ZoranRavic
      @ZoranRavic 2 года назад +1

      Even if it is displayed I don't see why you couldn't just use a custom domain name that includes the name of the website you're exploiting.

  • @vrindavihari7798
    @vrindavihari7798 4 года назад

    Well Explained, Tq. And BGM , loved it.

  • @luciacanonsantos5171
    @luciacanonsantos5171 3 года назад

    Love your videos! Thanks!!

  • @b.tulsirao7724
    @b.tulsirao7724 5 лет назад +1

    Love your vids👍

  • @Iliasbhal
    @Iliasbhal 4 года назад +2

    How can someone use an open redirect to take over an account?
    - password tokens are not listed anywhere. how can the hacker find the token?
    - even if the token is found, there is a HIGH chance it is expired.
    - even if the token is found, the token is deleted right after the password reset.
    Also if the hacker has the token, why not directly resetting the password himself?

    • @Iliasbhal
      @Iliasbhal 4 года назад

      Also, I've just discovered this channel, and it's a gem!

  • @selvamanir8671
    @selvamanir8671 2 года назад

    Your contents are valuable for self-learners

  • @mohammedal-shaboti7939
    @mohammedal-shaboti7939 6 лет назад

    Very good explanation, you are awesome.
    Thaaaaanks

  • @RAZREXE
    @RAZREXE 3 года назад

    And thus, a legend was born

  • @karimdhrif6679
    @karimdhrif6679 5 лет назад

    Thank you for making great content!

  • @redactedansh
    @redactedansh Год назад

    Well explained! ❤️

  • @0xyg3nSecurity
    @0xyg3nSecurity 4 года назад

    YOOOO Social Engineering is an essential skill because we all know when 'something' does not brake from the outside it does from the inside and of course the human factor will always be vulnerable.

  • @realadam_official
    @realadam_official 3 года назад

    A really good one! Thank you!

  • @noobsecurity5401
    @noobsecurity5401 6 лет назад +1

    nice explanation, got subs from us :)

  • @oxovi
    @oxovi 6 лет назад

    Ur rocking dude
    Love u 😘

  • @theprogrammer9308
    @theprogrammer9308 3 года назад

    I love the music at beginning

  • @Siik94Skillz
    @Siik94Skillz 5 лет назад

    Please your videos going, they are amazing

  • @Astrx-kc6lr
    @Astrx-kc6lr 4 года назад

    I discover ur channel now, cool man!

  • @normalitee0os
    @normalitee0os 2 года назад

    MAN!!! Your explanation just drilled the concept hole in my brain! I finally understand How is this a vulnerability and the Thomas Example was cherry on cake! It gave a good understanding~

  • @CheckersX
    @CheckersX 2 года назад

    Awesome videos.

  • @tanmaynayak6169
    @tanmaynayak6169 5 лет назад +1

    Awesome..

  • @zeqizhang5860
    @zeqizhang5860 5 лет назад +1

    nice work!!!

  • @bina7513
    @bina7513 3 года назад

    PwnFunction: What could possibly go wrong?
    Me: Everything.

  • @aneeshnadh5377
    @aneeshnadh5377 4 года назад

    This is really informative

  • @mayurparmar5509
    @mayurparmar5509 4 года назад

    awesome content bro

  • @Stormflower
    @Stormflower 2 года назад

    I was looking for an Olivia Rodrigo audio file, and I found a website that redirected me to some website where the screen said something about my iPad having 19 viruses....

    • @Seb2-t4n
      @Seb2-t4n 21 день назад

      Wait what happened after

  • @PyaeSone-gd4ui
    @PyaeSone-gd4ui 4 года назад

    Absolutely brilliant

  • @msodev
    @msodev 6 лет назад +1

    Cooooooooool channel. but plz place those browser window green, yellow and red buttons on the left :)

    • @PwnFunction
      @PwnFunction  6 лет назад

      see 2:20, I'm just following what I have XD

    • @msodev
      @msodev 6 лет назад

      @@PwnFunction damn you're right! right... got it??? ahhahahahaha

    • @msodev
      @msodev 6 лет назад

      @@PwnFunction i'll pay more attention next time XD

  • @RelabTV
    @RelabTV 2 года назад

    you explain this so clearly and so well. good work!

  • @pets4363
    @pets4363 Год назад

    Can you change the auto-generated subtitles for this video from Korean to English?

  • @abdellahamud7328
    @abdellahamud7328 5 лет назад

    Just got my equipments to start hunting thanks alot

  • @thefoxguy
    @thefoxguy 3 года назад +1

    If I make a open redirect and if it redirects out of the site I show a Warning that you are leaving the site.
    (I coded so everytime ANY redirect is ran it shows the warning first, then redirects to the target after accepting
    It shows the URL it is redirecting to and with a Fat Warning text

    • @thefoxguy
      @thefoxguy 3 года назад +1

      ( this is for user generated content, for internal redirects I use backend anyways without NEXT or so parameter )

    • @NStripleseven
      @NStripleseven 3 года назад +1

      That’s one way to fix it, yeah. Might be a little annoying for the user, but it does work.

  • @harshant1
    @harshant1 6 лет назад

    quality content ....... awesome

  • @sumspiew
    @sumspiew 6 лет назад

    Good content and explanation!:)

  • @joachim4660
    @joachim4660 3 года назад +3

    Awesome video!
    Also, it's better to send tokens via POST method rather than GET. That could solve the issue, but still very well demonstrated. 👍

    • @tycooperaow
      @tycooperaow 2 года назад

      Why do you claim so?

    • @joachim4660
      @joachim4660 2 года назад

      In the given example, the token leak could have been easily prevented by sending the token in the body or header, not as a part of the URL. But yeah, I was wrong, method has nothing to do with it. It's about having the token in the URL.

  • @santoslily7430
    @santoslily7430 5 лет назад

    Great vedio! But where can I find the english caption?

  • @aungkyawphyo4069
    @aungkyawphyo4069 4 года назад

    btw I like your drawing XD

  • @gustavstreicher4867
    @gustavstreicher4867 3 месяца назад

    So, I guess it's important to resolve the URL before checking against it.

  • @dylanriley2770
    @dylanriley2770 3 года назад

    fantastic videos wow

  • @ankitpatel-tr1wc
    @ankitpatel-tr1wc 6 лет назад +1

    Awesome content

  • @ignitor9941
    @ignitor9941 5 лет назад +1

    Awesome

  • @sayidshayan7610
    @sayidshayan7610 2 года назад

    How an attacker change url parameters on a website into desired url

  • @caohocnguyen7847
    @caohocnguyen7847 2 года назад

    I try to simulate the code in the end of the video and trigger XSS, but i can not trigger XSS. Could anyone help me ?

  • @techworld3043
    @techworld3043 2 года назад

    what do you use to create these videos ?

  • @psm876
    @psm876 4 года назад

    You are awesome...

  • @mrmedia7866
    @mrmedia7866 3 года назад

    please answer to me, what is the name of this app?

  • @vakyz5333
    @vakyz5333 4 года назад

    Great content

  • @xnl-h4ck3r
    @xnl-h4ck3r 4 года назад

    I was just watching through your video again, but needed subtitles... "Korean (auto generated)"?! That confused me for a second! :)

    • @PwnFunction
      @PwnFunction  4 года назад +1

      RUclips works in mysterious ways.

  • @slaxblake
    @slaxblake 5 лет назад

    Hey! if the websites instead of redirecting to another domain, loads content from the domain you select, does count as a vulnerability? how can i exploit it?

  • @_shariq
    @_shariq 3 года назад

    Can you please tell me the name of your terminal fonts?

  • @the_coding_traveller
    @the_coding_traveller 3 года назад

    i like the way how you said INTERNET EXPLORER whahahaha

  • @michael-gary-scott
    @michael-gary-scott 6 лет назад +5

    Oh boy. I'm totally guilty of this one.

  • @uwuster
    @uwuster 4 года назад

    Is your intro a wireshark packet? XP

  • @yoeriyoeri4264
    @yoeriyoeri4264 5 лет назад

    What program did you use for the drawings?

    • @PwnFunction
      @PwnFunction  4 года назад +2

      Adobe Animate.

    • @boo9007
      @boo9007 3 года назад

      @@PwnFunction ❤️

  • @zunigasecurity
    @zunigasecurity 3 года назад

    So beautiful

  • @freddiemercury6808
    @freddiemercury6808 6 лет назад +2

    Good video! the flickering when some (wrong) drawing is removed is really annoying though.

  • @charlesmacklon9222
    @charlesmacklon9222 4 года назад

    It's awesome

  • @r4nd0m25
    @r4nd0m25 3 года назад

    Please put the english subtitles

  • @TheIndiaView
    @TheIndiaView 3 года назад

    Just found like 10 open redirects on a site and it's other domains. will try to escalate those 😉

  • @umeshpatil5654
    @umeshpatil5654 6 лет назад +1

    How we can get token as it is seCret token ?

    • @PwnFunction
      @PwnFunction  6 лет назад

      From `Referer` header, which contains the address of the previous web page and in the url, there's the token. Only exploitable if the token is not expired or reusable or not used.

  • @subzey
    @subzey 2 года назад

    1:00 Luckily PHP removes all the newlines in the header() argument or else it could be much more interesting :D

  • @elysamsepi0l703
    @elysamsepi0l703 3 года назад

    Someone knows which theme the editor use in vscode?

  • @lekenn2920
    @lekenn2920 3 года назад

    God , i didn't understand anything. but i will😎

  • @selvamanir8671
    @selvamanir8671 2 года назад

    Bro put videos regularly

  • @yumpy09
    @yumpy09 6 лет назад

    make more vids about web hacking... nice job

  • @mcmundn8544
    @mcmundn8544 5 лет назад

    idk anything of those topics. i like your video style tho.

  • @______373
    @______373 2 года назад

    You are saying me to find a bug in a language I don't know and I still think I don't understand it bcz I'm dumb xD.

  • @sorteador4889
    @sorteador4889 3 года назад +1

    Paramiter?
    Parameter.

  • @SpiritTracker7
    @SpiritTracker7 4 года назад

    I think my site was being targeted... I noticed in AHrefs that I started getting a lot of backlinks structured like "maps.google.bj/url?q=mywebsite dot com"... they were coming all different similar links images.google.bj, google.im/url?q=mywebsite, etc etc... several hundred, at first I wondered if it was a competitor spamming backlinks.. but my questions is how do they get such a URL as maps.google.bj/url?q=mywebsite dot com indexed on google? It appeared to actually boost my metrics on Ahrefs but I think it maybe toxic on google side of metrics? Are you familiar with this? Are they permanent backlinks or are they blips and are gone in no time? So BIZARRE... can't tell if it's an attack or if its boosting metrics.