Finding Your Next Bug: Blind Cross Site Scripting (XSS) & XSS Hunter

Поделиться
HTML-код
  • Опубликовано: 15 ноя 2024

Комментарии • 37

  • @velurubharath8929
    @velurubharath8929 4 года назад +6

    Video is pretty good. Everytime I needed motivation to continue in bug hunting, your channel notification comes up. Please continue your amazing work.

    • @InsiderPhD
      @InsiderPhD  4 года назад +6

      Keep working on it, you’ll get it you just need time, practice and determination!

  • @StefanRows
    @StefanRows 4 года назад +1

    I really forgot to sub last time. Error corrected, great stuff Katie! Looking forward for more :)

  • @ajith1804
    @ajith1804 4 года назад +1

    I always feel smooth when you share your computer screen. Is it me or Is it to everybody?

  • @nebdar4340
    @nebdar4340 4 года назад

    Love the videos you explain everything so well! any plans on making a video about XXE in the near future?

  • @velurubharath8929
    @velurubharath8929 4 года назад

    Hi. I just started viewing the video. Will comment once it is over. :)

  • @darkyolks
    @darkyolks Год назад

    XSS Hunter no longer accepting sign ups :(

  • @TheBashir007
    @TheBashir007 2 года назад

    Kida dumb question
    If one injects xss payload into http header what would be the impact
    Will it work

  • @bugbountynotebook5215
    @bugbountynotebook5215 3 года назад

    great film

  • @lukaslokillo
    @lukaslokillo 4 года назад

    Very nice work! Next could you go in deep with this? for example, where each xss hunter's payloads works? or which can we use depending scenario? Regards!

    • @InsiderPhD
      @InsiderPhD  4 года назад +1

      Yeah for sure I'll definitely put that on the todo list

  • @tsrisanath8441
    @tsrisanath8441 4 года назад +1

    31% I think it's 21.8% at 3:31 if I am not wrong

  • @Free.Education786
    @Free.Education786 2 года назад +1

    Can we upload SHELL via XSS ? Or similar vulnerabilities exploitation methods like LFI, RFI, RCE to "upload SHELL" in web server directory to gain root access ? 🤔 . If yes, then please do educate us because I submitted many XSS popup vulnerability reports to HackerOne BugCrowd Integrity but all were rejected due to missing SERIOUS IMPACT. Hope to hear from you soon. Thanks 🤝 ❤💚💙✌💯👍

  • @simone8504
    @simone8504 4 года назад

    Thank you for the content!👍

  • @Shogunxd3-vp9jv
    @Shogunxd3-vp9jv 4 года назад

    Awesome-sauce! Many thanks!

  • @aayushkawathekar1922
    @aayushkawathekar1922 4 года назад

    Hey Katie ! Your explanation is better when you make long videos like for 40-50 min. It will help if you make that type of content more! thank you!

    • @InsiderPhD
      @InsiderPhD  4 года назад +1

      Thanks for the tip! Unfortunately with making a video a week it can be quite difficult to manage an hour video so I can't always make very long videos!

    • @aayushkawathekar1922
      @aayushkawathekar1922 4 года назад

      @@InsiderPhD Surely can understand the effort it takes to do it! Much appreciated....Maybe once a month try uploading a detailed video!

  • @hemanth1260
    @hemanth1260 4 года назад

    Great content as always

  • @possib1esec71
    @possib1esec71 4 года назад

    Awesome voice and content.

  • @TheZakMan87
    @TheZakMan87 3 года назад

    Weird, 2021 the screenshot API is not working anymore. Yours too?

  • @che3tah205
    @che3tah205 4 года назад

    19:00 isn't that LocalTapiloa? in the report??

    • @InsiderPhD
      @InsiderPhD  4 года назад +1

      Yup! They’re really great at disclosing stuff I’ve used their vulns a few times

  • @Dpower
    @Dpower 4 года назад

    Thx for you all job))

  • @aravindv6765
    @aravindv6765 3 года назад

    Blind XSS is very critical?

    • @InsiderPhD
      @InsiderPhD  3 года назад +1

      Depends on the context! Sometimes the impact can be huge like compromising an admin account, sometimes not so much!

  • @emreru5687
    @emreru5687 4 года назад

    Very Nice

  • @GnaRled77
    @GnaRled77 4 года назад

    XSShunter is not work with me why ??

  • @StephenOgu
    @StephenOgu 4 года назад

    I love this

  • @FIDAHUSSAIN
    @FIDAHUSSAIN 4 года назад

    ❤️❤️❤️

  • @pentestereleet9591
    @pentestereleet9591 4 года назад

    ❤️

  • @vinhnguyen-work
    @vinhnguyen-work 4 года назад

    Hello pro. It is perfect. Please share slide :))))

    • @InsiderPhD
      @InsiderPhD  4 года назад

      No slides, sorry. These videos take a long time to research and I want to make sure that if they are re-presented that they will be accurate.

  • @ordigen_brc20
    @ordigen_brc20 Год назад

    alert('botah of wotah')

  • @expert2570
    @expert2570 4 года назад

    i love your tuts but please my eyes is fucked due this white background