Live XSS Exploit: Using XSSFuzz to Break CSP on a Real Target!

Поделиться
HTML-код
  • Опубликовано: 4 фев 2025

Комментарии • 45

  • @BePracticalTech
    @BePracticalTech  4 месяца назад +6

    xssFuzz: github.com/Asperis-Security/xssFuzz/

  • @MustafaGains
    @MustafaGains 4 месяца назад +4

    This tool really helpful and time saving. it’s just give us a hint of weakness points in the CSP So that we can move forward to focus of this weakness to get an xss. ppl really dont even wanna read about the tool to understand what’s the tool purpose and what’s doing for us to use it correctly.

  • @chhavidudeja
    @chhavidudeja 3 месяца назад

    Amazing! I really enjoyed the whole video and took notes. I will be using this tool soon. Keep doing the great work :)

    • @BePracticalTech
      @BePracticalTech  3 месяца назад

      Really glad that you liked the video, Thanks for the support!!

  • @ehimuanfrancis3225
    @ehimuanfrancis3225 2 месяца назад

    I love the way you teach and also use real website for it ❤

  • @Muby_Ajiwa
    @Muby_Ajiwa 2 месяца назад

    Thanks you so much i really enjoy watching your videos keep it up

  • @haxonit
    @haxonit 4 месяца назад

    finally found a video where the youtuber is not saying to test out random payloads

  • @paramjeetsinghthiara1807
    @paramjeetsinghthiara1807 4 месяца назад +1

    Great! 👍 Got to learn new technique

  • @franciscomesquita2023
    @franciscomesquita2023 4 месяца назад

    Very good" More videos on xss stored.

  • @raghs3889
    @raghs3889 4 месяца назад

    nice video... thank you very much

  • @the_watson
    @the_watson 4 месяца назад

    Form your video I learn new thing osm

  • @abdulx01
    @abdulx01 4 месяца назад

    This is like generation base fuzzing. But its not enough to break sanitizer waf. You can add more mutation strategies.

    • @BePracticalTech
      @BePracticalTech  4 месяца назад

      We'll release more new features in the upcoming versions

  • @danielorji1829
    @danielorji1829 29 дней назад

    Hi, can this tool be used on Web3 sites also to find XSS?
    Because I’ve literally tried testing for XSS with other tools in web3 websites(that’s the Frontend part not the smart contract part) and it seems not to work or bypass whatever cloudfare WAF that has been put in place

  • @RajuHa-g3m
    @RajuHa-g3m 4 месяца назад

    Make a video on dom base xss please

  • @Offended.
    @Offended. 4 месяца назад

    great content

  • @CyberSecHemmars
    @CyberSecHemmars 4 месяца назад +2

    I was testing a web app and I injected a simple XSS alert(); but after reading the source, i noticed that the dangerous character were swapped with HTML escape character, for example "

    • @BePracticalTech
      @BePracticalTech  4 месяца назад +2

      Generally they are considered to be safe! However there are certain scenarios where we can still get xss if the mitigation is weak or if it the value is reflecting in some interesting areas( like within a js code etc)

  • @TheStoicTales
    @TheStoicTales 4 месяца назад +6

    Normally people already know what is xss-dom-reflected...etc...Please next time go straight to the point/pentest to the live target. Thanks for the video,keep it up

  • @raghs3889
    @raghs3889 4 месяца назад

    Hey you did not specify the "title" parameter, how did the tool show that parameter is vulnerable without you specifying the parameter in the syntax? did it check other parameters that are there in the url already or am i missing something?

    • @BePracticalTech
      @BePracticalTech  4 месяца назад

      Exactly, it will check all the parameters and then start testing the one which is not handling the dangerous chars properly

  • @swathipinky1605
    @swathipinky1605 4 месяца назад

    can you give me that index code that you have used to execute xss

  • @uttarkhandcooltech1237
    @uttarkhandcooltech1237 4 месяца назад

    ❤❤❤❤ love u bhai

  • @musabsk
    @musabsk 4 месяца назад

    is it possible to test multiple urls at a time, kindly suggest

    • @BePracticalTech
      @BePracticalTech  4 месяца назад

      @@musabsk I believe Asperis Security will release this feature in the next version!

  • @vongochoanglam6328
    @vongochoanglam6328 4 месяца назад

    can u rcm me the book or course tutorial for ctf web exploit

  • @akhilreddy9753
    @akhilreddy9753 4 месяца назад

    Should we do it by giving blind xss payload also

    • @BePracticalTech
      @BePracticalTech  4 месяца назад

      Please elaborate

    • @akhilreddy9753
      @akhilreddy9753 4 месяца назад

      @@BePracticalTech you are created you own server and add the path where you setup the T.txt file . Instead we also do like same thing in blind xss payload also . Like

    • @RajuHa-g3m
      @RajuHa-g3m 4 месяца назад

      He want to say like he gives his blind xss payload and then check for xss but it doesn't make any sense he can try manually also for blind xss ​@@BePracticalTech

  • @harisfirdousshah9164
    @harisfirdousshah9164 Месяц назад

    bro can u please forward me that test folder

  • @csstestusr
    @csstestusr 4 месяца назад

    Sir which vps u r using?

  • @govindkumarjha2500
    @govindkumarjha2500 4 месяца назад

    It accept payload like: ">alert(1) ???

  • @SecureByBhavesh
    @SecureByBhavesh 4 месяца назад +1

    First 🥇

  • @lakshaygamerlt4032
    @lakshaygamerlt4032 4 месяца назад

    give you xss payloads

    • @BePracticalTech
      @BePracticalTech  4 месяца назад

      @@lakshaygamerlt4032 There are cusom payloads already present in the tool

  • @Max-mz3is
    @Max-mz3is 4 месяца назад +1

    this tool doesn't work and not reliable at all try to run it against testphp it doesn't come up with basic xss such crap

    • @BePracticalTech
      @BePracticalTech  4 месяца назад +4

      @@Max-mz3is As I have mentioned in the video, this tool is not your typical xss automation tool. It is more like fuzzing the xss payload's components like tags, events etc
      However, if you want to automate xss with this tool then you can use the xss payloads file and it will work without any issues.
      I would suggest you to watch the whole video and understand how to use this tool