Polyglots: The Ultimate XSS Payloads

Поделиться
HTML-код
  • Опубликовано: 6 окт 2024

Комментарии • 74

  • @splint3rsec
    @splint3rsec 4 года назад +6

    This is so far the most simple and understandable xss video I’ve ever seen

  • @hermes8
    @hermes8 3 года назад +5

    This channel = the best info quality explained ever.

    • @chefsecure
      @chefsecure  3 года назад

      Awesome! Thanks Hermes! 😎

  • @lone.wo1f
    @lone.wo1f 4 года назад +10

    Your contents are great. Upload more often

    • @chefsecure
      @chefsecure  4 года назад +3

      Got more coming. Thanks for watching!

    • @lone.wo1f
      @lone.wo1f 4 года назад

      @@chefsecure use some more 'types' of hacking except for XSS, it would be helpful. Thank you.

    • @chefsecure
      @chefsecure  4 года назад +1

      @@lone.wo1f Will do. Planning one now. Thanks!

  • @chtdv
    @chtdv 4 года назад +2

    This channel is amazing, the explanation is so straightforward and clear, thanks!

  • @sabinaghidossi6690
    @sabinaghidossi6690 28 дней назад +1

    Your video are very interesting..and fun! Make more!!

    • @chefsecure
      @chefsecure  28 дней назад

      @@sabinaghidossi6690 Thanks. Anything else you'd like to see?

  • @mahesh6307
    @mahesh6307 5 месяцев назад +1

    I got it now ,as you only uploaded 3 videos,so hell you didn't got popular though video content is Damm good

  • @rodricbr
    @rodricbr 10 месяцев назад

    xss brute is a brazilian guy that is well known to be the creator of some of the most god tier polyglots out there
    I remember taking one polyglot that he made and inserting into a random website's search parameter, and it worked right away. the website was behind cloudflare too

  • @rayb5204
    @rayb5204 3 года назад

    Great content! Keep them coming

  • @wtfanupam
    @wtfanupam Год назад +1

    hey is your xss course still relevant in 2023? like the methods you teach, concepts and all.

    • @chefsecure
      @chefsecure  Год назад

      100% and possibly now more important than ever. XSS is still the #1 vulnerability found in Hackerone and I'm working on a video right now showing how ChatGPT/AI doesn't even come close to understanding what the course teaches. I recommend getting in now, because I'm adding more content soon and the price will go up.

  • @technocyborg9436
    @technocyborg9436 5 лет назад +2

    This is great sir

  • @mackynikat8833
    @mackynikat8833 3 года назад

    . i never , amd suppose everyone should not comsodee this bad . specially for me that i was only studying this to counter attacks . keep uploading dude

  • @saiujwal1346
    @saiujwal1346 4 года назад +1

    Yo juz awesome I'm subscribing

  • @tXambe
    @tXambe 3 года назад +2

    Hello, thanks for the videos, a question and if you have filtered the simbols &/\" ' ()* and the numbers, the polyglot a question and if you have filtered
    it will not work.

    • @chefsecure
      @chefsecure  3 года назад

      It can work but it will be very limited.
      This is actually a limitation of using polyglots - a website can be vulnerable but some simple filters can stop it from executing.
      If you go to the challenge for this recipe on chefsecure.com (this one is free) you can see this hands-on. The polyglot is too long.
      Just a warning: the challenge is difficult if you haven't had experience. I might make a video explaining it in the future.

    • @tXambe
      @tXambe 3 года назад

      @@chefsecure Thanks very much for your response

  • @_v0id309
    @_v0id309 4 года назад +3

    hello

    • @waterlord6969
      @waterlord6969 4 года назад +2

      What did you thought, did you thought that RUclips is not secured enough?🤣🤣

    • @_v0id309
      @_v0id309 4 года назад +1

      @@waterlord6969 i was getting bored so i did so

    • @waterlord6969
      @waterlord6969 4 года назад

      🤣😆

    • @chefsecure
      @chefsecure  4 года назад +1

      worth a shot!

  • @sychotrojan8362
    @sychotrojan8362 3 года назад +1

    networkchucks brother??

  • @toriyono8018
    @toriyono8018 3 года назад

    Create more video about xss . You should think about newie . More simple description needs

    • @chefsecure
      @chefsecure  3 года назад

      This is a more advanced recipe from my XSS course. You can check out the first video on my channel or do the full lesson here for free: chefsecure.com/courses/xss/recipes/hacking-websites-with-cross-site-scripting

  • @itsm3dud39
    @itsm3dud39 2 года назад

    does regulat expression change on different languages

  • @adefridefriman1648
    @adefridefriman1648 3 года назад +1

    how to inject

    • @chefsecure
      @chefsecure  3 года назад

      Check out my first video in the course. This is a full payload you can use in the example

  • @cobrapranav4212
    @cobrapranav4212 3 года назад

    Hello sir what to do if opening and closing tag blocks is it possible to bypass sir please suggest me a best payload

    • @chefsecure
      @chefsecure  3 года назад

      If you check out the challenge on the website, you'll see there is no single best payload.
      They all have pros and cons. The key is the know the context where you're injecting.

  • @esatymn
    @esatymn 4 года назад

    What vulnerability scanner were you using????

  • @ALLMOVIESLINKS
    @ALLMOVIESLINKS 4 года назад

    If works and event handlers inside that isnt work.then what is the advanced filter bypass on event handler inside img tag

    • @chefsecure
      @chefsecure  4 года назад

      Depends on what the filter does - there are so many things that it could be so you'll need to explore.
      Does it strip out the event handler entirely? Is execution blocked by CSP? Have you tried other event handlers, like onload or onclick? Is it looking for an exact pattern you can bypass like: on*="*"
      Which can be bypassed with single quotes or no quotes -> onerror='alert()' or onerror=alert()
      or even mixed capitalization OnErRor="alert()"
      Etc.

  • @Mo-vc1mv
    @Mo-vc1mv 4 года назад +1

    Whats the point of this. It is client-sided, so will this affect others?

    • @dreyand
      @dreyand 4 года назад

      U can inject any js code into the website and change the website's content, and also steal user cookies.

    • @thotslayer2684
      @thotslayer2684 4 года назад

      @DreyAnd Andrej so you are saying that we can affect others with console ?

    • @thotslayer2684
      @thotslayer2684 4 года назад

      DreyAnd Andrej and how can we do that ?

    • @dreyand
      @dreyand 4 года назад +2

      Aarav Bhutani By finding vulnerable parameters for example.

    • @thotslayer2684
      @thotslayer2684 4 года назад

      DreyAnd Andrej 😅 im a beginner so i’m not getting it

  • @JoshuaPhilipJha
    @JoshuaPhilipJha 3 года назад

    What if the website security level is set to high
    What to do

    • @chefsecure
      @chefsecure  3 года назад

      If it's blocking the polyglot, you'll need to be more subtle. Only try what's necessary to avoid being caught by firewalls.

    • @JoshuaPhilipJha
      @JoshuaPhilipJha 3 года назад

      @@chefsecure Thankyou
      Ok

    • @JoshuaPhilipJha
      @JoshuaPhilipJha 3 года назад

      @@chefsecure Does it mean the website is XSS Secure

  • @ozuzi
    @ozuzi 3 года назад

    is he ricky martin? :D

  • @mackynikat8833
    @mackynikat8833 3 года назад

    . dont have any other choice but to just follow the comments irr

  • @killerop533
    @killerop533 6 месяцев назад

    I can't understand anything 😂

    • @chefsecure
      @chefsecure  5 месяцев назад

      This is a an advanced example that pieces together each basic part of the course. Without a deeper understanding, however, it's just alien magic.

  • @themuffinman-killer
    @themuffinman-killer 4 года назад +2

    how does this help in compromising the website. i don't understand

    • @dkkdkdkddkdkdk5810
      @dkkdkdkddkdkdk5810 4 года назад

      You have to understand what you can do with xss atacks

    • @lekgnt2779
      @lekgnt2779 4 года назад

      @@dkkdkdkddkdkdk5810 javascript commands