Web App Penetration Testing - #10 - XSS(Reflected, Stored & DOM)

Поделиться
HTML-код
  • Опубликовано: 20 дек 2024

Комментарии • 104

  • @alexgameroom
    @alexgameroom 6 лет назад +15

    Thanks for this, I'm studying CEH and XSS is something I've struggled with. Very clear and you've explained it better in 17 minutes than the EC Council did in an entire chapter.

  • @benvoland
    @benvoland 6 лет назад +5

    You are one of the best youtubers that really explain what is going on behind the scenes and not just jumping around with no explaining about it. Thanks you so much!!! Liked it! Hope you will make a part 2 cause this is very intresting and helpfull!!!

  • @BlokeBritish
    @BlokeBritish 3 года назад +2

    05:09 "remember u hv to be humble" - how very well said man !!!

  • @danjones3823
    @danjones3823 3 года назад +1

    Was struggling to understand the difference between DOM and reflected. this was actually clear and helped me understand. keep up the content!

  • @spcfsi4143
    @spcfsi4143 6 лет назад +4

    Where's the love button on this thing. Thanks so much. I'm just beginning web app pentesting and you're making my life so much easier with these tutorials. Keep up the excellent work.

  • @blog.pymastery
    @blog.pymastery 6 лет назад +11

    Half understood! However, I really appreciate.
    I'll be practicing to understand as well as I can!
    Good job! Thank you again.

  • @josefprochazka1095
    @josefprochazka1095 5 лет назад +3

    DOM based XSS begins at 13:38

  • @RajKumar-yw8cd
    @RajKumar-yw8cd 4 года назад

    Best video I ever seen... I understand it faster

  • @oofiebiscuit
    @oofiebiscuit 6 лет назад +2

    i finally have account to the hackersploit website

  • @ICOFRITE
    @ICOFRITE 6 лет назад

    Great work as always Alexis! Loving your work!

  • @souravkundu1932
    @souravkundu1932 4 года назад +3

    Hey, @hackersploit you have not updated the XSS part. Means on high-level security. Such as you said at the end.

  • @joy3658
    @joy3658 Год назад +1

    This playlist is not complete man! Some videos is not listed here... Please take a look on it again. Like, #8 is missing. I would love to highly request you that please rearrange a full playlist for Web App Penetration Testing

  • @ajaydahiya4651
    @ajaydahiya4651 6 лет назад +1

    Very Well Explained Sir. Waiting for the advanced XSS :)

  • @8080VB
    @8080VB 2 года назад

    Also for dom you can manipulate the site url into anything. .just like what we saw in reflected.

  • @terrylick5908
    @terrylick5908 6 лет назад

    detailed information. just brilliant. all the best and take care.👍

  • @BucifalulR
    @BucifalulR 5 лет назад +1

    At 14:44, what do you mean by "a language that a client can understand"? As far as I know, Javascript is understood by clients and code between tags can be executed by clients. Also, isn't the "onerror" action in "

    • @neadlead2621
      @neadlead2621 2 года назад

      I have the same question did u found an answer ?

  • @niftyexploits9809
    @niftyexploits9809 6 лет назад

    iv been waiting for this part of web app

  • @kevincarter6122
    @kevincarter6122 6 лет назад +1

    so what would someone want to do something like this for?

  • @MrGFYne1337357
    @MrGFYne1337357 6 лет назад

    I'm late, you rock HSploit

  • @emilioortega9487
    @emilioortega9487 3 года назад

    at 14:50 dont understand why code doesn't work if javascript is a client side language... it should work like an html tag or I'm wrong, if so, why? thanks

  • @limitless5000
    @limitless5000 6 лет назад

    Great video, really glad I subscribed.

  • @shakirali3647
    @shakirali3647 6 лет назад

    Nice video. Keep up the good work

  • @SUDARMANHP
    @SUDARMANHP 3 года назад

    Thank you so much for the video sir....

  • @attscham7820
    @attscham7820 2 года назад

    reflected, stored, dom -got it. rdy for more

  • @TheEggroll4321
    @TheEggroll4321 4 года назад

    So both the website needs to be vulnerable to accept a stored xss and the user's browser that retrieves it needs to be vulnerable for the script to do certain things?

  • @isfatrianurullah3704
    @isfatrianurullah3704 6 лет назад +1

    i have notif for watching your videos.

  • @accessdenied9393
    @accessdenied9393 4 года назад

    I love this man ❤️❤️

  • @sewaksingh6189
    @sewaksingh6189 6 лет назад

    Love your every video ;)

  • @donalee7558
    @donalee7558 4 года назад

    hi do you have the video this kind of attack XSS but using dvwa or webgoat ?

  • @8L4NK_
    @8L4NK_ 6 лет назад

    @Alex aka hackersploit....
    Your the Greatest of all time > G.O.A.T

  • @D.a.n_D
    @D.a.n_D 6 лет назад

    Thanks for the great videos !

  • @susanapalacios2881
    @susanapalacios2881 4 года назад

    Thank you! Great work!

  • @سجادمؤيد-ف4ل
    @سجادمؤيد-ف4ل 4 года назад

    thank you verry nuch, i should ask you if i found xss in any site how i can exploit it and git the admin page of site ?

  • @vaisakh_km
    @vaisakh_km 3 года назад

    Hello, how can I download your app

  • @smashishere
    @smashishere 6 лет назад

    So if I go to a website and use the that pop up script in it and it works, does that mean that site would be vulnerable to other scripts? If it does then is it only for xss (get) or both xss (get) and xss (post). Sorry if I'm using the wrong terminology or this is a really stupid question, I'm a noob :p

  • @jottaz144
    @jottaz144 4 года назад

    Thanks, however, what does it mean for DOM that the input is "processed by the client"? I dont get how to differentiate it from the other 2 XSS attacks.

    • @AliIssa1
      @AliIssa1 2 года назад

      Hackersploits video is really good. But since you asked for more details on DOM XSS you can check the following video: ruclips.net/video/ZmNlFNsty9o/видео.html

  • @dhanashreedeshpande7100
    @dhanashreedeshpande7100 6 лет назад +1

    Please tell me How can we identify XSS attack from access log file? I mean, how it stores footprints over there in log file?

    • @roborbiettinoisgone392
      @roborbiettinoisgone392 4 года назад

      I don't know man, you made me curious! I will try some stuff and Maybe tell ya

  • @aditidogra7367
    @aditidogra7367 5 лет назад

    Well explained....thanks

  • @anujgupta7749
    @anujgupta7749 5 лет назад

    How Refected XSS use for Hacking ? I am bit Confused.

    • @brianhartling7767
      @brianhartling7767 5 лет назад

      You can create a script to (for example) send info to an email address. You would want to encode that portion and embed the script into the url. Then you could copy the whole malicious url and post the url somewhere you know people will click it and when they do it runs the script.

  • @hiteshagrawal8892
    @hiteshagrawal8892 5 лет назад

    can you share some more examples for DOM based XSS

    • @AliIssa1
      @AliIssa1 2 года назад

      Hackersploits video is really good. But since you asked for more details on DOM XSS you can check the following video: ruclips.net/video/ZmNlFNsty9o/видео.html

  • @psychorockz123
    @psychorockz123 5 лет назад

    I'm confused between DOM-Based XSS and Reflected XSS. I understand they're both affecting the victim on the client side and that reflected uses Javascript and DOM-Based uses AJAX. But is that really it? Could you be more specific?

  • @ronakrawal8325
    @ronakrawal8325 6 лет назад

    Amazing Video

  • @ao5468
    @ao5468 6 лет назад

    Hi there
    What is the best way to check if the input form field is Vulnerable to xss. The thing is the form field does not do any popup on render tab so it is hard to verify

  • @anon1977
    @anon1977 5 лет назад

    thanks myan i was able to get idea and i find xss on isp payment gateway.

  • @treeboi6371
    @treeboi6371 6 лет назад +4

    You should make a video on the raspberry pi 3 , its a fascinating topic and id love to get your opinion on it and how to use kali linux on it.

  • @nithinrkan
    @nithinrkan 4 года назад

    how does do i steal another users cookie?

  • @CyberAbyss007
    @CyberAbyss007 6 лет назад +1

    Thank you!

  • @ZoomAnimationHere
    @ZoomAnimationHere 4 года назад

    Awesome!

  • @Sam-rz5hw
    @Sam-rz5hw 6 лет назад

    Thanks you are the best

  • @user-et8es9vg5z
    @user-et8es9vg5z 4 года назад

    I didn't understand the difference between Cross-site Scripting Reflected and DOM-based cross-site scripting. Can someone explain this to me ? For me he does the same thing in each of these examples.

    • @AliIssa1
      @AliIssa1 2 года назад

      HackerSploits video is really good. But if you want more info on the difference between the types of XSS then watch: ruclips.net/video/ZmNlFNsty9o/видео.html

  • @BRINGOff.07
    @BRINGOff.07 4 года назад +2

    aw

  • @college3848
    @college3848 6 лет назад +2

    thanks brother #Alexis.... u r the best....

  • @victorlefevre4139
    @victorlefevre4139 6 лет назад

    Can u perform xss pls ?

  • @victorlefevre4139
    @victorlefevre4139 6 лет назад

    Ur the best with hacking
    Im french

  • @animationsongs682
    @animationsongs682 6 лет назад +10

    First Like 👍

  • @kiramaster2010
    @kiramaster2010 5 лет назад

    can we use this attack to upload shell ?

  • @E_N_J.B
    @E_N_J.B 4 года назад

    Thanks

  • @SarathKumar-zz1bd
    @SarathKumar-zz1bd 4 года назад

    It's good bro..

  • @imranthoufeeque
    @imranthoufeeque 6 лет назад +2

    First to view and like

  • @lick933
    @lick933 6 лет назад

    guys what's ARC-4 data

  • @jepunband6280
    @jepunband6280 4 года назад

    hello hackersploit, please do a tutorial on xsser tool.

  • @treeboi6371
    @treeboi6371 6 лет назад +2

    Hey there, nice video. Are you thinking about making any new udemy courses??

  • @AbhishekKumar-xv4lw
    @AbhishekKumar-xv4lw 6 лет назад +1

    Nice video broo

  • @Mr-cn4sm
    @Mr-cn4sm 4 года назад

    do u have a whassup group
    or a telegram group

  • @randomstranger9494
    @randomstranger9494 6 лет назад +1

    Would love an in-depth udemy course on Web Testing :)

  • @ijajbargir9621
    @ijajbargir9621 6 лет назад

    Ss7 video demo bro

  • @niftyexploits9809
    @niftyexploits9809 6 лет назад

    also webvuln.com is good for testing for those who dont want to run a vm of a lab

  • @prnxid
    @prnxid 6 лет назад +1

    Peace Man. I waiting for the high lvl of bwapp xss's

  • @yorumcuturk
    @yorumcuturk 4 года назад +1

    alert("hi hackan")

    • @yorumcuturk
      @yorumcuturk 4 года назад +2

      No, it didn't work here.

  • @MsSoldadoRaso
    @MsSoldadoRaso 3 года назад

    Just use Angular.

  • @8080VB
    @8080VB 3 года назад

    If your new to web app pen testing , you wont understand anything so hit the basic n come back (based on a true story)

  • @MidnightSpecter43
    @MidnightSpecter43 2 года назад

    peace

  • @donalee7558
    @donalee7558 4 года назад

    and testing with zap

  • @muhammadmughal4258
    @muhammadmughal4258 4 года назад

    where is DOM Based XSS ! always time pass videos :-(

    • @AliIssa1
      @AliIssa1 2 года назад

      HackerSploits video is really good. But since you want more info on DOM-XSS then check the following: ruclips.net/video/ZmNlFNsty9o/видео.html

  • @pamulyadav4275
    @pamulyadav4275 4 года назад +1

    pleaseeeeee......do more, talk less. Still like your videos.

  • @steiner254
    @steiner254 Год назад

    Awesome!