Hacking Stay-Logged-In Cookies with Owasp Zap | HakByte

Поделиться
HTML-код
  • Опубликовано: 25 ноя 2024

Комментарии • 34

  • @seanfaherty
    @seanfaherty 2 года назад +6

    as a guy used to Burp community I would have used python to prepare word list all hashed up like that... it takes me forever but it's nice to see the way the smart kids do it.

    • @markthorson2713
      @markthorson2713 2 года назад +3

      Could ya use the "intruder" battering ram attack with payload processors... Intruder Works in community edition just rate limited IIRC 🤔 but Zap is dam good too (i prefer their proxy workflow over burp CE).

  • @stuxed
    @stuxed 2 года назад +4

    Lol, I had the same issue with Burp licence! Good timing, thanks.

  • @stefanivanov8274
    @stefanivanov8274 2 года назад +6

    It will be great if there is comparison between the speed of brute-force with Burp CE, Burp Pro, ZAP and Python script. May be with other languages too ;]

  • @SpragginsDesigns
    @SpragginsDesigns 2 года назад +8

    I used this for a pentest last weekend. I only used two websites, and one is quite popular.
    I got someone's Visa card from the second one.
    The first one was flagged like it was built to be hacked. I also had to dig deep into their policies to figure out there's no explanation for FaceBook, Stripe, Serio and 4 other APIs doing GET and more destroying any way of making what our company needed compliant to use. They also have no nothing about security for Q1 2022. And I sent them my pentest report, and with the shocking details of being able to literally browse each users database they haven't reached back in 6 days!
    I usually use this to scan, but I took a deep dive into the extra add-ons while putting Ubuntu on my Microsoft Surface 😂

  • @RickyBana
    @RickyBana 2 года назад +6

    Great video, please do more of this with ZAP

  • @ericneo2
    @ericneo2 2 года назад +3

    Thank you for the tutorial and you gave the links to the resources. 👍

  • @harshamannewton
    @harshamannewton 2 года назад +2

    nice video ...but where this can be useful? in only bruteforcing ?

  • @lityoshii1086
    @lityoshii1086 2 года назад +2

    Stay consistent bro

  • @bluecreature39
    @bluecreature39 2 года назад +4

    Montana represent

  • @damnson2806
    @damnson2806 2 года назад +2

    Hi! I have a question, would it be possible to use pinephone pro instead of nethunter? They say it has root privileges by default, and also comes with linux terminal, but idk if its apt to do the same thing as a rooted android phone

  • @7barney914
    @7barney914 2 года назад +2

    is this guy the same guy in null byte? Something pretty similar both guys don't blink at all

  • @ovskihouse5271
    @ovskihouse5271 2 года назад +2

    I wana ask you i wish that you respond me very soon .. i opened a session in udemy with cookies and after minites i'd close a session .. but when i would reopened again with same cookies it failed.. how to login again and again?

  • @MefiMaxi
    @MefiMaxi 2 года назад +6

    Love this stuff ^^

  • @dahuynguyenphuc6586
    @dahuynguyenphuc6586 8 месяцев назад +1

    The first time I security scanned a website with OWASP ZAP, a bunch of data appeared in the "alert" section , The next day when I continued to scan that website, but " alert " item appeared nothing ? Is the data I scanned the first time still saved? how to get it??

  • @hvgaming2347
    @hvgaming2347 2 года назад +3

    Does he even blink ????

  • @funkymonk2254
    @funkymonk2254 2 года назад +2

    Thanks Kody.

  • @ChrisSamsonUSA
    @ChrisSamsonUSA 7 дней назад

    is it possible to find the actual source of the API url? For example, if there is an API /POST/SERVE/12345, but it's getting the object from the GCS and serving, how to you see the actual URL?

  • @VituralHwang
    @VituralHwang 2 года назад +1

    does this work with gmail ?

  • @denverm7909
    @denverm7909 8 месяцев назад +1

    how to get rid of this virus cookies?

  • @AdeelAnsariUS
    @AdeelAnsariUS 2 года назад +1

    Great video.

  • @TheClubPlazma
    @TheClubPlazma 2 года назад +2

    Nice one thank you

  • @SecurityTalent
    @SecurityTalent 2 года назад +2

    Thanks

  • @salhilahcene8698
    @salhilahcene8698 2 года назад +1

    I love it

  • @Elsag_GeliNakh
    @Elsag_GeliNakh 2 года назад +2

    Fantastic 🤣👍✔️

  • @lazycreater1302
    @lazycreater1302 2 года назад +1

    Plz make video on bypassing android 12 google account

  • @abrahamnorada6815
    @abrahamnorada6815 2 года назад +1

    amazing :o

  • @cian0r
    @cian0r Год назад +1

    this method good but my Priority open bullet

  • @5ql156
    @5ql156 2 года назад +4

    Using Owasp Zap on Burpsuits labs lol

  • @abdikanifaysal2002
    @abdikanifaysal2002 2 года назад +2

    First from somalia

  • @sterlinwright4173
    @sterlinwright4173 2 года назад +1

    You don't start off with a whole bunch of words on the screen your scaring the children

  • @chrisw1462
    @chrisw1462 2 года назад +3

    You have the 3-4 kHz band filtered too hard - much harder than the last Hak5 video you did. Makes it very hard to listen to. As soon as I heard it I knew, but I brought up my audio spectrum analyzer to verify it. There's almost zero energy at those frequencies. Do you know how important this band is for human speech comprehension? I'd like to believe it's a mistake, but more and more RUclips people are doing this, supposedly to try to 'add bass' to your voice. Okay, if you wanna add bass, ADD BASS. Stop nerfing 4 kHz into the ground.

  • @اصوتجميلةهنا
    @اصوتجميلةهنا 2 года назад +1

    Please translate into Arabic.