How to Trigger XSS in Email login field | Bug bounty poc

Поделиться
HTML-код
  • Опубликовано: 4 фев 2024
  • Disclaimer: This video is for strictly educational and informational purpose only. I own all equipment used for this demonstration. Hacking without permission is illegal so always ensure you have proper authorization before using security tools in any network environment. thanks.
  • НаукаНаука

Комментарии • 47

  • @soufianethebusinessman736
    @soufianethebusinessman736 4 месяца назад +1

    Music goes very well with the content, thanks for sharing. Hats off

  • @EinzzCookie
    @EinzzCookie 6 месяцев назад +5

    Where do I learn such stuff bro. Thats damn cool

    • @lostsecc
      @lostsecc  6 месяцев назад +12

      solve portswigger labs and learn some techniques from hacktricks website and also solve bwapp lab

  • @Free.Education786
    @Free.Education786 6 месяцев назад +1

    Excellent Boss 🎉❤, if possible, cover these advanced topics like How to bypass Drupal CMS or other secured CMS? How to bypass HARD WAF protection that stops HTML, SQL, and XSS injection payloads? Payload single-double-triple encoding using Cyber-Chef? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc.,? How to bypass Hard WAF using SQLMAP or Burpsuite? How to find hidden vulnerable parameters and endpoints inside the .js and .jason files? How to find hidden admin pages, cPanel pages, and WHM pages ? Please cover these important topics. Thanks
    👌💰🔥💉🔑🏆👍📹🌎✅️♥️

    • @lostsecc
      @lostsecc  6 месяцев назад +2

      sure i will upload all things..

  • @IllIIIIIIllll
    @IllIIIIIIllll 6 месяцев назад +2

    Bro does this attack work on any website built on particular frameworks?

    • @lostsecc
      @lostsecc  6 месяцев назад +1

      yes if javascript is not properly filterd in login form..

  • @miteshvalvi1170
    @miteshvalvi1170 6 месяцев назад +1

    how do you test usernames what is the methodology?

    • @lostsecc
      @lostsecc  6 месяцев назад +3

      if there is wordpress site check /wp-json/wp/v2/users api endpoint and also check login page source page and check js files there and also try bruteforce login with header X-Forwarded-For:
      this will bypass ip login attempt block..

  • @gamerz9129
    @gamerz9129 5 месяцев назад +1

    Amazing 🎉 i just wanan how victims get triggered of xss? What’s the impact?

    • @lostsecc
      @lostsecc  5 месяцев назад +2

      you can make a csrf poc and send the html document or send a url with that html linked when they click it you got there session cookie and you can login there account with that cookie its called full account takeover..

    • @muhammadidrisalfadany6512
      @muhammadidrisalfadany6512 5 месяцев назад

      @@lostseccYes, that is if it is vulnerable to CSRF and there is no CSRF token

    • @The_One_0_0
      @The_One_0_0 5 месяцев назад

      Also not to mention if your a developor this attack could be used to hack people and perform drive by malware to completely compromising the webserver both ends of the spectrum people take xss lightly most the time and it should definitly not be

    • @lostsecc
      @lostsecc  5 месяцев назад

      yes it should be used to spread malware also..

  • @Ajay_Yadav_Smart
    @Ajay_Yadav_Smart 6 месяцев назад +1

    Good Job bro..

    • @lostsecc
      @lostsecc  6 месяцев назад +1

      thnq so much brother ❤️ keep supporting..

  • @EnLopXf
    @EnLopXf 6 месяцев назад +1

    why did you make tutorials about your skill

    • @lostsecc
      @lostsecc  6 месяцев назад +5

      bcz i want all the Hacker community to grow together..

    • @Nochymusic
      @Nochymusic 6 месяцев назад

      @@lostsecchey the payloadss and every automated tool you have asap

  • @leo___333
    @leo___333 6 месяцев назад +1

    Stored xss or not

    • @lostsecc
      @lostsecc  6 месяцев назад +1

      its stored

  • @apple_00
    @apple_00 6 месяцев назад +2

    أحسنت ❤

  • @Free.Education786
    @Free.Education786 6 месяцев назад +1

    Please share payloads. Thanks ✅️

  • @PixelFlixAnime
    @PixelFlixAnime 6 месяцев назад +1

    Are you a bug bounty hunter

  • @ReuS_687
    @ReuS_687 5 месяцев назад

    nice payload

  • @an0nbil
    @an0nbil 6 месяцев назад

    Can you share that payload?

    • @lostsecc
      @lostsecc  6 месяцев назад

      ">"@x.y

    • @an0nbil
      @an0nbil 6 месяцев назад +1

      ​@@lostsecc thanks, Btw I found a disclosed Google maps API, can this be reported?

    • @3llam
      @3llam 6 месяцев назад

      ​@@an0nbil
      Previously it was valid, now it's not accepted because of Google started to give a refund for the malicious activities.
      So there's no impact 😅

    • @an0nbil
      @an0nbil 6 месяцев назад

      oh but trying wont cost anything 😂😂@@3llam

    • @3llam
      @3llam 6 месяцев назад

      @@an0nbil will cost an informative or N/A report 😂

  • @user-ny7el1sp6h
    @user-ny7el1sp6h 6 месяцев назад +2

    you are just incapable of posting a video without the cringe music for 14 year olds

    • @lostsecc
      @lostsecc  6 месяцев назад +1

      i like phonk music

    • @shamim_12
      @shamim_12 5 месяцев назад

      Exactly the video is good, but music is shit

  • @WSsd4
    @WSsd4 6 месяцев назад

    You have d!$cord?

    • @lostsecc
      @lostsecc  6 месяцев назад

      i have telegram channel check in channel description..

    • @selfmotivation6178
      @selfmotivation6178 6 месяцев назад

      @@lostsecc bhai gov. site hack kra, koi issue nhi hua? Ya fir this site is yours

    • @Zirzux
      @Zirzux 6 месяцев назад

      @@lostsecc its not there

    • @lostsecc
      @lostsecc  6 месяцев назад

      @@Zirzux i removed it i will make anotherone discord soon

  • @jackdz00000
    @jackdz00000 6 месяцев назад

    Share payload ❤

    • @lostsecc
      @lostsecc  6 месяцев назад

      ">"@x.y

    • @jackdz00000
      @jackdz00000 6 месяцев назад

      @@lostsecc thanks bro ♥️

  • @sugatstatusoffical2546
    @sugatstatusoffical2546 4 месяца назад

    Hey Bro what can i do while pemetesting i get blocked by website how to not getttig caught and how can i contact you in telegram im not able to messahe you personally.

    • @lostsecc
      @lostsecc  4 месяца назад +1

      rate limit your request if you are bruteforcing or use ip rotater extension so that you not have been blocked !