This video is amazing! The have to build it to break it approach is perfect. Keep these videos coming. I'm surprised this doesn't have many views (which i'm guessing will change in the near future).
I'm so glad it's helpful!! I will definitely be doing more of these in the future, and I'm going to keep switching up the language so we get a chance to see a variety of different web applications and frameworks. I'm actually working on Server-Side Template Injection (SSTI) for Flask right now! We will build a Flask app with a SQL connection, full authentication and Roll-Based Access Control (RBAC). After walking through actually finding the vuln, I'll show how to weaponize it to compromise the application and the server it's hosted on, and correlate each of those demonstrations with a Hactivity report or lab. I'm very excited about the new format! It's hopefully taking some of the best aspects of my different videos.
Would it be possible to inject, and say replace the html code tags 'h1' that already exist, with 'script'? So you will end up having Welcome ${name} instead of .... Or is this methode not available like in the html code?
As i read your channel description i was a bit surprised how experienced you are seen your this video awesome exactly the man which is being described in channel description. Thanks bro for sharing such an amazing content. If you feel free i would like to pick your brain 🧠 some day and record a video 📷 to learn about your hacking journey 😊. Thanks again Regards Ilyas
Man i need help? In target 🎯 when i inject my payload into the javascript alert pop up 🔝 i tested this with different browsers and OS work all same. But when I inject the payload straight in the url of the target 🎯 its block me from doing that! Like i wanna confirm to validity of this vulnerability what should i do or that it self tells me it’s vulnerable to XSS and i should report it? Can’t wait to get ur advice and answer ❤
The process is the same, your goal is to be able to write to the DOM in some way. You need to find user-controlled input that is reflected in the server's response. Then, if possible, you need to find a payload that will allow you to write valid HTML elements to the DOM. Finally, you can injection JavaScript. My next video will be on Client-side Injection Testing and should help a lot!
It's very random and inconsistent. I've made over $15k in a weekend, but I've also spent months testing an app and got nothing. I always say bug bounty hunting is like an Easter Egg Hunt, which is appropriate considering the time I'm posing this, haha! It's not a penetration test, there is a huge amount of luck required in bug bounty hunting to find the vulnerable applications before other researchers do. You can expand your technical skills and build automation to improve your chances, but ultimately there's still a great deal of luck involved. Bug Bounty Hunting is a fantastic way to earn a bit of money while you learn offensive security concepts, but it's not a great choice if you are looking for consistent income.
Taylor Swift. Hehe. I listen to her sometimes, but usually just when someone else is already playing her. Her long-term music producer, and one of her bodyguards, are fellow Jewish people (I'm mixed, from America, but I live abroad).
Thank you so much for such a great contents it really helps. Sometimes the payload rejected as a string on the page like 'Hi' how does that filtering works, can it be really byepass, i encountered several of this type of filter
Thank you!! It all depends on how the application is sanitizing the input. I'm working on a new video on client-side injections that should help a lot, but as a general rule you will need to bypass one or more of these compensating controls: 1. Cookie Flags 6. Browser Security Headers 2. Content Security Policy (CSP) 3. Web Application Firewall (WAF) 4. Client-Side Validation 5. Server-Side Validation 7. Output Encoding
We do need part two or may be up to part ten for this video .This is really a next level work.
I'm in burnout period man, and I just love seeing your videos, keep up the great work, you are the best, for me
I'm so glad it's helpful!
thx for this awesome lesson. It's a greate idea to combine webdev process with bug bounty.
Great content man! Keep it up! I really like learning from both the tester and the developer perspective. I would watch 10 more parts of this
This is awesome. Cant wait for more like it.
Thank you! I'm working on a similar video, now, for Command Injection and Code Injection :)
I appreciate all your knowledge. I'm trying dang hard to learn as much as possible, your videos are amazing!
Thank you so much!
MIND BLOWN. Really appreciate the way you made this video.
Pls make video on how you find xss from start. In love vdp targets
Hey, would you mind using a silent keyboard for these videos?
Brooo Hats off man .....Hats Off...🎩
Please make more videos like this and on other vulnerability as welll❤❤❤❤
Great video man. Please make this a xss series and include bypass URL encoding and WAF and other xss complicated stuff
I am really hoping to find that first one and i watch ur videos , appreciate you a lot bro .
Did you get one?
Dude I wish I watched your videos instead of going to college XD
nice bug bounty edducation ı have ever seen . ı subscribed
This video is amazing! The have to build it to break it approach is perfect. Keep these videos coming. I'm surprised this doesn't have many views (which i'm guessing will change in the near future).
I'm so glad it's helpful!! I will definitely be doing more of these in the future, and I'm going to keep switching up the language so we get a chance to see a variety of different web applications and frameworks.
I'm actually working on Server-Side Template Injection (SSTI) for Flask right now! We will build a Flask app with a SQL connection, full authentication and Roll-Based Access Control (RBAC). After walking through actually finding the vuln, I'll show how to weaponize it to compromise the application and the server it's hosted on, and correlate each of those demonstrations with a Hactivity report or lab.
I'm very excited about the new format! It's hopefully taking some of the best aspects of my different videos.
@@rs0n_live oh. I’m definitely watching that one. Can’t wait!
youre making great vids man
thanks a lot!!
Thank you rs i like watch your videos im my burnout period ❤️
same here im in burnout but i must wach him tho 😅
@@mohmino4532 haha good luck bro
@@abdonito8254 u too ❤🏃♂️
Haha, I'm so glad it's helpful! I can empathize with the burnout, too, hahaha. I'm sure we all can
Would it be possible to inject, and say replace the html code tags 'h1' that already exist, with 'script'? So you will end up having Welcome ${name} instead of .... Or is this methode not available like in the html code?
Thank you arson. This helps a lot.
💙💙💙
Haha. It would help the algorithm, indeed.
Haha, thank you!!!
As i read your channel description i was a bit surprised how experienced you are seen your this video awesome exactly the man which is being described in channel description.
Thanks bro for sharing such an amazing content. If you feel free i would like to pick your brain 🧠 some day and record a video 📷 to learn about your hacking journey 😊.
Thanks again
Regards
Ilyas
Can you share your methodology how get dom xss
Rs Excellent explanation brother ❤ Don't delay in continuing WAP test explanations
Ur brother from Tunisia
Thank you!!
Love the videos man ❤
Man i need help? In target 🎯 when i inject my payload into the javascript alert pop up 🔝 i tested this with different browsers and OS work all same. But when I inject the payload straight in the url of the target 🎯 its block me from doing that! Like i wanna confirm to validity of this vulnerability what should i do or that it self tells me it’s vulnerable to XSS and i should report it? Can’t wait to get ur advice and answer ❤
Great video! Thank you for your efforts! I hope you will succeed!
Is there a way to bypass the encoding of quotation marks in "?
Damn this was a great vid,especially for me that just started learning about web app testing!!
I'm so glad it's helpful!
Very thorough, and helpful video! Thanks, bro bro!
Great stuff
simply Great Video Arson :)
amazing video
upload more like this
Great video!
Thanks for the great video
Can how to find xss in application/json contentype
The process is the same, your goal is to be able to write to the DOM in some way. You need to find user-controlled input that is reflected in the server's response. Then, if possible, you need to find a payload that will allow you to write valid HTML elements to the DOM. Finally, you can injection JavaScript. My next video will be on Client-side Injection Testing and should help a lot!
how often do you find bugs in bug bounty programs?
It's very random and inconsistent. I've made over $15k in a weekend, but I've also spent months testing an app and got nothing. I always say bug bounty hunting is like an Easter Egg Hunt, which is appropriate considering the time I'm posing this, haha! It's not a penetration test, there is a huge amount of luck required in bug bounty hunting to find the vulnerable applications before other researchers do. You can expand your technical skills and build automation to improve your chances, but ultimately there's still a great deal of luck involved. Bug Bounty Hunting is a fantastic way to earn a bit of money while you learn offensive security concepts, but it's not a great choice if you are looking for consistent income.
I respect the matrix
Learning how to weaponise stuff more is great to not be phased by PoC.
The best!
good stuff
Taylor Swift. Hehe. I listen to her sometimes, but usually just when someone else is already playing her. Her long-term music producer, and one of her bodyguards, are fellow Jewish people (I'm mixed, from America, but I live abroad).
nice!
Got a better view of xss
anyone can help me bypass akami waf :( ? & Thank you sir we miss live videos alot
Love From Pakistan
nice
But still you can bypass < " '
Great content , I hope you hit 100k subscriber soon , also i hope to make a collaboration if that is possible
Thank you so much for such a great contents it really helps.
Sometimes the payload rejected as a string on the page like 'Hi' how does that filtering works, can it be really byepass, i encountered several of this type of filter
Thank you!! It all depends on how the application is sanitizing the input. I'm working on a new video on client-side injections that should help a lot, but as a general rule you will need to bypass one or more of these compensating controls:
1. Cookie Flags
6. Browser Security Headers
2. Content Security Policy (CSP)
3. Web Application Firewall (WAF)
4. Client-Side Validation
5. Server-Side Validation
7. Output Encoding