Bug Bounty Tip | Do This Exercise Every Day to Get Better at Finding XSS Bugs!

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 68

  • @legendsofilluminati503
    @legendsofilluminati503 2 месяца назад +2

    We do need part two or may be up to part ten for this video .This is really a next level work.

  • @Ma3en
    @Ma3en Год назад +21

    I'm in burnout period man, and I just love seeing your videos, keep up the great work, you are the best, for me

    • @rs0n_live
      @rs0n_live  Год назад +10

      I'm so glad it's helpful!

  • @CaiN805
    @CaiN805 4 месяца назад +2

    thx for this awesome lesson. It's a greate idea to combine webdev process with bug bounty.

  • @nguyennhattan4626
    @nguyennhattan4626 Месяц назад

    Great content man! Keep it up! I really like learning from both the tester and the developer perspective. I would watch 10 more parts of this

  • @ScriptKicker
    @ScriptKicker Год назад +2

    This is awesome. Cant wait for more like it.

    • @rs0n_live
      @rs0n_live  Год назад +2

      Thank you! I'm working on a similar video, now, for Command Injection and Code Injection :)

  • @CMDying
    @CMDying Год назад +5

    I appreciate all your knowledge. I'm trying dang hard to learn as much as possible, your videos are amazing!

  • @michaelr.3799
    @michaelr.3799 Год назад +4

    MIND BLOWN. Really appreciate the way you made this video.

  • @abhinavbansal9396
    @abhinavbansal9396 Год назад +2

    Pls make video on how you find xss from start. In love vdp targets

  • @hackingClay
    @hackingClay 14 часов назад

    Hey, would you mind using a silent keyboard for these videos?

  • @technicalinformer4034
    @technicalinformer4034 3 месяца назад

    Brooo Hats off man .....Hats Off...🎩
    Please make more videos like this and on other vulnerability as welll❤❤❤❤

  • @bandelaSuraj
    @bandelaSuraj 10 месяцев назад +2

    Great video man. Please make this a xss series and include bypass URL encoding and WAF and other xss complicated stuff

  • @lifeofgrish
    @lifeofgrish Год назад +1

    I am really hoping to find that first one and i watch ur videos , appreciate you a lot bro .

  • @nooribda7820
    @nooribda7820 13 дней назад

    Dude I wish I watched your videos instead of going to college XD

  • @user-ye7nd3oh4p
    @user-ye7nd3oh4p 2 месяца назад

    nice bug bounty edducation ı have ever seen . ı subscribed

  • @lxa1121
    @lxa1121 Год назад +1

    This video is amazing! The have to build it to break it approach is perfect. Keep these videos coming. I'm surprised this doesn't have many views (which i'm guessing will change in the near future).

    • @rs0n_live
      @rs0n_live  Год назад +5

      I'm so glad it's helpful!! I will definitely be doing more of these in the future, and I'm going to keep switching up the language so we get a chance to see a variety of different web applications and frameworks.
      I'm actually working on Server-Side Template Injection (SSTI) for Flask right now! We will build a Flask app with a SQL connection, full authentication and Roll-Based Access Control (RBAC). After walking through actually finding the vuln, I'll show how to weaponize it to compromise the application and the server it's hosted on, and correlate each of those demonstrations with a Hactivity report or lab.
      I'm very excited about the new format! It's hopefully taking some of the best aspects of my different videos.

    • @lxa1121
      @lxa1121 Год назад

      @@rs0n_live oh. I’m definitely watching that one. Can’t wait!

  • @bastianobsztyfitykultykiew4331
    @bastianobsztyfitykultykiew4331 4 месяца назад

    youre making great vids man

  • @markgilt.culaway25
    @markgilt.culaway25 4 месяца назад

    thanks a lot!!

  • @abdonito8254
    @abdonito8254 Год назад +1

    Thank you rs i like watch your videos im my burnout period ❤️

    • @mohmino4532
      @mohmino4532 Год назад

      same here im in burnout but i must wach him tho 😅

    • @abdonito8254
      @abdonito8254 Год назад +1

      @@mohmino4532 haha good luck bro

    • @mohmino4532
      @mohmino4532 Год назад

      @@abdonito8254 u too ❤🏃‍♂️

    • @rs0n_live
      @rs0n_live  Год назад

      Haha, I'm so glad it's helpful! I can empathize with the burnout, too, hahaha. I'm sure we all can

  • @smurfs6975
    @smurfs6975 Год назад

    Would it be possible to inject, and say replace the html code tags 'h1' that already exist, with 'script'? So you will end up having Welcome ${name} instead of .... Or is this methode not available like in the html code?

  • @SportingArenafast
    @SportingArenafast Год назад

    Thank you arson. This helps a lot.

  • @theomidtabei
    @theomidtabei 25 дней назад

    💙💙💙

  • @ReligionAndMaterialismDebunked

    Haha. It would help the algorithm, indeed.

    • @rs0n_live
      @rs0n_live  11 месяцев назад

      Haha, thank you!!!

  • @WebWonders1
    @WebWonders1 Год назад +2

    As i read your channel description i was a bit surprised how experienced you are seen your this video awesome exactly the man which is being described in channel description.
    Thanks bro for sharing such an amazing content. If you feel free i would like to pick your brain 🧠 some day and record a video 📷 to learn about your hacking journey 😊.
    Thanks again
    Regards
    Ilyas

  • @mohamedashraf2575
    @mohamedashraf2575 Год назад

    Can you share your methodology how get dom xss

  • @The_Ethical_TN
    @The_Ethical_TN Год назад

    Rs Excellent explanation brother ❤ Don't delay in continuing WAP test explanations
    Ur brother from Tunisia

  • @brs2379
    @brs2379 Год назад +1

    Love the videos man ❤

  • @MustafaGains
    @MustafaGains 7 месяцев назад

    Man i need help? In target 🎯 when i inject my payload into the javascript alert pop up 🔝 i tested this with different browsers and OS work all same. But when I inject the payload straight in the url of the target 🎯 its block me from doing that! Like i wanna confirm to validity of this vulnerability what should i do or that it self tells me it’s vulnerable to XSS and i should report it? Can’t wait to get ur advice and answer ❤

  • @easy_man_12
    @easy_man_12 Год назад

    Great video! Thank you for your efforts! I hope you will succeed!

    • @easy_man_12
      @easy_man_12 Год назад

      Is there a way to bypass the encoding of quotation marks in "?

  • @phillydee3592
    @phillydee3592 Год назад

    Damn this was a great vid,especially for me that just started learning about web app testing!!

    • @rs0n_live
      @rs0n_live  Год назад

      I'm so glad it's helpful!

  • @ReligionAndMaterialismDebunked

    Very thorough, and helpful video! Thanks, bro bro!

  • @4liraah
    @4liraah 11 месяцев назад

    Great stuff

  • @Dayanandhansubramani-rj6tc
    @Dayanandhansubramani-rj6tc Год назад

    simply Great Video Arson :)

  • @aquatester
    @aquatester Год назад

    amazing video
    upload more like this

  • @danc5790
    @danc5790 Год назад

    Great video!

  • @bountyproofs
    @bountyproofs 8 месяцев назад

    Thanks for the great video

  • @challengeaccepted6382
    @challengeaccepted6382 10 месяцев назад +1

    Can how to find xss in application/json contentype

    • @rs0n_live
      @rs0n_live  10 месяцев назад

      The process is the same, your goal is to be able to write to the DOM in some way. You need to find user-controlled input that is reflected in the server's response. Then, if possible, you need to find a payload that will allow you to write valid HTML elements to the DOM. Finally, you can injection JavaScript. My next video will be on Client-side Injection Testing and should help a lot!

  • @aryzen2781
    @aryzen2781 7 месяцев назад

    how often do you find bugs in bug bounty programs?

    • @rs0n_live
      @rs0n_live  7 месяцев назад +1

      It's very random and inconsistent. I've made over $15k in a weekend, but I've also spent months testing an app and got nothing. I always say bug bounty hunting is like an Easter Egg Hunt, which is appropriate considering the time I'm posing this, haha! It's not a penetration test, there is a huge amount of luck required in bug bounty hunting to find the vulnerable applications before other researchers do. You can expand your technical skills and build automation to improve your chances, but ultimately there's still a great deal of luck involved. Bug Bounty Hunting is a fantastic way to earn a bit of money while you learn offensive security concepts, but it's not a great choice if you are looking for consistent income.

  • @BaabuBhaiya-p6u
    @BaabuBhaiya-p6u 11 месяцев назад

    I respect the matrix

  • @ReligionAndMaterialismDebunked

    Learning how to weaponise stuff more is great to not be phased by PoC.

  • @danmcgirr4210
    @danmcgirr4210 Год назад

    The best!

  • @farrrrrrhaaaaan
    @farrrrrrhaaaaan Год назад

    good stuff

  • @ReligionAndMaterialismDebunked

    Taylor Swift. Hehe. I listen to her sometimes, but usually just when someone else is already playing her. Her long-term music producer, and one of her bodyguards, are fellow Jewish people (I'm mixed, from America, but I live abroad).

  • @RezaTahmasb
    @RezaTahmasb 7 месяцев назад

    nice!

  • @Bugua254
    @Bugua254 9 месяцев назад

    Got a better view of xss

  • @amoh96
    @amoh96 Год назад

    anyone can help me bypass akami waf :( ? & Thank you sir we miss live videos alot

  • @awais0x1
    @awais0x1 11 месяцев назад

    Love From Pakistan

  • @warnawarni5227
    @warnawarni5227 Год назад

    nice

  • @mohamedashraf2575
    @mohamedashraf2575 Год назад

    But still you can bypass < " '

  • @mr.koanti8035
    @mr.koanti8035 Год назад

    Great content , I hope you hit 100k subscriber soon , also i hope to make a collaboration if that is possible

  • @bakeery
    @bakeery 10 месяцев назад

    Thank you so much for such a great contents it really helps.
    Sometimes the payload rejected as a string on the page like 'Hi' how does that filtering works, can it be really byepass, i encountered several of this type of filter

    • @rs0n_live
      @rs0n_live  10 месяцев назад

      Thank you!! It all depends on how the application is sanitizing the input. I'm working on a new video on client-side injections that should help a lot, but as a general rule you will need to bypass one or more of these compensating controls:
      1. Cookie Flags
      6. Browser Security Headers
      2. Content Security Policy (CSP)
      3. Web Application Firewall (WAF)
      4. Client-Side Validation
      5. Server-Side Validation
      7. Output Encoding