Testing XSS Tools On Target Protected By WAF | 2024

Поделиться
HTML-код
  • Опубликовано: 14 окт 2024
  • In this video, we dive into the world of web application security by testing various XSS tools on a target protected by a Web Application Firewall (WAF). We'll explore how effective different XSS tools are at bypassing WAF defenses and highlight techniques used by both attackers and defenders. Whether you're a penetration tester, bug bounty hunter, or just interested in cybersecurity, this demonstration will provide valuable insights into XSS vulnerabilities and WAF protections.
    XSS Strike: github.com/s0m...
    Dalfox: github.com/hah...
    ibrahimXSS: ibrahimxss.store/
    Coupon: BEPRACTICAL10
    For any queries realted to ibrahimXSS, please reach out to him: / ibrahim-husi%c4%87-101...
    Website: bepractical.tech
    Telegram: telegram.me/be...
    Previous Video: • 4 Ways To Use SQLMAP E...
    The Art Of Web Reconnaissance:
    www.udemy.com/...
    Hacking Windows with Python from Scratch: www.udemy.com/...
    The Ultimate Guide to Hunt Account Takeover:
    www.udemy.com/...

Комментарии • 55

  • @BePracticalTech
    @BePracticalTech  3 месяца назад +7

    For those who are saying this video is sponsored, Let me tell you all that it is not. It is just that i liked the tool and thought to share it with you all. Whether you are planning to buy it or not is completely up to you. Thanks

    • @aatankbadboy3941
      @aatankbadboy3941 3 месяца назад +2

      @@BePracticalTech it's okay but mention that this is sponsored... not only you are promoting it there are lots of other creators also...

    • @BePracticalTech
      @BePracticalTech  3 месяца назад +1

      This video is not sponsored by anyone nor I got paid to promote any of the tools. I even said in the video that if you don't want to buy the tool then it is completely fine..

    • @c_war
      @c_war 3 месяца назад +2

      This is overhyped tool

    • @kittoh_
      @kittoh_ 3 месяца назад +1

      Not sponsored but you have a discount code. 😅

  • @ishoeb0x1
    @ishoeb0x1 2 месяца назад +2

    Hello., Tested the same target endpoint in Knoxss. This tool was also able to found xss

    • @yesireact
      @yesireact 2 месяца назад

      U r saying knoxss not able to find ?

  • @SevenHeavenlyig
    @SevenHeavenlyig 3 месяца назад +9

    Bro made a promotional video without saying it's Sponsored by Ibrahimxss 😂😂

  • @ZeroOne-wooh
    @ZeroOne-wooh 3 месяца назад +18

    sponsored or not, im just disappointed by the fact that despite knowing the truth, you didn't let your audience know whats going on. its not the tool, its just the list of the payloads which any tool could use it and find same shit. Dalfox can do it if you pass those payloads. sponsoring is not bad, trying to cheat is. just be careful. you've worked hard to build your legacy. don't let cheap tricks get you or don't try to do cheap tricks on new bug bounty hunters. cuz sooner or later you will be called out. hope you don't repeat this in the future. and good luck

    • @yeahboy2389
      @yeahboy2389 8 дней назад

      Literally bro, I was also thinking the same. But, I believe that only script kiddies would fall for this.

  • @swapnilade2612
    @swapnilade2612 3 месяца назад +4

    Why not you doing ibrahim xss vs knoxss?

    • @syeddaniyal1273
      @syeddaniyal1273 3 месяца назад

      because it is a promotion of ibrahimXSS

    • @darkmix4192
      @darkmix4192 3 месяца назад

      How is this knoxss tool work and it give positive results?

  • @PrashantSingh-jg3jd
    @PrashantSingh-jg3jd 2 месяца назад

    So I assume this is how the ibrahimxss tool works: The tool requires binding with google chrome where the tool tracks for any kind of popups in real time within the browser may be possible with that specific chrome driver. The tool then use payload file to send the request by appending the payload with in the browser. If any pop ups comes then, the tool picks a screenshot and include that url in the final generated report. This may be the reason why ibrahimxss got false positive as seen in your video. It simply tracks the popups in real time against the list of payloads. I am be wrong though! Let me know if anyone else think the other way. cheers!

  • @aatankbadboy3941
    @aatankbadboy3941 3 месяца назад +3

    Love you bro I want ibrahim xss

  • @eyezikandexploits
    @eyezikandexploits 3 месяца назад

    could you post the payload list of the last tool? you have github?

  • @rushangshah6308
    @rushangshah6308 3 месяца назад +2

    Why not knoxss

  • @gg-mr4qr
    @gg-mr4qr 3 месяца назад

    can if you share the payload file that is very very helpful for us.

  • @pawankandu914
    @pawankandu914 3 месяца назад +1

    Sir if u can then please give us that payoad lists used by the paid tool in this video.....

    • @SuzuneMyQueen
      @SuzuneMyQueen 2 месяца назад

      many payload are available on public github repo such as coffinxp's github (in the payloads repo)

  • @nishantrmagar517
    @nishantrmagar517 2 месяца назад

    is this tool also run in mac ?

  • @sarans119
    @sarans119 3 месяца назад +3

    Bro it is asking API but I not received it

  • @DheerajMadhukar
    @DheerajMadhukar 3 месяца назад

    Which UI tool you are using to manage VPS(s) ?

  • @Prince-zu5uj
    @Prince-zu5uj 2 месяца назад

    Akamai waf bypass?

  • @Gladiator-zh9od
    @Gladiator-zh9od 3 месяца назад

    Brother make video on how to configure Firefox for burp on windows

  • @abdulx01
    @abdulx01 3 месяца назад

    I have same... Tool that exactly work like ibrahimxss but different is payload file.. If you have good payload list then..good. Same headless detection tool. No false posstie. And it's cost nothing free of cost. Thanks

  • @uttarkhandcooltech1237
    @uttarkhandcooltech1237 3 месяца назад

    Hello bhaiya windows theme bto apka jo h

  • @aatankbadboy3941
    @aatankbadboy3941 3 месяца назад +6

    Mention that this is sponsored 🎉

    • @songsxmashup
      @songsxmashup 3 месяца назад +1

      some people are getting tool free at all by doing this and that

  • @mrwaahmed9897
    @mrwaahmed9897 3 месяца назад

    lol i tested it and it's not bypass any wafs and u didn't try knoxss because it's the best

  • @ferryirawan1575
    @ferryirawan1575 2 месяца назад

    API KEY

  • @exploreThe_
    @exploreThe_ 2 месяца назад

    Its only the game of payload... not tool...

  • @taralnawal5333
    @taralnawal5333 2 месяца назад

    Bro only give this payload.txt file😂

  • @monKeman495
    @monKeman495 3 месяца назад +3

    dalfox can't even find a single shit , what a shame god knows what they r doing !

    • @eyezikandexploits
      @eyezikandexploits 3 месяца назад

      that second payload in dalfox triggered if you would have checked the dom

  • @l00pzwastaken
    @l00pzwastaken 3 месяца назад

    Use tag as sponsored. Let me tell you why the tool owner is giving everyone to promote his tool i have seen many tweets which are bullshit

  • @vijayanarasimhamarella
    @vijayanarasimhamarella 2 дня назад

    Don't trust him it's a promotion of his channel and users. He is playing cheap tricks.

  • @SecureByBhavesh
    @SecureByBhavesh 3 месяца назад +1

    First !!!

  • @WebWonders1
    @WebWonders1 2 месяца назад

    Faking 😅

  • @Ironhide234
    @Ironhide234 3 месяца назад +1

    First 😂

  • @tushargurav3987
    @tushargurav3987 2 месяца назад

    Disappointed :[

  • @4Re5_Xm
    @4Re5_Xm 2 месяца назад

    Disappointed

  • @rootxgod1086
    @rootxgod1086 3 месяца назад +5

    promotion

  • @d3crypt_m3
    @d3crypt_m3 3 месяца назад +7

    Why paid promotion 🥲