Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control

Поделиться
HTML-код
  • Опубликовано: 17 ноя 2024

Комментарии • 52

  • @TCMSecurityAcademy
    @TCMSecurityAcademy  3 года назад +2

    I hope you enjoyed this video! If so, please consider dropping a like and subscribing.

  • @superfunguy380
    @superfunguy380 5 лет назад +2

    Thank you TCM for the good session. Very informative.

  • @captainharlock31
    @captainharlock31 5 лет назад +3

    Thank you for fantastic SQLi explanation. Now, it's clear for me ^^

  • @manavacharya5916
    @manavacharya5916 День назад

    Hello sir.
    This is really informative.
    Thank you for putting this out there for newbies like myself :)

  • @gbravy
    @gbravy 5 лет назад +2

    To login as admin without SQL injection, create a new user and intercept with Burp. There's a parameter to change isAdmin to true. That allows new users to have admin status and now you can access Administration, delete 5-star, and succeed in that challenge.

  • @thilakesh9332
    @thilakesh9332 5 лет назад +1

    Bro Thanks for that wonderful session. Learn about how the SQL query is breaking it. Thanks for that video.

  • @7XSergio
    @7XSergio 5 лет назад +8

    Thank you for sharing your knowledge and experiences!
    Are you planning on doing a course on Code Review for Web apps assessments?

  • @gq23401
    @gq23401 5 лет назад +4

    Love from Helsinki.

    • @gq23401
      @gq23401 5 лет назад +4

      Super lovely content.

  • @ptlhanang
    @ptlhanang 5 лет назад +1

    Thanks TCM, another great vid!

  • @okashamoosasujela6646
    @okashamoosasujela6646 5 лет назад +2

    I used this payload for xss 1.5 alert(`xss`)

  • @moblemeh152
    @moblemeh152 4 года назад

    thank you for every video you upload !

  • @johnmcfree6150
    @johnmcfree6150 5 лет назад +2

    hey maybe you could answer this, I spent a good 10 mins trying to figure out the first xss, without any success, I could get too where you got, except for the bitwise part.. How are we suppose to know to try that? I don't get it, that would have never ever crossed my mind :/

  • @Роберт-и8х
    @Роберт-и8х 5 лет назад +2

    Love you!!Love you!!Love you!!

  • @adityakiddo6554
    @adityakiddo6554 10 месяцев назад

    Once was top 5 but BAC is top 1 now

  • @superman9300
    @superman9300 4 года назад

    Another excellent video

  • @paragrana7533
    @paragrana7533 4 года назад

    Please upload Stored XSS sanitized thing again not working in latest juiceshop. FYI - I am running it in heroku as have 2gb Ram laptop that can't handle virtual machine or any large softwares.

  • @saurabh7955
    @saurabh7955 3 месяца назад

    Awesome Bro....

  • @PAWANKUMAR-nk2ub
    @PAWANKUMAR-nk2ub 5 лет назад +2

    How do you perform xss attack when alert prompt is blocked?

    • @AmineOnline
      @AmineOnline Год назад

      you bypass content security policy using the link in image
      there a recent video i solved that

  • @muhammadadel9537
    @muhammadadel9537 5 лет назад +1

    You are my Best !! ^_^

  • @adityakiddo6554
    @adityakiddo6554 10 месяцев назад

    Hey tcm ,,can u tell me alternate sites for juiceshop cauz its no longer working

  • @JoaoPaulo-gj5lx
    @JoaoPaulo-gj5lx 5 лет назад +2

    Bom dia por aí. (Good morning there).

  • @nabinrai7700
    @nabinrai7700 5 лет назад +1

    Very helpful thank you 😊

  • @DigitalTrendzy2023
    @DigitalTrendzy2023 5 лет назад +2

    Hi Bro can u please make owasp api top 10 video also .I am watching all of your tutorials are awsome

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 лет назад

      APIs are susceptible to most of the same attacks as web apps (e.g. injection, IDOR, XSS, etc.)

  • @ir4640
    @ir4640 5 лет назад

    How does the page load the urls with a # in them, i don't see any get requests for loading for example/#/score-board or so

  • @tanercoder1915
    @tanercoder1915 4 года назад

    I tried every possible password from that mc safesearch's video. I got his email from the admin panel. but password just don't match.

  • @gustavoosoriolopez
    @gustavoosoriolopez 5 лет назад +3

    Saludos desde Colombia

  • @Роберт-и8х
    @Роберт-и8х 5 лет назад +1

    Can you make or advise where to learn thing that black hat hackers do to understand how to secure from them? Can you act on all your video as an black hat would do? Only for educational purposes.

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 лет назад +2

      I stay far away from any blackhat talk or discussion to keep the RUclips gods happy

  • @mayankmehra722
    @mayankmehra722 4 года назад

    i can't find xss tier in juiceshop

  • @DarkOverFlowOverflow
    @DarkOverFlowOverflow 5 лет назад +3

    Do some bug bounty searching live

  • @vq8gef32
    @vq8gef32 Год назад

    Thank you so much

  • @SecurityTalent
    @SecurityTalent 3 года назад

    Thanks

  • @miss-sw3qu
    @miss-sw3qu 4 года назад

    During your XSS TIER 1.5 , I do not really quite understand how you are doing with bitwise operators. I did research and google and portswigger.net, but still don't seem to understand it... Any suggestions for me to learn about this?
    I went through great portswigger tutorial : support.portswigger.net/customer/portal/articles/2590804-Methodology_XSS_Filters.html#Signature