PortSwigger Labs - Reflected XSS into HTML context with all tags blocked except custom ones

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024

Комментарии • 32

  • @ImPerhapsLater
    @ImPerhapsLater Год назад +7

    Great explanation of why this attack works... so many others just post the script as their "solution" without explaining how to get there. Thank you!!

  • @التدريسالالكتروني

    man you are amazing in explaining !! please continue solving labs

  • @OhmKumar-j5f
    @OhmKumar-j5f 7 месяцев назад

    awesome explanation dude cleared all doubts please cover all labs of xss

  • @东倪
    @东倪 Год назад

    Your explanation is very insightful, thank you

  • @krishgohel9403
    @krishgohel9403 11 месяцев назад

    what an explaination bro 😇 so underrated channel

  • @ggm3743
    @ggm3743 Год назад +1

    what a wonderful explanation! How did you become this good in html, js...? I am trying to break into bug hunting but I dont know how much js should i actually learn? I know (university-level) C, Java and Python so its easier to understand Js for me now. Should i learn js and train on Portwigger labs at the same time or what would you recommend? Thank you :)

  • @nimaasadi730
    @nimaasadi730 Год назад

    Great explanation with great teaching

  • @amol24by7
    @amol24by7 10 месяцев назад

    Awesome explanation

  • @pinkypink2410
    @pinkypink2410 Год назад

    very useful,thank you!

  • @youssefblt9839
    @youssefblt9839 7 месяцев назад

    thank s for the explaination too

  • @nayar_km
    @nayar_km 6 месяцев назад

    awesome explanation

  • @anamariedevera8635
    @anamariedevera8635 6 месяцев назад

    I love your channel

  • @yuraekim9389
    @yuraekim9389 Год назад

    You are really good! Thank you

  • @solvedandlearned3878
    @solvedandlearned3878 8 месяцев назад

    Is it necessary to have the tabindex even if we include our id value in the url hash.?

  • @التدريسالالكتروني

    please make a video about this lab Reflected XSS in a JavaScript URL with some characters blocked

  • @imgyanesh_0
    @imgyanesh_0 2 месяца назад

    I am also doing same as you but after open xss.html page it write refused to connect
    What can I do sir

  • @lIlIllll1
    @lIlIllll1 Год назад

    YOU ARE GREAT

  • @mukoshmanob9240
    @mukoshmanob9240 Год назад

    sir, how will you know that 'onload' event not work? how i understand

  • @sscoconut1265
    @sscoconut1265 7 месяцев назад

    what does the # mean bro? does it mean calling a specific id?

  • @Shaik_Afrid
    @Shaik_Afrid Год назад

    bro how ur doing this i mean in order to understand all these stuff how much js should i learn

  • @ginsteward9673
    @ginsteward9673 Год назад

    thanks my bro. it's usefull

  • @torhat
    @torhat Год назад

    I feel like you say "Let's get started" intentionally in a slightly different way. Lol

  • @abhishekbiswakarma1541
    @abhishekbiswakarma1541 Год назад

    brother i am using the same payload but the lab is not solving

    • @warwolf5154
      @warwolf5154 Год назад

      yes form also its not working

  • @knowledgeboxbd9625
    @knowledgeboxbd9625 Год назад

    How you know that this search box is vulnerable to tabintex?

    • @CodeVerd
      @CodeVerd  Год назад +2

      When u use custom payload ,and if you know it's vulnerable, mostly u must use "tabindex" .In real world we need to check if tabindex is allowed or not

    • @knowledgeboxbd9625
      @knowledgeboxbd9625 Год назад

      @@CodeVerd Thanks bro now i understand .🥰

    • @CodeVerd
      @CodeVerd  Год назад

      @@knowledgeboxbd9625 ♥️

  • @محمّد.09
    @محمّد.09 Год назад

    nice

  • @hillclise1034
    @hillclise1034 Год назад

    Amazing clips . Want more views? -> Promo SM!!