Cross-Site Scripting (XSS) Explained! // How to Bug Bounty

Поделиться
HTML-код
  • Опубликовано: 9 фев 2025

Комментарии • 101

  • @NahamSec
    @NahamSec  3 месяца назад

    Want to learn directly from me? Check out my course here: app.hackinghub.io/hubs/nahamsec-bug-bounty-course

  • @Skaxarrat
    @Skaxarrat 11 месяцев назад +37

    This is my favourite format. You should do all the Top 10 OWASP vulnerabilities (Or Top 25...) like this one.

  • @wolfrevokcats7890
    @wolfrevokcats7890 Месяц назад

    Finally, someone is teaching XSS the right way. I'm glad that you're listening, I love how you make the font way bigger than your old video. I can watch your video even in mobile phone now if I don't feel like to open a laptop. Thanks man appreciate it

  • @mamuli01
    @mamuli01 4 месяца назад +1

    naham sir i just opened this video for 10 seconds and thought of exiting it but read the first comment on ur video and damn i am blown away by your explanation

    • @NahamSec
      @NahamSec  3 месяца назад +1

      I'm so happy to hear that! I hope this helped!

  • @aswadshaikh8312
    @aswadshaikh8312 11 месяцев назад +9

    Awesome video Naham.Absolutely loved it.
    Just one suggestion:- Can you please go a little slow next time? As someone from a technical background I could understand everything and keep up with u but even a lapse of couple of secs would lose me completely about what's happening

  • @veeppiaar1722
    @veeppiaar1722 19 дней назад

    Good Video for learning XSS. Thanks Naham :)

  • @rydanstark9494
    @rydanstark9494 11 месяцев назад +4

    Great man. Your videos helped me transition into Webapp pentesting from System Pentesting ❤🎉
    More Power to you

  • @BoricuaFez
    @BoricuaFez 11 месяцев назад +1

    Thanks for the information. Been working on a target that has made me loose motivation and taken me down a rabbit hole about JS and React.JS. This video and others gave another point of view on how to approach the target.
    Thank you again!

  • @AliYar-Khan
    @AliYar-Khan 11 месяцев назад +4

    Damn ... the only thing now holding us to hunt XSS are our own Procrastination

  • @lostsecArmy
    @lostsecArmy 11 месяцев назад +5

    🎉🎉🎉 love you from Pakistan 🎉🎉🎉

  • @saadadil6112
    @saadadil6112 2 месяца назад

    great video naham .absolutely loved it

  • @vlogsprasenjit
    @vlogsprasenjit 11 месяцев назад +1

    Great start❤

  • @un4v5s83
    @un4v5s83 11 месяцев назад

    thank you so much! i feel indebted to learn this much from scratch and from only knowing the terminology of XSS that need put payload on some parameter into this little more advanced things that very interesting to me to learn about. I need to learn more and how far the learning goes? (Try to play auto5d chess in case one day i will come back to this video)

  • @souraldandothi5681
    @souraldandothi5681 11 месяцев назад

    Great Approach! Looking forward to it!

  • @WorldwideWave811
    @WorldwideWave811 5 месяцев назад

    i really love your content bro, helps me learn alot as a cyber security student

  • @rohitshastry2007
    @rohitshastry2007 11 месяцев назад +4

    Really Great Stuff!! Thanks for the 5WP

  • @ss-rc1gy
    @ss-rc1gy 11 месяцев назад +4

    awesome content , what about the DOM xss and stored xss?

    • @papafhill9126
      @papafhill9126 11 месяцев назад +2

      NahamSec probably wants people to find injection points first, that's the "foothold" so to speak. Then you escalate from there, so RXSS is a great first step to getting to escalation.

    • @ss-rc1gy
      @ss-rc1gy 11 месяцев назад

      Ya , that makes a lot of sense 😁

    • @vexed3185
      @vexed3185 6 месяцев назад

      ​@@papafhill9126 Hey man, i dont understand, how can this affect the webapp? like does it edit the main code of the webapp or what?

  • @MiroPeev
    @MiroPeev 11 месяцев назад

    Great video and content! Thanks for helping out ....One question i have - where do you install your attack box for bug bounty? Is it on the VPS provider or it is local on your machine?

    • @sanjaiKumar-.-
      @sanjaiKumar-.- 11 месяцев назад

      I would positively say he uses a VPS

  • @ExplorewithRite
    @ExplorewithRite 11 месяцев назад

    the blog title field seemed to have a validation check ,is it possible that it would be bypassed ? and hence archieve xss through the blog title field

  • @Dext3r-Hwqkwtom
    @Dext3r-Hwqkwtom 11 месяцев назад

    Thank you for sharing your knowledge. Please extend this to 10 weeks 🙏🙏🙏

  • @haanrey
    @haanrey 11 месяцев назад +2

    Lookingg fresh my byoyyyy !!!🤩

  • @rctech1237
    @rctech1237 11 месяцев назад +30

    I am feeling like a bug hunter now 😂😊

  • @ezekiel-my1pl
    @ezekiel-my1pl 8 месяцев назад +1

    well explained! thank you for this

  • @parshva3516
    @parshva3516 11 месяцев назад

    do you suggest using a VPN while testing?

  • @askholia
    @askholia 11 месяцев назад +1

    Great video!

  • @razmjumehdi9069
    @razmjumehdi9069 11 месяцев назад

    Do you upload videos for 5 weeks on this RUclips channel?

  • @Frawkesish
    @Frawkesish 11 месяцев назад +5

    So I'm not gonna lie.. I've been trying to learn the art of bug bounties for some time and to be frank I got overwhelmed and pivoted to Web Development.. even landed a gig as a developer and about 6 months in now I'm back to try again.. I feel like this makes a hell of a lot more sense now having built several web apps now. I guess I should start by just hacking my own shit..

    • @ciconid
      @ciconid 11 месяцев назад

      What resources did you use to learn Web Dev?

    • @Frawkesish
      @Frawkesish 11 месяцев назад +1

      @@ciconid Fireship youtube channel and practice. Start with a project you think is cool and learn how to build that. You don't have to know everything to build something.

    • @musaharuna756
      @musaharuna756 9 месяцев назад

      ​@@FrawkesishBut how did you find the gig. Is it a full time?

    • @Frawkesish
      @Frawkesish 9 месяцев назад

      @@musaharuna756 I actually kinda "hacked" my way into my current role..
      I was working at an *insert retail company* and I found a simple issue I could solve. For me I found it frustrating we had to post a pic to discord and wait for a response to get the price of something that wasn't scanning.I ended up making discord bot with a simple database so I could search for the price of some specific items by name . I waited for a good opportunity to show it off to the right people and landed a gig . I don't get paid that silicon valley programmer pay but I now make a decent enough salary considering I had Zero experience and no degrees..
      Note they are not even close to a tech company and I am the only developer.. it is very stressful at times but if I gotta go another year or 2 to keep building my resume up then so be it !

    • @Frawkesish
      @Frawkesish 9 месяцев назад

      @@musaharuna756 I'm not sure if my comment actually worked or not. RUclips is tripping

  • @shubhamgupta-ji9nh
    @shubhamgupta-ji9nh 11 месяцев назад +2

    at 9:48, instead of an application, there is api running in the background of the application and it has a parameter which is un-used in the api, is there any possibility of a XSS considering the request is in json?

  • @Couple-Rounds
    @Couple-Rounds 11 месяцев назад +1

    Lots of Love 🇰🇪

  • @WaseemLaghari-m4e
    @WaseemLaghari-m4e 11 месяцев назад

    Once i got xss on TikTok but on that time they did not start their bug bounty program 😢

  • @leghdaf
    @leghdaf 11 месяцев назад +1

    Great Content ...

  • @MarkFoudy
    @MarkFoudy 11 месяцев назад +4

    Thanks for the content, nahmsec!

  • @SamuelEssa-ic6bt
    @SamuelEssa-ic6bt 3 месяца назад

    the last way this is self XSS ?

  • @b.i_khalil
    @b.i_khalil 11 месяцев назад +1

    How do I login with an API key??

  • @mr.bouttacheck6656
    @mr.bouttacheck6656 11 месяцев назад

    Within the next 4 weeks ima get something on one of those targets 💪🏾

  • @enigma.better
    @enigma.better 11 месяцев назад +1

    You really gotta do this for other common vulnerabilities too we all love this kind of content

  • @itikkulayanowich
    @itikkulayanowich 11 месяцев назад +3

    Does anybody here with ADHD who are super passionate about pentesting but struggling to start it?! 😢

    • @skyedunphy
      @skyedunphy 11 месяцев назад +2

      Thats so me

    • @bhavypatel1642
      @bhavypatel1642 11 месяцев назад +1

      Yes bro I am same here

    • @itikkulayanowich
      @itikkulayanowich 11 месяцев назад +1

      @@skyedunphy I knew I wasn't alone. But the only way for us to survive this is we people with ADHD have to work together. Or we'll probably eventually become broke af. But the best thing about us is we can super skilled and hyperfocused in the IT field. Especially since we are good at finding things. Would be helpful if you have any suggestions for solving this problem. Because I'm just too tired of just wasting my time and saving videos like these to my watch later list.

    • @garrettguthrie2536
      @garrettguthrie2536 2 месяца назад

      @@itikkulayanowich me too!!!

  • @Farsheedify
    @Farsheedify 11 месяцев назад +1

    Thanks for the amazing content.

  • @mohammedettayby
    @mohammedettayby 6 месяцев назад

    Thanks man this vidéo help me to get my first bounty

  • @thegyanshow812
    @thegyanshow812 11 месяцев назад +1

    amazing🤠🤠

  • @mmnahian
    @mmnahian 11 месяцев назад +4

    i am first bro

  • @lol-hz9mc
    @lol-hz9mc 11 месяцев назад

    Thank you for the video sir!

  • @am012z
    @am012z 11 месяцев назад +1

    Amazing 👏

  • @xskdak
    @xskdak 4 месяца назад

    Make us more technical content and more hackinghub hubs, can we have a open redirect explained?

  • @praveenmsp
    @praveenmsp 11 месяцев назад

    Why do you always change the protocol to http?

    • @NahamSec
      @NahamSec  11 месяцев назад

      Because the labs were having issues and only worked over HTTP. We did implement a fix though!

  • @ucheugbomah2228
    @ucheugbomah2228 11 месяцев назад

    all this you found means that this all vul?

  • @gamerz9129
    @gamerz9129 11 месяцев назад +2

    i always get double quote filter " is there any technique to bypas the double quote filter ?

  • @fabiothebest89lu
    @fabiothebest89lu 11 месяцев назад

    I learnt something new, thanks

  • @Duskk0077
    @Duskk0077 11 месяцев назад +1

    Great video thx

  • @ankitjha883
    @ankitjha883 11 месяцев назад +1

    Ben is really good

  • @preciousjoyb
    @preciousjoyb 10 месяцев назад

    Me, I am a Software QA and starting to learn Pentesting bug bounty

  • @bertrandfossung1216
    @bertrandfossung1216 11 месяцев назад

    Thank you for this awesome video. Little by little I’m grabbing these .

  • @elinamk12
    @elinamk12 5 месяцев назад

    so good big thanks.

  • @Bit_Fury
    @Bit_Fury 11 месяцев назад +1

    Thank you very much
    You have given us so much 😊❤

  • @GilligansTravels
    @GilligansTravels 11 месяцев назад +1

    Thank you

  • @MarkFoudy
    @MarkFoudy 11 месяцев назад +4

    First

  • @Nebuchadnezzar777-e7d
    @Nebuchadnezzar777-e7d 5 месяцев назад

    5:37

  • @aquatester
    @aquatester 11 месяцев назад

    THANKS DUDE!!!!!!!!!!!!

  • @AbhishekGupta-fz5dn
    @AbhishekGupta-fz5dn 11 месяцев назад +11

    this is the best video on internet about XSS

  • @AbdelrahmanAwad-kd5le
    @AbdelrahmanAwad-kd5le 11 месяцев назад

    bro you are awesome

  • @ahmada8629
    @ahmada8629 11 месяцев назад +1

    ✌🏻😍

  • @شیداعسکری-ل5ل
    @شیداعسکری-ل5ل 11 месяцев назад +1

    Great

  • @Learning.Something.New.Daily.
    @Learning.Something.New.Daily. 11 месяцев назад +1

    👍🏻

  • @h4s4n_ma
    @h4s4n_ma 11 месяцев назад

    wow😍

  • @minervaa0001
    @minervaa0001 2 месяца назад

    şu bugbounty öğrenmeye çalışan türk yok mu ya birlikte öğrenelim yazsınn

  • @afghan_muwaheed
    @afghan_muwaheed 9 дней назад

  • @MhdiSec
    @MhdiSec 11 месяцев назад

    👏

  • @shubham_srt
    @shubham_srt 11 месяцев назад

    Thanks

  • @austynstephens9263
    @austynstephens9263 11 месяцев назад +1

  • @benjamenwitaker5437
    @benjamenwitaker5437 11 месяцев назад

    P r o m o s m

  • @iamwitchergeraltofrivia9670
    @iamwitchergeraltofrivia9670 11 месяцев назад

    Hahahhahahahhaha blocking dangerous prots 😡😡😡😡😡😡😡😡

  • @TylerDurden-dd1tq
    @TylerDurden-dd1tq 11 месяцев назад

    WOW A VIDEO ON HOW TO GET MY FIRST 350 DUPES. CRAZY.

  • @aftabsaifi2436
    @aftabsaifi2436 11 месяцев назад

  • @Cyber_AR15
    @Cyber_AR15 11 месяцев назад +1

    Great video 👍🏽

  • @newbiejember9854
    @newbiejember9854 11 месяцев назад

    Great content 🎉

  • @mehrankurd
    @mehrankurd 2 месяца назад

    Thanks

  • @rajiniganth5322
    @rajiniganth5322 11 месяцев назад

    great

  • @Nejtak853
    @Nejtak853 9 месяцев назад

    great