Dear Sir, Please do cover these crucial topics also. Like... How to bypass Drupal CMS How to bypass WAF protection that stops HTML, SQL, and XSS injection payloads? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc. How to bypass WAF using SQLMAP How to find hidden vulnerable parameters and endpoints inside the.js files? How to find hidden admin panels & cPanel and WHM panels. Please cover these important topics. Thanks
You didn't not show how get reverse shells?? Also tell me one things what is "phar" is this command used to execute any malicious payload either RCE payload or XSS payloads in Burpsuite to get our payload executed on server? Does this "phar" command is used for that purpose to gain reverse shell directly??
My video with reverse shells was delete by YT. Not in my control unfortunately. Here is a good write up pentest-tools.com/blog/exploit-phar-deserialization-vulnerability
Can I ask, where does the application read from the picture? I mean which part does the web application read from inside the picture? Exif data or what? And many thanks for great content
If any website allows to upload files then we can perform all types web attacks. Main game starts when we see highly secured websites on HackerOne Bugcrowd Intigrity heavily protected by hard WAF CDN IPS etc. Humble advice to all new bug hunters don't waste 😉 your time and efforts on DVWA PORTSWIGGER BWAPP labs because these labs make you believe that you can hunt bugs on real live websites which is not the case in actual situation that's why 99.99% bug hunting students quit this field. If you want to be a REAL website hacker pentester exploitation expert then must practice on real live websites. Thanks 🎉❤
Very true. But at the same time you still can find a lot of upload flaws on real websites participating in bug bounty programs (particularly SMB companies). Especially the content type not checked or the extension obfuscation are quite common still. For new hunters focusing on access control, IDOR and business logic is probably the quickest way to make some success.
It totally depends on the version. There is no one fits all. I suggest googling for the version or simply follow the steps in the video. However as said, it won't work in other versions.
Dear Sir,
Please do cover these crucial topics also. Like...
How to bypass Drupal CMS
How to bypass WAF protection that stops HTML, SQL, and XSS injection payloads? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc. How to bypass WAF using SQLMAP How to find hidden vulnerable parameters and endpoints inside the.js files? How to find hidden admin panels & cPanel and WHM panels. Please cover these important topics. Thanks
I will do many more videos around many topics
@@martinvoelk Thanks 😊 Martin ✅️🤴👍✨️💉❤️🔑🫡
You didn't not show how get reverse shells?? Also tell me one things what is "phar" is this command used to execute any malicious payload either RCE payload or XSS payloads in Burpsuite to get our payload executed on server? Does this "phar" command is used for that purpose to gain reverse shell directly??
My video with reverse shells was delete by YT. Not in my control unfortunately.
Here is a good write up
pentest-tools.com/blog/exploit-phar-deserialization-vulnerability
Can I ask, where does the application read from the picture? I mean which part does the web application read from inside the picture? Exif data or what? And many thanks for great content
please dm. Not sure I understand the question
extension and meta data
nice work Sir 😀
Thank you! Cheers!
love it ❤
Thanks
If any website allows to upload files then we can perform all types web attacks. Main game starts when we see highly secured websites on HackerOne Bugcrowd Intigrity heavily protected by hard WAF CDN IPS etc. Humble advice to all new bug hunters don't waste 😉 your time and efforts on DVWA PORTSWIGGER BWAPP labs because these labs make you believe that you can hunt bugs on real live websites which is not the case in actual situation that's why 99.99% bug hunting students quit this field. If you want to be a REAL website hacker pentester exploitation expert then must practice on real live websites. Thanks 🎉❤
Very true. But at the same time you still can find a lot of upload flaws on real websites participating in bug bounty programs (particularly SMB companies). Especially the content type not checked or the extension obfuscation are quite common still. For new hunters focusing on access control, IDOR and business logic is probably the quickest way to make some success.
try.
Very informative!
Glad you liked it
Can u teach me how to download burp pro in mac
Portswigger has a step by step how to on their website explaining in great detail
Why did you choose monologue?
based on recon of the app.
💯💯
thanks
Very nice bro
Thanks
whats monolog/rce2?
it's a gadget chain.
phpggc -l monolog
Gadget Chains
-------------
NAME VERSION TYPE VECTOR I
Monolog/RCE1 1.4.1
Can you share the jpg file
I will provide a GitHub repo in the future
Hello sir can i have the picture ، can you upload it on mega or some other website and give me the link to download also Thx for the video
It totally depends on the version. There is no one fits all. I suggest googling for the version or simply follow the steps in the video. However as said, it won't work in other versions.
That toolbar at the bottom. 💀💀💀💀
haha