Thank you for the wonderful videos. I watched most of them, but I have a problem with waf. When fuzz for subdomain enumeration or directory or hidden parameter or anything after a short period of time, l block with waf, and the response is late from the server.
The way you trigger WAF is trying to access the specific endpoints or sending malicious requests. It's just an another layer of defense for websites. Unfortunately, its the biggest pain in the ass for most cases while doing bug bounties. I will be sharing some extra videos on this topic in the future, to help avoid it or bypass it. Feel free to check discord, if you have some questions or looking for collabs ;)
Dude, you're totally killing it with your techniques, way ahead of everyone else!
My pleasure!
yooo! My brother has again contributed some best things for the community! God bless you dear
Thanks bro!
This is a very good approach! Congrats on your success
Thanks so much!
Thanks
We need more content like this
gr8 video......need more like this..also on advance xss filter bypass
Noted!
its really helpfull dude, thank you for making this video
My pleasure!
New subscriber here, i really love your content mate!
Welcome aboard!
i love this content, thank you Ott3rly
Pretty goodddddddd Man really awesome content
Glad you enjoyed
Subscribed! Amazing content, I have just started BB
Welcome aboard!
Hello bro honestly you are doing great job I'm learning a lot from you where are you from
Hey, thanks. I'm from Lithuania.
Any video about browser extension u are using rare one ?
Not sure if that need extra video, but I could answer in next Q/A.
Thx great video 🫶🏽
Awesome 😮
Thanks 🤗
Thank you for the wonderful videos. I watched most of them, but I have a problem with waf. When fuzz for subdomain enumeration or directory or hidden parameter or anything after a short period of time, l block with waf, and the response is late from the server.
The way you trigger WAF is trying to access the specific endpoints or sending malicious requests. It's just an another layer of defense for websites. Unfortunately, its the biggest pain in the ass for most cases while doing bug bounties. I will be sharing some extra videos on this topic in the future, to help avoid it or bypass it. Feel free to check discord, if you have some questions or looking for collabs ;)
@@Ott3rly❤
Best best best 😮
great video boss
Appreciate it!
From where i can practice this bug bounty, i mean do you have any write ups?
Yes I do share a lot of tips and blog posts, check links on channel description.
@@Ott3rly thank you brother
@@Ott3rly I have another doubt, is there any vulnerability in code 503?
Nice ❤🔥
amazing
How to find what ruals in wfa was used in a website
You will never know. I've just shown how it looks from defensive side.
Osmm video 🎉❤❤❤❤❤❤❤
Thanks 🤗
Nice ❤
Glad you like it
Video is exllent
Thanks!
I'd like to see one on wordfence
That's too specific topic. I might work on that sometime, but not in the near future.
Basically I'm lame in escape tag normally ">< this doesn't not work ;// I try this do i have to learn specific things in JavaScript to understand this
It's always about the context where your payload will end up. Practise makes it perfect!
Nice video brother ❤
Thanks ✌
Auth Videos