XSS WAF Bypass Techniques

Поделиться
HTML-код
  • Опубликовано: 16 янв 2025

Комментарии • 52

  • @iloiskihailm8710
    @iloiskihailm8710 10 месяцев назад +3

    Dude, you're totally killing it with your techniques, way ahead of everyone else!

    • @Ott3rly
      @Ott3rly  10 месяцев назад +1

      My pleasure!

  • @cyberpro151
    @cyberpro151 10 месяцев назад +1

    yooo! My brother has again contributed some best things for the community! God bless you dear

    • @Ott3rly
      @Ott3rly  10 месяцев назад +1

      Thanks bro!

  • @PleaseTheNinja
    @PleaseTheNinja 10 месяцев назад +1

    This is a very good approach! Congrats on your success

    • @Ott3rly
      @Ott3rly  10 месяцев назад

      Thanks so much!

  • @Khalid-bm4fw
    @Khalid-bm4fw 8 месяцев назад +2

    Thanks
    We need more content like this

  • @abhinavbansal-cc8gr
    @abhinavbansal-cc8gr 10 месяцев назад +3

    gr8 video......need more like this..also on advance xss filter bypass

    • @Ott3rly
      @Ott3rly  10 месяцев назад

      Noted!

  • @nurmuhammadkevin8395
    @nurmuhammadkevin8395 4 месяца назад +2

    its really helpfull dude, thank you for making this video

    • @Ott3rly
      @Ott3rly  4 месяца назад +1

      My pleasure!

  • @detective5253
    @detective5253 10 месяцев назад +1

    New subscriber here, i really love your content mate!

    • @Ott3rly
      @Ott3rly  10 месяцев назад +1

      Welcome aboard!

  • @ilhamdn23
    @ilhamdn23 8 месяцев назад +1

    i love this content, thank you Ott3rly

  • @asifsaifi2925
    @asifsaifi2925 10 месяцев назад +1

    Pretty goodddddddd Man really awesome content

    • @Ott3rly
      @Ott3rly  10 месяцев назад

      Glad you enjoyed

  • @vlogsprasenjit
    @vlogsprasenjit 10 месяцев назад +1

    Subscribed! Amazing content, I have just started BB

    • @Ott3rly
      @Ott3rly  10 месяцев назад +1

      Welcome aboard!

  • @HeroKing-xg6ys
    @HeroKing-xg6ys 4 месяца назад +1

    Hello bro honestly you are doing great job I'm learning a lot from you where are you from

    • @Ott3rly
      @Ott3rly  4 месяца назад

      Hey, thanks. I'm from Lithuania.

  • @overthinker1877
    @overthinker1877 10 месяцев назад +1

    Any video about browser extension u are using rare one ?

    • @Ott3rly
      @Ott3rly  9 месяцев назад +1

      Not sure if that need extra video, but I could answer in next Q/A.

  • @overthinker1877
    @overthinker1877 10 месяцев назад +1

    Thx great video 🫶🏽

  • @sattharzakeer9594
    @sattharzakeer9594 10 месяцев назад +1

    Awesome 😮

    • @Ott3rly
      @Ott3rly  10 месяцев назад

      Thanks 🤗

  • @AhmedMoubarak-pz5yu
    @AhmedMoubarak-pz5yu 10 месяцев назад +1

    Thank you for the wonderful videos. I watched most of them, but I have a problem with waf. When fuzz for subdomain enumeration or directory or hidden parameter or anything after a short period of time, l block with waf, and the response is late from the server.

    • @Ott3rly
      @Ott3rly  10 месяцев назад +1

      The way you trigger WAF is trying to access the specific endpoints or sending malicious requests. It's just an another layer of defense for websites. Unfortunately, its the biggest pain in the ass for most cases while doing bug bounties. I will be sharing some extra videos on this topic in the future, to help avoid it or bypass it. Feel free to check discord, if you have some questions or looking for collabs ;)

    • @AhmedMoubarak-pz5yu
      @AhmedMoubarak-pz5yu 10 месяцев назад

      ​@@Ott3rly❤

  • @BanglarPranChitra
    @BanglarPranChitra 10 месяцев назад +1

    Best best best 😮

  • @Lazyhackerbd
    @Lazyhackerbd 10 месяцев назад +1

    great video boss

    • @Ott3rly
      @Ott3rly  10 месяцев назад +1

      Appreciate it!

  • @Shapeshiftshow
    @Shapeshiftshow 10 месяцев назад +1

    From where i can practice this bug bounty, i mean do you have any write ups?

    • @Ott3rly
      @Ott3rly  10 месяцев назад +1

      Yes I do share a lot of tips and blog posts, check links on channel description.

    • @Shapeshiftshow
      @Shapeshiftshow 10 месяцев назад

      @@Ott3rly thank you brother

    • @Shapeshiftshow
      @Shapeshiftshow 10 месяцев назад

      @@Ott3rly I have another doubt, is there any vulnerability in code 503?

  • @HasanthaGimhana
    @HasanthaGimhana 6 месяцев назад +1

    Nice ❤‍🔥

  • @Shintowel
    @Shintowel Месяц назад

    amazing

  • @munchlenova6353
    @munchlenova6353 10 месяцев назад +1

    How to find what ruals in wfa was used in a website

    • @Ott3rly
      @Ott3rly  10 месяцев назад +1

      You will never know. I've just shown how it looks from defensive side.

  • @devrajdhiwar9028
    @devrajdhiwar9028 10 месяцев назад +1

    Osmm video 🎉❤❤❤❤❤❤❤

    • @Ott3rly
      @Ott3rly  10 месяцев назад

      Thanks 🤗

  • @ss-rc1gy
    @ss-rc1gy 10 месяцев назад +1

    Nice ❤

    • @Ott3rly
      @Ott3rly  10 месяцев назад

      Glad you like it

  • @munchlenova6353
    @munchlenova6353 10 месяцев назад +1

    Video is exllent

    • @Ott3rly
      @Ott3rly  10 месяцев назад

      Thanks!

  • @TrackinDaMeta
    @TrackinDaMeta 6 месяцев назад

    I'd like to see one on wordfence

    • @Ott3rly
      @Ott3rly  6 месяцев назад

      That's too specific topic. I might work on that sometime, but not in the near future.

  • @c_war
    @c_war 10 месяцев назад +2

    Basically I'm lame in escape tag normally ">< this doesn't not work ;// I try this do i have to learn specific things in JavaScript to understand this

    • @Ott3rly
      @Ott3rly  10 месяцев назад +2

      It's always about the context where your payload will end up. Practise makes it perfect!

  • @RajuHa-g3m
    @RajuHa-g3m 10 месяцев назад +1

    Nice video brother ❤

    • @Ott3rly
      @Ott3rly  10 месяцев назад

      Thanks ✌

  • @KH-en1yr
    @KH-en1yr 10 месяцев назад +1

    Auth Videos