$1100 bugbounty | ssrf using html injection | bug bounty poc | hackerone | ssrf poc |

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • #education #learnEthicalHacking #bugbounty
    For education purpose only,
    you can learn the numerous ways to do a security testing for a website or mobile apps.
    like and subscribe to get notified with the latest exploits.

Комментарии • 31

  • @masthanjinostra2981
    @masthanjinostra2981 2 года назад +3

    Brother hello 👋. I have doubt. I can get blind ssrf request to burp collaborator url but when i give ip address I can’t get a ping back like this ?? Why ?? What ip should i give

    • @HACKERFUDDI
      @HACKERFUDDI  2 года назад +1

      for ip address use Shodan.
      And embed that URL to the burp collaborator payload.
      It's not necessary that you get a ping back.
      The endpoint might not be vulnerable.

    • @quietube.
      @quietube. Год назад +1

      Hey bro its not ssrf its something called "external service interaction"

  • @medjassertoubib4467
    @medjassertoubib4467 2 года назад +3

    well done . keep gonin

  • @LeonidasDAce
    @LeonidasDAce 2 года назад +4

    Isn’t it just a http request? Were you able to do any kind of SSRF based attacks like Port Scanning or others?

    • @HACKERFUDDI
      @HACKERFUDDI  2 года назад +1

      yes, there was a possibility for a attacker to do port scanning and has shown in video getting reverse sell is also possible.

    • @0xbitbybit
      @0xbitbybit 2 года назад +2

      @@HACKERFUDDI What reverse shell? That was just a HTTP request to your listener?

    • @leoleoleopp
      @leoleoleopp 6 месяцев назад

      @@HACKERFUDDI this isnt reverse shell lmao you just shown dns pingback

  • @kunal-kh1ws
    @kunal-kh1ws Год назад +2

    Nice bro 👍

  • @skysunset877
    @skysunset877 6 месяцев назад

    Hello. Thank you for good video. In 0:59, As far as I understand, if someone malicious refreshes a post registered with a malicious image code profile, will receive information, is my understanding correct?

    • @HACKERFUDDI
      @HACKERFUDDI  6 месяцев назад

      If some user gets to that place, and the attacker do have listener on, he will receive the information, no need to refresh.

  • @HackersGB
    @HackersGB 11 месяцев назад +1

    Bro zoom please your video

    • @ThirumaLi.mp4
      @ThirumaLi.mp4 8 месяцев назад

      Hii bro how are you I'm @Chhota_hacker

  • @statuslove2448
    @statuslove2448 2 года назад

    Bhai xss nikalne ki bonty milti hai kya bhaiya

  • @hiddenstar3393
    @hiddenstar3393 2 года назад +2

    Its not clear , can u share ur write-up plz !!

    • @HACKERFUDDI
      @HACKERFUDDI  2 года назад

      I don't write write-ups,
      But i recommend you to search for ssrf vector in Google and watch the video again.

  • @rahulacharya8159
    @rahulacharya8159 2 года назад

    Bounty?

  • @amanshendre5884
    @amanshendre5884 2 года назад

    Hi broo

    • @HACKERFUDDI
      @HACKERFUDDI  2 года назад +1

      Yo bro.

    • @amanshendre5884
      @amanshendre5884 2 года назад +1

      @HACKER FUDDI can u teching me pro in bug bonty i will daily 15 hours spending time with pc and i will all basics are clear and nmap use burp suite use and i will daily spand whool day this field but bro i can not achive any point please bro help me

    • @HACKERFUDDI
      @HACKERFUDDI  2 года назад +4

      Note:- I am not making fun of you.
      But you should improve your English.
      Finding and testing for bugs is 50%,
      Rest require reports writing skills.
      And for rest, read blogs, RUclips tutorials, buy some online courses.

    • @amanshendre5884
      @amanshendre5884 2 года назад

      Bhaiya English improve to ho jayegi but bhaiya propar guide chahiye our kitne din.me pura train ho shkta hu mai

    • @HACKERFUDDI
      @HACKERFUDDI  2 года назад +1

      Jotis dhika kya bhai me tere ko.