How To Search For DOM-Based XSS!

Поделиться
HTML-код
  • Опубликовано: 5 янв 2025

Комментарии • 101

  • @UnknownSend3r
    @UnknownSend3r 3 года назад +18

    BRILLIANT! two days of surfing the web to understand it and you explained it in under 10 mins. just subbed!

    • @intigriti
      @intigriti  3 года назад +5

      Awww, glad to hear that 😇. Thanks, more easy to understand videos to come!

    • @Truth_Seeeker
      @Truth_Seeeker 2 года назад +2

      two days worth it bro

  • @salman2464
    @salman2464 3 года назад +18

    Best XSS methodology explanation I’ve found in Years. Great work Bro, kudos for Intigriti 👍

    • @intigriti
      @intigriti  3 года назад +1

      Ohh wow 😊. in years? Thanks for that super lovely feedback!!
      More videos to come 😇

  • @ИванСыралёв-х7я
    @ИванСыралёв-х7я 2 года назад +6

    That video just saved me from hours of headaches. It is much more detailed then the writeup for that lab. Thank you

    • @intigriti
      @intigriti  2 года назад +1

      Thank you very much for that great feedback! ❤️ super glad it helped you!

  • @exohive5608
    @exohive5608 Год назад +1

    Been working on this lab too; was focused too much on the additional js files at the end of the script. You’ve explained it well! Thank you!

    • @intigriti
      @intigriti  Год назад

      Awesome, glad it helped 💜

  • @Enigma_0x1
    @Enigma_0x1 2 года назад +1

    This video was put together very well. It is thoroughly and simply explained. It is really hard to find this quality content online for cybersecurity

    • @intigriti
      @intigriti  2 года назад +1

      Thanks a lot Reuben ❤️

  • @jmcsmtp
    @jmcsmtp 2 года назад

    Excellent explanation. Thank you so much. I have been a researcher for years and have searched almost an equal amount of time for a simple explanation of DOM XSS. This tutorial is even better than the training material provided by PortSwigger. Well done.

    • @intigriti
      @intigriti  2 года назад

      Thank you so much for your very kind words! This feedback is really heartwarming!
      Coming from Pascal ❤️

  • @lucasGAM1005
    @lucasGAM1005 3 года назад

    one of the best practic explanations I've ever seen

    • @intigriti
      @intigriti  3 года назад

      Thank you very much! We really appreciate that 😇

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 2 года назад

    So much better than the portswigger video. You're an angel!

  • @dennismunyaka6537
    @dennismunyaka6537 3 года назад +3

    surely did learn something new. awesome content well articulated

    • @intigriti
      @intigriti  3 года назад

      Thanks Dennis 😎 We are glad you like it!

  • @lucanicolini4721
    @lucanicolini4721 3 года назад +1

    Great explanation! Thank you!

    • @intigriti
      @intigriti  3 года назад

      Thank you very much for your kind words 🥰

  • @白晓雷
    @白晓雷 Год назад +1

    Good one! Amazing for me!!!

  • @amol5436
    @amol5436 2 года назад

    really great explanation. thanks a lot for making such videos, it helped a lot..cheers..

    • @intigriti
      @intigriti  2 года назад

      You are very welcome! :) We are glad it helped 😇

  • @lesleybw
    @lesleybw 2 года назад

    Excellent explanation.

    • @intigriti
      @intigriti  2 года назад

      Glad you liked it ❤️

  • @CALVIS-1
    @CALVIS-1 2 года назад

    Thanks sir ,😇
    You earned my respect!

    • @intigriti
      @intigriti  2 года назад +1

      Thank you very much. That's very kind of you ❤️

  • @meljithpereira5532
    @meljithpereira5532 3 года назад +1

    Awsme explain .. 💐

    • @intigriti
      @intigriti  3 года назад

      Thanks a lot 😊
      We really appreciate your feedback!

  • @AshishSingh-jq6de
    @AshishSingh-jq6de 3 года назад

    Great man 🔥

    • @intigriti
      @intigriti  3 года назад +1

      Thank you Ashish 🥰

  • @HamsterLover1337
    @HamsterLover1337 Год назад

    Amazing video, best of the best Ive seen on the topic.
    But could you explain in another video what the real dangers are that come from different kinds of XSS (reflective, stored (DOM)) being possible?
    Such as stealing cookies, abusing SOP when CORS is misconfigured, etc?

    • @intigriti
      @intigriti  Год назад

      Thank you! Request noted ✍

  • @kiki-ig8fq
    @kiki-ig8fq 7 месяцев назад

    Nice video would be nice to include how to fix these as well

  • @JITHUC2000
    @JITHUC2000 2 года назад

    Good one! Thanks

    • @intigriti
      @intigriti  2 года назад

      You're welcome! 😇

  • @nongtar2839
    @nongtar2839 29 дней назад

    Thank you for your explanation! However, I’m still curious about how DOM-Based XSS is practical. Based on the concept, a DOM-Based payload executes on the web browser with out any interaction with server, so it seems like you’d just be hacking yourself for nothing. Instead of doing that, I think to make this type of attack practical, you’d need to combine it with Reflected XSS to deliver the payload. Isn’t that correct?
    In conclusion, if you want to deliver a DOM-Based XSS payload, you would need a reflection mechanism to get the payload to the victim’s browser. Is that right?

    • @intigriti
      @intigriti  24 дня назад

      Yep, you need some way to deliver the XSS payload to the victim. It could be simply sharing a URL (e.g. phishing email) or even a malvertisement!

  • @JuanBotes
    @JuanBotes 2 года назад

    Thanks once again for great content - I am really late to the party \o/

    • @intigriti
      @intigriti  2 года назад

      No worries! We are glad you are watching at this point 😇

  • @sahariarhasan2624
    @sahariarhasan2624 Год назад +1

    Amazing

  • @TheBroadwood
    @TheBroadwood 2 года назад

    What a great explanation. Especially the part where you show us how to use the debugger.
    But i have one question... isn't this example a little bit unrealistic? I mean the GET-Request only includes one parameter (productID). The serverside Javascript also already includes all stores in an array, so what practical purpose exists when a user is able to alter the list options?
    It's still great for teaching purposes.

    • @intigriti
      @intigriti  2 года назад +1

      Thank you very much ❤️
      The lab by Portswigger was definitely designed to be simple. We agree with that. But you need a simple demonstration to start grasping the concepts!

  • @adityauniyal-g8f
    @adityauniyal-g8f Месяц назад

    what automation tool should i use for DOM-based vulnerabilities?

    • @intigriti
      @intigriti  Месяц назад +1

      Not sure about automating but the DOM Invader in burp is a must for testing!

  • @rangelbatista4594
    @rangelbatista4594 2 года назад

    Thank you.

    • @intigriti
      @intigriti  2 года назад

      You're welcome! 💪

  • @squattingnomad6298
    @squattingnomad6298 2 года назад

    How do you prevent the injection?

    • @intigriti
      @intigriti  2 года назад

      Hey there, have a look at cheatsheetseries.owasp.org/cheatsheets/DOM_based_XSS_Prevention_Cheat_Sheet.html.

  • @Amir-qm5ns
    @Amir-qm5ns 2 года назад

    but how do you know what payload to use? tags, etc
    i mean, i found it is may be dom xss, but how do i know how to use the right payload?

    • @intigriti
      @intigriti  2 года назад

      You usually have a set of payloads in mind and you try them out and see how the app reacts.
      Another great resource is portswigger.net/web-security/cross-site-scripting/cheat-sheet

    • @Amir-qm5ns
      @Amir-qm5ns 2 года назад

      @@intigriti thanks for the answer, what do you mean how the app react? what do you usally check for see and confrim there is some suspious reaction?

  • @creationofislam
    @creationofislam 2 года назад

    Thank you

  • @gdfghgfdti3097
    @gdfghgfdti3097 2 года назад

    Goooooooood :)

    • @intigriti
      @intigriti  2 года назад

      Thank you very much! Keep watching all our videos 🙏🏻

  • @siefkhaled1374
    @siefkhaled1374 Год назад

    amazing

  • @PrakashKumar-se1qk
    @PrakashKumar-se1qk 2 года назад

    It was damn good 😍

    • @intigriti
      @intigriti  2 года назад

      Thank you so much 😇 Please share it with your community!

  • @itsm3dud39
    @itsm3dud39 3 года назад

    how to inspect source in firefox?

    • @intigriti
      @intigriti  3 года назад

      E.g. by clicking right click on your mouse!
      There's a couple of other methods but I let you google those. Googling is an important skill if you are a hacker!

  • @satriawinarah1894
    @satriawinarah1894 2 года назад

    Sorry I still don't understand.
    What we are doing is just in our browser, right?
    How can it affects another people browser? Because what I got is, we temper it after the server give the response which means only in our browser (in client side only)
    I understand about the common XSS, like a comment section case. We are successfully injected a script that will stay in the website for so long until another people open the same page and load all the injected script.

    • @intigriti
      @intigriti  2 года назад +2

      This vulnerability needs you to send the malicious URL (containing the XSS payload) to your victim. The victim then needs to click on it in order to get exploited. The most typical way this is happening in real-life is via an email phishing attack.
      However, you could also e.g. host that malicious URL on your own website and lure people into visiting that.

    • @satriawinarah1894
      @satriawinarah1894 2 года назад

      @@intigriti Thank you for the explanation
      Still wondering, if we need to send the script via a phishing attack, why do we still need to find the vulnerability as shown in the video?

  • @br_nidas
    @br_nidas 8 месяцев назад

    thx!

    • @intigriti
      @intigriti  8 месяцев назад +1

      Welcome! 💜

  • @ThushyCyber
    @ThushyCyber 2 года назад

    Nice

  • @eyadhussien1055
    @eyadhussien1055 2 года назад

    King

    • @intigriti
      @intigriti  2 года назад +1

      Coming from @hacksplained: "Thank you very much, I really appreciate it!" 🔥

  • @mehadi0187
    @mehadi0187 3 года назад

    perfect

  • @newuser2474
    @newuser2474 2 года назад

    Great

  • @kunjanvarma78
    @kunjanvarma78 2 года назад

    ❤️

  • @lethalleet
    @lethalleet 3 года назад

    First comment 🔥

  • @Jpkb6
    @Jpkb6 2 года назад

    thanks jesuscrist!!

  • @heuristicalgorithm8465
    @heuristicalgorithm8465 2 года назад

    confusing

    • @intigriti
      @intigriti  2 года назад

      Anything in specific that wasn't clear?

    • @heuristicalgorithm8465
      @heuristicalgorithm8465 2 года назад

      ​@@intigriti Where is img source script inserted in the source code? In the source itself? It's difficult to see in the vid. You can write to the website using both the source and sink? Also, How do you find that javascript debugger in Firefox? Thank you

  • @UCallMeChef
    @UCallMeChef 2 года назад

    Start doing real world examples stop these bullshit vuln web apps

    • @intigriti
      @intigriti  2 года назад

      That would not be ethical and is not allowed by law. Those vulnerable boxes are directly derived from real life examples, so make sure to search for them in real applications!

    • @UCallMeChef
      @UCallMeChef 2 года назад

      @@intigriti bug bounty’s

  • @trustedsecurity6039
    @trustedsecurity6039 Год назад

    stop using portswigger labs... people come here to learn what DOM XSS is for example (xD) and they are spoiled the better labs they could find and they cant learn from them. I know it is pratical and everybody do it but that sucks. i stopped the video and a lot of others due to this...

    • @intigriti
      @intigriti  Год назад +1

      Hey, thanks for the feedback! We're still making Portswigger videos but it's now a lot clearer that the content is a practical run through a Portswigger lab (the title and description exactly match the lab, and include links to the relevant lab and learning material), which are also uploaded directly to the Web Security Academy.

    • @trustedsecurity6039
      @trustedsecurity6039 Год назад

      @@intigriti cool but it doesnt change the problem, people will learn and see the solution of the best labs on the subject and will lose the preciois hands-on experience which make portswigger academy so good. Thanks for your all you do and love hunting on your platform :) the best one where triagers arent there to avoid payement :D

  • @mehkpentester5824
    @mehkpentester5824 Год назад

    Thank You