BUG BOUNTY: XSS AUTOMATION WITH A NEW TOOL! | 2023

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024
  • APOLOGIES FOR THE POOR AUDIO QUALITY AS THERE'S CONSTRUCTION GOING ON AT MY HOME!
    Note: This video is only for educational purpose.
    Hi everyone! This video demonstrates the process of xss automation using xss_vibes
    Tool Link: github.com/fai...
    Website: bepractical.tech
    Telegram: telegram.me/be...
    Previous Video: • BUG BOUNTY: ANDROID AP...
    Hacking Windows with Python from Scratch: www.udemy.com/...
    The Ultimate Guide to Hunt Account Takeover:
    www.udemy.com/...

Комментарии • 62

  • @gj9585
    @gj9585 10 месяцев назад +4

    please make a video on how to install katana in windows

  • @jaman_pentester
    @jaman_pentester 8 месяцев назад +1

    Nice tools. 🎉

  • @amoh96
    @amoh96 11 месяцев назад +4

    i see your videos alot about automation can u make methdology video about how to manuel testing & tips , tbh i found 4 xss in vdp 2 dublecate with automation & 2 valid with manuel testing

    • @ptyspawnbinbash
      @ptyspawnbinbash 11 месяцев назад +1

      Is Manuel ok with him being tested?

    • @lekos1337
      @lekos1337 11 месяцев назад

      @@ptyspawnbinbashbro 💀💀💀

  • @letsgo...7842
    @letsgo...7842 11 месяцев назад +1

    Great 😊 working 😍

  • @rony8094
    @rony8094 11 месяцев назад +1

    fantastic

  • @letsgo...7842
    @letsgo...7842 11 месяцев назад +1

    Amezing ♨️

  • @shivakumarmv4249
    @shivakumarmv4249 10 месяцев назад +1

    Hi this is very nice tool. My request is if any special characters are identified by the tool that reflecting in response, will this tool able to generate the XSS payloads based on the identified special character? If not, try to bring this tool. this will be a great help.

  • @dzzaza24
    @dzzaza24 11 месяцев назад +1

    goooog job

  • @suryaroja03
    @suryaroja03 11 месяцев назад +1

    awesome bro

  • @doshamitv5020
    @doshamitv5020 11 месяцев назад +2

    What about a SQL one ? will you soon release it ? ( BLIND SQL ) test for all parametres

  • @danielvergese9800
    @danielvergese9800 11 месяцев назад +2

    This tool looks to be great for most of the wp websites however do you have something for the website post logins?

    • @danielvergese9800
      @danielvergese9800 11 месяцев назад +1

      @BePracticalTech does the current payloads includes WAF bypass?

  • @SOBHITSHARMA
    @SOBHITSHARMA 11 месяцев назад +3

    Great Video man! thanks alot, but I have a question, this too checks the url only which is accessible, without login that means we have pages or modules which are hidden until we login, how to use this tool after succesfull login and then real modules test takes place. Please suggest. I have been looking for different automation for xss but all of them only works for open pages but not after login or may be I dont know how to use them after login. Once again thanks for your efforts.

    • @SOBHITSHARMA
      @SOBHITSHARMA 11 месяцев назад

      Any suggestions here ?

  • @omaralsayyed4146
    @omaralsayyed4146 11 месяцев назад +2

    Hy
    can help me for this issue please!
    -uThe system cannot find the file specified.
    Command 'cat res.txt | grep '=' | sort -u' returned non-zero exit status 1.

    • @omaralsayyed4146
      @omaralsayyed4146 11 месяцев назад

      It's problem because this tool just run in linux ,
      i use windows 11 and cmd not support cat command ,
      I installed ubuntu subsystem and executed in bash and it work successfully : )
      @@BePracticalTech

  • @pzer0man
    @pzer0man 11 месяцев назад +1

    great video but after found xss vuln. teach how to exploit them pls.

  • @Gowtham_SS
    @Gowtham_SS 11 месяцев назад +5

    Katana command not found bro

  • @mohamedhussain6602
    @mohamedhussain6602 11 месяцев назад +2

    katana not found what i do

  • @Aniket18101
    @Aniket18101 7 месяцев назад

    Respect bro

  • @sgeetha472
    @sgeetha472 11 месяцев назад +1

    \"is reflecting but didnt produce payload instead it shows connection reset ..continuously...why?i injected a basic xss payload ..but tgere is no response in burpsuite repeater.why?

    • @sgeetha472
      @sgeetha472 11 месяцев назад

      @@BePracticalTech email sent

  • @Official.Motivation.Machine
    @Official.Motivation.Machine 4 месяца назад +1

    Katana isnot working
    No command katana found, did you mean:
    Command botan3 in package botan3
    Command cantata in package cantata from the x11-repo repository

  • @Fetrah2
    @Fetrah2 11 месяцев назад +3

    Can you help me bro? it says 'is reflecting in the response
    but when I try to use a paylaod it says access denied what should I do could you please help me?

    • @rahul.bhardwaj
      @rahul.bhardwaj 11 месяцев назад

      ​@@BePracticalTechSame as My problem sir ...

    • @panagiotismitkas5526
      @panagiotismitkas5526 11 месяцев назад

      Waf is blocking the payload

    • @Fetrah2
      @Fetrah2 11 месяцев назад +1

      No It doesn't @@BePracticalTech

  • @cryptikbyte
    @cryptikbyte 2 месяца назад +1

    Bro please help karr kam se kam bolde pakda to nahi jaunga na??

  • @doshamitv5020
    @doshamitv5020 11 месяцев назад

    king

  • @SOBHITSHARMA
    @SOBHITSHARMA 11 месяцев назад +1

    Another thing, I tried the tool and it gave me list of urls which says
    [+] > is reflecting in the response
    [+] ' is reflecting in the response
    [+] " is reflecting in the response
    [+] < is reflecting in the response
    [+] / is reflecting in the response
    [+] Testing parameter name:
    but when I tried it with the payload which it says, I could not able to see xss on the webshite? Any suggestions?

    • @SOBHITSHARMA
      @SOBHITSHARMA 11 месяцев назад

      @@BePracticalTech

    • @SOBHITSHARMA
      @SOBHITSHARMA 11 месяцев назад

      @@BePracticalTech yep! not reflecting, so basically portal is auto encoding it.

    • @SOBHITSHARMA
      @SOBHITSHARMA 11 месяцев назад

      @@BePracticalTech thank you man!

  • @danmcgirr4210
    @danmcgirr4210 11 месяцев назад

    Great lesson!

  • @nikhiltiwari1477
    @nikhiltiwari1477 11 месяцев назад

    Is xss_vibes offline or online attack. Like does it create any traffic while ruuning?

  • @HawkPubg48
    @HawkPubg48 9 месяцев назад

    Can you add -proxy option please it will be beast thank you

  • @Arfat-Khan
    @Arfat-Khan 11 месяцев назад

    Can you make a video on file upload in details

  • @krivadnaaiservices
    @krivadnaaiservices 4 месяца назад

    So file gas to be bamed katana.txt always? And for scan single url, do we have to give parameters

    • @BePracticalTech
      @BePracticalTech  4 месяца назад

      Yes, you do need to provide the url containing the parameter eg. testphp.vulnweb.com/index.php?name=batman

  • @krivadnaaiservices
    @krivadnaaiservices 4 месяца назад

    He is not replying to anyone but only liking ur comments... hahaha

  • @shuvonsec
    @shuvonsec 8 месяцев назад

    payloads are not show

  • @eowaldemar8195
    @eowaldemar8195 9 месяцев назад

    Please, is it possible to provide the katana.txt file

  • @sugamdangal9974
    @sugamdangal9974 10 месяцев назад

    Will it be able to bypass Waf?

  • @ali_aqeel
    @ali_aqeel 11 месяцев назад

    Why don't you run on Linux?

  • @tbjehad106
    @tbjehad106 7 месяцев назад

    is it just for reflected xss

  • @TheCyberWarriorGuy
    @TheCyberWarriorGuy 11 месяцев назад

    :)

  • @mnageh-bo1mm
    @mnageh-bo1mm 7 месяцев назад

    it's not a new tool man , this just xss strike 🙄🙄🙄🙄

  • @sgeetha472
    @sgeetha472 11 месяцев назад

    how to generate payload?>,',",/, is reflecting is there any website to generate?

  • @deepspecial1161
    @deepspecial1161 11 месяцев назад

    brother can i get your telegram username i want talk something with thank you