Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE ✨✨
@@RanaKhalil101 I was looking for a course that covers CORS. I think I am so lucky to find your course It will take me to a whole another level :) Thank you ~
This is the best ever explaination I have seen on an internet for the CORS topic, what an explaination!! Each and every details are covered here to understand it deeply and properly in a very easy language. I really appreciate. Thank you and and please keep it up. 🙂❤🙌
I had so many confusion with Same-Origin-Policy and CORS, you made it clear for me once and forever. The most brilliant part of your lecture is that you provide real step-by-step case of attacking and exploiting vulnerability. Most explanations in Internet are just few general statements that produce more questions than answers. Thank you!
Come here because i was having some issues with AWS Cloudfront/S3 CORS configuration, and find out a lot of vulnerabilties in the existing confgs LMAO. Thank you so much!
You are the best web HACKER I know!!! Keep up you're amazing content. I could not find Cross-Origin Resource Sharing on youtube but then I remeber you were in a david bombal show. So, keep it up... 👍👌✌
You are amazing! Thanks for sharing so much knowledge. I've just found your academy through your Twitter. I'm looking forward to joining and training under your guidance. All the best!
Thanks a lot Rana. All my confusion are gone now. Thank you very much. Could you please make a video on Road to CEH Master, I'm thinking of taking the Elite package from EC council. I know you have cleared the OSCP and saw you video on David Bombal's channel. I got to know your videos from Portswigger's community solution. [ optional: you could make for the CEH Master one by collaborating with someone also].
at 36:44, it is said that if there aren't any CORS headers being used by the application, it can be due to the application making use of dynamic generation. Later at 37:33, we check if the value in the origin header is being reflected in ACAO CORS header. So basically we're finding flaws in dynamic generation by making use of what's being reflected in CORS' ACAO header. Aren't both these statements contradictory? If there are no CORS headers and the reason is dynamic generation then how can we test for dynamic generation using CORS headers?
I have one doubt regarding this.Suppose domain A wants domain B to access its resources, so it whitelists it. Another domain C knows that B is whitelisted. Now, domain C sends a request and specifies Origin equal to domain B, so will it be able to access the resources on A? If yes, then is it so easy to spoof origin and just access resources on a different domain?
What if I don't what to access or change any data just want to click a button on website A which then clicks or simulate a click on website B and execute a function, does this falls under CORS ? If not any suggestion on how this can be done?
This vulnerability important ?! The issue you’ve described is related to Cross-Origin Resource Sharing (CORS) misconfiguration. CORS is a security feature implemented by web browsers to control which web domains can access resources on a given domain. In this case, the application has a CORS policy that allows access from any domain (Access-Control-Allow-Origin: *), which is considered overly permissive and poses a security risk.
can you make some videos that match with industry requirements sometimes I'm get stuck in doing stuff well I'm Network Security Analyst i wants to learn more something new to add in my skilll
Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE ✨✨
Love u
Is your course available as one time purchase? Or I have to renew each month to keep access
@@akr2dev One time purchase
@@RanaKhalil101 I was looking for a course that covers CORS. I think I am so lucky to find your course It will take me to a whole another level :) Thank you ~
Why you speak englih why
You explain in the exact way a beginner would liked to be explained !
This is the best ever explaination I have seen on an internet for the CORS topic, what an explaination!! Each and every details are covered here to understand it deeply and properly in a very easy language. I really appreciate. Thank you and and please keep it up. 🙂❤🙌
totally agree on clarity of explanation !!
I had so many confusion with Same-Origin-Policy and CORS, you made it clear for me once and forever. The most brilliant part of your lecture is that you provide real step-by-step case of attacking and exploiting vulnerability. Most explanations in Internet are just few general statements that produce more questions than answers. Thank you!
You are among the best teacher I have ever met in my life ♥️
This is the best explanation of CORS and SOP I have come accross so far. Thank you!
Come here because i was having some issues with AWS Cloudfront/S3 CORS configuration, and find out a lot of vulnerabilties in the existing confgs LMAO. Thank you so much!
For a full stack developer like me this was super super useful, SO MANY THANKS.
This video has the best explanation that I've ever seen about this topic
Wow ! The best video on CORS. This helps me to work on the solution for the issue identified in my application. Thank you so much!
This is the best explanation of CORS and SOP I Thank you, even your language it's easy to consider again thank you
You are the best web HACKER I know!!! Keep up you're amazing content. I could not find Cross-Origin Resource Sharing on youtube but then I remeber you were in a david bombal show. So, keep it up... 👍👌✌
Love u sis❤ i hope u will be in jannah inshallah❤❤
This is really good and I am saving it ot watch a few times until it all clicks. Thanks!
You are my role model in this field
finally new series is back after some time!
Very informative video. Thanks for sharing your knowledge and skill.
Excellent. Made it easy to understand and grasp. Thank you !
I love how you always simplify things. You are amazing! keep it up Rana 🔥💪
You are amazing! Thanks for sharing so much knowledge. I've just found your academy through your Twitter. I'm looking forward to joining and training under your guidance. All the best!
Great video! This makes CORS so easy to understand :D
that was literally awesome, thank you
Thanks a lot for the video Rana, it’s super helpful!
Nice video thanks for the resources that were shared in this video 👏
Thanks a lot Rana. All my confusion are gone now. Thank you very much.
Could you please make a video on Road to CEH Master, I'm thinking of taking the Elite package from EC council.
I know you have cleared the OSCP and saw you video on David Bombal's channel. I got to know your videos from Portswigger's community solution. [ optional: you could make for the CEH Master one by collaborating with someone also].
Is it possible to exploit in "Authorization Bearer" JWT base web applications?
I love your explaination! Thanks!
Love your way of teaching
Wow 👌 beautifully explained. Your work is amazing. Totally impressed.
Your teaching skills are great. Thanks. Hope you make more videos on various topics.
You Just Nailed it , Ma'am
This channel is awesome, thank u soo much
Great work. Could have covered preflight requests as well.
How it possible for script from another tab (21:25) to access bank's tab's cookies to make requests on bank site?
because the browser sends the cookies automatically.
If it's set in the bank domain already
Real good video! Thanks for this awesome work!
Perfect explanation. Thank you!
thank you very much for your explanation, you were very clear. Keep it up
Thanks Rhana. You are the best🎉
Good stuff here. What about JSONP for cross origin resource sharing? Is it a valid alternative to CORS? Are there security problems with JSONP?
This is awesome contenet about CORS.
Excellent video what a detailed explanation... Kudos to you
Absolutely fantastic Rana
Wow ! such a great explanation ! like & subscribed!
Nicely Explained !
Wonderful explanation!
Hi, Dear Rana .
Many thanks to share your video with us..?
Succeds..!
Brilliant explanation. thanks
you're awesome. please don't stop
at 36:44, it is said that if there aren't any CORS headers being used by the application, it can be due to the application making use of dynamic generation. Later at 37:33, we check if the value in the origin header is being reflected in ACAO CORS header. So basically we're finding flaws in dynamic generation by making use of what's being reflected in CORS' ACAO header. Aren't both these statements contradictory? If there are no CORS headers and the reason is dynamic generation then how can we test for dynamic generation using CORS headers?
@Elijah Rodgers but since it isn't CORS header, wasn't it there anyways? We need ACAO header in response to test which is one of the two CORS headers.
Amazing explanation!!
Thanks Ms.Khalil
Please make the other videos available 🙏
I have one doubt regarding this.Suppose domain A wants domain B to access its resources, so it whitelists it. Another domain C knows that B is whitelisted. Now, domain C sends a request and specifies Origin equal to domain B, so will it be able to access the resources on A? If yes, then is it so easy to spoof origin and just access resources on a different domain?
Great Explanation!!!!!!!
Thanks Rana Khalil 🥰🥰
great job. love it!
thanks for making great content \o/
what mean access control allow origin header to null pls ?
nice video, thanks
What if I don't what to access or change any data just want to click a button on website A which then clicks or simulate a click on website B and execute a function, does this falls under CORS ?
If not any suggestion on how this can be done?
Thank you.
so helpful thanks
Ninja Hattori
God bless you 🙏
Amazing!
This vulnerability important ?!
The issue you’ve described is related to Cross-Origin Resource Sharing (CORS) misconfiguration. CORS is a security feature implemented by web browsers to control which web domains can access resources on a given domain. In this case, the application has a CORS policy that allows access from any domain (Access-Control-Allow-Origin: *), which is considered overly permissive and poses a security risk.
thansk❤
can you make some videos that match with industry requirements sometimes I'm get stuck in doing stuff well I'm Network Security Analyst i wants to learn more something new to add in my skilll
Top
why other videos are hidden of csrf? This is due to schedule or will be hidden for all time?
I love cats.
As long as my bank account is safe.
👏
I am the 404th like, but it's not found ;)