Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE ✨✨
@@RanaKhalil101 I was looking for a course that covers CORS. I think I am so lucky to find your course It will take me to a whole another level :) Thank you ~
I had so many confusion with Same-Origin-Policy and CORS, you made it clear for me once and forever. The most brilliant part of your lecture is that you provide real step-by-step case of attacking and exploiting vulnerability. Most explanations in Internet are just few general statements that produce more questions than answers. Thank you!
This is the best ever explaination I have seen on an internet for the CORS topic, what an explaination!! Each and every details are covered here to understand it deeply and properly in a very easy language. I really appreciate. Thank you and and please keep it up. 🙂❤🙌
at 36:44, it is said that if there aren't any CORS headers being used by the application, it can be due to the application making use of dynamic generation. Later at 37:33, we check if the value in the origin header is being reflected in ACAO CORS header. So basically we're finding flaws in dynamic generation by making use of what's being reflected in CORS' ACAO header. Aren't both these statements contradictory? If there are no CORS headers and the reason is dynamic generation then how can we test for dynamic generation using CORS headers?
You are the best web HACKER I know!!! Keep up you're amazing content. I could not find Cross-Origin Resource Sharing on youtube but then I remeber you were in a david bombal show. So, keep it up... 👍👌✌
Come here because i was having some issues with AWS Cloudfront/S3 CORS configuration, and find out a lot of vulnerabilties in the existing confgs LMAO. Thank you so much!
Awesome explanation, thank you very much! There's one thing I'm missing here. What is the proper configuration? Suppose i have dynamic env and i need to allow multiple domains... Some of them do need the Credentials header, some don't. What would you recommend?
You are amazing! Thanks for sharing so much knowledge. I've just found your academy through your Twitter. I'm looking forward to joining and training under your guidance. All the best!
Thanks a lot Rana. All my confusion are gone now. Thank you very much. Could you please make a video on Road to CEH Master, I'm thinking of taking the Elite package from EC council. I know you have cleared the OSCP and saw you video on David Bombal's channel. I got to know your videos from Portswigger's community solution. [ optional: you could make for the CEH Master one by collaborating with someone also].
I have one doubt regarding this.Suppose domain A wants domain B to access its resources, so it whitelists it. Another domain C knows that B is whitelisted. Now, domain C sends a request and specifies Origin equal to domain B, so will it be able to access the resources on A? If yes, then is it so easy to spoof origin and just access resources on a different domain?
What if I don't what to access or change any data just want to click a button on website A which then clicks or simulate a click on website B and execute a function, does this falls under CORS ? If not any suggestion on how this can be done?
can you make some videos that match with industry requirements sometimes I'm get stuck in doing stuff well I'm Network Security Analyst i wants to learn more something new to add in my skilll
This vulnerability important ?! The issue you’ve described is related to Cross-Origin Resource Sharing (CORS) misconfiguration. CORS is a security feature implemented by web browsers to control which web domains can access resources on a given domain. In this case, the application has a CORS policy that allows access from any domain (Access-Control-Allow-Origin: *), which is considered overly permissive and poses a security risk.
Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE ✨✨
Love u
Is your course available as one time purchase? Or I have to renew each month to keep access
@@akr2dev One time purchase
@@RanaKhalil101 I was looking for a course that covers CORS. I think I am so lucky to find your course It will take me to a whole another level :) Thank you ~
Why you speak englih why
You explain in the exact way a beginner would liked to be explained !
I had so many confusion with Same-Origin-Policy and CORS, you made it clear for me once and forever. The most brilliant part of your lecture is that you provide real step-by-step case of attacking and exploiting vulnerability. Most explanations in Internet are just few general statements that produce more questions than answers. Thank you!
This is the best ever explaination I have seen on an internet for the CORS topic, what an explaination!! Each and every details are covered here to understand it deeply and properly in a very easy language. I really appreciate. Thank you and and please keep it up. 🙂❤🙌
totally agree on clarity of explanation !!
How it possible for script from another tab (21:25) to access bank's tab's cookies to make requests on bank site?
because the browser sends the cookies automatically.
If it's set in the bank domain already
You are among the best teacher I have ever met in my life ♥️
This is the best explanation of CORS and SOP I have come accross so far. Thank you!
at 36:44, it is said that if there aren't any CORS headers being used by the application, it can be due to the application making use of dynamic generation. Later at 37:33, we check if the value in the origin header is being reflected in ACAO CORS header. So basically we're finding flaws in dynamic generation by making use of what's being reflected in CORS' ACAO header. Aren't both these statements contradictory? If there are no CORS headers and the reason is dynamic generation then how can we test for dynamic generation using CORS headers?
@Elijah Rodgers but since it isn't CORS header, wasn't it there anyways? We need ACAO header in response to test which is one of the two CORS headers.
This video has the best explanation that I've ever seen about this topic
Wow ! The best video on CORS. This helps me to work on the solution for the issue identified in my application. Thank you so much!
For a full stack developer like me this was super super useful, SO MANY THANKS.
Love u sis❤ i hope u will be in jannah inshallah❤❤
You are the best web HACKER I know!!! Keep up you're amazing content. I could not find Cross-Origin Resource Sharing on youtube but then I remeber you were in a david bombal show. So, keep it up... 👍👌✌
Come here because i was having some issues with AWS Cloudfront/S3 CORS configuration, and find out a lot of vulnerabilties in the existing confgs LMAO. Thank you so much!
You are my role model in this field
This is the best explanation of CORS and SOP I Thank you, even your language it's easy to consider again thank you
This is really good and I am saving it ot watch a few times until it all clicks. Thanks!
Is it possible to exploit in "Authorization Bearer" JWT base web applications?
Excellent. Made it easy to understand and grasp. Thank you !
finally new series is back after some time!
Thanks a lot for the video Rana, it’s super helpful!
Nice video thanks for the resources that were shared in this video 👏
Great video! This makes CORS so easy to understand :D
This channel is awesome, thank u soo much
Very informative video. Thanks for sharing your knowledge and skill.
Awesome explanation, thank you very much!
There's one thing I'm missing here.
What is the proper configuration?
Suppose i have dynamic env and i need to allow multiple domains... Some of them do need the Credentials header, some don't. What would you recommend?
I love your explaination! Thanks!
Love your way of teaching
You are amazing! Thanks for sharing so much knowledge. I've just found your academy through your Twitter. I'm looking forward to joining and training under your guidance. All the best!
Thanks a lot Rana. All my confusion are gone now. Thank you very much.
Could you please make a video on Road to CEH Master, I'm thinking of taking the Elite package from EC council.
I know you have cleared the OSCP and saw you video on David Bombal's channel. I got to know your videos from Portswigger's community solution. [ optional: you could make for the CEH Master one by collaborating with someone also].
Real good video! Thanks for this awesome work!
that was literally awesome, thank you
You Just Nailed it , Ma'am
I love how you always simplify things. You are amazing! keep it up Rana 🔥💪
Thanks Rhana. You are the best🎉
Wow 👌 beautifully explained. Your work is amazing. Totally impressed.
thank you very much for your explanation, you were very clear. Keep it up
what mean access control allow origin header to null pls ?
Your teaching skills are great. Thanks. Hope you make more videos on various topics.
Nicely Explained !
This is awesome contenet about CORS.
Absolutely fantastic Rana
Wonderful explanation!
Perfect explanation. Thank you!
Excellent video what a detailed explanation... Kudos to you
Wow ! such a great explanation ! like & subscribed!
Great work. Could have covered preflight requests as well.
Good stuff here. What about JSONP for cross origin resource sharing? Is it a valid alternative to CORS? Are there security problems with JSONP?
you're awesome. please don't stop
Brilliant explanation. thanks
Hi, Dear Rana .
Many thanks to share your video with us..?
Succeds..!
I have one doubt regarding this.Suppose domain A wants domain B to access its resources, so it whitelists it. Another domain C knows that B is whitelisted. Now, domain C sends a request and specifies Origin equal to domain B, so will it be able to access the resources on A? If yes, then is it so easy to spoof origin and just access resources on a different domain?
Please make the other videos available 🙏
Amazing explanation!!
Thanks Rana Khalil 🥰🥰
thanks for making great content \o/
Great Explanation!!!!!!!
great job. love it!
What if I don't what to access or change any data just want to click a button on website A which then clicks or simulate a click on website B and execute a function, does this falls under CORS ?
If not any suggestion on how this can be done?
Thanks Ms.Khalil
nice video, thanks
why other videos are hidden of csrf? This is due to schedule or will be hidden for all time?
Thank you.
so helpful thanks
Amazing!
God bless you 🙏
can you make some videos that match with industry requirements sometimes I'm get stuck in doing stuff well I'm Network Security Analyst i wants to learn more something new to add in my skilll
This vulnerability important ?!
The issue you’ve described is related to Cross-Origin Resource Sharing (CORS) misconfiguration. CORS is a security feature implemented by web browsers to control which web domains can access resources on a given domain. In this case, the application has a CORS policy that allows access from any domain (Access-Control-Allow-Origin: *), which is considered overly permissive and poses a security risk.
Ninja Hattori
thansk❤
I love cats.
As long as my bank account is safe.
Top
👏
I am the 404th like, but it's not found ;)