Great content Senpai !! Please I have a question concerning the Repetitive registration (DRY principal) challenge : How is it possible for a "mean" hacker to use this flaw to exploit the web app because it didn't seem to me that it is a big of a deal especially that the "Confirm Password Field " is no longer used in the newest web app Thanks alot !
Depends on your approach methods too , though this is fantastic video , your own methodologies to approach might differ , and bug bounty requires also your own set of ideas .... vigorous practice along wid this video will make it.... all the best
you are the best my friend.. You are good person.. Really.. I want something from you. Can you teach us C Language for Network Penetration Testing.. again thnx for everything , because you give us education and free.. YOU ARE THE BEST MY FRIEND 🙏😊
Secure flag doesn't allow the cookie to be transmitted over HTTP. What you're describing is the HTTPOnly flag. Anyway, thanks for the video, keep up the good work!
Nice stream , can you make video to bypass " i found xss in site.com but i face problem the code between double quots"" and filter encode any html and url encoding
Is the 'Scan' option shown at 12:51 still available in Burp Suite Community Edition? It's always grayed out for me on Burp Suite Community Edition v2020.2
@@JohnSmith-my5hb Thanks! In the video he selects that "Scan" option in the free edition (12:51). Was the scan option recently removed from the Community Edition?
Uhhh I think your upload failed lol. It's the very end of your lesson unless this was supposed to be a quick q & a unless my YT app is breaking. It's only giving me the last 9 minutes of the stream
I hope you enjoyed this video! If so, please consider dropping a like and subscribing.
You are doing God's work !!!! Great stream
Thank you!
My head is on overload. Awesome video.
Respect earned!!!!
Than you! MVP.
Building on this would really help ..thank you!
Great content Senpai !! Please I have a question concerning the Repetitive registration (DRY principal) challenge :
How is it possible for a "mean" hacker to use this flaw to exploit the web app because it didn't seem to me that it is a big of a deal especially that the "Confirm Password Field " is no longer used in the newest web app
Thanks alot !
How to build Websites? Acedemind, Traversy Media, Florin Pop etc. :)
hey if anyone have PortSwigger CA certificate file or if u have download link please send me. i'm unable to download
This is the type of information I've been searching for. Thank you!
وعليكم السلام
Thank you For this
Great video, as always. BTW, can you post the link to the DOM based XSS website?
I actually like listening to the Q&A...
I guess I'll just go watch it on twitch :(
The video was constantly skipping frames, so it was mostly audio.
Scan in burp is a pro version feature
I started like everyone starts...you know by searching on google....😂😂😂🤣🤣🤣🤣
cant wait for the 100k subs than the 1 mil :) great stuff as always!
Lol you speak hebrew? Shalom ahi
Nope! Only shaloms :)
can start doing bug bounty after this course?????? pls reply and thank you so much for these videos !!!
Depends on your approach methods too , though this is fantastic video , your own methodologies to approach might differ , and bug bounty requires also your own set of ideas .... vigorous practice along wid this video will make it.... all the best
check your discord invite link
you are the best my friend.. You are good person.. Really.. I want something from you. Can you teach us C Language for Network Penetration Testing.. again thnx for everything , because you give us education and free.. YOU ARE THE BEST MY FRIEND 🙏😊
If only I knew C :(
@@TCMSecurityAcademy okey , if you want to teach other language for network hacking.. We can wait 😄🙌
guys im not really sure what is this but the video is 1h 2min, but in the playlist the video is showing as 1h 32min for some reason
Secure flag doesn't allow the cookie to be transmitted over HTTP. What you're describing is the HTTPOnly flag. Anyway, thanks for the video, keep up the good work!
Yep. Clarified this mistake in the beginning of the next episode :). Thank you!
@@TCMSecurityAcademy didn't start with episode 3 yet! :)
i wish i could subscribe you for the second time
Nice stream , can you make video to bypass " i found xss in site.com but i face problem the code between double quots"" and filter encode any html and url encoding
Hey i installed juice box using docker now i am not able to get the request in burp proxy need help , it is running on port 3000
option for scanning a particular site is only in pro version..i have the community version ..what to do?
About long links especially when you can bitly or tiny urlify it today, true?
32:40 ->>
:)
That was so amazing when u said Salam Walikum
@51.42 you say "It never hit the server". Would you please explain how do you infer that it never hit the server?
Thank you.
Client based vs server based. A DOM is client side.
Thank you!!! :)
Thanks, bro learnt a lot from you.
You're welcome.
/*fabulous */
Love you!!
There is no scan option in free version!!
Keep up the great work!!!
Is the 'Scan' option shown at 12:51 still available in Burp Suite Community Edition? It's always grayed out for me on Burp Suite Community Edition v2020.2
The "Scan" option is payed version only.
@@JohnSmith-my5hb Thanks! In the video he selects that "Scan" option in the free edition (12:51). Was the scan option recently removed from the Community Edition?
@@fabiog He clearly said at (7.04) now this burp suite in my pro edition, (pro) means its a paid version of burp suite
Niceeeeeeeee! Ty.
Thanks
Miss the Livestream, but still this is Awesome....
Shalom 🙏
video on AWS security testing
Uhhh I think your upload failed lol. It's the very end of your lesson unless this was supposed to be a quick q & a unless my YT app is breaking. It's only giving me the last 9 minutes of the stream
Just RUclips issues on the initial conversion!