- 323
- 62 504
Mohd Badrudduja
Saudi Arabia
เข้าร่วมเมื่อ 16 ต.ค. 2011
Penetration Tester | Hacker | Cyber security Researcher.
SSRF via OpenID dynamic client registration - Lab#02
#openid #openidconnect #oauth2 #authentication #vulnerability #portswigger #websecurity #webexploitation
มุมมอง: 31
วีดีโอ
OpenID Dynamic Client Registration
มุมมอง 102หลายเดือนก่อน
#openid #openidconnect #oauth2 #authentication #vulnerability #portswigger #websecurity #webexploitation
Authentication bypass via OAuth implicit flow - #lab01
มุมมอง 158หลายเดือนก่อน
#oauth2 #authentication #bypass #vulnerability #portswigger #webexploitation #webclient
OAuth2.0 Authorization code vs Implicit grant types
มุมมอง 52หลายเดือนก่อน
#oauth2 #authentication #vulnerability #exploit #portswigger #websecurity
What is OAuth 2.0?
มุมมอง 111หลายเดือนก่อน
#oauth2 #authentication #vulnerability #exploit #portswigger #websecurity
Exploiting exact-match cache rules for web cache deception - Lab#05
มุมมอง 3062 หลายเดือนก่อน
#webcachedeception #portswigger #lab05 #webcache #deception #vulnerability #exploit
Exploiting cache server normalization for web cache deception - Lab#4
มุมมอง 2292 หลายเดือนก่อน
#webcachedeception #portswigger #webcache #deception #vulnerability #exploit
Exploiting origin server normalization for web cache deception - Lab#03
มุมมอง 2032 หลายเดือนก่อน
#webcachedeception #portswigger #webcache #deception #vulnerability #exploit
Exploiting path delimiters for web cache deception - Lab#02
มุมมอง 1712 หลายเดือนก่อน
#webcachedeception #portswigger #webcache #deception #vulnerability #exploit #path #delimiter
What is Delimiter discrepancies?
มุมมอง 742 หลายเดือนก่อน
#webcachedeception #portswigger #delimiter #discrepancies #webcache #deception #vulnerability
Exploiting path mapping for web cache deception - Lab#01
มุมมอง 3132 หลายเดือนก่อน
#webcachedeception #portswigger #websecurity #webcache #deception #vulnerability
Web Cache Deception - BRIEF
มุมมอง 2112 หลายเดือนก่อน
#webcachedeception #portswigger #webcache #deception #vulnerability
CSRF with broken Referer validation - Lab#12
มุมมอง 1493 หลายเดือนก่อน
#csrf #crosssiterequestforgery #vulnerability #exploit #portswigger #websecurity #webapplicationsecurity #pentesting
CSRF where Referer validation depends on header being present - Lab#11
มุมมอง 1103 หลายเดือนก่อน
#csrf #crosssiterequestforgery #portswigger #websecurity #webapplicationsecurity #webhacking #vulnerability #exploit
SameSite Lax bypass via cookie refresh - Lab#10
มุมมอง 2093 หลายเดือนก่อน
#csrf #samesite #bypass #portswigger #websecurity #pentesting
SameSite Strict bypass via sibling domain - Lab#09
มุมมอง 2813 หลายเดือนก่อน
SameSite Strict bypass via sibling domain - Lab#09
SameSite Strict bypass via client-side redirect - Lab#08
มุมมอง 1853 หลายเดือนก่อน
SameSite Strict bypass via client-side redirect - Lab#08
SameSite Lax bypass via method override - Lab#07
มุมมอง 1763 หลายเดือนก่อน
SameSite Lax bypass via method override - Lab#07
CSRF where token is duplicated in cookie - Lab#06
มุมมอง 1714 หลายเดือนก่อน
CSRF where token is duplicated in cookie - Lab#06
CSRF where token is tied to non-session cookie - Lab#05
มุมมอง 2174 หลายเดือนก่อน
CSRF where token is tied to non-session cookie - Lab#05
CSRF where token is not tied to user session - Lab#04
มุมมอง 1084 หลายเดือนก่อน
CSRF where token is not tied to user session - Lab#04
CSRF where token validation depends on token being present - Lab#03
มุมมอง 975 หลายเดือนก่อน
CSRF where token validation depends on token being present - Lab#03
CSRF where token validation depends on request method - Lab#02
มุมมอง 1345 หลายเดือนก่อน
CSRF where token validation depends on request method - Lab#02
CSRF vulnerability with no defenses - Lab#01
มุมมอง 1755 หลายเดือนก่อน
CSRF vulnerability with no defenses - Lab#01
Exploiting insecure output handling in LLMs - Lab#04
มุมมอง 4505 หลายเดือนก่อน
Exploiting insecure output handling in LLMs - Lab#04
Exploiting vulnerabilities in LLM APIs - Lab#02
มุมมอง 1806 หลายเดือนก่อน
Exploiting vulnerabilities in LLM APIs - Lab#02
You wrote the video is about "Dynamic client registration" but the topic is covered only for few minutes at the last that too very superficially, no explanation. Maybe, just change the heading of your video to avoid confusion.
Tysm for these videos
🙏🙏🙏❤❤
❤❤🙏🙏👋👋
🙏🙏🙏🙏
🙏🙏🙏🙏
🙏🙏🙏
❤❤
That’s amazing ❤❤🎉🎉
❤❤❤
🎉🎉🎉🎉🎉
The best channel for bug bounty hunting tutorial ❤❤❤
Hello Captain, Thank you for the solution but my log is not coming I tried the same.
Good video showing trial and error 👍
Thanks.
Good content
Thanks.
superb explaination bro... I am subscribed
Thanks 😊
good demostration
Thank you so much
excellent
Thanks! Glad you liked it.
this one is more hard than before, must watch it at least 3 times for me to understand🖐
is this bug still worth nowdays ?
very clear explanation sir, thank you
You are most welcome
Thanks a lot for your explaining But still i have lots of question :)
Having lots of questions means you will learn more and i see it positively. Do research as much as you can and let me know if you have issues in understanding concepts.
i always find email but no pwdToken or something else why is that?
I apologize for late reply I’m on vacation these days. Do you still have the same issue? If yes kindly tell me the time span of video so that i can understand the exact part of the video you stuck.
@@cybersec-radar i dont find the token key just email key as the third key
@AmineOnline did you find the reset token? The process to extract the token is little long but easy.
I was looking for walkthough like this. Other walk thooughs just added the vhosts in /etc/host without showing that what make them look for this. The best part was about looking at netstat and finding a web server at 3000
Hi, can you solve this lab again without using their exploit server ? I mean how do you exploit this in real target scenario ? How do you append the URL in the referer header in real target scenario ?
Hey Bro! Kindly add the walkthrough for Task 6: Advice n°5 d5e085772469d544a447bc8250890949
Hello, I deliver exploit to victim but after that i didnt get username “carlos” in response. Help me in finding it.
1. Before you send the exploit to victim make sure you are able to get the response of welcome page "/my-account" through cache. 2. If first step is fine then after sending the exploit to victim check "Access logs" and find out if victim is visiting your exploit server or not? You must see a different IP then yours. 3. If 1 & 2 steps are achieved and you are not getting the results. disable the burpsuite from browser. 4. If nothing works. I can setup a zoom session with you join me on linkedin "www.linkedin.com/in/mohd-badrudduja-cissp-cc-38715126/"
InteRnal PointeR vaRiabLe, jokes aside tysm nice tutorial bro!
You or anyone really most welcome and i’m open to any criticism. I believe in learning and growing.
@cybersec-radar i didn't mean any criticism, imo indians have a tutorial in everything i love what you guys share with the world, and more importantly I LUV UR ACCENT ♥️🔥
I apologize, I misunderstood your acronym “tysm” as “try some”.
thank you my brother
Glad I could help.
Great explanation ! Thanks a lot. looking forward for more video's
Glad you liked it! Stay tuned for more.
wanted to learn dom in deep haveing a knowledge about javascript
There is a separate module in portswigger named as “DOM-based vulnerabilities” which contains more in-depth content specifically for DOM. Check that out.
AoA sir can i learn xss
Yes, sure
Yo view exploit gives invalid csrf
And as far as I understand this occurs because cookie is not changed for some reason
Tell me the exact time of the video where you are facing the problem.
@ problem not in video . Problem occurs if I press view exploit
@ggelosstavrou9117 make sure csrf token and csrf cookie values are same.
Hmmm i got the problem… would you like to connect on zoom?
👍👍 Nice explaination
Thanks stay tuned
Plz make more video
Sure second lab is in process.
Learned a lot!
Thanks. Stay tuned
your videos are great
Thanks for watching!
thank u so much
Happy to help
You are most welcome
The whole playlist was well explained and well managed. Thank you and keep making such information videos.
Thanks! Glad you found the playlist helpful.
Excellent explanation, thank you!!!
Glad you enjoyed it!
Thankyou sir business logic vulnerabilities lab 10&11 bending sir video sir
You're welcome! Glad you liked those videos.
Any site that provide unique link for bug bounty or exploits server
try this "webhook.site/" & "github.com/projectdiscovery/interactsh" for Out of band interaction. And for HTML page hosting or specific for php, python n all you will easily find on google in $2/month to $5/month. Even you can use AWS.
Good one.
Thanks! I'm glad you liked it.
"Congratulations sir for passing CISSP! Well deserved!"
Thanks alot. Next one will be soon 🔜
thanks
Welcome!
Sir why are not add this video in ssti playlist
Done sir. Thanks for pointing out.
Thank you for this walkthrough.
Glad it was helpful!
Good explanation….
Glad it was helpful!