Just a question,did you just download a picture off the web and changed it to hacker.png and basically added that into your js file with the html script?
1. I don't think this changes every part of the website. Just the url that linked to this user. I might be wrong here but that's how I interpreted this. Especially if the server rerenders thing on requests (Say with a templating engine). Then I don't see how this could pollute any code outside on this user's link. 2. The initial payload needs to be hosted, but once it's does its job, depending on whether the website backends rerenders the page on request or not, it might not needed to be continuously hosting. However, in most modern sites it most likely will still be rerendered. So you will have to continuously host the script.js somewhere. Now, what's the point of this? Say if you have a site someone can donate to you via your user page. You can have a part of your bio be replacing the donate button to link to your own site - and then card stealing that way. (Literally 101 example of xss)
Essentially, the target user has to have the script run on their browser. If you search xss and then go to snyk's link on it, you'll even see that their example relied on you chatting a user and the script being passed onto that user's browser - which is the essentials needed for xss.
sql injections are bascially cross site scripting (XSS) for databases, this can allow users to download, modify and delete the database or parts of it. XSS on the other hand only works for websites, hence HTML tags
man your videos are so clear and the music is just mwah
Long time here. Best video ❤
Full video on this with full explanation
It is full video and all things all explained
Hello buddy, can you make a full course on website defacement please
Just a question,did you just download a picture off the web and changed it to hacker.png and basically added that into your js file with the html script?
1. I don't think this changes every part of the website. Just the url that linked to this user. I might be wrong here but that's how I interpreted this. Especially if the server rerenders thing on requests (Say with a templating engine). Then I don't see how this could pollute any code outside on this user's link.
2. The initial payload needs to be hosted, but once it's does its job, depending on whether the website backends rerenders the page on request or not, it might not needed to be continuously hosting. However, in most modern sites it most likely will still be rerendered. So you will have to continuously host the script.js somewhere.
Now, what's the point of this? Say if you have a site someone can donate to you via your user page. You can have a part of your bio be replacing the donate button to link to your own site - and then card stealing that way. (Literally 101 example of xss)
Essentially, the target user has to have the script run on their browser. If you search xss and then go to snyk's link on it, you'll even see that their example relied on you chatting a user and the script being passed onto that user's browser - which is the essentials needed for xss.
Wow, you really intelligent and full of knowledge
Hi
How to install wordpress in subdirectory in aws
So after injecting the payload how does a website get rid of the code? Because in real world scenarios this can cause a lot of damage.
Bro this changes only seen by us when we login with our credentials. How these changes become permanent to other user also
Have been watching you for years!
How does fing block system work as it's doesn't access your router admin panel
Can i use social media by create account in them through being anonymous
How to host a file on the target website where we left the xss payload.. that's is where the defacement takes place...
he wont tell
Great Video 👍
bro HTML page not showing why ??
Im learning hacking, can u tell me what are the best pro hacking group i want to join
Another video on this topic
Isn’t this similar to sql injection?
sql injections are bascially cross site scripting (XSS) for databases, this can allow users to download, modify and delete the database or parts of it. XSS on the other hand only works for websites, hence HTML tags
@@vasipalle thanks!
alert('XSS Attack!');
Video on how to find someones phone number, address, email, password, ip address in the first place
How r u doing brother 😁💥
Good video ,need more ways to hack website... (For learning purposes)
Or if any resources or video ,just paste the link of that video or resources.. please
😂😂😂
make video how to email spoof happens
I think Bro wakeup from a coma
Thanks❤
Educational purposes only 😂
😂😂
@@gg-mr4qr yep
I want to make a script for a game, brother, I want to earn money. Tell me brother, will you help me?
how do i contact you
How to hack and destroy systems
Yes
Hi I
Comeback
How to hack social media companies and power my social media account so that no one cant block me and my post get popular and on top
It is because
HELLO
alert(1)
Bro that not gonna work😂😂😂😂