The Mass Hunt XSS Technique Bug Bounty Hunters don't want you to know

แชร์
ฝัง
  • เผยแพร่เมื่อ 6 ก.พ. 2025

ความคิดเห็น • 112

  • @HacktifyCyberSecurity
    @HacktifyCyberSecurity  4 ปีที่แล้ว +12

    Best Seller Bug Bounty Hunting & Penetration Testing Courses - learn.hacktify.in

    • @Abhisheksingh-yo4jq
      @Abhisheksingh-yo4jq 3 ปีที่แล้ว

      i want to buy your course please add netbanking option

    • @LetsGoTech
      @LetsGoTech 2 ปีที่แล้ว

      Thank you for this videos

  • @SaleemSikandar
    @SaleemSikandar 4 ปีที่แล้ว +10

    The title of this video really matches with the content you have shown. Thumbs up.

  • @youfather38392
    @youfather38392 2 ปีที่แล้ว +2

    Best video for XSS automation I have ever seen
    Thank you ✌✌✌✌✌✌✌

  • @shivakumarmv4249
    @shivakumarmv4249 3 ปีที่แล้ว +2

    Excellent way of explaining the automation....Great job sir....

  • @sohailsaha7427
    @sohailsaha7427 4 ปีที่แล้ว +3

    Honestly saying, this is such a good way. Thanks a lot for demonstrating this. :)

  • @surya-ur5vv
    @surya-ur5vv 4 ปีที่แล้ว +8

    Realy You Are Awesome Rohit sir
    I just researched a lot and lot but i didnt know many thing When i saw ur video realy I impressed 😍 I reported 100 of reports but all will be duplicated but this time i work hard using ur video concepts and make bug bounty Once again thankyou for uploading daily videos. When i wake up morning i just check your channel for new content video !🥰🥰
    Regards,
    Surya

  • @منوعاتجميلة-ث7ز
    @منوعاتجميلة-ث7ز 3 ปีที่แล้ว +1

    Greetings,
    Where is the last video as you mentioned the beginning.
    Thank for this great content

  • @jishan3201
    @jishan3201 2 ปีที่แล้ว +1

    Is it ok if I use gau tool instead of waybackcurls.

  • @Prime10103
    @Prime10103 2 ปีที่แล้ว +1

    That was superb....sir.
    But I want know the methods like sqli ssti and others vulnerability ...how you found when you hunt.
    Please sir share with us your methods for different kind of vulnerability.
    Advance thank you...and wish you all the best.

  • @shrimantmore7765
    @shrimantmore7765 4 ปีที่แล้ว +4

    At 5:28 you mentioned that you directly used .txt file given waybackurls.
    So basically,
    1) Do we have to use data from waybackurls directly or
    2) We have to use grep "=" and egrep to remove noise and then use the generated file for further processing ?

    • @HacktifyCyberSecurity
      @HacktifyCyberSecurity  4 ปีที่แล้ว +2

      You can use the file from waybackurls.txt and supply the script to it to filter results based on =

  • @aliresearcher7339
    @aliresearcher7339 4 ปีที่แล้ว +1

    I really like your video..From Pakistan.

  • @slbpriank91
    @slbpriank91 4 ปีที่แล้ว +2

    What if the url has multiple params? And one of the param is vulnerable?

  • @NexInfernis
    @NexInfernis 3 ปีที่แล้ว +1

    hey my kxss is not running i have deleted and download it again but still not working any solution

  • @yuvrajshukla4616
    @yuvrajshukla4616 2 ปีที่แล้ว

    Today I find gem 💎 thanks bhaiya

  • @masshacker7401
    @masshacker7401 4 ปีที่แล้ว +1

    Nice video sir, great work , tomnomnom giving to us good scripts , waiting for ur xss patterns. I love sed tool in this videos

    • @shuvamadhikari8254
      @shuvamadhikari8254 4 ปีที่แล้ว +1

      Screen shot the payload and use www.onlineocr.net/ to copy text from screen shot 😜

  • @chinmoysharma8237
    @chinmoysharma8237 4 ปีที่แล้ว +3

    Awsome video sir🔥please make video for automation of other attacks also like OR, LFI, SSRF , SQLi..

  • @sushantkumbhar8790
    @sushantkumbhar8790 3 ปีที่แล้ว

    how to add color UI in dalfox??

  • @gk_eth
    @gk_eth 4 ปีที่แล้ว

    Some program urls when passed as input to kxss doesn't give any o/p..how to proceed further in that scenario??

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked ปีที่แล้ว

    XSSHunter doesn't work anymore, but there's an express version. That didn't work for me either.

  • @Free.Education786
    @Free.Education786 3 ปีที่แล้ว +1

    Thanks. How to collect all XSS payloads from bugcrowd HTB Hacker1 to mass attack to upload shell file, RCE and rooting web servers. Thanks

  • @HarshalChauhan_
    @HarshalChauhan_ 4 ปีที่แล้ว +2

    Can please make video on CORS tips and tricks

  • @Free.Education786
    @Free.Education786 2 ปีที่แล้ว +2

    What to do after getting alert(XSS); pop-up because pop-up with cookies 🍪 or document.domain(); pop-up is not suitable to receive bug bounty rewards. Please guide how to escalate reflected XSS to higher levels to earn bounties on hackerOne BugCrowd intigrity etc. Thanks 😊 🤝❤️💫💐😘🥰🌺💥💯👍

  • @shrimantmore7765
    @shrimantmore7765 4 ปีที่แล้ว +2

    Thanks for the information,
    BTW you mentioned about a list at 19:38, I think we already have tool for that and its Open Source too :)

    • @HacktifyCyberSecurity
      @HacktifyCyberSecurity  4 ปีที่แล้ว +3

      There are many parameters which are been added in public tools, but having your params from each web application gives you slighter advantage then others ;)

  • @rahul6379
    @rahul6379 3 ปีที่แล้ว +1

    sir can you teach all this amazing techniques in your paid courses of bug hunting

    • @HacktifyCyberSecurity
      @HacktifyCyberSecurity  3 ปีที่แล้ว

      Yes we teach more such techniques.
      Check at learn.hacktify.in

  • @MrTJadam
    @MrTJadam 4 ปีที่แล้ว

    Hey quick question, my output from kxss looks alot different than yours, just wondeirng what commit of kxss your using?

  • @e1Pr0f3ss0r
    @e1Pr0f3ss0r 4 ปีที่แล้ว

    Very useful video 👍👍👍

  • @jahanajj
    @jahanajj 8 หลายเดือนก่อน

    my kxss isn't working like yours ?!!!

  • @venkatkiran9412
    @venkatkiran9412 4 ปีที่แล้ว

    Im getting different output when we run kxss we are not getting url:

  • @surya-ur5vv
    @surya-ur5vv 4 ปีที่แล้ว

    I just downloaded the kxss but how could i run in my kali machine??

  • @axelanderson2030
    @axelanderson2030 2 ปีที่แล้ว +1

    bash scripts are messy, but you could try format it a little bit.
    Regardless, thanks for the info!

  • @sridevikatta1000
    @sridevikatta1000 4 ปีที่แล้ว

    sir, i am facing problem in installing kxss. can u pls tell me how to do. can we use gxss instead of kxss in the command you showed in this video.

  • @yukeshkumar9536
    @yukeshkumar9536 4 ปีที่แล้ว

    bro its not showing me the vulnerable and not vuulnerable tag line

  • @green_quirk
    @green_quirk 4 ปีที่แล้ว

    Awesome sir, Love your content.

  • @sail6114
    @sail6114 4 ปีที่แล้ว

    Superb sir, waiting for patterns 😎😎😀

  • @newuser2474
    @newuser2474 3 ปีที่แล้ว

    Nice explanation

  • @Shifacyclewala-pz4ls
    @Shifacyclewala-pz4ls 4 ปีที่แล้ว

    To join Hacktify's full Course Visit : learn.hacktify.in

  • @tangducbao7309
    @tangducbao7309 4 ปีที่แล้ว

    Really enjoy your video

  • @bejankinaveen9306
    @bejankinaveen9306 3 ปีที่แล้ว

    Sir we wait ing log4j vulnerability video

  • @manishdabi5619
    @manishdabi5619 3 ปีที่แล้ว

    Great video...

  • @The1996Rockers
    @The1996Rockers 4 ปีที่แล้ว +1

    You are awesome man

  • @bhuwanjain2957
    @bhuwanjain2957 4 ปีที่แล้ว

    how to bypass the html encoding of tags
    please tell!!

  • @ashishf6
    @ashishf6 4 ปีที่แล้ว

    Learnt something new thank you so much..😁

  • @sabyasachisahoo1237
    @sabyasachisahoo1237 4 ปีที่แล้ว

    Thanks sir..
    Can you make different way to account takeover bug

  • @morsalin101
    @morsalin101 3 ปีที่แล้ว

    Parameter is where?i need sir

  • @neetsaviour8457
    @neetsaviour8457 4 ปีที่แล้ว +2

    Please Make a Video on Explaing how CSP work and How we can Bypass them.

  • @yuvi_white_hat1942
    @yuvi_white_hat1942 4 ปีที่แล้ว

    How to find stored xss sir

  • @ca7986
    @ca7986 4 ปีที่แล้ว

    Great work! Where I can find these commands?

    • @shuvamadhikari8254
      @shuvamadhikari8254 4 ปีที่แล้ว +1

      Screen shot the payload and use www.onlineocr.net/ to copy text from screen shot 😜

  • @shahidhannure237
    @shahidhannure237 3 ปีที่แล้ว

    Hello sir have you published your xss pattern file?

  • @freyeahshah4494
    @freyeahshah4494 4 ปีที่แล้ว

    Awesome As Always 🙏

  • @arjunpeter9614
    @arjunpeter9614 4 ปีที่แล้ว

    Awesome explain , really feel good thumb's up n subscribe for you,

  • @abhiimali
    @abhiimali 4 ปีที่แล้ว

    Thank you ❤️✌️

  • @dibyaranjannayak6537
    @dibyaranjannayak6537 4 ปีที่แล้ว

    Awesome👍😊

  • @anshusharma5199
    @anshusharma5199 4 ปีที่แล้ว +1

    Hey make a video on nuclei

  • @tameemkhalid6316
    @tameemkhalid6316 4 ปีที่แล้ว

    Sir one doubt, when we remove after = values what if there are more parameter after = like page=1&id=2. I think only first = parameter will exist and all other will remove !

  • @sabindira3158
    @sabindira3158 4 ปีที่แล้ว +1

    Tried Kxss no output

    • @sabindira3158
      @sabindira3158 4 ปีที่แล้ว

      Does it mean no unfiltered parameters then ?

  • @thedarkarmy8713
    @thedarkarmy8713 3 ปีที่แล้ว

    Thank u.

  • @cksuwarnaraj
    @cksuwarnaraj 4 ปีที่แล้ว

    thank you for sharing. thumbs up

  • @accessdenied9393
    @accessdenied9393 4 ปีที่แล้ว

    Good stuff

  • @pratiksingh5796
    @pratiksingh5796 4 ปีที่แล้ว

    Very well explained ! You made XSS hunting simpler. Thanks
    There's one problem when i cat my target result and pipe it with Kxss the output is different for me, like this :-
    param classification is reflected and allows ' on www.target.com.ss:443/?classification=1234
    param campaigncode is reflected and allows ' on www.target.com.ss/learning/?campaigncode=target_banner_09&sc_trk=tar-courses-link
    so, how can i delete the sentence/string "param classification is reflected and allows ' on " ?
    Please Help

    • @holybugx
      @holybugx 4 ปีที่แล้ว

      cut -d' ' -f9 | sed 's/=.*/=/'

  • @bagasrizki973
    @bagasrizki973 4 ปีที่แล้ว

    Woahh, thanks

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked ปีที่แล้ว

    I tried to download Dalfox through all the methods, to no avail. Lol. I was trying before even seeing this video. KXSS I found out about earlier today from another TH-camr. Hehe.

  • @satyamgothi5090
    @satyamgothi5090 4 ปีที่แล้ว

    Instead of the confusing sed thing we could directly do it with "qsreplace -a" if I'm not wrong.

    • @HacktifyCyberSecurity
      @HacktifyCyberSecurity  4 ปีที่แล้ว +1

      Sed and qsreplace both works differently. sed is stream editor and will replace stuff anywhere in a string.
      whereas qsreplace will only replace for parameters.
      Eg - iloverohitsyoutubevideos.com/search=lotsoflove
      Here qsreplace will replace lotsoflove with FUZZ, sed can replace rohits to shifa.

    • @satyamgothi5090
      @satyamgothi5090 4 ปีที่แล้ว

      @@HacktifyCyberSecurity Yes I agree, but here the use case was the same for the first sed command you used, to modify the parameters and remove stuff after that "=". So just thought qsreplace seems like a cleaner option :)

    • @satyamgothi5090
      @satyamgothi5090 4 ปีที่แล้ว

      Nevermind, got it! My bad :P

  • @prathambansode91
    @prathambansode91 3 ปีที่แล้ว

    Sir plz take some bash scripting

  • @Hellsking
    @Hellsking 3 ปีที่แล้ว +1

    hello i tried kxss its take a lot of time like more than 10 hr and still loading

    • @vermeerweg1
      @vermeerweg1 3 ปีที่แล้ว

      Yep same here. kxss doesn't work anymore

  • @KunalSingh-uw3fj
    @KunalSingh-uw3fj 4 ปีที่แล้ว +1

    Sir, i have a confusion on installing KXSS, can you tell the procedure for installing KXSS?

    • @HacktifyCyberSecurity
      @HacktifyCyberSecurity  4 ปีที่แล้ว

      Make sure you have go installed and go path configured. Then follow the steps to install kxss from repo.

    • @malwarecopter4440
      @malwarecopter4440 4 ปีที่แล้ว +2

      Install go lang then use this command
      GO111MODULE=on go get -u github.com/tomnomnom/hacks/kxss
      Then go to your go installation folder
      Example
      Cd go/src/github.com/tomnomnom/hacks/kxss
      go build main.go
      A file name kxss will be build
      Now copy this to your go installation directory
      Example
      Sudo cp kxss /usr/bin
      It should now be available directly for use
      Or if you are not root user then simply copy this kxss file to your
      Go/bin/ folder
      Enjoy 😎

  • @surya-ur5vv
    @surya-ur5vv 4 ปีที่แล้ว

    sir what happen to today video?????????????????????

    • @HacktifyCyberSecurity
      @HacktifyCyberSecurity  4 ปีที่แล้ว +2

      Hi, Due to bad health couldn't upload it. It will be uploaded today.

  • @sarans119
    @sarans119 4 ปีที่แล้ว

    Share waybackurl script bro

  • @sabindira3158
    @sabindira3158 4 ปีที่แล้ว

    Plz share the script

  • @shuvamadhikari8254
    @shuvamadhikari8254 4 ปีที่แล้ว

    231 th like 😇

  • @bhuwanjain2957
    @bhuwanjain2957 4 ปีที่แล้ว

    www.optimizely.com is out of scope! bad luck