Exploiting Cross-site Scripting to Capture Passwords (No Collaborator)

แชร์
ฝัง
  • เผยแพร่เมื่อ 11 ม.ค. 2025

ความคิดเห็น • 20

  • @nishantdalvi9470
    @nishantdalvi9470 ปีที่แล้ว +1

    I wonder how would it be possible to learn xss and solve labs realted to it on port swigger academy if you wouldn't be there to explain these labs in detail

  • @amaljose6374
    @amaljose6374 8 หลายเดือนก่อน +1

    does anyone knows how the browser automatically sends the password of administrator and then the function posts it

  • @YoussefAlsalahy
    @YoussefAlsalahy ปีที่แล้ว

    thank you for this detailed explination no one did it like you ❤❤❤

  • @LMeasy
    @LMeasy 6 หลายเดือนก่อน +1

    man beautiful video you are really good teacher

  • @C4Cyber
    @C4Cyber ปีที่แล้ว +1

    Yo...
    That's cool bro....🔥🔥🔥🔥

  • @gpdally-tupa
    @gpdally-tupa ปีที่แล้ว +1

    Real good tut, thank you

  • @nishantdalvi9470
    @nishantdalvi9470 ปีที่แล้ว

    Just a little question Why didn't we added "DomContentLoaded" event listner to the window just like the previous lab exploit here ?

    • @ra1Lgunn3r
      @ra1Lgunn3r ปีที่แล้ว +1

      In the previous lab web added DOMContentLoaded to make sure a csrf token was generated before our script was exploited. I am not sure why this time DOMContentLoaded was not used. @z3nsh3ll is it because we assume that a csrf token will already have been generated or some other reason? Btw good explanation and video.

    • @Davidxt3
      @Davidxt3 3 หลายเดือนก่อน

      @@ra1Lgunn3r this time the function triggers when the password input is changed, and there's no way to change it before the DOM is loaded (and csrf token is generated)

  • @tuferchi
    @tuferchi 6 หลายเดือนก่อน

    Hello! Where i can ffound the no officail code?

  • @pranjalruhela1103
    @pranjalruhela1103 ปีที่แล้ว

    we introduced the input fields ... to trick the browser to think that okay... "I have it saved somewhere with me the credentials and I should supply them 2 these input fields?? " is it correct ?

    • @z3nsh3ll
      @z3nsh3ll  ปีที่แล้ว

      Yes, the browser is trying to be helpful by automatically supplying saved username and passwords to input fields. The browser may not always be able to tell the difference between the legitimate input fields and malicious input fields. The browser won't submit the username and password without the user's permission, however, simply filling the fields out is enough for us to be able to access them if we have JavaScript running in the victim's browser.

  • @JohnWick-fy9kp
    @JohnWick-fy9kp ปีที่แล้ว

    What does the hax function do?

    • @z3nsh3ll
      @z3nsh3ll  ปีที่แล้ว +1

      Hax() is a user defined custom function, not part of JavaScript. It simply creates a form along with the CSRF token and sends it to the /post/comment URL

    • @JohnWick-fy9kp
      @JohnWick-fy9kp ปีที่แล้ว

      @@z3nsh3ll Can we use any name instead of hax?

    • @z3nsh3ll
      @z3nsh3ll  ปีที่แล้ว +1

      @@JohnWick-fy9kp Yes, that's just a custom name. We can call the function anything we want.

  • @mnageh-bo1mm
    @mnageh-bo1mm 10 หลายเดือนก่อน

    or you can use a webhook

  • @rafipramudya7258
    @rafipramudya7258 10 หลายเดือนก่อน

    very good bro

  • @humamkassar4925
    @humamkassar4925 4 หลายเดือนก่อน

    👏👏👏👏👏👏👏