Bug Bounty Explained! How Hackers Break Into Your Website Using Only JSON?! Protect Your Website!
ฝัง
- เผยแพร่เมื่อ 22 ม.ค. 2021
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - วิทยาศาสตร์และเทคโนโลยี
Like, share and subscribe to learn all about cybersecurity!
Please provide translate Mr because I'm from Indonesia and me bad to speak english
Please make a video bug bounty full course
Sir how can I join channel members on your channel??
Full support
Hello Sir, I'm unable to access some tutorials on your channel as they are members only. I've subscribed and clicked the link to join but still i can't access them. Kindly help, Thank you
Great! Please make more tutorials like this...
Thank you so much for such good tutorial. please I am in need to learn about rce and ssrf.
Great Content, keep it up
Great video!
Could you also make a video on how to avoid spam filters? Thank you
seems its like SQL injection and XSS but using in JSON. Amazing that you teach us this. THank you
bro it is an XSS. JSON is the only verb on the web. actually, MOST of the websites haven't JSON vulnerability.
Nice video! Some insights: XSS here has more impact if you could turn it into GET request. The way you are showing here doesn't do that much or doesn't have much impact, imho
Its not about the impact hes showing
Great content !
Wow,great tuto...,
Hello I think you could use a proxy switcher to switch to the burpsuite proxy , What do you think about it?
Nice explanation
Pro tip: Use foxyproxy to setup the burp proxy quickly..... 🙂
That’s really true json they could get anything
dude are you using attack on titan's soundtrack? :D
Re-uploaded why? 🙄
Hey.....some of your videos are written "join this channel to view members-only content"...How do I join?
By paying certain amount of feed and this guy deserve that😊
How do retrieve my own data which is deleted?
Please make a Video.
Bro after toggle security level to 5 ..is this possible to hack or it's just show it's highly secured
cool
How to install owasp mutillidae 11 in kali Linux please make a video
Hey loi liang yang can you make tutorial deface website
can you share the link in this platform because of that just GitHub repository open even only open photo pls guys share this link.
Re uploaded 🤫🤐❤
Why what happened, are something's removed from previously uploaded video?
First With 95 others
How do I see the rest of your video. ? Your channel doesn’t allowed
Im confused how is this can be dangerous to other users? I saw you insert your payload everytime you make a request so that means the payload are not permanent inside the json right?
There's a kind of xss named stored, that has persistance.
If you had written document.body.style.display = "none" you would make the page to disappear
This is like self xss, there is no security impact in this
exactly, there ist litereally no company on bugbounty platforms that has self xss in scope, it is out of scope
@@dorianvoka5591 you definetely missing some info.
Go to hackerOne and search Fetlife in directory and read their policy
@@anishdhamala9233 bruh fetlife, watch out for the outer 90000000 programs
It look like it is only for website with login. My site will be an art gallery and no javascript, so it's okay.
🤩🤩🤩
Brother, this is cross site scripting itself know?
How to reconnect hacked devices using Metasploit Framework?
Persistent backdoor
Use foxy proxy
ANOTHER NAME IS XSS ATTACK
First comment
If you can add Chinese subtitles, I think there will be more audience
never
jo kiyu indian video dekha ra he wo muje riply kare