Cross Site Scripting (XSS) | Real World

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 พ.ย. 2024

ความคิดเห็น • 57

  • @WtfAnupam
    @WtfAnupam ปีที่แล้ว +34

    omg, this was so amazing, there are thousands of videos on XSS but I hardly encountered anyone who explains topics in a such beautiful and simple way. Thank-you so much

    • @EdwinDeJesus-w6i
      @EdwinDeJesus-w6i ปีที่แล้ว +1

      So he was logged in already on his account. Did he steal his own cookies

    • @jithu-ud1pd
      @jithu-ud1pd 2 หลายเดือนก่อน

      true

  • @ratmoneyg
    @ratmoneyg ปีที่แล้ว +2

    You are the best teacher of this subject I have found on TH-cam. I graduated this year with a BAS in Cyber Security, but still feel like I’ve only scratched the surface regarding ethical hacking. I’m trying to become self-sufficient at bug bounty hunting, but I’m so bad at it. Your videos are really helping me though (more than other creators). You just explain it so well in shorter, more concise videos. Thanks so much, and keep it up!!!

  • @Deleted_User1090
    @Deleted_User1090 ปีที่แล้ว

    I have looked for stuff like this forever and it never gives me a simple way or a way that makes sense THANK YOU.

  • @antraxgl3577
    @antraxgl3577 ปีที่แล้ว

    Thank you for the example ! Im starting with pentesting and I decided to go with XSS, it's actually pretty fun and I learned a lot with your video.

  • @yarinp23
    @yarinp23 9 หลายเดือนก่อน

    Thank you so much! I was searching for this exact thing, using a real payload and explaining instead of simple alert that wont demonstrate harm to the server

  • @GINGER-200
    @GINGER-200 6 หลายเดือนก่อน +4

    very interesting ill be back when i understand what I just watched

    • @GINGER-200
      @GINGER-200 4 หลายเดือนก่อน +2

      im back i get it now

  • @sumedh1678
    @sumedh1678 2 ปีที่แล้ว +1

    This kind of real world explanation will actually help us to understand attack more. Thanks!!!

  • @Waflon
    @Waflon 2 ปีที่แล้ว +4

    Thanks a lot for this kind of videos. Maybe you could do a OWASP 10 but in this format with 10 basic examples of the most common vul, also i'm from Chile and a new sub.

  • @brs2379
    @brs2379 2 ปีที่แล้ว +1

    Hey could you make a video on what your process is for bug bounties? What steps do you take when carrying out recon? What do you check for? And once you've completed recon, what do you do next?

  • @vedant153
    @vedant153 หลายเดือนก่อน

    Short and simple, thanks!

  • @adnanirfan6974
    @adnanirfan6974 ปีที่แล้ว

    keren, terimakasih ilmunya.
    itulah mengapa penting sebuah website menggunakan SSL agar dapat terredirect ke https dan cookies nya aman

  • @himawanraharja
    @himawanraharja 28 วันที่ผ่านมา

    this is amazing, most videos usually just alert.
    btw is it possible to try do one on angular based web?

  • @gkdusa
    @gkdusa 2 หลายเดือนก่อน

    great video, you connected all the dots with a real world attack example ! Make a video for exploiting latest AI attacks and 3rd party component vulns

  • @dev.roysalazar
    @dev.roysalazar 4 หลายเดือนก่อน +1

    There is something I don't understand. The malicious input it's saved in the db table that contains your profile info and it is sent and executed in the browser when the web client request to the server for your profile information, so how can this work to steal cookies from other users, since the malicious script it's only sent by the server when you log into your own account?

    • @dev.roysalazar
      @dev.roysalazar 4 หลายเดือนก่อน +1

      To answer my own question: if your user profile can be seen by anyone, when they see your profile they get the malicious code

    • @LinhNguyen-nh8oq
      @LinhNguyen-nh8oq หลายเดือนก่อน

      @@dev.roysalazarthanks, I have the same question

  • @ss-rc1gy
    @ss-rc1gy 2 ปีที่แล้ว

    thanks for this amazing tutorial , n btw would you like to recommend any books for learning javascript ?

  • @phoenix3488
    @phoenix3488 2 ปีที่แล้ว +4

    That's cool 😲.. so this type of attack is called reflected xss yeah 🤔?

  • @pd1259
    @pd1259 3 หลายเดือนก่อน

    Why are we referencing the xss.js file in the form field? Isn't it possible to directly paste the code from this file into the field?

  • @pedrobarthacking
    @pedrobarthacking ปีที่แล้ว

    Amazing how you teach in a simple form to understood.
    Can you make a video, explain how to test xss when the webApp have some waf/filters ? 🙂

  • @harshalmali856
    @harshalmali856 6 หลายเดือนก่อน

    amazing it caught my attention through your video to dig out more in this topic thanks bro

  • @amoh96
    @amoh96 ปีที่แล้ว

    Hello plz answer me i have qst abt bug bounty
    i finish html im in Js (Function) When i finish Js can i start learning XSS & Learn Recon & how Web Work & burpsuit and try in labs than start in real world ? and in the same time keep learning about PHP & MYSQL and other OWASP 10 & methodology

  • @Mr_tadoo
    @Mr_tadoo 2 ปีที่แล้ว

    Great as always !
    Idea : you can make more videos about server side bugs !

  • @pnuema1618
    @pnuema1618 6 หลายเดือนก่อน

    Would this be considered a persistant XSS attack?

  • @jaredelfaz2558
    @jaredelfaz2558 2 ปีที่แล้ว

    thank you. we need more hard xss like openredirect to xss ... something hard

  • @theMintyRaven
    @theMintyRaven ปีที่แล้ว

    great content, thank you.. I've not seen a real example of xss so far. could you make more contents like this? the real world/hands on hacking videos

  • @SleepyGameFacts
    @SleepyGameFacts 6 หลายเดือนก่อน

    Awesome explanation. Thank you

  • @jaredelfaz2558
    @jaredelfaz2558 2 ปีที่แล้ว

    and we want bug bounty explained videos. some blogs are high level we don't understand much of thier bug report write ups. please we want you to explain the easy way.

  • @Gr33n37
    @Gr33n37 ปีที่แล้ว

    grate video, whats fun you get a hard thing and make is simple to understand, views i guess you should also buy this guy's course, i saw it has cool content in it😁

  • @goodluckmichael9523
    @goodluckmichael9523 2 ปีที่แล้ว

    Thank u sire. Sire can u do more real world vulnerabilities exploitation and how to escalate a certain vulnerability to another Eg xss to csfr

  • @kaos092
    @kaos092 ปีที่แล้ว

    How are you grabbing an admin cookie? That the only part I don't understand. Why would you have access to any data from his session?

    • @Redhawk1961
      @Redhawk1961 3 หลายเดือนก่อน

      I know this is from a year ago, but this is stored xss, the malicious code is on the web server at this point. It's grabbing from a source (in this case, his kali linux server) and it's running anytime the profile created is checked. In this case, he was able to execute with , but there's more ways to execute js if the script function is blocked.

  • @suraj6177
    @suraj6177 ปีที่แล้ว

    this is amazing work👏

  • @powerdreng
    @powerdreng 7 หลายเดือนก่อน

    Well explained!

  • @ankitahir291
    @ankitahir291 2 ปีที่แล้ว

    Hi, how to prevent xss on joomla CMS... In lang parameter can you share any solution?

  • @cemkucuk6738
    @cemkucuk6738 ปีที่แล้ว

    very very good tutorial! thnx

  • @dhanitrianggara1772
    @dhanitrianggara1772 ปีที่แล้ว

    this is amazing work

  • @drushkyy2017
    @drushkyy2017 ปีที่แล้ว

    Do one for cross site request forgery, confused on that one please

  • @rizeenf2004
    @rizeenf2004 2 ปีที่แล้ว

    Cool. Keep it up

  • @castcrus
    @castcrus 10 หลายเดือนก่อน

    So, now the question is how to trick the admin in the real world to visit the link, like I have trouble logging in....

  • @GkjcAmpj-s2g
    @GkjcAmpj-s2g 3 หลายเดือนก่อน

    Wilson Timothy Jones Gary Clark Ruth

  • @siddhantsitapara2280
    @siddhantsitapara2280 2 ปีที่แล้ว

    Please Make video on cloud hacking like Synology Nas

  • @athul070
    @athul070 ปีที่แล้ว

    bro everyone is saying your videos are amazing
    good job
    I really want make some money through this field but I cant understand this ethical hacking where should I start

    • @ryan_phdsec
      @ryan_phdsec  ปีที่แล้ว

      I answer the video coming tomorrow.

  • @martinlastname8548
    @martinlastname8548 หลายเดือนก่อน

    Great dude

  • @rishabhrana3773
    @rishabhrana3773 2 ปีที่แล้ว

    Cobalt strike group

  • @iqyou-gw4kd
    @iqyou-gw4kd 2 ปีที่แล้ว

    شكرا لك اخي
    thank you sir

  • @Noctuu
    @Noctuu ปีที่แล้ว

    didnt know gmk did xss

  • @theomidtabei
    @theomidtabei หลายเดือนก่อน

    💙💙💙

  • @MustafaGains
    @MustafaGains 7 หลายเดือนก่อน

    ❤❤

  • @ttrss
    @ttrss 2 ปีที่แล้ว

    Not exactly "real world" lets be honest, why is http-only set to false??

    • @ryan_phdsec
      @ryan_phdsec  2 ปีที่แล้ว

      Not sure. In react, I have seen applications have dangerouslySetInnerHTML when it couldn't be any more clear NOT to do this.

  • @esamlasheen453
    @esamlasheen453 ปีที่แล้ว

    How i cans message you on dm ?