I was so confused when I was solving labs..... Every video I saw all they did was just copy n paste the solution ....I saw your video... You explanation was on point🔥👌... And my doubts are clear now.... Good work.... And please make videos on all labs and make it a playlist... It will be a great help bro✌️👍
here block means the tags which are handled by the developer so cant use them to intrude. hence found out that is something which is not handler by the code hence used that tag for intruding.
if its not part of playlist, means the concept is similar to something already covered. Let me know if you are struck anywhere. Will surely help you :)
Your videos are an excellent addition to my Bug Bounty curriculum. Thanks for all the efforts. Keep up ! BTW while configuring the attack in 'Target' tab, using the HTTPS checkbox depends on the protocol of the website right?
@@Dpoint0 thanks bro, im on streak of solving portswiggers labs, i would really love to have a bit of your guidance. you own any discord servers or community?
@@AhmedSalah-fi3dt as i have mentioned on 7:43 to get in attr=value format I used 100 as value, you can use anything, just we want our payload in the proper format, And exploit server means server in which attackers code is present, that is server is compromised and will affect the end-user
hi good explaination , but please advise for tag should look like this ....but if we dcode the solution it come like this : " onload=this.style.width='100px' my question is why on load and on resize attribute did not come inside opening tag of i frame . they are coming after opening tag and also i do not see any closing tag for i frame also. also , could not understand the purpose of double quote after print function.
Thanks mate. Very well explained. Lot better than the one posted in the official portswigger.
the best explantion ever thanks mate plz rock on
Perfect explanation 👌
thanks :)
you teach very nice please add subtitle for your videos
Great explaination!!This is the only video with proper explaination of tags and attributes used.!!
Glad you liked it :)
I was so confused when I was solving labs..... Every video I saw all they did was just copy n paste the solution ....I saw your video... You explanation was on point🔥👌... And my doubts are clear now.... Good work.... And please make videos on all labs and make it a playlist... It will be a great help bro✌️👍
Thanks buddy
thank you so much bro
Always welcome
well explained
Thanks mate 😊
Good videos man . I have a question : why in the minute 8:40 you put %20 next to the body?
thanks man your videos are amazing
thats url encoded format of space
@@Dpoint0 thanks for your response , awsome videos !
does reflected xss show in POST?
thank you man for this detailed explanation
I'm thankful to you, i found many solution for this but I couldn't find a proper explanation
do subscribe to support, glad it was helpful
Nice one matey....fell right in to that bear trap you described!! THANKS!!
Haha yeah silly thing
must have start and end tag right????
any luck on ur question // i m also having same impression .
How run two application side by side on kali??
Use terminal to run apps , or webapps drag side by side manually
If I didn't answer you properly
Can you reprashe your question
Great Great Explanation and Really Like your Thought Process.
Please do subscribe and share mate :)
Well explained. Thanks
nice video bro.
Very well explained, plz make more videos on port swigger labs
Sure I will thank you #dpoint
thanks for the explanation
can you please explain to me why we used
here block means the tags which are handled by the developer so cant use them to intrude. hence found out that is something which is not handler by the code hence used that tag for intruding.
Nice explanation Bro :)
Glad you liked it! :)
awesome explanation bro
Can you explain this - > "Reflected XSS with event handlers and href attributes blocked" from portswigger.
if its not part of playlist, means the concept is similar to something already covered. Let me know if you are struck anywhere. Will surely help you :)
Does we use this exploit server for send link (with this ) to victim/ and when victim open link in browser, his cookie will stealling?
Right that is basically executing something on client machine
@@Dpoint0 thank you bro :)
clearly explained great keep doing
good content and great effort
Thanks mate
Your videos are an excellent addition to my Bug Bounty curriculum. Thanks for all the efforts. Keep up !
BTW while configuring the attack in 'Target' tab, using the HTTPS checkbox depends on the protocol of the website right?
yes bonny, and thanks for appreciative comment
i still dont get it, what is the purpose of exploit server and how/why does it work
I think i replied to this previously, but if still, doubt persist you can post here maybe: portswigger.net/support - even I will follow the post bro
@@Dpoint0 thanks bro, im on streak of solving portswiggers labs, i would really love to have a bit of your guidance. you own any discord servers or community?
Bro even I am new bie, so yeah we can discuss. you can find discord link in about section
great video.. thank you..!!
:) welcome
where did you get this code??
its in the portswigger solution
great man keep going
Glad you like it mate :)
what is the purpose of =100
can you provide timestamp
@@Dpoint0 9:35
And also idont understand what is the purpose of exploit server
@@AhmedSalah-fi3dt as i have mentioned on 7:43 to get in attr=value format I used 100 as value, you can use anything, just we want our payload in the proper format, And exploit server means server in which attackers code is present, that is server is compromised and will affect the end-user
finally you cutted your hair
haha have a good day ahead
hi good explaination , but please advise for tag should look like this
....but if we dcode the solution it come like this :
" onload=this.style.width='100px'
my question is why on load and on resize attribute did not come inside opening tag of i frame .
they are coming after opening tag and also i do not see any closing tag for i frame also.
also , could not understand the purpose of double quote after print function.