Hunting Open Redirects: A Pathway to Chaining XSS

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ม.ค. 2025

ความคิดเห็น • 14

  • @Dxrk.24
    @Dxrk.24 หลายเดือนก่อน

    Expecting more of these! ❤︎

  • @SumitYadav-lr5vy
    @SumitYadav-lr5vy หลายเดือนก่อน

    amazing video

    • @Medusa0xf
      @Medusa0xf  หลายเดือนก่อน

      Thank you!

  • @SumitYadav-lr5vy
    @SumitYadav-lr5vy หลายเดือนก่อน +1

    Can you create a long video on how you hunt for bugs(manually hunting bac related bugs) on real world target?

    • @Medusa0xf
      @Medusa0xf  หลายเดือนก่อน +1

      I'll consider about that.

    • @Code_x_876
      @Code_x_876 หลายเดือนก่อน

      Please​@@Medusa0xf

    • @amoh96
      @amoh96 หลายเดือนก่อน

      yes good idea

  • @AsilentWolf-c2c
    @AsilentWolf-c2c หลายเดือนก่อน +1

    By the way, your voice is so pretty.

    • @MianGG-c
      @MianGG-c หลายเดือนก่อน +1

      this is not real, its an text-speech-gen , her real voice is in the snake-bites podcast.

  • @kittoh_
    @kittoh_ หลายเดือนก่อน

    Question: If the user clicks the forgot password link to reset the password, then gets redirected to a malicious site, given that the user forgot the password thus will not be able to provide login credentials so is the user safe from this kind of attack? And also most reset passwords links only requires email which is not so sensitive info.

    • @Medusa0xf
      @Medusa0xf  หลายเดือนก่อน +3

      Yes, in the case of password resets, most web applications ask for only the email address or username. However, since an email address is considered PII (Personally Identifiable Information), it’s a security vulnerability if it gets leaked in the response or URL.
      It’s still worth noting that if an attacker gains access to the email, they can chain multiple vulnerabilities together to launch further attacks. For example, if the web application lacks rate limiting and the attacker already has the username/email, they could perform a brute-force attack to guess the password. Another scenario could involve chaining an XSS vulnerability: if the user is already logged in, the attacker could exploit the reset password redirect. Even though the redirect is intended for password reset, it doesn’t matter-by using a JavaScript payload, the attacker could exfiltrate the user’s cookies, as I discussed in the video. I hope this clears up your doubt.

  • @mohadjermohamed3439
    @mohadjermohamed3439 หลายเดือนก่อน

    8 MINUTES FOR ONE SINGLE PAYLOAD WHICH EXISTS IN THE INTERNET FROM 2000

    • @Medusa0xf
      @Medusa0xf  หลายเดือนก่อน

      That's great that you understand, but not everyone does.