PortSwigger Labs - Reflected XSS into HTML context with most tags and attributes blocked (PART 04)
ฝัง
- เผยแพร่เมื่อ 24 ก.ย. 2024
- BRAND NEW
In this video, I will be showing how to solve "Reflected XSS into HTML context with most tags and attributes blocked ".
Buy me a coffee: www.buymeacoff...
Discord Link: / discord
Thanks for Watching.
#XSS #BugBounty #CrossSiteScripting #PortSwigger
#ICODE #Labs #PortSwiggerAcademyLabs #BugBountyHunter
Brother i am new to this journey.. I faced many difficulties whenever i tried to solve the portswigger lab then i foun your video in the youtube.You are just awesome. You explain every little things and you also explain why the code are working and why not. KEEP it UP bro!!! Love you.
Portswigger should feature your videos in their community solutions thing, they are far more helpful than the solutions given (not that the bar was very high lol)
Great work
I am agree. This man is awseome
Excellent explanation man! Very well done!
please keep going and I agree about the playlist. Some labs are missing and not organized.
Appreciate it ❤
Sure,thanks mate!
Brother, your content is wonderful. I was actually doing this but I didn't understand how it worked in real life, with your explanation I really managed to understand how this works in real life
this was very helpful. it was worth watching all the series
take 5 videos all i care is explain it completely and not rush stuff thanks man!
i am following your playlist.
its really really helpful.
tnx for making such kind of content
Great video. Plz create more videos on other portswigger topics/labs as well.
Thank you for very thorough explanation, I was struggling with understanding the need for and how exploit would work in general. I do understand that some time has passed since creation of the video, but maybe you could give an idea, how in this case would it be possible to see xss injection result in action, after we delivered it?
wow! That was great explanation buddy ❤👏👏👏
are you a king ? we need more sir
No stopping till until solving them all.
very nice man ... swesome dont mind the length its really worth it
great explain, it's very easy to understand and useful
wow bro amazing please do the other labs like this as well
Best explanation
It was a really good explanation
Very good, thank you very much!!
nice video. convert all the 4 videos into a single one and submit that for portswiggers community solution.
thanks mam, i saw the full xss playlist
awesome explanation! tks!
loved it !
I’m enjoying the videos but please organize the playlist in order ❤
Hey mate,sure!
@@CodeVerd You are born to teach.... Videos are great and informative. Thanks @CodeVerd
thanks for uploading keep going
Your welcome
This is awesome bro keep it up we want more videos
There is no stopping till I finish portswigger labs
loved it
Great content keep going.
best of the best
Sir Iframe tag is also blocked by the WAF. So how the lab was completed through Iframe?
can you tell me how to learn, if i don't understand, should i spend hours to find myself the solution or directly see the solution ?
Because it is not easy to find an exploit and I am not sure how to approach each lab
Thanks
I love you 😭
next level bro be my tutor sweaar
Bro tag is also blocked, then how is injectable?
you are using the tag for your own exploit server, only what's in the search query parameter is injected
What is the exploit server and why we need actually use this to deliver it to the user? What are alternatives in real life? How to google this misunderstanding to complete with this task?
In real life, you could simply send this link to user. On embed this link in an on any of ur websites of Google pages.
4 vid worth of lot of info just not lab ,, thanks a lot from 2024
NO! NO! tag and onload attribute are not allowed on that lab. Do solve the lab first