Live Bug Boundy Hunting | Target: Udemy | HackerOne | Html injection

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 ก.พ. 2025
  • The goal was to highlight importance of manual testing to bypassed, and identify the type of sanitization used by a particular website. Xss thing was actually a clickbait. Cross-Context XSS #BugBounty #HackerOne #BugCrowd #CyberSecurity #EthicalHacking #PenTesting #LiveHacking #BugHunting #Udemy #HackerOneHacks #BugBountyHunter #BugBountyProgram #HackersLife #CyberSec #Infosec #VulnerabilityResearch #CTF #dollar #rich #money #monetization #moneymindset #moneytips #HackingLive #CyberSecTraining #EthicalHackers #TechEducation #SecurityResearch #OnlineSecurity

ความคิดเห็น • 60

  • @Shhukoihee
    @Shhukoihee 6 หลายเดือนก่อน +7

    Bro that's nice explanation
    Can. You make more videos on how to find other vulnerability too your approach on real bug bounty target

  • @zedvn3792
    @zedvn3792 5 หลายเดือนก่อน +19

    It will not get udemy cookies because xss runs on the website you specify

  • @J-R105
    @J-R105 4 หลายเดือนก่อน +3

    Solid approach for XSS hunting since it can be tempting to skip straight to XSS without trying the HTML injection to XSS route. Did you modify your payload to show impact before submitting the bug report? Many companies will push back if your PoC just includes the alert() payload.

  • @Shanky..
    @Shanky.. 5 หลายเดือนก่อน +2

    Thanks brother after seeing you video i also gone to udemy and started hunting and in less than 20mins i found a bug 🎉

    • @NicolasAlvesDias
      @NicolasAlvesDias 5 หลายเดือนก่อน +2

      what bug have found can you please tell and how ? please

  • @mazzukmachu
    @mazzukmachu 6 หลายเดือนก่อน +6

    But that xss is not in udemy it is triggered in the lab.?

  • @bugbouty
    @bugbouty 6 หลายเดือนก่อน +7

    bro make a video about how to use sqlmap tamper scripts for bypass waf

  • @naveen1001
    @naveen1001 6 หลายเดือนก่อน +12

    Bro that was no real XSS

  • @Sojujaimon
    @Sojujaimon 6 หลายเดือนก่อน +2

    Avasam face kanikkane thodangiyalle nalla kariyam
    English Velliya problem Ella
    Keep going🎉🎉🎉

  • @Chronono
    @Chronono 6 หลายเดือนก่อน +3

    Bro can you share, where you have submitted and how was bounty for same?

    • @adithyakrishna_v
      @adithyakrishna_v  6 หลายเดือนก่อน +2

      At this stage it's an html injection so no boundy. Still testing on the end point to find loop holes in the sanitization. This almost worked alert(1) but script tag is actually properly html encoded. Most of the event handlers like onclick, onerror, onmouseover etc.. are properly sanitized. But still attributes like , can be injected so there might be a loop hole still, targeting the end point.

  • @anirudhe_s202
    @anirudhe_s202 6 หลายเดือนก่อน +2

    nine suresh gopi kondu povum😅 nice video

  • @deepparasiya5641
    @deepparasiya5641 6 หลายเดือนก่อน

    One of the best to look for xss
    Thank you very much
    Can you please share the resources that you used to build up this methodology.

    • @adithyakrishna_v
      @adithyakrishna_v  6 หลายเดือนก่อน +1

      I didn't rely on any particular resources; I just practiced and refined my methodology over time.

    • @mahabaratam8908
      @mahabaratam8908 5 หลายเดือนก่อน

      @@adithyakrishna_v can you share that methodology

  • @STRhacker420
    @STRhacker420 5 หลายเดือนก่อน

  • @mahabaratam8908
    @mahabaratam8908 5 หลายเดือนก่อน

    And also make a video for url encoding xsss

  • @usrDev403
    @usrDev403 6 หลายเดือนก่อน

    u wont get xss on main site.. u should try every parameter u see or try fetch some hidden parameter..than only u can.. but still everyone hunting on it so bigger chance u get dup

  • @jaysevalalmaharaj5505
    @jaysevalalmaharaj5505 14 วันที่ผ่านมา

    Hi bro

  • @tarakeshwargamingchannel9306
    @tarakeshwargamingchannel9306 17 วันที่ผ่านมา

    How much they paid for bug

  • @apranaya7782
    @apranaya7782 4 หลายเดือนก่อน

    hey i am beginner in this field and have absolute 0 knowledge can u tell me how to start bug bounty its prerequisite what to leran how much time it takes to lern in general plz read this comment thx

    • @adithyakrishna_v
      @adithyakrishna_v  4 หลายเดือนก่อน

      @@apranaya7782 Begin by learning how the web works, particularly web requests POST,GET,PUT),as it forms the foundation of web security. Next, focus on one vulnerability, like Cross-Site Scripting (XSS), and learn everything about it. Practice using labs like PortSwigger's Web Security Academy to understand how it works. Once you’re confident, create an account on platforms like Bugcrowd, HackerOne, or YesWeHack, and start with Vulnerability Disclosure Programs (VDPs) to gain experience. Pick a target and hunt for that specific vulnerability (e.g., XSS). After finding and reporting some bugs, move on to learning another vulnerability and apply both on your next target. The learning process takes time and dedication, but with consistent practice, you can start finding bugs within a few months. Keep pushing and growing!

    • @thenamehasbeenstolen4470
      @thenamehasbeenstolen4470 4 หลายเดือนก่อน

      just hack,watch videos,play with burp fetched request,read hacking articles on medium or any online site, and play with kali linux terminal

  • @tinu-xskullx5780
    @tinu-xskullx5780 5 หลายเดือนก่อน

    NA

  • @abdulx01
    @abdulx01 6 หลายเดือนก่อน +5

    Firstly I was totally sock to see your xss on udyme. 😅 Bro first you need learn xss to teach us. Noob boi 😅

    • @adithyakrishna_v
      @adithyakrishna_v  6 หลายเดือนก่อน +1

      Let me explain:
      XSS (Cross-Site Scripting) allows attackers to inject malicious scripts into web pages viewed by other users. In this case, I was able to inject a complete tag along with its attributes, including an unsanitized target attribute, which was not properly filtered. It should have been considered as text.
      This is my payload: bug
      This payload demonstrates a combination attack rather than a direct XSS attack. The primary attack vector here is the misuse of the target attribute, which the application did not properly sanitize.
      This method reveals a potential vulnerability in handling the target attribute. Regular users can be tricked into following the link to an external site, exploiting the credibility of a legitimate site like Udemy to execute the attack. Ideally, a site like Udemy should not have a vulnerability like this.
      The goal was to highlight the issues in Udemy's input sanitization, demonstrate how it could be bypassed, and identify the type of sanitization used by a particular website. However, I acknowledge that a more direct approach would have been more effective in emphasizing the XSS vulnerability.
      Thank you for your feedback, and I am committed to improving my methods.

    • @krrishogx
      @krrishogx 6 หลายเดือนก่อน

      same thinking bhai :)

    • @FahadMuneer-d6c
      @FahadMuneer-d6c 4 หลายเดือนก่อน

      hey abdul, I see alot of you guys rendering it not being the XSS but I think it is since we can redirect a user to another website that could be malicious. in other words its open redirection through xss because it resulted from the input we injected.
      although it requires social engineering to work but it is a URL redirection through xss.
      plz elaborate if im wrong.
      Thanks ,

  • @LEOSTRIBE
    @LEOSTRIBE 3 หลายเดือนก่อน

    it is simple html injection not real xss

  • @sairavuri5585
    @sairavuri5585 6 หลายเดือนก่อน

    How much bounty gain ?

  • @VulnVentures
    @VulnVentures 3 หลายเดือนก่อน

  • @dummy9422
    @dummy9422 6 หลายเดือนก่อน

    Video is pretty good. But can you please stop saying "see" so frequently. It's little bit irritating

  • @saidulsheikh-f3l
    @saidulsheikh-f3l 2 หลายเดือนก่อน

    need new video whith live example . please bro

  • @nadhilan2187
    @nadhilan2187 6 หลายเดือนก่อน

    nice do more videos.add more tips while hunting

  • @Cartoon_init
    @Cartoon_init 3 หลายเดือนก่อน

    Bhai tu lagta to indian hai lekin English mai kyu bol rha hai angrez log pahile se hi aage hai ap bus hum kare

  • @rashidyaseen6270
    @rashidyaseen6270 6 หลายเดือนก่อน +1

    So did you earnt something for this

    • @adithyakrishna_v
      @adithyakrishna_v  6 หลายเดือนก่อน

      No at this stage it's an html injection. Still testing on the end point to find loop holes in the sanitization. This almost worked alert(1) but script tag is actually properly html encoded. Most of the event handlers like onclick, onerror, onmouseover etc.. are properly sanitized. But still attributes like , can be injected so there might be a loop hole still, targeting the end point.

    • @FahadMuneer-d6c
      @FahadMuneer-d6c 4 หลายเดือนก่อน

      @@adithyakrishna_v Hey Aditya,
      I see alot of guys rendering it not being the XSS but I think it is since we can redirect a user to another website that could be malicious. in other words its open redirection through xss because it resulted from the input we injected.
      although it requires social engineering to work but it is a URL redirection through xss.
      plz elaborate if im wrong.
      Thanks ,

  • @it070vijaysingh2
    @it070vijaysingh2 6 หลายเดือนก่อน +1

    Xss portswigger lab ka h 😂😂, pag al mt bnaoo logo ko

    • @abdulx01
      @abdulx01 6 หลายเดือนก่อน +1

      😅

    • @adithyakrishna_v
      @adithyakrishna_v  6 หลายเดือนก่อน +3

      Let me explain:
      XSS (Cross-Site Scripting) allows attackers to inject malicious scripts into web pages viewed by other users. In this case, I was able to inject a complete tag along with its attributes, including an unsanitized target attribute, which was not properly filtered. It should have been considered as text.
      This is my payload: bug
      This payload demonstrates a combination attack rather than a direct XSS attack. The primary attack vector here is the misuse of the target attribute, which the application did not properly sanitize.
      This method reveals a potential vulnerability in handling the target attribute. Regular users can be tricked into following the link to an external site, exploiting the credibility of a legitimate site like Udemy to execute the attack. Ideally, a site like Udemy should not have a vulnerability like this.
      The goal was to highlight the issues in Udemy's input sanitization, demonstrate how it could be bypassed, and identify the type of sanitization used by a particular website. However, I acknowledge that a more direct approach would have been more effective in emphasizing the XSS vulnerability.
      Thank you for your feedback, and I am committed to improving my methods.

    • @abdulx01
      @abdulx01 6 หลายเดือนก่อน

      @@adithyakrishna_v This type. Called self xss.. If you increase the impact then this could be valid. Your payload got fired another domain.

    • @adithyakrishna_v
      @adithyakrishna_v  6 หลายเดือนก่อน

      @@abdulx01 Let me explain:
      It is an indirect or Cross-Context XSS and not Self-XSS . Cross-Context XSS involves using a trusted site (Udemy) to inject a payload that redirects and executes on another site. The primary vulnerability here is the lack of proper attribute sanitization by Udemy, allowing the crafting of such a payload.
      In self-XSS attacker tricks the user into executing malicious scripts in their own browser. Typically, this involves convincing the user to paste malicious code into the browser’s console or into a form on a trusted website.

    • @The_ancestor_of_Mars_humans
      @The_ancestor_of_Mars_humans 6 หลายเดือนก่อน

      @@adithyakrishna_v chat gpt to thik se use kar le bhai

  • @Dayanandhansubramani-rj6tc
    @Dayanandhansubramani-rj6tc 5 หลายเดือนก่อน

    are you from kerala :)

  • @faramon9213
    @faramon9213 6 หลายเดือนก่อน +1

    Bro malayalathil video cheyo

    • @adithyakrishna_v
      @adithyakrishna_v  6 หลายเดือนก่อน

      th-cam.com/play/PL2K366VwU2XEjLQf7er_dBYgUDA-gyqSb.html

    • @faramon9213
      @faramon9213 6 หลายเดือนก่อน

      @@adithyakrishna_v bug bounty malayalathil cheyo real world

  • @z-root8955
    @z-root8955 6 หลายเดือนก่อน +3

    Bruuh come on 😂 xss on portswigger

    • @gg-mr4qr
      @gg-mr4qr 5 หลายเดือนก่อน

      Right bro it's not udamy