All-Army CyberStakes! Cross-Site Scripting Filter Evasion

All-Army CyberStakes! Cross-Site Scripting Filter Evasion

John Hammond

4 года назад

46,446 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@imaok4721
@imaok4721 - 24.05.2020 00:31

I quite enjoyed that.

Ответить
@nonoperation2356
@nonoperation2356 - 27.06.2020 18:02

love this can you suggest any other XSS ctfs?

Ответить
@onions5113
@onions5113 - 30.06.2020 10:57

can you make a video how to make different types of payloads?

Ответить
@imhassan9119
@imhassan9119 - 24.07.2020 04:08

Can anyone explain how he made a request sending the dictionary and it injected the code?

Ответить
@anujchourange1792
@anujchourange1792 - 08.09.2020 14:37

You are just awesome bro !!!!!!!!!!!!

Ответить
@HerozTech
@HerozTech - 17.09.2020 11:31

Best of its kind
Thanks so much mentor

Ответить
@abhhibirdawade9657
@abhhibirdawade9657 - 21.09.2020 14:45

You are amazing 😀

Ответить
@slonkazoid
@slonkazoid - 26.09.2020 13:57

TIL: he doesn't know javascript syntax

Ответить
@sudha2373
@sudha2373 - 22.10.2020 20:47

Where u learn python for cyber security

Ответить
@nicola1421
@nicola1421 - 30.10.2020 12:27

That was so epic man 🤘🏼🤘🏼

Ответить
@manmoon7396
@manmoon7396 - 05.11.2020 00:48

Man, john looking forward to "python primer for hackers!" great stuff keep it up.

Ответить
@whosdavidce
@whosdavidce - 22.12.2020 22:34

this is amazing man

Ответить
@offmymeds13
@offmymeds13 - 08.01.2021 23:39

What is your primary job? I noticed you have to be in mil to do this challenge. I'm in the Army myself

Ответить
@serafeimzaragas5573
@serafeimzaragas5573 - 08.02.2021 15:33

Great video.I want to block my mobile carrirer xss protection to have free internet.give me an idea please.

Ответить
@shaistasiddic1822
@shaistasiddic1822 - 20.02.2021 19:30

Nice()

Ответить
@akashrakshit8446
@akashrakshit8446 - 12.03.2021 20:51

Dude quality stuff 👌👌👌

Ответить
@mostafanasser3065
@mostafanasser3065 - 16.03.2021 15:15

great video and I love your unique way in solving the challenge with python but couldn't you have don all this with burp suite ?

Ответить
@kuldeepsingh2983
@kuldeepsingh2983 - 22.03.2021 11:01

This is awesome.

Ответить
@joshuakorbut239
@joshuakorbut239 - 01.04.2021 13:20

I know it's old but I've been binging your videos and bro, just amazing. The use of python to wreck like everything makes me sooo sooo happy.. I've literally understood coding 1000% better just watching your content.

Ответить
@DOMPurify.isSupported
@DOMPurify.isSupported - 18.04.2021 21:33

Man 😍

Ответить
@d3vashishs0ni
@d3vashishs0ni - 28.04.2021 21:50

I think I have to leave bash and start python🐍🐍

Ответить
@sorrefly
@sorrefly - 13.05.2021 23:42

Your videos are priceless. You don't just show the attack but also the process and the evolving of ideas while designing the attack. 
Premium content, thank you really.

Ответить
@stackoverflow2155
@stackoverflow2155 - 28.06.2021 13:57

really enjoyed this!!!

Ответить
@nickcarter7063
@nickcarter7063 - 09.07.2021 10:46

I know I'm late on this one, but I'm just binging on your old stuff at 2:30am. The backticks allow you to use ES6 syntax to create a template literal, previously referred to as a template string I believe.

So instead of:
var name = "Nick"
var output = "My name is" + name
alert(output) // outputs "My name is Nick"

We can use name and change output to:
var output = `My name is ${name}`
Our alert will produce the same result without needing to concatenate the string and variable and eliminates the need for using quotes for the string. This is a very simple example, but when you need to concatenate a lot of stuff it saves a bunch of time. It also apparently helps to make this attack work which is super cool.

Ответить
@sudosuraj
@sudosuraj - 26.07.2021 20:35

That Was awesome <३

Ответить
@MatteoGariglio
@MatteoGariglio - 01.08.2021 00:37

Couldn't you just do "document.cookie" with the browser dev tools? Why create a script to send this info to your server?
To whom actually belong that session?

Ответить
@rehmankhan6081
@rehmankhan6081 - 09.08.2021 19:58

I see myself there doing PT with my client application finding all possible xyz. Exactly, I got that PT feel bro..🍻🔥

Ответить
@Andrei-ds8qv
@Andrei-ds8qv - 17.08.2021 01:53

Wowww, that was awesome!!!!! <3 Thanks a lot!

Ответить
@LuminousWatcher
@LuminousWatcher - 17.09.2021 14:06

`b to a` and `a to b`

Ответить
@Colaholiker
@Colaholiker - 20.09.2021 00:26

So basically if you don't have a server on the internet, you're SOL?

Ответить
@Synceditxboxoffice
@Synceditxboxoffice - 23.09.2021 14:03

incredible sir i really loved it and please keep coming these videos

Ответить
@viv_2489
@viv_2489 - 23.10.2021 13:07

This was so informative and beautiful in a short video 👌

Ответить
@dephy2003
@dephy2003 - 08.11.2021 19:19

Binging on your content. Love seeing your thought process as you run into roadblocks.

Ответить
@SB-rf2ye
@SB-rf2ye - 11.11.2021 06:45

I love how John teaches the subject. He most likely already knows the answer, but knows that showing the methodology is more important. Trying different things, failing sometimes, then finally winning, are what makes a good hacker.

Ответить
@booruledie3052
@booruledie3052 - 12.12.2021 22:48

One of best ctf question i’ve ever seen so far. Also great solution! Congrats John

Ответить
@Beast-cc7xd
@Beast-cc7xd - 15.12.2021 02:51

Amazing video man !! new sub and like , more XSS videos !!!!
Do you give a course on udemy or something like that on web hacking? If not, it would be great, we would all buy it

Ответить
@nusn43
@nusn43 - 06.02.2022 17:11

Bro how are u today? I am anonymous haha

Ответить
@nusn43
@nusn43 - 06.02.2022 17:22

Bro where script code phyton this video

Ответить
@leblanc666666
@leblanc666666 - 29.04.2022 16:19

I would have never thought about that base64 and atob(), nice little trick to bypass filters to keep in my pocket! Great fun lab!

Ответить
@abdulbasit-jj8qf
@abdulbasit-jj8qf - 23.08.2022 04:52

I love how you approach the problem... it is excellent..

also how do you get the output of python in new window.. by default it opens in a panel...

Ответить
@Shintowel
@Shintowel - 16.09.2022 00:26

Teacher

Ответить
@joewharton7735
@joewharton7735 - 06.10.2022 18:09

What I would do is make the string the fragment and pull it from there

Ответить
@3xp0netken
@3xp0netken - 05.01.2023 19:53

el verdadero proceso de un hacker , investigar , persistir , evadir los obstaculos .... te ganaste un subscriptor bro , buen video

Ответить
@Cooliofamily
@Cooliofamily - 27.03.2023 14:43

That ad at 18 minutes was 🤌🏼

Ответить
@adamstrickland97
@adamstrickland97 - 08.04.2023 21:59

Hey John, wondering if you can expand on your CORS comments from the end of the video. You mention that when a script from the target site tries to reach out to the attacker's site, you can see a CORS error. However, isn't that error entirely in the attacker's control? Couldn't you have returned the right CORS headers from your server to allow the request through?

Ответить
@optimistemo01
@optimistemo01 - 22.09.2023 11:19

I rather had idea lile h1 on dom content full load do function :3

Ответить
@Synceditxboxoffice
@Synceditxboxoffice - 30.09.2023 18:59

sir start a series on python like solving CTF on python its gonna be really fun ❤

Ответить
@ahmedezealdean6189
@ahmedezealdean6189 - 03.07.2024 05:05

seeing you hacking made me love hacking very much.

Ответить