Комментарии:
This playlist is not complete man! Some videos is not listed here... Please take a look on it again. Like, #8 is missing. I would love to highly request you that please rearrange a full playlist for Web App Penetration Testing
ОтветитьAwesome!
Ответитьpeace
ОтветитьAlso for dom you can manipulate the site url into anything. .just like what we saw in reflected.
Ответитьreflected, stored, dom -got it. rdy for more
ОтветитьIf your new to web app pen testing , you wont understand anything so hit the basic n come back (based on a true story)
ОтветитьThank you so much for the video sir....
ОтветитьJust use Angular.
ОтветитьWas struggling to understand the difference between DOM and reflected. this was actually clear and helped me understand. keep up the content!
Ответить:( :( ): ):
ОтветитьHello, how can I download your app
Ответитьwhere is DOM Based XSS ! always time pass videos :-(
ОтветитьThanks, however, what does it mean for DOM that the input is "processed by the client"? I dont get how to differentiate it from the other 2 XSS attacks.
ОтветитьSo both the website needs to be vulnerable to accept a stored xss and the user's browser that retrieves it needs to be vulnerable for the script to do certain things?
Ответитьaw
ОтветитьBest video I ever seen... I understand it faster
ОтветитьIt's good bro..
Ответить<script>alert("hi hackan")</script>
Ответитьand testing with zap
Ответитьhi do you have the video this kind of attack XSS but using dvwa or webgoat ?
Ответитьdo u have a whassup group
or a telegram group
I thank hackermorke on IG his the best hacker on IG
ОтветитьI didn't understand the difference between Cross-site Scripting Reflected and DOM-based cross-site scripting. Can someone explain this to me ? For me he does the same thing in each of these examples.
Ответитьhow does do i steal another users cookie?
ОтветитьI love this man ❤️❤️
Ответитьpleaseeeeee......do more, talk less. Still like your videos.
ОтветитьHey, @hackersploit you have not updated the XSS part. Means on high-level security. Such as you said at the end.
Ответитьthank you verry nuch, i should ask you if i found xss in any site how i can exploit it and git the admin page of site ?
ОтветитьAwesome!
ОтветитьThanks
ОтветитьThank you! Great work!
Ответитьhello hackersploit, please do a tutorial on xsser tool.
ОтветитьThis is a very informative series.
Ответитьthanks myan i was able to get idea and i find xss on isp payment gateway.
Ответитьcan you share some more examples for DOM based XSS
ОтветитьI'm confused between DOM-Based XSS and Reflected XSS. I understand they're both affecting the victim on the client side and that reflected uses Javascript and DOM-Based uses AJAX. But is that really it? Could you be more specific?
ОтветитьHow Refected XSS use for Hacking ? I am bit Confused.
ОтветитьWell explained....thanks
Ответитьcan we use this attack to upload shell ?
ОтветитьPlease tell me How can we identify XSS attack from access log file? I mean, how it stores footprints over there in log file?
ОтветитьThank you!
ОтветитьHi there
What is the best way to check if the input form field is Vulnerable to xss. The thing is the form field does not do any popup on render tab so it is hard to verify
Great work as always Alexis! Loving your work!
Ответить