Тёмный
BePractical
BePractical
BePractical
Подписаться
Business inquiries and collaborations: business@bepractical.tech

BePractical is your ultimate go-to for all things cybersecurity, bug bounty, ethical hacking, penetration testing and more.
Subscribe to our channel and become a cybersecurity pro!
Комментарии
@mohan9097
@mohan9097 День назад
Lets assume we have 2 accounts, attacker account in firefox and victim account in chrome. Now from the attacker account, we remove the upi and capture that request in burp and generated an csrf POC. Now if we open csrfpoc.html file in chrome browser, will the victim's upi gets removed ? Thats how the impact goes high because removing our own upi will not be an high impact right ? Please explain me on this. I am asking this because, There is a unique cookie going to the server to authorize..please explain
@michaelpierre9738
@michaelpierre9738 2 дня назад
Excellent, thanks
@paolomoser4561
@paolomoser4561 5 дней назад
i follow exactly your steps but when i activate the tunneling, i cant connect to internet. Can't figure out what the problem should be. Any ideas?
@memorysmelody4589
@memorysmelody4589 5 дней назад
is there any reference report for the same ?
@RajKumar-kw7fy
@RajKumar-kw7fy 5 дней назад
Hi sir I was found a "CAPTCHA_TOKEN" in js file it is image of form vulnerability are not i can report are tell me sir
@samhithreddy1353
@samhithreddy1353 5 дней назад
You are insane Mann I love the way you teach 😊😊😊
@memorysmelody4589
@memorysmelody4589 5 дней назад
Whats the ip displayed when we ping the website ?
@codevibe007
@codevibe007 6 дней назад
where i can contact you sir i asking somthing to you
@BePracticalTech
@BePracticalTech 6 дней назад
business@bepractical.tech
@HamdanBin-li5xn
@HamdanBin-li5xn 8 дней назад
please do a video about how we check false positive or not
@Free.Education786
@Free.Education786 8 дней назад
Excellent video 📹 brother. How to find vulnerable parameters and endpoints. I found many endpoints and parameters from paramspider collector parameth arjun x8, etc, but all of them failed in sqlmap or Ghauri because they are not injectable. How to solve this crucial problem. Thanks for your help and support. 🎉❤
@pak8380
@pak8380 9 дней назад
beautiful bro!!!!
@entertainment_in_blood
@entertainment_in_blood 9 дней назад
so if we find CSRFTOKEN used in the request, JWT token, JSON data.. we can determine that it s not vulnrable to CSRF And we can moveon.. but can you explain more parameter through which we can determine that its not vuln to CSRF..
@alarafat.mujahid
@alarafat.mujahid 9 дней назад
Thanks bro
@nikilmuchur4031
@nikilmuchur4031 10 дней назад
I need help please tell me how to do this, please explain in ur simple words.. by tonight i have to complete this Vulnerability Assessment and Remediation Scenario: Create your own simulated network environment containing several security vulnerabilities. Your task is to identify, document, and propose remediation for these vulnerabilities. Tasks: o Perform a vulnerability scan using tools . o Identify and document all vulnerabilities found. o For each vulnerability, provide: ▪ A description of the vulnerability. ▪ The potential impact on the system. ▪ Steps for remediation.
@nikilmuchur4031
@nikilmuchur4031 10 дней назад
I unable to install kali Linux in my laptop...so big issue...
@BePracticalTech
@BePracticalTech 9 дней назад
Try using live persistent kali linux
@vijay_sawant
@vijay_sawant 10 дней назад
Thank you so much for this video, i was having one doubt that. If they are using XSRF token in cookies: header then, that is sufficient for csrf or not?
@BePracticalTech
@BePracticalTech 9 дней назад
For most of the time, Yes!
@eyezikandexploits
@eyezikandexploits 10 дней назад
Question, how can you tell in the request that itd allow for a csrf i noticed none of the responses showed a samesite param or anything like that, even when adding the email. Whats the difference in the responses that allow for csrf besides it being GET and POST, is that the only difference?
@BePracticalTech
@BePracticalTech 10 дней назад
Didn't get you. Please explain again
@eyezikandexploits
@eyezikandexploits 10 дней назад
Great video man
@eyezikandexploits
@eyezikandexploits 10 дней назад
Great video, its explained very well
@gowtham8774
@gowtham8774 11 дней назад
Can you please make a video for http request smuggling?
@numberformat
@numberformat 11 дней назад
Thanks for showing us how easy it is to do this. Does anyone know about code obfuscation tools that would prevent something like?
@RAS02023
@RAS02023 12 дней назад
Xxs script executed status code 200 but no output . Is it blind xss or any other
@akroidofficial
@akroidofficial 12 дней назад
quality content. i always prefer manual rather than automated
@GHOSTOPFTWG
@GHOSTOPFTWG 12 дней назад
What is the impact sir?
@Fractal_reComm
@Fractal_reComm 12 дней назад
Dude, I'm a big fan and I admire and inspire me, your work, I would like you to help me find simpler sites like this. Generally, my targets are very well protected, but it's possible to overcome them. them and this takes much more time than in simpler systems, I have little experience but I have already found some cool vulnerabilities, I still can't afford better education in cybersecurity, I would be very happy and I'm sure that the entire community that is also starting out would be very happy and would help a lot, thank you for everything, I hope you read it
@user-yo5lx4gm1o
@user-yo5lx4gm1o 12 дней назад
Which tool have you used for checking requets "Intercept"
@BePracticalTech
@BePracticalTech 12 дней назад
Burpsuite
@AKGaming0
@AKGaming0 13 дней назад
Do you have discord server?
@l00pzwastaken
@l00pzwastaken 13 дней назад
In this Target 🎯 you are able to remove everyones data ? If yes then that is token based for session then how you are able to remove it?
@BePracticalTech
@BePracticalTech 13 дней назад
As shown in the video, this is a csrf vulnerability which means that the victim needs to click on the "submit" button and that will remove the upi id from this web app.
@AKGaming0
@AKGaming0 13 дней назад
You need a cookie for removing the UPI I'd, this not big issue in my opinion
@BePracticalTech
@BePracticalTech 13 дней назад
This is a CSRF vulnerability. As shown in the video, I was able to remove the UPI id.
@AKGaming0
@AKGaming0 13 дней назад
@@BePracticalTech this content is very high-quality. There is no doubt about it.
@ashikrahman1036
@ashikrahman1036 13 дней назад
happy eid bro❤ and thanks for this tutorial...
@BePracticalTech
@BePracticalTech 13 дней назад
Thank you so much for the wishes!
@Ankitverma-yc7zf
@Ankitverma-yc7zf 13 дней назад
buddy make a video for json content-type in CSRF showing how to bypass this.
@_tenten___
@_tenten___ 13 дней назад
Really Helpful! Thank you!
@im_szaby9190
@im_szaby9190 13 дней назад
how can i bypass html entity encoding
@uttarkhandcooltech1237
@uttarkhandcooltech1237 13 дней назад
Love you bhai happ Eid bhai jaan ❤❤❤ nice 👍🏼
@BePracticalTech
@BePracticalTech 13 дней назад
You too.. Thanks for the wishes!
@Prince-zu5uj
@Prince-zu5uj 13 дней назад
U able to remove anyone account upi?
@BePracticalTech
@BePracticalTech 13 дней назад
Yess
@newuser2474
@newuser2474 13 дней назад
Are jwt token vulnerable to csrf
@BePracticalTech
@BePracticalTech 13 дней назад
Not at all. Normally, the ajax request fetch the token and then use it for the rest of the requests. Therefore they are usually safe from CSRF
@newuser2474
@newuser2474 13 дней назад
@@BePracticalTech thanks!
@ashfaquejahan8879
@ashfaquejahan8879 13 дней назад
❤❤❤❤
@BePracticalTech
@BePracticalTech 13 дней назад
Telegram channel link: telegram.me/bepracticaltech
@adhitamaputra-73
@adhitamaputra-73 8 дней назад
.b.i.n.a. .s.a.r.a.n.a. .i.n.f.o.r.m.a.t.i.k.a.
@vijay_sawant
@vijay_sawant 13 дней назад
Thank you
@BePracticalTech
@BePracticalTech 13 дней назад
You're welcome!
@SecureByBhavesh
@SecureByBhavesh 13 дней назад
First
@krisharora8774
@krisharora8774 14 дней назад
got it ! Great explanation
@nachiketsinhrathod
@nachiketsinhrathod 14 дней назад
where is the lab or source code?
@BrendaEvelynVillegasGarcia
@BrendaEvelynVillegasGarcia 15 дней назад
Thanks!!!
@whitehat005
@whitehat005 16 дней назад
if <> this symbol block what can do
@BePracticalTech
@BePracticalTech 16 дней назад
Then we need to check where our given value is reflecting. Based on that, there could be other ways to execute xss
@kirtimanmohanty7575
@kirtimanmohanty7575 16 дней назад
Please upload a video on contentfull cms pen test
@yasaya9139
@yasaya9139 18 дней назад
Please make a video xxe basic and next level