Тёмный

10 - XSS (DOM) (low/med/high) - Damn Vulnerable Web Application (DVWA) 

CryptoCat
Подписаться 37 тыс.
Просмотров 26 тыс.
50% 1

Опубликовано:

 

30 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 26   
@level1agario
@level1agario 2 года назад
1:30 That moment when the FBI enters your house for attempting to do a XSS 😂 Thanks for your videos man. They are really helping me on my last year of university for the cyberattacks subject. I'm in the last year of the computer engineering degree at university. Greets from Spain.
@_CryptoCat
@_CryptoCat 2 года назад
haha thanks mate! glad they could help 🥰
@kasemtawalbeh5688
@kasemtawalbeh5688 11 дней назад
Man pleas open quality i can't see anything
@_CryptoCat
@_CryptoCat 11 дней назад
Sorry! Hopefully my recent videos are better
@architshrotriya9331
@architshrotriya9331 2 года назад
in medium part, the url passed should be 127.0.0.1/dvwa/vulnerabilities/xss_d/?default=English in video there's no double-inverted commas when passing value to onerror attribute, so please correct it, whoever is stuck there
@_CryptoCat
@_CryptoCat 2 года назад
nice! ty for the correction 🥰
@tamalchowdhury
@tamalchowdhury 2 года назад
Hey! I'm following your walkthroughs and learning how to hack. In your first try when you couldn't get the alert to show up, it was because of double quotes: ". After the first quote, you have to do single quote inside alert(' ') otherwise it will close early. We can also use backticks and es6 fetch for sending the data back to our server without redirecting the user.
@xrt5189
@xrt5189 3 года назад
niiice. walkthrough and explanations. thank you for your work
@luciacarrera3523
@luciacarrera3523 3 года назад
why does works but not??
@_CryptoCat
@_CryptoCat 3 года назад
hey good question which i should really of explained better in the video 😮 i just tested this again now, if you don't break out of the statement then the payload is inside the "value" of an tag and the characters become URL encoded so they dont execute when reflected on the page. when you get chance you can try both ways again and use F12 (devtools) inspector and ctrl + F to find your alert(0) and see the difference between the two payloads.. i wish i would of done this in the video, apologies 😳
@luciacarrera3523
@luciacarrera3523 3 года назад
@@_CryptoCat Thank you for answering!! Your videos are a life saver! I think most of my class is watching this playlist for our final project hahaha
@_CryptoCat
@_CryptoCat 3 года назад
@@luciacarrera3523 haha awesome! glad i could help 😊
@spaceexplorer865
@spaceexplorer865 3 года назад
Awesome and good explanation bro.
@bryansuazo6567
@bryansuazo6567 3 года назад
Great video!! under rated man.
@Cashvib-f4w
@Cashvib-f4w 10 месяцев назад
Why you don't attack the imposible level of xss-DOM?
@arnavpandey1722
@arnavpandey1722 3 года назад
Awesome!
@mahirlabib808
@mahirlabib808 2 года назад
Thanks for all these videos brother.
@_CryptoCat
@_CryptoCat 2 года назад
my pleasure 🥰
@nds6767
@nds6767 Год назад
At 15:02 you had a slight change which indicates it was successful.
@daliabarrancoz9398
@daliabarrancoz9398 Год назад
document.cookie just give me message security=low, not the phpsessid, Why?
@_CryptoCat
@_CryptoCat Год назад
Hmmmm if you check your cookies with F12 does the phpsessid show?
@sebastianmorales5
@sebastianmorales5 Год назад
@_CryptoCat for me too, phpsessid shows at cookies in the browser
@daliabarrancoz9398
@daliabarrancoz9398 Год назад
@@_CryptoCat it solves the problem
@IntroMakerNET
@IntroMakerNET 9 месяцев назад
@@daliabarrancoz9398How did you fix this? I'm experiencing the same issue.
Далее
Почему?
00:22
Просмотров 283 тыс.
how hackers hack any websites in minutes?!
23:17
Просмотров 231 тыс.
Cross-Site Scripting (XSS) Explained
11:27
Просмотров 446 тыс.
I legally defaced this website.
25:48
Просмотров 521 тыс.
XSS Attack Using DVWA
25:32
Просмотров 3,9 тыс.
How To Search For DOM-Based XSS!
9:37
Просмотров 49 тыс.
Почему?
00:22
Просмотров 283 тыс.