Тёмный

CORS - Lab #1 CORS vulnerability with basic origin reflection | Long Video 

Rana Khalil
Подписаться 83 тыс.
Просмотров 19 тыс.
50% 1

Опубликовано:

 

4 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 24   
@RanaKhalil101
@RanaKhalil101 2 года назад
Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE ✨✨
@dragoschiperi8090
@dragoschiperi8090 2 года назад
Great work! Thanks for explaining how to solve the lab without the "Go to exploit server" functionality.
@sarasevdari7159
@sarasevdari7159 2 года назад
Girl your explanation is fantastic. Much love, keep going
@wizix9877
@wizix9877 2 года назад
I love your videos. keep up the good work. Thank you.
@medogamer8524
@medogamer8524 Год назад
the GOAT of explainig
@Guilhermecpv762
@Guilhermecpv762 2 года назад
Thanks from Brasil, you are amazing!!
@سامرسعيد-ي1ب
@سامرسعيد-ي1ب Месяц назад
Thanks from iraq❤
@suryatejakalidindi485
@suryatejakalidindi485 2 месяца назад
thank you madam , please make a video on information disclosure
@TheBroadwood
@TheBroadwood 2 года назад
Since in the fetch method, there is not the full uri given, how does the fetch method know that it has to GET-Request the exploit server? 🤯
@MoohHunter
@MoohHunter 7 месяцев назад
you are amazing ^_
@acronproject
@acronproject Год назад
Thanks
@xoro163
@xoro163 2 года назад
what if the request is using only post method? how to create the payload??
@pranjalruhela1103
@pranjalruhela1103 Год назад
There was never ...even once anything mentioned related to the admin account in our script...still how come the logs display the admin info??
@yashchaudhary6146
@yashchaudhary6146 10 месяцев назад
Since its just a lab so burpsuite labs have made it in such a way that simulates a real hacking behaviour.
@tiago7w_583
@tiago7w_583 2 года назад
top
@burptester8761
@burptester8761 Год назад
It's very difficult for to send email to an admin when you don't have his email. I tried to do a pentesting on website, I found the admin username but not his email. Is there any other solution @Rana ?
@wadadparker957
@wadadparker957 5 месяцев назад
Buddy this is just for information, don't actually send phishing links to admins 💀
@Fahodinho
@Fahodinho 2 года назад
what's the significance of apikeys why is it a secret information? what can you do with it? and wouldn't the session key be more critical because you can steal it and impersonate a user?
@domssilva1752
@domssilva1752 2 года назад
api keys are usually used by developers to access paid services. leaking the api key could lead not only to private users info leak but also business financial loss
@itsm3dud39
@itsm3dud39 2 года назад
@@domssilva1752 where can i learn api vulnerabilities and attack?
@Tokga-m5r
@Tokga-m5r Год назад
@Rana Khalil is it necessary that i must write a script to go through i dont know how to code im trying to get started in bug bounty
@wolfrevokcats7890
@wolfrevokcats7890 8 месяцев назад
bug bounty is very competitive. You should learn how to code
@Tokga-m5r
@Tokga-m5r 8 месяцев назад
@@wolfrevokcats7890 what languages, I’m learning python steadily , recently I googled what programming languages are used by osi model do you think finding that information is any good
@TANKBM
@TANKBM 2 года назад
لايك وانا مغمض
Далее
Cross-Origin Resource Sharing (CORS) | Complete Guide
52:17
I Built a SECRET Lamborghini Dealership!
33:02
Просмотров 11 млн
PERFECT PITCH FILTER.. (CR7 EDITION) 🙈😅
00:21
Просмотров 3,5 млн
小路飞嫁祸姐姐搞破坏 #路飞#海贼王
00:45
Cross-Site Request Forgery (CSRF) | Complete Guide
48:11