Тёмный

Covering The Under Rated Vulnerabilities: CORS Misconfiguration #1 

BePractical
Подписаться 21 тыс.
Просмотров 2,7 тыс.
50% 1

In this video, I’ll walk you through CORS misconfiguration and why it matters. We’ll start with a simple introduction to what CORS (Cross-Origin Resource Sharing) is and how it works. Then, I'll show you a real-life demo of how attackers can use CORS misconfigurations to access data they shouldn’t be able to. Finally, I’ll share easy tips on how to fix these issues and keep your apps safe. This video is perfect for anyone who wants to learn about CORS vulnerabilities and how to protect against them. Let’s make your web apps more secure together!
PoC Link: drive.google.c...
Website: bepractical.tech
Telegram: telegram.me/be...
Previous Video: • Bug Bounty: Content Di...
The Art Of Web Reconnaissance:
www.udemy.com/...
Hacking Windows with Python from Scratch: www.udemy.com/...
The Ultimate Guide to Hunt Account Takeover:
www.udemy.com/...

Опубликовано:

 

17 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 19   
@MianHizb
@MianHizb 9 дней назад
4:10 there is no such thing as request 2 3, its not websockets its http stateless, preflight requets dont occur here, if you can correct that, it will be great, it only happens in non common http methods like delete still that is something else. Cheers
@AttackerShihab
@AttackerShihab 10 дней назад
Hey make portswigger all labs complete video .
@bugstester9919
@bugstester9919 5 дней назад
which user's cookie is sent by poc.html code, even though there is session_id:admin was the cookie session of the user, which user is deleted by this code of poc
@jawathossainrian
@jawathossainrian 9 дней назад
Really an Great Educational Material Openly Available
@jawathossainrian
@jawathossainrian 9 дней назад
Bro can u use RU-vid transcript to add subtitles to your video? Automated subtitle are really pain
@akhilreddy9753
@akhilreddy9753 10 дней назад
What if it is in the forget password endpoint . I can send the request through cors .is it valid or informative
@BePracticalTech
@BePracticalTech 10 дней назад
Informative. You need to find an endpoint that is handling something sensitive. For example: An endpoint that can fetch users, edit profile, delete user etc
@om3726
@om3726 10 дней назад
Hi Bro/sis please make videos on High Severity bugs P1,P2,P3 Starting from easy to find & understand to complex
@ZaraRashidKhan
@ZaraRashidKhan 10 дней назад
Thank you for sharing
@BePracticalTech
@BePracticalTech 10 дней назад
Glad you liked it!
@nedurunaveen0417
@nedurunaveen0417 10 дней назад
Thanks broo
@pawankandu914
@pawankandu914 10 дней назад
sir can you please can you share your nu.of experience in bug bounty
@BePracticalTech
@BePracticalTech 10 дней назад
@@pawankandu914 I started bug bounty in 2020
@Mr.3cho
@Mr.3cho 10 дней назад
I want to be your student to learn bug bounty guruji😅
@BePracticalTech
@BePracticalTech 10 дней назад
I am glad to hear this! We will be planning something soon for this one!
@pratyushkashyyy
@pratyushkashyyy 10 дней назад
Heyyy
@BePracticalTech
@BePracticalTech 10 дней назад
Heyy
@SecureByBhavesh
@SecureByBhavesh 10 дней назад
First !!!!!
@BePracticalTech
@BePracticalTech 10 дней назад
Thanks for the support Bhavesh!
Далее
I used AI to hack this website...
23:23
Просмотров 32 тыс.
The Anti-Virus Tier List
9:38
Просмотров 1,1 млн