Тёмный

Exploiting Server-side Parameter Pollution in a Query String 

Intigriti
Подписаться 28 тыс.
Просмотров 6 тыс.
50% 1

Опубликовано:

 

22 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 19   
@r3plican
@r3plican 7 месяцев назад
can u do more analyzing the source code of the vulnerability and try to look it out and fix it
@intigriti
@intigriti 7 месяцев назад
Heyyy, quite often with these labs we don't get access to the source code but at the end of a topic we review the mitigations / defenses. Request noted though! Maybe I can put together some simple code snippets for some examples.
@user-uh8ko8ik5w
@user-uh8ko8ik5w 2 месяца назад
Thank you for showing everything clearly!
@intigriti
@intigriti 2 месяца назад
🥰
@IbnRafael
@IbnRafael 4 месяца назад
@intigriti I don't get why reset_token was added to the field parameter? field=reset_token. Aren't they both parameters? What is the logic behind this?
@intigriti
@intigriti 4 месяца назад
The "field" is indeed the parameter, but since we saw "email" was a valid value for the field parameter, it makes sense that other form fields on the page would also be accepted ("reset_token" in this case).
@k.k6349
@k.k6349 3 месяца назад
burp suite intruder tab add from list is available in pro version only
@intigriti
@intigriti 3 месяца назад
The pre-set lists are pro-only but you should be able to import your own wordlist, with one word on each line
@camelotenglishtuition6394
@camelotenglishtuition6394 7 месяцев назад
Great video buddy
@intigriti
@intigriti 7 месяцев назад
Thanks mate! 👊
@Yuhisern
@Yuhisern 4 месяца назад
Yo awesome Im doing this now
@intigriti
@intigriti 4 месяца назад
Nice! 👊
@doya8130
@doya8130 7 месяцев назад
it's great video
@intigriti
@intigriti 7 месяцев назад
Thanks! 💜
@mnageh-bo1mm
@mnageh-bo1mm 7 месяцев назад
well the lab solution seems to be way too unrealistic...what was even that?
@intigriti
@intigriti 7 месяцев назад
Which part? Is it not realistic that a company would have an internal API, not accessible through the internet? Or that they might pass some user input to that API? 🤔
@mnageh-bo1mm
@mnageh-bo1mm 7 месяцев назад
@@intigriti yes why would that even be an option? It's no longer about pollution.... It's simply undocumented functionality of the api
@intigriti
@intigriti 7 месяцев назад
Undocumented functionality is the source of many vulnerabilities! You could have an undocumented function with an XSS or SQLi vulnerability, why not one with a parameter pollution vuln? 🙂
@mnageh-bo1mm
@mnageh-bo1mm 7 месяцев назад
@@intigriti lmao u right thx 😔😔
Далее