Тёмный

Open Redirect Vulnerability Explained 

PwnFunction
Подписаться 204 тыс.
Просмотров 169 тыс.
50% 1

Опубликовано:

 

23 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 141   
@_JohnHammond
@_JohnHammond 5 лет назад
These are awesome, dude! Happy you see you starting up a show!
@PwnFunction
@PwnFunction 5 лет назад
Thanks homie :)
@PlanetComputer
@PlanetComputer 3 года назад
fghj
@vipuldev893
@vipuldev893 3 года назад
dude Charlie Puth watched your videos
@kyngcytro
@kyngcytro 3 года назад
Awesome @John Hammond is here
@Safvanviber-xm3pn
@Safvanviber-xm3pn 11 месяцев назад
Sir 🔥✋
@epic_baller123
@epic_baller123 3 года назад
I hope for the day where I come back to this video and flawlessly understand everything you said
@pablom2274
@pablom2274 3 года назад
slowly undersanding
@Beste.TwitchClips
@Beste.TwitchClips 2 года назад
How's it going
@i_am_dumb1070
@i_am_dumb1070 Год назад
any updates?
@loralori57
@loralori57 2 года назад
This video gives me a ton of information in a clear logical way in 8 min ! I didnt understand or remeber it all but I can do research on the topic easily ! Thank you ! This is helpful
@abdilahrf
@abdilahrf 5 лет назад
the next liveoverflow ? focus on web exploitation topic should be good i think, keep it up buddy!
@PwnFunction
@PwnFunction 5 лет назад
I wish, but he's too good. I'm not even close to his knowledge/experience level and he's a person I look up to. For now, yes, I'll be focusing on Web, others later.
@PlanetComputer
@PlanetComputer 3 года назад
fghj
@nahmedfaisal
@nahmedfaisal 5 лет назад
What a great detailed video.. really loved it! next time i will just forward this video link, whenever anyone asks me about open redirects. You got me subbed and i will wait for more contents from you :)
@candidojosepargacruz8331
@candidojosepargacruz8331 5 лет назад
This is explained so simple. And i feel like i still saw a video on Chinese.
@PlanetComputer
@PlanetComputer 3 года назад
fghj
@kan8602
@kan8602 3 года назад
underrated comment
@nikkiofthevalley
@nikkiofthevalley 3 года назад
Well, the auto subtitles do say Korean
@topicsoninternet
@topicsoninternet 4 года назад
Awesome man! After a long time, I found an awesome video. Please continue to upload such content.
@THREAT_CON
@THREAT_CON 5 лет назад
Amazing video dude !! Keep it up. And thanks for the awesome challenge :)
@PwnFunction
@PwnFunction 5 лет назад
The honour is mine.
@_shariq
@_shariq 4 года назад
I always wait for that cool ending ♥
@Warpgatez
@Warpgatez 2 года назад
Just found you and I love all these videos. You got some pretty nice digital handwriting and drawing. That flask logo. 👍
@mrkii2056
@mrkii2056 5 лет назад
Can I call your Mom, Mom? cause You sounded like, you are my big brother, n you explained everything to me so sweetly
@arunraman6630
@arunraman6630 3 года назад
wtf
@hecticbeatzz5628
@hecticbeatzz5628 2 года назад
@@arunraman6630 right like what?
@thefrozenindie2056
@thefrozenindie2056 5 лет назад
Subbed Bro keep up the great work and very good quality
@vishaldhanani7241
@vishaldhanani7241 4 года назад
Very clear and good amazing video.I want to learn more such things from you.
@sodiboo
@sodiboo 3 года назад
With your download chrome example, don’t most browsers tell you where the file is downloaded from? Firefox would say “ChromeSetup” for what you downloaded and in a smaller line below it “Downloaded from attacker’s website”, could this possibly be faked in a dangerous way (something like how mega does downloads? completely on the page and only sends your browser the finished file, which i guess is intended for stuff you make in-browser, the browser should handle remote downloads, right?) or does the attack only work on browsers that don’t tell you which server it downloaded the file from?
@ZoranRavic
@ZoranRavic 2 года назад
Even if it is displayed I don't see why you couldn't just use a custom domain name that includes the name of the website you're exploiting.
@carlos.rberto
@carlos.rberto 4 года назад
Very good explanation! Thank you.
@rahulvaswani4966
@rahulvaswani4966 5 лет назад
Sir please more videos on different vulnerabilitys Great video
@dougthefiddler
@dougthefiddler 3 года назад
Very clear explanation with simple graphics. Thanks!
@surya-ur5vv
@surya-ur5vv 4 года назад
One of the best video i seen Open Redirection . Thanks for doing this kinds of videos it will be very usefull for beginers
@0xyg3nSecurity
@0xyg3nSecurity 3 года назад
YOOOO Social Engineering is an essential skill because we all know when 'something' does not brake from the outside it does from the inside and of course the human factor will always be vulnerable.
@theprogrammer9308
@theprogrammer9308 3 года назад
I love the music at beginning
@kabeerjaffri4015
@kabeerjaffri4015 3 года назад
I like how chill he is
@bina7513
@bina7513 3 года назад
PwnFunction: What could possibly go wrong? Me: Everything.
@alextotun
@alextotun 2 года назад
Very informative, and deep for understanding video! I have blow in my thinking about this..) Thanks! Good luck!
@gustavstreicher4867
@gustavstreicher4867 2 дня назад
So, I guess it's important to resolve the URL before checking against it.
@m5rian
@m5rian 2 года назад
I love the drawings lmaoo, good video :0
@hopeme5941
@hopeme5941 5 лет назад
Your awesome...and your video to good..bro
@yagi_4048
@yagi_4048 2 года назад
Wow, this channel is underrated !
@Siik94Skillz
@Siik94Skillz 5 лет назад
Please your videos going, they are amazing
@Stormflower
@Stormflower 2 года назад
I was looking for an Olivia Rodrigo audio file, and I found a website that redirected me to some website where the screen said something about my iPad having 19 viruses....
@Iliasbhal
@Iliasbhal 3 года назад
How can someone use an open redirect to take over an account? - password tokens are not listed anywhere. how can the hacker find the token? - even if the token is found, there is a HIGH chance it is expired. - even if the token is found, the token is deleted right after the password reset. Also if the hacker has the token, why not directly resetting the password himself?
@Iliasbhal
@Iliasbhal 3 года назад
Also, I've just discovered this channel, and it's a gem!
@UsamaAli-kr2cw
@UsamaAli-kr2cw 5 лет назад
Amzing bro keep going u got my sub😍😍
@selvamanir8671
@selvamanir8671 2 года назад
Your contents are valuable for self-learners
@0x2shadow19
@0x2shadow19 4 года назад
Amazing channel. Don't stop making videos like this
@luciacanonsantos5171
@luciacanonsantos5171 3 года назад
Love your videos! Thanks!!
@mohammedal-shaboti7939
@mohammedal-shaboti7939 5 лет назад
Very good explanation, you are awesome. Thaaaaanks
@michael-gary-scott
@michael-gary-scott 5 лет назад
Oh boy. I'm totally guilty of this one.
@msodev
@msodev 5 лет назад
Cooooooooool channel. but plz place those browser window green, yellow and red buttons on the left :)
@PwnFunction
@PwnFunction 5 лет назад
see 2:20, I'm just following what I have XD
@msodev
@msodev 5 лет назад
@@PwnFunction damn you're right! right... got it??? ahhahahahaha
@msodev
@msodev 5 лет назад
@@PwnFunction i'll pay more attention next time XD
@santoslily7430
@santoslily7430 5 лет назад
Great vedio! But where can I find the english caption?
@dylanriley2770
@dylanriley2770 3 года назад
fantastic videos wow
@alexgarcia9852
@alexgarcia9852 3 года назад
The best quality programing content ever Ever
@pets4363
@pets4363 9 месяцев назад
Can you change the auto-generated subtitles for this video from Korean to English?
@CheckersX
@CheckersX 2 года назад
Awesome videos.
@magnoliacomputerscience7334
@magnoliacomputerscience7334 5 лет назад
Great content here is your sub
@abdellahamud7328
@abdellahamud7328 4 года назад
Just got my equipments to start hunting thanks alot
@vrindavihari7798
@vrindavihari7798 4 года назад
Well Explained, Tq. And BGM , loved it.
@tanmaynayak6169
@tanmaynayak6169 5 лет назад
Awesome..
@freddiemercury6808
@freddiemercury6808 5 лет назад
Good video! the flickering when some (wrong) drawing is removed is really annoying though.
@theprogrammer9308
@theprogrammer9308 3 года назад
Why this channel is so amazing 😌
@joachim4660
@joachim4660 3 года назад
Awesome video! Also, it's better to send tokens via POST method rather than GET. That could solve the issue, but still very well demonstrated. 👍
@tycooperaow
@tycooperaow 2 года назад
Why do you claim so?
@joachim4660
@joachim4660 2 года назад
In the given example, the token leak could have been easily prevented by sending the token in the body or header, not as a part of the URL. But yeah, I was wrong, method has nothing to do with it. It's about having the token in the URL.
@realadam_official
@realadam_official 2 года назад
A really good one! Thank you!
@esmailahmed1457
@esmailahmed1457 5 лет назад
keeeeeep going maaaaan .. u are perfect
@supersaiyan0x016
@supersaiyan0x016 5 лет назад
Great vedio... explained everything so simply 😍 Keep on going... you earned my respect 😀
@xnl-h4ck3r
@xnl-h4ck3r 3 года назад
I was just watching through your video again, but needed subtitles... "Korean (auto generated)"?! That confused me for a second! :)
@PwnFunction
@PwnFunction 3 года назад
RU-vid works in mysterious ways.
@subzey
@subzey 2 года назад
1:00 Luckily PHP removes all the newlines in the header() argument or else it could be much more interesting :D
@b.tulsirao7724
@b.tulsirao7724 5 лет назад
Love your vids👍
@aneeshnadh5377
@aneeshnadh5377 4 года назад
This is really informative
@ignitor9941
@ignitor9941 5 лет назад
Awesome
@normalitee0os
@normalitee0os Год назад
MAN!!! Your explanation just drilled the concept hole in my brain! I finally understand How is this a vulnerability and the Thomas Example was cherry on cake! It gave a good understanding~
@the_coding_traveller
@the_coding_traveller 3 года назад
i like the way how you said INTERNET EXPLORER whahahaha
@zeqizhang5860
@zeqizhang5860 5 лет назад
nice work!!!
@techworld3043
@techworld3043 2 года назад
what do you use to create these videos ?
@thatonefoxxy
@thatonefoxxy 2 года назад
If I make a open redirect and if it redirects out of the site I show a Warning that you are leaving the site. (I coded so everytime ANY redirect is ran it shows the warning first, then redirects to the target after accepting It shows the URL it is redirecting to and with a Fat Warning text
@thatonefoxxy
@thatonefoxxy 2 года назад
( this is for user generated content, for internal redirects I use backend anyways without NEXT or so parameter )
@NStripleseven
@NStripleseven 2 года назад
That’s one way to fix it, yeah. Might be a little annoying for the user, but it does work.
@TNTpeoplenetwork
@TNTpeoplenetwork 5 лет назад
I didn't find video like this. Keep it up
@harsh-thebanker
@harsh-thebanker Год назад
Well explained! ❤️
@Astrx-kc6lr
@Astrx-kc6lr 4 года назад
I discover ur channel now, cool man!
@PyaeSone-gd4ui
@PyaeSone-gd4ui 4 года назад
Absolutely brilliant
@karimdhrif6679
@karimdhrif6679 5 лет назад
Thank you for making great content!
@TheIndiaView
@TheIndiaView 3 года назад
Just found like 10 open redirects on a site and it's other domains. will try to escalate those 😉
@tobiasmayer4492
@tobiasmayer4492 5 лет назад
Ok, this was awesome! Nice Tut
@RAZREXE
@RAZREXE 3 года назад
And thus, a legend was born
@noobsecurity5401
@noobsecurity5401 5 лет назад
nice explanation, got subs from us :)
@slaxblake
@slaxblake 5 лет назад
Hey! if the websites instead of redirecting to another domain, loads content from the domain you select, does count as a vulnerability? how can i exploit it?
@mayurparmar5509
@mayurparmar5509 4 года назад
awesome content bro
@yoeriyoeri4264
@yoeriyoeri4264 5 лет назад
You've got my sub man! Keep up the good work!
@ankitpatel-tr1wc
@ankitpatel-tr1wc 5 лет назад
Awesome content
@harshant1
@harshant1 5 лет назад
quality content ....... awesome
@mrmedia7866
@mrmedia7866 3 года назад
please answer to me, what is the name of this app?
@psm876
@psm876 4 года назад
You are awesome...
@yoeriyoeri4264
@yoeriyoeri4264 5 лет назад
What program did you use for the drawings?
@PwnFunction
@PwnFunction 4 года назад
Adobe Animate.
@boo9007
@boo9007 3 года назад
@@PwnFunction ❤️
@caohocnguyen7847
@caohocnguyen7847 2 года назад
I try to simulate the code in the end of the video and trigger XSS, but i can not trigger XSS. Could anyone help me ?
@_shariq
@_shariq 3 года назад
Can you please tell me the name of your terminal fonts?
@zunigasecurity
@zunigasecurity 3 года назад
So beautiful
@oxovi
@oxovi 5 лет назад
Ur rocking dude Love u 😘
@vakyz5333
@vakyz5333 3 года назад
Great content
@sayidshayan7610
@sayidshayan7610 Год назад
How an attacker change url parameters on a website into desired url
@selvamanir8671
@selvamanir8671 2 года назад
Bro put videos regularly
@aungkyawphyo4069
@aungkyawphyo4069 4 года назад
btw I like your drawing XD
@charlesmacklon9222
@charlesmacklon9222 3 года назад
It's awesome
@r4nd0m25
@r4nd0m25 3 года назад
Please put the english subtitles
@birb9254
@birb9254 5 лет назад
make more vids about web hacking... nice job
@RelabTV
@RelabTV 2 года назад
you explain this so clearly and so well. good work!
@sumspiew
@sumspiew 5 лет назад
Good content and explanation!:)
@elysamsepi0l703
@elysamsepi0l703 3 года назад
Someone knows which theme the editor use in vscode?
@umeshpatil5654
@umeshpatil5654 5 лет назад
How we can get token as it is seCret token ?
@PwnFunction
@PwnFunction 5 лет назад
From `Referer` header, which contains the address of the previous web page and in the url, there's the token. Only exploitable if the token is not expired or reusable or not used.
@netbin
@netbin 3 года назад
Foma Kinyaev
@uwuster
@uwuster 4 года назад
Is your intro a wireshark packet? XP
@lekenn2920
@lekenn2920 3 года назад
God , i didn't understand anything. but i will😎
@mcmundn8544
@mcmundn8544 5 лет назад
idk anything of those topics. i like your video style tho.
@juliocesar9443
@juliocesar9443 5 лет назад
AMAZING FUCKING VIDEO !!!!
@yoshihirotogashi6898
@yoshihirotogashi6898 3 года назад
1337 reference
Далее
XML External Entities (XXE) Explained
20:11
Просмотров 156 тыс.
Cross-Site Request Forgery (CSRF) Explained
14:11
Просмотров 456 тыс.
impossible lungs test !! 🫁
01:00
Просмотров 6 млн
one wrong npm package
19:27
Просмотров 182 тыс.
Open Redirect and How to Find It | Hacking Bug Bounty
13:36
The cloud is over-engineered and overpriced (no music)
14:39
Dangerous Code Hidden in Plain Sight for 12 years
18:00
HTTP Parameter Pollution Explained
11:08
Просмотров 253 тыс.