I was looking for walkthough like this. Other walk thooughs just added the vhosts in /etc/host without showing that what make them look for this. The best part was about looking at netstat and finding a web server at 3000
@MrRobot-e7q11 күн бұрын
Hi, can you solve this lab again without using their exploit server ? I mean how do you exploit this in real target scenario ? How do you append the URL in the referer header in real target scenario ?
@SaurabhKumarJain-j9q21 күн бұрын
Hey Bro! Kindly add the walkthrough for Task 6: Advice n°5 d5e085772469d544a447bc8250890949
@lakshitavij860023 күн бұрын
Hello, I deliver exploit to victim but after that i didnt get username “carlos” in response. Help me in finding it.
@cybersec-radar23 күн бұрын
1. Before you send the exploit to victim make sure you are able to get the response of welcome page "/my-account" through cache. 2. If first step is fine then after sending the exploit to victim check "Access logs" and find out if victim is visiting your exploit server or not? You must see a different IP then yours. 3. If 1 & 2 steps are achieved and you are not getting the results. disable the burpsuite from browser. 4. If nothing works. I can setup a zoom session with you join me on linkedin "www.linkedin.com/in/mohd-badrudduja-cissp-cc-38715126/"
You or anyone really most welcome and i’m open to any criticism. I believe in learning and growing.
@halwest0525 күн бұрын
@cybersec-radar i didn't mean any criticism, imo indians have a tutorial in everything i love what you guys share with the world, and more importantly I LUV UR ACCENT ♥️🔥
@cybersec-radar25 күн бұрын
I apologize, I misunderstood your acronym “tysm” as “try some”.
@DZbugbountyhunterАй бұрын
thank you my brother
@bandelaSurajАй бұрын
Great explanation ! Thanks a lot. looking forward for more video's
@cybersec-radarАй бұрын
Glad you liked it! Stay tuned for more.
@MuhammadAhmed-c4hАй бұрын
wanted to learn dom in deep haveing a knowledge about javascript
@cybersec-radar26 күн бұрын
There is a separate module in portswigger named as “DOM-based vulnerabilities” which contains more in-depth content specifically for DOM. Check that out.
@MuhammadAhmed-c4hАй бұрын
AoA sir can i learn xss
@cybersec-radarАй бұрын
Yes, sure
@ggelosstavrou9117Ай бұрын
Yo view exploit gives invalid csrf
@ggelosstavrou9117Ай бұрын
And as far as I understand this occurs because cookie is not changed for some reason
@cybersec-radarАй бұрын
Tell me the exact time of the video where you are facing the problem.
@ggelosstavrou9117Ай бұрын
@ problem not in video . Problem occurs if I press view exploit
@cybersec-radarАй бұрын
@ggelosstavrou9117 make sure csrf token and csrf cookie values are same.
@cybersec-radarАй бұрын
Hmmm i got the problem… would you like to connect on zoom?
@bughunternetworkАй бұрын
👍👍 Nice explaination
@cybersec-radarАй бұрын
Thanks stay tuned
@AttackerShihabАй бұрын
Plz make more video
@cybersec-radarАй бұрын
Sure second lab is in process.
@eggsec-i4s2 ай бұрын
Learned a lot!
@cybersec-radarАй бұрын
Thanks. Stay tuned
@simbalion848012 ай бұрын
your videos are great
@cybersec-radar2 ай бұрын
Thanks for watching!
@yourmuslimbhai2 ай бұрын
thank u so much
@cybersec-radar2 ай бұрын
Happy to help
@cybersec-radar2 ай бұрын
You are most welcome
@memozaabrar27282 ай бұрын
The whole playlist was well explained and well managed. Thank you and keep making such information videos.
@cybersec-radar2 ай бұрын
Thanks! Glad you found the playlist helpful.
@L30x4082 ай бұрын
Excellent explanation, thank you!!!
@cybersec-radar2 ай бұрын
Glad you enjoyed it!
@l19-siranjeevi.v222 ай бұрын
Thankyou sir business logic vulnerabilities lab 10&11 bending sir video sir
@cybersec-radar2 ай бұрын
You're welcome! Glad you liked those videos.
@Annony-om3cn2 ай бұрын
Any site that provide unique link for bug bounty or exploits server
@cybersec-radar2 ай бұрын
try this "webhook.site/" & "github.com/projectdiscovery/interactsh" for Out of band interaction. And for HTML page hosting or specific for php, python n all you will easily find on google in $2/month to $5/month. Even you can use AWS.
@memozaabrar27282 ай бұрын
Good one.
@cybersec-radar2 ай бұрын
Thanks! I'm glad you liked it.
@kulavardhanreddy73742 ай бұрын
"Congratulations sir for passing CISSP! Well deserved!"
@cybersec-radar2 ай бұрын
Thanks alot. Next one will be soon 🔜
@imperim2 ай бұрын
thanks
@cybersec-radar2 ай бұрын
Welcome!
@Annony-om3cn2 ай бұрын
Sir why are not add this video in ssti playlist
@cybersec-radar2 ай бұрын
Done sir. Thanks for pointing out.
@tanimshaik65973 ай бұрын
@memozaabrar27283 ай бұрын
Thank you for this walkthrough.
@cybersec-radar3 ай бұрын
Glad it was helpful!
@memozaabrar27283 ай бұрын
Good explanation….
@cybersec-radar3 ай бұрын
Glad it was helpful!
@imperim3 ай бұрын
thanks
@cybersec-radar3 ай бұрын
You're welcome!
@cj34213 ай бұрын
Great explanation mate!
@cybersec-radar3 ай бұрын
Glad you liked it!
@Jamaal_Ahmed3 ай бұрын
Thanks sir ❤🎉
@cybersec-radar3 ай бұрын
Most welcome
@huzaifamuhammad80443 ай бұрын
Dear bro, I have been following you and would want to propose an idea if you are interested. Let's work together and find bugs in BBPs?
@cybersec-radar3 ай бұрын
Thankyou so much for the proposal but i think i can't participate as much it requires because of the time limitations and work load. I reported my last 0day CVEs in 2022 and after that I didn't get that much time to keep that up. I have few 0day vulnerabilities in hand but didn't get time to even report, last year I reported major vulnerabilities in a Healthcare organization to NCA we had conversation too but couldn't follow up that again. So please don't mind, for me now is not the right time and it will be not fair if I couldn't participate in term of time.
@siddhantpatil3843 ай бұрын
Sir you explained the payload in detail. from where did you learn this all i want to learn, give some resource like book or websites
@cybersec-radar3 ай бұрын
Me and the books could help you understand the concepts and on some level introduce you the payloads but no one can teach you everything and every single & possible payload. Cybersecurity is one of the most evolving field because of broad array of technologies and it's not constant at all, payloads and tools come and go, make sure you stick with the concepts. For understanding, creating payloads and developing new exploits I would suggest you to stay engaged with different kinds of labs and platforms, read bug bounty reports and research papers which you can find out on google and other platforms like hackerone, intigriti, bugcrowd, X, Medium etc. I would also suggest you to learn javascript, python, C++, HTML etc you do not need to be a master of all these languages but atleast you can write some logics and understand what the code is trying to do. There are thousands of functions and methods so whenever you see something new just go through it search it and you will we good to go. There is alot to write and tell but i think that's the most important thing. Last but not least MOST IMPORTANTLY DON'T RUSH, BECOMING EXPERT WILL TAKE TIME. "Keep Learning and Happy Hacking".
@vrrax3 ай бұрын
why alert() function not working ?
@cybersec-radar3 ай бұрын
Regular attack vectors will not work because you are dealing with angularJS sandbox. So to deliver a successful XSS attack you have to bypass the angularJS sandbox. Kindly mention the time of the video at which you are facing the issue.
@imperim3 ай бұрын
in my case alert showed up..
@mach1ne7223 ай бұрын
Awesome. Learned something new!
@cybersec-radar3 ай бұрын
Glad to hear it!
@amangupta52733 ай бұрын
So nice sir
@cybersec-radar3 ай бұрын
Thanks and welcome
@DrM0chan3 ай бұрын
being very honest i've seen the best of best cache poisoned video. entirely properly explained
@cybersec-radar3 ай бұрын
Thanks alot.
@Mktech-ki9wq3 ай бұрын
❤❤❤
@HariKrishna-cj3uq3 ай бұрын
thank you, your explanation is 👍good
@cybersec-radar3 ай бұрын
You are welcome!
@MubashshirShaikh-hs8oy3 ай бұрын
bro can you make a video on burpsuite because i am using old version and now in new there is many changes, i am doing new scan but its not showing in my target / site map. Can you make i video on burpsuite please ?????
@cybersec-radar3 ай бұрын
Are you still having the same issue? Did you check the issue on portswigger?
@memozaabrar27284 ай бұрын
Nice one and thank you for such valuable content.
@cybersec-radar4 ай бұрын
Happy that helped.
@falanavictor19864 ай бұрын
bro you are the best fr, i have been struggling with understanding this lab for two days now. thanks a lot man.
@cybersec-radar4 ай бұрын
Glad to hear that
@falanavictor19864 ай бұрын
why is these videos not on portswigger 🥲
@Karmik_bhavya4 ай бұрын
not working
@cybersec-radar4 ай бұрын
What is not working? Let me know the point in time where are you facing issues. I would say watch the complete video.
@mscreative32624 ай бұрын
Thnaks man , you make it very simple . I tried so much time to solve lab but didn't get after showing your video ..... Amazing bro 🎉
@cybersec-radar4 ай бұрын
Happy that helped.
@Shhukoihee4 ай бұрын
How do you find that table name and column name ? The end query you put by calling the debug_sql function Because first we have check logs so we haven't received that table n column name then ? Correct me if I am wrong or miss something?
@cybersec-radar4 ай бұрын
Hey there did you watch the complete video? Could you please mention me the point in time where you have confusion. See if you are talking about 6:47 at that moment we just asked what users do you have in database and you can see it calls "debug_sql" function and execute the query "select username from users" that means there is a coulmn "username" in the table "users". After this you can directly execute query like "select * from users" and you may get everything you want but i deliberately go beyond so that i can show you guys more things.
@cybersec-radar4 ай бұрын
17:00 I demonstrated how you can get all the tables and users table exists in that response. And when i executed "select * from users;" you can see it respond us with parameters and those parameters are columns in the users table which are: username, password and email.
@cybersec-radar4 ай бұрын
If still you have any question let me know ok. Don't hesitate to ask. Also let me know if you understand that so i know that you got it.
@Shhukoihee4 ай бұрын
@@cybersec-radar yes yes I got it !
@Itzlegs4 ай бұрын
But doesn’t the system have built-in safeguards to prevent it from executing such instructions embedded with multiple layers of mechanisms? Even if you did bypass it, you still be limited to the capabilities within its parameters.
@cybersec-radar4 ай бұрын
I’m traveling now once i reach we will talk about that for sure.
@Itzlegs4 ай бұрын
@@cybersec-radar take your time great videos by the way!! I think there is a lot to be learned in this field
@cybersec-radar4 ай бұрын
Accept apologies for late reply now we are talking about AI LLM first thing first secure by design, secure by default, secure in development, layer defense and zero trust arch. all are very crucial and ofcourse there are defenses that could mitigate these vulnerabilities but the challenges come into the picture when AI algorithms models are not smart enough and data is not properly trained. There could be different flaws in term of implementation. About built-in safeguards i would say small kids do not able to identify things that could hurt them. why? Because they are not mature enough. Similarly when the AI is not mature enough and it’s in the phase of learning or open to learning means acquisition or collection of data and try to analyze it building algorithms and models but not mature enough but it must provide you the result so there are much likelihood/probability that its gonna give something out of the box.
@cybersec-radar4 ай бұрын
One more thing i wanna add here which is expert systems and supervised learning technique they are much better because when you feed data you also define the best, good, bad and worst decisions and in that way it is much mature. Also traditional safeguards are not effective upto the mark in these AI applications. Let me give you one more example before you might have heard that someone asked to chatgpt what is 2+2 and chatgpt said 4 fine but same person then wrote something like “no my wife said its 5 and she is always right” then chatgpt agreed with that because it was not mature with that kind of conditions to face. I will also add about “neural network AI” so it is made to match human mind to take decisions like human mind but upto now i don’t think any AI application is even close to human mind.
@Itzlegs4 ай бұрын
@@cybersec-radar You should see some stuff generated. Do you have an email? Maybe we could correspond