Hi rana hope you're doing well. how were you able to refresh the tab and see the results you've gotten from repeater, actually i couldn't replicate that, btw I am using firefox and foxyproxy in my side
@ali-wz6nz21 сағат бұрын
00:05 - CSRF vulnerability allows email change without defenses. 01:43 - Demonstrating CSRF vulnerability through email change function. 03:26 - Analyzing CSRF vulnerability conditions through email change functionality. 04:51 - Understanding CSRF vulnerability with predictable request parameters. 06:08 - CSRF forms can be exploited for unauthorized actions. 07:24 - Demonstrating a CSRF exploit using an exploit server. 09:01 - Demonstrating a CSRF exploit to change a user's email address. 10:29 - Demonstrating a CSRF exploit through user interaction.
@mehrankurdКүн бұрын
fantastic
@anashreer3 күн бұрын
expire otp ? hhhhhhhh
@tayyab.sheikh3 күн бұрын
Such a detailed explanation!
@amazingfacts89104 күн бұрын
Clear my all doubts,Thnx😊
@predestined976 күн бұрын
Thank you.
@frownless6 күн бұрын
Hi Rana do you have any discount codes now for your academy? Interested in purchasing
@quanduonginh86026 күн бұрын
thank you so much , video is very usefull
@RakibHassanAkash7 күн бұрын
I seems that your voice is need to more clear and slow. Finally it's very helpful.
@A.G.555.10 күн бұрын
thanks this video is very helpful
@ahamedsobuj791510 күн бұрын
Useless video
@TheEbalmon12 күн бұрын
Muchas gracias!!
@eforever2713 күн бұрын
nice :D
@TheEbalmon13 күн бұрын
Muchas gracias maja!
@PouriaJafari-e1v14 күн бұрын
thanks
@ggelosstavrou911715 күн бұрын
I get invalid CSRF token
@JohnAuHermes16 күн бұрын
hey please keep going with the videos, they are quite good, great job and thank you!.
@hellohi581416 күн бұрын
You already changed the email at “2:30” and it was updated, so what’s the point I didn’t get it ?
@intruder7017 күн бұрын
But how can i get table name in real world in this case, i mean blind SQL?
@GabrielCoelho-u5k17 күн бұрын
Thank you very much!!!!
@magican20818 күн бұрын
❤❤❤ from Pakistan😊
@cyberluk319 күн бұрын
Hey Rana - really good tutorial. May I ask why are you taking notes on VScode?
@ShahinAhmed-tl7tw20 күн бұрын
Hello How do I create an exploit server to receive emails in real life? Could you please explain me that?
@kiwioil0c69720 күн бұрын
i love her guys
@ueivamarquessouza491320 күн бұрын
I love your explaination! Thanks!
@codermomo179220 күн бұрын
It is better to use binary search
@codermomo179220 күн бұрын
19:52 U can also use substring to determine the length of the password. By increasing the first number and testing if the substring equals nothing (empty). 'AND..Substring (....20,1) = [nothing) IF IT equals nothing it means we exceeded the length
@mohamedeletrepy474021 күн бұрын
free palestine
@gullitlevia78725 күн бұрын
Hi Rana, this is the best video on CSRF. I've watched about four videos, but they lack substances and contents. Yours presented with detailed explanations about the GET and POST methods used in CSRF, included diagrams and traffic flow directions. @Timeline 35:17, can you please clarify is session token = cookie session?
@MostafaMokhtar-sw4sb27 күн бұрын
Very useful Thanks alot :)
@ggelosstavrou911727 күн бұрын
All of These images requests at 3:01 do not appear in my burp . Do you know why ? I don’t modify anything it’s just the default burp setting in Kali Linux
@tanmaybhayani29 күн бұрын
Best video on this topic. This is gold. Thanks so much for this.
@x12abАй бұрын
terrible voice
@priesthoodemmanuel3243Ай бұрын
i learn from videos how do i get video classes
@曹曹嘉旭Ай бұрын
In this experiment, why can't I see the log after I input the poc according to your method and click Send to the victim api key in