hello medusa, thank you for sharing im interested but im having issues joining the discord group. due to verification
@kashif_ali6919Күн бұрын
Everyone facing same thing I have completed verification but I don't have access of anything
@Medusa0xfКүн бұрын
Try Again?
@ShehanGgga5 күн бұрын
Hello your telegram or what's app?
@kashif_ali691910 күн бұрын
voice + guidence i love that
@Medusa0xfКүн бұрын
Thank you!
@mohadjermohamed343914 күн бұрын
8 MINUTES FOR ONE SINGLE PAYLOAD WHICH EXISTS IN THE INTERNET FROM 2000
@Medusa0xf11 күн бұрын
That's great that you understand, but not everyone does.
@testauthoritytes991716 күн бұрын
Why did you check "Remeber Me". Bad People may want to look into BITB😁
@Dxrk.2418 күн бұрын
Expecting more of these! ❤︎
@kittoh_18 күн бұрын
Question: If the user clicks the forgot password link to reset the password, then gets redirected to a malicious site, given that the user forgot the password thus will not be able to provide login credentials so is the user safe from this kind of attack? And also most reset passwords links only requires email which is not so sensitive info.
@Medusa0xf18 күн бұрын
Yes, in the case of password resets, most web applications ask for only the email address or username. However, since an email address is considered PII (Personally Identifiable Information), it’s a security vulnerability if it gets leaked in the response or URL. It’s still worth noting that if an attacker gains access to the email, they can chain multiple vulnerabilities together to launch further attacks. For example, if the web application lacks rate limiting and the attacker already has the username/email, they could perform a brute-force attack to guess the password. Another scenario could involve chaining an XSS vulnerability: if the user is already logged in, the attacker could exploit the reset password redirect. Even though the redirect is intended for password reset, it doesn’t matter-by using a JavaScript payload, the attacker could exfiltrate the user’s cookies, as I discussed in the video. I hope this clears up your doubt.
@AsilentWolf-c2c18 күн бұрын
By the way, your voice is so pretty.
@MianGG-c14 күн бұрын
this is not real, its an text-speech-gen , her real voice is in the snake-bites podcast.
@SumitYadav-lr5vy18 күн бұрын
Can you create a long video on how you hunt for bugs(manually hunting bac related bugs) on real world target?
@Medusa0xf18 күн бұрын
I'll consider about that.
@Code_x_87618 күн бұрын
Please@@Medusa0xf
@amoh9618 күн бұрын
yes good idea
@SumitYadav-lr5vy18 күн бұрын
amazing video
@Medusa0xf18 күн бұрын
Thank you!
@RareVampire-c6s20 күн бұрын
The voice is ❤
@rajmaharjan543721 күн бұрын
glad I found this gem :)
@Medusa0xf19 күн бұрын
Thanks!
@bambastala744621 күн бұрын
Don't use anime it's distracting
@alfonzo782224 күн бұрын
Hi! Loved this, you have some good content. It's always good to find someone new to sub to.
@Medusa0xf21 күн бұрын
Thank you so much!!
@T3chnocr4t25 күн бұрын
well explain and concise
@T3chnocr4t25 күн бұрын
Love the video, well explained
@Medusa0xf21 күн бұрын
Glad you liked it!
@Dxrk.2427 күн бұрын
Awesome as usual!
@Medusa0xf21 күн бұрын
Thanks!
@Aquax100027 күн бұрын
We want to see 😢 videos but I'm using it for sleeping 💤😴
@alfonzo782224 күн бұрын
Such a soothing voice I can't blame you!
@wmpdx727 күн бұрын
Love you 😘👌
@aechapark429927 күн бұрын
Welcome back, pls make a video on how to bypass cloudflare
@T3chnocr4t27 күн бұрын
thanks for explaining i really understand
@Medusa0xf21 күн бұрын
Glad to hear that
@SinergiasHolisticas27 күн бұрын
Love 🎉it
@H4ckerNafeed28 күн бұрын
The tiny note name? where u using to save payloads?
@senlin9414Ай бұрын
Great Content, but the background shouldn't be flickering.
@Medusa0xf19 күн бұрын
Thanks for the tip
@halfman.halfamazing3113Ай бұрын
Unable to focus while stuff running on the background with distracting music, it would be better if the video is some calm or lofi stuff.
@Medusa0xfКүн бұрын
Yeah i've been experimenting with editing. Check out the new video, you will love it!
@asfdfuckАй бұрын
xoss crush 😁
@user-tr3sh8tp9pАй бұрын
Great explanation. Thanks
@comosaycomosahАй бұрын
well put together
@Medusa0xfАй бұрын
Glad you liked it!
@testauthoritytes9917Ай бұрын
Medusa reminds me modlishka. Anyway great explanation. Some more points - you have worked on lazy loading cache hit and cache miss architecture that has a condition that this type if cache poisioning is only real of cache is updated. There are some more architecture you may want to explore, its write through and session storing. For write through architecture , cache cant be poisoned or updated to be delivered to multiple users for same content if you are not writing to DB. For session storing cached architecture mechanisms xss will fall short and you may want to try csrf.
@Medusa0xfАй бұрын
How about you share some articles for this on my server?
@nishantdalvi9470Ай бұрын
Please make this sort of video for Oauth misconfiguration as well
@Medusa0xfАй бұрын
Noted
@Bluesurfer-w8gАй бұрын
Ps : don't use glitch screen background when explaining something, it's uncomfortable
@testauthoritytes9917Ай бұрын
How comfortable is that when you have your website hosting different image or probably your user poset is changed or someone rides csrf and transfer legit amount from your digital wallet to some of your friend that you don't know. Get used it if you are blue 🔵, life will be less stressful 😊
@pratiksawant8119Ай бұрын
Agree
@shouvikkundu8289Ай бұрын
Yup it's kinda make us distract
@Medusa0xfАй бұрын
Okay
@mysteriousministar2481Ай бұрын
Nice video
@Medusa0xfАй бұрын
Thank you!
@dittonachanАй бұрын
great explaination, loved it.
@Medusa0xfАй бұрын
Thank you!
@OXIESECАй бұрын
Nice informative,+1 subscriber
@Medusa0xf21 күн бұрын
Awesome, thank you!
@smilehackermaxАй бұрын
Nice one!
@Medusa0xfАй бұрын
Thanks!
@Aquax1000Ай бұрын
Yo man hook me up with some BAC resources (not basics)
@Medusa0xfАй бұрын
You should hear this podcast. kzbin.info/www/bejne/rWWQkKqalLeYjpYsi=hnBOCR2AioksJdFH
@Aquax1000Ай бұрын
@@Medusa0xf I hate that smile do you have any other resources where you are the only one like same as this video. I love your blog but it's very nice to see any video on that. If you don't mind Medusa I'm doing fully manual testing now including BAC,Auth and OAuth so can you tell me am I missing out on something here ?
@RareVampire-c6s2 ай бұрын
Voice 😍
@maxautism66022 ай бұрын
Love the animation and the informative video - thanks a bunch!
@Medusa0xfАй бұрын
i'm glad!
@AfarTech2 ай бұрын
I don't know how can i say thank you, it's just an amazing lesson and a very clear speech, especially your voice😍 and I want to tell you my heart See My Profile i want Response Am Just kidding You are the first person who helped me to learn Penetration Testing easily thank you very much Medusa .💖🤗😬😄