Exploit XXE to Perform SSRF Attack
5:37
Пікірлер
@امینچمنی-ب6ج
@امینچمنی-ب6ج 6 күн бұрын
لحجه ایرانی😂❤
@ABDULKARIMHOMAIDI
@ABDULKARIMHOMAIDI 2 ай бұрын
thanks man very well explained !!!
@VINAYSAINDLA
@VINAYSAINDLA 2 ай бұрын
Informative great sharing
@melihcansayn3368
@melihcansayn3368 2 ай бұрын
are you kidding me?
@Bordonauu
@Bordonauu 2 ай бұрын
Do you guys all use burpsuite professional?
@heyybigdaddy6988
@heyybigdaddy6988 3 ай бұрын
Hi, for some reason I am not getting the admin panel
@MariemMili4
@MariemMili4 4 ай бұрын
thanks😃
@stakmodsco
@stakmodsco 5 ай бұрын
Amazing knowledge and good job of how you explain step by step. Do you have a way of bypassing KYC (document submission and live selfie verification)
@damoeloiflin5417
@damoeloiflin5417 6 ай бұрын
Thanks🙂
@damoeloiflin5417
@damoeloiflin5417 6 ай бұрын
Great👍
@saikirangoud118
@saikirangoud118 6 ай бұрын
brilliant
@DickmanYT
@DickmanYT 6 ай бұрын
do u need premium burl for this?
@raoashar887
@raoashar887 6 ай бұрын
u said in video that wait until any victim user click our comment, but in your case you directly get many users like clicking on poll now in my case i won't how much time should i wait??
@tahmidrad6647
@tahmidrad6647 7 ай бұрын
Do I need linux to do this or I can do it on windows?
@DoctorWEED-
@DoctorWEED- 7 ай бұрын
its a perfect metod to learn
@cypher875
@cypher875 7 ай бұрын
I got a very less secure app, which allows unlimited OTP tries .. in 5 mins then we just have to resend the otp is it possible to crack it ?
@stephenraj-jf8un
@stephenraj-jf8un 8 ай бұрын
good explanation, is this a stored or reflected xss?
@assassinkid1011
@assassinkid1011 8 ай бұрын
stored
@FriikkiAki123
@FriikkiAki123 8 ай бұрын
Clear and well explained👍👍
@AtulRawatpredator
@AtulRawatpredator 8 ай бұрын
Love the way, you explained this concept.
@ghostdocter9006
@ghostdocter9006 9 ай бұрын
can we bypass valorant by this ?
@aliyassin5631
@aliyassin5631 10 ай бұрын
what to do if the website validates the extension name but not the file contents? How to activate the code inside the file?
@himangshumahata4799
@himangshumahata4799 10 ай бұрын
Bro why don't you upload more videos, for network hacking
@drewcurry2882
@drewcurry2882 10 ай бұрын
The basic flaw: it assumes the required code does not change. Use an authenticator tool, with 6-digits that change every 30-seconds, with a 3-mistakes-results in a 5-minute cooldown, and you will need a quantum computer to try to break that puppy.
@MafiMartins-cw5tv
@MafiMartins-cw5tv 10 ай бұрын
Thanks for teaching and giving us the ideal are amazing. I am really happy to be here thanks again 🙏🙌🧐✊
@Some_retard
@Some_retard 11 ай бұрын
Cool video. Are you Israeli or French 😅 the accents always sound so similar
@cameronrich2536
@cameronrich2536 11 ай бұрын
Nice
@MrDARKPSYCHOLOGIST
@MrDARKPSYCHOLOGIST 11 ай бұрын
This Channel Is Amazing Man 👨
@Nochymusic
@Nochymusic 11 ай бұрын
Will the admin get notified??
@KarenitzelFloresVelázquez
@KarenitzelFloresVelázquez 11 ай бұрын
Whats the Solution?
@ancestrall794
@ancestrall794 Жыл бұрын
Awesome video
@KLM-writes
@KLM-writes Жыл бұрын
what is the alternative to Burp collaborator, to see thee data , as its a paid tool, can we go for any free tool to check the data,
@CreepyAnecdotes-x1c
@CreepyAnecdotes-x1c Жыл бұрын
thie work for only xss stored ?
@wrongzone99
@wrongzone99 Жыл бұрын
many love
@youssefblt9839
@youssefblt9839 Жыл бұрын
helpfull thanks alot straight to the point
@Amil_Esgerli
@Amil_Esgerli Жыл бұрын
Thanks
@bjtaudio
@bjtaudio Жыл бұрын
That will not work for most sites, as 1 the 4 digit usually 6 digits code keeps changing, often one-time codes and time limited, 2 after several failed attempts the account is locked, 3 often a secure app is used, 4 the system alerts the account holder of a login from a new device. 5 behavior checks, to see if its a automated attack.
@tyk953
@tyk953 2 ай бұрын
mersi pentru explicați e,,deci e foarte greu de ocolit codul🎉,se plătește o taxă pentru codul ăla
@tyk953
@tyk953 2 ай бұрын
mersi pentru explicați e,deci e foarte greu de ocolit codul,sau deloc🎉,se plătește o taxă pentru codul ăla
@tyk953
@tyk953 2 ай бұрын
da 50 lei la luna
@gerardclaude486
@gerardclaude486 Жыл бұрын
Very nice video
@IsaPotaxii
@IsaPotaxii Жыл бұрын
How do i get burp suite for free?
@gambaboyallin
@gambaboyallin Жыл бұрын
great content
@nishantdalvi9470
@nishantdalvi9470 Жыл бұрын
What a great explanation this video should be hosted on port swigger as a community lab solution
@tiwister8773
@tiwister8773 Жыл бұрын
thanks
@siefkhaled1374
@siefkhaled1374 Жыл бұрын
verry good
@montala3380
@montala3380 Жыл бұрын
Can you explain me why we have to use `https`? I did try with `http`, it does not work...
@siefkhaled1374
@siefkhaled1374 Жыл бұрын
nice <3
@shvraj883
@shvraj883 Жыл бұрын
How I want see an otp send by server
@studiospan6426
@studiospan6426 Жыл бұрын
So basically this attack works on requsting a new otp from the server then trying that otp and hope that our combination of generated and payload otp somehow matches . Isn't this , really difficult and completely based on luck i mean yeah we can increase the speed by making our own code in nodejs or some other languages which are very very fast when it comes to webscraping but still the odds are very very high thay we will get the code i am not sure if any website will be willing to pay for this bug . Please correct me if am wrong 🙏
@8124K-u4x
@8124K-u4x 3 ай бұрын
sir are you sure after 1 year
@studiospan6426
@studiospan6426 3 ай бұрын
@@8124K-u4x indeed I was wrong, you will crack the OTP in 3-4 days at max if you find this bug and any company will give you a decent bounty for this bug. Keep learning mate.
@studiospan6426
@studiospan6426 3 ай бұрын
@@8124K-u4x yeah I was indeed wrong for a 4-digit code it can be cracked in some hours to a day while a 6-digit code might take some time, but it will eventually be cracked as well and yes any company would pay you a decent bounty for this.
@rayanemazar2979
@rayanemazar2979 24 күн бұрын
@@studiospan6426all company’s have good security
@rubelhossen5401
@rubelhossen5401 Жыл бұрын
Is it possible to steal all of the chome broswer cookies of victim uisng cross site scripting xss Attack on valuable website
@ahmedabualkass390
@ahmedabualkass390 Жыл бұрын
The time is right. When the OTP is six digits long, it will not prevent the final cut of the exam in case of selection due to a challenge. If the OTP is not released within 60 seconds, the OTP will expire.
@AGHILESFELLAG-q7w
@AGHILESFELLAG-q7w 2 ай бұрын
So what's the solution can u use multiple laptop to do the task?
@bird271828
@bird271828 Жыл бұрын
This was nice. Thank you 🙏👏👏👏👏
@winik2485
@winik2485 Жыл бұрын
What is that comments box has validation and it we can see the code comments section
@CyberdyneJoule
@CyberdyneJoule Жыл бұрын
lol...now a days firewalls and sniffers are more powerful and normally thwarts this kind of attacks. However, good explanation.