Wow its amazing , please make video after i got xss what next can i do .
@akroidofficial6 ай бұрын
quality content. i always prefer manual rather than automated
@madhavanrio32105 ай бұрын
yeah dude automated tools are outdated now, because of WAF or other CDNs so try mannualy, and be unique from the crowd
@nishantdalvi94706 ай бұрын
Please make one more video in where we try bypassing WAF by inputting in equal to sign in our payload around the angular tags
@Jabir_AfreDy2 ай бұрын
Please teach me how to do price tempering and how to know that this sites we can do price tempering
@SecureByBhavesh6 ай бұрын
Informative, Please make video on SQLi
@RyanGiggs-w7i6 ай бұрын
Maybe u check in forget paswword for sqli
@sir_potraheno38923 ай бұрын
Thx, best video about xss
@Coollinux-c2b4 ай бұрын
is the lab that you use available in docker? if yes can you share to us
@codecore_1114 ай бұрын
Bro u are a gem 💎
@Alpha_Aquila6 ай бұрын
Please, I'm looking for that's video where you used Ngrok to demonstrate a vulnerability, please can you direct me there
@BePracticalTech6 ай бұрын
Here you go: kzbin.info/www/bejne/hZPYY6aDm6qcipYfeature=shared
@ronicristian46486 ай бұрын
I have a case, about xss stored, when I input: '-alert(1)-' '-alert(document.domain)-' '-alert(document.cookie)-' The 3 payloads above successfully bring up the xss popup but when I input this payload to steal cookies, why doesn't it work? '-src="//example/c.js"-'
@BePracticalTech6 ай бұрын
Maybe they have added a protection to prevent js code to read cookies
@studywork37793 ай бұрын
sir if any value is not reflected in source code what shall we do
@Createrrahul1M2 ай бұрын
Bro yeah to client side per ho reha he khud ke browsers me change se kya fark padega
@wearecrypto92865 ай бұрын
Hi bro i didn't under that adding attributes step by encoding can you please clear it?
@shrabanichakraborty81474 ай бұрын
amazing . Make video on how to write bug bounty report
@pak83806 ай бұрын
beautiful bro!!!!
@Officialheartlessheart6 ай бұрын
Please make a video on "XSS finding Methodology"
@sarthaksharma97214 ай бұрын
intruder allowed by website or not? plz reply
@TheCyberWarriorGuy6 ай бұрын
Please make some tutorial on BACs !!!
@animelover58496 ай бұрын
How to use subspy pip package
@im_szaby91906 ай бұрын
how can i bypass html entity encoding
@yasaya91396 ай бұрын
Please make a video xxe basic and next level
@asshu20046 ай бұрын
make some video on p1 bugs..
@jvr055 ай бұрын
this is very basic how about where //"" all of these are being detected and blocked ???
@pratapmahato34716 ай бұрын
Plz make video over sqlmap on live site not on test web
@BePracticalTech6 ай бұрын
We already covered a lot of videos on sql injection that too on live websites. Check out our playlist: kzbin.info/aero/PLrQwMS8b1fmQkMnul6q06vvZL83BuK9Ud
@Arben_Short4 ай бұрын
how to download your wallpaper
@damnn_motivation6 ай бұрын
Thanks bro
@uttarkhandcooltech12376 ай бұрын
Please share your window theme
@jaywandery92696 ай бұрын
good one
@whitehatboy0056 ай бұрын
if this symbol block what can do
@BePracticalTech6 ай бұрын
Then we need to check where our given value is reflecting. Based on that, there could be other ways to execute xss
@AgungDimasIrawan4 ай бұрын
@@BePracticalTech how, give the examples
@khanshaheb45006 ай бұрын
Where is waf bypassing scenario?
@parthshah72715 ай бұрын
Where can we find this particular lab ?
@sabrirais-rb7bl4 ай бұрын
pleasse the background windows
@giatalexandersilaban6124 ай бұрын
use this in react js broh
@mdalifislam73196 ай бұрын
Wow 🎉
@Free.Education7866 ай бұрын
Excellent video 📹 brother. How to find vulnerable parameters and endpoints. I found many endpoints and parameters from paramspider collector parameth arjun x8, etc, but all of them failed in sqlmap or Ghauri because they are not injectable. How to solve this crucial problem. Thanks for your help and support. 🎉❤
@AtulRawatpredator6 ай бұрын
I don’t understand how WAF is being bypassed over here.
@khanshaheb45006 ай бұрын
there is no waf bypassing in this video.
@AtulRawatpredator6 ай бұрын
@@khanshaheb4500 Why does the title say so ?
@goodboy88336 ай бұрын
@@AtulRawatpredator not here he is just referring to the context where how u can bypass one