just found you. veeerrry interesting channel. as someone who learns by watching a massive amount of poc videos on one topic, i like how you take the analysis deeper. finally a channel that doesnt have the redundant "how to hack" videos.
@dhyeychoksi51782 жыл бұрын
Fantastic video. Highly informative!
@_CryptoCat2 жыл бұрын
Great video! Do you compile the spreadsheet data manually during your research (13:30) or do you automate with some scripting/scraping?
@BugBountyReportsExplained2 жыл бұрын
Thanks! I start off with reports from PentesterLand, then I add a Google webscrape from Hackerone and then I add a few more reports from my memory/Pocket/etc.
@jatinnandwani66784 ай бұрын
Thanks!
@yaseen77492 жыл бұрын
This video is Diamond. Awesome mate very well explained. Gonna signup with BBRE soon.
@diegor.mackenzie15932 жыл бұрын
Love your vids. The other day I was messing around with a page and found an html injection, I was wondering if there was a way to escalate it to an XSS if the "=" sign is sanitized and leads me to a 403 Forbidden. Thanks!
@MrSettler Жыл бұрын
Awesome analysis!!
@rysiacz2 жыл бұрын
is one of the shortest xss payloads, maybe that's why they are use more often
@BugBountyReportsExplained2 жыл бұрын
good point!
@anonymousx_x3842 Жыл бұрын
Is there any way to bypass = blacklisted? Svg runs fine even creates its structure in code base but script tag and = are blocked on a url I'm testing with.
@BugBountyReportsExplained Жыл бұрын
@@anonymousx_x3842 are you sure you are URL-encoding the = in the URL? If yes, then I'm not aware of a bypass.
@trustedsecurity6039 Жыл бұрын
From my experience on the client i pentest img tag is better, 95% of the time svg doesnt work when img does
@trustedsecurity6039 Жыл бұрын
Maybe try a javascript:alert(1)
@brutexploiter2 жыл бұрын
Can you share the template...No need database
@emilisha-in4xl Жыл бұрын
This is Gold man 💥
@ruttalaabhinav81052 жыл бұрын
Correct me if i am wrong. Can we get XSS on 404 pages.
@stevesharma65212 жыл бұрын
What platform will u suggest for leaning bug bounty?
@BugBountyReportsExplained2 жыл бұрын
I suggest to pick a program first and then the platform
@محمّد.09 Жыл бұрын
LOVE YOUR VIDEOS I know HTML. Currently learning JavaScript. Then I'll put my hand on portswigger labs starting from xss then idor then business logic bugs. *My Questions are:* should I watch your channel from oldest or newest or most popular? should I continue with the approach I wrote above?
@BugBountyReportsExplained Жыл бұрын
I think XSS is actually quite a complex bug class to start with. I'd rather go with access control, IDORs, business logic etc. And yes, Portswigger lab is the resource to go. I think watch my channel from newest
@OthmanAlikhan Жыл бұрын
Thanks for the video =)
@Al-rt3ec2 жыл бұрын
is there step how to do for bug bounty each report ?
@BugBountyReportsExplained2 жыл бұрын
hm?
@Al-rt3ec2 жыл бұрын
@@BugBountyReportsExplained Excuse me what do you mean? i mean when i subscribed is there what does i mean?
@firzainsanudzaky37634 ай бұрын
@@Al-rt3ec Bro he questioning your question, it doesn't make sense
@_bergee_2 жыл бұрын
Ten film zawiera lokowanie produktu :)
@BugBountyReportsExplained2 жыл бұрын
Ja nie zauważyłem🙄
@akshaypandey47612 жыл бұрын
Hello brother I am also doing bug bounty but not getting success
@rix4uni2 жыл бұрын
Can you share the notion list
@edoardottt2 жыл бұрын
i guess it's available for premium bbre users
@BugBountyReportsExplained2 жыл бұрын
Exactly, the database is available in BBRE Premium
@kalki-fo3ie2 жыл бұрын
Can You Share About the BB Automation !
@BugBountyReportsExplained2 жыл бұрын
Yes but I'd have to invite someone for that because I don't do any automation
@kalki-fo3ie2 жыл бұрын
@@BugBountyReportsExplained thanks, Waiting :)
@ali-barznji Жыл бұрын
I love you bro ❤
@x.plorer2 жыл бұрын
Not 'E'mg tag but 'I'mg tag 😶🌫
@BugBountyReportsExplained2 жыл бұрын
true, I was reading it more in polish than in english
@yaseen77492 жыл бұрын
😂 exactly i was too scratching my head for the payload which starts from Emg. later i followed his track
@eyephpmyadmin69882 жыл бұрын
Would be interested in using this info as a ML training set
@Ajax-14327 ай бұрын
Every website would be vulnerable since you are injecting the script into the console yourself. This is not valid