Which XSS payloads get the biggest bounties? - Case study of 174 reports

  Рет қаралды 28,495

Bug Bounty Reports Explained

Bug Bounty Reports Explained

Күн бұрын

Пікірлер
@quad7375
@quad7375 Жыл бұрын
just found you. veeerrry interesting channel. as someone who learns by watching a massive amount of poc videos on one topic, i like how you take the analysis deeper. finally a channel that doesnt have the redundant "how to hack" videos.
@dhyeychoksi5178
@dhyeychoksi5178 2 жыл бұрын
Fantastic video. Highly informative!
@_CryptoCat
@_CryptoCat 2 жыл бұрын
Great video! Do you compile the spreadsheet data manually during your research (13:30) or do you automate with some scripting/scraping?
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Thanks! I start off with reports from PentesterLand, then I add a Google webscrape from Hackerone and then I add a few more reports from my memory/Pocket/etc.
@jatinnandwani6678
@jatinnandwani6678 4 ай бұрын
Thanks!
@yaseen7749
@yaseen7749 2 жыл бұрын
This video is Diamond. Awesome mate very well explained. Gonna signup with BBRE soon.
@diegor.mackenzie1593
@diegor.mackenzie1593 2 жыл бұрын
Love your vids. The other day I was messing around with a page and found an html injection, I was wondering if there was a way to escalate it to an XSS if the "=" sign is sanitized and leads me to a 403 Forbidden. Thanks!
@MrSettler
@MrSettler Жыл бұрын
Awesome analysis!!
@rysiacz
@rysiacz 2 жыл бұрын
is one of the shortest xss payloads, maybe that's why they are use more often
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
good point!
@anonymousx_x3842
@anonymousx_x3842 Жыл бұрын
Is there any way to bypass = blacklisted? Svg runs fine even creates its structure in code base but script tag and = are blocked on a url I'm testing with.
@BugBountyReportsExplained
@BugBountyReportsExplained Жыл бұрын
@@anonymousx_x3842 are you sure you are URL-encoding the = in the URL? If yes, then I'm not aware of a bypass.
@trustedsecurity6039
@trustedsecurity6039 Жыл бұрын
From my experience on the client i pentest img tag is better, 95% of the time svg doesnt work when img does
@trustedsecurity6039
@trustedsecurity6039 Жыл бұрын
Maybe try a javascript:alert(1)
@brutexploiter
@brutexploiter 2 жыл бұрын
Can you share the template...No need database
@emilisha-in4xl
@emilisha-in4xl Жыл бұрын
This is Gold man 💥
@ruttalaabhinav8105
@ruttalaabhinav8105 2 жыл бұрын
Correct me if i am wrong. Can we get XSS on 404 pages.
@stevesharma6521
@stevesharma6521 2 жыл бұрын
What platform will u suggest for leaning bug bounty?
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
I suggest to pick a program first and then the platform
@محمّد.09
@محمّد.09 Жыл бұрын
LOVE YOUR VIDEOS I know HTML. Currently learning JavaScript. Then I'll put my hand on portswigger labs starting from xss then idor then business logic bugs. *My Questions are:* should I watch your channel from oldest or newest or most popular? should I continue with the approach I wrote above?
@BugBountyReportsExplained
@BugBountyReportsExplained Жыл бұрын
I think XSS is actually quite a complex bug class to start with. I'd rather go with access control, IDORs, business logic etc. And yes, Portswigger lab is the resource to go. I think watch my channel from newest
@OthmanAlikhan
@OthmanAlikhan Жыл бұрын
Thanks for the video =)
@Al-rt3ec
@Al-rt3ec 2 жыл бұрын
is there step how to do for bug bounty each report ?
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
hm?
@Al-rt3ec
@Al-rt3ec 2 жыл бұрын
@@BugBountyReportsExplained Excuse me what do you mean? i mean when i subscribed is there what does i mean?
@firzainsanudzaky3763
@firzainsanudzaky3763 4 ай бұрын
​@@Al-rt3ec Bro he questioning your question, it doesn't make sense
@_bergee_
@_bergee_ 2 жыл бұрын
Ten film zawiera lokowanie produktu :)
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Ja nie zauważyłem🙄
@akshaypandey4761
@akshaypandey4761 2 жыл бұрын
Hello brother I am also doing bug bounty but not getting success
@rix4uni
@rix4uni 2 жыл бұрын
Can you share the notion list
@edoardottt
@edoardottt 2 жыл бұрын
i guess it's available for premium bbre users
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Exactly, the database is available in BBRE Premium
@kalki-fo3ie
@kalki-fo3ie 2 жыл бұрын
Can You Share About the BB Automation !
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Yes but I'd have to invite someone for that because I don't do any automation
@kalki-fo3ie
@kalki-fo3ie 2 жыл бұрын
@@BugBountyReportsExplained thanks, Waiting :)
@ali-barznji
@ali-barznji Жыл бұрын
I love you bro ❤
@x.plorer
@x.plorer 2 жыл бұрын
Not 'E'mg tag but 'I'mg tag 😶‍🌫
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
true, I was reading it more in polish than in english
@yaseen7749
@yaseen7749 2 жыл бұрын
😂 exactly i was too scratching my head for the payload which starts from Emg. later i followed his track
@eyephpmyadmin6988
@eyephpmyadmin6988 2 жыл бұрын
Would be interested in using this info as a ML training set
@Ajax-1432
@Ajax-1432 7 ай бұрын
Every website would be vulnerable since you are injecting the script into the console yourself. This is not valid
@akshaypandey4761
@akshaypandey4761 2 жыл бұрын
Can you help me
@vivekkhandagre9274
@vivekkhandagre9274 2 жыл бұрын
i love you bro 🥰😍🤑
@Abhi-yc6xs
@Abhi-yc6xs Жыл бұрын
can you give this cheet sheet in pin comment
@BugBountyReportsExplained
@BugBountyReportsExplained Жыл бұрын
I linked it in the description ;)
@bag8208
@bag8208 29 күн бұрын
Bro you best!
@trustedsecurity6039
@trustedsecurity6039 Жыл бұрын
Better to use than the quoted one
@BugBountyReportsExplained
@BugBountyReportsExplained Жыл бұрын
Good point actually
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
19:58
Bug Bounty Reports Explained
Рет қаралды 17 М.
Turning unexploitable XSS into an account takeover with Matan Berson
23:46
Bug Bounty Reports Explained
Рет қаралды 15 М.
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 36 МЛН
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
32:30
DEFCONConference
Рет қаралды 57 М.
Where are all the RCEs? RCE case study
25:12
Bug Bounty Reports Explained
Рет қаралды 8 М.
Detecting & Exploiting Cross-Site Scripting (XSS)
11:33
Tyler Ramsbey || Hack Smarter
Рет қаралды 3,6 М.
IDOR - how to predict an identifier? Bug bounty case study
23:55
Bug Bounty Reports Explained
Рет қаралды 17 М.
Hacker101 - JavaScript for Hackers (Created by @STOKfredrik)
24:17
$XX,000 Airbnb impossible XSS with 4 bypasses
9:15
Bug Bounty Reports Explained
Рет қаралды 29 М.
This is How I Scrape 99% of Sites
18:27
John Watson Rooney
Рет қаралды 257 М.
This Bug Got Me A $30,000 Bounty
12:41
NahamSec
Рет қаралды 20 М.
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.