Turning unexploitable XSS into an account takeover with Matan Berson

  Рет қаралды 15,967

Bug Bounty Reports Explained

Bug Bounty Reports Explained

Күн бұрын

Пікірлер: 51
@AppSecExplained
@AppSecExplained 5 ай бұрын
Nice, I had to listen through some sections a couple of times to really get my head around what was going on but def an interesting technique - thanks for sharing
@ebrahimesmaeilian
@ebrahimesmaeilian 4 ай бұрын
i watched it literally more that 20 times to understand it and the interesting thing is now that i got it i know it worth knowing it if it takes 100 times or even more to understand it.
@jus7be1337
@jus7be1337 16 күн бұрын
in the example code you provided at 5:03 how does the selfXSS page have access to windowsWithSensitiveData which was actually opened using the attacker's domain.
@BugBountyReportsExplained
@BugBountyReportsExplained 15 күн бұрын
From what origin was the window opened does not affect same-origin policy. And the origin of the window itself is the target's origin, since that's where we have self-xss
@bigboycdznutz2079
@bigboycdznutz2079 5 ай бұрын
So the attack requires the vulnerable web app to be 1. Vulnerable to CSRF 2. To also have the Self XSS If so, that is awesome
@dmitryi3761
@dmitryi3761 5 ай бұрын
Yeah and the backend should completely ignore the amount of injectable arbitrary code to trigger such complex self-xss. Might be easier to just setup a i.e. BeEF hook.
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
When you're at the level Matan is at, that how you stand out from other hackers - you're able to exploit edge cases others can't.
@msalih
@msalih 4 ай бұрын
Only login csrf is enough If I understand
@Aftab700
@Aftab700 5 ай бұрын
Cool, that’s a really interesting technique! Thanks for sharing.
@cyphear02
@cyphear02 5 ай бұрын
Clever! Just a small note: The techniques in this video implies that the payload is stored. Please feel free to correct me if I'm wrong on that.
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
Yes, if your payload is reflected from the URL, you don't need the victim to be logged in to your account
@InfoSecIntel
@InfoSecIntel 5 ай бұрын
Yeah self xss is usually stored. This bug seems like it has a few requirements but still I'm going to search for a writeup when Im done watching for sure
@cyphear02
@cyphear02 5 ай бұрын
@@BugBountyReportsExplained Yes, there is also the case where it's dom based self-xss (not reflected DOM-based). So basically you input something in the page and it executes (self-XSS), but it doesn't get stored for other users. This is pretty rare, but the self-XSS case I recently ran into, and that I had in mind when I started watching this video. I can provide an example if I didn't explain that well. Great content. Cheers!
@domenicogigante4095
@domenicogigante4095 5 ай бұрын
Once the victim is logged into his own account and gets redirected to the XSS page (but where the session cookie is fixed with the attacker cookie and not the victim one), how can the self-XSS be escalated to a normal XSS in the victim context? I mean, the cookie that can be exfiltrated from that page is the attacker cookie
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
Your barely ever exploit an xss by stealing session cookie because it's usually HttpOnly. But you can still read data and send requests as the victim
@domenicogigante4095
@domenicogigante4095 4 ай бұрын
@@BugBountyReportsExplained ok now that's clear, thanks!
@trustedsecurity6039
@trustedsecurity6039 5 ай бұрын
I didnt finished the video (1/3 of it rn) but the first technique with windows.open and CSRF login is the same as bitK technique with to turn self XSS in normal XSS 🤔
@trustedsecurity6039
@trustedsecurity6039 5 ай бұрын
It is different and more complex than bitK technique but that's unecessary complex. Dont get me wrong, this is an awesome technique and this young man has just a crazy skill, better than most of hackers out there. Thank you for sharing this technique!!!
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
In 1/3 of the video, we're talking about the conventional way to exploit self-XSS which only affects confidentiality and not integrity plus you have to be on the same origin. With this technique, you can also affect integrity plus you only need to be on the same site, not same origin which means you can also exploit exotic subdomains without needing CORS.
@trustedsecurity6039
@trustedsecurity6039 5 ай бұрын
@@BugBountyReportsExplained Yeah, you're right!! I just watched the second part, and I had to play it a second time to fully grasp the concept and its impact!
@underscore-b8z
@underscore-b8z Ай бұрын
Hey, for the second technique, was setting cookies/overflowing the cookie jar being done with a separate client bug? As he didnt mention how he was able to do it
@PC-fe1pf
@PC-fe1pf 6 күн бұрын
But windows that are opened with window.open, get blocked by chrome, no? So without the user manually allowing pop ups, this would not work. Or is there a bypass? Any information is welcome. Thanks in advance!
@null4624
@null4624 5 ай бұрын
So clever. Thanks for sharing
@markusjohansson4949
@markusjohansson4949 5 ай бұрын
You can log in the victim as the attacker from a subdomain by setting a cookie scoped to the target domain and path. Just need an xss on a subdomain.
@MtnBer
@MtnBer 3 ай бұрын
Yes, and in that case you can also skip a lot steps in the attack by just setting the attacker’s session cookies with a specific path using your XSS
@nopnopnopnopnopnopnop
@nopnopnopnopnopnopnop 5 ай бұрын
Could you please link an article that explains the co conventional self-xss exploitation method you explained? I didn't quite understand how you interact with the victim's user after logging in to the attacker's user. I read through a medium article trying to understand it, but your explanation seems to be different from the article.
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
I described it some time ago on BBRE Premium: members.bugbountyexplained.com/little-known-technique-to-exploit-self-xss-with-a-serious-impact/
@forxstsombodi3043
@forxstsombodi3043 5 ай бұрын
Thanks for sharing.
@m0zA369
@m0zA369 5 ай бұрын
you should do a video of the techniques to exploit self xss because i have a lot of P5 self xss
@N4G_Arthur
@N4G_Arthur 5 ай бұрын
I think if you have a csrf there you can inject it to the victim acc
@m0zA369
@m0zA369 5 ай бұрын
@@N4G_Arthur do you have any video or blog post explain that
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
reach out to Matan or me and we'll see what we can do
@vijaysah974
@vijaysah974 5 ай бұрын
Plz Make a practical video😊​@@BugBountyReportsExplained
@trustedsecurity6039
@trustedsecurity6039 5 ай бұрын
@@m0zA369 lol that's literally what this video is about ^^
@Yuliet56
@Yuliet56 5 ай бұрын
Please Do 1 hour podcast with him like you do with other guys.
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
I surely will
@HackChey
@HackChey 5 ай бұрын
which country he is from ?
@websuraksha1600
@websuraksha1600 5 ай бұрын
Poland
@ilanpav
@ilanpav 5 ай бұрын
Israel
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
Matan is from Israel
@IllIIIIIIllll
@IllIIIIIIllll 5 ай бұрын
🧐
@aniketakhade4452
@aniketakhade4452 4 ай бұрын
Will you make any lab for this bug? I'm trying to figure out how i can make the lab. Still at some point I'm getting confused in these scenarios. mostly 2nd one looks interesting and i want to make lab for that.
@BugBountyReportsExplained
@BugBountyReportsExplained 4 ай бұрын
I'm not planning to. It's a client-side attack so you can fairly easily play with it in DevTools
@TheYasserEzzat
@TheYasserEzzat 5 ай бұрын
Genius, He thinks like a hacker with 16 years experience, He must focus on browsers hacking .
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
Remember that from 1st September, the price of BBRE Premium will go up to $128/year. As usual, every existing member will stay on their current price so if you subscribe before the price rise, you will lock that $99/year forever. To subscribe, go to bbre.dev/premium
@CyberSecHemmars
@CyberSecHemmars 4 ай бұрын
Deep down, I know the guy is good; but as a beginner i barely understand the logic here. Looking forward to upping my bug bounty game.
@GodlyTank
@GodlyTank 5 ай бұрын
Awesome 😎
@dhyeychoksi5178
@dhyeychoksi5178 5 ай бұрын
Crazy!
@Kdaddyis
@Kdaddyis 5 ай бұрын
U look like agent 47😅
@H4LF_0xH34D
@H4LF_0xH34D Ай бұрын
dang it this awesome lolll
Boost Your Bug Bounty Game: Revealing My Recon Automation Script!
34:06
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
Going full-time bug bounty, privilege escalation bugs and more with Douglas Day
1:31:16
Bug Bounty Reports Explained
Рет қаралды 10 М.
GitLab’s First Critical SSRF since 2020
17:20
Bug Bounty Reports Explained
Рет қаралды 3,7 М.
Which XSS payloads get the biggest bounties? - Case study of 174 reports
28:40
Bug Bounty Reports Explained
Рет қаралды 28 М.
IDOR - how to predict an identifier? Bug bounty case study
23:55
Bug Bounty Reports Explained
Рет қаралды 17 М.
$203,000 bounties for 4 bugs in Azure Health Bot - 2x RCE, path traversal, memory leak
10:16
Top privilege escalation techniques - bug bounty case study
22:41
Bug Bounty Reports Explained
Рет қаралды 6 М.
From zero to 6-digit bug bounty earnings in 1 year - Johan Carlsson - BBRD podcast #3
1:08:37