CORS - Lab #4 CORS vulnerability with internal network pivot attack | Long Video

  Рет қаралды 3,967

Rana Khalil

Rana Khalil

Күн бұрын

Пікірлер
@cyberfiles8076
@cyberfiles8076 10 ай бұрын
Regarding the XSS, you CAN actually test this on the page we have access to, if you change the request method to GET. It may not have been the case when this video was recorded, as I notice some other small differences in the lab since the video came out. What made me try it was the fact that Rana herself uses a GET request to send the XSS payload. Thanks for the videos!
@GilligansTravels
@GilligansTravels 2 жыл бұрын
Looking forward to the course!
@GilligansTravels
@GilligansTravels 2 жыл бұрын
Reason 4 sold me!
@mackeman1356
@mackeman1356 2 жыл бұрын
thanks, you did great.
@yazeedsalahat9227
@yazeedsalahat9227 Жыл бұрын
i dont have burpsuite pro
@HassanRaza-ek3mv
@HassanRaza-ek3mv Жыл бұрын
Sorry, i could not understand this lab.
@TheBroadwood
@TheBroadwood 2 жыл бұрын
Hey Rana, i think that your code to fetch the csrf-token does not work properly. I tested it by sending the csrf token parsed from the HTML response to my burp collaborator instead of sending foundXSS=1. I found this out by doing the XSS labs and had to extract an csrf token to pass the lab and i failed using your function. PoC: (1) Your text.match(/csrf" value="([^"]+)"/) function xss_vector = '">'; leads to request to collaborator: GET /?csrf%22 HTTP/1.1 (2) Extracting the 2nd position [1] out of the resulting array from the match() function. xss_vector = '">'; or alternative xss_vector = '">'; will both lead to request to collaborator: GET /?GB9mbYqJlmG7smrWCl8g051Hlmxx35TJ HTTP/1.1 Nonethless this particular lab will still be solved with an invalid csrf token since it does not validate/need any credentials or tokens in order to delete the carlos user.
@xnns8195
@xnns8195 2 жыл бұрын
text.match() is a javascript function and it is passed as src attribute of img tag i dont know what is she trying to do.....
@yazeedsalahat9227
@yazeedsalahat9227 Жыл бұрын
i don't have burpsuite pro .. what can i use to solve this lab
@coffinplayz
@coffinplayz Жыл бұрын
​@@yazeedsalahat9227use crack burp
Cross-Origin Resource Sharing (CORS) | Complete Guide
52:17
Rana Khalil
Рет қаралды 75 М.
Long Nails 💅🏻 #shorts
00:50
Mr DegrEE
Рет қаралды 17 МЛН
Thank you Santa
00:13
Nadir Show
Рет қаралды 40 МЛН
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 154 МЛН
Making $$$ with Clickjacking
7:02
Farah Hawa
Рет қаралды 11 М.
CSRF - Lab #1 CSRF vulnerability with no defenses | Short Version
11:41
Hands-on guide to CORS
9:31
The Cyber Mentor
Рет қаралды 6 М.
Clickjacking - Hacking Web Application UIs
8:01
The Cyber Mentor
Рет қаралды 17 М.
Long Nails 💅🏻 #shorts
00:50
Mr DegrEE
Рет қаралды 17 МЛН