For those who are struggling to understand the payload, search 'CRLF Injection Attack', or visit CRLF on geeksforgeeks
@venomhacks13223 жыл бұрын
0 explanation
@2os53 жыл бұрын
true
@alonsocorrea12563 жыл бұрын
i think that you could explain the impact of this way to exploit CSRF
@mamunurrashid90223 жыл бұрын
I didn't understand why you copied session & csrfkey and save it on notepad, you didn't do anything with it later.!
@some_user69292 жыл бұрын
I'm glad you also spotted that. At 9:50 in csrfKey he should paste csrfKey from dropped in Burp's Repeater request and also from that request should copy csrf value and paste it to form .html.
@axeldelgadillo9838 Жыл бұрын
you and rana khalil are the best
@mushtaqueahmed69498 ай бұрын
Why you copied and paste csrfKey in PoC from same request. you should copy scrf from attacker request and paste in PoC
@zipp50222 жыл бұрын
my email address gets changed but still the lab isnt solved....
@rud87162 жыл бұрын
us bro us
@zipp50222 жыл бұрын
@@rud8716 the struggle is real bro, but it got solved eventually :)
@rud87162 жыл бұрын
@@zipp5022 bro what did you do, because I am also facing same problem
@zipp50222 жыл бұрын
@@rud8716 i wish i could help, but i solved it over a month ago, i dont exactly remember what happened, but it got solved, this lab is a big pain in the ass 😮💨😮💨
@JollyRogers-vp5yn Жыл бұрын
About the end of the video, in POC, you should put your csrf token on line 8 (name="csrf" value="your csrf token" This will resolve lab😊
@EmilyAnn Жыл бұрын
goddamit! this is not that difficult so why isn't this working for me??
@lie-be42774 ай бұрын
same problem. i inspected packets and realized cookie is not changing.
@hexbrokers91153 жыл бұрын
my firefox private icognito not load foxyproxy add on for proxying
@mamunurrashid90223 жыл бұрын
you need to give permission
@Fth.447 ай бұрын
Bu videodaki her şeyi defalarca yapmama rağmen bir türlü çözemedim tek tek not ediyorum nafile