Great explanation of why this attack works... so many others just post the script as their "solution" without explaining how to get there. Thank you!!
@التدريسالالكتروني Жыл бұрын
man you are amazing in explaining !! please continue solving labs
@东倪 Жыл бұрын
Your explanation is very insightful, thank you
@krishgohel9403 Жыл бұрын
what an explaination bro 😇 so underrated channel
@OhmKumar-j5f10 ай бұрын
awesome explanation dude cleared all doubts please cover all labs of xss
@ggm3743 Жыл бұрын
what a wonderful explanation! How did you become this good in html, js...? I am trying to break into bug hunting but I dont know how much js should i actually learn? I know (university-level) C, Java and Python so its easier to understand Js for me now. Should i learn js and train on Portwigger labs at the same time or what would you recommend? Thank you :)
@nimaasadi730 Жыл бұрын
Great explanation with great teaching
@solvedandlearned387811 ай бұрын
Is it necessary to have the tabindex even if we include our id value in the url hash.?
@anamariedevera86359 ай бұрын
I love your channel
@amol24by7 Жыл бұрын
Awesome explanation
@pinkypink2410 Жыл бұрын
very useful,thank you!
@yuraekim9389 Жыл бұрын
You are really good! Thank you
@nayar_km8 ай бұрын
awesome explanation
@التدريسالالكتروني Жыл бұрын
please make a video about this lab Reflected XSS in a JavaScript URL with some characters blocked
@imgyanesh_05 ай бұрын
I am also doing same as you but after open xss.html page it write refused to connect What can I do sir
@mukoshmanob9240 Жыл бұрын
sir, how will you know that 'onload' event not work? how i understand
@lIlIllll1 Жыл бұрын
YOU ARE GREAT
@youssefblt983910 ай бұрын
thank s for the explaination too
@sscoconut126510 ай бұрын
what does the # mean bro? does it mean calling a specific id?
@Shaik_Afrid Жыл бұрын
bro how ur doing this i mean in order to understand all these stuff how much js should i learn
@knowledgeboxbd96252 жыл бұрын
How you know that this search box is vulnerable to tabintex?
@CodeVerd2 жыл бұрын
When u use custom payload ,and if you know it's vulnerable, mostly u must use "tabindex" .In real world we need to check if tabindex is allowed or not
@knowledgeboxbd96252 жыл бұрын
@@CodeVerd Thanks bro now i understand .🥰
@CodeVerd2 жыл бұрын
@@knowledgeboxbd9625 ♥️
@abhishekbiswakarma1541 Жыл бұрын
brother i am using the same payload but the lab is not solving
@warwolf5154 Жыл бұрын
yes form also its not working
@ginsteward96732 жыл бұрын
thanks my bro. it's usefull
@CodeVerd2 жыл бұрын
Thanks mate
@محمّد.09 Жыл бұрын
nice
@cyber_torhat Жыл бұрын
I feel like you say "Let's get started" intentionally in a slightly different way. Lol