Find XSS the easy way! Dalfox - Hacker Tools

  Рет қаралды 26,629

Intigriti

Intigriti

Күн бұрын

Пікірлер: 65
@黑客-c6c
@黑客-c6c 2 жыл бұрын
This is the best xs software i have ever seen I really feel great!
@intigriti
@intigriti 2 жыл бұрын
Great! Any cool finds with it yet?
@tbjehad106
@tbjehad106 Жыл бұрын
why i didn't get the ditails over view step by step after scan. it just says issue 6 thats it .but didn't said me the vulnerability, the step and payload the tool user for to find this . but in this video you shows us its tell all the step
@Rogerson112
@Rogerson112 3 ай бұрын
Hello. Is this true that all automatic tools only find easy vulnerability? What about XSS that to achieve it we need to bypass CSP, WAF etc. If exist can you recommend some advanced scanners for example xss, sqli ?
@intigriti
@intigriti 3 ай бұрын
The general rule is; if it can be found with an automated scanner, then it would of already been found by one of the however many thousand people who ran that scan before you 😉
@Dhruv-te6dy
@Dhruv-te6dy Жыл бұрын
in video you say file containing all your endpoints means all URLs with parameters am i right? (time stamp 04:50)
@intigriti
@intigriti Жыл бұрын
Hmmm I didn't make this video so not 100% but generally when we say endpoint it's like "login endpoint = /login", "register endpoint = /register", "api endpoint = /api" etc
@Dhruv-te6dy
@Dhruv-te6dy Жыл бұрын
@@intigriti ok got it thanks
@william_ade
@william_ade 2 жыл бұрын
Thanks really appreciated!
@intigriti
@intigriti 2 жыл бұрын
Glad it helped!
@tomjohnes5030
@tomjohnes5030 3 жыл бұрын
This is definitely fire. But how to we hide its signature ? I see Dalfox populated on my testing machine logs. Not stealthy
@intigriti
@intigriti 3 жыл бұрын
It is most likely the user-agent that your seeing. Check the Dalfox help page to look up how to change it!
@CameronNoakes
@CameronNoakes 2 жыл бұрын
I can't run the tool how do you run it I get dalfox not a command
@intigriti
@intigriti 2 жыл бұрын
You first need to install dalfox. Look at the blog post in the description to find out how!
@malikimranawan3762
@malikimranawan3762 3 жыл бұрын
Can it work in finding real bug ? Bcz finding Bugs manually is much difficult ...
@intigriti
@intigriti 3 жыл бұрын
It can definitely help you!
@jimgrayson4828
@jimgrayson4828 Жыл бұрын
Think locally bro not just wan think Lan
@itsm3dud39
@itsm3dud39 3 жыл бұрын
can you suggest some other tools like this?
@intigriti
@intigriti 3 жыл бұрын
We'll cover some more in the future!
@itsm3dud39
@itsm3dud39 3 жыл бұрын
@@intigriti ok
@william_ade
@william_ade 2 жыл бұрын
What bistro of Linux are u using (love it) ?
@intigriti
@intigriti 2 жыл бұрын
I'm using Kali Linux!
@gurvirsingh4190
@gurvirsingh4190 3 жыл бұрын
Great 🔥
@intigriti
@intigriti 3 жыл бұрын
Thanks!! 🔥
@jishan3201
@jishan3201 2 жыл бұрын
@Gurvir singh Bhai har jagah yahi comment karte ho kya.. 😀😀😀 .
@youngheej8432
@youngheej8432 3 жыл бұрын
So cool hahwul!!!!!!!!!
@intigriti
@intigriti 3 жыл бұрын
We also like him 😇
@Life-M77
@Life-M77 3 жыл бұрын
Super sir
@intigriti
@intigriti 3 жыл бұрын
🙏
@rookie1913
@rookie1913 3 жыл бұрын
Great~
@intigriti
@intigriti 3 жыл бұрын
Thanks!
@ratmoneyg
@ratmoneyg Жыл бұрын
Does this still work?
@intigriti
@intigriti Жыл бұрын
The repo is still active, so if it's not working you can always raise an issue: github.com/hahwul/dalfox/issues
@ratmoneyg
@ratmoneyg Жыл бұрын
@@intigriti yeah I just can’t figure out how to install it. I tried for a while yesterday but gave up lol
@hahwul
@hahwul 3 жыл бұрын
😍😎
@intigriti
@intigriti 3 жыл бұрын
Thanks for the amazing tool!
@techfunky9583
@techfunky9583 2 жыл бұрын
Bruh how to run the assetfinder command
@intigriti
@intigriti 2 жыл бұрын
What timestamp are you referring to?
@lethalleet
@lethalleet 3 жыл бұрын
First comment again 🔥
@intigriti
@intigriti 3 жыл бұрын
Legend!
@lethalleet
@lethalleet 3 жыл бұрын
I need virtual tour of Intigriti office 🌞
@mukto2004
@mukto2004 Жыл бұрын
Does it also work with xss in input forms? Like comment
@intigriti
@intigriti Жыл бұрын
As far as I'm aware, it does!
@Dhruv-te6dy
@Dhruv-te6dy Жыл бұрын
@@intigriti but how can you give some example for it ?
@intigriti
@intigriti Жыл бұрын
check this example: media.geeksforgeeks.org/wp-content/uploads/20210723203017/Example1minmin.jpg which came from www.geeksforgeeks.org/dalfox-parameter-analysis-and-xss-scanning-tool
@meljithpereira5532
@meljithpereira5532 3 жыл бұрын
Y you dalfox is so fast ..??
@intigriti
@intigriti 3 жыл бұрын
Hi, for more information on the internals of the tool, feel free to check out the GitHub page and ask there!
@learnfirst-1
@learnfirst-1 2 жыл бұрын
it dosen't found xss hard challanges ...🤣🤣 specially html encoding or other escape function
@intigriti
@intigriti 2 жыл бұрын
Yes, true. That's normal, no tool would be able to solve those!
@AkashPatel-zd4wf
@AkashPatel-zd4wf 10 ай бұрын
one of the worst tool i ever encounter in bug bounty
@intigriti
@intigriti 10 ай бұрын
😆
@som3one0
@som3one0 Жыл бұрын
it is not accurate
@intigriti
@intigriti Жыл бұрын
I'm sorry! What's not accurate?
@som3one0
@som3one0 Жыл бұрын
@@intigriti result
@jishan3201
@jishan3201 2 жыл бұрын
I scan testvul.php site with gau which gave me 2800 urls then scan all those with kxss which gave me 19 vulnerable urls which I gave them to dalfox but it did not find anything. I checked manualy and they were all vunerable. Why this happend. Is this tool realy helpfull.?
@intigriti
@intigriti 2 жыл бұрын
Be sure to submit this to the tool's GitHub page, so the creator can use it to improve the tool!
@Free.Education786
@Free.Education786 2 жыл бұрын
What to do after getting alert(XSS); pop-up because pop-up with cookies 🍪 or document.domain(); pop-up is not suitable to receive bug bounty rewards. Please guide how to escalate reflected XSS to higher levels to earn bounties on hackerOne BugCrowd intigrity etc. Thanks 😊 🤝❤️💫💐😘🥰🌺💥💯👍
@intigriti
@intigriti 2 жыл бұрын
Unless on a sandbox domain or static page, an XSS should allow you to get a bounty on Intigriti.
@writecode9932
@writecode9932 3 жыл бұрын
Nice one... Thanks for sharing (rahulsl)
@intigriti
@intigriti 3 жыл бұрын
Glad you liked it! 😇
Hack EVERY API! KiteRunner - Hacker Tools
8:00
Intigriti
Рет қаралды 26 М.
Insanely fast parameter enumeration! Arjun - Hacker Tools
11:54
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН
Enumerating 100 targets at once! Meg - Hacker Tools
8:30
Intigriti
Рет қаралды 8 М.
Hacking the past! Waybackurls - Hacker Tools
6:00
Intigriti
Рет қаралды 7 М.
$XX,000 Airbnb impossible XSS with 4 bypasses
9:15
Bug Bounty Reports Explained
Рет қаралды 29 М.
Finding Your First Bug: Cross Site Scripting (XSS)
13:49
InsiderPhD
Рет қаралды 35 М.
Automatic Vulnerability Scanner! Nuclei - Hacker Tools
9:14
Intigriti
Рет қаралды 27 М.
Detecting & Exploiting Cross-Site Scripting (XSS)
11:33
Tyler Ramsbey || Hack Smarter
Рет қаралды 3,2 М.
Which XSS payloads get the biggest bounties? - Case study of 174 reports
28:40
Bug Bounty Reports Explained
Рет қаралды 28 М.
Missing HTTP Security Headers - Bug Bounty Tips
15:48
LiveOverflow
Рет қаралды 143 М.
XSS Testing methodology demonstrated
7:53
The XSS rat
Рет қаралды 12 М.
DO NOT USE alert(1) for XSS
12:16
LiveOverflow
Рет қаралды 166 М.