Lab: SameSite Strict BYPASS via sibling domain (no Burp Collaborator needed!)

  Рет қаралды 5,393

Jarno Timmermans

Jarno Timmermans

Күн бұрын

Пікірлер: 17
@jonnywoo8418
@jonnywoo8418 Ай бұрын
Thank you so much It's still works in 2024!
@netletic
@netletic Жыл бұрын
hi everyone! Here's the timestamps for this video: 00:00 - Intro 00:29 - View SameSite=strict Session Cookie 00:53 - Confirm WebSocket replies with entire chat history after READY message 01:35 - Confirm WebSocket is vulnerable to CSRF 02:19 - Discover our initial payload 03:25 - Write our initial payload 04:27 - Deliver our initial payload 05:25 - How we could bypass the SameSite=strict limitation 06:16 - Identify the sibling domain 06:52 - Confirm Reflected XSS vulnerability within sibling domain 07:29 - Login endpoint also accepts GET requests 07:45 - Try our initial payload via the sibling domain + reflected XSS 08:21 - Deliver our final payload to the victim 09:14 - Copy and clean the victim's base64 encoded chat logs 09:45 - View the decoded chat logs and solve the labs
@gopikanna_
@gopikanna_ Жыл бұрын
Thank you for the amazing walkthrough..!
@netletic
@netletic Жыл бұрын
thank you @gopikanna_! ☺️
@Андрій-ь1э
@Андрій-ь1э 2 күн бұрын
thank you
@Jonathan-ng4vw
@Jonathan-ng4vw Жыл бұрын
Nice explaination, thanks.
@netletic
@netletic Жыл бұрын
Cheers @Jonathan-ng4vw!
@system_null
@system_null Жыл бұрын
Hii. ur underrated
@netletic
@netletic Жыл бұрын
thanks null! ☺️
@kallikantzaros
@kallikantzaros 9 ай бұрын
thank you very much
@LMeasy
@LMeasy 4 ай бұрын
it doesnt work anymore, request is made only to /exploit by victim. something is not okay with the strict value, because if I visit URL manually then message is shown in logs, but if delivered to victim not
@Th3psalm1st
@Th3psalm1st 3 ай бұрын
Yes it doesn't work. Can't see the bases64 values in the access log. The same for "SameSite Strict bypass via sibling domain" Lab. I think you must get burp pro to solve this now. Did you find another way?
@LMeasy
@LMeasy 3 ай бұрын
@@Th3psalm1st on the next day I tried again with newly created lab environment and worked fine. I guess somehow after a while the simulation of visitors gets buggy in the lab. Maybe if you try this hope this helps. I had like 3 labs like this where i could not finish due to exploit server bugs, and on the next day I tried same payload and worked xd
@acronproject
@acronproject Жыл бұрын
very good thanks
@netletic
@netletic Жыл бұрын
Thank you @acronproject!
@Nul1Secur1ty
@Nul1Secur1ty 4 ай бұрын
Yep ;) 😘
@alperkaya8919
@alperkaya8919 15 күн бұрын
I had a different and better solution but because of exploit server, it didnt work.
Lab: CSRF with SameSite Strict BYPASS via client-side redirect
9:02
Jarno Timmermans
Рет қаралды 4,6 М.
PRANK😂 rate Mark’s kick 1-10 🤕
00:14
Diana Belitskay
Рет қаралды 8 МЛН
БУ, ИСПУГАЛСЯ?? #shorts
00:22
Паша Осадчий
Рет қаралды 1,8 МЛН
Who's spending her birthday with Harley Quinn on halloween?#Harley Quinn #joker
01:00
Harley Quinn with the Joker
Рет қаралды 22 МЛН
小丑揭穿坏人的阴谋 #小丑 #天使 #shorts
00:35
好人小丑
Рет қаралды 48 МЛН
SameSite Strict bypass via sibling domain
3:43
Bug Bounty España
Рет қаралды 1,1 М.
CSRF - Lab #8 CSRF with broken Referer validation | Short Version
12:09
SameSite Strict bypass via sibling domain - Lab#09
31:49
Mohd Badrudduja
Рет қаралды 172
Улучшил свой айфон!
0:17
По ту сторону Гугла
Рет қаралды 2,8 МЛН
Кто-то купил WinRar? #shorts #шортс #новости #факты
0:53
This is Хорошо
Рет қаралды 4,2 МЛН
iPhone or Samsung?
0:18
ARSTANOTT
Рет қаралды 4,2 МЛН
Is this the latest iPhone model#shorts
0:13
Si pamerR
Рет қаралды 1,4 МЛН