CORS vulnerability with basic origin reflection (Video solution)

  Рет қаралды 33,375

Michael Sommer

Michael Sommer

Күн бұрын

Пікірлер: 15
@santiago0072002pr
@santiago0072002pr 5 жыл бұрын
there it goes: i just catch one thing in the video that I was doing wrong. I was copying the URL that the exploit server has on top instead of copying the URL from the link on the lab itself where it tells you the account details. it took me more than a week to solve this bad boy.
@quanhlazie2187
@quanhlazie2187 4 жыл бұрын
thanks a lot... same to me
@MrLafk
@MrLafk 4 жыл бұрын
How is it possible to see the admin api key if we are requesting the resource as the wiener user?
@talha7851
@talha7851 3 жыл бұрын
Yep, how does that work?
@EagleTube1337
@EagleTube1337 3 жыл бұрын
if u see clearly , it click button send to victims , the victim is administrator so the site automatically as a dummy administrator clicked and get the response there , it same way when u have the payload and just send to victim , but in reality must have to wait the victim click , in this situation that site already coded for automatically click the malicious code
@cair0_
@cair0_ 3 жыл бұрын
what is the use of /log?key= and where it's located someone help pls
@santiago0072002pr
@santiago0072002pr 5 жыл бұрын
for some reason I am doing the same steps you are doing and all i get is a resource not found on the log part of the API keys. I have been stuck in this lab for about a week now.
@levilawliet5762
@levilawliet5762 5 жыл бұрын
There has to be a problem with the URL you are pasting, if you took the code snippet from the answer section, then make sure you remove "$URL".
@ARMIN1988ARMIN
@ARMIN1988ARMIN 4 жыл бұрын
copy the url from the application page, the page where you have logged and you can see "we like to shop", the url ends with academy.net. Paste this instead of the url placeholder, and don't erase /accountDetails', true... then for sure you can see your API in the url. Once you deliver the exploit, go to the log files, check the last the urls, the one that includes administrator, also includes url encoded key, copy that, url decode, then you have got the Admin API key. Good luck.
@GauravYadav-nd9st
@GauravYadav-nd9st 4 жыл бұрын
we havent changed the id to administrator in request then how we are getting api key of admin in logs.????
@EagleTube1337
@EagleTube1337 3 жыл бұрын
if u see clearly , it click button send to victims , the victim is administrator so the site automatically as a dummy administrator clicked and get the response there , it same way when u have the payload and just send to victim , but in reality must have to wait the victim click , in this situation that site already coded for automatically click the malicious code
@ARMIN1988ARMIN
@ARMIN1988ARMIN 4 жыл бұрын
Thanks a lot Michael.
@faresmahmoud7826
@faresmahmoud7826 5 жыл бұрын
thank you my dude
@monKeman495
@monKeman495 3 жыл бұрын
"Resource%20not%20found%20-%20Academy%20Exploit%20Server"
CORS vulnerability with trusted null origin (Video solution)
5:06
Michael Sommer
Рет қаралды 10 М.
Noodles Eating Challenge, So Magical! So Much Fun#Funnyfamily #Partygames #Funny
00:33
How Much Tape To Stop A Lamborghini?
00:15
MrBeast
Рет қаралды 260 МЛН
When Cucumbers Meet PVC Pipe The Results Are Wild! 🤭
00:44
Crafty Buddy
Рет қаралды 63 МЛН
CORS vulnerability with trusted insecure protocols (Video solution)
8:02
Basic server side template injection (Video solution)
4:27
Michael Sommer
Рет қаралды 8 М.
Race Conditions: Exploiting time-sensitive vulnerabilities
5:02
Emanuele Picariello
Рет қаралды 976
Covering The Under Rated Vulnerabilities: CORS Misconfiguration #1
17:19
What is CORS?
13:22
A shot of code
Рет қаралды 68 М.
🚨 Cloudflare XSS Bypass PoC 🚨
18:11
hackwithrohit
Рет қаралды 1 М.
Noodles Eating Challenge, So Magical! So Much Fun#Funnyfamily #Partygames #Funny
00:33