Médusa you’re just the best. Your explanations of complex processes are second to none. Please keep up with this series. This is a real gem 💎
@Medusa0xf4 ай бұрын
Means a lot 💚
@abdullahjaved23714 ай бұрын
The time it'd have taken to edit this, goddamn. Keep up the content meds.
@Medusa0xf4 ай бұрын
Thanks ❤
@bughunter907228 күн бұрын
Wow ❤nice explanation
@Medusa0xf25 күн бұрын
Thanks!
@amoh964 ай бұрын
i really like this type of video really cool keep it like this simple and give us examples thank u
@Medusa0xf4 ай бұрын
glad!
@crueljed15 ай бұрын
Nice explanation ❤
@Medusa0xf4 ай бұрын
Hope it helped!
@jxkz74 ай бұрын
Great content ❤
@Medusa0xf4 ай бұрын
thank you!
@IBO.ATTACKS4 ай бұрын
شكرا؟ = thanks 🤩
@thechannelofmine4 ай бұрын
The second report is closed as informative that means it's not a valid bug. for this to be impactful the attacker has to redirect the user to his malicious page than steal those tokens using the Referer header from the victim request.
@Medusa0xf4 ай бұрын
that's another case in itself 😄
@thechannelofmine4 ай бұрын
@@Medusa0xf If you take a look again at the report you will see that it's closed as informative that means it's not a vulnerability, as he didn't show a real exploit senario, and it's not vulnerable to man-in-the-middle attack because it's secured as https method. Btw are you active on hackerone?