Reflected XSS into HTML context with most tags and attributes blocked | portswigger

  Рет қаралды 4,930

Dpoint

Dpoint

Күн бұрын

Пікірлер
@rolobull
@rolobull 2 жыл бұрын
Thanks mate. Very well explained. Lot better than the one posted in the official portswigger.
@mayankchauhan4788
@mayankchauhan4788 3 жыл бұрын
Great explaination!!This is the only video with proper explaination of tags and attributes used.!!
@Dpoint0
@Dpoint0 3 жыл бұрын
Glad you liked it :)
@karthikmp5590
@karthikmp5590 3 жыл бұрын
I was so confused when I was solving labs..... Every video I saw all they did was just copy n paste the solution ....I saw your video... You explanation was on point🔥👌... And my doubts are clear now.... Good work.... And please make videos on all labs and make it a playlist... It will be a great help bro✌️👍
@Dpoint0
@Dpoint0 3 жыл бұрын
Thanks buddy
@JohnBuggy
@JohnBuggy 4 жыл бұрын
Nice one matey....fell right in to that bear trap you described!! THANKS!!
@Dpoint0
@Dpoint0 4 жыл бұрын
Haha yeah silly thing
@jorgsnjoroge4869
@jorgsnjoroge4869 2 жыл бұрын
Perfect explanation 👌
@ahmedkasmi7194
@ahmedkasmi7194 2 жыл бұрын
the best explantion ever thanks mate plz rock on
@manikeshtechtube4490
@manikeshtechtube4490 3 жыл бұрын
I'm thankful to you, i found many solution for this but I couldn't find a proper explanation
@Dpoint0
@Dpoint0 3 жыл бұрын
do subscribe to support, glad it was helpful
@HarshSenpaiRocks
@HarshSenpaiRocks 3 жыл бұрын
Great Great Explanation and Really Like your Thought Process.
@Dpoint0
@Dpoint0 3 жыл бұрын
Please do subscribe and share mate :)
@itsm3dud39
@itsm3dud39 3 жыл бұрын
does reflected xss show in POST?
@Esola11
@Esola11 3 жыл бұрын
thank you man for this detailed explanation
@ahmedabdellaoui796
@ahmedabdellaoui796 3 жыл бұрын
thanks for the explanation can you please explain to me why we used
@Dpoint0
@Dpoint0 3 жыл бұрын
here block means the tags which are handled by the developer so cant use them to intrude. hence found out that is something which is not handler by the code hence used that tag for intruding.
@MalluDiscoveryTV
@MalluDiscoveryTV 3 жыл бұрын
thanks :)
@randomtrends1545
@randomtrends1545 3 жыл бұрын
clearly explained great keep doing
@maheshpatel9435
@maheshpatel9435 4 жыл бұрын
Very well explained, plz make more videos on port swigger labs
@Dpoint0
@Dpoint0 4 жыл бұрын
Sure I will thank you #dpoint
@sisirkantabehera1035
@sisirkantabehera1035 3 жыл бұрын
How run two application side by side on kali??
@Dpoint0
@Dpoint0 3 жыл бұрын
Use terminal to run apps , or webapps drag side by side manually If I didn't answer you properly Can you reprashe your question
@chamathblack9203
@chamathblack9203 3 жыл бұрын
Well explained. Thanks
@nmahesh7498
@nmahesh7498 4 жыл бұрын
good content and great effort
@Dpoint0
@Dpoint0 4 жыл бұрын
Thanks mate
@bongamerzz1898
@bongamerzz1898 4 жыл бұрын
Your videos are an excellent addition to my Bug Bounty curriculum. Thanks for all the efforts. Keep up ! BTW while configuring the attack in 'Target' tab, using the HTTPS checkbox depends on the protocol of the website right?
@Dpoint0
@Dpoint0 4 жыл бұрын
yes bonny, and thanks for appreciative comment
@Beast-cc7xd
@Beast-cc7xd 3 жыл бұрын
Good videos man . I have a question : why in the minute 8:40 you put %20 next to the body? thanks man your videos are amazing
@Dpoint0
@Dpoint0 3 жыл бұрын
thats url encoded format of space
@Beast-cc7xd
@Beast-cc7xd 3 жыл бұрын
@@Dpoint0 thanks for your response , awsome videos !
@Stas1983ful
@Stas1983ful 2 жыл бұрын
Does we use this exploit server for send link (with this ) to victim/ and when victim open link in browser, his cookie will stealling?
@Dpoint0
@Dpoint0 2 жыл бұрын
Right that is basically executing something on client machine
@Stas1983ful
@Stas1983ful 2 жыл бұрын
@@Dpoint0 thank you bro :)
@darkdevil3167
@darkdevil3167 3 жыл бұрын
must have start and end tag right????
@ashwanipayal5635
@ashwanipayal5635 2 жыл бұрын
any luck on ur question // i m also having same impression .
@a.k.7605
@a.k.7605 4 жыл бұрын
great video.. thank you..!!
@Dpoint0
@Dpoint0 4 жыл бұрын
:) welcome
@nimaasadi730
@nimaasadi730 2 жыл бұрын
you teach very nice please add subtitle for your videos
@muhammadhuzaifa8570
@muhammadhuzaifa8570 3 жыл бұрын
nice video bro.
@officialwootz
@officialwootz 3 жыл бұрын
Nice explanation Bro :)
@Dpoint0
@Dpoint0 3 жыл бұрын
Glad you liked it! :)
@rahulshah1559
@rahulshah1559 4 жыл бұрын
i still dont get it, what is the purpose of exploit server and how/why does it work
@Dpoint0
@Dpoint0 4 жыл бұрын
I think i replied to this previously, but if still, doubt persist you can post here maybe: portswigger.net/support - even I will follow the post bro
@rahulshah1559
@rahulshah1559 4 жыл бұрын
@@Dpoint0 thanks bro, im on streak of solving portswiggers labs, i would really love to have a bit of your guidance. you own any discord servers or community?
@Dpoint0
@Dpoint0 4 жыл бұрын
Bro even I am new bie, so yeah we can discuss. you can find discord link in about section
@mdyiaz6138
@mdyiaz6138 3 жыл бұрын
where did you get this code??
@Dpoint0
@Dpoint0 3 жыл бұрын
its in the portswigger solution
@purvashgangolli5968
@purvashgangolli5968 3 жыл бұрын
thank you so much bro
@Dpoint0
@Dpoint0 3 жыл бұрын
Always welcome
@jessy6922
@jessy6922 3 жыл бұрын
well explained
@Dpoint0
@Dpoint0 3 жыл бұрын
Thanks mate 😊
@mohamedabuelyouser3632
@mohamedabuelyouser3632 3 жыл бұрын
great man keep going
@Dpoint0
@Dpoint0 3 жыл бұрын
Glad you like it mate :)
@recon0x095
@recon0x095 3 жыл бұрын
awesome explanation bro Can you explain this - > "Reflected XSS with event handlers and href attributes blocked" from portswigger.
@Dpoint0
@Dpoint0 3 жыл бұрын
if its not part of playlist, means the concept is similar to something already covered. Let me know if you are struck anywhere. Will surely help you :)
@AhmedSalah-fi3dt
@AhmedSalah-fi3dt 4 жыл бұрын
what is the purpose of =100
@Dpoint0
@Dpoint0 4 жыл бұрын
can you provide timestamp
@AhmedSalah-fi3dt
@AhmedSalah-fi3dt 4 жыл бұрын
@@Dpoint0 9:35
@AhmedSalah-fi3dt
@AhmedSalah-fi3dt 4 жыл бұрын
And also idont understand what is the purpose of exploit server
@Dpoint0
@Dpoint0 4 жыл бұрын
@@AhmedSalah-fi3dt as i have mentioned on 7:43 to get in attr=value format I used 100 as value, you can use anything, just we want our payload in the proper format, And exploit server means server in which attackers code is present, that is server is compromised and will affect the end-user
@kranelcubic1286
@kranelcubic1286 3 жыл бұрын
finally you cutted your hair
@Dpoint0
@Dpoint0 3 жыл бұрын
haha have a good day ahead
@ashwanipayal5635
@ashwanipayal5635 2 жыл бұрын
hi good explaination , but please advise for tag should look like this ....but if we dcode the solution it come like this : " onload=this.style.width='100px' my question is why on load and on resize attribute did not come inside opening tag of i frame . they are coming after opening tag and also i do not see any closing tag for i frame also. also , could not understand the purpose of double quote after print function.
Beat Ronaldo, Win $1,000,000
22:45
MrBeast
Рет қаралды 158 МЛН
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
GoogleCTF - Cross-Site Scripting "Pasteurize"
29:21
John Hammond
Рет қаралды 98 М.
Script Gadgets! Google Docs XSS Vulnerability Walkthrough
18:57
LiveOverflow
Рет қаралды 143 М.
PortSwigger Labs - Reflected XSS in canonical link tag
9:33
Two solutions for the January 2021 Initigriti XSS Challenge
25:52
The Genius Way Computers Multiply Big Numbers
22:04
PurpleMind
Рет қаралды 185 М.
Reflected XSS || Live demo
11:56
Sathvik Techtuber
Рет қаралды 2,3 М.