Thanks mate. Very well explained. Lot better than the one posted in the official portswigger.
@mayankchauhan47883 жыл бұрын
Great explaination!!This is the only video with proper explaination of tags and attributes used.!!
@Dpoint03 жыл бұрын
Glad you liked it :)
@karthikmp55903 жыл бұрын
I was so confused when I was solving labs..... Every video I saw all they did was just copy n paste the solution ....I saw your video... You explanation was on point🔥👌... And my doubts are clear now.... Good work.... And please make videos on all labs and make it a playlist... It will be a great help bro✌️👍
@Dpoint03 жыл бұрын
Thanks buddy
@JohnBuggy4 жыл бұрын
Nice one matey....fell right in to that bear trap you described!! THANKS!!
@Dpoint04 жыл бұрын
Haha yeah silly thing
@jorgsnjoroge48692 жыл бұрын
Perfect explanation 👌
@ahmedkasmi71942 жыл бұрын
the best explantion ever thanks mate plz rock on
@manikeshtechtube44903 жыл бұрын
I'm thankful to you, i found many solution for this but I couldn't find a proper explanation
@Dpoint03 жыл бұрын
do subscribe to support, glad it was helpful
@HarshSenpaiRocks3 жыл бұрын
Great Great Explanation and Really Like your Thought Process.
@Dpoint03 жыл бұрын
Please do subscribe and share mate :)
@itsm3dud393 жыл бұрын
does reflected xss show in POST?
@Esola113 жыл бұрын
thank you man for this detailed explanation
@ahmedabdellaoui7963 жыл бұрын
thanks for the explanation can you please explain to me why we used
@Dpoint03 жыл бұрын
here block means the tags which are handled by the developer so cant use them to intrude. hence found out that is something which is not handler by the code hence used that tag for intruding.
@MalluDiscoveryTV3 жыл бұрын
thanks :)
@randomtrends15453 жыл бұрын
clearly explained great keep doing
@maheshpatel94354 жыл бұрын
Very well explained, plz make more videos on port swigger labs
@Dpoint04 жыл бұрын
Sure I will thank you #dpoint
@sisirkantabehera10353 жыл бұрын
How run two application side by side on kali??
@Dpoint03 жыл бұрын
Use terminal to run apps , or webapps drag side by side manually If I didn't answer you properly Can you reprashe your question
@chamathblack92033 жыл бұрын
Well explained. Thanks
@nmahesh74984 жыл бұрын
good content and great effort
@Dpoint04 жыл бұрын
Thanks mate
@bongamerzz18984 жыл бұрын
Your videos are an excellent addition to my Bug Bounty curriculum. Thanks for all the efforts. Keep up ! BTW while configuring the attack in 'Target' tab, using the HTTPS checkbox depends on the protocol of the website right?
@Dpoint04 жыл бұрын
yes bonny, and thanks for appreciative comment
@Beast-cc7xd3 жыл бұрын
Good videos man . I have a question : why in the minute 8:40 you put %20 next to the body? thanks man your videos are amazing
@Dpoint03 жыл бұрын
thats url encoded format of space
@Beast-cc7xd3 жыл бұрын
@@Dpoint0 thanks for your response , awsome videos !
@Stas1983ful2 жыл бұрын
Does we use this exploit server for send link (with this ) to victim/ and when victim open link in browser, his cookie will stealling?
@Dpoint02 жыл бұрын
Right that is basically executing something on client machine
@Stas1983ful2 жыл бұрын
@@Dpoint0 thank you bro :)
@darkdevil31673 жыл бұрын
must have start and end tag right????
@ashwanipayal56352 жыл бұрын
any luck on ur question // i m also having same impression .
@a.k.76054 жыл бұрын
great video.. thank you..!!
@Dpoint04 жыл бұрын
:) welcome
@nimaasadi7302 жыл бұрын
you teach very nice please add subtitle for your videos
@muhammadhuzaifa85703 жыл бұрын
nice video bro.
@officialwootz3 жыл бұрын
Nice explanation Bro :)
@Dpoint03 жыл бұрын
Glad you liked it! :)
@rahulshah15594 жыл бұрын
i still dont get it, what is the purpose of exploit server and how/why does it work
@Dpoint04 жыл бұрын
I think i replied to this previously, but if still, doubt persist you can post here maybe: portswigger.net/support - even I will follow the post bro
@rahulshah15594 жыл бұрын
@@Dpoint0 thanks bro, im on streak of solving portswiggers labs, i would really love to have a bit of your guidance. you own any discord servers or community?
@Dpoint04 жыл бұрын
Bro even I am new bie, so yeah we can discuss. you can find discord link in about section
@mdyiaz61383 жыл бұрын
where did you get this code??
@Dpoint03 жыл бұрын
its in the portswigger solution
@purvashgangolli59683 жыл бұрын
thank you so much bro
@Dpoint03 жыл бұрын
Always welcome
@jessy69223 жыл бұрын
well explained
@Dpoint03 жыл бұрын
Thanks mate 😊
@mohamedabuelyouser36323 жыл бұрын
great man keep going
@Dpoint03 жыл бұрын
Glad you like it mate :)
@recon0x0953 жыл бұрын
awesome explanation bro Can you explain this - > "Reflected XSS with event handlers and href attributes blocked" from portswigger.
@Dpoint03 жыл бұрын
if its not part of playlist, means the concept is similar to something already covered. Let me know if you are struck anywhere. Will surely help you :)
@AhmedSalah-fi3dt4 жыл бұрын
what is the purpose of =100
@Dpoint04 жыл бұрын
can you provide timestamp
@AhmedSalah-fi3dt4 жыл бұрын
@@Dpoint0 9:35
@AhmedSalah-fi3dt4 жыл бұрын
And also idont understand what is the purpose of exploit server
@Dpoint04 жыл бұрын
@@AhmedSalah-fi3dt as i have mentioned on 7:43 to get in attr=value format I used 100 as value, you can use anything, just we want our payload in the proper format, And exploit server means server in which attackers code is present, that is server is compromised and will affect the end-user
@kranelcubic12863 жыл бұрын
finally you cutted your hair
@Dpoint03 жыл бұрын
haha have a good day ahead
@ashwanipayal56352 жыл бұрын
hi good explaination , but please advise for tag should look like this ....but if we dcode the solution it come like this : " onload=this.style.width='100px' my question is why on load and on resize attribute did not come inside opening tag of i frame . they are coming after opening tag and also i do not see any closing tag for i frame also. also , could not understand the purpose of double quote after print function.