Reflected XSS into HTML context with most tags and attributes blocked (Video solution, Audio)

  Рет қаралды 33,972

Michael Sommer

Michael Sommer

Күн бұрын

Пікірлер: 31
@jasonyeung2498
@jasonyeung2498 2 жыл бұрын
without explanation, why doing exactly the same from the answers? I did not get it.
@777pios
@777pios 3 жыл бұрын
I don't understand why we have to use a if this tag is not allowed and the exploit server also the onload attribute isn't allowed. I did not understand how to arrive at that solution?
@ucminhnguyen5610
@ucminhnguyen5610 3 жыл бұрын
mee too.Thanks Michael, can you explain it to us?
@JohnSmith-he5xg
@JohnSmith-he5xg 3 жыл бұрын
Agreed, this needs explanation...
@ahmedabdellaoui796
@ahmedabdellaoui796 3 жыл бұрын
exactly we need more explanation
@ahmedabdellaoui796
@ahmedabdellaoui796 3 жыл бұрын
hello 777pios below i found a video that explain the lab, enjoy : kzbin.info/www/bejne/j3-UhHaga8SWi5I
@ahmedabdellaoui796
@ahmedabdellaoui796 3 жыл бұрын
finally one of my colleagues explained it to me : there are 3 three parts in the lab : 1 : detecting wich tag and attributes are allowed ( body and on Resize ) 2 : inserting java script using the allowed tag and attribute to automatically resize the page we used the event onload ... The above is enogh to pop up the alert but on this lab it is needed to prepare also an exploitation : 3 exploitation menas we have to send a malicious url ( that is vulnerable ) to a victim, and to be able to send email, we have to use tag ( this tag will not be injected into our lab, no it's only needed to prepare the URL i.e we our victim will receive our link it starts only after https//... wich includes our allowed tag and attribute i hope my explaination help to understand it
@rev7841
@rev7841 3 жыл бұрын
how did you get %20=1 after body? and %22%3E%3C after ?search? this is not explained at all
@vasumudiraj8327
@vasumudiraj8327 3 жыл бұрын
encoded form
@ahmedabdellaoui796
@ahmedabdellaoui796 3 жыл бұрын
Hello III below i found a video that explain the lab, enjoy : kzbin.info/www/bejne/j3-UhHaga8SWi5I
@bugfinder9853
@bugfinder9853 2 жыл бұрын
may i know what is logic %20=1 ???
@paulojr1384
@paulojr1384 2 жыл бұрын
i think is couse you are saing to burp to complete the payload (%20 is backspace url encoded) so you are saing: fuzz for some workable event here
@dragoschiperi8090
@dragoschiperi8090 2 жыл бұрын
Hi! What is Portswigger's exploit server equivalent into Burp? How can this lab be resolved using only Burp? Thanks Michael!
@deepeddyrecords5933
@deepeddyrecords5933 3 жыл бұрын
Excellent work! Thank you again. I like your quick and to-the-point demonstrations. I don't know why people complain. I like to see the solutions so I can go back and research what you did on my own. I learn more that way.
@duylt5_letrongduy743
@duylt5_letrongduy743 3 жыл бұрын
why do you need to add $$ twice? because I see only Brute force has 1 variable -> add 1 $ right? Please can anyone help me understand this problem?
@Ritikamaurya112
@Ritikamaurya112 Жыл бұрын
in my burp it's showing payload count 152 & request count 0 I did the same you mentioned
@jorgsnjoroge4869
@jorgsnjoroge4869 2 жыл бұрын
It's all a mess, you aren't explaning what is what😢 what is even going on???
@securityintech
@securityintech Жыл бұрын
There is no need to add "> infront of body payload, without that as well it will work.
@LivingmotivatedLifewithpurpose
@LivingmotivatedLifewithpurpose 3 жыл бұрын
Thanks Michael, core tech stuff liked it. But it would be helpful for newbie like us if you add some explanations
@Michael10Sommer
@Michael10Sommer 3 жыл бұрын
Thank you very much. If something is unclear, I will explain it. But I always recommend, work through the topic and come back to the labs. My goal is to solve the labs as fast as possible, so you don't need a lot of time to watch the videos.
@ahmedabdellaoui796
@ahmedabdellaoui796 3 жыл бұрын
finally one of my colleagues explained it to me : there are 3 three parts in the lab : 1= detecting wich tag and attributes are allowed ( body and on Resize ) 2= inserting java script using the allowed tag and attribute to automatically resize the page we used the event onload ... The above is enogh to pop up the alert but on this lab it is needed to prepare also an exploitation : 3= exploitation means we have to send a malicious url ( that is vulnerable ) to a victim, and to be able to send URL, we have to use tag ( this tag will not be injected into our lab, no it's only needed to prepare the URL i.e our victim will receive the link and it will starts only after https//... wich includes our allowed tag and attribute and js i hope my explaination help you to understand the lab for newbies like me Below a video that explaine much about this lab, @
@ahmedabdellaoui796
@ahmedabdellaoui796 3 жыл бұрын
kzbin.info/www/bejne/j3-UhHaga8SWi5I
@huyha3684
@huyha3684 Жыл бұрын
very helpful, tks bro
@acronproject
@acronproject Жыл бұрын
very good
@mahmoudchiboub8213
@mahmoudchiboub8213 3 жыл бұрын
rana is way better
@Lunamona-qp8cg
@Lunamona-qp8cg Жыл бұрын
yes :(
Reflected XSS with some SVG markup allowed (Video solution, Audio)
7:31
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 120 МЛН
Using Custom HTML Tags to Run an XSS Attack
7:56
z3nsh3ll
Рет қаралды 6 М.
CSRF where token is tied to non-session cookie (Video solution, Audio)
10:33
These CSS PRO Tips & Tricks Will Blow Your Mind!
8:48
Coding2GO
Рет қаралды 524 М.
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН