This is the best explainer video I've found on this subject.
@nigamelastic2 жыл бұрын
just wanna say that the videos are super cool, keep up the good work
@soulgh0st3062 жыл бұрын
hi, how u get the avatar with the pink hair? keep it doing it great, happy coding
@poc0027 Жыл бұрын
thank you man this is really helpful and fun 😁
@ca79862 жыл бұрын
Amazing ❤
@bluezombie75062 жыл бұрын
Makes sense, but if we bug bounty. Should we click enter when writing the payload? Or how do we go about testing this on a website without giving every account Admin access
@azrabanu34292 жыл бұрын
nice video can you please make a video on exploiting prototype pollution in AnngularJs
@giuseppesec2 жыл бұрын
it would be the same concept. it doesn't matter the type of javascript, what matters is vulnerable merge and extend functions. which is why in this video the vulnerable module was node.extend. don't worry about the javascript type. worry about merge and extend functions. for example, look up CVE-2019-10768. it's an angularJs prototype pollution, and it looks the exact same as the payload in this video, and it arose from a vulnerable merge function
@Free.Education7862 жыл бұрын
Please make beginner to advance level practical live website hacking, live website bug hunting, live website penetration testing, live website exploitation content video series... 🙏 😊 💯✌❤💚💙💜😍😘🤝