Why you should never use eval() in JavaScript. Reflected DOM XSS Attack.

  Рет қаралды 16,153

z3nsh3ll

z3nsh3ll

Күн бұрын

Пікірлер: 30
@anonn437
@anonn437 Жыл бұрын
Man I can't explain how thankful I am for your videos. Most people just copy paste the solution and tell you that this is how you should do it.But you my friend explains it very well.This is really a super underrated channel and I wish you had a wide audience. Again thanks my friend, have good day!
@eduardofernandez6132
@eduardofernandez6132 10 ай бұрын
thats true, best explanation ive seen even amongst the paid courses and etc, im been watching the videos thought Burp Academy, but i ll probably watch all the other contents as well, im currently working on OSWE certification and the way you explain thing is 1000 times better
@blablabla8133
@blablabla8133 9 ай бұрын
SICK explanation, Jesus, at first i was so confused but after you explained it, everything became so clear. THANK YOU SO MUCH.
@aliaali4619
@aliaali4619 7 ай бұрын
oh my god!!! i'm learning from your explanation more than port swigger labs. i really appreciate this great strength and patience in teaching from the basics. please make more and more videos in other types of owasp vulns in P.S labs. we need this. your're awesome man!!!
@mohamedassaneseck7412
@mohamedassaneseck7412 10 ай бұрын
Awesome content that go deep in explanation. Thank you for that man !! Keep it up !!
@neelthakor1483
@neelthakor1483 Жыл бұрын
Your content is very much helpful, Thank you very much.
@codemode3187
@codemode3187 Жыл бұрын
why when we use (-) it works i replace the - with ; but it did not work can you explain
@random-characters4162
@random-characters4162 Жыл бұрын
ask chatGPT this question and u will understand: explain me this js code: eval('let myObj = ' + "{\"information\" : \"stuff\"-alert(1)}")
@xBossWii
@xBossWii Жыл бұрын
from the solution on the lab page: An arithmetic operator (in this case the subtraction operator) is then used to separate the expressions before the alert() function is called. Finally, a closing curly bracket and two forward slashes close the JSON object early and comment out what would have been the rest of the object. As a result, the response is generated as follows: {"searchTerm":"\\"-alert(1)}//", "results":[]}
@FORMMINGHACKERS
@FORMMINGHACKERS Жыл бұрын
Great content! Congratulations!!🌟
@nightenamoured4798
@nightenamoured4798 6 ай бұрын
best explanation on KZbin
@Nick-g9w5s
@Nick-g9w5s Ай бұрын
thanks for your explanation
@carefulwithmoney4699
@carefulwithmoney4699 Жыл бұрын
amazing explanation, thanks so much !
@revenant9171
@revenant9171 Жыл бұрын
Been watching your XSS videos on portswigger academy and they've been very helpful. Your explanations are great. Curious - how did you learn so much about JavaScript? were you a web developer before you got into hacking? Or did you learn JavaScript as you encountered it in your security learning?
@z3nsh3ll
@z3nsh3ll Жыл бұрын
Thanks for watching the content. I started purely with cyber security but realised pretty quickly that many of the exploits were hard to understand without a coding background. I learned web development (at least initially) purely to help with hacking, but a side effect of that is that I now manage some full stack websites and do some freelance webdev work on the side. I would highly recommend learning to code in depth for any ethical hacker. Although not everyone does this, you will be much stronger at breaking code if you understand how it's written. You'll also open up additional employment vectors if you are interested in that sort of thing.
@vaibhavsuri2389
@vaibhavsuri2389 Жыл бұрын
@@z3nsh3ll Hi Mate you have really great videos thanks for it. Can you please suggest which web app technologies we need to learn for code breaking, it is just only java script or some other technology as well?
@achievefinancialindependen5430
@achievefinancialindependen5430 Жыл бұрын
@@z3nsh3ll Damn man... You made me look stupid to myself... Being a web developer, I had to see your solution thrice!! The very last part where you got that invalid javascript syntax, I couldn't see a way to add that curly brace before the "//". Looks like I need to practice many labs to build that skill... But having no clue to solve is forcing me to go checking for solutions... how did you practice or learn these things when you started with cyber security?
@kerbalette156
@kerbalette156 Жыл бұрын
Excellent explanation. Thanks
@Somens8Dworld
@Somens8Dworld 9 ай бұрын
but even without eval it should show the alert if I directly add to var
@crazydave1990ify
@crazydave1990ify 4 ай бұрын
Is this approach applicable in all methods where eval() is in use? or this specific instance of eval()?
@XJacksonvilleX
@XJacksonvilleX 7 ай бұрын
i did not understand why you did not have to comment out the brackets in your local server, meanwhile you had to in the lab. can anyone explain?
@Uchihao_o
@Uchihao_o 4 ай бұрын
Maybe it's a bit too late but I guess the reason is that he isn't employing a filter to automatically escape some characters like most labs do I mean it's not an embedded feature in JSON to escape characters like in the lab to just make the lab more realistic
@roidaniel10
@roidaniel10 Жыл бұрын
Amazing !
@MahmoudGilak
@MahmoudGilak 2 ай бұрын
you are perfect. 🌹
@oziesiek666
@oziesiek666 Жыл бұрын
great explanation , thank you for that. I encounter this vulneralibity on Burp practice exam but I didn't know how I can exploit this vulnerability for example to steal a cookie or login into low privilige account. I'm very beginner at js so maybe could you point how this could be used for real life exploitation ? Whenever I tried to use more complicated script than just an alert or print this was rejected :(
@Felix-wh8pz
@Felix-wh8pz Жыл бұрын
So good
@imperim
@imperim 3 ай бұрын
thanks
@xxapoloxx
@xxapoloxx 11 ай бұрын
I fail to see how this in any different than you opening the console and runing something
@s1k3r4
@s1k3r4 Жыл бұрын
This XSS attack is both stored AND DOM based - here's why....
12:05
Learn GO Fast: Full Tutorial
1:07:53
Alex Mux
Рет қаралды 523 М.
“Don’t stop the chances.”
00:44
ISSEI / いっせい
Рет қаралды 62 МЛН
小丑教训坏蛋 #小丑 #天使 #shorts
00:49
好人小丑
Рет қаралды 54 МЛН
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
What is asynchronous JavaScript code? 💤
4:48
Bro Code
Рет қаралды 27 М.
Event-Driven Architecture (EDA) vs Request/Response (RR)
12:00
Confluent
Рет қаралды 179 М.
AngularJS DOM XSS Attack - Understanding $on.constructor
25:13
Learn JSON in 10 Minutes
12:00
Web Dev Simplified
Рет қаралды 3,3 МЛН
JavaScript Promises Crash Course
24:03
Kevin Powell
Рет қаралды 39 М.
Writing Secure JavaScript
24:15
freeCodeCamp.org
Рет қаралды 58 М.
DOM XSS in jQuery Selector Sink using a Hashchange Event
22:49
Лайфхак: Легально делать деньги
0:43
В Европе заставят Apple сделать в айфонах USB Type-C
0:18
Короче, новости
Рет қаралды 1,1 МЛН
Monster My Best Friend 🥹❤️👻 #shorts Tiktok
1:01
BETER BÖCÜK
Рет қаралды 29 МЛН
Satisfying Vend 😦 Ep.5 #shorts #satisfying #vendingmachine
0:23
TYE Arcade
Рет қаралды 17 МЛН