This is such a bad explanation, you cannot deduce and understand everything, without having to read the third party resources. The PoC has the same naming variables; what is the meaning of the second parameter 'hack' of the both open function calls. And how is the message listener work in this scenario exactly. I would appreciate a bit longer videos with much more thorough explanations that don't rase more questions than they answer. Thanks.
@alexandrefernandes483 жыл бұрын
Very Nice!! I have exploit it in a different way, I hope it is considered a valid way xD. Thanks for that challenge, I’m looking forward to the next one. @fernale
@robbeverwilghen3 жыл бұрын
May I ask how you exploited it? :)
@robbeverwilghen3 жыл бұрын
@@alexandrefernandes48 Oh nice thanks! I was also able to always win, and found an html injection in the str, but wasn't able to exploit it to xss
@TheXSSrat3 жыл бұрын
Sorry bro, we were not able to get your poc working :(
@alexandrefernandes483 жыл бұрын
@@TheXSSrat np bro, I realized that it was wrong very late.