XSS Bypassing WAF POC || liveramp.com

  Рет қаралды 1,591

A9x

A9x

Күн бұрын

#bugbounty #hacker #ethicalhacking #ethicalhacker

Пікірлер: 19
@jeremied7945
@jeremied7945 Ай бұрын
I got a question here: what if you choose to not report all the payloads ? Like just one payload by report? Would you be able to claim the p1 bounty for each ?
@mohithreddy1439
@mohithreddy1439 2 ай бұрын
Hi bro telugu na meeru great work bro meeru reply isthey personal ga ping chestha
@Couple-Rounds
@Couple-Rounds 3 ай бұрын
how much bounty? You do it like lostsec-coffin😊
@A9x-AkhilReddy
@A9x-AkhilReddy 3 ай бұрын
@@Couple-Rounds I know him bro .twitter hot topic on infosec . I don't disclose bounty amount bro.
@archuser532
@archuser532 3 ай бұрын
@@A9x-AkhilReddy why not please share the bounty amount as i am also beginner to this
@hackerhacker-t4w
@hackerhacker-t4w 2 ай бұрын
i need payload bro
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
@@hackerhacker-t4w drop you social media handle .I will send to you
@NethaxStark
@NethaxStark 2 ай бұрын
Now these payloads are not working!
@zedvn3792
@zedvn3792 2 ай бұрын
Why do you know where to add the character "?"(cloud/?) come in and include the payload?
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
@@zedvn3792 it just a part of testing bro .even If I don't the target at first . I just randomly check everything . The most important thing is if you open any domain in your browser go through the entire source code .you can get some most interesting url ,URI , endpoints , parameters, in that source code. That time I saw this I just added the "> but nothing happened . But it reflects the exact same value inside it . Then I add these symbols for further testing how things are really working . Then I just add ;, ?so it happened .Then it comes out of the tag .then I inject simple html payloads it worked .while I was testing for xss .the waf blocked me .so I have some payloads list that saves from all over the internet .I sent it to the intruder .and checked the response of 218 payloads .then I got the xss . I hope I clarify it for you .
@zedvn3792
@zedvn3792 2 ай бұрын
@@A9x-AkhilReddy nice bro
@CountDraculYeaminthescorpio
@CountDraculYeaminthescorpio 3 ай бұрын
nice
@Erontos01
@Erontos01 3 ай бұрын
I want you to teach me😊
@A9x-AkhilReddy
@A9x-AkhilReddy 3 ай бұрын
@@Erontos01 still a noob to explore new things
@NethaxStark
@NethaxStark 2 ай бұрын
Could you give me the payload lists!
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
@@NethaxStark search it on Twitter or Google it .
@NethaxStark
@NethaxStark 2 ай бұрын
@@A9x-AkhilReddy Your list !
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
@@NethaxStark how did I sent it to you bro .provide your discord link . I would send you my list
$XX,000 Airbnb impossible XSS with 4 bypasses
9:15
Bug Bounty Reports Explained
Рет қаралды 28 М.
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Рет қаралды 1,4 МЛН
💩Поу и Поулина ☠️МОЧАТ 😖Хмурых Тварей?!
00:34
Ной Анимация
Рет қаралды 2 МЛН
规则,在门里生存,出来~死亡
00:33
落魄的王子
Рет қаралды 21 МЛН
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,4 МЛН
BUG BOUNTY: FILE UPLOAD VULNERABILITIES VIA PDF FILES | 2023
14:16
Live XSS Exploit: Using XSSFuzz to Break CSP on a Real Target!
19:26
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 113 М.
2024 Bug Bounty Recon Basics
8:46
NahamSec
Рет қаралды 24 М.
💩Поу и Поулина ☠️МОЧАТ 😖Хмурых Тварей?!
00:34
Ной Анимация
Рет қаралды 2 МЛН