Dude, you're totally killing it with your techniques, way ahead of everyone else!
@Ott3rly10 ай бұрын
My pleasure!
@cyberpro15110 ай бұрын
yooo! My brother has again contributed some best things for the community! God bless you dear
@Ott3rly10 ай бұрын
Thanks bro!
@PleaseTheNinja9 ай бұрын
This is a very good approach! Congrats on your success
@Ott3rly9 ай бұрын
Thanks so much!
@abhinavbansal-cc8gr10 ай бұрын
gr8 video......need more like this..also on advance xss filter bypass
@Ott3rly10 ай бұрын
Noted!
@Khalid-bm4fw8 ай бұрын
Thanks We need more content like this
@nurmuhammadkevin83954 ай бұрын
its really helpfull dude, thank you for making this video
@Ott3rly4 ай бұрын
My pleasure!
@ilhamdn237 ай бұрын
i love this content, thank you Ott3rly
@detective52539 ай бұрын
New subscriber here, i really love your content mate!
@Ott3rly9 ай бұрын
Welcome aboard!
@HeroKing-xg6ys3 ай бұрын
Hello bro honestly you are doing great job I'm learning a lot from you where are you from
@Ott3rly3 ай бұрын
Hey, thanks. I'm from Lithuania.
@vlogsprasenjit9 ай бұрын
Subscribed! Amazing content, I have just started BB
@Ott3rly9 ай бұрын
Welcome aboard!
@asifsaifi292510 ай бұрын
Pretty goodddddddd Man really awesome content
@Ott3rly10 ай бұрын
Glad you enjoyed
@Lazyhackerbd10 ай бұрын
great video boss
@Ott3rly10 ай бұрын
Appreciate it!
@BanglarPranChitra9 ай бұрын
Best best best 😮
@AhmedMoubarak-pz5yu9 ай бұрын
Thank you for the wonderful videos. I watched most of them, but I have a problem with waf. When fuzz for subdomain enumeration or directory or hidden parameter or anything after a short period of time, l block with waf, and the response is late from the server.
@Ott3rly9 ай бұрын
The way you trigger WAF is trying to access the specific endpoints or sending malicious requests. It's just an another layer of defense for websites. Unfortunately, its the biggest pain in the ass for most cases while doing bug bounties. I will be sharing some extra videos on this topic in the future, to help avoid it or bypass it. Feel free to check discord, if you have some questions or looking for collabs ;)
@AhmedMoubarak-pz5yu9 ай бұрын
@@Ott3rly❤
@overthinker187710 ай бұрын
Thx great video 🫶🏽
@sattharzakeer959410 ай бұрын
Awesome 😮
@Ott3rly10 ай бұрын
Thanks 🤗
@HasanthaGimhana5 ай бұрын
Nice ❤🔥
@overthinker187710 ай бұрын
Any video about browser extension u are using rare one ?
@Ott3rly9 ай бұрын
Not sure if that need extra video, but I could answer in next Q/A.
@munchlenova635310 ай бұрын
How to find what ruals in wfa was used in a website
@Ott3rly10 ай бұрын
You will never know. I've just shown how it looks from defensive side.
@ss-rc1gy10 ай бұрын
Nice ❤
@Ott3rly10 ай бұрын
Glad you like it
@ShintowelАй бұрын
amazing
@munchlenova635310 ай бұрын
Video is exllent
@Ott3rly10 ай бұрын
Thanks!
@devrajdhiwar902810 ай бұрын
Osmm video 🎉❤❤❤❤❤❤❤
@Ott3rly10 ай бұрын
Thanks 🤗
@RajuHa-g3m10 ай бұрын
Nice video brother ❤
@Ott3rly10 ай бұрын
Thanks ✌
@Shapeshiftshow9 ай бұрын
From where i can practice this bug bounty, i mean do you have any write ups?
@Ott3rly9 ай бұрын
Yes I do share a lot of tips and blog posts, check links on channel description.
@Shapeshiftshow9 ай бұрын
@@Ott3rly thank you brother
@Shapeshiftshow9 ай бұрын
@@Ott3rly I have another doubt, is there any vulnerability in code 503?
@TrackinDaMeta6 ай бұрын
I'd like to see one on wordfence
@Ott3rly6 ай бұрын
That's too specific topic. I might work on that sometime, but not in the near future.
@c_war10 ай бұрын
Basically I'm lame in escape tag normally ">< this doesn't not work ;// I try this do i have to learn specific things in JavaScript to understand this
@Ott3rly10 ай бұрын
It's always about the context where your payload will end up. Practise makes it perfect!