Finding Your Next Bug: Blind Cross Site Scripting (XSS) & XSS Hunter

preview_player
Показать описание
You asked for it and it's here! This is the first episode in the Finding Your Next Bug series and we're talking about blind XSS. With everyone looking for XSS bugs, WAF bypasses being even more complex and developers wising up blind XSS can be a neat way to find bugs that others don't. This type of stored XSS is awesome for hunting XSS in places you don't expect, logs, admin control panels, repair panels, etc. In this video we go from 0 knwoledge of blind xss, to a demo showing how it works. We also go over how to use XSS hunter and what it does. Finally we talk about some of the cool and some of the mundane blind XSS bugs that others have found.

Finally we talk about some of the cool and some of the mundane blind XSS bugs that others have found.
Further Reading:

Case Studies:
Рекомендации по теме
Комментарии
Автор

Video is pretty good. Everytime I needed motivation to continue in bug hunting, your channel notification comes up. Please continue your amazing work.

velurubharath
Автор

I really forgot to sub last time. Error corrected, great stuff Katie! Looking forward for more :)

StefanRows
Автор

XSS Hunter no longer accepting sign ups :(

darkyolks
Автор

Love the videos you explain everything so well! any plans on making a video about XXE in the near future?

nebdar
Автор

I always feel smooth when you share your computer screen. Is it me or Is it to everybody?

ajith
Автор

Hi. I just started viewing the video. Will comment once it is over. :)

velurubharath
Автор

31% I think it's 21.8% at 3:31 if I am not wrong

tsrisanath
Автор

Kida dumb question
If one injects xss payload into http header what would be the impact
Will it work

TheBashir
Автор

Can we upload SHELL via XSS ? Or similar vulnerabilities exploitation methods like LFI, RFI, RCE to "upload SHELL" in web server directory to gain root access ? 🤔 . If yes, then please do educate us because I submitted many XSS popup vulnerability reports to HackerOne BugCrowd Integrity but all were rejected due to missing SERIOUS IMPACT. Hope to hear from you soon. Thanks 🤝 ❤💚💙✌💯👍

Free.Education
Автор

Very nice work! Next could you go in deep with this? for example, where each xss hunter's payloads works? or which can we use depending scenario? Regards!

lukaslokillo
Автор

Weird, 2021 the screenshot API is not working anymore. Yours too?

TheZakMan
Автор

Hey Katie ! Your explanation is better when you make long videos like for 40-50 min. It will help if you make that type of content more! thank you!

aayushkawathekar
Автор

19:00 isn't that LocalTapiloa? in the report??

chetah
Автор

Hello pro. It is perfect. Please share slide :))))

hanoi
Автор

<script>alert('botah of wotah')</script>

ordigen_brc
Автор

i love your tuts but please my eyes is fucked due this white background

expert