Learn Offensive JavaScript TODAY

preview_player
Показать описание
00:00 Intro
00:20 JS primer
02:09 Keylogger
05:16 Exfiltrating data
07:00 Stealing autofill passwords
10:40 Bypassing CSRF
12:00 Outro

📱Social Media📱
___________________________________________

💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:

Hacker Books:

My Build:

My Recording Equipment:

Рекомендации по теме
Комментарии
Автор

I think no music is better for educational videos. Allows better concentration. Great video nonetheless

RustysAdventures
Автор

Great video CyberMentor! Just as a heads up, if you can convince an end-user to install a browser plugin, you can use the same exact script to exfiltrate data without worrying about needing a pre-existing XSS vulnerability in the page. I have a few videos on my channel that cover similar exploits if you are ever interested in collaborating.

andhof
Автор

Man!! This is an AMAZING Video!! Thanks you Alex! That incredible! I love JavaScript more than ever

mf-
Автор

Now I can get on Twitter with my offenssve skillset and thrive

dudupup
Автор

This was really great and easy to understand, yeah we would love to learn more advance web exploitation topics that can be used in real life pentest :)

wtfanupam
Автор

can you please create a full course on this in tcm academy ?

sourabhpurohit
Автор

So, in what real-life situation would you be able to deploy this? I mean how could you get the JS code to run on the website you want to keylog?

hackvlix
Автор

Excuse me sir....I'm a victim of a scam...can my money still be saved? And who can I turn to for help? 🙏🏻🥺

heru_nitinegoro
Автор

Hi, have found stored xss through img tag but when i try escalate with above code <script> are blacklisted, any idea how to specify code without scripts(<script></script>) tag

saqlainmushrif
Автор

I was a little disappointed to learn that this was not a "how to name your variables mildly offensive slurs" video.

stopcensoringmen
Автор

I tried all of them but didn't get the csrf token in the form

_rymak_