Cross-Site Scripting (XSS) Explained! // How to Bug Bounty

preview_player
Показать описание

💵 Support the Channel:
You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
☕️ Buy Me Coffee:

JOIN DISCORD:

🆓 🆓 🆓 $200 DigitalOcean Credit:

💬 Social Media

#bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp
Рекомендации по теме
Комментарии
Автор

This is my favourite format. You should do all the Top 10 OWASP vulnerabilities (Or Top 25...) like this one.

Skaxarrat
Автор

naham sir i just opened this video for 10 seconds and thought of exiting it but read the first comment on ur video and damn i am blown away by your explanation <3

mamuli
Автор

Awesome video Naham.Absolutely loved it.
Just one suggestion:- Can you please go a little slow next time? As someone from a technical background I could understand everything and keep up with u but even a lapse of couple of secs would lose me completely about what's happening

aswadshaikh
Автор

Damn ... the only thing now holding us to hunt XSS are our own Procrastination

AliYar-Khan
Автор

Great man. Your videos helped me transition into Webapp pentesting from System Pentesting ❤🎉

More Power to you

rydanstark
Автор

awesome content, what about the DOM xss and stored xss?

ss-rcgy
Автор

Really Great Stuff!! Thanks for the 5WP

rohitshastry
Автор

Great video and content! Thanks for helping out ....One question i have - where do you install your attack box for bug bounty? Is it on the VPS provider or it is local on your machine?

MiroPeev
Автор

thank you so much! i feel indebted to learn this much from scratch and from only knowing the terminology of XSS that need put payload on some parameter into this little more advanced things that very interesting to me to learn about. I need to learn more and how far the learning goes? (Try to play auto5d chess in case one day i will come back to this video)

unvs
Автор

Thanks for the information. Been working on a target that has made me loose motivation and taken me down a rabbit hole about JS and React.JS. This video and others gave another point of view on how to approach the target.
Thank you again!

BoricuaFez
Автор

i really love your content bro, helps me learn alot as a cyber security student

WorldwideWave
Автор

Do you upload videos for 5 weeks on this YouTube channel?

razmjumehdi
Автор

do you suggest using a VPN while testing?

parshva
Автор

Thank you for sharing your knowledge. Please extend this to 10 weeks 🙏🙏🙏

Dextr-Hwqkwtom
Автор

the blog title field seemed to have a validation check, is it possible that it would be bypassed ? and hence archieve xss through the blog title field

ExplorewithRite
Автор

Great Approach! Looking forward to it!

souraldandothi
Автор

Does anybody here with ADHD who are super passionate about pentesting but struggling to start it?! 😢

alexparakan
Автор

Once i got xss on TikTok but on that time they did not start their bug bounty program 😢

WaseemLaghari-me
Автор

Make us more technical content and more hackinghub hubs, can we have a open redirect explained?

Jarling-sooi
Автор

So I'm not gonna lie.. I've been trying to learn the art of bug bounties for some time and to be frank I got overwhelmed and pivoted to Web Development.. even landed a gig as a developer and about 6 months in now I'm back to try again.. I feel like this makes a hell of a lot more sense now having built several web apps now. I guess I should start by just hacking my own shit..

Frawkesish