Комментарии:
🎉
ОтветитьFirst oneeeee
ОтветитьGood morning Mr hackerloi
Ответить🎉
Ответить3rd person to comment, come hack me 😪🤒🤒😁😁
Ответитьwsg
ОтветитьCyberghost😮
ОтветитьGood morning Mr hackerloi
ОтветитьComment#7!
Ответитьthe concept of xss has been confusing me, this video helped me so much❤
ОтветитьMy mom said no ?
Ответитьyeah this stuff worked 15 years ago, now decent admins will filter input fields to remove chars needed to inject scripts
ОтветитьMaybe you can try demonstrate some of CVE vulnerability that most viral and how to prevent it 😊
👇 Who agrees
Bro make videos when he has to pay his bills
Ответитьsir,I asked my mom about hacking, and she threw a spatula at me.
ОтветитьGod is good
ОтветитьBest late Christmas gift ever, I've had issues trying to understand XSS but this gave me an idea of how it works, Thank you Mr Loi🙏
ОтветитьIt's not as simple as this in the real world tho😂
Ответить🐐
Ответитьwhy you use windows 10 1511?
ОтветитьHaha using .textContent 😂 will make it useless in JavaScript to advance for more security use a sanitizing library 🤔 about the cookies stealing 😂 you can flag it on the server side so JavaScript can't be able to manipulate it.. well i still wonder how some site prevent it while allowing formatting text 🤔 thank you for the video 🤜 i really appreciate it
ОтветитьSocial Engineering Toolkit?!?!? Script Kiddie detected :) You are definetely script kiddie
Ответить