Комментарии:
Not 'E'mg tag but 'I'mg tag 😶🌫
ОтветитьFantastic video. Highly informative!
ОтветитьCan you share the notion list
ОтветитьWhat platform will u suggest for leaning bug bounty?
Ответитьis there step how to do for bug bounty each report ?
ОтветитьTen film zawiera lokowanie produktu :)
Ответитьi love you bro 🥰😍🤑
ОтветитьCan You Share About the BB Automation !
ОтветитьThis video is Diamond. Awesome mate very well explained. Gonna signup with BBRE soon.
ОтветитьHello brother I am also doing bug bounty but not getting success
ОтветитьCan you help me
ОтветитьLove your vids. The other day I was messing around with a page and found an html injection, I was wondering if there was a way to escalate it to an XSS if the "=" sign is sanitized and leads me to a 403 Forbidden. Thanks!
ОтветитьCan you share the template...No need database
Ответить<svg/onload=alert()> is one of the shortest xss payloads, maybe that's why they are use more often
ОтветитьCorrect me if i am wrong. Can we get XSS on 404 pages.
ОтветитьWould be interested in using this info as a ML training set
ОтветитьAwesome analysis!!
Ответитьcan you give this cheet sheet in pin comment
Ответитьjust found you. veeerrry interesting channel. as someone who learns by watching a massive amount of poc videos on one topic, i like how you take the analysis deeper. finally a channel that doesnt have the redundant "how to hack" videos.
ОтветитьLOVE YOUR VIDEOS
I know HTML. Currently learning JavaScript. Then I'll put my hand on portswigger labs starting from xss then idor then business logic bugs.
My Questions are:
should I watch your channel from oldest or newest or most popular?
should I continue with the approach I wrote above?
Thanks for the video =)
ОтветитьThis is Gold man 💥
ОтветитьBetter to use <img/src/onerror=alert(8)> than the quoted one
ОтветитьI love you bro ❤
ОтветитьEvery website would be vulnerable since you are injecting the script into the console yourself. This is not valid
ОтветитьThanks!
Ответить