Which XSS payloads get the biggest bounties? - Case study of 174 reports

Which XSS payloads get the biggest bounties? - Case study of 174 reports

Bug Bounty Reports Explained

1 год назад

27,669 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@x.plorer
@x.plorer - 13.12.2022 20:09

Not 'E'mg tag but 'I'mg tag 😶‍🌫

Ответить
@dhyeychoksi5178
@dhyeychoksi5178 - 13.12.2022 20:42

Fantastic video. Highly informative!

Ответить
@rix4uni
@rix4uni - 13.12.2022 20:58

Can you share the notion list

Ответить
@stevesharma6521
@stevesharma6521 - 13.12.2022 21:11

What platform will u suggest for leaning bug bounty?

Ответить
@Al-rt3ec
@Al-rt3ec - 13.12.2022 21:25

is there step how to do for bug bounty each report ?

Ответить
@_bergee_
@_bergee_ - 13.12.2022 23:50

Ten film zawiera lokowanie produktu :)

Ответить
@vivekkhandagre9274
@vivekkhandagre9274 - 14.12.2022 18:05

i love you bro 🥰😍🤑

Ответить
@kalki-fo3ie
@kalki-fo3ie - 15.12.2022 15:33

Can You Share About the BB Automation !

Ответить
@yaseen7749
@yaseen7749 - 15.12.2022 21:03

This video is Diamond. Awesome mate very well explained. Gonna signup with BBRE soon.

Ответить
@akshaypandey4761
@akshaypandey4761 - 15.12.2022 22:38

Hello brother I am also doing bug bounty but not getting success

Ответить
@akshaypandey4761
@akshaypandey4761 - 15.12.2022 22:39

Can you help me

Ответить
@diegor.mackenzie1593
@diegor.mackenzie1593 - 20.12.2022 02:35

Love your vids. The other day I was messing around with a page and found an html injection, I was wondering if there was a way to escalate it to an XSS if the "=" sign is sanitized and leads me to a 403 Forbidden. Thanks!

Ответить
@brutexploiter
@brutexploiter - 22.12.2022 11:03

Can you share the template...No need database

Ответить
@rysiacz
@rysiacz - 29.12.2022 15:50

<svg/onload=alert()> is one of the shortest xss payloads, maybe that's why they are use more often

Ответить
@ruttalaabhinav8105
@ruttalaabhinav8105 - 04.01.2023 07:50

Correct me if i am wrong. Can we get XSS on 404 pages.

Ответить
@eyephpmyadmin6988
@eyephpmyadmin6988 - 28.01.2023 00:10

Would be interested in using this info as a ML training set

Ответить
@MrSettler
@MrSettler - 16.02.2023 17:30

Awesome analysis!!

Ответить
@Abhi-yc6xs
@Abhi-yc6xs - 13.06.2023 17:14

can you give this cheet sheet in pin comment

Ответить
@quad7375
@quad7375 - 22.06.2023 17:48

just found you. veeerrry interesting channel. as someone who learns by watching a massive amount of poc videos on one topic, i like how you take the analysis deeper. finally a channel that doesnt have the redundant "how to hack" videos.

Ответить
@محمّد.09
@محمّد.09 - 18.07.2023 20:35

LOVE YOUR VIDEOS
I know HTML. Currently learning JavaScript. Then I'll put my hand on portswigger labs starting from xss then idor then business logic bugs.
My Questions are:
should I watch your channel from oldest or newest or most popular?
should I continue with the approach I wrote above?

Ответить
@OthmanAlikhan
@OthmanAlikhan - 18.08.2023 13:34

Thanks for the video =)

Ответить
@emilisha-in4xl
@emilisha-in4xl - 18.11.2023 17:39

This is Gold man 💥

Ответить
@trustedsecurity6039
@trustedsecurity6039 - 20.01.2024 11:47

Better to use <img/src/onerror=alert(8)> than the quoted one

Ответить
@ali-barznji
@ali-barznji - 30.01.2024 00:58

I love you bro ❤

Ответить
@Ajax-1432
@Ajax-1432 - 24.06.2024 04:52

Every website would be vulnerable since you are injecting the script into the console yourself. This is not valid

Ответить
@jatinnandwani6678
@jatinnandwani6678 - 10.09.2024 11:30

Thanks!

Ответить