9cesec
9cesec
  • 87
  • 15 040
CROSS-SITE SCRIPTING(XSS) | METASPLOITABLE 2
In this video, I walked through some penetration testing techniques for exploiting cross-site scripting(XSS) vulnerability using Metasploitable 2 DVWA machine.
This video is a form of journal and a way I practice what I've learnt.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
DISCLAIMER:
This video is for educational purposes only and demonstrates general penetration testing techniques and procedures. I cannot be held responsible for any damage caused to your computer or software by following these steps. Use this information at your own risk. It is always advisable to seek professional assistance if you are not comfortable performing these procedures yourself. Additionally, some software and tools featured in this video may have specific licensing requirements or limitations. Please ensure you are using them in accordance with their respective terms of use.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
#XSS #metasploitable #pentesting #php #linux #tutorial
0:00 Intro
0:50 What is cross-site scripting XSS?
1:37 How does XSS work?
3:05 Reflected XSS
3:40 Stored XSS
4:23 DOM-Based XSS
6:31 Reflected XSS Lab
8:00 Stored XSS Lab
10:28 Preventing XSS Attack
#XSS #XSS #metasploitable #linux •#webexploitation •#secureshell •#linuxtowindows •#browser •#burpsuite •#curls •#web •#cybersecurity •#offensivesecurity •#hacking
- - -
tryhackme ethicalhacking cybersecurity cybersec hacking informationsecurity pentesting ethicalhacking cybersecuritytraining learnhacking tryhackmecommunity tryhackmerooms cyberwarriors cyberattack cyberdefense cyberthreats cybercrime cyberawareness cyberhygiene cybersavvy cybereducation cyberskills linuxcommunity linuxusers linuxenthusiasts linuxmastery cyberninjas ninjaskills linuxsecrets hiddenfiles shellscripting capturetheflag adventofcyber attacksurfacereduction securityposture networksecurity cybersecurityprofessional phishing dosattacks vulnerabilityexploitation firewall intrusiondetection patchmanagement cyberdefence cyberresilience cybercrime informationsecurity cyberthreats cyberattack cyberprotect
kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
wireshark
- - -
Переглядів: 22

Відео

Advent of Cyber 2024 | Introduction {Tryhackme}
Переглядів 47619 годин тому
Advent of Cyber 2024 - Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas! Here I walkedthrough the introduction room for the upcoming advent of cyber 2024. Sign up on Tryhackme: tryhackme.com/signup?referrer=656cbbd3fafb242fa32c741c Follow along for free at tryhackme.com/r/room/adventofcyber2024 This video is...
SMTP Penetration Testing on Metasploitable 2 | Port 25
Переглядів 48414 днів тому
SMTP - Simple Mail Transfer Protocol is a protocol mostly used to send and receive emails in a network via Port 25. Here I walked through some penetration testing techniques for the SMTB protocol port 25 on Metasploitable 2 Vulnerable machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER:This video is for educational purposes only a...
PICOCTF2024 | VERIFY | SCAN SURPRISE - Challenge Walkthrough
Переглядів 5321 день тому
Verify & Scan Surprise is a PicoCTF2024 CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/450 & play.picoctf.org/practice/challenge/444 This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER:This vid...
SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445) | PART 2
Переглядів 14321 день тому
SMB - Server Message Block is a protocol mostly used to transfer files between a windows network using TCP/IP connections via Port 139/445. This is a sequel to SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445) video. Here I walked through some penetration testing techniques for the SMB/SAMBA protocol port 139/445 on Metasploitable 2 Vulnerable machine. This video is a form of ...
SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445)
Переглядів 14421 день тому
SMB - Server Message Block is a protocol mostly used to transfer files between a windows network using TCP/IP connections via Port 139/445. Here I walked through some penetration testing techniques for the SMB/SAMBA protocol port 139/445 on Metasploitable 2 Vulnerable machine using metasploit, nmap and searchsploit tools. This video is a form of journal and a way I practice what I've learnt. ▬▬...
PICOCTF | COOKIES & SCAVENGER HUNT - Challenge Walkthrough
Переглядів 5521 день тому
Cookies & Scavenger Hunt are CTF challenges from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/173 & play.picoctf.org/practice/challenge/161 This video is a form of journal and a way I practice what I've learnt. 0:00 Intro 0:10 Cookies 7:01 Scavenger Hunt #burpsuite ...
COMMAND EXECUTION | METASPLOITABLE 2
Переглядів 147Місяць тому
In this video, I walked through some penetration testing techniques for exploiting command execution vulnerability using Metasploitable 2 DVWA machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educational purposes only and demonstrates general troubleshooting techniques and procedures. I cannot be held respons...
FILE UPLOAD VULNERABILITY | METASPLOITABLE 2
Переглядів 211Місяць тому
In this video, I walked through some penetration testing techniques for exploiting file upload vulnerability using Metasploitable 2 DVWA machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educational purposes only and demonstrates general troubleshooting techniques and procedures. I cannot be held responsible f...
PICOCTF | RUNME.PY - Challenge Walkthrough
Переглядів 28Місяць тому
Runme.py is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/250 This video is a form of journal and a way I practice what I've learnt. #python #pythonscript #wget #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivese...
PICOCTF | UNMINIFY - Challenge Walkthrough
Переглядів 38Місяць тому
Unminify is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/426 This video is a form of journal and a way I practice what I've learnt. #sourcecode #unminify #HTML #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivese...
FTP Penetration Testing on Metasploitable 2 (Port 21)
Переглядів 3022 місяці тому
File Transfer Protocol(FTP) is a file transfer protocol, used to transfer files between a network using TCP/IP connections via Port 20/21. This is a sequel to FTP Penetration Testing on Ubuntu (Port 21) video. Here I walked through some penetration testing techniques for the FTP protocol port 21 on Metasploitable 2 Vulnerable machine. This video is a form of journal and a way I practice what I'...
FTP Penetration Testing on Ubuntu (Port 21)
Переглядів 2142 місяці тому
File Transfer Protocol(FTP) is a file transfer protocol, used to transfer files between a network using TCP/IP connections via Port 20/21. FTP works as just like HTTP and SMB protocols. When the FTP server is configured in a network then a specific folder is defined as a shared folder in order to share files. Users can access this file server via FTP. Here I walked through some penetration test...
PICOCTF | INSP3CT0R - Challenge Walkthrough
Переглядів 422 місяці тому
Insp3ct0r is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/18 This video is a form of journal and a way I practice what I've learnt. #HTML #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivesecurity •#hacking ▬▬▬▬▬...
SSH Penetration Testing (Port 22) | Part 2
Переглядів 3052 місяці тому
Secure Shell (SSH) is a cryptographic protocol, this is a method for securely interacting with a computer over an unsecured network. Here I continued through some penetration testing techniques for the SSH protocol port 22 specifically on key based authentication. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educa...
PICOCTF | SOAP - Challenge Walkthrough
Переглядів 1122 місяці тому
PICOCTF | SOAP - Challenge Walkthrough
SSH Penetration Testing (Port 22)
Переглядів 4422 місяці тому
SSH Penetration Testing (Port 22)
PICOCTF | WEBDECODE - Challenge Walkthrough
Переглядів 852 місяці тому
PICOCTF | WEBDECODE - Challenge Walkthrough
ARTSY COMMANDS | How To Get Creative In The Linux Terminal
Переглядів 582 місяці тому
ARTSY COMMANDS | How To Get Creative In The Linux Terminal
PICOCTF | INCLUDES - Challenge Walkthrough
Переглядів 532 місяці тому
PICOCTF | INCLUDES - Challenge Walkthrough
PICOCTF | INSPECT HTML - Challenge Walkthrough
Переглядів 422 місяці тому
PICOCTF | INSPECT HTML - Challenge Walkthrough
WGEL CTF - {TRYHACKME}
Переглядів 883 місяці тому
WGEL CTF - {TRYHACKME}
PICOCTF | LOCAL AUTHORITY - Challenge Walkthrough
Переглядів 903 місяці тому
PICOCTF | LOCAL AUTHORITY - Challenge Walkthrough
PICOCTF2024 | TIME MACHINE - Challenge Walkthrough
Переглядів 1033 місяці тому
PICOCTF2024 | TIME MACHINE - Challenge Walkthrough
0 - DVWA{DAMN VULNERABLE WEB APPLICATION} | INTRO AND SETUP
Переглядів 823 місяці тому
0 - DVWA{DAMN VULNERABLE WEB APPLICATION} | INTRO AND SETUP
PICOCTF2024 | TRICKSTER - Challenge Walkthrough
Переглядів 1,2 тис.3 місяці тому
PICOCTF2024 | TRICKSTER - Challenge Walkthrough
HYDRA - How to Use Hydra to Bruteforce Passwords {TRYHACKME}
Переглядів 2,6 тис.3 місяці тому
HYDRA - How to Use Hydra to Bruteforce Passwords {TRYHACKME}
PICOCTF2024 | IntroToBurp - Challenge Walkthrough
Переглядів 1353 місяці тому
PICOCTF2024 | IntroToBurp - Challenge Walkthrough
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 2
Переглядів 643 місяці тому
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 2
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 1
Переглядів 2563 місяці тому
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 1

КОМЕНТАРІ

  • @eh_shreyash
    @eh_shreyash 8 днів тому

    what is the last question answer ?

    • @9cesec.1
      @9cesec.1 7 днів тому

      It will be unlock on December 1st at 16.00 GMT

  • @shabeats790
    @shabeats790 8 днів тому

    what was the last answer to submit?

    • @9cesec.1
      @9cesec.1 8 днів тому

      No answer yet until the 1st of December. It will be available to answer by then.

  • @KRT2132
    @KRT2132 Місяць тому

    Great video. Lots of good advice. Can you do a video on NMAP / Gobuster / Dirbuster? Using them together and what the thought process is when you find something open? I like the unedited aspect and showing you trying to figure out why something is not working.

    • @9cesec.1
      @9cesec.1 Місяць тому

      Thank you and I appreciate your comment. I will try to make a video on the requested tools much later.

  • @KrishiCH-k9b
    @KrishiCH-k9b Місяць тому

    hey i love ur video and its explained really well

    • @9cesec.1
      @9cesec.1 Місяць тому

      Thank you and I appreciate you.

  • @Pokemonhome.
    @Pokemonhome. Місяць тому

    Can you create a video on custom exploit creation

    • @9cesec.1
      @9cesec.1 Місяць тому

      You mean like creating your own exploits for a CTF??

  • @decordeiro05_
    @decordeiro05_ Місяць тому

    i like your videos!!! keep making those videos for me watch you channel😅

    • @9cesec.1
      @9cesec.1 Місяць тому

      Thank you, I really appreciate your comment😁 And yes I will continue.

  • @Mary-le5db
    @Mary-le5db Місяць тому

    what tool pentester use before burpsuite invented?

    • @9cesec.1
      @9cesec.1 Місяць тому

      Not quite sure butt I think it's Nessus.

  • @RedTriangles
    @RedTriangles Місяць тому

    Thanks man. Love your content, subscribed! Would love to see you do more THM stuff too!

    • @9cesec.1
      @9cesec.1 Місяць тому

      I appreciate you. Yeah more THM coming soonest. Thank you.

  • @shanmugapriya9864
    @shanmugapriya9864 Місяць тому

    clear explanation michael !!! great

    • @9cesec.1
      @9cesec.1 Місяць тому

      Glad it was helpful!

  • @ENGCYTGoutham
    @ENGCYTGoutham 2 місяці тому

    tq

  • @np_dev
    @np_dev 2 місяці тому

    the discord invite link inside your channel info is invalid

    • @9cesec.1
      @9cesec.1 2 місяці тому

      Thank you for that. The link was expired. It's now updated and here is the link as well. discord.gg/wGTJQ3QG

  • @WahabAbiodun-dp4oy
    @WahabAbiodun-dp4oy 2 місяці тому

    Very Useful 🙌

  • @RajPatel-pd9gi
    @RajPatel-pd9gi 2 місяці тому

    curl is a nice tool !

  • @RajPatel-pd9gi
    @RajPatel-pd9gi 2 місяці тому

    Insightful 👍

    • @9cesec.1
      @9cesec.1 2 місяці тому

      Thank you🙏

  • @mariamalrumaidhi2773
    @mariamalrumaidhi2773 2 місяці тому

    thank you , very helpful <3

    • @9cesec.1
      @9cesec.1 2 місяці тому

      You are welcome.

  • @lansangmatt5760
    @lansangmatt5760 3 місяці тому

    what requirements to run hydra sir, does it need a network adapter for "hacking"?

    • @moutsimzak3749
      @moutsimzak3749 2 місяці тому

      Did u knew?

    • @LocalAuthorityy
      @LocalAuthorityy 2 місяці тому

      No. It doesn’t. It is a tool for online cracking. Adapter is for Wi-Fi. Read more about them

  • @spidygamming1304
    @spidygamming1304 3 місяці тому

    I write cd PicoCFT and its shows ,no such file or directory, what can i do? Please help

    • @9cesec.1
      @9cesec.1 3 місяці тому

      That's a folder or directory i created before the video. if you want to follow the exact same steps then create the follow with this command > mkdir PicoCFT

    • @spidygamming1304
      @spidygamming1304 3 місяці тому

      ​@@9cesec.1 you save me

  • @spidygamming1304
    @spidygamming1304 3 місяці тому

    Thanks man

  • @skdhackerr
    @skdhackerr 4 місяці тому

    Good Series, very helpful :)

  • @magicianlucifer8851
    @magicianlucifer8851 4 місяці тому

    so you are coming in

  • @marlindim7004
    @marlindim7004 5 місяців тому

    Hi, i love your videos Very nice explanation, keep it up.

    • @9cesec.1
      @9cesec.1 5 місяців тому

      Thank you for your kind words

  • @_Etendue.
    @_Etendue. 5 місяців тому

    Nice Video.

  • @_Etendue.
    @_Etendue. 5 місяців тому

    Nice video

  • @akshay_exe
    @akshay_exe 5 місяців тому

    Awesome man thanks ❤

    • @9cesec.1
      @9cesec.1 5 місяців тому

      Thank you

  • @_Etendue.
    @_Etendue. 5 місяців тому

    Nice video has been learning a lot

    • @9cesec.1
      @9cesec.1 5 місяців тому

      I'm glad to hear that👍

  • @_Etendue.
    @_Etendue. 6 місяців тому

    Awesome video. keep it up.

  • @_Etendue.
    @_Etendue. 6 місяців тому

    nice

    • @9cesec.1
      @9cesec.1 6 місяців тому

      Thank you❤

  • @_Etendue.
    @_Etendue. 6 місяців тому

    Nice video❤

  • @_Etendue.
    @_Etendue. 6 місяців тому

    Awesome video

  • @_Etendue.
    @_Etendue. 6 місяців тому

    Nice video❤

    • @9cesec.1
      @9cesec.1 6 місяців тому

      Thank you.

  • @_Etendue.
    @_Etendue. 6 місяців тому

    Keep it up.

    • @9cesec.1
      @9cesec.1 6 місяців тому

      Thank you. I will.

  • @jameson9334
    @jameson9334 8 місяців тому

    'Promosm' 😱

  • @usyfkhairy1617
    @usyfkhairy1617 8 місяців тому

    nice

    • @9cesec.1
      @9cesec.1 8 місяців тому

      Thank you

  • @dirkguzman7955
    @dirkguzman7955 9 місяців тому

    😔 promo sm