- 13
- 14 866
CybreezZ
United States
Приєднався 17 бер 2022
Cybreezz is a bug bounty pic channel. In this Channel i will upload real world attack scenarios on live target. I will show uou how can we find vulnerabilities on real target
How to find ssti on live target | Ssti | bug bounty | ethical hacking | Template Injection
ssti or server site template injection is a most critical vulnerability in web application in this video I will try to understand how can we find an exploit ssti vulnerability
#SSTIAttacks
#SSTIVulnerability
#ServerSideTemplateInjection
#SSTIExploitation
#SstiPoc
#SSTIAttacks
#SSTIVulnerability
#ServerSideTemplateInjection
#SSTIExploitation
#SstiPoc
Переглядів: 412
Відео
Easy and Lightweight Bug Bounty Recon Techniques | Bug Bounty | Ethical Hacking | Pen Testing
Переглядів 4372 місяці тому
In this video, i will show you some web based platforms which is very helpful in our bug bounty journey so, as a ethical hacker or bug bounty hunter we have to know this types of platforms to find unique and hidden information about our target So, Enjoy the video. #InformationDisclosure #ReconTechniqes #EthicalHacking #BugHunting #InformationSecurity #Recon #recon #hackingtutorial #cybersecurit...
How i found 3 Critical vulnerabilities on same target | xss | HTML injection | parameter tempering
Переглядів 5202 місяці тому
xss, cross site scripting, stored xss, html injection, parameter tempering, parameter pollution, price manipulation. in this video i will your those critical vulnerability. my #Xss #CrossSiteScripting #Storedxss #HtmlInjection #ParameterTampering #ParameterPollution #PriceManipulation #crosssitescripting #infosec #hackingtutorial #bugbounty #crosssitescripting #cybersecurity #hackingtutorial #b...
Bug bounty Tools | Tools for bug bounty
Переглядів 1452 місяці тому
#hackingtutorial #cybersecurity bugbounty #hackingtutorial #cybersecurity #ethicalhacking #websecurity #bugbounty #htmlinjection #infosec #pentest #redteam #webhacking #informationsecurity #infosec
Cross site Scripting(XSS) on live target | How to find xss on live target | Bug bounty | Web Hacking
Переглядів 5302 місяці тому
Cross Site scripting (xss) In this video i will try to show you, how you can find xss on live target. In this video, we'll dive deep into XSS (Cross-Site Scripting) attacks, one of the most common security vulnerabilities on the web. We'll cover what XSS is, how it works, different types of XSS (Stored, Reflected, and DOM-based), and most importantly, how you can protect your website from these...
How to Bypass 403 forbidden l Bug bounty | Ethical Hacking | Penetration Testing
Переглядів 12 тис.2 місяці тому
403 Bypass. In this video i will show you how you can bypass 403 error code #403 #403bypass #bugbounty #ethicalhacking #cybersecurity #websecurity #hackingtutorial #pentest #hackingtutorial #redteam #htmlinjection #infosec #webhacking
What is Local file inclusion(lfi) | How to find lfi | Bug bounty | Ethical hacking | Cyber security
Переглядів 2216 місяців тому
Local file inclusion or lfi also known as path travarsal,directory travarsal. This is a security vulnerability and every people's need to know who's passionate ro bug hunting, penetration testing| ethical hacking etc This tutorial i try cover this things #what is local file inclusion (lfi) #why this vulnerability arise #how to find this vulnerability #bugbounty #ethicalhacking #cybersecurity #w...
Html injection on live target | hackerone | bug bounty | Ethical hacking| penetration testing
Переглядів 1466 місяців тому
HTML Injection! In this in-depth tutorial, we dive deep into the world of ethical hacking, penetration testing, and bug bounty hunting by exploring the intricacies of HTML injection flaws. Whether you're a seasoned cybersecurity professional or just starting your journey, this video will equip you with the knowledge and tools to identify, exploit, and mitigate HTML injection vulnerabilities eff...
How to find Cross site scripting (XSS) | reftected xss| Live hunting| bug bounty| Ethical hacking
Переглядів 2666 місяців тому
Cross site scripting or XSS is a one of the most common vulnerability in the web application. Cross site scripting or xss is allow attacker to inject malicious script. There is they're four types of Cross site scripting or XSS 1: reflected xss/non-persistant 2: stored xss/persistent 3: dom xssHtml injection,bug bounty,bug hunting,what is html injection,xss,sql injection,ssrf,csrf,bugs vulnerabi...
How to bypass admin panels or login pages | bug bounty | Ethical hacking | penetration testing
Переглядів 3576 місяців тому
SQL injection is a web application vulnerability which allow an attacker to inject malicious queries there's OWASP top 10 vulnerability like XSS CSRF SSRG Command injection command injection etc . Bug bounty and penetration testing is process to find web application vulnerability. There is a lot's of method to bypass admin panels or login pages using sql injection but i try just a common method...
Sir please one video to how to configure subzy 😢
8:59 hello sir you have a subzy tool can you please make a sum of videos to how to configure suzy please 😢😢
Keep motivating us with those vedios i like to learn these there is lot to learn in this field
<svg/OnLoad="`${prompt``}`">
уахахахах ну парень приколист конечно. его просто редиректило на основной сайт, а выставляет енто как обход 403 ахахаххаха
This video was about 14 minutes too long. You didn't bypass anything you got 404 attempting directory traversal......
those websites are really helpful tysm
Nice❤
It is not bypassing it just redirecting you to another page or ig home page
👍👍
congrats !, i'm talk from Brazil bro
/cgi-bin (Status: 403) [Size: 139] /cgi-sys (Status: 403) [Size: 139] /cgi-scanners (Status: 403) [Size: 139] /cgi-revenge (Status: 403) [Size: 139] /cgi-win (Status: 403) [Size: 139] /cgi-perl (Status: 403) [Size: 139] /%7Emike (Status: 403) [Size: 139] /http%3A%2F%2Fwww (Status: 403) [Size: 139] /cgi-bin2 (Status: 403) [Size: 139] /CGI-BIN (Status: 403) [Size: 139] /**http%3a (Status: 403) [Size: 139] /cgi-trap (Status: 403) [Size: 139] /http%3A (Status: 403) [Size: 139] /trans%5Bpixel%5D (Status: 403) [Size: 139] /cgi-script (Status: 403) [Size: 139] /*http%3A (Status: 403) [Size: 139] /cgi-12 (Status: 403) [Size: 139] /%7Ejeff (Status: 403) [Size: 139] /cgi-app (Status: 403) [Size: 139] /http%3A%2F%2Fyoutube (Status: 403) [Size: 139] /http%3A%2F%2Fblogs (Status: 403) [Size: 139] /image%7B0%7D%5B4%5D (Status: 403) [Size: 139] /http%3A%2F%2Fblog (Status: 403) [Size: 139] i was testing my terget website and i found this many 403 but I can't found any think to report
while i give this routes to 4-zero-3 tool in every 200 OK it is redirecting to the main website
Great ..Pls make complete series bug bounty and pentesting video.
ok brother
funny video bypass has realease right now
it will be "release 2 weeks ago"
Chat gpt💪🏽💪🏽💪🏽
Are kidding me kiddo
😂😂😂😂😂😂😂😂😂
Directory traversal is not a 403 bypass
I tore my hair out... This is a 1 and a half minute video. You and I both suck at typing. So slow, it felt like I had 2 birthdays, waiting for the end. Yjx for the video and info/Content was A1.
i will recommend you for use both of those tools
always waf will prevent you Even if you exceeded 403
Katana Vs ParamSpider which is best ?
use both
You get any bounty bro
no, this is vdp
its not bypass if u not got result or render
Please make playlist on various methodologies to bypass 403 (i mean make video on multiple methodologies)
Yes, i will try
why? he didnt even bypass it in this video.....
It is not bypass. You just go back to the main website
You are right. But nevertheless the tool is interesting.
❤❤
wait for next video
../../ means it go backwards from the current directory.. ur not bypassing it
and ppl will be like yeah look im hacker used kali linux for five minutes
@@retr0.1337 path normalization at its best hey looks me a hacker i bypassed it :)
yeah that is called url encoding
@@retr0.1337 man i am in this field for years and i can confirm this thing he showed is nothing than time waste 🤣
what screen recorder you use ?
obs studio
@@fokhrul1337 Thanks
nice one bro
Thanks 🔥
Thanks ❤❤
KEEP GOING BRO
yes, keep support
I think you just get in a 404 page not a sensitive page or directory...; "Oops it look like you've taken a wrong turn"
i just wanted to show how we can try for bypass 403 error code
yeah that's correct . it is not bypassing
@@fokhrul1337 ok then. fine , thank you bro BTW
🎉🎉
🎉🎉
Very very insightful 👏 👌
Very very Useful video . Thank you for posting.
❤❤
This is php payload. Also teach kids about aspx, cfm, jsp etc. Second thing teach kids, how to exploit lfi rfi vulnerabilities to download shell in web server to complete server compromise. Third you can encode lfi rfi payloads to bypass web servers WAF or filtering. Thanks 🎉❤
Amazing video ❤❤❤❤❤❤❤
please make this video without music .....
Ok brother i thought if i add music in this videoes people will be not bored
@@fokhrul1337 haram
Please make videos in how to hack NASA, Facebook, Google
Meet with me personally i will teach you
@@fokhrul1337 what's your address?