Open Redirect Vulnerability Explained

Поділитися
Вставка
  • Опубліковано 15 гру 2024

КОМЕНТАРІ • 141

  • @_JohnHammond
    @_JohnHammond 5 років тому +398

    These are awesome, dude! Happy you see you starting up a show!

  • @loralori57
    @loralori57 2 роки тому +15

    This video gives me a ton of information in a clear logical way in 8 min ! I didnt understand or remeber it all but I can do research on the topic easily ! Thank you ! This is helpful

  • @_shariq
    @_shariq 4 роки тому +19

    I always wait for that cool ending ♥

  • @nahmedfaisal
    @nahmedfaisal 5 років тому +10

    What a great detailed video.. really loved it!
    next time i will just forward this video link, whenever anyone asks me about open redirects.
    You got me subbed and i will wait for more contents from you :)

  • @epic_baller123
    @epic_baller123 3 роки тому +25

    I hope for the day where I come back to this video and flawlessly understand everything you said

  • @topicsoninternet
    @topicsoninternet 5 років тому +5

    Awesome man! After a long time, I found an awesome video. Please continue to upload such content.

  • @THREAT_CON
    @THREAT_CON 5 років тому +9

    Amazing video dude !! Keep it up. And thanks for the awesome challenge :)

  • @abdilahrf
    @abdilahrf 5 років тому +50

    the next liveoverflow ? focus on web exploitation topic should be good i think, keep it up buddy!

    • @PwnFunction
      @PwnFunction  5 років тому +32

      I wish, but he's too good. I'm not even close to his knowledge/experience level and he's a person I look up to.
      For now, yes, I'll be focusing on Web, others later.

    • @PlanetComputer
      @PlanetComputer 3 роки тому +1

      fghj

  • @candidojosepargacruz8331
    @candidojosepargacruz8331 5 років тому +39

    This is explained so simple. And i feel like i still saw a video on Chinese.

  • @thefrozenindie2056
    @thefrozenindie2056 5 років тому +2

    Subbed Bro keep up the great work and very good quality

  • @surya-ur5vv
    @surya-ur5vv 4 роки тому +2

    One of the best video i seen Open Redirection . Thanks for doing this kinds of videos it will be very usefull for beginers

  • @dougthefiddler
    @dougthefiddler 3 роки тому +1

    Very clear explanation with simple graphics. Thanks!

  • @Warpgatez
    @Warpgatez 2 роки тому

    Just found you and I love all these videos. You got some pretty nice digital handwriting and drawing. That flask logo. 👍

  • @m5rian
    @m5rian 2 роки тому

    I love the drawings lmaoo, good video :0

  • @alexgarcia9852
    @alexgarcia9852 3 роки тому

    The best quality programing content ever
    Ever

  • @mrkii2056
    @mrkii2056 5 років тому +7

    Can I call your Mom, Mom? cause You sounded like, you are my big brother, n you explained everything to me so sweetly

  • @rahulvaswani4966
    @rahulvaswani4966 5 років тому +1

    Sir please more videos on different vulnerabilitys
    Great video

  • @carlos.rberto
    @carlos.rberto 4 роки тому +2

    Very good explanation! Thank you.

  • @UsamaAli-kr2cw
    @UsamaAli-kr2cw 5 років тому +1

    Amzing bro keep going u got my sub😍😍

  • @yagi_4048
    @yagi_4048 3 роки тому

    Wow, this channel is underrated !

  • @kabeerjaffri4015
    @kabeerjaffri4015 3 роки тому

    I like how chill he is

  • @0x2shadow19
    @0x2shadow19 4 роки тому

    Amazing channel. Don't stop making videos like this

  • @vishaldhanani7241
    @vishaldhanani7241 4 роки тому +1

    Very clear and good amazing video.I want to learn more such things from you.

  • @yoeriyoeri4264
    @yoeriyoeri4264 5 років тому +2

    You've got my sub man! Keep up the good work!

  • @alextotun
    @alextotun 2 роки тому

    Very informative, and deep for understanding video! I have blow in my thinking about this..) Thanks! Good luck!

  • @theprogrammer9308
    @theprogrammer9308 3 роки тому

    Why this channel is so amazing 😌

  • @hopeme5941
    @hopeme5941 5 років тому +2

    Your awesome...and your video to good..bro

  • @selvamanir8671
    @selvamanir8671 2 роки тому

    Your contents are valuable for self-learners

  • @theprogrammer9308
    @theprogrammer9308 3 роки тому

    I love the music at beginning

  • @magnoliacomputerscience7334
    @magnoliacomputerscience7334 5 років тому +2

    Great content here is your sub

  • @TNTpeoplenetwork
    @TNTpeoplenetwork 5 років тому

    I didn't find video like this. Keep it up

  • @tobiasmayer4492
    @tobiasmayer4492 5 років тому

    Ok, this was awesome! Nice Tut

  • @supersaiyan0x016
    @supersaiyan0x016 5 років тому +4

    Great vedio... explained everything so simply 😍 Keep on going... you earned my respect 😀

  • @RAZREXE
    @RAZREXE 3 роки тому

    And thus, a legend was born

  • @Siik94Skillz
    @Siik94Skillz 5 років тому

    Please your videos going, they are amazing

  • @vrindavihari7798
    @vrindavihari7798 4 роки тому

    Well Explained, Tq. And BGM , loved it.

  • @esmailahmed1457
    @esmailahmed1457 5 років тому

    keeeeeep going maaaaan .. u are perfect

  • @mohammedal-shaboti7939
    @mohammedal-shaboti7939 5 років тому

    Very good explanation, you are awesome.
    Thaaaaanks

  • @0xyg3nSecurity
    @0xyg3nSecurity 3 роки тому

    YOOOO Social Engineering is an essential skill because we all know when 'something' does not brake from the outside it does from the inside and of course the human factor will always be vulnerable.

  • @bina7513
    @bina7513 3 роки тому

    PwnFunction: What could possibly go wrong?
    Me: Everything.

  • @sodiboo
    @sodiboo 3 роки тому +4

    With your download chrome example, don’t most browsers tell you where the file is downloaded from? Firefox would say “ChromeSetup” for what you downloaded and in a smaller line below it “Downloaded from attacker’s website”, could this possibly be faked in a dangerous way (something like how mega does downloads? completely on the page and only sends your browser the finished file, which i guess is intended for stuff you make in-browser, the browser should handle remote downloads, right?) or does the attack only work on browsers that don’t tell you which server it downloaded the file from?

    • @ZoranRavic
      @ZoranRavic 2 роки тому +1

      Even if it is displayed I don't see why you couldn't just use a custom domain name that includes the name of the website you're exploiting.

  • @Stormflower
    @Stormflower 2 роки тому

    I was looking for an Olivia Rodrigo audio file, and I found a website that redirected me to some website where the screen said something about my iPad having 19 viruses....

  • @noobsecurity5401
    @noobsecurity5401 5 років тому +1

    nice explanation, got subs from us :)

  • @b.tulsirao7724
    @b.tulsirao7724 5 років тому +1

    Love your vids👍

  • @Astrx-kc6lr
    @Astrx-kc6lr 4 роки тому

    I discover ur channel now, cool man!

  • @normalitee0os
    @normalitee0os 2 роки тому

    MAN!!! Your explanation just drilled the concept hole in my brain! I finally understand How is this a vulnerability and the Thomas Example was cherry on cake! It gave a good understanding~

  • @karimdhrif6679
    @karimdhrif6679 5 років тому

    Thank you for making great content!

  • @luciacanonsantos5171
    @luciacanonsantos5171 3 роки тому

    Love your videos! Thanks!!

  • @zeqizhang5860
    @zeqizhang5860 5 років тому +1

    nice work!!!

  • @RelabTV
    @RelabTV 2 роки тому

    you explain this so clearly and so well. good work!

  • @oxovi
    @oxovi 5 років тому

    Ur rocking dude
    Love u 😘

  • @abdellahamud7328
    @abdellahamud7328 5 років тому

    Just got my equipments to start hunting thanks alot

  • @redactedansh
    @redactedansh Рік тому

    Well explained! ❤️

  • @msodev
    @msodev 5 років тому +1

    Cooooooooool channel. but plz place those browser window green, yellow and red buttons on the left :)

    • @PwnFunction
      @PwnFunction  5 років тому

      see 2:20, I'm just following what I have XD

    • @msodev
      @msodev 5 років тому

      @@PwnFunction damn you're right! right... got it??? ahhahahahaha

    • @msodev
      @msodev 5 років тому

      @@PwnFunction i'll pay more attention next time XD

  • @harshant1
    @harshant1 5 років тому

    quality content ....... awesome

  • @realadam_official
    @realadam_official 3 роки тому

    A really good one! Thank you!

  • @PyaeSone-gd4ui
    @PyaeSone-gd4ui 4 роки тому

    Absolutely brilliant

  • @tanmaynayak6169
    @tanmaynayak6169 5 років тому +1

    Awesome..

  • @ankitpatel-tr1wc
    @ankitpatel-tr1wc 5 років тому +1

    Awesome content

  • @Iliasbhal
    @Iliasbhal 3 роки тому +2

    How can someone use an open redirect to take over an account?
    - password tokens are not listed anywhere. how can the hacker find the token?
    - even if the token is found, there is a HIGH chance it is expired.
    - even if the token is found, the token is deleted right after the password reset.
    Also if the hacker has the token, why not directly resetting the password himself?

    • @Iliasbhal
      @Iliasbhal 3 роки тому

      Also, I've just discovered this channel, and it's a gem!

  • @aneeshnadh5377
    @aneeshnadh5377 4 роки тому

    This is really informative

  • @CheckersX
    @CheckersX 2 роки тому

    Awesome videos.

  • @mayurparmar5509
    @mayurparmar5509 4 роки тому

    awesome content bro

  • @thefoxguy
    @thefoxguy 3 роки тому +1

    If I make a open redirect and if it redirects out of the site I show a Warning that you are leaving the site.
    (I coded so everytime ANY redirect is ran it shows the warning first, then redirects to the target after accepting
    It shows the URL it is redirecting to and with a Fat Warning text

    • @thefoxguy
      @thefoxguy 3 роки тому +1

      ( this is for user generated content, for internal redirects I use backend anyways without NEXT or so parameter )

    • @NStripleseven
      @NStripleseven 3 роки тому +1

      That’s one way to fix it, yeah. Might be a little annoying for the user, but it does work.

  • @dylanriley2770
    @dylanriley2770 3 роки тому

    fantastic videos wow

  • @joachim4660
    @joachim4660 3 роки тому +3

    Awesome video!
    Also, it's better to send tokens via POST method rather than GET. That could solve the issue, but still very well demonstrated. 👍

    • @tycooperaow
      @tycooperaow 2 роки тому

      Why do you claim so?

    • @joachim4660
      @joachim4660 2 роки тому

      In the given example, the token leak could have been easily prevented by sending the token in the body or header, not as a part of the URL. But yeah, I was wrong, method has nothing to do with it. It's about having the token in the URL.

  • @sumspiew
    @sumspiew 5 років тому

    Good content and explanation!:)

  • @ignitor9941
    @ignitor9941 5 років тому +1

    Awesome

  • @pets4363
    @pets4363 11 місяців тому

    Can you change the auto-generated subtitles for this video from Korean to English?

  • @michael-gary-scott
    @michael-gary-scott 5 років тому +5

    Oh boy. I'm totally guilty of this one.

  • @aungkyawphyo4069
    @aungkyawphyo4069 4 роки тому

    btw I like your drawing XD

  • @xnl-h4ck3r
    @xnl-h4ck3r 3 роки тому

    I was just watching through your video again, but needed subtitles... "Korean (auto generated)"?! That confused me for a second! :)

    • @PwnFunction
      @PwnFunction  3 роки тому +1

      UA-cam works in mysterious ways.

  • @the_coding_traveller
    @the_coding_traveller 3 роки тому

    i like the way how you said INTERNET EXPLORER whahahaha

  • @slaxblake
    @slaxblake 5 років тому

    Hey! if the websites instead of redirecting to another domain, loads content from the domain you select, does count as a vulnerability? how can i exploit it?

  • @vakyz5333
    @vakyz5333 4 роки тому

    Great content

  • @psm876
    @psm876 4 роки тому

    You are awesome...

  • @freddiemercury6808
    @freddiemercury6808 5 років тому +2

    Good video! the flickering when some (wrong) drawing is removed is really annoying though.

  • @caohocnguyen7847
    @caohocnguyen7847 2 роки тому

    I try to simulate the code in the end of the video and trigger XSS, but i can not trigger XSS. Could anyone help me ?

  • @techworld3043
    @techworld3043 2 роки тому

    what do you use to create these videos ?

  • @mrmedia7866
    @mrmedia7866 3 роки тому

    please answer to me, what is the name of this app?

  • @lekenn2920
    @lekenn2920 3 роки тому

    God , i didn't understand anything. but i will😎

  • @elysamsepi0l703
    @elysamsepi0l703 3 роки тому

    Someone knows which theme the editor use in vscode?

  • @yoeriyoeri4264
    @yoeriyoeri4264 5 років тому

    What program did you use for the drawings?

  • @_shariq
    @_shariq 3 роки тому

    Can you please tell me the name of your terminal fonts?

  • @charlesmacklon9222
    @charlesmacklon9222 4 роки тому

    It's awesome

  • @zunigasecurity
    @zunigasecurity 3 роки тому

    So beautiful

  • @subzey
    @subzey 2 роки тому

    1:00 Luckily PHP removes all the newlines in the header() argument or else it could be much more interesting :D

  • @santoslily7430
    @santoslily7430 5 років тому

    Great vedio! But where can I find the english caption?

  • @TheIndiaView
    @TheIndiaView 3 роки тому

    Just found like 10 open redirects on a site and it's other domains. will try to escalate those 😉

  • @umeshpatil5654
    @umeshpatil5654 5 років тому +1

    How we can get token as it is seCret token ?

    • @PwnFunction
      @PwnFunction  5 років тому

      From `Referer` header, which contains the address of the previous web page and in the url, there's the token. Only exploitable if the token is not expired or reusable or not used.

  • @sayidshayan7610
    @sayidshayan7610 2 роки тому

    How an attacker change url parameters on a website into desired url

  • @uwuster
    @uwuster 4 роки тому

    Is your intro a wireshark packet? XP

  • @gustavstreicher4867
    @gustavstreicher4867 Місяць тому

    So, I guess it's important to resolve the URL before checking against it.

  • @selvamanir8671
    @selvamanir8671 2 роки тому

    Bro put videos regularly

  • @birb9254
    @birb9254 5 років тому

    make more vids about web hacking... nice job

  • @mcmundn8544
    @mcmundn8544 5 років тому

    idk anything of those topics. i like your video style tho.

  • @juliocesar9443
    @juliocesar9443 5 років тому

    AMAZING FUCKING VIDEO !!!!

  • @netbin
    @netbin 3 роки тому

    Foma Kinyaev

  • @r4nd0m25
    @r4nd0m25 3 роки тому

    Please put the english subtitles

  • @yoshihirotogashi6898
    @yoshihirotogashi6898 3 роки тому

    1337 reference