We already covered a lot of videos on sql injection that too on live websites. Check out our playlist: ua-cam.com/play/PLrQwMS8b1fmQkMnul6q06vvZL83BuK9Ud.html
Excellent video 📹 brother. How to find vulnerable parameters and endpoints. I found many endpoints and parameters from paramspider collector parameth arjun x8, etc, but all of them failed in sqlmap or Ghauri because they are not injectable. How to solve this crucial problem. Thanks for your help and support. 🎉❤
I have a case, about xss stored, when I input: '-alert(1)-' '-alert(document.domain)-' '-alert(document.cookie)-' The 3 payloads above successfully bring up the xss popup but when I input this payload to steal cookies, why doesn't it work? '-src="//example/c.js"-'
Wow its amazing , please make video after i got xss what next can i do .
quality content. i always prefer manual rather than automated
yeah dude automated tools are outdated now, because of WAF or other CDNs so try mannualy, and be unique from the crowd
Please make one more video in where we try bypassing WAF by inputting in equal to sign in our payload around the angular tags
Informative, Please make video on SQLi
Maybe u check in forget paswword for sqli
Thx, best video about xss
amazing . Make video on how to write bug bounty report
Bro u are a gem 💎
Please make a video on "XSS finding Methodology"
Please teach me how to do price tempering and how to know that this sites we can do price tempering
Please make some tutorial on BACs !!!
Please make a video xxe basic and next level
make some video on p1 bugs..
beautiful bro!!!!
is the lab that you use available in docker? if yes can you share to us
good one
Plz make video over sqlmap on live site not on test web
We already covered a lot of videos on sql injection that too on live websites. Check out our playlist: ua-cam.com/play/PLrQwMS8b1fmQkMnul6q06vvZL83BuK9Ud.html
Thanks bro
Please, I'm looking for that's video where you used Ngrok to demonstrate a vulnerability, please can you direct me there
Here you go: ua-cam.com/video/Obu2sMfEiT4/v-deo.htmlfeature=shared
Bro yeah to client side per ho reha he khud ke browsers me change se kya fark padega
Please share your window theme
Hi bro i didn't under that adding attributes step by encoding can you please clear it?
sir if any value is not reflected in source code what shall we do
How to use subspy pip package
intruder allowed by website or not? plz reply
use this in react js broh
Excellent video 📹 brother. How to find vulnerable parameters and endpoints. I found many endpoints and parameters from paramspider collector parameth arjun x8, etc, but all of them failed in sqlmap or Ghauri because they are not injectable. How to solve this crucial problem. Thanks for your help and support. 🎉❤
Wow 🎉
how to download your wallpaper
pleasse the background windows
how can i bypass html entity encoding
this is very basic how about where //"" all of these are being detected and blocked ???
Where is waf bypassing scenario?
if this symbol block what can do
Then we need to check where our given value is reflecting. Based on that, there could be other ways to execute xss
@@BePracticalTech how, give the examples
Where can we find this particular lab ?
❤❤❤😊
I don’t understand how WAF is being bypassed over here.
there is no waf bypassing in this video.
@@khanshaheb4500 Why does the title say so ?
@@AtulRawatpredator not here he is just referring to the context where how u can bypass one
I have a case, about xss stored, when I input:
'-alert(1)-'
'-alert(document.domain)-'
'-alert(document.cookie)-'
The 3 payloads above successfully bring up the xss popup but when I input this payload to steal cookies, why doesn't it work?
'-src="//example/c.js"-'
Maybe they have added a protection to prevent js code to read cookies