Це відео не доступне.
Перепрошуємо.

BUG BOUNTY: BYPASSING WAF TO GET LFI (REAL TARGET) | 10K SPECIAL | 2023

Поділитися
Вставка
  • Опубліковано 29 жов 2023
  • Note: This video is only for educational purpose.
    Learn cybersecurity from one of the best and affordable platform on the internet.
    Securzy Official Website: securzy.io
    Use Coupon FAIYAZ50 to get 50% discount on premium membership
    Hi everyone! Learn how to bypass weak web application firewalls to get local file inclusion
    Website: bepractical.tech
    Telegram: telegram.me/be...
    Previous Video: • BUG BOUNTY: FINDING LF...
    Hacking Windows with Python from Scratch: www.udemy.com/...
    The Ultimate Guide to Hunt Account Takeover:
    www.udemy.com/...

КОМЕНТАРІ • 33

  • @mandikgoyal7740
    @mandikgoyal7740 9 місяців тому +5

    Very Informative Videos Keep up the good work

  • @Th3-Noob-Audit0rs
    @Th3-Noob-Audit0rs 9 місяців тому +4

    ❤ hope your video's bypass UA-cam guidelines also

  • @FAHADKHATRI12
    @FAHADKHATRI12 9 місяців тому +2

    This is valuable information!

  • @Fractal_reComm
    @Fractal_reComm Місяць тому

    Dude, I'm a big fan and I admire and inspire me, your work, I would like you to help me find simpler sites like this. Generally, my targets are very well protected, but it's possible to overcome them.
    them and this takes much more time than in simpler systems, I have little experience but I have already found some cool vulnerabilities,
    I still can't afford better education in cybersecurity, I would be very happy and I'm sure that the entire community that is also starting out would be very happy and would help a lot, thank you for everything, I hope you read it

  • @user-eq1er5lh3d
    @user-eq1er5lh3d 9 місяців тому

    Congratulation on you 10000 subs!!!) You deserve MORE!!!!

  • @zahiruddinahmad55
    @zahiruddinahmad55 9 місяців тому +4

    Please make a video 403/404 bypass

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked 9 місяців тому

      Yeee. More of these would be awesome. Hehe. I know we can add hostname:3000, and some stuff like that.

  • @gauravkesharwani5557
    @gauravkesharwani5557 4 місяці тому

    Great explanation bro. Many people teach if we want to check for such vulnerabilities we need to use payloads like ../../../../etc/passwd. However you shared another perspective - why to just try /etc/passwd, if we can check with other files within web root leading to source code reveal. Thanks for sharing this content

  • @Deepakkumar-pm2kt
    @Deepakkumar-pm2kt 9 місяців тому

    Loved the video man. Learnt a lot from how your explanations.

  • @islamkafafy6984
    @islamkafafy6984 9 місяців тому

    Wow Dude you are amazing keep uploading top tier videos more

  • @HunterX461
    @HunterX461 9 місяців тому

    Congratulations bro for 10k fam ❤🎉Next milestone is of 50k subs😊

  • @abduls4479
    @abduls4479 9 місяців тому

    Awesome video.. thanks man

  • @imran_hossain123
    @imran_hossain123 8 місяців тому

    Thanks from Bangladesh

  • @user-wm5nx2qx4v
    @user-wm5nx2qx4v 9 місяців тому

    you amazing man, thanks for the effort, you really work hard to give us the best content, and we appreciate it.

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked 9 місяців тому

    Early crew. :3

  • @hamzaannane885
    @hamzaannane885 9 місяців тому

    From 10k to 100k 🎉🎉🎉 one day

  • @akashpatel-bs8ve
    @akashpatel-bs8ve 9 місяців тому

    Nice information, jump to 4:00 to main content 👍

  • @MRIDULSG
    @MRIDULSG 9 місяців тому

    I have a question regarding this. What I understand is in LFI, you can actually execute the files on the server. In this case, the index.php file shall show the output of the executed version of the index.php file instead of showing the source code. In directory traversal, we can see the content of the file. Please Correct me if I'm wrong.

    • @BePracticalTech
      @BePracticalTech  9 місяців тому

      Actually in local file inclusion, you will be able to see the contents of files present on the server. However, there are certain scenarios where you'll be able to execute the files(like you mentioned) but it depends from target to target.
      The vulnerable endpoint here was actually serving the content of the pdf that's why we were able to get the content of source code.
      Hope you understood

  • @tanvirmridha
    @tanvirmridha 9 місяців тому

    😮

  • @TechAmbition
    @TechAmbition 4 місяці тому

    Bro targeting real host
    *Only for educational purposes 😅

  • @mnoobb69
    @mnoobb69 2 дні тому

    Where are you from bro?

  • @hamzaannane885
    @hamzaannane885 9 місяців тому

    Keep going 🎉🎉🎉 u are the best

  • @Be_Buddhaa
    @Be_Buddhaa 9 місяців тому

    How many programming languages do you know?😢

    • @BePracticalTech
      @BePracticalTech  9 місяців тому

      I know few programming languages

    • @Be_Buddhaa
      @Be_Buddhaa 9 місяців тому

      @@BePracticalTech name please ?🥵🔥

  • @oswardgaming3223
    @oswardgaming3223 9 місяців тому

    Bro i am new in bug hunting so suggest me the right path for bug hunting

    • @BePracticalTech
      @BePracticalTech  9 місяців тому

      Join our telegram community: telegram.me/bepracticaltech