Live XSS Exploit: Using XSSFuzz to Break CSP on a Real Target!

Поділитися
Вставка
  • Опубліковано 17 лис 2024

КОМЕНТАРІ • 42

  • @BePracticalTech
    @BePracticalTech  Місяць тому +4

    xssFuzz: github.com/Asperis-Security/xssFuzz/

  • @ehimuanfrancis3225
    @ehimuanfrancis3225 2 дні тому

    I love the way you teach and also use real website for it ❤

  • @MustafaGains
    @MustafaGains Місяць тому +4

    This tool really helpful and time saving. it’s just give us a hint of weakness points in the CSP So that we can move forward to focus of this weakness to get an xss. ppl really dont even wanna read about the tool to understand what’s the tool purpose and what’s doing for us to use it correctly.

  • @chhavidudeja
    @chhavidudeja Місяць тому

    Amazing! I really enjoyed the whole video and took notes. I will be using this tool soon. Keep doing the great work :)

    • @BePracticalTech
      @BePracticalTech  Місяць тому

      Really glad that you liked the video, Thanks for the support!!

  • @haxonit
    @haxonit Місяць тому

    finally found a video where the youtuber is not saying to test out random payloads

  • @franciscomesquita2023
    @franciscomesquita2023 Місяць тому

    Very good" More videos on xss stored.

  • @paramjeetsinghthiara1807
    @paramjeetsinghthiara1807 Місяць тому +1

    Great! 👍 Got to learn new technique

  • @the_watson
    @the_watson Місяць тому

    Form your video I learn new thing osm

  • @CyberSecHemmars
    @CyberSecHemmars Місяць тому +2

    I was testing a web app and I injected a simple XSS alert(); but after reading the source, i noticed that the dangerous character were swapped with HTML escape character, for example "

    • @BePracticalTech
      @BePracticalTech  Місяць тому +2

      Generally they are considered to be safe! However there are certain scenarios where we can still get xss if the mitigation is weak or if it the value is reflecting in some interesting areas( like within a js code etc)

  • @abdulx01
    @abdulx01 Місяць тому

    This is like generation base fuzzing. But its not enough to break sanitizer waf. You can add more mutation strategies.

    • @BePracticalTech
      @BePracticalTech  Місяць тому

      We'll release more new features in the upcoming versions

  • @raghs3889
    @raghs3889 Місяць тому

    nice video... thank you very much

  • @Offended.
    @Offended. Місяць тому

    great content

  • @raghs3889
    @raghs3889 Місяць тому

    Hey you did not specify the "title" parameter, how did the tool show that parameter is vulnerable without you specifying the parameter in the syntax? did it check other parameters that are there in the url already or am i missing something?

    • @BePracticalTech
      @BePracticalTech  Місяць тому

      Exactly, it will check all the parameters and then start testing the one which is not handling the dangerous chars properly

  • @swathipinky1605
    @swathipinky1605 Місяць тому

    can you give me that index code that you have used to execute xss

  • @RajuHa-g3m
    @RajuHa-g3m Місяць тому

    Make a video on dom base xss please

  • @vongochoanglam6328
    @vongochoanglam6328 Місяць тому

    can u rcm me the book or course tutorial for ctf web exploit

  • @musabsk
    @musabsk Місяць тому

    is it possible to test multiple urls at a time, kindly suggest

    • @BePracticalTech
      @BePracticalTech  Місяць тому

      @@musabsk I believe Asperis Security will release this feature in the next version!

  • @govindkumarjha2500
    @govindkumarjha2500 Місяць тому

    It accept payload like: ">alert(1) ???

  • @TheStoicTales
    @TheStoicTales Місяць тому +4

    Normally people already know what is xss-dom-reflected...etc...Please next time go straight to the point/pentest to the live target. Thanks for the video,keep it up

  • @akhilreddy9753
    @akhilreddy9753 Місяць тому

    Should we do it by giving blind xss payload also

    • @BePracticalTech
      @BePracticalTech  Місяць тому

      Please elaborate

    • @akhilreddy9753
      @akhilreddy9753 Місяць тому

      @@BePracticalTech you are created you own server and add the path where you setup the T.txt file . Instead we also do like same thing in blind xss payload also . Like

    • @RajuHa-g3m
      @RajuHa-g3m Місяць тому

      He want to say like he gives his blind xss payload and then check for xss but it doesn't make any sense he can try manually also for blind xss ​@@BePracticalTech

  • @uttarkhandcooltech1237
    @uttarkhandcooltech1237 Місяць тому

    ❤❤❤❤ love u bhai

  • @Sanjoyg10
    @Sanjoyg10 Місяць тому

    Sir which vps u r using?

  • @SecureByBhavesh
    @SecureByBhavesh Місяць тому +1

    First 🥇

  • @lakshaygamerlt4032
    @lakshaygamerlt4032 Місяць тому

    give you xss payloads

    • @BePracticalTech
      @BePracticalTech  Місяць тому

      @@lakshaygamerlt4032 There are cusom payloads already present in the tool

  • @Max-mz3is
    @Max-mz3is Місяць тому +1

    this tool doesn't work and not reliable at all try to run it against testphp it doesn't come up with basic xss such crap

    • @BePracticalTech
      @BePracticalTech  Місяць тому +4

      @@Max-mz3is As I have mentioned in the video, this tool is not your typical xss automation tool. It is more like fuzzing the xss payload's components like tags, events etc
      However, if you want to automate xss with this tool then you can use the xss payloads file and it will work without any issues.
      I would suggest you to watch the whole video and understand how to use this tool