Exploit Cross-Site Scripting(XSS) To Capture Passwords

Поділитися
Вставка
  • Опубліковано 9 бер 2022
  • If an application is vulnerable to cross-site scripting one of the actions that attackers attempt to perform is capturing the username and password of the users and take over their accounts. In a successful scenario if the victim is an admin user of the application then exploiting XSS would allow an attacker to access the admin functions and data and fully compromise the application. During this video we see this scenario in action.
    Web Security Academy | Lab: Exploiting cross-site scripting to capture passwords.
    portswigger.net/web-security/...
    NOTE: This video is made ONLY for educational purposes and to help developers and security researchers to enhance their security knowledge. Therefore, allowing them remediate potential vulnerabilities in their OWN applications.
    Twitter: / tracethecode
  • Наука та технологія

КОМЕНТАРІ • 29

  • @prathameshbakliwal1809
    @prathameshbakliwal1809 2 роки тому +4

    Great video. Got to learn with your nice detailed explanation which was very helpful in understanding what's going on and how to use the XSS payload

  • @MrDARKPSYCHOLOGIST
    @MrDARKPSYCHOLOGIST 3 місяці тому +1

    This Channel Is Amazing Man 👨

  • @cameronrich2536
    @cameronrich2536 3 місяці тому +1

    Nice

  • @meena6911
    @meena6911 Рік тому

    This was a great video, but I don’t really know what to do in my specific situation where can I contact you for help regarding my situation.. because I don’t know if this will workout for me.

  • @LinhNguyen-yz7vo
    @LinhNguyen-yz7vo Рік тому

    hey, why when the victim visit your comment then you can get their credential? can you please explain more? Thanks

  • @montala3380
    @montala3380 8 місяців тому

    Can you explain me why we have to use `https`? I did try with `http`, it does not work...

  • @JuanBotes
    @JuanBotes 2 роки тому +2

    thanks for content explanation \o/

  • @winik2485
    @winik2485 9 місяців тому

    What is that comments box has validation and it we can see the code comments section

  • @youcefhanaia6664
    @youcefhanaia6664 Рік тому +1

    Thanks!

  • @kulshumkhatoonshah9587
    @kulshumkhatoonshah9587 2 роки тому +1

    Nicee edit broo

  • @v0ulls628
    @v0ulls628 Рік тому

    So when they click it, it will bring them to whatever domain you typed in the code?

    • @TraceTheCode
      @TraceTheCode  Рік тому

      When they view the comment, their username/password is sent to the domain in the payload.

    • @v0ulls628
      @v0ulls628 Рік тому

      @@TraceTheCode does this work on windows?

    • @TraceTheCode
      @TraceTheCode  Рік тому

      You can run a web server on windows.

  • @user-un9sh9qe8z
    @user-un9sh9qe8z 5 місяців тому

    thie work for only xss stored ?

  • @zentaxaro6483
    @zentaxaro6483 11 місяців тому +1

    its nice explanation but for burp collaborator you need professional version that not everyone have so its kinda you know pointless

  • @cryptowise658
    @cryptowise658 Рік тому +1

    Do you sell any course

    • @TraceTheCode
      @TraceTheCode  Рік тому

      A web application course will be available in near future.

    • @cryptowise658
      @cryptowise658 Рік тому

      @@TraceTheCode I want bug bounty

    • @sunnyyadavyt
      @sunnyyadavyt Рік тому

      @@cryptowise658 i can teach you

  • @tigreonice2339
    @tigreonice2339 2 роки тому

    And if victim is just an user not admin?

    • @TraceTheCode
      @TraceTheCode  2 роки тому +1

      When attacker got user/pass of a victim user then can take over the account regardless of the victim privileges. If Victim is an admin this can lead to full compromise of the web application data and functions.

    • @tigreonice2339
      @tigreonice2339 2 роки тому +2

      @@TraceTheCode damn. This is insane. THANK YOU for your answer and good video by the way.
      Please if you can make one teaching how to be protrected against beEF the kali linux tool

    • @TraceTheCode
      @TraceTheCode  2 роки тому +2

      My Pleasure!

  • @alexander_adnan
    @alexander_adnan Рік тому

    Title is a bit wild..