CORS - Lab #1 CORS vulnerability with basic origin reflection | Long Video

Поділитися
Вставка
  • Опубліковано 27 жов 2024

КОМЕНТАРІ • 24

  • @RanaKhalil101
    @RanaKhalil101  2 роки тому

    Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE ✨✨

  • @dragoschiperi8090
    @dragoschiperi8090 2 роки тому +2

    Great work! Thanks for explaining how to solve the lab without the "Go to exploit server" functionality.

  • @sarasevdari7159
    @sarasevdari7159 2 роки тому +1

    Girl your explanation is fantastic. Much love, keep going

  • @medogamer8524
    @medogamer8524 Рік тому

    the GOAT of explainig

  • @wizix9877
    @wizix9877 2 роки тому +2

    I love your videos. keep up the good work. Thank you.

  • @Guilhermecpv762
    @Guilhermecpv762 2 роки тому +1

    Thanks from Brasil, you are amazing!!

  • @suryatejakalidindi485
    @suryatejakalidindi485 3 місяці тому

    thank you madam , please make a video on information disclosure

  • @سامرسعيد-ي1ب
    @سامرسعيد-ي1ب Місяць тому

    Thanks from iraq❤

  • @TheBroadwood
    @TheBroadwood 2 роки тому

    Since in the fetch method, there is not the full uri given, how does the fetch method know that it has to GET-Request the exploit server? 🤯

  • @xoro163
    @xoro163 2 роки тому

    what if the request is using only post method? how to create the payload??

  • @acronproject
    @acronproject Рік тому

    Thanks

  • @pranjalruhela1103
    @pranjalruhela1103 Рік тому

    There was never ...even once anything mentioned related to the admin account in our script...still how come the logs display the admin info??

    • @yashchaudhary6146
      @yashchaudhary6146 11 місяців тому

      Since its just a lab so burpsuite labs have made it in such a way that simulates a real hacking behaviour.

  • @MoohHunter
    @MoohHunter 8 місяців тому

    you are amazing ^_

  • @burptester8761
    @burptester8761 Рік тому

    It's very difficult for to send email to an admin when you don't have his email. I tried to do a pentesting on website, I found the admin username but not his email. Is there any other solution @Rana ?

    • @wadadparker957
      @wadadparker957 6 місяців тому

      Buddy this is just for information, don't actually send phishing links to admins 💀

  • @Tokga-m5r
    @Tokga-m5r Рік тому

    @Rana Khalil is it necessary that i must write a script to go through i dont know how to code im trying to get started in bug bounty

    • @wolfrevokcats7890
      @wolfrevokcats7890 9 місяців тому

      bug bounty is very competitive. You should learn how to code

    • @Tokga-m5r
      @Tokga-m5r 9 місяців тому

      @@wolfrevokcats7890 what languages, I’m learning python steadily , recently I googled what programming languages are used by osi model do you think finding that information is any good

  • @Fahodinho
    @Fahodinho 2 роки тому

    what's the significance of apikeys why is it a secret information? what can you do with it? and wouldn't the session key be more critical because you can steal it and impersonate a user?

    • @domssilva1752
      @domssilva1752 2 роки тому +2

      api keys are usually used by developers to access paid services. leaking the api key could lead not only to private users info leak but also business financial loss

    • @itsm3dud39
      @itsm3dud39 2 роки тому

      @@domssilva1752 where can i learn api vulnerabilities and attack?

  • @tiago7w_583
    @tiago7w_583 2 роки тому +1

    top

  • @TANKBM
    @TANKBM 2 роки тому +1

    لايك وانا مغمض