BUG BOUNTY HUNTING: FINDING CROSS SITE REQUEST FORGERY LIVE
Вставка
- Опубліковано 19 вер 2024
- Hi everyone! This video demonstrates how to find cross site request forgery on live websites. Feel free to ask your doubts in the comment section.
Previous Video:
• BUG BOUNTY: LET'S AUTO...
Telegram:
telegram.me/be...
Courses:
Hacking windows with python:
www.udemy.com/...
The Ultimate Guide to hunt Account Takeover:
www.udemy.com/...
I wish I've got this channel when I was starting Bug bounties, this is so awesome man.
nice explained bro i got it nicely
Thank you so much for this video, i was having one doubt that. If they are using XSRF token in cookies: header then, that is sufficient for csrf or not?
For most of the time, Yes!
🔥🔥
Why when i go on your website i can't find labs
I found B-SSRF in hackerone program ,but I only get request back in my burp collaborator. This is enough for POC ? please tell bro ..
Bro how to jwt token confusion key bypass ?? With kali Linux
can we get csrf on admin login page?
Bro, it's self csrf that is a informative issue and no impact.
Csrf led to victims account name or anything change. Here you can show us s crsf that is you do in your account not victims account.
@@BePracticalTech can you tell me please it’s Impact?
And if I find the same issue can i report it??
And what the severity is??
Ni