This is our continuation series of Junior pentesting learning path. Patreon to help support the channel! Thank you so much! / stuffy24 Hacker Discord / discord
Stuffy back at it again with quality explanations! Keep going bro I've already used and learned from you for a few different basic modules. The -3 in repeater seeking an internal 500 error got me good. smh
Hello. Nice videos! I have one question. I understand that the GET request generates the cookie and the token that we want for our POST request. But the GET request also has a cookie in the request headers, so how is burp suite able to guess that?
Because you already have a connection to the site. This isnt the very first interaction. You are going to the site and then sending the requets to burp.
nice video... but your picture has blocked a very important part of the screen. i think that viewers want to see your screen, not your face. but you explain clearly and well.
I agree with you on that sometimes I do it on purpose. This was not intentional but just for future reference I do it intentionally on some to hide certain things and I try to remember to show the important things. It's a learning process for me as well so I appreciate it
Stuffy back at it again with quality explanations! Keep going bro I've already used and learned from you for a few different basic modules. The -3 in repeater seeking an internal 500 error got me good. smh
Thank you man! I appreciate you all!
When I get stuck, I favor your explanations moreso than other creators covering THM modules. Just wanted to drop in to say thanks!
Thanks so much! Glad it can help!
Great video - was good to hear your opinions.
I'm learning a lot from you sir.Awesome video.
Thank you!
great video man thank you 💯
Great walk through sir!
Thank you !
very helpful thanks you
thank you for the support
The video is a bit hard to see in some parts. but great work, sir. Thank you.
Thanks for the feedback! I have a large monitor so I need to start considering these things!
nice job
Hello. Nice videos! I have one question.
I understand that the GET request generates the cookie and the token that we want for our POST request. But the GET request also has a cookie in the request headers, so how is burp suite able to guess that?
Because you already have a connection to the site. This isnt the very first interaction. You are going to the site and then sending the requets to burp.
Oh, I see. Thank you!
nice video... but your picture has blocked a very important part of the screen. i think that viewers want to see your screen, not your face. but you explain clearly and well.
I agree with you on that sometimes I do it on purpose. This was not intentional but just for future reference I do it intentionally on some to hide certain things and I try to remember to show the important things. It's a learning process for me as well so I appreciate it
@@stuffy24 yeah i understand. it takes lots of courage to start a channel.. lol i really like your explanations.
@@iwasanmijohn2276 thank you man! We're all getting better everyday! I wanna give everyone the resources to become a hacker
yo what is the 12 the one
no wayyyyyyyyyyyyyy
TT
Im not sure what your referencing or asking
@@stuffy24i got it resolved.
There seems to be a problem with task12 of the box.
Just had to use the attack box. :)
@@goatedFool good catch!
@@goatedFoolthanks bro. stuck at task 12 for 2 hours without knowing what i did wrong.