Watch how Hackers deface websites...

Sdílet
Vložit
  • čas přidán 4. 03. 2024
  • Check out Fing, an awesome network administration tool that lets you manage your network like a Pro! Get 25% off on the premium version using my link: bit.ly/3wOU6e1
    In this video, I demonstrate how hackers deface websites with Stored Cross Site Scripting (XSS). Stored cross-site scripting arises when an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way.
    If you don't know what defacing is, it simply means maliciously changing the content of a website so that whenever any user goes to the website they see the content that has been put there by the hacker instead of the actual website.
    The website that I used in this video is an open source web application that is built to be vulnerable to numerous vulnerabilities. I made some minor modifications to the app to help me perform my demonstration.
    The modified docker image of the app can be found here: hub.docker.com/r/tejaswaroop1...
    DISCLAIMER: This video is intended only for educational purposes.
    The experiments in this video are performed in a controlled
    lab setup and not on a live target. The content is purely
    from a penetration testing perspective. I do not
    condone or encourage any illegal activities.
    To setup this vulnerable app on your computer, install docker and execute these commands:
    1. Pull the Image from docker hub:
    docker pull tejaswaroop156/juice_shop_mod
    2. Start the app
    docker run -d -p 3000:3000 tejaswaroop156/juice_shop_mod
    Join my Discord: / discord
    Follow me on Instagram: / teja.techraj
    Website: techraj156.com​​​​​
    Blog: blog.techraj156.com
    Thanks for watching!
    SUBSCRIBE for more videos!
  • Věda a technologie

Komentáře • 42

  • @mnageh-bo1mm
    @mnageh-bo1mm Před 3 měsíci +3

    man your videos are so clear and the music is just mwah

  • @user-jp6ud3qx6l
    @user-jp6ud3qx6l Před 3 měsíci +7

    Long time here. Best video ❤

  • @mohitjain4943
    @mohitjain4943 Před 3 měsíci

    Have been watching you for years!

  • @ttgyanofficial
    @ttgyanofficial Před 3 měsíci +10

    Full video on this with full explanation

    • @codeberry8230
      @codeberry8230 Před 15 dny

      It is full video and all things all explained

  • @leyashu0799
    @leyashu0799 Před 3 měsíci +4

    Hello buddy, can you make a full course on website defacement please

  • @xXxMAKAR0VxXx
    @xXxMAKAR0VxXx Před 2 měsíci

    Wow, you really intelligent and full of knowledge

  • @vlogsprasenjit
    @vlogsprasenjit Před 3 měsíci

    Great Video 👍

  • @opposite342
    @opposite342 Před 16 dny

    1. I don't think this changes every part of the website. Just the url that linked to this user. I might be wrong here but that's how I interpreted this. Especially if the server rerenders thing on requests (Say with a templating engine). Then I don't see how this could pollute any code outside on this user's link.
    2. The initial payload needs to be hosted, but once it's does its job, depending on whether the website backends rerenders the page on request or not, it might not needed to be continuously hosting. However, in most modern sites it most likely will still be rerendered. So you will have to continuously host the script.js somewhere.
    Now, what's the point of this? Say if you have a site someone can donate to you via your user page. You can have a part of your bio be replacing the donate button to link to your own site - and then card stealing that way. (Literally 101 example of xss)

    • @opposite342
      @opposite342 Před 16 dny +1

      Essentially, the target user has to have the script run on their browser. If you search xss and then go to snyk's link on it, you'll even see that their example relied on you chatting a user and the script being passed onto that user's browser - which is the essentials needed for xss.

  • @girivasan4311
    @girivasan4311 Před 3 měsíci

    Hi
    How to install wordpress in subdirectory in aws

  • @Arian-Ices
    @Arian-Ices Před 3 měsíci

    How does fing block system work as it's doesn't access your router admin panel

  • @user-hq8wm8giyujcg
    @user-hq8wm8giyujcg Před 3 měsíci

    Can i use social media by create account in them through being anonymous

  • @saleemahmed8302
    @saleemahmed8302 Před 3 měsíci

    So after injecting the payload how does a website get rid of the code? Because in real world scenarios this can cause a lot of damage.

  • @ttgyanofficial
    @ttgyanofficial Před 3 měsíci

    Another video on this topic

  • @krivadnaaiservices
    @krivadnaaiservices Před 3 měsíci

    How to host a file on the target website where we left the xss payload.. that's is where the defacement takes place...

  • @SCLEDONFF
    @SCLEDONFF Před 3 měsíci

    bro HTML page not showing why ??

  • @user-hq8wm8giyujcg
    @user-hq8wm8giyujcg Před 3 měsíci

    Im learning hacking, can u tell me what are the best pro hacking group i want to join

  • @beatboss8702
    @beatboss8702 Před 3 měsíci

    How r u doing brother 😁💥

  • @bablubawra1352
    @bablubawra1352 Před 3 měsíci

    make video how to email spoof happens

  • @ra.njan_kr
    @ra.njan_kr Před 3 měsíci +1

    Good video ,need more ways to hack website... (For learning purposes)

    • @ra.njan_kr
      @ra.njan_kr Před 3 měsíci

      Or if any resources or video ,just paste the link of that video or resources.. please

    • @INDIANchhanel-ii7zz
      @INDIANchhanel-ii7zz Před 3 měsíci

      😂😂😂

  • @robyee3325
    @robyee3325 Před 3 měsíci +1

    Isn’t this similar to sql injection?

    • @vasipalle
      @vasipalle Před 3 měsíci +4

      sql injections are bascially cross site scripting (XSS) for databases, this can allow users to download, modify and delete the database or parts of it. XSS on the other hand only works for websites, hence HTML tags

    • @robyee3325
      @robyee3325 Před 3 měsíci

      @@vasipalle thanks!

  • @user-hq8wm8giyujcg
    @user-hq8wm8giyujcg Před 3 měsíci

    Video on how to find someones phone number, address, email, password, ip address in the first place

  • @user-ur1db8pc6i
    @user-ur1db8pc6i Před 3 měsíci +1

    Hi I

  • @rockyforreal
    @rockyforreal Před 3 měsíci

    I think Bro wakeup from a coma

  • @PARIKAKU
    @PARIKAKU Před 3 měsíci

    Comeback

  • @jokerhackr
    @jokerhackr Před 3 měsíci +2

    I want to make a script for a game, brother, I want to earn money. Tell me brother, will you help me?

  • @user-hq8wm8giyujcg
    @user-hq8wm8giyujcg Před 3 měsíci

    How to hack social media companies and power my social media account so that no one cant block me and my post get popular and on top

  • @user-hq8wm8giyujcg
    @user-hq8wm8giyujcg Před 3 měsíci

    How to hack and destroy systems

  • @DynamicLights
    @DynamicLights Před 23 dny

    Educational purposes only 😂

  • @RubinBastakoti
    @RubinBastakoti Před 2 měsíci

    HELLO

  • @MarshmelloGTAG
    @MarshmelloGTAG Před 3 měsíci

    alert(1)

    • @The_offical_M
      @The_offical_M Před 3 měsíci +2

      Bro that not gonna work😂😂😂😂