Beyond Alert(1): Demonstrating the impact of an XSS [Capture The Flag Fundamentals]

Sdílet
Vložit
  • čas přidán 27. 08. 2024

Komentáře • 13

  • @247CTF
    @247CTF  Před 4 lety +11

    🤖 Can anybody create an XSS payload to auto-subscribe to this channel? 🤖

    • @imherovirat
      @imherovirat Před 3 lety +2

      I don't know what forced me to click the subscribe button just after watching the first minute of the video. I think some one injected the payload on my hands.

  • @rusirumunasingha2234
    @rusirumunasingha2234 Před 4 lety +1

    Reddit bought me here. Subscribed! Love the technical explanations!!

  • @PinkDraconian
    @PinkDraconian Před 3 lety +2

    Great video!

    • @247CTF
      @247CTF  Před 3 lety +1

      Thanks for the visit

  • @domaincontroller
    @domaincontroller Před 3 lety +1

    01:20 hijacking

  • @hnsoni4
    @hnsoni4 Před 4 lety +1

    Consider myself noob I even failed to understand your explanation
    I am confused application is running on different server then how are you able to persist the JS ?

    • @247CTF
      @247CTF  Před 4 lety +1

      The application (on the left) is vulnerable to XSS. Another listening "server" (on the right), is receiving the JavaScript (on the bottom) payloads by GET requests. These payloads are being executed in the browser, from within the context of the affected user via the application (on the left) and sending requests to the "server" (on the right). The example XSS is reflected, so nothing is being persisted.

    • @hnsoni4
      @hnsoni4 Před 4 lety

      @@247CTF Thanks. I got it Now. Keep up the good work. One last request can we talk over discord or something I need some advice

    • @hnsoni4
      @hnsoni4 Před 4 lety

      @@247CTF And one more doubt. These things are not persisted then how can we force a user to do all these things. Cause these powerful attacks won't work unless it is persisted on the main application server itself?

  • @strongleongch
    @strongleongch Před 2 lety

    Hello from recommendations!