Reflected XSS Protected by Very Strict CSP with Dangling Markup Attack

Reflected XSS Protected by Very Strict CSP with Dangling Markup Attack

z3nsh3ll

1 год назад

5,680 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@kenji8763
@kenji8763 - 23.03.2025 06:07

2025 update: There's been a Chrome update that breaks the dangling markup attack in this lab. There is, however, an alternative method using forms that still works, search for skullhat's article on this lab.
Also, if your exploit works against your own account (ie you can steal your own CSRF token), but can't the victim to click it, let your lab expire (takes ~15 minutes) and restart with a new lab, then it should work.

Ответить
@turbografx1690
@turbografx1690 - 23.03.2025 03:58

Absolutely fantastic video, thank you for this!

Ответить
@np7569
@np7569 - 23.02.2025 11:09

a work of art

Ответить
@leapof
@leapof - 12.01.2025 10:57

Loved your videos

Ответить
@_96blackjack50
@_96blackjack50 - 09.11.2024 15:03

not working..

Ответить
@Приветводка-й4м
@Приветводка-й4м - 03.10.2024 22:08

bro, idk but i think you exposed your public ip on the video

Ответить
@nazuko2721
@nazuko2721 - 24.08.2024 07:54

there's another lab related to CSP has been added in portswiger please solve that lab too
the time of your recoding that lab didn't been added but now it's added please solve it

Ответить
@mostafamohammed5080
@mostafamohammed5080 - 18.08.2024 22:22

I was disappointed when I did not find your explanation in portswigger lab and was ready to skip it at all because I did not understand a thing, but fortunately I tried to search a bit and was thrilled to see your amazing videos 🥰😍
Thank you very much for your kindness and amazing explanation👍

Ответить
@camilohurtado4814
@camilohurtado4814 - 17.07.2024 02:25

Has anybody been able to solve this lab recently?

Ответить
@0wners5651
@0wners5651 - 12.07.2024 14:18

thank you sir

Ответить
@youssef-kz3yn
@youssef-kz3yn - 30.06.2024 20:46

Please sir can you check if this exploit is still working on chrome latest version?? because it doesn't seem to work on chrome but the same exploit works on me on firefox

Ответить
@sr.holmes5552
@sr.holmes5552 - 19.02.2024 21:38

como siempre tus videos son una joya

Ответить
@mostafa12979
@mostafa12979 - 20.01.2024 14:36

Thank you so much ❤

Ответить
@1n3c
@1n3c - 15.01.2024 18:41

Very good job. Definitely worth watching.

Ответить
@MrCredo-tz5rh
@MrCredo-tz5rh - 05.01.2024 08:11

Thank you for your explanation!!!

Ответить
@minionikgaming-clashroyale6754
@minionikgaming-clashroyale6754 - 08.12.2023 05:32

I don't understand why only 480 people has watched this masterpiece explanation 🎉🎉🎉🎉
Loved it sir.
You explained my most favourite bug type so efficiently.

Ответить
@shooterdd632
@shooterdd632 - 16.11.2023 18:54

stealing CSRF token didn't work? Something were changed in this lab

Ответить
@bayaspirinha
@bayaspirinha - 16.11.2023 04:28

This lab cannot be solved in this way anymore, they patched using the URL of the lab as a replacement of Burp, very sad. Thanks for the video anyway, I learned a lot :)

Ответить
@fm0x1
@fm0x1 - 31.10.2023 14:15

Whoaa! the explanation was amazing, thanks you for share your knowledge bro.

Ответить
@javeleyjaveley
@javeleyjaveley - 12.10.2023 11:17

Why do you know GET has the hidden parameter email?

Ответить
@javeleyjaveley
@javeleyjaveley - 12.10.2023 11:11

I like your video

Ответить
@milapmerja5033
@milapmerja5033 - 09.10.2023 12:29

Great explanation brother. Helpful for a beginner to understand easily.

Ответить