Комментарии:
2025 update: There's been a Chrome update that breaks the dangling markup attack in this lab. There is, however, an alternative method using forms that still works, search for skullhat's article on this lab.
Also, if your exploit works against your own account (ie you can steal your own CSRF token), but can't the victim to click it, let your lab expire (takes ~15 minutes) and restart with a new lab, then it should work.
Absolutely fantastic video, thank you for this!
Ответитьa work of art
ОтветитьLoved your videos
Ответитьnot working..
Ответитьbro, idk but i think you exposed your public ip on the video
Ответитьthere's another lab related to CSP has been added in portswiger please solve that lab too
the time of your recoding that lab didn't been added but now it's added please solve it
I was disappointed when I did not find your explanation in portswigger lab and was ready to skip it at all because I did not understand a thing, but fortunately I tried to search a bit and was thrilled to see your amazing videos 🥰😍
Thank you very much for your kindness and amazing explanation👍
Has anybody been able to solve this lab recently?
Ответитьthank you sir
ОтветитьPlease sir can you check if this exploit is still working on chrome latest version?? because it doesn't seem to work on chrome but the same exploit works on me on firefox
Ответитьcomo siempre tus videos son una joya
ОтветитьThank you so much ❤
ОтветитьVery good job. Definitely worth watching.
ОтветитьThank you for your explanation!!!
ОтветитьI don't understand why only 480 people has watched this masterpiece explanation 🎉🎉🎉🎉
Loved it sir.
You explained my most favourite bug type so efficiently.
stealing CSRF token didn't work? Something were changed in this lab
ОтветитьThis lab cannot be solved in this way anymore, they patched using the URL of the lab as a replacement of Burp, very sad. Thanks for the video anyway, I learned a lot :)
ОтветитьWhoaa! the explanation was amazing, thanks you for share your knowledge bro.
ОтветитьWhy do you know GET has the hidden parameter email?
ОтветитьI like your video
ОтветитьGreat explanation brother. Helpful for a beginner to understand easily.
Ответить