تقييمات الطلاب
( 5 من 5 )
١ تقييمات
فيديو شرح How Can XSS Be Used to Access Sensitive Files TryHackMe The Sticker Shop ضمن كورس اختبار اختراق المواقع شرح قناة Motasem Hamdan Cyber Security & Tech، الفديو رقم 1 مجانى معتمد اونلاين
The video is a detailed walkthrough of a TryHackMe challenge called "The Sticker Shop," which explores Cross-Site Scripting (XSS) vulnerabilities and how they can be leveraged to compromise a system.
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://buymeacoffee.com/notescatalog/membership
Writeup
https://motasem-notes.net/how-can-xss-be-used-to-access-sensitive-files-tryhackme-the-sticker-shop/
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/mastermindstudynotes/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
0:00 - Introduction to the Sticker Shop Challenge
0:18 - Problem Statement Overview
0:36 - Initial Exploration of the Webpage
1:19 - Viewing Page Source and Developer Notes
1:31 - Understanding the Feedback Form
2:00 - Setting Up and Using Burp Suite
2:33 - Inspecting Requests and Responses
3:26 - Testing for Reflected XSS Vulnerabilities
4:32 - Exploring Stored and Blind XSS
5:14 - Setting Up Listener for XSS Payloads
6:24 - Crafting XSS Payload for Testing
7:27 - Confirming XSS Vulnerability
8:03 - Exploiting XSS for Information Disclosure
9:21 - Creating Payload to Access Sensitive Files
11:05 - Executing and Validating the Payload
12:42 - Alternative Approach with JavaScript
14:03 - Writing JavaScript for Advanced Exploits
17:10 - Final Payload Execution
17:32 - Conclusion and Flag Retrieval