Student Reviews
( 5 Of 5 )
1 review
Video of How Can XSS Be Used to Access Sensitive Files TryHackMe The Sticker Shop in Web PenTesting course by Motasem Hamdan channel, video No. 52 free certified online
The video is a detailed walkthrough of a TryHackMe challenge called "The Sticker Shop," which explores Cross-Site Scripting (XSS) vulnerabilities and how they can be leveraged to compromise a system.
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://buymeacoffee.com/notescatalog/membership
Writeup
https://motasem-notes.net/how-can-xss-be-used-to-access-sensitive-files-tryhackme-the-sticker-shop/
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/mastermindstudynotes/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
0:00 - Introduction to the Sticker Shop Challenge
0:18 - Problem Statement Overview
0:36 - Initial Exploration of the Webpage
1:19 - Viewing Page Source and Developer Notes
1:31 - Understanding the Feedback Form
2:00 - Setting Up and Using Burp Suite
2:33 - Inspecting Requests and Responses
3:26 - Testing for Reflected XSS Vulnerabilities
4:32 - Exploring Stored and Blind XSS
5:14 - Setting Up Listener for XSS Payloads
6:24 - Crafting XSS Payload for Testing
7:27 - Confirming XSS Vulnerability
8:03 - Exploiting XSS for Information Disclosure
9:21 - Creating Payload to Access Sensitive Files
11:05 - Executing and Validating the Payload
12:42 - Alternative Approach with JavaScript
14:03 - Writing JavaScript for Advanced Exploits
17:10 - Final Payload Execution
17:32 - Conclusion and Flag Retrieval