Found XSS by bypassing the misconfigured CSP in one of the govt website of India!
Tip: Check out this new amazing tool that will be very useful in fuzzing interesting payloads, tags & events that will be useful when bypassing waf or csp (https://github.com/Asperis-Security/xssFuzz)
Tip: Check out this new amazing tool that will be very useful in fuzzing interesting payloads, tags & events that will be useful when bypassing waf or csp (https://github.com/Asperis-Security/xssFuzz)
👍22👏1
#Discussion 1: How can you start in bug bounty?
(Comment down your thoughts on how can be begin the hunting journey & let's start discussion on it!)
(Comment down your thoughts on how can be begin the hunting journey & let's start discussion on it!)
👍9💋1
This media is not supported in your browser
VIEW IN TELEGRAM
POV: It's late at night.. Your internet pack has just expired.. So you hacked your neighbors WiFi
#hackerman😎
#hackerman😎
😁19🤣6🐳2👍1🔥1
Discussion #2: Which is the tool that you commonly use when doing web recon?
(Comment it down below)
For me it's Ffuf
(Comment it down below)
For me it's Ffuf
❤9👍1
Hi everyone! New video will be releasing tomorrow!(btw i have tried something new on this video so please let me know in the comments if this new format feels nice✌️)
Thanks for all your support!❤
Thanks for all your support!❤
❤11
Hi everyone, New video is out!
Check out how i was able to bypass content security policy(csp) on a live target!
Video Link: https://www.youtube.com/watch?v=Hz6zfXMdl54
Check out how i was able to bypass content security policy(csp) on a live target!
Video Link: https://www.youtube.com/watch?v=Hz6zfXMdl54
YouTube
Live XSS Exploit: Using XSSFuzz to Break CSP on a Real Target!
In this video, I demonstrate how to exploit a live target using a powerful tool called XSSFuzz to uncover XSS vulnerabilities through a misconfigured CSP (Content Security Policy). Watch as I take you step-by-step through the process, revealing how XSSFuzz…
❤12👍4
#Discussion 3:
You are given these two targets to find vulnerabilities
api.test.com (homepage returns 403)
test.com(returns a static web app)
What will be your methodology??
(Comment your approach below!)
You are given these two targets to find vulnerabilities
api.test.com (homepage returns 403)
test.com(returns a static web app)
What will be your methodology??
(Comment your approach below!)
❤8
#Discussion 4: What's the most underrated tool that you would recommend to bug bounty hunters?
❤3
HI everyone, New video is out! Check out how we can turn an informative report into traiged with these 3 effective ways!
https://www.youtube.com/watch?v=UEz_DKfmmCc
https://www.youtube.com/watch?v=UEz_DKfmmCc
YouTube
3 Proven Techniques to Get Your Bug Bounty Report Accepted!
Are you struggling to get your bug bounty reports accepted? You’re not alone! In this video, I’ll share 3 proven techniques that can help you elevate your submissions from "informative" to "accepted." Whether you’re just starting out or looking to sharpen…
👍8❤3🔥2
While i have shared a lot of my bug bounty success story with you all, let me share story of my failures!
You know, When i was starting bug bounty hunting, I was unable to report a valid vulnerability for 6 month straight! Every report that i submitted got marked as informative, not applicable and duplicate! At that time, i was very demotivated, stressed and depressed. I was thinking, "Maybe bug bounty is not my thing" but suddenly, I started questioning myself:
1. Didn't i wanted to learn cyber security because it is my passion?
2. Am i only focusing on reporting vulnerabilities instead of improving my skills?
By asking these questions, I understand one thing: I need to switch my focus on learning, improving and hacking instead of getting demotivated because i was not getting any rewards! And eventually, I was able to get that first vulnerability and now i can easily say that i am the better version of myself than before!
You know, When i was starting bug bounty hunting, I was unable to report a valid vulnerability for 6 month straight! Every report that i submitted got marked as informative, not applicable and duplicate! At that time, i was very demotivated, stressed and depressed. I was thinking, "Maybe bug bounty is not my thing" but suddenly, I started questioning myself:
1. Didn't i wanted to learn cyber security because it is my passion?
2. Am i only focusing on reporting vulnerabilities instead of improving my skills?
By asking these questions, I understand one thing: I need to switch my focus on learning, improving and hacking instead of getting demotivated because i was not getting any rewards! And eventually, I was able to get that first vulnerability and now i can easily say that i am the better version of myself than before!
❤🔥32🔥8❤6👍6
What are your feedbacks on the new video?
Anonymous Poll
87%
It's awesome! Make more videos like this
9%
No, stick to your old format
4%
Others(comment your feedback)
In this same month, BePractical reached about 1k subscribers!!
I remember how I used to create videos in my hostel... The audio quality were very poor at that time since there were always students who kept fighting outside my room since my room was near canteen😂... But still you people supported me... Thanks a bunchhh!!!!!!!! ❤️
Keep hacking
I remember how I used to create videos in my hostel... The audio quality were very poor at that time since there were always students who kept fighting outside my room since my room was near canteen😂... But still you people supported me... Thanks a bunchhh!!!!!!!! ❤️
Keep hacking
❤32👏4🔥2
Hi everyone! We are excited to let you know that bepractical.tech website is back online! Unfortunately, We needed to remove the labs since there were some really critical vulnerabilities identified by us and few of our subscribers. However, we will be launching labs very soon. Stay tuned
🔥10❤4
Hi everyone! I have a great news to share with you all. After a lot of struggle, I am very excited to tell you all that i'll be doing live session with all you on the topic of Server Side Request Forgery! The webinar will be around 2 hrs long and will cover everything about ssrf from basics to advanced. The best part? IT WILL BE FREE FOR EVERYONE! We are going to do it in the month of November! See you all soon
❤65👍22❤🔥5🔥3