Hacker Tweets Explained
Let me explain to you what you can learn from these tweets. Did you know the name trick?
Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io
Quote Tweet: https://twitter.com/avlidienbrunn/status/1697869590569582932
Original Tweet: https://twitter.com/Rhynorater/status/1696862832841916679
Critical Thinking Podcast: https://www.criticalthinkingpodcast.io/
XSS Origin Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjyakFK7puB3fHVfXMinqMSi
Chapters:
00:00 - Intro
00:37 - Tweets About Tricky XSS
01:24 - XSS Testbed Setup with php
03:45 - Exploring the XSS Context
05:24 - The window Object
06:46 - Tweet 1: Justin's XSS Explained
08:22 - Tweet 2: Mathias's Variant With Object
09:52 - Tweet 2: Mathias's Variant Creating Class
10:30 - The window.name Trick
12:00 - Closing Script Tag XSS
12:28 - Outro
=[ ❤️ Support ]=
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
2nd Channel: https://www.youtube.com/LiveUnderflow
=[ 🐕 Social ]=
→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Видео Hacker Tweets Explained канала LiveOverflow
Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io
Quote Tweet: https://twitter.com/avlidienbrunn/status/1697869590569582932
Original Tweet: https://twitter.com/Rhynorater/status/1696862832841916679
Critical Thinking Podcast: https://www.criticalthinkingpodcast.io/
XSS Origin Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjyakFK7puB3fHVfXMinqMSi
Chapters:
00:00 - Intro
00:37 - Tweets About Tricky XSS
01:24 - XSS Testbed Setup with php
03:45 - Exploring the XSS Context
05:24 - The window Object
06:46 - Tweet 1: Justin's XSS Explained
08:22 - Tweet 2: Mathias's Variant With Object
09:52 - Tweet 2: Mathias's Variant Creating Class
10:30 - The window.name Trick
12:00 - Closing Script Tag XSS
12:28 - Outro
=[ ❤️ Support ]=
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
2nd Channel: https://www.youtube.com/LiveUnderflow
=[ 🐕 Social ]=
→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Видео Hacker Tweets Explained канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![riscure embedded hardware CTF is over - loopback 0x03](https://i.ytimg.com/vi/FI4serDzE4w/default.jpg)
![Live Hacking - Internetwache CTF 2016 - web50, web60, web80](https://i.ytimg.com/vi/X_PbKmZfeVo/default.jpg)
![LiveOverflow Channel Trailer](https://i.ytimg.com/vi/xCEJfTfhtQc/default.jpg)
![format2 on a modern Ubuntu - bin 0x26](https://i.ytimg.com/vi/Kc6_PpdbcCw/default.jpg)
![Deepdive Containers - Kernel Sources and nsenter](https://i.ytimg.com/vi/sHp0Q3rvamk/default.jpg)
![What is a Protocol? (Deepdive)](https://i.ytimg.com/vi/d-zn-wv4Di8/default.jpg)
![Riscure Embedded Hardware CTF setup and introduction - rhme2 Soldering](https://i.ytimg.com/vi/u_U6F2Kkbb0/default.jpg)
![TCP Protocol introduction - bin 0x1A](https://i.ytimg.com/vi/0EHo0HsTKJw/default.jpg)
![XSS on the Wrong Domain T_T - Tech Support (web) Google CTF 2020](https://i.ytimg.com/vi/9ecv6ILXrZo/default.jpg)
![Finding 0day in Apache APISIX During CTF (CVE-2022-24112)](https://i.ytimg.com/vi/yrCXamnX9No/default.jpg)
![File Path Race Condition & How To Prevent It - bin 0x31](https://i.ytimg.com/vi/5g137gsB9Wk/default.jpg)
![Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2](https://i.ytimg.com/vi/H3rtbWQAMZ8/default.jpg)
![Exploit Fails? Debug Your Shellcode - bin 0x2B](https://i.ytimg.com/vi/re4teYmSoXA/default.jpg)
![New to Linux? Need Help Understanding Shell Commands?](https://i.ytimg.com/vi/3xIj8Xyx1TU/default.jpg)
![HACKERSPACES ARE AWESOME!](https://i.ytimg.com/vi/HJy-Y4nok3g/default.jpg)
![VPNs, Proxies and Secure Tunnels Explained (Deepdive)](https://i.ytimg.com/vi/32KKwgF67Ho/default.jpg)
![Fuzzing Browsers for weird XSS Vectors](https://i.ytimg.com/vi/yq_P3dzGiK4/default.jpg)
![Understanding C Pointer Magic Arithmetic | Ep. 07](https://i.ytimg.com/vi/zdzcTh9kUrc/default.jpg)
![The fakeobj() Primitive: Turning an Address Leak into a Memory Corruption](https://i.ytimg.com/vi/vwlG2l0ANuc/default.jpg)
![Solving Pwnable CTF Challenge With Docker Workflow](https://i.ytimg.com/vi/OqTpc_ljPYk/default.jpg)
![The HTTP Protocol: GET /test.html - web 0x01](https://i.ytimg.com/vi/C_gZb-rNcVQ/default.jpg)