June 10, 2023, 12:15 p.m. | CryptoCat

CryptoCat www.youtube.com

16 - Open Redirection (low/med/high difficulties) video from the Damn Vulnerable Web Application (DVWA) walkthrough/tutorial series. Hope you enjoy 🙂

↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23

↢Damn Vulnerable Web Application (DVWA)↣
https://github.com/digininja/DVWA

↢Open Redirects↣
@PwnFunction: https://www.youtube.com/watch?v=4Jk_I-cw4WE
https://learn.snyk.io/lessons/open-redirect/javascript
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/11-Client-side_Testing/04-Testing_for_Client-side_URL_Redirect
https://cwe.mitre.org/data/definitions/601.html
https://portswigger.net/support/using-burp-to-test-for-open-redirections

↢Chapters↣
Start - 0:00
Open Redirections - 0:06
Low - 1:53
Med - 6:14
High - 8:33
Impossible (source code review) - 10:33
End - 12:38

application code dvwa high hope low media open redirect open redirects redirects series social social media source code start tutorial video vulnerable vulnerable web application walkthrough web web application

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India

Cyber Program Manager - CISO- United States – Remote

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Network Security Engineer (AEGIS)

@ Peraton | Virginia Beach, VA, United States

SC2022-002065 Cyber Security Incident Responder (NS) - MON 13 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Information Systems Security Engineer

@ Booz Allen Hamilton | USA, GA, Warner Robins (300 Park Pl Dr)