14 – JavaScript (low/med/high) – Damn Vulnerable Web Application (DVWA)



14 – JavaScript (low/med/high) – Damn Vulnerable Web Application (DVWA)

14 - JavaScript (low/med/high) - Damn Vulnerable Web Application (DVWA)

14 – JavaScript (low/med/high difficulties) video from the Damn Vulnerable Web Application (DVWA) walkthrough/tutorial series. Hope you enjoy 🙂

↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23

↢Damn Vulnerable Web Application (DVWA)↣
https://dvwa.co.uk/

↢JavaScript Hacking↣
https://www.hacker101.com/sessions/javascript_for_hackers.html
https://miloserdov.org/?p=4681

↢JavaScript Deobfuscation↣
http://www.jsnice.org/
https://lelinhtinh.github.io/de4js/
https://www.dcode.fr/javascript-unobfuscator
https://miloserdov.org/?p=4662

↢Chapters↣
Start – 0:00
Low – 1:05
Low (playing with Firefox debugger) – 7:00
Med (formatting code) – 14:43
Med – 17:47
High (deobfuscate) – 28:23
High (replace JS source file using burp) – 35:41
High (debug with devtools) – 45:09
Impossible – 54:38

Comments are closed.