REDACTED EP02: Hacking a Payment Processor (ft Rhynorater)

7,824
0
Published 2023-12-04
Try out this lab for yourself 👇
app.hackinghub.io/post-message

📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training

💵 Support the Channel:
You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
☕️ Buy Me Coffee:
www.buymeacoffee.com/nahamsec

JOIN DISCORD:
discordapp.com/invite/ucCz7uh

🆓 🆓 🆓 $200 DigitalOcean Credit:
m.do.co/c/3236319b9d0b

💬 Social Media
- twitter.com/nahamsec
- instagram.com/nahamsec
- twitch.com/nahamsec
- facebook.com/nahamsec1


#bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp

All Comments (21)
  • @socalledhacker
    As always monday, coffee, nahamsec video... love it .... and also make some podcast buddy...
  • @MFoster392
    Justin is a wiz man, i follow him and his podcast, another awesome guest u da man Ben :-)
  • @odenko7680
    Naver heard of this attack, I need to recheck it. Thank you ben and your guest for the content .
  • @baravind719
    Nahamsec really appreciated for sharing good knowledge to us ❤. I have a question in this video that we need to bypass the SOP and need to creat a script which embeds attackers url which contains bypassed SOP url in it? And start attackers web server ? I'm just confused
  • been doing the htb ouija the last day and watching this as a break, i dont do these brainfuck level boxes but man. this video is a nice reset
  • @musawerkhan9817
    Does it necessary to find all the information of a target like whois, ns and more or we can only use the scope asset
  • @0xbeven462
    Thanks for bringing ryno to demonstrate on the podcast you can't visualize
  • @gysotgaming4530
    Love ya ben😊thank you for your videos 🫡1st comment gang😇
  • @MCcraft02
    where is the post message tracker extension link?