Browsers

0
In this video we figure out how to do a popunder in Chrome version 59, by using a trick.
I wanted to compile a custom Chromium 68 build to totally ignore the obfuscated JavaScript. That was a cool experience, but in the end not necessary - the pop-under trick was super simple and works on Mac, Windows and Linux.
An actual XSS on google.com by Masato Kinugawa. It abuses a parser differential between a JavaScript enabled and disabled context.
Leaking data through a search cross origin, by abusing a behaviour of Chrome regarding iframed pages that trigger errors.
There are a lot of charlatans out their overhyping by posting misleading content. It's infuriating because a lot of the actual research is less flashy and thus more hidden. Maybe I'm a bit too pessimistic in this video, but I think it's a concrete example we can use talk about it.

Discover by Tools

Want to know how a tool can be used? Or learn more about a tool's feature? Find videos using certain tools.