Web Exploitation Tips
Web Exploitation Tips
-
Put a basic payload in all possible inputs:
qwe'"<X</
. And just watch text reflection on a website. If you will see somewhereqwe'"
(without angle brackets), there is a chance of XSS. Additionally, search for “qwe” text in the source code of the page. Use Developers Tools in the browser for this task. -
You can use

before javascript protocol to bypass XSS(cross-site scripting) protection in<a>
tag. Example:<a href="javascript:alert(1)">
-
You can try to bypass the uploaded file extension block using these tricks
file.html.
(using dot at the end) orfile.htm%6C
(using encoded l) -
SSTI ( (Server Side Template Injection) Payload List:
{{7*7}}
or${7*7}
or<%= 7*7 %>
or${{7*7}}
or#{7*7}
. If evaluated as 49 - target can be vulnerable to XSS or even RCE.
Credit to Anton@theceman