Web Exploitation Tips
Web Exploitation Tips
-
Put a basic payload in all possible inputs:
qwe'"<X</. And just watch text reflection on a website. If you will see somewhereqwe'"(without angle brackets), there is a chance of XSS. Additionally, search for “qwe” text in the source code of the page. Use Developers Tools in the browser for this task. -
You can use
before javascript protocol to bypass XSS(cross-site scripting) protection in<a>tag. Example:<a href="javascript:alert(1)"> -
You can try to bypass the uploaded file extension block using these tricks
file.html.(using dot at the end) orfile.htm%6C(using encoded l) -
SSTI ( (Server Side Template Injection) Payload List:
{{7*7}}or${7*7}or<%= 7*7 %>or${{7*7}}or#{7*7}. If evaluated as 49 - target can be vulnerable to XSS or even RCE.
Credit to Anton@theceman